Skip to content

Commit 2d85cef

Browse files
authored
Merge pull request #953 from dhairyya/dhagarwal_working
45 days after last used date
2 parents ac5e54a + f3bac9c commit 2d85cef

File tree

4 files changed

+11
-8
lines changed

4 files changed

+11
-8
lines changed

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: deniseb
88
audience: ITPro
99
ms.topic: how-to
1010
ms.localizationpriority: medium
11-
ms.date: 06/10/2024
11+
ms.date: 07/15/2024
1212
search.appverid:
1313
- MET150
1414
ms.collection:
@@ -96,7 +96,7 @@ The following list describes what happens in the Tenant Allow/Block List when yo
9696
- If the message was blocked for any other reason, an allow entry for the sender email address or domain is created, and the entry appears on the **Domains & addresses** tab in the Tenant Allow/Block List.
9797
- If the message wasn't blocked due to filtering, no allow entries are created anywhere.
9898

99-
By default, allow entries for domains and email addresses, files, and URLs exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). After Microsoft learns from the removed allow entries, messages that contain those entities are delivered, unless something else in the message is detected as malicious. By default, allow entries for spoofed senders never expire.
99+
By default, allow entries for domains and email addresses, files, and URLs exist for 45 days after last used date. Whenever the entity that isn't determined to be clean by the filtering system is encountered during mail flow or time of click, the allow entry activates and updates the last used date. The allow entry is kept for 45 days after the filtering system determines that the entity is clean. By default, allow entries for spoofed senders never expire.
100100

101101
> [!IMPORTANT]
102102
> Microsoft doesn't allow you to create allow entries directly. Unnecessary allow entries expose your organization to malicious email that could have been filtered by the system.

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier1
1616
description: Admins can learn how to allow or block email and spoofed sender entries in the Tenant Allow/Block List.
1717
ms.service: defender-office-365
18-
ms.date: 4/30/2024
18+
ms.date: 07/15/2024
1919
appliesto:
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -82,7 +82,7 @@ Instead, you use the **Emails** tab on the **Submissions** page at <https://secu
8282
>
8383
> When the entity in the allow entry is encountered again (during mail flow or at time of click), all filters associated with that entity are overridden.
8484
>
85-
> By default, allow entries for domains and email addresses exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). After Microsoft learns from the removed allow entries, messages that contain those entities are delivered, unless something else in the message is detected as malicious.
85+
> By default, allow entries for domains and email addresses, files, and URLs exist for 45 days after last used date. Whenever the entity that isn't determined to be clean by the filtering system is encountered during mail flow or time of click, the allow entry activates and updates the last used date. The allow entry is kept for 45 days after the filtering system determines that the entity is clean. By default, allow entries for spoofed senders never expire.
8686
>
8787
> During mail flow, if messages containing the allowed entity pass other checks in the filtering stack, the messages will be delivered. For example, if a message passes [email authentication checks](email-authentication-about.md), URL filtering, and file filtering, the message is delivered if it's also from an allowed sender.
8888
@@ -220,6 +220,7 @@ In existing domain and email address entries, you can change the expiration date
220220
- **1 day**
221221
- **7 days**
222222
- **30 days**
223+
- **45 days after last used date**
223224
- **Specific date**: The maximum value is 30 days from today.
224225
- **Optional note**
225226

defender-office-365/tenant-allow-block-list-files-configure.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier1
1616
description: Admins can learn how to allow or block files in the Tenant Allow/Block List.
1717
ms.service: defender-office-365
18-
ms.date: 4/30/2024
18+
ms.date: 07/15/2024
1919
appliesto:
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -82,7 +82,7 @@ Instead, you use the **Email attachments** tab on the **Submissions** page at <h
8282
>
8383
> When the entity in the allow entry is encountered again (during mail flow or at time of click), all filters associated with that entity are overridden.
8484
>
85-
> By default, allow entries for files exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). After Microsoft learns from the removed allow entries, messages that contain those entities are delivered, unless something else in the message is detected as malicious.
85+
> By default, allow entries for domains and email addresses, files, and URLs exist for 45 days after last used date. Whenever the entity that isn't determined to be clean by the filtering system is encountered during mail flow or time of click, the allow entry activates and updates the last used date. The allow entry is kept for 45 days after the filtering system determines that the entity is clean. By default, allow entries for spoofed senders never expire.
8686
>
8787
> During mail flow, if messages containing the allowed entity pass other checks in the filtering stack, the messages are delivered. For example, if a message passes [email authentication checks](email-authentication-about.md), the message is delivered if it also contains an allowed file.
8888
>
@@ -221,6 +221,7 @@ In existing file entries, you can change the expiration date and note.
221221
- **1 day**
222222
- **7 days**
223223
- **30 days**
224+
- **45 days after last used date**
224225
- **Specific date**: The maximum value is 30 days from today.
225226
- **Optional note**
226227

defender-office-365/tenant-allow-block-list-urls-configure.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier1
1616
description: Admins can learn how to allow or block URLs in the Tenant Allow/Block List.
1717
ms.service: defender-office-365
18-
ms.date: 4/30/2024
18+
ms.date: 07/15/2024
1919
appliesto:
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -84,7 +84,7 @@ Instead, you use the **URLs** tab on the **Submissions** page at <https://securi
8484
>
8585
> When the entity in the allow entry is encountered again (during mail flow or at time of click), all filters associated with that entity are overridden.
8686
>
87-
> By default, allow entries for URLs exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). After Microsoft learns from the removed allow entries, messages that contain those URLs are delivered, unless something else in the message is detected as malicious.
87+
> By default, allow entries for domains and email addresses, files, and URLs exist for 45 days after last used date. Whenever the entity that isn't determined to be clean by the filtering system is encountered during mail flow or time of click, the allow entry activates and updates the last used date. The allow entry is kept for 45 days after the filtering system determines that the entity is clean. By default, allow entries for spoofed senders never expire.
8888
>
8989
> During mail flow, if messages containing the allowed URL pass other checks in the filtering stack, the messages are delivered. For example, if a message passes [email authentication checks](email-authentication-about.md) and file filtering, the message is delivered if it also contains an allowed URL.
9090
>
@@ -221,6 +221,7 @@ In existing URL entries, you can change the expiration date and note.
221221
- **1 day**
222222
- **7 days**
223223
- **30 days**
224+
- **45 days after last used date**
224225
- **Specific date**: The maximum value is 30 days from today.
225226
- **Optional note**
226227

0 commit comments

Comments
 (0)