Updates from: 10/25/2022 01:13:12
Category Microsoft Docs article Related commit history on GitHub Change details
admin About Shared Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/about-shared-mailboxes.md
Before you [create a shared mailbox](create-a-shared-mailbox.md), here are some
- **Licenses:** Your shared mailbox can store up to 50GB of data without you assigning a license to it. After that, you need to assign a license to the mailbox to store more data. For more details on shared mailbox licensing, please see [Exchange Online Limits](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#StorageLimits). When a shared mailbox reaches the storage limit, you'll be able to receive email for a while, but you won't be able to send new email. Then, after that, it will stop receiving email. Senders to the mailbox will get a non-delivery receipt.
+> [!NOTE]
+>
+> The following scenarios require an Exchange Online Plan 2 license:
+>
+> - The shared mailbox has more than 50 GB of storage in use.
+> - The shared mailbox uses in-place archiving.
+> - The shared mailbox is placed on litigation hold.
+>
+> For step-by-step instructions on how to assign licenses, see [Assign licenses to users](/microsoft-365/admin/manage/assign-licenses-to-users).
+ - **User permissions:** You need to give users permissions (membership) to use the shared mailbox. Only people inside your organization can use a shared mailbox. - **External users:** You can't give people outside your business (such as people with a Gmail account) access to your shared mailbox. If you want to do this, consider creating a group for Outlook instead. To learn more, see [Create a Microsoft 365 group in the admin center](../create-groups/create-groups.md).
admin Get Help Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-support.md
Save time by starting your service request online. We'll help you find a solutio
## Phone support
-Phone numbers for Billing and Technical support hours (and languages) are listed on [Microsoft 366 for business support contacts by country or region](support-contact-info.md).
+In most countries or regions, billing support for Microsoft 365 for business products and services is provided in English from 9 AM-5 PM, Monday through Friday. Local language support varies by country or region.
+
+Technical support is provided in English 24 hours a day, 7 days a week, and in some cases, in local languages as noted.
+
+>[!div class="nextstepaction"]
+>[Find support phone numbers by country or region](support-contact-info.md)
Admins, have your account details ready when you call. > [!NOTE] > To better protect your organization, we added a PIN-based verification step to our existing phone-based verification process. If you contact us from a number that isn't registered with your organization profile, the Microsoft support representative sends a verification code to the registered email or phone number in your Microsoft 365 admin center profile. You must provide this code to the support representative to grant them access to your organization's account.
-Billing support for Microsoft 365 for business products and services is provided in English from 9 AM-5 PM (9 AM-6 PM in Australia), Monday through Friday.\
-Technical support is provided in English 24 hours a day, 7 days a week.
--- **In the United States, call 1 800 865 9408.**--- **In Australia, call 1 800 197 503.**--- **In Canada, call 1 800 865 9408.**--- **In the United Kingdom, call 0800 032 6417.**- ## Small business support with Business Assist Get the most out of your subscription with expert advice from small business specialists.
admin M365 Katakana Glossary https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/m365-katakana-glossary.md
ms.localizationpriority: medium
+- Tier3
- Adm_O365 - scotvorg
admin Servicenow Support Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/servicenow-support-integration.md
- Title: "Enable Microsoft 365 support integration for ServiceNow Virtual Agent"-- NOCSH-------- scotvorg-- M365-subscription-management-- Adm_TOC---- MET150
-description: "Configure the support integration experimental feature to test and provide the Microsoft 365 support integration team with feedback."
--
-# Enable Microsoft 365 support integration for ServiceNow Virtual Agent
-
-> [!IMPORTANT]
-> Support integration for ServiceNow Virtual Agent is an experimental feature being rolled out for users to test and provide the Microsoft 365 support integration team with feedback.
-
-When you configure the Microsoft 365 support integration app to work with ServiceNow Virtual Agent, you gain access to **Recommended Solutions** through two different user experiences:
--- **Quick Insights** Similar to what appears on the Incidents page, the ServiceNow Virtual Agent displays **Recommended articles** and **Recommend solutions** based on the text entered.-
- :::image type="content" source="../../media/ServiceNow-guide/servicenow-support-integration-1.png" lightbox="../../media/ServiceNow-guide/servicenow-support-integration-1.png" alt-text="Quick Insights.":::
--- **Branching Experience** Branching integrates with the search and assistant feature to guide users through a troubleshooting flow that returns responses based on the text entered.-
- :::image type="content" source="../../media/ServiceNow-guide/servicenow-support-integration-2.png" lightbox="../../media/ServiceNow-guide/servicenow-support-integration-2.png" alt-text="Branching Experience.":::
-
-## Before you begin
--- Enable Virtual Agent in ServiceNow. For details, see [Activate Virtual Agent](https://docs.servicenow.com/bundle/quebec-now-intelligence/page/administer/virtual-agent/task/activate-virtual-agent.html).--- Download and complete the setup of the Microsoft 365 support integration app from the ServiceNow Store.--- Minimum version of Microsoft 365 support integration: v1.0.10.--- Minimum version of ServiceNow: Quebec.--- Role required: Admin.-
-## Configure Microsoft 365 support integration to work with ServiceNow Virtual Agent
--- Set Microsoft 365 Support as your fallback topic. For details, see [Configure a Virtual Agent chat experience](https://docs.servicenow.com/bundle/quebec-now-intelligence/page/administer/virtual-agent/task/configure-default-chat-experience.html).-
- :::image type="content" source="../../media/ServiceNow-guide/servicenow-support-integration-3.png" lightbox="../../media/ServiceNow-guide/servicenow-support-integration-3.png" alt-text="Set default chat experience fallback topic.":::
admin Servicenow Virtual Agent Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/servicenow-virtual-agent-integration.md
+
+ Title: "Integrate Microsoft 365 with ServiceNow Virtual Agent"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+
+- scotvorg
+- M365-subscription-management
+- Adm_TOC
++
+search.appverid:
+- MET150
+description: "Configure support integration to test and provide the Microsoft 365 support integration team with feedback."
++
+# Integrate Microsoft 365 with ServiceNow Virtual Agent
+
+When you configure the Microsoft 365 support integration app to work with ServiceNow Virtual Agent, you access the self-help created by Microsoft 365 product teams through two different user experiences:
+
+- Microsoft 365 step-by-step and walk-through solutions.
+
+ :::image type="content" source="../../media/ServiceNow-guide/servicenow-support-integration-2.png" lightbox="../../media/ServiceNow-guide/servicenow-support-integration-1.png" alt-text="Quick Insights.":::
+ :::image type="content" source="../../media/ServiceNow-guide/servicenow-support-integration-2b.png" lightbox="../../media/ServiceNow-guide/servicenow-support-integration-2b.png" alt-text="Quick Insights.":::
+
+- Top web search results from Microsoft 365 knowledge base articles.
+
+ :::image type="content" source="../../media/ServiceNow-guide/servicenow-support-integration-1.png" lightbox="../../media/ServiceNow-guide/servicenow-support-integration-1.png" alt-text="Knowledge base article search results.":::
+
+## Before you begin
+
+- Enable Virtual Agent in ServiceNow. For details, see [Activate Virtual Agent](https://docs.servicenow.com/bundle/quebec-now-intelligence/page/administer/virtual-agent/task/activate-virtual-agent.html).
+
+- Install and complete the setup of the Microsoft 365 support integration app from the ServiceNow Store.
+
+- Minimum version of ServiceNow: Rome.
+
+- Role required: ServiceNow admin or virtual_agent_admin.
+
+## Configure Microsoft 365 support integration to work with ServiceNow Virtual Agent
+
+### Standalone fallback topic
+
+Set Microsoft 365 Support as your fallback topic. For details, see [Configure a Virtual Agent chat experience](https://docs.servicenow.com/bundle/quebec-now-intelligence/page/administer/virtual-agent/task/configure-default-chat-experience.html).
++
+### Topic blocks
+
+If you donΓÇÖt have any topic created, you can use the standalone fallback topic as above or [create your own virtual agent topic](https://docs.servicenow.com/bundle/rome-now-intelligence/page/administer/virtual-agent/task/create-virtual-agent-topic.html).
+
+Follow these steps to add the Microsoft 365 Support topic block:
+
+1. Under **Utilities**, select **Topic Block**, and add it to your flow.
+
+ :::image type="content" source="../../media/ServiceNow-guide/servicenow-topic-block-1.png" lightbox="../../media/ServiceNow-guide/servicenow-topic-block-1.png" alt-text="Add a topic block to your flow.":::
+
+1. Under **Topic Block Properties**, choose **Microsoft 365 Support Topic Block**.
+
+ :::image type="content" source="../../media/ServiceNow-guide/servicenow-topic-block-2.png" lightbox="../../media/ServiceNow-guide/servicenow-topic-block-2.png" alt-text="Choose the Support Topic Block property.":::
+
+1. A Microsoft 365 Support Topic Block accesses input text in this order:
+
+ a. Checks for input variable. If the input variable is not empty, fetches the results for the input variable.
+
+ :::image type="content" source="../../media/ServiceNow-guide/servicenow-topic-block-3.png" lightbox="../../media/ServiceNow-guide/servicenow-topic-block-3.png" alt-text="Fetches the results for input variable.":::
+
+ b. If the input variable is empty, checks for text entered by the user in the chat window and fetches results for the text.
+
+ :::image type="content" source="../../media/ServiceNow-guide/servicenow-topic-block-4.png" lightbox="../../media/ServiceNow-guide/servicenow-topic-block-4.png" alt-text="Checks for text entered in the chat window.":::
+
+ c. If the user didn't enter text, asks the user to enter text to fetch results.
+
+ :::image type="content" source="../../media/ServiceNow-guide/servicenow-topic-block-5.png" lightbox="../../media/ServiceNow-guide/servicenow-topic-block-5.png" alt-text="Checks for text entered in the chat window.":::
+
+1. Microsoft 365 Support Topic Block provides an output variable, which is the userΓÇÖs feedback for the results.
+
+ a. Output variable name: m365_success
+ b. Possible output variable values: YES/NO
+
+ :::image type="content" source="../../media/ServiceNow-guide/servicenow-topic-block-6.png" lightbox="../../media/ServiceNow-guide/servicenow-topic-block-6.png" alt-text="Output variable name and values.":::
admin Support Contact Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/support-contact-info.md
Title: "Find Microsoft 365 for business phone support numbers by country or region"
+ Title: "Find Microsoft 365 for business support phone numbers by country or region"
- highpri - Adm_O365 - search.appverid: - MET150 description: "Learn how to get phone support for your Microsoft 365 for business subscription. You must be an admin for a business subscription to get support." Last updated : 10/20/2022
-# Find Microsoft 365 for business phone support numbers by country or region
+# Find Microsoft 365 for business support phone numbers by country or region
-Billing support for Microsoft 365 for business products and services is provided in English from 9 AM-5 PM (9 AM-6 PM in Australia), Monday through Friday.\
-Technical support is provided in English 24 hours a day, 7 days a week.
+In most countries or regions, billing support for Microsoft 365 for business products and services is provided in English from 9 AM-5 PM, Monday through Friday. Local language support varies by country or region.
+
+Technical support is provided in English 24 hours a day, 7 days a week, and in some cases, in local languages as noted.
Admins, have your account details ready when you call.
English: 24 hours a day, 7 days a week
:::column::: **Phone number:**\ 0120 996 680 (Office 365 Enterprise)\
-0120 628 860 (Other Plans)
+0120 628 860 (Other plans, like Microsoft 365 Business Basic, Microsoft 365 Business Standard, or Microsoft 365 Business Premium)
Alternative Phone Numbers:\ 03 4332 5493 (Office 365 Enterprise)\
-03 4332 6257 (Other Plans)\
+03 4332 6257 (Other plans, like Microsoft 365 Business Basic, Microsoft 365 Business Standard, or Microsoft 365 Business Premium)\
Local call charges apply. **Billing support hours:**\
Japanese: 24 hours a day, 7 days a week\
English: 24 hours a day, 7 days a week **Other Plans:**\
-Telephone technical support is available from 9:00-17:30 on weekdays. For high severity issues, technical support is available 24 hours a day, 7 days a week.
+Telephone technical support is available from 9:00-17:30 on weekdays.\
+For high severity issues, technical support is available 24 hours a day, 7 days a week.
:::column-end::: :::row-end:::
business-premium Index https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/index.md
ms.audience: Admin
Previously updated : 09/15/2022 Last updated : 10/24/2022 ms.localizationpriority: high - M365-Campaigns
Completing all six missions is the most effective way to thwart hackers, protect
## Cybersecurity playbook
-The guidance in these missions is based upon the [Zero Trust security model](../security/office-365-security/microsoft-365-policies-configurations.md), and is summarized in a downloadable [Cybersecurity playbook](https://download.microsoft.com/download/9/c/1/9c167271-8209-492e-acc2-38a39d1834c2/m365bp-cybersecurity-playbook.pdf)).
+The guidance in these missions is based upon the [Zero Trust security model](../security/office-365-security/microsoft-365-policies-configurations.md), and is summarized in a downloadable [Cybersecurity playbook](https://download.microsoft.com/download/9/c/1/9c167271-8209-492e-acc2-38a39d1834c2/m365bp-cybersecurity-playbook.pdf).
[:::image type="content" source="media/m365bp-cyber-security-playbook.png" alt-text="Cybersecurity playbook. Download this guide.":::](https://download.microsoft.com/download/9/c/1/9c167271-8209-492e-acc2-38a39d1834c2/m365bp-cybersecurity-playbook.pdf)
commerce Manage Saas Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/manage-saas-apps.md
There are a few ways to purchase third-party apps.
- **Partner purchase** ΓÇô Work with a partner through Partner Center to purchase subscriptions. - **Microsoft proposal** ΓÇô Respond to a proposal from Microsoft Sales that includes third-party apps.
-Once customers purchase the apps and accept the Microsoft Customer Agreement, they can manage them in Microsoft 365 admin center, or Microsoft Store for Business.
+Once customers purchase the apps and accept the Microsoft Customer Agreement, they can manage them in Microsoft 365 admin center.
App providers sell their apps either at a flat rate, or by purchasing licenses for users.
compliance Change The Size Of Pst Files When Exporting Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/change-the-size-of-pst-files-when-exporting-results.md
f1.keywords:
Previously updated : 10/12/2018 audience: Admin
# Change the size of PST files when exporting eDiscovery search results
-When you use the eDiscovery Export tool to export the email results of an eDiscovery search from the different Microsoft eDiscovery tools, the default size of a PST file that can be exported is 10 GB. If you want to change this default size, you can edit the Windows Registry on the computer that you use to export the search results. One reason to do this is so a PST file can fit on removable media, such a DVD, a compact disc, or a USB drive.
+When you use the eDiscovery Export tool to export the email results of an eDiscovery search from the different Microsoft eDiscovery tools, the default size of a PST file that can be exported is 10 GB. If you want to change this default size, you can edit the Windows Registry on the computer that you use to export the search results. One reason to do this is so PST files can fit on removable media, such a DVD, a compact disc, or a USB drive.
> [!NOTE] > The eDiscovery Export tool is used to export the search results when using the Content search tool in the Microsoft Purview compliance portal.
When you use the eDiscovery Export tool to export the email results of an eDisco
Perform the following procedure on the computer that you'll use to export the results of an eDiscovery search.
-1. Close the eDiscovery Export tool if it's open.
-
-2. Save the following text to a Window registry file by using a filename suffix of .reg; for example, PstExportSize.reg.
-
+1. Close the eDiscovery Export tool if it's open.
+
+2. Save the following text to a Window registry file by using a filename suffix of .reg; for example, PstExportSize.reg.
+ ```text Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange\Client\eDiscovery\ExportTool]
Perform the following procedure on the computer that you'll use to export the re
``` In the example above, the `PstSizeLimitInBytes` value is set to 1,073,741,824 bytes or approximately 1 GB. Here are some other sample values for the `PstSizeLimitInBytes` setting.
-
+ |**Size in GB (approx.)**|**Size in bytes**| |:--|:--| |0.7 GB (700 MB) <br/> |751619277 <br/> | |2 GB <br/> |2147483648 <br/> | |4 GB <br/> |4294967296 <br/> | |8 GB <br/> |8589934592 <br/> |
-
-3. Change the `PstSizeLimitInBytes` value to the desired maximum size of a PST file when you export search results, and then save the file.
-
-4. In Windows Explorer, click or double-click the .reg file that you created in the previous steps.
-
-5. In the User Access Control window, click **Yes** to let the Registry Editor make the change.
-
-6. When prompted to continue, click **Yes**.
-
+
+3. Change the `PstSizeLimitInBytes` value to the desired maximum size of a PST file when you export search results, and then save the file.
+
+4. In Windows Explorer, select or double-click the .reg file that you created in the previous steps.
+
+5. In the User Access Control window, select **Yes** to let the Registry Editor make the change.
+
+6. When prompted to continue, select **Yes**.
+ The Registry Editor displays a message saying that the setting was successfully added to the registry.
-
-7. You can repeat steps 3 - 6 to change the value for the `PstSizeLimitInBytes` registry setting.
+
+7. You can repeat steps 3 - 6 to change the value for the `PstSizeLimitInBytes` registry setting.
-## Frequently asked questions about changing the default size of PST files when you export eDiscovery search results
+## Frequently asked questions
- **Why is the default size 10 GB?**
+**Why is the default size 10 GB?**
The default size of 10 GB was based on customer feedback; 10 GB is a good balance between the optimal amount of content in a single PST and with a minimum chance of file corruption.
- **Should I increase or decrease the default size of PST files?**
+**Should I increase or decrease the default size of PST files?**
Customers tend to decrease the size limit so that the search results will fit on removable media that they can physically ship to other locations in their organization. We don't recommend that you increase the default size because PST files larger than 10 GB might have corruption issues.
- **What computer do I have to do this on?**
+**What computer do I have to do this on?**
You need to change the registry setting on any local computer that you run the eDiscovery Export tool on.
- **After I change this setting, do I have to reboot the computer?**
+**After I change this setting, do I have to reboot the computer?**
No, you don't have to reboot the computer. But, if the eDiscovery Export tool is running, you'll have to close it and the restart it after you change this setting.
- **Does an existing registry key get edited or does a new key get created?**
+**Does an existing registry key get edited or does a new key get created?**
A new registry key is created the first time you run the .reg file that you created in this procedure. Then the setting is edited each time you change and rerun the .reg edit file.
compliance Check Your Content Search Query For Errors https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/check-your-content-search-query-for-errors.md
Here's a list of the unsupported characters that we check for in search queries for Content search and Microsoft Purview eDiscovery (Standard). Unsupported characters are often hidden, and they typically cause a search error or return unintended results. -- **Smart quotation marks** - Smart single and double quotation marks (also called curly quotes) aren't supported. Only straight quotation marks can be used in a search query. --- **Non-printable and control characters** - Non-printable and control characters don't represent a written symbol, such as an alpha-numeric character. Examples of non-printable and control characters include characters that format text or separate lines of text. -
+- **Smart quotation marks** - Smart single and double quotation marks (also called curly quotes) aren't supported. Only straight quotation marks can be used in a search query.
+- **Non-printable and control characters** - Non-printable and control characters don't represent a written symbol, such as an alpha-numeric character. Examples of non-printable and control characters include characters that format text or separate lines of text.
- **Left-to-right and right-to-left marks** - These marks are control characters used to indicate text direction for left-to-right languages (such as English and Spanish) and right-to-left languages (such as Arabic and Hebrew).- - **Lowercase Boolean operators** - If you use a Boolean operator, such as **AND**, **OR**, and **NOT** in a search query, it must be uppercase. When we check a query for typos, the query syntax will often indicate that a Boolean operator is being used even though lowercase operators might be used; for example, `(WordA or WordB) and (WordC or WordD)`. [!INCLUDE [purview-preview](../includes/purview-preview.md)]
Here's a list of the unsupported characters that we check for in search queries
If unsupported characters are found in your query, a warning message is displayed that says unsupported characters were found and suggests an alternative. You then have the option keep the original query or replace it with the suggested revised query.
-Here's an example of the warning message that's displayed after you click **Check query for typos** for the search query in the previous screenshot. Note the original query used smart quotes and lowercase Boolean operators.
+Here's an example of the warning message that's displayed after you select **Check query for typos** for the search query in the previous screenshot. Note the original query used smart quotes and lowercase Boolean operators.
![A warning message is displayed with a suggested revision for your query.](../media/23214b30-8e52-412c-bd80-63fb1b3ed52d.png)
compliance Communication Compliance Investigate Remediate https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-investigate-remediate.md
After reviewing the message basics, it's time to open a message to examine the d
- **Plain text**: Text view that displays a line-numbered text-only view of the message and includes keyword highlighting in messages and attachments for sensitive info type terms, terms identified by built-in classifiers assigned to a policy, or for terms included in a dedicated keyword dictionary assigned to a policy. Keyword highlighting, which is currently available for English language only, can help direct you to the area of interest in long messages and attachments. In some cases, highlighted text might be only in attachments for messages matching policy conditions. Embedded files aren't displayed and the line numbering in this view is helpful for referencing pertinent details among multiple reviewers. - **Conversation**: Available for Microsoft Teams chat messages, this view displays up to five messages before and after an alert message to help reviewers view the activity in the conversational context. This context helps reviewers to quickly evaluate messages and make more informed message resolution decisions. Real-time message additions to conversations are displayed, including all inline images, emojis, and stickers available in Teams. Image or text file attachments to messages aren't displayed. Notifications are automatically displayed for messages that have been edited or for messages that have been deleted from the conversation window. When a message is resolved, the associated conversational messages aren't retained with the resolved message. Conversation messages are available for up to 60 days after the alert message is identified. - **User history**: User history view displays all other alerts generated by any communication compliance policy for the user sending the message.-- **Pattern detected notification**: Many harassing and bullying actions over time and involve reoccurring instances of the same behavior by a user. The *Pattern detected* notification is displayed in the alert details and raises attention to the alert. Detection of patterns is on a per-policy basis and evaluates behavior over the last 30 days when at least two messages are sent to the same recipient by a sender. Investigators and reviewers can use this notification to identify repeated behavior to evaluate the alert as appropriate.-- **Translation**: This view automatically converts alert message text to the language configured in the *Displayed language* setting in the Microsoft 365 subscription for each reviewer. The *Translation* view helps broaden investigative support for organizations with multilingual users and eliminates the need for additional translation services outside of the communication compliance review process. Using Microsoft translation services, the *Translation* view can be turned on and off as needed and supports a wide range of languages. For a complete list of supported languages, see [Microsoft Translator Languages](https://www.microsoft.com/translator/business/languages/). Languages listed in the *Translator Language List* are supported in the *Translation* view.
+- **Pattern detected notification**: Many harassing and bullying actions over time involve reoccurring instances of the same behavior by a user. The *Pattern detected* notification is displayed in the alert details and raises attention to the alert. Detection of patterns is on a per-policy basis and evaluates behavior over the last 30 days when at least two messages are sent to the same recipient by a sender. Investigators and reviewers can use this notification to identify repeated behavior to evaluate the alert as appropriate.
+- **Translation**: This view automatically converts alert message text to the language configured in the *Displayed language* setting in the Microsoft 365 subscription for each reviewer. The *Translation* view helps broaden investigative support for organizations with multilingual users and eliminates the need for additional translation services outside of the communication compliance review process. Using Microsoft translation services, communication compliance automatically detects if the text is in a different language than the user's current system setting and will display alert message text accordingly. For a complete list of supported languages, see [Microsoft Translator Languages](https://www.microsoft.com/translator/business/languages/). Languages listed in the *Translator Language List* are supported in the *Translation* view.
### Step 3: Decide on a remediation action
compliance Configure Edge To Export Search Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/configure-edge-to-export-search-results.md
Title: "Use the eDiscovery Export Tool in Microsoft Edge"
-description: "You have to enable ClickOnce support to use the newest version of Microsoft Edge to download search results from Content Search and eDiscovery in the security and compliance center."
+description: "You have to enable ClickOnce support to use the newest version of Microsoft Edge to download search results from Content Search and eDiscovery in the security and compliance portal."
f1.keywords: - NOCSH
As a result of recent changes to the newest version of Microsoft Edge, ClickOnce
![Select Enabled from dropdown list.](../media/ClickOnceimage1.png)
-3. Scroll down to the bottom of the browser window and click **Restart** to restart Edge.
+3. Scroll down to the bottom of the browser window and select **Restart** to restart Microsoft Edge.
![Click Restart.](../media/ClickOnceimage2.png)
-**Note:** Organizations can use Group Policy to disable ClickOnce support. To check if there is an organizational policy for ClickOnce support, go to **edge://policy**. The following screenshot shows that ClickOnce is enabled across the entire organization. If this policy value is set to **false**, you will need to contact an admin in your organization.
+**Note:** Organizations can use Group Policy to disable ClickOnce support. To check if there's an organizational policy for ClickOnce support, go to **edge://policy**. The following screenshot shows that ClickOnce is enabled across the entire organization. If this policy value is set to **false**, you'll need to contact an admin in your organization.
![List of Edge organizational policies.](../media/ClickOnceimage3.png) ## Install and run the eDiscovery Export Tool
-1. Click **Download results** on the flyout page of an export in Content Search or an eDiscovery case.
+1. Select **Download results** on the flyout page of an export in Content Search or an eDiscovery case.
![Click Download results on the flyout page to download search results.](../media/ClickOnceExport1.png)
-2. You will be prompted with a confirmation to launch the tool, Click **Open**.
+2. You'll be prompted with a confirmation to launch the tool, select **Open**.
![Click Open to launch the eDiscovery Export Tool.](../media/ClickOnceimage4.png)
- If the eDiscovery Export Tool isn't installed, you will be prompted with a Security Warning,
+ If the eDiscovery Export Tool isn't installed, you'll be prompted with a Security Warning,
![Click Install to install the eDiscovery Export Tool.](../media/ClickOnceimage5.png)
-3. Click **Install**. After it's installed, the export tool will launch automatically.
+3. Select **Install**. After it's installed, the export tool will launch automatically.
-For more information, see the following topics:
+For more information, see the following articles:
- [Export Content Search results](export-search-results.md)
compliance Content Search Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/content-search-reference.md
Keep the following things in mind when using the keyword list to create a search
![The correct way to format a keyword list (by selecting checkbox and then pasting list).](../media/5d511a7b-c1f9-499c-bffe-e075bfc9adec.png) -- You can also prepare a list of keywords or keyword phrases in an Excel file or a plain text file, and then copy and paste your list into the keyword list. To do this, you have to select the **Show keyword list** check box. Then, click the first row in the keyword list and paste your list. Each line from the Excel or text file is pasted into separate row in the keyword list.
+- You can also prepare a list of keywords or keyword phrases in an Excel file or a plain text file, and then copy and paste your list into the keyword list. To do this, you have to select the **Show keyword list** check box. Then, select the first row in the keyword list and paste your list. Each line from the Excel or text file is pasted into separate row in the keyword list.
- After you create a query using the keyword list, it's a good idea to verify the search query syntax to make the search query is what you intended. In the search query that's displayed under **Query** in the details pane, the keywords are separated by the text **(c:s)**. This indicates that the keywords are connected by a logical operator similar in functionality to the **OR** operator. Similarly, if your search query includes conditions, the keywords and the conditions are separated by the text **(c:c)**. This indicates that the keywords are connected to the conditions with a logical operator similar in functionality to the **AND** operator. Here's an example of the search query (displayed in the Details pane) that results when using the keyword list and a condition.
Keep the following things in mind when using the keyword list to create a search
- When you run a content search, Microsoft 365 automatically checks your search query for unsupported characters and for Boolean operators that may not be capitalized. Unsupported characters are often hidden and typically cause a search error or return unintended results. For more information about the unsupported characters that are checked, see [Check your Content Search query for errors](check-your-content-search-query-for-errors.md). -- If you have a search query that contains keywords for non-English characters (such as Chinese characters), you can click **Query language-country/region**![Query language-country/region icon in Content search.](../media/8d4b60c8-e1f1-40f9-88ae-ee2a7eca0886.png) and select a language-country culture code value for the search. The default language/region is neutral. How can you tell if you need to change the language setting for a content search? If you're certain content locations contain the non-English characters you're searching for, but the search returns no results, the language setting may be the cause.
+- If you have a search query that contains keywords for non-English characters (such as Chinese characters), you can select **Query language-country/region**![Query language-country/region icon in Content search.](../media/8d4b60c8-e1f1-40f9-88ae-ee2a7eca0886.png) and select a language-country culture code value for the search. The default language/region is neutral. How can you tell if you need to change the language setting for a content search? If you're certain content locations contain the non-English characters you're searching for, but the search returns no results, the language setting may be the cause.
## Partially indexed items
Keep the following things in mind when using the keyword list to create a search
## Searching Microsoft Teams and Microsoft 365 Groups
-You can search the mailbox that's associated with a Microsoft Team or Microsoft 365 Group. Because Microsoft Teams is built on Microsoft 365 Groups, searching them is similar. In both cases, only the group or team mailbox is searched. The mailboxes of the group or team members aren't searched. To search them, you have to specifically add them to the search.
+You can search the mailbox that's associated with a Microsoft Team or Microsoft 365 Group. Because Microsoft Teams is built on Microsoft 365 Groups, searching them is similar. In both cases, only the group or team mailbox is searched. The mailboxes of the group or team members aren't searched. To search them, you've to specifically add them to the search.
Keep the following things in mind when searching for content in Microsoft Teams and Microsoft 365 Groups.
Keep the following things in mind when searching for content in Microsoft Teams
- Summary information for meetings and calls in a Teams channel are also stored in the mailboxes of users who dialed into the meeting or call. This means you can use Content Search to search these summary records. Summary information includes: - Date, start time, end time, and duration of a meeting or call- - The date and time when each participant joined or left the meeting or call- - Calls sent to voice mail- - Missed or unanswered calls- - Call transfers, which are represented as two separate calls It can take up to 8 hours for meeting and call summary records to be available to be searched.
Keep the following things in mind when searching for content in Microsoft Teams
For more information, see [Microsoft Teams launches eDiscovery for calls and meetings](https://techcommunity.microsoft.com/t5/microsoft-teams-blog/microsoft-teams-launches-ediscovery-for-calling-and-meetings/ba-p/210947). -- Card content generated by apps in Teams channels, 1:1 chats, and 1xN chats is stored in mailboxes and can be searched. A *card* is a UI container for short pieces of content. Cards can have multiple properties and attachments, and can include buttons that can trigger card actions. For more information, see [Cards](/microsoftteams/platform/task-modules-and-cards/what-are-cards)
+- Card content generated by apps in Teams channels, 1:1 chats, and 1xN chats are stored in mailboxes and can be searched. A *card* is a UI container for short pieces of content. Cards can have multiple properties and attachments, and can include buttons that can trigger card actions. For more information, see [Cards](/microsoftteams/platform/task-modules-and-cards/what-are-cards)
Like other Teams content, where card content is stored is based on where the card was used. Content for cards used in a Teams channel is stored in the Teams group mailbox. Card content for 1:1 and 1xN chats are stored in the mailboxes of the chat participants.
You can use the **ItemClass** email property or the **Type** search condition to
## Searching inactive mailboxes
-You can search inactive mailboxes in a content search. To get a list of the inactive mailboxes in your organization, run the command `Get-Mailbox -InactiveMailboxOnly` in Exchange Online PowerShell. Alternatively, you can go to **Data lifecycle management** \> **Microsoft 365** \> **Retention** in the Microsoft Purview compliance portal, and then click **More**![Navigation Bar ellipses.](../media/9723029d-e5cd-4740-b5b1-2806e4f28208.gif) \> **Inactive mailboxes**.
+You can search inactive mailboxes in a content search. To get a list of the inactive mailboxes in your organization, run the command `Get-Mailbox -InactiveMailboxOnly` in Exchange Online PowerShell. Alternatively, you can go to **Data lifecycle management** \> **Microsoft 365** \> **Retention** in the Microsoft Purview compliance portal, and then select **More**![Navigation Bar ellipses.](../media/9723029d-e5cd-4740-b5b1-2806e4f28208.gif) \> **Inactive mailboxes**.
Here are a few things to keep in mind when searching inactive mailboxes.
Here are a few things to keep in mind when searching inactive mailboxes.
New-ComplianceSearch -Name InactiveMailboxSearch -ExchangeLocation .pavelb@contoso.onmicrosoft.com -AllowNotFoundExchangeLocationsEnabled $true ``` -- We strongly recommend that you avoid having an active mailbox and inactive mailbox with the same SMTP address. If you need to reuse the SMTP address that is assigned to an inactive mailbox, we recommend that you recover the inactive mailbox or restore the contents of an inactive mailbox to an active mailbox (or the archive of an active mailbox), and then delete the inactive mailbox. For more information, see one of the following topics:
+- We strongly recommend that you avoid having an active mailbox and inactive mailbox with the same SMTP address. If you need to reuse the SMTP address that is assigned to an inactive mailbox, we recommend that you recover the inactive mailbox or restore the contents of an inactive mailbox to an active mailbox (or the archive of an active mailbox), and then delete the inactive mailbox. For more information, see one of the following articles:
- [Recover an inactive mailbox in Office 365](recover-an-inactive-mailbox.md)- - [Restore an inactive mailbox in Office 365](restore-an-inactive-mailbox.md)- - [Delete an inactive mailbox in Office 365](delete-an-inactive-mailbox.md) ## Searching disconnected or de-licensed mailboxes
Here are a few things to keep in mind when searching inactive mailboxes.
If the Exchange Online license (or the entire Microsoft 365 license) is removed from a user account or in Azure Active Directory, the user's mailbox becomes a *disconnected* mailbox. This means that the mailbox is no longer associated with the user account. Here's what happens when searching disconnected mailboxes: - If the license is removed from a mailbox, the mailbox is no longer searchable.- - If an existing content search includes a mailbox in which the license is removed, no search results from the disconnected mailbox will be returned if you rerun the content search.- - If you use the **New-ComplianceSearch** cmdlet to create a content search and specify a disconnected mailbox as the Exchange content location to search, the content search won't return any search results from the disconnected mailbox. If you need to preserve the data in a disconnected mailbox so that it's searchable, you must place a hold on the mailbox before removing the license. This preserves the data and keeps the disconnected mailbox searchable until the hold is removed. For more information about holds, see [How to identify the type of hold placed on an Exchange Online mailbox](identify-a-hold-on-an-exchange-online-mailbox.md).
-## Searching for content in a SharePoint Multi-Geo environment
+## Searching for content in a SharePoint multi-geo environment
If it's necessary for an eDiscovery manager to search for content in SharePoint and OneDrive in different regions in a [SharePoint multi-geo environment](../enterprise/multi-geo-capabilities-in-onedrive-and-sharepoint-online-in-microsoft-365.md), then you need to do the following things to make that happen:
-1. Create a separate user account for each satellite geo location that the eDiscovery manager needs to search. To search for content in sites in that geo location, the eDiscovery manager must sign in to the account you created for that location and then run a content search.
+1. Create a separate user account for each satellite geo location that the eDiscovery manager needs to search. To search for content in sites in that geo location, the eDiscovery manager must sign in to the account you created for that location, and then run a content search.
