Updates from: 10/04/2022 01:25:11
Category Microsoft Docs article Related commit history on GitHub Change details
threat-intelligence Reputation Scoring https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/reputation-scoring.md
# Reputation scoring
-Microsoft Defender Threat Intelligence (Defender TI) provides proprietary reputation scores for any Host, Domain, or IP Address. Whether validating the reputation of a known or unknown entity, this score helps users quickly understand any detected ties to malicious or suspicious infrastructure. The platform provides quick information about the activity of these entities (e.g. First and Last Seen timestamps, ASN, country, associated infrastructure) and a list of rules that impact the reputation score when applicable.
+Microsoft Defender Threat Intelligence (Defender TI) provides proprietary reputation scores for any Host, Domain, or IP Address. Whether validating the reputation of a known or unknown entity, this score helps users quickly understand any detected ties to malicious or suspicious infrastructure. The platform provides quick information about the activity of these entities (e.g. First and Last Seen timestamps, ASN, associated infrastructure) and a list of rules that impact the reputation score when applicable.
Reputation data is important to understanding the trustworthiness of your own attack surface and is also useful when assessing unknown hosts, domains or IP addresses that appear in investigations. These scores will uncover any prior malicious or suspicious activity that impacted the entity, or other known indicators of compromise that should be considered.
See the example reputation scoring rules below:
||--| | SSL-Certificate Self-Signed | Self-signed certificates may indicate malicious behavior | | Tagged as Malicious | Tagged as malicious by a member within your organization |
-| Country | Infrastructure hosted in this country is more likely to be malicious |
| Web components observed | The number of web components observed may indicate maliciousness | | Name server | Domain is using a name server that is more likely to be used by malicious infrastructure | | Registrar | Domains registered with this registrar are more likely to be malicious |
Defender TIΓÇÖs reputation score, classification, rules, and description of rule
Any associated articles can be shared with the analystΓÇÖs cyber threat intelligence team, so they have a clearer understanding of who may be targeting their organization. ## Next steps
-For more information, see [Analyst insights](analyst-insights.md).
+For more information, see [Analyst insights](analyst-insights.md).
business-premium M365bp Trial Playbook Microsoft Business Premium https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-trial-playbook-microsoft-business-premium.md
Title: "Microsoft 365 Business Premium trial guide"
+ Title: "User trial guide: Microsoft 365 Business Premium"
f1.keywords: - NOCSH
- tier1 Previously updated : 09/15/2022 Last updated : 10/03/2022 ms.localizationpriority: high search.appverid: - MOE150
search.appverid:
description: "Make the most of your Microsoft 365 Business Premium trial. Try out some of the key productivity and security capabilities."
-# Trial guide: Microsoft 365 Business Premium
+# User trial guide: Microsoft 365 Business Premium
-Welcome to the Microsoft Business Premium trial guide! This guide will help you make the most of your 30-day free trial. You can see firsthand how Microsoft 365 Business Premium increases productivity and helps safeguard your organization with advanced security capabilities. Use this guide to set up your threat protection features, analyze detected threats, and respond to cyberattacks.
+Welcome to the Microsoft Business Premium user trial guide! This guide will help you make the most of your 30-day free trial. You can see firsthand how Microsoft 365 Business Premium increases productivity and helps safeguard your organization with advanced security capabilities. Use this guide to set up your threat protection features, analyze detected threats, and respond to cyberattacks.
## Set up the Microsoft 365 Business Premium trial When you [start a trial or purchase Microsoft 365 Business Premium](get-microsoft-365-business-premium.md), your first step is to get everything set up. > [!TIP]
-> Save this guide to your browser favorites. When links in the guide take you away from this location, it'll be easier to return to this guide to continue.
+> Save this user trial guide to your browser favorites. When links in the user trial guide take you away from this location, it'll be easier to return to this guide to continue.
1. [Set up your trial](../business-premium/m365bp-setup.md)!
compliance Acknowledge Hold Notification https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/acknowledge-hold-notification.md
When responding to a regulatory request or investigation, you may be required to
To help reduce the time, cost, and effort of following up with your custodians, eDiscovery (Premium) allows you to send and follow up on legal hold notifications through email. In addition to email notices, each custodian will have access to an individualized Compliance Portal, allowing custodians to be kept informed of changes to their obligation status. + ## Email notifications After a Legal Hold Notification has been issued, each custodian will receive a unique and personalized email containing your defined legal hold notice and added instructions.
compliance Add Custodians To Case https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/add-custodians-to-case.md
You can add and manage custodians in eDiscovery (Premium) cases in four steps:
4. Review the custodians and complete the process. + ## Make sure you have the necessary permissions To add custodians to a case, you must be a member of the eDiscovery Manager role group. This provides you with the necessary permissions to add custodians to a case and place a hold on the custodial data sources. For more information, see [Assign eDiscovery permissions](get-started-with-advanced-ediscovery.md#step-2-assign-ediscovery-permissions).
compliance Add Data To Review Set From Another Review Set https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/add-data-to-review-set-from-another-review-set.md
In some cases, it may be necessary to select documents from one review set and w
Follow the workflow in this article to add content from one review set to another. + ## Create a review set Before you start, you'll need to create a review set to add the data to. A new review set can be added on the **Review sets** tab of the case. For more information, see [Create a review set](managing-review-sets.md#create-a-review-set).
compliance Add Data To Review Set https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/add-data-to-review-set.md
You can add to an existing review set or create a new review set. If adding to
Adding data to a review set is a long-running process. This process includes gathering items from the original data sources in Microsoft 365 (for example, from mailboxes and sites), copying them to the Azure Storage location (this copying process is also called *ingestion*), and then reindexing the items. You can track the progress on the **Jobs** tab or on the **Searches** tab by monitoring the status in the **Added data to review set** column. After the review set processing is completed, click the **Review sets** tab in the case, and then click the review set to start the process of filtering, reviewing, tagging, and exporting data in the review set. + ## Define options to scope your collection for review When you add the content of a search to an existing or new review set, you have the following options for how to collect the content for review:
compliance Add Or Remove Members From A Case In Advanced Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/add-or-remove-members-from-a-case-in-advanced-ediscovery.md
You can add or remove members to manage who can access the case. However, before
> [!IMPORTANT] > If a role is added or removed from a role group that you've added as a member of a case, then the role group will be automatically removed as a member of the case (or any case the role group is a member of). The reason for this is to protect your organization from inadvertently providing additional permissions to members of a case. Similarly, if a role group is deleted, it will be removed from all cases it was a member of. For more information, see [Assign eDiscovery permissions](assign-ediscovery-permissions.md#adding-role-groups-as-members-of-ediscovery-cases). + ## Removing members from a case Only an [eDiscovery Administrator](assign-ediscovery-permissions.md) can remove members from a case. Even if you are assigned to the eDiscovery Manager role group or initially created the case, you won't be able to remove yourself or other members from a case unless you are also an eDiscovery Administrator. To remove yourself or other members from a case, contact an eDiscovery Administrator in your organization.
compliance Add Your Organization Brand To Encrypted Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/add-your-organization-brand-to-encrypted-messages.md
If you'd like more control, use Microsoft Purview Advanced Message Encryption to
Once you've created the templates, you can apply them to encrypted emails by using Exchange mail flow rules. If you have Microsoft Purview Advanced Message Encryption, you can revoke any email that you've branded by using these templates. + ## Work with OME branding templates You can modify several features within a branding template. You can modify, but not remove, the default template. If you have Advanced Message Encryption, you can also create, modify, and remove custom templates. Use Exchange Online PowerShell to work with one branding template at a time.
compliance Advanced Audit https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/advanced-audit.md
search.appverid:
# Microsoft Purview Audit (Premium)
-> [!TIP]
-> *Did you know you can try the premium versions of all nine Microsoft Purview solutions for free?* Use the 90-day Purview solutions trial to explore how robust Purview capabilities can help your organization meet its compliance needs. Microsoft 365 E3 and Office 365 E3 customers can start now at the [Microsoft Purview compliance portal trials hub](https://compliance.microsoft.com/trialHorizontalHub?sku=ComplianceE5&ref=DocsRef). Learn details about [who can sign up and trial terms](compliance-easy-trials.md).
- The [Audit functionality](search-the-audit-log-in-security-and-compliance.md) in Microsoft Purview provides organizations with visibility into many types of audited activities across many different services in Microsoft 365. Microsoft Purview Audit (Premium) helps organizations to conduct forensic and compliance investigations by increasing audit log retention required to conduct an investigation, providing access to crucial events (by using Audit log search in the Microsoft Purview compliance portal and the Office 365 Management Activity API) that help determine scope of compromise, and faster access to Office 365 Management Activity API. > [!NOTE]
The [Audit functionality](search-the-audit-log-in-security-and-compliance.md) in
This article provides an overview of Audit (Premium) capabilities and shows you how to set up users for Audit (Premium). + ## Long-term retention of audit logs Audit (Premium) retains all Exchange, SharePoint, and Azure Active Directory audit records for one year. This is accomplished by a default audit log retention policy that retains any audit record that contains the value of **Exchange**, **SharePoint**, or **AzureActiveDirectory** for the **Workload** property (which indicates the service in which the activity occurred) for one year. Retaining audit records for longer periods can help with on-going forensic or compliance investigations. For more information, see the "Default audit log retention policy" section in [Manage audit log retention policies](audit-log-retention-policies.md#default-audit-log-retention-policy).
compliance Advanced Ediscovery Cloud Attachments https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/advanced-ediscovery-cloud-attachments.md
Cloud attachments are links to documents that are typically stored in SharePoint
- Collecting the version of the document at the time it was shared in a cloud attachment. + ## Collecting cloud attachments When you create a draft collection and the search results contain items that include cloud attachments, you have to the option of collecting the target of the cloud attachment when you commit the draft collection to a review set. When you select this option, eDiscovery (Premium) adds the documents that are linked to in the cloud attachment to the review set. This allows you to review the target documents and determine if the document is relevant to your case or investigation.
compliance Advanced Ediscovery Communications Library https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/advanced-ediscovery-communications-library.md
When you or other users create a hold notification or other types of custodian c
This article explains how to create organization-wide communications templates and select them when creating a new custodian notification for a specific eDiscovery (Premium) case. + ## Before you create templates in the Communications library - You must be an eDiscovery Administrator in your organization to add or remove templates in the Communications library in eDiscovery (Premium). For more information, see [Assign eDiscovery permissions in the Microsoft Purview compliance portal](assign-ediscovery-permissions.md)
compliance Advanced Ediscovery Dashboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/advanced-ediscovery-dashboard.md
search.appverid:
For some cases in Microsoft Purview eDiscovery (Premium), you may have a large volume of documents and email messages that need to be reviewed. Before you start the review process, you may want to quickly analyze your corpus to identify trends or key statistics that will help you develop your review strategy. To do this, you can use the eDiscovery (Premium) dashboard for review sets to quickly analyze your corpus. + ## Step 1: Create a widget on the review set dashboard 1. In the Microsoft Purview compliance portal, go to **eDiscovery > eDiscovery (Premium)** to display the list of cases in your organization.
compliance Advanced Ediscovery Historical Versions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/advanced-ediscovery-historical-versions.md
To support the historical versions capability in eDiscovery (Premium), SharePoin
After an eDiscovery administrator turns on historical versions for the organization and then activates it for specific SharePoint sites, the SharePoint content push service crawls all major and minor versions of documents on the activated sites and then sends those versions for indexing. After the crawling and indexing process is complete, documents and their versions are available for eDiscovery search. As long as a specific version can be accessed (by version history), then that version will be discoverable in an eDiscovery (Premium) collection search. + ## Set up historical versions To enable historical versions in eDiscovery (Premium), your organization has to turn it on and then activate specific sites so that all versions of documents stored on those sites are indexed for search. Before you set up eDiscovery (Premium) for historical versions, you have to enable versioning support in SharePoint.
compliance Advanced Ediscovery Issuing Officers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/advanced-ediscovery-issuing-officers.md
When you or others create a hold notification or other type of communication tha
This article explains how to add and remove users to the list of organization-wide issuing officers. + ## Before you add an issuing officer - You must be an eDiscovery Administrator in your organization to add or remove issuing officers. For more information, see [Assign eDiscovery permissions in the Microsoft Purview compliance portal](assign-ediscovery-permissions.md)
compliance Advanced Ediscovery New Case Format https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/advanced-ediscovery-new-case-format.md
search.appverid:
More organizations are using the eDiscovery (Premium) solution in Microsoft Purview for critical eDiscovery processes. This includes responding to regulatory requests, investigations, and litigation. As usage of eDiscovery (Premium) increases, a common customer requirement is to expand the total amount of content that can be managed in a single eDiscovery (Premium) case. To help accommodate significant increases in case size, both for total data volume and the total number of items, you can now choose the new case format when you create an eDiscovery (Premium) case. + ## Create a case To create an eDiscovery (Premium) case using the new case format:
compliance Alert Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/alert-policies.md
Alert policies let you categorize the alerts that are triggered by a policy, app
> [!NOTE] > Alert policies are available for organizations with a Microsoft 365 Enterprise, Office 365 Enterprise, or Office 365 US Government E1/F1/G1, E3/F3/G3, or E5/G5 subscription. Advanced functionality is only available for organizations with an E5/G5 subscription, or for organizations that have an E1/F1/G1 or E3/F3/G3 subscription and a Microsoft Defender for Office 365 P2 or a Microsoft 365 E5 Compliance or an E5 eDiscovery and Audit add-on subscription. The functionality that requires an E5/G5 or add-on subscription is highlighted in this topic. Also note that alert policies are available in Office 365 GCC, GCC High, and DoD US government environments. + ## How alert policies work Here's a quick overview of how alert policies work and the alerts that are triggers when user or admin activity matches the conditions of an alert policy.
compliance Analyzing Data In Review Set https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/analyzing-data-in-review-set.md
When the number of collected documents is large, it can be difficult to review t
- [Themes](themes-in-advanced-ediscovery.md) + ## Run analytics for a review set To analyze data in a review set:
compliance Apply Irm To A List Or Library https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-irm-to-a-list-or-library.md
You can use Information Rights Management (IRM) to help control and protect files that are downloaded from lists or libraries. This feature is only supported in the Microsoft global cloud. IRM is not supported for SharePoint lists and libraries in national cloud deployments. + ## Administrator preparations before applying IRM - The Azure Rights Management service (Azure RMS) from Azure Information Protection, and the on-premises equivalent, Active Directory Rights Management Services (AD RMS), support Information Rights Management for sites. No separate or additional installations are required.
compliance Apply Retention Labels Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-retention-labels-automatically.md
Use the following instructions for the two admin steps.
> > For these scenarios, see [Publish retention labels and apply them in apps](create-apply-retention-labels.md). + ## Before you begin The global admin for your organization has full permissions to create and edit retention labels and their policies. If you aren't signing in as a global admin, see the permissions information for [records management](get-started-with-records-management.md#permissions) or [data lifecycle management](get-started-with-data-lifecycle-management.md#permissions-for-retention-policies-and-retention-labels), depending on the solution you're using.
compliance Apply Sensitivity Label Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-sensitivity-label-automatically.md
There are two different methods for automatically applying a sensitivity label t
> For more information, see [Default labels and policies for Microsoft Purview Information Protection](mip-easy-trials.md). + ## Compare auto-labeling for Office apps with auto-labeling policies Use the following table to help you identify the differences in behavior for the two complementary automatic labeling methods:
compliance Archive 17A 4 Blackberry Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-blackberry-data.md
Use the [BlackBerry DataParser](https://www.17a-4.com/BlackBerry-dataparser/) fr
After BlackBerry data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a BlackBerry connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving BlackBerry data The following overview explains the process of using a data connector to archive BlackBerry data in Microsoft 365.
After you create a BlackBerry DataParser connector, you can view the connector s
## Known issues
-At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive 17A 4 Bloomberg Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-bloomberg-data.md
Use the [Bloomberg DataParser](https://www.17a-4.com/Bloomberg-dataparser/) from
After Bloomberg data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Bloomberg connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Bloomberg data The following overview explains the process of using a data connector to archive Bloomberg data in Microsoft 365.
compliance Archive 17A 4 Cisco Jabber Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-cisco-jabber-data.md
Use the [Cisco Jabber DataParser](https://www.17a-4.com/jabber-dataparser/) from
After Cisco Jabber data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Cisco Jabber connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Cisco Jabber data The following overview explains the process of using a data connector to archive Cisco Jabber data in Microsoft 365.
compliance Archive 17A 4 Factset Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-factset-data.md
Use the [FactSet DataParser](https://www.17a-4.com/factset-dataparser/) from 17a
After FactSet data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a FactSet connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving FactSet data The following overview explains the process of using a data connector to archive FactSet data in Microsoft 365.
compliance Archive 17A 4 Fuze Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-fuze-data.md
Use the [Fuze DataParser](https://www.17a-4.com/fuze-dataparser/) from 17a-4 LLC
After Fuze data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Fuze connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Fuze data The following overview explains the process of using a data connector to archive Fuze data in Microsoft 365.
compliance Archive 17A 4 Fxconnect Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-fxconnect-data.md
Use the [FX Connect DataParser](https://www.17a-4.com/dataparser-roadmap/) from
After FX Connect data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a FX Connect connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving FX Connect data The following overview explains the process of using a data connector to archive FX Connect data in Microsoft 365.
compliance Archive 17A 4 Ice Im Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-ice-im-data.md
Use the [ICE DataParser](https://www.17a-4.com/ice-dataparser/) from 17a-4 LLC t
After ICE Connect Chat data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using an ICE DataParser connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving ICE Chat data The following overview explains the process of using a data connector to archive ICE Connect Chat data in Microsoft 365.
compliance Archive 17A 4 Investedge Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-investedge-data.md
Use the [InvestEdge DataParser](https://www.17a-4.com/investedge-dataparser/) fr
After InvestEdge data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a InvestEdge connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving InvestEdge data The following overview explains the process of using a data connector to archive InvestEdge data in Microsoft 365.
compliance Archive 17A 4 Liveperson Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-liveperson-data.md
Use the [LivePerson Conversational Cloud DataParser](https://www.17a-4.com/livep
After data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a LivePerson Conversational Cloud connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving LivePerson Conversational Cloud data The following overview explains the process of using a data connector to archive LivePerson Conversational Cloud data in Microsoft 365.
compliance Archive 17A 4 Quip Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-quip-data.md
Use the [Quip DataParser](https://www.17a-4.com/quip-dataparser/) from 17a-4 LLC
After Quip data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Quip connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Quip data The following overview explains the process of using a data connector to archive Quip data in Microsoft 365.
compliance Archive 17A 4 Refinitiv Messenger Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-refinitiv-messenger-data.md
Use the [Refinitiv Eikon Messenger DataParser](https://www.17a-4.com/refinitiv-m
After Refinitiv Eikon Messenger data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Refinitiv Eikon Messenger connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Refinitiv Eikon Messenger data The following overview explains the process of using a data connector to archive Refinitiv Eikon Messenger data in Microsoft 365.
compliance Archive 17A 4 Servicenow Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-servicenow-data.md
Use the [ServiceNow DataParser](https://www.17a-4.com/dataparser/) from 17a-4 LL
After ServiceNow data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a ServiceNow connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving ServiceNow data The following overview explains the process of using a data connector to archive ServiceNow data in Microsoft 365.
compliance Archive 17A 4 Skype For Business Server Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-skype-for-business-server-data.md
Use the [Skype Server DataParser](https://www.17a-4.com/skype-server-dataparser/
After Skype for Business Server data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Skype for Business Server connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Skype for Business Server data The following overview explains the process of using a data connector to archive Skype for Business Server data in Microsoft 365.
compliance Archive 17A 4 Slack Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-slack-data.md
Use [DataParser from 17a-4 LLC](https://www.17a-4.com/slack-dataparser/) to impo
After Slack data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Slack connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Slack data The following overview explains the process of using a data connector to archive Slack data in Microsoft 365.
compliance Archive 17A 4 Sql Database Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-sql-database-data.md
Use the [SQL DataParser](https://www.17a-4.com/sql-dataparser/) from 17a-4 LLC t
After SQL data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a SQL connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving SQL data The following overview explains the process of using a data connector to archive SQL data in Microsoft 365.
compliance Archive 17A 4 Symphony Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-symphony-data.md
Use the [Symphony DataParser](https://www.17a-4.com/Symphony-dataparser/) from 1
After Symphony data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Symphony connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Symphony data The following overview explains the process of using a data connector to archive Symphony data in Microsoft 365.
compliance Archive 17A 4 Webex Teams Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-webex-teams-data.md
Use the [Cisco Webex DataParser](https://www.17a-4.com/webex-dataparser/) from 1
After Cisco Webex data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Cisco Webex connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Cisco Webex data The following overview explains the process of using a data connector to archive Cisco Webex data in Microsoft 365.
compliance Archive 17A 4 Zoom Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-17a-4-zoom-data.md
Use the [Zoom DataParser](https://www.17a-4.com/dataparser/) from 17a-4 LLC to i
After Zoom data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Zoom connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Zoom data The following overview explains the process of using a data connector to archive Zoom data in Microsoft 365.
compliance Archive Android Archiver Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-android-archiver-data.md
Use a TeleMessage connector in the Microsoft Purview compliance portal to import
After data from Android mobile phones is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, Content Search, and Microsoft 365 retention policies to Android Archiver data. For example, you can search Android Archiver mobile communication using Content Search or associate the mailbox that contains the Android Archiver connector data with a custodian in an eDiscovery (Premium) case. Using an Android Archiver connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Android mobile data The following overview explains the process of using a connector to archive Android mobile data in Microsoft 365.
compliance Archive Att Network Archiver Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-att-network-archiver-data.md
Use a TeleMessage connector in the Microsoft Purview compliance portal to import
After SMS and MMS messages are stored in user mailboxes, you can apply Microsoft 365 Purview features such as Litigation Hold, Content Search, and Microsoft 365 retention policies to AT&T Network data. For example, you can search AT&T Network data using Content Search or associate the mailbox that contains the AT&T Network connector data with a custodian in an eDiscovery (Premium) case. Using a AT&T Network connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving AT&T Network data The following overview explains the process of using a connector to archive AT&T Network data in Microsoft 365.
compliance Archive Bell Network Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-bell-network-data.md
Use a TeleMessage connector in the Microsoft Purview compliance portal to import
After the SMS and MMS messages are stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, Content Search, and Microsoft 365 retention policies to Bell Network data. For example, you can search Bell Network SMS/MMS using Content Search or associate the mailbox that contains the Bell Network connector data with a custodian in an eDiscovery (Premium) case. Using a Bell Network connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Bell Network data The following overview explains the process of using a connector to archive Bell Network data in Microsoft 365.
compliance Archive Bloomberg Message Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-bloomberg-message-data.md
Use a data connector in the Microsoft Purview compliance portal to import and ar
After Bloomberg Message data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation hold, content search, In-place archiving, auditing, Communication compliance, and Microsoft 365 retention policies to Bloomberg Message data. For example, you can search Bloomberg Message emails using the content search tool or associate the mailbox that contains the Bloomberg Message data with a custodian in an eDiscovery (Premium) case. Using a Bloomberg Message connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Bloomberg Message data The following overview explains the process of using a connector to archive Bloomberg Message data in Microsoft 365.
compliance Archive Celltrust Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-celltrust-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After CellTrust data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a CellTrust connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving CellTrust data The following overview explains the process of using a connector to archive CellTrust data in Microsoft 365.
After you create the CellTrust connector, you can view the connector status in t
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Ciscojabberonmssql Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-ciscojabberonmssql-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Cisco Jabber data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Cisco Jabber connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Cisco Jabber data The following overview explains the process of using a connector to archive Cisco Jabber on MS SQL data in Microsoft 365.
compliance Archive Ciscojabberonoracle Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-ciscojabberonoracle-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Cisco Jabber on Oracle data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels. Using a Cisco Jabber on Oracle connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Cisco Jabber on Oracle data The following overview explains the process of using a connector to archive the Cisco Jabber on Oracle data in Microsoft 365.
compliance Archive Ciscojabberonpostgresql Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-ciscojabberonpostgresql-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Cisco Jabber on PostgreSQL data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels. Using a Cisco Jabber on PostgreSQL connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Cisco Jabber on PostgreSQL data The following overview explains the process of using a connector to archive the Cisco Jabber on PostgreSQL data in Microsoft 365.
compliance Archive Data From Celltrustsl2 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-data-from-celltrustsl2.md
CellTrust SL2 captures mobile communications data and integrates with the leadin
After data is imported to user mailboxes in Microsoft 365, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, Microsoft 365 retention policies, and communication compliance. Using the CellTrust SL2 Data Connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving with the CellTrust SL2 Data Connector CellTrust's SL2 platform captures communication data from multiple sources. SL2 data sources are either Person-to-Person (P2P) or Application-to-Person (A2P). The process described in this article pertains only to P2P data sources. For all P2P data sources, at least one party in the collaboration is an SL2 user who is subscribed to the SL2 service. The following overview explains the process of using the CellTrust SL2 Data Connector in Microsoft 365.
compliance Archive Eml Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-eml-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After EML messages are stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, and retention policies and retention labels. Using an EML connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving EML data The following overview explains the process of using a connector to archive EML data in Microsoft 365.
After you create the EML connector, you can view the connector status in the com
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Enterprise Number Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-enterprise-number-data.md
Use a TeleMessage connector in the Microsoft Purview compliance portal to import
After the TeleMessage Enterprise Number Archiver connector data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, Content Search, In-Place Archiving, Auditing, Communication compliance, and Microsoft 365 retention policies to Enterprise Number Archiver data. For example, you can search the TeleMessage Enterprise Number Archiver SMS, MMS, and Voice Call using Content Search or associate the mailbox that contains the Enterprise Number Archiver connector data with a custodian in an eDiscovery (Premium) case. Using an Enterprise Number Archiver connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Enterprise Number data The following overview explains the process of using a connector to archive Enterprise Network data in Microsoft 365.
After you've completed the prerequisites described in the previous section, you
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Facebook Data With Sample Connector https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-facebook-data-with-sample-connector.md
After the Facebook data is imported, you can apply Microsoft Purview features su
If youΓÇÖd like to participate in the preview, please reach out to the team at dcfeedback@microsoft.com. + ## Prerequisites for setting up a connector for Facebook Business pages Complete the following prerequisites before you can set up and configure a connector in the compliance portal to import and archive data from your organization's Facebook Business pages.
compliance Archive Fxconnect Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-fxconnect-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After FX Connect data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using an FX Connect connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving FX Connect data The following overview explains the process of using a connector to archive the FX Connect information in Microsoft 365.
After you create the FX Connect connector, you can view the connector status in
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Icechat Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-icechat-data.md
Use a native connector in the Microsoft Purview compliance portal to import and
After ICE chat data is stored in user mailboxes, you can apply Microsoft Purview features such as litigation hold, eDiscovery, archiving, auditing, communication compliance, and Microsoft 365 retention policies to ICE Chat data. For example, you can search ICE Chat messages using content search or associate the mailbox that contains the ICE Chat data with a custodian in an eDiscovery (Premium) case. Using an ICE Chat connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving ICE Chat data The following overview explains the process of using a connector to archive ICE chat data in Microsoft 365.
compliance Archive Instant Bloomberg Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-instant-bloomberg-data.md
Use a native connector in the Microsoft Purview compliance portal to import and
After Instant Bloomberg data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, Content Search, In-Place Archiving, Auditing, Communication compliance, and Microsoft 365 retention policies to Instant Bloomberg data. For example, you can search Instant Bloomberg chat messages using Content Search or associate the mailbox that contains the Instant Bloomberg data with a custodian in a Microsoft Purview eDiscovery (Premium) case. Using an Instant Bloomberg connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Instant Bloomberg data The following overview explains the process of using a connector to archive Instant Bloomberg chat data in Microsoft 365.
compliance Archive Linkedin Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-linkedin-data.md
Use a connector in the Microsoft Purview compliance portal to import and archive
After the LinkedIn Company page data is stored in a mailbox, you can apply Microsoft Purview features such as Litigation Hold, Content Search, In-Place Archiving, Auditing, and Microsoft 365 retention policies to LinkedIn data. For example, you can search for these items using Content Search or associate the storage mailbox with a custodian in a Microsoft Purview eDiscovery (Premium) case. Creating a connector to import and archive LinkedIn data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Before you set up a connector - The user who creates a LinkedIn Company Page connector must be assigned the Data Connector Admin role. This role is required to add connectors on the **Data connectors** page in the compliance portal. This role is added by default to multiple role groups. For a list of these role groups, see the "Roles in the security and compliance centers" section in [Permissions in the Security & Compliance Center](../security/office-365-security/permissions-in-the-security-and-compliance-center.md#roles-in-the-security--compliance-center). Alternatively, an admin in your organization can create a custom role group, assign the Data Connector Admin role, and then add the appropriate users as members. For instructions, see the "Create a custom role group" section in [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md#create-a-custom-role-group).
compliance Archive Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-mailboxes.md
Mailbox archiving in Microsoft Purview is sometimes also called *In-Place Archiv
Users can access and store messages in their archive mailboxes by using Outlook and Outlook on the web. Users can also move or copy messages between their primary mailbox and their archive mailbox. They can also recover deleted items from the Recoverable Items folder in their archive mailbox by using the Recover Deleted Items tool. + ## Managing archive mailboxes with messaging records management (MRM) Messages can also be moved to the archive mailbox by the [default Exchange retention policy](/exchange/security-and-compliance/messaging-records-management/default-retention-policy) from messaging records management (MRM). This default policy is automatically assigned to every mailbox and does the following:
compliance Archive Mssqldatabaseimporter Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-mssqldatabaseimporter-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After content from MS SQL Database stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels. Using an MS SQL Database connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving the MS SQL data The following overview explains the process of using a connector to archive MS SQL data in Microsoft 365.
After you create the MS SQL Database Importer connector, you can view the connec
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive O2 Network Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-o2-network-data.md
Use a TeleMessage connector in the Microsoft Purview compliance portal to import
After SMS messages and voice calls are stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, Content Search, and Microsoft 365 retention policies to O2 Network data. For example, you can search O2 Network SMS messages and voice calls using Content Search or associate the mailbox that contains O2 Network data with a custodian in an eDiscovery (Premium) case. Using an O2 Network connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving O2 Network data The following overview explains the process of using a connector to archive O2 Network data in Microsoft 365.
After you've completed the prerequisites described in the previous section, you
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Pivot Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-pivot-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Pivot data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Pivot connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Pivot data The following overview explains the process of using a connector to archive the Pivot data in Microsoft 365.
After you create the Pivot connector, you can view the connector status in the c
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Redtailspeak Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-redtailspeak-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Redtail Speak data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies, and retention labels. Using a Redtail Speak connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving the Redtail Speak data The following overview explains the process of using a connector to archive the Redtail Speak data in Microsoft 365.
After you create the Redtail Speak connector, you can view the connector status
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Reutersdealing Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-reutersdealing-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Reuters Dealing data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Reuters Dealing connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Reuters Dealing data The following overview explains the process of using a connector to archive the Reuters Dealing data in Microsoft 365.
After you create the Reuters Dealing connector, you can view the connector statu
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Reuterseikon Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-reuterseikon-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Reuters Eikon data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Reuters Eikon connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Reuters Eikon data The following overview explains the process of using a connector to archive Reuters Eikon data in Microsoft 365.
