You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/defender-for-office-365-whats-new.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
8
8
author: chrisda
9
9
manager: deniseb
10
10
ms.localizationpriority: medium
11
-
ms.date: 02/25/2025
11
+
ms.date: 03/03/2025
12
12
audience: ITPro
13
13
ms.collection:
14
14
- m365-security
@@ -39,10 +39,12 @@ For more information on what's new with other Microsoft Defender security produc
39
39
-[What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
40
40
-[What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
41
41
42
-
## February 2025
42
+
## March 2025
43
43
44
44
-**User reported messages by third-party add-ins can be sent to Microsoft for analysis**: In [user reported settings](submissions-user-reported-messages-custom-mailbox.md), admins can select **Monitor reported messages in Outlook**\>**Use a non-Microsoft add-in button**. In the **Reported message destination** section, select **Microsoft and my reporting mailbox**, and then provide the email address of the internal Exchange Online mailbox where user-reported messages by the third-party add-in are routed to. Microsoft analyzea these reported messages and provides result on the **User reported** tab of **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>.
45
45
46
+
-**Create allow entries directly in the Tenant Allow/Block List**: You can now create allow entries for domains & addresses and URLs directly in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). This capability is available in Microsoft 365 Worldwide, GCC, GCC High, DoD, and Office 365 operated by 21Vianet.
47
+
46
48
## January 2025
47
49
48
50
-[Use the built-in Report button in Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): The built-in **Report** button in Outlook for iOS version 4.2508 or, later and Android version 4.2446 or later now supports the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) experience to report messages as Phishing, Junk, and Not Junk.
Copy file name to clipboardExpand all lines: defender-office-365/submissions-admin.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -309,6 +309,7 @@ After a few moments, the associated allow entries appear on the **Domains & addr
309
309
> - By default, allow entries for domains and email addresses are kept for 45 days after the filtering system determines that the entity is clean, and then the allow entry is removed. For all other values like 1 day, 7 days, 30 days, specific date the allow entry expire at the defined date. By default, allow entries for spoofed senders never expire.
310
310
> - For messages that were incorrectly blocked by [domain or user impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365), the allow entry for the domain or sender is not created in the Tenant Allow/Block List. Instead, the domain or sender is added to the **Trusted senders and domains** section in the [anti-phishing policy](anti-phishing-policies-mdo-configure.md#use-the-microsoft-defender-portal-to-modify-anti-phishing-policies) that detected the message.
311
311
> - When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>.
312
+
> - If you allow at least 7 email addresses in the same domain in the Tenant Allow/Block List, submissions automatically roll up the email addresses into a domain allow entry. This action happens when submission is trying to add an email address allow for that domain.
Copy file name to clipboardExpand all lines: defender-office-365/tenant-allow-block-list-about.md
+11-3Lines changed: 11 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: deniseb
8
8
audience: ITPro
9
9
ms.topic: how-to
10
10
ms.localizationpriority: medium
11
-
ms.date: 09/20/2024
11
+
ms.date: 03/03/2025
12
12
search.appverid:
13
13
- MET150
14
14
ms.collection:
@@ -79,9 +79,17 @@ Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configur
79
79
80
80
## Allow entries in the Tenant Allow/Block List
81
81
82
-
In most cases, you can't directly create allow entries in the Tenant Allow/Block List. Unnecessary allow entries expose your organization to malicious email that could have been filtered by the system.
82
+
Unnecessary allow entries expose your organization to malicious email that could have been filtered by the system, so there are limitations for creating allow entries directly in the Tenant Allow/Block List:
83
83
84
-
-**Domains and email addresses**, **files**, and **URLs**: You can't create allow entries directly in the Tenant Allow/Block List. Instead you use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to submit the **[email](submissions-admin.md#report-good-email-to-microsoft)**, **[email attachment](submissions-admin.md#report-good-email-attachments-to-microsoft)**, or **[URL](submissions-admin.md#report-good-urls-to-microsoft)** to Microsoft. After you select **I've confirmed it's clean**, you can then select **Allow this message**, **Allow this file**, or **Allow this URL** to create an allow entry for the domains and email addresses, files, or URLs.
84
+
-**Domains and email addresses** and **URLs**: You can create allow entries directly in the Tenant Allow/Block List to override the following verdicts:
85
+
- Bulk
86
+
- Spam
87
+
- High confidence spam
88
+
- Phishing (not high confidence phishing)
89
+
90
+
For malware and high confidence phishing verdicts, you can't create allow entries directly in the Tenant Allow/Block List. Instead, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to submit the **[email](submissions-admin.md#report-good-email-to-microsoft)** or **[URL](submissions-admin.md#report-good-urls-to-microsoft)** to Microsoft. After you select **I've confirmed it's clean**, you can then select **Allow this message** or **Allow this URL** to create an allow entry for the domains and email addresses or URLs.
91
+
92
+
-**Files**: You can't create allow entries directly in the Tenant Allow/Block List. Instead, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to submit the **[email attachment](submissions-admin.md#report-good-email-attachments-to-microsoft)** to Microsoft. After you select **I've confirmed it's clean**, you can then select **Allow this file** to create an allow entry for the files.
