Skip to content

Commit 07d9de2

Browse files
authored
Merge pull request #4956 from pradeepmi-MSFT/patch-3
(AzureCXP) fixes MicrosoftDocs/defender-docs-pr#487164
2 parents 8f19fc6 + 6403c29 commit 07d9de2

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: bagol
88
audience: ITPro
99
ms.topic: how-to
1010
ms.localizationpriority: medium
11-
ms.date: 07/28/2025
11+
ms.date: 09/08/2025
1212
search.appverid:
1313
- MET150
1414
ms.collection:
@@ -107,6 +107,9 @@ Unnecessary allow entries expose your organization to malicious email that the s
107107
- You can proactively create [an allow entry for a spoofed sender](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders) on the **Spoofed sender** tab in the Tenant Allow/Block List before [spoof intelligence](anti-spoofing-spoof-intelligence.md) identifies and blocks the message as spoofing.
108108

109109
- **IP Addresses**: You can proactively create an [an allow entry for an IP address](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ipv6-addresses) on the **IP addresses** tab in the Tenant Allow/Block List to override the IP filters for incoming messages.
110+
- An IP address allow entry bypasses IP-based filtering checks (for example, connection filtering or IP reputation checks).
111+
- An IP address allow entry doesn't change message throttling behavior.
112+
- An IP address block entry rejects messages at the service edge.
110113

111114
The following list describes what happens in the Tenant Allow/Block List when you submit something to Microsoft as a false positive on the **Submissions** page:
112115

0 commit comments

Comments
 (0)