Token_file - str: Path to save the token fileĪllow_unencrypted_storage - bool: Allows the Azure Identity This defaults to theĬurrent user if using the UsernamePassword auth method, butĬould be a shared mailbox if the user has access to the mailbox This is requiredįor all auth methods except UsernamePassword. Password - str: The user password, required when the authĬlient_id - str: The app registration’s client IDĬlient_secret - str: The app registration’s secret User - str: The M365 user, required when the auth method is UsernamePassword, DeviceCode, or ClientSecret Skip_certificate_verification - bool: Skip certificateĪuth_method - str: Authentication method, valid types are Ssl - bool: Use an encrypted SSL/TLS connection If your host recommends another port, still try 993 N_procs - int: Number of process to run in parallel whenĬhunk_size - int: Number of files to give to each process Log_file - str: Write log messages to a file at this path Silent - bool: Only print errors (Default: True) Nameservers - str: A comma separated list ofĭNS resolvers (Default: Cloudflare’s public resolvers) Offline - bool: Do not use online queries for geolocation Ip_db_path - str: An optional custom path to a MMDB file Output - str: Directory to place JSON and CSV files inĪggregate_json_filename - str: filename for the aggregateįorensic_json_filename - str: filename for the forensic ![]() Strip_attachment_payloads - bool: Remove attachment Save_forensic - bool: Save forensic report data to Save_aggregate - bool: Save aggregate report data to The full set of configuration options are: # This is an example comment save_aggregate = True save_forensic = True host = user = password = $uperSecure watch = True delete = False hosts = 127.0.0.1:9200 ssl = False url = token = HECTokenGoesHere index = email bucket = my-bucket path = parsedmarc server = localhost port = 514 v, -version show program's version number and exit log-file LOG_FILE output logging to a file s, -silent only print errors and warnings offline do not make online queries for geolocation or DNS Number of seconds to wait for an answer from DNS n NAMESERVERS, -nameservers NAMESERVERS forensic-csv-filename FORENSIC_CSV_FILENAMEįilename for the forensic CSV output file aggregate-csv-filename AGGREGATE_CSV_FILENAMEįilename for the aggregate CSV output file forensic-json-filename FORENSIC_JSON_FILENAMEįilename for the forensic JSON output file ![]() aggregate-json-filename AGGREGATE_JSON_FILENAMEįilename for the aggregate JSON output file ![]() Write output files to the given directory Remove attachment payloads from forensic report output c CONFIG_FILE, -config-file CONFIG_FILEĪ path to a configuration file (-silent implied) h, -help show this help message and exit įile_path one or more paths to aggregate or forensic report Lookalike domain monitoring, check out DomainAware. If you are looking for SPF and DMARC record validation and parsing,ĭMARC protects against domain spoofing, not lookalike domains. Optionally send the results to Elasticsearch and/or Splunk, for use withĭemystifying DMARC - A complete guide to SPF, DKIM, and DMARC Transparently handles gzip or zip compressed reports Parses draft and 1.0 standard aggregate/rua reportsĬan parse reports from an inbox over IMAP, Microsoft Graph, or Gmail API Open source alternative to commercial DMARC report processing services suchĪs Agari Brand Protection, Dmarcian, OnDMARC, ProofPoint Email Fraud Defense, When used with Elasticsearch and Kibana (or Splunk), it works as a self-hosted Parsedmarc is a Python module and CLI utility for parsing DMARC reports. Please consider reviewing the open issues to see how you can contribute code, documentation, or user support.Īssistance on the pinned issues would be particularly helpful. This is a project is maintained by one developer.
0 Comments
Leave a Reply. |