You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This example adds a URL block entry for contoso.com and all subdomains (for example, contoso.com, www.contoso.com, xyz.abc.contoso.com, and www.contoso.com/b). Because we didn't use the ExpirationDate or NoExpiration parameters, the entry expires after 30 days.
This example adds a URL allow entry for the specified third-party phishing simulation URL with no expiration. For more information, see [Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes](https://learn.microsoft.com/defender-office-365/advanced-delivery-policy-configure).
This example adds a URL allow entry for the specified domain with expiration as 45 days after last used date. This allow will permit URLs identified as bulk, spam and regular phish.
89
+
For URLs identified as malware or high-confidence phishing, you will need to submit the URL to create allows. [Learn more about submitting good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
90
+
77
91
## PARAMETERS
78
92
79
93
### -Entries
@@ -281,6 +295,8 @@ The RemoveAfter parameter enables the **Remove on** \> **45 days after last used
281
295
282
296
The only valid value for this parameter is 45.
283
297
298
+
It can be used with the Allow switch where the ListType parameter value is Sender or FileHash or Url.
299
+
284
300
You can't use this parameter with the ExpirationDate or NoExpirationDate parameters.
0 commit comments