Skip to content

Commit 28f0cea

Browse files
committed
Edits to IP addresses in TABL
1 parent 6affbe6 commit 28f0cea

6 files changed

+27
-29
lines changed

defender-office-365/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -241,7 +241,7 @@
241241
- name: Allow or block URLs using the Tenant Allow/Block List
242242
href: tenant-allow-block-list-urls-configure.md
243243
- name: Allow or block IP addresses using the Tenant Allow/Block List
244-
href: tenant-allow-block-list-IP-configure.md
244+
href: tenant-allow-block-list-ip-addresses-configure.md
245245
- name: Admin submissions
246246
href: submissions-admin.md
247247
- name: Create block sender lists

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ appliesto:
3232
3333
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, you might disagree with the EOP or Microsoft Defender for Office 365 filtering verdict. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative).
3434

35-
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow or time of click for incoming messages from external senders.
35+
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow or time of click for incoming messages from external senders.
3636

3737
Entries for **Domains and email addresses** and **Spoofed senders** apply to internal messages sent within the organization. Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
3838

@@ -43,7 +43,7 @@ For usage and configuration instructions, see the following articles:
4343
- **Domains and email addresses** and **spoofed senders**: [Allow or block emails using the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
4444
- **Files**: [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
4545
- **URLs**: [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).
46-
- **IP addresses**: [Allow or block IPs using the Tenant Allow/Block List](tenant-allow-block-list-IP-configure.md).
46+
- **IP addresses**: [Allow or block IP addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
4747

4848
These articles contain procedures in the Microsoft Defender portal and in PowerShell.
4949

@@ -71,9 +71,11 @@ In the Tenant Allow/Block List, you can also directly create block entries for t
7171

7272
- **[Spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders)**: If you manually override an existing allow verdict from [spoof intelligence](anti-spoofing-spoof-intelligence.md), the blocked spoofed sender becomes a manual block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List.
7373

74-
- **[IP addresses](tenant-allow-block-list-IP-configure.md#create-block-entries-for-IP-addresses)**: If you manually create a block, all incoming emails from that incoming sending IP address will get dropped on the edge.
74+
- **[IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses)**: If you manually create a block entry, all incoming email messages from that IP address are dropped at the edge of the service.
7575

76-
By default, block entries for [domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses), [files](tenant-allow-block-list-files-configure.md#create-block-entries-for-files) and [URLs](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) expire after 30 days, but you can set them to expire up 90 days or to never expire. Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders) and [IP addresses](tenant-allow-block-list-email-IP-configure.md#create-block-entries-for-IP-addresses)never expire.
76+
By default, block entries for [domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses), [files](tenant-allow-block-list-files-configure.md#create-block-entries-for-files) and [URLs](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) expire after 30 days, but you can set them to expire up 90 days or to never expire.
77+
78+
Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders) and [IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses) never expire.
7779

7880
## Allow entries in the Tenant Allow/Block List
7981

@@ -85,8 +87,7 @@ In most cases, you can't directly create allow entries in the Tenant Allow/Block
8587
- If spoof intelligence already blocked the message as spoofing, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to [report the email to Microsoft](submissions-admin.md#report-good-email-to-microsoft) as **I've confirmed it's clean**, and then select **Allow this message**.
8688
- You can proactively create [an allow entry for a spoofed sender](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders) on the **Spoofed sender** tab in the Tenant Allow/Block List before [spoof intelligence](anti-spoofing-spoof-intelligence.md) identifies and blocks the message as spoofing.
8789

88-
- **IP Addresses**:
89-
- You can proactively create an [an allow entry for an IP address](tenant-allow-block-list-email-IP-configure.md#create-allow-entries-for-IP-addresses) on the **IP addresses** tab in the Tenant Allow/Block List to override the IP filters for incoming message from them.
90+
- **IP Addresses**: You can proactively create an [an allow entry for an IP address](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses) on the **IP addresses** tab in the Tenant Allow/Block List to override the IP filters for incoming messages.
9091

