Loading...

Microsoft Defender for Office 365: Tenant Allow Block List to Support URL Top-Level Domain Blocking

Microsoft Defender for Office 365: Tenant Allow Block List to Support URL Top-Level Domain Blocking

Microsoft will soon be introducing a new feature for Microsoft Defender for Office 365 that allows users to block URLs based on their top-level domain. Users can create entries in the Microsoft 365 Defender portal or PowerShell using the format "*.TLD/", where TLD refers to any top-level domain like .net, .biz, .io, .movie, country codes like .in, .us, .ru, etc. The feature applies to customers with Exchange Online Protection, Microsoft Defender for Office plan 1, or plan 2 service plans. The new feature will not affect existing Tenant Allow Block List entries, and no changes are required for preparation. The rollout of the feature will begin in late September 2023 and will be completed by late October 2023. This message is associated with Microsoft 365 Roadmap ID 115506.

Once the feature is complete, all URLs related to "*.TLD/" will be blocked, including subdomains, domains, or sub-paths during mail flow, and at the time of click across Microsoft Teams and Office apps if Safe Links are enabled.

Microsoft Defender for Office 365 enables organizations to protect their systems from various attacks and suspicious activities. This new feature will provide additional security to customers by enabling them to block URLs based on their top-level domains and protect against malwares.

The post Microsoft Defender for Office 365: Tenant Allow Block List to Support URL Top-Level Domain Blocking appeared first on M365 Admin.

Published on:

Learn more
M365 Admin
M365 Admin

by João Ferreira

Share post:

Related posts

Microsoft Defender for Office 365: Enhanced multiple action experience from Threat explorer

Microsoft Defender for Office 365 has introduced enhancements to its Threat explorer feature, enabling SecOps personnel to take multiple actio...

2 months ago

Microsoft Defender for Office 365: Admins can block top level domain addresses within Tenant Allow/Block List

Microsoft Defender for Office 365 has released a new feature that allows admins to block top level domain addresses within the Tenant Allow/Bl...

2 months ago

Microsoft Defender for Office 365: Tenant Allow Block list in GCC, GCCH, and DoD

Microsoft Defender for Office 365 is set to bring its Tenant Allow/Block list functionality to GCC, GCCH, and DoD. This move will provide admi...

3 months ago

Microsoft Defender for Office 365: Last used date inside Tenant Allow Block List

Microsoft Defender for Office 365 releases an update to Tenant allow block list domains & addresses, URL, and file entries to display their la...

8 months ago

Microsoft Defender for Office 365: Tenant Allow/Block List domain & addresses block to send inbound emails to admin quarantine

The latest update to Microsoft Defender for Office 365 addresses an important issue concerning the Tenant Allow/Block List. Previously, when a...

1 year ago

Microsoft Defender for Office 365: Built-in Protection Time of Click URL Email Protection

Microsoft Defender for Office 365 customers will soon be able to benefit from enhanced security features as the final remaining aspect of the ...

1 year ago

Microsoft Defender for Office 365: Limitless Tenant Allow/Block List

Microsoft is updating its Defender for Office 365 security platform to allow customers with MDO P2 or E5 security to create unlimited block an...

1 year ago

Microsoft Defender for Office 365: Tenant blocks via admin submission

Microsoft Defender for Office 365 users can now ensure higher security by blocking senders, email addresses, domains, URLs and email attachmen...

1 year ago

Microsoft Defender for Office 365: URL and attachment allow & block via submissions for government clouds

Microsoft Defender for Office 365 is making it easier for customers in government cloud environments to create allow and block rules for URLs ...

1 year ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy