You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/tenant-allow-block-list-email-spoof-configure.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,14 +47,19 @@ This article describes how admins can manage entries for email senders in the Mi
47
47
48
48
- For blocking inbound and outbound email from a domain, any subdomains in that domain, and any email addresses in that domain, create the block entry using the syntax: `*.TLD`, where `TLD` can be any top-level domain, internal domain, or email address domain.
49
49
50
-
- For blocking inbound and outbound email from a sudomain in a domain and any email addresses in that subdomain, create the block entry using the syntax: `*.SD1.TLD`, `*.SD2.SD1.TLD`, `*.SD3.SD2.SD1.TLD`, etc. for internal domains and email address domains.
50
+
- For blocking inbound and outbound email from a subdomain in a domain and any email addresses in that subdomain, create the block entry using the syntax: `*.SD1.TLD`, `*.SD2.SD1.TLD`, `*.SD3.SD2.SD1.TLD`, etc. for internal domains and email address domains.
51
51
52
52
- For details about the syntax for spoofed sender entries, see the [Domain pair syntax for spoofed sender entries](#domain-pair-syntax-for-spoofed-sender-entries) section later in this article.
53
53
54
54
- An entry should be active within 5 minutes.
55
55
56
56
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
57
-
-[Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration**\>**Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
57
+
-[Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration**\>**Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell):
58
+
-*Add and remove entries from the Tenant Allow/Block List*: Membership assigned with the following permissions:
59
+
-**Authorization and settings/Security settings/Detection tuning (manage)**
60
+
-*Read-only access to the Tenant Allow/Block List*:
61
+
-**Authorization and settings/Security settings/Read-only**.
62
+
-**Authorization and settings/Security settings/Core Security settings (read)**.
Copy file name to clipboardExpand all lines: defender-office-365/tenant-allow-block-list-files-configure.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,12 @@ This article describes how admins can manage entries for files in the Microsoft
54
54
- An entry should be active within 5 minutes.
55
55
56
56
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
57
-
-[Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration**\>**Exchange Online permissions** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
57
+
-[Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration**\>**Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell):
58
+
-*Add and remove entries from the Tenant Allow/Block List*: Membership assigned with the following permissions:
59
+
-**Authorization and settings/Security settings/Detection tuning (manage)**
60
+
-*Read-only access to the Tenant Allow/Block List*:
61
+
-**Authorization and settings/Security settings/Read-only**.
62
+
-**Authorization and settings/Security settings/Core Security settings (read)**.
Copy file name to clipboardExpand all lines: defender-office-365/tenant-allow-block-list-ip-addresses-configure.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,12 @@ This article describes how admins can manage entries for IPv6 addresses in the M
52
52
- An entry should be active within 5 minutes.
53
53
54
54
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
55
-
-[Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration**\>**Exchange Online permissions** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
55
+
-[Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration**\>**Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell):
56
+
-*Add and remove entries from the Tenant Allow/Block List*: Membership assigned with the following permissions:
57
+
-**Authorization and settings/Security settings/Detection tuning (manage)**
58
+
-*Read-only access to the Tenant Allow/Block List*:
59
+
-**Authorization and settings/Security settings/Read-only**.
60
+
-**Authorization and settings/Security settings/Core Security settings (read)**.
0 commit comments