9192
The following list describes what happens in the Tenant Allow/Block List when you submit something to Microsoft as a false positive on the **Submissions** page:
9293

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -543,4 +543,4 @@ For submission instructions for impersonation false positives, see [Report good
543543
- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)
544544
- [Allow or block files in the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
545545
- [Allow or block URLs in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)
546-
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-IP-configure.md)
546+
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)

defender-office-365/tenant-allow-block-list-files-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -283,4 +283,4 @@ For detailed syntax and parameter information, see [Remove-TenantAllowBlockListI
283283
- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)
284284
- [Allow or block emails in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
285285
- [Allow or block URLs in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)
286-
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-IP-configure.md)
286+
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)

defender-office-365/tenant-allow-block-list-IP-configure.md renamed to defender-office-365/tenant-allow-block-list-ip-addresses-configure.md

Lines changed: 16 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -36,10 +36,10 @@ This article describes how admins can manage entries for IP addresses in the Mic
3636

3737
- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).
3838

39-
- Only support IPv6 addresses in the following format:
40-
- Single IPv6 address in Colon-Hexadecimal Notation. for example, 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
41-
- Single IPv6 address in Zero Compression. for example, 2001:db8::1 represents 2001:0db8:0000:0000:0000:0000:0000:0001.
42-
- CIDR IPv6 range. for example, 2001:0db8::/32. 1-128 range is supported
39+
- IPv6 addresses are supported only in the following formats:
40+
- Single addresses in colon-hexadecimal format. For example, 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
41+
- Single addresses in zero compression format. For example, 2001:db8::1 represents 2001:0db8:0000:0000:0000:0000:0000:0001.
42+
- CIDR IPv6 range. For example, 2001:0db8::/32. 1-128 range is supported.
4343

4444
- Entry limits for IP addresses:
4545
- **Exchange Online Protection**: The maximum number of allow entries is 500, and the maximum number of block entries is 500 (1000 IP entries in total).
@@ -66,9 +66,9 @@ This article describes how admins can manage entries for IP addresses in the Mic
6666
6767
## Create allow entries for IP addresses
6868

69-
The allow entry only override the IP filters for that sending IP address. You can create allow entries for IP addresses directly in the Tenant Allow/Block List, using either of the following methods:
69+
The allow entry overrides only the IP filters for the specified sending IP address.
7070

71-
- From the **IP addresses** tab on the **Tenant Allow/Block Lists** page or in PowerShell as described in this section.
71+
You can create allow entries for IP addresses directly in the Tenant Allow/Block List as described in this section.
7272

7373
### Use the Microsoft Defender portal to create allow entries for IP addresses in the Tenant Allow/Block List
7474

@@ -85,7 +85,7 @@ This article describes how admins can manage entries for IP addresses in the Mic
8585
- **Remove allow entry after**: Select from the following values:
8686
- **1 day**
8787
- **7 days**
88-
- **30 days**
88+
- **30 days**
8989
- **Never expire** (default)
9090
- **Specific date**: The maximum value is 90 days from today.
9191

@@ -95,7 +95,7 @@ This article describes how admins can manage entries for IP addresses in the Mic
9595

9696
Back on the **IP addresses** tab, the entry is listed.
9797

98-
##### Use PowerShell to create allow entries for IP addresses in the Tenant Allow/Block List
98+
#### Use PowerShell to create allow entries for IP addresses in the Tenant Allow/Block List
9999

100100
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
101101

@@ -106,17 +106,16 @@ New-TenantAllowBlockListItems -ListType IP -Allow -Entries "IPAddress1","IPAddre
106106
This example adds an allow entry for the specified IP address that never expires.
107107

108108
```powershell
109-
New-TenantAllowBlockListItems -ListType IP -Allow -Entries "2001:db8:3333:4444:5555:6666:7777:8882"-NoExpiration
109+
New-TenantAllowBlockListItems -ListType IP -Allow -Entries "2001:db8:3333:4444:5555:6666:7777:8882" -NoExpiration
110110
```
111111

