![]() You can sort the alerts by name, or use the Search box to find the alert. On the Alert policy page, find the alert named User restricted from sending email. ![]() Or, to go directly to the Alert policy page, use. In the Microsoft 365 Defender portal at, go to Email & collaboration > Policies & rules > Alert policy. To verify that audit logging is turned on or to turn it on, see Turn auditing on or off. Select Yes in the warning dialog that opens.įor alerts to work, audit logging must to be turned on (it's on by default). When you're finished on the Unblock user page, select Submit. Enabling MFA and resetting the password are a good defense against future account compromise. On the Unblock user page, consider the recommendations and use the links in the Multi-factor authentication and Change password sections to Enable MFA and Reset the user's password if you haven't done these steps already. When you're finished on the Overview page, select Next. Verify that you've gone through the suggestions in the Recommendations section to confirm that the account isn't compromised or to regain control of the account. In the Unblock user flyout that opens, read the details about the restricted account on the Overview page. Select the user to unblock by selecting the check box for the entity, and then selecting the Unblock action that appears on the page. Use the Search box and a corresponding value to find specific users. To change the list of entities from normal to compact spacing, select Change list spacing to compact or normal, and then select Compact list. Select a column header to sort by that column. On the Restricted entities page, identify the user account to unblock. Or, to go directly to the Restricted entities page, use. In the Microsoft 365 Defender portal at, go to Email & collaboration > Review > Restricted entities. Remove a user from the Restricted entities page in the Microsoft 365 Defender portal Before you follow the procedures in this article to remove a user from the Restricted entities page, be sure to follow the required steps to regain control of the account as described in Responding to a compromised email account in Office 365.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |