Skip to content

Commit 12bad6b

Browse files
authored
Merge branch 'main' into patch-9
2 parents f8dde6c + 5522a36 commit 12bad6b

7 files changed

+142
-18
lines changed

defender-endpoint/microsoft-defender-security-center-antivirus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- m365-security
1515
- tier2
1616
search.appverid: met150
17-
ms.date: 08/28/2023
17+
ms.date: 03/03/2025
1818
---
1919

2020
# Microsoft Defender Antivirus in the Windows Security app

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
88
author: chrisda
99
manager: deniseb
1010
ms.localizationpriority: medium
11-
ms.date: 02/25/2025
11+
ms.date: 03/03/2025
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -39,10 +39,12 @@ For more information on what's new with other Microsoft Defender security produc
3939
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
4040
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4141

42-
## February 2025
42+
## March 2025
4343

4444
- **User reported messages by third-party add-ins can be sent to Microsoft for analysis**: In [user reported settings](submissions-user-reported-messages-custom-mailbox.md), admins can select **Monitor reported messages in Outlook** \> **Use a non-Microsoft add-in button**. In the **Reported message destination** section, select **Microsoft and my reporting mailbox**, and then provide the email address of the internal Exchange Online mailbox where user-reported messages by the third-party add-in are routed to. Microsoft analyzea these reported messages and provides result on the **User reported** tab of **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>.
4545

46+
- **Create allow entries directly in the Tenant Allow/Block List**: You can now create allow entries for domains & addresses and URLs directly in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). This capability is available in Microsoft 365 Worldwide, GCC, GCC High, DoD, and Office 365 operated by 21Vianet.
47+
4648
## January 2025
4749

4850
- [Use the built-in Report button in Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): The built-in **Report** button in Outlook for iOS version 4.2508 or, later and Android version 4.2446 or later now supports the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) experience to report messages as Phishing, Junk, and Not Junk.

defender-office-365/submissions-admin.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -309,6 +309,7 @@ After a few moments, the associated allow entries appear on the **Domains & addr
309309
> - By default, allow entries for domains and email addresses are kept for 45 days after the filtering system determines that the entity is clean, and then the allow entry is removed. For all other values like 1 day, 7 days, 30 days, specific date the allow entry expire at the defined date. By default, allow entries for spoofed senders never expire.
310310
> - For messages that were incorrectly blocked by [domain or user impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365), the allow entry for the domain or sender is not created in the Tenant Allow/Block List. Instead, the domain or sender is added to the **Trusted senders and domains** section in the [anti-phishing policy](anti-phishing-policies-mdo-configure.md#use-the-microsoft-defender-portal-to-modify-anti-phishing-policies) that detected the message.
311311
> - When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>.
312+
> - If you allow at least 7 email addresses in the same domain in the Tenant Allow/Block List, submissions automatically roll up the email addresses into a domain allow entry. This action happens when submission is trying to add an email address allow for that domain.
312313
313314
### Report good email attachments to Microsoft
314315

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: deniseb
88
audience: ITPro
99
ms.topic: how-to
1010
ms.localizationpriority: medium
11-
ms.date: 09/20/2024
11+
ms.date: 03/03/2025
1212
search.appverid:
1313
- MET150
1414
ms.collection:
@@ -79,9 +79,17 @@ Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configur
7979

8080
## Allow entries in the Tenant Allow/Block List
8181

82-
In most cases, you can't directly create allow entries in the Tenant Allow/Block List. Unnecessary allow entries expose your organization to malicious email that could have been filtered by the system.
82+
Unnecessary allow entries expose your organization to malicious email that could have been filtered by the system, so there are limitations for creating allow entries directly in the Tenant Allow/Block List:
8383

84-
- **Domains and email addresses**, **files**, and **URLs**: You can't create allow entries directly in the Tenant Allow/Block List. Instead you use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to submit the **[email](submissions-admin.md#report-good-email-to-microsoft)**, **[email attachment](submissions-admin.md#report-good-email-attachments-to-microsoft)**, or **[URL](submissions-admin.md#report-good-urls-to-microsoft)** to Microsoft. After you select **I've confirmed it's clean**, you can then select **Allow this message**, **Allow this file**, or **Allow this URL** to create an allow entry for the domains and email addresses, files, or URLs.
84+
- **Domains and email addresses** and **URLs**: You can create allow entries directly in the Tenant Allow/Block List to override the following verdicts:
85+
- Bulk
86+
- Spam
87+
- High confidence spam
88+
- Phishing (not high confidence phishing)
89+
90+
For malware and high confidence phishing verdicts, you can't create allow entries directly in the Tenant Allow/Block List. Instead, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to submit the **[email](submissions-admin.md#report-good-email-to-microsoft)** or **[URL](submissions-admin.md#report-good-urls-to-microsoft)** to Microsoft. After you select **I've confirmed it's clean**, you can then select **Allow this message** or **Allow this URL** to create an allow entry for the domains and email addresses or URLs.
91+
92+
- **Files**: You can't create allow entries directly in the Tenant Allow/Block List. Instead, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to submit the **[email attachment](submissions-admin.md#report-good-email-attachments-to-microsoft)** to Microsoft. After you select **I've confirmed it's clean**, you can then select **Allow this file** to create an allow entry for the files.
8593

8694
- **Spoofed senders**:
8795
- If spoof intelligence already blocked the message as spoofing, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to [report the email to Microsoft](submissions-admin.md#report-good-email-to-microsoft) as **I've confirmed it's clean**, and then select **Allow this message**.

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 61 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier1
1616
description: Admins can learn how to allow or block email and spoofed sender entries in the Tenant Allow/Block List.
1717
ms.service: defender-office-365
18-
ms.date: 11/27/2024
18+
ms.date: 03/03/2025
1919
appliesto:
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -73,12 +73,65 @@ This article describes how admins can manage entries for email senders in the Mi
7373

7474
### Create allow entries for domains and email addresses
7575

76-
You can't create allow entries for domains and email addresses directly in the Tenant Allow/Block List. Unnecessary allow entries expose your organization to malicious email that would have been filtered by the system.
76+
Unnecessary allow entries expose your organization to malicious email that would have been filtered by the system, so there are limitations for creating allow entries directly in the Tenant Allow/Block List.
7777

78-
Instead, you use the **Emails** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=email>. When you submit a blocked message as **I've confirmed it's clean** and then select **Allow this message**, an allow entry for the sender is added to the **Domains & email addresses** tab on the **Tenant Allow/Block Lists** page. For instructions, see [Submit good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft).
78+
To create allow entries for domains and email addresses, use either of the following methods:
79+
80+
- From the **Emails** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=email>. When you submit a blocked message as **I've confirmed it's clean** and then select **Allow this message**, an allow entry for the sender is added to the **Domains & email addresses** tab on the **Tenant Allow/Block Lists** page. For instructions, see [Submit good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft).
81+
82+
This method is required to override malware and high confidence phishing verdicts.
83+
84+
- From the **Domains & addresses** tab on the **Tenant Allow/Block Lists** page or in PowerShell as described in this section.
85+
86+
This method is available to override the following verdicts only:
87+
88+
- Bulk
89+
- Spam
90+
- High confidence spam
91+
- Phishing (not high confidence phishing)
7992

8093
[!INCLUDE [Allow entry facts](../includes/allow-entry-facts.md)]
8194

95+
#### Use the Microsoft Defender portal to create allow entries for domains and email addresses in the Tenant Allow/Block List
96+
97+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
98+
99+
2. On the **Tenant Allow/Block Lists** page, verify that the **Domains & addresses** tab is selected.
100+
101+
3. On the **Domains & addresses** tab, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add**, and then select **Allow**.
102+
103+
4. In the **Allow domains & addresses** flyout that opens, configure the following settings:
104+
105+
- **Domains & addresses**: Enter one email address or domain per line, up to a maximum of 20.
106+
107+
- **Remove allow entry after**: Select from the following values:
108+
- **45 days after last used date** (default)
109+
- **1 day**
110+
- **7 days**
111+
- **Specific date**: The maximum value is 30 days from today.
112+
113+
- **Optional note**: Enter descriptive text for why you're allowing the email addresses or domains.
114+
115+
5. When you're finished in the **Block domains & addresses** flyout, select **Add**.
116+
117+
Back on the **Domains & email addresses** tab, the entry is listed.
118+
119+
##### Use PowerShell to create allow entries for domains and email addresses in the Tenant Allow/Block List
120+
121+
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
122+
123+
```powershell
124+
New-TenantAllowBlockListItems -ListType Sender -Allow -Entries "DomainOrEmailAddress1","DomainOrEmailAddress1",..."DomainOrEmailAddressN" [-RemoveAfter 45] [-Notes <String>]
125+
```
126+
127+
This example adds an allow entry for the specified email addresses. Because we didn't use the ExpirationDate or RemoverAfter parameters, the entry expires after 45 days from last used date.
128+
129+
```powershell
130+
New-TenantAllowBlockListItems -ListType Sender -Allow -Entries "[email protected]","[email protected]"
131+
```
132+
133+
For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
134+
82135
### Create block entries for domains and email addresses
83136

84137
To create block entries for *domains and email addresses*, use either of the following methods:
@@ -102,7 +155,7 @@ Email from these blocked senders is marked as *high confidence phishing* and qua
102155

103156
2. On the **Tenant Allow/Block Lists** page, verify that the **Domains & addresses** tab is selected.
104157

105-
3. On the **Domains & addresses** tab, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Block**.
158+
3. On the **Domains & addresses** tab, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add**, and then select **Block**.
106159

107160
4. In the **Block domains & addresses** flyout that opens, configure the following settings:
108161

@@ -147,6 +200,10 @@ On the **Domains & addresses** tab, you can sort the entries by clicking on an a
147200

148201
- **Value**: The domain or email address.
149202
- **Action**: The value **Allow** or **Block**.
203+
- **Override verdicts**: The available values are:
204+
- **Up to malware** for block entries.
205+
- **Up to regular confidence phishing** for allow entries created directly in Tenant Allow/Block List.
206+
- **Up to high confidence phishing** for allow entries created via submissions.
150207
- **Modified by**
151208
- **Last updated**
152209
- **Last used date**: The date the entry was last used in the filtering system to override the verdict.

defender-office-365/tenant-allow-block-list-files-configure.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier1
1616
description: Admins can learn how to allow or block files in the Tenant Allow/Block List.
1717
ms.service: defender-office-365
18-
ms.date: 07/18/2024
18+
ms.date: 03/03/2025
1919
appliesto:
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -97,7 +97,7 @@ To create block entries for files, use either of the following methods:
9797

9898
2. On the **Tenant Allow/Block Lists** page, select the **Files** tab.
9999

100-
3. On the **Files** tab, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Block**.
100+
3. On the **Files** tab, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add**, and then select **Block**.
101101

102102
4. In the **Block files** flyout that opens, configure the following settings:
103103

@@ -142,6 +142,7 @@ On the **Files** tab, you can sort the entries by clicking on an available colum
142142

143143
- **Value**: The file hash.
144144
- **Action**: The available values are **Allow** or **Block**.
145+
- **Override verdicts**: The available values are **Up to malware** for both block and allow entries.
145146
- **Modified by**
146147
- **Last updated**
147148
- **Last used date**: The date the entry was last used in the filtering system to override the verdict.

0 commit comments

Comments
 (0)