If your team forwards mail through gateways, list servers, or security services, this scenario is probably familiar: SPF fails, DKIM fails, DMARC fails, and yet the message is still clearly legitimate.
That is exactly where ARC becomes operationally useful.
But the part that causes confusion is this: ARC is not a universal bypass. It only helps when the receiver trusts the ARC sealer and local policy decides to use that ARC evidence.
This guide focuses on that practical boundary for Microsoft 365 and Gmail: when ARC can influence a DMARC outcome, and when it cannot.
If ARC itself still feels new, start with ARC basics: authenticated chain of custody, then come back here.
Think of ARC as signed testimony about earlier authentication checks.
ARC-Authentication-Results, ARC-Message-Signature, ARC-Seal).The important word is may.
ARC does not force a receiver to accept a message. It gives extra context that a receiver can choose to trust.
Microsoft 365 lets admins explicitly define trusted ARC sealers (by domain in the ARC d= value).
When that trust is configured and the chain validates, Microsoft can use previous authentication context from ARC during composite authentication decisions, including scenarios where transit modifications caused current-hop SPF/DKIM/DMARC failures.
Microsoft's own doc is very direct here, including how to validate this in headers (arc=pass, oda=1, and composite auth signals):
https://learn.microsoft.com/en-us/defender-office-365/email-authentication-arc-configure
Practical takeaway: in Microsoft 365, "trusted ARC sealer" is a concrete admin control, not just a vague concept.
Gmail's guidance also makes the boundary clear:
References:
So if someone says, "ARC passed, therefore Gmail must accept," that is simply not how it works in practice.
ARC is most helpful when all of these are true:
In other words, ARC helps explain why a direct DMARC check failed now while still proving the message had good authentication earlier in the path.
If you want a fast incident workflow for reading those headers, use How to read ARC cv/i/d/s in incidents.
ARC usually does not help when:
This is why ARC should be treated as additional signal, not a replacement for SPF, DKIM, DMARC, or anti-abuse controls.
Use this checklist during rollout and post-incident review:
d=/s=).cv=none at i=1, cv=pass onward in healthy paths).For background on why forwarding breaks direct checks in the first place, see Why forwarding breaks SPF/DKIM and affects DMARC.
Mailbox providers do not publish a universal, static "trusted sealer allowlist" for everyone to rely on in all circumstances. Trust decisions are implementation-specific and can evolve over time.
Treat provider documentation as the source of truth for behavior, then validate with your own headers and outcomes.
That approach avoids the most common ARC mistake: assuming protocol validity automatically equals delivery success.
Trusted ARC sealers matter because they let receivers use signed historical authentication context when forwarding breaks direct SPF/DKIM alignment.
They do not override all other checks, and they do not turn ARC into a guaranteed pass.
Use ARC as intended: a high-value context signal inside a broader authentication and anti-abuse decision.