Updates from: 08/20/2022 01:20:48
Category Microsoft Docs article Related commit history on GitHub Change details
threat-intelligence Searching And Pivoting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/searching-and-pivoting.md
Microsoft Defender Threat Intelligence (Defender TI) offers a robust and flexibl
## Open Defender TIΓÇÖs Threat Intelligence Home Page
-1. Access the [Defender Threat Intelligence Portal](https://defender.microsoft.com/).
+1. Access the [Defender Threat Intelligence Portal](https://ti.defender.microsoft.com/).
2. Complete Microsoft authentication to access portal. ## Performing threat intelligence searches and pivots
admin Browser Usage Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/browser-usage-report.md
description: "Learn how to get a Microsoft browser usage report using the Micros
# Microsoft 365 Reports in the admin center - Microsoft browser usage
-The Microsoft 365 Reports dashboard shows you an activity overview across the products in your organization. It enables you to drill into individual product level reports to give you more granular insight about the activities within each product. Check out [the Reports overview topic](activity-reports.md). In the Microsoft browser usage report, you can gain insights on new Microsoft Edge usage. Usage reporting is based on an aggregate count of users in your organization that sign in to their Microsoft 365 account and use the Microsoft Edge browser to access Microsoft 365 services.
+The Microsoft 365 Reports dashboard shows you an activity overview across the products in your organization. It enables you to drill into individual product level reports to give you more granular insight about the activities within each product. Check out [the Reports overview topic](activity-reports.md).
+
+The **Microsoft Browser Usage report** in the Microsoft 365 Admin Center lets you see if users access Microsoft 365 online services via Microsoft Edge. This report insight can help you migrate your organization to Microsoft Edge. Usage reporting is based on an aggregate count of users in your organization that sign in to their Microsoft 365 account and use the Microsoft Edge browser to access Microsoft 365 services.
## How to get to the Microsoft browser usage report
The **Daily active users** chart shows you the daily user count for Microsoft Ed
The **Active Users** chart shows you the total number of users accessing Microsoft 365 services while using Microsoft Edge over the selected time period.
-The table shows you a breakdown of data at the per-user level. You can add or remove columns from the table.
+The report is internal to your organization with permissions limited to IT admins with existing access to the activity reports on the usage dashboard in the Microsoft 365 Admin Center.
+
+> [!NOTE]
+> Aggregate Microsoft browser usage and user level reporting is available. User level identification can be [removed per your organizationΓÇÖs policies](activity-reports.md#show-user-details-in-the-reports) and [role based access controls](../../admin/add-users/assign-admin-roles.md) can be used to adjust report access.
+ |Item|Description| |:--|:--|
admin Whats New In Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/whats-new-in-preview.md
description: "The Microsoft 365 admin center - learn about the features that wer
::: moniker-end
-We're continuously adding new features to [the Microsoft 365 admin center](Overview of the Microsoft 365 admin center](admin-overview/admin-center-overview.md), fixing issues we learn about, and making changes based on your feedback. Some features get rolled out at different speeds to our customers. If you aren't seeing a feature yet, [try adding yourself to targeted release](manage/release-options-in-office-365.md).
+We're continuously adding new features to [the Microsoft 365 admin center](admin-overview/admin-center-overview.md), fixing issues we learn about, and making changes based on your feedback. Some features get rolled out at different speeds to our customers. If you aren't seeing a feature yet, [try adding yourself to targeted release](manage/release-options-in-office-365.md).
And if you'd like to know what's new with other Microsoft cloud
compliance Dlp Policy Tips Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-tips-reference.md
The list of out-of-the-box sensitive information types that will be detected for
- U.S. Individual Taxpayer Identification Number (ITIN) - U.S. Social Security Number (SSN)
-Please note that custom sensitive information types are also supported for DLP policy tips in addition to the above out-of-the-box sensitive information types.
+Note that some custom sensitive information types are also supported for DLP policy tips in addition to the above out-of-the-box sensitive information types.
+
+> [!NOTE]
+> Not all elements of custom sensitive information types are compatible with every version of Office. Entity elements for Custom SITs, such as Functions, may cause incompatibility.
## Data Loss Prevention on endpoint devices supports policy tips for only some sensitive information types
compliance Endpoint Dlp Learn About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-learn-about.md
Endpoint DLP enables you to audit and manage the following types of activities u
|Activity |Description |Windows 10 1809 and later/ Windows 11| macOS Catalina 10.15 and later | Auditable/restrictable| |||||| |upload to cloud service, or access by unallowed browsers | Detects when a user attempts to upload an item to a restricted service domain or access an item through a browser. If they are using a browser that is listed in DLP as an unallowed browser, the upload activity will be blocked and the user is redirected to use Microsoft Edge. Microsoft Edge will then either allow or block the upload or access based on the DLP policy configuration |supported | supported|auditable and restrictable|
-|copy to other app |Detects when a user attempts to copy information from a protected item and then paste it into another app, process or item. Copying and pasting information within the same app, process, or item is not detected by this activity.|supported|supported | auditable and restrictable|
+|copy to other app |Detects when a user attempts to copy information from a protected item and then paste it into another app, process or item. It also detects when a user copies and pastes content among files within the same app, process or item for Word, Excel, and PowerPoint.|supported|supported | auditable and restrictable|
|copy to USB removable media |Detects when a user attempts to copy an item or information to removable media or USB device.|supported|supported | auditable and restrictable| |copy to a network share |Detects when a user attempts to copy an item to a network share or mapped network drive |supported|supported |auditable and restrictable| |print a document |Detects when a user attempts to print a protected item to a local or network printer.|supported|supported|auditable and restrictable |
See, [Design a data loss prevention policy](dlp-policy-design.md) for more guida
## Monitored files
-Endpoint DLP supports monitoring of these file types. DLP audits the activities for these file types, even if there isn't a policy match.
+Endpoint DLP supports monitoring of these file types through policy:
- Word files - PowerPoint files
Endpoint DLP supports monitoring of these file types. DLP audits the activities
- .h files - .java files
+DLP audits the activities for these file types, even if there isn't a policy match:
+
+- Word files
+- PowerPoint files
+- Excel files
+- PDF files
+ If you only want monitoring data from policy matches, you can turn off the **Always audit file activity for devices** in the endpoint DLP global settings. > [!NOTE]
compliance Tls 1.0 And 1.1 Deprecation For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/tls-1.0-and-1.1-deprecation-for-office-365.md
appliesto:
# Disabling TLS 1.0 and 1.1 for Microsoft 365 > [!IMPORTANT]
-> We temporarily halted disablement of TLS 1.0 and 1.1 for commercial customers due to COVID-19. As supply chains have adjusted and certain countries open back up, we restarted the TLS 1.2 enforcement rollout on October 15, 2020. Rollout will continue over the following weeks and months.
+> We have already disabled TLS 1.0 and 1.1 for most Microsoft 365 services in the world wide environment. Rollout will continue over the following weeks and months.
+For Microsoft 365 operated by 21 Vianet, TLS 1.0/1.1 will be disabled on June 30, 2023.
As of October 31, 2018, the Transport Layer Security (TLS) 1.0 and 1.1 protocols are deprecated for the Microsoft 365 service. The effect for end-users is minimal. This change has been publicized for over two years, with the first public announcement made in December 2017. This article is only intended to cover the Office 365 local client in relation to the Office 365 service but can also apply to on-premises TLS issues with Office and Office Online Server/Office Web Apps.
enterprise O365 Data Locations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/o365-data-locations.md
The table below defines the data location for various services. When determining
### Data Center Geographies
-The following global geographies can store data at rest. The locations where customer data may be stored can change.
+The following regional geographies can store data at rest. The locations where customer data may be stored can change.
-| Global Geographies | Locations where customer data may be stored |
+| Regional Geographies | Locations where customer data may be stored |
| | |
-| Global Geography 1 ΓÇô EMEA (Europe, Middle East and Africa) | Austria, Finland, France, Ireland, Netherlands, Sweden |
-| Global Geography 2 ΓÇô Asia Pacific | Hong Kong, Japan, Malaysia, Singapore, South Korea |
-| Global Geography 3 - Americas | Brazil, Chile, United States |
+| Regional Geography 1 ΓÇô EMEA (Europe, Middle East and Africa) | Austria, Finland, France, Ireland, Netherlands, Sweden |
+| Regional Geography 2 ΓÇô Asia Pacific | Hong Kong, Japan, Malaysia, Singapore, South Korea |
+| Regional Geography 3 - Americas | Brazil, Chile, United States |
## Country/Region specific Data Center city locations
For country/region specific data centers, the following defines the cities where
| Germany | Frankfurt, Berlin | | India | Chennai, Mumbai, Pune | | Japan | Osaka, Tokyo |
+| Qatar | Doha |
| South Korea | Busan, Seoul | | Norway | Oslo, Stavanger | | South Africa | Cape Town, Johannesburg |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| Service | Location | | | |
-| Exchange Online | Global Geography 1 ΓÇô EMEA |
-| OneDrive for Business | Global Geography 1 ΓÇô EMEA |
-| SharePoint Online | Global Geography 1 ΓÇô EMEA |
-| Microsoft Teams | Global Geography 1 ΓÇô EMEA |
-| Office Online & Mobile | Global Geography 1 ΓÇô EMEA |
-| EOP | Global Geography 1 ΓÇô EMEA |
-| Intune | Global Geography 1 ΓÇô EMEA |
-| Planner | Global Geography 1 ΓÇô EMEA |
-| Sway | United States |
-| Yammer | Global Geography 1 ΓÇô EMEA |
-| OneNote Services | Global Geography 1 ΓÇô EMEA |
-| Stream | Global Geography 1 ΓÇô EMEA |
-| Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
-| Viva Connections | Global Geography 1 ΓÇô EMEA |
-| Viva Topics | Global Geography 1 ΓÇô EMEA |
-| Viva Learning | Global Geography 1 ΓÇô EMEA |
-| Viva Insights - Personal | Global Geography 1 ΓÇô EMEA |
-| Viva Insights - Manager/Leader AAD org data only | Global Geography 1 ΓÇô EMEA |
-| Viva Insights - Manager/Leader with 3rd party HR data only | United States |
-| Viva Insights - Advanced | United States |
+| Exchange Online | Qatar* |
+| OneDrive for Business | Qatar* |
+| SharePoint Online | Qatar* |
+| Exchange Online Protection | Qatar* |
+| Microsoft Defender for Office P1 | Qatar* |
+| Microsoft Teams | Qatar* |
+| Office for the Web | Qatar* |
+| Office for Mobile | Qatar* |
+| OneNote Services | Qatar* |
+| Stream | Qatar* |
+| Whiteboard | Qatar* |
+| Viva Connections | Qatar* |
+| Viva Insights - Personal Insights | Qatar* |
+| Viva Topics | Qatar* |
+| Azure Active Directory | European Union |
+| Dataverse for Teams | European Union |
+| Intune | European Union |
+| Planner | European Union |
+| Power Automate Desktop | European Union |
+| Power Virtual Agent for Teams | European Union |
+| Viva Insights - Mgr / Leader / Advanced | European Union |
+| Viva learning | European Union |
+| Yammer | European Union |
+| Forms | United States |
+*Every service that stores customer data at rest in Exchange Online, SharePoint Online or OneDrive for Business, or is deployed locally.
</p></details> ## Republic of Macedonia
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | United Arab Emirates | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | United Arab Emirates | | Viva Topics | United Arab Emirates | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
New Microsoft 365 tenants are defaulted to Geo based on the country of the billi
| OneNote Services | Global Geography 1 ΓÇô EMEA | | Stream | Global Geography 1 ΓÇô EMEA | | Whiteboard | United States |
-| Forms | Global Geography 1 ΓÇô EMEA |
+| Forms | United States |
| Viva Connections | Global Geography 1 ΓÇô EMEA | | Viva Topics | Global Geography 1 ΓÇô EMEA | | Viva Learning | Global Geography 1 ΓÇô EMEA |
security TOC https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/TOC.md
###### [Set preferences](linux-preferences.md) ###### [Detect and block Potentially Unwanted Applications](linux-pua.md) ###### [Schedule scans with Microsoft Defender for Endpoint on Linux](linux-schedule-scan-mde.md)
+###### [Schedule antivirus scan in Defender for Endpoint on Linux](schedule-antivirus-scan-in-mde.md)
###### [Schedule an update of the Microsoft Defender for Endpoint (Linux)](linux-update-MDE-Linux.md) ##### [Troubleshoot]()
##### [Cloud protection and sample submission](cloud-protection-microsoft-antivirus-sample-submission.md) #### [Configure and validate Microsoft Defender Antivirus network connections](configure-network-connections-microsoft-defender-antivirus.md) #### [Specify additional definition sets for network traffic inspection](specify-additional-definitions-network-traffic-inspection-mdav.md)
-#### [Protect security settings with tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md)
+#### [Tamper protection]()
+##### [Protect security settings with tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md)
+##### [Manage tamper protection using Microsoft 365 Defender](manage-tamper-protection-microsoft-365-defender.md)
+##### [Manage tamper protection using Microsoft Endpoint Manager](manage-tamper-protection-microsoft-endpoint-manager.md)
+##### [Manage tamper protection with Configuration Manager](manage-tamper-protection-configuration-manager.md)
+##### [Manage tamper protection on an individual device](manage-tamper-protection-individual-device.md)
+##### [FAQs on tamper protection](faqs-tamper-protection.md)
#### [Turn on block at first sight](configure-block-at-first-sight-microsoft-defender-antivirus.md) #### [Configure the cloud block timeout period](configure-cloud-block-timeout-period-microsoft-defender-antivirus.md) #### [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md)
security Autoir Investigation Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/autoir-investigation-results.md
In the Investigation details view, you can see information on the **Investigatio
|**Log**|Provides a chronological, detailed view of all the investigation actions taken after an alert was triggered.| |**Pending actions**|Lists items that require approval to proceed. Go to the Action center (<https://security.microsoft.com/action-center>) to approve pending actions.|
+## Investigation states
+
+The following table lists investigation states and what they indicate.
++
+|Investigation state |Definition |
+|||
+|Benign | Artifacts were investigated and a determination was made that no threats were found.|
+|PendingResource | An automated investigation is paused because either a remediation action is pending approval, or the device on which an artifact was found is temporarily unavailable.|
+|UnsupportedAlertType | An automated investigation is not available for this type of alert. Further investigation can be done manually, by using advanced hunting. |
+|Failed | At least one investigation analyzer ran into a problem where it couldn't complete the investigation. If an investigation fails after remediation actions were approved, the remediation actions might still have succeeded.|
+|Successfully remediated| An automated investigation completed, and all remediation actions were completed or approved.|
+
+To provide more context about how investigation states show up, the following table lists alerts and their corresponding automated investigation state. This table is included as an example of what a security operations team might see in the Microsoft 365 Defender portal.
+
+|Alert name | Severity | Investigation state | Status | Category |
+|--|-||--|-|
+|Malware was detected in a wim disk image file|Informational|Benign|Resolved|Malware|
+|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a rar archive file|Informational|UnsupportedAlertType|New|Malware|
+|Malware was detected in a rar archive file|Informational|UnsupportedAlertType|New|Malware|
+|Malware was detected in a rar archive file|Informational|UnsupportedAlertType|New|Malware|
+|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
+|Wpakill hacktool was prevented|Low|Failed|New|Malware|
+|GendowsBatch hacktool was prevented|Low|Failed|New|Malware|
+|Keygen hacktool was prevented|Low|Failed|New|Malware|
+|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in an iso disc image file|Informational|PendingResource|New|Malware|
+|Malware was detected in an iso disc image file|Informational|PendingResource|New|Malware|
+|Malware was detected in a pst outlook data file|Informational|UnsupportedAlertType|New|Malware|
+|Malware was detected in a pst outlook data file|Informational|UnsupportedAlertType|New|Malware|
+|MediaGet detected|Medium|PartiallyInvestigated|New|Malware|
+|TrojanEmailFile|Medium|SuccessfullyRemediated|Resolved|Malware|
+|CustomEnterpriseBlock malware was prevented|Informational|SuccessfullyRemediated|Resolved|Malware|
+|An active CustomEnterpriseBlock malware was blocked|Low|SuccessfullyRemediated|Resolved|Malware|
+|An active CustomEnterpriseBlock malware was blocked|Low|SuccessfullyRemediated|Resolved|Malware|
+|An active CustomEnterpriseBlock malware was blocked|Low|SuccessfullyRemediated|Resolved|Malware|
+|TrojanEmailFile|Medium|Benign|Resolved|Malware|
+|CustomEnterpriseBlock malware was prevented|Informational|UnsupportedAlertType|New|Malware|
+|CustomEnterpriseBlock malware was prevented|Informational|SuccessfullyRemediated|Resolved|Malware|
+|TrojanEmailFile|Medium|SuccessfullyRemediated|Resolved|Malware|
+|TrojanEmailFile|Medium|Benign|Resolved|Malware|
+|An active CustomEnterpriseBlock malware was blocked|Low|PendingResource|New|Malware|
+ ## See also - [Review remediation actions following an automated investigation](manage-auto-investigation.md)
security Configure Proxy Internet https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-proxy-internet.md
Use netsh to configure a system-wide static proxy.
> [!NOTE] > > - This will affect all applications including Windows services which use WinHTTP with default proxy.</br>
-> - Laptops that are changing topology (for example: from office to home) will malfunction with netsh command. Use the registry-based static proxy configuration.
1. Open an elevated command line: 1. Go to **Start** and type **cmd**.
security Edr In Block Mode https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/edr-in-block-mode.md
- next-gen - edr - admindeeplinkDEFENDER Previously updated : 04/04/2022 Last updated : 08/19/2022 ms.technology: mde
ms.technology: mde
# Endpoint detection and response (EDR) in block mode **Applies to:**+ - [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Microsoft Defender Antivirus **Platforms**+ - Windows > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink) ## What is EDR in block mode?
-[Endpoint detection and response](overview-endpoint-detection-response.md) (EDR) in block mode provides added protection from malicious artifacts when Microsoft Defender Antivirus is not the primary antivirus product and is running in passive mode. EDR in block mode works behind the scenes to remediate malicious artifacts that were detected by EDR capabilities. Such artifacts might have been missed by the primary, non-Microsoft antivirus product. For devices running Microsoft Defender Antivirus as their primary antivirus, EDR in block mode provides an extra layer of defense by allowing Microsoft Defender Antivirus to take automatic actions on post-breach, behavioral EDR detections.
+[Endpoint detection and response](overview-endpoint-detection-response.md) (EDR) in block mode provides added protection from malicious artifacts when Microsoft Defender Antivirus(MDAV) is not the primary antivirus product and is running in passive mode. EDR in block mode works behind the scenes to remediate malicious artifacts that were detected by EDR capabilities. Such artifacts might have been missed by the primary, non-Microsoft antivirus product. EDR in block mode allows Microsoft Defender Antivirus to take actions on post-breach, behavioral EDR detections. See the section, [Do I need to turn on EDR in block mode if I have Microsoft Defender Antivirus?](#do-i-need-to-turn-edr-in-block-mode-on-if-i-have-microsoft-defender-antivirus-running-on-devices) in the **Frequently asked questions** section.
> [!IMPORTANT]
-> EDR in block mode does not provide all the protection that is available when Microsoft Defender Antivirus real-time protection is enabled. All features that depend on Microsoft Defender Antivirus to be the active antivirus solution will not work, including the following key examples:
+> EDR in block mode does not provide all the protection that is available when Microsoft Defender Antivirus real-time protection is enabled. Some capabilities that depend on Microsoft Defender Antivirus to be the active antivirus solution will not work, such as the following examples:
> > - Real-time protection, including on-access scanning, is not available when Microsoft Defender Antivirus is in passive mode. To learn more about real-time protection policy settings, see **[Enable and configure Microsoft Defender Antivirus always-on protection](configure-real-time-protection-microsoft-defender-antivirus.md)**.
->
> - Features like **[network protection](network-protection.md)** and **[attack surface reduction rules](attack-surface-reduction.md)** are only available when Microsoft Defender Antivirus is running in active mode. >
-> It is expected that your non-Microsoft antivirus solution provides these capabilities.
+> It is expected that your non-Microsoft antivirus solution includes these capabilities.
-EDR in block mode is integrated with [Microsoft Defender Vulnerability Management](next-gen-threat-and-vuln-mgt.md). Your organization's security team will get a [security recommendation](tvm-security-recommendation.md) to turn EDR in block mode on if it isn't already enabled.
+EDR in block mode is integrated with [threat & vulnerability management](next-gen-threat-and-vuln-mgt.md) capabilities. Your organization's security team will get a [security recommendation](tvm-security-recommendation.md) to turn EDR in block mode on if it isn't already enabled. This recommendation is primarily for devices using an active non-Microsoft antivirus solution (with Microsoft Defender Antivirus in passive mode). There is little benefit to enabling EDR in block mode when Microsoft Defender Antivirus is the primary antivirus solution on devices.
:::image type="content" source="images/edrblockmode-TVMrecommendation.png" alt-text="The recommendation to turn on EDR in block mode" lightbox="images/edrblockmode-TVMrecommendation.png"::: > [!TIP] > To get the best protection, make sure to **[deploy Microsoft Defender for Endpoint baselines](configure-machines-security-baseline.md)**.
-Watch this video to learn why and how to turn on endpoint detection and response (EDR) in block mode, enable behavioral blocking, and containment at every stage from pre-breach to post-breach.
+Watch this video to learn why and how to turn on endpoint detection and response (EDR) in block mode, enable behavioral blocking, and containment at every stage from pre-breach to post-breach.
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4HjW2] ## What happens when something is detected?
-When EDR in block mode is turned on, and a malicious artifact is detected, Microsoft Defender for Endpoint blocks and remediates that artifact. Your security operations team will see detection status as **Blocked** or **Prevented** in the [Action center](respond-machine-alerts.md#check-activity-details-in-action-center), listed as completed actions.
-
-The following image shows an instance of unwanted software that was detected and blocked through EDR in block mode:
+When EDR in block mode is turned on, and a malicious artifact is detected, Defender for Endpoint remediates that artifact. Your security operations team will see detection status as **Blocked** or **Prevented** in the [Action center](respond-machine-alerts.md#check-activity-details-in-action-center), listed as completed actions. The following image shows an instance of unwanted software that was detected and remediated through EDR in block mode:
:::image type="content" source="images/edr-in-block-mode-detection.png" alt-text="The detection by EDR in block mode" lightbox="images/edr-in-block-mode-detection.png"::: - ## Enable EDR in block mode > [!IMPORTANT]
-> Starting with platform version 4.18.2202.X, you can now set EDR in block mode to target specific device groups using Intune CSPs. You can continue to set EDR in block mode tenant-wide in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>. EDR in block mode is primarily recommended for devices that are running Microsoft Defender Antivirus in passive mode (a non-Microsoft antivirus solution is installed and active on the device).
+> Starting with platform version 4.18.2202.X, you can now set EDR in block mode to target specific device groups using Intune CSPs. You can continue to set EDR in block mode tenant-wide in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>. EDR in block mode is primarily recommended for devices that are running Microsoft Defender Antivirus in passive mode (a non-Microsoft antivirus solution is installed and active on the device).
> [!TIP] > Make sure the [requirements](#requirements-for-edr-in-block-mode) are met before turning on EDR in block mode.
-### Security Portal
+### Security Portal
1. Go to the Microsoft 365 Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)) and sign in.-
-2. Choose **Settings** \> **Endpoints** \> **General** \> **Advanced features**.
-
-3. Scroll down, and then turn on **Enable EDR in block mode**.
+1. Choose **Settings** \> **Endpoints** \> **General** \> **Advanced features**.
+1. Scroll down, and then turn on **Enable EDR in block mode**.
### Intune
To create a custom policy in Intune, see [Deploy OMA-URIs to target a CSP throug
For more information on the Defender CSP used for EDR in block mode, see "Configuration/PassiveRemediation" under [Defender CSP](/windows/client-management/mdm/defender-csp). - ## Requirements for EDR in block mode The following table lists requirements for EDR in block mode:
The following table lists requirements for EDR in block mode:
|Requirement|Details| ||| |Permissions|You must have either the Global Administrator or Security Administrator role assigned in [Azure Active Directory](/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal). For more information, see [Basic permissions](basic-permissions.md).|
-|Operating system|Devices must be running one of the following versions of Windows: <br/>- Windows 11 <br/>- Windows 10 (all releases)<br/>- Windows Server 2022 <br/>- Windows Server 2019<br/>- Windows Server, version 1803 or newer<br/>- Windows Server 2016 and Windows Server 2012 R2 (with the [new unified client solution](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution))<sup>[[1](#fn1)]</sup> |
+|Operating system|Devices must be running one of the following versions of Windows: <ul><li>Windows 11</li><li>Windows 10 (all releases)</li><li>Windows Server 2019 or later</li><li>Windows Server, version 1803 or later</li><li>Windows Server 2016 and Windows Server 2012 R2 \(with the [new unified client solution](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution)\)</li></ul>|
|Microsoft Defender for Endpoint|Devices must be onboarded to Defender for Endpoint. See the following articles: <br/>- [Minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md)<br/>- [Onboard devices and configure Microsoft Defender for Endpoint capabilities](onboard-configure.md)<br/>- [Onboard Windows servers to the Defender for Endpoint service](configure-server-endpoints.md)<br/>- [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution (Preview)](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution) | |Microsoft Defender Antivirus|Devices must have Microsoft Defender Antivirus installed and running in either active mode or passive mode. [Confirm Microsoft Defender Antivirus is in active or passive mode](#how-do-i-confirm-microsoft-defender-antivirus-is-in-active-or-passive-mode).| |Cloud-delivered protection|Microsoft Defender Antivirus must be configured such that [cloud-delivered protection is enabled](enable-cloud-protection-microsoft-defender-antivirus.md).|
To confirm whether Microsoft Defender Antivirus is running in active or passive
|Method|Procedure| ||| |PowerShell|1. Select the Start menu, begin typing `PowerShell`, and then open Windows PowerShell in the results.<br/><br/>2. Type `Get-MpComputerStatus`.<br/><br/>3. In the list of results, in the **AMRunningMode** row, look for one of the following values:<br/>- `Normal`<br/>- `Passive Mode`<br/><br/>To learn more, see [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus).|
-|Command Prompt|1. Select the Start menu, begin typing `Command Prompt`, and then open Windows Command Prompt in the results.<br/><br/>2. Type `sc query windefend`.<br/><br/>3. In the list of results, in the **STATE** row, confirm that the service is running. |
+|Command Prompt|<ol><li>Select the Start menu, begin typing `Command Prompt`, and then open Windows Command Prompt in the results.</li><li>Type `sc query windefend`.</li><li>In the list of results, in the **STATE** row, confirm that the service is running.</li></ol>|
### How do I confirm that EDR in block mode is turned on with Microsoft Defender Antivirus in passive mode?
If Microsoft Defender Antivirus is running in active mode or passive mode, EDR i
- Windows 11 - Windows 10 (all releases)-- Windows Server, version 1803 or newer
+- Windows Server, version 1803 or newer
- Windows Server 2022-- Windows Server 2019
+- Windows Server 2019
- Windows Server 2016 and Windows Server 2012 R2 (with the [new unified client solution](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution)) With the [new unified client solution](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution) for Windows Server 2016 and Windows Server 2012 R2, you can run EDR in block mode in either passive mode or active mode. > [!NOTE]
-> Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md) for this feature to work.
+> Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md) for this feature to work.
### How much time does it take for EDR in block mode to be disabled?
security Faqs Tamper Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/faqs-tamper-protection.md
+
+ Title: Frequently asked questions on tamper protection
++
+description: Frequently asked questions on configuring tamper protection.
+keywords: malware, defender, antivirus, tamper protection
+ms.pagetype: security
+ms.mktglfcycl: manage
+ms.sitesec: library
+ms.localizationpriority: medium
+audience: ITPro
++++
+- nextgen
+- admindeeplinkDEFENDER
+ms.technology: mde
+
+- M365-security-compliance
+- m365initiative-defender-endpoint
++
+# Frequently asked questions on tamper protection
+
+**Applies to:**
+
+- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- Microsoft Defender Antivirus
+
+**Platforms**
+- Windows
+
+## On which versions of Windows can I configure 'tamper protection'?
+
+- Windows 11
+- Windows 11 Enterprise multi-session
+- Windows 10 OS [1709](/lifecycle/announcements/revised-end-of-service-windows-10-1709), [1803](/lifecycle/announcements/windows-server-1803-end-of-servicing), [1809](/windows/release-health/status-windows-10-1809-and-windows-server-2019), or later together with [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint).
+- Windows 10 Enterprise multi-session
+
+If you're using Configuration Manager, version 2006, with tenant attach, tamper protection can be extended to Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, and Windows Server 2022. See [Tenant attach: Create and deploy endpoint security Antivirus policy from the admin center (preview)](/mem/configmgr/tenant-attach/deploy-antivirus-policy).
+
+## Will tamper protection affect non-Microsoft antivirus registration in the Windows Security app?
+
+No. Non-Microsoft antivirus offerings will continue to register with the Windows Security application.
+
+## What happens if Microsoft Defender Antivirus isn't active on a device?
+
+Devices that are onboarded to Microsoft Defender for Endpoint will have Microsoft Defender Antivirus running in passive mode. In these cases, tamper protection will continue to protect the service and its features.
+
+## How do I turn tamper protection on or off?
+
+If you're a home user, see [Manage tamper protection on an individual device](manage-tamper-protection-individual-device.md).
+
+If you're an organization using [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint), you should be able to manage 'tamper protection' in Intune similar to how you manage other endpoint protection features. See the following sections of this article:
+
+- [Manage tamper protection using Microsoft Endpoint Manager](manage-tamper-protection-microsoft-endpoint-manager.md)
+- [Manage tamper protection using Microsoft 365 Defender](manage-tamper-protection-microsoft-365-defender.md)
+
+## How does configuring tamper protection in Intune affect how I manage Microsoft Defender Antivirus with Group Policy?
+
+If you're currently using Intune to configure and manage 'tamper protection', you should continue using Intune.
+
+Group policy doesn't apply to tamper protection. Changes made to Microsoft Defender Antivirus settings using Group Policy are ignored when tamper protection is turned on, or when tamper protection is configured with Intune.
+
+## If we use Microsoft Intune to configure 'tamper protection', does it apply only to the entire organization?
+
+You have flexibility in configuring tamper protection with Intune. You can target your entire organization, or select specific devices and user groups.
+
+## Can I configure tamper protection with Microsoft Endpoint Configuration Manager?
+
+If you're using tenant attach, you can use Microsoft Endpoint Configuration Manager. See the following resources:
+
+- [Manage tamper protection using tenant attach with Configuration Manager, version 2006](manage-tamper-protection-configuration-manager.md)
+- [Tech Community blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin)
+
+## I have the Windows E3 enrollment. Can I use configuring tamper protection in Intune?
+
+Currently, configuring tamper protection in Intune is only available for customers who have [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint).
+
+## I'm an enterprise customer. Can local admins change tamper protection on their devices?
+
+No. Local admins can't change or modify 'tamper protection' settings.
+
+## What happens if my device is onboarded with Microsoft Defender for Endpoint and then goes into an off-boarded state?
+
+If a device is off-boarded from Microsoft Defender for Endpoint, tamper protection is turned on, which is the default state for unmanaged devices.
+
+## If the status of tamper protection changes, are alerts shown in the Microsoft 365 Defender portal?
+
+Yes. The alert is shown in [https://security.microsoft.com](https://security.microsoft.com) under **Alerts**.
+
+Your security operations team can also use hunting queries, such as the following example:
+
+`AlertInfo|where Title == "Tamper Protection bypass"`
+
+> [!TIP]
+> If you're looking for Antivirus related information for other platforms, see:
+> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
+> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
+> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
+> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
+> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
+> - [Configure Defender for Endpoint on Android features](android-configure.md)
+> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Mac Resources https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-resources.md
Important tasks, such as controlling product settings and triggering on-demand s
|Configuration|Turn on/off scans after security intelligence updates|`mdatp config scan-after-definition-update --value [enabled/disabled]`| |Configuration|Turn on/off archive scanning (on-demand scans only)|`mdatp config scan-archives --value [enabled/disabled]`| |Configuration|Turn on/off file hash computation|`mdatp config enable-file-hash-computation --value [enabled/disabled]`|
+|Configuration|Turn on/off data_loss_prevention|`mdatp config data_loss_prevention --value [enabled/disabled]`|
|Diagnostics|Change the log level|`mdatp log level set --level [error/warning/info/verbose]`| |Diagnostics|Generate diagnostic logs|`mdatp diagnostic create --path [directory]`| |Health|Check the product's health|`mdatp health`|
security Mac Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-whatsnew.md
For more information on Microsoft Defender for Endpoint on other operating syste
- [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md) - [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md)</br>
+<details>
+ <summary>Aug-2022 (Build: 101.78.13 | Release version: 20.122072.17813.0)</summary>
+
+&ensp;Build: **101.78.13**<br/>
+&ensp;Release version: **20.122072.17813.0**<br/>
+&ensp;Engine version: **1.1.19500.2**<br/>
+&ensp;Signature version: **1.373.556.0**<br/>
+
+**What's new**
+
+- Fix for uninstaller to properly delete Application Support folder
+- Fix for Network Protection not filtering Safari when Firewall or iCloud Private Relay is on
+- Fix for osqueryui zombie processes
+- Fix for UI crash on Ventura
+- Fix for definitions not getting downloaded right after install
+- Other bug fixes
+
+<br/>
+</details>
+ <details> <summary>Aug-2022 (Build: 101.75.90 | Release version: 20.122071.17590.0)</summary>
For more information on Microsoft Defender for Endpoint on other operating syste
</details> <br/><br/>
-</details>
+</details>
security Manage Tamper Protection Configuration Manager https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-tamper-protection-configuration-manager.md
+
+ Title: Manage tamper protection using tenant attach with Configuration Manager, version 2006
++
+description: Turn tamper protection on or off using tenant attach with Configuration Manager.