2. Create a search permissions filter for each satellite geo location (and corresponding user account) the eDiscovery manager needs to search. Each of these search permissions filters limits the scope of the content search to a specific geo location when the eDiscovery manager is signed in to the user account associated with that location.
New-ComplianceSecurityFilter -FilterName "SPMultiGeo-APC" -Users ediscovery-apc@
Keep the following things in mind when using search permissions filters to search for content in multi-geo environments: - The **Region** parameter directs searches to the specified satellite location. If an eDiscovery manager only searches SharePoint and OneDrive sites outside of the region specified in the search permissions filter, no search results are returned.- - The **Region** parameter doesn't control searches of Exchange mailboxes. All datacenters are searched when you search mailboxes. For more information about using search permissions filters in a multi-geo environment, see the "Searching and exporting content in Multi-Geo environments" section in [Set up compliance boundaries for eDiscovery investigations](set-up-compliance-boundaries.md#searching-and-exporting-content-in-multi-geo-environments).
compliance Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/content-search.md
You can use the Content search eDiscovery tool in the Microsoft Purview compliance portal to search for in-place content such as email, documents, and instant messaging conversations in your organization. Use this tool to search for content in these cloud-based Microsoft 365 data sources: - Exchange Online mailboxes- - SharePoint Online sites and OneDrive for Business accounts- - Microsoft Teams- - Microsoft 365 Groups- - Yammer Groups After you run a search, the number of content locations and an estimated number of search results are displayed on the search flyout page. You can quickly view statistics, such as the content locations that have the most items that match the search query. After you run a search, you can preview the results or export them to a local computer.
After you run a search, the number of content locations and an estimated number
## Before you run a search - To access to the Content search tool in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">compliance portal</a> (to run searches and preview results and export results), an administrator, compliance officer, or eDiscovery manager must be a member of the eDiscovery Manager role group in the compliance portal. For more information, see [Assign eDiscovery permissions](assign-ediscovery-permissions.md).- - In an Exchange hybrid deployment, you can't use the Content search tool to search emails in on-premises mailboxes. You can only use the tool to search cloud-based mailboxes.- - In an Exchange hybrid deployment, you can search for Teams chat data in on-premises mailboxes. For more information, see [Teams chat data for on-premises users](/microsoft-365/compliance/search-cloud-based-mailboxes-for-on-premises-users). ## Create and run a search
-1. Go to <https://compliance.microsoft.com> and sign in using the credentials of an account that's been assigned the appropriate permissions.
+1. Go to the [Microsoft Purview compliance portal](https://compliance.microsoft.com) and sign in using the credentials of an account that's been assigned the appropriate permissions.
-2. In the left navigation pane of the compliance portal, click **Content search**.
+2. In the left navigation pane of the compliance portal, select **Content search**.
-3. On the **Content search** page, click **New search**.
+3. On the **Content search** page, select **New search**.
-4. Type a name for the search, an optional description that helps identify the search. The name of the search must be unique in your organization.
+4. On the **Name and description** page, enter a name for the search, an optional description that helps identify the search. The name of the search must be unique in your organization.
5. On the **Locations** page, choose the content locations that you want to search. You can search mailboxes, sites, and public folders. ![Choose the content locations to search.](../media/ContentSearchLocations.png)
- 1. **Exchange mailboxes**: Set the toggle to **On** and then click **Choose users, groups, or teams** to specify the mailboxes to search. Use the search box to find user mailboxes and distribution groups. You can also search the mailbox associated with a Microsoft Team (for channel messages), Office 365 Group, and Yammer Group. For more information about the application data stored in mailboxes, see [Content stored in mailboxes for eDiscovery](what-is-stored-in-exo-mailbox.md).
+ 1. **Exchange mailboxes**: Set the toggle to **On** and then select **Choose users, groups, or teams** to specify the mailboxes to search. Use the search box to find user mailboxes and distribution groups. You can also search the mailbox associated with a Microsoft Team (for channel messages), Microsoft 365 Group, and Yammer Group. For more information about the application data stored in mailboxes, see [Content stored in mailboxes for eDiscovery](what-is-stored-in-exo-mailbox.md).
- 2. **SharePoint sites**: Set the toggle to **On** and then click **Choose sites** to specify SharePoint sites and OneDrive accounts to search. Type the URL for each site that you want to search. You can also add the URL for the SharePoint site for a Microsoft Team, Office 365 Group, or Yammer Group.
+ 2. **SharePoint sites**: Set the toggle to **On** and then select **Choose sites** to specify SharePoint sites and OneDrive accounts to search. Enter the URL for each site that you want to search. You can also add the URL for the SharePoint site for a Microsoft Team, Microsoft 365 Group, or Yammer Group.
- 3. **Exchange public folders**: Set the toggle to **On** to search public folders in your Exchange Online organization. You can't choose specific public folders to search. Leave the toggle switch off if you don't want search public folders.
+ 3. **Exchange public folders**: Set the toggle to **On** to search all public folders in your Exchange Online organization. You can't choose specific public folders to search. Leave the toggle switch off if you don't want search all public folders.
4. Keep this checkbox selected to search for Teams content for on-premises users. For example, if you search all Exchange mailboxes in the organization and this checkbox is selected, the cloud-based storage used to store Teams chat data for on-premises users will be included in the scope of the search. For more information, see [Search for Teams chat data for on-premises users](search-cloud-based-mailboxes-for-on-premises-users.md).
-6. On the **Define your search conditions** page, type a keyword query and add conditions to the search query if necessary.
+6. On the **Conditions** page, enter a keyword query and add conditions to the search query if necessary.
![Configure the search query.](../media/ContentSearchQuery.png) 1. Specify keywords, message properties such as sent and received dates, or document properties such as file names or the date that a document was last changed. You can use more complex queries that use a Boolean operator, such as **AND**, **OR**, **NOT**, and **NEAR**. If you leave the keyword box empty, all content located in the specified content locations is included in the search results. For more information, see [Keyword queries and search conditions for eDiscovery](keyword-queries-and-search-conditions.md).
- 2. Alternatively, you can click the **Show keyword list** checkbox and the type a keyword in each row. If you do this, the keywords on each row are connected by a logical operator (**c:s**) that is similar in functionality to the **OR** operator in the search query that's created.
+ 2. Alternatively, you can select the **Show keyword list** checkbox and the enter a keyword in each row. If you do this, the keywords on each row are connected by a logical operator (**c:s**) that is similar in functionality to the **OR** operator in the search query that's created.
- Why use the keyword list? You can get statistics that show how many items match each keyword. This can help you quickly identify which keywords are the most (and least) effective. You can also use a keyword phrase (surrounded by parentheses) in a row. For more information about the keyword list and search statistics, see [Get keyword statistics for searches](view-keyword-statistics-for-content-search.md#get-keyword-statistics-for-searches).
+ **Why use the keyword list**? You can get statistics that show how many items match each keyword. This can help you quickly identify which keywords are the most (and least) effective. You can also use a keyword phrase (surrounded by parentheses) in a row. For more information about the keyword list and search statistics, see [Get keyword statistics for searches](view-keyword-statistics-for-content-search.md#get-keyword-statistics-for-searches).
> [!NOTE] > To help reduce issues caused by large keyword lists, you're limited to a maximum of 20 rows in the keyword list. 3. You can add search conditions to narrow a search and return a more refined set of results. Each condition adds a clause to the search query that is created and run when you start the search. A condition is logically connected to the keyword query (specified in the keyword box) by a logical operator (**c:c**) that is similar in functionality to the **AND** operator. That means that items have to satisfy both the keyword query and one or more conditions to be included in the results. This is how conditions help to narrow your results. For a list and description of conditions that you can use in a search query, see [Search conditions](keyword-queries-and-search-conditions.md#search-conditions).
-7. Review the search settings (and edit if necessary), and then submit the search to start it.
+7. Review the search settings (and edit if necessary), and then select **Submit** to start the search.
-To access this content search again or access other content searches listed on the **Content search** page, select the search and then click **Open**.
+To access this content search again or access other content searches listed on the **Content search** page, select a search to view the search summary and search statistics.
+
+For more information about Content search, such as searching for content in different Microsoft 365 services, see [Feature reference for Content search](content-search-reference.md).
## Next steps Here's a list of next steps to perform after you create and run a Content search. - [Preview search results](preview-ediscovery-search-results.md)- - [View statistics for search results](view-keyword-statistics-for-content-search.md)- - [Export search results](export-search-results.md)- - [Export a search report](export-a-content-search-report.md)-
-## More information
-
-For more information about Content search, such as searching for content in different Microsoft 365 services, see [Feature reference for Content search](content-search-reference.md).
compliance De Duplication In Ediscovery Search Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/de-duplication-in-ediscovery-search-results.md
This article describes how de-duplication of eDiscovery search results works and explains the limitations of the de-duplication algorithm. When using eDiscovery tools to export the results of an eDiscovery search, you have the option to de-duplicate the results that are exported. What does this mean? When you enable de-duplication (by default, de-duplication isn't enabled), only one copy of an email message is exported even though multiple instances of the same message might have been found in the mailboxes that were searched. De-duplication helps you save time by reducing the number of items that you have to review and analyze after the search results are exported. But it's important to understand how de-duplication works and be aware that there are limitations to the algorithm that might cause a unique item to be marked as a duplicate during the export process.+
+The information in this article is applicable when exporting search results using one of the following eDiscovery tools:
+
+- [Content search](/microsoft-365/compliance/search-for-content) in the Microsoft Purview compliance portal
+- [In-Place eDiscovery in Exchange Online](/exchange/security-and-compliance/in-place-ediscovery/in-place-ediscovery)
+- The [eDiscovery Center in SharePoint Online](/sharepoint/dev/general-development/ediscovery-in-sharepoint)
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
When using eDiscovery tools to export the results of an eDiscovery search, you h
eDiscovery tools use a combination of the following email properties to determine whether a message is a duplicate: -- **InternetMessageId** - This property specifies the Internet message identifier of an email message, which is a globally unique identifier that refers to a specific version of a specific message. This ID is generated by the sender's email client program or host email system that sends the message. If a person sends a message to more than one recipient, the Internet message ID will be the same for each instance of the message. Subsequent revisions to the original message will receive a different message identifier. --- **ConversationTopic** - This property specifies the subject of the conversation thread of a message. The value of the **ConversationTopic** property is the string that describes the overall topic of the conversation. A conversation consists of an initial message and all messages sent in reply to the initial message. Messages within the same conversation have the same value for the **ConversationTopic** property. The value of this property is typically the Subject line from the initial message that spawned the conversation.
+- **InternetMessageId** - This property specifies the Internet message identifier of an email message, which is a globally unique identifier that refers to a specific version of a specific message. This ID is generated by the sender's email client program or host email system that sends the message. If a person sends a message to more than one recipient, the Internet message ID will be the same for each instance of the message. Subsequent revisions to the original message will receive a different message identifier.
+- **ConversationTopic** - This property specifies the subject of the conversation thread of a message. The value of the **ConversationTopic** property is the string that describes the overall article of the conversation. A conversation consists of an initial message and all messages sent in reply to the initial message. Messages within the same conversation have the same value for the **ConversationTopic** property. The value of this property is typically the Subject line from the initial message that spawned the conversation.
+- **BodyTagInfo** - This is an internal Exchange store property. The value of this property is calculated by checking various attributes in the body of the message. This property is used to identify differences in the body of messages.
-- **BodyTagInfo** - This is an internal Exchange store property. The value of this property is calculated by checking various attributes in the body of the message. This property is used to identify differences in the body of messages. -
-During the eDiscovery export process, these three properties are compared for every message that matches the search criteria. If these properties are identical for two (or more) messages, those messages are determined to be duplicates and the result is that only one copy of the message will be exported if de-duplication is enabled. The message that is exported is known as the "source item". Information about duplicate messages is included in the **Results.csv** and **Manifest.xml** reports that are included with the exported search results. In the **Results.csv** file, a duplicate message is identified by having a value in the **Duplicate to Item** column. The value in this column matches the value in the **Item Identity** column for the message that was exported.
+During the eDiscovery export process, these three properties are compared for every message that matches the search criteria. If these properties are identical for two (or more) messages, those messages are determined to be duplicates, and the result is that only one copy of the message will be exported if de-duplication is enabled. The message that is exported is known as the "source item". Information about duplicate messages is included in the **Results.csv** and **Manifest.xml** reports that are included with the exported search results. In the **Results.csv** file, a duplicate message is identified by having a value in the **Duplicate to Item** column. The value in this column matches the value in the **Item Identity** column for the message that was exported.
The following graphics show how duplicate messages are displayed in the **Results.csv** and **Manifest.xml** reports that are exported with the search results. These reports don't include the email properties previously described, which are used in the de-duplication algorithm. Instead, the reports include the **Item Identity** property that is assigned to items by the Exchange store.
- ### Results.csv report (viewed in Excel)
+### Results.csv report (viewed in Excel)
![Viewing info about duplicate items in the Results.csv report.](../media/e3d64004-3b91-4cba-b6f3-934b46cbdcdb.png)
- ### Manifest.xml report (viewed in Excel)
+### Manifest.xml report (viewed in Excel)
![Viewing info about duplicate items in the Manifest.xml report.](../media/69aa4786-9883-46ff-bcae-b35e0daf4a6d.png)
Unique messages can also be marked as duplicates when the Copy-on-Write page pro
## More information -- The information in this article is applicable when exporting search results using one of the following eDiscovery tools:-
- - Content search in compliance center in Office 365
-
- - In-Place eDiscovery in Exchange Online
-
- - The eDiscovery Center in SharePoint Online
--- For more information about exporting search results, see:-
- - [Export Content Search](export-search-results.md)
-
- - [Export a Content Search report](export-a-content-search-report.md)
-
- - [Export In-Place eDiscovery search results to a PST file](/exchange/security-and-compliance/in-place-ediscovery/export-search-results)
+For more information about exporting search results, see:
- - [Export content and create reports in the eDiscovery Center](/SharePoint/governance/export-content-and-create-reports-in-the-ediscovery-center)
+- [Export Content Search](export-search-results.md)
+- [Export a Content Search report](export-a-content-search-report.md)
+- [Export In-Place eDiscovery search results to a PST file](/exchange/security-and-compliance/in-place-ediscovery/export-search-results)
+- [Export content and create reports in the eDiscovery Center](/SharePoint/governance/export-content-and-create-reports-in-the-ediscovery-center)
compliance Differences Between Estimated And Actual Ediscovery Search Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/differences-between-estimated-and-actual-ediscovery-search-results.md
search.appverid:
# Differences between estimated and actual eDiscovery search results
-This article applies to searches that you can run using one of the following Microsoft 365 eDiscovery tools:
+This article applies to searches that you can run using one of the following Microsoft Purview eDiscovery tools:
- Content search - eDiscovery (Standard)
However, as you'll notice in the previous screenshot of the Export Summary repor
Here are some reasons for these differences: - **The way results are estimated**. An estimate of the search results is just that, an estimate (and not an actual count) of the items that meet the search query criteria. To compile the estimate of Exchange items, a list of the message IDs that meet the search criteria is requested from the Exchange database by the eDiscovery tool you're using. But when you export the search results, the search is rerun and the actual messages are retrieved from the Exchange database. So these differences might result because of how the estimated number of items and the actual number of items are determined.- - **Changes that happen between the time when estimating and exporting search results**. When you export search results, the search is restarted to collect that most recent items in the search index that meet the search criteria. It's possible there are additional items were created, sent, or received that meet the search criteria in the time between when the estimated search results were collected and when the search results were exported. It's also possible that items that were in the search index when the search results were estimated are no longer there because they were purged from the content location before the search results are exported. One way to mitigate this issue is to specify a date range for an eDiscovery search. Another way is to place a hold on content locations so that items are preserved and can't be purged. Here are other issues that can result is differences between estimated and exported search results: - In increase in items when using a date query. This is typically cause by the following two things:-
- - Hold versioning in SharePoint. If a document is deleted from a site that's on hold and document versioning is enabled, all versions of the deleted document will be preserved.
-
- - Calendar items. Accept and reject messages and recurring meetings will automatically continue creating new items in the background with old dates.
-
+ - Hold versioning in SharePoint. If a document is deleted from a site that's on hold and document versioning is enabled, all versions of the deleted document will be preserved.
+ - Calendar items. Accept and reject messages and recurring meetings will automatically continue creating new items in the background with old dates.
- With holds, there can be cases where the same item is preserved in a user's primary mailbox and in their archive mailbox. This can happen when a user manually moves an item to their archive.- - Although rare, even in the case when a hold is applied, maintenance of built-in calendar items (which aren't editable by the user, but are included in many search results) may be removed from time to time. This periodic removal of calendar items will result in fewer items that are exported. - **Unindexed items**. Items that are unindexed for search can cause differences between estimated and actual search results. You can include unindexed items when you export the search results. If you include unindexed items when exporting search results, there might be more items that are exported. This will cause a difference between the estimated and exported search results.
compliance Disable Reports When You Export Content Search Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/disable-reports-when-you-export-content-search-results.md
f1.keywords:
Previously updated : 12/30/2016 audience: Admin
# Disable reports when you export Content Search results
-When you use the eDiscovery Export tool to export the results of a Content Search in the Microsoft Purview compliance portal, the tool automatically creates and exports two reports that contain additional information about the exported content. These reports are the Results.csv file and the Manifest.xml file (see the [Frequently asked questions about disabling export reports](#frequently-asked-questions-about-disabling-export-reports) section in this topic for detailed descriptions of these reports). Because these files can be very large, you can speed up the download time and save disk space by preventing these files from being exported. You can do this by changing the Windows Registry on the computer that you use to export the search results. If you want to include the reports at a later time, you can edit the registry setting.
+When you use the eDiscovery Export tool to export the results of a Content Search in the Microsoft Purview compliance portal, the tool automatically creates and exports two reports that contain additional information about the exported content. These reports are the Results.csv file and the Manifest.xml file (see the [Frequently asked questions about disabling export reports](#frequently-asked-questions-about-disabling-export-reports) section in this article for detailed descriptions of these reports). Because these files can be very large, you can speed up the download time and save disk space by preventing these files from being exported. You can do this by changing the Windows Registry on the computer that you use to export the search results. If you want to include the reports at a later time, you can edit the registry setting.
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
When you use the eDiscovery Export tool to export the results of a Content Searc
Perform the following procedure on the computer that you'll use to export the results a content search. 1. Close the eDiscovery Export tool if it's open.
-
+
2. Perform one or both of the following steps, depending on which export report you want to disable.
-
+ - **Results.csv**
-
+ Save the following text to a Windows registry file by using a filename suffix of .reg; for example, DisableResultsCsv.reg.
-
+ ```text Windows Registry Editor Version 5.00 reg add HKLM\SOFTWARE\Microsoft\Exchange\Client\eDiscovery\ExportTool /v ResultCsvEnabled /t REG_SZ /d False ``` - **Manifest.xml**
-
+ Save the following text to a Windows registry file by using a filename suffix of .reg; for example, DisableManifestXml.reg.
-
+ ```text Windows Registry Editor Version 5.00 reg add HKLM\SOFTWARE\Microsoft\Exchange\Client\eDiscovery\ExportTool /v ResultEdrmEnabled /t REG_SZ /d False ```
-3. In Windows Explorer, click or double-click the .reg file that you created in the previous steps.
-
-4. In the User Access Control window, click **Yes** to let the Registry Editor make the change.
-
-5. When prompted to continue, click **Yes**.
-
+3. In Windows Explorer, select or double-click the .reg file that you created in the previous steps.
+
+4. In the User Access Control window, select **Yes** to let the Registry Editor make the change.
+
+5. When prompted to continue, select **Yes**.
+ The Registry Editor displays a message saying that the setting was successfully added to the registry. ## Edit registry settings to re-enable the export reports
Perform the following procedure on the computer that you'll use to export the re
If you disabled the Results.csv and Manifest.xml reports by creating the .reg files in the previous procedure, you can edit those files to re-enable a report so that it's exported with the search results. Again, perform the following procedure on the computer that you'll use to export the results a content search. 1. Close the eDiscovery Export tool if it's open.
-
+ 2. Edit one or both of the .reg edit files that you created in the previous procedure.
-
+ - **Results.csv**
-
+ Open the DisableResultsCsv.reg file in Notepad, change the value `False` to `True`, and then save the file. For example, after you edit the file, it looks like this:
-
+ ```text Windows Registry Editor Version 5.00 reg add HKLM\SOFTWARE\Microsoft\Exchange\Client\eDiscovery\ExportTool /v ResultCsvEnabled /t REG_SZ /d True ``` - **Manifest.xml**
-
+ Open the DisableManifestXml.reg file in Notepad, change the value `False` to `True`, and then save the file. For example, after you edit the file, it looks like this:
-
+ ```text Windows Registry Editor Version 5.00 reg add HKLM\SOFTWARE\Microsoft\Exchange\Client\eDiscovery\ExportTool /v ResultEdrmEnabled /t REG_SZ /d True ```
-3. In Windows Explorer, click or double-click a .reg file that you edited in the previous step.
-
-4. In the User Access Control window, click **Yes** to let the Registry Editor make the change.
-
-5. When prompted to continue, click **Yes**.
-
+3. In Windows Explorer, select or double-click a .reg file that you edited in the previous step.
+
+4. In the User Access Control window, select **Yes** to let the Registry Editor make the change.
+
+5. When prompted to continue, select **Yes**.
+ The Registry Editor displays a message saying that the setting was successfully added to the registry. ## Frequently asked questions about disabling export reports
- **What are the Results.csv and Manifest.xml reports?**
+**What are the Results.csv and Manifest.xml reports?**
The Results.csv and Manifest.xml files contain additional information about the content that was exported. - **Results.csv** An Excel document that contains information about each item that is download as a search result. For email, the result log contains information about each message, including:
-
+ - The location of the message in the source mailbox (including whether the message is in the primary or archive mailbox).
-
- The date the message was sent or received.
-
- The Subject line from the message.
-
- The sender and recipients of the message.
-
- - Whether the message is a duplicate message if you enabled de-duplication when exporting the search results. Duplicate messages will have a value in the **Parent ItemId** column that identifies the message as a duplicate. The value in the **Parent ItemId** column is the same as the value in the **Item DocumentId** column of the message that was exported.
-
- For documents from SharePoint and OneDrive for Business sites, the result log contains information about each document, including:
-
+ - Whether the message is a duplicate message if you enabled de-duplication when exporting the search results. Duplicate messages will have a value in the **Parent ItemId** column that identifies the message as a duplicate. The value in the **Parent ItemId** column is the same as the value in the **Item DocumentId** column of the message that was exported.
+
+ For documents from SharePoint and OneDrive for Business sites, the result log contains information about each document, including:
+ - The URL for the document.
-
- The URL for the site collection where the document is located.
-
- The date that the document was last modified.
-
- The name of the document (which is located in the Subject column in the result log).
-
+ - **Manifest.xml** A manifest file (in XML format) that contains information about each item included in the search results. The information in this report is the same as the Results.csv report, but it's in the format specified by the Electronic Discovery Reference Model (EDRM). For more information about EDRM, go to [https://www.edrm.net](https://www.edrm.net).
-
- **When should I disable exporting these reports?**
+
+**When should I disable exporting these reports?**
It depends on your specific needs. Many organizations don't require additional information about search results, and don't need these reports.
- **What computer do I have to do this on?**
+**What computer do I have to do this on?**
- You have to change the registry setting on any local computer that you run the eDiscovery Export tool on.
+You have to change the registry setting on any local computer that you run the eDiscovery Export tool on.
- **After I change this setting, do I have to restart the computer?**
+**After I change this setting, do I have to restart the computer?**
No, you don't have to restart the computer. But if the eDiscovery Export tool is running, you have to close it and then restart it after you change the registry setting.
- **Does an existing registry key get edited or does a new key get created?**
+**Does an existing registry key get edited or does a new key get created?**
-A new registry key is created the first time you run the .reg file that you created in the procedure in this topic. Then the setting is edited each time you change and re-run the .reg edit file.
+A new registry key is created the first time you run the .reg file that you created in the procedure in this article. Then the setting is edited each time you change and rerun the .reg edit file.
compliance Ediscovery Decryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-decryption.md
Title: "Decryption in eDiscovery"
+ Title: "Decryption in Microsoft Purview eDiscovery tools"
description: "Learn about how Microsoft 365 eDiscovery tools handle encrypted documents attached to email messages and stored in SharePoint Online and OneDrive for Business." f1.keywords: - NOCSH
- seo-marvel-apr2020
-# Decryption in Microsoft 365 eDiscovery tools
+# Decryption in Microsoft Purview eDiscovery tools
Encryption is an important part of your file protection and information protection strategy. Organizations of all types use encryption technology to protect sensitive content within their organization and ensure that only the right people have access to that content.
-To execute common eDiscovery tasks on encrypted content, eDiscovery managers were required to decrypt email message content as it was exported from content searches, Microsoft Purview eDiscovery (Standard) cases, and Microsoft Purview eDiscovery (Premium) cases. Content encrypted with Microsoft encryption technologies wasn't available for review until after it was exported.
+To run common eDiscovery tasks on encrypted content, eDiscovery managers were required to decrypt email message content as it was exported from content searches, Microsoft Purview eDiscovery (Standard) cases, and Microsoft Purview eDiscovery (Premium) cases. Content encrypted with Microsoft encryption technologies wasn't available for review until after it was exported.
-To make it easier to manage encrypted content in the eDiscovery workflow, Microsoft 365 eDiscovery tools now incorporate the decryption of encrypted files attached to email messages and sent in Exchange Online.<sup>1</sup> Additionally, encrypted documents stored in SharePoint Online and OneDrive for Business are decrypted in eDiscovery (Premium)<sup>2</sup>.
+To make it easier to manage encrypted content in the eDiscovery workflow, Microsoft Purview eDiscovery tools now incorporate the decryption of encrypted files attached to email messages and sent in Exchange Online.<sup>1</sup> Additionally, encrypted documents stored in SharePoint Online and OneDrive for Business are decrypted in eDiscovery (Premium)<sup>2</sup>.
-Prior to this new capability, only the content of an email message protected by rights management (and not attached files) were decrypted. Encrypted documents in SharePoint and OneDrive couldn't be decrypted during the eDiscovery workflow. Now, files that are encrypted with a Microsoft encryption technology is located on a SharePoint or OneDrive account are searchable and decrypted when the search results are prepared for preview, added to a review set in eDiscovery (Premium), and exported. Additionally, encrypted documents in SharePoint and OneDrive that are attached to an email message (as a copy) are searchable. This decryption capability allows eDiscovery managers to view the content of encrypted email attachments and site documents when previewing search results, and review them after they have been added to a review set in eDiscovery (Premium).
+Prior to this new capability, only the content of an email message protected by rights management (and not attached files) were decrypted. Encrypted documents in SharePoint and OneDrive couldn't be decrypted during the eDiscovery workflow. Now, files that are encrypted with a Microsoft encryption technology is located on a SharePoint or OneDrive account are searchable and decrypted when the search results are prepared for preview, added to a review set in eDiscovery (Premium), and exported. Additionally, encrypted documents in SharePoint and OneDrive that are attached to an email message (as a copy) are searchable. This decryption capability allows eDiscovery managers to view the content of encrypted email attachments and site documents when previewing search results, and review them after they've been added to a review set in eDiscovery (Premium).
[!INCLUDE [purview-preview](../includes/purview-preview.md)] ## Supported encryption technologies
-For Exchange, Microsoft eDiscovery tools support items encrypted with Microsoft encryption technologies. These technologies are Azure Rights Management (Azure RMS)<sup>3</sup> and Microsoft Purview Information Protection (specifically sensitivity labels). For more information about Microsoft encryption technologies, see [Encryption](encryption.md) and the various [email encryption](email-encryption.md#comparing-email-encryption-options-available-in-office-365) options available. Content encrypted by S/MIME or third-party encryption technologies isn't supported. For example, previewing or exporting content encrypted with non-Microsoft technologies isn't supported.
+For Exchange, Microsoft Purview eDiscovery tools support items encrypted with Microsoft encryption technologies. These technologies are Azure Rights Management (Azure RMS)<sup>3</sup> and Microsoft Purview Information Protection (specifically sensitivity labels). For more information about Microsoft encryption technologies, see [Encryption](encryption.md) and the various [email encryption](email-encryption.md#comparing-email-encryption-options-available-in-office-365) options available. Content encrypted by S/MIME or third-party encryption technologies isn't supported. For example, previewing or exporting content encrypted with non-Microsoft technologies isn't supported.
> [!NOTE] > The decryption of email messages sent with an [Microsoft Purview Message Encryption custom branding template](add-your-organization-brand-to-encrypted-messages.md) is not supported by Microsoft eDiscovery tools. When using an OME custom branding template, email messages are delivered to the OME portal instead of the recipient's mailbox. Therefore, you won't be able to use eDiscovery tools to search for encrypted messages because those messages are never received by the recipient's mailbox.
-For SharePoint, content labeled with SharePoint online service will be decrypted. Items labeled or encrypted in the client before uploading to SharePoint, legacy document library RMS templates or settings and S/MIME or other standards are not supported<sup>2</sup>.
+For SharePoint, content labeled with SharePoint online service will be decrypted. Items labeled or encrypted in the client before uploading to SharePoint, legacy document library RMS templates or settings and S/MIME or other standards aren't supported<sup>2</sup>.
## eDiscovery activities that support encrypted items
The following table identifies the supported tasks that can be performed in Micr
eDiscovery doesn't support encrypted files in SharePoint and OneDrive when a sensitivity label that applied the encryption is configured with either of the following settings: - Users can assign permissions when they manually apply the label to a document. This is sometimes referred to as *user-defined permissions*.- - User access to the document has an expiration setting that is set to a value other than **Never**. For more information about these settings, see the "Configure encryption settings" section in [Restrict access to content by using sensitivity labels to apply encryption](encryption-sensitivity-labels.md#configure-encryption-settings).
This role is assigned by default to the eDiscovery Manager role group on the **P
Any rights-protected (RMS-protected) email messages included in the results of a Content search will be decrypted when you export them. Additionally, any file that's encrypted with a [Microsoft encryption technology](encryption.md) and is attached to an email message that's included in the search results will be decrypted when it's exported. This decryption capability is enabled by default for members of the eDiscovery Manager role group. This is because the RMS Decrypt management role is assigned to this role group by default. Keep the following things in mind when exporting encrypted email messages and attachments: - As previously explained, if you enable decryption of RMS-protected messages when you export them, you have to export the search results as individual messages. If you export search results to a PST file, RMS-protected messages will be exported as individual email messages.- - Messages that are decrypted are identified in the **ResultsLog** report. This report contains a column named **Decode Status**, and a value of **Decoded** identifies the messages that were decrypted.- - In addition to decrypting file attachments when exporting search results, you can also preview the decrypted file when previewing search results. You can only view the rights-protected email message after you export it.- - If you need to prevent someone from decrypting RMS-protect messages and encrypted file attachments, you have to create a custom role group (by copying the built-in eDiscovery Manager role group) and then remove the RMS Decrypt management role from the custom role group. Then add the person who you don't want to decrypt messages as a member of the custom role group. ## Notes
-<sup>1</sup> Encrypted files located on a local computer and copied to an email message arenΓÇÖt decrypted and indexed for eDiscovery. For eDiscovery (Premium), encrypted email and attachments in recipient mailbox needs to be advanced indexed to be decrypted. For more information about advanced indexing, see [Advanced indexing of custodian data](indexing-custodian-data.md).
+<sup>1</sup> Encrypted files located on a local computer and copied to an email message aren't decrypted and indexed for eDiscovery. For eDiscovery (Premium), encrypted email and attachments in recipient mailbox needs to be advanced indexed to be decrypted. For more information about advanced indexing, see [Advanced indexing of custodian data](indexing-custodian-data.md).
<sup>2</sup> Only items labeled within SharePoint online service will be decrypted, everything else is unsupported including labeling or encrypting in the client before upload, legacy doc library RMS templates or settings, SMIME or any other standard etc. See [Enable sensitivity labels for Office files](sensitivity-labels-sharepoint-onedrive-files.md).
-<sup>3</sup> The RMS keys need to be fully managed in M365/O365 cloud service - meaning DKE, BYOK, OnPrem RMS, etc. are not supported. See [Your Azure Information Protection tenant key](/azure/information-protection/plan-implement-tenant-key#tenant-root-keys-generated-by-microsoft).
+<sup>3</sup> The RMS keys need to be fully managed in M365/O365 cloud service - meaning DKE, BYOK, on-premises RMS, etc. aren't supported. See [Your Azure Information Protection tenant key](/azure/information-protection/plan-implement-tenant-key#tenant-root-keys-generated-by-microsoft).
compliance Ediscovery Kql Editor https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-kql-editor.md
search.appverid:
# Use the KQL editor to build search queries
-The new KQL query experience in Microsoft 365 eDiscovery tools search provides feedback and guidance when you build search queries in Content search, Microsoft Purview eDiscovery (Standard), and eDiscovery (Premium). When you type queries in the editor, it provides autocompletion for supported searchable properties and conditions and provides lists of supported values for standard properties and conditions. For example, if you specify the `kind` email property in your query, the editor will present a list of supported values that you can select. The KQL editor also displays potential query errors in real time that you can fix before you run the search. Best of all, you can paste complex queries directly into the editor without having to manually build queries using the keywords and conditions cards in the standard condition builder.
+The new Keyword Query Language (KQL) query experience in Microsoft Purview eDiscovery tools search provides feedback and guidance when you build search queries in Content search, Microsoft Purview eDiscovery (Standard), and eDiscovery (Premium). When you enter queries in the editor, it provides autocompletion for supported searchable properties and conditions and provides lists of supported values for standard properties and conditions. For example, if you specify the `kind` email property in your query, the editor will present a list of supported values that you can select. The KQL editor also displays potential query errors in real time that you can fix before you run the search. Best of all, you can paste complex queries directly into the editor without having to manually build queries using the keywords and conditions cards in the standard condition builder.
Here are the key benefits to using the KQL editor: - Provides guidance and helps you build search queries from scratch.- - Lets you quickly paste long, complex queries directly into the editor. For example, if you receive a complex query from opposing counsel, you can paste that into the KQL editor instead of having to use the condition builder.- - Quickly identifies potential errors and displays hints about how to resolve issues. The KQL editor is also available when you create query-based holds in eDiscovery (Standard) and eDiscovery (Premium).
The following sections show examples of how the KQL editor provides suggestions
### Autocompletion of search properties and operators
-When you start to type a search query in the KQL editor, the editor displays suggested autocompletion of supported search properties (also called *property restrictions*) that you can select. You have to type a minimum of two characters to display a list of supported properties that begin with those two characters. For example, the following screenshot shows the suggested search properties that begin with `Se`.
+When you start to enter a search query in the KQL editor, the editor displays suggested autocompletion of supported search properties (also called *property restrictions*) that you can select. You have to type a minimum of two characters to display a list of supported properties that begin with those two characters. For example, the following screenshot shows the suggested search properties that begin with `Se`.
