In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, EOP offers multiple ways of blocking email from unwanted senders. Collectively, you can think of these options as blocked sender lists.
The following list contains the available methods to block senders in EOP from most recommended to least recommended:
Block entries for domains and email addresses (including spoofed senders) in the Tenant Allow/Block List.
Outlook Blocked Senders (the Blocked Senders list in each mailbox that affects only that mailbox).
Blocked sender lists or blocked domain lists (anti-spam policies).
Exchange mail flow rules (also known as transport rules).
The IP Block List (connection filtering).
The rest of this article contains specifics about each method.
Tip
Always submit messages in your blocked sender lists to Microsoft for analysis. For instructions, see Report questionable email to Microsoft. If the messages or message sources are determined to be harmful, Microsoft can automatically block the messages, and you won't need to manually maintain the entry in blocked sender lists.
Instead of blocking email, you also have several options to allow email from specific sources using safe sender lists. For more information, see Create safe sender lists.
A standard SMTP email message can contain different sender email addresses as described in Why internet email needs authentication. Frequently, the MAIL FROM address (also known as the 5321.MailFrom address, P1 sender, or envelope sender) and From address (also known as the 5322.From address or P2 sender) are the same. However, when email is sent on behalf of someone else, the addresses can be different. Blocked sender lists and blocked domain lists in anti-spam policies inspect the From address only. This behavior is similar to Outlook Blocked Senders that use the From address.
Email messages from these senders are marked as high confidence spam (SCL = 9). What happens to the messages is determined by the anti-spam policy that detected the message for the recipient. In the Standard and Strict preset security policies, high confidence spam messages are quarantined.
As an added benefit, users in the organization can't send email to these blocked domains and addresses. The message is returned in the following non-delivery report (also known as an NDR or bounce message): 550 5.7.703 Your message can't be delivered because messages to XXX, YYY are blocked by your organization using Tenant Allow Block List. The entire message is blocked for all internal and external recipients of the message, even if only one recipient email address or domain is defined in a block entry.
Only if you can't use the Tenant Allow/Block List for some reason should you consider using a different method to block senders.
Use Outlook Blocked Senders
When only a few users received unwanted email, users or admins can add the sender email addresses to the Blocked Senders list in the mailbox. For instructions, see the following articles:
When messages are successfully blocked due to a user's Blocked Senders list, the X-Forefront-Antispam-Report header field contains the value SFV:BLK.
Tip
If the unwanted messages are newsletters from a reputable and recognizable source, unsubscribing from the email is another option to stop the user from receiving the messages.
Use blocked sender lists or blocked domain lists
When multiple users are affected, the scope is wider, so the next best option is blocked sender lists or blocked domain lists in custom anti-spam policies or the default anti-spam policy. Messages from senders on the lists are marked as High confidence spam, and the action that you configured for the High Confidence Spam filter verdict is taken on the messages. For more information, see Configure anti-spam policies.
The maximum limit for these lists is approximately 1,000 entries.
Use mail flow rules
Mail flow rules can also look for keywords or other properties in the unwanted messages.
Regardless of the conditions or exceptions that you use to identify the messages, you configure the action to set the spam confidence level (SCL) of the message to 9, which marks the message as High confidence spam. For more information, see Use mail flow rules to set the SCL in messages.
Important
It's easy to create rules that are overly aggressive, so it's important that you identify only the messages you want to block using very specific criteria. Also, be sure to monitor the usage of the rule to ensure everything works as expected.
Use the IP Block List
When it's not possible to use one of the other options to block a sender, only then should you use the IP Block List in the connection filter policy. For more information, see Configure the connection filter policy. It's important to keep the number of blocked IPs to a minimum, so we don't recommend blocking entire IP address ranges.
You should especially avoid adding IP address ranges that belong to consumer services (for example, outlook.com) or shared infrastructures. You also need to review the list of blocked IP addresses as part of regular maintenance.
This module examines how Microsoft Defender for Office 365 extends EOP protection through various tools, including Safe Attachments, Safe Links, spoofed intelligence, spam filtering policies, and the Tenant Allow/Block List.
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.
Admins can learn how to configure the junk email settings in Exchange Online mailboxes. Many of these settings are available to users in Outlook or Outlook on the web.