After you create the Reuters Eikon connector, you can view the connector status
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Reutersfx Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-reutersfx-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Reuters FX data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Reuters FX connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Reuters FX data The following overview explains the process of using a connector to archive Reuters FX data in Microsoft 365.
After you create the Reuters FX connector, you can view the connector status in
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Ringcentral Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-ringcentral-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After RingCentral data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels. Using a RingCentral connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving RingCentral data The following overview explains the process of using a connector to archive the RingCentral data in Microsoft 365.
compliance Archive Rogers Network Archiver Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-rogers-network-archiver-data.md
Use the TeleMessage connector in the Microsoft Purview compliance portal to impo
After data from the Rogers mobile network is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, Content search, and Microsoft 365 retention policies to the data. For example, you can search for SMS and MMS messages from the Rogers mobile network using Content search or a search associated with a Microsoft Purview eDiscovery (Standard) case. Using a Rogers Network Archiver connector to import and archive data in Microsoft 365 can help your organization stay compliant with corporate governance regulations and regulatory policies. + ## Overview of archiving Rogers mobile network data The following overview explains the process of using a connector to archive Rogers SMS and MMS data in Microsoft 365.
compliance Archive Salesforcechatter Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-salesforcechatter-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Salesforce Chatter data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels. Using a Salesforce Chatter connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Salesforce Chatter data The following overview explains the process of using a connector to archive the Salesforce Chatter data in Microsoft 365.
compliance Archive Servicenow Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-servicenow-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After ServiceNow data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies, and retention labels. Using a ServiceNow connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving ServiceNow data The following overview explains the process of using a connector to archive the ServiceNow data in Microsoft 365.
After you create the ServiceNow connector, you can view the connector status in
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Signal Archiver Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-signal-archiver-data.md
Use the TeleMessage connector in the Microsoft Purview compliance portal to impo
After Signal Archiver connector data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, Content search, and Microsoft 365 retention policies to Signal communications data. For example, you can search Signal communication using Content search or associate the mailbox that contains the Signal Archiver connector data with a custodian in an eDiscovery (Premium) case. Using a Signal Archiver connector to import and archive data in Microsoft 365 can help your organization stay compliant with corporate governance regulations and regulatory policies. + ## Overview of archiving Signal communications data The following overview explains the process of using a connector to archive Signal communication data in Microsoft 365.
compliance Archive Skypeforbusiness Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-skypeforbusiness-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Skype for Business data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels. Using a Skype for Business connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Skype for Business data The following overview explains the process of using a connector to archive the Skype for Business data in Microsoft 365.
compliance Archive Slack Data Microsoft https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-slack-data-microsoft.md
The Slack eDiscovery data connector provided by Microsoft helps you to import an
If youΓÇÖd like to participate in the preview, please reach out to the team at dcfeedback@microsoft.com. + ## Overview of archiving Slack eDiscovery data The following overview explains the process of using a Microsoft data connector to archive the Slack data in Microsoft 365.
compliance Archive Slack Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-slack-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Slack eDiscovery data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Slack connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Slack eDiscovery data The following overview explains the process of using a connector to archive the Slack information in Microsoft 365.
After you create the Slack eDiscovery connector, you can view the connector stat
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Symphony Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-symphony-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Symphony communications are stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Symphony connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Symphony data The following overview explains the process of using a data connector to archive Symphony communications in Microsoft 365.
After you create the Symphony connector, you can view the connector status in th
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Telegram Archiver Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-telegram-archiver-data.md
Use the TeleMessage connector in the Microsoft Purview compliance portal to impo
After Telegram Archiver connector data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, Content search, and Microsoft 365 retention policies to Telegram communication data. For example, you can search Telegram communication using Content Search or associate the mailbox that contains the Telegram Archiver connector data with a custodian in an eDiscovery (Premium) case. Using a Telegram Archiver connector to import and archive data in Microsoft 365 can help your organization stay compliant with corporate governance regulations and regulatory policies. + ## Overview of archiving Telegram communications data The following overview explains the process of using a connector to archive Telegram communications data in Microsoft 365.
compliance Archive Telus Network Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-telus-network-data.md
Use the TeleMessage connector in the Microsoft Purview compliance portal to impo
After SMS messages are stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, Content Search, and Microsoft 365 retention policies to TELUS data. For example, you can search TELUS SMS messages using Content Search or associate the mailbox that contains the TELUS data with a custodian in an eDiscovery (Premium) case. Using a TELUS Network connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving TELUS Network data The following overview explains the process of using a connector to archive TELUS Network data in Microsoft 365.
compliance Archive Text Delimited Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-text-delimited-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After text-delimited data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, and retention policies and retention labels. Using a text-delimited data connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving the text-delimited data The following overview explains the process of using a connector to archive text-delimited source information in Microsoft 365.
After you create the Text- Delimited connector, you can view the connector statu
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Twitter Data With Sample Connector https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-twitter-data-with-sample-connector.md
After Twitter data is imported, you can apply Microsoft Purview features such as
If youΓÇÖd like to participate in the preview, please reach out to the team at dcfeedback@microsoft.com. + ## Before you set up a connector Complete the following prerequisites before you can set up and configure a connector in the compliance portal to import and archive data from your organization's Twitter account.
During the completion of this step (by following the step-by-step instructions),
- Azure app service URL (obtained in Step 2; for example, `https://twitterconnector.azurewebsites.net`) -- APISecretKey (that you created in Step 2)
+- APISecretKey (that you created in Step 2)
compliance Archive Veritas Twitter Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-veritas-twitter-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Twitter data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels. Using a Twitter connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Twitter data The following overview explains the process of using a connector to archive Twitter data in Microsoft 365.
compliance Archive Verizon Network Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-verizon-network-data.md
Use the TeleMessage connector in the Microsoft Purview compliance portal to impo
After Verizon Network connector data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, Content Search, and Microsoft 365 retention policies to Verizon data. For example, you can search Verizon SMS and MMS messages using Content Search or associate the mailbox that contains Verizon Network data with a custodian in a Microsoft Purview eDiscovery (Premium) case. Using a Verizon Network connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Verizon Network data The following overview explains the process of using a connector to archive Verizon Network data in Microsoft 365.
After you've completed the prerequisites described in the previous section, you
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Webexteams Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-webexteams-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Webex Teams data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Webex Teams connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Webex Teams data The following overview explains the process of using a connector to archive Webex Teams data in Microsoft 365.
After you create the Webex Teams connector, you can view the connector status in
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Webpagecapture Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-webpagecapture-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After webpage content is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, and retention policies and retention labels. Using a Webpage Capture connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving webpage data The following overview explains the process of using a connector to archive webpage content in Microsoft 365.
After you create the Webpage Capture connector, you can view the connector statu
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Wechat Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-wechat-data.md
Use the TeleMessage connector in the Microsoft Purview compliance portal to impo
After WeChat Archiver connector data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, In-Place Archiving, Auditing, Communication compliance, and Microsoft 365 retention policies to WeChat communication data. For example, you can search WeChat communication using Content Search or associate the mailbox that contains the WeChat Archiver connector data with a custodian in an eDiscovery (Premium) case. Using a WeChat Archiver connector to import and archive data in Microsoft 365 can help your organization stay compliant with corporate governance regulations and regulatory policies. + ## Overview of archiving WeChat communication data The following overview explains the process of using a connector to archive WeChat communications data in Microsoft 365.
compliance Archive Whatsapp Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-whatsapp-data.md
Use the TeleMessage connector in the Microsoft Purview compliance portal to impo
After WhatsApp data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, Content search, and Microsoft 365 retention policies to WhatsApp data. For example, you can search WhatsApp messages using Content search or associate the mailbox that contains WhatsApp messages with a custodian in an eDiscovery (Premium) case. Using a WhatsApp connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving WhatsApp data The following overview explains the process of using a connector to archive WhatsApp data in Microsoft 365.
compliance Archive Workplacefromfacebook Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-workplacefromfacebook-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Workplace data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using Workplace from Facebook connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Workplace from Facebook data The following overview explains the process of using a connector to archive Workplace data in Microsoft 365.
After you create the Workplace from Facebook connector, you can view the connect
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Xip Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-xip-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After XIP source data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using an XIP connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving the XIP source data The following overview explains the process of using a connector to archive the XIP source data in Microsoft 365.
After you create the XIP connector, you can view the connector status in the com
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Xslt Xml Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-xslt-xml-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After XSLT/XML data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, and retention policies and retention labels. Using an XSLT/XML connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving XSLT/XML data The following overview explains the process of using a connector to archive XSLT/XML source data in Microsoft 365.
After you create the XSLT/XML connector, you can view the connector status in th
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Yieldbroker Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-yieldbroker-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Yieldbroker is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies, and retention labels. Using a Yieldbroker connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Yieldbroker data The following overview explains the process of using a connector to archive the Yieldbroker data in Microsoft 365.
After you create the Yieldbroker connector, you can view the connector status in
## Known issues -- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
+- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Archive Youtube Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-youtube-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After YouTube data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels. Using a YouTube connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving YouTube data The following overview explains the process of using a connector to archive the YouTube data in Microsoft 365.
compliance Archive Zoommeetings Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-zoommeetings-data.md
Use a Veritas connector in the Microsoft Purview compliance portal to import and
After Zoom Meetings data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Zoom Meetings connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies. + ## Overview of archiving Zoom Meetings data The following overview explains the process of using a connector to archive Zoom Meetings data in Microsoft 365.
After you create the Zoom Meetings connector, you can view the connector status
- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date. -- For the Zoom Meetings connector to work, you must enable recordings when setting up Zoom Meetings.
+- For the Zoom Meetings connector to work, you must enable recordings when setting up Zoom Meetings.
compliance Archiving Third Party Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archiving-third-party-data.md
Watch this interactive guide that demonstrates how to create data connectors to
> [!VIDEO https://mslearn.cloudguides.com/guides/Archive%20data%20from%20non-Microsoft%20sources%20in%20Microsoft%20365] + ## Third-party data connectors The Microsoft Purview compliance portal provides native third-party data connectors from Microsoft to import data from various data sources, such as LinkedIn, Instant Bloomberg, and Twitter and data connectors that support the Insider risk management solution. In addition to these data connectors, Microsoft works with the following partners to provide many more third part data connectors in the compliance portal. Your organization works with these partners to set up their archiving service before creating a corresponding data connector in the compliance portal.
compliance Assessment In Relevance In Advanced Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/assessment-in-relevance-in-advanced-ediscovery.md
Microsoft Purview eDiscovery (Premium) enables early assessment, for example, for the defined issues and the data imported for a case. eDiscovery (Premium) lets the expert make decisions about an adopted approach and to apply these decisions to the document review project. + ## Understanding assessment In Assessment, the expert reviews a random set of at least 500 files, which are used to determine the richness of the issues and to produce statistics that reflect the training results. Assessment is successful when enough relevant files are found to reach a statistical level that will help eDiscovery (Premium) Relevance to provide accurate statistics and to effectively determine the stabilization point in the training process.
compliance Assign Ediscovery Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/assign-ediscovery-permissions.md
The primary eDiscovery-related role group in compliance portal is called **eDisc
> [!NOTE] > To analyze a user's data using eDiscovery (Premium), the user (the custodian of the data) must be assigned an Office 365 E5 or Microsoft 365 E5 license. Alternatively, users with an Office 365 E1 or a Office 365 or Microsoft 365 E3 license can be assigned a Microsoft 365 E5 Compliance or Microsoft 365 eDiscovery and Audit add-on license. Administrators, compliance officers, or legal personnel who are assigned to cases as members and use eDiscovery (Premium) to collect, view, and analyze data don't need an E5 license. For more information about eDiscovery (Premium) licensing, see [Subscriptions and licensing in eDiscovery (Premium)](overview-ediscovery-20.md#subscriptions-and-licensing). + ## Before you assign permissions - You have to be a member of the Organization Management role group or be assigned the Role Management role to assign eDiscovery permissions in the compliance portal.
compliance Attorney Privilege Detection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/attorney-privilege-detection.md
search.appverid:
A major and costly aspect of the review phase of any eDiscovery process is reviewing documents for privileged content. Microsoft Purview eDiscovery (Premium) provides machine learning-based detection of privileged content to make this process more efficient. This feature is called *attorney-client privilege detection*. + ## How does it work? When attorney-client privilege detection is enabled, all documents in a review set will be processed by the attorney-client privilege detection model when you [analyze the data](analyzing-data-in-review-set.md) in the review set. The model looks for two things:
compliance Audit Log Retention Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-log-retention-policies.md
You can create and manage audit log retention policies in the Microsoft Purview
- Specific activities (in a Microsoft 365 service) performed by all users or by specific users - A priority level that specifies which policy takes precedence in you have multiple policies in your organization + ## Default audit log retention policy Audit (Premium) in Microsoft 365 provides a default audit log retention policy for all organizations. This policy retains all Exchange Online, SharePoint Online, OneDrive for Business, and Azure Active Directory audit records for one year. This default policy retains audit records that contain the value of **Exchange**, **SharePoint**, **OneDrive**, **AzureActiveDirectory** for the **Workload** property (which is the service in which the activity occurred). The default policy can't be modified. See the [More information](#more-information) section in this article for a list of record types for each workload that are included in the default policy.
compliance Audit Log Search Script https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-log-search-script.md
If you need to retrieve audit logs on a regular basis, you should consider a sol
When there are situations where you need to manually retrieve auditing data for a specific investigation or incident, particularly for longer date ranges in larger organizations, using the **Search-UnifiedAuditLog** cmdlet may be the best option. This article includes a PowerShell script that uses the cmdlet that can retrieve 50,000 audit records (each time you run the cmdlet) and then export them to a CSV file that you can format using Power Query in Excel to help with your review. Using the script in this article also minimizes the chance that large audit log searches will time out in the service. + ## Before you run the script - Audit logging has to be enabled for your organization to successfully use the script to return audit records. Audit logging is turned on by default for Microsoft 365 and Office 365 enterprise organizations. To verify that audit log search is turned on for your organization, you can run the following command in Exchange Online PowerShell:
compliance Audit New Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-new-search.md
The Audit New Search (preview) builds upon the existing search functionalities a
- Completed search jobs are now stored, giving customers the ability to reference historical audit searches. These search jobs are presented in the UI, listing the search name, search job status, progress %, Number of results, Creation Time, and Searched by. - Each admin Audit account user can have a maximum of 10 search jobs in progress at a time. + ## Information to get started View the available Microsoft Purview Audit documentation as the search job creation and export experiences have many parallels with the current search experience:
compliance Auditing Solutions Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/auditing-solutions-overview.md
Microsoft Purview auditing solutions provide an integrated solution to help orga
> [!NOTE] > Microsoft Purview auditing is the new name for the unified audit log. + ## Microsoft Purview auditing solutions Microsoft Purview provides two auditing solutions: Audit (Standard) and Audit (Premium).
compliance Auditing Troubleshooting Scenarios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/auditing-troubleshooting-scenarios.md
This article describes how to use the audit log search tool to help you investig
- Search for mailbox activities performed by users with non-E5 licenses - Search for mailbox activities performed by delegate users + ## Using the audit log search tool Each of the troubleshooting scenarios described in this article is based on using the audit log search tool in the Microsoft Purview compliance portal. This section lists the permissions required to search the audit log and describes the steps to access and run audit log searches. Each scenario section explains how to configure an audit log search query and what to look for in the detailed information in the audit records that match the search criteria.
The following example returns mailbox audit log records for activities performed
Search-MailboxAuditLog -Identity <mailbox identity> -StartDate <date> -EndDate <date> -LogonTypes Delegate -ShowDetails ```
-You can also use the **New-MailboxAuditLogSearch** cmdlet to search the audit log for a specific mailbox and to have the results sent via email to specified recipients.
+You can also use the **New-MailboxAuditLogSearch** cmdlet to search the audit log for a specific mailbox and to have the results sent via email to specified recipients.
compliance Auto Apply Retention Labels Scenario https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/auto-apply-retention-labels-scenario.md
The auto-apply functionality uses SharePoint metadata for document classificatio
In this article, we'll look at the information architecture and definition of the retention labels. Then we'll classify documents by auto-applying the labels. And finally we'll generate the events that initiate the retention period. + ## Information architecture Our scenario is a manufacturing company that uses SharePoint to store all the documents about the products that the company develops. These documents include product specifications, agreements with suppliers, and user manuals. When these documents are stored in SharePoint through Enterprise Content Management policies, document metadata is defined, which is used to classify them. Each document has the following metadata properties:
compliance Autoexpanding Archiving https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/autoexpanding-archiving.md
For step-by-step instructions for turning on auto-expanding archiving, see [Enab
> [!NOTE] > Auto-expanding archiving also supports shared mailboxes. + ## How auto-expanding archiving works As explained in the introduction, additional mailbox storage space is created when a user's archive mailbox is enabled. When auto-expanding archiving is enabled, Microsoft Purview periodically checks the size of the archive mailbox. When an archive mailbox gets close to its storage limit, additional storage space is automatically created for the archive. If the user runs out of this additional storage space, more storage space is automatically added to the user's archive. This process continues until the user's archive reaches a size 1.5 TB. This process happens automatically, which means administrators don't have to request additional archive storage or manage auto-expanding archiving.
compliance Building Search Queries https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/building-search-queries.md
When configuring the search query when creating a [collection](collections-overv
![Use keywords and conditions to narrow the results of a search.](../media/SearchQueryBox.png) + ## Keyword searches Type a keyword query in the **Keywords** box in the search query. You can specify keywords, email message properties, such as sent and received dates, or document properties, such as file names or the date that a document was last changed. You can use more complex queries that use a Boolean operator, such as **AND**, **OR**, **NOT**, and **NEAR**. You can also search for sensitive information (such as social security numbers) in documents in SharePoint and OneDrive (not in email messages), or search for documents that have been shared externally. If you leave the **Keywords** box empty, all content located in the specified content locations is in the search results.
compliance Bulk Add Custodians https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/bulk-add-custodians.md
search.appverid:
For Microsoft Purview eDiscovery (Premium) cases that involve many custodians, you can import multiple custodians at once by using a CSV file that contains the information necessary to add them to a case. The import custodians tool will also validate the CSV file before the import job is created. This means you can fix any errors in the CSV file instead of having to wait until the import job is complete before learning there are errors that prevent a custodian from being added to the case. + ## Before you import custodians - You can import a maximum of 1,000 custodians (rows) per CSV file. Note that importing 1,000 custodians at the same time might result in timeout errors and some custodians might fail the import. To remediate this, repeat the import and the failed custodians should be imported. To avoid timeouts we recommend importing 200 custodians at a time.
compliance Bulk Create Publish Labels Using Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/bulk-create-publish-labels-using-powershell.md
Overview:
2. Use PowerShell to create the retention labels and retention label policies in those lists. + ## Disclaimer The sample scripts provided in this article aren't supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such damages.
compliance Bulk Import External Contacts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/bulk-import-external-contacts.md
After you complete these steps to import contacts, you can perform these additio
- [Hide external contacts from the shared address book](#hide-external-contacts-from-the-shared-address-book) + ## Step 1: Create a CSV file that contains information about the external contacts The first step is to create a CSV file that contains information about each external contact that you want to import to Exchange Online.
compliance Change The Hold Duration For An Inactive Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/change-the-hold-duration-for-an-inactive-mailbox.md
However, if the hold is time-based, the mailbox content will be retained until t
As regulations and policies evolve, there may be some situations in which you need to change the duration of the hold assigned to the inactive mailbox. The following steps outline how to do this. + ## Connect to PowerShell As we mentioned before, many different types of holds can trigger the creation of an inactive mailbox. For this reason, in order to change the hold duration applied to the inactive mailbox, you must first identify what type of holds are affecting it. To do this, you must use Exchange Online PowerShell to identify the types of holds and, if the inactive mailbox is affected by Microsoft 365 retention policies or labels you must also use Security & Compliance PowerShell to identify the specific policies.
compliance Change The Size Of Pst Files When Exporting Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/change-the-size-of-pst-files-when-exporting-results.md
When you use the eDiscovery Export tool to export the email results of an eDisco
> [!NOTE] > The eDiscovery Export tool is used to export the search results when using the Content search tool in the Microsoft Purview compliance portal. + ## Create a registry setting to change the size of PST files when you export eDiscovery search results Perform the following procedure on the computer that you'll use to export the results of an eDiscovery search.
compliance Check Your Content Search Query For Errors https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/check-your-content-search-query-for-errors.md
Here's a list of the unsupported characters that we check for in search queries
- **Lowercase Boolean operators** - If you use a Boolean operator, such as **AND**, **OR**, and **NOT** in a search query, it must be uppercase. When we check a query for typos, the query syntax will often indicate that a Boolean operator is being used even though lowercase operators might be used; for example, `(WordA or WordB) and (WordC or WordD)`. + ## What happens if a query has an unsupported character? If unsupported characters are found in your query, a warning message is displayed that says unsupported characters were found and suggests an alternative. You then have the option keep the original query or replace it with the suggested revised query.
compliance Classifier Get Started With https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/classifier-get-started-with.md
Watch this video for a quick summary of creating a trainable classifier. You'll
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWyGL7] + ## Prerequisites ### Licensing requirements
compliance Classifier How To Retrain Content Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/classifier-how-to-retrain-content-explorer.md
Watch this video for a quick summary of the tuning and retraining process. You'l
> [!NOTE] > Pre-trained classifiers cannot be retrained. + ## Permissions To access classifiers in the Microsoft Purview compliance portal:
compliance Classifier Learn About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/classifier-learn-about.md
description: "Trainable classifiers can recognize various types of content for l
Categorizaing and labeling content so it can be protected and handled properly is the starting place for the information protection discipline. Microsoft Purview has three ways to classify content. + ## Manually Manual categorizing requires human judgment and action. Users and admins categorize content as they encounter it. You can use either use the pre-existing labels and sensitive information types or use custom created ones. You can then protect the content and manage its disposition.
compliance Classifier Tc Definitions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/classifier-tc-definitions.md
Our Threat, Profanity, Harassment, and Discrimination classifiers can scan conte
All others are English only. + ## See also - [Retention labels](retention.md)
compliance Clone A Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/clone-a-content-search.md
Why clone Content Searches?
- To decrease the size of the search results. For example, if you have a search that returns too many results to export, you can clone the search and then add a search condition based on a date range to reduce the number of search results. + ## Script information - You need to install the Exchange Online PowerShell module. For instructions, see [Install and maintain the Exchange Online PowerShell module](/powershell/exchange/exchange-online-powershell-v2#install-and-maintain-the-exchange-online-powershell-module).
compliance Close Or Delete Case https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/close-or-delete-case.md
When the legal case or investigation supported by a Microsoft Purview eDiscovery (Premium) case is completed, you can close or delete a case. You can also reopen a closed case. + ## Close a case Here's what happens when you close an eDiscovery (Premium) case:
compliance Close Reopen Delete Core Ediscovery Cases https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/close-reopen-delete-core-ediscovery-cases.md
search.appverid:
This article describes how to close, reopen, and delete Microsoft Purview eDiscovery (Standard) cases in Microsoft 365. + ## Close a case When the legal case or investigation supported by a eDiscovery (Standard) case is completed, you can close the case. Here's what happens when you close a case:
compliance Collection Statistics Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/collection-statistics-reports.md
After you create a draft collection, you can view statistics on the retrieved it
When you've identified the set of documents you want to further examine, you can add the search results to a review set to collect and process. + ## Statistics and reports for draft collections This section describes the statistics that are available for draft collections. These statistics are available on the **Search statistics** tab on the flyout page of a draft collection.
compliance Collections Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/collections-overview.md
When the manager is satisfied with the scope of the collection and the estimated
With the release of collections in an eDiscovery (Premium), the **Searches** tab has been renamed to **Collections** in an eDiscovery (Premium) case in the Microsoft Purview compliance portal. The steps to define the scope and size of the collection follow the same process as search to define locations and conditions. Save as draft and get preview estimates enables quick validation of targeted scope of collections prior to committing a full search and collection into the review set. This enables improved job management, and targeted iterations for starting to minimize content during the search and collection process. + ## Collections workflow To get started using collections in eDiscovery (Premium), here's a basic workflow and descriptions of each step in the process.
compliance Commit Draft Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/commit-draft-collection.md
search.appverid:
When you're satisfied with the items you've collected in a draft collection and are ready to analyze, tag, and review them, you can add a collection to a review set in the case. When you commit a draft collection to a review set, collected items are copied from their original content location in Microsoft 365 to a review set. A review set is a secure, Microsoft-provided Azure Storage location in the Microsoft cloud. + ## Commit a draft collection to a review set 1. In the Microsoft Purview compliance portal, open the Microsoft Purview eDiscovery (Premium) case, and then select the **Collections** tab to display a list of the collections in the case.
compliance Communication Compliance Case Study https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-case-study.md
This case study will cover the basics for quickly configuring a communication co
- [Step 3: Configuring prerequisites and creating a communication compliance policy](#step-3-configuring-prerequisites-and-creating-a-communication-compliance-policy) - [Step 4: Investigate and remediate alerts](#step-4-investigate-and-remediate-alerts) + ## Step 1: Planning for communication compliance Contoso IT administrators and compliance specialists attended online webinars about compliance solutions in Microsoft 365 and decided that communication compliance policies will help them meet the updated corporate policy requirements for reducing workplace harassment. Working together, they've developed a plan to create and enable a communication compliance policy that will detect inappropriate messages. This configuration includes detecting text for chats sent in Microsoft Teams, private messages and community conversations in Yammer, and in email messages sent in Exchange Online. Their plan includes identifying:
compliance Communication Compliance Channels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-channels.md
search.appverid:
With communication compliance policies, you can choose to scan messages in one or more of the following communication platforms as a group or as standalone sources. Original messages captured across these platforms are retained in the original platform location in accordance with your organization's [retention and hold policies](/microsoft-365/compliance/information-governance). Copies of messages used by communication compliance policies for analysis and investigation are retained for as long as policy is in place, even if users leave your organization and their mailboxes are deleted. When a communication policy is deleted, copies of messages associated with the policy are also deleted. + ## Microsoft Teams Chat communications in both public and private Microsoft Teams channels and individual chats can be scanned. When users are assigned to a communication compliance policy with Microsoft Teams coverage selected, chat communications for the users are automatically detected across all Microsoft Teams where the users are a member. Microsoft Teams coverage is automatically included for pre-defined policy templates and is selected by default in the custom policy template. Teams chats matching communication compliance policy conditions may take up to 48 hours to process.
compliance Communication Compliance Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-configure.md
search.appverid:
Use communication compliance policies to identify user communications for examination by internal or external reviewers. For more information about how communication compliance policies can help you detect communications in your organization, see [communication compliance policies](/microsoft-365/compliance/communication-compliance-policies). If you'd like to review how Contoso quickly configured a communication compliance policy to detect inappropriate content in Microsoft Teams, Exchange Online, and Yammer communications, check out this [case study](/microsoft-365/compliance/communication-compliance-case-study). + ## Subscriptions and licensing Before you get started with communication compliance, you should confirm your [Microsoft 365 subscription](https://www.microsoft.com/microsoft-365/compare-all-microsoft-365-plans) and any add-ons. To access and use communication compliance, your organization must have one of the following subscriptions or add-ons:
compliance Communication Compliance Investigate Remediate https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-investigate-remediate.md
After you've configured your [communication compliance policies](/microsoft-365/
After you have the required permissions, follow the workflow instructions here to investigate and remediate alert issues. + ## Investigate alerts The first step to investigate issues detected by your policies is to review communication compliance alerts in the Microsoft Purview compliance portal. There are several areas in the communication compliance solution area to help you to quickly investigate alerts, depending on how you prefer to view alert grouping:
compliance Communication Compliance Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-plan.md
You can also check out the [Microsoft Mechanics video](https://www.youtube.com/w
> [!IMPORTANT] > Communication compliance is currently available in tenants hosted in geographical regions and countries supported by Azure service dependencies. To verify that communication compliance is supported for your organization, see [Azure dependency availability by country/region](/troubleshoot/azure/general/dependency-availability-by-country). + ## Transitioning from Supervision in Office 365 For organizations using supervision policies in Office 365, you should immediately plan to transition to communication compliance policies in Microsoft Purview and need to understand these important points:
compliance Communication Compliance Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-policies.md
search.appverid:
# Create and manage communication compliance policies + ## Policies > [!IMPORTANT]
compliance Communication Compliance Reports Audits https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-reports-audits.md
search.appverid:
# Use communication compliance reports and audits + ## Reports The **Reports** dashboard is the central location for viewing all communication compliance reports. To view and manage reports, users must be assigned to the *Communication Compliance Viewers* role group.
compliance Communication Compliance Siem https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-siem.md
search.appverid:
A common need for organizations is to integrate communication compliance alerts and these SIEM solutions. With this integration, organizations can view communication compliance alerts in their SIEM solution and then remediate alerts within the communication compliance workflow and user experience. For example, an employee sends an offensive message to another employee and that message is detected by a communication compliance policy for inappropriate content. These events are tracked in Microsoft 365 Audit (also known as "unified audit log") by the communication compliance solution and imported into the SIEM solution. An alert is then triggered in the SIEM solution for the organization from events included in Microsoft 365 Audit that are associated with communication compliance alerts. Investigators are notified of the alert in the SIEM solutions and then they investigate and remediate the alert in the communication compliance solution. + ## Communication compliance alerts in Microsoft 365 Audit All communication compliance policy matches are captured in Microsoft 365 Audit. The following examples show the details available for selected communication compliance policy match activities:
compliance Communication Compliance Solution Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-solution-overview.md
Protecting sensitive information and detecting and acting on workplace harassment incidents is an important part of compliance with internal policies and standards. Microsoft Purview Communication Compliance helps minimize these risks by helping you quickly detect, capture, and take remediation actions for email and Microsoft Teams communications. These include inappropriate communications containing profanity, threats, and harassment and communications that share sensitive information inside and outside of your organization. + ## Configure communication compliance Use the following steps to configure communication compliance for your organization:
compliance Communication Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance.md
search.appverid:
# Learn about communication compliance
-> [!TIP]
-> *Did you know you can try the premium versions of all nine Microsoft Purview solutions for free?* Use the 90-day Purview solutions trial to explore how robust Purview capabilities can help your organization meet its compliance needs. Microsoft 365 E3 and Office 365 E3 customers can start now at the [Microsoft Purview compliance portal trials hub](https://compliance.microsoft.com/trialHorizontalHub?sku=ComplianceE5&ref=DocsRef). Learn details about [who can sign up and trial terms](/microsoft-365/compliance/compliance-easy-trials).