112112
For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
113113

114-
115114
## Create block entries for IP addresses
116115

117-
Email messages send from the blocked IP addresses are dropped on the edge. To create block entries for IP addresses, use either of the following methods:
116+
You can create block entries for IP addresses directly in the Tenant Allow/Block List as described in this section.
118117

119-
- From the **IP addresses** tab on the **Tenant Allow/Block Lists** page or in PowerShell as described in this section.
118+
Incoming email messages from IP addresses in block entries are blocked at the edge of the service.
120119

121120
### Use the Microsoft Defender portal to create block entries for IP addresses in the Tenant Allow/Block List
122121

@@ -133,7 +132,7 @@ Email messages send from the blocked IP addresses are dropped on the edge. To cr
133132
- **Remove block entry after**: Select from the following values:
134133
- **1 day**
135134
- **7 days**
136-
- **30 days**
135+
- **30 days**
137136
- **Never expire** (default)
138137
- **Specific date**: The maximum value is 90 days from today.
139138

@@ -143,7 +142,7 @@ Email messages send from the blocked IP addresses are dropped on the edge. To cr
143142

144143
Back on the **IP addresses** tab, the entry is listed.
145144

146-
##### Use PowerShell to create block entries for IP addresses in the Tenant Allow/Block List
145+
#### Use PowerShell to create block entries for IP addresses in the Tenant Allow/Block List
147146

148147
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
149148

@@ -154,12 +153,11 @@ New-TenantAllowBlockListItems -ListType IP -Block -Entries "IPAddress1","IPAddre
154153
This example adds an block entry for the specified IP address that never expires.
155154

156155
```powershell
157-
New-TenantAllowBlockListItems -ListType IP -Block -Entries "2001:db8:3333:4444:5555:6666:7777:8882"-NoExpiration
156+
New-TenantAllowBlockListItems -ListType IP -Block -Entries "2001:db8:3333:4444:5555:6666:7777:8882" -NoExpiration
158157
```
159158

160159
For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
161160

162-
163161
## Use the Microsoft Defender portal to view entries for IP addresses in the Tenant Allow/Block List
164162

165163
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
@@ -248,19 +246,18 @@ For existing IP addresses entries, you can change the expiration date and note.
248246

249247
When you're finished in the **Edit IP addresses** flyout, select **Save**.
250248

251-
252249
### Use PowerShell to modify existing allow or block entries for IP addresses in the Tenant Allow/Block List
253250

254251
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
255252

256253
```powershell
257-
Set-TenantAllowBlockListItems -ListType IP <-Ids <Identity value> | -Entries <Value>> [<-ExpirationDate Date | -NoExpiration>] [-Notes <String>]
254+
Set-TenantAllowBlockListItems -ListType IP <-Ids <Identity value> | -Entries <Value> [<-ExpirationDate Date | -NoExpiration>] [-Notes <String>]
258255
```
259256

260257
This example changes the expiration date of the specified IP address block entry.
261258

262259
```powershell
263-
Set-TenantAllowBlockListItems -ListType IP -Entries "2001:db8:3333:4444:5555:6666:7777:8882" -ExpirationDate "9/1/2022"
260+
Set-TenantAllowBlockListItems -ListType IP -Entries "2001:db8:3333:4444:5555:6666:7777:8882" -ExpirationDate "9/1/2024"
264261
```
265262

266263
For detailed syntax and parameter information, see [Set-TenantAllowBlockListItems](/powershell/module/exchange/set-tenantallowblocklistitems).

defender-office-365/tenant-allow-block-list-urls-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -523,4 +523,4 @@ The following entries are invalid:
523523
- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)
524524
- [Allow or block files in the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
525525
- [Allow or block emails in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
526-
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-IP-configure.md)
526+
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)

0 commit comments

Comments
 (0)