You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
TABL is added support for blocking domains in Teams admin center. So added a new document for it. Updated TABL, Microsoft Teams overview, Microsoft secops guide to call it out.
Copy file name to clipboardExpand all lines: defender-office-365/mdo-support-teams-about.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- tier1
17
17
description: Admins can learn about Microsoft Teams features in Microsoft Defender for Office 365 Plan 2.
18
18
ms.service: defender-office-365
19
-
ms.date: 07/24/2025
19
+
ms.date: 07/28/2025
20
20
appliesto:
21
21
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
22
22
---
@@ -30,7 +30,7 @@ appliesto:
30
30
With the increased use of collaboration tools like Microsoft Teams, the possibility of malicious attacks using chat messages has also increased. Microsoft Defender for Office 365 already provides the following Teams protection features:
31
31
32
32
- Time of click protection for URLs and files in Teams messages through [Safe Links for Microsoft Teams](safe-links-about.md#safe-links-settings-for-microsoft-teams) and [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).
33
-
- Allow/block [URLs](tenant-allow-block-list-urls-configure.md) and [files](tenant-allow-block-list-files-configure.md) inside Teams using Tenant Allow Block Lists.
33
+
- Allow/block [domains](tenant-allow-block-list-teams-domain-configure.md), [URLs](tenant-allow-block-list-urls-configure.md) and [files](tenant-allow-block-list-files-configure.md) inside Teams using Tenant Allow Block Lists.
34
34
35
35
In Microsoft 365 E5 and Defender for Office 365 Plan 2, we've extended Teams protection with a set of capabilities that are designed to disrupt the attack chain:
Copy file name to clipboardExpand all lines: defender-office-365/mdo-support-teams-sec-ops-guide.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- tier1
17
17
description: A prescriptive playbook for SecOps personnel to manage Microsoft Teams protection in Microsoft Defender for Office 365.
18
18
ms.service: defender-office-365
19
-
ms.date: 04/22/2025
19
+
ms.date: 07/28/2025
20
20
appliesto:
21
21
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
22
22
---
@@ -59,7 +59,7 @@ SecOps team members can also use block entries in the Tenant Allow/Block List to
59
59
SecOps team members can use threat hunting or information from external threat intelligence feeds to proactively respond to false negative Teams messages (bad messages allowed). They can use the information to proactively block threats. For example:
60
60
61
61
-[Create URL block entries](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) in the Tenant Allow/Block List in Defender for Office 365. Block entries apply at time of click for URLs in Teams.
62
-
-[Block domains in Teams using the Teams admin center](/microsoftteams/trusted-organizations-external-meetings-chat#specify-trusted-microsoft-365-organizations).
62
+
-[Block domains in Teams using the Tenant Allow/Block List](tenant-allow-block-list-teams-domain-configure.md).
63
63
- Submit undetected URLs to Microsoft using [admin submission](submissions-admin.md#report-questionable-urls-to-microsoft).
Copy file name to clipboardExpand all lines: defender-office-365/tenant-allow-block-list-about.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: deniseb
8
8
audience: ITPro
9
9
ms.topic: how-to
10
10
ms.localizationpriority: medium
11
-
ms.date: 07/08/2025
11
+
ms.date: 07/28/2025
12
12
search.appverid:
13
13
- MET150
14
14
ms.collection:
@@ -30,9 +30,9 @@ appliesto:
30
30
> [!IMPORTANT]
31
31
> To allow phishing URLs that are part of non-Microsoft attack simulation training, use the [advanced delivery configuration](advanced-delivery-policy-configure.md) to specify the URLs. Don't use the Tenant Allow/Block List.
32
32
33
-
You might occasionally disagree with the filtering verdict from the default email protections for cloud mailboxes or from Microsoft Defender for Office 365. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative).
33
+
You might occasionally disagree with the filtering verdict from Microsoft Defender for Office 365 for cloud email mailboxes or Microsoft Teams or Office apps. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative) or a URL might be blocked when it shouldn't have.
34
34
35
-
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override filtering verdicts. The list is used during mail flow or time of click for incoming messages from external senders.
35
+
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override filtering verdicts. The list is used during mail flow (for email) or time of click (for Teams, Office, Email)from senders.
36
36
37
37
Entries for **Domains and email addresses** and **Spoofed senders** apply to messages from both internal and external senders. Special handling applies to internal spoofing scenarios. Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
38
38
@@ -44,6 +44,7 @@ For usage and configuration instructions, see the following articles:
44
44
-**Files**: [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
45
45
-**URLs**: [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).
46
46
-**IP addresses**: [Allow or block IPv6 addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
47
+
-**Teams domains**: [Block domains in Microsoft Teams using the Tenant Allow/Block List](tenant-allow-block-list-teams-domain-configure.md).
47
48
48
49
These articles contain procedures in the Microsoft Defender portal and in PowerShell.
49
50
@@ -73,6 +74,8 @@ In the Tenant Allow/Block List, you can also directly create block entries for t
73
74
74
75
-**[IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ipv6-addresses)**: If you manually create a block entry, all incoming email messages from that IP address are dropped at the edge of the service.
75
76
77
+
-**[Teams domains]((tenant-allow-block-list-teams-domain-configure.md))**: If you manually create a block entry, all incoming communication over Teams from that domain will be blocked whereas existing communication will be deleted.