- Microsoft Purview Communication Compliance is an insider risk solution that helps minimize communication risks by helping you detect, capture, and act on inappropriate messages in your organization. Pre-defined and custom policies allow you to scan internal and external communications for policy matches so they can be examined by designated reviewers. Reviewers can investigate scanned email, Microsoft Teams, Yammer, or third-party communications in your organization and take appropriate actions to make sure they're compliant with your organization's message standards. Communication compliance policies in Microsoft 365 help you overcome many modern challenges associated with compliance and internal and external communications, including:
To keep up with the latest communication compliance updates, select **What's new
> [!IMPORTANT] > Communication compliance is currently available in tenants hosted in geographical regions and countries supported by Azure service dependencies. To verify that communication compliance is supported for your organization, see [Azure dependency availability by country/region](/troubleshoot/azure/general/dependency-availability-by-country). + ## Scenarios for communication compliance Communication compliance policies can assist with reviewing messages in your organization in several important compliance areas:
compliance Compliance Easy Trials Compliance Manager Assessment Playbook https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials-compliance-manager-assessment-playbook.md
This playbook will help you make the most of your 90-day free trial by teaching
Using Microsoft recommendations, you'll quickly see how the premium assessment templates can help your organization assess risks and efficiently respond to global, regional and industrial regulatory requirements. + ## Step 1: Get to know Compliance Manager Our [Compliance Manager overview page](compliance-manager.md) is the best first stop for a comprehensive review of what Compliance Manager is and how it works. You may also want to jump right to key sections of our documentation using the links below:
compliance Compliance Easy Trials Compliance Manager Assessments https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials-compliance-manager-assessments.md
Compliance Manager helps you manage your organizationΓÇÖs compliance requirement
Your licensing agreement to use Compliance Manager may include one or more built-in templates for building assessments. An extensive library of premium assessment templates is also available for building assessments specific to your organizationΓÇÖs needs. To try out these templates before purchasing licenses, sign up for the free Compliance Manager premium assessments trial. + ## Terms and conditions See the [terms and conditions](/legal/microsoft-365/microsoft-365-trial) for Microsoft 365 trials.
compliance Compliance Easy Trials Compliance Playbook https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials-compliance-playbook.md
Welcome to the Microsoft Purview solutions trial playbook. This playbook will help you make the most of your free trial by helping you discover robust and comprehensive capabilities of Microsoft Purview and security products. + ## Compliance actions with Microsoft Purview Easily and quickly start trying MicrosoftΓÇÖs compliance solutions without changing your organizationΓÇÖs metadata.
compliance Compliance Easy Trials Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials-roles.md
description: "Learn which user roles are required in order to sign up for a tria
This article outlines the user roles required in order to enroll your organization in a Microsoft 365 trial. + ## Who can start all trials A user with one of the roles listed below can start any Microsoft 365 trial.
For more information about how to assign user roles and permissions, see the fol
- **Microsoft 365 admin roles**: [About admin roles in the Microsoft 365 admin center](../admin/add-users/about-admin-roles.md) - **Microsoft Purview and Priva**: [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md)-- **Microsoft 365 Defender**: [Create and manage roles for role-based access control](../security/defender-endpoint/user-roles.md)
+- **Microsoft 365 Defender**: [Create and manage roles for role-based access control](../security/defender-endpoint/user-roles.md)
compliance Compliance Easy Trials https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials.md
Microsoft Purview solutions help protect your organization from internal threats
The Microsoft Purview solutions trial is the easiest way to try all the capabilities of Microsoft Purview solutions, and setting it up only takes a couple of minutes. After the trial setup is complete, all features of the Microsoft E5 license package are available for you to use for up to 90 days. + ## Terms and conditions See the [terms and conditions](/legal/microsoft-365/microsoft-365-trial) for Microsoft 365 trials.
compliance Compliance Extensibility https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-extensibility.md
There are two key building blocks for compliance extensibility:
- **APIs**. Enables programmatic access to Microsoft Purview capabilities. + ## Data connectors Microsoft provides third-party data connectors that can be configured in the Microsoft Purview compliance portal. For a list of data connectors provided by Microsoft, see the [Third-party data connectors](archiving-third-party-data.md#third-party-data-connectors) table. The table of third-party data connectors also summarizes the compliance solutions that you can apply to third-party data after you import and archive data in Microsoft 365, and links to the step-by-step instructions for each connector.
compliance Compliance Manager Alert Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-alert-policies.md
description: "Learn how to create alerts for activities in Microsoft Purview Com
**In this article:** Learn how to **set alerts** for certain activities in Compliance Manager, how to manage alerts, and how to **create alert policies** for defining alert conditions. + ## Overview Compliance Manger can alert you to changes as soon as they happen so that you can stay on track with your compliance goals. For example, you can set up alerts to inform you when an improvement action's score value has increased or decreased due to a configuration change in your tenant, or when an improvement action has been assigned to a user to perform implementation or testing work. View the [types of events](#create-an-alert-policy) for which you can create alerts.
compliance Compliance Manager Assessments https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-assessments.md
description: "Build assessments in Microsoft Purview Compliance Manager to help
**In this article:** Learn how to customize Compliance Manager for your organization by creating and managing **assessments**. This article walks you through how to create assessments, how to organize them into **groups**, working with **controls**, accepting **updates**, and exporting assessment **reports**. + ## Introduction to assessments Compliance Manager helps you create assessments that evaluate your compliance with industry and regional regulations that apply to your organization. Assessments are built upon the framework of assessment templates, which contain the necessary controls, improvement actions, and, where applicable, Microsoft actions for completing the assessment. Setting up the most relevant assessments for your organization can help you implement policies and operational procedures to limit your compliance risk.
compliance Compliance Manager Improvement Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-improvement-actions.md
description: "Learn how to implement and test controls by working with improveme
**In this article:** This article explains how to **manage your compliance workflow** with improvement actions. Learn how to **assign improvement actions** for implementation and testing, **manage updates**, and export **reports**. + ## Manage compliance workflows with improvement actions Improvement actions centralize your compliance activities. Each improvement action gives detailed implementation guidance to help you align with data protection regulations and standards. Actions can be assigned to users in your organization to perform implementation and testing work. You can also store documentation, notes, and record status updates within the action.
You can set up alerts to notify you immediately when certain changes to improvem
Select **Export** in the upper left corner of your screen to download an Excel worksheet containing all your improvement actions and the filter categories shown on the improvement actions page.
-The exported Excel file is also what you use to update multiple improvement actions at once. Get details about how to edit the export file to [update multiple improvement actions](compliance-manager-update-actions.md).
+The exported Excel file is also what you use to update multiple improvement actions at once. Get details about how to edit the export file to [update multiple improvement actions](compliance-manager-update-actions.md).
compliance Compliance Manager Mcca https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-mcca.md
description: "Understand how to use Configuration Analyzer for Microsoft Purview
**In this article:** Learn how to install and run the Configuration Analyzer for Microsoft Purview (CAMP) tool to get quickly started with Microsoft Purview Compliance Manger. + ## Compliance Configuration Analyzer (CAMP) overview The Configuration Analyzer for Microsoft Purview (CAMP) is a tool that can help you get started with [Microsoft Purview Compliance Manager](compliance-manager.md). CAMP is a PowerShell-based utility that will fetch your organization's current configurations and validate them against Microsoft 365 recommended best practices. These best practices are based on a set of controls that include key regulations and standards for data protection and data governance.
compliance Compliance Manager Quickstart https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-quickstart.md
Compliance Manager provides intelligent and actionable data upon your first visi
Whether youΓÇÖre coming to Compliance Manager for the first time, or are ready to use some of the advanced features, this guide can support you along your journey. + ## First visit: get to know Compliance Manager Compliance Manager is located in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>. Your organization's global administrator will need to [set up user permissions and assign roles](compliance-manager-setup.md#set-user-permissions-and-assign-roles) before you start using Compliance Manager.
compliance Compliance Manager Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-setup.md
description: "Set Microsoft Purview Compliance Manager user permissions and role
**In this article:** This article helps you set up Compliance Manager. Learn how to **access** Compliance Manager, **set roles and permissions**, and configure **automatic testing of improvement actions**. Walk through **your Compliance Manager dashboard** and understand the main pages: the improvement actions page, the solutions page, the assessments page, and the assessment templates page. + ## Who can access Compliance Manager Compliance Manager is available to organizations with Office 365 and Microsoft 365 licenses, and to US Government Community Cloud (GCC) Moderate, GCC High, and Department of Defense (DoD) customers. Assessment availability and management capabilities depend on your licensing agreement. [View service description details](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-purview-compliance-manager).
compliance Compliance Manager Templates Create https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-templates-create.md
To create your own new template for custom assessments in Compliance Manager, yo
To learn about formatting your spreadsheet, see [Format assessment template data with Excel](compliance-manager-templates-format-excel.md). + ## Required roles Only users who hold a Global Administrator or Compliance Manager Administration role can create and modify templates. Learn more about [roles and permissions](compliance-manager-setup.md#set-user-permissions-and-assign-roles).
compliance Compliance Manager Templates Extend https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-templates-extend.md
Compliance Manager offers the option to add your own controls and improvement ac
To extend a template, you will use special instructions for modifying template data, depending on whether youΓÇÖre extending Microsoft assessment templates or universal assessment templates. + ## Extend Microsoft assessment templates When you extend a Microsoft template, such as one created for use with Microsoft 365, it can still receive updates released by Microsoft. Updates may happen when there are changes to the related regulation or product (see [Accept updates to assessments](compliance-manager-assessments.md#accept-updates-to-assessments)).
compliance Compliance Manager Templates Format Excel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-templates-format-excel.md
description: "Understand how to work with Excel data for assessment templates in
When [creating](compliance-manager-templates-create.md), [modifying](compliance-manager-templates-modify.md), or [extending](compliance-manager-templates-extend.md) assessment templates in Compliance Manager, you will work with Excel spreadsheets that use a specific format and schema. These specifications must be followed for the files to import correctly. + ## Download example spreadsheet To view a sample spreadsheet, [download an example file](https://go.microsoft.com/fwlink/?linkid=2124865). You can use this for reference to create your own file.
compliance Compliance Manager Templates List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-templates-list.md
description: "Microsoft Purview Compliance Manager provides templates for buildi
> [!IMPORTANT] > The assessment templates that are available to your organization depend on your licensing agreement. [Review the details](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-purview-compliance-manager). + ## Overview [Microsoft Purview Compliance Manager](compliance-manager.md) provides a comprehensive set of templates for creating assessments. These templates can help your organization comply with national, regional, and industry-specific requirements governing the collection and use of data.
compliance Compliance Manager Templates Modify https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-templates-modify.md
However, there are details to be aware of as you format your file with changes t
To learn more about the format of this spreadsheet, see [Format your template data with Excel](compliance-manager-templates-format-excel.md). + ## Format your Excel file to modify an existing template From your **assessment templates** page, select the template you want to modify, which will bring up its details page. Then select **Export to Excel**. An Excel file with all your template data will download. Save the file to your local machine.
compliance Compliance Manager Templates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-templates.md
description: "Understand how to use and manage templates for building assessment
> [!IMPORTANT] > The assessment templates that are available to your organization depend on your licensing agreement. [Review the details](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-purview-compliance-manager). + ## Templates overview A template is a framework of controls for creating an assessment in Compliance Manager. Our comprehensive set of templates can help your organization comply with national, regional, and industry-specific requirements governing the collection and use of data. We refer to templates by the same name as their underlying certification or regulation, such as the EU GDPR template and the ISO/IEC 27701:2019 template.
compliance Compliance Manager Update Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-update-actions.md
description: "Migrate your existing compliance data into Microsoft Purview Compl
**In this article:** Learn how to migrate your organization's existing compliance activities into Compliance Manager and update multiple improvement actions at once by uploading a formatted Excel file. + ## Overview Compliance Manager enables organizations to bring their existing compliance activity data and evidence into the Compliance Manager solution. By uploading a specially formatted Excel file, organizations who are new to Compliance Manager can migrate compliance activities completed in other systems into Compliance Manager and quickly start increasing their overall compliance score.
compliance Compliance Manager Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-whats-new.md
description: "Find out whatΓÇÖs new in Compliance Manger and whatΓÇÖs to come. R
**In this article:** Learn about recent updates in Compliance Manager. + ## August 2022 Compliance Manager has published the following new assessment template:
compliance Compliance Manager https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager.md
description: "Microsoft Purview Compliance Manager helps organizations manage th
# Microsoft Purview Compliance Manager
-> [!TIP]
-> *Did you know you can try the premium versions of all nine Microsoft Purview solutions for free?* Use the 90-day Purview solutions trial to explore how robust Purview capabilities can help your organization meet its compliance needs. Microsoft 365 E3 and Office 365 E3 customers can start now at the [Microsoft Purview compliance portal trials hub](https://compliance.microsoft.com/trialHorizontalHub?sku=ComplianceE5&ref=DocsRef). Learn details about [who can sign up and trial terms](compliance-easy-trials.md).
- **In this article:** Learn what Compliance Manager is, how it helps simplify compliance and reduce risk, and its key components. + ## What is Compliance Manager? [Microsoft Purview Compliance Manager](https://compliance.microsoft.com/compliancemanager) is a feature in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a> that helps you manage your organizationΓÇÖs multicloud compliance requirements with greater ease and convenience. Compliance Manager can help you throughout your compliance journey, from taking inventory of your data protection risks to managing the complexities of implementing controls, staying current with regulations and certifications, and reporting to auditors.
compliance Compliance Quick Tasks https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-quick-tasks.md
This article is also helpful if you're figuring out how best to manage risks, pr
After you've completed these basic compliance tasks, consider expanding compliance coverage in your organization by implementing additional Microsoft Purview solutions. + ## Task 1: Configure compliance permissions It's important to manage who in your organization has access to the Microsoft Purview compliance portal to view content and perform management tasks. Microsoft 365 provides administrative roles specific to compliance and for using the tools included in the Microsoft Purview compliance portal.
compliance Compliance Score Calculation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-score-calculation.md
> [!IMPORTANT] > Recommendations from Compliance Manager should not be interpreted as a guarantee of compliance. It is up to you to evaluate and validate the effectiveness of customer controls per your regulatory environment. These services are subject to the terms and conditions in the [Product Terms](https://go.microsoft.com/fwlink/?linkid=2108910). See also [Microsoft 365 licensing guidance for security and compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-purview-compliance-manager). + ## How to read your compliance score The Compliance Manager dashboard displays your overall compliance score. This score measures your progress in completing recommended improvement actions within controls. Your score can help you understand your current compliance posture. It can also help you prioritize actions based on their potential to reduce risk.
compliance Configure Edge To Export Search Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/configure-edge-to-export-search-results.md
search.appverid:
As a result of recent changes to the newest version of Microsoft Edge, ClickOnce support is no longer enabled by default. To continue using the eDiscovery Export Tool to download Content Search or eDiscovery search results, you either need to use [Microsoft Internet Explorer](https://support.microsoft.com/help/17621/internet-explorer-downloads) or enable ClickOnce support in the newest version of Microsoft Edge. + ## Enable ClickOnce support in Microsoft Edge 1. In Microsoft Edge, go to **edge://flags/#edge-click-once**.
compliance Configure Irm To Use An On Premises Ad Rms Server https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/configure-irm-to-use-an-on-premises-ad-rms-server.md
This topic shows you how to configure IRM to use an AD RMS server. For informati
To learn more about IRM in Exchange Online, see [Information Rights Management in Exchange Online](information-rights-management-in-exchange-online.md). + ## What do you need to know before you begin? - Estimated time to complete this task: 30 minutes
compliance Configure Search And Analytics Settings In Advanced Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/configure-search-and-analytics-settings-in-advanced-ediscovery.md
To configure search and analytics settings for a case:
![Configure analytics and search settings for an eDiscovery (Premium) case.](../media/AeDCaseSettings.png) + ## Near duplicates and email threading In this section, you can set parameters for duplicate detection, near duplicate detection, and email threading. For more information, see [Near duplicate detection](near-duplicate-detection-in-advanced-ediscovery.md) and [Email threading](email-threading-in-advanced-ediscovery.md).
compliance Content Search Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/content-search-reference.md
This article describes features and functionality of Content search. + ## Content search limits For a description of the limits that are applied to Content searches, see [Limits for Content search](limits-for-content-search.md).
compliance Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/content-search.md
You can use the Content search eDiscovery tool in the Microsoft Purview complian
After you run a search, the number of content locations and an estimated number of search results are displayed on the search flyout page. You can quickly view statistics, such as the content locations that have the most items that match the search query. After you run a search, you can preview the results or export them to a local computer. + ## Before you run a search - To access to the Content search tool in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">compliance portal</a> (to run searches and preview results and export results), an administrator, compliance officer, or eDiscovery manager must be a member of the eDiscovery Manager role group in the compliance portal. For more information, see [Assign eDiscovery permissions](assign-ediscovery-permissions.md).
compliance Conversation Review Sets https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/conversation-review-sets.md
With conversation reconstruction, you can use built-in capabilities to reconstru
- Export individual messages or threaded conversations + ## Terminology Here are few definitions to help you get start using conversation reconstruction.
compliance Create A Custom Sensitive Information Type In Scc Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-a-custom-sensitive-information-type-in-scc-powershell.md
After you've created a well-formed XML file, you can upload it to Microsoft 365
> [!NOTE] > If you don't need the fine-grained control that PowerShell provides, you can create custom sensitive information types in the Microsoft Purview compliance portal. For more information, see [Create a custom sensitive information type](create-a-custom-sensitive-information-type.md). + ## Important disclaimer Microsoft Support can't help you create content-matching definitions.
compliance Create A Custom Sensitive Information Type https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-a-custom-sensitive-information-type.md
There are two ways to create a new sensitive information type:
- [copy and modify an existing sensitive information type](#copy-and-modify-a-sensitive-information-type) + ## Before you begin - You should be familiar with sensitive information types and what they are composed of. See, [Learn about sensitive information types](sensitive-information-type-learn-about.md). It is critical to understand the roles of:
compliance Create A Dlp Policy From A Template https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-a-dlp-policy-from-a-template.md
You can fine tune a template by modifying any of its existing rules or adding ne
You can also choose the Custom template, which has no default rules, and configure your DLP policy from scratch, to meet the specific compliance requirements for your organization. + ## Permissions Members of your compliance team who will create DLP policies need permissions to the Compliance Center. By default, your tenant admin will have access can give compliance officers and other people access. Follow these steps:
compliance Create A Keyword Dictionary https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-a-keyword-dictionary.md
description: "Learn the basic steps to creating a keyword dictionary in the Offi
Microsoft Purview Data Loss Prevention (DLP) can identify, monitor, and protect your sensitive items. Identifying sensitive items sometimes requires looking for keywords, particularly when identifying generic content (such as healthcare-related communication), or inappropriate or explicit language. Although you can create keyword lists in sensitive information types, keyword lists are limited in size and require modifying XML to create or edit them. Keyword dictionaries provide simpler management of keywords and at a much larger scale, supporting up to 1 MB of terms (post compression) in the dictionary and support any language. The tenant limit is also 1 MB after compression. 1 MB of post compression limit means that all dictionaries combined across a tenant can have close to 1 million characters. + ## Keyword dictionary limits There is a limit of 50 keyword dictionary based sensitive information types that can be created per tenant. To find out how many keyword dictionaries you have in your tenant, connect using the procedures in [Connect to the Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell) to connect to your tenant and run this PowerShell script.
compliance Create A Litigation Hold https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-a-litigation-hold.md
Here's what happens when you create a Litigation hold.
- Items in the user's primary and the archive mailboxes are retained + ## Assign an Exchange Online Plan 2 license To place an Exchange Online mailbox on Litigation hold, it must be assigned an Exchange Online Plan 2 license. If a mailbox is assigned an Exchange Online Plan 1 license, you would have to assign it a separate Exchange Online Archiving license to place it on hold.
compliance Create A Report On Holds In Ediscovery Cases https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-a-report-on-holds-in-ediscovery-cases.md
The script in this article lets eDiscovery administrators and eDiscovery manager
See the [More information](#more-information) section for a detailed description of the information included in the report. + ## Admin requirements and script information - To generate a report on all eDiscovery cases in your organization, you have to be an eDiscovery Administrator in your organization. If you are an eDiscovery Manager, the report will only include information about the cases that you can access. For more information about eDiscovery permissions, see [Assign eDiscovery permissions](assign-ediscovery-permissions.md).
compliance Create Activity Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-activity-alerts.md
You can create an activity alert that will send you an email notification when u
> [!NOTE] > Activity alerts are being deprecated. We recommend that you start using alert policies in the security and compliance center instead of creating new activity alerts. Alert policies provide additional functionality such as the ability to create an alert policy that triggers an alert when any user performs a specified activity, and displaying alerts on the **View alerts** page in the security and compliance center. For more information, see [Alert policies](alert-policies.md). + ## Confirm roles and configure audit logging - You must be assigned the Organization Configuration role in the Microsoft Purview compliance portal to manage activity alerts. By default, this role is assigned to the Compliance Administrator and Organization Management role groups. For more information about adding members to role groups, see [Give users access to the Microsoft Purview compliance portal](../security/office-365-security/grant-access-to-the-security-and-compliance-center.md).
compliance Create And Manage Advanced Ediscoveryv2 Case https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-and-manage-advanced-ediscoveryv2-case.md
After setting up Microsoft Purview eDiscovery (Premium) and [assigning permissio
This article also provides a high-level overview of using cases to manage the eDiscovery (Premium) workflow for a legal case or other types of investigations. + ## Create a case Complete the following steps to create a case and add members. The user who creates the case is automatically added as a member. Members of the case can access the case in the Microsoft Purview compliance portal and perform eDiscovery (Premium) tasks.
compliance Create And Manage Inactive Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-and-manage-inactive-mailboxes.md
Inactive mailboxes let you retain former employees' email after they leave your
For more information about inactive mailboxes, see [Learn about inactive mailboxes](inactive-mailboxes-in-office-365.md). + ## Create an inactive mailbox Making a mailbox inactive requires a hold on the mailbox, and then deleting the mailbox or corresponding user account.
compliance Create Apply Retention Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-apply-retention-labels.md
Making retention labels available to people in your organization so that they ca
Use the following instructions for the two admin steps. + ## Before you begin The global admin for your organization has full permissions to create and edit retention labels and their policies. If you aren't signing in as a global admin, see the permissions information for [records management](get-started-with-records-management.md#permissions) or [data lifecycle management](get-started-with-data-lifecycle-management.md#permissions-for-retention-policies-and-retention-labels), depending on the solution you're using.
compliance Create Draft Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-draft-collection.md
search.appverid:
After you've identified custodians and any non-custodian data sources for the case, you're ready to identify and locate a set of documents that are relevant. You do this by using the Collections tool to search data sources for relevant content. You do this by creating a collection that searches specified data sources for content that matches your search criteria. You have the option to create a *draft collection*, which is an estimate of the items are found or you can create a collection that automatically adds the items to a review set. When you create a draft collection, you can views information about the estimated results that matched the search query, such as the total number and size of items found, the different data sources where they were found, and statistics about the search query. You can also preview a sample of items that were returned by the collection. Using these statistics, you can change the search query and rerun the draft collection to narrow your results. Once you're satisfied with the collection results, you can commit the collection to a review set. When you commit a draft collection, the items returned by the collection are added to a review set for review, analysis, and export. + ## Before you create a draft collection - Add custodians and non-custodial data sources to the case before you create a draft collection. This is required so that you can select the data sources when you create a draft collection. For more information, see:
compliance Create Ediscovery Holds https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-ediscovery-holds.md
When you create a hold, you have the following options to scope the content that
- Specify a date range to preserve only the content that was sent, received, or created within that date range. Alternatively, you can hold all content in specified locations regardless of when it was sent, received, or created. + ## How to create an eDiscovery hold To create an eDiscovery hold that's associated with a eDiscovery (Standard) case:
compliance Create Hold Notification https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-hold-notification.md
Using eDiscovery (Premium) custodian communications, organizations can manage th
The article outlines the steps in the hold notification workflow. + ## Step 1: Specify communication details The first step is to specify the appropriate details for legal hold notices or other custodian communications.
compliance Create Info Mgmt Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-info-mgmt-policies.md
You can create an information management policy can at three different locations
For more information, see [Introduction to information management policies](intro-to-info-mgmt-policies.md). + ## Create a policy for multiple content types within a site collection <a name="__toc261001590"> </a>
compliance Create Report On And Delete Multiple Content Searches https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-report-on-and-delete-multiple-content-searches.md
Quickly creating and reporting discovery searches is often an important step in eDiscovery and investigations when you're trying to learn about the underlying data, and the richness and quality of your searches. To help you do this, Security & Compliance PowerShell offers a set of cmdlets to automate time-consuming Content Search tasks. These scripts provide a quick and easy way to create a number of searches, and then run reports of the estimated search results that can help you determine the quantity of data in question. You can also use the scripts to create different versions of searches to compare the results each one produces. These scripts can help you to quickly and efficiently identify and cull your data. + ## Before you create a Content Search - You have to be a member of the eDiscovery Manager role group in the Microsoft Purview compliance portal to run the scripts that are described in this topic.
compliance Create Retention Labels Data Lifecycle Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-retention-labels-data-lifecycle-management.md
Use the following information to help you create retention labels to supplement
> [!NOTE] > Create retention labels from the **Records management** solution rather than **Data lifecycle management** if you need to use retention labels to manage high-value items for business, legal, or regulatory record-keeping requirements. For example, you want to use event-based retention or disposition review. For instructions, see [Use file plan to create and manage retention labels](file-plan-manager.md). + ## Before you begin The global admin for your organization has full permissions to create and edit retention labels and their policies. If you aren't signing in as a global admin, see [Permissions for retention policies and retention labels](get-started-with-data-lifecycle-management.md#permissions-for-retention-policies-and-retention-labels).
compliance Create Retention Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-retention-policies.md
For more information about retention policies and how retention works in Microso
> [!NOTE] > The information on this page is for compliance administrators. If you are not an administrator and want to understand how retention policies have been configured for the apps that you use, contact your help desk, IT department, or administrator. If you're seeing messages about retention policies in Teams chats and channel messages, you might find it helpful to review [Teams messages about retention policies](https://support.microsoft.com/office/teams-messages-about-retention-policies-c151fa2f-1558-4cf9-8e51-854e925b483b). + ## Before you begin The global admin for your organization has full permissions to create and edit retention policies. If you aren't signing in as a global admin, see the [permissions information for data lifecycle management](get-started-with-data-lifecycle-management.md#permissions-for-retention-policies-and-retention-labels).
compliance Create Sensitivity Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-sensitivity-labels.md
Then, create one or more label policies that contain the labels and policy setti
> > For more information, see [Default labels and policies for Microsoft Purview Information Protection](mip-easy-trials.md). + ## Before you begin The global admin for your organization has full permissions to create and manage all aspects of sensitivity labels. If you aren't signing in as a global admin, see [Permissions required to create and manage sensitivity labels](get-started-with-sensitivity-labels.md#permissions-required-to-create-and-manage-sensitivity-labels).
compliance Create Test Tune Dlp Policy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-test-tune-dlp-policy.md
DLP examines email messages and files for sensitive information, like a credit c
- Display a warning to the end user who is sending the email or sharing the file - Actively block the email or file sharing from taking place + ## Permissions Members of your compliance team who will create DLP policies need permissions to the Compliance Center. By default, your tenant admin will have access can give compliance officers and other people access. Follow these steps:
compliance Customer Key Availability Key Roll https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customer-key-availability-key-roll.md
description: "Learn how to roll the customer root keys stored in Azure Key Vault
> [!CAUTION] > Only roll an encryption key that you use with Customer Key when your security or compliance requirements dictate that you must roll the key. In addition, do not delete any keys that are or were associated with policies. When you roll your keys, there will be content encrypted with the previous keys. For example, while active mailboxes will be re-encrypted frequently, inactive, disconnected, and disabled mailboxes may still be encrypted with the previous keys. SharePoint Online performs backup of content for restore and recovery purposes, so there may still be archived content using older keys. + ## About rolling the availability key Microsoft does not expose direct control of the availability key to customers. For example, you can only roll (rotate) the keys that you own in Azure Key Vault. Microsoft 365 rolls the availability keys on an internally-defined schedule. There is no customer-facing, service-level agreement (SLA) for these key rolls. Microsoft 365 rotates the availability key using Microsoft 365 service code in an automated, non-manual process. Microsoft administrators may initiate the roll process. The key is rolled using automated mechanisms without direct access to the key store. Access to the availability key secret store is not provisioned to Microsoft administrators. Availability key rolling leverages the same mechanism used to initially generate the key. For more information about the availability key, see [Understand the availability key](customer-key-availability-key-understand.md).
compliance Customer Key Availability Key Understand https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customer-key-availability-key-understand.md
Sharing the responsibility to protect your data, using various protections and p
See the [Microsoft Trust Center](https://www.microsoft.com/trustcenter/Privacy/govt-requests-for-data) for more information about how we secure keys. + ## Availability key uses The availability key provides recovery capability for scenarios in which an external malefactor or malicious insider steals control of your key vault, or when inadvertent mismanagement results in loss of root keys. This recovery capability applies to all Microsoft 365 services compatible with Customer Key. Individual services use the availability key differently. Microsoft 365 only uses the availability key in the ways described below.
compliance Customer Key Manage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customer-key-manage.md
description: "After you set up Customer Key, learn how to manage it by restoring
After you've set up Customer Key, you'll need to create and assign one or more data encryption policies (DEP). Once you've assigned your DEPs, you can manage your keys as described in this article. Learn more about Customer Key in the related topics. + ## Create a DEP for use with multiple workloads for all tenant users Before you begin, ensure that you've completed the tasks required to set up Customer Key. For information, see [Set up Customer Key](customer-key-set-up.md). To create the DEP, you need the Key Vault URIs you obtained during setup. For information, see [Obtain the URI for each Azure Key Vault key](customer-key-set-up.md#obtain-the-uri-for-each-azure-key-vault-key).
compliance Customer Key Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customer-key-overview.md
description: "In this article, you will learn about how service encryption works
Microsoft 365 provides baseline, volume-level encryption enabled through BitLocker and Distributed Key Manager (DKM). Microsoft 365 offers an added layer of encryption for your content. This content includes data from Exchange Online, Skype for Business, SharePoint Online, OneDrive for Business, and Microsoft Teams. + ## How service encryption, BitLocker, and Customer Key work together Your data is always encrypted at rest in the Microsoft 365 service with BitLocker and DKM. For more information, see [How Exchange Online secures your email secrets](exchange-online-secures-email-secrets.md). Customer Key provides extra protection against viewing of data by unauthorized systems or personnel, and complements BitLocker disk encryption in Microsoft data centers. Service encryption is not meant to prevent Microsoft personnel from accessing your data. Instead, Customer Key helps you meet regulatory or compliance obligations for controlling root keys. You explicitly authorize Microsoft 365 services to use your encryption keys to provide value added cloud services, such as eDiscovery, anti-malware, anti-spam, search indexing, and so on.
compliance Customer Key Set Up https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customer-key-set-up.md
Set up Azure before you can use Customer Key. This article describes the steps y
> [!IMPORTANT] > We strongly recommend that you follow the best practices in this article. These are called out as **TIP** and **IMPORTANT**. Customer Key gives you control over root encryption keys whose scope can be as large as your entire organization. This means that mistakes made with these keys can have a broad impact and may result in service interruptions or irrevocable loss of your data. + ## Before you set up Customer Key Before you get started, ensure that you have the appropriate Azure subscriptions and M365/O365 licensing for your organization. You must use paid Azure Subscriptions. Subscriptions you got through Free, Trial, Sponsorships, MSDN Subscriptions, and those under Legacy Support are not eligible.
compliance Customer Lockbox Requests https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customer-lockbox-requests.md
Customer Lockbox ensures that Microsoft can't access your content to do service
Occasionally, Microsoft engineers help troubleshoot and fix issues that arise with the service. Usually, engineers fix issues using extensive telemetry and debugging tools Microsoft has in place for its services. However, some cases require a Microsoft engineer to access your content to determine the root cause and fix the issue. Customer Lockbox requires the engineer to request access from you as a final step in the approval workflow. This gives you the option to approve or deny the request for your organization, and provide direct-access control to your content. + ## Customer Lockbox overview video > [!VIDEO https://www.microsoft.com/videoplayer/embed/8fecf10b-1f03-4849-8b67-76d3d2a43f26?autoplay=false]
compliance Customize A Built In Sensitive Information Type https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customize-a-built-in-sensitive-information-type.md
When looking for sensitive information in content, you need to describe that inf
You can take this example and apply it to other built-in sensitive information types. For a list of default sensitive information types and XML definitions, see [Sensitive information type entity definitions](sensitive-information-type-entity-definitions.md). + ## Export the XML file of the current rules To export the XML, you need to [connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell).
compliance Data Classification Activity Explorer Available Events https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-activity-explorer-available-events.md
description: "A list of labeling activities that are available in Activity explo
# Labeling activities that are available in Activity explorer + ## Sensitivity label applied This event is generated each time an unlabeled document is labeled or an email is sent with a sensitivity label.
compliance Data Classification Activity Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-activity-explorer.md
There are over 30 different filters available for use, some are:
+ ## Prerequisites Every account that accesses and uses data classification must have a license assigned to it from one of these subscriptions:
compliance Data Classification Content Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-content-explorer.md
description: "Content explorer allows you to natively view labeled items."