+keywords: malware, defender, antivirus, tamper protection, Configuration Manager
+ms.pagetype: security
+ms.mktglfcycl: manage
+ms.sitesec: library
+ms.localizationpriority: medium
+audience: ITPro
++++
+- nextgen
+- admindeeplinkDEFENDER
+ms.technology: mde
+
+- M365-security-compliance
+- m365initiative-defender-endpoint
++
+# Manage tamper protection using tenant attach with Configuration Manager, version 2006
+
+**Applies to:**
+
+- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- Microsoft Defender Antivirus
+
+**Platforms**
+- Windows
+
+If you're using [version 2006 of Configuration Manager](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2006), you can manage tamper protection settings on Windows 10, Windows 10 Enterprise multi-session, Windows 11, Windows 11 Enterprise multi-session, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, and Windows Server 2022 by using a method called *tenant attach*. Tenant attach enables you to sync your on-premises-only Configuration Manager devices into the Microsoft Endpoint Manager admin center, and then deliver endpoint security configuration policies to on-premises collections & devices.
+
+> [!NOTE]
+> The procedure can be used to extend tamper protection to devices running Windows 10, Windows 10 Enterprise multi-session, Windows 11, Windows 11 Enterprise multi-session, Windows Server 2019, and Windows Server 2022. Make sure to review the prerequisites and other information in the resources mentioned in this procedure. For Windows Server 2012 R2 running the modern, unified solution [version 2203 of Configuration Manager](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2203) is required.
+
+1. Set up tenant attach. To learn more, see [Get started: Create and deploy endpoint security policies from the admin center](/mem/configmgr/tenant-attach/endpoint-security-get-started).
+
+2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** \> **Antivirus**, and then choose **+ Create Policy**.
+
+ - In the **Platform** list, select **Windows 10, Windows 11, and Windows Server (ConfigMgr)**.
+ - In the **Profile** list, select **Windows Security experience (preview)**.
+
+3. Deploy the policy to your device collection.
+
+## Need help with this method?
+
+See the following resources:
+
+- [Settings for the Windows Security experience profile in Microsoft Intune](/mem/intune/protect/antivirus-security-experience-windows-settings)
+- [Tech Community Blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin)
+
+> [!TIP]
+> If you're looking for Antivirus related information for other platforms, see:
+> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
+> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
+> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
+> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
+> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
+> - [Configure Defender for Endpoint on Android features](android-configure.md)
+> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Manage Tamper Protection Individual Device https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-tamper-protection-individual-device.md
+
+ Title: Manage tamper protection on an individual device
++
+description: Turn tamper protection on or off for an individual device.
+keywords: malware, defender, antivirus, tamper protection
+ms.pagetype: security
+ms.mktglfcycl: manage
+ms.sitesec: library
+ms.localizationpriority: medium
+audience: ITPro
++++
+- nextgen
+- admindeeplinkDEFENDER
+ms.technology: mde
+
+- M365-security-compliance
+- m365initiative-defender-endpoint
++
+# Manage tamper protection on an individual device
+
+**Applies to:**
+
+- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- Microsoft Defender Antivirus
+
+**Platforms**
+- Windows
+
+> [!NOTE]
+> Tamper protection blocks attempts to modify Microsoft Defender Antivirus settings through the registry.
+> To help ensure that tamper protection doesn't interfere with non-Microsoft security products or enterprise installation scripts that modify these settings, go to **Windows Security** and update **Security intelligence** to version 1.287.60.0 or later. (See [Security intelligence updates](https://www.microsoft.com/wdsi/definitions).)
+> After you've made this update, tamper protection continues to protect your registry settings, and logs attempts to modify them without returning errors.
+
+If you're a home user, or you aren't subject to settings managed by a security team, you can use the Windows Security app to manage 'tamper protection'. You must have appropriate admin permissions on your device to do change security settings, such as tamper protection.
+
+Here's what you see in the Windows Security app:
++
+1. Select **Start**, and start typing *Security*. In the search results, select **Windows Security**.
+
+2. Select **Virus & threat protection** \> **Virus & threat protection settings**.
+
+3. Set **Tamper Protection** to **On** or **Off**.
+
+> [!TIP]
+> If you're looking for Antivirus related information for other platforms, see:
+> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
+> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
+> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
+> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
+> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
+> - [Configure Defender for Endpoint on Android features](android-configure.md)
+> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
+
security Manage Tamper Protection Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-tamper-protection-microsoft-365-defender.md
+
+ Title: Manage tamper protection for your organization using Microsoft 365 Defender
++
+description: Turn tamper protection on or off for your tenant using the Microsoft 365 Defender portal.
+keywords: malware, defender, antivirus, tamper protection, Microsoft 365 Defender
+ms.pagetype: security
+ms.mktglfcycl: manage
+ms.sitesec: library
+ms.localizationpriority: medium
+audience: ITPro
++++
+- nextgen
+- admindeeplinkDEFENDER
+ms.technology: mde
+
+- M365-security-compliance
+- m365initiative-defender-endpoint
++
+# Manage tamper protection for your organization using Microsoft 365 Defender portal
+
+**Applies to:**
+
+- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- Microsoft Defender Antivirus
+
+**Platforms**
+- Windows
+
+Tamper protection can be turned on or off for your tenant using the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Here are a few points to keep in mind:
+
+- Currently, the option to manage 'tamper protection' in the Microsoft 365 Defender portal is on by default for new deployments. For existing deployments, 'tamper protection' is available on an opt-in basis. To opt in, in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>, choose **Settings** \> **Endpoints** \> **Advanced features** \> **Tamper protection**.
+- When you use the Microsoft 365 Defender portal to manage 'tamper protection', you do not have to use Intune or the tenant attach method.
+- When you manage 'tamper protection' in the Microsoft 365 Defender portal, the setting is applied tenant wide, affecting all of your devices that are running Windows 10, Windows 10 Enterprise multi-session, Windows 11, Windows 11 Enterprise multi-session, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019 or Windows Server 2022. To fine-tune 'tamper protection' (such as having tamper protection on for some devices but off for others), use either [Manage tamper protection for your organization using Microsoft Endpoint Manager](manage-tamper-protection-microsoft-endpoint-manager.md) or [Manage tamper protection using tenant attach with Configuration Manager, version 2006](manage-tamper-protection-configuration-manager.md).
+- If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft 365 Defender portal.
+
+## Requirements for managing tamper protection in the Microsoft 365 Defender portal
+
+- You must have appropriate [permissions](/microsoft-365/security/defender-endpoint/assign-portal-access) assigned, such as global admin, security admin, or security operations.
+
+- Your Windows devices must be running one of the following versions of Windows:
+
+ - Windows 11
+ - Windows 11 Enterprise multi-session
+ - Windows 10
+ - Windows 10 Enterprise multi-session
+ - Windows Server 2022
+ - Windows Server 2019
+ - Windows Server, version 1803 or later
+ - Windows Server 2016
+ - Windows Server 2012 R2
+
+For more information about releases, see [Windows 10 release information](/windows/release-health/release-information).
+
+- Your devices must be [onboarded to Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/onboarding).
+- Your devices must be using anti-malware platform version `4.18.2010.7` (or above) and anti-malware engine version `1.1.17600.5` (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)
+- [Cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) must be turned on.
+
+> [!NOTE]
+> When tamper protection is enabled via the Microsoft 365 Defender portal, cloud-delivered protection is required, so that the enabled state of tamper protection can be controlled.
+> Starting with the November 2021 update (platform version `4.18.2111.5`), if cloud-delivered protection is not turned on for a device and tamper protection is turned on in the Microsoft 365 Defender portal, then cloud-delivered protection will be automatically turned on for that device along with tamper protection.
+
+## Turn tamper protection on (or off) in the Microsoft 365 Defender portal
++
+1. Go to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
+
+2. Choose **Settings** \> **Endpoints**.
+
+3. Go to **General** \> **Advanced features**, and then turn tamper protection on.
+
+> [!TIP]
+> If you're looking for Antivirus related information for other platforms, see:
+> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
+> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
+> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
+> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
+> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
+> - [Configure Defender for Endpoint on Android features](android-configure.md)
+> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Manage Tamper Protection Microsoft Endpoint Manager https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-tamper-protection-microsoft-endpoint-manager.md
+
+ Title: Manage tamper protection for your organization using Microsoft Endpoint Manager
++
+description: Turn tamper protection on or off for your organization in Microsoft Endpoint Manager.
+keywords: malware, defender, antivirus, tamper protection, Microsoft Endpoint Manager
+ms.pagetype: security
+ms.mktglfcycl: manage
+ms.sitesec: library
+ms.localizationpriority: medium
+audience: ITPro
++++
+- nextgen
+- admindeeplinkDEFENDER
+ms.technology: mde
+
+- M365-security-compliance
+- m365initiative-defender-endpoint
++
+# Manage tamper protection for your organization using Microsoft Endpoint Manager
+
+**Applies to:**
+
+- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- Microsoft Defender Antivirus
+
+**Platforms**
+- Windows
++
+If your organization uses Microsoft Endpoint Manager (MEM) you can turn tamper protection on (or off) for your organization in the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)). Use Intune when you want to fine-tune tamper protection settings. For example, if you want to enable tamper protection on some devices, but not all, use Intune.
+
+## Requirements for managing tamper protection in Endpoint Manager
+
+- You must have appropriate [permissions](/microsoft-365/security/defender-endpoint/assign-portal-access) assigned, such as global admin, security admin, or security operations.
+- Your organization uses [Microsoft Endpoint Manager to manage devices](/mem/endpoint-manager-getting-started). (Microsoft Endpoint Manager (MEM) licenses are required; MEM is included in Microsoft 365 E3/E5, Enterprise Mobility + Security E3/E5, Microsoft 365 Business Premium, Microsoft 365 F1/F3, Microsoft 365 Government G3/G5, and corresponding education licenses.)
+- Your Windows devices must be running Windows 11 or Windows 10 [1709](/lifecycle/announcements/revised-end-of-service-windows-10-1709), [1803](/lifecycle/announcements/windows-server-1803-end-of-servicing), [1809](/windows/release-health/status-windows-10-1809-and-windows-server-2019), or later. (For more information about releases, see [Windows 10 release information](/windows/release-health/release-information).)
+- You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above).
+- Your devices must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version `1.1.15500.X` (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)
+
+## Turn tamper protection on (or off) in Microsoft Endpoint Manager
++
+1. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** \> **Antivirus**, and then choose **+ Create Policy**.
+
+ - In the **Platform** list, select **Windows 10 and later**.
+ - In the **Profile** list, select **Windows Security experience**.
+
+2. Create a profile that includes the following setting:
+
+ - **Enable tamper protection to prevent Microsoft Defender being disabled: Enable**
+
+3. Assign the profile to one or more groups.
+
+> [!TIP]
+> If you're looking for Antivirus related information for other platforms, see:
+> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
+> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
+> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
+> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
+> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
+> - [Configure Defender for Endpoint on Android features](android-configure.md)
+> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Microsoft Defender Endpoint Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-linux.md
If you experience any installation failures, refer to [Troubleshooting installat
- Red Hat Enterprise Linux 6.7 or higher (Preview) - Red Hat Enterprise Linux 7.2 or higher - Red Hat Enterprise Linux 8.x
+ - Red Hat Enterprise Linux 9.x
- CentOS 6.7 or higher (Preview) - CentOS 7.2 or higher - Ubuntu 16.04 LTS or higher LTS
High I/O workloads from certain applications can experience performance issues w
## Related articles -- [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint)-- [Connect your non-Azure machines to Microsoft Defender for Cloud](/azure/defender-for-cloud/quickstart-onboard-machines)-
+- [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint)
+- [Connect your non-Azure machines to Microsoft Defender for Cloud](/azure/defender-for-cloud/quickstart-onboard-machines)
+- [Turn on network protection for Linux](network-protection-linux.md)
security Microsoft Defender Endpoint Mac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-mac.md
Starting with macOS 11 (Big Sur), Microsoft Defender for Endpoint has been fully
- For more information about logging, uninstalling, or other topics, see [Resources for Microsoft Defender for Endpoint on Mac](mac-resources.md). - [Privacy for Microsoft Defender for Endpoint on Mac](mac-privacy.md).
+- [Turn on Network protection for macOS](network-protection-macos.md)
security Network Protection Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection-linux.md
Within 10-15 minutes, these domains will be listed in Microsoft 365 Defender for
- [Web protection](web-protection-overview.md) - [Create indicators](manage-indicators.md) - [Web content filtering](web-content-filtering.md)
+- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
security Network Protection Macos https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection-macos.md
Network protection expands the scope of Microsoft 365 Defender [SmartScreen](/
- Your device must be in either the InsiderSlow (Preview) or InsiderFast (Beta) Microsoft AutoUpdate update channel. You can check the update channel using the following command: ```bash
-mdatp --health releaseRing
+mdatp health --field release_ring
``` If your device isn't already in the InsiderSlow(Preview) update channel, execute the following command from the Terminal. The channel update takes effect next time the product starts (when the next product update is installed or when the device is rebooted).
No End-user notification on third party browsers? Check your toast message setti
- [Web protection](web-protection-overview.md) - [Create indicators](manage-indicators.md) - [Web content filtering](web-content-filtering.md)
+- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
security Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection.md
Network protection is enabled per device, which is typically done using your man
You can enable network protection in **Audit** mode or **Block** mode. If you want to evaluate the impact of enabling network protection before actually blocking IP addresses or URLs, you can enable network protection in Audit mode for a period of time to gather data on what would be blocked. Audit mode logs when end users have connected to an address or site that would otherwise have been blocked by network protection.
+For information about Network protection for Linux and macOS see: [Network protection for Linux](network-protection-linux.md) and [Network protection for MacOS](network-protection-macos.md).
+ ## Advanced hunting If you're using advanced hunting to identify audit events, you'll have up to 30 days history available from the console. See [Advanced hunting](advanced-hunting-overview.md).
security Post Ti Indicator https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/post-ti-indicator.md
expirationTime|DateTimeOffset|The expiration time of the indicator. **Optional**
severity|Enum|The severity of the indicator. Possible values are: "Informational", "Low", "Medium", and "High". **Optional** recommendedActions|String|TI indicator alert recommended actions. **Optional** rbacGroupNames|String|Comma-separated list of RBAC group names the indicator would be applied to. **Optional**
+educateUrl|String|Custom notification/support URL. Supported for Block and Warn action types for URL indicators. **Optional**
generateAlert|Enum|**True** if alert generation is required, **False** if this indicator should not generate an alert. ## Response
security Prevent Changes To Security Settings With Tamper Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md
Tamper protection doesn't prevent you from viewing your security settings. And,
|To perform this task...|See this section...| |||
-|Manage tamper protection across your tenant <p> Use the Microsoft 365 Defender portal to turn tamper protection on or off|[Manage tamper protection for your organization using the Microsoft 365 Defender](#manage-tamper-protection-for-your-organization-using-the-microsoft-365-defender-portal)|
-|Fine-tune tamper protection settings in your organization <p> Use Intune (Microsoft Endpoint Manager) to turn tamper protection on or off. You can configure tamper protection for some or all users with this method.|[Manage tamper protection for your organization using Microsoft Endpoint Manager](#manage-tamper-protection-for-your-organization-using-microsoft-endpoint-manager)|
-|Turn tamper protection on (or off) for your organization with Configuration Manager|[Manage tamper protection for your organization using tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006)|
-|Turn tamper protection on (or off) for an individual device|[Manage tamper protection on an individual device](#manage-tamper-protection-on-an-individual-device)|
+|Manage tamper protection across your tenant <p> Use the Microsoft 365 Defender portal to turn tamper protection on or off|[Manage tamper protection for your organization using Microsoft 365 Defender](manage-tamper-protection-microsoft-365-defender.md)|
+|Fine-tune tamper protection settings in your organization <p> Use Intune (Microsoft Endpoint Manager) to turn tamper protection on or off. You can configure tamper protection for some or all users with this method.|[Manage tamper protection for your organization using Microsoft Endpoint Manager](manage-tamper-protection-microsoft-endpoint-manager.md)|
+|Turn tamper protection on (or off) for your organization with Configuration Manager|[Manage tamper protection for your organization using tenant attach with Configuration Manager, version 2006](manage-tamper-protection-configuration-manager.md)|
+|Turn tamper protection on (or off) for an individual device|[Manage tamper protection on an individual device](manage-tamper-protection-individual-device.md)|
|View details about tampering attempts on devices|[View information about tampering attempts](#view-information-about-tampering-attempts)| |Review your security recommendations|[Review security recommendations](#review-your-security-recommendations)|
-|Review the list of frequently asked questions (FAQs)|[Browse the FAQs](#view-information-about-tampering-attempts)|
+|Review the list of frequently asked questions (FAQs)|[Browse the FAQs](faqs-tamper-protection.md)|
## Potential dependency on cloud protection
-Depending on the method or management tool you use to enable tamper protection, there might be a dependency on [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) Cloud-delivered protection is also referred to as cloud protection, or Microsoft Advanced Protection Service (MAPS).
+Depending on the method or management tool you use to enable tamper protection, there might be a dependency on [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md). Cloud-delivered protection is also referred to as cloud protection, or Microsoft Advanced Protection Service (MAPS).
The following table provides details on the methods, tools, and dependencies.
The following table provides details on the methods, tools, and dependencies.
|Microsoft Endpoint Configuration Manager with Tenant Attach|No| |Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com))|Yes|
-## Manage tamper protection for your organization using the Microsoft 365 Defender portal
-
-Tamper protection can be turned on or off for your tenant using the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Here are a few points to keep in mind:
--- Currently, the option to manage tamper protection in the Microsoft 365 Defender portal is on by default for new deployments. For existing deployments, tamper protection is available on an opt-in basis. To opt in, in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>, choose **Settings** \> **Endpoints** \> **Advanced features** \> **Tamper protection**.-- When you use the Microsoft 365 Defender portal to manage tamper protection, you do not have to use Intune or the tenant attach method.-- When you manage tamper protection in the Microsoft 365 Defender portal, the setting is applied tenant wide, affecting all of your devices that are running Windows 10, Windows 10 Enterprise multi-session, Windows 11, Windows 11 Enterprise multi-session, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019 or Windows Server 2022. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Microsoft Endpoint Manager](#manage-tamper-protection-for-your-organization-using-microsoft-endpoint-manager) or [Configuration Manager with tenant attach](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006).-- If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft 365 Defender portal.-
-### Requirements for managing tamper protection in the Microsoft 365 Defender portal
--- You must have appropriate [permissions](/microsoft-365/security/defender-endpoint/assign-portal-access) assigned, such as global admin, security admin, or security operations.--- Your Windows devices must be running one of the following versions of Windows:
-
- - Windows 11
- - Windows 11 Enterprise multi-session
- - Windows 10
- - Windows 10 Enterprise multi-session
- - Windows Server 2022
- - Windows Server 2019
- - Windows Server, version 1803 or later
- - Windows Server 2016
- - Windows Server 2012 R2
-
-For more information about releases, see [Windows 10 release information](/windows/release-health/release-information).
--- Your devices must be [onboarded to Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/onboarding).-- Your devices must be using anti-malware platform version `4.18.2010.7` (or above) and anti-malware engine version `1.1.17600.5` (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)-- [Cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) must be turned on.-
-> [!NOTE]
-> When tamper protection is enabled via the Microsoft 365 Defender portal, cloud-delivered protection is required, so that the enabled state of tamper protection can be controlled.
-> Starting with the November 2021 update (platform version `4.18.2111.5`), if cloud-delivered protection is not turned on for a device and tamper protection is turned on in the Microsoft 365 Defender portal, then cloud-delivered protection will be automatically turned on for that device along with tamper protection.
-
-### Turn tamper protection on (or off) in the Microsoft 365 Defender portal
--
-1. Go to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Choose **Settings** \> **Endpoints**.
-
-3. Go to **General** \> **Advanced features**, and then turn tamper protection on.
-
-## Manage tamper protection for your organization using Microsoft Endpoint Manager
-
-If your organization uses Microsoft Endpoint Manager (MEM) you can turn tamper protection on (or off) for your organization in the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)). Use Intune when you want to fine-tune tamper protection settings. For example, if you want to enable tamper protection on some devices, but not all, use Intune.
-
-### Requirements for managing tamper protection in Endpoint Manager
--- You must have appropriate [permissions](/microsoft-365/security/defender-endpoint/assign-portal-access) assigned, such as global admin, security admin, or security operations.-- Your organization uses [Microsoft Endpoint Manager to manage devices](/mem/endpoint-manager-getting-started). (Microsoft Endpoint Manager (MEM) licenses are required; MEM is included in Microsoft 365 E3/E5, Enterprise Mobility + Security E3/E5, Microsoft 365 Business Premium, Microsoft 365 F1/F3, Microsoft 365 Government G3/G5, and corresponding education licenses.)-- Your Windows devices must be running Windows 11 or Windows 10 [1709](/lifecycle/announcements/revised-end-of-service-windows-10-1709), [1803](/lifecycle/announcements/windows-server-1803-end-of-servicing), [1809](/windows/release-health/status-windows-10-1809-and-windows-server-2019), or later. (For more information about releases, see [Windows 10 release information](/windows/release-health/release-information).)-- You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above).-- Your devices must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version `1.1.15500.X` (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)-
-### Turn tamper protection on (or off) in Microsoft Endpoint Manager
--
-1. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** \> **Antivirus**, and then choose **+ Create Policy**.
-
- - In the **Platform** list, select **Windows 10 and later**.
- - In the **Profile** list, select **Windows Security experience**.
-
-2. Create a profile that includes the following setting:
-
- - **Enable tamper protection to prevent Microsoft Defender being disabled: Enable**
-
-3. Assign the profile to one or more groups.
-
-### Manage tamper protection for your organization with Configuration Manager, version 2006
-
-If you're using [version 2006 of Configuration Manager](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2006), you can manage tamper protection settings on Windows 10, Windows 10 Enterprise multi-session, Windows 11, Windows 11 Enterprise multi-session, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, and Windows Server 2022 by using a method called *tenant attach*. Tenant attach enables you to sync your on-premises-only Configuration Manager devices into the Microsoft Endpoint Manager admin center, and then deliver endpoint security configuration policies to on-premises collections & devices.
-
-> [!NOTE]
-> The procedure can be used to extend tamper protection to devices running Windows 10, Windows 10 Enterprise multi-session, Windows 11, Windows 11 Enterprise multi-session, Windows Server 2019, and Windows Server 2022. Make sure to review the prerequisites and other information in the resources mentioned in this procedure. For Windows Server 2012 R2 running the modern, unified solution [version 2203 of Configuration Manager](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2203) is required.
-
-1. Set up tenant attach. To learn more, see [Get started: Create and deploy endpoint security policies from the admin center](/mem/configmgr/tenant-attach/endpoint-security-get-started).
-
-2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** \> **Antivirus**, and then choose **+ Create Policy**.
-
- - In the **Platform** list, select **Windows 10, Windows 11, and Windows Server (ConfigMgr)**.
- - In the **Profile** list, select **Windows Security experience (preview)**.
-
-3. Deploy the policy to your device collection.
-
-#### Need help with this method?
-
-See the following resources:
--- [Settings for the Windows Security experience profile in Microsoft Intune](/mem/intune/protect/antivirus-security-experience-windows-settings)-- [Tech Community Blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin)-
-## Manage tamper protection on an individual device
-
-> [!NOTE]
-> Tamper protection blocks attempts to modify Microsoft Defender Antivirus settings through the registry.
-> To help ensure that tamper protection doesn't interfere with non-Microsoft security products or enterprise installation scripts that modify these settings, go to **Windows Security** and update **Security intelligence** to version 1.287.60.0 or later. (See [Security intelligence updates](https://www.microsoft.com/wdsi/definitions).)
-> After you've made this update, tamper protection continues to protect your registry settings, and logs attempts to modify them without returning errors.
-
-If you are a home user, or you are not subject to settings managed by a security team, you can use the Windows Security app to manage tamper protection. You must have appropriate admin permissions on your device to do change security settings, such as tamper protection.
-
-Here's what you see in the Windows Security app:
--
-1. Select **Start**, and start typing *Security*. In the search results, select **Windows Security**.
-
-2. Select **Virus & threat protection** \> **Virus & threat protection settings**.
-
-3. Set **Tamper Protection** to **On** or **Off**.
- ## Are you using Windows Server 2012 R2, 2016, or Windows version 1709, 1803, or 1809?
-If you are using Windows Server 2012 R2 using the modern unified solution, Windows Server 2016, Windows 10 version 1709, 1803, or [1809](/windows/release-health/status-windows-10-1809-and-windows-server-2019), you won't see **Tamper Protection** in the Windows Security app. Instead, you can use PowerShell to determine whether tamper protection is enabled.
+If you're using Windows Server 2012 R2 using the modern unified solution, Windows Server 2016, Windows 10 version 1709, 1803, or [1809](/windows/release-health/status-windows-10-1809-and-windows-server-2019), you won't see **Tamper Protection** in the Windows Security app. Instead, you can use PowerShell to determine whether tamper protection is enabled.
-On Windows Server 2016, the Settings app will not accurately reflect the status of real-time protection when tamper protection is enabled.
+On Windows Server 2016, the Settings app won't accurately reflect the status of real-time protection when tamper protection is enabled.
-#### Use PowerShell to determine whether tamper protection and real-time protection are turned on
+### Use PowerShell to determine whether tamper protection and real-time protection are turned on
1. Open the Windows PowerShell app.
Tamper protection integrates with [Microsoft Defender Vulnerability Management](
To learn more about Microsoft Defender Vulnerability Management, see [Dashboard insights - Defender Vulnerability Management](tvm-dashboard-insights.md#dashboard-insightsthreat-and-vulnerability-management).
-## Frequently asked questions
-
-### On which versions of Windows can I configure tamper protection?
--- Windows 11-- Windows 11 Enterprise multi-session-- Windows 10 OS [1709](/lifecycle/announcements/revised-end-of-service-windows-10-1709), [1803](/lifecycle/announcements/windows-server-1803-end-of-servicing), [1809](/windows/release-health/status-windows-10-1809-and-windows-server-2019), or later together with [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint).-- Windows 10 Enterprise multi-session
-
-If you are using Configuration Manager, version 2006, with tenant attach, tamper protection can be extended to Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, and Windows Server 2022. See [Tenant attach: Create and deploy endpoint security Antivirus policy from the admin center (preview)](/mem/configmgr/tenant-attach/deploy-antivirus-policy).
-
-### Will tamper protection affect non-Microsoft antivirus registration in the Windows Security app?
-
-No. Non-Microsoft antivirus offerings will continue to register with the Windows Security application.
-
-### What happens if Microsoft Defender Antivirus is not active on a device?
-
-Devices that are onboarded to Microsoft Defender for Endpoint will have Microsoft Defender Antivirus running in passive mode. In these cases, tamper protection will continue to protect the service and its features.
-
-### How do I turn tamper protection on or off?
-
-If you are a home user, see [Manage tamper protection on an individual device](#manage-tamper-protection-on-an-individual-device).
-
-If you are an organization using [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint), you should be able to manage tamper protection in Intune similar to how you manage other endpoint protection features. See the following sections of this article:
--- [Manage tamper protection using Microsoft Endpoint Manager](#manage-tamper-protection-for-your-organization-using-microsoft-endpoint-manager)-- [Manage tamper protection using the Microsoft 365 Defender portal](#manage-tamper-protection-for-your-organization-using-the-microsoft-365-defender-portal)-
-### How does configuring tamper protection in Intune affect how I manage Microsoft Defender Antivirus with Group Policy?
-
-If you are currently using Intune to configure and manage tamper protection, you should continue using Intune.
-
-Group policy doesn't apply to tamper protection. Changes made to Microsoft Defender Antivirus settings using Group Policy are ignored when tamper protection is turned on, or when tamper protection is configured with Intune.
-
-### If we use Microsoft Intune to configure tamper protection, does it apply only to the entire organization?
-
-You have flexibility in configuring tamper protection with Intune. You can target your entire organization, or select specific devices and user groups.
-
-### Can I configure tamper protection with Microsoft Endpoint Configuration Manager?
-
-If you are using tenant attach, you can use Microsoft Endpoint Configuration Manager. See the following resources:
--- [Manage tamper protection for your organization with Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006)-- [Tech Community blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin)-
-### I have the Windows E3 enrollment. Can I use configuring tamper protection in Intune?
-
-Currently, configuring tamper protection in Intune is only available for customers who have [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint).
-
-### I'm an enterprise customer. Can local admins change tamper protection on their devices?
-
-No. Local admins cannot change or modify tamper protection settings.
-
-### What happens if my device is onboarded with Microsoft Defender for Endpoint and then goes into an off-boarded state?
-
-If a device is off-boarded from Microsoft Defender for Endpoint, tamper protection is turned on, which is the default state for unmanaged devices.
-
-### If the status of tamper protection changes, are alerts shown in the Microsoft 365 Defender portal?
-
-Yes. The alert is shown in [https://security.microsoft.com](https://security.microsoft.com) under **Alerts**.
-
-Your security operations team can also use hunting queries, such as the following example:
-
-`AlertInfo|where Title == "Tamper Protection bypass"`
-
-[View information about tampering attempts](#view-information-about-tampering-attempts).
> [!TIP] > If you're looking for Antivirus related information for other platforms, see:
security Schedule Antivirus Scan In Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/schedule-antivirus-scan-in-mde.md
+
+ Title: How to schedule an antivirus scan using Anacron in Microsoft Defender for Endpoint on Linux
+description: Learn how to schedule an antivirus scan in Microsoft Defender for Endpoint on Linux for better protection of your organization's assets.
+keywords: microsoft, defender, Microsoft Defender for Endpoint, linux, scans, antivirus, microsoft defender for endpoint on linux
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
++
+ms.localizationpriority: medium
+
+audience: ITPro
++
+ms.technology: mde
++
+# Schedule an antivirus scan using Anacron in Microsoft Defender for Endpoint on Linux
+
+**Applies to:**
+- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
++
+To run a scan of Microsoft Defender Antivirus for Linux, see [Supported Commands](/microsoft-365/security/defender-endpoint/linux-resources#supported-commands).
+
+> [!NOTE]
+> This article supports Microsoft Defender for Endpoint on Linux for Red Hat Enterprise Linux distributions (RHEL).
+
+## System requirements
+
+See the following system requirements needed to schedule Microsoft Defender Antivirus scan in Microsoft Defender Endpoint on Linux.
+
+- Linux server distributions and versions: Red Hat Enterprise Linux 7.2 or higher.
+- The **FANOTIFY** option in kernel must be enabled.
+
+## Scheduling Microsoft Defender Antivirus scan in Red Hat Linux
+
+You can schedule cron jobs to initiate Microsoft Defender Antivirus scans on a schedule. For more information, see [How to schedule scans with Microsoft Defender for Endpoint on Linux](linux-schedule-scan-mde.md). This process works well if the device is always up and running.
+
+But if the Linux devices are shut down or offline during the cron schedule, the scan won't run. In these situations, you can use **anacron** to read the timestamp and find the last executed job. If the device was shut down during the scheduled cron job, it needs to wait until the next scheduled time. By using **anacron**, the system will detect the last time the scan was run. If the device didn't run the cron job, it will automatically start it.
+
+### Schedule Microsoft Defender Antivirus scans in Red Hat Linux
+
+Use the following steps to schedule scans:
+
+1. Connect to the RedHat server using Putty.
+1. Edit the anacron file:
+
+ ```vi /etc/anacron```
+
+ :::image type="content" source="images/vi_etc_anacron.png" alt-text="anacron file":::
+
+ ```
+ # /etc/anacrontab: configuration file for anacron
+ # See anacron (8) and anacrontab (5) for details.
+ SHELL=/bin/sh
+ PATH=/sbin:/bin:/usr/sbin:/usr/bin
+ RANDOM_DELAY=45
+ # Anacron jobs will start between 8pm and 11pm.
+ START_HOURS_RANGE=2-023
+ # delay will be 5 minutes + RANDOM_DELAY for cron.daily
+ ```
+
+1. Note the following items in the file.
+ 1. **Shell:** Shell is referred as ```/bin/sh```, and not as ```/bin/bash```. Remember when writing the jobs.
