1. Diagnosis and Required Information
The quarantine details indicate that the email was blocked by the Office365 AntiPhish Default policy with the reason Phish / Spoof DMARC. This often occurs when a legitimate internal or third-party service sends an email on behalf of your domain but fails Microsoft 365's authentication checks (SPF, DKIM, or DMARC).
To create the correct exclusion, you need two pieces of information from the quarantine report:
2. Recommended Solution: Tenant Allow/Block List (Spoofed Senders)
The most targeted way to allow a legitimate spoofed sender is by adding the specific sender/infrastructure pair to the Tenant Allow/Block List in the Microsoft 365 Defender portal.
Step A: Access the Tenant Allow/Block List
Sign in to the Microsoft 365 Defender portal (https://security.microsoft.com) as a Security Administrator.
Navigate to Email & collaboration > Policies & rules > Threat policies.
Select Tenant Allow/Block Lists.
Go to the Spoofed senders tab.
Click Add.
Step B: Populate the "Add new domain pairs" Form
Use the data gathered in Step 1 to fill out the form (as shown in your screenshot):
Example Input for the Text Box:
Click Add to save the exclusion.
3. Alternative Solution: Mail Flow Rule (Transport Rule)
If the Tenant Allow/Block List is not an option or doesn't work, you can create a Mail Flow Rule in the Exchange Admin Center to bypass anti-phishing protection for the specific sender IP.
Sign in to the Exchange Admin Center (EAC).
Go to Mail flow > Rules.
Click Add a rule and select Create a new rule...
Set Conditions:
Under Apply this rule if... select: The sender > IP address is in any of these ranges or exactly matches.
Enter the Sender IP: 203.44.156.236 and add it.
Set Action:
Under Do the following... select: Modify the message properties > set a message header.
Set the message header to: X-Forefront-Antispam-Report
Set the value to: SFV:SKI;CAT:NONE; (This instructs the filtering engine to skip anti-spam/phishing checks).
Save the rule.
4. Important Security Note (Long-Term Fix)
Relying on security exclusions is a workaround. For the most secure and reliable long-term solution, you should address the root cause: the failed email authentication.
The report shows:
DMARC: Fail
SPF: Soft fail
DKIM: None
You should contact your hosting provider or the administrator of the 203.44.156.236 IP to ensure:
Your domain's SPF record for cyp.org.au is updated to explicitly include the sending IP address 203.44.156.236.
DKIM signing is properly configured and enabled for this sending service.
Fixing the authentication will allow the messages to pass DMARC/SPF/DKIM checks, eliminating the need for the security exclusion.