Skip to content

Commit 3c8c546

Browse files
committed
Calling out message vs entity level allow
Calling out different type of allow and how they act
1 parent 299a2a7 commit 3c8c546

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

defender-office-365/how-policies-and-protections-are-combined.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
description: Admins can learn how the order of protection settings and the priority order of security policies affect the application of security policies in Microsoft 365.
1818
ms.service: defender-office-365
1919
search.appverid: met150
20-
ms.date: 05/16/2024
20+
ms.date: 09/12/2024
2121
appliesto:
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -180,7 +180,10 @@ Tenant allows and blocks are able to override some filtering stack verdicts as d
180180
|Bulk|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
181181
|Not spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
182182

183-
- [Allow entries in the Tenant Allow/Block List](tenant-allow-block-list-about.md#allow-entries-in-the-tenant-allowblock-list):
183+
- [Allow entries in the Tenant Allow/Block List](tenant-allow-block-list-about.md#allow-entries-in-the-tenant-allowblock-list):
184+
- There are two type of allow here: message level allow and entity level allow
185+
- Message level allow which act on the entire message irrespective of the entity present. Email address/domain allow is an example of this type.
186+
- Entity level allow which act on the filter verdict for that entity. URL, Spoofed sender, file allow are example of this type. To override malware and high confidence phishing verdict you need to have these type of allow which can be created by submission only due to [Secure by default in Office 365](secure-by-default.md).
184187

185188
|Filtering stack verdict|Email address/domain|
186189
|---|---|

0 commit comments

Comments
 (0)