+ 1. **RANDOM_DELAY:** Describes the maximum time in minutes for the job. This value is used to offset the jobs so there wouldn't be too many jobs running at the same time. Using this delay is ideal for VDI solutions.
+ 1. **START_HOURS_RANGE:** Describes the time range to run the job.
+ 1. **cron.daily:** Describes 1 as the period of days required for the frequency of job executions. 5 is the delay in minutes that anacron waits after the device restarts.
+
+1. Review look at the anacron jobs:
+
+ ```ls -lh /etc/cron*```
+
+ :::image type="content" source="images/ls_lh_etc_cron.png" alt-text="anacron jobs":::
+
+ ```
+ [root@enaredhat7 /] # 1s -1h /etc/cron*
+ - rw
+ - rw - r
+
+ /etc/cron.d:
+ total 28k
+ - rw - r
+ - rw - r
+ - rw - r
+ - rw - r
+ - rw - r
+ - rw - r
+ - rw
+
+ /etc/cron.daily:
+ total 24k
+ - rwxr - xr - x. 1 root root 127 Jun 14 16:49 avscandaily
+ - rwx
+ - rwxr - xr - x. 1 root root 618 Jul 10 2018 man-db.cron
+ - rwx
+ - rwx
+ - rwxr - xr - x. 1 root root 114 Apr 8 2021 rhui-update-client
+
+ /etc/cron.hourly:
+ total 8.0k
+ - rwxr - xr - x. 1 root root 392 Nov 30 2021 0anacron
+ - rwxr - xr - x. 1 root root 131 Jun 14 17:05 update
+
+ /etc/cron.monthly:
+ total 0
+ - rwxr - xr - x. 1 root root 0 Jun 14 17:47 mdatpupdate
+
+ /etc/cron.weekly:
+ total 0
+ ```
+
+1. Ignore the ```/etc/cron.d``` directory, you'll see ```/etc/corn.daily, hourly, monthly, and weekly```.
+
+1. To schedule a weekly antivirus scan, you can create a file (Job) under the ```/etc/cron.weekly``` directory.
+
+ ```cd /etc/cron.weekly```
+
+ ``` vi mdavfullscan```
+
+ ```Press Insert```
+
+ :::image type="content" source="images/vi_mdavfullscan.png" alt-text="weekly antivirus scans":::
+
+ ```
+ #!/bin/sh
+ set -e
+ echo $(date) ΓÇ£Time Scan BeginsΓÇ¥ >>/logs/mdav_avacron_full_scan.log/bin/mdatp scan full >> /logs/mdav_avacron_full_scan.log
+ echo $(date) ΓÇ£Time Scan FinishedΓÇ¥ >>/logs/mdav_avacron_full_scan.log
+ exit 0
+ ~
+ ```
+
+ ```Press Esc```
+
+ ```Type: **wq!```
+
+1. Change the file permissions to allow the file to be executed.
+
+ ```Chmod 755 mdavfullscan```
+ ```ls -la```
+
+ :::image type="content" source="images/chmod-755-mdavfullscan.png" alt-text="7. Change file permissions":::
+
+ ```
+ [root@enaredhat7 cron.weekly]# 1s -1a
+ total 16
+ drwxr - xr ΓÇô x. 2 root root 26 Jun 14 19:19 .
+ drwxr - xr ΓÇô x. 85 root root 8192 Jun 14 19:01 ..
+ - rw - r
+ [root@enaredhat7 cron.weekly] # chmod 755 mdavfullscan
+ [root@enaredhat7 cron.weekly] # 1s -1h
+ total 4. 0k
+ - rwxr - xr ΓÇô x. 1 root root 128 Jun 14 19:19 mdavfullscan
+ [root@enaredhat7 cron.weekly] #
+ ```
+
+1. Use the command to test the weekly anacron job.
+
+ ```./mdavfullscan```
+
+1. Use the command to verify the job ran successfully.
+
+ ```cat /logs/mdav_avacron_full_scan.log```
+
+ :::image type="content" source="images/mdav_avacron_full_scan_log.png" alt-text="verify the job ran":::
+
+ ```
+ [root@enaredhat7 cron.weekly] # cat / logs / mdav_avacron_full_scan.log
+ Tue Jun 14 20:20:44 UTC 2022 Time Scan Begins
+ Scan has finished
+ 66547 file(s) scanned
+ 0 threat(s) detected
+ Tue Jun 14 20:20:50 UTC 2022 Time Scan Finished
+ [root@enaredhat7 cron.weekly] #
+ ```
security Security Config Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/security-config-management.md
Use the following steps to validate that your endpoints have successfully comple
To offboard devices that have been onboarded via Security Management for Microsoft Defender for Endpoint, see [Offboard devices from the Microsoft Defender for Endpoint service](offboard-machines.md). >[!NOTE]
->Offboarding will [disable Tamper Protection](prevent-changes-to-security-settings-with-tamper-protection.md#manage-tamper-protection-for-your-organization-using-the-microsoft-365-defender-portal) if it is enabled.
+>Offboarding will [disable Tamper Protection](manage-tamper-protection-microsoft-365-defender.md) if it is enabled.
## Troubleshooting Security Management To troubleshoot Security Management for Microsoft Defender for Endpoint enrollment issues, see [Troubleshoot onboarding issues related to Security Management for Microsoft Defender for Endpoint](troubleshoot-security-config-mgt.md).
security Troubleshoot Live Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-live-response.md
Live response leverages Defender for Endpoint sensor registration with WNS servi
1. `notify.windows.com` is not blocked in your environment. For more information, see, [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). 2. WpnService (Windows Push Notifications System Service) is not disabled.
+3. WpnService connectivity with WNS cloud is not disabled via group policy or MDM setting. ['Turn off notifications network usage'](/windows/client-management/mdm/policy-csp-notifications) should not be set to '1'.
Refer to the articles below to fully understand the WpnService service behavior and requirements:
security Web Threat Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-threat-protection.md
The following procedure describes how to configure web threat protection using t
- Set **Enable network protection** to **Enabled** so web protection is turned on. Alternately, you can set network protection to **Audit mode** to see how it will work in your environment. In audit mode, network protection does not prevent users from visiting sites or domains, but it does track detections as events. - To protect users from potential phishing scams and malicious software, turn **Require SmartScreen for Microsoft Edge Legacy** to **Yes**. - To prevent users from bypassing warnings about potentially malicious sites, set **Block malicious site access** to **Yes**.
- - To prevent users from bypassing the warnings and downloading unverified files, set **Block unverified file download** tl **Yes**.
+ - To prevent users from bypassing the warnings and downloading unverified files, set **Block unverified file download** to **Yes**.
6. On the **Scope tags** tab, if your organization is using scope tags, choose **+ Select scope tags**, and then choose **Next**. (If you are not using scope tags, choose **Next**.) To learn more about scope tags, see [Use role-based access control (RBAC) and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags).
security Whats New In Microsoft Defender Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
For more information on Microsoft Defender for Endpoint on other operating syste
## April 2022 - [Updated onboarding and feature parity for Windows Server 2012 R2 and Windows Server 2016)](configure-server-endpoints.md)<br/> The new unified solution package is now generally available and makes it easier to onboard servers by removing dependencies and installation steps. In addition, this unified solution package comes with many new feature improvements.-- Integration with Tunnel. Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app.This feature was earlier available only on Android. [Learn more](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/what-s-new-in-microsoft-endpoint-manager-2204-april-edition/ba-p/3297995)
+- Integration with Tunnel. Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. This feature was earlier available only on Android. [Learn more](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/what-s-new-in-microsoft-endpoint-manager-2204-april-edition/ba-p/3297995)
## January 2022
For more information on Microsoft Defender for Endpoint on other operating syste
- [Mobile Application management support](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-new-capabilities-on-android-and-ios/ba-p/2442730) <br> This enhancement enables Microsoft Defender for Endpoint protect an organization's data within a managed application when Intune is being used to manage mobile applications. For more information about mobile application management, see [this documentation](/mem/intune/apps/mam-faq). -- [Microsoft Tunnel VPN integration](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-new-capabilities-on-android-and-ios/ba-p/2442730) <br> Microsoft Tunnel VPN capabilities is now integrated with Microsoft Defender for Endpoint app for Android. This unification enables organizations to offer a simplified end user experience with one security app ΓÇô offering both mobile threat defense and the ability to access on-prem resources from their mobile device, while security and IT teams are able to maintain the same admin experiences they are familiar with.
+- [Microsoft Tunnel VPN integration](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-new-capabilities-on-android-and-ios/ba-p/2442730) <br> Microsoft Tunnel VPN capabilities is now integrated with Microsoft Defender for Endpoint app for Android. This unification enables organizations to offer a simplified end user experience with one security app ΓÇô offering both mobile threat defense and the ability to access on-premesis resources from their mobile device, while security and IT teams are able to maintain the same admin experiences they are familiar with.
- [Jailbreak detection on iOS](/microsoft-365/security/defender-endpoint/ios-configure-features#conditional-access-with-defender-for-endpoint-on-ios) <br> Jailbreak detection capability in Microsoft Defender for Endpoint on iOS is now generally available. This adds to the phishing protection that already exists. For more information, see [Setup Conditional Access Policy based on device risk signals](/microsoft-365/security/defender-endpoint/ios-configure-features). ## March 2021-- [Manage tamper protection using the Microsoft 365 Defender portal](prevent-changes-to-security-settings-with-tamper-protection.md#manage-tamper-protection-for-your-organization-using-the-microsoft-365-defender-portal) <br> You can manage tamper protection settings on Windows 10, Windows Server 2016, Windows Server 2019, and Windows Server 2022 by using a method called *tenant attach*.
+- [Manage tamper protection for your organization using Microsoft 365 Defender portal](manage-tamper-protection-microsoft-365-defender.md) <br> You can manage tamper protection settings on Windows 10, Windows Server 2016, Windows Server 2019, and Windows Server 2022 by using a method called *tenant attach*.
## January 2021
security M365d Autoir Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir-results.md
f1.keywords:
ms.localizationpriority: medium Last updated : 08/11/2022 audience: ITPro
With Microsoft 365 Defender, when an [automated investigation](m365d-autoir.md)
The investigation page has recently been updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and [Microsoft Defender for Office 365](../office-365-security/defender-for-office-365.md). To access the unified investigation page, select the link in the yellow banner you'll see on: -- Any investigation page in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077143" target="_blank">Office 365 Security & Compliance Center</a>
+- Any investigation page in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077143" target="_blank">Microsoft Purview compliance portal</a>
- Any investigation page in the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) - Any incident or Action center experience in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>
In the Investigation details view, you can see information on the **Investigatio
| Tab | Description | |:--|:--| | **Investigation graph** | Provides a visual representation of the investigation. Depicts entities and lists threats found, along with alerts and whether any actions are awaiting approval.<br/>You can select an item on the graph to view more details. For example, selecting the **Evidence** icon takes you to the **Evidence** tab, where you can see detected entities and their verdicts. |
-| **Alerts** | Lists alerts associated with the investigation. Alerts can come from threat protection features on a user's device, in Office apps, Microsoft Defender for Cloud Apps, and other Microsoft 365 Defender features. <br> <br> Note that if you see *Unsupported alert type*, it means that automated investigation capabilities cannot pick up that alert to run an automated investigation. However, you can [investigate these alerts manually](investigate-incidents.md#alerts).
+| **Alerts** | Lists alerts associated with the investigation. Alerts can come from threat protection features on a user's device, in Office apps, Microsoft Defender for Cloud Apps, and other Microsoft 365 Defender features. <br> <br> If you see *Unsupported alert type*, it means that automated investigation capabilities cannot pick up that alert to run an automated investigation. However, you can [investigate these alerts manually](investigate-incidents.md#alerts).
| **Devices** | Lists devices included in the investigation along with their remediation level. (Remediation levels correspond to [the automation level for device groups](m365d-configure-auto-investigation-response.md#review-or-change-the-automation-level-for-device-groups).) | | **Mailboxes** |Lists mailboxes that are impacted by detected threats. | | **Users** | Lists user accounts that are impacted by detected threats. |
In the Investigation details view, you can see information on the **Investigatio
|**Log** | Provides a chronological, detailed view of all the investigation actions taken after an alert was triggered.| | **Pending actions history** | Lists items that require approval to proceed. Go to the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) to approve pending actions. | +
+## Investigation states
+
+The following table lists investigation states and what they indicate.
++
+|Investigation state |Definition |
+|||
+|Benign | Artifacts were investigated and a determination was made that no threats were found.|
+|PendingResource | An automated investigation is paused because either a remediation action is pending approval, or the device on which an artifact was found is temporarily unavailable.|
+|UnsupportedAlertType | An automated investigation is not available for this type of alert. Further investigation can be done manually, by using advanced hunting. |
+|Failed | At least one investigation analyzer ran into a problem where it couldn't complete the investigation. If an investigation fails after remediation actions were approved, the remediation actions might still have succeeded.|
+|Successfully remediated| An automated investigation completed, and all remediation actions were completed or approved.|
+
+To provide more context about how investigation states show up, the following table lists alerts and their corresponding automated investigation state. This table is included as an example of what a security operations team might see in the Microsoft 365 Defender portal.
+
+|Alert name | Severity | Investigation state | Status | Category |
+|--|-||--|-|
+|Malware was detected in a wim disk image file|Informational|Benign|Resolved|Malware|
+|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a rar archive file|Informational|UnsupportedAlertType|New|Malware|
+|Malware was detected in a rar archive file|Informational|UnsupportedAlertType|New|Malware|
+|Malware was detected in a rar archive file|Informational|UnsupportedAlertType|New|Malware|
+|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
+|Wpakill hacktool was prevented|Low|Failed|New|Malware|
+|GendowsBatch hacktool was prevented|Low|Failed|New|Malware|
+|Keygen hacktool was prevented|Low|Failed|New|Malware|
+|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
+|Malware was detected in an iso disc image file|Informational|PendingResource|New|Malware|
+|Malware was detected in an iso disc image file|Informational|PendingResource|New|Malware|
+|Malware was detected in a pst outlook data file|Informational|UnsupportedAlertType|New|Malware|
+|Malware was detected in a pst outlook data file|Informational|UnsupportedAlertType|New|Malware|
+|MediaGet detected|Medium|PartiallyInvestigated|New|Malware|
+|TrojanEmailFile|Medium|SuccessfullyRemediated|Resolved|Malware|
+|CustomEnterpriseBlock malware was prevented|Informational|SuccessfullyRemediated|Resolved|Malware|
+|An active CustomEnterpriseBlock malware was blocked|Low|SuccessfullyRemediated|Resolved|Malware|
+|An active CustomEnterpriseBlock malware was blocked|Low|SuccessfullyRemediated|Resolved|Malware|
+|An active CustomEnterpriseBlock malware was blocked|Low|SuccessfullyRemediated|Resolved|Malware|
+|TrojanEmailFile|Medium|Benign|Resolved|Malware|
+|CustomEnterpriseBlock malware was prevented|Informational|UnsupportedAlertType|New|Malware|
+|CustomEnterpriseBlock malware was prevented|Informational|SuccessfullyRemediated|Resolved|Malware|
+|TrojanEmailFile|Medium|SuccessfullyRemediated|Resolved|Malware|
+|TrojanEmailFile|Medium|Benign|Resolved|Malware|
+|An active CustomEnterpriseBlock malware was blocked|Low|PendingResource|New|Malware|
+ ## Next steps - [View and manage remediation actions](m365d-autoir-actions.md)
security Microsoft 365 Security Center Defender Cloud Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-defender-cloud-apps.md
f1.keywords:
Previously updated : 05/03/2022 Last updated : 08/04/2022 audience: ITPro search.appverid:
The image and the table below lists the changes in navigation between Microsoft
| Defender for Cloud Apps | Microsoft 365 Defender | |||
+| **Discover** | |
| Cloud Discover dashboard | Cloud apps -> Cloud discovery | | Discovered Apps | tab on Cloud Discovery page | | Discovered resources | tab on Cloud Discovery page |
The image and the table below lists the changes in navigation between Microsoft
| Devices | tab on Cloud Discovery page | | Cloud app catalog | Cloud apps -> Cloud app catalog | | Create Cloud Discovery snapshot report | On the Cloud Discovery page, under Actions |
+| **Investigate** | |
| Activity log | Cloud apps -> Activity log |
-| Files | remaining in Defender for Cloud Apps portal |
+| Files | Cloud apps -> Files |
| Users and accounts | Assets -> Identities | | Security configuration | remaining in Defender for Cloud Apps portal | | Identity security posture | [Microsoft Defender for Identity's identity security posture assessments](/defender-for-identity/isp-overview) | | OAuth apps | Cloud apps -> OAuth apps |
-| Connected apps | remaining in Defender for Cloud Apps portal |
+| Connected apps | Settings -> Cloud apps -> Connected apps |
+| **Control** | |
+| Policies | Cloud apps -> Policy management |
+| Templates | Cloud apps -> Policy templates |
+| **Settings** | |
+| Settings | Settings -> Cloud apps |
+| System settings | Settings -> Cloud apps |
+| Settings/Governance log | Cloud apps -> Governance log |
+| Security extensions | Settings -> Cloud apps |
+| Playbooks | Settings -> Cloud apps |
+| SIEM agents | Settings -> Cloud apps |
+| External DLP | Settings -> Cloud apps |
+| API tokens | Settings -> Cloud apps |
+| Manage admin access | Permissions-> Cloud apps-> Roles |
+| Exported reports | Reports -> Cloud apps -> Exported reports |
+| Scoped deployment and privacy | Permissions -> Cloud apps -> Activity Privacy permissions |
+| Connected Apps/App connectors | Settings -> Cloud Apps -> Connected Apps |
+| Conditional Access App Control | Settings -> Cloud apps -> Conditional Access App Control apps |
+| IP address ranges | Settings -> Cloud apps |
+| User groups | Settings -> Cloud apps |
> [!NOTE] > The new Defender for Cloud Apps experience in the Microsoft 365 Defender portal is currently available for all users detailed in [Manage admin access](/defender-cloud-apps/manage-admins), except for:
-> * **App/Instance admin**, **User group admin**, **Cloud Discovery global admin**, and **Cloud Discovery report admin**, as defined in [Built-in admin roles in Defender for Cloud Apps](/defender-cloud-apps/manage-admins#built-in-admin-roles-in-defender-for-cloud-apps).
-> * User privacy groups as defined in [Activity privacy](/defender-cloud-apps/activity-privacy)
+>
+> - **App/Instance admin**, **User group admin**, **Cloud Discovery global admin**, and **Cloud Discovery report admin**, as defined in [Built-in admin roles in Defender for Cloud Apps](/defender-cloud-apps/manage-admins#built-in-admin-roles-in-defender-for-cloud-apps).
+> - User privacy groups as defined in [Activity privacy](/defender-cloud-apps/activity-privacy)
## What's changed
security Admin Submission https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/admin-submission.md
Watch this short video to learn how to use admin submissions in Microsoft Defend
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Actions & submissions** \> **Submissions**. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-2. On the **Submissions** page, verify that the **Emails** tab is selected based on the type of content you want to report, and then click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
+2. On the **Submissions** page, verify that the **Emails** tab is selected.
+
+3. On the **Emails** tab, click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
+
+4. In the **Submit to Microsoft for analysis** flyout that appears, enter the following information:
+
+ - **Select the submission type**: Verify the value **Email** is selected.
+
+ - **Add the network message ID or upload the email file**: Select one of the following options:
-3. In the **Add the network message ID or upload the email file** section, use one of the following options:
- **Add the email network message ID**: This is a GUID value that's available in the **X-MS-Exchange-Organization-Network-Message-Id** header in the message or in the **X-MS-Office365-Filtering-Correlation-Id** header in quarantined messages.+ - **Upload the email file (.msg or .eml)**: Click **Browse files**. In the dialog that opens, find and select the .eml or .msg file, and then click **Open**.
-4. In the **Choose a recipient who had an issue** box, specify the recipient that you would like to run a policy check against. The policy check will determine if the email bypassed scanning due to user or organization policies.
+ - **Choose a recipient who had an issue**: Specify the recipient that you would like to run a policy check against. The policy check will determine if the email bypassed scanning due to user or organization policies.
-5. In the **Select a reason for submitting to Microsoft** section, select one of the following options:
- - **Should not have been blocked (False positive)**
- - **Should have been blocked (False negative)**: In the **The email should have been categorized as** section that appears, select one of the following values (if you're not sure, use your best judgment):
- - **Phish**
- - **Malware**
- - **Spam**
+ - **Select a reason for submitting to Microsoft**: Verify **Should not have been blocked (False positive)** is selected.
-6. When you're finished, click **Submit**.
+ - **The email should have been categorized as**: Select **Phish**, **Malware**, or **Spam**. If you're not sure, use your best judgement.
- > :::image type="content" source="../../media/submission-flyout-email.png" alt-text="The New URL submission process" lightbox="../../media/submission-flyout-email.png":::
+ - **Block all emails from this sender or domain**: Select this option to create a block entry for the sender in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage your allows and blocks in the Tenant Allow/Block List](manage-tenant-allow-block-list.md).
-## Report questionable URLs to Microsoft
+ After you select this option, the following settings are available:
+
+ - By default, **Sender** is selected but you can select **Domain** instead.
+
+ - **Remove block entry after**: The default value is **30 days**, but you can select from the following values:
+ - **1 day**
+ - **7 days**
+ - **30 days**
+ - **90 days**
+ - **Never expire**
+ - **Specific date**
+
+ - **Block entry note**: Enter optional information about why you're allowing this email.
+
+ When you're finished, click **Submit**, and then click **Done**.
+
+> :::image type="content" source="../../media/admin-submission-email-block.png" alt-text="Submit a false negative (bad) email to Microsoft for analysis on the Submissions page in the Defender portal." lightbox="../../media/admin-submission-email-block.png":::
+
+> [!NOTE]
+> For messages that were incorrectly blocked by [spoof intelligence](learn-about-spoof-intelligence.md), a block entry for the domain pair is not created in the Tenant Allow/Block List.
+>
+> For messages that were incorrectly blocked by [domain or user impersonation protection](set-up-anti-phishing-policies.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365), a block entry for the domain or sender is not created in the Tenant Allow/Block List. Instead, the domain or sender is added to the **Trusted senders and domains section** in the [anti-phishing policy](configure-mdo-anti-phishing-policies.md#use-the-microsoft-365-defender-portal-to-modify-anti-phishing-policies) that detected the message.
+>
+> To report a file as **Should not have been blocked (False positive)**, see [Use the Microsoft 365 Defender portal to create allow entries for domains and email addresses in the Submissions portal](allow-block-email-spoof.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-domains-and-email-addresses-in-the-submissions-portal).
+
+## Report questionable email attachments to Microsoft
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Actions & submissions** \> **Submissions**. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-2. On the **Submissions** page, verify that the **URLs** tab is selected based on the type of content you want to report, and then click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
+2. On the **Submissions** page, select the **Email attachments** tab.
+
+3. On the **Email attachments** tab, click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
+
+4. On the **Submit to Microsoft for analysis** flyout that appears, enter the following information:
+
+ - **Select the submission type**: Verify the value **Email attachment** is selected.
+
+ - **File**: Click **Browse files** to find and select the file to submit.
-3. In the **URL** box that appears, enter the full URL (for example, `https://www.fabrikam.com/marketing.html`).
+ > [!NOTE]
+ > File submissions are not available in clouds that do not allow for data to leave the environment. **Browse files** is greyed out.
-4. In the **Select a reason for submitting to Microsoft** section, select one of the following options:
- - **Should not have been blocked (False positive)**
- - **Should have been blocked (False negative)**: In the **This URL should have been categorized as** section that appears, select one of the following values (if you're not sure, use your best judgment):
- - **Phish**
- - **Malware**
+ - **Select a reason for submitting to Microsoft**: Verify **Should have been blocked (False negative)** is selected.
-5. When you're finished, click **Submit**.
+ - **The email should have been categorized as**: Select **Phish** or **Malware**. If you're not sure, use your best judgement.
- > :::image type="content" source="../../media/submission-url-flyout.png" alt-text="The New Email submission process" lightbox="../../media/submission-url-flyout.png":::
+ - **Block this file**: Select this option to create a block entry for the sender in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage your allows and blocks in the Tenant Allow/Block List](manage-tenant-allow-block-list.md).
+
+ After you select this option, the following settings are available:
+
+ - **Remove block entry after**: The default value is **30 days**, but you can select from the following values:
+ - **1 day**
+ - **7 days**
+ - **30 days**
+ - **90 days**
+ - **Never expire**
+ - **Specific date**
+
+ - **Block entry note**: Enter optional information about why you're allowing this email.
+
+ When you're finished, click **Submit**, and then click **Done**.
+
+> :::image type="content" source="../../media/admin-submission-file-block.png" alt-text="Submit a false negative (bad) email attachment to Microsoft for analysis on the Submissions page in the Defender portal." lightbox="../../media/admin-submission-file-block.png":::
> [!NOTE]
- > URL submissions are not available in clouds that do not allow for data to leave the environment. The ability to select URL will be greyed out.
+ > To report a file as **Should not have been blocked (False positive)**, see [Use the Microsoft 365 Defender portal to create allow entries for files in the Submissions portal](allow-block-files.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-files-in-the-submissions-portal).
-## Report questionable email attachment to Microsoft
+## Report questionable URLs to Microsoft
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Actions & submissions** \> **Submissions**. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-2. On the **Submissions** page, verify that the **Email attachments** tab is selected based on the type of content you want to report, and then click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
+2. On the **Submissions** page, select the **URLs** tab.
-3. In the **File** section that appears, click **Browse files**. In the dialog that opens, find and select the file, and then click **Open**.
+3. On the **URLs** tab, click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
-3. In the **Select a reason for submitting to Microsoft** section, select one of the following options:
- - **Should not have been blocked (False positive)**
- - **Should have been blocked (False negative)**: In the **This file should have been categorized as** section that appears, select one of the following values (if you're not sure, use your best judgment):
- - **Phish**
- - **Malware**
+4. In the **Submit to Microsoft for analysis** flyout that appears, enter the following information:
-4. When you're finished, click **Submit**.
+ - **Select the submission type**: Verify the value **URL** is selected.
- > :::image type="content" source="../../media/submission-file-flyout.png" alt-text="The New Attachment submission process" lightbox="../../media/submission-file-flyout.png":::
+ - **URL**: Enter the full URL (for example, `https://www.fabrikam.com/marketing.html`), and then select it in the box that appears.
-> [!NOTE]
-> If malware filtering has replaced the message attachments with the Malware Alert Text.txt file, you need to submit the original message from quarantine that contains the original attachments. For more information on quarantine and how to release messages with malware false positives, see [Manage quarantined messages and files as an admin](manage-quarantined-messages-and-files.md).
-> File submissions are not available in the clouds that do not allow for data to leave the environment. The ability to select File will be greyed out.
+ > [!NOTE]
+ > URL submissions are not available in clouds that do not allow for data to leave the environment. **URL** is greyed out.
+
+ - **Select a reason for submitting to Microsoft**: Verify **Should have been blocked (False negative)** is selected.
+
+ - **The email should have been categorized as**: Select **Phish** or **Malware**. If you're not sure, use your best judgement.
+
+ - **Block this URL**: Select this option to create a block entry for the sender in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage your allows and blocks in the Tenant Allow/Block List](manage-tenant-allow-block-list.md).
+
+ After you select this option, the following settings are available:
+
+ - **Remove block entry after**: The default value is **30 days**, but you can select from the following values:
+ - **1 day**
+ - **7 days**
+ - **30 days**
+ - **90 days**
+ - **Never expire**
+ - **Specific date**
+
+ - **Block entry note**: Enter optional information about why you're allowing this email.
+
+ When you're finished, click **Submit**, and then click **Done**.
+
+> :::image type="content" source="../../media/admin-submission-url-block.png" alt-text="Submit a false negative (bad) URL to Microsoft for analysis on the Submissions page in the Defender portal." lightbox="../../media/admin-submission-url-block.png":::
+
+ > [!NOTE]
+ > To report a URL as **Should not have been blocked (False positive)**, see [Use the Microsoft 365 Defender portal to create allow entries for URLs in the Submissions portal](allow-block-urls.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-urls-in-the-submissions-portal).
## View email admin submissions to Microsoft
Watch this short video to learn how to use admin submissions in Microsoft Defend
2. On the **Submissions** page, verify that the **Emails** tab is selected.
- - You can sort the entries by clicking on an available column header. Click **Customize columns** to select the columns you need. All columns can be selected and showed in the submission grid. The default values are marked with an asterisk (*):
+ - You can sort the entries by clicking on an available column header.
+
+ - Click ![Customize columns icon.](../../media/m365-cc-sc-customize-icon.png) **Customize columns** to select the columns that you want to view. The default values are marked with an asterisk (\*):
- **Submission name**<sup>\*</sup> - **Sender**<sup>\*</sup> - **Recipient**
Watch this short video to learn how to use admin submissions in Microsoft Defend
When you're finished, click **Apply**.
- :::image type="content" source="../../media/email-admin-submission-customize-columns.png" alt-text="Customize column option for email admin submissions." lightbox="../../media/email-admin-submission-customize-columns.png":::
+ :::image type="content" source="../../media/admin-submission-email-customize-columns.png" alt-text="Customize columns option for email admin submissions." lightbox="../../media/admin-submission-email-customize-columns.png":::
- - To filter the entries, click **Filter**. The available filters are:
- - **Date submitted**: **Start date** and **End date**.
+ - To filter the entries, click ![Filter icon.](../../media/m365-cc-sc-filter-icon.png) **Filter**. The following values are available in the **Filter** flyout that appears:
+ - **Date submitted**: **Start date** and **End date** values.
- **Submission ID**: A GUID value that's assigned to every submission. - **Network Message ID** - **Sender** - **Recipient** - **Name** - **Submitted by**
- - **Reason for submitting**
- - **Status**
- - **Tags**
+ - **Reason for submitting**: The values **Not junk**, **Phish**, **Malware**, and **Spam**.
+ - **Status**: The values **Pending** and **Completed**.
+ - **Tags**: The default value is **All** or select a [user tag](user-tags.md) from the drop down list.
- When you're finished, click **Apply**.
+ When you're finished, click **Apply**. To clear existing filters, click ![Clear filters icon](../../media/m365-cc-sc-clear-filters-icon.png) **Clear filters** in the **Filter** flyout.
- :::image type="content" source="../../media/email-admin-submission-filters.png" alt-text="Filter options for email admin submissions." lightbox="../../media/email-admin-submission-filters.png":::
+ :::image type="content" source="../../media/admin-submission-email-filters.png" alt-text="Filter options for email admin submissions." lightbox="../../media/admin-submission-email-filters.png":::
- - To group the entries, click **Group** and select one of the following values from the dropdown list:
+ - To group the entries, click ![Group icon.](../../media/m365-cc-sc-group-icon.png) **Group** and select one of the following values from the dropdown list:
- **None** - **Reason** - **Status** - **Result** - **Tags**
- - To export the entries, click **Export**. In the dialog that appears, save the .csv file.
+ - To export the entries, click ![Export icon.](../../media/m365-cc-sc-download-icon.png) **Export**. In the dialog that appears, save the .csv file.
## View email attachment admin submissions to Microsoft
Watch this short video to learn how to use admin submissions in Microsoft Defend
2. On the **Submissions** page, verify that the **Email attachments** tab is selected.
- - You can sort the entries by clicking on an available column header. Click **Customize columns** to select the columns you need. All columns can be selected and showed in the submission grid. The default values are marked with an asterisk (*):
- - **Attachment name**<sup>\*</sup>
+ - You can sort the entries by clicking on an available column header.
+
+ - Click ![Customize columns icon.](../../media/m365-cc-sc-customize-icon.png) **Customize columns** to select the columns that you want to view. The default values are marked with an asterisk (\*):
+ - **Attachment filename**<sup>\*</sup>
- **Date submitted**<sup>\*</sup> - **Reason for submitting**<sup>\*</sup> - **Status**<sup>\*</sup>
Watch this short video to learn how to use admin submissions in Microsoft Defend
When you're finished, click **Apply**.
- :::image type="content" source="../../media/email-attachment-admin-submission-customize-columns.png" alt-text="Customize column options for email attachment admin submissions.":::
+ :::image type="content" source="../../media/admin-submission-file-customize-columns.png" alt-text="Customize column options for email attachment admin submissions.":::
- - To filter the entries, click **Filter**. The available filters are:
+ - To filter the entries, click ![Filter icon.](../../media/m365-cc-sc-filter-icon.png) **Filter**. The following values are available in the **Filter** flyout that appears:
- **Date submitted**: **Start date** and **End date**. - **Submission ID**: A GUID value that's assigned to every submission. - **Attachment filename** - **Submitted by** - **Reason for submitting** - **Status**
- - **Tags**
+ - **Tags**: The default value is **All** or select a [user tag](user-tags.md) from the drop down list.
When you're finished, click **Apply**.
- :::image type="content" source="../../media/email-attachment-admin-submission-filters.png" alt-text="Filter options for email attachment admin submissions.":::
+ :::image type="content" source="../../media/admin-submission-file-filters.png" alt-text="Filter options for email attachment admin submissions.":::
- - To group the entries, click **Group** and select one of the following values from the dropdown list:
+ - To group the entries, click ![Group icon.](../../media/m365-cc-sc-group-icon.png) **Group** and select one of the following values from the drop down list:
- **None** - **Reason** - **Status** - **Result** - **Tags**
- - To export the entries, click **Export**. In the dialog that appears, save the .csv file.
+ - To export the entries, click ![Export icon.](../../media/m365-cc-sc-download-icon.png) **Export**. In the dialog that appears, save the .csv file.
## View URLs admin submissions to Microsoft
Watch this short video to learn how to use admin submissions in Microsoft Defend
2. On the **Submissions** page, verify that the **URLs** tab is selected.
- - You can sort the entries by clicking on an available column header. Click **Customize columns** to select the columns you need. All columns can be selected and showed in the submission grid. The default values are marked with an asterisk (*):
+ - You can sort the entries by clicking on an available column header.
+
+ - Click ![Customize columns icon.](../../media/m365-cc-sc-customize-icon.png) **Customize columns** to select the columns that you want to view. The default values are marked with an asterisk (\*):
- **URL**<sup>\*</sup> - **Date submitted**<sup>\*</sup> - **Reason for submitting**<sup>\*</sup>
Watch this short video to learn how to use admin submissions in Microsoft Defend
When you're finished, click **Apply**.
- :::image type="content" source="../../media/url-admin-submission-customize-columns.png" alt-text="Customize column options for URL admin submissions.":::
+ :::image type="content" source="../../media/admin-submission-url-customize-columns.png" alt-text="Customize column options for URL admin submissions.":::
- - To filter the entries, click **Filter**. The available filters are:
+ - To filter the entries, click ![Filter icon.](../../media/m365-cc-sc-filter-icon.png) **Filter**. The following values are available in the **Filter** flyout that appears:
- **Date submitted**: **Start date** and **End date**. - **Submission ID**: A GUID value that's assigned to every submission. - **URL** - **Submitted by** - **Reason for submitting** - **Status**
- - **Tags**
+ - **Tags**: The default value is **All** or select a [user tag](user-tags.md) from the drop down list.
- When you're finished, click **Apply**.
+ When you're finished, click **Apply**. To clear existing filters, click ![Clear filters icon](../../media/m365-cc-sc-clear-filters-icon.png) **Clear filters** in the **Filter** flyout.
- :::image type="content" source="../../media/url-admin-submission-customize-columns.png" alt-text="Filter options for URL admin submissions.":::
+ :::image type="content" source="../../media/admin-submission-url-filters.png" alt-text="Filter options for URL admin submissions.":::
- - To group the entries, click **Group** and select one of the following values from the dropdown list:
+ - To group the entries, click ![Group icon.](../../media/m365-cc-sc-group-icon.png) **Group** and select one of the following values from the dropdown list:
- **None** - **Reason** - **Status** - **Result** - **Tags**
- - To export the entries, click **Export**. In the dialog that appears, save the .csv file.
+ - To export the entries, click ![Export icon.](../../media/m365-cc-sc-download-icon.png) **Export**. In the dialog that appears, save the .csv file.
-### Admin submission result details
+## Admin submission result details
-Messages that are submitted in admin submissions are reviewed and results shown in the submissions detail flyout:
+Messages that are submitted in admin submissions are reviewed by Microsoft and results shown in the submissions detail flyout:
- If there was a failure in the sender's email authentication at the time of delivery. - Information about any policy hits that could have affected or overridden the verdict of a message.
If you've deployed the [Report Message add-in](enable-the-report-message-add-in.
2. On the **Submissions** page, select the **User reported messages** tab.
- - You can sort the entries by clicking on an available column header. Click **Customize columns** to show the options. The default values are marked with an asterisk (*):
-
+ - Click ![Customize columns icon.](../../media/m365-cc-sc-customize-icon.png) **Customize columns** to select the columns that you want to view. The default values are marked with an asterisk (\*):
- **Email subject**<sup>\*</sup> - **Reported by**<sup>\*</sup> - **Date reported**<sup>\*</sup>
If you've deployed the [Report Message add-in](enable-the-report-message-add-in.
When you're finished, click **Apply**.
- - To filter the entries, click **Filter**. The available filters are:
+ - To filter the entries, click ![Filter icon.](../../media/m365-cc-sc-filter-icon.png) **Filter**. The following values are available in the **Filter** flyout that appears:
- **Date reported**: **Start date** and **End date**. - **Reported by** - **Email subject** - **Message reported ID** - **Network Message ID** - **Sender**
- - **Reported reason**: **Not junk**, **Phish**, or **Spam**
- - **Reported from**: **Microsoft add-in** or **Third party add-in**
- - **Phish simulation**: **Yes** or **No**
- - **Converted to admin submission**: **Yes** or **No**
- - **Tags**
+ - **Reported reason**: The values **Not junk**, **Phish**, or **Spam**.
+ - **Reported from**: The values **Microsoft add-in** or **Third party add-in**.
+ - **Phish simulation**: The values **Yes** or **No**.
+ - **Converted to admin submission**: The values **Yes** or **No**.
+ - **Tags**: The default value is **All** or select a [user tag](user-tags.md) from the drop down list.
- When you're finished, click **Apply**.
+ When you're finished, click **Apply**. To clear existing filters, click ![Clear filters icon](../../media/m365-cc-sc-clear-filters-icon.png) **Clear filters** in the **Filter** flyout.
- > :::image type="content" source="../../media/admin-submission-reported-messages.png" alt-text="The New Filter options for user submissions" lightbox="../../media/admin-submission-reported-messages.png":::
+ > :::image type="content" source="../../media/admin-submission-user-reported-filters.png" alt-text="Filter options for user submissions." lightbox="../../media/admin-submission-user-reported-filters.png":::
- - To group the entries, click **Group** and select one of the following values from the dropdown list:
+ - To group the entries, click ![Group icon.](../../media/m365-cc-sc-group-icon.png) **Group** and select one of the following values from the dropdown list:
- **None** - **Reason** - **Sender**
If you've deployed the [Report Message add-in](enable-the-report-message-add-in.
- **Converted to admin submission** - **Tags**
- - To export the entries, click **Export**. In the dialog that appears, save the .csv file.
- - To notify users see [Admin Review for Reported messages](admin-review-reported-message.md)
-
+ - To export the entries, click ![Export icon.](../../media/m365-cc-sc-download-icon.png) **Export**. In the dialog that appears, save the .csv file.
+
+ - To notify users, see [Admin Review for Reported messages](admin-review-reported-message.md)
+ > [!NOTE]
-> If organizations are configured to send user reported messages to the custom mailbox only, reported messages will appear in **User reported messages** but their results will always be empty (as they would not have been rescanned).
+> If organizations are configured to send user reported messages to the [custom mailbox only](user-submission.md), reported messages will appear in **User reported messages** but their results will always be empty (as they would not have been rescanned).
## Undo user submissions
-Once a user submits a suspicious email to the custom mailbox, the user and admin don't have an option to undo the submission. If the user would like to recover the email, it will be available for recovery in the Deleted Items or Junk Email folders.
+Once a user submits a suspicious email to the custom mailbox, the user and admin don't have an option to undo the submission. If the user would like to recover the email, it's available for recovery in their Deleted Items or Junk Email folders.
## Convert user reported messages from the custom mailbox into an admin submission If you've configured the custom mailbox to intercept user-reported messages without sending the messages to Microsoft, you can find and send specific messages to Microsoft for analysis.
-On the **User reported messages** tab, select a message in the list, click **Submit to Microsoft for analysis**, and then select one of the following values from the dropdown list:
+On the **User reported messages** tab, select a message in the list, click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-submit-user-reported-message-icon.png) **Submit to Microsoft for analysis**, and then select one of the following values from the dropdown list:
- **Report clean** - **Report phishing**
On the **User reported messages** tab, select a message in the list, click **Sub
- **Report spam** - **Trigger investigation**
- :::image type="content" source="../../media/admin-submission-main-action-button.png" alt-text="The New options on the Action button" lightbox="../../media/admin-submission-main-action-button.png":::
+ :::image type="content" source="../../media/admin-submission-user-reported-submit-button-options.png" alt-text="The New options on the Action button" lightbox="../../media/admin-submission-user-reported-submit-button-options.png":::
If the message is reported to Microsoft, the **Converted to admin submission** value turns from **no** to **yes**. You can directly access the admin submission by clicking **View the converted admin submission** from the overflow menu inside the submission flyout of the respective user reported message.
security Allow Block Email Spoof https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/allow-block-email-spoof.md
Title: Allow or block emails using the Tenant Allow/Block List f1.keywords: - NOCSH--++ Last updated audience: ITPro
ms.prod: m365-security
- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
-You can use the Microsoft 365 Defender portal or PowerShell to allow or block emails (including spoofing emails) using the Tenant Allow/Block List.
+This article describes how to create and manage allow and block entries for domains and email addresses (including spoofed senders) that are available in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage your allows and blocks in the Tenant Allow/Block List](manage-tenant-allow-block-list.md).
-## Create block entries for domains or email addresses
+You manage allow and block entries for email in the Microsoft 365 Defender Portal or in Exchange Online PowerShell.
-### Use the Microsoft 365 Defender portal to create block entries for domains or email addresses
+## What do you need to know before you begin?
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+- You open the Microsoft 365 Defender portal at <https://security.microsoft.com>. To go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-2. On the **Tenant Allow/Block List** page, verify that the **Domains & addresses** tab is selected, and then click ![Block icon.](../../media/m365-cc-sc-create-icon.png) **Block**.
+- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).
-3. In the **Block domains & addresses** flyout that appears, configure the following settings:
- - **Email addresses or domains**: Enter one email address or domain per line, up to a maximum of 20.
- - **Never expire**: Do one of the following steps:
- - Verify the setting is turned off (![Toggle off.](../../media/scc-toggle-off.png)) and use the **Remove on** box to specify the expiration date for the entries.
+- For domains and email addresses, the maximum number of allow entries is 500, and the maximum number of block entries is 500 (1000 domain and email address entries total).
- or
+- For spoofed senders, the maximum number of entries is 1024.
- - Move the toggle to the right to configure the entries to never expire: ![Toggle on.](../../media/scc-toggle-on.png).
- - **Optional note**: Enter descriptive text for the entries.
+- Entries for spoofed senders never expire.
+
+- For details about the syntax for spoofed sender entries, see the [Domain pair syntax for spoofed sender entries](#domain-pair-syntax-for-spoofed-sender-entries) section later in this article.
+
+- An entry should be active within 30 minutes, but it might take up to 24 hours for the entry to be active.
+
+- You need to be assigned permissions in Exchange Online before you can do the procedures in this article:
+ - To add and remove values from the Tenant Allow/Block List, you need to be a member of one of the following role groups:
+ - **Organization Management** or **Security Administrator** role group (**Security admin role**)
+ - **Security Operator** role group (**Tenant AllowBlockList Manager**).
+ - For read-only access to the Tenant Allow/Block List, you need to be a member of one of the following role groups:
+ - **Global Reader** role group
+ - **Security Reader** role group
+ - **View-Only configuration** role group
+
+ For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
+
+ **Notes**:
+
+ - Adding users to the corresponding Azure Active Directory role in the Microsoft 365 admin center gives users the required permissions *and* permissions for other features in Microsoft 365. For more information, see [About admin roles](../../admin/add-users/about-admin-roles.md).
+ - The **View-Only Organization Management** role group in [Exchange Online](/Exchange/permissions-exo/permissions-exo#role-groups) also gives read-only access to the feature.
+
+## Domains and email addresses in the Tenant Allow/Block List
+
+### Create block entries for domains and email addresses
+
+You have the following options to create block entries for domains and email addresses:
+
+- [The Submissions page in the Microsoft 365 Defender portal](#use-the-microsoft-365-defender-portal-to-create-block-entries-for-domains-and-email-addresses-in-the-submissions-portal)
+- The Tenant Allow/Block List in [the Microsoft 365 Defender portal](#use-the-microsoft-365-defender-portal-to-create-block-entries-for-domains-and-email-addresses-in-the-tenant-allowblock-list) or in [PowerShell](#use-powershell-to-create-block-entries-for-domains-and-email-addresses-in-the-tenant-allowblock-list)
-4. When you're finished, click **Add**.
+To create block entries for spoofed senders, see the [Use the Microsoft 365 Defender portal to view allow or block entries for spoofed senders in the Tenant Allow/Block List](#use-the-microsoft-365-defender-portal-to-view-allow-or-block-entries-for-spoofed-senders-in-the-tenant-allowblock-list) section later in this article.
+
+#### Use the Microsoft 365 Defender portal to create block entries for domains and email addresses in the Submissions portal
+
+When you use the Submissions portal at <https://security.microsoft.com/reportsubmission> to report email messages as **Should have been blocked (False negative)**, you can select **Block all emails from this recipient** to add a block entry for the domain or sender in the Tenant Allow/Block List.
+
+For instructions, see [Report questionable email to Microsoft](admin-submission.md#report-questionable-email-to-microsoft).
+
+#### Use the Microsoft 365 Defender portal to create block entries for domains and email addresses in the Tenant Allow/Block List
+
+You create block entries for domains and email addresses directly in the Tenant Allow/Block List.
> [!NOTE]
-> Email from these addresses or domains will be blocked as _high confidence spam_ (SCL = 9) and moved to the Junk Email folder.
+> Email messages from these blocked domains and email addresses are identified as *high confidence spam* (SCL = 9) and is moved to the Junk Email folder by default.
>
-> Users in the organization can't send email to these blocked domains and addresses. They'll received the following non-delivery report (also known as an NDR or bounce message): "5.7.1 Your message can't be delivered because one or more recipients are blocked by your organizationΓÇÖs tenant allow/block list policy."
+> Users in the organization can't send email to these blocked domains and addresses. They'll receive the following non-delivery report (also known as an NDR or bounce message): `5.7.1 Your message can't be delivered because one or more recipients are blocked by your organization's tenant allow/block list policy.`
-### Use Exchange Online PowerShell to create block entries for domains or email addresses
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-To add domains or email addresses block entries in the Tenant Allow/Block List, use the following syntax:
+2. On the **Tenant Allow/Block List** page, verify that the **Domains & addresses** tab is selected.
+
+3. **Domains & addresses** tab, click ![Block icon.](../../media/m365-cc-sc-create-icon.png) **Block**.
+
+4. In the **Block domains & addresses** flyout that appears, configure the following settings:
+
+ - **Domains & addresses**: Enter one email address or domain per line, up to a maximum of 20.
+
+ - **Remove block entry after**: The default value is **30 days**, but you can select from the following values:
+ - **1 day**
+ - **7 days**
+ - **30 days**
+ - **Never expire**
+ - **Specific date**: The maximum value is 90 days from today.
+
+ - **Optional note**: Enter descriptive text for the entries.
+
+5. When you're finished, click **Add**.
+
+##### Use PowerShell to create block entries for domains and email addresses in the Tenant Allow/Block List
+
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
```powershell
-New-TenantAllowBlockListItems -ListType <Sender> -Block -Entries "Value1","Value2",..."ValueN" <-ExpirationDate Date | -NoExpiration> [-Notes <String>]
+New-TenantAllowBlockListItems -ListType Sender -Block -Entries "DomainOrEmailAddress1","DomainOrEmailAddress1",..."DomainOrEmailAddressN" <-ExpirationDate Date | -NoExpiration> [-Notes <String>]
```
-This example adds a block entry for the specified email address or domain that expires on a specific date.
+This example adds a block entry for the specified email address that expires on a specific date.
```powershell
-New-TenantAllowBlockListItems -ListType Sender -Block -Entries "test@badattackerdomain.com", "test2@anotherattackerdomain.com" -ExpirationDate 8/20/2021
+New-TenantAllowBlockListItems -ListType Sender -Block -Entries "test@badattackerdomain.com","test2@anotherattackerdomain.com" -ExpirationDate 8/20/2022
``` For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
-## Create allow sender entries
+### Use the Microsoft 365 Defender portal to create allow entries for domains and email addresses in the Submissions portal
+
+You can't create allow entries for domains and email addresses directly in the Tenant Allow/Block List. Instead, you use the Submissions portal at <https://security.microsoft.com/reportsubmission> to report the message as a false positive. For more information about admin submissions, see [Use the Submissions portal to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](admin-submission.md).
+
+> [!NOTE]
+> Because Microsoft manages allow entries for you, unneeded allow entries for domains and email addresses will be removed. This behavior protects your organization and helps prevent misconfigured allow entries. If you disagree with the verdict, you might need to open a support case to help determine why a message is still considered bad.
+>
+> If the domain or email address has not already been blocked, an allow entry for the domain or email address won't be created.
+>
+> In most cases where the message was determined to be a false positive that was incorrectly blocked, the allow entry will be removed on the specified expiration date.
+>
+> To create allow entries for spoofed senders, see the [Create allow entries for spoofed senders](#create-allow-entries-for-spoofed-senders) section later in this article.
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Actions & submissions** \> **Submissions**. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-### Use the Microsoft 365 Defender portal to create allow sender entries
+2. On the **Submissions** page, verify that the **Emails** tab is selected.
-Allow senders email addresses (or domains) on the **Submissions** page in Microsoft 365 Defender.
+3. On the **Emails** tab, click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
-You can't directly modify the Tenant Allow/Block List to add allow entries. Instead, use [admin submissions](admin-submission.md) to submit the blocked message. This action will add the corresponding URL, file, spoofed sender domain pair, impersonated domain (or user) and/or domains or email addresses to the Tenant Allow/Block List. If the item has not been blocked, then the allow won't be created. In most cases where the message was determined to be a false positive that was incorrectly blocked, the allow entry will be removed on the specified expiration date.
+4. In the **Submit to Microsoft for analysis** flyout that appears, enter the following information:
-> [!IMPORTANT]
-> Because Microsoft manages allow entries for you, unneeded domain or email address, URL, or file allow entries will be removed. This behavior protects your organization and helps prevent misconfigured allow entries. If you disagree with the verdict, you might need to open a support case to help determine why a message is still considered bad.
+ - **Select the submission type**: Verify the value **Email** is selected.
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
+ - **Add the network message ID or upload the email file**: Select one of the following options:
-2. On the **Submissions** page, verify that the **Emails** tab is selected, and then click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
+ - **Add the email network message ID**: This is a GUID value that's available in the **X-MS-Exchange-Organization-Network-Message-Id** header in the message or in the **X-MS-Office365-Filtering-Correlation-Id** header in quarantined messages.
-3. Use the **Submit to Microsoft for review** flyout to submit a message by adding the network message ID or uploading the email file.
+ - **Upload the email file (.msg or .eml)**: Click **Browse files**. In the dialog that opens, find and select the .eml or .msg file, and then click **Open**.
-4. In the **Select a reason for submitting to Microsoft** section, select **Should not have been blocked (false positive)**.
+ - **Choose a recipient who had an issue**: Specify the recipient that you would like to run a policy check against. The policy check will determine if the email was blocked due to user or organization policies.
-5. Turn on **Allow messages like this** option.
+ - **Select a reason for submitting to Microsoft**: Select **Should not have been blocked (False positive)**, and then configure the following settings:
-6. From the **Remove after** drop-down list, specify how long you want the allow option to work.
+ - **Allow emails with similar attributes (URL, sender, etc.)**: Turn on this setting ![Toggle on.](../../media/scc-toggle-on.png).
-7. Add why you are adding the allow using the **Optional Note** box.
+ - **Remove allow entry after**: The default value is **30 days**, but you can select from the following values:
+ - **1 day**
+ - **7 days**
+ - **30 days**
+ - **Specific date**: The maximum value is 30 days from today.
-8. When you're finished, select the **Submit** button.
+ - **Allow entry note**: Enter optional information about why you're allowing this email.
- :::image type="content" source="../../media/admin-submission-allow-messages.png" alt-text="Submit malware to Microsoft for analysis example." lightbox="../../media/admin-submission-allow-messages.png":::
+ When you're finished, click **Submit**, and then click **Done**.
+
+ :::image type="content" source="../../media/admin-submission-email-allow.png" alt-text="Submit a false positive (good) email to Microsoft for analysis on the Submissions page in the Defender portal." lightbox="../../media/admin-submission-email-allow.png":::
+
+5. After a few moments, the allow entry will appear on the **Domains & addresses** tab on the **Tenant Allow/Block List** page.
> [!NOTE] >
-> - During mail flow, Based on which filters determined the mail to be malicious, the allows are added. For example, the sender and URL are determined to be bad, an allow will be added for each.
+> - Allows are added during mail flow, based on which filters determined the message to be malicious. For example, if the sender and a URL in the message were determined to be bad, an allow entry is created for the sender, and an allow entry is created for the URL.
> - When that entity (domain or email address, URL, file) is encountered again, all filters associated with that entity are skipped.
-> - During mail flow, if the rest of the filters find the email containing this entity to be clean, the email will be delivered. For example, a sender allow (when authentication passes) will bypass all verdicts except malware and high confidence phishing associated with an attachment or URL.
+> - During mail flow, if messages from the domain or email address pass other checks in the filtering stack, the messages will be delivered. For example, if [email authentication](email-validation-and-authentication.md) passes, a message from a sender in the allow entry will be delivered.
-## View domain or email addresses entries
+### Use the Microsoft 365 Defender portal to view allow or block entries for domains and email addresses in the Tenant Allow/Block List
-To view blocked domains or email addresses entries in the Tenant Allow/Block List, use the following syntax:
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-```powershell
-Get-TenantAllowBlockListItems -ListType <Sender> [-Entry <SenderValue | FileHashValue | URLValue>] [<-ExpirationDate Date | -NoExpiration>]
-```
+2. Verify the **Domains & addresses** tab is selected. The following columns are available:
-For detailed syntax and parameter information, see [Get-TenantAllowBlockListItems](/powershell/module/exchange/get-tenantallowblocklistitems).
+ - **Value**: The domain or email address.
+ - **Action**: The value **Allow** or **Block**.
+ - **Modified by**
+ - **Last updated**
+ - **Remove on**: The expiration date.
+ - **Notes**
+
+ You can click on a column heading to sort in ascending or descending order.
+
+ Click ![Group icon.](../../media/m365-cc-sc-group-icon.png) **Group** to group the results by **None** or **Action**.
+
+ Click ![Search icon.](../../media/m365-cc-sc-search-icon.png) **Search**, enter all or part of a value, and then press ENTER to find a specific value. When you're finished, click ![Clear search icon.](../../media/m365-cc-sc-close-icon.png) **Clear search**.
+
+ Click ![Filter icon.](../../media/m365-cc-sc-filter-icon.png) **Filter** to filter the results. The following values are available in the **Filter** flyout that appears:
+
+ - **Action**: **Allow** and **Block**.
+ - **Never expire**: ![Toggle on.](../../media/scc-toggle-on.png) or ![Toggle off.](../../media/scc-toggle-off.png)
+ - **Last updated**: Select **From** and **To** dates.
+ - **Remove on**: Select **From** and **To** dates.
+
+ When you're finished, click **Apply**. To clear existing filters, click ![Clear filters icon](../../media/m365-cc-sc-clear-filters-icon.png) **Clear filters** in the **Filter** flyout.
-## Modify domain or email addresses entries
+#### Use PowerShell to view allow or block entries for domains and email addresses in the Tenant Allow/Block List
-To modify allowed or blocked domains or email addresses entries in the Tenant Allow/Block List, use the following syntax:
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
```powershell
-Set-TenantAllowBlockListItems -ListType <Sender> -Ids <"Id1","Id2",..."IdN"> [<-ExpirationDate Date | -NoExpiration>] [-Notes <String>]
+Get-TenantAllowBlockListItems -ListType Sender [-Allow] [-Block] [-Entry <Domain or Email address value>] [<-ExpirationDate Date | -NoExpiration>]
```
-For detailed syntax and parameter information, see [Set-TenantAllowBlockListItems](/powershell/module/exchange/set-tenantallowblocklistitems).
+This example returns all allow and block entries for domains and email addresses.
-## Remove domain or email addresses entries
+```powershell
+Get-TenantAllowBlockListItems -ListType Sender
+```
-To remove allowed or blocked domains or email addresses entries from the Tenant Allow/Block List, use the following syntax:
+This example filters the results for block entries for domains and email addresses.
```powershell
-Remove-TenantAllowBlockListItems -ListType <Sender> -Ids <"Id1","Id2",..."IdN">
+Get-TenantAllowBlockListItems -ListType Sender -Block
```
-For detailed syntax and parameter information, see [Remove-TenantAllowBlockListItems](/powershell/module/exchange/remove-tenantallowblocklistitems).
+For detailed syntax and parameter information, see [Get-TenantAllowBlockListItems](/powershell/module/exchange/get-tenantallowblocklistitems).
-## Domain pair syntax for spoofed sender entries
+### Use the Microsoft 365 Defender portal to modify allow or block entries for domains and email addresses in the Tenant Allow/Block List
-A domain pair for a spoofed sender in the Tenant Allow/Block List uses the following syntax: `<Spoofed user>, <Sending infrastructure>`.
+When you modify an allow or block entry for domains and email addresses in the Tenant Allow/Block list, you can only modify the expiration date and notes.
-- **Spoofed user**: This value involves the email address of the spoofed user that's displayed in the **From** box in email clients. This address is also known as the `5322.From` address. Valid values include:
- - An individual email address (for example, chris@contoso.com).
- - An email domain (for example, contoso.com).
- - The wildcard character (for example, \*).
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-- **Sending infrastructure**: This value indicates the source of messages from the spoofed user. Valid values include:
- - The domain found in a reverse DNS lookup (PTR record) of the source email server's IP address (for example, fabrikam.com).
- - If the source IP address has no PTR record, then the sending infrastructure is identified as \<source IP\>/24 (for example, 192.168.100.100/24).
- - A verified DKIM domain.
+2. Verify the **Domains & addresses** tab is selected.
-Here are some examples of valid domain pairs to identify spoofed senders:
+3. On the **Domains & addresses** tab, select the check box of the entry that you want to modify, and then click the ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit** button that appears.
-- `contoso.com, 192.168.100.100/24`-- `chris@contoso.com, fabrikam.com`-- `*, contoso.net`
+4. The following settings are available in the **Edit domain & addresses** flyout that appears:
-The maximum number of spoofed sender entries is 1000.
+ - **Remove allow entry after** or **Remove block entry after**:
+ - You can extend allow entries for a maximum of 30 days after the creation date.
+ - You can extend block entries for a maximum of 90 days after the creation date or set them to **Never expire**.
-Adding a domain pair only allows or blocks the *combination* of the spoofed user *and* the sending infrastructure. It does not allow email from the spoofed user from any source, nor does it allow email from the sending infrastructure source for any spoofed user.
+ - **Optional note**
-For example, you add an allow entry for the following domain pair:
+ When you're finished, click **Save**.
-- **Domain**: gmail.com-- **Infrastructure**: tms.mx.com
+> [!NOTE]
+> For allow entries only, if you select the entry by clicking anywhere in the row other than the check box, you can select ![View submission icon.](../../media/m365-cc-sc-view-submission-icon.png) **View submission** in the details flyout that appears to go to the **Submissions** page at <https://security.microsoft.com/reportsubmission>.
-Only messages from that domain _and_ sending infrastructure pair are allowed to spoof. Other senders attempting to spoof gmail.com aren't allowed. Messages from senders in other domains originating from tms.mx.com are checked by spoof intelligence.
+#### Use PowerShell to modify allow or block entries for domains and email addresses in the Tenant Allow/Block List
-> [!NOTE]
-> You can't use wildcards in the sending infrastructure.
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-## Create blocked spoofed sender entries
+```powershell
+Set-TenantAllowBlockListItems -ListType Sender <-Ids <Identity value> | -Entries <Value value>> [<-ExpirationDate Date | -NoExpiration>] [-Notes <String>]
+```
-### Use the Microsoft 365 Defender portal to create blocked spoofed sender entries
+This example changes the expiration date of the specified block entry for domains and email addresses.
-> [!NOTE]
-> Email from these senders will be blocked as _phish_.
->
-> Only the _combination_ of the spoofed user _and_ the sending infrastructure as defined in the domain pair is specifically allowed or blocked from spoofing.
->
-> When you configure an allow or block entry for a domain pair, messages from that domain pair no longer appear in the spoof intelligence insight.
->
-> Entries for spoofed senders never expire.
+```powershell
+Set-TenantAllowBlockListItems -ListType Sender -Entries "julia@fabrikam.com" -ExpirationDate "9/1/2022"
+```
-1. In the Microsoft 365 Defender portal, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**.
+For detailed syntax and parameter information, see [Set-TenantAllowBlockListItems](/powershell/module/exchange/set-tenantallowblocklistitems).
-2. On the **Tenant Allow/Block List** page, select the **Spoofed senders** tab, and then click ![Block icon.](../../media/m365-cc-sc-create-icon.png) **Add**.
+### Use the Microsoft 365 Defender portal to remove allow or block entries for domains and email addresses in the Tenant Allow/Block List
-3. In the **Add new domain pairs** flyout that appears, configure the following settings:
- - **Add new domain pairs with wildcards**: Enter one domain pair per line, up to a maximum of 20. For details about the syntax for spoofed sender entries, see [Manage the Tenant Allow/Block List](tenant-allow-block-list.md).
- - **Spoof type**: Select one of the following values:
- - **Internal**: The spoofed sender is in a domain that belongs to your organization (an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains)).
- - **External**: The spoofed sender is in an external domain.
- - **Action**: Select **Block**.
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-4. When you're finished, click **Add**.
+2. Verify the **Domains & addresses** tab is selected.
+
+3. On **Domains & addresses** tab, do one of the following steps:
+
+ - Select the check box of the entry that you want to remove, and then click the ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete** icon that appears.
+ - Select the entry that you want to remove by click anywhere in the row other than the check box. In the details flyout that appears, click ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete**.
+
+4. In the warning dialog that appears, click **Delete**.
> [!NOTE]
-> The emails from these senders will be blocked as _phishing_.
+> You can select multiple entries by selecting each check box, or select all entries by selecting the check box next to the **Value** column header.
-### Use Exchange Online PowerShell to create blocked spoofed sender entries
+#### Use PowerShell to remove allow or block entries for domains and email addresses from the Tenant Allow/Block List
-To add spoofed sender entries in the Tenant Allow/Block List, use the following syntax:
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
```powershell
-New-TenantAllowBlockListSpoofItems -SpoofedUser <Domain | EmailAddress | *> -SendingInfrastructure <Domain | IPAddress/24> -SpoofType <External | Internal> -Action <Allow | Block>
+Remove-TenantAllowBlockListItems -ListType Sender <-Ids <Identity value> | -Entries <Value value>>
```
-For detailed syntax and parameter information, see [New-TenantAllowBlockListSpoofItems](/powershell/module/exchange/new-tenantallowblocklistspoofitems).
+This example removes the specified block entry for domains and email addresses from the Tenant Allow/Block List.
-## Create allowed spoofed sender entries
+```powershell
+Remove-TenantAllowBlockListItems -ListType Sender -Entries "adatum.com"
+```
+
+For detailed syntax and parameter information, see [Remove-TenantAllowBlockListItems](/powershell/module/exchange/remove-tenantallowblocklistitems).
+
+## Spoofed senders in the Tenant Allow/Block List
+
+### Create allow entries for spoofed senders
+
+You have the following options to create block entries for spoofed senders:
-### Use the Tenant Allow/Block List in the Microsoft 365 Defender portal to create allowed spoofed sender entries
+- [The Submissions page in the Microsoft 365 Defender portal](#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-domains-and-email-addresses-in-the-submissions-portal)
+- The Tenant Allow/Block List in [the Microsoft 365 Defender portal](#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-spoofed-senders-in-the-tenant-allowblock-list) or in [PowerShell](#use-powershell-to-create-block-entries-for-spoofed-senders-in-the-tenant-allowblock-list)
> [!NOTE]
+> Allow entries for spoofed senders take care of intra-org, cross-org, and DMARC spoofing.
>
-> - Only the _combination_ of the spoofed user _and_ the sending infrastructure as defined in the domain pair is specifically allowed or blocked from spoofing.
-> - When you configure an allow or block entry for a domain pair, messages from that domain pair no longer appear in the spoof intelligence insight.
-> - Entries for spoofed senders never expire.
+> Only the combination of the spoofed user *and* the sending infrastructure as defined in the [domain pair](#domain-pair-syntax-for-spoofed-sender-entries) is allowed to spoof.
+>
+> When you configure an allow entry for a domain pair, messages from that domain pair no longer appear in the [spoof intelligence insight](learn-about-spoof-intelligence.md).
+>
+> Allow entries for spoofed senders never expire.
+
+#### Use the Microsoft 365 Defender portal to create allow entries for spoofed senders in the Submissions portal
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+Submitting messages that were blocked by [spoof intelligence](learn-about-spoof-intelligence.md) to Microsoft from the **Submissions** page adds the sender as an allow entry on the **Spoofed senders** tab in Tenant Allow/Block List.
+
+> [!NOTE]
+> When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** tab in the Tenant Allow/Block List.
+>
+> If the sender has not been blocked by spoof intelligence, submitting the email message to Microsoft won't create an allow entry in the Tenant Allow/Block List.
