You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/tenant-allow-block-list-about.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ For usage and configuration instructions, see the following articles:
43
43
-**Domains and email addresses** and **spoofed senders**: [Allow or block emails using the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
44
44
-**Files**: [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
45
45
-**URLs**: [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).
46
-
-**IP addresses**: [Allow or block IP addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
46
+
-**IP addresses**: [Allow or block IPv6 addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
47
47
48
48
These articles contain procedures in the Microsoft Defender portal and in PowerShell.
49
49
@@ -71,11 +71,11 @@ In the Tenant Allow/Block List, you can also directly create block entries for t
71
71
72
72
-**[Spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders)**: If you manually override an existing allow verdict from [spoof intelligence](anti-spoofing-spoof-intelligence.md), the blocked spoofed sender becomes a manual block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List.
73
73
74
-
-**[IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses)**: If you manually create a block entry, all incoming email messages from that IP address are dropped at the edge of the service.
74
+
-**[IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ipv6-addresses)**: If you manually create a block entry, all incoming email messages from that IP address are dropped at the edge of the service.
75
75
76
76
By default, block entries for [domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses), [files](tenant-allow-block-list-files-configure.md#create-block-entries-for-files) and [URLs](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) expire after 30 days, but you can set them to expire up 90 days or to never expire.
77
77
78
-
Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders) and [IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses) never expire.
78
+
Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders) and [IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ipv6-addresses) never expire.
79
79
80
80
## Allow entries in the Tenant Allow/Block List
81
81
@@ -87,7 +87,7 @@ In most cases, you can't directly create allow entries in the Tenant Allow/Block
87
87
- If spoof intelligence already blocked the message as spoofing, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to [report the email to Microsoft](submissions-admin.md#report-good-email-to-microsoft) as **I've confirmed it's clean**, and then select **Allow this message**.
88
88
- You can proactively create [an allow entry for a spoofed sender](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders) on the **Spoofed sender** tab in the Tenant Allow/Block List before [spoof intelligence](anti-spoofing-spoof-intelligence.md) identifies and blocks the message as spoofing.
89
89
90
-
-**IP Addresses**: You can proactively create an [an allow entry for an IP address](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses) on the **IP addresses** tab in the Tenant Allow/Block List to override the IP filters for incoming messages.
90
+
-**IP Addresses**: You can proactively create an [an allow entry for an IP address](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ipv6-addresses) on the **IP addresses** tab in the Tenant Allow/Block List to override the IP filters for incoming messages.
91
91
92
92
The following list describes what happens in the Tenant Allow/Block List when you submit something to Microsoft as a false positive on the **Submissions** page:
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, admins can create and manage entries for IP addresses in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
29
+
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, admins can create and manage entries for IPv6 addresses in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
30
30
31
-
This article describes how admins can manage entries for IP addresses in the Microsoft Defender portal and in Exchange Online PowerShell.
31
+
This article describes how admins can manage entries for IPv6 addresses in the Microsoft Defender portal and in Exchange Online PowerShell.
32
32
33
33
## What do you need to know before you begin?
34
34
@@ -64,13 +64,13 @@ This article describes how admins can manage entries for IP addresses in the Mic
64
64
> [!IMPORTANT]
65
65
> <sup>\*</sup> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
66
66
67
-
## Create allow entries for IP addresses
67
+
## Create allow entries for IPv6 addresses
68
68
69
69
The allow entry overrides only the IP filters for the specified sending IP address.
70
70
71
-
You can create allow entries for IP addresses directly in the Tenant Allow/Block List as described in this section.
71
+
You can create allow entries for IPv6 addresses directly in the Tenant Allow/Block List as described in this section.
72
72
73
-
### Use the Microsoft Defender portal to create allow entries for IP addresses in the Tenant Allow/Block List
73
+
### Use the Microsoft Defender portal to create allow entries for IPv6 addresses in the Tenant Allow/Block List
74
74
75
75
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
76
76
@@ -95,7 +95,7 @@ You can create allow entries for IP addresses directly in the Tenant Allow/Block
95
95
96
96
Back on the **IP addresses** tab, the entry is listed.
