Skip to content

Commit bb5a5ca

Browse files
Update connection-filter-policies-configure.md
For more clarify.
1 parent d03ccb2 commit bb5a5ca

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

defender-office-365/connection-filter-policies-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ appliesto:
2929

3030
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
3131

32-
In Microsoft 365 organizations with Exchange Online mailboxes or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, _connection filtering_ and the default connection filter policy identify good or bad source email servers by IP addresses. The key components of the default connection filter policy are:
32+
In Microsoft 365 organizations with Exchange Online mailboxes or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, inbound connection details are attributed to specific tenants, and the default connection filter policy is applied. This helps identify good or bad source email servers controlled by tenant admins by IP addresses. The key components of the default connection filter policy are:
3333

3434
- **IP Allow List**: Skip spam filtering for all incoming messages from the specified source IP addresses or IP address ranges. All incoming messages are scanned for malware and high confidence phishing. For other scenarios where spam filtering still occurs on messages from servers in the IP Allow List, see the [Scenarios where messages from sources in the IP Allow List are still filtered](#scenarios-where-messages-from-sources-in-the-ip-allow-list-are-still-filtered) section later in this article. For more information about how the IP Allow List should fit into your overall safe senders strategy, see [Create safe sender lists in EOP](create-safe-sender-lists-in-office-365.md).
3535

0 commit comments

Comments
 (0)