Skip to content

Commit bf23c17

Browse files
authored
Update tenant-allow-block-list-about.md
1 parent 07db56b commit bf23c17

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: deniseb
88
audience: ITPro
99
ms.topic: how-to
1010
ms.localizationpriority: medium
11-
ms.date: 06/10/2024
11+
ms.date: 07/15/2024
1212
search.appverid:
1313
- MET150
1414
ms.collection:
@@ -96,7 +96,7 @@ The following list describes what happens in the Tenant Allow/Block List when yo
9696
- If the message was blocked for any other reason, an allow entry for the sender email address or domain is created, and the entry appears on the **Domains & addresses** tab in the Tenant Allow/Block List.
9797
- If the message wasn't blocked due to filtering, no allow entries are created anywhere.
9898

99-
By default, allow entries for domains and email addresses, files, and URLs exist for 45 days after last used date. Whenever the entity is encountered during mailflow or time of click and the entity has not been learned to be clean by the filtering, the allow entry will kick in and in the real time the last used date will be updated. So the 45 day after last used date will keep the allow entry for 45 days after the filtering system has learned the entity to be clean and you will have full visibility into it. By default, allow entries for spoofed senders never expire.
99+
By default, allow entries for domains and email addresses, files, and URLs exist for 45 days after last used date. Whenever the entity that isn't determined to be clean by the filtering system is encountered during mail flow or time of click, the allow entry activates and updates the last used date. The allow entry is kept for 45 days after the filtering system determines that the entity is clean. By default, allow entries for spoofed senders never expire.
100100

101101
> [!IMPORTANT]
102102
> Microsoft doesn't allow you to create allow entries directly. Unnecessary allow entries expose your organization to malicious email that could have been filtered by the system.

0 commit comments

Comments
 (0)