![KQL editor suggests supported properties](../media/KQLEditorAutoCompleteProperties.png)
compliance Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery.md
Electronic discovery, or eDiscovery, is the process of identifying and deliverin
Microsoft Purview provides three eDiscovery solutions: Content search, eDiscovery (Standard), and eDiscovery (Premium).
-<!--
-![Key capabilities of Microsoft Purview eDiscovery tools.](..\media\m365-ediscovery-solution-graphic.png)
>- |Content Search|eDiscovery (Standard)|eDiscovery (Premium)|
-||||
-|Search for content </br> Keyword queries and search conditions </br> Export search results </br> Role-based permissions|Search and export </br> Case management </br>Legal hold|Custodian management </br> Legal hold notifications </br> Advanced indexing </br> Review set filtering </br> Tagging </br> Analytics </br> Predictive coding models </br> And more...|
+|:-|:--|:-|
+|- Search for content </br> - Keyword queries and search conditions </br> - Export search results </br> - Role-based permissions|- Search and export </br> - Case management </br> - Legal hold| - Custodian management </br> - Legal hold notifications </br> - Advanced indexing </br> - Review set filtering </br> - Tagging </br> - Analytics </br> - Predictive coding models </br> And more...|
- **Content search**. Use the Content search tool to search for content across Microsoft 365 data sources and then export the search results to a local computer. -- **eDiscovery (Standard)**. eDiscovery (Standard) builds on the basic search and export functionality of Content search by enabling you to create eDiscovery cases and assign eDiscovery managers to specific cases. eDiscovery managers can only access the cases of which they are members. eDiscovery (Standard) also lets you associate searches and exports with a case and lets you place an eDiscovery hold on content locations relevant to the case.
+- **eDiscovery (Standard)**. eDiscovery (Standard) builds on the basic search and export functionality of Content search by enabling you to create eDiscovery cases and assign eDiscovery managers to specific cases. eDiscovery managers can only access the cases of which they're members. eDiscovery (Standard) also lets you associate searches and exports with a case and lets you place an eDiscovery hold on content locations relevant to the case.
- **eDiscovery (Premium)**. The eDiscovery (Premium) tool builds on the existing case management, preservation, search, and export capabilities in eDiscovery (Standard). eDiscovery (Premium) provides an end-to-end workflow to identify, preserve, collect, review, analyze, and export content that's responsive to your organization's internal and external investigations. It lets legal teams manage custodians and the legal hold notification workflow to communicate with custodians involved in a case. It allows you to collect and copy data from the live service into review sets, when you can filter, search, and tag content to cull non-relevant content from further review so your workflow can identify and focus on content that's most relevant. eDiscovery (Premium) provides analytics and machine learning-based predictive coding models to further narrow to scope of your investigation to the most relevant content.
Here's a description of each eDiscovery capability.
- **Search for content**. Search for content that's stored in Exchange mailboxes, OneDrive for Business accounts, SharePoint sites, Microsoft Teams, Microsoft 365 Groups, and Yammer Teams. This includes content generated by other Microsoft 365 apps that store data in mailboxes and sites. -- **Keyword queries and search conditions**. Create KQL keyword search queries to search for content that match query criteria. You can also include conditions to narrow the scope of your search.
+- **Keyword queries and search conditions**. Create Keyword Query Language (KQL) search queries to search for content keywords that match query criteria. You can also include conditions to narrow the scope of your search.
- **Search statistics**. After you run a search, you can view statistics of the estimated search results, such as the number and total size of items matching your search criteria. Other statistics include the top content locations that contain search results and the number of items that match different parts of the search query. - **Export search results**. Export search results to a local computer in your organization in a two-step process. When you export search results, items are copied from their original content location in Microsoft 365 to a Microsoft-provided Azure Storage location. Then you can download those items to a local computer. -- **Role-based permissions**. Use role-based access (RBAC) permissions to control what eDiscovery-related tasks that different users can perform. You can use a built-in eDiscovery-related role group or create custom role groups that assign specific eDiscovery permissions.
+- **Role-based permissions**. Use role-based access control (RBAC) permissions to control what eDiscovery-related tasks that different users can perform. You can use a built-in eDiscovery-related role group or create custom role groups that assign specific eDiscovery permissions.
- **Case management**. eDiscovery cases in eDiscovery (Standard) and eDiscovery (Premium) let you associate specific searches and exports with a specific investigation. You can also assign members to a case to control who can access the case and view the contents of the case.
Here's a description of each eDiscovery capability.
- **Legal hold notifications**. Manage the process of communicating with case custodians. A legal hold notification instructs custodians to preserve content that's relevant to the case. You can track the notices that were received, read, and acknowledged by custodians. The communications workflow in eDiscovery (Premium) allows you to create and send initial notifications, reminders, and escalations if custodians fail to acknowledge a hold notification. -- **Advanced indexing**. When you add custodial and non-custodian data sources to a case, the associated content locations are reindexed (in a process called *Advanced indexing*) so that any content deemed as partially indexed is reprocessed to make it fully searchable when you collect data for an investigation.
+- **Advanced indexing**. When you add custodial and non-custodian data sources to a case, the associated content locations are reindexed in a process called *Advanced indexing*. Advanced indexing ensures any content deemed as partially indexed is reprocessed to make it fully searchable when you collect data for an investigation.
- **Error remediation**. Fix processing errors using a process called *error remediation*. Error remediation allows you to rectify data issues that prevent eDiscovery (Premium) from properly processing the content during Advanced indexing. For example, files that are password protected can't be processed since the files are locked or encrypted. Using error remediation, you can download files with errors, remove the password protection, and then upload the remediated files.
Here's a description of each eDiscovery capability.
- **Collection statistics and reports**. After you create a draft collection or commit a collection to a review set, you can view a rich set of statistics on the retrieved items, such as the content locations that contain the most items that matched the search criteria and the number of items returned by the search query. You can also preview a subset of the results. -- **Review set filtering**. After content is added to a review set, you can apply filters to display only the set of items that match your filtering criteria. Then you can save the filter sets as a query, which lets you quickly reapply the saved filters. Review set filtering and saved queries help you quickly cull content to the items that are most relevant to your investigation.
+- **Review set filtering**. After content is added to a review set, you can apply filters to display only the set of items that match your filtering criteria. Then you can save the filter sets as a query, which lets you quickly reapply the saved filters. Review set filtering and saved queries help you quickly select content items that are most relevant to your investigation.
-- **Tagging**. Tags also help you cull non-relevant content and identify the most relevant content. When experts, attorneys, or other users review content in a review set, their opinions related to the content can be captured by using tags. For example, if the intent is to cull unnecessary content, a user can tag documents with a tag such as "non-responsive". After content has been reviewed and tagged, a review set query can be created to exclude any content tagged as "non-responsive". This process eliminates the non-responsive content from subsequent steps in the eDiscovery workflow.
+- **Tagging**. Tags also help you omit non-relevant content and identify the most relevant content. When experts, attorneys, or other users review content in a review set, their opinions related to the content can be captured by using tags. For example, if the intent is to exclude unnecessary content, a user can tag documents with a tag such as "non-responsive". After content has been reviewed and tagged, a review set query can be created to exclude any content tagged as "non-responsive". This process eliminates the non-responsive content from subsequent steps in the eDiscovery workflow.
- **Analytics**. eDiscovery (Premium) provides tools to analyze review set documents to help you organize the documents in a coherent manner and reduce the volume of documents to be reviewed. *Near duplicate detection* groups textually similar documents together to help you make your review process more efficient. *Email threading* identifies specific email messages that give a complete context of the conversation in an email thread. *Themes* functionality attempts to analyze themes in review set documents and assign a theme to documents so that you can review documents with related theme. These analytics capabilities help make your review process more efficient so that reviewers can review a fraction of collected documents. -- **Predictive coding models**. Use predictive coding models to reduce and cull large volumes of case content to a relevant set of items that you can prioritize for review. This is accomplished by creating and training your own predictive coding models that help you prioritize the review of the most relevant items in a review set. The system uses the training to apply prediction scores to every item in the review set. This lets you filter items based on the prediction score, which allows you to review the most relevant (or non-relevant) items first.
+- **Predictive coding models**. Use predictive coding models to reduce large volumes of case content to a relevant set of items that you can prioritize for review. This is accomplished by creating and training your own predictive coding models that help you prioritize the review of the most relevant items in a review set. The system uses the training to apply prediction scores to every item in the review set. This lets you filter items based on the prediction score, which allows you to review the most relevant (or non-relevant) items first.
- **Computed document metadata**. Many of the eDiscovery (Premium) features, such as Advanced indexing, conversation threading, analytics, and predictive coding add metadata properties to review set documents. This metadata contains information related to the function performed by a specific feature. When reviewing documents, you can filter on metadata properties to display documents that match your filter criteria. This metadata can be imported into third-party review applications after review set documents are exported. -- **Transparency of long-running jobs**. Jobs in eDiscovery (Premium) are typically long-running processes that are triggered by user actions, such as the adding custodians to a case, adding content to a review set, running analytics, and training predictive coding models. You can track the status of these jobs and get support information if you need to escalate issues to MS Support.
+- **Transparency of long-running jobs**. Jobs in eDiscovery (Premium) are typically long-running processes that are triggered by user actions, such as the adding custodians to a case, adding content to a review set, running analytics, and training predictive coding models. You can track the status of these jobs and get support information if you need to escalate issues to Microsoft Support.
- **Export to customer-owned Azure Storage location**. When you export documents from a review set, you have the option to export them to an Azure Storage account managed by your organization. Additionally, eDiscovery (Premium) lets you customize what data is exported. This includes exporting file metadata, native files, text files, tags, and redacted documents saved to a PDF file.
The following sections show the minimum subscription requirements for Content se
- Office 365 Education A1 subscription - Office 365 E1 subscription - ### eDiscovery (Standard) - Exchange Online Plan 2
The following sections show the minimum subscription requirements for Content se
## Get started with eDiscovery
-See the following articles to help you learn more and get started using the eDiscovery solutions in Microsoft 365.
+See the following articles to help you learn more and get started using Microsoft Purview eDiscovery solutions.
-### Content search
+### Get started with Content search
- [Search for content using Content search](search-for-content.md)- - [Create a search](content-search.md)
-### eDiscovery (Standard)
+### Get started with eDiscovery (Standard)
- [Get started with eDiscovery (Standard)](get-started-core-ediscovery.md)
-### eDiscovery (Premium)
+### Get started with eDiscovery (Premium)
- [Overview of eDiscovery (Premium)](overview-ediscovery-20.md)- - [Set up eDiscovery (Premium)](get-started-with-advanced-ediscovery.md)- - [Create and manage an eDiscovery (Premium) case](create-and-manage-advanced-ediscoveryv2-case.md) ## eDiscovery roadmap
To see what eDiscovery features have been launched, are rolling out, or in devel
## Training
-Training your IT administrators, eDiscovery managers, and compliance investigation teams in the basics for Content search, eDiscovery (Standard), and eDiscovery (Premium) can help your organization get started more quickly using Microsoft 365 eDiscovery tools. Microsoft 365 provides the following resource to help these users in your organization getting started with eDiscovery: [Describe the eDiscovery and audit capabilities of Microsoft 365](/training/modules/describe-ediscovery-capabilities-of-microsoft-365).
+Training your IT administrators, eDiscovery managers, and compliance investigation teams in the basics for Content search, eDiscovery (Standard), and eDiscovery (Premium) can help your organization get started more quickly using Microsoft Purview eDiscovery tools. To help these users in your organization getting started with eDiscovery, see [Describe the eDiscovery and audit capabilities of Microsoft Purview](/training/modules/describe-ediscovery-capabilities-of-microsoft-365).
compliance Export A Content Search Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/export-a-content-search-report.md
When you export a report, the report files are downloaded to a folder on your lo
## Before you export a search report - To export a search report, you have to be assigned the Compliance Search management role in compliance portal. This role is assigned by default to the built-in eDiscovery Manager and Organization Management role groups. For more information, see [Assign eDiscovery permissions](assign-ediscovery-permissions.md).- - When you export a report, the data is temporarily stored in an Azure Storage location in the Microsoft cloud before it's downloaded to your local computer. Be sure that your organization can connect to the endpoint in Azure, which is **\*.blob.core.windows.net** (the wildcard represents a unique identifier for your export). The search results data is deleted from the Azure Storage location two weeks after it's created.- - The computer you use to export the search report has to meet the following system requirements: - Latest version of Windows (32-bit or 64-bit)
-
- Microsoft .NET Framework 4.7 or higher - You have to use Microsoft Edge<sup>1</sup> to run the eDiscovery Export Tool. Using Internet Explorer 11 to export search results is no longer supported<sup>2</sup>. > [!NOTE]
- > <sup>1</sup> As a result of recent changes to Microsoft Edge, ClickOnce support is no longer enabled by default. For instructions on enabling ClickOnce support in Edge, see [Use the eDiscovery Export Tool in Microsoft Edge](configure-edge-to-export-search-results.md). Also, Microsoft doesn't manufacture third-party extensions or add-ons for ClickOnce applications. Exporting search results using an unsupported browser with third-party extensions or add-ons isn't supported.
+ > <sup>1</sup> As a result of recent changes to Microsoft Edge, SelectOnce support is no longer enabled by default. For instructions on enabling SelectOnce support in Edge, see [Use the eDiscovery Export Tool in Microsoft Edge](configure-edge-to-export-search-results.md). Also, Microsoft doesn't manufacture third-party extensions or add-ons for SelectOnce applications. Exporting search results using an unsupported browser with third-party extensions or add-ons isn't supported.
> > <sup>2</sup> Beginning August 2021, Microsoft 365 apps and services will no longer support Internet Explorer 11 (IE11) and users may have a degraded experience or be unable to connect to those apps and services. These apps and services will phase out over the upcoming weeks and months to ensure a smooth end of support. Each app and service are being phased out on independent schedules. For more information, see this [blog post](https://techcommunity.microsoft.com/t5/microsoft-365-blog/microsoft-365-apps-say-farewell-to-internet-explorer-11-and/ba-p/1591666). -- If the estimated total size of the results returned by search exceeds 2 TB, exporting the reports fails. To successfully export the reports, try to narrow the scope and rerun the search so the estimated size of the results is less than 2 TB.-
+- If the estimated total size of the results returned by search exceeds 2 TB, exporting the reports fails. To successfully export the reports, try to narrow the scope, and rerun the search so the estimated size of the results is less than 2 TB.
- If the results of a search are older than 7 days and you submit an export report job, an error message is displayed prompting you to rerun the search to update the search results. If this happens, cancel the export, rerun the search, and then start the export again.- - Exporting search reports counts against the maximum number of exports running at the same time and the maximum number of exports that a single user can run. For more information about export limits, see [Export Content search results](export-search-results.md#export-limits). ## Step 1: Generate the report for export
The first step is to prepare the report for downloading to your computer exporti
1. In the compliance portal, select the Content search that you want to export the report from.
-2. On the **Actions** menu at the bottom of the search flyout page, click **Export report**.
+2. On the **Actions** menu at the bottom of the search flyout page, select **Export report**.
![Export report option in Actions menu.](../media/ActionMenuExportReport.png)
The first step is to prepare the report for downloading to your computer exporti
For more information about de-duplication and how duplicate items are identified, see [De-duplication in eDiscovery search results](de-duplication-in-ediscovery-search-results.md).
-5. Click **Generate report**.
+5. Select **Generate report**.
The search reports are prepared for downloading, which means the report documents are uploaded to an Azure Storage location in the Microsoft cloud. This may take several minutes.
The next step is to download the report from the Azure Storage area to your loca
1. On the **Content search** page in the compliance portal, select the **Exports** tab
- You may have to click **Refresh** to update the list of export jobs so that it shows the export job you created. Export report jobs have the same name as the corresponding search with **_ReportsOnly** appended to the search name.
+ You may have to select **Refresh** to update the list of export jobs so that it shows the export job you created. Export report jobs have the same name as the corresponding search with **_ReportsOnly** appended to the search name.
2. Select the export job that you created in Step 1.
-3. On the **Export report** flyout page under **Export key**, click **Copy to clipboard**. You use this key in step 6 to download the search results.
+3. On the **Export report** flyout page under **Export key**, select **Copy to clipboard**. You use this key in step 6 to download the search results.
> [!IMPORTANT] > Because anyone can install and start the eDiscovery Export tool, and then use this key to download the search report, be sure to take precautions to protect this key just like you would protect passwords or other security-related information.
-4. At the top of the flyout page, click **Download results**.
+4. At the top of the flyout page, select **Download results**.
-5. If you're prompted to install the **eDiscovery Export Tool**, click **Install**.
+5. If you're prompted to install the **eDiscovery Export Tool**, select **Install**.
6. In the **eDiscovery Export Tool**, do the following:
The next step is to download the report from the Azure Storage area to your loca
1. Paste the export key that you copied in step 3 in the appropriate box.
- 2. Click **Browse** to specify the location where you want to download the search report files.
+ 2. Select **Browse** to specify the location where you want to download the search report files.
-7. Click **Start** to download the search results to your computer.
+7. Select **Start** to download the search results to your computer.
The **eDiscovery Export Tool** displays status information about the export process, including an estimate of the number (and size) of the remaining items to be downloaded. When the export process is complete, you can access the files in the location where they were downloaded.
When you generate and export a report about the results of a Content search, the
If you include unindexed items when exporting the report, the number of unindexed items are included in the total number of estimated search results and in the total number of downloaded search results (if you were to export the search results) that are listed in the export summary report. In other words, the total number of items that would be downloaded is equal to the total number of estimated results and the total number of unindexed items. -- **Manifest:** A manifest file (in XML format) that contains information about each item included in the search results. If you enabled the de-duplication option, duplicate messages are not included in the manifest file.-
+- **Manifest:** A manifest file (in XML format) that contains information about each item included in the search results. If you enabled the de-duplication option, duplicate messages aren't included in the manifest file.
- **Results:** An Excel document that contains a row with information about each indexed item that would be exported with the search results. For email, the result log contains information about each message, including: - The location of the message in the source mailbox (including whether the message is in the primary or archive mailbox).- - The date the message was sent or received.- - The Subject line from the message.- - The sender and recipients of the message. For documents from SharePoint and OneDrive for Business sites, the results log contains information about each document, including: - The URL for the document.- - The URL for the site collection where the document is located.- - The date that the document was last modified.- - The name of the document (which is located in the Subject column in the result log). > [!NOTE] > The number of rows in the **Results** report should be equal to the total number of search results minus the total number of items listed in the **Unindexed Items** report. - **Trace.log:** A trace log that contains detailed logging information about the export process and can help uncover issues during export. If you open a ticket with Microsoft Support about an issue related to exporting search reports, you may be asked to provide this trace log.- - **Unindexed items:** An Excel document that contains information about any unindexed items included in the search results. If you don't include unindexed items when you generate the search results report, this report will still be downloaded, but will be empty.
compliance Export Search Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/export-search-results.md
Exporting the results of a Content search involves preparing the results, and th
## Before you export search results - To export search results, you have to be assigned the Export management role in Microsoft Purview compliance portal. This role is assigned to the built-in eDiscovery Manager role group. It isn't assigned by default to the Organization Management role group. For more information, see [Assign eDiscovery permissions](assign-ediscovery-permissions.md).- - The computer you use to export the search results has to meet the following system requirements: - Latest version of Windows (32-bit or 64-bit)
-
- Microsoft .NET Framework 4.7 or higher
-
+ - You have to use Microsoft Edge<sup>1</sup> to run the eDiscovery Export Tool. Using Internet Explorer 11 to export search results is no longer supported<sup>2</sup>. > [!NOTE]
- > <sup>1</sup> As a result of recent changes to Microsoft Edge, ClickOnce support is no longer enabled by default. For instructions on enabling ClickOnce support in Edge, see [Use the eDiscovery Export Tool in Microsoft Edge](configure-edge-to-export-search-results.md). Also, Microsoft doesn't manufacture third-party extensions or add-ons for ClickOnce applications. Exporting search results using an unsupported browser with third-party extensions or add-ons isn't supported.
+ > <sup>1</sup> As a result of recent changes to Microsoft Edge, SelectOnce support is no longer enabled by default. For instructions on enabling SelectOnce support in Edge, see [Use the eDiscovery Export Tool in Microsoft Edge](configure-edge-to-export-search-results.md). Also, Microsoft doesn't manufacture third-party extensions or add-ons for SelectOnce applications. Exporting search results using an unsupported browser with third-party extensions or add-ons isn't supported.
> > <sup>2</sup> Beginning August 2021, Microsoft 365 apps and services will no longer support Internet Explorer 11 (IE11) and users may have a degraded experience or be unable to connect to those apps and services. These apps and services will phase out over the upcoming weeks and months to ensure a smooth end of support. Each app and service are being phased out on independent schedules. For more information, see this [blog post](https://techcommunity.microsoft.com/t5/microsoft-365-blog/microsoft-365-apps-say-farewell-to-internet-explorer-11-and/ba-p/1591666). -- The eDiscovery Export Tool that you use in Step 2 to download search results doesn't support automation (by using a script or running cmdlets). We highly recommended that you don't automate the preparation process in Step 1 or the download process in Step 2. If you automate either of these processes, Microsoft Support will not provide assistance if you run into issues.-
+- The eDiscovery Export Tool that you use in Step 2 to download search results doesn't support automation (by using a script or running cmdlets). We highly recommended that you don't automate the preparation process in Step 1 or the download process in Step 2. If you automate either of these processes, Microsoft Support won't provide assistance if you run into issues.
- We recommend downloading search results to a local computer. To eliminate your company's firewall or proxy infrastructure from causing issues when downloading search results, you might consider downloading search results to a virtual desktop outside of your network. This may decrease timeouts that occur in Azure data connections when exporting a large number of files. For more information about virtual desktops, see [Windows Virtual Desktop](https://azure.microsoft.com/services/virtual-desktop).- - To improve performance when downloading search results, consider dividing searches that return a large set of results into smaller searches. For example, you can use date ranges in search queries to return a smaller set of results that can be downloaded faster.
-
- When you export search results, the data is temporarily stored in a Microsoft-provided Azure Storage location in the Microsoft cloud before it's downloaded to your local computer. Be sure that your organization can connect to the endpoint in Azure, which is **\*.blob.core.windows.net** (the wildcard represents a unique identifier for your export). The search results data is deleted from the Azure Storage location two weeks after it's created.
-
- If your organization uses a proxy server to communicate with the Internet, you need to define the proxy server settings on the computer that you use to export the search results (so the export tool can be authenticated by your proxy server). To do this, open the *machine.config* file in the location that matches your version of Windows. - **32-bit:** `%windir%\Microsoft.NET\Framework\[version]\Config\machine.config`
-
- **64-bit:** `%windir%\Microsoft.NET\Framework64\[version]\Config\machine.config` Add the following lines to the *machine.config* file somewhere between the `<configuration>` and `</configuration>` tags. Be sure to replace `ProxyServer` and `Port` with the correct values for your organization; for example, `proxy01.contoso.com:80`.
Exporting the results of a Content search involves preparing the results, and th
## Step 1: Prepare search results for export
-The first step is to prepare the search results for exporting. When you prepare results, they are uploaded to a Microsoft-provided Azure Storage location in the Microsoft cloud. Content from mailboxes and sites is uploaded at a maximum rate of 2 GB per hour.
+The first step is to prepare the search results for exporting. When you prepare results, they're uploaded to a Microsoft-provided Azure Storage location in the Microsoft cloud. Content from mailboxes and sites is uploaded at a maximum rate of 2 GB per hour.
-1. In the compliance portal, select the content search that you want to export results from.
+1. In the [Microsoft Purview compliance portal](https://compliance.microsoft.com), select the content search that you want to export results from.
-2. On the **Actions** menu at the bottom of the flyout page, click **Export results**.
+2. On the **Actions** menu at the bottom of the flyout page, select **Export results**.
![Export results option in Actions menu.](../media/ActionMenuExportResults.png)
The first step is to prepare the search results for exporting. When you prepare
![Export output options.](../media/ExportOutputOptions.png) - **All items, excluding ones that have unrecognized format, are encrypted, or weren't indexed for other reasons**. This option exports only indexed items.
-
- **All items, including ones that have unrecognized format, are encrypted, or weren't indexed for other reasons**. This option exports indexed and unindexed items.
-
- **Only items that have an unrecognized format, are encrypted, or weren't indexed for other reasons**. This option exports only unindexed items. See the [More information](#more-information) section for a description about how partially indexed items are exported. For more information about partially indexed items, see [Partially indexed items in Content search](partially-indexed-items-in-content-search.md).
The first step is to prepare the search results for exporting. When you prepare
![Exchange options.](../media/ExchangeExportOptions.png) - **One PST file for each mailbox**: Exports one PST file for each user mailbox that contains search results. Any results from the user's archive mailbox are included in the same PST file. This option reproduces the mailbox folder structure from the source mailbox.
-
- **One PST file containing all messages**: Exports a single PST file (named *Exchange.pst*) that contains the search results from all source mailboxes included in the search. This option reproduces the mailbox folder structure for each message.
-
- **One PST file containing all messages in a single folder**: Exports search results to a single PST file where all messages are located in a single, top-level folder. This option lets reviewers review items in chronological order (items are sorted by sent date) without having to navigate the original mailbox folder structure for each item.
-
- **Individual messages**: Exports search results as individual email messages, using the .msg format. If you select this option, email search results are exported to a folder in the file system. The folder path for individual messages is the same as the one used if you exported the results to a PST file. 5. Configure the following additional options:
The first step is to prepare the search results for exporting. When you prepare
> [!IMPORTANT] > Exporting files in a compressed (zipped) folder will increase export times.
-6. Click **Export** to start the export process. The search results are prepared for downloading, which means they're collected from the original content locations and then uploaded to an Azure Storage location in the Microsoft cloud. This may take several minutes.
+6. Select **Export** to start the export process. The search results are prepared for downloading, which means they're collected from the original content locations and then uploaded to an Azure Storage location in the Microsoft cloud. This may take several minutes.
See the next section for instructions to download the exported search results.
See the next section for instructions to download the exported search results.
The next step is to download the search results from the Azure Storage location to your local computer.
-> [!NOTE]
+> [!IMPORTANT]
> The exported search results must be downloaded within 14 days after you created the export job in Step 1. 1. On the **Content search** page in the compliance portal, select the **Exports** tab
- You may have to click **Refresh** to update the list of export jobs so that it shows the export job you created. Export jobs have the same name as the corresponding search with **_Export** appended to the search name.
+ You may have to select **Refresh** to update the list of export jobs so that it shows the export job you created. Export jobs have the same name as the corresponding search with **_Export** appended to the search name.
2. Select the export job that you created in Step 1.
-3. On the flyout page under **Export key**, click **Copy to clipboard**. You use this key in step 6 to download the search results.
+3. On the flyout page under **Export key**, select **Copy to clipboard**. You use this key in step 6 to download the search results.
> [!IMPORTANT] > Because anyone can install and start the eDiscovery Export tool, and then use this key to download the search results, be sure to take precautions to protect this key just like you would protect passwords or other security-related information.
-4. At the top of the flyout page, click **Download results**.
+4. At the top of the flyout page, select **Download results**.
-5. If you're prompted to install the **eDiscovery Export Tool**, click **Install**.
+5. If you're prompted to install the **eDiscovery Export Tool**, select **Install**.
6. In the **eDiscovery Export Tool**, do the following: ![eDiscovery Export Tool.](../media/eDiscoveryExportTool.png)
- 1. Paste the export key that you copied in step 3 in the appropriate box.
+ 1. Paste the export key that you copied in Step 3 in the appropriate box.
- 2. Click **Browse** to specify the location where you want to download the search result files.
+ 2. Select **Browse** to specify the location where you want to download the search result files.
> [!IMPORTANT] > Due to high network activity during download, you should download search results only to a location on an internal drive on your local computer. For the best download experience, follow these guidelines: <br/>
The next step is to download the search results from the Azure Storage location
>- Disable anti-virus scanning for the folder that you download the search result to.<br/> >- Download search results to different folders for concurrent download jobs.
-7. Click **Start** to download the search results to your computer.
+7. Select **Start** to download the search results to your computer.
The **eDiscovery Export Tool** displays status information about the export process, including an estimate of the number (and size) of the remaining items to be downloaded. When the export process is complete, you can access the files in the location where they were downloaded.
The next step is to download the search results from the Azure Storage location
Here's more information about exporting search results.
-[Export limits](#export-limits)
-
-[Export reports](#export-reports)
-
-[Exporting partially indexed items](#exporting-partially-indexed-items)
-
-[Exporting individual messages or PST files](#exporting-individual-messages-or-pst-files)
-
-[Decrypting RMS-protected email messages and encrypted file attachments](#decrypting-rms-protected-email-messages-and-encrypted-file-attachments)
-
-[Filenames of exported items](#filenames-of-exported-items)
-
-[Miscellaneous](#miscellaneous)
+- [Export limits](#export-limits)
+- [Export reports](#export-reports)
+- [Exporting partially indexed items](#exporting-partially-indexed-items)
+- [Exporting individual messages or PST files](#exporting-individual-messages-or-pst-files)
+- [Decrypting RMS-protected email messages and encrypted file attachments](#decrypting-rms-protected-email-messages-and-encrypted-file-attachments)
+- [Filenames of exported items](#filenames-of-exported-items)
+- [Miscellaneous](#miscellaneous)
### Export limits
For information about limits when exporting content search results, see the "Exp
- When you export search results, the following reports are included in addition to the search results. - **Export Summary** An Excel document that contains a summary of the export. This includes information such as the number of content sources that were searched, the estimated and downloaded sizes of the search results, and the estimated and downloaded number of items that were exported.
-
- **Manifest** A manifest file (in XML format) that contains information about each item included in the search results.
-
- **Results** An Excel document that contains information about each item that is download as a search result. For email, the result log contains information about each message, including: - The location of the message in the source mailbox (including whether the message is in the primary or archive mailbox).
-
- The date the message was sent or received.- - The Subject line from the message.- - The sender and recipients of the message.- - Whether the message is a duplicate message if you enabled the de-duplication option when exporting the search results. Duplicate messages have a value in the **Duplicate to Item** column that identifies the message as a duplicate. The value in the **Duplicate to Item** column contains the item identity of the message that was exported. For more information, see [De-duplication in eDiscovery search results](de-duplication-in-ediscovery-search-results.md). For documents from SharePoint and OneDrive for Business sites, the result log contains information about each document, including: - The URL for the document.- - The URL for the site collection where the document is located.- - The date that the document was last modified.- - The name of the document (which is located in the Subject column in the result log). - **Unindexed Items** An Excel document that contains information about any partially indexed items that would be included in the search results. If you don't include partially indexed items when you generate the search results report, this report will still be downloaded, but will be empty.- - **Errors and Warnings** Contains errors and warnings for files encountered during export. See the Error Details column for information specific to each individual error or warning.- - **Skipped Items** When you export search results from SharePoint and OneDrive for Business sites, the export will usually include a skipped items report (SkippedItems.csv). The items cited in this report are typically items that won't be downloaded, such as a folder or a document set. Not exporting these types of items is by design. For other items that were skipped, the 'Error Type' and 'Error Details' field in the skipped items report show the reason the item was skipped and wasn't downloaded with the other search results.- - **Trace.log** Contains detailed logging information about the export process and can help uncover issues during export. If you open a ticket with Microsoft Support about an issue related to exporting search results, you may be asked to provide this trace log. > [!NOTE]
For information about limits when exporting content search results, see the "Exp
If you choose to export partially indexed items, partially indexed mailbox items are exported in a separate PST file regardless of the option that you choose under **Export Exchange content as**. -- If partially indexed items are returned in the search results (because other properties of partially indexed items matched the search criteria), then those partially indexed are exported with the regular search results. So, if you choose to export both indexed items and partially indexed items (by selecting the **All items, including ones that have unrecognized format, are encrypted, or weren't indexed for other reasons** export option), the partially indexed items exported with the regular results will be listed in the Results.csv report. They will not be listed in the Unindexed items.csv report.
+- If partially indexed items are returned in the search results (because other properties of partially indexed items matched the search criteria), then those partially indexed are exported with the regular search results. So, if you choose to export both indexed items and partially indexed items (by selecting the **All items, including ones that have unrecognized format, are encrypted, or weren't indexed for other reasons** export option), the partially indexed items exported with the regular results will be listed in the Results.csv report. They won't be listed in the Unindexed items.csv report.
### Exporting individual messages or PST files - If the file path name of a message exceeds the maximum character limit for Windows, the file path name is truncated. But the original file path name will be listed in the Manifest and ResultsLog.
-
- As previously explained, email search results are exported to a folder in the file system. The folder path for individual messages would replicate the folder path in the user's mailbox. For example, for a search named "ContosoCase101" messages in a user's inbox would be located in the folder path `~ContosoCase101\\<date of export\Exchange\user@contoso.com (Primary)\Top of Information Store\Inbox`.- - If you choose to export email messages in one PST file containing all messages in a single folder, a **Deleted Items** folder and a **Search Folders** folder are included in the top level of the PST folder. These folders are empty.- - As previously stated, you must export email search results as individual messages to decrypt RMS-protected messages when they're exported. Encrypted messages will remain encrypted if you export email search results as a PST file. ### Decrypting RMS-protected email messages and encrypted file attachments
For information about limits when exporting content search results, see the "Exp
Any rights-protected (RMS-protected) email messages included in the results of a Content search will be decrypted when you export them. Additionally, any file that's encrypted with a [Microsoft encryption technology](encryption.md) and is attached to an email message that's included in the search results will also be decrypted when it's exported. This decryption capability is enabled by default for members of the eDiscovery Manager role group. This is because the RMS Decrypt management role is assigned to this role group by default. Keep the following things in mind when exporting encrypted email messages and attachments: - As previously explained, to decrypt RMS-protected messages when you export them, you have to export the search results as individual messages. If you export search results to a PST file, RMS-protected messages remain encrypted.- - Messages that are decrypted are identified in the **ResultsLog** report. This report contains a column named **Decode Status**, and a value of **Decoded** in this column identifies the messages that were decrypted.- - In addition to decrypting file attachments when exporting search results, you can also preview the decrypted file when previewing search results. You can only view the rights-protected email message after you export it.- - At this time, the decryption capability when exporting search results doesn't include encrypted content from SharePoint and OneDrive for Business sites. However, support is coming soon for documents encrypted with Microsoft encryption technologies and stored in SharePoint Online and OneDrive for Business.- - If you need to prevent someone from decrypting RMS-protect messages and encrypted file attachments, you have to create a custom role group (by copying the built-in eDiscovery Manager role group) and then remove the RMS Decrypt management role from the custom role group. Then add the person who you don't want to decrypt messages as a member of the custom role group. ### Filenames of exported items -- There is a 260-character limit (imposed by the operating system) for the full path name for email messages and site documents exported to your local computer. The full path name for exported items includes the item's original location and the folder location on the local computer where the search results are downloaded to. For example, if you specify to download the search results to `C:\Users\Admin\Desktop\SearchResults` in the eDiscovery Export tool, then the full pathname for a downloaded email item would be `C:\Users\Admin\Desktop\SearchResults\ContentSearch1\03.15.2017-1242PM\Exchange\sarad@contoso.com (Primary)\Top of Information Store\Inbox\Insider trading investigation.msg`.
+- There's a 260-character limit (imposed by the operating system) for the full path name for email messages and site documents exported to your local computer. The full path name for exported items includes the item's original location and the folder location on the local computer where the search results are downloaded to. For example, if you specify to download the search results to `C:\Users\Admin\Desktop\SearchResults` in the eDiscovery Export tool, then the full pathname for a downloaded email item would be `C:\Users\Admin\Desktop\SearchResults\ContentSearch1\03.15.2017-1242PM\Exchange\sarad@contoso.com (Primary)\Top of Information Store\Inbox\Insider trading investigation.msg`.
- If the 260-character limit is exceeded, the full path name for an item will be truncated, based on the following:
Any rights-protected (RMS-protected) email messages included in the results of a
### Miscellaneous - When downloading search results using the eDiscovery Export Tool, it's possible you might receive the following error: `System.Net.WebException: The remote server returned an error: (412) The condition specified using HTTP conditional header(s) is not met.` This is transient error, which typically occurs in the Azure Storage location. To resolve this issue, retry [downloading the search results](#step-2-download-the-search-results), which will restart the eDiscovery Export Tool.- - All search results and the export reports are included in a folder that has the same name as the Content search. The email messages that were exported are located in a folder named **Exchange**. Documents are located in a folder named **SharePoint**.- - The file system metadata for documents on SharePoint and OneDrive for Business sites is maintained when documents are exported to your local computer. That means document properties, such as created and last modified dates, aren't changed when documents are exported.--- If your search results include a list item from SharePoint that matches the search query, all rows in the list will be exported in addition to the item that matches the search query and any attachments in the list. The reason for this behavior is to provide a context for list items that are returned in the search results. The additional list items and attachments may cause the count of exported items to be different than the original estimate of search results.
+- If your search results include a list item from SharePoint that matches the search query, all rows in the list will be exported in addition to the item that matches the search query and any attachments in the list. The reason for this behavior is to provide a context for list items that are returned in the search results. The other list items and attachments may cause the count of exported items to be different than the original estimate of search results.
compliance Insider Risk Management Activities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-activities.md
Reviewing, investigating, and acting on insider risk alerts are important parts
Becoming overwhelmed with the number of alerts produced by your insider risk management policies could be frustrating. The number of alerts can be quickly addressed with simple steps, depending on the types of alert volume you're receiving. You may be receiving too many valid alerts or have too many stale low-risk alerts. Consider taking the following actions: - **Adjust your insider risk policies**: Selecting and configuring the correct insider risk policy is the most basic method to address the type and volume of alerts. Starting with the appropriate [policy template](insider-risk-management-policies.md#policy-templates) helps focus the types of risk activities and alerts you'll see. Other factors that may impact alert volume are the size of the in-scope user and groups and the content and [channels that are prioritized](insider-risk-management-policies.md#prioritize-content-in-policies). Consider adjusting policies to refine these areas to what is most important for your organization.-- **Modify your insider risk settings**: Insider risk settings include a wide variety of configuration options that can impact the volume and types of alerts you'll receive. These include settings for [policy indicators](insider-risk-management-settings.md#indicators), [indicator thresholds](insider-risk-management-settings.md#indicator-level-settings-preview), and [policy timeframes](insider-risk-management-settings.md#policy-timeframes). Consider configuring [intelligent detections](insider-risk-management-settings.md#intelligent-detections) options to exclude specific file types, define minimum thresholds before activity alerts are reported by your policies, and changing the alert volume configuration to a lower setting.
+- **Modify your insider risk settings**: Insider risk settings include a wide variety of configuration options that can impact the volume and types of alerts you'll receive. These include settings for [policy indicators](insider-risk-management-settings.md#indicators), [indicator thresholds](insider-risk-management-settings.md#indicator-level-settings-preview), and [policy timeframes](insider-risk-management-settings.md#policy-timeframes). Consider configuring [intelligent detections](insider-risk-management-settings.md#intelligent-detections) options to exclude specific file types and sensitive info types, define minimum thresholds before activity alerts are reported by your policies, and change the alert volume configuration to a lower setting.
- **Enable inline alert customization (preview)**: Enabling [inline alert customization](/microsoft-365/compliance/insider-risk-management-settings#inline-alert-customization-preview) allows analysts and investigators to quickly edit policies when reviewing alerts. They can update thresholds for activity detection with Microsoft recommendations, configure custom thresholds, or choose to ignore the type of activity that created the alert. If this is not enabled, then only users assigned to the *Insider Risk Management* role group can use inline alert customization. - **Bulk deletion of alerts where applicable**: It may help save triage time for your analysts and investigators to immediately [dismiss multiple alerts](insider-risk-management-activities.md#dismiss-multiple-alerts-preview) at once. You can select up to 400 alerts to dismiss at one time.
compliance Insider Risk Management Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-configure.md
Before configuring a policy, define the following insider risk settings:
4. On the **Policy timeframes** page, select the [policy timeframes](insider-risk-management-settings.md#policy-timeframes) to go into effect for a user when they trigger a match for an insider risk policy. 5. On the **Intelligent detections** page, configure the following settings for insider risk policies:
- - [File type exclusions](insider-risk-management-settings.md#file-type-exclusions)
- - [Minimum number of daily events to boost score for unusual activity](insider-risk-management-settings.md#minimum-number-of-daily-events-to-boost-score-for-unusual-activity)
- - [Alert volume level](insider-risk-management-settings.md#alert-volume)
- - [Microsoft Defender for Endpoint alert status](insider-risk-management-settings.md#microsoft-defender-for-endpoint-alert-statuses-preview)
- - [Domain settings](insider-risk-management-settings.md#domains)
+ - [File activity detection](insider-risk-management-settings.md#file-activity-detection)
+ - [Alert volume](insider-risk-management-settings.md#alert-volume)
+ - [Microsoft Defender for Endpoint alert statuses](insider-risk-management-settings.md#microsoft-defender-for-endpoint-alert-statuses)
+ - [Domains](insider-risk-management-settings.md#domains)
+ - [Sensitive info type exclusion](insider-risk-management-settings.md#sensitive-info-types-exclusion)
+ - [File path exclusions](insider-risk-management-settings.md#file-path-exclusions)
+ - [Site exclusions](insider-risk-management-settings.md#site-exclusions)
+ - [Keyword exclusion](insider-risk-management-settings.md#keyword-exclusion)
6. On the **Export alerts** page, enable export of insider risk alert information using the Office 365 Management APIs if needed. 7. On the **Priority user groups** page, create a priority user group and add users if not created in **Step 3**. 8. On the **Power Automate flows** page, configure a flow from insider risk flow templates or create a new flow. See the [Getting started with insider risk management settings](insider-risk-management-settings.md#power-automate-flows-preview) article for step-by-step guidance.
compliance Insider Risk Management Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-settings.md
Policy timeframes allow you to define past and future review periods that are tr
Intelligent detection settings help refine how the detections of risky activities are processed for alerts. In certain circumstances, you may need to define file types to ignore, or you want to enforce a detection level for daily events to boost risk scores for users. Use these settings to control file type exclusions, boosting risk score for unusual activity, and file volume limits.
-### File type exclusions
+### File activity detection
To exclude specific file types from all insider risk management policy matching, enter file type extensions separated by commas. For example, to exclude certain types of music files from policy matches you may enter *aac,mp3,wav,wma* in the **File type exclusions** field. Files with these extensions will be ignored by all insider risk management policies.
-### Minimum number of daily events to boost score for unusual activity
-
-With this setting, you define how many daily events are required to boost the risk score for activity that's considered unusual for a user. For example, let's say you enter 25 for this risk booster. If a user averages 10 file downloads over the past 30 days, but a policy detects they downloaded 20 files on one day, the score for that activity won't be boosted even though it's unusual for that user because the number of files they downloaded that day was less than the number you entered for this risk booster.
- ### Alert volume User activities detected by insider risk policies are assigned a specific risk score, which in turn determines the alert severity (low, medium, high). By default, we'll generate a certain amount of low, medium, and high severity alerts, but you can increase or decrease the volume to suit your needs. To adjust the volume of alerts for all insider risk management policies, choose one of the following settings:
User activities detected by insider risk policies are assigned a specific risk s
- **Default volume**: You'll see all high severity alerts and a balanced amount of medium and low severity alerts. - **More alerts**: You'll see all medium and high severity alerts and most low severity alerts. This setting level might result in more false positives.
-### Microsoft Defender for Endpoint alert statuses (preview)
+### Microsoft Defender for Endpoint alert statuses
[Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. To have better visibility of security violations in your organization, you can import and filter Defender for Endpoint alerts for activities used in policies created from insider risk management security violation policy templates.
For each of the following domain settings, you can enter up to 500 domains:
By specifying allowed domains in settings, this activity with these domains is treated similarly to how internal organization activity is treated. For example, domains added here map to activities may involve sharing content with someone outside your organization (such as sending email to someone with a gmail.com address). - **Third party domains:** If your organization uses third-party domains for business purposes (such as cloud storage), include them here so you can receive alerts for activity related to the device indicator *Use a browser to download content from a third-party site*.
+
+### Sensitive info types exclusion
+
+By excluding sensitive info types, you can specify which types map to indicators and triggers involving file-related activities for Endpoint, SharePoint, Teams, OneDrive, and Exchange. For those files that contain any sensitive info types identified here, they will be risk scored but not shown as activities involving content related to sensitive info types. For a complete list, see [Sensitive information type entity definitions](sensitive-information-type-entity-definitions.md).
+
+You can select the sensitive info types to be excluded from the list of all available (out-of-box and custom) types available in the tenant. Insider risk management excludes several sensitive info types by default, such as ABA Routing Number. You can choose up to 100 sensitive info types to be excluded.
+
+> [!NOTE]
+> The exclusion list of sensitive info types takes precedence over the [priority content](insider-risk-management-policies.md#prioritize-content-in-policies) list.
+
+To add sensitive info types to exclude, complete the following steps:
+
+1. In the compliance portal, navigate to **Insider risk management** > **Settings** > **Intelligent detections**.
+2. In the **Sensitive info types** section, select **Add sensitive info types to exclude**.
+3. On the **Add or edit sensitive info type** pane, select the types that you want to exclude.
+4. Select **Add** accept the changes or **Cancel** to discard the changes.
+
+To delete a sensitive info type exclusion, select the exclusion and **Delete**.
### File path exclusions
The default file path exclusions are:
The wildcards in these paths denote that all folder levels between the \Users and \AppData are included in the exclusion. For example, activities in *C:\Users\Test1\AppData\Local* and *C:\Users\Test2\AppData\Local*, *C:\Users\Test3\AppData\Local* (and so on) would all be included and not scored for risk as part of the *\Users\\\*\AppData\Local* exclusion selection.
-### Site URL exclusions
+### Site exclusions
Configure site URL exclusions to prevent potential risk activities that occur in SharePoint (and SharePoint sites associated with Team channel sites) from generating policy alerts. You might want to consider excluding sites and channels that contain non-sensitive files and data that can be shared with stakeholders or the public. You can enter up to 500 site URL paths to exclude.
To edit site URL paths to exclude, complete the following steps:
To delete a Site URL exclusion, select the site URL exclusion and select **Delete**.
-### Keyword exclusions
+### Keyword exclusion
Configure exclusions for keywords that appear in file names, file paths, or email message subject lines. This allows flexibility for organizations that need to reduce potential alert noise due to flagging of benign terms specified for your organization. Such activities related to files or email subjects containing the keyword will be ignored by your insider risk management policies and won't generate alerts. You can enter up to 500 keywords to exclude.
compliance Investigating Partially Indexed Items In Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/investigating-partially-indexed-items-in-ediscovery.md
An eDiscovery search that you run from the Microsoft Purview compliance portal automatically includes partially indexed items in the estimated search results when you run a search. Partially indexed items are Exchange mailbox items and documents on SharePoint and OneDrive for Business sites that for some reason weren't completely indexed for search. Most email messages and site documents are successfully indexed because they fall within the [Indexing limits for email messages](limits-for-content-search.md#indexing-limits-for-email-messages). However, some items may exceed these indexing limits, and will be partially indexed. Here are other reasons why items can't be indexed for search and are returned as partially indexed items when you run an eDiscovery search: - Email messages have an attached file that can't be opened; this is the most common cause of partially indexed email items.- - Too many files attached to an email message.- - A file attached to an email message is too large.- - The file type is supported for indexing but an indexing error occurred for a specific file. Although it varies, most organizations customers have less than 1% of content by volume and less than 12% of content by size that is partially indexed. The reason for the difference between the volume versus size is that larger files have a higher probability of containing content that can't be completely indexed.+
+For more information about partially index items in Content search, see [Investigating partially indexed items in Content search](partially-indexed-items-in-content-search.md).
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
Although it varies, most organizations customers have less than 1% of content by
After you run an eDiscovery search, the total number and size of partially indexed items in the locations that were searched are listed in the search result statistics that are displayed in the detailed statistics for the search. Note these are called *unindexed items* in the search statistics. Here are a few things that will affect the number of partially indexed items that are returned in the search results: - If an item is partially indexed and matches the search query, it's included in both the count (and size) of search result items and partially indexed items. However, when the results of that same search are exported, the item is included only with set of search results; it's not included as a partially indexed item.--- Partially indexed items located in SharePoint and OneDrive sites *are not* included in the estimate of partially indexed items that's displayed in the detailed statistics for the search. However, partially indexed items can be exported when you export the results of an eDiscovery search. For example, if you only search sites, the estimated number partially indexed items will be zero.
+- Partially indexed items located in SharePoint and OneDrive sites *aren't* included in the estimate of partially indexed items that's displayed in the detailed statistics for the search. However, partially indexed items can be exported when you export the results of an eDiscovery search. For example, if you only search sites, the estimated number partially indexed items will be zero.
## Calculating the ratio of partially indexed items in your organization
The following is a list of indexing errors and a description of the possible cau
| Error tag | Description | |:--|:--| | `attachmentcount` <br/> |An email message had too many attachments, and some of these attachments weren't processed. <br/> |
-| `attachmentdepth` <br/> |The content retriever and document parser found too many levels of attachments nested inside other attachments. Some of these attachments were not processed. <br/> |
+| `attachmentdepth` <br/> |The content retriever and document parser found too many levels of attachments nested inside other attachments. Some of these attachments weren't processed. <br/> |
| `attachmentrms` <br/> |An attachment failed decoding because it was RMS-protected. <br/> | | `attachmentsize` <br/> |A file attached to an email message was too large and couldn't be processed. <br/> | | `indexingtruncated` <br/> |When writing the processed email message to the index, one of the indexable properties was too large and was truncated. The truncated properties are listed in Error Properties field. <br/> |
The following is a list of indexing errors and a description of the possible cau
| `retrieverrms` <br/> |The content retriever failed to decode an RMS-protected message. <br/> | | `wordbreakertruncated` <br/> |Too many words were identified in the document during indexing. Processing of the property stopped when reaching the limit, and the property is truncated. <br/> |
-Error fields describe which fields are affected by the processing error listed in the Error Tags field. If you're searching a property such as `subject` or `participants`, errors in the body of the message won't impact the results of your search. This can be useful when determining exactly which partially indexed items you might need to further investigate.
-
-<!--
-## Using a PowerShell script to determine your organization's exposure to partially indexed email items
-
-The following steps show you how to run a PowerShell script that searches for all items in all Exchange mailboxes, and then generates a report about your organization's ratio of partially indexed email items (by count and by size) and displays the number of items (and their file type) for each indexing error that occurs. Use the error tag descriptions in the previous section to identify the indexing error.
-
-1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1; for example, `PartiallyIndexedItems.ps1`.
-
- ```powershell
- write-host "**************************************************"
- write-host " Security & Compliance PowerShell " -foregroundColor yellow -backgroundcolor darkgreen
- write-host " eDiscovery Partially Indexed Item Statistics " -foregroundColor yellow -backgroundcolor darkgreen
- write-host "**************************************************"
- " "
- # Create a search with Error Tags Refinders enabled
- Remove-ComplianceSearch "RefinerTest" -Confirm:$false -ErrorAction 'SilentlyContinue'
- New-ComplianceSearch -Name "RefinerTest" -ContentMatchQuery "size>0" -RefinerNames ErrorTags -ExchangeLocation ALL
- Start-ComplianceSearch "RefinerTest"
- # Loop while search is in progress
- do{
- Write-host "Waiting for search to complete..."
- Start-Sleep -s 5
- $complianceSearch = Get-ComplianceSearch "RefinerTest"
- }while ($complianceSearch.Status -ne 'Completed')
- $refiners = $complianceSearch.Refiners | ConvertFrom-Json
- $errorTagProperties = $refiners.Entries | Get-Member -MemberType NoteProperty
- $partiallyIndexedRatio = $complianceSearch.UnindexedItems / $complianceSearch.Items
- $partiallyIndexedSizeRatio = $complianceSearch.UnindexedSize / $complianceSearch.Size
- " "
- "===== Partially indexed items ====="
- " Total Ratio"
- "Count {0:N0}{1:P2}" -f $complianceSearch.Items.ToString("N0").PadRight(15, " "), $partiallyIndexedRatio
- "Size(GB) {0:N2}{1:P2}" -f ($complianceSearch.Size / 1GB).ToString("N2").PadRight(15, " "), $partiallyIndexedSizeRatio
- " "
- Write-Host ===== Reasons for partially indexed items =====
- foreach($errorTagProperty in $errorTagProperties)
- {
- $name = $refiners.Entries.($errorTagProperty.Name).Name
- $count = $refiners.Entries.($errorTagProperty.Name).TotalCount
- $frag = $name.Split("{_}")
- $errorTag = $frag[0]
- $fileType = $frag[1]
- if ($errorTag -ne $lastErrorTag)
- {
- $errorTag
- }
- " " + $fileType + " => " + $count
- $lastErrorTag = $errorTag
- }
- ```
-
-2. [Connect to Security & Compliance PowerShell](/powershell/exchange/exchange-online-powershell).
-
-3. In Security & Compliance PowerShell, go to the folder where you saved the script in step 1, and then run the script; for example:
-
- ```powershell
- .\PartiallyIndexedItems.ps1
- ```
-
-Here's an example fo the output returned by the script.
-
-![Example of output from script that generates a report on your organization's exposure to partially indexed email items.](../media/aeab5943-c15d-431a-bdb2-82f135abc2f3.png)
-
-> [!NOTE]
-> Note the following:
->
-> - The total number and size of email items, and your organization's ratio of partially indexed email items (by count and by size).
->
-> - A list error tags and the corresponding file types for which the error occurred.
>-
-## See also
-
-[Partially indexed items in eDiscovery](partially-indexed-items-in-content-search.md)
+Error fields describe which fields are affected by the processing error listed in the Error Tags field. If you're searching a property such as `subject` or `participants`, errors in the body of the message won't impact the results of your search. This can be useful when determining exactly which partially indexed items you might need to further investigate.
compliance Keyword Queries And Search Conditions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/keyword-queries-and-search-conditions.md
# Keyword queries and search conditions for eDiscovery
-This article describes the email and document properties that you can search for in email items and Microsoft Teams chat conversations in Exchange Online, and documents stored on SharePoint and OneDrive for Business sites using the eDiscovery search tools in the Microsoft Purview compliance portal. This includes Content search, Microsoft Purview eDiscovery (Standard), and Microsoft Purview eDiscovery (Premium) (eDiscovery searches in eDiscovery (Premium) are called *collections*). You can also use the **\*-ComplianceSearch** cmdlets in Security & Compliance PowerShell to search for these properties. The article also describes:
+This article describes the email and document properties that you can search for in email items, Microsoft Teams chat conversations in Exchange Online, and documents stored on SharePoint and OneDrive for Business sites using the eDiscovery search tools in the Microsoft Purview compliance portal.
+
+This includes Content search, Microsoft Purview eDiscovery (Standard), and Microsoft Purview eDiscovery (Premium) (eDiscovery searches in eDiscovery (Premium) are called *collections*). You can also use the **\*-ComplianceSearch** cmdlets in [Security & Compliance PowerShell](/powershell/exchange/scc-powershell) to search for these properties.
+
+This article also describes:
- Using Boolean search operators, search conditions, and other search query techniques to refine your search results. - Searching for sensitive data types and custom sensitive data types in SharePoint and OneDrive for Business.-- Searching for site content that's shared with users outside of your organization
+- Searching for site content that's shared with users outside of your organization.
For step-by-step instructions on how to create different eDiscovery searches, see:
For step-by-step instructions on how to create different eDiscovery searches, se
## Searchable email properties
-The following table lists email message properties that can be searched by using the eDiscovery search tools in the compliance portal or by using the **New-ComplianceSearch** or the **Set-ComplianceSearch** cmdlet. The table includes an example of the _property:value_ syntax for each property and a description of the search results returned by the examples. You can type these `property:value` pairs in the keywords box for an eDiscovery search.
+The following table lists email message properties that can be searched by using the eDiscovery search tools in the compliance portal or by using the **New-ComplianceSearch** or the **Set-ComplianceSearch** cmdlet. The table includes an example of the _property:value_ syntax for each property and a description of the search results returned by the examples. You can enter these `property:value` pairs in the keywords box for an eDiscovery search.
> [!NOTE] > When searching email properties, it's not possible to search for items in which the specified property is empty or blank. For example, using the *property:value* pair of **subject:""** to search for email messages with an empty subject line will return zero results. This also applies when searching site and contact properties. |**Property**|**Property description**|**Examples**|**Search results returned by the examples**| |:--|:--|:--|:|
-|AttachmentNames|The names of files attached to an email message.|`attachmentnames:annualreport.ppt` <p> `attachmentnames:annual*`|Messages that have an attached file named annualreport.ppt. In the second example, using the wildcard character ( * ) returns messages with the word "annual" in the file name of an attachment.<sup>1</sup>
-|Bcc|The Bcc field of an email message.<sup>1</sup>|`bcc:pilarp@contoso.com` <p> `bcc:pilarp` <p> `bcc:"Pilar Pinilla"`|All examples return messages with Pilar Pinilla included in the Bcc field.<br>([See Recipient Expansion](keyword-queries-and-search-conditions.md#recipient-expansion))|
-|Category|The categories to search. Categories can be defined by users by using Outlook or Outlook on the web (formerly known as Outlook Web App). The possible values are: <ul><li>blue<li>green<li>orange<li>purple<li>red<li>yellow</li></ul>|`category:"Red Category"`|Messages that have been assigned the red category in the source mailboxes.|
-|Cc|The Cc field of an email message.<sup>1</sup>|`cc:pilarp@contoso.com` <p> `cc:"Pilar Pinilla"`|In both examples, messages with Pilar Pinilla specified in the Cc field.<br>([See Recipient Expansion](keyword-queries-and-search-conditions.md#recipient-expansion))|
-|Folderid|The folder ID (GUID) of a specific mailbox folder. If you use this property, be sure to search the mailbox that the specified folder is located in. Only the specified folder will be searched. Any subfolders in the folder won't be searched. To search subfolders, you need to use the Folderid property for the subfolder you want to search. <p> For more information about searching for the Folderid property and using a script to obtain the folder IDs for a specific mailbox, see [Use Content search for targeted collections](use-content-search-for-targeted-collections.md).|`folderid:4D6DD7F943C29041A65787E30F02AD1F00000000013A0000` <p> `folderid:2370FB455F82FC44BE31397F47B632A70000000001160000 AND participants:garthf@contoso.com`|The first example returns all items in the specified mailbox folder. The second example returns all items in the specified mailbox folder that were sent or received by garthf@contoso.com.|
+|AttachmentNames|The names of files attached to an email message.|`attachmentnames:annualreport.ppt` <p> `attachmentnames:annual*`|Messages that have an attached file named *annualreport.ppt*. In the second example, using the wildcard character ( * ) returns messages with the word *annual* in the file name of an attachment.<sup>1</sup>
+|Bcc|The Bcc field of an email message.<sup>1</sup>|`bcc:pilarp@contoso.com` <p> `bcc:pilarp` <p> `bcc:"Pilar Pinilla"`|All examples return messages with *Pilar Pinilla* included in the Bcc field.<br>([See Recipient Expansion](keyword-queries-and-search-conditions.md#recipient-expansion))|
+|Category|The categories to search. Categories can be defined by users by using Outlook or Outlook on the web (formerly known as Outlook Web App). The possible values are: <ul><li>blue<li>green<li>orange<li>purple<li>red<li>yellow</li></ul>|`category:"Red Category"`|Messages that have been assigned the *red* category in the source mailboxes.|
+|Cc|The Cc field of an email message.<sup>1</sup>|`cc:pilarp@contoso.com` <p> `cc:"Pilar Pinilla"`|In both examples, messages with *Pilar Pinilla* specified in the Cc field.<br>([See Recipient Expansion](keyword-queries-and-search-conditions.md#recipient-expansion))|
+|Folderid|The folder ID (GUID) of a specific mailbox folder. If you use this property, be sure to search the mailbox that the specified folder is located in. Only the specified folder will be searched. Any subfolders in the folder won't be searched. To search subfolders, you need to use the *Folderid* property for the subfolder you want to search. <p> For more information about searching for the *Folderid* property and using a script to obtain the folder IDs for a specific mailbox, see [Use Content search for targeted collections](use-content-search-for-targeted-collections.md).|`folderid:4D6DD7F943C29041A65787E30F02AD1F00000000013A0000` <p> `folderid:2370FB455F82FC44BE31397F47B632A70000000001160000 AND participants:garthf@contoso.com`|The first example returns all items in the specified mailbox folder. The second example returns all items in the specified mailbox folder that were sent or received by *garthf@contoso.com*.|
|From|The sender of an email message.<sup>1</sup>|`from:pilarp@contoso.com` <p> `from:contoso.com`|Messages sent by the specified user or sent from a specified domain.<br>([See Recipient Expansion](keyword-queries-and-search-conditions.md#recipient-expansion))| |HasAttachment|Indicates whether a message has an attachment. Use the values **true** or **false**.|`from:pilar@contoso.com AND hasattachment:true`|Messages sent by the specified user that have attachments.| |Importance|The importance of an email message, which a sender can specify when sending a message. By default, messages are sent with normal importance, unless the sender sets the importance as **high** or **low**.|`importance:high` <p> `importance:medium` <p> `importance:low`|Messages that are marked as high importance, medium importance, or low importance.|
Boolean search operators, such as **AND**, **OR**, and **NOT**, help you define
|\>=|property\>=value|Denotes that the property being searched is greater than or equal to a specific value.<sup>1</sup>| |..|property:value1..value2|Denotes that the property being searched is greater than or equal to value1 and less than or equal to value2.<sup>1</sup>| |" "|"fair value" <p> subject:"Quarterly Financials"|In a keyword query (where you type the `property:value` pair in the **Keyword** box), use double quotation marks (" ") to search for an exact phrase or term. However, if you use the **Subject** or **Subject/Title** [search condition](#search-conditions) condition, don't add double quotation marks to the value because quotation marks are automatically added when using these search conditions. If you do add quotation marks to the value, two pairs of double quotations will be added to the condition value, and the search query will return an error. |
-|\*|cat\* <p> subject:set\*|Prefix searches (also called *prefix matching*) where a wildcard character ( * ) is placed at the end of a word in keywords or `property:value` queries. In prefix searches, the search returns results with terms that contain the word followed by zero or more characters. For example, ` Title: set*` returns documents that contain the word "set", "setup", and "setting" (and other words that start with "set") in the document title. <p> **Note:** You can use only prefix searches; for example, **cat\*** or **set\***. Suffix searches (**\*cat**), infix searches (**c\*t**), and substring searches (**\*cat\***) arenΓÇÖt supported. <p> Also, adding a period ( \. ) to a prefix search will change the results that are returned. That's because a period is treated as a stop word. For example, searching for **cat\*** and searching for **cat.\*** will return different results. We recommend not using a period in a prefix search.|
+|\*|cat\* <p> subject:set\*|Prefix searches (also called *prefix matching*) where a wildcard character ( * ) is placed at the end of a word in keywords or `property:value` queries. In prefix searches, the search returns results with terms that contain the word followed by zero or more characters. For example, ` Title: set*` returns documents that contain the word "set", "setup", and "setting" (and other words that start with "set") in the document title. <p> **Note:** You can use only prefix searches; for example, **cat\*** or **set\***. Suffix searches (**\*cat**), infix searches (**c\*t**), and substring searches (**\*cat\***) aren't supported. <p> Also, adding a period ( \. ) to a prefix search will change the results that are returned. That's because a period is treated as a stop word. For example, searching for **cat\*** and searching for **cat.\*** will return different results. We recommend not using a period in a prefix search.|
|( )|(fair OR free) AND (from:contoso.com) <p> (IPO OR initial) AND (stock OR shares) <p> (quarterly financials)|Parentheses group together Boolean phrases, `property:value` items, and keywords. For example, `(quarterly financials)` returns items that contain the words quarterly and financials.| > [!NOTE]
Create a condition using mail properties when searching mailboxes or public fold
||| |Message kind|The message type to search. This is the same property as the Kind email property. Possible values: <ul><li>contacts</li><li>docs</li><li>email</li><li>externaldata</li><li>fax</li><li>im</li><li>journals</li><li>meetings</li><li>microsoftteams</li><li>notes</li><li>posts</li><li>rssfeeds</li><li>tasks</li><li>voicemail</li></ul>| |Participants|All the people fields in an email message. These fields are From, To, Cc, and Bcc. ([See Recipient Expansion](keyword-queries-and-search-conditions.md#recipient-expansion))|
-|Type|The message class property for an email item. This is the same property as the ItemClass email property. It's also a multi-value condition. So to select multiple message classes, hold the **CTRL** key and then click two or more message classes in the drop-down list that you want to add to the condition. Each message class that you select in the list will be logically connected by the **OR** operator in the corresponding search query. <p> For a list of the message classes (and their corresponding message class ID) that are used by Exchange and that you can select in the **Message class** list, see [Item Types and Message Classes](/office/vba/outlook/Concepts/Forms/item-types-and-message-classes).|
+|Type|The message class property for an email item. This is the same property as the ItemClass email property. It's also a multi-value condition. So to select multiple message classes, hold the **CTRL** key and then select two or more message classes in the drop-down list that you want to add to the condition. Each message class that you select in the list will be logically connected by the **OR** operator in the corresponding search query. <p> For a list of the message classes (and their corresponding message class ID) that are used by Exchange and that you can select in the **Message class** list, see [Item Types and Message Classes](/office/vba/outlook/Concepts/Forms/item-types-and-message-classes).|
|Received|The date that an email message was received by a recipient. This is the same property as the Received email property.| |Recipients|All recipient fields in an email message. These fields are To, Cc, and Bcc. ([See Recipient Expansion](keyword-queries-and-search-conditions.md#recipient-expansion))| |Sender|The sender of an email message.|
When you add a condition, you can select an operator that is relevant to type of
Keep the following in mind when using search conditions. - A condition is logically connected to the keyword query (specified in the keyword box) by the **AND** operator. That means that items have to satisfy both the keyword query and the condition to be included in the results. This is how conditions help to narrow your results.- - If you add two or more unique conditions to a search query (conditions that specify different properties), those conditions are logically connected by the **AND** operator. That means only items that satisfy all the conditions (in addition to any keyword query) are returned.- - If you add more than one condition for the same property, those conditions are logically connected by the **OR** operator. That means items that satisfy the keyword query and any one of the conditions are returned. So, groups of the same conditions are connected to each other by the **OR** operator and then sets of unique conditions are connected by the **AND** operator.- - If you add multiple values (separated by commas or semi-colons) to a single condition, those values are connected by the **OR** operator. That means items are returned if they contain any of the specified values for the property in the condition.- - Any condition that uses an operator with **Contains** and **Equals** logic will return similar search results for simple string searches. A simple string search is a string in the condition that doesn't include a wildcard). For example, a condition that uses **Equals any of** will return the same items as a condition that uses **Contains any of**.- - The search query that is created by using the keywords box and conditions is displayed on the **Search** page, in the details pane for the selected search. In a query, everything to the right of the notation `(c:c)` indicates conditions that are added to the query.- - Conditions only add properties to the search query; they don't add operators. This is why the query displayed in the detail pane doesn't show operators to the right of the `(c:c)` notation. KQL adds the logical operators (according to the previously explained rules) when the executing the query.--- You can use the drag and drop control to resequence the order of conditions. Click on the control for a condition and move it up or down.-
+- You can use the drag and drop control to resequence the order of conditions. Select the control for a condition and move it up or down.
- As previously explained, some condition properties allow you to type multiple values (separated by semi-colons). Each value is logically connected by the **OR** operator, and results in the query `(filetype=docx) OR (filetype=pptx) OR (filetype=xlsx)`. The following illustration shows an example of a condition with multiple values. ![One condition with multiple values.](../media/SearchConditions1.png) > [!NOTE]
- > You can't add multiple conditions (by clicking **Add condition** for the same property. Instead, you have to provide multiple values for the condition (separated by semi-colons), as shown in the previous example.
+ > You can't add multiple conditions (by selecting **Add condition** for the same property. Instead, you have to provide multiple values for the condition (separated by semi-colons), as shown in the previous example.
### Examples of using conditions in search queries
This example returns email messages or calendar meetings that were sent between
## Special characters
-Some special characters arenΓÇÖt included in the search index and therefore arenΓÇÖt searchable. This also includes the special characters that represent search operators in the search query. Here's a list of special characters that are either replaced by a blank space in the actual search query or cause a search error.
+Some special characters aren't included in the search index and therefore aren't searchable. This also includes the special characters that represent search operators in the search query. Here's a list of special characters that are either replaced by a blank space in the actual search query or cause a search error.
`+ - = : ! @ # % ^ & ; _ / ? ( ) [ ] { }` ## Searching for site content shared with external users
-You can also use eDiscovery search tools in the compliance center to search for documents stored on SharePoint and OneDrive for Business sites that have been shared with people outside of your organization. This can help you identify sensitive or proprietary information that's being shared outside your organization. You can do this by using the `ViewableByExternalUsers` property in a keyword query. This property returns documents or sites that have been shared with external users by using one of the following sharing methods:
+You can also use eDiscovery search tools in the compliance portal to search for documents stored on SharePoint and OneDrive for Business sites that have been shared with people outside of your organization. This can help you identify sensitive or proprietary information that's being shared outside your organization. You can do this by using the `ViewableByExternalUsers` property in a keyword query. This property returns documents or sites that have been shared with external users by using one of the following sharing methods:
- A sharing invitation that requires users to sign in to your organization as an authenticated user. - An anonymous guest link, which allows anyone with this link to access the resource without having to be authenticated.
In these scenarios, the `ViewableByExternalUsers` property won't reflect the cu
As previously explained, you can use the `SharedWithUsersOWSUser` property so search for documents that have been shared between people in your organization. When a person shares a file (or folder) with another user inside your organization, a link to the shared file appears on the **Shared with me** page in the OneDrive for Business account of the person who the file was shared with. For example, to search for the documents that have been shared with Sara Davis, you can use the query `SharedWithUsersOWSUser:"sarad@contoso.com"`. If you export the results of this search, the original documents (located in the content location of the person who shared the documents with Sara) will be downloaded.
