Skip to content

Commit 5fecb60

Browse files
(AzureCXP) fixes MicrosoftDocs/defender-docs-pr#486850
Added a note section in line numbers 196-197.
1 parent 4b7db95 commit 5fecb60

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

defender-office-365/connection-filter-policies-configure.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -193,6 +193,9 @@ For example, the source email server 192.168.1.25 sends email from the domains c
193193

194194
### Scenarios where messages from sources in the IP Allow List are still filtered
195195

196+
> [!NOTE]
197+
> These scenarios apply to all environments (standalone, hybrid, multi-geo, and cross-forest), and the filtering behavior is based on security checks such as malware detection, phishing protection, or transport rules, not on the deployment model.
198+
196199
Messages from an email server in your IP Allow List are still subject to spam filtering in the following scenarios:
197200

198201
- An IP address in your IP Allow List is also configured in an on-premises, IP-based inbound connector in _any_ Microsoft 365 organization, **and** that Microsoft 365 organization and the first Microsoft 365 server that encounters the message both happen to be in _the same_ forest in the Microsoft datacenters. In this scenario, **IPV:CAL** _is_ added to the message's [anti-spam message headers](message-headers-eop-mdo.md) (indicating the message bypassed spam filtering), but the message is still subject to spam filtering.

0 commit comments

Comments
 (0)