Skip to main content

How do I Whitelist in Spoof Intelligence Allow/Block List for Microsoft 365?

K
Written by Karthek S
Updated over a week ago

Overview

Microsoft has an advanced protection feature called Spoof Intelligence, part of Microsoft Defender for Office 365. It’s designed to detect when an email pretends (or “spoofs”) to come from a trusted sender—this is common in phishing attacks.

This feature examines the “From” address of an email to verify whether it was genuinely sent from that domain. If it wasn't, the system can either block the email or flag it with warnings such as:

"We could not verify the identity of the sender"

or

"Unverified sender"

To manage these situations, Microsoft allows you to whitelist trusted spoofed emails using the Tenant Allow/Block List, specifically under the Spoofed senders tab.

Three ways to whitelist spoofed emails:

  1. Full infrastructure wildcarding (best/easiest):
    → Whitelists all domain spoofed through a specific server.
    → E.g.: *, linktologin.com

  2. Domain-specific allow:
    → Whitelist only spoofing for a specific domain like linktologin.com, 52.74.95.172.

  3. Sender-specific allow:
    → Whitelist only a specific simulated sender email like [email protected], linktologin.com.

How do I do it?


To configure this, navigate to Microsoft 365 Defender > Threat Policies > Tenant Allow/Block List > Spoofed Senders tab. Add the entries listed below, then make sure to save your changes.

Recommended: Spoofing Protection for All RH Domains

*, right-hand.ai

*, linktologin.com

*, linktosso.com

*, inbox-login.com

*, authupdate.com

*, resetlogin.com

*, account-protect.me

*, discount0ffer.com

*, micrrosotf.com

*, grnaill.com

*, mailboxaccess.com

*, linkdinapp.com

*, micosot.com

*, doqusign.com

Did this answer your question?