Skip to content

Commit 5734d2d

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into painbar-custom-install-path
2 parents e46f7eb + 8aff1a0 commit 5734d2d

File tree

2 files changed

+13
-1
lines changed

2 files changed

+13
-1
lines changed

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier1
1616
description: Admins can learn how to allow or block email and spoofed sender entries in the Tenant Allow/Block List.
1717
ms.service: defender-office-365
18-
ms.date: 07/08/2025
18+
ms.date: 08/13/2025
1919
appliesto:
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -82,6 +82,15 @@ This article describes how admins can manage entries for email senders in the Mi
8282
8383
## Domains and email addresses in the Tenant Allow/Block List
8484

85+
> [!NOTE]
86+
> Entries for email addresses with special characters (for example, spaces, quotes, or symbols) must use UTF-8 hexadecimal URL encoding for the special characters. Otherwise, you might receive errors when you try to add the entries.
87+
>
88+
> For example, to block the email address `"bad+ attacker"@fourthcoffee.com`, use the value `%22bad%2B%20attacker%[email protected]`:
89+
>
90+
> - `%22` represents the double quotation marks (").
91+
> - `%2B` represents the plus sign (+).
92+
> - `%20` represents the space ( ).
93+
8594
### Create allow entries for domains and email addresses
8695

8796
Unnecessary allow entries expose your organization to malicious email that the system would otherwise filter, so there are limitations for creating allow entries directly in the Tenant Allow/Block List.

unified-secops-platform/microsoft-sentinel-onboard.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,8 @@ When you switch the primary workspace for Microsoft Sentinel, the Defender XDR c
161161

162162
If you decide to offboard a workspace from the Defender portal, disconnect the workspace from the settings for Microsoft Sentinel.
163163

164+
If your workspace has the [Microsoft Defender XDR connector](/azure/sentinel/connect-microsoft-365-defender) configured, offboarding the workspace from the Defender portal will also disconnect the Microsoft Defender XDR connector.
165+
164166
1. Go to the [Microsoft Defender portal](https://security.microsoft.com/) and sign in.
165167
1. In the Defender portal, under **System**, select **Settings** > **Microsoft Sentinel**.
166168
1. On the **Workspaces** page, select the connected workspace and **Disconnect workspace**.
@@ -178,3 +180,4 @@ If you want to connect to a different workspace, from the **Workspaces** page, s
178180
- [Automatic attack disruption in Microsoft Defender XDR](/defender-xdr/automatic-attack-disruption)
179181
- [Investigate incidents in Microsoft Defender portal](/defender-xdr/investigate-incidents)
180182
- [Optimize your security operations](/azure/sentinel/soc-optimization/soc-optimization-access?tabs=defender-portal)
183+

0 commit comments

Comments
 (0)