Content explorer allows you to natively view the items that were summarized on the overview page. + ## Prerequisites For licensing requirements, see [Information Protection: Data Classification Analytics: Overview Content & Activity Explorer](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection-data-classification-analytics-overview-content--activity-explorer)
compliance Data Classification Increase Accuracy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-increase-accuracy.md
The **Match**, **Not a match** experience is available in:
- Trainable Classifier Matched Items page - Microsoft Purview Data Loss Prevention (DLP) Alerts page + ## Applies to |Classifier |Contextual summary| Redacted preview panel| Match and Not a Match|
compliance Data Classification Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-overview.md
Take a video tour of our data classification features.
Data classification will scan your sensitive content and labeled content before you create any policies. This is called **zero change management**. This lets you see the impact that all the retention and sensitivity labels are having in your environment and empower you to start assessing your protection and governance policy needs. + ## Prerequisites ### Permissions
compliance Data Connector Admin Logs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-connector-admin-logs.md
After you create a data connector to import non-Microsoft data to Microsoft Purv
> [!IMPORTANT] > Audit logging must be enabled for your organization to view admin log. It is enabled by default for Microsoft 365 and Office 365 organizations, but we strongly recommend that you verify auditing status of your organization. For instructions to check auditing status, please click here. For instructions to turn on auditing manually, please click here. Once auditing is turned on, it could take up to 48 hours to log import events. We strongly recommend enabling auditing before a connector is configured. Once a connector is configured, it could take up to 72 hours to generate logs that contains import status summary. + ## Before you view admin logs - Auditing must be enabled for your organization to generate and view admin log for your organization. Auditing is enabled by default in Microsoft Purview. However, we recommend that you verify auditing status of your organization. For instructions, see [Verify the auditing status for your organization](turn-audit-log-search-on-or-off.md#verify-the-auditing-status-for-your-organization). If you need to enable auditing for your organization, see [Turn on auditing](turn-audit-log-search-on-or-off.md#turn-on-auditing).
compliance Data Encryption In Odb And Spo https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-encryption-in-odb-and-spo.md
Understand the basic elements of encryption for data security in OneDrive for Business and SharePoint Online. + ## Security and data encryption in Office 365 Microsoft 365 is a highly secure environment that offers extensive protection in multiple layers: physical data center security, network security, access security, application security, and data security. This article specifically focuses on the in-transit and at-rest encryption side of data security for OneDrive for Business and SharePoint Online.
compliance Data Governance Recommendations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-governance-recommendations.md
The <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">
This topic lists the data-governance recommendations you might see and describes what content is detected to trigger each one. + ## Clean up voicemail This recommendation appears when email messages identified as the message type 'voicemail' are detected in users' mailboxes. Learn more about [message properties in Exchange](/exchange/policy-and-compliance/ediscovery/message-properties-and-search-operators#searchable-properties-in-exchange).
compliance Data Governance Solution https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-governance-solution.md
For data governance that maps and manages data across your data estate, includin
For a data protection solution, see [Deploy an information protection solution with Microsoft Purview](information-protection-solution.md). + ## Licensing To understand your licensing requirements and options, see the information from the Microsoft 365 guidance for security & compliance, [Microsoft Purview Data Lifecycle Management & Microsoft Purview Records Management](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-purview-data-lifecycle-management--microsoft-purview-records-management) section for feature-level licensing requirements.
compliance Data Lifecycle Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-lifecycle-management.md
Microsoft Purview Data Lifecycle Management (formerly Microsoft Information Gove
Retaining and deleting content is often needed for compliance and regulatory requirement, but deleting content that no longer has business value also helps you manage risk and liability. For example, it reduces your attack surface. + ## Microsoft 365 features **Retention policies** are the cornerstone for data lifecycle management. Use these policies for Microsoft 365 workloads that include Exchange, SharePoint, OneDrive, Teams, and Yammer. Configure whether content for these services needs to be retained indefinitely, or for a specific period if users edit or delete it. Or you can configure the policy to automatically permanently delete the content after a specified period if it's not already deleted. You can also combine these two actions for retain and then delete, which is a very typical configuration. For example, retain email for three years and then delete it.
compliance Data Loss Prevention Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-loss-prevention-policies.md
With a DLP policy, you can:
To view alerts and metadata related to your DLP policies you can use the [DLP Alerts Management Dashboard](dlp-configure-view-alerts-policies.md). You can also view policy match reports to assess how your organization is complying with a DLP policy. If a DLP policy allows users to override a policy tip and report a false positive, you can also view what users have reported -->+ ## Create and manage DLP policies You create and manage DLP policies on the data loss prevention page in the Microsoft Purview compliance portal.
compliance Data Spillage Scenariosearch And Purge https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-spillage-scenariosearch-and-purge.md
search.appverid:
**What is data spillage and why should you care?** Data spillage is when a confidential document is released into an untrusted environment. When a data spillage incident is detected, it's important to quickly assess the size and locations of the spillage, examine user activities around it, and then permanently purge the spilled data from the system. + ## Data spillage scenario You're a lead information security officer at Contoso. You are informed of a data spillage situation where an employee unknowingly shared a highly confidential document with multiple people through email. You want to quickly assess who received this document internally and externally. Once identified, you would like to share case findings with other investigators to review, and then permanently remove the data from Office 365. After the investigation is complete, you want to generate a report with the evidence of permanent removal and other case details for any future reference.
compliance De Duplication In Ediscovery Search Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/de-duplication-in-ediscovery-search-results.md
This article describes how de-duplication of eDiscovery search results works and
When using eDiscovery tools to export the results of an eDiscovery search, you have the option to de-duplicate the results that are exported. What does this mean? When you enable de-duplication (by default, de-duplication isn't enabled), only one copy of an email message is exported even though multiple instances of the same message might have been found in the mailboxes that were searched. De-duplication helps you save time by reducing the number of items that you have to review and analyze after the search results are exported. But it's important to understand how de-duplication works and be aware that there are limitations to the algorithm that might cause a unique item to be marked as a duplicate during the export process. + ## How duplicate messages are identified eDiscovery tools use a combination of the following email properties to determine whether a message is a duplicate:
compliance Decision Based On The Results In Advanced Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/decision-based-on-the-results-in-advanced-ediscovery.md
In the Relevance module in eDiscovery (Premium), the Decide tab provides additional information for viewing and using decision-support statistics for determining the size of the review set of case files. + ## Using the Decide tab ![Relevance Decide.](../media/f32fed89-f3b5-404a-90c7-ea25d2eb58a9.png)
compliance Declare Records https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/declare-records.md
If you're not sure whether to use a record or a regulatory record, see [Compare
You can then either publish those labels in a retention label policy so that users and administrators can apply them to content, or for labels that mark items as records (but not regulatory records), auto-apply those labels to content that you want to declare a record. + ## How to display the option to mark content as a regulatory record > [!NOTE]
compliance Define Mail Flow Rules To Encrypt Email https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/define-mail-flow-rules-to-encrypt-email.md
For information about the components that make up mail flow rules and how mail f
> [!IMPORTANT] > For hybrid Exchange environments, on-premises users can send and receive encrypted mail using message encryption only if email is routed through Exchange Online. To configure message encryption in a hybrid Exchange environment, you need to first [configure hybrid using the Hybrid Configuration wizard](/Exchange/exchange-hybrid) and then [configure mail to flow from Office 365 to your email server](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/set-up-connectors-to-route-mail#part-1-configure-mail-to-flow-from-office-365-to-your-on-premises-email-server) and [configure mail to flow from your email server to Office 365](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/set-up-connectors-to-route-mail#part-2-configure-mail-to-flow-from-your-email-server-to-office-365). Once you've configured mail to flow through Office 365, then you can configure mail flow rules for message encryption by using this guidance. + ## Create mail flow rules to encrypt email messages with Microsoft Purview Message Encryption You can define mail flow rules for triggering message encryption with by using the EAC.
compliance Delete An Inactive Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/delete-an-inactive-mailbox.md
An inactive mailbox is used to preserve a former employee's email after they lea
See the [More information](#more-information) section for a description of what happens after holds are removed from an inactive mailbox. + ## Before you delete an inactive mailbox - You must use Exchange Online PowerShell to remove holds from an inactive mailbox. You can't use the Exchange admin center (EAC) or the Microsoft Purview compliance portal for these procedures. For step-by-step instructions to use Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).
compliance Delete Items In The Recoverable Items Folder Of Mailboxes On Hold https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/delete-items-in-the-recoverable-items-folder-of-mailboxes-on-hold.md
This article explains how admins can delete items from the Recoverable Items fol
> [!CAUTION] > The procedures outlined in this article will result in data being permanently deleted (purged) from an Exchange Online mailbox. That means messages that you delete from the Recoverable Items folder can't be recovered and won't be available for legal discovery or other compliance purposes. If you want to delete messages from a mailbox that's placed on hold as part of a Litigation Hold, In-Place Hold, eDiscovery hold, or retention policy created in the Microsoft Purview compliance portal, check with your records management or legal departments before removing the hold. Your organization might have a policy that defines whether a mailbox on hold or a data spillage incident takes priority. + ## Before you delete items - To create and run a Content Search, you have to be a member of the eDiscovery Manager role group or be assigned the Compliance Search management role. To delete messages, you have to be a member of the Organization Management role group or be assigned the Search And Purge management role. For information about adding users to a role group, see [Assign eDiscovery permissions](./assign-ediscovery-permissions.md).
compliance Deploy Facebook Connector https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/deploy-facebook-connector.md
This article contains the step-by-step process to deploy a connector that uses the Office 365 Import service to import data from Facebook Business pages to Microsoft 365. For a high-level overview of this process and a list of prerequisites required to deploy a Facebook connector, see [Set up a connector to archive Facebook data](archive-facebook-data-with-sample-connector.md). + ## Step 1: Create an app in Azure Active Directory 1. Go to <https://portal.azure.com> and sign in using the credentials of a global admin account.
compliance Deploy Twitter Connector https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/deploy-twitter-connector.md
This article contains the step-by-step process to deploy a connector that uses the Office 365 Import service to import data from your organization's Twitter account to Microsoft 365. For a high-level overview of this process and a list of prerequisites required to deploy a Twitter connector, see [Set up a connector to archive Twitter data ](archive-twitter-data-with-sample-connector.md). + ## Step 1: Create an app in Azure Active Directory 1. Go to <https://portal.azure.com> and sign in using the credentials of a global admin account.
compliance Deprecating Ome Viewer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/deprecating-ome-viewer.md
description: The Office 365 Message Encryption (OME) Viewer app was removed from
On August 15, 2018, we removed the Office 365 Message Encryption (OME) Viewer mobile app from Android and Apple stores. The Office 365 Message Encryption Viewer mobile app was required to read email messages and attachments that were encrypted with the previous version of OME on Apple and Android phones. Apart from removing the OME Viewer app, we are not making any other changes to the previous version of OME. + ## Changes from August 2018 As announced September 2017, we have released a new version of [Office 365 Message Encryption](https://aka.ms/ome2017) so that users can send encrypted and protected messages to anyone inside or outside the organization without the requirement of the mobile app. Since then, we've added additional capabilities:
compliance Device Onboarding Configure Proxy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-configure-proxy.md
The WinHTTP configuration setting is independent of the Windows Internet (WinINe
- Registry-based configuration - WinHTTP configured using netsh command ΓÇô Suitable only for desktops in a stable topology (for example: a desktop in a corporate network behind the same proxy) + ## Configure the proxy server manually using a registry-based static proxy For endpoint devices that aren't permitted to connect to the Internet, you need to configure a registry-based static proxy. You need to configure this to allow only Microsoft Endpoint DLP to report diagnostic data and communicate with Microsoft endpoint cloud service.
compliance Device Onboarding Gp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-gp.md
description: Use Group Policy to deploy the configuration package on Windows 10
> For Windows Server 2019, you may need to replace NT AUTHORITY\Well-Known-System-Account with NT AUTHORITY\SYSTEM of the XML file that the Group Policy preference creates. + ## Onboard devices using Group Policy 1. Open the [Compliance center](https://compliance.microsoft.com).
compliance Device Onboarding Macos Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-macos-overview.md
MacOS devices can be onboarded into Microsoft Purview solutions using either Int
- [Endpoint data loss prevention (DLP)](./endpoint-dlp-learn-about.md) - [Insider risk management](insider-risk-management.md) + ## Before you begin Before you get started with Endpoint DLP on macOS devices (Catalina 10.15 or later), you should familiarize yourself with these articles:
compliance Device Onboarding Mdm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-mdm.md
description: Use Mobile Device Management tools to deploy the configuration pack
You can use mobile device management (MDM) solutions to configure devices. Microsoft 365 information protection supports MDMs by providing OMA-URIs to create policies to manage devices. + ## Before you begin If you're using Microsoft Intune, you must have the device MDM Enrolled. Otherwise, settings will not be applied successfully.
compliance Device Onboarding Offboarding Macos Intune Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-offboarding-macos-intune-mde.md
description: Learn how to onboard and offboard macOS devices into Microsoft Purv
- [Insider risk management](insider-risk-management.md) + ## Before you begin - Make sure your [macOS devices are onboarded into Intune](/mem/intune/fundamentals/deployment-guide-platform-macos) and enrolled in the [Company Portal app](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp).
compliance Device Onboarding Offboarding Macos Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-offboarding-macos-intune.md
You can use Intune to onboard macOS devices into Microsoft Purview solutions.
- [Endpoint data loss prevention (DLP)](./endpoint-dlp-learn-about.md) - [Insider risk management](insider-risk-management.md) + ## Before you begin - Make sure your [macOS devices are onboarded into Intune](/mem/intune/fundamentals/deployment-guide-platform-macos) and are enrolled in the [Company Portal app](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp).
compliance Device Onboarding Offboarding Macos Jamfpro Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-offboarding-macos-jamfpro-mde.md
You can use JAMF Pro to onboard macOS devices into Microsoft Purview solutions.
- [Insider risk management](insider-risk-management.md) + ## Before you begin - Make sure your [macOS devices are managed through JAMF pro](https://www.jamf.com/resources/product-documentation/jamf-pro-installation-guide-for-mac/) and are associated with an identity (Azure AD joined UPN) through JAMF Connect or Intune.
compliance Device Onboarding Offboarding Macos Jamfpro https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-offboarding-macos-jamfpro.md
You can use JAMF Pro to onboard macOS devices into Microsoft Purview solutions l
- [Endpoint data loss prevention (DLP)](./endpoint-dlp-learn-about.md) - [Insider risk management](insider-risk-management.md) + ## Before you begin - Make sure your [macOS devices are managed through JAMF pro](https://www.jamf.com/resources/product-documentation/jamf-pro-installation-guide-for-mac/) and are associated with an identity (Azure AD joined UPN) through JAMF Connect or Intune.
compliance Device Onboarding Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-overview.md
Insider risk management uses the full breadth of service and 3rd-party indicator
Device onboarding is shared across Microsoft 365 and Microsoft Defender for Endpoint (MDE). If you've already onboarded devices to MDE, they will appear in the managed devices list and no further steps are necessary to onboard those specific devices. Onboarding devices in Compliance center also onboards them into MDE. + ## Before you begin ### SKU/subscriptions licensing
compliance Device Onboarding Sccm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-sccm.md
The default value in case the registry key doesn't exist is 1.
For more information about System Center Configuration Manager Compliance, see [Introduction to compliance settings in System Center 2012 R2 Configuration Manager](/previous-versions/system-center/system-center-2012-R2/gg682139(v=technet.10)). + ## Other recommended configuration settings After onboarding devices to the service, it's important to take advantage of the included threat protection capabilities by enabling them with the following recommended configuration settings.
compliance Device Onboarding Script https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-script.md
You can also manually onboard individual devices to Microsoft 365. You might wan
> > To deploy at scale, use [other deployment options](device-onboarding-overview.md). For example, you can deploy an onboarding script to more than 10 devices in production with the script available in [Onboard Windows 10 devices using Group Policy](device-onboarding-gp.md). + ## Onboard devices 1. Get the configuration package .zip file (*DeviceComplianceOnboardingPackage.zip*) package from [Microsoft Purview compliance portal](https://compliance.microsoft.com)
compliance Device Onboarding Vdi https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-vdi.md
description: Deploy the configuration package on virtual desktop infrastructure
> [!WARNING] > Endpoint data loss prevention support for Windows Virtual Desktop supports single session scenarios. Multi-session scenarios on Windows Virtual Desktop are currently not supported. + ## Onboard VDI devices Microsoft 365 supports non-persistent virtual desktop infrastructure (VDI) session onboarding.
compliance Disable Reports When You Export Content Search Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/disable-reports-when-you-export-content-search-results.md
When you use the eDiscovery Export tool to export the results of a Content Search in the Microsoft Purview compliance portal, the tool automatically creates and exports two reports that contain additional information about the exported content. These reports are the Results.csv file and the Manifest.xml file (see the [Frequently asked questions about disabling export reports](#frequently-asked-questions-about-disabling-export-reports) section in this topic for detailed descriptions of these reports). Because these files can be very large, you can speed up the download time and save disk space by preventing these files from being exported. You can do this by changing the Windows Registry on the computer that you use to export the search results. If you want to include the reports at a later time, you can edit the registry setting. + ## Create registry settings to disable the export reports Perform the following procedure on the computer that you'll use to export the results a content search.
compliance Disposition https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/disposition.md
description: "Monitor and manage the disposal of content for when you use a disp
Use the **Disposition** page from **Records Management** in the Microsoft Purview compliance portal to manage disposition reviews and view the metadata of [records](records-management.md#records) that have been automatically deleted at the end of their retention period. + ## Prerequisites for viewing content dispositions To manage disposition reviews and confirm that records have been deleted, you must have sufficient permissions and auditing must be enabled. Also be aware of any [limitations](retention-limits.md#maximum-numbers-for-disposition) for disposition.
compliance Dlp Alerts Dashboard Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-alerts-dashboard-get-started.md
Microsoft Purview Data Loss Prevention (DLP) policies can take protective action
If you are new to DLP alerts, you should review [Learn about the data loss prevention alerts dashboard](dlp-alerts-dashboard-learn.md) + ## Before you begin Before you begin, make sure you have the necessary prerequisites:
compliance Dlp Alerts Dashboard Learn https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-alerts-dashboard-learn.md
When the criteria in a Microsoft Purview Data Loss Prevention (DLP) policy is ma
<!-- [Microsoft Purview compliance portal](https://compliance.microsoft.com/)--> + ## Workloads The [DLP alert management dashboard](https://compliance.microsoft.com/datalossprevention?viewid=dlpalerts), in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>, shows alerts for DLP policies on these workloads:
compliance Dlp Chrome Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-chrome-get-started.md
description: "Prepare for and deploy the Microsoft Purview Extension."
Use these procedures to roll out the Microsoft Purview Extension. + ## Before you begin To use Microsoft Purview Extension, the device must be onboarded into endpoint DLP. Review these articles if you are new to DLP or endpoint DLP
compliance Dlp Chrome Learn About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-chrome-learn-about.md
description: "The Microsoft Purview Extension extends monitoring and control of
Once the Extension is installed on a Windows 10 device, organizations can monitor when a user attempts to access or upload a sensitive item to a cloud service using Google Chrome and enforce protective actions via DLP. + ## Activities you can monitor and take action on The extension enables you to audit and manage the following types of activities users take on sensitive items on devices running Windows 10.
compliance Dlp Conditions And Exceptions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-conditions-and-exceptions.md
Most conditions and exceptions have one property that supports one or more value
Actions typically require additional properties. For example, when the DLP policy rule redirects a message, you need to specify where the message is redirected to. <!-- Some actions have multiple properties that are available or required. For example, when the rule adds a header field to the message header, you need to specify both the name and value of the header. When the rule adds a disclaimer to messages, you need to specify the disclaimer text, but you can also specify where to insert the text, or what to do if the disclaimer can't be added to the message. Typically, you can configure multiple actions in a rule, but some actions are exclusive. For example, one rule can't reject and redirect the same message.--> + ## Conditions and exceptions for DLP policies The tables in the following sections describe the conditions and exceptions that are available in DLP.
compliance Dlp Configure Endpoint Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-configure-endpoint-settings.md
You must configure these settings if you intend to control:
- How business justifications for overriding policies appear in policy tips. - If activities on Office, PDF, and CSV files are automatically audited. + ## DLP settings Before you get started, you should set up your DLP settings.
compliance Dlp Configure View Alerts Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-configure-view-alerts-policies.md
description: Learn how to define and manage alerts for data loss prevention poli
Microsoft Purview Data Loss Prevention (DLP) policies can take protective actions to prevent unintentional sharing of sensitive items. When an action is taken on a sensitive item, you can be notified by configuring alerts for DLP. This article shows you how to define rich alert policies that are linked to your data loss prevention (DLP) policies. You'll see how to use the new DLP alert management dashboard in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a> to view alerts, events, and associated metadata for DLP policy violations. + ## Features The following features are part of this:
compliance Dlp Learn About Dlp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-learn-about-dlp.md
In Microsoft Purview, you implement data loss prevention by defining and applyin
DLP detects sensitive items by using deep content analysis, not by just a simple text scan. Content is analyzed for primary data matches to keywords, by the evaluation of regular expressions, by internal function validation, and by secondary data matches that are in proximity to the primary data match. Beyond that DLP also uses machine learning algorithms and other methods to detect content that matches your DLP policies. + ## DLP is part of the larger Microsoft Purview offering DLP is just one of the Microsoft Purview tools that you will use to help protect your sensitive items wherever they live or travel. You should understand the other tools in the Microsoft Purview tools set, how they interrelate, and work better together. See, [Microsoft Purview tools](protect-information.md) to learn more about the information protection process.
compliance Dlp Microsoft Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-microsoft-teams.md
You can extend the Teams DLP policy to cover SharePoint Online and OneDrive for
- **Share with team (internally)**: You share the channel with another team TeamB in Contoso. That another team may have a different DLP policy, but that doesnΓÇÖt matter. P1 will apply to everyone in this shared channel, including both TeamA and TeamB users. - **Share with team (cross tenant)**: You share the channel with a team TeamF in Fabrikam. Fabrikam may have its own DLP policy, but that doesnΓÇÖt matter. P1 will apply to everyone in this shared channel, including both TeamA (Contoso) and TeamF (Fabrikam) users. + ## DLP Licensing for Microsoft Teams [Data loss prevention](dlp-learn-about-dlp.md) capabilities include Microsoft Teams chat and channel messages, **including private channel messages** for:
compliance Dlp Migrate Exo Policy To Unified Dlp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-migrate-exo-policy-to-unified-dlp.md
The migration wizard works by reading the configuration of your DLP policies in
The migration wizard only migrates EXO policies and associated mail flow rules. Standalone Exchange mail flow rules aren't migrated. + ## Migration workflow There are four phases to migrating DLP policies from Exchange into the Unified DLP management console in the compliance portal.
compliance Dlp On Premises Scanner Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-on-premises-scanner-get-started.md
description: "Set up data loss prevention on-premises scanner"
This article walks you through the prerequisites and configuration for the Microsoft Purview data loss prevention on-premises scanner. + ## Before you begin ### SKU/subscriptions licensing
compliance Dlp On Premises Scanner Learn https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-on-premises-scanner-learn.md
Data loss prevention on-premises scanner is part of the Microsoft Purview Data L
The **DLP on-premises scanner** crawls on-premises data-at-rest in file shares and SharePoint document libraries and folders for sensitive items that, if leaked, would pose a risk to your organization or pose a risk of compliance policy violation. This gives you the visibility and control you need to ensure that sensitive items are used and protected properly, and to help prevent risky behavior that might compromise them. The DLP on-premises scanner detects sensitive information by using [built-in](sensitive-information-type-entity-definitions.md) or [custom sensitive information](create-a-custom-sensitive-information-type.md) types, [sensitivity labels](sensitivity-labels.md) or file properties. The information about what users are doing with sensitive items is made visible in [activity explorer](data-classification-activity-explorer.md) and you can enforce protective actions on those items via [DLP policies](create-test-tune-dlp-policy.md). + ## The DLP on-premises scanner relies on Azure Information Protection scanner The DLP on-premises scanner relies on a full implementation of the Azure Information Protection (AIP) scanner to monitor, label and protect sensitive items. If you aren't familiar with the AIP scanner, we strongly recommend familiarizing yourself with it. See these articles:
compliance Dlp On Premises Scanner Use https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-on-premises-scanner-use.md
If you want to enforce DLP rules on the scanned files, enforcement must be enabl
2. Edit the policy. 3. On the **Test or turn on the policy** page, select **Yes, turn it on right away**. + ## See also - [Learn about DLP on-premises scanner](dlp-on-premises-scanner-learn.md)
compliance Dlp Overview Plan For Dlp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-overview-plan-for-dlp.md
description: "Overview of the planning process for data loss prevention"
Every organization will plan for and implement data loss prevention (DLP) differently, because every organization's business needs, goals, resources, and situation are unique to them. However, there are elements that are common to all successful DLP implementations. This article presents the best practices that are used by organizations in their DLP planning. + ## Multiple starting points Many organizations choose to implement DLP to comply with various governmental or industry regulations. For example, the European Union's General Data Protection Regulation (GDPR), or the Health Insurance Portability and Accountability Act (HIPAA), or the California Consumer Privacy Act (CCPA). They also implement data loss prevention to protect their intellectual property. But the starting place and ultimate destination in the DLP journey vary.
compliance Dlp Policy Design https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-design.md
If you are new to Microsoft Purview DLP, it's helpful to work through these arti
- [Set goals and strategy](dlp-overview-plan-for-dlp.md#set-goals-and-strategy) - [Data Loss Prevention policy reference](dlp-policy-reference.md#data-loss-prevention-policy-reference) - this article introduces all the components of a DLP policy and how each one influences the behavior of a policy + ## Policy design overview [Designing a policy](#policy-design-process) is mostly about clearly [defining your business needs, documenting them in a policy intent statement](#define-intent-for-the-policy) and then [mapping those needs to policy configuration](#map-business-needs-to-policy-configuration). You'll use the decisions you made in your planning phase to inform some of your policy design decisions.
compliance Dlp Policy Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md
Microsoft Purview Data Loss Prevention (DLP) policies have many components to configure. To create an effective policy, you need to understand what the purpose of each component is and how its configuration alters the behavior of the policy. This article provides a detailed anatomy of a DLP policy. + ## Policy templates DLP policy templates are pre-sorted into four categories:
compliance Dlp Policy Tips Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-tips-reference.md
DLP policy tips in Outlook Web Access is supported for all the conditions, excep
- Prepend email subject - Remove O365 Message Encryption and rights protection + ## Outlook 2013 and later supports showing policy tips for only some conditions and exceptions Currently, Outlook 2013 and later supports showing policy tips for policies which do not contain any condition or exception apart from the below mentioned conditions and corresponding exceptions:
compliance Dlp Powerbi Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-powerbi-get-started.md
description: "Prepare for and deploy DLP to PowerBI locations."
To help organizations detect and protect their sensitive data, [Microsoft Purview data loss prevention (DLP) polices](/microsoft-365/compliance/dlp-learn-about-dlp) support Power BI. When a PowerBI data set matches the criteria in a DLP policy, an alert that explains the nature of the sensitive content can be triggered. This alert is also registered in the data loss prevention **Alerts** tab in the Microsoft compliance portal for monitoring and management by administrators. In addition, email alerts can be sent to administrators and specified users. + ## Considerations and limitations - DLP policies apply to workspaces. Only workspaces hosted in Premium Gen2 capacities are supported. For more information, see [What is Power BI Premium Gen2?](/power-bi/enterprise/service-premium-gen2-what-is).
compliance Dlp Sensitivity Label As Condition https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-sensitivity-label-as-condition.md
Sensitivity labels appear as an option in the **Content contains** list.
> **Sensitivity Labels** as a condition will not be available if you have selected **Teams chat and channel messages** as a location to apply the DLP policy. + ## Supported items, scenarios, and policy tips You can use sensitivity labels as conditions on these items and in these scenarios.
compliance Dlp Share Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-share-alerts.md
Users with the [appropriate permissions](dlp-configure-view-alerts-policies.md#r
You can share an alert with users that you give limited permissions to using the procedures in this article. + ## Before you begin If you aren't familiar with DLP Alerts, see [Configure and view alerts for data loss prevention policies](/microsoft-365/compliance/dlp-configure-view-alerts-policies).
compliance Dlp Teams Default Policy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-teams-default-policy.md
description: "Learn about the default data loss prevention policy in Microsoft T
[Microsoft Purview Data Loss Prevention](dlp-learn-about-dlp.md) capabilities have been extended to include Microsoft Teams chat and channel messages, including private channel messages. As a part of this release, we created a default DLP policy for Microsoft Teams for first-time customers to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>. + ## Licensing For complete licensing information for DLP in Microsoft Teams, see [Information Protection: Data Loss Prevention for Teams](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection-data-loss-prevention-for-teams).
compliance Dlp Use Policies Non Microsoft Cloud Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-use-policies-non-microsoft-cloud-apps.md
description: Learn how to use dlp policies for non-Microsoft cloud apps.
You can scope DLP policies to Microsoft Defender for Cloud Apps to monitor, detect and take actions when sensitive items are used and shared via non-Microsoft cloud apps. + ## Before you begin ### SKU/subscriptions licensing
compliance Document Fingerprinting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/document-fingerprinting.md
description: "Document Fingerprinting makes it easier for you to protect informa
Information workers in your organization handle many kinds of sensitive information during a typical day. In the Microsoft Purview compliance portal, Document Fingerprinting makes it easier for you to protect this information by identifying standard forms that are used throughout your organization. This topic describes the concepts behind Document Fingerprinting and how to create one by using PowerShell. + ## Basic scenario for Document Fingerprinting Document Fingerprinting is a Microsoft Purview Data Loss Prevention (DLP) feature that converts a standard form into a sensitive information type, which you can use in the rules of your DLP policies. For example, you can create a document fingerprint based on a blank patent template and then create a DLP policy that detects and blocks all outgoing patent templates with sensitive content filled in. Optionally, you can set up [policy tips](use-notifications-and-policy-tips.md) to notify senders that they might be sending sensitive information, and the sender should verify that the recipients are qualified to receive the patents. This process works with any text-based forms used in your organization. Additional examples of forms that you can upload include:
compliance Double Key Encryption Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/double-key-encryption-overview.md
Have a question about how Double Key Encryption works? Check for an answer here. + ## What is Double Key Encryption (DKE)? Double Key Encryption enables customers to protect their highly sensitive data to meet specialized requirements. It helps you maintain full control of their encryption keys. It uses two keys to protect data; one key in your control and a second key stored securely in Microsoft Azure. Viewing data protected with Double Key Encryption requires access to both keys. Since Microsoft can access only one of these keys, protected data remains inaccessible to Microsoft, ensuring that you have full control over your data privacy and security.
compliance Double Key Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/double-key-encryption.md
Double Key Encryption supports both cloud and on-premises deployments. These dep
For more information about the default, cloud-based tenant root keys, see [Planning and implementing your Azure Information Protection tenant key](/azure/information-protection/plan-implement-tenant-key). + ## When your organization should adopt DKE Double Key Encryption is intended for your most sensitive data that is subject to the strictest protection requirements. DKE isn't intended for all data. In general, you'll be using Double Key Encryption to protect only a small part of your overall data. You should do due diligence in identifying the right data to cover with this solution before you deploy. In some cases, you might need to narrow your scope and use other solutions for most of your data, such as Microsoft Purview Information Protection with Microsoft-managed keys or BYOK. These solutions are sufficient for documents that aren't subject to enhanced protections and regulatory requirements. Also, these solutions enable you to use the most powerful Office 365 services; services that you can't use with DKE encrypted content. For example:
compliance Download Export Jobs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/download-export-jobs.md
When you export documents from a review set in an eDiscovery (Premium) case, you have the option to export them to an Azure Storage account managed by your organization. If you use this option, the documents are uploaded to your Azure Storage location. After they are exported, you can access the documents (and download them to a local computer or other location) by using the Azure Storage Explorer. This article provides instructions for how to export documents to your Azure Storage account and the use the Azure Storage Explorer to connect to an Azure Storage location to download the exported documents. For more information about Azure Storage Explorer, see [Use Azure Storage Explorer](/azure/storage/blobs/storage-quickstart-blobs-storage-explorer). + ## Before you export documents from a review set - You need to provide a shared access signature (SAS) token for your Azure Storage account and the URL for a specific container in the storage account to export documents from a review set. Be sure to have these at hand (for example, copied to a text file) when you perform Step 2
compliance Ediscovery Cjk Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-cjk-support.md
Microsoft Purview eDiscovery (Premium) supports double-byte character set langua
- When you [analyze case data in a review set](analyzing-data-in-review-set.md) by using near duplicate detection, email threading, and themes analytics. + ## Frequently asked questions **How do I create a search to collect items that contains CJK characters?**
For information about how to change display language and time zone, see [How to
- The [Relevance module](using-relevance.md) used to analyze data doesn't support CJK languages. -- [Query-based holds](managing-holds.md#manage-non-custodial-holds) aren't supported for CJK languages.
+- [Query-based holds](managing-holds.md#manage-non-custodial-holds) aren't supported for CJK languages.
compliance Ediscovery Decryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-decryption.md
To make it easier to manage encrypted content in the eDiscovery workflow, Micros
Prior to this new capability, only the content of an email message protected by rights management (and not attached files) were decrypted. Encrypted documents in SharePoint and OneDrive couldn't be decrypted during the eDiscovery workflow. Now, files that are encrypted with a Microsoft encryption technology is located on a SharePoint or OneDrive account are searchable and decrypted when the search results are prepared for preview, added to a review set in eDiscovery (Premium), and exported. Additionally, encrypted documents in SharePoint and OneDrive that are attached to an email message (as a copy) are searchable. This decryption capability allows eDiscovery managers to view the content of encrypted email attachments and site documents when previewing search results, and review them after they have been added to a review set in eDiscovery (Premium). + ## Supported encryption technologies For Exchange, Microsoft eDiscovery tools support items encrypted with Microsoft encryption technologies. These technologies are Azure Rights Management (Azure RMS)<sup>3</sup> and Microsoft Purview Information Protection (specifically sensitivity labels). For more information about Microsoft encryption technologies, see [Encryption](encryption.md) and the various [email encryption](email-encryption.md#comparing-email-encryption-options-available-in-office-365) options available. Content encrypted by S/MIME or third-party encryption technologies isn't supported. For example, previewing or exporting content encrypted with non-Microsoft technologies isn't supported.
compliance Ediscovery Diagnostic Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-diagnostic-info.md
Occasionally Microsoft Support engineers require specific information about your
> [!IMPORTANT] > The output from the cmdlets and diagnostic information described in this article may include sensitive information about litigation or internal investigations in your organization. Before sending the raw diagnostic information to Microsoft Support, you should review the information and redact any sensitive information (such as names or other information about parties to litigation or investigation) by replacing it with `XXXXXXX`. Using this method will also indicate to the Microsoft Support engineer that information was redacted. + ## Collect diagnostic information for eDiscovery (Standard) Collecting diagnostic information for eDiscovery (Standard) is cmdlet-based, so you'll have to use Security & Compliance PowerShell. The following PowerShell examples will run cmdlets and then save the output to a specified text file. In most support cases, you should only have to run one of these commands.
compliance Ediscovery Graph Connector https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-graph-connector.md
Microsoft 365 customers can perform eDiscovery searches on content ingested for
With Graph connectors, you can enable content from external data sources to be available to Microsoft Purview eDiscovery premium solution. Learn more about establishing Graph Connectors for your organization here: [Microsoft Graph connectors overview for Microsoft Search](/microsoftsearch/connectors-overview). + ## Add Graph Connector as a data source within a case Once Graph Connectors are established for an organization and eDiscovery is enabled, the option to add the Graph Connector data source to the case will be available under non-Microsoft 365 locations. Only the connectors that have been established and enabled will be available to the eDiscovery manager for inclusion in a case.
compliance Ediscovery Kql Editor https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-kql-editor.md
Here are the key benefits to using the KQL editor:
The KQL editor is also available when you create query-based holds in eDiscovery (Standard) and eDiscovery (Premium). + ## Displaying the KQL editor When you create or edit an eDiscovery search, the option to display and use the KQL editor is located on the **Conditions** page in the search or collections wizard.
compliance Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery.md
search.appverid:
# Microsoft Purview eDiscovery solutions
-> [!TIP]
-> *Did you know you can try the premium versions of all nine Microsoft Purview solutions for free?* Use the 90-day Purview solutions trial to explore how robust Purview capabilities can help your organization meet its compliance needs. Microsoft 365 E3 and Office 365 E3 customers can start now at the [Microsoft Purview compliance portal trials hub](https://compliance.microsoft.com/trialHorizontalHub?sku=ComplianceE5&ref=DocsRef). Learn details about [who can sign up and trial terms](compliance-easy-trials.md).
- Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in legal cases. You can use eDiscovery tools in Microsoft Purview to search for content in Exchange Online, OneDrive for Business, SharePoint Online, Microsoft Teams, Microsoft 365 Groups, and Yammer teams. You can search mailboxes and sites in the same eDiscovery search, and then export the search results. You can use Microsoft Purview eDiscovery (Standard) cases to identify, hold, and export content found in mailboxes and sites. If your organization has an Office 365 E5 or Microsoft 365 E5 subscription (or related E5 add-on subscriptions), you can further manage custodians and analyze content by using the feature-rich Microsoft Purview eDiscovery (Premium) solution in Microsoft 365. + ## eDiscovery solutions Microsoft Purview provides three eDiscovery solutions: Content search, eDiscovery (Standard), and eDiscovery (Premium).
compliance Email Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/email-encryption.md
Microsoft 365 delivers multiple encryption options to help you meet your busines
- Information Rights Management (IRM). + ## How Microsoft 365 uses email encryption Encryption is the process by which information is encoded so that only an authorized recipient can decode and consume the information. Microsoft 365 uses encryption in two ways: in the service, and as a customer control. In the service, encryption is used in Microsoft 365 by default; you don't have to configure anything. For example, Microsoft 365 uses Transport Layer Security (TLS) to encrypt the connection, or session, between two servers.
compliance Email Threading In Advanced Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/email-threading-in-advanced-ediscovery.md
Consider an email conversation that has been going on for a while. In most cases, the last message in the email thread will include the contents of all the preceding messages. Therefore, reviewing the last message will give a complete context of the conversation that happened in the thread. Email threading identifies such messages so that reviewers can review a fraction of collected documents without losing any context. + ## What does email threading do? Email threading parses each email thread and deconstructs it to individual messages. Each email thread is a chain of individual messages. Microsoft Purview eDiscovery (Premium) analyzes all email messages in the review set to determine whether an email message has unique content or if the chain (parent messages) are wholly contained in the final message in the email thread. Email messages are divided into four inclusive values:
compliance Enable Archive Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/enable-archive-mailboxes.md
Use the information in this article to enable or disable an archive mailbox by u
Currently, you can use either the [Microsoft Purview compliance portal](microsoft-365-compliance-center.md) or the [new Exchange admin center (EAC)](/exchange/exchange-admin-center) to enable or disable archive mailboxes. + ## Get the necessary permissions You must be assigned the Mail Recipients role in Exchange Online to enable or disable archive mailboxes. By default, this role is assigned to the Recipient Management and Organization Management role groups on the **Permissions** page in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2059104" target="_blank">Exchange admin center</a>.
compliance Enable Autoexpanding Archiving https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/enable-autoexpanding-archiving.md
You can use the Exchange Online auto-expanding archiving feature to enable additional storage space for archive mailboxes. When auto-expanding archiving is turned on, additional storage space is automatically added to a user's archive mailbox until it reaches the storage limit of 1.5 TB. You can turn on auto-expanding archiving for everyone in your organization or just for specific users. For more information about auto-expanding archiving, see [Learn about auto-expanding archiving](autoexpanding-archiving.md). + ## Before you enable auto-expanding archiving - Understand the following restrictions:
compliance Enable Mailbox Auditing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/enable-mailbox-auditing.md
Here are some benefits of mailbox auditing on by default:
> - The important thing to remember about the release of mailbox auditing on by default is: you don't need to do anything to manage mailbox auditing. However, to learn more, customize mailbox auditing from the default settings, or turn it off altogether, this article can help you. > - By default, only mailbox audit events for E5 users are available in audit log searches in the Microsoft Purview compliance portal or via the Office 365 Management Activity API. For more information, see the [More information](#more-information) section in this article. + ## Verify mailbox auditing on by default is turned on To verify that mailbox auditing on by default is turned on for your organization, run the following command in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
compliance Enable Message Encryption And Decryption In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/enable-message-encryption-and-decryption-in-office-365.md
Microsoft Purview Message Encryption lets email users send encrypted messages to
To learn how to create mail flow rules for encryption, see [Define rules to encrypt or decrypt email messages](./define-mail-flow-rules-to-encrypt-email.md). + ## See also [Encryption in Office 365](./encryption.md)
compliance Encryption Azure Ad Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/encryption-azure-ad-configuration.md
For example:
To ensure access to the encryption service isn't inadvertently blocked, use the following sections to help configure your organization's Azure AD, or relay the information to an Azure AD administrator in another organization. Without access to this service, users can't be authenticated and authorized to open encrypted content. + ## Cross-tenant access settings and encrypted content > [!IMPORTANT]
compliance Encryption Office 365 Certificate Chains Itar https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/encryption-office-365-certificate-chains-itar.md
Last updated: **10/16/2020**
Expand the root and intermediate sections below to see additional details about the certificate providers. + ## **Microsoft 365 Certificate Details** ### **Baltimore CyberTrust Root**
compliance Encryption Office 365 Certificate Chains https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/encryption-office-365-certificate-chains.md
Last updated: **4/25/2022**
Expand the root and intermediate sections below to see additional details about the certificate providers. + ## **Microsoft 365 Root Certificate Details** ### **Baltimore CyberTrust Root**
compliance Encryption Office 365 Tls Certificates Changes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/encryption-office-365-tls-certificates-changes.md
This change will not affect certificates, domains, or services used in the China
All certificate information in this article was previously provided in [Microsoft 365 encryption chains](./encryption-office-365-certificate-chains.md) no later than October 2020. + ## When will this change happen? Services began transitioning to the new Root CAs in January 2022 and will continue through October 2022.
compliance Encryption Sensitivity Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/encryption-sensitivity-labels.md
The encryption settings are available when you [create a sensitivity label](crea
> [!NOTE] > Now rolling out in preview, a sensitivity label in Outlook can apply S/MIME protection rather than encryption and permissions from the Azure Rights Management service. For more information, see [Configure a label to apply S/MIME protection in Outlook](sensitivity-labels-office-apps.md#configure-a-label-to-apply-smime-protection-in-outlook). + ## Understand how the encryption works Encryption uses the Azure Rights Management service (Azure RMS) from Azure Information Protection. This protection solution uses encryption, identity, and authorization policies. To learn more, see [What is Azure Rights Management?](/azure/information-protection/what-is-azure-rms) from the Azure Information Protection documentation.
compliance Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/encryption.md
Encryption is an important part of your file protection and information protecti
- For information about how to configure or set up encryption for your organization, see [Set up encryption in Office 365 Enterprise](set-up-encryption.md). + ## What is encryption, and how does it work in Office 365? The encryption process encodes your data (referred to as plaintext) into ciphertext. Unlike plaintext, ciphertext can't be used by people or computers unless and until the ciphertext is decrypted. Decryption requires an encryption key that only authorized users have. Encryption helps ensure that only authorized recipients can decrypt your content. Content includes files, email messages, calendar entries, and so on.
compliance Endpoint Dlp Getting Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-getting-started.md
Endpoint data loss prevention (Endpoint DLP) is part of the Microsoft Purview Da
Microsoft Endpoint DLP allows you to monitor [onboarded Windows 10, and Windows 11](device-onboarding-overview.md) and [onboarded macOS devices](device-onboarding-macos-overview.md) running Catalina 10.15 and higher. Once a device is onboarded, DLP will detect when sensitive items are used and shared. This gives you the visibility and control you need to ensure that they are used and protected properly, and to help prevent risky behavior that might compromise them. + ## Before you begin ### SKU/subscriptions licensing
compliance Endpoint Dlp Learn About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-learn-about.md
You can use Microsoft Purview Data Loss Prevention (DLP) to monitor the actions
> [!NOTE] > In Microsoft Purview, DLP policy evaluation of sensitive items occurs centrally, so there is no time lag for policies and policy updates to be distributed to individual devices. When a policy is updated in compliance center, it generally takes about an hour for those updates to be synchronized across the service. Once policy updates are synchronized, items on targeted devices are automatically re-evaluated the next time they are accessed or modified. + ## Endpoint activities you can monitor and take action on Endpoint DLP enables you to audit and manage the following types of activities users take on sensitive items that are physically stored Windows 10, Windows 11, or macOS devices.
compliance Endpoint Dlp Using https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-using.md
To help familiarize you with Endpoint DLP features and how they surface in DLP p
>- [Create, test, and tune a DLP policy](create-test-tune-dlp-policy.md) + ## Before you begin ### SKU/subscriptions licensing
These scenarios require that you already have devices onboarded and reporting in
## Scenario 4: Avoid looping DLP notifications from cloud synchronization apps with auto-quarantine (preview)
-### Before you begin
+#[!INCLUDE [purview-preview](../includes/purview-preview.md)]
+
+## Before you begin
In this scenario, synchronizing files with the **Highly Confidential** sensitivity label to OneDrive is blocked. This is a complex scenario with multiple components and procedures. You will need:
compliance Enhancing Mail Flow With Mta Sts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/enhancing-mail-flow-with-mta-sts.md
Support for the [SMTP MTA Strict Transport Security](https://datatracker.ietf.or
MTA-STS can be broken down into two scenarios: Inbound and Outbound Protection. Inbound covers the protection of domains hosted in Exchange Online with MTA-STS and Outbound covers the MTA-STS validations performed by Exchange Online when sending emails to MTA-STS protected domains. + ## Outbound Protection All messages sent outbound from Exchange Online to MTA-STS protected recipients are being validated with these extra security checks set out by the MTA-STS standard. There's nothing admins need to do to apply it. Our outbound implementation respects the wishes of the recipient domain owners via their MTA-STS policy. MTA-STS forms part of the security infrastructure of Exchange Online, and it's therefore always on (like other core SMTP features).
These configuration flows are intended to provide only technical information abo
> [!NOTE] > An example MTA-STS TXT record can be found in [How To Adopt MTA-STS](#how-to-adopt-mta-sts).
-10. Once the TXT record is available in DNS, validate your MTA-STS configuration. Once the configuration has been successfully validated, update the mta-sts.txt file such that the policy mode is ΓÇÿenforceΓÇÖ; then update your policy ID in the TXT record.
+10. Once the TXT record is available in DNS, validate your MTA-STS configuration. Once the configuration has been successfully validated, update the mta-sts.txt file such that the policy mode is ΓÇÿenforceΓÇÖ; then update your policy ID in the TXT record.
compliance Error Remediation When Processing Data In Advanced Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/error-remediation-when-processing-data-in-advanced-ediscovery.md
Error remediation allows eDiscovery administrators the ability to rectify data i
Use the following workflow to remediate files with errors in eDiscovery (Premium) cases. + ## Create an error remediation session to remediate files with processing errors > [!NOTE]
When remediated files are uploaded, the original metadata is preserved except fo
- WordCount - WorkingsetId
-For a definition of all metadata fields in eDiscovery (Premium), see [Document metadata fields](document-metadata-fields-in-advanced-ediscovery.md).
+For a definition of all metadata fields in eDiscovery (Premium), see [Document metadata fields](document-metadata-fields-in-advanced-ediscovery.md).
compliance Event Driven Retention https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/event-driven-retention.md
Event-based retention, sometimes also referred to as "event-driven retention", i
A retention label based on an event has the same capabilities as any retention label in Microsoft Purview. For more information, see [Learn about retention policies and retention labels](retention.md). + ## Understanding the relationship between event types, labels, events, and asset IDs To successfully use event-based retention, it's important to understand the relationship between event types, retention labels, events, and asset IDs as illustrated in the diagrams and the explanation that follows:
compliance Exchange Online Secures Email Secrets https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/exchange-online-secures-email-secrets.md
description: "In addition to the Office 365 Trust Center that provides Security,
This article describes how Microsoft secures your email secrets in its datacenters. + ## How do we secure secret information provided by you? In addition to the Office 365 Trust Center that provides [Security, Privacy, and Compliance Information for Office 365](./get-started-with-service-trust-portal.md), you might want to know how Microsoft helps protects secrets you provide in its datacenters. We use a technology called Distributed Key Manager (DKM).
compliance Exchange Online Uses Tls To Secure Email Connections https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/exchange-online-uses-tls-to-secure-email-connections.md
description: "Learn how Exchange Online and Microsoft 365 use Transport Layer Se
Learn how Exchange Online and Microsoft 365 use Transport Layer Security (TLS) and Forward Secrecy (FS) to secure email communications. Also provides information about the certificate issued by Microsoft for Exchange Online. + ## TLS basics for Microsoft 365 and Exchange Online Transport Layer Security (TLS), and SSL that came before TLS, are cryptographic protocols that secure communication over a network by using security certificates to encrypt a connection between computers. TLS supersedes Secure Sockets Layer (SSL) and is often referred to as SSL 3.1. Exchange Online uses TLS to encrypt the connections between Exchange servers and the connections between Exchange servers and other servers such as your on-premises Exchange servers or your recipients' mail servers. Once the connection is encrypted, all data sent through that connection is sent through the encrypted channel. However, if you forward a message that was sent through a TLS-encrypted connection to a recipient organization that doesn't support TLS encryption, that message isn't necessarily encrypted. TLS doesn't encrypt the message, just the connection.
compliance Export A Content Search Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/export-a-content-search-report.md
Instead of exporting the full set of search results from a Content search in the
When you export a report, the report files are downloaded to a folder on your local computer that has the same name as the Content Search, but that's appended with *_ReportsOnly*. For example, if the Content Search is named *ContosoCase0815*, then the report is downloaded to a folder named *ContosoCase0815_ReportsOnly*. For a list of documents that are included in the report, see [What's included in the report](#whats-included-in-the-report). + ## Before you export a search report - To export a search report, you have to be assigned the Compliance Search management role in compliance portal. This role is assigned by default to the built-in eDiscovery Manager and Organization Management role groups. For more information, see [Assign eDiscovery permissions](assign-ediscovery-permissions.md).
compliance Export Content In Core Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/export-content-in-core-ediscovery.md
After a search associated with a Microsoft Purview eDiscovery (Standard) case is successfully run, you can export the search results. When you export search results, mailbox items are downloaded in PST files or as individual messages. When you export content from SharePoint and OneDrive for Business sites, copies of native Office documents and other documents are exported. A Results.csv file that contains information about every item that's exported and a manifest file (in XML format) that contains information about every search result is also exported. + ## Export search results 1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a> and sign in using the credentials for user account that has been assigned the appropriate eDiscovery permissions.
compliance Export Documents From Review Set https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/export-documents-from-review-set.md
To export documents from a review set:
> [!NOTE] > Export jobs are retained for the life of the case. However, you must download the content from an export job within 30 days after the export job is complete. + ## Export options Use the following options to configure the export. Not all options are allowed for some output options, most notably, export of text files and redacted PDFs aren't allowed when exporting to the PST format.
compliance Export Search Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/export-search-results.md
After a Content search is successfully run, you can export the search results to
Exporting the results of a Content search involves preparing the results, and then downloading them to a local computer. These steps for exporting search results also apply to exporting the results of a search that's associated with Microsoft Purview eDiscovery (Standard) cases. + ## Before you export search results - To export search results, you have to be assigned the Export management role in Microsoft Purview compliance portal. This role is assigned to the built-in eDiscovery Manager role group. It isn't assigned by default to the Organization Management role group. For more information, see [Assign eDiscovery permissions](assign-ediscovery-permissions.md).
compliance Export View Audit Log Records https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/export-view-audit-log-records.md
After you search the audit log and download the search results to a CSV file, the file contains a column named **AuditData**, which contains additional information about each event. The data in this column is formatted as a JSON object, which contains multiple properties that are configured as *property:value* pairs separated by commas. You can use the JSON transform feature in the Power Query Editor in Excel to split each property in the JSON object in the **AuditData** column into multiple columns so that each property has its own column. This lets you sort and filter on one or more of these properties, which can help you quickly locate the specific auditing data you're looking for. + ## Step 1: Export audit log search results The first step is to search the audit log and then export the results in a comma-separated value (CSV) file to your local computer.
compliance File Plan Manager https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/file-plan-manager.md
File plan can be used for all retention labels, even if they don't mark content
For information about what retention labels are and how to use them, see [Learn about retention policies and retention labels](retention.md). + ## Accessing file plan To access file plan, you must have one of the following admin roles:
compliance Filter Data When Importing Pst Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/filter-data-when-importing-pst-files.md
The following graphic shows the Intelligent Import process, and highlights the t
![The Intelligent Import process in Office 365.](../media/f2ec309b-11f5-48f2-939c-a6ff72152d14.png) + ## Create a PST import job - The steps in this topic assume that you've created a PST import job in the Office 365 Import service by using network upload or drive shipping. For step-by-step instructions, see one of the following topics:
compliance Form A Query To Find Sensitive Data Stored On Sites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/form-a-query-to-find-sensitive-data-stored-on-sites.md
Users often store sensitive data, such as credit card numbers, social security n
> [!NOTE] > Electronic discovery, or eDiscovery, and DLP are premium features that require [SharePoint Online Plan 2](https://go.microsoft.com/fwlink/?LinkId=510080). + ## Forming a basic DLP query There are three parts that make up a basic DLP query: SensitiveType, count range, and confidence range. As illustrated in the following graphic, **SensitiveType:"\<type\>"** is required, and both **|\<count range\>** and **|\<confidence range\>** are optional.
compliance Get Started Core Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-core-ediscovery.md
Microsoft Purview eDiscovery (Standard) in Microsoft Purview provides a basic eD
This article discusses the steps necessary to set up eDiscovery (Standard). This includes ensuring the proper licensing required to access eDiscovery (Standard) and place an eDiscovery hold on content locations, as well as assigning permissions to your IT, legal, and investigation team so they can access and manage cases. This article also provides a high-level overview of using cases to search for and export content. + ## Step 1: Verify and assign appropriate licenses Licensing for eDiscovery (Standard) requires the appropriate organization subscription and per-user licensing.
compliance Get Started With Advanced Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-with-advanced-ediscovery.md
This article discusses the following steps necessary to set up eDiscovery (Premi
This includes ensuring the proper licensing required to access eDiscovery (Premium) and add custodians to cases, and assigning permissions to your legal and investigation team so they can access and manage cases. + ## Step 1: Verify and assign appropriate licenses Licensing for eDiscovery (Premium) requires the appropriate organization subscription and per-user licensing. For a list of licensing requirements for eDiscovery (Premium), see [Subscriptions and licensing](overview-ediscovery-20.md#subscriptions-and-licensing).
For more information about setting up and using the attorney-client privilege de
## Next steps
-After you set up eDiscovery (Premium), you're ready to [create a case](create-and-manage-advanced-ediscoveryv2-case.md).
+After you set up eDiscovery (Premium), you're ready to [create a case](create-and-manage-advanced-ediscoveryv2-case.md).
compliance Get Started With Data Lifecycle Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-with-data-lifecycle-management.md
Ready to start managing the lifecycle of your organization's data by retaining t
5. If you have PST files that contain data you want to govern: **Import PST files to online mailboxes** by using network upload or drive shipping: [Learn about importing your organization's PST files](importing-pst-files-to-office-365.md) + ## Subscription and licensing requirements A number of different subscriptions support data lifecycle management capabilities.
compliance Get Started With Records Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-with-records-management.md
Ready to start managing your organization's high-value content for legal, busine
> [!TIP] > If you're migrating records to Microsoft 365 and need to validate that they haven't been altered, see [Validating migrated records](records-management.md#validating-migrated-records). + ## Subscription and licensing requirements A number of different subscriptions support records management and the licensing requirements for users depends on the features you use.
If you're using retention policies for baseline data governance, they typically
In comparison, retention labels have a UI presence in Microsoft 365 apps, so make sure you provide guidance for end users and your help desk before these labels are deployed to your production network. To help users apply retention labels in SharePoint and OneDrive, and information about unlocking records for editing, see [Apply retention labels to files in SharePoint or OneDrive](https://support.microsoft.com/office/apply-retention-labels-to-files-in-sharepoint-or-onedrive-11a6835b-ec9f-40db-8aca-6f5ef18132df).
-However, the most effective end-user documentation will be customized guidance and instructions you provide for the retention label names and configurations you choose. See the following page and downloads that you can use to help train your users: [End User Training for Retention Labels](https://microsoft.github.io/ComplianceCxE/enduser/retention/).
+However, the most effective end-user documentation will be customized guidance and instructions you provide for the retention label names and configurations you choose. See the following page and downloads that you can use to help train your users: [End User Training for Retention Labels](https://microsoft.github.io/ComplianceCxE/enduser/retention/).
compliance Get Started With Sensitivity Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-with-sensitivity-labels.md
The basic flow for deploying and applying sensitivity labels:
![Diagram showing workflow for sensitivity labels.](../media/Sensitivity-label-flow.png) + ## Subscription and licensing requirements for sensitivity labels A number of different subscriptions support sensitivity labels and the licensing requirements for users depend on the features you use.
compliance Get Started With Service Trust Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-with-service-trust-portal.md
The Microsoft Service Trust Portal provides a variety of content, tools, and other resources about how Microsoft cloud services protect your data, and how you can manage cloud data security and compliance for your organization. + ## Accessing the Service Trust Portal The Service Trust Portal is Microsoft's public site for publishing audit reports and other compliance-related information associated with MicrosoftΓÇÖs cloud services. STP users can download audit reports produced by external auditors and gain insight from Microsoft-authored whitepapers that provide details on how Microsoft cloud services protect your data, and how you can manage cloud data security and compliance for your organization. To access some of the resources on the Service Trust Portal, you must log in as an authenticated user with your Microsoft cloud services account (Azure Active Directory organization account) and review and accept the Microsoft Non-Disclosure Agreement for Compliance Materials.
compliance Get Started With The Default Dlp Policy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-with-the-default-dlp-policy.md
You can use this widget to quickly view when and how much sensitive information
![Widget named Further protect shared content.](../media/2bae6dbc-cc92-4f35-b54c-c36e60226b5b.png) + ## View the report and refine the default DLP policy When the widget shows you that users have shared sensitive information with people outside your organization, choose **Refine DLP policy** at the bottom.
compliance How Dlp Works Between Admin Centers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/how-dlp-works-between-admin-centers.md
In Microsoft Purview, you can create a data loss prevention (DLP) policy in two
DLP policies created in these admin centers work side by side - this article explains how. + ## How DLP in the Compliance portal works with DLP and mail flow rules in the Exchange admin center After you create a DLP policy in the Compliance portal, the policy is deployed to all of the locations included in the policy. If the policy includes Exchange Online, the policy's synced there and enforced in exactly the same way as a DLP policy created in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2059104" target="_blank">Exchange admin center</a>.
compliance How Smtp Dane Works https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/how-smtp-dane-works.md
Once the MX, A/AAAA and DNSSEC-related resource records for a domain are returne
After receiving the authentic TLSA record, the sending mail server establishes an SMTP connection to the MX host associated with the authentic TLSA record. The sending mail server will try to set up TLS and compare the server's TLS certificate with the data in the TLSA record to validate that the destination mail server connected to the sender is the legitimate receiving mail server. The message will be transmitted (using TLS) if authentication succeeds. When authentication fails or if TLS isn't supported by the destination server, Exchange Online will retry the entire validation process beginning with a DNS query for the same destination domain again after 15 minutes, then 15 minutes after that, then every hour for the next 24 hours. If authentication continues to fail after 24 hours of retrying, the message will expire and an NDR with error details will be generated and sent to the sender. + ## What are the components of DANE? ### TLSA Resource Record
compliance Identify A Hold On An Exchange Online Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/identify-a-hold-on-an-exchange-online-mailbox.md
Microsoft 365 offers several ways that your organization can prevent mailbox con
To manage mailboxes on hold, you may have to identify the type of hold that's placed on a mailbox so that you can perform tasks such as changing the hold duration, temporarily or permanently removing the hold, or excluding a mailbox from a Microsoft 365 retention policy. In these cases, the first step is to identify the type of hold placed on the mailbox. And because multiple holds (and different types of holds) can be placed on a single mailbox, you have to identify all holds placed on a mailbox if you want to remove or change a hold. + ## Step 1: Obtain the GUID for holds placed on a mailbox You can run the following two cmdlets in Exchange Online PowerShell to get the GUID of the holds that are placed on a mailbox. After you obtain a GUID, you use it to identify the specific hold in Step 2. A Litigation Hold isn't identified by a GUID. Litigation Holds are either enabled or disabled for a mailbox.
compliance Import Epic Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/import-epic-data.md
Setting up an Epic connector consists of the following tasks:
If youΓÇÖd like to participate in the preview, please reach out to the team at dcfeedback@microsoft.com. + ## Before you set up the connector - The user who creates the Epic connector in Step 3 must be assigned the Data Connector Admin role. This role is required to add connectors on the **Data connectors** page in the compliance portal. This role is added by default to multiple role groups. For a list of these role groups, see the "Roles in the security and compliance centers" section in [Permissions in the Security & Compliance Center](../security/office-365-security/permissions-in-the-security-and-compliance-center.md#roles-in-the-security--compliance-center). Alternatively, an admin in your organization can create a custom role group, assign the Data Connector Admin role, and then add the appropriate users as members. For instructions, see the "Create a custom role group" section in [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md#create-a-custom-role-group).
compliance Import Healthcare Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/import-healthcare-data.md
Setting up a Healthcare connector consists of the following tasks:
If youΓÇÖd like to participate in the preview, please reach out to the team at dcfeedback@microsoft.com. + ## Before you set up the connector - The user who creates the Healthcare connector in Step 3 must be assigned the Data Connector Admin role. This role is required to add connectors on the **Data connectors** page in the compliance portal. This role is added by default to multiple role groups. For a list of these role groups, see the "Roles in the security and compliance centers" section in [Permissions in the Security & Compliance Center](../security/office-365-security/permissions-in-the-security-and-compliance-center.md#roles-in-the-security--compliance-center). Alternatively, an admin in your organization can create a custom role group, assign the Data Connector Admin role, and then add the appropriate users as members. For instructions, see the "Create a custom role group" section in [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md#create-a-custom-role-group).
compliance Import Hr Data US Government https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/import-hr-data-US-government.md
You can set up a data connector in the Microsoft Purview compliance portal to import human resources (HR) data to your US Government organization. HR-related data includes the date an employee submitted their resignation and date of the employee's last day. This HR data can then be used by Microsoft information protection solutions, such as the [insider risk management solution](insider-risk-management.md), to help protect your organization from malicious activity or data theft inside your organization. Setting up an HR connector consists of creating an app in Azure Active Directory that's used for authentication by connector, creating a CSV mapping files that contains your HR data, creating a data connector in the compliance center, and then running a script (on a scheduled basis) that ingests the HR data in the CSV file to the Microsoft cloud. Then the data connector is used by the insider risk management tool to access the HR data that was imported to your Microsoft 365 US Government organization. + ## Before you begin - The user who creates the HR connector in Step 3 must be assigned the Data Connector Admin role. This role is required to add connectors on the **Data connectors** page in the compliance portal. This role is added by default to multiple role groups. For a list of these role groups, see the "Roles in the security and compliance centers" section in [Permissions in the Security & Compliance Center](../security/office-365-security/permissions-in-the-security-and-compliance-center.md#roles-in-the-security--compliance-center). Alternatively, an admin in your organization can create a custom role group, assign the Data Connector Admin role, and then add the appropriate users as members. For instructions, see the "Create a custom role group" section in [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md#create-a-custom-role-group).