97
97
98
-
#### Use PowerShell to create allow entries for IP addresses in the Tenant Allow/Block List
98
+
#### Use PowerShell to create allow entries for IPv6 addresses in the Tenant Allow/Block List
99
99
100
100
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
101
101
@@ -111,13 +111,13 @@ New-TenantAllowBlockListItems -ListType IP -Allow -Entries "2001:db8:3333:4444:5
111
111
112
112
For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
113
113
114
-
## Create block entries for IP addresses
114
+
## Create block entries for IPv6 addresses
115
115
116
-
You can create block entries for IP addresses directly in the Tenant Allow/Block List as described in this section.
116
+
You can create block entries for IPv6 addresses directly in the Tenant Allow/Block List as described in this section.
117
117
118
-
Incoming email messages from IP addresses in block entries are blocked at the edge of the service.
118
+
Incoming email messages from IPv6 addresses in block entries are blocked at the edge of the service.
119
119
120
-
### Use the Microsoft Defender portal to create block entries for IP addresses in the Tenant Allow/Block List
120
+
### Use the Microsoft Defender portal to create block entries for IPv6 addresses in the Tenant Allow/Block List
121
121
122
122
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
123
123
@@ -142,7 +142,7 @@ Incoming email messages from IP addresses in block entries are blocked at the ed
142
142
143
143
Back on the **IP addresses** tab, the entry is listed.
144
144
145
-
#### Use PowerShell to create block entries for IP addresses in the Tenant Allow/Block List
145
+
#### Use PowerShell to create block entries for IPv6 addresses in the Tenant Allow/Block List
146
146
147
147
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
148
148
@@ -158,7 +158,7 @@ New-TenantAllowBlockListItems -ListType IP -Block -Entries "2001:db8:3333:4444:5
158
158
159
159
For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
160
160
161
-
## Use the Microsoft Defender portal to view entries for IP addresses in the Tenant Allow/Block List
161
+
## Use the Microsoft Defender portal to view entries for IPv6 addresses in the Tenant Allow/Block List
162
162
163
163
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
164
164
@@ -188,7 +188,7 @@ Use the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="f
188
188
189
189
To group the entries, select :::image type="icon" source="media/m365-cc-sc-group-icon.png" border="false"::: **Group** and then select **Action**. To ungroup the entries, select **None**.
190
190
191
-
### Use PowerShell to view entries for IP addresses in the Tenant Allow/Block List
191
+
### Use PowerShell to view entries for IPv6 addresses in the Tenant Allow/Block List
192
192
193
193
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
194
194
@@ -216,7 +216,7 @@ Get-TenantAllowBlockListItems -ListType IP -Block
216
216
217
217
For detailed syntax and parameter information, see [Get-TenantAllowBlockListItems](/powershell/module/exchange/get-tenantallowblocklistitems).
218
218
219
-
## Use the Microsoft Defender portal to modify entries for IP addresses in the Tenant Allow/Block List
219
+
## Use the Microsoft Defender portal to modify entries for IPv6 addresses in the Tenant Allow/Block List
220
220
221
221
For existing IP addresses entries, you can change the expiration date and note.
222
222
@@ -246,7 +246,7 @@ For existing IP addresses entries, you can change the expiration date and note.
246
246
247
247
When you're finished in the **Edit IP addresses** flyout, select **Save**.
248
248
249
-
### Use PowerShell to modify existing allow or block entries for IP addresses in the Tenant Allow/Block List
249
+
### Use PowerShell to modify existing allow or block entries for IPv6 addresses in the Tenant Allow/Block List
250
250
251
251
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
252
252
@@ -262,7 +262,7 @@ Set-TenantAllowBlockListItems -ListType IP -Entries "2001:db8:3333:4444:5555:666
262
262
263
263
For detailed syntax and parameter information, see [Set-TenantAllowBlockListItems](/powershell/module/exchange/set-tenantallowblocklistitems).
264
264
265
-
## Use the Microsoft Defender portal to remove entries for IP addresses from the Tenant Allow/Block List
265
+
## Use the Microsoft Defender portal to remove entries for IPv6 addresses from the Tenant Allow/Block List
266
266
267
267
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
268
268
@@ -283,7 +283,7 @@ Back on the **IP addresses** tab, the entry is no longer listed.
283
283
> [!TIP]
284
284
> You can select multiple entries by selecting each check box, or select all entries by selecting the check box next to the **Value** column header.
285
285
286
-
### Use PowerShell to remove entries for IP addresses from the Tenant Allow/Block List
286
+
### Use PowerShell to remove entries for IPv6 addresses from the Tenant Allow/Block List
287
287
288
288
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
0 commit comments