-Documents must be explicitly shared with a specific user to be returned in search results when using the `SharedWithUsersOWSUser` property. For example, when a person shares a document in their OneDrive account, they have the option to share it with anyone (inside or outside the organization), share it only with people inside the organization, or share it with a specific person. Here's a screenshot of the **Share** window in OneDrive, that shows the three sharing options.
+Documents must be explicitly shared with a specific user to be returned in search results when using the `SharedWithUsersOWSUser` property. For example, when a person shares a document in their OneDrive account, they have the option to share it with anyone (inside or outside the organization), share it only with people inside the organization, or share it with a specific person. Here's a screenshot of the **Share** window in OneDrive that shows the three sharing options.
![Only files shared with specific people will be returned by a search query that uses the SharedWithUsersOWSUser property.](../media/469a4b61-68bd-4ab0-b612-ab6302973886.png)
kind:im AND subject:conversation AND (received=startdate..enddate)
## Character limits for searches
-ThereΓÇÖs a 4,000 character limit for search queries when searching for content in SharePoint sites and OneDrive accounts.
-HereΓÇÖs how the total number of characters in the search query are calculated:
+There's a 4,000 character limit for search queries when searching for content in SharePoint sites and OneDrive accounts.
+Here's how the total number of characters in the search query are calculated:
- The characters in keyword search query (including both user and filter fields) count against this limit. - The characters in any location property (such as the URLs for all the SharePoint sites or OneDrive locations being searched) count against this limit.
For more information about character limits, see [eDiscovery search limits](limi
## Search tips and tricks -- Keyword searches arenΓÇÖt case-sensitive. For example, **cat** and **CAT** return the same results.-
+- Keyword searches aren't case-sensitive. For example, **cat** and **CAT** return the same results.
- The Boolean operators **AND**, **OR**, **NOT**, and **NEAR** must be uppercase.- - A space between two keywords or two `property:value` expressions is the same as using **AND**. For example, `from:"Sara Davis" subject:reorganization` returns all messages sent by Sara Davis that contain the word reorganization in the subject line.--- Use syntax that matches the `property:value` format. Values arenΓÇÖt case-sensitive, and they can't have a space after the operator. If thereΓÇÖs a space, your intended value will be a full-text search. For example `to: pilarp` searches for "pilarp" as a keyword, rather than for messages that were sent to pilarp.-
+- Use syntax that matches the `property:value` format. Values aren't case-sensitive, and they can't have a space after the operator. If there's a space, your intended value will be a full-text search. For example `to: pilarp` searches for "pilarp" as a keyword, rather than for messages that were sent to pilarp.
- When searching a recipient property, such as To, From, Cc, or Recipients, you can use an SMTP address, alias, or display name to denote a recipient. For example, you can use pilarp@contoso.com, pilarp, or "Pilar Pinilla".--- You can use only prefix searches; for example, **cat\*** or **set\***. Suffix searches (**\*cat**), infix searches (**c\*t**), and substring searches (**\*cat\***) arenΓÇÖt supported.-
+- You can use only prefix searches; for example, **cat\*** or **set\***. Suffix searches (**\*cat**), infix searches (**c\*t**), and substring searches (**\*cat\***) aren't supported.
- When searching a property, use double quotation marks (" ") if the search value consists of multiple words. For example `subject:budget Q1` returns messages that contain **budget** in the subject line and that contain **Q1** anywhere in the message or in any of the message properties. Using `subject:"budget Q1"` returns all messages that contain **budget Q1** anywhere in the subject line.- - To exclude content marked with a certain property value from your search results, place a minus sign (-) before the name of the property. For example, `-from:"Sara Davis"` excludes any messages sent by Sara Davis.- - You can export items based on message type. For example, to export Skype conversations and chats in Microsoft Teams, use the syntax `kind:im`. To return only email messages, you would use `kind:email`. To return chats, meetings, and calls in Microsoft Teams, use `kind:microsoftteams`.- - As previously explained, when searching sites you have to add the trailing `/` to the end of the URL when using the `path` property to return only items in a specified site. If you don't include the trailing `/`, items from a site with a similar path name will also be returned. For example, if you use `path:sites/HelloWorld` then items from sites named `sites/HelloWorld_East` or `sites/HelloWorld_West` would also be returned. To return items only from the HelloWorld site, you have to use `path:sites/HelloWorld/`.
compliance Limits For Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/limits-for-content-search.md
Title: "Limits for Content search and eDiscovery (Standard) in the compliance center"
+ Title: "Limits for Content search and eDiscovery (Standard) in the Microsoft Purview compliance portal"
description: "Learn about the limits in effect for the Content search and eDiscovery (Standard) features in the Microsoft Purview compliance portal." f1.keywords: - NOCSH
search.appverid:
- MET150
-# Limits for eDiscovery search
+# Limits for Content search and eDiscovery (Standard)
Various limits are applied to eDiscovery search tools in the Microsoft Purview compliance portal. This includes searches run on the **Content search** page and searches that are associated with an eDiscovery case on the **eDiscovery (Standard)** page. These limits help to maintain the health and quality of services provided to organizations. There are also limits related to the indexing of email messages in Exchange Online for search. You can't modify the limits for eDiscovery searches or email indexing, but you should be aware of them so that you can take these limits into consideration when planning, running, and troubleshooting eDiscovery searches.
The following table lists the limits when exporting the results of a content sea
|Description of limit|Limit| |||
-|Maximum amount of exportable data from a single search <p> **Note:** If the search results are larger than 2 TB, consider using date ranges or other types of filters to decrease the total size of the search results.|2 TB|
+|Maximum amount of exportable data from a single search <p> **Note:** If the search results are larger than 2 TB, consider using date ranges, or other types of filters to decrease the total size of the search results.|2 TB|
|Maximum an organization can export in a single day <p> **Note:** This limit is reset daily at 12:00AM UTC|2 TB| |Maximum number of mailboxes for search results that can be downloaded using the eDiscovery Export Tool|100,000|
-|Maximum size of PST file that can be exported <p> **Note:** If the search results from a user's mailbox are larger than 10 GB, the search results for the mailbox will be exported in two (or more) separate PST files. If you choose to export all search results in a single PST file, the PST file will be spilt into additional PST files if the total size of the search results is larger than 10 GB. If you want to change this default size, you can edit the Windows Registry on the computer that you use to export the search results. See [Change the size of PST files when exporting eDiscovery search results](change-the-size-of-pst-files-when-exporting-results.md). The search results from a specific mailbox won't be divided among multiple PST files unless the content from a single mailbox is more than 10 GB. If you chose to export the search results in one PST file for that contains all messages in a single folder and the search results are larger than 10 GB, the items are still organized in chronological order, so they will be spilt into additional PST files based on the sent date.|10 GB|
+|Maximum size of PST file that can be exported <p> **Note:** If the search results from a user's mailbox are larger than 10 GB, the search results for the mailbox will be exported in two (or more) separate PST files. If you choose to export all search results in a single PST file, the PST file will be spilt into additional PST files if the total size of the search results is larger than 10 GB. If you want to change this default size, you can edit the Windows Registry on the computer that you use to export the search results. See [Change the size of PST files when exporting eDiscovery search results](change-the-size-of-pst-files-when-exporting-results.md). The search results from a specific mailbox won't be divided among multiple PST files unless the content from a single mailbox is more than 10 GB. If you chose to export the search results in one PST file for that contains all messages in a single folder and the search results are larger than 10 GB, the items are still organized in chronological order, so they'll be spilt into additional PST files based on the sent date.|10 GB|
|Rate at which search results from mailboxes and sites are uploaded to a Microsoft-provided Azure Storage location.|Maximum of 2 GB per hour| ## Indexing limits for email messages
The following table describes the indexing limits that might result in an email
|Maximum number of attached images|0|An image that's attached to an email message is skipped by the parser and isn't indexed.| |Maximum time spent parsing an item|30 seconds|A maximum of 30 seconds is spent parsing an item for indexing. If the parsing time exceeds 30 seconds, the item is marked as partially indexed.| |Maximum parser output|2 million characters|The maximum amount of text output from the parser that's indexed. For example, if the parser extracted 8 million characters from a document, only the first 2 million characters are indexed.|
-|Maximum annotation tokens|2 million|When an email message is indexed, each word is annotated with different processing instructions that specify how that word should be indexed. Each set of processing instructions is called an annotation token. To maintain the quality of service in Office 365, there is a limit of 2 million annotation tokens for an email message.|
+|Maximum annotation tokens|2 million|When an email message is indexed, each word is annotated with different processing instructions that specify how that word should be indexed. Each set of processing instructions is called an annotation token. To maintain the quality of service in Office 365, there's a limit of 2 million annotation tokens for an email message.|
|Maximum body size in index|67 million characters|The total number of characters in the body of an email message and all its attachments. When an email message is indexed, all text in the body of the message and in all attachments is concatenated into a single string. The maximum size of this string that is indexed is 67 million characters.|
-|Maximum unique tokens in body|1 million|As previously explained, tokens are the result of extracting text from content, removing punctuation and spaces, and then dividing it into words (called tokens) that are stored in the index. For example, the phrase `"cat, mouse, bird, dog, dog"` contains 5 tokens. But only 4 of these are unique tokens. There is a limit of 1 million unique tokens per email message, which helps prevent the index from getting too large with random tokens.|
+|Maximum unique tokens in body|1 million|As previously explained, tokens are the result of extracting text from content, removing punctuation and spaces, and then dividing it into words (called tokens) that are stored in the index. For example, the phrase `"cat, mouse, bird, dog, dog"` contains 5 tokens. But only 4 of these are unique tokens. There's a limit of 1 million unique tokens per email message, which helps prevent the index from getting too large with random tokens.|
||| ## Jobs limits |Description|Limit|
-|||
+|:-|:-|
|Maximum number of concurrent jobs in your organization.|50| |Maximum number of concurrent jobs that a single user can start at the same time.|25| |Maximum number of concurrent tenant-wide jobs(for example, tenant-wide searches) in your organization.|5|
The following table describes the indexing limits that might result in an email
## More information
-There are additional limits related to different aspects of searching for content, such as content indexing. For more information about these limits, see the following topics:
+There are additional limits related to different aspects of searching for content, such as content indexing. For more information about these limits, see the following articles:
- [Partially indexed items in Content Search](partially-indexed-items-in-content-search.md)- - [Investigating partially indexed items in eDiscovery](investigating-partially-indexed-items-in-ediscovery.md)- - [Search limits for SharePoint Online](/sharepoint/search-limits) For information about content searches, see: - [Content search in Microsoft 365](content-search.md)- - [Search for content in a eDiscovery (Standard) case](search-for-content-in-core-ediscovery.md)- - [Keyword queries and search conditions for content search](keyword-queries-and-search-conditions.md) For case limits related to eDiscovery (Standard) and eDiscovery (Premium), see: - [Limits in eDiscovery (Standard)](limits-core-ediscovery.md)- - [Limits in eDiscovery (Premium)](limits-ediscovery20.md)
compliance Partially Indexed Items In Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/partially-indexed-items-in-content-search.md
Title: "Partially indexed items in Content Search"
-description: "Learn about unindexed items in Exchange and SharePoint that you can include in an eDiscovery search that you run in the Microsoft Purview compliance portal."
+description: "Learn about unindexed items in Exchange and SharePoint that you can include in a Content search that you run in the Microsoft Purview compliance portal."
f1.keywords: - NOCSH
search.appverid:
- MET150
-# Partially indexed items in eDiscovery
+# Partially indexed items in Content search
-An Microsoft Purview eDiscovery search that you run from the Microsoft Purview compliance portal automatically includes partially indexed items in the estimated search results when you run a search. Partially indexed items are Exchange mailbox items and documents on SharePoint and OneDrive for Business sites that for some reason weren't completely indexed for search. In Exchange, a partially indexed item typically contains a file (of a file type that can't be indexed) that is attached to an email message. Here are some other reasons why items can't be indexed for search and are returned as partially indexed items when you run an eDiscovery search:
+A Content search that you run from the Microsoft Purview compliance portal automatically includes partially indexed items in the estimated search results when you run a search. Partially indexed items are Exchange mailbox items and documents on SharePoint and OneDrive for Business sites that for some reason weren't completely indexed for search. In Exchange, a partially indexed item typically contains a file (of a file type that can't be indexed) that is attached to an email message. Here are some other reasons why items can't be indexed for search and are returned as partially indexed items when you run an eDiscovery search:
- The file type is unrecognized or unsupported for indexing.- - Messages have an attached file that can't be opened; this is the most common cause of partially indexed email items.- - The file type is supported for indexing but an indexing error occurred for a specific file.- - Too many files attached to an email message.- - A file attached to an email message is too large.- - A file is encrypted with non-Microsoft technologies.- - A file is password-protected. > [!NOTE]
For legal investigations, your organization may be required to review partially
## File types not indexed for search
-Certain types of files, such as Bitmap or MP3 files, don't contain content that can be indexed. As a result, the search indexing servers in Exchange and SharePoint don't perform full-text indexing on these types of files. These types of files are considered to be unsupported file types. There are also file types for which full-text indexing has been disabled, either by default or by an administrator. Unsupported and disabled file types are labeled as unindexed items in Content Searches. As previously stated, partially indexed items can be included in the set of search results when you run a search, export the search results to a local computer, or prepare search results for eDiscovery (Premium).
+Certain types of files, such as Bitmap (.bmp) or MP3 (.mp3) files, don't contain content that can be indexed. As a result, the search indexing servers in Exchange and SharePoint don't perform full-text indexing on these types of files. These types of files are considered to be unsupported file types. There are also file types for which full-text indexing has been disabled, either by default or by an administrator. Unsupported and disabled file types are labeled as unindexed items in Content Searches. As previously stated, partially indexed items can be included in the set of search results when you run a search, export the search results to a local computer, or prepare search results for eDiscovery (Premium).
-For a list of supported and disabled file formats, see the following topics:
+For a list of supported and disabled file formats, see the following articles:
- **Exchange** - [File formats indexed by Exchange Search](/exchange/file-formats-indexed-by-exchange-search-exchange-2013-help)- - **Exchange** - [Get-SearchDocumentFormat](/powershell/module/exchange/get-searchdocumentformat)- - **SharePoint** - [Default crawled file name extensions and parsed file types in SharePoint](/SharePoint/technical-reference/default-crawled-file-name-extensions-and-parsed-file-types) ## Messages and documents with partially indexed file types can be returned in search results
Your organization might be required to identify and perform additional analysis
Keep the following in mind about partially indexed items: - When you run an eDiscovery search, the total number and size of partially indexed Exchange items (returned by the search query) are displayed in the search statistics on the flyout page, and labeled as **unindexed items**. Statistics about partially indexed items displayed on the flyout page don't include partially indexed items in SharePoint sites or OneDrive accounts.- - If the search that you're exporting results from was a search of specific content locations or all content locations in your organization, only the unindexed items from content locations that contain items that match the search criteria will be exported. In other words, if no search results are found in a mailbox or site, then any unindexed items in that mailbox or site won't be exported. The reason for this is that exporting partially indexed items from lots of locations in the organization might increase the likelihood of export errors and increase the time it takes to export and download the search results. To export partially indexed items from all content locations for a search, configure the search to return all items (by removing any keywords from the search query) and then export only partially indexed items when you export the search results (by clicking **Only items that have an unrecognized format, are encrypted, or weren't indexed for other reasons** under **Output options**). - If you choose to include all mailbox items in the search results, or if a search query doesn't specify any keywords or only specifies a date range, partially indexed items might not be copied to the PST file that contains the partially indexed items. This is because all items, including any partially indexed items, will be automatically included in the regular search results.- - Partially indexed items aren't available to be previewed. You have to export the search results to view partially indexed items returned by the search.
- Additionally, when you export search results and include partially indexed items in the export, partially indexed items from SharePoint items are exported to a folder named **Uncrawlable**. When you export partially indexed Exchange items, they are exported differently depending on whether or not the partially indexed items matched the search query and the configuration of the export settings.
+ Additionally, when you export search results and include partially indexed items in the export, partially indexed items from SharePoint items are exported to a folder named **Uncrawlable**. When you export partially indexed Exchange items, they're exported differently depending if the partially indexed items matched the search query and the configuration of the export settings.
- The following table shows the export behavior of indexed and partially indexed items and whether or not each is included for the different export configuration settings.
The following table describes the indexing limits that might result in an email
For a list of indexing limits for SharePoint documents, see [Search limits for SharePoint Online](/sharepoint/search-limits). |**Indexing limit**|**Maximum value**|**Description**|
-|:--|:--|:--|
+|:--|:-|:--|
|Maximum attachment size (excluding Excel files) <br/> |150 MB <br/> |The maximum size of an email attachment that will parse for indexing. Any attachment that's larger than this limit won't be parsed for indexing, and the message with the attachment will be marked as partially indexed. <br/><br/> **Note:** Parsing is the process where the indexing service extracts text from the attachment, removes unnecessary characters like punctuation and spaces, and then divides the text into words (in a process called tokenization), that are then stored in the index. | |Maximum size of Excel files <br/> |4 MB <br/> |The maximum size of an Excel file located on a site or attached to an email message that will be parsed for indexing. Any Excel file that's larger than this limit won't be parsed, and the file or the email the message with the file attachment will be marked as unindexed. <br/> | |Maximum number of attachments <br/> |250 <br/> |The maximum number of files attached to an email message that will be parsed for indexing. If a message has more than 250 attachments, the first 250 attachments are parsed and indexed, and the message is marked as partially indexed because it had additional attachments that weren't parsed. <br/> |
For a list of indexing limits for SharePoint documents, see [Search limits for S
|Maximum number of attached images <br/> |0 <br/> |An image that's attached to an email message is skipped by the parser and isn't indexed. <br/> | |Maximum time spent parsing an item <br/> |30 seconds <br/> |A maximum of 30 seconds is spent parsing an item for indexing. If the parsing time exceeds 30 seconds, the item is marked as partially indexed. <br/> | |Maximum parser output <br/> |2 million characters <br/> |The maximum amount of text output from the parser that's indexed. For example, if the parser extracted 8 million characters from a document, only the first 2 million characters are indexed. <br/> |
-|Maximum annotation tokens <br/> |2 million <br/> |When an email message is indexed, each word is annotated with different processing instructions that specify how that word should be indexed. Each set of processing instructions is called an annotation token. To maintain the quality of service in Office 365, there is a limit of 2 million annotation tokens for an email message. <br/> |
+|Maximum annotation tokens <br/> |2 million <br/> |When an email message is indexed, each word is annotated with different processing instructions that specify how that word should be indexed. Each set of processing instructions is called an annotation token. To maintain the quality of service in Office 365, there's a limit of 2 million annotation tokens for an email message. <br/> |
|Maximum body size in index <br/> |67 million characters <br/> |The total number of characters in the body of an email message and all its attachments. When an email message is indexed, all text in the body of the message and in all attachments is concatenated into a single string. The maximum size of this string that is indexed is 67 million characters. <br/> |
-|Maximum unique tokens in body <br/> |1 million <br/> |As previously explained, tokens are the result of extracting text from content, removing punctuation and spaces, and then dividing it into words (called tokens) that are stored in the index. For example, the phrase `"cat, mouse, bird, dog, dog"` contains 5 tokens. But only 4 of these are unique tokens. There is a limit of 1 million unique tokens per email message, which helps prevent the index from getting too large with random tokens. <br/> |
+|Maximum unique tokens in body <br/> |1 million <br/> |As previously explained, tokens are the result of extracting text from content, removing punctuation and spaces, and then dividing it into words (called tokens) that are stored in the index. For example, the phrase `"cat, mouse, bird, dog, dog"` contains 5 tokens. But only 4 of these are unique tokens. There's a limit of 1 million unique tokens per email message, which helps prevent the index from getting too large with random tokens. <br/> |
|||| ## More information about partially indexed items
For a list of indexing limits for SharePoint documents, see [Search limits for S
- Email messages encrypted with S/MIME are partially indexed. This includes encrypted messages with or without file attachments. -- Email messages protected using Azure Rights Management are indexed and will be included in the search results if they match the search query. Rights-protected email messages are decrypted and can be previewed and exported. This functionality requires that you are assigned the RMS Decrypt role, which is assigned by default to the eDiscover Manager role group.
+- Email messages protected using Azure Rights Management are indexed and will be included in the search results if they match the search query. Rights-protected email messages are decrypted and can be previewed and exported. This functionality requires that you're assigned the RMS Decrypt role, which is assigned by default to the eDiscover Manager role group.
- If you create a query-based hold that's associated with an eDiscovery case, all partially indexed items are placed on hold. This includes partially indexed items that don't match the search query criteria for the hold. For more information about creating query-based eDiscovery holds, see [Create an eDiscovery hold](create-ediscovery-holds.md).-
-## See also
-
-[Investigating partially indexed items in eDiscovery](investigating-partially-indexed-items-in-ediscovery.md)
compliance Permissions Filtering For Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/permissions-filtering-for-content-search.md
# Configure permissions filtering for eDiscovery
-You can use search permissions filtering to let an eDiscovery manager search only a subset of mailboxes and sites in your organization. You can also use permissions filtering to let that same eDiscovery manager search only for mailbox or site content that meets a specific search criteria. For example, you might let an eDiscovery manager search only the mailboxes of users in a specific location or department. You do this by creating a filter that uses a supported recipient filter to limit which mailboxes a specific user or group of users can search. You can also create a filter that specifies what mailbox content a user can search for. This is done by creating a filter that uses a searchable message property. Similarly, you can let an eDiscovery manager search only specific SharePoint sites in your organization. You do this by creating a filter that limits which site can be searched. You can also create a filter that specifies what site content can be searched. This is done by creating a filter that uses a searchable site property.
+You can use search permissions filtering to let an eDiscovery manager search only a subset of mailboxes and sites in your organization. You can also use permissions filtering to let that same eDiscovery manager search only for mailbox or site content that meets a specific search criteria.
+
+For example, you might want an eDiscovery manager to search only the mailboxes of users in a specific location or department. You do this by creating a filter that uses a supported recipient filter to limit which mailboxes a specific user or group of users can search. You can also create a filter that specifies what mailbox content a user can search for. This is done by creating a filter that uses a searchable message property. Similarly, you can let an eDiscovery manager search only specific SharePoint sites in your organization. You do this by creating a filter that limits which site can be searched. You can also create a filter that specifies what site content can be searched. This is done by creating a filter that uses a searchable site property.
Search permissions filters are applied when you search for content using Content search, Microsoft Purview eDiscovery (Standard), and Microsoft Purview eDiscovery (Premium) in the Microsoft Purview compliance portal. When a search permissions filter is applied to a specific user, that user can perform the following search-related actions:
Search permissions filters are applied when you search for content using Content
You can also use search permissions filtering to create logical boundaries (called _compliance boundaries_) within an organization that control the user content locations (such as mailboxes, SharePoint sites, and OneDrive accounts) that specific eDiscovery managers can search. For more information, see [Set up compliance boundaries for eDiscovery investigations](set-up-compliance-boundaries.md).
-The following four cmdlets in Security & Compliance PowerShell let you configure and manage search permissions filters:
+The following four cmdlets in [Security & Compliance PowerShell](/powershell/exchange/scc-powershell) let you configure and manage search permissions filters:
- [New-ComplianceSecurityFilter](#new-compliancesecurityfilter) - [Get-ComplianceSecurityFilter](#get-compliancesecurityfilter)
The following four cmdlets in Security & Compliance PowerShell let you configure
## Requirements to configure permissions filtering -- To run the compliance security filter cmdlets, you have to be a member of the Organization Management role group in the compliance portal. For more information, see [Permissions in the Security & Compliance Center](../security/office-365-security/permissions-in-the-security-and-compliance-center.md).-
+- To run the compliance security filter cmdlets, you have to be a member of the *Organization Management* role group in the compliance portal. For more information, see [Permissions in the Security & Compliance Center](../security/office-365-security/permissions-in-the-security-and-compliance-center.md).
- You have to connect to both Exchange Online and Security & Compliance PowerShell to use the compliance security filter cmdlets. This is necessary because these cmdlets require access to mailbox properties, which is why you have to connect to Exchange Online PowerShell. See the steps in the next section.- - See the [More information](#more-information) section for additional information about search permissions filters.- - Search permissions filtering is applicable to inactive mailboxes, which means you can use mailbox and mailbox content filtering to limit who can search an inactive mailbox. See the [More information](#more-information) section for additional information about permissions filtering and inactive mailboxes.- - Search permissions filtering can't be used to limit who can search public folders in Exchange.--- There is no limit to the number of search permissions filters that can be created in an organization. However, a search query can have a maximum of 100 conditions. In this case, a condition is defined as something that's connected to the query by a Boolean operator (such as **AND**, **OR**, and **NEAR**). The limit for the number of conditions includes the search query itself plus all search permissions filters that are applied to the user who runs the search. Therefore, the more search permissions filters you have (especially if these filters are applied to the same user or group of users), the better the chance of exceeding the maximum number of conditions for a search. To prevent your organization from reaching the conditions limit, keep the number of search permissions filters in your organization to few as possible to meet your business requirements. For more information, see [Set up compliance boundaries for eDiscovery investigations](set-up-compliance-boundaries.md#frequently-asked-questions).
+- There's no limit to the number of search permissions filters that can be created in an organization. However, a search query can have a maximum of 100 conditions. In this case, a condition is defined as something that's connected to the query by a Boolean operator (such as **AND**, **OR**, and **NEAR**). The limit for the number of conditions includes the search query itself plus all search permissions filters that are applied to the user who runs the search. Therefore, the more search permissions filters you have (especially if these filters are applied to the same user or group of users), the better the chance of exceeding the maximum number of conditions for a search. To prevent your organization from reaching the conditions limit, keep the number of search permissions filters in your organization to few as possible to meet your business requirements. For more information, see [Set up compliance boundaries for eDiscovery investigations](set-up-compliance-boundaries.md#frequently-asked-questions).
## Connect to Exchange Online and Security & Compliance PowerShell in a single session
-Before you can successfully run the script in this section, you have to download and install the Exchange Online PowerShell module. For information, see [Install and maintain the Exchange Online Powershell module](/powershell/exchange/exchange-online-powershell-v2#install-and-maintain-the-exchange-online-powershell-module).
+Before you can successfully run the script in this section, you have to download and install the Exchange Online PowerShell module. For information, see [Install and maintain the Exchange Online PowerShell module](/powershell/exchange/exchange-online-powershell-v2#install-and-maintain-the-exchange-online-powershell-module).
1. Save the following text to a Windows PowerShell script file by using a filename suffix of **.ps1**. For example, you could save it to a file named **ConnectEXO-SCC.ps1**.
How do you know if this worked? After you run the script, cmdlets from Exchange
For troubleshooting PowerShell connection errors, see: - [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell#how-do-you-know-this-worked)- - [Connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell#how-do-you-know-this-worked) ## New-ComplianceSecurityFilter
The _Filters_ parameter specifies the search criteria for the compliance securi
- **Site and site content filtering:** There are two SharePoint- and OneDrive-related filters that you can use to specify what site or site content the assigned users can search. - **Site_**_SearchableSiteProperty_- - **SiteContent_**_SearchableSiteProperty_ These two filters are interchangeable. For example, `"Site_Path -like 'https://contoso.sharepoint.com/sites/doctors'"` and `"SiteContent_Path -like 'https://contoso.sharepoint.com/sites/doctors'"` return the same results. For a list of searchable site properties, see [Keyword queries and search conditions for eDiscovery](keyword-queries-and-search-conditions.md#searchable-site-properties) For a more complete list, see [Overview of crawled and managed properties in SharePoint](/SharePoint/technical-reference/crawled-and-managed-properties-overview). Properties marked with a **Yes** in the **Queryable** column can be used to create a site or site content filter.
The _Filters_ parameter specifies the search criteria for the compliance securi
Keep the following considerations in mind when configuring the _Filters_ parameter for search permissions filters: - Unlike mailboxes, there isn't a content location filter for sites even though the _Site_ filter looks like a location filter. All filters for SharePoint and OneDrive are content filters (which is also why _Site\__ and _SiteContent\__ filters are interchangeable) because site-related properties like _Path_ are stamped directly on the documents. Why is this? It's a result of the way that SharePoint is designed. In SharePoint, there isn't a "site object" with properties, like there is with Exchange mailboxes. Therefore, the _Path_ property is stamped on the document and contains the URL of the site where the document is located. This is why a _Site_ filter is considered a content filter and not a content location filter.- - You have to create a search permissions filter to explicitly prevent users from searching content locations in a specific service (such as preventing a user from searching any Exchange mailbox or any SharePoint site). In other words, creating a search permissions filter that allows a user to search all SharePoint sites in the organization doesn't prevent that user from searching mailboxes. For example, to allow SharePoint admins to only search SharePoint sites, you have to create a filter that prevents them from searching mailboxes. Similarly, to allow Exchange admins to only search mailboxes, you have to create a filter that prevents them from searching sites. ### Users
An alternative to using a filters list would be to create two separate search pe
Keep the following things in mind about using a filters list: - You have to use a filters list to create a filter that includes a **Mailbox** filter and a **MailboxContent** filter.- - Each component of a filters list can contain a complex filter syntax. For example, the mailbox and site filters can contain multiple filters separated by an **-or** operator: ```powershell
This example allows the user annb@contoso.com to perform search actions only for
New-ComplianceSecurityFilter -FilterName CountryFilter -Users annb@contoso.com -Filters "Mailbox_CountryCode -eq '124'" ```
-This example allows the users donh and suzanf to search only the mailboxes and OneDrive accounts that have the value 'Marketing' for the CustomAttribute1 mailbox property.
+This example allows the users *donh* and *suzanf* to search only the mailboxes and OneDrive accounts that have the value 'Marketing' for the CustomAttribute1 mailbox property.
```powershell New-ComplianceSecurityFilter -FilterName MarketingFilter -Users donh,suzanf -Filters "Mailbox_CustomAttribute1 -eq 'Marketing'"
The **Remove-ComplianceSecurityFilter** is used to delete a search filter. Use t
## More information -- **How does search permissions filtering work?** The permissions filter is appended to the search query when a search is run. The permissions filter is joined to the search query by the **AND** Boolean operator. The query logic for the search query and the permissions filter would look like this:
+**How does search permissions filtering work?** The permissions filter is appended to the search query when a search is run. The permissions filter is joined to the search query by the **AND** Boolean operator. The query logic for the search query and the permissions filter would look like this:
```text <SearchQuery> AND <PermissionsFilter>
The **Remove-ComplianceSecurityFilter** is used to delete a search filter. Use t
For example, you have a permissions filter that allows Bob to perform all search actions on the mailboxes of members of the Workers distribution group. Then Bob runs a search on all mailboxes in the organization with the search query `sender:jerry@adatum.com`. Because the permissions filter and the search query are logically combined by an **AND** operator, the search returns any message sent by jerry@adatum.com to any member of the Workers distribution group. -- **What happens if you have multiple search permissions filters?** In a search query, multiple permissions filters are combined by **OR** Boolean operators. So results will be returned if any of the filters are true. In a search, all filters (combined by **OR** operators) are then combined with the search query by the **AND** operator.
+**What happens if you have multiple search permissions filters?** In a search query, multiple permissions filters are combined by **OR** Boolean operators. So results will be returned if any of the filters are true. In a search, all filters (combined by **OR** operators) are then combined with the search query by the **AND** operator.
```text <SearchQuery> AND (<PermissionsFilter1> OR <PermissionsFilter2> OR <PermissionsFilter3>)
The **Remove-ComplianceSecurityFilter** is used to delete a search filter. Use t
Let's take the previous example, where a search filter allows Bob to search only the mailboxes of the members of the Workers distribution group. Then we create another filter that prevents Bob from searching Phil's mailbox ("Mailbox_Alias -ne 'Phil'"). And let's also assume that Phil is a member of the Workers group. When Bob runs a search (from the previous example) on all mailboxes in the organization, search results are returned for Phil's mailbox even though you applied filter to prevent Bob from searching Phil's mailbox. This is because the first filter, which allows Bob to search the Workers group, is true. And because Phil is a member of the Workers group, Bob can search Phil's mailbox. -- **Does search permissions filtering work for inactive mailboxes?** Yes, you can use mailbox and mailbox content filters to limit who can search inactive mailboxes in your organization. Like a regular mailbox, an inactive mailbox has to be configured with the recipient property that's used to create a permissions filter. If necessary, you can use the **Get-Mailbox -InactiveMailboxOnly** command to display the properties of inactive mailboxes. For more information, see [Create and manage inactive mailboxes](create-and-manage-inactive-mailboxes.md).
+**Does search permissions filtering work for inactive mailboxes?** Yes, you can use mailbox and mailbox content filters to limit who can search inactive mailboxes in your organization. Like a regular mailbox, an inactive mailbox has to be configured with the recipient property that's used to create a permissions filter. If necessary, you can use the **Get-Mailbox -InactiveMailboxOnly** command to display the properties of inactive mailboxes. For more information, see [Create and manage inactive mailboxes](create-and-manage-inactive-mailboxes.md).
-- **Does search permissions filtering work for public folders?** No. As previously explained, search permissions filtering can't be used to limit who can search public folders in Exchange. For example, items in public folder locations can't be excluded from the search results by a permissions filter.
+**Does search permissions filtering work for public folders?** No. As previously explained, search permissions filtering can't be used to limit who can search public folders in Exchange. For example, items in public folder locations can't be excluded from the search results by a permissions filter.
-- **Does allowing a user to search all content locations in a specific service also prevent them from searching content locations in a different service?** No. As previously explained, you have to create a search permissions filter to explicitly prevent users from searching content locations in a specific service (such as preventing a user from searching any Exchange mailbox or any SharePoint site). In other words, creating a search permissions filter that allows a user to search all SharePoint sites in the organization doesn't prevent that user from searching mailboxes. For example, to allow SharePoint admins to only search SharePoint sites, you have to create a filter that prevents them from searching mailboxes. Similarly, to allow Exchange admins to only search mailboxes, you have to create a filter that prevents them from searching sites.
+**Does allowing a user to search all content locations in a specific service also prevent them from searching content locations in a different service?** No. As previously explained, you have to create a search permissions filter to explicitly prevent users from searching content locations in a specific service (such as preventing a user from searching any Exchange mailbox or any SharePoint site). In other words, creating a search permissions filter that allows a user to search all SharePoint sites in the organization doesn't prevent that user from searching mailboxes. For example, to allow SharePoint admins to only search SharePoint sites, you have to create a filter that prevents them from searching mailboxes. Similarly, to allow Exchange admins to only search mailboxes, you have to create a filter that prevents them from searching sites.
-- **Do search permissions filters count against search query character limits?** Yes. Search permissions filters count against the character limit for search queries. For more information, see [Limits in eDiscovery (Premium)](limits-ediscovery20.md).
+**Do search permissions filters count against search query character limits?** Yes. Search permissions filters count against the character limit for search queries. For more information, see [Limits in eDiscovery (Premium)](limits-ediscovery20.md).
