Microsoft is currently working on adding a custom Authenticated Received Chain (ARC) configuration support to Microsoft Defender for Office 365.
What is ARC?
ARC is an email authentication method that offers an authenticated “chain of custody” for messages that allow all intermediaries (one that handles the email starting from the origin server to recipient mailbox) to see what other entities are used to manage at every stage of email delivery process.
With ARC configuration support for Microsoft Office 365, email authentication results failure will be prevented. The failure can be due to the modifications done during the email routing. This includes modifications made within the forwarding rules or the mailing lists before it reaches the recipient’s inbox.
Microsoft on their Microsoft 365 roadmap explained that the email senders utilize DKIM, SPF, DMARC authentication methods for email authentication. However, some of the legit intermediate services make changes within the email, which is possibly the reason for email authentication failure at the subsequent hop.
Now as Microsoft 365 gets ARC configuration support, admins can add the trusted intermediaries in the Microsoft 365 Defender portal. Microsoft will now honor the admin added ARC signatures thereby permitting legit messages.
The ability to alter the ARC configurations incorporates added trusted entities to modify messages with attributions and also links up the signatures with their domain name which thereby helps keep the ARC chains intact.
Starting from March 2022, the Custom ARC configuration support will be available to Office 365 users across the globe.
Enhance Anti-Spoofing Detection within Office 365
Back in 2015, DMARC.org announced ARC. However, the specification was published by IETF’s DMARC Working Group, four years later in July 2019.
And, in October 2019, the ARC configuration was enabled to further enhance anti-spoofing detection in the Microsoft Office 365.
Meanwhile, Defender for Office 365 would make it simpler for security teams to recognize the users and malicious domains that are used to execute the phishing attacks.
Additionally, the Office 365 consumers will be notified about any suspious activity detected within their environment.
Featured Image: microsoft.com
Looking for more Microsoft news? Signup for our news later for the latest update.
Additionally, you can also check out the latest Web Hosting News here!