In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, admins can create and manage entries for URLs in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see Manage allows and blocks in the Tenant Allow/Block List.
Pastaba
To allow phishing URLs from third-party phishing simulations, use the advanced delivery configuration to specify the URLs. Don't use the Tenant Allow/Block List.
This article describes how admins can manage entries for URLs in the Microsoft Defender portal and in Exchange Online PowerShell.
Exchange Online Protection: The maximum number of allow entries is 500, and the maximum number of block entries is 500 (1000 URL entries in total).
Defender for Office 365 Plan 1: The maximum number of allow entries is 1000, and the maximum number of block entries is 1000 (2000 URL entries in total).
Defender for Office 365 Plan 2: The maximum number of allow entries is 5000, and the maximum number of block entries is 10000 (15000 URL entries in total).
You can enter a maximum of 250 characters in a URL entry.
An entry should be active within 5 minutes.
You need to be assigned permissions before you can do the procedures in this article. You have the following options:
Add and remove entries from the Tenant Allow/Block List: Membership in one of the following role groups:
Organization Management or Security Administrator (Security admin role).
Security Operator (Tenant AllowBlockList Manager role): This permission works only when assigned directly in the Exchange admin center at https://admin.exchange.microsoft.com > Roles > Admin Roles.
Read-only access to the Tenant Allow/Block List: Membership in one of the following role groups:
Global Reader
Security Reader
View-Only Configuration
View-Only Organization Management
Microsoft Entra permissions: Membership in the Global Administrator*, Security Administrator, Global Reader, or Security Reader roles gives users the required permissions and permissions for other features in Microsoft 365.
Svarbu
* Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
Create allow entries for URLs
Unnecessary allow entries expose your organization to malicious email that would have been filtered by the system, so there are limitations for creating allow entries directly in the Tenant Allow/Block List.
To create allow entries for URLs, use either of the following methods:
This method is required to override malware and high confidence phishing verdicts.
From the URLs tab on the Tenant Allow/Block Lists page or in PowerShell as described in this section.
This method is available to override the following verdicts only:
Bulk
Spam
High confidence spam
Phishing (not high confidence phishing)
Patarimas
Allow entries from submissions are added during mail flow based on the filters that determined the message was malicious. For example, if the sender email address and a URL in the message are determined to be malicious, an allow entry is created for the sender (email address or domain) and the URL.
During mail flow or time of click, if messages containing the entities in the allow entries pass other checks in the filtering stack, the messages are delivered (all filters associated with the allowed entities are skipped). For example, if a message passes email authentication checks, URL filtering, and file filtering, a message from an allowed sender email address is delivered if it's also from an allowed sender.
By default, allow entries for domains and email addresses, files, and URLs are kept for 45 days after the filtering system determines that the entity is clean, and then the allow entry is removed. Or you can set allow entries to expire up to 30 days after you create them. Allow entries for spoofed senders never expire.
During time of click, the URL allow entry overrides all filters associated with the URL entity, which allows users to access the URL.
A URL allow entry doesn't prevent the URL from being wrapped by Safe Links protection in Defender for Office 365. For more information, see Do not rewrite list in SafeLinks.
Use the Microsoft Defender portal to create allow entries for URLs in the Tenant Allow/Block List
On the Tenant Allow/Block List page, select the URLs tab.
On the URLs tab, select Add, and then select Allow.
In the Allow URLs flyout that opens, configure the following settings:
Add URLs with wildcards: Enter one URL per line, up to a maximum of 20. For details about the syntax for URL entries, see the URL syntax for the Tenant Allow/Block List section later in this article.
Remove allow entry after: Select from the following values:
45 days after last used date (default)
1 day
7 days
Specific date: The maximum value is 30 days from today.
Optional note: Enter descriptive text for why you're allowing the URLs.
When you're finished in the Allow URLs flyout, select Add.
Back on the URLs tab, the entry is listed.
Use PowerShell to create allow entries for URLs in the Tenant Allow/Block List
This example adds an allow entry for the URL abc.contoso.com and all email addresses (for example, xyz@abc.contoso.com). Because we didn't use the ExpirationDate or RemoverAfter parameters, the entry expires after 45 days from last used date.
On the Tenant Allow/Block List page, select the URLs tab.
On the URLs tab, select Add, and then select Block.
In the Block URLs flyout that opens, configure the following settings:
Add URLs with wildcards: Enter one URL per line, up to a maximum of 20. For details about the syntax for URL entries, see the URL syntax for the Tenant Allow/Block List section later in this article.
Remove block entry after: Select from the following values:
Never expire
1 day
7 days
30 days (default)
Specific date: The maximum value is 90 days from today.
Optional note: Enter descriptive text for why you're blocking the URLs.
When you're finished in the Block URLs flyout, select Add.
Back on the URLs tab, the entry is listed.
Use PowerShell to create block entries for URLs in the Tenant Allow/Block List
This example adds a block entry for the URL contoso.com and all subdomains (for example, contoso.com and xyz.abc.contoso.com). Because we didn't use the ExpirationDate or NoExpiration parameters, the entry expires after 30 days.
On the URLs tab, select the entry from the list by selecting the check box next to the first column, and then select the Edit action that appears.
In the Edit URL flyout that opens, the following settings are available:
Block entries:
Remove block entry after: Select from the following values:
1 day
7 days
30 days
Never expire
Specific date: The maximum value is 90 days from today.
Optional note
Allow entries:
Remove allow entry after: Select from the following values:
1 day
7 days
30 days
45 days after last used date
Specific date: The maximum value is 30 days from today.
Optional note
When you're finished in the Edit URL flyout, select Save.
Patarimas
In the details flyout of an entry on the URLs tab, use View submission at the top of the flyout to go to the details of the corresponding entry on the Submissions page. This action is available if a submission was responsible for creating the entry in the Tenant Allow/Block List.
Use PowerShell to modify entries for URLs in the Tenant Allow/Block List
Select the entry from the list by selecting the check box next to the first column, and then select the Delete action that appears.
Select the entry from the list by clicking anywhere in the row other than the check box. In the details flyout that opens, select Delete at the top of the flyout.
Patarimas
To see details about other entries without leaving the details flyout, use Previous item and Next item at the top of the flyout.
In the warning dialog that opens, select Delete.
Back on the URLs tab, the entry is no longer listed.
Patarimas
You can select multiple entries by selecting each check box, or select all entries by selecting the check box next to the Value column header.
Use PowerShell to remove entries for URLs from the Tenant Allow/Block List
This module examines how Microsoft Defender for Office 365 extends EOP protection through various tools, including Safe Attachments, Safe Links, spoofed intelligence, spam filtering policies, and the Tenant Allow/Block List.
Admins can learn how to use the Submissions page in the Microsoft Defender portal to submit messages, URLs, and email attachments to Microsoft for analysis. Reasons for submission include: legitimate messages that were blocked, suspicious messages that were allowed, suspected phishing email, spam, malware, and other potentially harmful messages.
Admins can learn how to use the advanced delivery policy in Exchange Online Protection (EOP) to identify messages that shouldn't be filtered in specific supported scenarios (third-party phishing simulations and messages delivered to security operations (SecOps) mailboxes.
Learn about Safe Links protection in Defender for Office 365 to protect an organization from phishing and other attacks that use malicious URLs. Discover Teams Safe Links, and see graphics of Safe Links messages.
Zero-hour auto purge (ZAP) moves delivered messages in Microsoft 365 mailboxes to the Junk Email folder or quarantine if those messages are retroactively found to be spam, phishing, or contain malware.