Skip to content

Latest commit

 

History

History
19 lines (18 loc) · 1.72 KB

File metadata and controls

19 lines (18 loc) · 1.72 KB
title Allow entry facts
description Customers learn they can sign-up for a free trial of Defender for Office 365.
ms.reviewer
ms.date 07/18/2024
manager deniseb
ms.author chrisda
author chrisda
ms.service microsoft-365-security
ms.subservice mdo
search.appverid met150

Tip

Allow entries from submissions are added during mail flow based on the filters that determined the message was malicious. For example, if the sender email address and a URL in the message are determined to be malicious, an allow entry is created for the sender (email address or domain) and the URL.

During mail flow or time of click, if messages containing the entities in the allow entries pass other checks in the filtering stack, the messages are delivered (all filters associated with the allowed entities are skipped). For example, if a message passes email authentication checks, URL filtering, and file filtering, a message from an allowed sender email address is delivered if it's also from an allowed sender.

By default, allow entries for domains and email addresses, files, and URLs are kept for 30 days after the filtering system determines that the entity is clean, and then the allow entry is removed. Or you can set allow entries to expire up to 30 days after you create them. Allow entries for spoofed senders never expire.