Skip to content

Commit 2663799

Browse files
committed
Block Teams domains
1 parent eaceb4d commit 2663799

7 files changed

+116
-119
lines changed

defender-office-365/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -253,6 +253,8 @@
253253
href: tenant-allow-block-list-urls-configure.md
254254
- name: Allow or block IPv6 addresses using the Tenant Allow/Block List
255255
href: tenant-allow-block-list-ip-addresses-configure.md
256+
- name: Block domains in Microsoft Teams using the Tenant Allow/Block List
257+
href: tenant-allow-block-list-teams-domains-configure.md
256258
- name: Admin submissions
257259
href: submissions-admin.md
258260
- name: Create block sender lists

defender-office-365/mdo-support-teams-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ appliesto:
3030
With the increased use of collaboration tools like Microsoft Teams, the possibility of malicious attacks using chat messages has also increased. Microsoft Defender for Office 365 already provides the following Teams protection features:
3131

3232
- Time of click protection for URLs and files in Teams messages through [Safe Links for Microsoft Teams](safe-links-about.md#safe-links-settings-for-microsoft-teams) and [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).
33-
- Allow/block [domains](tenant-allow-block-list-teams-domain-configure.md), [URLs](tenant-allow-block-list-urls-configure.md) and [files](tenant-allow-block-list-files-configure.md) inside Teams using the Tenant Allow Block List.
33+
- Allow/block [domains](tenant-allow-block-list-teams-domains-configure.md), [URLs](tenant-allow-block-list-urls-configure.md) and [files](tenant-allow-block-list-files-configure.md) inside Teams using the Tenant Allow Block List.
3434

3535
In Microsoft 365 E5 and Defender for Office 365 Plan 2, we've extended Teams protection with a set of capabilities that are designed to disrupt the attack chain:
3636

defender-office-365/mdo-support-teams-sec-ops-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ SecOps team members can also use block entries in the Tenant Allow/Block List to
5959
SecOps team members can use threat hunting or information from external threat intelligence feeds to proactively respond to false negative Teams messages (bad messages allowed). They can use the information to proactively block threats. For example:
6060

6161
- [Create URL block entries](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) in the Tenant Allow/Block List in Defender for Office 365. Block entries apply at time of click for URLs in Teams.
62-
- [Block domains in Teams using the Tenant Allow/Block List](tenant-allow-block-list-teams-domain-configure.md).
62+
- [Block domains in Teams using the Tenant Allow/Block List](tenant-allow-block-list-teams-domains-configure.md).
6363
- Submit undetected URLs to Microsoft using [admin submission](submissions-admin.md#report-questionable-urls-to-microsoft).
6464

6565
> [!TIP]
42.7 KB
Loading

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ For usage and configuration instructions, see the following articles:
4444
- **Files**: [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
4545
- **URLs**: [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).
4646
- **IP addresses**: [Allow or block IPv6 addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
47-
- **Teams domains**: [Block domains in Microsoft Teams using the Tenant Allow/Block List](tenant-allow-block-list-teams-domain-configure.md).
47+
- **Teams domains**: [Block domains in Microsoft Teams using the Tenant Allow/Block List](tenant-allow-block-list-teams-domains-configure.md).
4848

4949
These articles contain procedures in the Microsoft Defender portal and in PowerShell.
5050

@@ -74,7 +74,7 @@ In the Tenant Allow/Block List, you can also directly create block entries for t
7474

7575
- **[IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ipv6-addresses)**: If you manually create a block entry, all incoming email messages from that IP address are dropped at the edge of the service.
7676

77-
- **[Teams domains]((tenant-allow-block-list-teams-domain-configure.md))**: If you manually create a block entry, all incoming communication over Teams from that domain will be blocked whereas existing communication will be deleted.
77+
- **[Teams domains]((tenant-allow-block-list-teams-domains-configure.md))**: If you manually create a block entry, all incoming communication over Teams from that domain will be blocked whereas existing communication will be deleted.
7878

7979
By default, the following types of block entries expire after 30 days, but you can set them to expire up 90 days or to never expire:
8080

@@ -86,7 +86,7 @@ The following types of block entries never expire:
8686

8787
- [Spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders)
8888
- [IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ipv6-addresses)
89-
- [Teams domains](tenant-allow-block-list-teams-domain-configure.md).
89+
- [Teams domains](tenant-allow-block-list-teams-domains-configure.md).
9090

9191
## Allow entries in the Tenant Allow/Block List
9292

defender-office-365/tenant-allow-block-list-teams-domain-configure

Lines changed: 0 additions & 114 deletions
This file was deleted.

0 commit comments

Comments
 (0)