Skip to content

Commit f9c8978

Browse files
authored
Merge pull request #1654 from MithunRathinam/patch-5
Update tenant-allow-block-list-ip-addresses-configure.md
2 parents 185b4ec + e7d96ba commit f9c8978

6 files changed

+28
-28
lines changed

defender-office-365/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@
240240
href: tenant-allow-block-list-files-configure.md
241241
- name: Allow or block URLs using the Tenant Allow/Block List
242242
href: tenant-allow-block-list-urls-configure.md
243-
- name: Allow or block IP addresses using the Tenant Allow/Block List
243+
- name: Allow or block IPv6 addresses using the Tenant Allow/Block List
244244
href: tenant-allow-block-list-ip-addresses-configure.md
245245
- name: Admin submissions
246246
href: submissions-admin.md

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ For usage and configuration instructions, see the following articles:
4343
- **Domains and email addresses** and **spoofed senders**: [Allow or block emails using the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
4444
- **Files**: [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
4545
- **URLs**: [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).
46-
- **IP addresses**: [Allow or block IP addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
46+
- **IP addresses**: [Allow or block IPv6 addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
4747

4848
These articles contain procedures in the Microsoft Defender portal and in PowerShell.
4949

@@ -71,11 +71,11 @@ In the Tenant Allow/Block List, you can also directly create block entries for t
7171

7272
- **[Spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders)**: If you manually override an existing allow verdict from [spoof intelligence](anti-spoofing-spoof-intelligence.md), the blocked spoofed sender becomes a manual block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List.
7373

74-
- **[IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses)**: If you manually create a block entry, all incoming email messages from that IP address are dropped at the edge of the service.
74+
- **[IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ipv6-addresses)**: If you manually create a block entry, all incoming email messages from that IP address are dropped at the edge of the service.
7575

7676
By default, block entries for [domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses), [files](tenant-allow-block-list-files-configure.md#create-block-entries-for-files) and [URLs](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) expire after 30 days, but you can set them to expire up 90 days or to never expire.
7777

78-
Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders) and [IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses) never expire.
78+
Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders) and [IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ipv6-addresses) never expire.
7979

8080
## Allow entries in the Tenant Allow/Block List
8181

@@ -87,7 +87,7 @@ In most cases, you can't directly create allow entries in the Tenant Allow/Block
8787
- If spoof intelligence already blocked the message as spoofing, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to [report the email to Microsoft](submissions-admin.md#report-good-email-to-microsoft) as **I've confirmed it's clean**, and then select **Allow this message**.
8888
- You can proactively create [an allow entry for a spoofed sender](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders) on the **Spoofed sender** tab in the Tenant Allow/Block List before [spoof intelligence](anti-spoofing-spoof-intelligence.md) identifies and blocks the message as spoofing.
8989

90-
- **IP Addresses**: You can proactively create an [an allow entry for an IP address](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses) on the **IP addresses** tab in the Tenant Allow/Block List to override the IP filters for incoming messages.
90+
- **IP Addresses**: You can proactively create an [an allow entry for an IP address](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ipv6-addresses) on the **IP addresses** tab in the Tenant Allow/Block List to override the IP filters for incoming messages.
9191

9292
The following list describes what happens in the Tenant Allow/Block List when you submit something to Microsoft as a false positive on the **Submissions** page:
9393

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -543,4 +543,4 @@ For submission instructions for impersonation false positives, see [Report good
543543
- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)
544544
- [Allow or block files in the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
545545
- [Allow or block URLs in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)
546-
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)
546+
- [Allow or block IPv6 addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)

defender-office-365/tenant-allow-block-list-files-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -283,4 +283,4 @@ For detailed syntax and parameter information, see [Remove-TenantAllowBlockListI
283283
- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)
284284
- [Allow or block emails in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
285285
- [Allow or block URLs in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)
286-
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)
286+
- [Allow or block IPv6 addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)

defender-office-365/tenant-allow-block-list-ip-addresses-configure.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Allow or block IP addresses using the Tenant Allow/Block List
2+
title: Allow or block IPv6 addresses using the Tenant Allow/Block List
33
f1.keywords:
44
- NOCSH
55
ms.author: chrisda
@@ -13,7 +13,7 @@ search.appverid:
1313
ms.collection:
1414
- m365-security
1515
- tier1
16-
description: Admins can learn how to allow or block IP addresses in the Tenant Allow/Block List.
16+
description: Admins can learn how to allow or block IPv6 addresses in the Tenant Allow/Block List.
1717
ms.service: defender-office-365
1818
ms.date: 09/20/2024
1919
appliesto:
@@ -22,13 +22,13 @@ appliesto:
2222
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2323
---
2424

25-
# Allow or block IP addresses using the Tenant Allow/Block List
25+
# Allow or block IPv6 addresses using the Tenant Allow/Block List
2626

2727
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
2828

29-
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, admins can create and manage entries for IP addresses in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
29+
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, admins can create and manage entries for IPv6 addresses in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
3030

31-
This article describes how admins can manage entries for IP addresses in the Microsoft Defender portal and in Exchange Online PowerShell.
31+
This article describes how admins can manage entries for IPv6 addresses in the Microsoft Defender portal and in Exchange Online PowerShell.
3232

3333
## What do you need to know before you begin?
3434

@@ -64,13 +64,13 @@ This article describes how admins can manage entries for IP addresses in the Mic
6464
> [!IMPORTANT]
6565
> <sup>\*</sup> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
6666
67-
## Create allow entries for IP addresses
67+
## Create allow entries for IPv6 addresses
6868