+
+The instructions to report the message are nearly identical to the steps in [Use the Microsoft 365 Defender portal to create allow entries for domains and email addresses in the Submissions portal](#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-domains-and-email-addresses-in-the-submissions-portal).
+
+The only differences are:
+
+- The **Remove allow entry after** setting in Step 4 is meaningless, because entries for spoofed senders never expire.
+- The **Allow entry note** setting in Step 4 doesn't apply to entries for spoofed senders in the Tenant Allow/Block List.
+
+#### Use the Microsoft 365 Defender portal to create allow entries for spoofed senders in the Tenant Allow/Block List
+
+In the Tenant Allow/Block List, you can create allow entries for spoofed senders before they're detected and blocked by [spoof intelligence](learn-about-spoof-intelligence.md).
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
2. On the **Tenant Allow/Block List** page, select the **Spoofed senders** tab, and then click ![Add icon.](../../media/m365-cc-sc-create-icon.png) **Add**. 3. In the **Add new domain pairs** flyout that appears, configure the following settings:
- - **Add new domain pairs with wildcards**: Enter one domain pair per line, up to a maximum of 20. For details about the syntax for spoofed sender entries, see [Manage the Tenant Allow/Block List](tenant-allow-block-list.md).
+
+ - **Add domain pairs with wildcards**: Enter domain pair per line, up to a maximum of 20. For details about the syntax for spoofed sender entries, see the [Domain pair syntax for spoofed sender entries](#domain-pair-syntax-for-spoofed-sender-entries) section later in this article.
+ - **Spoof type**: Select one of the following values: - **Internal**: The spoofed sender is in a domain that belongs to your organization (an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains)). - **External**: The spoofed sender is in an external domain.
- - **Action**: Select **Allow**.
-4. When you're finished, click **Add**.
+ - **Action**: Select **Allow** or **Block**.
-### Use Admin Submission in the Microsoft 365 Defender portal to create allowed spoofed sender entries
+ When you're finished, click **Add**.
-You can also allow spoofed senders using the **Submissions** page in Microsoft 365 Defender.
+##### Use PowerShell to create allow entries for spoofed senders in the Tenant Allow/Block List
-Use [admin submissions](admin-submission.md) to submit the blocked message. This action will add the corresponding URL, file, spoofed sender domain pair, impersonated domain (or user) and/or sender to the Tenant Allow/Block List. If the item has not been blocked, then the allow won't be created.
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-> [!IMPORTANT]
->
-> - Spoof allows take care of intra-org, cross-org and DMARC spoofing.
-> - The optional note in the admin submission don't apply to spoof allows.
+```powershell
+New-TenantAllowBlockListSpoofItems -Identity Default -Action Allow -SpoofedUser <Domain | EmailAddress> -SendingInfrastructure <Domain | IPAddress/24> -SpoofType <External | Internal>
+```
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
+This example creates an allow entry for the sender bob@contoso.com from the source contoso.com.
-2. On the **Submissions** page, verify that the **Emails** tab is selected, and then click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
+```powershell
+New-TenantAllowBlockListSpoofItems -Identity Default -Action Allow -SendingInfrastructure contoso.com -SpoofedUser bob@contoso.com -SpoofType External
+```
-3. Use the **Submit to Microsoft for review** flyout to submit a message by adding the network message ID or uploading the email file.
+For detailed syntax and parameter information, see [New-TenantAllowBlockListSpoofItems](/powershell/module/exchange/new-tenantallowblocklistspoofitems).
-4. In the **Select a reason for submitting to Microsoft** section, select **Should not have been blocked (false positive)**.
+### Use the Microsoft 365 Defender portal to create block entries for spoofed senders in the Tenant Allow/Block List
-5. Turn on **Allow messages like this** option.
+You create block entries for spoofed senders directly in the Tenant Allow/Block List.
-6. From the **Remove after** drop-down list, specify how long you want the allow option to work though it does not applies to spoof allows as they never expire.
+> [!NOTE]
+> Email messages from these senders are blocked as *phishing*.
+>
+> Only the combination of the spoofed user *and* the sending infrastructure as defined in the [domain pair](#domain-pair-syntax-for-spoofed-sender-entries) is blocked from spoofing.
+>
+> When you configure a block entry for a domain pair, messages from that domain pair no longer appear in the [spoof intelligence insight](learn-about-spoof-intelligence.md).
+>
+> Block entries for spoofed senders never expire.
-7. When you're finished, select the **Submit** button.
+The instructions to report the message are nearly identical to the steps in [Use the Microsoft 365 Defender portal to create allow entries for domains and email addresses in the Submissions portal](#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-domains-and-email-addresses-in-the-submissions-portal).
- :::image type="content" source="../../media/admin-submission-allow-messages.png" alt-text="Submit malware to Microsoft for analysis example." lightbox="../../media/admin-submission-allow-messages.png":::
+The only difference is: for the **Action** value in Step 4, choose **Block** instead of **Allow**.
-> [!NOTE]
->
-> - The spoofed sender domain pair will be created and visible in the **Spoofed senders** tab under the **Tenant allow/block list** page.
+#### Use PowerShell to create block entries for spoofed senders in the Tenant Allow/Block List
+
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-### Use Exchange Online PowerShell to create allowed spoofed sender entries
+```powershell
+New-TenantAllowBlockListSpoofItems -Identity Default -Action Block -SpoofedUser <Domain | EmailAddress> -SendingInfrastructure <Domain | IPAddress/24> -SpoofType <External | Internal>
+```
-To add spoofed sender entries in the Tenant Allow/Block List in [Exchange Online PowerShell](/powershell/exchange/exchange-online-powershell), use the following syntax:
+This example creates a block entry for the sender laura@adatum.com from the source 172.17.17.17/24.
```powershell
-New-TenantAllowBlockListSpoofItems -SpoofedUser <Domain | EmailAddress | *> -SendingInfrastructure <Domain | IPAddress/24> -SpoofType <External | Internal> -Action <Allow | Block>
+New-TenantAllowBlockListSpoofItems -Identity Default -Action Allow -SendingInfrastructure 172.17.17.17/24 -SpoofedUser laura@adatum.com -SpoofType External
``` For detailed syntax and parameter information, see [New-TenantAllowBlockListSpoofItems](/powershell/module/exchange/new-tenantallowblocklistspoofitems).
-## View spoofed sender entries
+### Use the Microsoft 365 Defender portal to view allow or block entries for spoofed senders in the Tenant Allow/Block List
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+
+2. Verify the **Spoofed senders** tab is selected. The following columns are available:
+
+ - **Spoofed user**
+ - **Sending infrastructure**
+ - **Spoof type**: The value **Internal** or **External**.
+ - **Action**: The value **Block** or **Allow**.
+
+ You can click on a column heading to sort in ascending or descending order.
+
+ Click ![Group icon.](../../media/m365-cc-sc-group-icon.png) **Group** to group the results by **None**, **Action**, or **Spoof type**.
+
+ Click ![Search icon.](../../media/m365-cc-sc-search-icon.png) **Search**, enter all or part of a value, and then press ENTER to find a specific value. When you're finished, click ![Clear search icon.](../../media/m365-cc-sc-close-icon.png) **Clear search**.
+
+ Click ![Filter icon.](../../media/m365-cc-sc-filter-icon.png) **Filter** to filter the results. The following values are available in the **Filter** flyout that appears:
+
+ - **Action**: **Allow** and **Block**.
+ - **Spoof type**: **Internal** and **External**.
+
+ When you're finished, click **Apply**. To clear existing filters, click ![Clear filters icon](../../media/m365-cc-sc-clear-filters-icon.png) **Clear filters** in the **Filter** flyout.
-To view spoofed sender entries in the Tenant Allow/Block List, use the following syntax:
+#### Use PowerShell to view allow or block entries for spoofed senders in the Tenant Allow/Block List
+
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
```powershell Get-TenantAllowBlockListSpoofItems [-Action <Allow | Block>] [-SpoofType <External | Internal>
Get-TenantAllowBlockListSpoofItems -Action Block -SpoofType External
For detailed syntax and parameter information, see [Get-TenantAllowBlockListSpoofItems](/powershell/module/exchange/get-tenantallowblocklistspoofitems).
-## Modify spoofed sender entries
+### Use the Microsoft 365 Defender portal to modify allow or block entries for spoofed senders in the Tenant Allow/Block List
+
+When you modify an allow or block entry for spoofed senders in the Tenant Allow/Block list, you can only change the entry from **Allow** to **Block**, or vice-versa.
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+
+2. Select the **Spoofed senders** tab.
+
+3. On the **Spoofed senders** tab, select the entry that you want to modify, and then click the ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit** button that appears.
-To modify allow or block spoofed sender entries in the Tenant Allow/Block List, use the following syntax:
+4. In the **Edit spoofed sender** flyout that appears, choose **Allow** or **Block**.
+
+5. When you're finished, click **Save**.
+
+#### Use PowerShell to modify allow or block entries for spoofed senders in the Tenant Allow/Block List
+
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
```powershell
-Set-TenantAllowBlockListSpoofItems -Ids <"Id1","Id2",..."IdN"> -Action <Allow | Block>
+Set-TenantAllowBlockListSpoofItems -Identity Default -Ids <Identity value> -Action <Allow | Block>
``` This example changes spoofed sender entry from allow to block. ```powershell
-Set-TenantAllowBlockListItems -Ids "RgAAAAAI8gSyI_NmQqzeh-HXJBywBwCqfQNJY8hBTbdlKFkv6BcUAAAl_QCZAACqfQNJY8hBTbdlKFkv6BcUAAAl_oSRAAAA" -Action Block
+Set-TenantAllowBlockListItems -Identity Default -Ids 3429424b-781a-53c3-17f9-c0b5faa02847 -Action Block
``` For detailed syntax and parameter information, see [Set-TenantAllowBlockListSpoofItems](/powershell/module/exchange/set-tenantallowblocklistspoofitems).
-## Remove spoofed sender entries
+### Use the Microsoft 365 Defender portal to remove allow or block entries for spoofed senders in the Tenant Allow/Block List
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+
+2. Select the **Spoofed senders** tab.
+
+3. On the **Spoofed senders** tab, select the entry that you want to remove, and then click the ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete** icon that appears.
+
+4. In the warning dialog that appears, click **Delete**.
+
+> [!NOTE]
+> You can select multiple entries by selecting each check box, or selecting all entries by selecting the check box next to the **Spoofed user** column header.
+
+#### Use PowerShell to remove allow or block entries for spoofed senders from the Tenant Allow/Block List
-To remove allow or block spoof sender entries from the Tenant Allow/Block List, use the following syntax:
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
```powershell
-Remove-TenantAllowBlockListSpoofItems -Ids <"Id1","Id2",..."IdN">
+Remove-TenantAllowBlockListSpoofItems -Identity domain.com\Default -Ids <Identity value>
```
+```powershell
+Remove-TenantAllowBlockListSpoofItems -Identity domain.com\Default -Ids d86b3b4b-e751-a8eb-88cc-fe1e33ce3d0c
+```
+
+This example removes the specified spoofed sender. You get the Ids parameter value from the Identity property in the output of Get-TenantAllowBlockListSpoofItems command.
+ For detailed syntax and parameter information, see [Remove-TenantAllowBlockListSpoofItems](/powershell/module/exchange/remove-tenantallowblocklistspoofitems).
-## Create impersonated sender entries
+### Domain pair syntax for spoofed sender entries
+
+A domain pair for a spoofed sender in the Tenant Allow/Block List uses the following syntax: `<Spoofed user>, <Sending infrastructure>`.
-### Use Admin submission in the Microsoft 365 Defender portal to create impersonated sender entries
+- **Spoofed user**: This value involves the email address of the spoofed user that's displayed in the **From** box in email clients. This address is also known as the `5322.From` address. Valid values include:
+ - An individual email address (for example, chris@contoso.com).
+ - An email domain (for example, contoso.com).
+ - The wildcard character (for example, \*).
-You can also allow impersonated senders using the **Submissions** page in Microsoft 365 Defender.
+- **Sending infrastructure**: This value indicates the source of messages from the spoofed user. Valid values include:
+ - The domain found in a reverse DNS lookup (PTR record) of the source email server's IP address (for example, fabrikam.com).
+ - If the source IP address has no PTR record, then the sending infrastructure is identified as \<source IP\>/24 (for example, 192.168.100.100/24).
+ - A verified DKIM domain.
-Use [admin submissions](admin-submission.md) to submit the blocked message. This action will add the corresponding URL, file, spoofed sender domain pair, impersonated domain (or user) and/or sender to the Tenant Allow/Block List. If the item has not been blocked, then the allow won't be created.
+Here are some examples of valid domain pairs to identify spoofed senders:
-> [!IMPORTANT]
->
-> - Impersonation allows take care of domain and user impersonation.
-> - Graph Impersonation is not taken care from here for now.
+- `contoso.com, 192.168.100.100/24`
+- `chris@contoso.com, fabrikam.com`
+- `*, contoso.net`
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
+Adding a domain pair only allows or blocks the *combination* of the spoofed user *and* the sending infrastructure. It does not allow email from the spoofed user from any source, nor does it allow email from the sending infrastructure source for any spoofed user.
-2. On the **Submissions** page, verify that the **Emails** tab is selected, and then click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
+For example, you add an allow entry for the following domain pair:
-3. Use the **Submit to Microsoft for review** flyout to submit a message by adding the network message ID or uploading the email file.
+- **Domain**: gmail.com
+- **Infrastructure**: tms.mx.com
+
+Only messages from that domain *and* sending infrastructure pair are allowed to spoof. Other senders attempting to spoof gmail.com aren't allowed. Messages from senders in other domains originating from tms.mx.com are checked by spoof intelligence.
+
+> [!NOTE]
+> You can't use wildcards in the sending infrastructure.
-4. In the **Select a reason for submitting to Microsoft** section, select **Should not have been blocked (false positive)**.
+## About impersonated domains or senders
-5. Turn on **Allow messages like this** option.
+In organizations with Microsoft Defender for Office 365, you can't create allow entries in the Tenant/Allow/Block List for messages that were detected as impersonation by [domain or sender impersonation protection](set-up-anti-phishing-policies.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
-6. From the **Remove after** drop-down list, specify how long you want the allow option to work though it does not applies to impersonated allows as they never expire.
+Reporting a message that was incorrectly blocked as impersonation in the Submissions portal at <https://security.microsoft.com/reportsubmission> does not add the sender or domain as an allow entry in the Tenant Allow/Block List.
-7. When you're finished, select the **Submit** button.
+Instead, the domain or sender is added to the **Trusted senders and domains section** in the [anti-phishing policy](configure-mdo-anti-phishing-policies.md#use-the-microsoft-365-defender-portal-to-modify-anti-phishing-policies) that detected the message.
- :::image type="content" source="../../media/admin-submission-allow-messages.png" alt-text="Submit malware to Microsoft for analysis example." lightbox="../../media/admin-submission-allow-messages.png":::
+The instructions to report the message are identical to the steps in [Use the Microsoft 365 Defender portal to create allow entries for domains and email addresses in the Submissions portal](#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-domains-and-email-addresses-in-the-submissions-portal).
> [!NOTE]
-> The impersonated domain (or user) will be created and visible in the **Trusted senders and domains** section in the anti-phishing policy at <https://security.microsoft.com/antiphishing>.
+> Currently, Graph Impersonation is not taken care from here.
## Related articles -- [Admin submissions](admin-submission.md)
+- [Use the Submissions portal to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](admin-submission.md)
- [Report false positives and false negatives](report-false-positives-and-false-negatives.md) - [Manage your allows and blocks in the Tenant Allow/Block List](manage-tenant-allow-block-list.md) - [Allow or block files in the Tenant Allow/Block List](allow-block-files.md)
security Allow Block Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/allow-block-files.md
Title: Allow or block files using the Tenant Allow/Block List f1.keywords: - NOCSH--++ Last updated audience: ITPro
ms.prod: m365-security
- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
-You can use the Microsoft 365 Defender portal or PowerShell to allow or block files in the Tenant Allow/Block List.
+This article describes how to manage file allow and block entries that are available in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage your allows and blocks in the Tenant Allow/Block List](manage-tenant-allow-block-list.md).
-## Create block file entries
+You manage allow and block entries for files in the Microsoft 365 Defender Portal or in Exchange Online PowerShell.
-### Use Microsoft 365 Defender
+## What do you need to know before you begin?
+
+- You open the Microsoft 365 Defender portal at <https://security.microsoft.com>. To go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
+
+- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).
+
+- You specify files by using the SHA256 hash value of the file. To find the SHA256 hash value of a file in Windows, run the following command in a Command Prompt:
+
+ ```DOS
+ certutil.exe -hashfile "<Path>\<Filename>" SHA256
+ ```
+
+ An example value is `768a813668695ef2483b2bde7cf5d1b2db0423a0d3e63e498f3ab6f2eb13ea3a`. Perceptual hash (pHash) values are not supported.
+
+- For files, the maximum number of allow entries is 500, and the maximum number of block entries is 500 (1000 file entries total).
+
+- You can enter a maximum of 64 characters in a file entry.
+
+- An entry should be active within 30 minutes, but it might take up to 24 hours for the entry to be active.
+
+- You need to be assigned permissions in Exchange Online before you can do the procedures in this article:
+ - To add and remove values from the Tenant Allow/Block List, you need to be a member of one of the following role groups:
+ - **Organization Management** or **Security Administrator** role group (**Security admin role**)
+ - **Security Operator** role group (**Tenant AllowBlockList Manager**).
+ - For read-only access to the Tenant Allow/Block List, you need to be a member of one of the following role groups:
+ - **Global Reader** role group
+ - **Security Reader** role group
+ - **View-Only configuration** role group
+
+ For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
+
+ **Notes**:
+
+ - Adding users to the corresponding Azure Active Directory role in the Microsoft 365 admin center gives users the required permissions *and* permissions for other features in Microsoft 365. For more information, see [About admin roles](../../admin/add-users/about-admin-roles.md).
+ - The **View-Only Organization Management** role group in [Exchange Online](/Exchange/permissions-exo/permissions-exo#role-groups) also gives read-only access to the feature.
+
+## Create block entries for files
+
+You have the following options to create block entries for files:
+
+- [The Submissions page in the Microsoft 365 Defender portal](#use-the-microsoft-365-defender-portal-to-create-block-entries-for-files-in-the-submissions-portal)
+- The Tenant Allow/Block List in [the Microsoft 365 Defender portal](#use-the-microsoft-365-defender-portal-to-create-block-entries-for-files-in-the-tenant-allowblock-list) or in [PowerShell](#use-powershell-to-create-block-entries-for-files-in-the-tenant-allowblock-list)
+
+### Use the Microsoft 365 Defender portal to create block entries for files in the Submissions portal
+
+When you use the Submissions portal at <https://security.microsoft.com/reportsubmission> to report files as **Should have been blocked (False negative)**, you can select **Block this file** to add a block entry for the file in the Tenant Allow/Block List.
+
+For instructions, see [Report questionable email attachments to Microsoft](admin-submission.md#report-questionable-email-attachments-to-microsoft).
+
+### Use the Microsoft 365 Defender portal to create block entries for files in the Tenant Allow/Block List
+
+You create block entries for files directly in the Tenant Allow/Block List.
+
+> [!NOTE]
+> Email messages that contain these blocked files are blocked as *malware*.
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-2. On the **Tenant Allow/Block List** page, select the **Files** tab, and then click ![Block icon.](../../media/m365-cc-sc-create-icon.png) **Block**.
+2. On the **Tenant Allow/Block List** page, select the **Files** tab.
+
+3. On the **Files** tab, click ![Block icon.](../../media/m365-cc-sc-create-icon.png) **Block**.
+
+4. In the **Block files** flyout that appears, configure the following settings:
-3. In the **Block files** flyout that appears, configure the following settings:
- **Add file hashes**: Enter one SHA256 hash value per line, up to a maximum of 20.
- - **Never expire**: Do one of the following steps:
- - Verify the setting is turned off (![Toggle off.](../../media/scc-toggle-off.png)) and use the **Remove on** box to specify the expiration date for the entries.
- or
+ - **Remove block entry after**: The default value is **30 days**, but you can select from the following values:
+ - **1 day**
+ - **7 days**
+ - **30 days**
+ - **Never expire**
+ - **Specific date**: The maximum value is 90 days from today.
- - Move the toggle to the right to configure the entries to never expire: ![Toggle on.](../../media/scc-toggle-on.png).
- **Optional note**: Enter descriptive text for the entries.
-4. When you're finished, click **Add**.
-
-> [!NOTE]
-> The emails containing these files will be blocked as _malware_.
+5. When you're finished, click **Add**.
-### Use PowerShell
+#### Use PowerShell to create block entries for files in the Tenant Allow/Block List
-To add block file entries in the Tenant Allow/Block List, use the following syntax:
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
```powershell New-TenantAllowBlockListItems -ListType <FileHash> -Block -Entries "Value1","Value2",..."ValueN" <-ExpirationDate Date | -NoExpiration> [-Notes <String>]
New-TenantAllowBlockListItems -ListType FileHash -Block -Entries "768a813668695e
For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
-## Create allow file entries
+## Use the Microsoft 365 Defender portal to create allow entries for files in the Submissions portal
+
+You can't create allow entries for files directly in the Tenant Allow/Block List. Instead, you use the Submissions portal at <https://security.microsoft.com/reportsubmission> to report the message as a false positive. For more information about admin submissions, see [Use the Submissions portal to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](admin-submission.md).
+
+Reporting the file as a false positive on the **Submissions** page adds an allow entry for the file in the Tenant Allow/Block List.
+
+> [!IMPORTANT]
+> Because Microsoft manages allow entries for you, unneeded allow entries for files will be removed. This behavior protects your organization and helps prevent misconfigured allow entries. If you disagree with the verdict, you might need to open a support case to help determine why a file is still considered bad.
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Actions & submissions** \> **Submissions**. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-### Use Microsoft 365 Defender
+2. On the **Submissions** page, select the **Email attachments** tab.
-Allow Files on the **Submissions** page in Microsoft 365 Defender.
+3. On the **Email attachments** tab, click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
+4. On the **Submit to Microsoft for analysis** flyout that appears, enter the following information:
-2. On the **Submissions** page, select the **Email attachments** tab, and then click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
+ - **Select the submission type**: Verify the value **Email attachment** is selected.
-3. Use the **Submit to Microsoft for review** flyout to submit a message by adding the file or files.
+ - **File**: Click **Browse files** to find and select the file to submit.
-4. In the **Select a reason for submitting to Microsoft** section, select **Should not have been blocked (false positive)**.
+ - **Select a reason for submitting to Microsoft**: Select **Should not have been blocked (False positive)**, and then configure the following settings:
-5. Turn on the **Allow files like this** option.
+ - **Allow this file**: Turn on this setting ![Toggle on.](../../media/scc-toggle-on.png).
-6. From the **Remove after** drop-down list, specify for how long you want the allow option to work.
+ - **Remove allow entry after**: The default value is **30 days**, but you can select from the following values:
+ - **1 day**
+ - **7 days**
+ - **30 days**
+ - **Specific date**: The maximum value is 30 days from today.
-7. Add why you are adding allow using the **Optional Note**.
+ - **Allow entry note**: Enter optional information about why you're allowing this file.
-8. When you're finished, click the **Submit** button.
+ When you're finished, click **Submit**, and then click **Done**.
- :::image type="content" source="../../media/submit-email-for-analysis.png" alt-text="Submit email for analysis." lightbox="../../media/submit-email-for-analysis.png":::
+ :::image type="content" source="../../media/admin-submission-file-allow.png" alt-text="Submit a false positive (good) email attachment to Microsoft for analysis on the Submissions page in the Defender portal." lightbox="../../media/admin-submission-file-allow.png":::
+
+5. After a few moments, the allow entry will appear on the **Files** tab on the **Tenant Allow/Block List** page.
> [!NOTE]
->
-> When the file is encountered again, it is not sent for detonation or reputation checks, and all other file-based filters are skipped. During mail flow, if the rest of the filters find the email that contains the file to be clean, then the email will be delivered.
+> When the file is encountered again, it's not sent for [Safe Attachments](safe-attachments.md) detonation or file reputation checks, and all other file-based filters are skipped. During mail flow, if messages containing the file pass other non-file checks in the filtering stack, the messages will be delivered.
+
+## Use the Microsoft 365 Defender portal to view allow or block entries for files in the Tenant Allow/Block List
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+
+2. Select the **Files** tab. The following columns are available:
+
+ - **Value**: The file hash.
+ - **Action**: The value **Allow** or **Block**.
+ - **Modified by**
+ - **Last updated**
+ - **Remove on**: The expiration date.
+ - **Notes**
+
+ You can click on a column heading to sort in ascending or descending order.
+
+ Click ![Group icon.](../../media/m365-cc-sc-group-icon.png) **Group** to group the results by **None** or **Action**.
+
+ Click ![Search icon.](../../media/m365-cc-sc-search-icon.png) **Search**, enter all or part of a value, and then press ENTER to find a specific value. When you're finished, click ![Clear search icon.](../../media/m365-cc-sc-close-icon.png) **Clear search**.
+
+ Click ![Filter icon.](../../media/m365-cc-sc-filter-icon.png) **Filter** to filter the results. The following values are available in the **Filter** flyout that appears:
-## View file entries
+ - **Action**: **Allow** and **Block**.
+ - **Never expire**: ![Toggle on.](../../media/scc-toggle-on.png) or ![Toggle off.](../../media/scc-toggle-off.png)
+ - **Last updated**: Select **From** and **To** dates.
+ - **Remove on**: Select **From** and **To** dates.
-To view block file entries in the Tenant Allow/Block List, use the following syntax:
+ When you're finished, click **Apply**. To clear existing filters, click ![Clear filters icon](../../media/m365-cc-sc-clear-filters-icon.png) **Clear filters** in the **Filter** flyout.
+
+### Use PowerShell to view allow or block entries for files in the Tenant Allow/Block List
+
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
+
+```powershell
+Get-TenantAllowBlockListItems -ListType FileHash [-Allow] [-Block] [-Entry <FileHashValue>] [<-ExpirationDate Date | -NoExpiration>]
+```
+
+This example returns all allowed and blocked files.
```powershell
-Get-TenantAllowBlockListItems -ListType <FileHash> [-Entry <SenderValue | FileHashValue | URLValue>] [<-ExpirationDate Date | -NoExpiration>]
+Get-TenantAllowBlockListItems -ListType FileHash
``` This example returns information for the specified file hash value.
This example returns information for the specified file hash value.
Get-TenantAllowBlockListItems -ListType FileHash -Entry "9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08" ```
+This example filters the results by blocked files.
+
+```powershell
+Get-TenantAllowBlockListItems -ListType FileHash -Block
+```
+ For detailed syntax and parameter information, see [Get-TenantAllowBlockListItems](/powershell/module/exchange/get-tenantallowblocklistitems).
-## Modify file entries
+## Use the Microsoft 365 Defender portal to modify allow or block entries for files in the Tenant Allow/Block List
-To modify allow or block file entries in the Tenant Allow/Block List, use the following syntax:
+When you modify an allow or block file entry in the Tenant Allow/Block list, you can only modify the expiration date and notes.
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+
+2. Select the **Files** tab
+
+3. On the **Files** tab, select the check box of the entry that you want to modify, and then click the ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit** button that appears.
+
+4. The following settings are available in the **Edit file** flyout that appears:
+
+ - **Remove allow entry after** or **Remove block entry after**:
+ - You can extend allow entries for a maximum of 30 days after the creation date.
+ - You can extend block entries for a maximum of 90 days after the creation date or set them to **Never expire**.
+
+ - **Optional note**
+
+ When you're finished, click **Save**.
+
+> [!NOTE]
+> For allow entries only, if you select the entry by clicking anywhere in the row other than the check box, you can select ![View submission icon.](../../media/m365-cc-sc-view-submission-icon.png) **View submission** in the details flyout that appears to go to the **Submissions** page at <https://security.microsoft.com/reportsubmission>.
+
+### Use PowerShell to modify allow or block entries for files in the Tenant Allow/Block List
+
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
+
+```powershell
+Set-TenantAllowBlockListItems -ListType <FileHash> <-Ids <Identity value> | -Entries <Value value>> [<-ExpirationDate Date | -NoExpiration>] [-Notes <String>]
+```
+
+This example changes the expiration date of the specified file block entry.
```powershell
-Set-TenantAllowBlockListItems -ListType <FileHash> -Ids <"Id1","Id2",..."IdN"> [<-ExpirationDate Date | -NoExpiration>] [-Notes <String>]
+Set-TenantAllowBlockListItems -ListType FileHash -Entries "27c5973b2451db9deeb01114a0f39e2cbcd2f868d08cedb3e210ab3ece102214" -ExpirationDate "9/1/2022"
``` For detailed syntax and parameter information, see [Set-TenantAllowBlockListItems](/powershell/module/exchange/set-tenantallowblocklistitems).
-## Remove file entries
+## Use the Microsoft 365 Defender portal to remove allow or block entries for files from the Tenant Allow/Block List
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+
+2. Select the **Files** tab.
+
+3. On the **Files** tab, do one of the following steps:
+
+ - Select the check box of the entry that you want to remove, and then click the ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete** icon that appears.
+ - Select the entry that you want to remove by click anywhere in the row other than the check box. In the details flyout that appears, click ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete**.
+
+4. In the warning dialog that appears, click **Delete**.
+
+> [!NOTE]
+> You can select multiple entries by selecting each check box, or select all entries by selecting the check box next to the **Value** column header.
+
+### Use PowerShell to remove allow or block entries for files from the Tenant Allow/Block List
+
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
+
+```powershell
+Remove-TenantAllowBlockListItems -ListType FileHash <-Ids <Identity value> | -Entries <Value value>>
+```
-To remove allow or block file entries from the Tenant Allow/Block List, use the following syntax:
+This example removes the specified file block from the Tenant Allow/Block List.
```powershell
-Remove-TenantAllowBlockListItems -ListType <FileHash> -Ids <"Id1","Id2",..."IdN">
+Remove-TenantAllowBlockListItems -ListType FileHash -Entries "27c5973b2451db9deeb01114a0f39e2cbcd2f868d08cedb3e210ab3ece102214"
``` For detailed syntax and parameter information, see [Remove-TenantAllowBlockListItems](/powershell/module/exchange/remove-tenantallowblocklistitems). ## Related articles -- [Admin submissions](admin-submission.md)
+- [Use the Submissions portal to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](admin-submission.md)
- [Report false positives and false negatives](report-false-positives-and-false-negatives.md) - [Manage your allows and blocks in the Tenant Allow/Block List](manage-tenant-allow-block-list.md) - [Allow or block emails in the Tenant Allow/Block List](allow-block-email-spoof.md)
security Allow Block Urls https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/allow-block-urls.md
Title: Allow or block URLs using the Tenant Allow/Block List f1.keywords: - NOCSH-+ Last updated
ms.prod: m365-security
- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
-You can use the Microsoft 365 Defender portal or PowerShell to allow or block URLs in the Tenant Allow/Block List.
+This article describes how to create and manage URL allow and block entries that are available in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage your allows and blocks in the Tenant Allow/Block List](manage-tenant-allow-block-list.md).
+
+You manage allow and block entries for URLs in the Microsoft 365 Defender Portal or in Exchange Online PowerShell.
+
+## What do you need to know before you begin?
+
+- You open the Microsoft 365 Defender portal at <https://security.microsoft.com>. To go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
+
+- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).
+
+- For URL entry syntax, see the [URL syntax for the Tenant Allow/Block List](#url-syntax-for-the-tenant-allowblock-list) section later in this article.
+
+- For URLs, the maximum number of allow entries is 500, and the maximum number of block entries is 500 (1000 URL entries total).
+
+- You can enter a maximum of 250 characters in a URL entry.
+
+- An entry should be active within 30 minutes, but it might take up to 24 hours for the entry to be active.
+
+- You need to be assigned permissions in Exchange Online before you can do the procedures in this article:
+ - To add and remove values from the Tenant Allow/Block List, you need to be a member of one of the following role groups:
+ - **Organization Management** or **Security Administrator** role group (**Security admin role**)
+ - **Security Operator** role group (**Tenant AllowBlockList Manager**).
+ - For read-only access to the Tenant Allow/Block List, you need to be a member of one of the following role groups:
+ - **Global Reader** role group
+ - **Security Reader** role group
+ - **View-Only configuration** role group
+
+ For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
+
+ **Notes**:
+
+ - Adding users to the corresponding Azure Active Directory role in the Microsoft 365 admin center gives users the required permissions *and* permissions for other features in Microsoft 365. For more information, see [About admin roles](../../admin/add-users/about-admin-roles.md).
+ - The **View-Only Organization Management** role group in [Exchange Online](/Exchange/permissions-exo/permissions-exo#role-groups) also gives read-only access to the feature.
