Skip to content

Commit 0140b8c

Browse files
committed
Update block-access-exchange-web-services.md
1 parent d571bab commit 0140b8c

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

microsoft-365/baseline-security-mode/block-access-exchange-web-services.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ If you have enabled this setting but need to revert to the default behavior (all
2626

2727
EWS has historically been used by legacy applications and custom integrations. However, it also represents a common attack vector because it allows broad programmatic access to mailbox data. Compromised accounts or malicious apps can use EWS to read mail, access contacts, send messages, or perform automated actions without user interaction. Enforcing this setting significantly reduces your risk by preventing unauthorized or outdated apps from reaching sensitive Exchange data. You can still allow exceptions for specific users or workloads using Exchange Online PowerShell.
2828

29-
You can also generate a CSV report to identify which apps are making EWS requests, how frequently they access EWS, and the extent of your organization’s dependency on EWS.
29+
You can also generate a CSV report to identify which apps are making EWS requests, how frequently they access EWS, and the extent of your organization’s dependency on EWS.
3030

3131
> [!NOTE]
3232
> Usage data is collected and aggregated weekly, not daily.

0 commit comments

Comments
 (0)