78
+
76
79
By default, the following types of block entries expire after 30 days, but you can set them to expire up 90 days or to never expire:
77
80
78
81
-[Domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses)
@@ -83,6 +86,7 @@ The following types of block entries never expire:
title: Block domains in Microsoft Teams using the Tenant Allow/Block List
3
+
f1.keywords:
4
+
- NOCSH
5
+
ms.author: chrisda
6
+
author: chrisda
7
+
manager: deniseb
8
+
audience: ITPro
9
+
ms.topic: how-to
10
+
ms.localizationpriority: medium
11
+
search.appverid:
12
+
- MET150
13
+
ms.collection:
14
+
- m365-security
15
+
- tier1
16
+
description: Admins can learn how to block domains in Microsoft Teams using the Tenant Allow/Block List.
17
+
ms.service: defender-office-365
18
+
ms.date: 07/28/2025
19
+
appliesto:
20
+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
# Block domains in Microsoft Teams using the Tenant Allow/Block List
25
+
26
+
<!-- MDO Trial banner content goes here. If needed, manually include the banner text or leave this comment as a placeholder. -->
27
+
28
+
In all organizations with Microsoft Teams with EOP, admins can create and manage entries for domains to block in the Teams Admin center using the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
29
+
30
+
This article describes how security admins can manage entries for blocked domains in the Teams admin center using the Microsoft Defender portal.
31
+
32
+
33
+
- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
34
+
35
+
- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).
36
+
37
+
## What do you need to know before you begin?
38
+
39
+
- Entry limits for domains:
40
+
41
+
- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>. Than go to **Teams domains** tab.
42
+
43
+
- Entries never expire.
44
+
45
+
- An entry should be active within 5 minutes.
46
+
47
+
- Once the block entry is added, all new communication from that tenant over Teams is blocked. This includes new Teams meetings, chats, channels, and calls. Existing Teams meetings, chats, channels, and calls are deleted.
48
+
49
+
- You need to ensure that on the [external access policy in the teams admin center](https://admin.teams.microsoft.com/company-wide-settings/external-communications) the Teams and Skype for Business users in external organizations are configured to **Allow all external domains** or **Block only specific external domains**. If you select **Block all external domains** or **Allow only specific external domains**, than you cannot add domains v the Tenant Allow/Block List.
50
+
51
+
- You also need to ensure that on the [external access policy in the teams admin center](https://admin.teams.microsoft.com/company-wide-settings/external-communications) "Allow my security team to manage blocked domains" is enabled. If this option is disabled, you cannot do anything from the Tenant Allow/Block List.
52
+
53
+
-You need to be assigned permissions before you can do the procedures in this article. You have the following options:
54
+
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**<sup>\*</sup>, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions *and* permissions for other features in Microsoft 365.
55
+
56
+
## Domains for Teams in the Tenant Allow/Block List
57
+
58
+
### Create block entries for domains inside Microsoft Teams via the Tenant Allow/Block List
59
+
60
+
#### Use the Microsoft Defender portal to create block entries
61
+
62
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
63
+
64
+
2. On the **Tenant Allow/Block Lists** page, verify that the **Teams domains** tab is selected.
65
+
66
+
3. You need to ensure that on the [external access policy in the teams admin center](https://admin.teams.microsoft.com/company-wide-settings/external-communications) the Teams and Skype for Business users in external organizations are configured to **Allow all external domains** or **Block only specific external domains**. If you select **Block all external domains** or **Allow only specific external domains**, than you cannot add domains v the Tenant Allow/Block List.
67
+
68
+
4. You also need to ensure that on the [external access policy in the teams admin center](https://admin.teams.microsoft.com/company-wide-settings/external-communications) "Allow my security team to manage blocked domains" is enabled. If this option is disabled, you cannot do anything from the Tenant Allow/Block List.
69
+
70
+
5. On the **Teams domains** tab, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add**, and then select **Block**.
71
+
72
+
6. In the **Block external domains in Teams** flyout that opens, configure the following settings:
73
+
74
+
- **Add domains**: Enter one domain per line, up to a maximum of 20.
75
+
76
+
7. When you're finished in the **Block external domains in Teams** flyout, select **Add**.
77
+
78
+
Back on the **Teams domains** tab, the entry is listed. It will show up on the Teams admin center page after a few minutes as well.
79
+
80
+
### Use the Microsoft Defender portal to view blocked domains
81
+
82
+
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
83
+
84
+
Verify the **Teams domains** tab is selected.
85
+
86
+
On the **Teams domains** tab, you can sort the entries by clicking on an available column header. The following columns are available:
87
+
88
+
- **Value**: The domain or email address.
89
+
90
+
Use the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific entries.
91
+
92
+
### Use the Microsoft Defender portal to remove blocked domains
93
+
94
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
95
+
96
+
2. Verify the **Teams domains** tab is selected.
97
+
98
+
3. On **Teams domains** tab, do one of the following steps:
99
+
100
+
- Select the entry from the list by selecting the check box next to the first column, and then select the :::image type="icon" source="media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears.
101
+
102
+
> [!TIP]
103
+
> - You can select multiple entries by selecting each check box, or select all entries by selecting the check box next to the **Value** column header.
104
+
105
+
4. In the warning dialog that opens, select **Delete**.
106
+
107
+
Back on the **Teams domains** tab, the entry is no longer listed. It will be deleted from the Teams admin center page after a few minutes as well.
108
+
109
+
## Related articles
110
+
111
+
- [Managing external access in Teams admin center](microsoftteams/trusted-organizations-external-meetings-chat?tabs=organization-settings#specify-trusted-microsoft-365-organizations)
112
+
- [Report false positives and false negatives in Teams](submissions-teams.md)
113
+
- [Allow or block files in the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
114
+
- [Allow or block URLs in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)
0 commit comments