**What is the maximum number of search permissions filters that can be created in an organization?**
-There is no limit to the number of search permissions filters that can be created in an organization. However, a search query can have a maximum of 100 conditions. In this case, a condition is defined as something that's connected to the query by a Boolean operator (such as **AND**, **OR**, and **NEAR**). The limit of the number of conditions includes the search query itself plus all search permissions filters that are applied to the user who runs the search. Therefore, the more search permissions filters you have (especially if these filters are applied to the same user or group of users), the better the chance of exceeding the maximum number of conditions for a search.
+There's no limit to the number of search permissions filters that can be created in an organization. However, a search query can have a maximum of 100 conditions. In this case, a condition is defined as something that's connected to the query by a Boolean operator (such as **AND**, **OR**, and **NEAR**). The limit of the number of conditions includes the search query itself plus all search permissions filters that are applied to the user who runs the search. Therefore, the more search permissions filters you have (especially if these filters are applied to the same user or group of users), the better the chance of exceeding the maximum number of conditions for a search.
To understand how this limit works, you need to understand that a search permissions filter is appended to the search query when a search is run. A search permissions filter is joined to the search query by the **AND** Boolean operator. The query logic for the search query and a single search permissions filter would look like this:
compliance Preserve Bcc And Expanded Distribution Group Recipients For Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/preserve-bcc-and-expanded-distribution-group-recipients-for-ediscovery.md
# Preserve Bcc and expanded distribution group recipients for eDiscovery
-Litigation holds, eDiscovery holds, and [Microsoft 365 retention policies](./retention.md) (created in the Microsoft Purview compliance portal) allow you to preserve mailbox content to meet regulatory compliance and eDiscovery requirements. Information about recipients directly addressed in the To and Cc fields of a message is included in all messages by default. But your organization may require the ability to search for and reproduce details about all recipients of a message. This includes:
+Litigation holds, eDiscovery holds, and [Microsoft 365 retention policies](./retention.md) created in the Microsoft Purview compliance portal allow you to preserve mailbox content to meet regulatory compliance and eDiscovery requirements. Information about recipients directly addressed in the To and Cc fields of a message is included in all messages by default. But your organization may require the ability to search for and reproduce details about all recipients of a message. This includes:
-- **Recipients addressed using the Bcc field of a message:** Bcc recipients are stored in the message in the sender's mailbox, but not included in headers of the message delivered to recipients.
-
-- **Expanded distribution group recipients:** Recipients who receive the message because they're members of a distribution group to which the message was addressed, either in the To, Cc or Bcc fields.
-
+- **Recipients addressed using the Bcc field of a message:** Bcc recipients are stored in the message in the sender's mailbox, but not included in headers of the message delivered to recipients.
+- **Expanded distribution group recipients:** Recipients who receive the message because they're members of a distribution group to which the message was addressed, either in the To, Cc or Bcc fields.
+ Exchange Online and Exchange Server 2013 (Cumulative Update 7 and later versions) retain information about Bcc and expanded distribution group recipients. You can search for this information by using an eDiscovery tool in the compliance portal. [!INCLUDE [purview-preview](../includes/purview-preview.md)] ## How Bcc recipients and expanded distribution group recipients are preserved
-As stated earlier, information about Bcc'ed recipients is stored with the message in the sender's mailbox. This information is indexed and available to eDiscovery searches and holds.
+Information about Bcc'ed recipients is stored with the message in the sender's mailbox. This information is indexed and available to eDiscovery searches and holds.
-Information about expanded distribution group recipients is stored with the message after you place a mailbox on In-Place Hold or Litigation Hold. In Office 365, this information is also stored when a Microsoft 365 retention policy is applied to a mailbox. Distribution group membership is determined at the time the message is sent. The expanded recipients list stored with the message is not impacted by changes to membership of the group after the message is sent.
+Information about expanded distribution group recipients is stored with the message after you place a mailbox on In-Place Hold or Litigation Hold. In Microsoft 365, this information is also stored when a Microsoft Purview retention policy is applied to a mailbox. Distribution group membership is determined at the time the message is sent. The expanded recipients list stored with the message isn't impacted by changes to membership of the group after the message is sent.
|Information about...|Is stored in...|Is stored by default?|Is accessible to...|
-|||||
-|To and Cc recipients|Message properties in the sender and recipients' mailboxes.|Yes|Sender, recipients, and compliance officers|
-|Bcc recipients|Message property in the sender's mailbox.|Yes|Sender and compliance officers|
-|Expanded distribution group recipients|Message properties in the sender's mailbox.|No. Expanded distribution group recipient information is stored after a mailbox is placed on In-Place Hold or Litigation Hold, or assigned to a Microsoft 365 retention policy.|Compliance officers|
+|:-|:--|:--|:|
+|To: and Cc: recipients|Message properties in the sender and recipients' mailboxes.|Yes|Sender, recipients, and compliance officers|
+|Bcc: recipients|Message property in the sender's mailbox.|Yes|Sender and compliance officers|
+|Expanded distribution group recipients|Message properties in the sender's mailbox.|No. Expanded distribution group recipient information is stored after a mailbox is placed on In-Place Hold or Litigation Hold, or assigned to a Microsoft Purview retention policy.|Compliance officers|
## Searching for messages sent to Bcc and expanded distribution group recipients When searching for messages sent to a recipient, eDiscovery search results now include messages sent to a distribution group that the recipient is a member of. The following table shows the scenarios where messages sent to Bcc and expanded distribution group recipients are returned in eDiscovery searches.
-Scenario 1: John is a member of the US-Sales distribution group. This table shows eDiscovery search results when Bob sends a message to John directly or indirectly via a distribution group.
+**Scenario 1**: John is a member of the US-Sales distribution group. This table shows eDiscovery search results when Bob sends a message to John directly or indirectly via a distribution group.
|When you search Bob's mailbox for messages sent...|And the message is sent with...|Results include message?| ||||
-|To:John|John on TO|Yes|
-|To:John|US-Sales on TO|Yes|
-|To:US-Sales|US-Sales on TO|Yes|
-|Cc:John|John on CC|Yes|
-|Cc:John|US-Sales on CC|Yes|
-|Cc:US-Sales|US-Sales on CC|Yes|
+|To: John|John on To:|Yes|
+|To: John|US-Sales on To:|Yes|
+|To: US-Sales|US-Sales on To:|Yes|
+|Cc: John|John on Cc:|Yes|
+|Cc: John|US-Sales on Cc:|Yes|
+|Cc: US-Sales|US-Sales on Cc:|Yes|
-Scenario 2: Bob sends an email to John (To/Cc) and Jack (Bcc directly, or indirectly via a distribution group). The table below shows eDiscovery search results.
+**Scenario 2**: Bob sends an email to John (To/Cc) and Jack (Bcc directly, or indirectly via a distribution group). The table below shows eDiscovery search results.
|When you search...|For messages sent...|Results include message?|Notes| |||||
-|Bob's mailbox|To/Cc:John|Yes|Presents an indication that Jack was Bcc'ed.|
-|Bob's mailbox|Bcc:Jack|Yes|Presents an indication that Jack was Bcc'ed.|
-|Bob's mailbox|Bcc:Jack (via distribution group)|Yes|List of members of the Bcc'ed distribution group, expanded when the message was sent, is visible in eDiscovery search preview, export, and logs.|
-|John's mailbox|To/Cc:John|Yes|No indication of Bcc recipients.|
-|John's mailbox|Bcc:Jack (directly or via distribution group)|No|Bcc information is not stored in the message delivered to recipients. You must search the sender's mailbox.|
-|Jack's mailbox|To/Cc:John (directly or via distribution group)|Yes|To/Cc information is included in message delivered to all recipients.|
-|Jack's mailbox|Bcc:Jack (directly or via distribution group)|No|Bcc information is not stored in the message delivered to recipients. You must search the sender's mailbox.|
+|Bob's mailbox|To:/Cc: John|Yes|Presents an indication that Jack was Bcc'ed.|
+|Bob's mailbox|Bcc: Jack|Yes|Presents an indication that Jack was Bcc'ed.|
+|Bob's mailbox|Bcc: Jack (via distribution group)|Yes|List of members of the Bcc'ed distribution group, expanded when the message was sent, is visible in eDiscovery search preview, export, and logs.|
+|John's mailbox|To:/Cc: John|Yes|No indication of Bcc recipients.|
+|John's mailbox|Bcc: Jack (directly or via distribution group)|No|Bcc: information isn't stored in the message delivered to recipients. You must search the sender's mailbox.|
+|Jack's mailbox|To:/Cc: John (directly or via distribution group)|Yes|To:/Cc: information is included in message delivered to all recipients.|
+|Jack's mailbox|Bcc: Jack (directly or via distribution group)|No|Bcc: information isn't stored in the message delivered to recipients. You must search the sender's mailbox.|
## Frequently asked questions
- **Q. When and where is Bcc recipient information stored?**
+**When and where is Bcc recipient information stored?**
-A. Bcc recipient information is preserved by default in the original message in sender's mailbox. If the Bcc recipient is a distribution group, distribution group membership is only expanded if the sender's mailbox is on hold or assigned to a Microsoft 365 retention policy.
+Bcc recipient information is preserved by default in the original message in sender's mailbox. If the Bcc recipient is a distribution group, distribution group membership is only expanded if the sender's mailbox is on hold or assigned to a Microsoft 365 retention policy.
- **Q. When and where is the list of expanded distribution group recipients stored?**
+**When and where is the list of expanded distribution group recipients stored?**
-A. Group membership is expanded at the time the message is sent. The list of expanded distribution group members is stored in the original message in the sender's mailbox. The sender's mailbox must be on In-Place Hold, Litigation Hold, or assigned to a Microsoft 365 retention policy.
+Group membership is expanded at the time the message is sent. The list of expanded distribution group members is stored in the original message in the sender's mailbox. The sender's mailbox must be on In-Place Hold, Litigation Hold, or assigned to a Microsoft 365 retention policy.
- **Q. Can the To/Cc recipients see which recipients were Bcc'ed?**
+**Can the To/Cc recipients see which recipients were Bcc'ed?**
-A. No. This information is not included in message headers, and isn't visible to To/Cc recipients. The sender can see the Bcc field stored in the original message stored in their mailbox. Compliance officers can see this information when searching the sender's mailbox.
+No. This information isn't included in message headers, and isn't visible to To/Cc recipients. The sender can see the Bcc field stored in the original message stored in their mailbox. Compliance officers can see this information when searching the sender's mailbox.
- **Q. How can I ensure that expanded distribution group recipients are always preserved?**
+**How can I ensure that expanded distribution group recipients are always preserved?**
-A. To ensure that expanded distribution group members are always preserved with a message, [Place all mailboxes on hold](/Exchange/policy-and-compliance/holds/place-all-mailboxes-on-hold) or create an organization-wide Microsoft 365 retention policy.
+To ensure that expanded distribution group members are always preserved with a message, [Place all mailboxes on hold](/Exchange/policy-and-compliance/holds/place-all-mailboxes-on-hold) or create an organization-wide Microsoft 365 retention policy.
- **Q. Which types of groups are supported?**
+**Which types of groups are supported?**
-A. Distribution groups, mail-enabled security groups, and dynamic distribution groups are supported.
+Distribution groups, mail-enabled security groups, and dynamic distribution groups are supported.
- **Q. Is there a limit on the number of distribution group recipients that are expanded and stored in the message?**
+**Is there a limit on the number of distribution group recipients that are expanded and stored in the message?**
-A. Up to 10,000 members of a distribution group is preserved.
+Up to 10,000 members of a distribution group is preserved.
- **Q. Are nested distribution groups supported?**
+**Are nested distribution groups supported?**
-A. Yes, 25 levels of nested distribution groups are expanded.
+Yes, 25 levels of nested distribution groups are expanded.
- **Q. Where is the Bcc and expanded distribution group recipient information visible?**
+**Where is the Bcc and expanded distribution group recipient information visible?**
-A. Bcc and expanded distribution group recipients information is visible to Compliance officers when performing an eDiscovery search. Bcc and expanded distribution group recipients are included in search results copied to a Discovery mailbox or exported to a PST file and in the eDiscovery log included in search results. Bcc recipient information is also available in search preview.
+Bcc and expanded distribution group recipients information is visible to Compliance officers when performing an eDiscovery search. Bcc and expanded distribution group recipients are included in search results copied to a Discovery mailbox or exported to a PST file and in the eDiscovery log included in search results. Bcc recipient information is also available in search preview.
- **Q. What happens if a member of a distribution group is hidden from the organization's global address list (GAL)?**
+**What happens if a member of a distribution group is hidden from the organization's global address list (GAL)?**
-A. There's no impact. If recipients are hidden from the GAL, they are still included in the list of recipients for the expanded distribution group.
+There's no impact. If recipients are hidden from the GAL, they're still included in the list of recipients for the expanded distribution group.
compliance Preview Ediscovery Search Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/preview-ediscovery-search-results.md
After you run a Content search or a search associated with a Microsoft Purview e
To preview a sample of results returned by a search:
-1. In the Microsoft Purview compliance portal, go to the Content search page or a eDiscovery (Standard) case.
+1. In the [Microsoft Purview compliance portal](https://compliance.microsoft.com), go to the **Content search** or an eDiscovery (Standard) case.
2. Select search to display the flyout page.
-3. On the bottom of the flyout page, click **Review sample**.
+3. On the bottom of the flyout page, select **Review sample**.
- ![Click Review sample on the flyout page to preview results.](../media/PreviewSearchResults1.png)
+ ![Select Review sample on the flyout page to preview results.](../media/PreviewSearchResults1.png)
A page is displayed containing a sample of the search results.
To preview a sample of results returned by a search:
A maximum of 1,000 randomly selected items are available to preview. In addition to being randomly selected, items available for preview must also meet the following criteria: - A maximum of 100 items from a single content location (a mailbox or a site) can be previewed. This means that it's possible that less than 1,000 items might be available for preview. For example, if you search four mailboxes and the search returns 1,500 estimated items, only 400 will be available for preview because only 100 items from each mailbox can be previewed.- - For mailbox items, only email messages are available to preview. Items like tasks, calendar items, and contacts can't be previewed.- - For site items, only documents are available to preview. Items like folders, lists, or list attachments can't be previewed. ## File types supported when previewing search results
-You can preview supported file types in the preview pane. If a file type isn't supported, you have to download a copy of the file to your local computer (by clicking **Download original item**). For .aspx Web pages, the URL for the page is included though you may not have permissions to access the page. Unindexed items aren't available for previewing.
+You can preview supported file types in the preview pane. If a file type isn't supported, you have to download a copy of the file to your local computer (by selecting **Download original item**). For .aspx Web pages, the URL for the page is included though you may not have permissions to access the page. Unindexed items aren't available for previewing.
The following file types are supported and can be previewed in the search results pane. - .txt, .html, .mhtml- - .eml- - .doc, .docx, .docm- - .pptm, .pptx- - .pdf Also, the following file container types are supported. You can view the list of files in the container in the preview pane. - .zip- - .gzip
compliance Retry Failed Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retry-failed-content-search.md
# Retry a Content Search to resolve a content location error
-When you use Content Search in the security and compliance center to search a large number of mailboxes, you may get search errors that are similar to the error:
+When you use Content Search in the compliance portal to search a large number of mailboxes, you may get search errors that are similar to the error:
```text Error - The search on the following locations failed:- User1@contoso.com: Problem in processing the request. Please try again later. If you keep getting this error, contact your admin. (CS008-009)- User2@contoso.com: Application error occurred. Please try again later. (CS012-002) ```
-These errors (with error codes of CS001-002, CS003-002, CS008-009, CS012-002, and other errors of the form CS0XX-0XX) indicate that Content Search failed to search specific content locations; in this example, two mailboxes weren't searched. These errors are displayed on the status details flyout page of the Content Search.
+These errors (with error codes of CS001-002, CS003-002, CS008-009, CS012-002, and other errors of the form CS0XX-0XX) indicate that Content Search failed to search specific content locations. In this example, two mailboxes weren't searched. These errors are displayed on the status details flyout page of the Content Search.
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
When searching a large number of mailboxes, the search is distributed across tho
## Resolving content location errors
-Restarting the search will often result in similar errors on different servers. Instead of restarting the search, click the **Retry** button that is displayed at the top of the search results page.
+Restarting the search will often result in similar errors on different servers. Instead of restarting the search, select the **Retry** button that is displayed at the top of the search results page.
-![Click the Retry button to resolve content location errors.](../media/retrycontentsearch3.png)
+![Select the Retry button to resolve content location errors.](../media/retrycontentsearch3.png)
This will result in the retrying the search only for the mailboxes that failed. When you retry the search, the other results that were successfully returned are retained.
This will result in the retrying the search only for the mailboxes that failed.
Here are some additional causes of content location errors and some tips to help you avoid them when searching large numbers of mailboxes. - The mailbox being searched might be busy due to user activity. In this case, the search service might throttle itself to prevent the mailbox from becoming unavailable. To avoid this, try running searches during non-business hours.- - The search query might be retrieving too much content from the mailbox. If possible, try to narrow the scope of the search by using keywords, date ranges, and search conditions.- - Too many keywords or keyword phrases when you create a search query using the [keywords list](view-keyword-statistics-for-content-search.md#get-keyword-statistics-for-searches). When you run a search query that uses the keywords list, the service essentially runs a separate search for each row in the keyword list so that statistics can be generated. If you're using the keywords list in search queries, minimize the number of rows in the keyword list or divide the number keywords into smaller lists and create a different search for each keyword list. > [!NOTE] > To help reduce issues caused by large keyword lists, you're now limited to a maximum of 20 rows in the keyword list of a search query. - Too many searches are being performed on the same mailbox at the same time. If possible, try to run one search at a time on any one mailbox.- - Searching too many mailboxes in a single search. The probability of content location errors increases when searching a large number of mailboxes. If possible, try to run multiple searches so that each search includes a subset of mailboxes in your organization.- - Required maintenance is being performed on the mailbox. Though this cause probably occurs infrequently, wait a little while after receiving the content location error and then retry the search.
compliance Search Cloud Based Mailboxes For On Premises Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-cloud-based-mailboxes-for-on-premises-users.md
# Search for Teams chat data for on-premises users
-If your organization has an Exchange hybrid deployment (or your organization synchronizes an on-premises Exchange organization with Office 365) and has enabled Microsoft Teams, on-premises users can use the Teams chat application for instant messaging. For a cloud-based user, Teams chat data (also called *1x1 or 1xN chats*) is saved to their primary cloud-based mailbox. When an on-premises user uses the Teams chat application, their chat messages can't be stored in their primary mailbox, which is located on-premises. To get around this limitation, Microsoft has released a new feature where a cloud-based storage area is created so that you use eDiscovery tools to search for and export Teams chat data for on-premises users.
+If your organization has an Exchange hybrid deployment (or your organization synchronizes an on-premises Exchange organization with Microsoft 365) and has enabled Microsoft Teams, on-premises users can use the Teams chat application for instant messaging. For a cloud-based user, Teams chat data (also called *1x1 or 1xN chats*) is saved to their primary cloud-based mailbox. When an on-premises user uses the Teams chat application, their chat messages can't be stored in their primary mailbox, which is located on-premises. To get around this limitation, Microsoft has released a new feature where a cloud-based storage area is created so that you use eDiscovery tools to search for and export Teams chat data for on-premises users.
Here are the requirements and limitations for enabling cloud-based storage for on-premises users: - The user accounts in your on-premises directory service (such as Active Directory) must be synchronized with Azure Active Directory, the directory service in Microsoft 365. This means that a mail user account is created in Microsoft 365 and is associated with a user whose primary mailbox is located in the on-premises organization.- - The user whose primary mailbox is located in the on-premises organization must be assigned a Microsoft Teams license and a minimum of an Exchange Online Plan 1 license.- - If your organization doesn't have an Exchange hybrid deployment, you must synchronize your on-premises Exchange schema to Azure Active Directory. If you don't do this, you might risk creating duplicate cloud-based mailboxes in Exchange Online for users that have a mailbox in your on-premises Exchange organization.- - Only the Teams chat data associated with an on-premises user is stored in the cloud-based storage area. An on-premises user can't access this storage area in any way. > [!NOTE]
Here are the requirements and limitations for enabling cloud-based storage for o
## How it works
-If a Microsoft Teams-enabled user has an on-premises mailbox and their user account/identity has been synched to the cloud, Microsoft creates cloud-based storage to associate the on-premises user's 1xN Teams chat data with. Teams chat data for on-premises users is indexed for search. This lets you Use Content search (and searches associated with Microsoft Purview eDiscovery (Standard) and Microsoft Purview eDiscovery (Premium) cases) to search, preview, and export Teams chat data for on-premises users. You can also use **\*ComplianceSearch** cmdlets in Security & Compliance PowerShell to search for Teams chat data for on-premises users.
+If a Microsoft Teams-enabled user has an on-premises mailbox and their user account/identity has been synched to the cloud, Microsoft creates cloud-based storage to associate the on-premises user's 1xN Teams chat data with. Teams chat data for on-premises users is indexed for search. This lets you use Content search (and searches associated with Microsoft Purview eDiscovery (Standard) and Microsoft Purview eDiscovery (Premium) cases) to search, preview, and export Teams chat data for on-premises users. You can also use **\*ComplianceSearch** cmdlets in [Security & Compliance PowerShell](/powershell/exchange/scc-powershell) to search for Teams chat data for on-premises users.
The following graphic shows the workflow of how Teams chat data for on-premises users is available to search, preview, and export.
In addition to this capability, you can also use eDiscovery tools to search, pre
Here's how to use Content search in the Microsoft Purview compliance portal to search for Teams chat data for on-premises users. You can also use the search tool in eDiscovery (Standard) to search for chat data for on-premises users.
-1. In the compliance portal, go to **Content search**.
+1. In the [Microsoft Purview compliance portal](https://compliance.microsoft.com), go to **Content search**.
-2. On the **Searches** tab, click **New search**, and name the new search.
+2. On the **Searches** tab, select **New search**, and name the new search.
3. On the **Locations** page, set the toggle to **On** for Exchange mailboxes.
Here's how to use Content search in the Microsoft Purview compliance portal to s
6. Submit and run the search. Any search results for on-premises users can be previewed like any other search results. You can also export the search results (including any Teams chat data) to a PST file. For more information, see: - [Create a search](content-search.md)- - [Preview search results](preview-ediscovery-search-results.md)- - [Export search results](export-search-results.md) ## Using PowerShell to search for Teams chat data for on-premises users
-You can use the **New-ComplianceSearch** cmdlets in Security & Compliance PowerShell to search for Teams chat data for on-premises users. As previously explained, you don't have to submit a support request to use PowerShell to search for Teams chat data for on-premises users.
+You can use the **New-ComplianceSearch** cmdlets in [Security & Compliance PowerShell](/powershell/exchange/scc-powershell) to search for Teams chat data for on-premises users. As previously explained, you don't have to submit a support request to use PowerShell to search for Teams chat data for on-premises users.
-1. [Connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell).
+1. Connect to [Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell).
2. Run the following PowerShell command to create a content search that searches for Teams chat data for on-premises users.
You can use the **New-ComplianceSearch** cmdlets in Security & Compliance PowerS
For more information using these cmdlets, see: - [New-ComplianceSearch](/powershell/module/exchange/new-compliancesearch)- - [Start-ComplianceSearch](/powershell/module/exchange/start-compliancesearch) ## Known issues
compliance Search For And Delete Messages In Your Organization https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-for-and-delete-messages-in-your-organization.md
search.appverid:
# Search for and delete email messages
-**This article is for administrators. Are you trying to find items in your mailbox that you want to delete? See [Find a message or item with Instant Search](https://support.office.com/article/69748862-5976-47b9-98e8-ed179f1b9e4d)**.
+> [!TIP]
+>This article is for administrators. Are you trying to find items in your mailbox that you want to delete? See [Find a message or item with Instant Search](https://support.office.com/article/69748862-5976-47b9-98e8-ed179f1b9e4d).
You can use the Content search feature to search for and delete email messages from all mailboxes in your organization. This can help you find and remove potentially harmful or high-risk email, such as: - Messages that contain dangerous attachments or viruses- - Phishing messages- - Messages that contain sensitive data > [!TIP]
You can use the Content search feature to search for and delete email messages f
## Before you begin - The search and purge workflow described in this article doesn't delete chat messages or other content from Microsoft Teams. If the Content search that you create in Step 2 returns items from Microsoft Teams, those items won't be deleted when you purge items in Step 3. To search for and delete chat messages, see [Search and purge chat messages in Teams](search-and-delete-Teams-chat-messages.md).--- To create and run a Content search, you have to be a member of the **eDiscovery Manager** role group or be assigned the **Compliance Search** role in the Microsoft Purview compliance portal. To delete messages, you have to be a member of the **Organization Management** role group or be assigned the **Search And Purge** role in the compliance center For information about adding users to a role group, see [Assign eDiscovery permissions](assign-ediscovery-permissions.md).
+- To create and run a Content search, you have to be a member of the *eDiscovery Manager* role group or be assigned the *Compliance Search* role in the Microsoft Purview compliance portal. To delete messages, you have to be a member of the *Organization Management* role group or be assigned the *Search And Purge* role in the compliance portal For information about adding users to a role group, see [Assign eDiscovery permissions](assign-ediscovery-permissions.md).
> [!NOTE]
- > The **Organization Management** role group exists in both Exchange Online and in the compliance portal. These are separate role groups that give different permissions. Being a member of **Organization Management** in Exchange Online does not grant the required permissions to delete email messages. If you aren't assigned the **Search And Purge** role in the compliance center (either directly or through a role group such as **Organization Management**), you'll receive an error in Step 3 when you run the **New-ComplianceSearchAction** cmdlet with the message "A parameter cannot be found that matches parameter name 'Purge'".
+ > The *Organization Management* role group exists in both Exchange Online and in the compliance portal. These are separate role groups that give different permissions. Being a member of *Organization Management* in Exchange Online does not grant the required permissions to delete email messages. If you aren't assigned the *Search And Purge* role in the compliance portal (either directly or through a role group such as *Organization Management*), you'll receive an error in Step 3 when you run the *New-ComplianceSearchAction* cmdlet with the message "A parameter cannot be found that matches parameter name 'Purge'".
- You have to use Security & Compliance PowerShell to delete messages. See [Step 1: Connect to Security & Compliance PowerShell](#step-1-connect-to-security--compliance-powershell) for instructions about how to connect.- - A maximum of 10 items per mailbox can be removed at one time. Because the capability to search for and remove messages is intended to be an incident-response tool, this limit helps ensure that messages are quickly removed from mailboxes. This feature isn't intended to clean up user mailboxes.- - The maximum number of mailboxes in a content search that you can use to delete items by doing a search and purge action is 50,000. If the search (that you create in [Step 2](#step-2-create-a-content-search-to-find-the-message-to-delete) searches more than 50,000 mailboxes, the purge action (that you create in Step 3) will fail. Searching more than 50,000 mailbox in a single search might typically happen when you configure the search to include all mailboxes in your organization. This restriction still applies even when less than 50,000 mailboxes contain items that match the search query. See the [More information](#more-information) section for guidance about using search permissions filters to search for and purge items from more than 50,000 mailboxes.- - The procedure in this article can only be used to delete items in Exchange Online mailboxes and public folders. You can't use it to delete content from SharePoint or OneDrive for Business sites.- - Email items in a review set in an eDiscovery (Premium) case can't be deleted by using the procedures in this article. That's because items in a review set are stored in an Azure Storage location, and not in the live service. This means they won't be returned by the content search that you create in Step 1. To delete items in a review set, you have to delete the eDiscovery (Premium) case that contains the review set. For more information, see [Close or delete an eDiscovery (Premium) case](close-or-delete-case.md). ## Step 1: Connect to Security & Compliance PowerShell
-The first step is to connect to Security & Compliance PowerShell for your organization. For step-by-step instructions, see [Connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell).
+The first step is to connect to [Security & Compliance PowerShell](/powershell/exchange/scc-powershell) for your organization. For step-by-step instructions, see [Connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell).
## Step 2: Create a Content Search to find the message to delete
-The second step is to create and run a Content search to find the message that you want to remove from mailboxes in your organization. You can create the search by using the compliance portal or by running the **New-ComplianceSearch** and **Start-ComplianceSearch** cmdlets in Security & Compliance PowerShell. The messages that match the query for this search will be deleted by running the **New-ComplianceSearchAction -Purge** command in [Step 3](#step-3-delete-the-message). For information about creating a Content search and configuring search queries, see the following topics:
+The second step is to create and run a Content search to find the message that you want to remove from mailboxes in your organization. You can create the search by using the [Microsoft Purview compliance portal](https://compliance.microsoft.com) or by running the **New-ComplianceSearch** and **Start-ComplianceSearch** cmdlets in Security & Compliance PowerShell. The messages that match the query for this search will be deleted by running the **New-ComplianceSearchAction -Purge** command in [Step 3](#step-3-delete-the-message). For information about creating a Content search and configuring search queries, see the following articles:
- [Content search in Office 365](content-search.md)- - [Keyword queries for Content search](keyword-queries-and-search-conditions.md)- - [New-ComplianceSearch](/powershell/module/exchange/New-ComplianceSearch)- - [Start-ComplianceSearch](/powershell/module/exchange/Start-ComplianceSearch) > [!NOTE]
The second step is to create and run a Content search to find the message that y
The goal of the search query is to narrow the results of the search to only the message or messages that you want to remove. Here are some tips: - If you know the exact text or phrase used in the subject line of the message, use the **Subject** property in the search query.- - If you know that exact date (or date range) of the message, include the **Received** property in the search query.- - If you know who sent the message, include the **From** property in the search query.- - Preview the search results to verify that the search returned only the message (or messages) that you want to delete.- - Use the search estimate statistics (displayed in the details pane of the search in the compliance portal or by using the [Get-ComplianceSearch](/powershell/module/exchange/get-compliancesearch) cmdlet) to get a count of the total number of results. Here are two examples of queries to find suspicious email messages.
Here are two examples of queries to find suspicious email messages.
(Received:4/13/2016..4/14/2016) AND (Subject:'Action required') ``` -- This query returns messages that were sent by chatsuwloginsset12345@outlook.com and that contain the exact phrase "Update your account information" in the subject line.
+- This query returns messages that were sent by user@contoso.com and that contain the exact phrase "Update your account information" in the subject line.
```powershell
- (From:chatsuwloginsset12345@outlook.com) AND (Subject:"Update your account information")
+ (From:user@contoso.com) AND (Subject:"Update your account information")
``` Here's an example of using a query to create and start a search by running the **New-ComplianceSearch** and **Start-ComplianceSearch** cmdlets to search all mailboxes in the organization:
Start-ComplianceSearch -Identity $Search.Identity
## Step 3: Delete the message
-After you've created and refined a Content search to return the messages that you want to remove, the final step is to run the **New-ComplianceSearchAction -Purge** command in Security & Compliance PowerShell to delete the message. You can soft- or hard-delete the message. A soft-deleted message is moved to a user's Recoverable Items folder and retained until the deleted item retention period expires. Hard-deleted messages are marked for permanent removal from the mailbox and will be permanently removed the next time the mailbox is processed by the Managed Folder Assistant. If single item recovery is enabled for the mailbox, hard-deleted items will be permanently removed after the deleted item retention period expires. If a mailbox is placed on hold, deleted messages are preserved until the hold duration for the item expires or until the hold is removed from the mailbox.
+After you've created and refined a Content search to return the messages that you want to remove, the final step is to run the **New-ComplianceSearchAction -Purge** command in Security & Compliance PowerShell to delete the message.
+
+You can soft- or hard-delete the message. A soft-deleted message is moved to a user's Recoverable Items folder and retained until the deleted item retention period expires. Hard-deleted messages are marked for permanent removal from the mailbox and will be permanently removed the next time the mailbox is processed by the Managed Folder Assistant. If single item recovery is enabled for the mailbox, hard-deleted items will be permanently removed after the deleted item retention period expires. If a mailbox is placed on hold, deleted messages are preserved until the hold duration for the item expires or until the hold is removed from the mailbox.
> [!NOTE] > As previously stated, items from Microsoft Teams that are returned by Content search are not deleted when you run the the **New-ComplianceSearchAction -Purge** command.
compliance Search For Content https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-for-content.md
Use the Content search tool in the Microsoft Purview compliance portal to quickl
## Search for content The first step is to starting using the Content search tool to choose content locations to search and configure a keyword query to search for specific items. Or, you can just leave the query blank and return all items in the target locations.
-
-- [Create and run](content-search.md) a Content search--- [Build search queries and use conditions](keyword-queries-and-search-conditions.md) to narrow your search--- [Feature reference](content-search-reference.md) for Content search--- [Configure search permissions filtering](permissions-filtering-for-content-search.md) so that an eDiscovery manager can only search subset of mailboxes or sites in your organization -- [Search cloud-based mailboxes](search-cloud-based-mailboxes-for-on-premises-users.md) for on-premises users in Microsoft 365--- [View keyword statistics](view-keyword-statistics-for-content-search.md) for the results of a search and then refine the query if necessary--- [Search for third-party data](use-content-search-to-search-third-party-data-that-was-imported.md) that your organization has imported to Microsoft 365--- [Preserve Bcc recipients](/exchange/policy-and-compliance/holds/preserve-bcc-recipients-and-group-members) so you can search for them
+- [Create and run](content-search.md) a Content search.
+- [Build search queries and use conditions](keyword-queries-and-search-conditions.md) to narrow your search.
+- [Feature reference](content-search-reference.md) for Content search.
+- [Configure search permissions filtering](permissions-filtering-for-content-search.md) so that an eDiscovery manager can only search subset of mailboxes or sites in your organization.
+- [Search cloud-based mailboxes](search-cloud-based-mailboxes-for-on-premises-users.md) for on-premises users in Microsoft 365.
+- [View keyword statistics](view-keyword-statistics-for-content-search.md) for the results of a search and then refine the query if necessary.
+- [Search for third-party data](use-content-search-to-search-third-party-data-that-was-imported.md) that your organization has imported to Microsoft 365.
+- [Preserve Bcc recipients](/exchange/policy-and-compliance/holds/preserve-bcc-recipients-and-group-members) so you can search for them.
## Perform actions on content you find
-After you run a search and refine it as necessary, the next step is to do something with the results returned by the search. You can export and download the results to your local computer or in the case of a email attack on your organization, you can delete the results of a search from user mailboxes.
-
-- [Export the results of a content search](export-search-results.md) and download them to your local computer
+After you run a search and refine it as necessary, the next step is to do something with the results returned by the search. You can export and download the results to your local computer or in the case of an email attack on your organization, you can delete the results of a search from user mailboxes.
-- [Search for and delete email messages](search-for-and-delete-messages-in-your-organization.md), such as messages that content a virus, dangerous attachments, or phishing messages--- [Export a report](export-a-content-search-report.md) about the results of a content search, without exporting the actual results
+- [Export the results of a content search](export-search-results.md) and download them to your local computer..
+- [Search for and delete email messages](search-for-and-delete-messages-in-your-organization.md), such as messages that content a virus, dangerous attachments, or phishing messages.
+- [Export a report](export-a-content-search-report.md) about the results of a content search, without exporting the actual results.
