Skip to content

Commit e385a3a

Browse files
authored
Merge pull request #4609 from MicrosoftDocs/TABL-chrisda
TABL-chrisda to Main
2 parents 68d2b6c + cc9bca7 commit e385a3a

6 files changed

+123
-7
lines changed

defender-office-365/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -253,6 +253,8 @@
253253
href: tenant-allow-block-list-urls-configure.md
254254
- name: Allow or block IPv6 addresses using the Tenant Allow/Block List
255255
href: tenant-allow-block-list-ip-addresses-configure.md
256+
- name: Block domains in Microsoft Teams using the Tenant Allow/Block List
257+
href: tenant-allow-block-list-teams-domains-configure.md
256258
- name: Admin submissions
257259
href: submissions-admin.md
258260
- name: Create block sender lists

defender-office-365/mdo-support-teams-about.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier1
1717
description: Admins can learn about Microsoft Teams features in Microsoft Defender for Office 365 Plan 2.
1818
ms.service: defender-office-365
19-
ms.date: 07/24/2025
19+
ms.date: 07/28/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2222
---
@@ -30,7 +30,7 @@ appliesto:
3030
With the increased use of collaboration tools like Microsoft Teams, the possibility of malicious attacks using chat messages has also increased. Microsoft Defender for Office 365 already provides the following Teams protection features:
3131

3232
- Time of click protection for URLs and files in Teams messages through [Safe Links for Microsoft Teams](safe-links-about.md#safe-links-settings-for-microsoft-teams) and [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).
33-
- Allow/block [URLs](tenant-allow-block-list-urls-configure.md) and [files](tenant-allow-block-list-files-configure.md) inside Teams using Tenant Allow Block Lists.
33+
- Allow/block [domains](tenant-allow-block-list-teams-domains-configure.md), [URLs](tenant-allow-block-list-urls-configure.md) and [files](tenant-allow-block-list-files-configure.md) inside Teams using the Tenant Allow Block List.
3434

3535
In Microsoft 365 E5 and Defender for Office 365 Plan 2, we've extended Teams protection with a set of capabilities that are designed to disrupt the attack chain:
3636

defender-office-365/mdo-support-teams-sec-ops-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier1
1717
description: A prescriptive playbook for SecOps personnel to manage Microsoft Teams protection in Microsoft Defender for Office 365.
1818
ms.service: defender-office-365
19-
ms.date: 04/22/2025
19+
ms.date: 07/28/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2222
---
@@ -59,7 +59,7 @@ SecOps team members can also use block entries in the Tenant Allow/Block List to
5959
SecOps team members can use threat hunting or information from external threat intelligence feeds to proactively respond to false negative Teams messages (bad messages allowed). They can use the information to proactively block threats. For example:
6060

6161
- [Create URL block entries](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) in the Tenant Allow/Block List in Defender for Office 365. Block entries apply at time of click for URLs in Teams.
62-
- [Block domains in Teams using the Teams admin center](/microsoftteams/trusted-organizations-external-meetings-chat#specify-trusted-microsoft-365-organizations).
62+
- [Block domains in Teams using the Tenant Allow/Block List](tenant-allow-block-list-teams-domains-configure.md).
6363
- Submit undetected URLs to Microsoft using [admin submission](submissions-admin.md#report-questionable-urls-to-microsoft).
6464

6565
> [!TIP]
42.7 KB
Loading

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: deniseb
88
audience: ITPro
99
ms.topic: how-to
1010
ms.localizationpriority: medium
11-
ms.date: 07/08/2025
11+
ms.date: 07/28/2025
1212
search.appverid:
1313
- MET150
1414
ms.collection:
@@ -30,9 +30,9 @@ appliesto:
3030
> [!IMPORTANT]
3131
> To allow phishing URLs that are part of non-Microsoft attack simulation training, use the [advanced delivery configuration](advanced-delivery-policy-configure.md) to specify the URLs. Don't use the Tenant Allow/Block List.
3232
33-
You might occasionally disagree with the filtering verdict from the default email protections for cloud mailboxes or from Microsoft Defender for Office 365. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative).
33+
You might occasionally disagree with the Microsoft filtering verdict for email messages, Microsoft Teams messages, or Office apps. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative), or a URL might be blocked when it shouldn't have.
3434

35-
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override filtering verdicts. The list is used during mail flow or time of click for incoming messages from external senders.
35+
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override filtering verdicts. The list is used during mail flow (for email) or time of click (for email, Teams, or Office apps).
3636

3737
Entries for **Domains and email addresses** and **Spoofed senders** apply to messages from both internal and external senders. Special handling applies to internal spoofing scenarios. Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
3838

@@ -44,6 +44,7 @@ For usage and configuration instructions, see the following articles:
4444
- **Files**: [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
4545
- **URLs**: [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).
4646
- **IP addresses**: [Allow or block IPv6 addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
47+
- **Teams domains**: [Block domains in Microsoft Teams using the Tenant Allow/Block List](tenant-allow-block-list-teams-domains-configure.md).
4748

4849
These articles contain procedures in the Microsoft Defender portal and in PowerShell.
4950

@@ -73,6 +74,8 @@ In the Tenant Allow/Block List, you can also directly create block entries for t
7374

7475
- **[IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ipv6-addresses)**: If you manually create a block entry, all incoming email messages from that IP address are dropped at the edge of the service.
7576

77+
- **[Teams domains](tenant-allow-block-list-teams-domains-configure.md)**: If you manually create a block entry, all incoming communication over Teams from that domain will be blocked whereas existing communication will be deleted.
78+
7679
By default, the following types of block entries expire after 30 days, but you can set them to expire up 90 days or to never expire:
7780

7881
- [Domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses)
@@ -83,6 +86,7 @@ The following types of block entries never expire:
8386

8487
- [Spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders)
8588
- [IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ipv6-addresses)
89+
- [Teams domains](tenant-allow-block-list-teams-domains-configure.md).
8690

8791
## Allow entries in the Tenant Allow/Block List
8892

Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,110 @@
1+
---
2+
title: Block domains in Microsoft Teams using the Tenant Allow/Block List
3+
f1.keywords:
4+
- NOCSH
5+
ms.author: chrisda
6+
author: chrisda
7+
manager: deniseb
8+
audience: ITPro
9+
ms.topic: how-to
10+
ms.localizationpriority: medium
11+
search.appverid:
12+
- MET150
13+
ms.collection:
14+
- m365-security
15+
- tier1
16+
description: Admins can learn how to block domains in Microsoft Teams using the Tenant Allow/Block List.
17+
ms.service: defender-office-365
18+
ms.date: 07/29/2025
19+
appliesto:
20+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
21+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
22+
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
23+
---
24+
25+
# Block domains in Microsoft Teams using the Tenant Allow/Block List
26+
27+
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
28+
29+
In all organizations with Microsoft Teams and cloud mailboxes, admins can create and manage block entries for domains in Microsoft Teams using the Tenant Allow/Block List. These blocked domain entries also appear on the **Organization settings** tab of the **External access** page in the Microsoft Teams admin center at <https://admin.teams.microsoft.com/company-wide-settings/external-communications> in the **Teams and Skype for Business users in external organizations** section:
30+
31+
:::image type="content" source="media/tenant-allow-block-list-teams-domains.png" alt-text="Screenshot of the External access page in the Microsoft Teams admin center showing blocked domains." lightbox="media/tenant-allow-block-list-teams-domains.png":::
32+
33+
For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
34+
35+
This article describes how security admins can manage entries for blocked domains in Teams admin center using the Microsoft Defender portal.
36+
37+
## What do you need to know before you begin?
38+
39+
- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>. Then, go to the **Teams domains** tab.
40+
41+
- After you add the block entry for the domain in Teams, all new Teams communication from that organization is blocked. Block communication includes new Teams meetings, chats, channels, and calls. Existing Teams meetings, chats, channels, and calls are deleted.
42+
43+
- On the **Organization settings** tab of the **External access** page in the Microsoft Teams admin center at <https://admin.teams.microsoft.com/company-wide-settings/external-communications>, the following settings are required to create and manage block entries for domains in Teams using the Tenant Allow/Block List:
44+
- **Teams and Skype for Business users in external organizations** must be one of the following values:
45+
- **Allow all external domains**
46+
- **Block only specific external domains**
47+
- **Allow my security team to manage blocked domains** must be :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
48+
49+
- Block entries for domains in Teams never expire.
50+
51+
- An entry should be active within 5 minutes.
52+
53+
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
54+
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**<sup>\*</sup>, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions *and* permissions for other features in Microsoft 365.
55+
56+
> [!IMPORTANT]
57+
> <sup>\*</sup> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
58+
59+
## Create block entries for domains in Teams in the Tenant Allow/Block List
60+
61+
> [!TIP]
62+
> See the requirements in the [What do you need to know before you begin?](#what-do-you-need-to-know-before-you-begin) section to managed blocked domains in Teams in the Tenant Allow/Block list. You don't get a **Teams domains** tab on the **Tenant Allow/Block Lists** page if you don't meet the requirements.
63+
64+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
65+
66+
2. On the **Tenant Allow/Block Lists** page, select the **Teams domains** tab.
67+
68+
3. On the **Teams domains** tab, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add**, and then select **Block**.
69+
70+
4. In the **Block external domains in Teams** flyout that opens, configure the following settings:
71+
72+
- **Add domains**: Enter one domain per line, up to a maximum of 20.
73+
74+
5. When you're finished in the **Block external domains in Teams** flyout, select **Add**.
75+
76+
Back on the **Teams domains** tab, the entry is listed. After a few minutes, the blocked domain also appears on the **Organization settings** tab of the **External access** page in the Microsoft Teams admin center at <https://admin.teams.microsoft.com/company-wide-settings/external-communications>.
77+
78+
## View block entries for domains in Teams in the Tenant Allow/Block List
79+
80+
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
81+
82+
On the **Teams domains** tab, select the **Teams domains**.
83+
84+
On the **Teams domains** tab, you can sort the entries by clicking on an available column header. The following columns are available:
85+
86+
- **Value**: The domain or email address.
87+
88+
Use the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific entries.
89+
90+
### Remove block entries for domains in Teams in the Tenant Allow/Block List
91+
92+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
93+
94+
2. On the **Tenant Allow/Block Lists** page, select the **Teams domains** tab.
95+
96+
3. On **Teams domains** tab, select the entry from the list by selecting the check box next to the first column, and then select the :::image type="icon" source="media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears.
97+
98+
> [!TIP]
99+
> - You can select multiple entries by selecting each check box, or select all entries by selecting the check box next to the **Value** column header.
100+
101+
4. In the warning dialog that opens, select **Delete**.
102+
103+
Back on the **Teams domains** tab, the entry is no longer listed. After a few minutes, the blocked domain disappears from the **Organization settings** tab of the **External access** page in the Microsoft Teams admin center at <https://admin.teams.microsoft.com/company-wide-settings/external-communications>.
104+
105+
## Related articles
106+
107+
- [Managing external access in Teams admin center](/microsoftteams/trusted-organizations-external-meetings-chat?tabs=organization-settings#specify-trusted-microsoft-365-organizations)
108+
- [Report false positives and false negatives in Teams](submissions-teams.md)
109+
- [Allow or block files in the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
110+
- [Allow or block URLs in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)

0 commit comments

Comments
 (0)