Skip to content

Commit f97d8e7

Browse files
Merge pull request #5208 from MicrosoftDocs/main
[AutoPublish] main to live - 10/06 10:29 PDT | 10/06 22:59 IST
2 parents 1ac6f23 + ca51fd0 commit f97d8e7

File tree

4 files changed

+9
-3
lines changed

4 files changed

+9
-3
lines changed

defender-office-365/air-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ AIR in Defender for Office 365 Plan 2 requires that [audit logging is turned on]
4545

4646
An alert is triggered, and a security playbook starts an automated investigation, which results in findings and recommended actions. Here's the overall flow of AIR, step by step:
4747

48-
1. An automated investigation is started initiated in one of the following ways:
48+
1. An automated investigation is initiated in one of the following ways:
4949
- Specific alerts that are designed to initiate AIR. These alerts include:
5050
- Something suspicious is identified in email (for example, the message itself, an attachment, a URL, or a compromised user account).
5151
- [Zero-hour auto purge (ZAP)](zero-hour-auto-purge.md).

defender-office-365/create-block-sender-lists-in-office-365.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ search.appverid:
1515
- MET150s
1616
description: Admins can learn about the available and preferred options to block inbound messages to Microsoft 365.
1717
ms.service: defender-office-365
18-
ms.date: 07/03/2025
18+
ms.date: 10/06/2025
1919
appliesto:
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -87,3 +87,6 @@ Regardless of the conditions or exceptions that you use to identify the messages
8787
When it's not possible to use one of the other options to block a sender, _only then_ should you use the IP Block List in the default connection filter policy. For more information, see [Configure connection filtering](connection-filter-policies-configure.md). It's important to keep the number of blocked IPs to a minimum, so we don't recommend blocking entire IP address ranges.
8888

8989
You should _especially_ avoid adding IP address ranges that belong to consumer services (for example, outlook.com) or shared infrastructures. You also need to review the list of blocked IP addresses as part of regular maintenance.
90+
91+
> [!TIP]
92+
> The IP Block List accepts Classless Inter-Domain Routing (CIDR) IP address ranges from /24 through /32.
374 Bytes
Loading

defender-office-365/recommended-settings-for-eop-and-office365.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection:
1919
- tier1
2020
description: What are best practices for email and collaboration security settings in Microsoft 365? What are the current recommendations for standard protection? What should you use to be more strict? And what extras do you get if you also use Microsoft Defender for Office 365?
2121
ms.service: defender-office-365
22-
ms.date: 08/09/2025
22+
ms.date: 10/06/2025
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
2525
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -51,6 +51,9 @@ This article describes the default threat policy settings, and also the recommen
5151
> - [Create sender allowlists](create-safe-sender-lists-in-office-365.md)
5252
> - [Create sender blocklists](create-block-sender-lists-in-office-365.md)
5353
54+
> [!TIP]
55+
> To see all information in the following tables in this article, use the :::image type="icon" source="media/m365-cc-sc-expand-table-icon.png" border="false"::: **Expand table** control at the top of each table.
56+
5457
<a name='eop-anti-malware-policy-settings'></a>
5558

5659
## Default email protections for cloud mailboxes

0 commit comments

Comments
 (0)