Skip to content

Tenant Allow/Block Lists

There are a couple of places in MDO where you can specify "allows" or "blocks".

None of these are the best way of allowing mail through filters, you should start with the tenant allow/block list.

The allow/block list allows for entries of the following types:

  • Domains and email address
  • Spoofed senders
  • URLs
    • These entries will be wildcarded so no need to submit subpages on a website
    • Consider adding blocks to your EDR indicators, or MDCA unsanctioned cloud app list. This list will only apply to emails, Teams, and Microsoft files (OneDrive and SharePoint).
  • Files
  • IP addresses

You can always add blocks directly to these lists but only Spoofed senders and IP addresses allow you to directly add allows. For all other types you can get allow entries by submitting an email to Microsoft for analysis and reporting the message as clean. Microsoft will automatically determine based on the message detections what and where to add the allow entries to prevent the message from being quarantined in the future.

Microsoft will even add a trusted impersonated sender to your anti-phishing policy if necessary. This will not add the trusted sender to every anti-phish policy but instead the highest precedence anti-phish policy the email recipient is a member of.

Tip

Don't forget, if you are using any advanced spam filters you cannot report the message to Microsoft as clean if it was quarantined because of ASF

Just as you can submit quarantined emails as clean to Microsoft to get allow entries added, you can do the same with false negatives, messages you feel should be quarantined, to get block entries added.

Auditing Changes

Depending on what you are looking for you can audit changes to the tenant allow/block list by going to the unified audit log and searching for the following operations within the Activities - operation names field:

  • Get-TenantAllowBlockListItems
  • Set-TenantAllowBlockListItems
  • New-TenantAllowBlockListItems
  • Remove-TenantAllowBlockListItems
  • Get-TenantAllowBlockListItemsSpoofItems
  • Set-TenantAllowBlockListItemsSpoofItems
  • New-TenantAllowBlockListItemsSpoofItems
  • Remove-TenantAllowBlockListItemsSpoofItems

Note that you can search for all of these at once by adding commas like this Get-TenantAllowBlockListItems,Set-TenantAllowBlockListItems,New-TenantAllowBlockListItems,Remove-TenantAllowBlockListItems,Get-TenantAllowBlockListItemsSpoofItems,Set-TenantAllowBlockListItemsSpoofItems,New-TenantAllowBlockListItemsSpoofItems,Remove-TenantAllowBlockListItemsSpoofItems

Summary

  • Avoid using anti-spam blocks and allows


    • Hard to maintain when using multiple policies
    • Skips most filtering including spoof checks
  • Don't use the trusted impersonated senders list


    • Submitting an impersonation as clean will handle this for you
  • Submit messages to Microsoft


    Microsoft will do the hard work for you adding blocks and allows, no guessing where to add the entry

  • Start with the tenant allow/block list


    • Blocks also prevent sending to these emails
    • Microsoft will clean up entries for you as they learn from your submissions