Remove blocked connectors from the Restricted entities portal

Tip

Did you know you can try the features in Microsoft 365 Defender for Office 365 Plan 2 for free? Use the 90-day Defender for Office 365 trial at the Microsoft 365 Defender portal trials hub. Learn about who can sign up and trial terms here.

Applies to

If an inbound connector is detected as potentially compromised, it is restricted from sending any relaying email. The connector is then added to the Restricted entities page in the Microsoft 365 Defender portal. When the connector is used to send email, the message is returned in a non-delivery report (also known as an NDR or bounced message) with the error code 550;5.7.711 and the following text:

Your message couldn't be delivered. The most common reason for this is that your organization's email connector is suspected of sending spam or phish and it's no longer allowed to send email. Contact your email admin for assistance. Remote Server returned '550;5.7.711 Access denied, bad inbound connector. AS(2204).'

Admins can remove connectors from the Restricted entities page in Microsoft 365 Defender or in Exchange Online PowerShell.

Learn more on restricted entities

A restricted entity is an entity that has been blocked from sending email because either it has been potentially compromised, or it has exceeded sending limit.

There are 2 types of restricted entities:

  • Restricted user: For more information about why a user can be restricted and how to handle restricted users, see Remove blocked users from the Restricted entities portal.

  • Restricted connector: Learn about why a connector can be restricted and how to handle restricted connectors (this article).

What do you need to know before you begin?

  • Open the Microsoft 365 Defender portal at https://security.microsoft.com. To go directly to the Restricted entities page, use https://security.microsoft.com/restrictedentities.

  • To connect to Exchange Online PowerShell, see Connect to Exchange Online PowerShell.

  • You must have permissions in Exchange Online before you can follow the procedures mentioned in this article:

    • To remove connectors from the Restricted entities portal, you need to be a member of the Organization Management or Security Administrator role groups.
    • For read-only access to the Restricted entities portal, you need to be a member of the Global Reader or Security Reader role groups.

    For more information, see Permissions in Exchange Online.

    Note

    • Adding users to the corresponding Azure Active Directory role in the Microsoft 365 admin center gives users the required permissions and permissions for other features in Microsoft 365. For more information, see About admin roles.

    • The View-Only Organization Management role group in Exchange Online also gives read-only access to the feature.

  • Before you remove the connector from the Restricted entities portal, be sure to follow the required steps to regain control of the connector. For more information, see Respond to a compromised connector.

Use the Microsoft 365 Defender portal to remove a connector from the Restricted entities list

  1. In the Microsoft 365 Defender portal, go to Email & collaboration > Review > Restricted entities. To go directly to the Restricted entities page, use https://security.microsoft.com/restrictedentities.

  2. On the Restricted entities page, find and select the connector that you want to unblock by clicking on the connector.

  3. Click the Unblock action that appears.

  4. In the Unblock entity flyout that appears, read the details about the restricted connector. You should go through the recommendations to ensure you're taking the proper actions in case the connector is compromised.

  5. When you're finished, click Unblock.

    Note

    It might take up to 1 hour for all restrictions to be removed from the connector.

Verify the alert settings for restricted connectors

The default alert policy named Suspicious connector activity will automatically notify admins when connectors are blocked from relaying email. For more information about alert policies, see Alert policies in Microsoft 365.

Important

For alerts to work, audit log search must to be turned on. For more information, see Turn the audit log search on or off.

  1. In the Microsoft 365 Defender portal, go to Email & collaboration > Policies & rules > Alert policy.

  2. On the Alert policy page, find and select the alert named Suspicious connector activity. You can sort the policies by name, or use the Search box to find the policy.

  3. In the Suspicious connector activity flyout that appears, verify or configure the following settings:

    • Status: Verify the alert is turned on Toggle on..

    • Email recipients: Click Edit and verify or configure the following settings in the Edit recipients flyout that appears:

      • Send email notifications: Verify this is selected (On).
      • Email recipients: The default value is TenantAdmins (meaning, Global admin members). To add more recipients, click on a blank area of the box. A list of recipients will appear, and you can start typing a name to filter and select a recipient. You can remove an existing recipient from the box by clicking Remove icon. next to their name.
      • Daily notification limit: The limit is no more than 3 notifications per connector per day.

      When you're finished, click Save.

  4. Back on the Suspicious connector activity flyout, click Close.

Use Exchange Online PowerShell to view and remove connectors from the Restricted entities list

To view the list of connectors that are restricted from sending email, run the following command:

Get-BlockedConnector

To view details about a specific connector, replace <connectorId> and run the following command:

Get-BlockedConnector -ConnectorId <connectorId>

To remove a connector from the Restricted entities list, replace <connectorId> and run the following command:

Remove-BlockedConnector -ConnectorId <connectorId>

More information