+
+## Create block entries for URLs
+
+You have the following options to create block entries for URLs:
+
+- [The Submissions page in the Microsoft 365 Defender portal](#use-the-microsoft-365-defender-portal-to-create-block-entries-for-urls-in-the-submissions-portal)
+- The Tenant Allow/Block List in [the Microsoft 365 Defender portal](#use-the-microsoft-365-defender-portal-to-create-block-entries-for-urls-in-the-tenant-allowblock-list) or in [PowerShell](#use-powershell-to-create-block-entries-for-urls-in-the-tenant-allowblock-list)
+
+### Use the Microsoft 365 Defender portal to create block entries for URLs in the Submissions portal
+
+When you use the Submissions portal at <https://security.microsoft.com/reportsubmission> to report URLs as **Should have been blocked (False negative)**, you can select **Block this file** to add a block entry for the URL in the Tenant Allow/Block List.
+
+For instructions, see [Report questionable URLs to Microsoft](admin-submission.md#report-questionable-urls-to-microsoft).
+
+### Use the Microsoft 365 Defender portal to create block entries for URLs in the Tenant Allow/Block List
+
+You create block entries for URLs directly in the Tenant Allow/Block List.
+
+> [!NOTE]
+> Email messages that contain these blocked URLs are blocked as *phishing*.
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+
+2. On the **Tenant Allow/Block List** page, select the **URLs** tab.
+
+3. On the **URLs** tab, click ![Block icon.](../../media/m365-cc-sc-create-icon.png) **Block**.
+
+4. In the **Block URLs** flyout that appears, configure the following settings:
+
+ - **Add URLs with wildcards**: Enter one URL per line, up to a maximum of 20. For details about the syntax for URL entries, see the [URL syntax for the Tenant Allow/Block List](#url-syntax-for-the-tenant-allowblock-list) section later in this article.
+
+ - **Remove block entry after**: The default value is **30 days**, but you can select from the following values:
+ - **Never expire**
+ - **1 day**
+ - **7 days**
+ - **30 days**
+ - **Specific date**: The maximum value is 90 days from today.
+
+ - **Optional note**: Enter descriptive text for the entries.
+
+5. When you're finished, click **Add**.
+
+#### Use PowerShell to create block entries for URLs in the Tenant Allow/Block List
+
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
+
+```powershell
+New-TenantAllowBlockListItems -ListType Url -Block -Entries "Value1","Value2",..."ValueN" <-ExpirationDate <Date> | -NoExpiration> [-Notes <String>]
+```
+
+This example adds a block URL entry for contoso.com and all subdomains (for example, contoso.com and xyz.abc.contoso.com). Because we didn't use the ExpirationDate or NoExpiration parameters, the entry expires after 30 days.
+
+```powershell
+New-TenantAllowBlockListItems -ListType Url -Block -Entries ~contoso.com
+```
+
+For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
+
+## Use the Microsoft 365 Defender portal to create allow entries for URLs in the Submissions portal
+
+You can't create URL allow entries directly in the Tenant Allow/Block List. Instead, you use the Submissions portal at <https://security.microsoft.com/reportsubmission> to report the message as a false positive. For more information about admin submissions, see [Use the Submissions portal to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](admin-submission.md).
+
+Reporting the URL as a false positive on the **Submissions** page adds an allow entry for the URL in the Tenant Allow/Block List.
+
+> [!IMPORTANT]
+> Because Microsoft manages allow entries for you, unneeded URL allow entries will be removed. This behavior protects your organization and helps prevent misconfigured allow entries. If you disagree with the verdict, you might need to open a support case to help determine why a URL is still considered bad.
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Actions & submissions** \> **Submissions**. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
+
+2. On the **Submissions** page, select the **URLs** tab
+
+3. On the **URLs** tab, click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
+
+4. In the **Submit to Microsoft for analysis** flyout that appears, enter the following information:
+
+ - **Select the submission type**: Verify the value **URL** is selected.
+
+ - **URL**: Enter the full URL (for example, `https://www.fabrikam.com/marketing.html`), and then select it in the box that appears.
+
+ - **Select a reason for submitting to Microsoft**: Select **Should not have been blocked (False positive)**, and then configure the following settings:
+
+ - **Allow this URL**: Turn on this setting ![Toggle on.](../../media/scc-toggle-on.png).
+
+ - **Remove allow entry after**: The default value is **30 days**, but you can select from the following values:
+ - **1 day**
+ - **7 days**
+ - **30 days**
+ - **Specific date**: The maximum value is 30 days from today.
+
+ - **Allow entry note**: Enter optional information about why you're allowing this URL.
+
+ When you're finished, click **Submit**, and then click **Done**.
+
+ :::image type="content" source="../../media/admin-submission-url-allow.png" alt-text="Submit a false positive (good) URL to Microsoft for analysis on the Submissions page in the Defender portal." lightbox="../../media/admin-submission-url-allow.png":::
+
+5. After a few moments, the URL allow entry will appear on the **URL** tab on the **Tenant Allow/Block List** page.
+
+> [!NOTE]
+>
+> - When the URL is detected again, it's not sent for [Safe Links](safe-links.md) detonation or URL reputation checks, and all other URL-based filters are skipped.
+> - During mail flow, if messages containing the URL pass other non-URL checks in the filtering stack, the messages will be delivered.
+
+## Use the Microsoft 365 Defender portal to view allow or block entries for URLs in the Tenant Allow/Block List
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+
+2. Select the **URL** tab. The following columns are available:
+
+ - **Value**: The URL.
+ - **Action**: The value **Allow** or **Block**.
+ - **Modified by**
+ - **Last updated**
+ - **Remove on**: The expiration date.
+ - **Notes**
+
+ Click on a column heading to sort in ascending or descending order.
+
+ Click ![Group icon.](../../media/m365-cc-sc-group-icon.png) **Group** to group the results by **None** or **Action**.
+
+ Click ![Search icon.](../../media/m365-cc-sc-search-icon.png) **Search**, enter all or part of a value, and then press ENTER to find a specific value. When you're finished, click ![Clear search icon.](../../media/m365-cc-sc-close-icon.png) to clear the search.
+
+ Click ![Filter icon.](../../media/m365-cc-sc-filter-icon.png) **Filter** to filter the results. The following values are available in the **Filter** flyout that appears:
+
+ - **Action**: **Allow** and **Block**.
+ - **Never expire**: ![Toggle on.](../../media/scc-toggle-on.png) or ![Toggle off.](../../media/scc-toggle-off.png)
+ - **Last updated**: Select **From** and **To** dates.
+ - **Remove on**: Select **From** and **To** dates.
+
+ When you're finished, click **Apply**. To clear existing filters, click ![Clear filters icon](../../media/m365-cc-sc-clear-filters-icon.png) **Clear filters** in the **Filter** flyout.
+
+### Use PowerShell to view allow or block entries for URLs in the Tenant Allow/Block List
+
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
+
+```powershell
+Get-TenantAllowBlockListItems -ListType Url [-Allow] [-Block] [-Entry <URLValue>] [<-ExpirationDate <Date> | -NoExpiration>]
+```
+
+This example returns all allowed and blocked URLs.
+
+```powershell
+Get-TenantAllowBlockListItems -ListType Url
+```
+
+This example filters the results by blocked URLs.
+
+```powershell
+Get-TenantAllowBlockListItems -ListType Url -Block
+```
+
+For detailed syntax and parameter information, see [Get-TenantAllowBlockListItems](/powershell/module/exchange/get-tenantallowblocklistitems).
+
+## Use the Microsoft 365 Defender portal to modify allow or block entries for URLs in the Tenant Allow/Block List
+
+When you modify an allow or block URL entry in the Tenant Allow/Block list, you can only modify the expiration date and notes.
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+
+2. Select the **URLs** tab
+
+3. On the **URLs** tab, select the check box of the entry that you want to modify, and then click the ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit** button that appears.
+
+4. The following values are available in the **Edit URL** flyout that appears:
+
+ - **Remove allow entry after** or **Remove block entry after**:
+ - You can extend allow entries for a maximum of 30 days after the creation date.
+ - You can extend block entries for a maximum of 90 days after the creation date or set them to **Never expire**.
+
+ - **Optional note**
+
+ When you're finished, click **Save**.
+
+> [!NOTE]
+> For allow entries only, if you select the entry by clicking anywhere in the row other than the check box, you can select ![View submission icon.](../../media/m365-cc-sc-view-submission-icon.png) **View submission** in the details flyout that appears to go to the **Submissions** page at <https://security.microsoft.com/reportsubmission>.
+
+### Use PowerShell to modify allow or block entries for URLs in the Tenant Allow/Block List
+
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
+
+```powershell
+Set-TenantAllowBlockListItems -ListType Url <-Ids <Identity value> | -Entries <Value value>> [<-ExpirationDate Date | -NoExpiration>] [-Notes <String>]
+```
+
+This example changes the expiration date of the specified block URL entry.
+
+```powershell
+Set-TenantAllowBlockListItems -ListType Url -Entries "~contoso.com" -ExpirationDate "9/1/2022"
+```
+
+For detailed syntax and parameter information, see [Set-TenantAllowBlockListItems](/powershell/module/exchange/set-tenantallowblocklistitems).
+
+## Use the Microsoft 365 Defender portal to remove allow or block entries for URLs from the Tenant Allow/Block List
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+
+2. Select the **URLs** tab.
+
+3. On the **URLs** tab, do one of the following steps:
+
+ - Select the check box of the entry that you want to remove, and then click the ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete** icon that appears.
+ - Select the entry that you want to remove by click anywhere in the row other than the check box. In the details flyout that appears, click ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete**.
+
+4. In the warning dialog that appears, click **Delete**.
+
+> [!NOTE]
+> You can select multiple entries by selecting each check box, or select all entries by selecting the check box next to the **Value** column header.
+
+### Use PowerShell to remove allow or block entries for URLs from the Tenant Allow/Block List
+
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
+
+```powershell
+Remove-TenantAllowBlockListItems -ListType Url <-Ids <Identity value> | -Entries <Value value>>
+```
+
+This example removes the specified block URL entry from the Tenant Allow/Block List.
+
+```powershell
+Remove-TenantAllowBlockListItems -ListType Url -Entries "~cohovineyard.com
+```
+
+For detailed syntax and parameter information, see [Remove-TenantAllowBlockListItems](/powershell/module/exchange/remove-tenantallowblocklistitems).
## URL syntax for the Tenant Allow/Block List
The following entries are invalid:
- contoso.com/\*\* - contoso.com/\*/\*
-## Create block URL entries in the Tenant Allow/Block List
-
-### Use Microsoft 365 Defender
-
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. On the **Tenant Allow/Block List** page, verify that the **URLs** tab is selected, and then click ![Block icon.](../../media/m365-cc-sc-create-icon.png) **Block**.
-
-3. In the **Block URLs** flyout that appears, configure the following settings:
- - **Add URLs with wildcards**: Enter one URL per line, up to a maximum of 20. For details about the syntax for URL entries, see the URL syntax section in [Manage the Tenant Allow/Block List](tenant-allow-block-list.md).
- - **Never expire**: Do one of the following steps:
- - Verify the setting is turned off (![Toggle off.](../../media/scc-toggle-off.png)) and use the **Remove on** box to specify the expiration date for the entries.
-
- or
-
- - Move the toggle to the right to configure the entries to never expire: ![Toggle on.](../../media/scc-toggle-on.png).
- - **Optional note**: Enter descriptive text for the entries.
-
-4. When you're finished, click **Add**.
-
-> [!NOTE]
-> The emails containing these URLs will be blocked as _phish_.
-
-### Use PowerShell
-
-To add block URL entries in the Tenant Allow/Block List, use the following syntax:
-
-```powershell
-New-TenantAllowBlockListItems -ListType <Url> -Block -Entries "Value1","Value2",..."ValueN" <-ExpirationDate Date | -NoExpiration> [-Notes <String>]
-```
-
-This example adds a block URL entry for contoso.com and all subdomains (for example, contoso.com and xyz.abc.contoso.com). Because we didn't use the ExpirationDate or NoExpiration parameters, the entry expires after 30 days.
-
-```powershell
-New-TenantAllowBlockListItems -ListType Url -Block -Entries ~contoso.com
-```
-
-For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
-
-## Create allow URL entries
-
-### Use Microsoft 365 Defender
-
-Allow URLs on the **Submissions** page in Microsoft 365 Defender.
-
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-2. On the **Submissions** page, select the **URLs** tab, and then click ![Submit to Microsoft for analysis icon.](../../media/m365-cc-sc-create-icon.png) **Submit to Microsoft for analysis**.
-
-3. Use the **Submit to Microsoft for review** flyout to submit a message by adding the URL.
-
-4. In the **Select a reason for submitting to Microsoft** section, select **Should not have been blocked (false positive)**.
-
-5. Turn on the **Allow URLs like this** option.
-
-6. From the **Remove after** drop-down list, specify for how long you want the allow option to work.
-
-7. Add why you are adding allow using the **Optional Note**.
-
-8. When you're finished, click the **Submit** button.
-
- :::image type="content" source="../../media/submit-url-for-analysis.png" alt-text="Submit URL for analysis" lightbox="../../media/submit-url-for-analysis.png":::
-
-> [!NOTE]
->
-> - When the URL is encountered again, the URL is not sent for detonation or reputation checks and all other URL-based filters are skipped.
-> - So for an email (containing this URL), during mail flow, if the rest of the filters find the email to be clean then the email will be delivered.
-
-## View URL entries
-
-To view block URL entries in the Tenant Allow/Block List, use the following syntax:
-
-```powershell
-Get-TenantAllowBlockListItems -ListType <URL> [-Entry <SenderValue | FileHashValue | URLValue>] [<-ExpirationDate Date | -NoExpiration>]
-```
-
-This example returns all blocked URLs.
-
-```powershell
-Get-TenantAllowBlockListItems -ListType Url -Block
-```
-
-For detailed syntax and parameter information, see [Get-TenantAllowBlockListItems](/powershell/module/exchange/get-tenantallowblocklistitems).
-
-## Modify URL entries
-
-To modify allow or block URL entries in the Tenant Allow/Block List, use the following syntax:
-
-```powershell
-Set-TenantAllowBlockListItems -ListType <URL> -Ids <"Id1","Id2",..."IdN"> [<-ExpirationDate Date | -NoExpiration>] [-Notes <String>]
-```
-
-This example changes the expiration date of the specified block URL entry.
-
-```powershell
-Set-TenantAllowBlockListItems -ListType Url -Ids "RgAAAAAI8gSyI_NmQqzeh-HXJBywBwCqfQNJY8hBTbdlKFkv6BcUAAAl_QCZAACqfQNJY8hBTbdlKFkv6BcUAAAl_oSRAAAA" -ExpirationDate "5/30/2020"
-```
-
-For detailed syntax and parameter information, see [Set-TenantAllowBlockListItems](/powershell/module/exchange/set-tenantallowblocklistitems).
-
-## Remove URL entries
-
-To remove allow or block URL entries from the Tenant Allow/Block List, use the following syntax:
-
-```powershell
-Remove-TenantAllowBlockListItems -ListType <URL> -Ids <"Id1","Id2",..."IdN">
-```
-This example removes the specified block URL entry from the Tenant Allow/Block List.
-
-```powershell
-Remove-TenantAllowBlockListItems -ListType Url -Ids "RgAAAAAI8gSyI_NmQqzeh-HXJBywBwCqfQNJY8hBTbdlKFkv6BcUAAAl_QCZAACqfQNJY8hBTbdlKFkv6BcUAAAl_oSPAAAA0"
-```
-
-For detailed syntax and parameter information, see [Remove-TenantAllowBlockListItems](/powershell/module/exchange/remove-tenantallowblocklistitems).
- ## Related articles -- [Admin submissions](admin-submission.md)
+- [Use the Submissions portal to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](admin-submission.md)
- [Report false positives and false negatives](report-false-positives-and-false-negatives.md) - [Manage your allows and blocks in the Tenant Allow/Block List](manage-tenant-allow-block-list.md) - [Allow or block files in the Tenant Allow/Block List](allow-block-files.md)
security Anti Phishing Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-protection.md
EOP (that is, Microsoft 365 organizations without Microsoft Defender for Office
- **Anti-phishing policies in EOP**: Turn spoof intelligence on or off, turn unauthenticated sender indicators in Outlook on or off, and specify the action for blocked spoofed senders. For more information, see [Configure anti-phishing policies in EOP](configure-anti-phishing-policies-eop.md). -- **Allow or block spoofed senders in the Tenant Allow/Block List**: When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoof senders before they're detected by spoof intelligence. For more information, see [Manage the Tenant Allow/Block List in EOP](tenant-allow-block-list.md).
+- **Allow or block spoofed senders in the Tenant Allow/Block List**: When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoof senders before they're detected by spoof intelligence. For more information, see [Manage the Tenant Allow/Block List in EOP](manage-tenant-allow-block-list.md).
- **Implicit email authentication**: EOP enhances standard email authentication checks for inbound email ([SPF](set-up-spf-in-office-365-to-help-prevent-spoofing.md), [DKIM](use-dkim-to-validate-outbound-email.md), and [DMARC](use-dmarc-to-validate-email.md) with sender reputation, sender history, recipient history, behavioral analysis, and other advanced techniques to help identify forged senders. For more information, see [Email authentication in Microsoft 365](email-validation-and-authentication.md).
security Anti Spam Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-protection.md
Microsoft's email safety roadmap involves an unmatched cross-product approach. E
As email use has grown, so has email abuse. Unmonitored junk email can clog inboxes and networks, impact user satisfaction, and hamper the effectiveness of legitimate email communications. That's why Microsoft continues to invest in anti-spam technologies. Simply put, it starts by containing and filtering junk email. > [!TIP]
-> The following anti-spam technologies are useful when you want to allow or block messages based on the message envelope (for example, the sender's domain or the source IP address of the message). To allow or block messages based on payload (for example, URLs in the message or attached files), then you should use the [Tenant Allow/Block List portal](tenant-allow-block-list.md).
+> The following anti-spam technologies are useful when you want to allow or block messages based on the message envelope (for example, the sender's domain or the source IP address of the message). To allow or block messages based on payload (for example, URLs in the message or attached files), then you should use the [Tenant Allow/Block List portal](manage-tenant-allow-block-list.md).
## Anti-spam technologies in EOP
security Anti Spoofing Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spoofing-protection.md
The following anti-spoofing technologies are available in EOP:
- **Spoof intelligence insight**: Review spoofed messages from senders in internal and external domains during the last 7 days, and allow or block those senders. For more information, see [Spoof intelligence insight in EOP](learn-about-spoof-intelligence.md). -- **Allow or block spoofed senders in the Tenant Allow/Block List**: When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoof senders before they're detected by spoof intelligence. For more information, see [Manage the Tenant Allow/Block List in EOP](tenant-allow-block-list.md).
+- **Allow or block spoofed senders in the Tenant Allow/Block List**: When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoof senders before they're detected by spoof intelligence. For more information, see [Manage the Tenant Allow/Block List in EOP](manage-tenant-allow-block-list.md).
- **Anti-phishing policies**: In EOP and Microsoft Defender for Office 365, anti-phishing policies contain the following anti-spoofing settings: - Turn spoof intelligence on or off.
To help mailing list messages pass anti-spoofing checks, do following steps base
When enough senders reply back to domain owners that they should set up email authentication records, it spurs them into taking action. While Microsoft also works with domain owners to publish the required records, it helps even more when individual users request it.
- - Create inbox rules in your email client to move messages to the Inbox. You can also ask your admins to configure overrides as described in [Spoof intelligence insight in EOP](learn-about-spoof-intelligence.md) and [Manage the Tenant Allow/Block List](tenant-allow-block-list.md).
+ - Create inbox rules in your email client to move messages to the Inbox. You can also ask your admins to configure overrides as described in [Spoof intelligence insight in EOP](learn-about-spoof-intelligence.md) and [Manage the Tenant Allow/Block List](manage-tenant-allow-block-list.md).
- - Use the Tenant Allow/Block List to create an override for the mailing list to treat it as legitimate. For more information, see [Add allows in the Tenant Allow/Block List](manage-tenant-allows.md).
+ - Use the Tenant Allow/Block List to create an override for the mailing list to treat it as legitimate. For more information, see [Create allow entries for spoofed senders](allow-block-email-spoof.md#create-allow-entries-for-spoofed-senders).
If all else fails, you can report the message as a false positive to Microsoft. For more information, see [Report messages and files to Microsoft](report-junk-email-messages-to-microsoft.md).
security Configure Advanced Delivery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/configure-advanced-delivery.md
The SecOps mailbox entries that you configured are displayed on the **SecOps mai
- IP range: For example, 192.168.0.1-192.168.0.254. - CIDR IP: For example, 192.168.0.1/25.
- - **Simulation URLs to allow**: Expand this setting and optionally enter specific URLs that are part of your phishing simulation campaign that should not be blocked or detonated by clicking in the box, entering a value, and then pressing Enter or selecting the value that's displayed below the box. You can add up to 10 entries. For the URL syntax format, see [URL syntax for the Tenant Allow/Block List](tenant-allow-block-list.md#url-syntax-for-the-tenant-allowblock-list). These URLs are wrapped at the time of click, but they aren't blocked.
+ - **Simulation URLs to allow**: Expand this setting and optionally enter specific URLs that are part of your phishing simulation campaign that should not be blocked or detonated by clicking in the box, entering a value, and then pressing Enter or selecting the value that's displayed below the box. You can add up to 10 entries. For the URL syntax format, see [URL syntax for the Tenant Allow/Block List](allow-block-urls.md#url-syntax-for-the-tenant-allowblock-list). These URLs are wrapped at the time of click, but they aren't blocked.
To remove an existing value, click remove ![Remove icon.](../../media/m365-cc-sc-remove-selection-icon.png) next to the value.
In addition to the two scenarios that the advanced delivery policy can help you
- **False positives under review**: You might want to temporarily allow certain messages that are still being analyzed by Microsoft via [admin submissions](admin-submission.md) to report known good messages that are incorrectly being marked as bad to Microsoft (false positives). As with all overrides, we _**highly recommended**_ that these allowances are temporary.
-## Security & Compliance PowerShell procedures for SecOps mailboxes in the advanced delivery policy
+## PowerShell procedures for SecOps mailboxes in the advanced delivery policy
-In Security & Compliance PowerShell, the basic elements of SecOps mailboxes in the advanced delivery policy are:
+In PowerShell, the basic elements of SecOps mailboxes in the advanced delivery policy are:
- **The SecOps override policy**: Controlled by the **\*-SecOpsOverridePolicy** cmdlets. - **The SecOps override rule**: Controlled by the **\*-SecOpsOverrideRule** cmdlets.
Remove-SecOpsOverrideRule -Identity SecOpsOverrideRule6fed4b63-3563-495d-a481-b2
For detailed syntax and parameter information, see [Remove-SecOpsOverrideRule](/powershell/module/exchange/remove-secopsoverriderule).
-## Security & Compliance PowerShell procedures for third-party phishing simulations in the advanced delivery policy
+## PowerShell procedures for third-party phishing simulations in the advanced delivery policy
-In Security & Compliance PowerShell, the basic elements of third-party phishing simulations in the advanced delivery policy are:
+In PowerShell, the basic elements of third-party phishing simulations in the advanced delivery policy are:
- **The phishing simulation override policy**: Controlled by the **\*-PhishSimOverridePolicy** cmdlets. - **The phishing simulation override rule**: Controlled by the **\*-PhishSimOverrideRule** cmdlets.
For detailed syntax and parameter information, see [New-PhishSimOverrideRule](/p
#### Step 3: (Optional) Use PowerShell to identify the phishing simulation URLs to allow
-Use the following syntax:
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
```powershell New-TenantAllowBlockListItems -Allow -ListType Url -ListSubType AdvancedDelivery -Entries "<URL1>","<URL2>",..."<URL10>" <[-NoExpiration] | [-ExpirationDate <DateTime>]> ```
-For details about the URL syntax, see [URL syntax for the Tenant Allow/Block List](tenant-allow-block-list.md#url-syntax-for-the-tenant-allowblock-list).
+For details about the URL syntax, see [URL syntax for the Tenant Allow/Block List](allow-block-urls.md#url-syntax-for-the-tenant-allowblock-list)
This example adds a URL allow entry for the specified third-party phishing simulation URL with no expiration.
security Configure Global Settings For Safe Links https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/configure-global-settings-for-safe-links.md
You can configure the global Safe Links settings in the Microsoft 365 Defender p
## Configure the "Block the following URLs" list in the Microsoft 365 Defender portal > [!NOTE]
-> You can now manage block URL entries in the [Tenant Allow/Block List](allow-block-urls.md#create-block-url-entries-in-the-tenant-allowblock-list). The "Block the following URLs" list is in the process of being deprecated. We'll attempt to migrate existing entries from the "Block the following URLs" list to block URL entries in the Tenant Allow/Block List. Messages containing the blocked URL will be quarantined.
+> You can now manage block URL entries in the [Tenant Allow/Block List](allow-block-urls.md#use-the-microsoft-365-defender-portal-to-create-block-entries-for-urls-in-the-tenant-allowblock-list). The "Block the following URLs" list is in the process of being deprecated. We'll attempt to migrate existing entries from the "Block the following URLs" list to block URL entries in the Tenant Allow/Block List. Messages containing the blocked URL will be quarantined.
The **Block the following URLs** list identifies the links that should always be blocked by Safe Links scanning in supported apps. For more information, see ["Block the following URLs" list for Safe Links](safe-links.md#block-the-following-urls-list-for-safe-links).
security Create Safe Sender Lists In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/create-safe-sender-lists-in-office-365.md
Mail flow rules allow the most flexibility to ensure that only the right message
> > - While you can use safe sender lists to help with false positives (good email marked as bad), you should consider the use of safe sender lists as a temporary solution that should be avoided if possible. We don't recommend managing false positives by using safe sender lists, because exceptions to spam filtering can open your organization to spoofing and other attacks. If you insist on using safe sender lists to manage false positives, you need to be vigilant and keep the topic [Report messages and files to Microsoft](report-junk-email-messages-to-microsoft.md) at the ready. >
-> - To allow a domain to send unauthenticated email (bypass anti-spoofing protection) but not bypass anti-spam and other protections, you can use the [spoof intelligence insight](learn-about-spoof-intelligence.md) and the [Tenant Allow/Block List](tenant-allow-block-list.md).
+> - To allow a domain to send unauthenticated email (bypass anti-spoofing protection) but not bypass anti-spam and other protections, you can use the [spoof intelligence insight](learn-about-spoof-intelligence.md) and the [Tenant Allow/Block List](manage-tenant-allow-block-list.md).
> > - EOP and Outlook inspect different message properties to determine the sender of the message. For more information, see the [Considerations for bulk email](#considerations-for-bulk-email) section later in this article. >
security Email Validation And Authentication https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-validation-and-authentication.md
Once you've gotten started with an SPF fallback policy of `?all`, you can gradua
### Configure permitted senders of unauthenticated email
-You can also use the [spoof intelligence insight](learn-about-spoof-intelligence.md) and the [Tenant Allow/Block List](tenant-allow-block-list.md) to permit senders to transmit unauthenticated messages to your organization.
+You can also use the [spoof intelligence insight](learn-about-spoof-intelligence.md) and the [Tenant Allow/Block List](manage-tenant-allow-block-list.md) to permit senders to transmit unauthenticated messages to your organization.
For external domains, the spoofed user is the domain in the From address, while the sending infrastructure is one of the following values:
security Exchange Online Protection Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/exchange-online-protection-overview.md
For information about requirements, important limits, and feature availability a
|Outbound anti-spam|[Outbound spam protection in EOP](outbound-spam-controls.md) <p> [Configure outbound spam filtering in EOP](configure-the-outbound-spam-policy.md) <p> [Control automatic external email forwarding in Microsoft 365](external-email-forwarding.md)| |Connection filtering|[Configure connection filtering](configure-the-connection-filter-policy.md)| |Anti-phishing|[Anti-phishing policies in Microsoft 365](set-up-anti-phishing-policies.md) <p> [Configure anti-phishing policies in EOP](configure-anti-phishing-policies-eop.md)|
-|Anti-spoofing protection|[Spoof intelligence insight in EOP](learn-about-spoof-intelligence.md) <p> [Manage the Tenant Allow/Block List](tenant-allow-block-list.md)|
+|Anti-spoofing protection|[Spoof intelligence insight in EOP](learn-about-spoof-intelligence.md) <p> [Manage the Tenant Allow/Block List](manage-tenant-allow-block-list.md)|
|Zero-hour auto purge (ZAP) for delivered malware, spam, and phishing messages|[ZAP in Exchange Online](zero-hour-auto-purge.md)| |Preset security policies|[Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md) <p> [Configuration analyzer for protection policies in EOP and Microsoft Defender for Office 365](configuration-analyzer-for-security-policies.md)|
-|Tenant Allow/Block List|[Manage the Tenant Allow/Block List](tenant-allow-block-list.md)|
+|Tenant Allow/Block List|[Manage the Tenant Allow/Block List](manage-tenant-allow-block-list.md)|
|Block lists for message senders|[Create blocked sender lists in EOP](create-block-sender-lists-in-office-365.md)| |Allow lists for message senders|[Create safe sender lists in EOP](create-safe-sender-lists-in-office-365.md)| |Directory Based Edge Blocking (DBEB)|[Use Directory Based Edge Blocking to reject messages sent to invalid recipients](/exchange/mail-flow-best-practices/use-directory-based-edge-blocking)|
security Learn About Spoof Intelligence https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/learn-about-spoof-intelligence.md
The rest of this article explains how to use the spoof intelligence insight in t
> [!NOTE] >
-> - Only spoofed senders that were detected by spoof intelligence appear in the spoof intelligence insight. When you override the allow or block verdict in the insight, the spoofed sender becomes a manual allow or block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoofed senders before they're detected by spoof intelligence. For more information, see [Manage the Tenant Allow/Block List in EOP](tenant-allow-block-list.md).
+> - Only spoofed senders that were detected by spoof intelligence appear in the spoof intelligence insight. When you override the allow or block verdict in the insight, the spoofed sender becomes a manual allow or block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoofed senders before they're detected by spoof intelligence. For more information, see [Manage the Tenant Allow/Block List in EOP](manage-tenant-allow-block-list.md).
> > - The spoof intelligence insight and the **Spoofed senders** tab in the Tenant Allow/Block list replace the functionality of the spoof intelligence policy that was available on the anti-spam policy page in the Security & Compliance Center. >
The rest of this article explains how to use the spoof intelligence insight in t
## What do you need to know before you begin? -- You open the Microsoft 365 Defender portal at <https://security.microsoft.com>. To go directly to the **Spoofing** tab on the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>. To go directly to the **Spoof intelligence insight** page, use <https://security.microsoft.com/spoofintelligence>.
+- You open the Microsoft 365 Defender portal at <https://security.microsoft.com>. To go directly to the **Spoofed senders** tab on the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>. To go directly to the **Spoof intelligence insight** page, use <https://security.microsoft.com/spoofintelligence>.
- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).
The rest of this article explains how to use the spoof intelligence insight in t
## Open the spoof intelligence insight in the Microsoft 365 Defender portal
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Tenant Allow/Block Lists** in the **Rules** section. To go directly to the **Spoofing** tab on the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>.
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Tenant Allow/Block Lists** in the **Rules** section. To go directly to the **Spoofed senders** tab on the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>.
2. On the **Tenant Allow/Block Lists** page, the spoof intelligence insight looks like this:
Only email from that domain/sending infrastructure pair will be allowed to spoof
## Use the spoof intelligence insight in Exchange Online PowerShell or standalone EOP PowerShell
-In PowerShell, you use the **Get-SpoofIntelligenceInsight** cmdlet to **view** allowed and blocked spoofed senders that were detected by spoof intelligence. To manually allow or block the spoofed senders, you need to use the **New-TenantAllowBlockListSpoofItems** cmdlet. For more information, see [Use PowerShell to manage spoofed sender entries to the Tenant Allow/Block List](tenant-allow-block-list.md).
+In PowerShell, you use the **Get-SpoofIntelligenceInsight** cmdlet to **view** allowed and blocked spoofed senders that were detected by spoof intelligence. To manually allow or block the spoofed senders, you need to use the **New-TenantAllowBlockListSpoofItems** cmdlet. For more information, see [Use PowerShell to manage spoofed sender entries to the Tenant Allow/Block List](manage-tenant-allow-block-list.md).
To view the information in the spoof intelligence insight, run the following command:
security Manage Tenant Allow Block List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/manage-tenant-allow-block-list.md
ms.prod: m365-security
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, you might disagree with the EOP filtering verdict. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative).
-The Tenant Allow/Block List in the Microsoft 365 Defender portal gives you a way to manually override the Microsoft 365 filtering verdicts. The Tenant Allow/Block List is used during mail flow for incoming messages (does not apply to intra-org messages) and at the time of user clicks. You can specify the following types of overrides:
+The Tenant Allow/Block List in the Microsoft 365 Defender portal gives you a way to manually override the Microsoft 365 filtering verdicts. The Tenant Allow/Block List is used during mail flow for incoming messages form external senders (does not apply to intra-org messages) and at the time of user clicks.
-- URLs to block.-- Files to block.-- Domains or email addresses to block - both sending and receiving.-- Spoofed senders to allow or block. If you override the allow or block verdict in the [spoof intelligence insight](learn-about-spoof-intelligence.md), the spoofed sender becomes a manual allow or block entry that only appears on the **Spoof** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoofed senders here before they're detected by spoof intelligence.-- URLs to allow.-- Files to allow.-- Domains or email addresses to allow - both sending and receiving.
+The Tenant Allow/Block list is available in the the Microsoft 365 Defender portal at <https://security.microsoft.com> \> **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. To go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-This article describes how to configure entries in the Tenant Allow/Block List in the Microsoft 365 Defender portal or in PowerShell (Exchange Online PowerShell for Microsoft 365 organizations with mailboxes in Exchange Online; standalone EOP PowerShell for organizations without Exchange Online mailboxes).
+For entry creation and configuration instructions, see the following topics:
-## What do you need to know before you begin?
+- **Domains and email addresses** and **spoofed senders**: [Allow or block emails using the Tenant Allow/Block List](allow-block-email-spoof.md)
+- **Files**: [Allow or block files using the Tenant Allow/Block List](allow-block-files.md)
+- **URLs**: [Allow or block URLs using the Tenant Allow/Block List](allow-block-urls.md).
-- In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. To go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+These articles contain procedures in the Microsoft 365 Defender Portal and in PowerShell.
-- You specify files by using the SHA256 hash value of the file. To find the SHA256 hash value of a file in Windows, run the following command in a Command Prompt:
+## Block entries in the Tenant Allow/Block List
- ```console
- certutil.exe -hashfile "<Path>\<Filename>" SHA256
- ```
+Use the Submissions portal (also known as *admin submission*) at <https://security.microsoft.com/reportsubmission> to create block entries for the following types of items as you report them as false positives to Microsoft:
- An example value is `768a813668695ef2483b2bde7cf5d1b2db0423a0d3e63e498f3ab6f2eb13ea3a`. Perceptual hash (pHash) values are not supported.
+- **Domains and email addresses**:
+ - Email messages from these senders are blocked as *high confidence spam* (SCL = 9) and moved to the Junk Email folder.
+ - Users in the organization can't send email to these blocked domains and addresses. They'll receive the following non-delivery report (also known as an NDR or bounce message): `5.7.1 Your message can't be delivered because one or more recipients are blocked by your organization's tenant allow/block list policy.`
-- For domains or email addresses, URLs, and file hashes, the Tenant Allow/Block List allows 500 entries each for both allows and blocks, making it a total of 1000 entries. For spoofed senders(spoofing), the total number of entries allowed is 1024.
+- **Files**: Email messages that contain these blocked files are blocked as *malware*.
-- The maximum number of characters for each entry is:
- - File hashes = 64
- - URL = 250
+- **URLs**: Email messages that contain these blocked URLs are blocked as *phishing*.
-- An entry should be active within 30 minutes, but it might take up to 24 hours for the entry to be active.
+In the Tenant Allow/Block List, you can also directly create block entries for the following types of items:
-- By default, entries in the Tenant Allow/Block List will expire after 30 days. You can specify a date or set them to never expire (for block type of entries).
+- **Domains and email addresses**, **Files**, and **URLs**.
-- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).
+- **Spoofed senders**: If you manually override an existing allow verdict from [spoof intelligence](learn-about-spoof-intelligence.md), the blocked spoofed sender becomes a manual block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List.
-- You need to be assigned permissions in Exchange Online before you can do the procedures in this article:
- - To add and remove values from the Tenant Allow/Block List, you need to be a member of
- - **Organization Management** or **Security Administrator** role group (**Security admin role**)
- - **Security Operator** role group (**Tenant AllowBlockList Manager**).
- - For read-only access to the Tenant Allow/Block List, you need to be a member of
- - **Global Reader** role group
- - **Security Reader** role group
- - **View-Only configuration** role group
+By default, block entries for **domains and email addresses**, **files** and **URLs** expire after 30 days, but you can set them to expire up 90 days or to never expire. Block entries for **spoofed senders** never expire.
- For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
+## Allow entries in the Tenant Allow/Block List
- > [!NOTE]
- >
- > - Adding users to the corresponding Azure Active Directory role in the Microsoft 365 admin center gives users the required permissions *and* permissions for other features in Microsoft 365. For more information, see [About admin roles](../../admin/add-users/about-admin-roles.md).
- > - The **View-Only Organization Management** role group in [Exchange Online](/Exchange/permissions-exo/permissions-exo#role-groups) also gives read-only access to the feature.
+In most cases, you can't directly create allow entries in the Tenant Allow/Block List:
-## Configure the Tenant Allow/Block List
+- **Domains and email addresses**, **files**, and **URLs**: You can't create allow entries directly in the Tenant Allow/Block List. Instead you use the Submissions portal at <https://security.microsoft.com/reportsubmission> to report the **email**, **email attachment**, or **URL** to Microsoft as **Should not have been blocked (False positive)**.
-To allow or block emails, see [Allow or block emails using the Tenant Allow/Block List](allow-block-email-spoof.md).
+- **Spoofed senders**:
+ - If spoof intelligence has already blocked the message as spoofing, use the Submissions portal at <https://security.microsoft.com/reportsubmission> to report the **email** to Microsoft as **Should not have been blocked (False positive)**.
+ - You can proactively create an allow entry for a spoofed sender on the **Spoofed sender** tab in the Tenant Allow/Block List before [spoof intelligence](learn-about-spoof-intelligence.md) identifies and blocks the message as spoofing.
-To allow or block files, see [Allow or block files using the Tenant Allow/Block List](allow-block-files.md).
+The following list describes what happens in the Tenant Allow/Block List when you report something to Microsoft as a false positive in the Submissions portal:
-To allow or block URLs, see [Allow or block URLs using the Tenant Allow/Block List](allow-block-urls.md).
+- **Email attachments** and **URLs**: An allow entry is created and it appears on the **Files** or **URLs** tab in the Tenant Allow/Block List.
-These articles contain the instructions to add or remove or modify entries in Tenant Allow/Block List using both Microsoft 365 Defender Portal and Exchange Online PowerShell or standalone EOP PowerShell.
+- **Email**: If a message was blocked by the Microsoft 365 filtering stack, an allow entry might be created in the Tenant Allow/Block List:
-### What to expect after you add an allow or block entry
+ - If the message was blocked by [spoof intelligence](learn-about-spoof-intelligence.md), an allow entry for the sender is created and it appears on the **Spoofed senders** tab in the Tenant Allow Block List.
-After you add an allow entry through the Submissions portal or a block entry in the Tenant Allow/Block List, the entry should start working immediately.
-
-We recommend letting entries automatically expire after 30 days to see if the system has learned about the allow or block. If not, you should make another entry to give the system another 30 days to learn.
+ - If the message was blocked by by [domain or user impersonation protection](set-up-anti-phishing-policies.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) in Defender for Office 365, an allow entry is not created in the Tenant Allow/Block List. Instead, the domain or sender is added to the **Trusted senders and domains section** in the [anti-phishing policy](configure-mdo-anti-phishing-policies.md#use-the-microsoft-365-defender-portal-to-modify-anti-phishing-policies) that detected the message.
-## View entries in the Tenant Allow/Block List
-
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. Select the tab you want. The columns that are available depend on the tab you selected:
-
- - **Domains & addresses**:
- - **Value**: The domain or email address.
- - **Action**: The value **Allow** or **Block**.
- - **Modified by**
- - **Last updated**
- - **Remove on**
- - **Notes**
- - **Spoofed senders**
- - **Spoofed user**
- - **Sending infrastructure**
- - **Spoof type**: The value **Internal** or **External**.
- - **Action**: The value **Block** or **Allow**.
- - **URLs**:
- - **Value**: The URL.
- - **Action**: The value **Allow** or **Block**.
- - **Modified by**
- - **Last updated**
- - **Remove on**
- - **Notes**
- - **Files**
- - **Value**: The file hash.
- - **Action**: The value **Allow** or **Block**.
- - **Modified by**
- - **Last updated**
- - **Remove on**
- - **Notes**
-
- You can click on a column heading to sort in ascending or descending order.
-
- You can click **Group** to group the results. The values that are available depend on the tab you selected:
-
- - **Domains & addresses**: You can group the results by **Action**.
- - **Spoofed sender**: You can group the results by **Action** or **Spoof type**.
- - **URLs**: You can group the results by **Action**.
- - **Files**: You can group the results by **Action**.
-
- Click **Search**, enter all or part of a value, and then press ENTER to find a specific value. When you're finished, click ![Clear search icon.](../../media/m365-cc-sc-close-icon.png) **Clear search**.
-
- Click **Filter** to filter the results. The values that are available in **Filter** flyout that appears depend on the tab you selected:
-
- - **Domains & addresses**
- - **Action**
- - **Never expire**
- - **Last updated date**
- - **Remove on**
- - **Spoofed senders**
- - **Action**
- - **Spoof type**
- - **URLs**
- - **Action**
- - **Never expire**
- - **Last updated date**
- - **Remove on**
- - **Files**
- - **Action**
- - **Never expire**
- - **Last updated**
- - **Remove on**
-
- When you're finished, click **Apply**. To clear existing filters, click **Filter**, and in the **Filter** flyout that appears, click **Clear filters**.
-
-## Modify entries in the Tenant Allow/Block List
-
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. Select the tab that contains the type of entry that you want to modify:
- - **Domains or email addresses**
- - **Spoofed senders**
- - **URLs**
- - **Files**
-
-3. Select the entry that you want to modify, and then click ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit**. The values that you are able to modify in the flyout that appears depend on the tab you selected in the previous step:
- - **Domains & addresses**
- - **Never expire** and/or expiration date.
- - **Optional note**
- - **Spoofed senders**
- - **Action**: You can change the value to **Allow** or **Block**.
- - **URLs**
- - **Never expire** and/or expiration date.
- - **Optional note**
- - **Files**
- - **Never expire** and/or expiration date.
- - **Optional note**
-
- Note that the values for domains or email addresses, URLs, and files never expire for blocked entries only.
-
-4. When you're finished, click **Save**.
-
-> [!NOTE]
-> You can only extend allows for a maximum of 30 days after the creation date. Blocks can be extended for up to 90 days, but unlike allows, they can also be set to Never expire.
+ - If the message was blocked for other reasons, an allow entry for the sender is created and it appears on the **Domains & addresses** tab in the Tenant Allow Block List.
-## Remove entries from the Tenant Allow/Block List
+ - If the message was not blocked, and allow entry for the sender is not created, so it won't on the **Spoofed senders** tab or the **Domains & addresses** tab.
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+By default, allow entries for **domains and email addresses**, **files** and **URLs** expire after 30 days, which is also the maximum. Allow entries for **spoofed senders** never expire.
-2. Select the tab that contains the type of entry that you want to remove:
- - **Domains & addresses**
- - **Spoofed senders**
- - **URLs**
- - **Files**
-
-3. Select the entry that you want to remove, and then click ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete**.
+> [!NOTE]
+> Because Microsoft manages allow entries for you, unneeded allow entries for **domains and email addresses**, **URLs**, or **files** will be removed. This behavior protects your organization and helps prevent misconfigured allow entries. If you disagree with the verdict, you might need to open a support case to help determine why a message is still considered bad.
+>
+> Allows are added during mail flow, based on which filters determined the message to be malicious. For example, if the sender and a URL in the message were determined to be bad, an allow entry is created for the sender, and an allow entry is created for the URL.
+>
+> When that entity (domain or email address, URL, file) is encountered again, all filters associated with that entity are skipped.
+>
+> During mail flow, if messages from the domain or email address pass other checks in the filtering stack, the messages will be delivered. For example, if [email authentication](email-validation-and-authentication.md) passes, a message from a sender in the allow entry will be delivered.
-4. In the warning dialog that appears, click **Delete**.
+## What to expect after you add an allow or block entry
-## Related articles
+After you add an allow entry through the Submissions portal or a block entry in the Tenant Allow/Block List, the entry should start working immediately.
-- [Allow or block files in the Tenant Allow/Block List](allow-block-files.md)-- [Allow or block emails in the Tenant Allow/Block List](allow-block-email-spoof.md)-- [Allow or block URLs in the Tenant Allow/Block List](allow-block-urls.md)
+We recommend letting entries automatically expire after 30 days to see if the system has learned about the allow or block. If not, you should make another entry to give the system another 30 days to learn.
security Mdo Sec Ops Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-guide.md
Incident queue management and the responsible personas are described in the foll
In Defender for Office 365, you manage false positives (good mail marked as bad) and false negatives (bad mail allowed) in the following locations: - The [Submissions portal (admin submissions)](admin-submission.md).-- The [Tenant Allow/Block List](tenant-allow-block-list.md)
+- The [Tenant Allow/Block List](manage-tenant-allow-block-list.md)
- [Threat Explorer](threat-explorer.md) For more information, see the [Manage false positive and false negative detections](#manage-false-positive-and-false-negative-detections) section later in this article.
The following permissions (roles and role groups) are available in Defender for
To assign this role to a new or existing role group, see [Modify Email & collaboration role membership in the Microsoft 365 Defender portal](permissions-microsoft-365-security-center.md#modify-email--collaboration-role-membership-in-the-microsoft-365-defender-portal).
- - **Tenant AllowBlockList Manager**: Manage allow and block entries in the [Tenant Allow/Block List](tenant-allow-block-list.md). Blocking URLs, files (using file hash) or senders is a useful response action to take when investigating malicious email that was delivered.
+ - **Tenant AllowBlockList Manager**: Manage allow and block entries in the [Tenant Allow/Block List](manage-tenant-allow-block-list.md). Blocking URLs, files (using file hash) or senders is a useful response action to take when investigating malicious email that was delivered.
By default, this role is assigned only to the **Security Operator** role group. But, members of the **Security Administrators** and **Organization management** role groups can also manage entries in the Tenant Allow/Block List.
Security team members can do submissions from multiple locations in the Microsof
You can select up to 10 messages to perform a bulk submission. Admin submissions created this way also visible in the Submission portal.
-For the short-term mitigation of false negatives, security teams can directly manage [block entries](manage-tenant-blocks.md) for files, URLs, and senders in the [Tenant Allow/Block List](tenant-allow-block-list.md).
+For the short-term mitigation of false negatives, security teams can directly manage block entries for files, URLs, and domains or email addresses in the [Tenant Allow/Block List](manage-tenant-allow-block-list.md).
-For the short-term mitigation of false positives, security teams can't directly manage [allow entries](manage-tenant-allows.md) in the Tenant Allow/Block List. Instead, they need to use [admin submissions](admin-submission.md) and the **Allow messages like this** option.
+For the short-term mitigation of false positives, security teams can't directly manage allow entries for domains and email addresses in the Tenant Allow/Block List. Instead, they need to use [admin submissions](admin-submission.md) to report the email message as a false positive. For instructions, see [Use the Microsoft 365 Defender portal to create allow entries for domains and email addresses in the Submissions portal](allow-block-email-spoof.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-domains-and-email-addresses-in-the-submissions-portal).
[Quarantine](manage-quarantined-messages-and-files.md) in Defender for Office 365 holds potentially dangerous or unwanted messages and files. Security teams can view, release, and delete all types of quarantined messages for all users. This capability enables security teams to respond effectively when a false positive message or file is quarantined.
security Mdo Sec Ops Manage Incidents And Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-manage-incidents-and-alerts.md
Security teams can take wide variety of response actions on email using Defender
- You can report false positive or false negative detections directly to Microsoft using [Threat Explorer](threat-explorer.md) or [admin submissions](admin-submission.md). -- You can block undetected malicious files, URLs, or senders using the [Tenant Allow/Block List](tenant-allow-block-list.md).
+- You can block undetected malicious files, URLs, or senders using the [Tenant Allow/Block List](manage-tenant-allow-block-list.md).
Defender for Office 365 actions are seamlessly integrated into hunting experiences and the history of actions are visible on the **History** tab in the unified **Action center** at <https://security.microsoft.com/action-center/history>.
security Migrate To Defender For Office 365 Onboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-onboard.md
As you find and fix issues, you can add more users to the pilot groups (and corr
- Filter in Threat Explorer to identify the messages. - Filter in Advanced Hunting to identify the messages.
- Report any false positives to Microsoft as early as possible through admin submissions, use the [Tenant Allow/Block List](tenant-allow-block-list.md) feature to configure safe overrides for those false positives.
+ Report any false positives to Microsoft as early as possible through admin submissions, use the [Tenant Allow/Block List](manage-tenant-allow-block-list.md) feature to configure safe overrides for those false positives.
- It's also a good idea to examine unnecessary overrides. In other words, look at the verdicts that Microsoft 365 would have provided on the messages. If Microsoft365 rendered the correct verdict, then the need for override is greatly diminished or eliminated.
security Recommended Settings For Eop And Office365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365.md
To create and configure anti-spam policies, see [Configure anti-spam policies in
|Enable ZAP for spam messages <br><br> _SpamZapEnabled_|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|| |**Allow & block list**||||| |Allowed senders <br><br> _AllowedSenders_|None|None|None||
-|Allowed sender domains <br><br> _AllowedSenderDomains_|None|None|None|Adding domains to the allowed senders list is a very bad idea. Attackers would be able to send you email that would otherwise be filtered out. <br><br> Use the [spoof intelligence insight](learn-about-spoof-intelligence.md) and the [Tenant Allow/Block List](tenant-allow-block-list.md) to review all senders who are spoofing sender email addresses in your organization's email domains or spoofing sender email addresses in external domains.|
+|Allowed sender domains <br><br> _AllowedSenderDomains_|None|None|None|Adding domains to the allowed senders list is a very bad idea. Attackers would be able to send you email that would otherwise be filtered out. <br><br> Use the [spoof intelligence insight](learn-about-spoof-intelligence.md) and the [Tenant Allow/Block List](manage-tenant-allow-block-list.md) to review all senders who are spoofing sender email addresses in your organization's email domains or spoofing sender email addresses in external domains.|
|Blocked senders <br><br> _BlockedSenders_|None|None|None|| |Blocked sender domains <br><br> _BlockedSenderDomains_|None|None|None||
The spoof settings are inter-related, but the **Show first contact safety tip**
|**Phishing threshold & protection**||||| |**Enable spoof intelligence** <br><br> _EnableSpoofIntelligence_|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|| |**Actions**|||||
-|**If message is detected as spoof** <br><br> _AuthenticationFailAction_|**Move message to the recipients' Junk Email folders** <br><br> `MoveToJmf`|**Move message to the recipients' Junk Email folders** <br><br> `MoveToJmf`|**Quarantine the message** <br><br> `Quarantine`|This setting applies to spoofed senders that were automatically blocked as shown in the [spoof intelligence insight](learn-about-spoof-intelligence.md) or manually blocked in the [Tenant Allow/Block List](tenant-allow-block-list.md). <br><br> If you select **Quarantine the message**, an **Apply quarantine policy** box is available to select the quarantine policy that defines what users are allowed to do to messages that are quarantined as spoofing. When you create a new anti-phishing policy, a blank value means the default quarantine policy is used to define the historical capabilities for messages that were quarantined as spoofing (DefaultFullAccessPolicy with no quarantine notifications). <br><br> Standard and Strict preset security policies use the default quarantine policy (DefaultFullAccessPolicy with no quarantine notifications) as described in the table [here](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features). <br><br> Admins can create and select custom quarantine policies that define more restrictive or less restrictive capabilities for users in the default or custom anti-phishing policies. For more information, see [Quarantine policies](quarantine-policies.md).|
+|**If message is detected as spoof** <br><br> _AuthenticationFailAction_|**Move message to the recipients' Junk Email folders** <br><br> `MoveToJmf`|**Move message to the recipients' Junk Email folders** <br><br> `MoveToJmf`|**Quarantine the message** <br><br> `Quarantine`|This setting applies to spoofed senders that were automatically blocked as shown in the [spoof intelligence insight](learn-about-spoof-intelligence.md) or manually blocked in the [Tenant Allow/Block List](manage-tenant-allow-block-list.md). <br><br> If you select **Quarantine the message**, an **Apply quarantine policy** box is available to select the quarantine policy that defines what users are allowed to do to messages that are quarantined as spoofing. When you create a new anti-phishing policy, a blank value means the default quarantine policy is used to define the historical capabilities for messages that were quarantined as spoofing (DefaultFullAccessPolicy with no quarantine notifications). <br><br> Standard and Strict preset security policies use the default quarantine policy (DefaultFullAccessPolicy with no quarantine notifications) as described in the table [here](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features). <br><br> Admins can create and select custom quarantine policies that define more restrictive or less restrictive capabilities for users in the default or custom anti-phishing policies. For more information, see [Quarantine policies](quarantine-policies.md).|
|**Show first contact safety tip** <br><br> _EnableFirstContactSafetyTips_|Not selected <br><br> `$false`|Not selected <br><br> `$false`|Not selected <br><br> `$false`|For more information, see [First contact safety tip](set-up-anti-phishing-policies.md#first-contact-safety-tip).| |**Show (?) for unauthenticated senders for spoof** <br><br> _EnableUnauthenticatedSender_|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|Adds a question mark (?) to the sender's photo in Outlook for unidentified spoofed senders. For more information, see [Unauthenticated sender indicators](set-up-anti-phishing-policies.md#unauthenticated-sender-indicators).| |**Show "via" tag** <br><br> _EnableViaTag_|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|Adds a via tag (chris@contoso.com via fabrikam.com) to the From address if it's different from the domain in the DKIM signature or the **MAIL FROM** address. <br><br> For more information, see [Unauthenticated sender indicators](set-up-anti-phishing-policies.md#unauthenticated-sender-indicators).|
In PowerShell, you use the [Set-AtpPolicyForO365](/powershell/module/exchange/se
|Security feature name|Default|Built-in protection|Comment| ||::|::||
-|**Block the following URLs** <br><br> _ExcludedUrls_|Blank <br><br> `$null`|Blank <br><br> `$null`|We have no specific recommendation for this setting. <br><br> For more information, see ["Block the following URLs" list for Safe Links](safe-links.md#block-the-following-urls-list-for-safe-links). <br><br> **Note**: You can now manage block URL entries in the [Tenant Allow/Block List](allow-block-urls.md#create-block-url-entries-in-the-tenant-allowblock-list). The "Block the following URLs" list is in the process of being deprecated. We'll attempt to migrate existing entries from the "Block the following URLs" list to block URL entries in the Tenant Allow/Block List. Messages containing the blocked URL will be quarantined.|
+|**Block the following URLs** <br><br> _ExcludedUrls_|Blank <br><br> `$null`|Blank <br><br> `$null`|We have no specific recommendation for this setting. <br><br> For more information, see ["Block the following URLs" list for Safe Links](safe-links.md#block-the-following-urls-list-for-safe-links). <br><br> **Note**: You can now manage block URL entries in the [Tenant Allow/Block List](allow-block-urls.md#use-the-microsoft-365-defender-portal-to-create-block-entries-for-urls-in-the-tenant-allowblock-list). The "Block the following URLs" list is in the process of being deprecated. We'll attempt to migrate existing entries from the "Block the following URLs" list to block URL entries in the Tenant Allow/Block List. Messages containing the blocked URL will be quarantined.|
#### Safe Links policy settings
In PowerShell, you use the [New-SafeLinksPolicy](/powershell/module/exchange/new
|**Apply real-time URL scanning for suspicious links and links that point to files** <br><br> _ScanUrls_|Not selected <br><br> `$false`|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|| |**Wait for URL scanning to complete before delivering the message** <br><br> _DeliverMessageAfterScan_|Not selected <br><br> `$false`|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|| |**Do not rewrite URLs, do checks via Safe Links API only** <br><br> _DisableURLRewrite_|Not selected <br><br> `$false`|Selected <br><br> `$true`|Not selected <br><br> `$false`|Not selected <br><br> `$false`||
-|**Do not rewrite the following URLs in email** <br><br> _DoNotRewriteUrls_|Blank <br><br> `$null`|Blank <br><br> `$null`|Blank <br><br> `$null`|Blank <br><br> `$null`|We have no specific recommendation for this setting. <br><br> **Note**: Entries in the "Do not rewrite the following URLs" list are not scanned or wrapped by Safe Links during mail flow. Use [allow URL entries in the Tenant Allow/Block List](allow-block-urls.md#create-allow-url-entries) so URLs are not scanned or wrapped by Safe Links during mail flow _and_ at time of click.|
+|**Do not rewrite the following URLs in email** <br><br> _DoNotRewriteUrls_|Blank <br><br> `$null`|Blank <br><br> `$null`|Blank <br><br> `$null`|Blank <br><br> `$null`|We have no specific recommendation for this setting. <br><br> **Note**: Entries in the "Do not rewrite the following URLs" list are not scanned or wrapped by Safe Links during mail flow. Use [allow URL entries in the Tenant Allow/Block List](allow-block-urls.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-urls-in-the-submissions-portal) so URLs are not scanned or wrapped by Safe Links during mail flow _and_ at time of click.|
|**Action for potentially malicious URLs in Microsoft Teams**|||||| |**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams** <br><br> _EnableSafeLinksForTeams_|Not selected <br><br> `$false`|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|| |**Action for potentially malicious URLs in Microsoft Office apps**||||||
security Safe Links https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links.md
For more information about the order of precedence and how multiple policies are
## "Block the following URLs" list for Safe Links > [!NOTE]
-> You can now manage block URL entries in the [Tenant Allow/Block List](allow-block-urls.md#create-block-url-entries-in-the-tenant-allowblock-list). The "Block the following URLs" list is in the process of being deprecated. We'll attempt to migrate existing entries from the "Block the following URLs" list to block URL entries in the Tenant Allow/Block List. Messages containing the blocked URL will be quarantined.
+> You can now manage block URL entries in the [Tenant Allow/Block List](allow-block-urls.md#use-the-microsoft-365-defender-portal-to-create-block-entries-for-urls-in-the-tenant-allowblock-list). The "Block the following URLs" list is in the process of being deprecated. We'll attempt to migrate existing entries from the "Block the following URLs" list to block URL entries in the Tenant Allow/Block List. Messages containing the blocked URL will be quarantined.
The **Block the following URLs** list defines the links that are always blocked by Safe Links scanning in the following locations:
You configure the list of URLs in the global settings for Safe Links. For instru
**Notes**: -- For a truly universal list of URLs that are blocked everywhere, see [Manage the Tenant Allow/Block List](tenant-allow-block-list.md).
+- For a truly universal list of URLs that are blocked everywhere, see [Manage the Tenant Allow/Block List](manage-tenant-allow-block-list.md).
- Limits for the **Block the following URLs** list: - The maximum number of entries is 500. - The maximum length of an entry is 128 characters.
Examples of the values that you can enter and their results are described in the
## "Do not rewrite the following URLs" lists in Safe Links policies > [!NOTE]
-> Entries in the "Do not rewrite the following URLs" list are not scanned or wrapped by Safe Links during mail flow. Use [allow URL entries in the Tenant Allow/Block List](allow-block-urls.md#create-allow-url-entries) so URLs are not scanned or wrapped by Safe Links during mail flow _and_ at time of click.
+> Entries in the "Do not rewrite the following URLs" list are not scanned or wrapped by Safe Links during mail flow. Use [allow URL entries in the Tenant Allow/Block List](allow-block-urls.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-urls-in-the-submissions-portal) so URLs are not scanned or wrapped by Safe Links during mail flow _and_ at time of click.
Each Safe Links policy contains a **Do not rewrite the following URLs** list that you can use to specify URLs that are not rewritten by Safe Links scanning. In other words, the list allows users who are included in the policy to access the specified URLs that would otherwise be blocked by Safe Links. You can configure different lists in different Safe Links policies. Policy processing stops after the first (likely, the highest priority) policy is applied to the user. So, only one **Do not rewrite the following URLs** list is applied to a user who is included in multiple active Safe Links policies.
To add entries to the list in new or existing Safe Links policies, see [Create S
- Microsoft Teams - Office web apps
- For a truly universal list of URLs that are allowed everywhere, see [Manage the Tenant Allow/Block List](tenant-allow-block-list.md). However, note that URLs added there will not be excluded from Safe Links rewriting, as that must be done in a Safe Links policy.
+ For a truly universal list of URLs that are allowed everywhere, see [Manage the Tenant Allow/Block List](manage-tenant-allow-block-list.md). However, note that URLs added there will not be excluded from Safe Links rewriting, as that must be done in a Safe Links policy.
- Consider adding commonly used internal URLs to the list to improve the user experience. For example, if you have on-premises services, such as Skype for Business or SharePoint, you can add those URLs to exclude them from scanning. - If you already have **Do not rewrite the following URLs** entries in your Safe Links policies, be sure to review the lists and add wildcards as required. For example, your list has an entry like `https://contoso.com/a` and you later decide to include subpaths like `https://contoso.com/a/b`. Instead of adding a new entry, add a wildcard to the existing entry so it becomes `https://contoso.com/a/*`.
security Set Up Anti Phishing Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/set-up-anti-phishing-policies.md
The following spoof settings are available in anti-phishing policies in EOP and
When spoof intelligence is enabled, the **spoof intelligence insight** shows spoofed senders that were automatically detected and allowed or blocked by spoof intelligence. You can manually override the spoof intelligence verdict to allow or block the detected spoofed senders from within the insight. But when you do, the spoofed sender disappears from the spoof intelligence insight, and is now visible only on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoofed senders in the Tenant Allow/Block List. For more information, see the following articles: - [Spoof intelligence insight in EOP](learn-about-spoof-intelligence.md)
- - [Manage the Tenant Allow/Block List in EOP](tenant-allow-block-list.md)
+ - [Manage the Tenant Allow/Block List in EOP](manage-tenant-allow-block-list.md)
> [!NOTE] >
Unauthenticated sender indicators are part of the [Spoof settings](#spoof-settin
To prevent the question mark or via tag from being added to messages from specific senders, you have the following options: -- Allow the spoofed sender in the [spoof intelligence insight](learn-about-spoof-intelligence.md) or manually in the [Tenant Allow/Block List](tenant-allow-block-list.md). Allowing the spoofed sender will prevent the via tag from appearing in messages from the sender, even if the **Show "via" tag** setting is turned on in the policy.
+- Allow the spoofed sender in the [spoof intelligence insight](learn-about-spoof-intelligence.md) or manually in the [Tenant Allow/Block List](manage-tenant-allow-block-list.md). Allowing the spoofed sender will prevent the via tag from appearing in messages from the sender, even if the **Show "via" tag** setting is turned on in the policy.
- [Configure email authentication](email-validation-and-authentication.md#configure-email-authentication-for-domains-you-own) for the sender domain. - For the question mark in the sender's photo, SPF or DKIM are the most important. - For the via tag, confirm the domain in the DKIM signature or the **MAIL FROM** address matches (or is a subdomain of) the domain in the From address.
security Set Up Safe Links Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/set-up-safe-links-policies.md
Creating a custom Safe Links policy in the Microsoft 365 Defender portal creates
- **Do not rewrite the following URLs in email** section: Click **Manage (nn) URLs** to allow access to specific URLs that would otherwise be blocked by Safe Links. > [!NOTE]
- > Entries in the "Do not rewrite the following URLs" list are not scanned or wrapped by Safe Links during mail flow. Use [allow URL entries in the Tenant Allow/Block List](allow-block-urls.md#create-allow-url-entries) so URLs are not scanned or wrapped by Safe Links during mail flow _and_ at time of click.
+ > Entries in the "Do not rewrite the following URLs" list are not scanned or wrapped by Safe Links during mail flow. Use [URL allow entries in the Tenant Allow/Block List](allow-block-urls.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-urls-in-the-submissions-portal) so URLs are not scanned or wrapped by Safe Links during mail flow _and_ at time of click.
1. In the **Manage URLs to not rewrite** flyout that appears, click ![Add URLs icon.](../../media/m365-cc-sc-create-icon.png) **Add URLs**. 2. In the **Add URLs** flyout that appears, type the URL or value that you want, select the entry that appears below the box, and then click **Save**. Repeat this step as many times as necessary.
security Tenant Allow Block List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list.md
- Title: Manage your allows and blocks in the Tenant Allow/Block List
- - NOCSH
--- Previously updated :-
- - MET150
-
- - M365-security-compliance
-
-description: Admins can learn how to manage allows and blocks in the Tenant Allow/Block List in the Security portal.
--
-# Manage the Tenant Allow/Block List
--
-**Applies to**
-- [Exchange Online Protection](exchange-online-protection-overview.md)-- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)-- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)-
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, you might disagree with the EOP filtering verdict. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative).
-
-The Tenant Allow/Block List in the Microsoft 365 Defender portal gives you a way to manually override the Microsoft 365 filtering verdicts. The Tenant Allow/Block List is used during mail flow for incoming messages (does not apply to intra-org messages) and at the time of user clicks. You can specify the following types of overrides:
--- URLs to block.-- Files to block.-- Email domains or addresses to block.-- Spoofed senders to allow or block. If you override the allow or block verdict in the [spoof intelligence insight](learn-about-spoof-intelligence.md), the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoofed senders here before they're detected by spoof intelligence.-- URLs to allow.-- Files to allow.-- Email domains or addresses to allow.-
-This article describes how to configure entries in the Tenant Allow/Block List in the Microsoft 365 Defender portal or in PowerShell (Exchange Online PowerShell for Microsoft 365 organizations with mailboxes in Exchange Online; standalone EOP PowerShell for organizations without Exchange Online mailboxes).
-
-> [!NOTE]
-> The ["Block the following URLs" list in Safe Links policies](safe-links.md#block-the-following-urls-list-for-safe-links) is in the process of being deprecated. You can now manage block URL entries in the Tenant Allow/Block List. We'll attempt to migrate existing entries from the "Block the following URLs" list to block URL entries in the Tenant Allow/Block List. Messages containing the blocked URL will be quarantined.
-
-## What do you need to know before you begin?
--- You open the Microsoft 365 Defender portal at <https://security.microsoft.com>. To go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.--- You specify files by using the SHA256 hash value of the file. To find the SHA256 hash value of a file in Windows, run the following command in a Command Prompt:-
- ```DOS
- certutil.exe -hashfile "<Path>\<Filename>" SHA256
- ```
-
- An example value is `768a813668695ef2483b2bde7cf5d1b2db0423a0d3e63e498f3ab6f2eb13ea3a`. Perceptual hash (pHash) values are not supported.
--- The available URL values are described in the [URL syntax for the Tenant Allow/Block List](#url-syntax-for-the-tenant-allowblock-list) section later in this article.--- The Tenant Allow/Block List has the following limits:
- - 500 entries for domains & addresses.
- - 500 entries for URLs.
- - 500 entries for file hashes.
- - 1024 entries for spoofing (spoofed senders).
--- Entries in the Tenant Allow/Block List have the following limits:
- - 64 character for file hashes.
- - 250 characters for URLs.
--- 99.99% of entries should be active within 30 minutes. Entries that aren't active within 30 minutes can take up to 24 hours. --- Email addresses & domains does not support punycode.--- By default, entries in the Tenant Allow/Block List will expire after 30 days. You can specify a date or set them to never expire (for blocks only).--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- You need to be assigned permissions in **Exchange Online** before you can do the procedures in this article:
- - To add and remove entries from the Tenant Allow/Block List, you need to be a member of one of the following role groups:
- - **Organization Management** (the **Security admin** role).
- - **Security Administrator** (the **Security admin** role).
- - **Security Operator** (the **Tenant AllowBlockList Manager** role).
-
- - For read-only access to the Tenant Allow/Block List, you need to be a member of one of the following role groups:
- - **Global Reader** role group.
- - **Security Reader** role group.
- - **View-Only Configuration** role group.
-
- For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
-
- > [!NOTE]
- >
- > - Adding users to the corresponding Azure Active Directory role in the Microsoft 365 admin center gives users the required permissions *and* permissions for other features in Microsoft 365. For more information, see [About admin roles](../../admin/add-users/about-admin-roles.md).
- > - The **View-Only Organization Management** role group in [Exchange Online](/Exchange/permissions-exo/permissions-exo#role-groups) also gives read-only access to the feature.
-
-## Configure the Tenant Allow/Block List
-
-### Use the Microsoft 365 Defender portal
-
-In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. To go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-To add all blocks, see [Add blocks in the Tenant Allow/Block List](manage-tenant-blocks.md).
-
-To add all allows, see [Add allows in the Tenant Allow/Block List](manage-tenant-allows.md).
-
-To modify and remove all blocks and allows, see [Modify and remove entries in the Tenant Allow/Block List](modify-remove-entries-tenant-allow-block.md).
-
-### Use Exchange Online PowerShell or standalone EOP PowerShell
-
-To manage all allows and blocks, see [Add blocks in the Tenant Allow/Block List](manage-tenant-blocks.md), [Add allows in the Tenant Allow/Block List](manage-tenant-allows.md), and [Modify and remove entries in the Tenant Allow/Block List](modify-remove-entries-tenant-allow-block.md).
-
-## View entries in the Tenant Allow/Block List
-
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. Select the tab you want. The columns that are available depend on the tab you selected:
-
- - **Domains & addresses**:
- - **Value**: The domain or email address.
- - **Action**: The value **Allow** or **Block**.
- - **Modified by**
- - **Last updated**
- - **Remove on**
- - **Notes**
- - **Spoofed senders**
- - **Spoofed user**
- - **Sending infrastructure**
- - **Spoof type**: The value **Internal** or **External**.
- - **Action**: The value **Block** or **Allow**.
- - **URLs**:
- - **Value**: The URL.
- - **Action**: The value **Allow** or **Block**.
- - **Modified by**
- - **Last updated**
- - **Remove on**
- - **Notes**
- - **Files**
- - **Value**: The file hash.
- - **Action**: The value **Allow** or **Block**.
- - **Modified by**
- - **Last updated**
- - **Remove on**
- - **Notes**
-
- You can click on a column heading to sort in ascending or descending order.
-
- You can click **Group** to group the results. The values that are available depend on the tab you selected:
-
- - **Domains & addresses**: You can group the results by **Action**.
- - **Spoofed senders**: You can group the results by **Action** or **Spoof type**.
- - **URLs**: You can group the results by **Action**.
- - **Files**: You can group the results by **Action**.
-
- Click **Search**, enter all or part of a value, and then press ENTER to find a specific value. When you're finished, click ![Clear search icon.](../../media/m365-cc-sc-close-icon.png) **Clear search**.
-
- Click **Filter** to filter the results. The values that are available in **Filter** flyout that appears depend on the tab you selected:
-
- - **Domains & addresses**
- - **Action**
- - **Never expire**
- - **Last updated date**
- - **Remove on**
- - **Spoofed senders**
- - **Action**
- - **Spoof type**
- - **URLs**
- - **Action**
- - **Never expire**
- - **Last updated date**
- - **Remove on**
- - **Files**
- - **Action**
- - **Never expire**
- - **Last updated**
- - **Remove on**
-
- When you're finished, click **Apply**. To clear existing filters, click **Filter**, and in the **Filter** flyout that appears, click **Clear filters**.
-
-3. When you're finished, click **Add**.
-
-## View domains & addresses, file or URL entries in the Tenant Allow/Block List
-
-To view block domains & addresses, file or URL entries in the Tenant Allow/Block List, use the following syntax:
-
-```powershell
-Get-TenantAllowBlockListItems -ListType <Sender | FileHash | URL> [-Entry <SenderValue | FileHashValue | URLValue>] [<-ExpirationDate Date | -NoExpiration>]
-```
-
-This example returns information for the specified file hash value.
-
-```powershell
-Get-TenantAllowBlockListItems -ListType FileHash -Entry "9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08"
-```
-
-This example returns all blocked URLs.
-
-```powershell
-Get-TenantAllowBlockListItems -ListType Url -Block
-```
-
-For detailed syntax and parameter information, see [Get-TenantAllowBlockListItems](/powershell/module/exchange/get-tenantallowblocklistitems).
-
-## View spoofed sender entries
-
-To view spoofed sender entries in the Tenant Allow/Block List, use the following syntax:
-
-```powershell
-Get-TenantAllowBlockListSpoofItems [-Action <Allow | Block>] [-SpoofType <External | Internal>
-```
-
-This example returns all spoofed sender entries in the Tenant Allow/Block List.
-
-```powershell
-Get-TenantAllowBlockListSpoofItems
-```
-
-This example returns all allow spoofed sender entries that are internal.
-
-```powershell
-Get-TenantAllowBlockListSpoofItems -Action Allow -SpoofType Internal
-```
-
-This example returns all blocked spoofed sender entries that are external.
-
-```powershell
-Get-TenantAllowBlockListSpoofItems -Action Block -SpoofType External
-```
-
-For detailed syntax and parameter information, see [Get-TenantAllowBlockListSpoofItems](/powershell/module/exchange/get-tenantallowblocklistspoofitems).
-
-## URL syntax for the Tenant Allow/Block List
--- IPv4 and IPv6 addresses are allowed, but TCP/UDP ports are not.--- Filename extensions are not allowed (for example, test.pdf).--- Unicode is not supported, but Punycode is.--- Hostnames are allowed if all of the following statements are true:
- - The hostname contains a period.
- - There is at least one character to the left of the period.
- - There are at least two characters to the right of the period.
-
- For example, `t.co` is allowed; `.com` or `contoso.` are not allowed.
--- Subpaths are not implied for allows.-
- For example, `contoso.com` does not include `contoso.com/a`.
--- Wildcards (*) are allowed in the following scenarios:-
- - A left wildcard must be followed by a period to specify a subdomain. (only applicable for blocks)
-
- For example, `*.contoso.com` is allowed; `*contoso.com` is not allowed.
-
- - A right wildcard must follow a forward slash (/) to specify a path.
-
- For example, `contoso.com/*` is allowed; `contoso.com*` or `contoso.com/ab*` are not allowed.
-
- - `*.com*` is invalid (not a resolvable domain and the right wildcard does not follow a forward slash).
-
- - Wildcards are not allowed in IP addresses.
--- The tilde (~) character is available in the following scenarios:-
- - A left tilde implies a domain and all subdomains.
-
- For example `~contoso.com` includes `contoso.com` and `*.contoso.com`.
--- A username or password isn't supported or required.--- Quotes (' or ") are invalid characters.--- A URL should include all redirects where possible.-
-### URL entry scenarios
-
-Valid URL entries and their results are described in the following sections.
-
-#### Scenario: No wildcards
-
-**Entry**: `contoso.com`
--- **Allow match**: contoso.com--- **Allow not matched**:
- - abc-contoso.com
- - contoso.com/a
- - payroll.contoso.com
- - test.com/contoso.com
- - test.com/q=contoso.com
- - www.contoso.com
- - www.contoso.com/q=a@contoso.com
--- **Block match**:
- - contoso.com
- - contoso.com/a
- - payroll.contoso.com
- - test.com/contoso.com
- - test.com/q=contoso.com
- - www.contoso.com
- - www.contoso.com/q=a@contoso.com
--- **Block not matched**: abc-contoso.com-
-#### Scenario: Left wildcard (subdomain)
-
-> [!NOTE]
-> This scenario applies only to blocks.
-
-**Entry**: `*.contoso.com`
--- **Block match**:
- - www.contoso.com
- - xyz.abc.contoso.com
--- **Block not matched**:
- - 123contoso.com
- - contoso.com
- - test.com/contoso.com
- - www.contoso.com/abc
-
-#### Scenario: Right wildcard at top of path
-
-**Entry**: `contoso.com/a/*`
--- **Allow match** and **Block match**:
- - contoso.com/a/b
- - contoso.com/a/b/c
- - contoso.com/a/?q=joe@t.com
--- **Allow not matched** and **Block not matched**:
- - contoso.com
- - contoso.com/a
- - www.contoso.com
- - www.contoso.com/q=a@contoso.com
-
-#### Scenario: Left tilde
-
-**Entry**: `~contoso.com`
--- **Allow match** and **Block match**:
- - contoso.com
- - www.contoso.com
- - xyz.abc.contoso.com
--- **Allow not matched** and **Block not matched**:
- - 123contoso.com
- - contoso.com/abc
- - www.contoso.com/abc
-
-#### Scenario: Right wildcard suffix
-
-**Entry**: `contoso.com/*`
--- **Allow match** and **Block match**:
- - contoso.com/?q=whatever@fabrikam.com
- - contoso.com/a
- - contoso.com/a/b/c
- - contoso.com/ab
- - contoso.com/b
- - contoso.com/b/a/c
- - contoso.com/ba
--- **Allow not matched** and **Block not matched**: contoso.com-
-#### Scenario: Left wildcard subdomain and right wildcard suffix
-
-> [!NOTE]
-> This scenario applies only to blocks.
-
-**Entry**: `*.contoso.com/*`
--- **Block match**:
- - abc.contoso.com/ab
- - abc.xyz.contoso.com/a/b/c
- - www.contoso.com/a
- - www.contoso.com/b/a/c
- - xyz.contoso.com/ba
--- **Block not matched**: contoso.com/b-
-#### Scenario: Left and right tilde
-
-**Entry**: `~contoso.com~`
--- **Allow match** and **Block match**:-
- - contoso.com
- - contoso.com/a
- - www.contoso.com
- - www.contoso.com/b
- - xyz.abc.contoso.com
--- **Allow not matched** and **Block not matched**:-
- - 123contoso.com
- - contoso.org
-
-#### Scenario: IP address
-
-**Entry**: `1.2.3.4`
--- **Allow match** and **Block match**: 1.2.3.4--- **Allow not matched** and **Block not matched**:-
- - 1.2.3.4/a
- - 11.2.3.4/a
-
-#### IP address with right wildcard
-
-**Entry**: `1.2.3.4/*`
--- **Allow match** and **Block match**:-
- - 1.2.3.4/b
- - 1.2.3.4/baaaa
-
-### Examples of invalid entries
-
-The following entries are invalid:
--- **Missing or invalid domain values**:-
- - contoso
- - \*.contoso.\*
- - \*.com
- - \*.pdf
--- **Wildcard on text or without spacing characters**:-
- - \*contoso.com
- - contoso.com\*
- - \*1.2.3.4
- - 1.2.3.4\*
- - contoso.com/a\*
- - contoso.com/ab\*
--- **IP addresses with ports**:-
- - contoso.com:443
- - abc.contoso.com:25
--- **Non-descriptive wildcards**:-
- - \*
- - \*.\*
--- **Middle wildcards**:-
- - conto\*so.com
- - conto~so.com
--- **Double wildcards**-
- - contoso.com/\*\*
- - contoso.com/\*/\*
-
-## Domain pair syntax for spoofed sender entries in the Tenant Allow/Block List
-
-A domain pair for a spoofed sender in the Tenant Allow/Block List uses the following syntax: `<Spoofed user>, <Sending infrastructure>`.
--- **Spoofed user**: This value involves the email address of the spoofed user that's displayed in the **From** box in email clients. This address is also known as the `5322.From` address. Valid values include:
- - An individual email address (for example, chris@contoso.com).
- - An email domain (for example, contoso.com).
- - The wildcard character (for example, \*).
--- **Sending infrastructure**: This value indicates the source of messages from the spoofed user. Valid values include:
- - The domain found in a reverse DNS lookup (PTR record) of the source email server's IP address (for example, fabrikam.com).
- - If the source IP address has no PTR record, then the sending infrastructure is identified as \<source IP\>/24 (for example, 192.168.100.100/24).
- - A verified DKIM domain.
-
-Here are some examples of valid domain pairs to identify spoofed senders:
--- `contoso.com, 192.168.100.100/24`-- `chris@contoso.com, fabrikam.com`-- `*, contoso.net`-
-The maximum number of spoofed sender entries is 1000.
-
-Adding a domain pair only allows or blocks the *combination* of the spoofed user *and* the sending infrastructure. It does not allow email from the spoofed user from any source, nor does it allow email from the sending infrastructure source for any spoofed user.
-
-For example, you add an allow entry for the following domain pair:
--- **Domain**: gmail.com-- **Infrastructure**: tms.mx.com-
-Only messages from that domain *and* sending infrastructure pair are allowed to spoof. Other senders attempting to spoof gmail.com aren't allowed. Messages from senders in other domains originating from tms.mx.com are checked by spoof intelligence.
-
-## What to expect after you add an allow or block entry
-
-After you add an allow entry through the Submissions portal or a block entry in the Tenant Allow/Block List, the entry should start working immediately once the entry is active. 99.99% of entries should be active within 30 minutes. Entries that aren't active within 30 minutes can take up to 24 hours.
-
-We recommend letting entries automatically expire after 30 days to see if the system has learned about the allow or block. If not, you should make another entry to give the system another 30 days to learn.
security Tenant Wide Setup For Increased Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-wide-setup-for-increased-security.md
The Microsoft 365 Defender portal includes capabilities that protect your enviro
|Area|Default policy?|Recommendation| ||||
-|**Anti-phishing**|Yes|Configure the default anti-phishing policy as described here: [Configure anti-phishing protection settings in EOP and Defender for Office 365](protect-against-threats.md#part-2anti-phishing-protection-in-eop-and-defender-for-office-365). <p> More information: <ul><li>[Anti-phishing policies in Microsoft 365](set-up-anti-phishing-policies.md)</li><li>[Recommended anti-phishing policy settings in Microsoft Defender for Office 365](recommended-settings-for-eop-and-office365.md#anti-phishing-policy-settings-in-microsoft-defender-for-office-365)</li><li> [Impersonation insight](impersonation-insight.md)</li><li>[Spoof intelligence insight in EOP](learn-about-spoof-intelligence.md)</li><li>[Manage the Tenant Allow/Block List](tenant-allow-block-list.md).</li></ul>|
+|**Anti-phishing**|Yes|Configure the default anti-phishing policy as described here: [Configure anti-phishing protection settings in EOP and Defender for Office 365](protect-against-threats.md#part-2anti-phishing-protection-in-eop-and-defender-for-office-365). <p> More information: <ul><li>[Anti-phishing policies in Microsoft 365](set-up-anti-phishing-policies.md)</li><li>[Recommended anti-phishing policy settings in Microsoft Defender for Office 365](recommended-settings-for-eop-and-office365.md#anti-phishing-policy-settings-in-microsoft-defender-for-office-365)</li><li> [Impersonation insight](impersonation-insight.md)</li><li>[Spoof intelligence insight in EOP](learn-about-spoof-intelligence.md)</li><li>[Manage the Tenant Allow/Block List](manage-tenant-allow-block-list.md).</li></ul>|
|**Anti-Malware Engine**|Yes|Configure the default anti-malware policy as described here: [Configure anti-malware protection settings in EOP](protect-against-threats.md#part-1anti-malware-protection-in-eop). <p> More information: <ul><li>[Anti-malware protection](anti-malware-protection.md)</li><li>[Recommended anti-malware policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-malware-policy-settings)</li><li>[Configure anti-malware policies](configure-anti-malware-policies.md)</li></ul>| |**Safe Attachments in Defender for Office 365**|No|Configure the global settings for Safe Attachments and create a Safe Attachments policy as described here: [Configure Safe Attachments settings in Microsoft Defender for Office 365](protect-against-threats.md#safe-attachments-policies-in-microsoft-defender-for-office-365). <p> More information: <ul><li>[Recommended Safe Attachments settings](recommended-settings-for-eop-and-office365.md#safe-attachments-settings)</li><li>[Safe Attachments in Microsoft Defender for Office 365](safe-attachments.md)</li><li>[Set up Safe Attachments policies](set-up-safe-attachments-policies.md)</li><li>[Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](mdo-for-spo-odb-and-teams.md)</li><li>[Safe Documents in Microsoft 365 E5](safe-docs.md)</li></ul>| |**Safe Links in Microsoft Defender for Office 365**|No|Create a Safe Links policy as described here: [Configure Safe Links settings in Microsoft Defender for Office 365](protect-against-threats.md#safe-links-policies-in-microsoft-defender-for-office-365). <p> More information: <ul><li>[Recommended Safe Links settings](recommended-settings-for-eop-and-office365.md#safe-links-settings)</li><li>[Set up Safe Links policies](set-up-safe-links-policies.md)</li><li>[Safe Links in Microsoft Defender for Office 365](safe-links.md)</li></ul>|
security Try Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/try-microsoft-defender-for-office-365.md
When you evaluate Defender for Office 365, the policies that control protection
**Notes**: -- Safe Links will detonate URLs in mail flow. To prevent specific URLs from being detonated, use the Tenant Allow/Block List. For more information, see [Manage the Tenant Allow/Block List](tenant-allow-block-list.md).
+- Safe Links will detonate URLs in mail flow. To prevent specific URLs from being detonated, use the Tenant Allow/Block List. For more information, see [Manage the Tenant Allow/Block List](manage-tenant-allow-block-list.md).
- Safe Links doesn't wrap URL links in email message bodies. - The evaluation policy settings are described in the [Evaluation policy settings](#evaluation-policy-settings) section later in this article.
security Tuning Anti Phishing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tuning-anti-phishing.md
Specifically, you should check the **X-Forefront-Antispam-Report** header field
- For messages that end up in quarantine by mistake, or for messages that are allowed through, we recommend that you search for those messages in [Threat Explorer and real-time detections](threat-explorer.md). You can search by sender, recipient, or message ID. After you locate the message, go to details by clicking on the subject. For a quarantined message, look to see what the "detection technology" was so that you can use the appropriate method to override. For an allowed message, look to see which policy allowed the message. -- Email from spoofed senders (the From address of the message doesn't match the source of the message) is classified as phishing in Defender for Office 365. Sometimes spoofing is benign, and sometimes users don't want messages from specific spoofed sender to be quarantined. To minimize the impact to users, periodically review the [spoof intelligence insight](learn-about-spoof-intelligence.md), the **Spoofed senders** tab in the [Tenant Allow/Block List](tenant-allow-block-list.md), and the [Spoof detections report](view-email-security-reports.md#spoof-detections-report). Once you have reviewed allowed and blocked spoofed senders and made any necessary overrides, you can be confident to [configure spoof intelligence in anti-phishing policies](set-up-anti-phishing-policies.md#spoof-settings) to **Quarantine** suspicious messages instead of delivering them to the user's Junk Email folder.
+- Email from spoofed senders (the From address of the message doesn't match the source of the message) is classified as phishing in Defender for Office 365. Sometimes spoofing is benign, and sometimes users don't want messages from specific spoofed sender to be quarantined. To minimize the impact to users, periodically review the [spoof intelligence insight](learn-about-spoof-intelligence.md), the **Spoofed senders** tab in the [Tenant Allow/Block List](manage-tenant-allow-block-list.md), and the [Spoof detections report](view-email-security-reports.md#spoof-detections-report). Once you have reviewed allowed and blocked spoofed senders and made any necessary overrides, you can be confident to [configure spoof intelligence in anti-phishing policies](set-up-anti-phishing-policies.md#spoof-settings) to **Quarantine** suspicious messages instead of delivering them to the user's Junk Email folder.
- You can repeat the above step for Impersonation (domain or user) in Microsoft Defender for Office 365. The Impersonation report is found under **Threat Management** \> **Dashboard** \> **Insights**.
security Use Dmarc To Validate Email https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/use-dmarc-to-validate-email.md
Microsoft 365 is configured like this because some legitimate email may fail DMA
- Users add safe senders individually by using their email client. -- Admins can use the [spoof intelligence insight](learn-about-spoof-intelligence.md) or the [Tenant Allow/Block List](tenant-allow-block-list.md) to allow messages from the spoofed sender.
+- Admins can use the [spoof intelligence insight](learn-about-spoof-intelligence.md) or the [Tenant Allow/Block List](manage-tenant-allow-block-list.md) to allow messages from the spoofed sender.
- Admins create an Exchange mail flow rule (also known as a transport rule) for all users that allows messages for those particular senders.
Want more information about DMARC? These resources can help.
[**Use DKIM to validate outbound email sent from your custom domain in Microsoft 365**](use-dkim-to-validate-outbound-email.md)
-[Use trusted ARC Senders for legitimate mailflows](/microsoft-365/security/office-365-security/use-arc-exceptions-to-mark-trusted-arc-senders?view=o365-21vianet)
+[Use trusted ARC Senders for legitimate mailflows](/microsoft-365/security/office-365-security/use-arc-exceptions-to-mark-trusted-arc-senders?view=o365-21vianet&preserve-view=true)
security Walkthrough Spoof Intelligence Insight https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/walkthrough-spoof-intelligence-insight.md
- [Microsoft 365 Defender](../defender/microsoft-365-defender.md) > [!IMPORTANT]
-> Spoofed sender management in the Microsoft 365 Defender portal is now available only on the **Spoofing** tab in the Tenant Allow/Block List. For current procedures in the Microsoft 365 Defender portal, see [Spoof intelligence insight in EOP](learn-about-spoof-intelligence.md).
+> Spoofed sender management in the Microsoft 365 Defender portal is now available only on the **Spoofed senders** tab in the Tenant Allow/Block List. For current procedures in the Microsoft 365 Defender portal, see [Spoof intelligence insight in EOP](learn-about-spoof-intelligence.md).
> > Spoofed sender management in Exchange Online PowerShell or Standalone EOP PowerShell is in the process of being migrated exclusively to the related **\*-TenantAllowBlockListSpoofItems**, **Get-SpoofIntelligenceInsight**, and **Get-SpoofMailReport** cmdlets. For procedures using these cmdlets, see the following articles: >
-> - [View spoofed sender entries using PowerShell](tenant-allow-block-list.md#view-spoofed-sender-entries)
-> - [Add spoofed sender allow entries using PowerShell](manage-tenant-allows.md#add-spoofed-sender-allow-entries-using-powershell)
-> - [Add spoofed sender block entries using PowerShell](manage-tenant-blocks.md#add-spoofed-sender-block-entries)
-> - [Modify spoofed sender entries using PowerShell](modify-remove-entries-tenant-allow-block.md#modify-allow-or-block-spoofed-sender-entries-from-the-tenant-allowblock-list)
-> - [Remove spoofed sender entries using PowerShell](modify-remove-entries-tenant-allow-block.md#remove-allow-or-block-spoofed-sender-entries-from-the-tenant-allowblock-list)
+> - [Use PowerShell to view allow or block entries for spoofed senders in the Tenant Allow/Block List](allow-block-email-spoof.md#use-powershell-to-view-allow-or-block-entries-for-spoofed-senders-in-the-tenant-allowblock-list)
+> - [Use PowerShell to create allow entries for spoofed senders](allow-block-email-spoof.md#use-powershell-to-create-allow-entries-for-spoofed-senders-in-the-tenant-allowblock-list)
+> - [Use PowerShell to create block entries for spoofed senders](allow-block-email-spoof.md#use-powershell-to-create-block-entries-for-spoofed-senders-in-the-tenant-allowblock-list)
+> - [Use PowerShell to modify allow or block entries for spoofed senders in the Tenant Allow/Block List](allow-block-email-spoof.md#use-powershell-to-modify-allow-or-block-entries-for-spoofed-senders-in-the-tenant-allowblock-list)
+> - [Use PowerShell to remove allow or block entries for spoofed senders from the Tenant Allow/Block List](allow-block-email-spoof.md#use-powershell-to-remove-allow-or-block-entries-for-spoofed-senders-from-the-tenant-allowblock-list)
> > The older spoofed sender management experience using the **Get-PhishFilterPolicy** and **Set-PhishFilterPolicy** cmdlets is in the process of being deprecated, but is still presented in this article for completeness until the cmdlets are removed everywhere.
security Whats New In Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/whats-new-in-defender-for-office-365.md
For more information on what's new with other Microsoft Defender security produc
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new) - [What's new in Microsoft Cloud App Security](/cloud-app-security/release-notes)
+## August 2022
+
+**Automatic redirection from Office 365 Security and Compliance Center to Microsoft 365 Defender portal:** Automatic redirection begins for users accessing the security solutions in Office 365 Security and Compliance center (protection.office.com) to the appropriate solutions in Microsoft 365 Defender portal (security.microsoft.com). This is for all security workflows like: Alerts, Threat Management, and Reports.
+- Redirection URLs:
+ - GCC Environment:
+ - From Office 365 Security & Compliance Center URL: protection.office.com
+ - To Microsoft 365 Defender URL: security.microsoft.com
+ - GCC-High Environment:
+ - From Office 365 Security & Compliance Center URL: scc.office365.us
+ - To Microsoft 365 Defender URL: security.microsoft.us
+ - DoD Environment:
+ - From Office 365 Security & Compliance Center URL: scc.protection.apps.mil
+ - To Microsoft 365 Defender URL: security.apps.mil
+- Items in the Office 365 Security and Compliance Center that are not related to security aren't redirected to Microsoft 365 Defender. For compliance solutions redirection to Microsoft 365 Compliance Center, see Message Center post 244886.
+- This is a continuation of [Microsoft 365 Defender delivers unified XDR experience to GCC, GCC High and DoD customers - Microsoft Tech Community](https://techcommunity.microsoft.com/t5/public-sector-blog/microsoft-365-defender-delivers-unified-xdr-experience-to-gcc/ba-p/3263702), announced in March 2022.
+- This change enables users to view and manage additional Microsoft 365 Defender security solutions in one portal.
+- This change impacts all customers who use the Office 365 Security and Compliance Center (protection.office.com), including Microsoft Defender for Office (Plan 1 or Plan 2), Microsoft 365 E3 / E5, Office 365 E3/ E5, and Exchange Online Protection. For the full list, see [Security & Compliance Center - Service Descriptions | Microsoft Docs](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance)
+- This change impacts all users who log in to the Office 365 Security and Compliance portal (protection.office.com), including security teams and end-users who access the Email Quarantine experience, at the **Microsoft Defender Portal** > **Review** > **Quarantine**.
+- Redirection is enabled by default and impacts all users of the Tenant.
+- Global Administrators and Security Administrators can turn on or off redirection in the Microsoft 365 Defender portal by navigating to **Settings** > **Email & collaboration** > **Portal redirection** and switch the redirection toggle.
+ ## July 2022 -- [Introducing actions into the email entity page](mdo-email-entity-page.md): Admins can take preventative, remediation and submission actions from emial entity page.
+- [Introducing actions into the email entity page](mdo-email-entity-page.md): Admins can take preventative, remediation and submission actions from email entity page.
## June 2022 -- [Spoofing allows using admin submission](allow-block-email-spoof.md#use-admin-submission-in-the-microsoft-365-defender-portal-to-create-allowed-spoofed-sender-entries): Create allowed spoofed sender entries using the Tenant Allow/Block List.
+- [Use the Microsoft 365 Defender portal to create allow entries for spoofed senders in the Submissions portal](allow-block-email-spoof.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-spoofed-senders-in-the-submissions-portal): Create allowed spoofed sender entries using the Tenant Allow/Block List.
-- [Impersonation allows using admin submission](allow-block-email-spoof.md#create-impersonated-sender-entries): Add allows for impersonated senders using the Submissions page in Microsoft 365 Defender.
+- [Impersonation allows using admin submission](allow-block-email-spoof.md#about-impersonated-domains-or-senders): Add allows for impersonated senders using the Submissions page in Microsoft 365 Defender.
- [View converted admin submission from user submission](admin-submission.md#convert-user-reported-messages-from-the-custom-mailbox-into-an-admin-submission): Configure the custom mailbox to intercept user-reported messages without sending the messages to Microsoft for analysis.
For more information on what's new with other Microsoft Defender security produc
- (Choose to) Apply Preset Strict/Standard policies to entire organization and avoid the hassle of selecting specific recipient users, groups, or domains, thereby securing all recipient users of your organization. - Configure impersonation protection settings for custom users and custom domains within Preset Strict/Standard policies and automatically protect your targeted users and targeted domain against impersonation attacks. -- [Simplifying the quarantine experience (part two) in Microsoft 365 Defender for office 365](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/simplifying-the-quarantine-experience-part-two/ba-p/3354687): Highlights additional features to make the quarantine experience even more easy to use.
+- [Simplifying the quarantine experience (part two) in Microsoft 365 Defender for office 365](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/simplifying-the-quarantine-experience-part-two/ba-p/3354687): Highlights additional features to make the quarantine experience even easier to use.
## April 2022
For more information on what's new with other Microsoft Defender security produc
## August 2021 - [Admin review for reported messages](admin-review-reported-message.md): Admins can now send templated messages back to end users after they review reported messages. The templates can be customized for your organization and based on your admin's verdict as well.-- [Add allows in the Tenant Allow/Block List](manage-tenant-allows.md): You can now add allow entries to the Tenant Allow/Block List if the blocked message was submitted as part of the admin submission process. Depending on the nature of the block, the submitted URL, file, and/or sender allow will be added to the Tenant Allow/Block List. In most cases, the allows are added to give the system some time and allow it naturally if warranted. In some cases, Microsoft manages the allow for you.
+- ou can now add allow entries to the Tenant Allow/Block List if the blocked message was submitted as part of the admin submission process. Depending on the nature of the block, the submitted URL, file, and/or sender allow will be added to the Tenant Allow/Block List. In most cases, the allows are added to give the system some time and allow it naturally if warranted. In some cases, Microsoft manages the allow for you. For more information, see:
+ - [Use the Microsoft 365 Defender portal to create allow entries for URLs in the Submissions portal](allow-block-urls.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-urls-in-the-submissions-portal)
+ - [Use the Microsoft 365 Defender portal to create allow entries for files in the Submissions portal](allow-block-files.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-files-in-the-submissions-portal)
+ - [Use the Microsoft 365 Defender portal to create allow entries for domains and email addresses in the Submissions portal](allow-block-email-spoof.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-domains-and-email-addresses-in-the-submissions-portal)
## July 2021
For more information on what's new with other Microsoft Defender security produc
## June 2021 -- New first contact safety tip setting within anti-phishing policies. This safety tip is shown when recipients first receive an email from a sender or do not often receive email from a sender. For more information on this setting and how to configure it, see the following articles:
+- New first contact safety tip setting within anti-phishing policies. This safety tip is shown when recipients first receive an email from a sender or don't often receive email from a sender. For more information on this setting and how to configure it, see the following articles:
- [First contact safety tip](set-up-anti-phishing-policies.md#first-contact-safety-tip) - [Configure anti-phishing policies in EOP](configure-anti-phishing-policies-eop.md) - [Configure anti-phishing policies in Microsoft Defender for Office 365](configure-mdo-anti-phishing-policies.md)