85
93
86
94
-**Spoofed senders**:
87
95
- If spoof intelligence already blocked the message as spoofing, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to [report the email to Microsoft](submissions-admin.md#report-good-email-to-microsoft) as **I've confirmed it's clean**, and then select **Allow this message**.
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -73,12 +73,65 @@ This article describes how admins can manage entries for email senders in the Mi
73
73
74
74
### Create allow entries for domains and email addresses
75
75
76
-
You can't create allow entries for domains and email addresses directly in the Tenant Allow/Block List. Unnecessary allow entries expose your organization to malicious email that would have been filtered by the system.
76
+
Unnecessary allow entries expose your organization to malicious email that would have been filtered by the system, so there are limitations for creating allow entries directly in the Tenant Allow/Block List.
77
77
78
-
Instead, you use the **Emails** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=email>. When you submit a blocked message as **I've confirmed it's clean** and then select **Allow this message**, an allow entry for the sender is added to the **Domains & email addresses** tab on the **Tenant Allow/Block Lists** page. For instructions, see [Submit good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft).
78
+
To create allow entries for domains and email addresses, use either of the following methods:
79
+
80
+
- From the **Emails** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=email>. When you submit a blocked message as **I've confirmed it's clean** and then select **Allow this message**, an allow entry for the sender is added to the **Domains & email addresses** tab on the **Tenant Allow/Block Lists** page. For instructions, see [Submit good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft).
81
+
82
+
This method is required to override malware and high confidence phishing verdicts.
83
+
84
+
- From the **Domains & addresses** tab on the **Tenant Allow/Block Lists** page or in PowerShell as described in this section.
85
+
86
+
This method is available to override the following verdicts only:
#### Use the Microsoft Defender portal to create allow entries for domains and email addresses in the Tenant Allow/Block List
96
+
97
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
98
+
99
+
2. On the **Tenant Allow/Block Lists** page, verify that the **Domains & addresses** tab is selected.
100
+
101
+
3. On the **Domains & addresses** tab, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add**, and then select **Allow**.
102
+
103
+
4. In the **Allow domains & addresses** flyout that opens, configure the following settings:
104
+
105
+
-**Domains & addresses**: Enter one email address or domain per line, up to a maximum of 20.
106
+
107
+
-**Remove allow entry after**: Select from the following values:
108
+
-**45 days after last used date** (default)
109
+
-**1 day**
110
+
-**7 days**
111
+
-**Specific date**: The maximum value is 30 days from today.
112
+
113
+
-**Optional note**: Enter descriptive text for why you're allowing the email addresses or domains.
114
+
115
+
5. When you're finished in the **Block domains & addresses** flyout, select **Add**.
116
+
117
+
Back on the **Domains & email addresses** tab, the entry is listed.
118
+
119
+
##### Use PowerShell to create allow entries for domains and email addresses in the Tenant Allow/Block List
120
+
121
+
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
This example adds an allow entry for the specified email addresses. Because we didn't use the ExpirationDate or RemoverAfter parameters, the entry expires after 45 days from last used date.
For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
134
+
82
135
### Create block entries for domains and email addresses
83
136
84
137
To create block entries for *domains and email addresses*, use either of the following methods:
@@ -102,7 +155,7 @@ Email from these blocked senders is marked as *high confidence phishing* and qua
102
155
103
156
2. On the **Tenant Allow/Block Lists** page, verify that the **Domains & addresses** tab is selected.
104
157
105
-
3. On the **Domains & addresses** tab, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Block**.
158
+
3. On the **Domains & addresses** tab, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add**, and then select **Block**.
106
159
107
160
4. In the **Block domains & addresses** flyout that opens, configure the following settings:
108
161
@@ -147,6 +200,10 @@ On the **Domains & addresses** tab, you can sort the entries by clicking on an a
147
200
148
201
-**Value**: The domain or email address.
149
202
-**Action**: The value **Allow** or **Block**.
203
+
-**Override verdicts**: The available values are:
204
+
-**Up to malware** for block entries.
205
+
-**Up to regular confidence phishing** for allow entries created directly in Tenant Allow/Block List.
206
+
-**Up to high confidence phishing** for allow entries created via submissions.
150
207
-**Modified by**
151
208
-**Last updated**
152
209
-**Last used date**: The date the entry was last used in the filtering system to override the verdict.
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -97,7 +97,7 @@ To create block entries for files, use either of the following methods:
97
97
98
98
2. On the **Tenant Allow/Block Lists** page, select the **Files** tab.
99
99
100
-
3. On the **Files** tab, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Block**.
100
+
3. On the **Files** tab, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add**, and then select **Block**.
101
101
102
102
4. In the **Block files** flyout that opens, configure the following settings:
103
103
@@ -142,6 +142,7 @@ On the **Files** tab, you can sort the entries by clicking on an available colum
142
142
143
143
-**Value**: The file hash.
144
144
-**Action**: The available values are **Allow** or **Block**.
145
+
-**Override verdicts**: The available values are **Up to malware** for both block and allow entries.
145
146
-**Modified by**
146
147
-**Last updated**
147
148
-**Last used date**: The date the entry was last used in the filtering system to override the verdict.
0 commit comments