6969
The allow entry overrides only the IP filters for the specified sending IP address.
7070

71-
You can create allow entries for IP addresses directly in the Tenant Allow/Block List as described in this section.
71+
You can create allow entries for IPv6 addresses directly in the Tenant Allow/Block List as described in this section.
7272

73-
### Use the Microsoft Defender portal to create allow entries for IP addresses in the Tenant Allow/Block List
73+
### Use the Microsoft Defender portal to create allow entries for IPv6 addresses in the Tenant Allow/Block List
7474

7575
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
7676

@@ -95,7 +95,7 @@ You can create allow entries for IP addresses directly in the Tenant Allow/Block
9595

9696
Back on the **IP addresses** tab, the entry is listed.
9797

98-
#### Use PowerShell to create allow entries for IP addresses in the Tenant Allow/Block List
98+
#### Use PowerShell to create allow entries for IPv6 addresses in the Tenant Allow/Block List
9999

100100
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
101101

@@ -111,13 +111,13 @@ New-TenantAllowBlockListItems -ListType IP -Allow -Entries "2001:db8:3333:4444:5
111111

112112
For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
113113

114-
## Create block entries for IP addresses
114+
## Create block entries for IPv6 addresses
115115

116-
You can create block entries for IP addresses directly in the Tenant Allow/Block List as described in this section.
116+
You can create block entries for IPv6 addresses directly in the Tenant Allow/Block List as described in this section.
117117

118-
Incoming email messages from IP addresses in block entries are blocked at the edge of the service.
118+
Incoming email messages from IPv6 addresses in block entries are blocked at the edge of the service.
119119

120-
### Use the Microsoft Defender portal to create block entries for IP addresses in the Tenant Allow/Block List
120+
### Use the Microsoft Defender portal to create block entries for IPv6 addresses in the Tenant Allow/Block List
121121

122122
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
123123

@@ -142,7 +142,7 @@ Incoming email messages from IP addresses in block entries are blocked at the ed
142142

143143
Back on the **IP addresses** tab, the entry is listed.
144144

145-
#### Use PowerShell to create block entries for IP addresses in the Tenant Allow/Block List
145+
#### Use PowerShell to create block entries for IPv6 addresses in the Tenant Allow/Block List
146146

147147
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
148148

@@ -158,7 +158,7 @@ New-TenantAllowBlockListItems -ListType IP -Block -Entries "2001:db8:3333:4444:5
158158

159159
For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
160160

161-
## Use the Microsoft Defender portal to view entries for IP addresses in the Tenant Allow/Block List
161+
## Use the Microsoft Defender portal to view entries for IPv6 addresses in the Tenant Allow/Block List
162162

163163
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
164164

@@ -188,7 +188,7 @@ Use the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="f
188188

189189
To group the entries, select :::image type="icon" source="media/m365-cc-sc-group-icon.png" border="false"::: **Group** and then select **Action**. To ungroup the entries, select **None**.
190190

191-
### Use PowerShell to view entries for IP addresses in the Tenant Allow/Block List
191+
### Use PowerShell to view entries for IPv6 addresses in the Tenant Allow/Block List
192192

193193
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
194194

@@ -216,7 +216,7 @@ Get-TenantAllowBlockListItems -ListType IP -Block
216216

217217
For detailed syntax and parameter information, see [Get-TenantAllowBlockListItems](/powershell/module/exchange/get-tenantallowblocklistitems).
218218

219-
## Use the Microsoft Defender portal to modify entries for IP addresses in the Tenant Allow/Block List
219+
## Use the Microsoft Defender portal to modify entries for IPv6 addresses in the Tenant Allow/Block List
220220

221221
For existing IP addresses entries, you can change the expiration date and note.
222222

@@ -246,7 +246,7 @@ For existing IP addresses entries, you can change the expiration date and note.
246246

247247
When you're finished in the **Edit IP addresses** flyout, select **Save**.
248248

249-
### Use PowerShell to modify existing allow or block entries for IP addresses in the Tenant Allow/Block List
249+
### Use PowerShell to modify existing allow or block entries for IPv6 addresses in the Tenant Allow/Block List
250250

251251
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
252252

@@ -262,7 +262,7 @@ Set-TenantAllowBlockListItems -ListType IP -Entries "2001:db8:3333:4444:5555:666
262262

263263
For detailed syntax and parameter information, see [Set-TenantAllowBlockListItems](/powershell/module/exchange/set-tenantallowblocklistitems).
264264

265-
## Use the Microsoft Defender portal to remove entries for IP addresses from the Tenant Allow/Block List
265+
## Use the Microsoft Defender portal to remove entries for IPv6 addresses from the Tenant Allow/Block List
266266

267267
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
268268

@@ -283,7 +283,7 @@ Back on the **IP addresses** tab, the entry is no longer listed.
283283
> [!TIP]
284284
> You can select multiple entries by selecting each check box, or select all entries by selecting the check box next to the **Value** column header.
285285
286-
### Use PowerShell to remove entries for IP addresses from the Tenant Allow/Block List
286+
### Use PowerShell to remove entries for IPv6 addresses from the Tenant Allow/Block List
287287

288288
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
289289

defender-office-365/tenant-allow-block-list-urls-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -527,4 +527,4 @@ The following entries are invalid:
527527
- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)
528528
- [Allow or block files in the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
529529
- [Allow or block emails in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
530-
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)
530+
- [Allow or block IPv6 addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)

0 commit comments

Comments
 (0)