Skip to content

Commit df564c5

Browse files
authored
Update date and clarify email address handling
Updated the date for the Tenant Allow/Block List documentation and refined the language for clarity regarding email address handling.
1 parent d618ff1 commit df564c5

File tree

1 file changed

+5
-9
lines changed

1 file changed

+5
-9
lines changed

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: bagol
88
audience: ITPro
99
ms.topic: how-to
1010
ms.localizationpriority: medium
11-
ms.date: 09/08/2025
11+
ms.date: 09/22/2025
1212
search.appverid:
1313
- MET150
1414
ms.collection:
@@ -27,25 +27,21 @@ appliesto:
2727

2828
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
2929

30-
> [!IMPORTANT]
31-
> To allow phishing URLs that are part of non-Microsoft attack simulation training, use the [advanced delivery configuration](advanced-delivery-policy-configure.md) to specify the URLs. Don't use the Tenant Allow/Block List.
32-
3330
You might occasionally disagree with the Microsoft filtering verdict for email messages, Microsoft Teams messages, or Office apps. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative), or a URL might be blocked when it shouldn't have.
3431

3532
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override filtering verdicts. The list is used during mail flow (for email) or time of click (for email, Teams, or Office apps).
3633

37-
> [!NOTE]
38-
> Tenant Allow/Block Lists (TABLs) apply to the **MAIL FROM (5321.MailFrom / envelope sender)** address, not the From (5322.From / P2 sender) address.
39-
40-
Entries for **Domains and email addresses** and **Spoofed senders** apply to messages from both internal and external senders. Special handling applies to internal spoofing scenarios. Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
41-
4234
The Tenant Allow/Block list is available in the Microsoft Defender portal at <https://security.microsoft.com> **Email & collaboration** \> **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
4335

4436
For usage and configuration instructions, see the following articles:
4537

4638
- **Domains and email addresses** and **spoofed senders**: [Allow or block emails using the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
39+
- Entries apply to the MAIL FROM address (also known as the `5321.MailFrom` address, P1 sender, or envelope sender), not the From address (also known as the `5322.From` address or P2 sender). For more information about these addresses, see [Why internet email needs authentication](email-authentication-about.md#why-internet-email-needs-authentication).
40+
- Entries apply to messages from both internal and external senders. Special handling applies to internal spoofing scenarios.
41+
- Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
4742
- **Files**: [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
4843
- **URLs**: [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).
44+
- To allow phishing URLs from non-Microsoft attack simulation training, don't use URL allow entries in the Tenant Allow/Block List. Use the [advanced delivery policy](advanced-delivery-policy-configure.md) to specify the URLs.
4945
- **IP addresses**: [Allow or block IPv6 addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
5046
- **Teams domains**: [Block domains in Microsoft Teams using the Tenant Allow/Block List](tenant-allow-block-list-teams-domains-configure.md).
5147

0 commit comments

Comments
 (0)