-
-
Notifications
You must be signed in to change notification settings - Fork 5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request]: Anti-Spam Connection Filter Safe List #2943
Comments
This issue is stale because it has been open 10 days with no activity. We will close this issue soon. If you want this feature implemented you can contribute it. See: https://docs.cipp.app/dev-documentation/contributing-to-the-code . Please notify the team if you are working on this yourself. |
This issue was closed because it has been stalled for 14 days with no activity. |
I would like to work on this please! |
Great! I assigned you (@kris6673) to the issue. Have fun working on it! |
@kris6673, thanks very much. |
This issue is stale because it has been open 10 days with no activity. We will close this issue soon. If you want this feature implemented you can contribute it. See: https://docs.cipp.app/dev-documentation/contributing-to-the-code . Please notify the team if you are working on this yourself. |
Bump to keep open |
This issue is stale because it has been open 10 days with no activity. We will close this issue soon. If you want this feature implemented you can contribute it. See: https://docs.cipp.app/dev-documentation/contributing-to-the-code . Please notify the team if you are working on this yourself. |
Bump 2 - The resurrection |
Description of the new feature - must be an in-depth explanation of the feature you want, reasoning why, and the added benefits for MSPs as a whole.
I'm looking to have the anti-spam connection filter policy option 'safe list' included in the Defender standards so that it can be configured as part of the standards rather than needing to configure it manually.
Specifically, I'm looking to be able to enable Microsoft's built-in 'safe list' rather than setting my own safe/block list of IPs.
PowerShell commands you would normally use to achieve above request
Set-HostedConnectionFilterPolicy "Default" -EnableSafeList $true
The text was updated successfully, but these errors were encountered: