Skip to content

Commit af2d8d2

Browse files
authored
Update defender-for-office-365-whats-new.md
1 parent a61ca5e commit af2d8d2

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
88
author: chrisda
99
manager: deniseb
1010
ms.localizationpriority: medium
11-
ms.date: 07/18/2024
11+
ms.date: 07/26/2024
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -41,7 +41,7 @@ For more information on what's new with other Microsoft Defender security produc
4141

4242
## July 2024
4343

44-
- **Tenant allow block list in GCC, GCCH, DoD and and Office 365 operated by Vianet environments**: [Tenant Allow/Block List](tenant-allow-block-list-about.md) is now available these environments. They are on parity with the WW commercial experiences.
44+
- **Tenant Allow/Block List in Microsoft 365 GCC, GCC High, DoD and and Office 365 operated by 21Vianet environments**: The [Tenant Allow/Block List](tenant-allow-block-list-about.md) is now available these environments. They are on parity with the WW commercial experiences.
4545

4646
- **45 days after last used date**: The value **Remove allow entry after** \> **45 days after last used date** is now the default on new allow entries from submissions and existing allow entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). The allow entry is triggered and the **LastUsedDate** property is updated when the entity is encountered and identified as malicious during mail flow or at time of click. After the filtering system determines that the entity is clean, the allow entry is automatically removed after 45 days. By default, allow entries for spoofed senders never expire.
4747

0 commit comments

Comments
 (0)