Skip to content

Commit c911942

Browse files
Merge pull request #4944 from MicrosoftDocs/main
[AutoPublish] main to live - 09/05 10:29 PDT | 09/05 22:59 IST
2 parents bfb2c4a + dd1e2cb commit c911942

File tree

2 files changed

+5
-2
lines changed

2 files changed

+5
-2
lines changed

defender-endpoint/android-whatsnew.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ April 2025
8080
**Setup a secure environment to test prerelease builds of Defender for Endpoint on Android**. Learn the steps on how to set up your environment for prerelease testing of Defender for Endpoint on Android. These steps are for Android devices that are onboarded to Microsoft Defender for Endpoint through the following methods:
8181

8282
- Android Enterprise scenarios
83-
- Mobile Application Mangement (MAM) enrollment scenarios
83+
- Mobile Application Management (MAM) enrollment scenarios
8484

8585
For more information, see [Deploy Defender for Endpoint prerelease builds on Android devices using Google Play preproduction tracks](mobile-pretest-android.md).
8686

defender-office-365/connection-filter-policies-configure.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- seo-marvel-apr2020
1919
description: Admins can learn how to configure connection filtering in Microsoft 365 to allow or block emails from email servers.
2020
ms.service: defender-office-365
21-
ms.date: 07/03/2025
21+
ms.date: 09/05/2025
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -193,6 +193,9 @@ For example, the source email server 192.168.1.25 sends email from the domains c
193193

194194
### Scenarios where messages from sources in the IP Allow List are still filtered
195195

196+
> [!NOTE]
197+
> These scenarios apply to all environments: standalone, hybrid, multi-geo, and cross-forest. Filtering behavior is based on security checks (for example, malware detection, phishing protection, or mail flow rules, not on the deployment model.
198+
196199
Messages from an email server in your IP Allow List are still subject to spam filtering in the following scenarios:
197200

198201
- An IP address in your IP Allow List is also configured in an on-premises, IP-based inbound connector in _any_ Microsoft 365 organization, **and** that Microsoft 365 organization and the first Microsoft 365 server that encounters the message both happen to be in _the same_ forest in the Microsoft datacenters. In this scenario, **IPV:CAL** _is_ added to the message's [anti-spam message headers](message-headers-eop-mdo.md) (indicating the message bypassed spam filtering), but the message is still subject to spam filtering.

0 commit comments

Comments
 (0)