## Learn more about content search
-Content search is easy to use, but it's also a powerful tool. Behind-the-scenes, there's a lot going on. The more you know about it and understand its behavior and its limitations, the more successful you'll be using it for your organization's search and investigation needs. Learn about:
+Content search is easy to use, but it's also a powerful tool. Behind-the-scenes, there's a lot going on. The more you know about it and understand its behavior and its limitations, the more successful you'll be using it for your organization's search and investigation needs.
-- [Content search limits](limits-for-content-search.md), such as the maximum number of searches that you can run at one time and the maximum number of content locations you can include in a single search--- [Estimated and actual search results](differences-between-estimated-and-actual-ediscovery-search-results.md) and the reasons why there might be differences between them when you export and download search results--- [Partially indexed items in Exchange and SharePoint](partially-indexed-items-in-content-search.md) and how to include or exclude them when you export and download search results--- [Investigate partially indexed items](investigating-partially-indexed-items-in-ediscovery.md) and determine your organization's exposure to them--- [De-duplication in search results](de-duplication-in-ediscovery-search-results.md) that you can enable when you export email messages that are the results of a search
+- [Content search limits](limits-for-content-search.md), such as the maximum number of searches that you can run at one time and the maximum number of content locations you can include in a single search.
+- [Estimated and actual search results](differences-between-estimated-and-actual-ediscovery-search-results.md) and the reasons why there might be differences between them when you export and download search results.
+- [Partially indexed items in Exchange and SharePoint](partially-indexed-items-in-content-search.md) and how to include or exclude them when you export and download search results.
+- [Investigate partially indexed items](investigating-partially-indexed-items-in-ediscovery.md) and determine your organization's exposure to them.
+- [De-duplication in search results](de-duplication-in-ediscovery-search-results.md) that you can enable when you export email messages that are the results of a search.
## Use scripts for advanced scenarios
-Sometimes you have to perform more advanced, complex, and repetitive content search tasks. In these cases, it's easier and faster to use commands in Security & Compliance PowerShell. To help make this easier, we've created a number of Security & Compliance PowerShell scripts to help you complete complex content search-related tasks.
--- [Search specific mailbox and site folders](use-content-search-for-targeted-collections.md) (called a *targeted* collection) when you're confident that items responsive to a case are located in that folder--- [Search the mailbox and OneDrive location](search-the-mailbox-and-onedrive-for-business-for-a-list-of-users.md) for a list of users
+Sometimes you have to perform more advanced, complex, and repetitive content search tasks. In these cases, it's easier and faster to use commands in [Security & Compliance PowerShell](/powershell/exchange/scc-powershell).
-- [Create, report on, and delete multiple searches](create-report-on-and-delete-multiple-content-searches.md) to quickly and efficiently identify and cull search data
+To help make this easier, we've created several Security & Compliance PowerShell scripts to help you complete complex content search-related tasks.
-- [Clone a content search](clone-a-content-search.md) and quickly compare the results of different keyword search queries run on the same content locations; or use the script to save time by not having to re-enter a large number of content locations when you create a new search
+- [Search specific mailbox and site folders](use-content-search-for-targeted-collections.md) (called a *targeted* collection) when you're confident that items responsive to a case are located in that folder.
+- [Search the mailbox and OneDrive location](search-the-mailbox-and-onedrive-for-business-for-a-list-of-users.md) for a list of users.
+- [Create, report on, and delete multiple searches](create-report-on-and-delete-multiple-content-searches.md) to quickly and efficiently identify and cull search data.
+- [Clone a content search](clone-a-content-search.md) and quickly compare the results of different keyword search queries run on the same content locations; or use the script to save time by not having to re-enter a large number of content locations when you create a new search.
compliance Search For Ediscovery Activities In The Audit Log https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-for-ediscovery-activities-in-the-audit-log.md
f1.keywords:
Previously updated : 05/10/2022 audience: Admin
Content Search and eDiscovery-related activities (for Microsoft Purview eDiscovery (Standard) and Microsoft Purview eDiscovery (Premium)) that are performed in Microsoft Purview compliance portal or by running the corresponding PowerShell cmdlets are logged in the audit log. Events are logged when administrators or eDiscovery managers (or any user assigned eDiscovery permissions) perform the following Content Search and eDiscovery (Standard) tasks in the compliance portal: -- Creating and managing eDiscovery (Standard) and eDiscovery (Premium) cases--- Creating, starting, and editing Content searches--- Performing search actions, such as previewing, exporting, and deleting search results--- Managing custodians and review sets in eDiscovery (Premium)--- Configuring permissions filtering for Content search--- Managing the eDiscovery Administrator role
+- Creating and managing eDiscovery (Standard) and eDiscovery (Premium) cases.
+- Creating, starting, and editing Content searches.
+- Performing search actions, such as previewing, exporting, and deleting search results.
+- Managing custodians and review sets in eDiscovery (Premium).
+- Configuring permissions filtering for Content search.
+- Managing the eDiscovery Administrator role.
For more information about searching the audit log, the permissions that are required, and exporting search results, see [Search the audit log in the compliance portal](search-the-audit-log-in-security-and-compliance.md).
For more information about searching the audit log, the permissions that are req
Currently, you have to do a few specific things to view eDiscovery activities in the audit log. Here's how.
-1. Go to <https://compliance.microsoft.com> and sign in using your work or school account.
+1. Go to the [Microsoft Purview compliance portal](https://compliance.microsoft.com) and sign in using your work or school account.
-2. In the left navigation pane of the compliance portal, click **Audit**.
+2. In the left navigation pane of the compliance portal, select **Audit**.
-3. In the **Activities** drop-down list, under **eDiscovery activities** or **eDiscovery (Premium) activities**, click one or more activities to search for.
+3. In the **Activities** drop-down list, under **eDiscovery activities** or **eDiscovery (Premium) activities**, select one or more activities to search for.
> [!NOTE] > The **Activities** drop-down list also includes a group of activities named **eDiscovery cmdlet activities** that will return records from the cmdlet audit log.
Currently, you have to do a few specific things to view eDiscovery activities in
5. In the **Users** box, select one or more users to display search results for. Leave this box blank to return entries for all users.
-6. Click **Search** to run the search using your search criteria.
+6. Select **Search** to run the search using your search criteria.
-7. After the search results are displayed, you can click **Filter results** to filter or sort the resulting activity records. Unfortunately, you can't use filtering to explicitly exclude certain activities.
+7. After the search results are displayed, you can select **Filter results** to filter or sort the resulting activity records. Unfortunately, you can't use filtering to explicitly exclude certain activities.
-8. To view details about an activity, click the activity record in the list of search results.
+8. To view details about an activity, select the activity record in the list of search results.
- A **Details** fly out page is displayed that contains the detailed properties from the event record. To display additional details, click **More information**. For a description of these properties, see the [Detailed properties for eDiscovery activities](#detailed-properties-for-ediscovery-activities) section.
+ A **Details** fly out page is displayed that contains the detailed properties from the event record. To display additional details, select **More information**. For a description of these properties, see the [Detailed properties for eDiscovery activities](#detailed-properties-for-ediscovery-activities) section.
9. If desired, you can export the audit log search results to a CSV file, and then use the Excel Power Query feature to format and filter these records. For more information, see [Export, configure, and view audit log records](export-view-audit-log-records.md).
The following table describes the Content Search and eDiscovery (Standard) activ
|**Friendly name**|**Operation**|**Corresponding cmdlet**|**Description**| |:--|:--|:--|:--|
-|Added member to eDiscovery case <br/> |CaseMemberAdded <br/> |Add-ComplianceCaseMember <br/> |A user was added as a member of an eDiscovery case. As a member of a case, a user can perform various case-related tasks depending on whether they have been assigned the necessary permissions. <br/> |
+|Added member to eDiscovery case <br/> |CaseMemberAdded <br/> |Add-ComplianceCaseMember <br/> |A user was added as a member of an eDiscovery case. As a member of a case, a user can perform various case-related tasks depending on whether they've been assigned the necessary permissions. <br/> |
|Changed content search <br/> |SearchUpdated <br/> |Set-ComplianceSearch <br/> |An existing content search was changed. Changes can include adding or removing content locations or editing the search query. <br/> | |Changed eDiscovery administrator membership <br/> |CaseAdminUpdated <br/> |Update-eDiscoveryCaseAdmin <br/> |The list of eDiscovery Administrators in your organization was changed. This activity is logged when the list of eDiscovery Administrators is replaced with a group of new users. If a single user is added or removed, the CaseAdminAdded operation is logged. <br/> | |Changed eDiscovery case <br/> |CaseUpdated <br/> |Set-ComplianceCase <br/> |An eDiscovery case was changed. Changes include closing an open case or reopening a closed case. <br/> |
The following table describes the Content Search and eDiscovery (Standard) activ
|Started export of content search <br/> |SearchExported <br/> |New-ComplianceSearchAction <br/> |A user exported the results of a content search. <br/> | |Started export report <br/> |SearchReport <br/> |New-ComplianceSearchAction <br/> |A user exported a content search report. <br/> | |Stopped content search <br/> |SearchStopped <br/> |Stop-ComplianceSearch <br/> |A user stopped a content search. <br/> |
-|(none)|CaseViewed|Get-ComplianceCase|A user viewed a eDiscovery (Standard) case in the compliance center. The audit record for this event includes the name of the case that was viewed. |
-|(none)|SearchViewed|Get-ComplianceSearch|A user viewed a Content search in the compliance center by accessing the search on the **Searches** tab in a eDiscovery (Standard) case or accessing it on the **Content search** page. The audit record for this event includes the identity of the search that was viewed.|
-|(none)|ViewedSearchExported|Get-ComplianceSearchAction -Export|A user viewed a Content search export in the compliance center by accessing the export on the **Exports** tab on the **Content search** page. This activity is also logged when a user views an export associated with a eDiscovery (Standard) case.|
-|(none)|ViewedSearchPreviewed|Get-ComplianceSearchAction -Preview|A user previewed the results of a Content search in the compliance center. This activity is also logged when a user previews the results of a search associated with a eDiscovery (Standard) case.|
+|(none)|CaseViewed|Get-ComplianceCase|A user viewed a eDiscovery (Standard) case in the compliance portal. The audit record for this event includes the name of the case that was viewed. |
+|(none)|SearchViewed|Get-ComplianceSearch|A user viewed a Content search in the compliance portal by accessing the search on the **Searches** tab in a eDiscovery (Standard) case or accessing it on the **Content search** page. The audit record for this event includes the identity of the search that was viewed.|
+|(none)|ViewedSearchExported|Get-ComplianceSearchAction -Export|A user viewed a Content search export in the compliance portal by accessing the export on the **Exports** tab on the **Content search** page. This activity is also logged when a user views an export associated with a eDiscovery (Standard) case.|
+|(none)|ViewedSearchPreviewed|Get-ComplianceSearchAction -Preview|A user previewed the results of a Content search in the compliance portal. This activity is also logged when a user previews the results of a search associated with a eDiscovery (Standard) case.|
||||| ## eDiscovery (Premium) activities
The following table describes the eDiscovery (Premium) activities logged in the
## eDiscovery cmdlet activities
-The following table lists the cmdlet audit log records that are logged when an administrator or user performs an eDiscovery-related activity by using the compliance center or by running the corresponding cmdlet in Security & Compliance PowerShell. The detailed information in the audit log record is different for the cmdlet activities listed in this table and the eDiscovery activities described in the previous section.
+The following table lists the cmdlet audit log records that are logged when an administrator or user performs an eDiscovery-related activity by using the compliance portal or by running the corresponding cmdlet in Security & Compliance PowerShell. The detailed information in the audit log record is different for the cmdlet activities listed in this table and the eDiscovery activities described in the previous section.
As previously stated, it may take up to 24 hours for eDiscovery cmdlet activities to appear in the audit log search results.
As previously stated, it may take up to 24 hours for eDiscovery cmdlet activitie
|Created eDiscovery case <br/> |[New-ComplianceCase](/powershell/module/exchange/new-compliancecase) <br/> |An eDiscovery case was created. When a case is created, you only have to give it a name. Other case-related tasks such as adding members, creating holds, and creating content searches associated with the case result in additional events being logged. <br/> | |Deleted eDiscovery case <br/> |[Remove-ComplianceCase](/powershell/module/exchange/remove-compliancecase) <br/> |An eDiscovery case was deleted. Any hold associated with the case has to be removed before the case can be deleted. <br/> | |Changed eDiscovery case <br/> |[Set-ComplianceCase](/powershell/module/exchange/set-compliancecase) <br/> |An eDiscovery case was changed. Changes include closing an open case or reopening a closed case. <br/> |
-|Added member to eDiscovery case <br/> |[Add-ComplianceCaseMember](/powershell/module/exchange/add-compliancecasemember) <br/> |A user was added as a member of an eDiscovery case. As a member of a case, a user can perform various case-related tasks depending on whether they have been assigned the necessary permissions. <br/> |
+|Added member to eDiscovery case <br/> |[Add-ComplianceCaseMember](/powershell/module/exchange/add-compliancecasemember) <br/> |A user was added as a member of an eDiscovery case. As a member of a case, a user can perform various case-related tasks depending on whether they've been assigned the necessary permissions. <br/> |
|Removed member from eDiscovery case <br/> |[Remove-ComplianceCaseMember](/powershell/module/exchange/remove-compliancecasemember) <br/> |A user was removed as a member of an eDiscovery case. <br/> | |Changed eDiscovery case membership <br/> |[Update-ComplianceCaseMember](/powershell/module/exchange/update-compliancecasemember) <br/> |The membership list of an eDiscovery case was changed. This activity is logged when all members are replaced with a group of new users. If a single member is added or removed, the **Add-ComplianceCaseMember** or **Remove-ComplianceCaseMember** operation is logged. <br/> | |Created content search <br/> |[New-ComplianceSearch](/powershell/module/exchange/new-compliancesearch) <br/> |A new content search was created. <br/> | |Deleted content search <br/> |[Remove-ComplianceSearch](/powershell/module/exchange/remove-compliancesearch) <br/> |An existing content search was deleted. <br/> | |Changed content search <br/> |[Set-ComplianceSearch](/powershell/module/exchange/set-compliancesearch) <br/> |An existing content search was changed. Changes can include adding or removing content locations that are searched and editing the search query. <br/> |
-|Started content search <br/> |[Start-ComplianceSearch](/powershell/module/exchange/start-compliancesearch) <br/> |A content search was started. When you create or change a content search by using the compliance center GUI, the search is automatically started. If you create or change a search by using the **New-ComplianceSearch** or **Set-ComplianceSearch** cmdlet, you have to run the **Start-ComplianceSearch** cmdlet to start the search. <br/> |
+|Started content search <br/> |[Start-ComplianceSearch](/powershell/module/exchange/start-compliancesearch) <br/> |A content search was started. When you create or change a content search by using the compliance portal GUI, the search is automatically started. If you create or change a search by using the **New-ComplianceSearch** or **Set-ComplianceSearch** cmdlet, you have to run the **Start-ComplianceSearch** cmdlet to start the search. <br/> |
|Stopped content search <br/> |[Stop-ComplianceSearch](/powershell/module/exchange/stop-compliancesearch) <br/> |A content search that was running was stopped. <br/> | |Created content search action <br/> |[New-ComplianceSearchAction](/powershell/module/exchange/new-compliancesearchaction) <br/> |A content search action was created. Content search actions include previewing search results, exporting search results, preparing search results for analysis in eDiscovery (Premium), and permanently deleting items that match the search criteria of a content search. <br/> | |Deleted content search action <br/> |[Remove-ComplianceSearchAction](/powershell/module/exchange/remove-compliancesearchaction) <br/> |A content search action was deleted. <br/> |
The following table describes the properties that are included on the flyout pag
|**Property**|**Description**| |:--|:--| |Case <br/> |The identity (GUID) of the eDiscovery case that was created, changed, or deleted. <br/> |
-|ClientApplication <br/> |eDiscovery cmdlet activities have a value of **EMC** for this property. This indicates the activity was performed by using the compliance center GUI or running the cmdlet in PowerShell. <br/> |
+|ClientApplication <br/> |eDiscovery cmdlet activities have a value of **EMC** for this property. This indicates the activity was performed by using the compliance portal GUI or running the cmdlet in PowerShell. <br/> |
|ClientIP <br/> |The IP address of the device that was used when the activity was logged. The IP address is displayed in either an IPv4 or IPv6 address format. <br/> | |ClientRequestId <br/> | For eDiscovery activities, this property is typically blank. <br/> |
-|CmdletVersion <br/> |The build number for the version of the compliance center running in your organization. <br/> |
+|CmdletVersion <br/> |The build number for the version of the compliance portal running in your organization. <br/> |
|CreationTime <br/> |The date and time in Coordinated Universal Time (UTC) when the eDiscovery activity was completed. <br/> | |EffectiveOrganization <br/> |The name of the Microsoft 365 organization. <br/> | |ExchangeLocations <br/> |The Exchange Online mailboxes that are included in a content search or placed on hold in an eDiscovery case. <br/> |
The following table describes the properties that are included on the flyout pag
|Query <br/> |The search query associated with the activity, such as a content search or a query-based hold. <br/> | |RecordType <br/> |The type of operation indicated by the record. The value of **18** indicates an event related to an activity listed in the [eDiscovery cmdlet activities](#ediscovery-cmdlet-activities) section. A value of **24** indicates an event related to an activity listed in the [How to search for and view eDiscovery activities](#how-to-search-for-and-view-ediscovery-activities) section. <br/> | |ResultStatus <br/> |Indicates whether the action (specified in the Operation property) was successful or not. <br/> |
-|SecurityComplianceCenterEventType <br/> |Indicates that the activity was a compliance center event. All eDiscovery activities will have a value of **0** for this property. <br/> |
+|SecurityComplianceCenterEventType <br/> |Indicates that the activity was a compliance portal event. All eDiscovery activities will have a value of **0** for this property. <br/> |
|SharepointLocations <br/> |The SharePoint Online sites that are included in a content search or placed on hold in an eDiscovery case. <br/> | |StartTime <br/> |The date and time in Coordinated Universal Time (UTC) when the eDiscovery activity was started. <br/> | |UserId <br/> |The user who performed the activity (specified in the Operation property) that resulted in the record being logged. Records for eDiscovery activity performed by system accounts (such as NT AUTHORITY\SYSTEM) are also included in the audit log. <br/> |
compliance Sensitivity Labels Aip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-aip.md
Some features are only supported by built-in labeling for Office apps, and won't
- For automatic and recommended labeling: - Access to intelligent classification services that include [trainable classifiers](classifier-learn-about.md), [exact data match (EDM)](sit-learn-about-exact-data-match-based-sits.md), and [named entities](named-entities-learn.md)
- - Detection of sensitive information as users type
+ - Detection of sensitive information as users enter the text
- In Word, users can review and remove the identified sensitive content - [Sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) that is integrated into existing user workflows - [PDF support](sensitivity-labels-office-apps.md#pdf-support)
compliance Sensitivity Labels Office Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-office-apps.md
The numbers listed are the minimum Office application versions required for each
|[Dynamic markings with variables](#dynamic-markings-with-variables) | Current Channel: 2010+ <br /><br> Monthly Enterprise Channel: 2010+ <br /><br> Semi-Annual Enterprise Channel: 2102+ | 16.42+ | 2.42+ | 16.0.13328+ | [Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) | |[Assign permissions now](encryption-sensitivity-labels.md#assign-permissions-now) | Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ | 16.21+ | 2.21+ | 16.0.11231+ | [Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) | |[Let users assign permissions: <br /> - Prompt users for custom permissions (users and groups)](encryption-sensitivity-labels.md#let-users-assign-permissions) |Current Channel: 2004+ <br /><br> Monthly Enterprise Channel: 2004+ <br /><br> Semi-Annual Enterprise Channel: 2008+ | 16.35+ | Under review | Under review | Under review |
-|[Let users assign permissions: <br /> - Prompt users for custom permissions (users, groups, and organizations)](encryption-sensitivity-labels.md#support-for-organization-wide-custom-permissions) |Preview: Rolling out to [Current Channel (Preview)](https://office.com/insider) | Under review | Under review | Under review | Under review |
+|[Let users assign permissions: <br /> - Prompt users for custom permissions (users, groups, and organizations)](encryption-sensitivity-labels.md#support-for-organization-wide-custom-permissions) |Preview: Rolling out to [Beta Channel](https://office.com/insider) | Under review | Under review | Under review | Under review |
|[Audit label-related user activity](#auditing-labeling-activities) | Current Channel: 2011+ <br /><br> Monthly Enterprise Channel: 2011+ <br /><br> Semi-Annual Enterprise Channel: 2108+ | 16.43+ | 2.46+ | 16.0.13628+ | Yes | |[Require users to apply a label to their email and documents](#require-users-to-apply-a-label-to-their-email-and-documents) | Current Channel: 2101+ <br /><br> Monthly Enterprise Channel: 2101+ <br /><br> Semi-Annual Enterprise Channel: 2108+ | 16.45+ | 2.47+ | 16.0.13628+ | [Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) |[Apply a sensitivity label to content automatically](apply-sensitivity-label-automatically.md) <br /> - Using sensitive info types | Current Channel: 2009+ <br /><br> Monthly Enterprise Channel: 2009+ <br /><br> Semi-Annual Enterprise Channel: 2102+ | 16.44+ | Under review | Under review | [Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) |
-|[Apply a sensitivity label to content automatically](apply-sensitivity-label-automatically.md) <br /> - Using trainable classifiers | Current Channel: 2105+ <br /><br> Monthly Enterprise Channel: 2105+ <br /><br> Semi-Annual Enterprise Channel: 2108+ | 16.49+ | Under review | Under review | [Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) |
+|[Apply a sensitivity label to content automatically](apply-sensitivity-label-automatically.md) <br /> - Using trainable classifiers | Current Channel: 2105+ <br /><br> Monthly Enterprise Channel: 2105+ <br /><br> Semi-Annual Enterprise Channel: 2108+ | 16.49+ | Under review | Under review | [Under review |
|[Support co-authoring and AutoSave](sensitivity-labels-coauthoring.md) for labeled and encrypted documents | Current Channel: 2107+ <br /><br> Monthly Enterprise Channel: 2107+ <br /><br> Semi-Annual Enterprise Channel: 2202+ | 16.51+ | 2.58+ | 16.0.14931+ | [Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) | |[PDF support](#pdf-support)| Current Channel: 2208+ <br /><br> Monthly Enterprise Channel: 2208+ <br /><br> Semi-Annual Enterprise Channel: Under review| Under review | Under review | Under review | Under review | |[Sensitivity bar](#sensitivity-bar) and [display label color](#label-colors) | Preview: Rolling out to [Beta Channel](https://office.com/insider) | Under review | Under review | Under review | Under review |
Use the Microsoft Purview compliance portal to select one of 10 standard colors
You can't select colors for sublabels because they automatically inherit the label color from their parent label.
-If a label is configured for a different color from one of the 10 default colors, you see a **Use previously assigned customer color** checkbox selected, and the standard color options aren't available. You can change the custom color to one of the standard colors by first clearing the checkbox, and then you can select one of the standard colors.
+If a label is configured for a different color from one of the 10 default colors, you see a **Use previously assigned custom color** check box selected, and the standard color options aren't available. You can change the custom color to one of the standard colors by first clearing the checkbox, and then you can select one of the standard colors.
You can't use the compliance portal to configure a different custom color. Instead, use PowerShell, as described in the next section.
compliance View Keyword Statistics For Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/view-keyword-statistics-for-content-search.md
After you create and run a Content search or a search associated with a Microsof
Additionally, you can use the keywords list to configure a search to return statistics for each keyword in a search query. This lets you compare the number of results returned by each keyword in a query.
-You can also download search statistics to a CSV file. This lets you use the filtering and sorting features in Excel to compare results, and prepare reports for your search results.
+You can also download search statistics to a comma-separated value (CSV) file. This lets you use the filtering and sorting features in Excel to compare results, and prepare reports for your search results.
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
You can also download search statistics to a CSV file. This lets you use the fil
To display statistics for a Content search or a search associated with a eDiscovery (Standard) case.:
-1. In the Microsoft Purview compliance portal, click **Show all**, and then do one of the following:
+1. In the Microsoft Purview compliance portal, select **Show all**, and then do one of the following:
- - Click **Content search** and then select a search to display the flyout page.
+ - Select **Content search** and then select a search to display the flyout page.
OR
- - Click **eDiscovery** > **eDiscovery (Standard)**, select a case, and then select a search on the **Searches** tab to display the flyout page.
+ - Select **eDiscovery** > **eDiscovery (Standard)**, select a case, and then select a search on the **Searches** tab to display the flyout page.
-2. On the flyout page of the selected search, click the **Search statistics** tab.
+2. On the flyout page of the selected search, select the **Search statistics** tab.
![The Search statistics tab.](../media/SearchStatistics1.png)
This section displays a graphical summary of the estimated items returned by the
![Search estimates for a search.](../media/SearchContentReport.png) - **Estimated items by locations**: The total number of estimated items returned by the search. The specific number of items located in mailboxes and located in sites is also displayed.- - **Estimated locations with hits**: The total number of content locations that contain items returned by the search. The specific number of mailbox and site locations is also displayed.- - **Data volume by location (in MB)**: The total size of all estimated items returned by the search. The specific size of mailbox items and site items is also displayed. ### Condition report
This section displays statistics about the search query and the number of estima
![Condition report.](../media/SearchContentReportNoKeywordList.png) - **Location type**: The type of content location that the query statistics are applicable to. The value of **Exchange** indicates a mailbox location; a value of **SharePoint** indicates a site location.- - **Part**: The part of the search query the statistics are applicable to. **Primary** indicates the entire search query. **Keyword** indicates the statistics in the row are for a specific keyword. If you use a keyword list for search query, statistics for each component of the query are included in this table. For more information, see [Get keyword statistics for searches](#get-keyword-statistics-for-searches).- - **Condition**: The actual component (keyword or condition) of the search query that returned the statistics displayed in the corresponding row.- - **Locations with hits**: The number of the content locations (specified by the **Location type** column) that contain items that match the primary or keyword query listed in the **Condition** column.- - **Items**: The number of items (from the specified content location) that match the query listed in the **Condition** column. As previously explained, if an item contains multiple instances of a keyword that is being searched for, it's only counted once in this column.- - **Size (MB)**: The total size of all items that were found (in the specified content location) that match the search query in the **Condition** column. ### Top locations
This section displays statistics about the search query and the number of estima
This section displays statistics about the specific content locations with the most items returned by the search. The top 1,000 locations are displayed. You can also download a copy of this report in CSV format. - The name of the location name (the email address of mailboxes and the URL for sites).- - Location type (a mailbox or site).- - Estimated number of items in the content location returned by the search.- - The total size of estimated items in each content location. ## Get keyword statistics for searches
-As previous explained, the **Condition report** section shows the search query and the number (and size) of items that match the query. If you use a keyword list when you create or edit a search query, you can get enhanced statistics that show how many items match each keyword or keyword phrase. This can help you quickly identify which parts of the query are the most (and least) effective. For example, if a keyword returns a large number of items, you might choose to refine the keyword query to narrow the search results.
+The **Condition report** section shows the search query and the number (and size) of items that match the query. If you use a keyword list when you create or edit a search query, you can get enhanced statistics that show how many items match each keyword or keyword phrase. This can help you quickly identify which parts of the query are the most (and least) effective. For example, if a keyword returns a large number of items, you might choose to refine the keyword query to narrow the search results.
To create a keyword list and view keyword statistics for a search:
-1. In the compliance portal, create a new Content search or a search associated with a eDiscovery (Standard) case.
+1. In the [Microsoft Purview compliance portal](https://compliance.microsoft.com), create a new Content search or a search associated with a eDiscovery (Standard) case.
2. On the **Conditions** page of the search wizard. select the **Show keyword list** checkbox.
To create a keyword list and view keyword statistics for a search:
5. When the search is completed, select it to display the flyout page.
-6. On the **Search statistics** tab, click the **Condition report** to display the keyword statistics for the search.
+6. On the **Search statistics** tab, select the **Condition report** to display the keyword statistics for the search.
![The statistics for each keyword are displayed.](../media/SearchKeywordsList3.png) As shown in the previous screenshot, the statistics for each keyword are displayed; this includes: - The keyword statistics for each type of content location included in the search.- - The number of unindexed mailbox items.- - The actual search query and results for each keyword (identified as **Keyword** in the **Part** column), which includes any conditions from the search query.- - The complete search query (identified as **Primary** in the **Part** column) and the statistics for the complete query for each location type. Note these are the same statistics displayed on the **Summary** tab.
compliance What Is Stored In Exo Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/what-is-stored-in-exo-mailbox.md
Title: "Content stored in Exchange Online mailboxes"
+ Title: "Content stored in Exchange Online mailboxes for eDiscovery"
description: "Content produced by cloud-based apps in Microsoft 365 is stored or associated with a user's Exchange Online mailbox. This content can be searched using Microsoft eDiscovery tools." f1.keywords: - NOCSH
search.appverid:
# Content stored in Exchange Online mailboxes for eDiscovery
-A mailbox in Exchange Online is primarily used to store email-related items such as messages, calendar items, tasks, and notes. But that's changing as more cloud-based apps also store their data in a user's mailbox. One advantage of storing data in a mailbox is that you can use the search tools in content search, Microsoft Purview eDiscovery (Standard), and Microsoft Purview eDiscovery (Premium) to find, view, and export the data from these cloud-based apps. The data from some of these apps is stored in hidden folders located in a non-interpersonal message (non-IPM) subtree in the mailbox. Data from other cloud-based apps might not be stored _in_ the mailbox, but it's _associated with_ the mailbox, and is returned in searches (if that data matches the search query). Regardless of whether cloud-based data is stored in or associated with a user mailbox, the data is typically not visible in an email client when a user opens their mailbox.
+A mailbox in Exchange Online is primarily used to store email-related items such as messages, calendar items, tasks, and notes. But that's changing as more cloud-based apps also store their data in a user's mailbox. One advantage of storing data in a mailbox is that you can use the search tools in content search, Microsoft Purview eDiscovery (Standard), and Microsoft Purview eDiscovery (Premium) to find, view, and export the data from these cloud-based apps.
-The following table lists the apps that either stores or associates data with a cloud-based mailbox. The table also describes the type of content that each app produces.
-
-<br>
+The data from some of these apps is stored in hidden folders located in a non-interpersonal message (non-IPM) subtree in the mailbox. Data from other cloud-based apps might not be stored _in_ the mailbox, but it's _associated with_ the mailbox, and is returned in searches (if that data matches the search query). Regardless of whether cloud-based data is stored in or associated with a user mailbox, the data is typically not visible in an email client when a user opens their mailbox.
-****
+The following table lists the apps that either stores or associates data with a cloud-based mailbox. The table also describes the type of content that each app produces.
|Microsoft 365 app|Description|
-|||
+|:-|:-|
|Forms<sup>*</sup>|Forms and responses to a form are stored in files that are attached to email messages and stored in a hidden folder in the mailbox of the user who created the form. Forms created before April 2020 are stored as a PDF file. Forms created after 2020 are stored as a JSON file. Responses to a form are stored in a CSV file. When you export content from Forms in a PST file, this data is located in the **ApplicationDataRoot** folder in a subfolder named with the following globally unique identified (GUID): **c9a559d2-7aab-4f13-a6ed-e7e9c52aec87**.| |Microsoft 365 Groups|Email messages, calendar items, contacts (People), notes, and tasks are stored in the mailbox that's associated with a Microsoft 365 group.| |Outlook/Exchange Online|Email messages, calendar items, contacts (People), notes, and tasks are stored in a user's mailbox.|
enterprise Microsoft 365 Ediscovery Throttling Service Advisory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/microsoft-365-ediscovery-throttling-service-advisory.md
+
+ Title: "Service advisories for eDiscovery throttling in Exchange Online monitoring"
+++ Last updated :
+audience: Admin
++
+ms.localizationpriority: medium
+search.appverid:
+- MET150
+
+- scotvorg
+- Ent_O365
+- Strat_O365_Enterprise
+
+- admindeeplinkMAC
+- admindeeplinkEXCHANGE
+f1.keywords:
+- NOCSH
+description: "Learn about service advisories for eDiscovery throttling in Exchange Online monitoring."
++
+# Service advisories for eDiscovery throttling in Exchange Online monitoring
+
+We've released a new Exchange Online service advisory that informs you of eDiscovery being throttled. These service advisories provide visibility into the instances when the user is unable to submit Search and Export because of throttling.
+
+These service advisories are displayed in the Microsoft 365 admin center. To view these service advisories, go to **Health** | **[Service health](https://go.microsoft.com/fwlink/p/?linkid=842900)** | **Exchange Online**. Here's an example of eDiscovery service advisory.
+
+![eDiscovery service health screenshot](../media/ediscovery-service-health.jpg)
+
+## What does this service advisory indicate?
+
+The service advisories for eDiscovery throttling inform admins about their tenant being throttled due to number of Search and Export jobs exceeding the limit set by Microsoft. Various limits are applied to eDiscovery search tools in the [Microsoft Purview](/compliance/index.yml) compliance portal. This includes searches run on the [Content Search](/compliance/search-for-content) page and searches that are associated with an eDiscovery case on the [eDiscovery (Standard)](/compliance/get-started-core-ediscovery) page. These limits help to maintain the health and quality of services provided to organizations. These advisories provide awareness so that you can take these limits into consideration when planning, running, and troubleshooting eDiscovery searches and exports.
+
+For limits related to the Microsoft Purview eDiscovery (Standard) tool, see [Limits for Content search and eDiscovery (Standard) in the compliance center](/compliance/limits-for-content-search?viewFallbackFrom=o365-worldwide%20for%20service%20limits).
+
+### How often will I see these service advisories?
+
+You can expect to see this type of advisory until the time where the Search and Export jobs are within the defined limit.
+
+## More information
+
+- For information about troubleshooting and resolving eDiscovery compliance issues, see [Microsoft Purview troubleshooting](/troubleshoot/microsoft-365-compliance-welcome).
+- For information about Microsoft Purview, see [What is Microsoft Purview?](/purview/purview)
+- To learn more about Microsoft Purview eDiscovery solutions, see [Microsoft Purview eDiscovery solutions](/compliance/ediscovery)
lighthouse M365 Lighthouse Deploy Standard Tenant Configurations Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-deploy-standard-tenant-configurations-overview.md
Lighthouse baseline configurations are designed to make sure all managed tenants
| Require MFA for admins | A Conditional Access policy requiring multi-factor authentication for all admins. It's required for all cloud applications. For more information about this baseline, see [Conditional Access: Require MFA for all administrators](/azure/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa).| | Require MFA for end users | A Conditional Access policy that requires multi-factor authentication for all users. It's required for all cloud applications. For more information about this baseline, see [Conditional Access: Require MFA for all users](/azure/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa). | | Block legacy authentication | A Conditional Access policy to block legacy client authentication. For more information about this baseline, see [Block legacy authentication to Azure AD with Conditional Access](/azure/active-directory/conditional-access/block-legacy-authentication).|
-| Set up device enrollment | Device enrollment to allow your tenant devices to enroll in Microsoft Endpoint Manager. This is done by setting up Auto Enrollment between Azure Active Directory and Microsoft Endpoint Manager. For more information about this baseline, see [Set up enrollment for Windows devices](/mem/intune/enrollment/windows-enroll). |
+| Set up device enrollment | Device enrollment allows your tenant devices to enroll in Microsoft Endpoint Manager and provide Endpoint Analytics visibility into your devices through device health monitoring. This configuration is done by setting up Auto Enrollment between Azure Active Directory and Microsoft Endpoint Manager. For more information about this baseline, see [Set up enrollment for Windows devices](/mem/intune/enrollment/windows-enroll). |
+| Configure app protection policy | A set of protection policies that allow you to manage and protect a managed tenant's organization's data within an application, independent of any mobile device management (MDM) solution. The organization's data will be protected with or without enrolling devices in an MDM solution. |
| Set up Microsoft Defender for Business | Provisions the tenant for Microsoft Defender for Business and onboards the devices already enrolled in Microsoft Endpoint Manager to Microsoft Defender for Business. For more information, see [What is Microsoft Defender for Business?](../security/defender-business/mdb-overview.md) | | Set up Exchange Online Protection and Microsoft Defender for Office 365 | A policy to apply recommended anti-spam, anti-malware, anti-phishing, safe links and safe attachment policies to your tenants Exchange Online mailboxes. | | Configure Microsoft Defender Antivirus for Windows 10 and later | A device configuration profile for Windows devices with pre-configured Microsoft Defender Antivirus settings. For more information about this baseline, see [Configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure).|
security Get Defender Business Servers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/get-defender-business-servers.md
f1.keywords: NOCSH
# How to get Microsoft Defender for Business servers (preview)
+> [!IMPORTANT]
+> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as Microsoft Defender for Business servers (preview). Alternately, you could use [Microsoft Defender for Servers](/azure/defender-for-cloud/defender-for-servers-introduction); however, your Defender for Business experience could change when you add an enterprise plan, such as Defender for Servers Plan 1 or Plan 2. To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions?](mdb-faq.yml#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions) and [Onboard devices to Microsoft Defender for Business](mdb-onboard-devices.md).
+ Microsoft Defender for Business servers (preview) enables you to onboard a device running Windows Server or Linux Server to Defender for Business or Microsoft 365 Business Premium. When the Microsoft Defender for Business servers license becomes generally available, you'll need one license for each server instance.
-Here's how to get Microsoft Defender for Business servers (preview):
+**Here's how to get Microsoft Defender for Business servers (preview)**:
1. Go to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
security Mdb Onboard Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-onboard-devices.md
ms.localizationpriority: medium Previously updated : 09/14/2022 Last updated : 10/24/2022 f1.keywords: NOCSH
To view the list of devices that are onboarded to Defender for Business, go to t
## Servers
-> [!NOTE]
-> **The ability to onboard a server is currently in preview**.
+> [!IMPORTANT]
+> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as Microsoft Defender for Business servers (preview). Alternately, you could use [Microsoft Defender for Servers](/azure/defender-for-cloud/defender-for-servers-introduction); however, your Defender for Business experience could change when you add an enterprise plan, such as Defender for Servers Plan 1 or Plan 2. To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions?](mdb-faq.yml#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions).
Choose the operating system for your server:
security Mdb Requirements https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-requirements.md
ms.localizationpriority: medium Previously updated : 09/14/2022 Last updated : 10/24/2022 f1.keywords: NOCSH
The following table lists the basic requirements you need to configure and use D
| Permissions | To sign up for Defender for Business, you must be a Global Admin.<br/><br/>To access the Microsoft 365 Defender portal, users must have one of the following [roles in Azure AD](mdb-roles-permissions.md) assigned:<ul><li>Security Reader</li><li>Security Admin</li><li>Global Admin</li></ul>To learn more, see [Roles and permissions in Defender for Business](mdb-roles-permissions.md). | | Browser requirements | Microsoft Edge or Google Chrome | | Client device operating system | To manage devices in the Microsoft 365 Defender portal, your devices must be running one of the following operating systems: <ul><li>Windows 10 or 11 Business</li><li>Windows 10 or 11 Professional</li><li>Windows 10 or 11 Enterprise</li><li>Mac (the three most-current releases are supported)</li></ul>Make sure that [KB5006738](https://support.microsoft.com/topic/october-26-2021-kb5006738-os-builds-19041-1320-19042-1320-and-19043-1320-preview-ccbce6bf-ae00-4e66-9789-ce8e7ea35541) is installed on the Windows devices. <br/><br/>If you're already managing devices in Microsoft Intune, you can continue to use the Microsoft Endpoint Manager admin center.<sup>[[1](#fn1)]</sup> In that case, the following other operating systems are supported: <ul><li>iOS and iPadOS</li><li>Android OS</li></ul> |
-| Server requirements | If you're planning to onboard an instance of Windows Server or Linux Server, you must meet the following requirements: <ul><li>The **Preview features** setting is turned on. In the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Preview features**.</li><li>Enforcement scope for Windows Server is turned on. In the Microsoft 365 Defender portal, go to **Settings** > **Endpoints** > **Configuration management** > **Enforcement scope**. Select **Use MDE to enforce security configuration settings from MEM**, select **Windows Server**, and then select **Save**.</li><li>Linux Server endpoints meet the [prerequisites for Microsoft Defender for Endpoint on Linux](../defender-endpoint/microsoft-defender-endpoint-linux.md#prerequisites).</li></ul> |
+| Server requirements | If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers (preview)](get-defender-business-servers.md)<sup>[[2](#fn2)]</sup>. You must meet the following requirements: <ul><li>The **Preview features** setting is turned on. In the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Preview features**.</li><li>Enforcement scope for Windows Server is turned on. In the Microsoft 365 Defender portal, go to **Settings** > **Endpoints** > **Configuration management** > **Enforcement scope**. Select **Use MDE to enforce security configuration settings from MEM**, select **Windows Server**, and then select **Save**.</li><li>Linux Server endpoints meet the [prerequisites for Microsoft Defender for Endpoint on Linux](../defender-endpoint/microsoft-defender-endpoint-linux.md#prerequisites).</li></ul> |
(<a id="fn1">1</a>) Microsoft Intune is not included in the standalone version of Defender for Business. Intune can be added onto Defender for Business. Intune is included in Microsoft 365 Business Premium.
+(<a id="fn2">2</a>) To onboard servers, we recommend using [Microsoft Defender for Business servers (preview)](get-defender-business-servers.md). Alternately, you could use [Microsoft Defender for Servers](/azure/defender-for-cloud/defender-for-servers-introduction); however, your Defender for Business experience could change when you add an enterprise plan, such as Defender for Servers Plan 1 or Plan 2. To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions?](mdb-faq.yml#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions) and [Onboard devices to Microsoft Defender for Business](mdb-onboard-devices.md).
+ > [!NOTE] > [Azure Active Directory (Azure AD)](/azure/active-directory/fundamentals/active-directory-whatis) is used to manage user permissions and device groups. Azure AD is included in your Defender for Business subscription. > - If you don't have a Microsoft 365 subscription before you start your trial, Azure AD will be provisioned for you during the activation process.
security TOC https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/TOC.md
#### [Use Configuration Manager](manage-mde-post-migration-configuration-manager.md) #### [Use Group Policy](manage-mde-post-migration-group-policy-objects.md) #### [Use PowerShell, WMI, or MPCmdRun.exe](manage-mde-post-migration-other-tools.md)
+#### [Updating MMA on Windows devices](update-agent-mma-windows.md)
#### [Server migration scenarios](server-migration.md) ##### [Migrating servers from Microsoft Monitoring Agent to the unified solution](application-deployment-via-mecm.md)
security Enable Cloud Protection Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus.md
ms.localizationpriority: medium
Previously updated : 02/03/2022 Last updated : 10/24/2022
For more information about allowed parameters, see [Windows Defender WMIv2 APIs]
1. Open the Windows Security app by selecting the shield icon in the task bar, or by searching the start menu for **Windows Security**.
-2. Select the **Virus & threat protection** tile (or the shield icon on the left menu bar), and then, under **Manage settings** select **Virus & threat protection settings**.
+2. Select the **Virus & threat protection** tile (or the shield icon on the left menu bar), and then, under **Virus & threat protection settings**, select **Manage settings**.
:::image type="content" source="../../media/wdav-protection-settings-wdsc.png" alt-text="The Virus & threat protection settings" lightbox="../../media/wdav-protection-settings-wdsc.png":::
security Mac Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-whatsnew.md
For more information on Microsoft Defender for Endpoint on other operating syste
- [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md) - [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md)</br>
+<details>
+ <summary>Oct-2022 (Build: 101.86.81 | Release version: 20.122082.18681.0)</summary>
+
+&ensp;Build: **101.86.81**<br/>
+&ensp;Release version: **20.122082.18681.0**<br/>
+&ensp;Engine version: **1.1.19700.3**<br/>
+&ensp;Signature version: **1.377.636.0**<br/>
+
+**What's new**
+
+- Bug fix: Upgrade fails if \_mdatp user a member of \_lpadmin group
+
+<br/>
+</details>
+ <details> <summary>Oct-2022 (Build: 101.82.21 | Release version: 20.122082.18221.0)</summary>
security Switch To Mde Phase 1 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/switch-to-mde-phase-1.md
Need help updating your organization's devices? See the following resources:
|OS|Resource| |||
-|Windows|[Microsoft Update](https://www.update.microsoft.com)|
+|Windows|[Microsoft Update](/windows/deployment/update/how-windows-update-works)|
|macOS|[How to update the software on your Mac](https://support.apple.com/HT201541)| |iOS|[Update your iPhone, iPad, or iPod touch](https://support.apple.com/HT204204)| |Android|[Check & update your Android version](https://support.google.com/android/answer/7680439)|
security Update Agent Mma Windows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/update-agent-mma-windows.md
+
+ Title: Update your agent on devices for Microsoft Defender for Endpoint
+description: Learn about your options for updating or replacing your MMA agent on Windows devices for Defender for Endpoint.
+keywords: MMA, agent, azure log
++
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
++
+ms.localizationpriority: medium
Last updated : 10/24/2022+
+audience: ITPro
+
+- m365-security
+- tier2
++
+search.appverid: met150
++
+# Updating MMA on Windows devices for Microsoft Defender for Endpoint
+
+**Applies to:**
+- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)
+- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)
+- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
+
+If you're using the Microsoft Monitoring Agent (MMA) on Windows devices, you should keep this agent updated. With the modern, unified agent for Windows Server 2012 R2 and Windows Server 2016, you should migrate to the new solution instead.
+
+- [Update the Microsoft Monitoring Agent (MMA) on your devices](#option-1-update-mma-on-your-devices)
+- [Use a new agent on Windows Server 2012 R2 or Windows Server 2016](#option-2-use-a-new-agent-on-windows-server-2012-r2-or-windows-server-2016)
+
+This article describes both options and includes links to additional information.
+
+## Option 1: Update MMA on your devices
+
+*This option applies to devices running Windows 7 SP1 Enterprise, Windows 7 SP1 Pro, Windows 8.1 Pro, Windows 8.1 Enterprise, and Windows Server 2008 R2 SP1.*
+
+- See [Manage and maintain the Log Analytics agent for Windows and Linux](/azure/azure-monitor/agents/agent-manage?tabs=PowerShellLinux) for instructions on how to upgrade the agent using Azure Automation or a command line approach for use with various deployment tools and methods at your disposal.
+
+- Update MMA by using [Microsoft Update](/windows/deployment/update/how-windows-update-works), through [Windows Server Update Services](/windows/deployment/update/waas-manage-updates-wsus) or [Configuration Manager](/mem/configmgr/osd/deploy-use/manage-windows-as-a-service). Use the method that was configured when MMA was first installed on the device.
+
+- Download the MMA setup file:
+
+ - **Windows 64-bit agent**: [https://go.microsoft.com/fwlink/?LinkId=828603](https://go.microsoft.com/fwlink/?LinkId=828603)
+ - **Windows 32-bit agent**: [https://go.microsoft.com/fwlink/?LinkId=828604](https://go.microsoft.com/fwlink/?LinkId=828604)
+
+## Option 2: Use a new agent on Windows Server 2012 R2 or Windows Server 2016
+
+*This option applies to servers running Windows Server 2012 R2 and Windows Server 2016.*
+
+A new agent was released in April 2022 for Windows Server 2012 R2 and Windows Server 2016. The new agent doesn't depend on MMA. There are significant benefits to moving to this new agent, such as a vastly extended feature set. To learn more, see [Tech Community Blog: Defending Windows Server 2012 R2 and 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/ba-p/2783292).
+
+- Microsoft Defender Vulnerability Management provides an assessment (SCID-2030) titled "Update Microsoft Defender for Endpoint core components" that will allow you to track which Windows Server 2012 R2 and 2016 machines haven't yet been upgraded.
+
+- See [Server migration scenarios from the previous, MMA-based Microsoft Defender for Endpoint solution](server-migration.md) to understand your options for upgrading to the new agent.
+
+- If you're using Microsoft Endpoint Configuration Manager (SCCM/ConfigMgr) 2107 or later to manage your servers running Windows Server 2012 R2 or Windows Server 2016, see [Migrating servers from Microsoft Monitoring Agent to the unified solution](application-deployment-via-mecm.md) to perform an **orchestrated** upgrade.
+
+- If you're using Microsoft Endpoint Configuration Manager (SCCM/ConfigMgr) 2207 or later to manage your servers running Windows Server 2012 R2 or Windows Server 2016, see [Onboarding to Microsoft Defender for Endpoint with Configuration Manager 2207 and later versions](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection) to perform an **automated** upgrade.
+
+- If you're using Microsoft Defender for Cloud with servers running Windows Server 2012 R2 or Windows Server 2016, you can automate the upgrade by selecting **Enable unified solution**. See [Users with Defender for Servers enabled and Microsoft Defender for Endpoint deployed](/azure/defender-for-cloud/integration-defender-for-endpoint?tabs=windows).
+
+## Important information about MMA
+
+- If you've determined that you aren't using the MMA for Defender for Endpoint, or you've already updated your agent, no other steps are needed.
+
+- If you are, however, still using MMA for other purposes (such as Log Analytics), MMA is currently set to retire in August 2024. See [We're retiring the Log Analytics agent in Azure Monitor on 31 August 2024](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/). Depending your particular scenario, this could be a good time to upgrade to [Azure Monitoring Agent, the successor of MMA](/azure/azure-monitor/agents/azure-monitor-agent-migration).
+
+> [!IMPORTANT]
+> Devices running Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2, or Windows Server 2016 that haven't been upgraded to the [new, unified solution](application-deployment-via-mecm.md) will remain dependent on MMA. In such cases, [AMA](/azure/azure-monitor/agents/agents-overview) cannot be used as a substitute for Defender for Endpoint.
security Web Content Filtering https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-content-filtering.md
ms.pagetype: security
ms.localizationpriority: medium Last updated : 10/24/2022 audience: ITPro
Policies can be deployed to block any of the following parent or child categorie
To add a new policy, follow these steps:
-1. In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>, choose **Settings** > **Web content filtering** > **+ Add policy**.
+1. In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>, choose **Settings** > **Endpoints** > **Web content filtering** > **+ Add policy**.
2. Specify a name.
security First Incident Analyze https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-analyze.md
Title: Step 1. Triage and analyze your first incident description: How to triage and begin the analysis of your first incident in Microsoft 365 Defender.
-keywords: incidents, alerts, investigate, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, incident response, cyber-attack
+keywords: incidents, alerts, attack story, investigate, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, incident response, cyber-attack
search.product: eADQiWindows 10XVcnh
There are multiple ways to read and analyze data using Microsoft 365 Defender bu
Here's an example:
-1. Once triage priority has been determined, an analyst begins an in-depth analysis by selecting the incident name. This page brings up the **Incident Summary** where data is displayed in tabs to assist with the analysis. Under the **Alerts** tab, the types of alerts are displayed. Analysts can click on each alert to drill down into the respective detection source.
+1. Once triage priority has been determined, an analyst begins an in-depth analysis by selecting the incident name. This page brings up the **Attack story** where data is displayed in tabs to assist with the analysis. Under the **Alerts story** tab, the types of alerts are displayed. Analysts can click on each alert to drill down into the respective detection source.
- :::image type="content" source="../../media/first-incident-analyze/first-incident-analyze-summary-tab.png" alt-text="The Summary tab of an incident" lightbox="../../media/first-incident-analyze/first-incident-analyze-summary-tab.png":::
+ :::image type="content" source="../../media/first-incident-analyze/first-incident-analyze-summary-tab.png" alt-text="Screenshot that shows the attack story of an incident." lightbox="../../media/first-incident-analyze/first-incident-analyze-summary-tab.png":::
For a quick guide about which domain each detection source covers, review the [Detect](#detection-by-microsoft-365-defender) section of this article.
security First Incident Remediate https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-remediate.md
Title: Step 2. Remediate your first incident description: How to get started in remediating your first incident in Microsoft 365 Defender.
-keywords: incidents, alerts, investigate, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, incident response, cyber-attack
+keywords: incidents, alerts, attack story, investigate, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, incident response, cyber-attack
search.product: eADQiWindows 10XVcnh
Microsoft 365 Defender offers several remediation actions that analysts can manu
- **Collect investigation package** - As part of the investigation or response process, you can collect an investigation package from a device. By collecting the investigation package, you can identify the current state of the device and further understand the tools and techniques used by the attacker. - **Ask Defender Experts** (available in both Actions on devices and files) - You can consult a Microsoft Defender expert for more insights regarding potentially compromised devices or devices that are already compromised. Microsoft Defender experts can be engaged directly from within Microsoft 365 Defender for a timely and accurate response.
+> [!NOTE]
+> You can take actions on devices straight from the graph within the attack story.
+ ## Actions on files - **Stop and quarantine file** - This action includes stopping running processes, quarantining files, and deleting persistent data, such as any registry keys. This action takes effect on devices with Windows 11 or Windows 10, version 1703 or later, where the file was observed in the last 30 days.
security Incidents Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incidents-overview.md
Title: Incident response with Microsoft 365 Defender description: Investigate incidents seen across devices, users, and mailboxes in the Microsoft 365 Defender portal.
-keywords: incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, incident response, cyber-attack
+keywords: incidents, alerts, attack story, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, incident response, cyber-attack
search.product: eADQiWindows 10XVcnh
Because piecing the individual alerts together to gain insight into an attack ca
:::image type="content" source="../../media/incidents-overview/incidents.png" alt-text="How Microsoft 365 Defender correlates events from entities into an incident." lightbox="../../media/incidents-overview/incidents.png":::
-Watch this short overview of incidents in Microsoft 365 Defender (4 minutes).
-
-<br>
-
->[!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Bzwz?]
- Grouping related alerts into an incident gives you a comprehensive view of an attack. For example, you can see: - Where the attack started.
If [enabled](m365d-enable.md), Microsoft 365 Defender can [automatically investi
## Incidents and alerts in the Microsoft 365 Defender portal
-You manage incidents from **Incidents & alerts > Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>. Here's an example.
+You manage incidents from **Incidents & alerts > Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target=" blank">Microsoft 365 Defender portal</a>. Here's an example.
:::image type="content" source="../../media/incidents-queue/incidents-ss-incidents.png" alt-text="The Incidents page in the Microsoft 365 Defender portal." lightbox="../../media/incidents-queue/incidents-ss-incidents.png":::
-Selecting an incident name displays a summary of the incident and provides access to tabs with additional information. Here's an example.
+Selecting an incident name displays the entire attack story of the incident, including:
+
+- Alert page within incident: The scope of alerts related to the incident and their information on the same tab.
+- Graph: A visual representation of the attack that connects the different suspicious entities that are part of the attack with their related assets such as users, devices, and mailboxes.
+You can view the entity details directly from the graph and act on them with response options like file delete or device isolation.
+ The additional tabs for an incident are:
The additional tabs for an incident are:
All the supported events and suspicious entities in the alerts of the incident. -- Graph (Preview)-
- A visual representation of the attack that connects the different suspicious entities that are part of the attack with their related assets such as users, devices, and mailboxes.
-
-Here's the relationship between an incident and its data and the tabs of an incident in the Microsoft 365 Defender portal.
+- Summary
+ A quick overview of the impacted assets associated with alerts.
> [!NOTE] > If you see an *Unsupported alert type* alert status, it means that automated investigation capabilities cannot pick up that alert to run an automated investigation. However, you can [investigate these alerts manually](investigate-incidents.md#alerts).
Consider these steps for your own incident response workflow:
1. For each incident, begin an [attack and alert investigation and analysis](investigate-incidents.md):
- 1. View the summary of the incident to understand its scope and severity and what entities are affected with the **Summary** and **Graph** (Preview) tabs.
+ 1. View the attack story of the incident to understand its scope, severity, detection source, and what entities are affected.
- 1. Begin analyzing the alerts to understand their origin, scope, and severity with the **Alerts** tab.
+ 1. Begin analyzing the alerts to understand their origin, scope, and severity with the alert story within the incident.
- 1. As needed, gather information on impacted devices, users, and mailboxes with the **Devices**, **Users**, and **Mailboxes** tabs.
+ 1. As needed, gather information on impacted devices, users, and mailboxes with the graph. Right click on any entity to open a flyout with all the details.
1. See how Microsoft 365 Defender has [automatically resolved some alerts](m365d-autoir.md) with the **Investigations** tab.
security Investigate Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-alerts.md
You'll need to have any of the following roles to access Microsoft Defender for
To see the main alert page, select the name of the alert. Here's an example. You can also select the **Open the main alert page** action from the **Manage alert** pane.
Microsoft 365 Defender alerts may come from solutions like Microsoft Defender fo
| App Governance | `ma` | | Microsoft Data Loss Prevention | `dl` |
-By default, only the most relevant alerts for the security operation center are enabled. If you want to get all AAD IP risk detections, you can change it in Microsoft 365 Defender setting page under **Alert service setting** section.
+By default, only the most relevant alerts for the security operation center are enabled. If you want to get all AAD IP risk detections, you can change it in Microsoft 365 Defender setting page under **Alert service setting** section.
+ > [!IMPORTANT] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
Once you've selected an entity of interest, the details page changes to display
To manage an alert, select **Manage alert** in the summary details section of the alert page. For a single alert, here's an example of the **Manage alert** pane. The **Manage alert** pane allows you to view or specify:
The **Manage alert** pane allows you to view or specify:
To manage a *set of alerts similar to a specific alert*, select **View similar alerts** in the **INSIGHT** box in the summary details section of the alert page. From the **Manage alerts** pane, you can then classify all of the related alerts at the same time. Here's an example. If similar alerts were already classified in the past, you can save time by using Microsoft 365 Defender recommendations to learn how the other alerts were resolved. From the summary details section, select **Recommendations**. The **Recommendations** tab provides next-step actions and advice for investigation, remediation, and prevention. Here's an example. ## Suppress an alert
security Investigate Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-incidents.md
Title: Investigate incidents in Microsoft 365 Defender description: Investigate incidents related to devices, users, and mailboxes.
-keywords: incident, incidents, analyze, response, machines, devices, users, identities, mail, email, mailbox, investigation, graph, evidence
+keywords: incident, incidents, attack story, analyze, response, machines, devices, users, identities, mail, email, mailbox, investigation, graph, evidence
ms.mktglfcycl: deploy
Within an incident, you analyze the alerts that affect your network, understand
## Initial investigation
-Before diving into the details, take a look at the properties and summary of the incident.
+Before diving into the details, take a look at the properties and the entire attack story of the incident.
You can start by selecting the incident from the check mark column. Here's an example.
When you do, a summary pane opens with key information about the incident, such
:::image type="content" source="../../media/investigate-incidents/incidents-ss-incident-side-panel.png" alt-text="The pane that displays the summary details for an incident in the Microsoft 365 Defender portal." lightbox="../../media/investigate-incidents/incidents-ss-incident-side-panel.png":::
-From here, you can select **Open incident page**. This opens the main page for the incident where you'll find more summary information and tabs for alerts, devices, users, investigations, and evidence.
+From here, you can select **Open incident page**. This opens the main page for the incident where you'll find the full attack story information and tabs for alerts, devices, users, investigations, and evidence.
You can also open the main page for an incident by selecting the incident name from the incident queue.
+## Attack story
+
+Attack stories help you to quickly review, investigate, and remediate attacks while viewing the full story of the attack on the same tab. It also allows you to review the entity details and take remediation actions, such as deleting a file or isolating a device without losing context.
++
+Within the attack story you can find the alert page and the incident graph.
+
+The incident alert page has these sections:
+
+- Alert story, which includes:
+
+ - What happened
+
+ - Actions taken
+
+ - Related events
+
+- Alert properties in the right pane (state, details, description, and others)
+
+Note that not every alert will have all of the listed subsections in the **Alert story** section.
+
+The graph shows the full scope of the attack, how the attack spread through your network over time, where it started, and how far the attacker went. It connects the different suspicious entities that are part of the attack with their related assets such as users, devices, and mailboxes.
+
+From the graph, you can:
+
+- Play the alerts and the nodes on the graph as they occurred over time to understand the chronology of the attack.
+
+ :::image type="content" source="../../media/investigate-incidents/play-alert-attack-story.gif" alt-text="Screenshot that shows playing of the alerts and nodes on the attack story graph page.":::
+
+- Open an entity pane, allowing you to review the entity details and act on remediation actions, such as deleting a file or isolating a device.
+
+ :::image type="content" source="../../media/investigate-incidents/review-entity-details-attack-story.gif" alt-text="Screenshot that shows the review of the entity details on the attack story graph page.":::
+
+- Highlight the alerts based on the entity to which they are related.
+
+Use the **Summary** page to assess the relative importance of the incident and quickly access the associated alerts and impacted entities.
+ ## Summary The **Summary** page gives you a snapshot glance at the top things to notice about the incident. Information is organized in these sections.
Information is organized in these sections.
| Incident information | Displays the properties of the incident, such as tags, status, and severity. | |||
-Use the **Summary** page to assess the relative importance of the incident and quickly access the associated alerts and impacted entities.
- ## Alerts On the **Alerts** tab, you can view the alert queue for alerts related to the incident and other information about them such as:
Here's an example.
:::image type="content" source="../../media/investigate-incidents/incident-alert-example.png" alt-text="The details of an alert within an incident in the Microsoft 365 Defender portal." lightbox="../../media/investigate-incidents/incident-alert-example.png":::
-The incident alert page has these sections:
--- Alert story, which includes:-
- - What happened
-
- - Actions taken
-
- - Related events
--- Alert properties in the right pane (state, details, description, and others)-
-Not every alert will have all of the listed subsections in the **Alert story** section.
- Learn how to use the alert queue and alert pages in [investigate alerts](investigate-alerts.md). ## Devices
You can select the check mark for a user to see details of the user account thre
Learn how to view additional user information and manage the users of an incident in [investigate users](investigate-users.md). - ## Mailboxes The **Mailboxes** tab lists all the mailboxes that have been identified to be part of or related to the incident. Here's an example.
Microsoft 365 Defender automatically investigates all the incidents' supported e
Each of the analyzed entities is marked with a verdict (Malicious, Suspicious, Clean) and a remediation status. This helps you understand the remediation status of the entire incident and what next steps can be taken.
-## Graph (Preview)
-
-The **Graph** tab shows the full scope of the attack, how the attack spread through your network over time, where it started, and how far the attacker went. It connects the different suspicious entities that are part of the attack with their related assets such as users, devices, and mailboxes.
-
-From the **Graph** tab, you can:
-
-1. Play the alerts and the nodes on the graph as they occurred over time to understand the chronology of the attack.
--
- :::image type="content" source="../../media/investigate-incidents/incident-graph-play.gif" alt-text="The playing of the alerts and nodes on the Graph page":::
-
-
-2. Open an entity pane, allowing you to review the entity details and act on remediation actions, such as deleting a file or isolating a device.
-
- :::image type="content" source="../../media/investigate-incidents/incident-graph-entity-pane.png" alt-text="The entity pane on the Graph page in the Microsoft 365 Defender portal" lightbox="../../media/investigate-incidents/incident-graph-entity-pane.png":::
-
-3. Highlight the alerts based on the entity to which they are related.
-
- :::image type="content" source="../../media/investigate-incidents/incident-graph-alert.png" alt-text="An alert highlight on the Graph page" lightbox="../../media/investigate-incidents/incident-graph-alert.png":::
- ## Next steps As needed:
security Manage Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/manage-incidents.md
Title: Manage incidents in Microsoft 365 Defender description: Learn how to assign, update the status,
-keywords: incident, incidents, analyze, response, alerts, correlated alerts, assign, update, status, manage, classification, microsoft, 365, m365
+keywords: incident, incidents, attack story, analyze, response, alerts, correlated alerts, assign, update, status, manage, classification, microsoft, 365, m365
ms.mktglfcycl: deploy
You can manage incidents from the **Manage incident** pane for an incident. Here
You can display this pane from the **Manage incident** link on the:
+- **Alert story** page.
- Properties pane of an incident in the incident queue. - **Summary** page of an incident.
From the **Classification** field, you specify whether the incident is:
Classifying incidents and specifying their status and type helps tune Microsoft 365 Defender to provide better detection determination over time.
-Watch this short video to learn how to use classification to increase triage efficiency.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4LHJq]
- ## Add comments You can add multiple comments to an incident with the **Comment** field. Each comment gets added to the historical events of the incident. You can see the comments and history of an incident from the **Comments and history** link on the **Summary** page.
security Configure Mdo Anti Phishing Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/configure-mdo-anti-phishing-policies.md
Creating a custom anti-phishing policy in the Microsoft 365 Defender portal crea
> [!NOTE] >
- > - In each anti-phishing policy, you can specify a maximum of 350 protected users (sender email addresses). You can't specify the same protected user in multiple policies.
+ > - In each anti-phishing policy, you can specify a maximum of 301 protected users (sender email addresses). You can't specify the same protected user in multiple policies.
> - User impersonation protection does not work if the sender and recipient have previously communicated via email. If the sender and recipient have never communicated via email, the message will be identified as an impersonation attempt. - **Enable users to protect**: The default value is off (not selected). To turn it on, select the check box, and then click the **Manage (nn) sender(s)** link that appears.
security Preset Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/preset-security-policies.md
You might want to apply the **Standard** or **Strict** preset security policies
Each entry consists of a display name and an email address. Enter each value in the boxes and then click **Add**. Repeat this step as many times as necessary.
- You can specify a maximum of 350 users, and you can't specify the same user in the user impersonation protection settings in multiple policies.
+ You can specify a maximum of 301 users, and you can't specify the same user in the user impersonation protection settings in multiple policies.
To remove an existing entry from the list, click ![Remove user from impersonation protection icon.](../../media/m365-cc-sc-remove.png).
security Set Up Anti Phishing Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/set-up-anti-phishing-policies.md
The following impersonation settings are only available in anti-phishing policie
> [!NOTE] >
- > - In each anti-phishing policy, you can specify a maximum of 350 protected users (sender email addresses). You can't specify the same protected user in multiple policies. So, regardless of how many policies apply to a recipient, the maximum number of protected users (sender email addresses) for each individual recipient is 350. For more information about policy priority and how policy processing stops after the first policy is applied, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
+ > - In each anti-phishing policy, you can specify a maximum of 301 protected users (sender email addresses). You can't specify the same protected user in multiple policies. So, regardless of how many policies apply to a recipient, the maximum number of protected users (sender email addresses) for each individual recipient is 301. For more information about policy priority and how policy processing stops after the first policy is applied, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
> - User impersonation protection does not work if the sender and recipient have previously communicated via email. If the sender and recipient have never communicated via email, the message will be identified as an impersonation attempt. By default, no sender email addresses are configured for impersonation protection in **Users to protect**. Therefore, by default, no sender email addresses are covered by impersonation protection, either in the default policy or in custom policies.
test-base Test With M365 App https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/test-base/test-with-m365-app.md
+
+ Title: 'Test your application with latest Microsoft 365 apps'
+description: How to Test your application with latest Microsoft 365 apps
+search.appverid: MET150
+++
+audience: Software-Vendor
+ Last updated : 10/21/2022+
+ms.localizationpriority: medium
+++
+f1.keywords: NOCSH
++
+# Test your application with latest Microsoft 365 apps
++
+This section provides instructions on how to test your application with latest Microsoft 365 apps.
+
+> [!IMPORTANT]
+> Currently only pre-release of Office 365 from the monthly preview channel is available.
++
+### Choose the Microsoft 365 application
+
+In the **Configure test** step when onboarding a new package, switch on the **Pre-install Microsoft apps** toggle button will enable user to choose pre-release version of Microsoft 365 apps with latest update to be installed for testing.
+
+ > [!div class="mx-imgBorder"]
+ > ![Screenshot shows Package config test](Media/testwithm365app01.png)
+ > [!NOTE]
+ > As the Office preview channel provides pre-release Office updates with monthly cadence, only **security update** type is enabled for the package once the toggle button is turned on. Windows OS versions that could be selected in the Test matrix also will be limited to the Windows products for which the chosen Office product are available. Due to the mentioned pre-requisite, if you would like to turn on the Office update testing feature for existing packages, un-supported update type and Windows OS products will be disabled by default.
+
+&nbsp;
+### Define the install sequence for the chosen Microsoft 365 application
+
+You can use **Functional test** to define the install sequence for the pre-release Office with the latest update. Click the **Open functional test panel** icon as below after creating your own script and adding to the Functional test list.
+
+ > [!div class="mx-imgBorder"]
+ > ![Screenshot shows Package edit package](Media/testwithm365app02.png)
+
+You will be able to reorder the scripts in the functional list panel by dragging the items up and down to the proper step. Choose which step to execute the Office installation by selecting the script before which you would like the pre-release Office installation to happen.
+
+In below example, Windows update will be installed first, followed by the pre-office-install script, then the Office pre-release will be installed before the install script for userΓÇÖs application after which the run-test script will be executed.
+
+ > [!div class="mx-imgBorder"]
+ > ![Screenshot shows Functional test](Media/testwithm365app03.png)
+ > [!NOTE]
+ > For Out of box test type, Office install will be by default executed after the Windows update installation and before the install script gets executed.
+
+&nbsp;
+### View the test result with Microsoft 365 application
+
+A test run will be executed after the package passes the validation. On a monthly basis, an automated run will be scheduled on each patch Tuesday when the latest Windows security update gets released. The package will install the latest pre-release version of Office from the monthly preview channel as of the corresponding execution date to allow your application to be tested against both latest Windows and Office updates.
+
+You can view the results of the test runs under the Test summary page by clicking the link on the package name.
+
+ > [!div class="mx-imgBorder"]
+ > ![Screenshot shows Security update](Media/testwithm365app04.png)
+
+&nbsp;
+In the detailed page, you will see install-Office as an auto-executed script which represents the status of the pre-release Office installation.
+
+ > [!div class="mx-imgBorder"]
+ > ![Screenshot shows Reliability](Media/testwithm365app05.png)
+ > [!NOTE]
+ > For Out of box test type, a pre-defined Office interop test script will be executed to help collect conflict signals for pre-release Office running with userΓÇÖs installed application by default. You can use Functional test to define your own test flow and bypass the Office test script if you would like to focus on testing how your application works with latest Office updates.