You can use the Task Scheduler app in Windows to automatically run the script ev
The last time the script ran and the next time it's scheduled to run is displayed. You can double-click the task to edit it.
- You can also verify the last time the script ran on the flyout page of the corresponding HR connector in the compliance center.
+ You can also verify the last time the script ran on the flyout page of the corresponding HR connector in the compliance center.
compliance Import Hr Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/import-hr-data.md
Setting up a connector for HR data that insider risk management policies can use
> [!IMPORTANT] > A new version of the HR connector is now available for public preview. To create a new HR connector or to import data for the [new employee profile scenario](#csv-file-for-employee-profile-data-preview) for the healthcare policy scenario for insider risk management, go to the **Data connectors** page in the compliance portal, select the **Connectors** tab, and then click **Add a connector > HR (preview)** to start the set up. Existing HR connectors will continue to work without any disruption. + ## Before you begin - Determine which HR scenarios and data to import to Microsoft 365. This will help you determine how many CSV files and HR connectors you'll need to create, and how to generate and structure the CSV files. The HR data that you import is determined by the insider risk management policies that you want to implement. For more information, see Step 1.
compliance Import Physical Badging Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/import-physical-badging-data.md
Setting up a physical badging connector consists of the following tasks:
If youΓÇÖd like to participate in the preview, please reach out to the team at dcfeedback@microsoft.com. + ## Before you set up the connector - The user who creates the physical badging connector in Step 3 must be assigned the Data Connector Admin role. This role is required to add connectors on the **Data connectors** page in the compliance portal. This role is added by default to multiple role groups. For a list of these role groups, see the "Roles in the security and compliance centers" section in [Permissions in the Security & Compliance Center](../security/office-365-security/permissions-in-the-security-and-compliance-center.md#roles-in-the-security--compliance-center). Alternatively, an admin in your organization can create a custom role group, assign the Data Connector Admin role, and then add the appropriate users as members. For instructions, see the "Create a custom role group" section in [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md#create-a-custom-role-group).
compliance Importing Pst Files To Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/importing-pst-files-to-office-365.md
You can use the Import service in the <a href="https://go.microsoft.com/fwlink/p
- **Drive shipping** ![Hard disk.](../media/e72b76f3-1f73-4296-b749-c325d95d9ef6.png) - Copy the PST files to a BitLocker-encrypted hard drive and then physically ship the drive to Microsoft. When Microsoft receives the hard drive, data center personnel upload the data to a temporary Azure Storage location in the Microsoft cloud. Then you use the Microsoft 365 Import service to import the data to mailboxes in your organization. + ## Step-by-step instructions See one of the following topics for detailed, step-by-step instructions for bulk-importing your organization's PST files to Microsoft 365.
compliance Inactive Mailboxes In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/inactive-mailboxes-in-office-365.md
description: Learn how to retain mailbox content for former employees by turning
Your organization might need to retain former employees' email after they leave the organization. Depending on your organization's retention requirements, you might need to retain mailbox content for a few months or years after employment ends, or you might need to retain mailbox content indefinitely. Regardless of how long you need to retain email, you can create inactive mailboxes to retain the mailbox of former employees. + ## What are inactive mailboxes? When an employee leaves your organization (or goes on an extended leave of absence), you can remove their Microsoft 365 account. The employee's mailbox data is retained for 30 days after the account is removed. During this period, you can still recover the mailbox data by undeleting the account. After 30 days, the data is permanently removed.
compliance Increase The Recoverable Quota For Mailboxes On Hold https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/increase-the-recoverable-quota-for-mailboxes-on-hold.md
The remainder of this topic describes the step-by-step procedures to create a cu
[(Optional) Step 4: Run the Managed Folder Assistant to apply the new retention settings](#optional-step-4-run-the-managed-folder-assistant-to-apply-the-new-retention-settings) + ## Step 1: Create a custom retention tag for the Recoverable Items folder The first step is to create a custom retention tag (called a retention policy tag or RPT) for the Recoverable Items folder. As previously explained, this RPT moves items from the Recoverable Items folder in the user's primary mailbox to the Recoverable Items folder in the user's archive mailbox. You have to use PowerShell to create an RPT for the Recoverable Items folder. You can't use the Exchange admin center (EAC).
compliance Indexing Custodian Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/indexing-custodian-data.md
To learn more about processing support and partially indexed items, see:
- [Default crawled file name extensions and parsed file types in SharePoint Server](/SharePoint/technical-reference/default-crawled-file-name-extensions-and-parsed-file-types) + ## Viewing Advanced indexing results After the Advanced indexing process is completed, you can get an understanding of the effectiveness of reprocessing. In the Advanced indexing results view on the **Processing** tab for a case, the graph lists the number of items added to the *hybrid index*. The hybrid index is where eDiscovery (Premium) stores the reprocessed content.
compliance Information Barriers Attributes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-attributes.md
This article describes how to use attributes with information barriers, and it p
- [Define policies for information barriers in Microsoft Teams](information-barriers-policies.md) - [Edit (or remove) IB policies](information-barriers-edit-segments-policies.md) + ## How to use attributes in IB policies The attributes listed in this article can be used to define or edit segments of users. Your defined segments serve as parameters (called *UserGroupFilter* values) in [IB policies](information-barriers-policies.md).
compliance Information Barriers Edit Segments Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-edit-segments-policies.md
f1.keywords:
After you have [defined information barriers (IB) policies](information-barriers-policies.md), you may need to make changes to those policies or to your user segments, as part of [troubleshooting](/office365/troubleshoot/information-barriers/information-barriers-troubleshooting) or as regular maintenance. + ## What do you want to do? |**Action**|**Description**|
compliance Information Barriers Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-policies.md
For more information about IB scenarios and features, see [Learn about informati
> [!TIP] > To help you prepare your plan, an [example scenario](#example-scenario-contosos-departments-segments-and-policies) is included in this article. + ## Required subscriptions and permissions Before you get started with IB, you should confirm your Microsoft 365 subscription and any add-ons. To access and use IB, your organization must have one of the following subscriptions or add-ons:
compliance Information Barriers Solution Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-solution-overview.md
Microsoft Purview Information Barriers (IB) is supported in Microsoft Teams, Sha
- An internal team with trade secret material should not call or chat online with people in certain groups within their organization - A research team should only call or chat online with a product development team + ## Configure information barriers Use the following steps to configure IB for your organization:
compliance Information Barriers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers.md
IB policies can allow or prevent communication and collaboration between groups
> [!IMPORTANT] > Information barriers **only supports** two-way communication and collaboration restrictions. For example, a scenario where Marketing can communicate and collaborate with Day Traders, but Day Traders cannot communicate and collaborate with Marketing **isn't supported**. + ## Information barriers and Microsoft Teams In Microsoft Teams, IB policies determine and prevent the following kinds of unauthorized communication and collaboration:
compliance Information Protection Solution https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-protection-solution.md
Your information protection strategy is driven by your business needs. Many orga
Microsoft Purview Information Protection (formerly Microsoft Information Protection) provides a framework, process, and capabilities you can use to accomplish your specific business objectives. + ## Microsoft Purview Information Protection framework Use Microsoft Purview Information Protection to help you discover, classify, protect, and govern sensitive information wherever it lives or travels.
compliance Information Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-protection.md
description: "Implement Microsoft Purview Information Protection capabilities to
>*[Licensing for Microsoft 365 Security & Compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance)*
-> [!TIP]
-> *Did you know you can try the premium versions of all nine Microsoft Purview solutions for free?* Use the 90-day Purview solutions trial to explore how robust Purview capabilities can help your organization meet its compliance needs. Microsoft 365 E3 and Office 365 E3 customers can start now at the [Microsoft Purview compliance portal trials hub](https://compliance.microsoft.com/trialHorizontalHub?sku=ComplianceE5&ref=DocsRef). Learn details about [who can sign up and trial terms](compliance-easy-trials.md).
- Implement capabilities from **Microsoft Purview Information Protection** (formerly Microsoft Information Protection) to help you discover, classify, and protect sensitive information wherever it lives or travels. These information protection capabilities give you the tools to [know your data](#know-your-data), [protect your data](#protect-your-data), and [prevent data loss](#prevent-data-loss).
Use the following sections to learn more about the available capabilities and ho
For information about governing your data for compliance or regulatory requirements, see [Govern your data with Microsoft Purview](manage-data-governance.md). + ## Know your data To understand your data landscape and identify sensitive data across your hybrid environment, use the following capabilities:
compliance Information Rights Management In Exchange Online https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-rights-management-in-exchange-online.md
To help prevent information leakage, Exchange Online includes Information Rights
IRM protection can be applied by users in Microsoft Outlook or Outlook on the web, and it can be applied by administrators using transport protection rules or Outlook protection rules. IRM helps you and your users control who can access, forward, print, or copy sensitive data within an email. + ## Changes to how IRM works with message encryption and Azure Active Directory As of September 2017, when you set up Microsoft Purview Message Encryption for your organization, you also set up IRM for use with Azure Rights Management (Azure RMS). You no longer set up IRM with Azure RMS separately. Instead, message encryption and rights management work seamlessly together. For more details about Microsoft Purview Message Encryption, see [Message Encryption FAQ](./ome-faq.yml). If you're ready to get started using Microsoft Purview Message Encryption within your organization, see [Set up Microsoft Purview Message Encryption](./set-up-new-message-encryption-capabilities.md).
compliance Insider Risk Management Activities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-activities.md
Investigating risky user activities is an important first step in minimizing insider risks for your organization. These risks may be activities that generate alerts from insider risk management policies, or risks from activities that are detected by policies but don't immediately create an insider risk management alert for users. You can investigate these types of activities by using the **User activity reports (preview)** or with the **Alert dashboard**. + ## User activity reports (preview) User activity reports allow you to examine activities for specific users for a defined time period without having to assign them temporarily or explicitly to an insider risk management policy. In most insider risk management scenarios, users are explicitly defined in policies, and they may have policy alerts (depending on triggering events) and risk scores associated with the activities. But in some scenarios, you may want to examine the activities for users that aren't explicitly defined in a policy. These activities may be for users that you've received a tip about the user and potentially risky activities, or users that typically don't need to be assigned to an insider risk management policy.
compliance Insider Risk Management Audit Log https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-audit-log.md
To view and export data from the audit log, users must be assigned to the *Insid
> [!NOTE] > The insider risk management audit log isn't associated with the Microsoft 365 audit log, they are independent auditing systems and capture information on separate activities. Disabling Microsoft 365 auditing doesn't impact activity auditing within insider risk management. + ## View activity in the insider risk audit log To view feature activity detected for insider risk management, navigate to, and select the **Insider risk audit log** link in the top-right area of any insider risk management tab. By default, you'll see the following information displayed for insider risk management activities:
compliance Insider Risk Management Browser Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-browser-support.md
The following table summarizes detected activities and extension support for eac
| Files copied to USB devices | Extension | Extension | | Browsing risky websites | Extension | Extension | + ## Common requirements Before installing the Microsoft Edge add-on or Google Chrome extension, customers need to ensure that devices for in-scope policy users meet the following requirements:
compliance Insider Risk Management Cases https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-cases.md
After investigating the details of a case, you can take action by:
Check out the [Insider Risk Management Investigation and Escalation video](https://www.youtube.com/watch?v=UONUSmkRC8s) for an overview of how cases are investigated and managed in insider risk management. + ## Cases dashboard The insider risk management **Cases dashboard** allows you to view and act on cases. Each report widget on the dashboard displays information for last 30 days.
compliance Insider Risk Management Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-configure.md
Use insider risk management policies to identify risky activities and management
For more information about how insider risk policies can help you manage risk in your organization, see [Learn about insider risk management](insider-risk-management.md). + ## Subscriptions and licensing Before you get started with insider risk management, you should confirm your [Microsoft 365 subscription](https://www.microsoft.com/microsoft-365/compare-all-microsoft-365-plans) and any add-ons. To access and use insider risk management, your organization must have one of the following subscriptions or add-ons:
compliance Insider Risk Management Content Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-content-explorer.md
If the content includes Information Rights Management permissions, these permiss
> [!NOTE] > Content explorer includes user activities related to Microsoft 365 service files, such as user activity on SharePoint, Exchange, Microsoft Teams, and OneDrive for Business. + ## Column options To make it easier for risk analysts and investigators to review captured data and messages and review the context to the case, several filtering and sorting tools are included in the Content explorer. For basic sorting, the **Date** and **File class** columns support sorting using the column titles in the content queue pane. Other queue columns are available to add to the view to provide different pivots on the files and messages.
compliance Insider Risk Management Notices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-notices.md
Insider risk management notice templates allow you to automatically send email m
Create notice templates if you want to send users an email reminder notice for policy matches as part of the case resolution process. Notices can only be sent to the user email address associated with the specific case being reviewed. When selecting a notice template to apply to a policy match, you can choose to accept the field values defined in the template or overwrite the fields as needed + ## Notice templates dashboard The **Notices templates dashboard** displays a list of configured notice templates and allows you to create new notice templates. The notice templates are listed in reverse date order with the most recent notice template listed first.
compliance Insider Risk Management Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-plan.md
Watch the video below to learn how the insider risk management workflow can help
Check out the [Microsoft Mechanics video](https://www.youtube.com/watch?v=Ynkfu8OF0wQ) on how insider risk management and communication compliance work together to help minimize data risks from users in your organization. + ## Work with stakeholders in your organization Identify the appropriate stakeholders in your organization to collaborate for taking actions on insider risk management alerts and cases. Some recommended stakeholders to consider including in initial planning and the end-to-end [insider risk management workflow](insider-risk-management.md#workflow) are people from the following areas of your organization:
compliance Insider Risk Management Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-policies.md
Insider risk management policies determine which users are in-scope and which ty
Check out the [Insider Risk Management Policies Configuration video](https://www.youtube.com/watch?v=kudK5ajZTUo) for an overview of how policies created with built-in policy templates can help you to quickly act on potential risks. + ## Policy dashboard The **Policy dashboard** allows you to quickly see the policies in your organization, the health of the policy, manually add users to security policies, and to view the status of alerts associated with each policy.
compliance Insider Risk Management Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-settings.md
Insider risk management settings apply to all insider risk management policies,
Before you get started and create insider risk management policies, it's important to understand these settings and choose setting levels best for the compliance needs for your organization. + ## Privacy Protecting the privacy of users that have policy matches is important and can help promote objectivity in data investigation and analysis reviews for insider risk alerts. For users with an insider risk policy match, you can choose one of the following settings:
compliance Insider Risk Management Solution Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-solution-overview.md
Watch the videos below to learn how insider risk management can help your organi
**Insider risk management workflow**: >[!VIDEO https://www.microsoft.com/videoplayer/embed/RE4OUXB] + ## Configure insider risk management Use the following steps to configure insider risk management for your organization:
compliance Insider Risk Management Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-users.md
Learn more about how the Users dashboard displays users in the following scenari
- Users with triggering events - Users added temporarily to policies + ## Users with active insider risk policy alerts The **Users dashboard** automatically displays all users with active insider risk policy alerts. These users with alerts have both a triggering indicator and an activity risk score that meets the requirements for creating an insider risk alert. Activities for these users are viewed by selecting the user in the **Users dashboard** and navigating to the **User activity** tab.
compliance Insider Risk Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management.md
# Learn about insider risk management
-> [!TIP]
-> *Did you know you can try the premium versions of all nine Microsoft Purview solutions for free?* Use the 90-day Purview solutions trial to explore how robust Purview capabilities can help your organization meet its compliance needs. Microsoft 365 E3 and Office 365 E3 customers can start now at the [Microsoft Purview compliance portal trials hub](https://compliance.microsoft.com/trialHorizontalHub?sku=ComplianceE5&ref=DocsRef). Learn details about [who can sign up and trial terms](compliance-easy-trials.md).
- Microsoft Purview Insider Risk Management is a compliance solution that helps minimize internal risks by enabling you to detect, investigate, and act on malicious and inadvertent activities in your organization. Insider risk policies allow you to define the types of risks to identify and detect in your organization, including acting on cases and escalating cases to Microsoft eDiscovery (Premium) if needed. Risk analysts in your organization can quickly take appropriate actions to make sure users are compliant with your organization's compliance standards. For more information and an overview of the planning process to address risky activities in your organization, see [Starting an insider risk management program](https://download.microsoft.com/download/b/2/0/b208282a-2482-4986-ba07-15a9b9286df0/pwc-starting-an-insider-risk-management-program-with-pwc-and-microsoft.pdf).
Check out the [Microsoft Mechanics video](https://www.youtube.com/watch?v=Ynkfu8
> [!IMPORTANT] > Insider risk management is currently available in tenants hosted in geographical regions and countries supported by Azure service dependencies. To verify that insider risk management is supported for your organization, see [Azure dependency availability by country/region](/troubleshoot/azure/general/dependency-availability-by-country). + ## Modern risk pain points Managing and minimizing risk in your organization starts with understanding the types of risks found in the modern workplace. Some risks are driven by external events and factors that are outside of direct control. Other risks are driven by internal events and user activities that can be minimized and avoided. Some examples are risks from illegal, inappropriate, unauthorized, or unethical behavior and actions by users in your organization. These behaviors include a broad range of internal risks from users:
compliance Insider Risk Solution Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-solution-overview.md
Microsoft 365 risk prevention features are designed and built-in to our insider
| ![Security violations icon.](../media/ir-risk-security-violations.png)| Security violations | | ![Supported](../media/check-mark.png) | | ![Supported](../media/check-mark.png) | | ![Regulatory compliance violations icon.](../media/ir-risk-regulatory-compliance-violations.png)| Regulatory compliance violations | ![Supported](../media/check-mark.png) | ![Supported](../media/check-mark.png) | ![Supported](../media/check-mark.png) | | + ## Insider risk solutions To help protect your organization against insider risks, use these Microsoft Purview capabilities and features.
compliance Intro To Info Mgmt Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/intro-to-info-mgmt-policies.md
For example, an organization that must follow government regulations requiring t
For how-to information, see [Create and apply information management policies](create-info-mgmt-policies.md). + ## Features of information management policies <a name="__top"> </a>
compliance Investigating Partially Indexed Items In Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/investigating-partially-indexed-items-in-ediscovery.md
An eDiscovery search that you run from the Microsoft Purview compliance portal a
Although it varies, most organizations customers have less than 1% of content by volume and less than 12% of content by size that is partially indexed. The reason for the difference between the volume versus size is that larger files have a higher probability of containing content that can't be completely indexed. + ## Why does the partially indexed item count change for a search? After you run an eDiscovery search, the total number and size of partially indexed items in the locations that were searched are listed in the search result statistics that are displayed in the detailed statistics for the search. Note these are called *unindexed items* in the search statistics. Here are a few things that will affect the number of partially indexed items that are returned in the search results:
compliance Keyword Queries And Search Conditions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/keyword-queries-and-search-conditions.md
For step-by-step instructions on how to create different eDiscovery searches, se
> [!NOTE] > eDiscovery searches in the compliance portal and the corresponding **\*-ComplianceSearch** cmdlets in Security & Compliance PowerShell use the Keyword Query Language (KQL). For more detailed information, see [Keyword Query Language syntax reference](/sharepoint/dev/general-development/keyword-query-language-kql-syntax-reference). + ## Searchable email properties The following table lists email message properties that can be searched by using the eDiscovery search tools in the compliance portal or by using the **New-ComplianceSearch** or the **Set-ComplianceSearch** cmdlet. The table includes an example of the _property:value_ syntax for each property and a description of the search results returned by the examples. You can type these `property:value` pairs in the keywords box for an eDiscovery search.
compliance Legacy Ediscovery Retirement https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/legacy-ediscovery-retirement.md
As a result of this new and improved eDiscovery functionality in the compliance
The following sections in this article provide guidance about each feature being retired. This information including timelines and alternative tools that you can use instead of the retired tool. + ## In-Place eDiscovery and In-Place Holds in the Exchange admin center As per the original announcement on July 1, 2017, the In-Place eDiscovery & Hold functionality in the Exchange admin center (EAC) is being retired. The In-Place eDiscovery & Holds page in the EAC allowed you to search, hold, and export content from Exchange Online. In-Place eDiscovery also let you copy search results to a discovery mailbox so that you or other eDiscovery managers could review content and make it available for legal, regulatory, and public requests.
compliance Legacy Information For Message Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/legacy-information-for-message-encryption.md
Here are some examples:
- A health care provider sends health care information to patients - An attorney sends confidential information to a customer or another attorney + ## How Office 365 Message Encryption works without the new capabilities Office 365 Message Encryption is an online service that's built on Microsoft Azure Rights Management (Azure RMS). With Azure RMS, administrators can define mail flow rules to determine the conditions for encryption. For example, a rule can require the encryption of all messages addressed to a specific recipient.
compliance Limits Ediscovery20 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/limits-ediscovery20.md
This article describes the limits in the Microsoft Purview eDiscovery (Premium) solution in Microsoft 365. + ## Case and review set limits The following table lists the limits for cases and review sets in eDiscovery (Premium).
compliance Limits For Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/limits-for-content-search.md
Various limits are applied to eDiscovery search tools in the Microsoft Purview c
For limits related to the Microsoft Purview eDiscovery (Premium) tool, see [Limits in eDiscovery (Premium)](limits-ediscovery20.md) + ## Search limits The following table lists the search limits when using the content search tool in the compliance portal and for searches that are associated with a Microsoft Purview eDiscovery (Standard) case.
compliance Load Non Office 365 Data Into A Review Set https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/load-non-Office-365-data-into-a-review-set.md
Not all documents that you need to analyze in Microsoft Purview eDiscovery (Premium) are located in Microsoft 365. With the non-Microsoft 365 data import feature in eDiscovery (Premium), you can upload documents that aren't located in Microsoft 365 to a review set. This article shows you how to bring your non-Microsoft 365 documents into eDiscovery (Premium) for analysis. + ## Requirements to upload non-Office 365 content Using the upload non-Microsoft 365 feature described in this article requires that you have the following:
compliance Mailitemsaccessed Forensics Investigations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/mailitemsaccessed-forensics-investigations.md
A compromised user account (also called an *account takeover*) is a type of atta
To help you with investigating compromise email accounts, we're now auditing accesses of mail data by mail protocols and clients with the *MailItemsAccessed* mailbox-auditing action. This new audited action will help investigators better understand email data breaches and help you identify the scope of compromises to specific mail items that may been compromised. The goal of using this new auditing action is forensics defensibility to help assert that a specific piece of mail data was not compromised. If an attacker gained access to a specific piece of mail, Exchange Online audits the event even though there is no indication that the mail item was read. + ## The MailItemsAccessed mailbox-auditing action The new MailItemsAccessed action is part of the new [Audit (Premium)](advanced-audit.md) functionality. It's part of [Exchange mailbox auditing](/office365/securitycompliance/enable-mailbox-auditing#mailbox-auditing-actions) and is enabled by default for users that are assigned an Office 365 or Microsoft 365 E5 license or for organizations with a Microsoft 365 E5 Compliance add-on subscription.
compliance Manage Data Governance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/manage-data-governance.md
The following sections detail the main capabilities for each solution, with link
Looking for complementary capabilities to protect your data? See [Protect your data with Microsoft Purview](information-protection.md). + ## Microsoft Purview Data Lifecycle Management To keep what you need and delete what you don't:
Ready to start using some or all of these capabilities? See [Get started with re
## Licensing requirements
-To understand your licensing requirements and options, see the information from the Microsoft 365 guidance for security & compliance, [Microsoft Purview Data Lifecycle Management & Microsoft Purview Records Management](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-purview-data-lifecycle-management--microsoft-purview-records-management) section for feature-level licensing requirements.
+To understand your licensing requirements and options, see the information from the Microsoft 365 guidance for security & compliance, [Microsoft Purview Data Lifecycle Management & Microsoft Purview Records Management](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-purview-data-lifecycle-management--microsoft-purview-records-management) section for feature-level licensing requirements.
compliance Manage Hold Notification https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/manage-hold-notification.md
search.appverid:
After you have initiated your legal hold notification workflow, you can use the communications workflow in Microsoft Purview eDiscovery (Premium) to track the status of your communications. The Communications tab contains a list of all notifications within your eDiscovery (Premium) case. You can see details such as the number of custodians that have been assigned or have acknowledged the notice. + ## Monitor acknowledgments After you select a communication from the **Communications** tab, you can view a list of custodians that have acknowledged a hold notice.
compliance Manage Legal Investigations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/manage-legal-investigations.md
Organizations have many reasons to respond to a legal case involving certain exe
**Want to know how Microsoft manages its eDiscovery investigations?** Here's a [technical white paper](https://go.microsoft.com/fwlink/?linkid=852161) you can download that explains how we use the same search and investigation tools to manage our internal eDiscovery workflow. + ## Manage legal investigations with eDiscovery cases eDiscovery cases let you control who can create, access, and manage eDiscovery cases in your organization. Use cases to add members and control what types of actions they can perform, place a hold on content locations relevant to a legal case, and use the Content Search tool to search the locations on hold for content that might be responsive to your case. Then you can also export and download those results for further investigation by external reviewers.
Here's a quick overview of the built-in workflow in eDiscovery (Premium). For mo
- [Export case data](exporting-data-ediscover20.md) for review by outside counsel. -- [Manage long-running jobs](managing-jobs-ediscovery20.md) in eDiscovery (Premium).
+- [Manage long-running jobs](managing-jobs-ediscovery20.md) in eDiscovery (Premium).
compliance Manage New Custodians https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/manage-new-custodians.md
The **Custodians** page on the **Data sources** tab in an Microsoft Purview eDiscovery (Premium) case contains a list of all custodians that have been added to the case. After you add custodians to a case, details about each custodian are automatically collected from Azure Active Directory and are viewable in eDiscovery (Premium). + ## View custodian details To view the details about a custodian, click the custodian from the list on the **Custodians** tab. A flyout page is displayed and contains the following information about the custodian.
compliance Manage Office 365 Message Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/manage-office-365-message-encryption.md
description: Once you've finished setting up Office 365 Message Encryption (OME)
Once you've finished setting up Office 365 Message Encryption (OME), you can customize the configuration of your deployment in several ways. For example, you can configure whether to enable one-time pass codes, display the **Encrypt** button in Outlook on the web, and more. The tasks in this article describe how. + ## Manage whether Google, Yahoo, and Microsoft Account recipients can use these accounts to sign in to the Office 365 Message Encryption portal When you set up the new Office 365 Message Encryption capabilities, users in your organization can send messages to recipients that are outside of your organization. If the recipient uses a *social ID* such as a Google account, Yahoo account, or Microsoft account, the recipient can sign in to the OME portal with a social ID. If you want, you can choose not to allow recipients to use social IDs to sign in to the OME portal.
compliance Manage Relevance Setup In Advanced Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/manage-relevance-setup-in-advanced-ediscovery.md
eDiscovery (Premium) includes components for the Relevance training and tagging of files relevant to a case. eDiscovery (Premium) learns from the trained samples of Relevant and Not Relevant files to provide Relevance scores for each file, and generates analytical results that can be used during and after the file review process. + ## Guidelines for setting up Relevance training In Advance eDiscovery, in the **Cases** window, select a case and click **Go to case**. Click **Relevance** \> **Relevance setup**. Follow these recommended guidelines to set up Relevance.
compliance Managing Custodian Communications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/managing-custodian-communications.md
search.appverid:
Microsoft Purview eDiscovery (Premium) allows legal departments to simplify their processes around tracking and distributing legal hold notifications. The custodian communications tool enables legal departments to manage and automate the entire legal hold process, from initial notifications, to reminders, and to escalations, all in one location. + ## What is a legal hold notification? A legal hold (also known as a *litigation hold*) notice is a notification sent from an organizationΓÇÖs legal department to employees, contingent staff, or custodians of data that may be relevant to a legal investigation. These notifications instruct custodians to preserve electronically stored information and any content that may be relevant to an active or impending legal matter. Legal teams must know that each custodian has received, read, understood, and has agreed to comply with the given instructions.
For more information about managing the custodian communication process, see the
- [Manage hold notifications](manage-hold-notification.md) -- [Acknowledge a hold notification](acknowledge-hold-notification.md)
+- [Acknowledge a hold notification](acknowledge-hold-notification.md)
compliance Managing Holds https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/managing-holds.md
You can use an Microsoft Purview eDiscovery (Premium) case to create holds to preserve content that might be relevant to your case. Using the eDiscovery (Premium) hold capabilities, you can place holds on custodians and their data sources. Additionally, you can place a non-custodial hold on mailboxes and OneDrive for Business sites. You can also place a hold on the group mailbox, SharePoint site, and OneDrive for Business site for a Microsoft 365 Group. Similarly, you can place a hold on the mailbox and site that are associated with Microsoft Teams. When you place content locations on hold, content is held until you release the custodian, remove a specific data location, or delete the hold policy entirely. + ## Manage custodian-based holds In some cases, you may have a set of custodians that you have identified and have decided to preserve their data during the case. In eDiscovery (Premium), when these custodians are placed on hold, the user and their selected data sources are automatically added to a custodian hold policy.
compliance Managing Jobs Ediscovery20 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/managing-jobs-ediscovery20.md
Here's a list of the jobs (which are typically long-running processes) that are
|Running analytics|A user analyzes data in a review set by running eDiscovery (Premium) analytics tools such as near duplicate detection, email threading analysis, and themes analysis. For more information, see [Analyze data in a review set](analyzing-data-in-review-set.md).| |Tagging documents|This job is triggered when a user clicks **Start tagging job** in the **Tagging panel** when reviewing documents in a review set. A user can start this job after tagging documents in a review set and then bulk-selecting them in the view document panel. For more information, see [Tag documents in a review set](tagging-documents.md).| + ## Job status The following table describes the different status states for jobs.
compliance Managing Review Sets https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/managing-review-sets.md
Review sets are a static set of documents where you can analyze, query, view, ta
- [Export case data](exporting-data-ediscover20.md) + ## Create a review set Review sets can be created on the **Review sets** tab by clicking **+ Add review set**.
compliance Microsoft 365 Compliance Center Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/microsoft-365-compliance-center-permissions.md
To view the **Permissions** tab in the compliance portal, users need to be a glo
Permissions in the compliance portal are based on the role-based access control (RBAC) permissions model. RBAC is the same permissions model that's used by most Microsoft 365 services, so if you're familiar with the permission structure in these services, granting permissions in the compliance portal will be familiar. It's important to remember that the permissions managed in the compliance portal don't cover the management of all the permissions needed in each individual service. You'll still need to manage certain service-specific permissions in the admin center for the specific service. For example, if you need to assign permissions for archiving, auditing, and MRM retention policies, you'll need to manage these permissions in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2059104" target="_blank">Exchange admin center</a>. + ## Relationship of members, roles, and role groups A role grants permissions to do a set of tasks; for example, the Case Management role lets users work with eDiscovery cases.
compliance Microsoft 365 Compliance Center Redirection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/microsoft-365-compliance-center-redirection.md
This article explains how automatic redirection works for users accessing compliance solutions from the Office 365 Security and Compliance Center (protection.office.com) to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>. + ## What to expect Automatic redirection is enabled by default for all users accessing compliance-related solutions in Office 365 Security and Compliance (protection.office.com):
compliance Microsoft 365 Compliance Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/microsoft-365-compliance-center.md
Read this article to get acquainted with the compliance portal, [how to access i
[![Microsoft Purview compliance portal home page.](../media/m365-compliance-center-home.png)](https://compliance.microsoft.com) + ## Welcome to Microsoft Purview When you go to the compliance portal for the first time, you're greeted with the following welcome message:
compliance Microsoft 365 Solution Catalog https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/microsoft-365-solution-catalog.md
Risk and compliance solutions in Microsoft Purview are collections of integrated
Read this article to get acquainted with the solution catalog in the Microsoft Purview compliance portal, [how to access](#how-do-i-access) and your [next steps](#next-steps). + ## Catalog organization The solution catalog is organized into sections that contain information cards for each risk and compliance solution available in your Microsoft 365 subscription. Each section contains cards for solutions grouped by risk and compliance area.
compliance Migrate Aad Classification Sensitivity Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/migrate-aad-classification-sensitivity-labels.md
To learn more about sensitivity labels and their behavior for sites and Microsof
See the following scenarios for best practices when migrating from classic AAD classification to the sensitivity labels. + ## Scenario 1: Tenant never used classic AAD classifications or sensitivity labels for documents and emails - Tenant Admin enables sensitivity labels for groups by setting the tenant flag ΓÇ£EnableMIPLabelsΓÇ¥ to true via AAD powershell cmdlet.
compliance Migrate Legacy Ediscovery Searches And Holds https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/migrate-legacy-eDiscovery-searches-and-holds.md
To help customers take advantage of the new and improved functionality, this art
> [!NOTE] > Because there are many different scenarios, this article provides general guidance to transition searches and holds to a eDiscovery (Standard) case in the compliance portal. Using eDiscovery cases aren't always required, but they add an extra layer of security by letting you assign permissions to control who has access to the eDiscovery cases in your organization. + ## Before you begin - You need to install the Exchange Online PowerShell module. For instructions, see [Install and maintain the Exchange Online PowerShell module](/powershell/exchange/exchange-online-powershell-v2#install-and-maintain-the-exchange-online-powershell-module).
If you migrate an In-Place eDiscovery search but don't associate it with an eDis
- [Start-ComplianceSearch](/powershell/module/exchange/start-compliancesearch) -- For more information about the compliance portal, see [Overview of the Microsoft Purview compliance portal](microsoft-365-compliance-center.md).
+- For more information about the compliance portal, see [Overview of the Microsoft Purview compliance portal](microsoft-365-compliance-center.md).
compliance Mip Dbcs Relnotes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/mip-dbcs-relnotes.md
description: "Release notes for support for double byte character sets."
This support is available for sensitive information types and keyword dictionaries and will be reflected in Microsoft Purview Data Loss Prevention (for Exchange Online, SharePoint Online, OneDrive for Business, and Teams), Communications Compliance, Auto Labelling in office apps and Microsoft Defender for Cloud Apps. + ## Known issues - When a text file attached to an email is in UTF-8 format without byte order mark (BOM), the email isn't detected by the Communication Compliance policy.
compliance Mip Easy Trials https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/mip-easy-trials.md
Eligibility includes customers who have a [free trial for Microsoft Purview](com
|DLP for Teams | At least one DLP policy for Teams| |DLP for devices | At least one DLP policy for devices| + ## Activate the default labels and policies To get these preconfigured labels and policies:
compliance Named Entities Learn https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/named-entities-learn.md
DLP makes special use of named entities in *enhanced policy templates*, which ar
+ ## Examples of named entity SITs Named entity SITs come in two flavors, *bundled* and *unbundled*
compliance Named Entities Use https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/named-entities-use.md
description: "Use these procedures to take advantage of named entities in your d
Read through [Learn about named entities](named-entities-learn.md) before you start to use them. + ## Before you begin ### SKU/subscriptions licensing
compliance Near Duplicate Detection In Advanced Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/near-duplicate-detection-in-advanced-ediscovery.md
Consider a set of documents to be reviewed in which a subset is based on the same template and has mostly the same boilerplate language, with a few differences here and there. If a reviewer could identify this subset, review one of them thoroughly, and review the differences for the rest, they would not have missed any unique information while taking only a fraction of time that would have taken them to read all documents cover to cover. Near duplicate detection groups textually similar documents together to help you make your review process more efficient. + ## How does it work? When near duplicate detection is run, the system parses every document with text. Then, it compares every document against each other to determine whether their similarity is greater than the set threshold. If it is, the documents are grouped together. Once all documents have been compared and grouped, a document from each group is marked as the "pivot"; in reviewing your documents, you can review a pivot first and review the other documents in the same near duplicate set, focusing on the difference between the pivot and the document that is in review.
compliance New Defender Alert Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/new-defender-alert-policies.md
description: "We're releasing new alert policies for Microsoft Defender for Offi
Microsoft Defender for Office 365 is introducing new and improved alert policies related to post-delivery detections. This includes enhancements to the Automated Investigation & Response (AIR) playbooks associated with them. In addition, we're modifying the severity classification for six default alert policies to better align the alerts generated by these policies with their impact on your organization. + ## Post-delivery detections We'll be introducing four new default alert policies related to post-delivery detections after the Microsoft Defender for Office 365 Zero-hour auto purge (ZAP) removes messages from an inbox. These four new alert policies will replace two existing default alert policies that cover ZAP scenarios and will provide organizations enhanced details about the underlying detection and related indicators. These alerts (and the AIR playbooks that will be triggered from these alerts) will accurately capture the threats of the emails and entities, including if the URL points to a malicious file or if the file contains a malicious URL.
compliance Non Custodial Data Sources https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/non-custodial-data-sources.md
search.appverid:
In Microsoft Purview eDiscovery (Premium) cases, it doesn't always meet your needs to associate a Microsoft 365 data source with a custodian in the case. But you may still need to associate that data with a case so that you can search it, add it to a review set, and analyze and review it. The feature in eDiscovery (Premium) is called *non-custodial data sources* and lets you add data to a case without having to associate it to a custodian. It also applies the same eDiscovery (Premium) functionality to non-custodial data that's available for data associated with custodian. Two of the most useful things that you can apply to non-custodial data is placing it on hold and processing it using [Advanced indexing](indexing-custodian-data.md). + ## Add a non-custodial data source Follow these steps to add and manage non-custodial data sources in an eDiscovery (Premium) case.
compliance Office 365 Azure Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/office-365-azure-encryption.md
For data at rest, Azure offers many encryption options, such as support for AES-
For more information about encryption in Azure, see [Azure encryption overview](/azure/security/security-azure-encryption-overview) and [Azure Data Encryption-at-Rest](/azure/security/azure-security-encryption-atrest). + ## Azure Disk Encryption Azure Disk Encryption enables you to encrypt your Windows and Linux Infrastructure as a Service (IaaS) VM disks. Azure Disk Encryption leverages the BitLocker feature of Windows and the DM-Crypt feature of Linux to provide volume-level encryption for the operating system and the data disks. It also ensures that all data on the VM disks are encrypted at rest in your Azure storage. Azure Disk Encryption is integrated with Azure Key Vault to help you control, manage, and audit the use of the encryption keys and secrets.
compliance Office 365 Customer Managed Encryption Features https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/office-365-customer-managed-encryption-features.md
description: In this article, you'll learn about encryption technologies that yo
For more information about these technologies, see the [Microsoft 365 service descriptions](/office365/servicedescriptions/office-365-service-descriptions-technet-library). + ## Azure Rights Management [Azure Rights Management](/azure/information-protection/what-is-azure-rms) (Azure RMS) is the protection technology used by [Azure Information Protection](/information-protection/understand-explore/what-is-information-protection). It uses encryption, identity, and authorization policies to help secure your files and email across multiple platforms and devicesΓÇöphones, tablets, and PCs. Information can be protected both within and outside your organization because protection remains with the data. Azure RMS provides persistent protection of all file types, protects files anywhere, supports business-to-business collaboration, and a wide range of Windows and non-Windows devices. Azure RMS protection can also augment [data loss prevention (DLP) policies](/exchange/security-and-compliance/data-loss-prevention/data-loss-prevention). For more information about which applications and services can use the Azure Rights Management service from Azure Information Protection, see [How applications support the Azure Rights Management service](/information-protection/understand-explore/applications-support).
compliance Office 365 Encryption In The Microsoft Cloud Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/office-365-encryption-in-the-microsoft-cloud-overview.md
For customer data in transit, all Office 365 servers negotiate secure sessions u
(All customer-facing servers negotiate to TLS 1.2 by default.) + ## Related Links - [Encryption in Azure](office-365-azure-encryption.md)
compliance Office 365 Encryption Risks And Protections https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/office-365-encryption-risks-and-protections.md
Some risk scenarios and the currently available encryption technologies that mit
| Office 365 Message Encryption | Exchange Online, SharePoint Online | Customer | Email, including protected attachments, falls in hands of a person either within or outside Microsoft 365 who is not the intended recipient of the email. | OME provides value to customers where all emails originating from Microsoft 365 that match certain criteria (i.e., all emails to a certain address) are automatically encrypted before they get sent to another internal or an external recipient. | | SMTP TLS with partner organization | Exchange Online | Customer | Email is intercepted via a man-in-the-middle or other attack while in transit from a Microsoft 365 tenant to another partner organization. | This scenario provides value to the customer such that they can send/receive all emails between their Microsoft 365 tenant and their partner's email organization inside an encrypted SMTP channel. | + ## Encryption technologies available in multi-tenant environments | Encryption Technology | Implemented by | Key Exchange Algorithm and Strength | Key Management\* | FIPS 140-2 Validated |
compliance Office 365 Service Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/office-365-service-encryption.md
description: "Summary: Understand data resiliency in Microsoft Office 365."
In addition to using volume-level encryption, Exchange Online, Microsoft Teams, SharePoint Online, and OneDrive for Business also use Service Encryption to encrypt customer data. Service Encryption allows for two key management options: + ## Microsoft-managed keys Microsoft manages all cryptographic keys including the root keys for service encryption. This option is currently enabled by default for Exchange Online, SharePoint Online, OneDrive for Business. Microsoft-managed keys provide default service encryption unless you decide to onboard using Customer Key. If, at a later date, you decide to stop using Customer Key without following the data purge path, then your data stays encrypted using the Microsoft-managed keys. Your data is always encrypted at this default level at a minimum.
compliance Ome Advanced Expiration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ome-advanced-expiration.md
You can only set expiration dates for emails to external recipients.
With Microsoft Purview Advanced Message Encryption, anytime you apply custom branding, the Office 365 applies the wrapper to email that fits the mail flow rule to which you apply the template. In addition, you can only use expiration if you use custom branding. + ## Create a custom branding template to force mail expiration by using PowerShell 1. [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) with an account that has global administrator permissions in your organization.
compliance Ome Advanced Message Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ome-advanced-message-encryption.md
Advanced Message Encryption helps customers meet compliance obligations that req
You can only revoke and set an expiration date for emails sent to external recipients. + ## Get started with Microsoft Purview Advanced Message Encryption The following articles describe how you set up and use Advanced Message Encryption.
compliance Ome Message Access Logs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ome-message-access-logs.md
search.appverid:
Access logs are available for encrypted messages through the encrypted message portal that lets your organization determine when messages are read, and forwarded by your external recipients. To ensure logs are available for any external recipients, you should apply a custom branding template to protected emails sent by your organization to external recipients that enforces a portal experience. See [Add your organization's brand to your encrypted messages](add-your-organization-brand-to-encrypted-messages.md). + ## Enabling message access audit logs in PowerShell Access log can be enabled using [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). The *EnablePortalTrackingLogs* parameter of the **[Set-IrmConfiguration](/powershell/module/exchange/set-irmconfiguration)** cmdlet specifies whether to enable the audit logs of accessing the encrypted message portal. Valid values are:
compliance Ome Sensitive Info Types https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ome-sensitive-info-types.md
You can use either Exchange mail flow rules or Microsoft Purview data loss prevention (DLP) to create a sensitive information type policy with Office 365 Message Encryption. To create an Exchange mail flow rule, you can use either the <a href="https://go.microsoft.com/fwlink/p/?linkid=2059104" target="_blank">Exchange admin center (EAC)</a> or PowerShell. + ## To create the policy by using mail flow rules in the EAC Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2059104" target="_blank">Exchange admin center</a> and go to **Mail flow** > **Rules**. On the Rules page, create a rule that applies Office 365 Message Encryption. You can create a rule based on conditions such as the presence of certain keywords or sensitive information types in the message or attachment.
compliance Ome Version Comparison https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ome-version-comparison.md
The rest of this article compares legacy Office 365 Message Encryption (OME) to
This article is part of a larger series of articles about message encryption. This article is intended for administrators and ITPros. If you're just looking for information on sending or receiving an encrypted message, see the list of articles in [Message encryption](ome.md) and locate the article that best fits your needs. + ## Overview of AD RMS deprecation in Exchange Online Exchange Online includes Information Rights Management (IRM) functionality that provides online and offline protection of email messages and attachments. By default, Exchange Online uses Azure Information Protection. However, your organization may have configured Exchange Online IRM to use on-premises Active Directory Rights Management Service (AD RMS). AD RMS support in Exchange Online is retiring. Instead, Azure Information Protection will replace AD RMS entirely.
compliance Ome https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ome.md
People often use email to exchange sensitive information, such as financial data
With Office 365 Message Encryption, your organization can send and receive encrypted email messages between people inside and outside your organization. Office 365 Message Encryption works with Outlook.com, Yahoo!, Gmail, and other email services. Email message encryption helps ensure that only intended recipients can view message content. + ## How Message Encryption works The rest of this article applies to the Microsoft Purview Message Encryption.
compliance Overview Ediscovery 20 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/overview-ediscovery-20.md
The Microsoft Purview eDiscovery (Premium) solution builds on the existing Microsoft eDiscovery and analytics capabilities. eDiscovery (Premium) provides an end-to-end workflow to preserve, collect, analyze, review, and export content that's responsive to your organization's internal and external investigations. It also lets legal teams manage the entire legal hold notification workflow to communicate with custodians involved in a case. + ## eDiscovery (Premium) capabilities eDiscovery (Premium) can help your organization respond to legal matters or internal investigations by discovering data where it lives. You can seamlessly manage eDiscovery workflows by identifying persons of interest and their data sources, seamlessly apply holds to preserve data, and then manage the legal hold communication process. By collecting data from the source, you can search the live Microsoft 365 platform to quickly find what you need. Intelligent, machine learning capabilities such as deep indexing, email threading, and near duplicate detection also help you reduce large volumes of data to a relevant data set.
compliance Partially Indexed Items In Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/partially-indexed-items-in-content-search.md
An Microsoft Purview eDiscovery search that you run from the Microsoft Purview c
For legal investigations, your organization may be required to review partially indexed items. You can also specify whether to include partially indexed items when you export search results to a local computer or when you prepare the results for analysis with eDiscovery (Premium). For more information, see [Investigating partially indexed items in eDiscovery](investigating-partially-indexed-items-in-ediscovery.md). + ## File types not indexed for search Certain types of files, such as Bitmap or MP3 files, don't contain content that can be indexed. As a result, the search indexing servers in Exchange and SharePoint don't perform full-text indexing on these types of files. These types of files are considered to be unsupported file types. There are also file types for which full-text indexing has been disabled, either by default or by an administrator. Unsupported and disabled file types are labeled as unindexed items in Content Searches. As previously stated, partially indexed items can be included in the set of search results when you run a search, export the search results to a local computer, or prepare search results for eDiscovery (Premium).
compliance Permissions Filtering For Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/permissions-filtering-for-content-search.md
The following four cmdlets in Security & Compliance PowerShell let you configure
- [Set-ComplianceSecurityFilter](#set-compliancesecurityfilter) - [Remove-ComplianceSecurityFilter](#remove-compliancesecurityfilter) + ## Requirements to configure permissions filtering - To run the compliance security filter cmdlets, you have to be a member of the Organization Management role group in the compliance portal. For more information, see [Permissions in the Security & Compliance Center](../security/office-365-security/permissions-in-the-security-and-compliance-center.md).
Also, the number of search permissions filters appended to a query depends on th
There's one more thing to keep in mind about the condition limit. The number of specific SharePoint sites that are included in the search query or search permissions filters also count against this limit.
-To prevent your organization from reaching the conditions limit, keep the number of search permissions filters in your organization to few as possible to meet your business requirements.
+To prevent your organization from reaching the conditions limit, keep the number of search permissions filters in your organization to few as possible to meet your business requirements.
compliance Plan For Security And Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/plan-for-security-and-compliance.md
Managing security and compliance is a partnership. You're responsible for protecting your data, identities, and devices, while Microsoft vigorously protects Microsoft 365 services. You can use Microsoft 365 and Enterprise Mobility + Security (EMS) together to help you achieve the appropriate level of protection for your organization. + ## Step 1: Review capabilities Orient yourself to the information protection capabilities in the Information Protection for Office 365 poster.
compliance Predictive Coding Apply Prediction Filter https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/predictive-coding-apply-prediction-filter.md
Here are two ways you can use the prediction score filter:
- Cull items from the review set that the model has predicted are not relevant. Alternative, you can use the prediction score filter to de-prioritize the review of non-relevant items. + ## Before you apply a prediction score filter - Create a predictive coding model so that a corresponding prediction score filter is created.
compliance Predictive Coding Create Model https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/predictive-coding-create-model.md
The first step in using the machine learning capabilities of predictive coding i
To review the predictive coding workflow, see [Learn about predictive coding in eDiscovery (Premium)](predictive-coding-overview.md#the-predictive-coding-workflow) + ## Before you create a model - There must be a minimum of 2,000 items in a review set to create a predictive coding model.
compliance Predictive Coding Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/predictive-coding-overview.md
The predictive coding module in eDiscovery (Premium) uses the intelligent, machi
The predictive coding module is designed to streamline the complexity of managing a model within a review set and provide an iterative approach to training your model so you can get started faster with the machine learning capabilities in eDiscovery (Premium). To get started, you can create a model, label as few as 50 items as relevant or not relevant. The system uses this training to apply prediction scores to every item in the review set. This lets you filter items based on the prediction score, which allows you to review the most relevant (or non-relevant) items first. If you want to train models with higher accuracies and recall rates, you can continue labeling items in subsequent training rounds until the model stabilizes. + ## The predictive coding workflow Here's an overview and description of each step predictive coding workflow. For a more detailed description of the concepts and terminology of the predictive coding process, see [Predictive coding reference](predictive-coding-reference.md).
compliance Predictive Coding Quick Start https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/predictive-coding-quick-start.md
To get started, you create a model, label as few as 50 items as relevant or not
For a detailed overview of predictive coding, see [Learn about predictive coding in eDiscovery (Premium)](predictive-coding-overview.md). + ## Step 1: Create a new predictive coding model The first step is to create a new predictive coding model in the review set
compliance Predictive Coding Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/predictive-coding-reference.md
This article describes the key concepts and metrics of the predictive coding tool in Microsoft Purview eDiscovery (Premium). The sections in the article are listed in alphabetical order. + ## Confidence level The confidence level is an advanced setting when you create a predictive coding model. It defines that the model's performance metrics (for example, richness, precision, and recall) fall within a specified range (that's determined the margin of error defined for the model) that's representative of the true values of the prediction scores the model assigns to items in the review set. The values for the confidence level and margin of error also help determine how many items are included in the control set. The default value for the confidence level is 0.95 or 95%.
compliance Predictive Coding Train Model https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/predictive-coding-train-model.md
After you create a predictive coding model in Microsoft Purview eDiscovery (Prem
To review the predictive coding workflow, see [Learn about predictive coding in eDiscovery (Premium)](predictive-coding-overview.md#the-predictive-coding-workflow) + ## Before you train a model - During a training round, label items as **Relevant** or **Not relevant** based on the relevancy of the content in the document. Don't base your decision on the values in the metadata fields. For example, for email messages or Teams conversations, don't base your labeling decision on the message participants.
compliance Prepare Tls 1.2 In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/prepare-tls-1.2-in-office-365.md
appliesto:
# Preparing for TLS 1.2 in Office 365 and Office 365 GCC + ## Summary To provide the best-in-class encryption to our customers, Microsoft plans to deprecate Transport Layer Security (TLS) versions 1.0 and 1.1 in Office 365 and Office 365 GCC. We understand that the security of your data is important, and we're committed to transparency about changes that may affect your use of the TLS service.
compliance Preserve Bcc And Expanded Distribution Group Recipients For Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/preserve-bcc-and-expanded-distribution-group-recipients-for-ediscovery.md
Litigation holds, eDiscovery holds, and [Microsoft 365 retention policies](./ret
Exchange Online and Exchange Server 2013 (Cumulative Update 7 and later versions) retain information about Bcc and expanded distribution group recipients. You can search for this information by using an eDiscovery tool in the compliance portal. + ## How Bcc recipients and expanded distribution group recipients are preserved As stated earlier, information about Bcc'ed recipients is stored with the message in the sender's mailbox. This information is indexed and available to eDiscovery searches and holds.
compliance Preview Ediscovery Search Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/preview-ediscovery-search-results.md
To preview a sample of results returned by a search:
In the previous screenshot, notice that keywords from the search query are highlighted when you preview items. + ## How the search result samples are selected A maximum of 1,000 randomly selected items are available to preview. In addition to being randomly selected, items available for preview must also meet the following criteria:
Also, the following file container types are supported. You can view the list of
- .zip -- .gzip
+- .gzip
compliance Privacy Statement For Office 365 Secure Email Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/privacy-statement-for-office-365-secure-email-portal.md
Last Updated: May 2017
This privacy statement governs the Office 365 the new OME capabilities Portal (the "the new OME capabilities Portal"). Previous versions were known as Office 365 Message Encryption (OME) and the "OME Portal". This privacy statement does not apply to other online or offline Microsoft sites, products, or services. Other privacy statements may also apply to the data you process through the new OME capabilities Portal, such as the privacy statement for Microsoft account (if it is used for authentication) or the privacy statement associated with your device. + ## Collection, Processing, and Use of Your Information The new OME capabilities Portal enables you to view email encrypted with Office 365 from various end points, such as desktop computers or mobile devices. The encrypted email arrives in your mailbox as an HTML attachment to a regular mail. If the mail is sent to your Microsoft account, work or school account, or Gmail account, you will be asked to sign in to the web-based the new OME capabilities Portal with such account. If the encrypted mail is sent to an account other than the Microsoft Account, the work or school account, or a Gmail account, you will be prompted to create a Microsoft account and associate it with the account to which the encrypted message was sent; alternatively, you can choose to request a one-time passcode for authentication, which will be sent to the same email address to which the encrypted message was sent. After successful authentication, the message will be decrypted and displayed via the new OME capabilities Portal.
compliance Privileged Access Management Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/privileged-access-management-configuration.md
ms.assetid:
This article guides you through enabling and configuring privileged access management in your organization. You can use either the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a> or Exchange Management PowerShell to manage and use privileged access. + ## Before you begin Before you get started with privileged access management, you should confirm your [Microsoft 365 subscription](https://www.microsoft.com/microsoft-365/compare-all-microsoft-365-plans) and any add-ons. To access and use privileged access management, your organization must have one of the following subscriptions or add-ons:
compliance Privileged Access Management Solution Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/privileged-access-management-solution-overview.md
Having standing access by some users to sensitive information or critical network configuration settings in Microsoft Exchange Online is a potential pathway for compromised accounts or internal threat activities. Microsoft Purview Privileged Access Management helps protect your organization from breaches and helps to meet compliance best practices by limiting standing access to sensitive data or access to critical configuration settings. Instead of administrators having constant access, just-in-time access rules are implemented for tasks that need elevated permissions. Enabling privileged access management for Exchange Online in Microsoft 365 allows your organization to operate with zero standing privileges and provide a layer of defense against standing administrative access vulnerabilities. + ## Configure privileged access management Use the following steps to configure privileged access management for your organization:
compliance Privileged Access Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/privileged-access-management.md
Microsoft Purview Privileged Access Management allows granular access control ov
For a quick overview of the integrated Customer Lockbox and privileged access management workflow, see this [Customer Lockbox and privileged access management video](https://go.microsoft.com/fwlink/?linkid=2066800). + ## Layers of protection Privileged access management complements other data and access feature protections within the Microsoft 365 security architecture. Including privileged access management as part of an integrated and layered approach to security provides a security model that maximizes protection of sensitive information and Microsoft 365 configuration settings. As shown in the diagram, privileged access management builds on the protection provided with native encryption of Microsoft 365 data and the role-based access control security model of Microsoft 365 services. When used with [Azure AD Privileged Identity Management](/azure/active-directory/active-directory-privileged-identity-management-configure), these two features provide access control with just-in-time access at different scopes.
compliance Protect Access To Data And Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/protect-access-to-data-and-services.md
Protecting access to your Microsoft 365 data and services is crucial to defending against cyberattacks and guarding against data loss. The same protections can be applied to other SaaS applications in your environment and even to on-premises applications published with Azure Active Directory Application Proxy. + ## Step 1: Review recommendations Recommended capabilities for protecting identities and devices that access Office 365, other SaaS services, and on-premises applications published with Azure AD Application Proxy.
compliance Protect Documents That Have Fci Or Other Properties https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/protect-documents-that-have-fci-or-other-properties.md
A DLP policy simply looks for a specific property name/value pair. Any document
If you want to apply your DLP policy to content with specific Microsoft 365 labels, you should not follow the steps here. Instead, learn how to [Using a retention label as a condition in a DLP policy](data-loss-prevention-policies.md#using-a-retention-label-as-a-condition-in-a-dlp-policy). + ## Before you create the DLP policy Before you can use a Windows Server FCI property or other property in a DLP policy, you need to create a managed property in the <a href="https://go.microsoft.com/fwlink/?linkid=2185219" target="_blank">SharePoint admin center</a>. Here's why.
compliance Purview Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/purview-compliance.md
[Microsoft Purview](/purview/purview) risk and compliance solutions help you manage and monitor your data, protect information, minimize compliance risks, and meet regulatory requirements. This article will help you learn about Microsoft Purview risk and compliance solutions and quickly get started with deploying these solutions to meet specific compliance needs for your organization. + ## Protect sensitive data across clouds, apps, and devices Your information protection strategy should be driven by your business needs, but every organization has a requirement to protect some or all of its data. Use the capabilities from [Microsoft Purview Information Protection](/microsoft-365/compliance/information-protection) (formerly Microsoft Information Protection) to help you discover, classify, protect, and govern sensitive information wherever it lives or travels.
compliance Record Versioning https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/record-versioning.md
While the document is unlocked, any user with standard edit permissions can edit
For more information about what user actions are allowed when a record is locked or unlocked, see [Compare restrictions for what actions are allowed or blocked](records-management.md#compare-restrictions-for-what-actions-are-allowed-or-blocked). + ## Locking and unlocking a record After a retention label that marks content as a record is applied to a document, any user with Contribute permissions or a narrower permission level can unlock a record or lock an unlocked record.
compliance Records Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/records-management.md
description: Learn how Microsoft Purview Records Management supports high-value
A records management system, also known as records and information management, is a solution for organizations to manage regulatory, legal, and business-critical records. Records management for Microsoft Purview helps you achieve your organization's legal obligations, provides the ability to demonstrate compliance with regulations, and increases efficiency with regular disposition of items that are no longer required to be retained, no longer of value, or no longer required for business purposes.
-> [!TIP]
-> *Did you know you can try the premium versions of all nine Microsoft Purview solutions for free?* Use the 90-day Purview solutions trial to explore how robust Purview capabilities can help your organization meet its compliance needs. Microsoft 365 E3 and Office 365 E3 customers can start now at the [Microsoft Purview compliance portal trials hub](https://compliance.microsoft.com/trialHorizontalHub?sku=ComplianceE5&ref=DocsRef). Learn details about [who can sign up and trial terms](compliance-easy-trials.md).
- Use the following capabilities to support your records management solution for Microsoft 365 data: - **Label content as a record**. Create and configure retention labels to mark content as a [record](#records) that can then be applied by users or automatically applied by identifying sensitive information, keywords, or content types.
Using these capabilities, you can incorporate your organization's retention sche
In addition to the online documentation, you might find it useful to download a [deck with FAQs](https://aka.ms/MIPC/Blog-RecordsManagementWebinar) from a records management webinar. The recording of the actual webinar is no longer available. + ## Records When content is declared a record:
compliance Recover An Inactive Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/recover-an-inactive-mailbox.md
See the [More information](#more-information) section for more details about the
> - [Content search](content-search.md) > - [Export content search results](export-search-results.md) + ## Requirements to recover an inactive mailbox - You must use Exchange Online PowerShell to recover an inactive mailbox. You can't use the Exchange admin center (EAC) or the Microsoft Purview compliance portal for this procedure. For step-by-step instructions to use Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).
compliance Restore An Inactive Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/restore-an-inactive-mailbox.md
See the [More information](#more-information) section in this article for more d
> - [Content search](content-search.md) > - [Export content search results](export-search-results.md) + ## Requirements to restore an inactive mailbox - You must use Exchange Online PowerShell to restore an inactive mailbox. You can't use the Exchange admin center (EAC) or the Microsoft Purview compliance portal for this procedure. For step-by-step instructions to use Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).
compliance Retention Cmdlets https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-cmdlets.md
When you use retention labels, these contain the retention settings and their po
- A retention label policy that you publish needs a rule that defines which labels should be displayed in apps. - An auto-apply retention label policy needs a rule that defines the label to apply and the conditions for applying the label. + ## Retention cmdlets for most locations Use the cmdlets in the following table when the locations are **Exchange email**, **SharePoint sites**, **OneDrive accounts**, **Microsoft 365 Groups**, **Skype for Business**, **Exchange public folders**, **Teams chat messages**, or **Teams channel messages**.
When the locations are for Teams chat messages, Teams channel messages, Exchange
Use the help pages associated with each cmdlet for detailed information and examples.
-For guided help to create and then publish retention labels, see [Create and publish retention labels by using PowerShell](bulk-create-publish-labels-using-powershell.md).
+For guided help to create and then publish retention labels, see [Create and publish retention labels by using PowerShell](bulk-create-publish-labels-using-powershell.md).
compliance Retention Label Flow https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-label-flow.md
It's outside the scope of this article to document all the ways in which you can
- [When the flow is triggered](#when-the-flow-is-triggered) + ## Overview of using retention labels with a Power Automate flow The following processes show the high-level overview of how retention labels work with a Power Automate flow:
compliance Retention Limits https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-limits.md
description: "Understand the maximum number of policies and items per policy for
When you use [retention policies and retention label policies](retention.md#retention-policies-and-retention-labels) to automatically retain or delete data for your organization, there are some maximum numbers to be aware of. + ## Maximum number of retention labels per tenant A maximum of 1,000 retention labels are supported per tenant.
compliance Retention Policies Exchange https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-exchange.md
The information in this article supplements [Learn about retention](retention.md
- [Learn about retention for Microsoft Teams](retention-policies-teams.md) - [Learn about retention for Yammer](retention-policies-yammer.md) + ## What's included for retention and deletion The following Exchange items from user mailboxes and shared mailboxes can be retained and deleted by using retention policies and retention labels: Mail messages (includes received messages, drafts, sent messages) with any attachments, tasks when they have an end date, and notes.
compliance Retention Policies Sharepoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-sharepoint.md
For other workloads, see:
- [Learn about retention for Yammer](retention-policies-yammer.md) - [Learn about retention for Exchange](retention-policies-exchange.md) + ## What's included for retention and deletion All files stored in SharePoint or OneDrive sites can be retained by applying a retention policy or retention label.
compliance Retention Policies Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-teams.md
For other workloads, see:
- [Learn about retention for Yammer](retention-policies-yammer.md) - [Learn about retention for Exchange](retention-policies-exchange.md) + ## What's included for retention and deletion > [!NOTE]
compliance Retention Policies Yammer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-yammer.md
For other workloads, see:
- [Learn about retention for Microsoft Teams](retention-policies-teams.md) - [Learn about retention for Exchange](retention-policies-exchange.md) + ## What's included for retention and deletion Yammer user messages and community messages can be deleted by using retention policies for Yammer, and in addition to the text in these messages, the following items can be retained for compliance reasons: Hypertext links and links to other Yammer messages.
compliance Retention Preservation Lock https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-preservation-lock.md
In summary, a locked policy can be increased or extended, but it can't be reduce
Configure Preservation Lock after you've created a [retention policy](create-retention-policies.md), or a retention label policy that you [publish](create-apply-retention-labels.md) and contains only labels that [mark items as regulatory records](records-management.md#records). + ## How to lock a retention policy or retention label policy You must use PowerShell if you need to use Preservation Lock. Because administrators can't disable or delete a policy for retention after this lock is applied, enabling this feature is not available in the UI to safeguard against accidental configuration.
compliance Retention Regulatory Requirements https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-regulatory-requirements.md
Use the resources on this page to help you meet specific regulatory requirements
These resources are available to download from the [Data Protection Resources, FAQ, and White Papers](https://servicetrust.microsoft.com/ViewPage/TrustDocuments) page of the Service Trust Portal. + ## New Zealand Public Records Act **Supporting New Zealand's Public Records Act compliance obligations with Microsoft 365** - [Download assessment](https://aka.ms/NZPRA)
compliance Retention Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-settings.md
Settings that are specific to each scenario are explained in their respective do
For overview information about policies for retention and how retention works in Microsoft 365, see [Learn about retention policies and retention labels](retention.md). + ## Scopes - adaptive and static If you're unfamiliar with adaptive and static scopes, and to help you choose which one to use when you configure a policy for retention, see [Adaptive or static policy scopes for retention](retention.md#adaptive-or-static-policy-scopes-for-retention).
compliance Retention https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention.md
These retention settings work with content in place that saves you the additiona
Use the following sections to learn more about how retention policies and retention labels work, when to use them, and how they supplement each other. But if you're ready to get started and deploy retention settings for some common scenarios, see [Get started with data lifecycle management](get-started-with-data-lifecycle-management.md). + ## How retention settings work with content in place When content has retention settings assigned to it, that content remains in its original location. Most of the time, people continue to work with their documents or mail as if nothing's changed. But if they edit or delete content that's included in the retention policy, a copy of the content is automatically retained.
compliance Retry Failed Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retry-failed-content-search.md
User2@contoso.com: Application error occurred. Please try again later. (CS012-00
These errors (with error codes of CS001-002, CS003-002, CS008-009, CS012-002, and other errors of the form CS0XX-0XX) indicate that Content Search failed to search specific content locations; in this example, two mailboxes weren't searched. These errors are displayed on the status details flyout page of the Content Search. + ## Cause of content location errors When searching a large number of mailboxes, the search is distributed across thousands of servers in a Microsoft datacenter. At any one time, specific servers could be in reboot state or in the process of failing over to redundant copies. In either of these cases, the Content Search's request to retrieve data will time out. In the previous example, the errors for the mailboxes that failed were the result of the search timing out.
compliance Review Set Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/review-set-search.md
In most cases, it will be useful to dig deeper into the content in a review set and organize it to facilitate a more efficient review. Using filters and queries in a review set helps you focus on a subset of documents that meet the criteria of your review. + ## Default filters In a review set, there are five default filters that are pre-loaded in the review set:
compliance Revoke Ome Encrypted Mail https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/revoke-ome-encrypted-mail.md
If a message was encrypted using Microsoft Purview Advanced Message Encryption,
> [!NOTE] > To guarantee that the ability to track and revoke OME messages is available, you must add a custom branding template. See [Add your organization's brand to your encrypted messages](add-your-organization-brand-to-encrypted-messages.md) + ## Encrypted emails that you can revoke Admins and message senders can revoke encrypted emails if the recipient received a link-based, branded encrypted email. If the recipient received a native inline experience in a supported Outlook client, then you can't revoke the message.
compliance Search And Delete Teams Chat Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-and-delete-Teams-chat-messages.md
search.appverid:
You can use eDiscovery (Premium) and the Microsoft Graph Explorer to search for and delete chat messages in Microsoft Teams. This can help you find and remove sensitive information or inappropriate content. This search and purge workflow will also help you respond to a data spillage incident, when content containing confidential or malicious information is released through Teams chat messages. + ## Before you search and purge chat messages - To create an eDiscovery (Premium) case and use collections to search for chat messages, you have to be a member of the **eDiscovery Manager** role group in the Microsoft Purview compliance portal. To delete chat messages, you have to be assigned the **Search And Purge** role. This role is assigned to the Data Investigator and Organization Management role groups by default. For more information, see [Assign eDiscovery permissions](assign-ediscovery-permissions.md).
compliance Search Cloud Based Mailboxes For On Premises Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-cloud-based-mailboxes-for-on-premises-users.md
Here are the requirements and limitations for enabling cloud-based storage for o
> [!NOTE] > Teams channel conversations are always stored in the cloud-based mailbox that's associated with the Team, which means you can search for channel conversations. For more information about searching Teams channel conversations, see [Searching Microsoft Teams and Microsoft 365 Groups](content-search-reference.md#searching-microsoft-teams-and-microsoft-365-groups). + ## How it works If a Microsoft Teams-enabled user has an on-premises mailbox and their user account/identity has been synched to the cloud, Microsoft creates cloud-based storage to associate the on-premises user's 1xN Teams chat data with. Teams chat data for on-premises users is indexed for search. This lets you Use Content search (and searches associated with Microsoft Purview eDiscovery (Standard) and Microsoft Purview eDiscovery (Premium) cases) to search, preview, and export Teams chat data for on-premises users. You can also use **\*ComplianceSearch** cmdlets in Security & Compliance PowerShell to search for Teams chat data for on-premises users.
compliance Search For And Delete Messages In Your Organization https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-for-and-delete-messages-in-your-organization.md
You can use the Content search feature to search for and delete email messages f
> [!TIP] > If your organization has a Defender for Office 365 Plan 2 subscription, we recommend using the procedure detailed in [Remediate malicious email delivered in Office 365](/microsoft-365/security/office-365-security/remediate-malicious-email-delivered-office-365), rather than following the procedure described in this article. + ## Before you begin - The search and purge workflow described in this article doesn't delete chat messages or other content from Microsoft Teams. If the Content search that you create in Step 2 returns items from Microsoft Teams, those items won't be deleted when you purge items in Step 3. To search for and delete chat messages, see [Search and purge chat messages in Teams](search-and-delete-Teams-chat-messages.md).
compliance Search For Content In Core Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-for-content-in-core-ediscovery.md
To create a eDiscovery (Standard) search:
After the search is completed, you can preview the search results. If necessary, click **Refresh** on the **Searches** page to display the search you created. + ## More information about searching content locations - When you click **Choose users, groups, or teams** to specify mailboxes to search, the mailbox picker that's displayed is empty. This is by design to enhance performance. To add recipients to this list, click **Choose users, groups, or teams**, type a name (a minimum of three characters) in the search box, select the check box next to the name, and then click **Choose**.
compliance Search For Content https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-for-content.md
Use the Content search tool in the Microsoft Purview compliance portal to quickly find email in Exchange mailboxes, documents in SharePoint sites and OneDrive locations, and instant messaging conversations in Skype for Business. You can use the content search tool to search for email, documents, and instant messaging conversations in collaboration tools such as Microsoft Teams and Microsoft 365 Groups. + ## Search for content The first step is to starting using the Content search tool to choose content locations to search and configure a keyword query to search for specific items. Or, you can just leave the query blank and return all items in the target locations.
compliance Search For Ediscovery Activities In The Audit Log https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-for-ediscovery-activities-in-the-audit-log.md
Content Search and eDiscovery-related activities (for Microsoft Purview eDiscove
For more information about searching the audit log, the permissions that are required, and exporting search results, see [Search the audit log in the compliance portal](search-the-audit-log-in-security-and-compliance.md). + ## How to search for and view eDiscovery activities Currently, you have to do a few specific things to view eDiscovery activities in the audit log. Here's how.
compliance Search The Audit Log In Security And Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance.md
Need to find if a user viewed a specific document or purged an item from their mailbox? If so, you can use the audit log search tool in Microsoft Purview compliance portal to search the unified audit log to view user and administrator activity in your organization. Thousands of user and admin operations performed in dozens of Microsoft 365 services and solutions are captured, recorded, and retained in your organization's unified audit log. Users in your organization can use the audit log search tool to search for, view, and export (to a CSV file) the audit records for these operations. + ## Microsoft 365 services that support auditing Why a unified audit log? Because you can search the audit log for activities performed in different Microsoft 365 services. The following table lists the Microsoft 365 services and features (in alphabetical order) that are supported by the unified audit log.
compliance Search The Mailbox And Onedrive For Business For A List Of Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-the-mailbox-and-onedrive-for-business-for-a-list-of-users.md
Security & Compliance PowerShell provides a number of cmdlets that let you automate time-consuming eDiscovery-related tasks. Currently, creating a Content search in the Microsoft Purview compliance portal to search a large number of custodian content locations takes time and preparation. Before you create a search, you have to collect the URL for each OneDrive for Business site and then add each mailbox and OneDrive for Business site to the search. In future releases, this will be easier to do in the compliance portal. Until then, you can use the script in this article to automate this process. This script prompts you for the name of your organization's MySite domain (for example, **contoso** in the URL `https://contoso-my.sharepoint.com`), a list of user email addresses, the name of the new Content Search, and the search query to use. The script gets the OneDrive for Business URL for each user in the list, and then it creates and starts a Content Search that searches the mailbox and OneDrive for Business site for each user in the list, using the search query that you provide. + ## Permissions and script information - You have to be a member of the eDiscovery Manager role group in the compliance portal and a SharePoint Online global administrator to run the script in Step 3.
compliance Sensitive Information Type Learn About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitive-information-type-learn-about.md
Sensitive information types (SIT) are pattern-based classifiers. They detect sen
Microsoft provides a large number of pre-configured SITs or you can create your own. + ## Sensitive information types are used in - [Microsoft Purview Data Loss Prevention policies](dlp-learn-about-dlp.md)
compliance Sensitivity Labels Aip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-aip.md
For more information about these capabilities that extend labeling beyond Office
Independently from labeling, you can continue to use the [AIPService](/powershell/module/aipservice) PowerShell module for tenant-level management of the encryption service. For example, configure super user access when you need to remove encryption for data recovery, track and revoke documents that have been opened by the AIP client, and configure the use license validity period for offline access. For more information, see [Administering protection from Azure Information Protection by using PowerShell](/azure/information-protection/administer-powershell). + ## Decide whether to use built-in labeling for Office apps or the AIP add-in Now that the AIP client is in [maintenance mode](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/announcing-aip-unified-labeling-client-maintenance-mode-and/ba-p/3043613), we don't recommend you use the AIP add-in for Office apps for the following reasons:
compliance Sensitivity Labels Coauthoring https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-coauthoring.md
In addition, enabling this functionality results in the [AutoSave](https://suppo
To read the release announcement, see the blog post [Co-authoring on Microsoft Information Protection encrypted documents is now generally available](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/co-authoring-on-microsoft-information-protection-encrypted/ba-p/2693718). + ## Metadata changes for sensitivity labels > [!IMPORTANT]
compliance Sensitivity Labels Default Sharing Link https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-default-sharing-link.md
Configuring the default link type for documents might also be appropriate withou
- Documents labeled **General** have a default sharing link type that restricts sharing to people in your organization. - Documents labeled **Personal** have a default sharing link type that allows sharing to anyone with the link. + ## Prerequisites To apply the default sharing link type for sites, sensitivity labels must be enabled for containers. If this capability isn't yet enabled for your tenant, see [How to enable sensitivity labels for containers and synchronize labels](sensitivity-labels-teams-groups-sites.md#how-to-enable-sensitivity-labels-for-containers-and-synchronize-labels).
compliance Sensitivity Labels Office Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-office-apps.md
When you have [published](create-sensitivity-labels.md#publish-sensitivity-label
Use the information in this article to help you successfully manage sensitivity labels in Office apps. For example, identify the minimum versions of apps you need for features that are specific to built-in labeling, any additional configuration information for these features, and understand interactions with the Azure Information Protection unified labeling client and other apps and services. + ## Labeling client for desktop apps To use sensitivity labels that are built into Office desktop apps for Windows and Mac, you must use a subscription edition of Office. This labeling client doesn't support standalone editions of Office, sometimes called "Office Perpetual".
When the Outlook app doesn't support turning off mandatory labeling: If you sele
> [!NOTE] > This capability is currently rolling out for built-in labeling, and in various stages of release across the platforms. Identify the minimum versions of Outlook that support this feature by using the [capabilities table for Outlook](#sensitivity-label-capabilities-in-outlook) on this page, and the row **Apply S/MIME protection**. >
-> If you configure a label to apply S/MIME protection but the Outlook app doesn't yet support it, the label is still displayed in Outlook and can be applied, but the S/MIME settings are ignored. You won't be able to select this label for Exchange auto-labeling policies.
+> If you configure a label to apply S/MIME protection but Outlook on Windows doesn't yet support it, the label is still displayed and can be applied, but the S/MIME settings are ignored. You won't be able to select this label for Exchange auto-labeling policies.
This configuration is not available in the Microsoft Purview compliance portal. You must use PowerShell advanced settings with the [Set-Label](/powershell/module/exchange/set-label) or [New-Label](/powershell/module/exchange/new-label) cmd after you've [connected to Office 365 Security & Compliance Center PowerShell](/powershell/exchange/office-365-scc/connect-to-scc-powershell/connect-to-scc-powershell).
compliance Sensitivity Labels Sharepoint Default Label https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-sharepoint-default-label.md
When you use Office on the web to create or edit a file, the default sensitivity
- File upload: it can take a few minutes for the label to be applied. - Microsoft 365 Apps: the label is applied after the app is closed. + ## Will an existing label be overridden? Summary of outcomes:
To map sensitivity label GUIDs to label names, use the [Get-Label](/powershell/m
## Next steps
-Default labeling ensures a minimum level of protection but doesn't take into account the file contents that might require a higher level of protection. Consider supplementing this labeling method with [automatic labeling](apply-sensitivity-label-automatically.md) that uses content inspection, and encourage [manual labeling](https://support.microsoft.com/office/apply-sensitivity-labels-to-your-files-and-email-in-office-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9) for users to replace the default label when needed.
+Default labeling ensures a minimum level of protection but doesn't take into account the file contents that might require a higher level of protection. Consider supplementing this labeling method with [automatic labeling](apply-sensitivity-label-automatically.md) that uses content inspection, and encourage [manual labeling](https://support.microsoft.com/office/apply-sensitivity-labels-to-your-files-and-email-in-office-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9) for users to replace the default label when needed.
compliance Sensitivity Labels Sharepoint Onedrive Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-sharepoint-onedrive-files.md
You always have the choice to disable sensitivity labels for Office files in Sha
If you are currently protecting documents in SharePoint by using SharePoint Information Rights Management (IRM), be sure to check the [SharePoint Information Rights Management (IRM) and sensitivity labels](#sharepoint-information-rights-management-irm-and-sensitivity-labels) section on this page. + ## Requirements These new capabilities work with [sensitivity labels](sensitivity-labels.md) only. If you currently have Azure Information Protection labels, first migrate them to sensitivity labels so that you can enable these features for new files that you upload. For instructions, see [How to migrate Azure Information Protection labels to unified sensitivity labels](/azure/information-protection/configure-policy-migrate-labels).
compliance Sensitivity Labels Teams Groups Sites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-teams-groups-sites.md
Content in these containers however, do not inherit the labels for the sensitivi
Container labels don't support displaying [other languages](create-sensitivity-labels.md#additional-label-settings-with-security--compliance-powershell) and display the original language only for the label name and description. + ## Using sensitivity labels for Microsoft Teams, Microsoft 365 groups, and SharePoint sites Before you enable sensitivity labels for containers and configure sensitivity labels for the new settings, users can see and apply sensitivity labels in their apps. For example, from Word:
compliance Sensitivity Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels.md
In all these cases, sensitivity labels from Microsoft Purview can help you take
For more information about these and other scenarios that are supported by sensitivity labels, see [Common scenarios for sensitivity labels](get-started-with-sensitivity-labels.md#common-scenarios-for-sensitivity-labels). New features are being developed all the time that support sensitivity labels, so you might also find it useful to check the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=Microsoft%20Information%20Protection&searchterms=label). + ## What a sensitivity label is When you assign a sensitivity label to content, it's like a stamp that's applied and is:
compliance Service Assurance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/service-assurance.md
You can also find out how Office 365 can help customers comply with standards, l
- Federal Risk and Authorization Management Program (FedRAMP) + ## Who can access Office 365 Service assurance, and how? **New customers, and customers evaluating Microsoft online services** can access Service assurance which is included with Office 365 Enterprise E3 and E5 plans (both trial and paid subscriptions). If you don't have one of these plans and want to try Service assurance, you can [sign-up for a trial of Office 365 Enterprise E5](https://go.microsoft.com/fwlink/p/?LinkID=698279).
Depending on your specific set-up, options included in your view might have some
**Why am I getting an error saying that documents from Service assurance are corrupted?**
-Most Service assurance documents are in PDF format. Choose **Save** to save these files to, and then open them up from, your local computer.
+Most Service assurance documents are in PDF format. Choose **Save** to save these files to, and then open them up from, your local computer.
compliance Set Up Advanced Audit https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/set-up-advanced-audit.md
If your organization has a subscription and end-user licensing that supports Aud
![Workflow to set up Audit (Premium).](../media/AdvancedAuditWorkflow.png) + ## Step 1: Set up Audit (Premium) for users Audit (Premium) features such as the ability to log crucial events such as MailItemsAccessed and Send require an appropriate E5 license assigned to users. Additionally, the Advanced Auditing app/service plan must be enabled for those users. To verify that the Advanced Auditing app is assigned to users, perform the following steps for each user:
compliance Set Up An Archive And Deletion Policy For Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/set-up-an-archive-and-deletion-policy-for-mailboxes.md
You can follow some or all of the steps in this article to set up an archive and
> [!NOTE] > Instructions in this article use the [Microsoft Purview compliance portal](microsoft-365-compliance-center.md) and the [new Exchange admin center](/exchange/features-in-new-eac). + ## Before you set up an archive and deletion policy - You must be a global administrator in your organization to perform the steps in this article.
compliance Set Up Azure Rms For Previous Version Message Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/set-up-azure-rms-for-previous-version-message-encryption.md
description: "The previous version of Office 365 Message Encryption depends on M
This topic describes the steps you need to follow in order to activate and then set up Azure Rights Management (RMS), part of Azure Information Protection, for use with the previous version of Office 365 Message Encryption (OME). + ## This article only applies to the previous version of OME If you haven't yet moved your organization to Microsoft Purview Message Encryption, but you have already deployed OME, then the information in this article applies to your organization. Microsoft recommends that you make a plan to move to Microsoft Purview Message Encryption as soon as it is reasonable for your organization. For instructions, see [Set up Microsoft Purview Message Encryption](set-up-new-message-encryption-capabilities.md). If you want to find out more about how the new capabilities work first, see [Message Encryption](ome.md). The rest of this article refers to OME behavior before the release of Microsoft Purview Message Encryption.
compliance Set Up Basic Audit https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/set-up-basic-audit.md
These steps include ensuring the proper organizational subscriptions and user li
For more information, see [Audit (Standard) in Microsoft 365](auditing-solutions-overview.md#audit-standard). + ## Step 1: Verify organization subscription and user licensing Licensing for Audit (Standard) requires the appropriate organization subscription that provides access to audit log search tool and per-user licensing that's required to log and retain audit records.
compliance Set Up Compliance Boundaries https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/set-up-compliance-boundaries.md
Here's the process for setting up compliance boundaries:
[Step 4: Create an eDiscovery case for an intra-agency investigations](#step-4-create-an-ediscovery-case-for-intra-agency-investigations) + ## Before you set up compliance boundaries - Users must be assigned an Exchange Online license. To verify this, use the [Get-User](/powershell/module/exchange/get-user) cmdlet in Exchange Online PowerShell.
compliance Set Up Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/set-up-encryption.md
With Office 365, several encryption capabilities are available by default. Addit
|Files are shared in online meetings and IM conversations (Microsoft Teams)|When people are working with files using Microsoft Teams, TLS is used for the connection. This is built into Office 365 automatically. Microsoft Teams does not currently support inline rendering of encrypted email. To prevent encrypted email from landing in Microsoft Teams as encrypted, see [Message Encryption FAQ](./ome-faq.yml#can-i-automatically-remove-encryption-on-incoming-and-outgoing-mail-).| | + ## Additional information To learn more about file protection solutions that include encryption options, see [File Protection Solutions in Office 365](https://www.microsoft.com/download/details.aspx?id=55523).
compliance Set Up Irm In Sp Admin Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/set-up-irm-in-sp-admin-center.md
Within SharePoint Online, IRM protection is applied to files at the list and library level. Before your organization can use IRM protection, you must first set up Rights Management. IRM relies on the Azure Rights Management service from Azure Information Protection to encrypt and assign usage restrictions. Some Microsoft 365 plans include Azure Rights Management, but not all. To learn more, read [How Office applications and services support Azure Rights Management](/azure/information-protection/understand-explore/office-apps-services-support). + ## Turn on IRM service using SharePoint admin center Before your organization can IRM-protect SharePoint lists and libraries, you must first activate the Rights Management service for your organization. To learn how see [Activating Azure Rights Management](/information-protection/deploy-use/activate-service). You must use a work or school account that has global administrator privileges to enable the Rights Management service. Otherwise, you won't be able to use IRM features with SharePoint Online.
compliance Set Up New Message Encryption Capabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/set-up-new-message-encryption-capabilities.md
Microsoft Purview Message Encryption allows organizations to share protected ema
Follow the steps below to ensure that Microsoft Purview Message Encryption is available in your organization. + ## Verify that Azure Rights Management is active Microsoft Purview Message Encryption leverages the protection features in [Azure Rights Management Services (Azure RMS)](/azure/information-protection/what-is-information-protection), the technology used by [Azure Information Protection](/azure/information-protection/what-is-azure-rms) to protect emails and documents via encryption and access controls.
compliance Single Item Error Remediation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/single-item-error-remediation.md
search.appverid:
Error remediation gives Microsoft Purview eDiscovery (Premium) users the ability to rectify data issues that prevent eDiscovery (Premium) from properly processing the content. For example, files that are password protected can't be processed because those files are locked or encrypted. Previously, you could only remediate errors in bulk by using [this workflow](error-remediation-when-processing-data-in-advanced-ediscovery.md). But sometimes, it doesn't make sense to remediate errors in multiple files when youΓÇÖre unsure if any of those files are responsive to the case youΓÇÖre investigating. It also might not make sense to remediate errors before youΓÇÖve had a chance to review the file metadata (such as file location or who had access) to help you make up-front decisions about responsiveness. A new feature called *single item error remediation* gives eDiscovery managers the ability to view the metadata of files with a processing error and if necessary remediate the error directly in the review set. The article discusses how to identify, ignore, and remediate files with processing errors in a review set. + ## Identify documents with errors Documents with processing errors in a review set are now identified (with a banner). You can remediate or ignore the error. The following screenshot shows the processing error banner for a Word document in a review set that is password-protected. Also notice that you can view the file metadata of documents with processing errors.
compliance Sit Common Scenarios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-common-scenarios.md
This article describes how to implement some common sensitive information type (SIT) use case scenarios. You can use these procedures as examples and adapt them to your specific needs. + ## Protect credit card numbers Contoso Bank needs to classify the credit card numbers that they issue as sensitive. Their credit cards start with a set of six-digit patterns. They would like to customize the out of the box credit card definition to only detect the credit card numbers starting with their six-digit patterns.
compliance Sit Create Edm Sit Classic Ux Workflow https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-create-edm-sit-classic-ux-workflow.md
Creating and making an exact data match (EDM) based sensitive information type (SIT) available is a multi-phase process. They can be used in Microsoft Purview data loss prevention policies, auto-labeling, eDiscovery and certain content governance tasks. This article outlines the workflow and links to the procedures for each phase using the classic experience. + ## Applies to - Classic experience
compliance Sit Create Edm Sit Unified Ux Sample File https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-create-edm-sit-unified-ux-sample-file.md
Creating and making an exact data match (EDM) based sensitive information type (SIT) available is a multi-phase process. They can be used in Microsoft Purview data loss prevention policies, eDiscovery and certain content governance tasks This article outlines the workflow and links to the procedures for each phase using the classic experience. + ## Applies to - New experience
Then your sample file must have the same column headers, but use synthetic value
## Next step -- **For new experience**: [Create EDM SIT schema and rule package](sit-create-edm-sit-unified-ux-schema-rule-package.md)
+- **For new experience**: [Create EDM SIT schema and rule package](sit-create-edm-sit-unified-ux-schema-rule-package.md)
compliance Sit Create Edm Sit Unified Ux Schema Rule Package https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-create-edm-sit-unified-ux-schema-rule-package.md
You can create the EDM schema and sensitive information type (or rule package) using the new experience in the compliance portal. + ## Applies to - New experience
compliance Sit Create Edm Sit Unified Ux Workflow https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-create-edm-sit-unified-ux-workflow.md
Creating and making an exact data match (EDM) based sensitive information type (SIT) available is a multi-phase process. They can be used in Microsoft Purview data loss prevention policies, eDiscovery and certain content governance tasks This article outlines the workflow and links to the procedures for each of the phases + ## Applies to - New experience
compliance Sit Custom Sit Filters https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-custom-sit-filters.md
description: "This article presents a list of the filters that can be encoded in
In Microsoft you can define filters or other checks while creating a custom sensitive information types (SIT). + ## List of supported filters and use cases ### AllDigitsSame Exclude
compliance Sit Defn Aba Routing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-aba-routing.md
description: "ABA routing number sensitive information type entity definition."
# ABA routing number + ## Format nine digits that may be in a formatted or unformatted pattern
compliance Sit Defn All Full Names https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-all-full-names.md
description: "All full names sensitive information type entity definition."
All full names is a bundled named entity. It detects full names for people from all supported countries/regions, which include Australia, China, Japan, U.S., and countries in the EU. Use this SIT to detect all possible matches of full names. + ## Format Various.
In addition, patterns that a human would see as indicative of names are also mat
- Slovenian - Spanish - Swedish-- Turkish
+- Turkish
compliance Sit Defn All Medical Terms Conditions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-all-medical-terms-conditions.md
description: "All medical terms and conditions sensitive information type entity
All medical terms and conditions is a bundled named entity that detects medical terms and medical conditions. It detects English terms only. Use this SIT to detect all possible matches of medical terms and conditions. + ## Format Dictionary
compliance Sit Defn All Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-all-physical-addresses.md
description: "All Physical Addresses sensitive information type entity definitio
All physical addresses is a bundled entity SIT, which detects patterns related to physical addresses from all supported countries/regions. + ## Format Various
This bundled named entity SIT contains these individual SITs:
- Slovenian - Spanish - Swedish-- Turkish
+- Turkish
compliance Sit Defn Amazon S3 Client Secret Access Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-amazon-s3-client-secret-access-key.md
description: "Amazon S3 client secret access key sensitive information type enti
# Amazon S3 client secret access key (preview) + ## Format A combination of 40 characters consisting of letters, digits, and special characters.
The patterns are designed to match actual credentials with reasonable confidence
### Keyword_SymmetricKey240: - secret -- key
+- key
compliance Sit Defn Argentina National Identity Numbers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-argentina-national-identity-numbers.md
description: "Argentina national identity (DNI) number sensitive information typ
# Argentina national identity (DNI) number + ## Format Eight digits with or without periods
A DLP policy has medium confidence that it's detected this type of sensitive inf
- documento n├║mero - documento numero - registro nacional de las personas-- rnp
+- rnp
compliance Sit Defn Argentina Unique Tax Identification Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-argentina-unique-tax-identification-key.md
description: "Argentina Unique Tax Identification Key (CUIT/CUIL) sensitive info
# Argentina Unique Tax Identification Key (CUIT/CUIL) + ## Format 11 digits with dash
A DLP policy has medium confidence that it's detected this type of sensitive inf
- tax identity - tax identification - N├║mero de Identificaci├│n Fiscal-- n├║mero de contribuyente
+- n├║mero de contribuyente
compliance Sit Defn Asp Net Machine Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-asp-net-machine-key.md
description: "ASP.NET machine key sensitive information type entity definition."
# ASP.NET machine key (preview) + ## Format Symmetric keys in XML configuration.
compliance Sit Defn Australia Bank Account Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-australia-bank-account-number.md
description: "Australia bank account number sensitive information type entity de
# Australia bank account number + ## Format six to 10 digits with or without a bank state branch number
A DLP policy has medium confidence that it's detected this type of sensitive inf
- bank details - banking information - full names-- iaea
+- iaea
compliance Sit Defn Australia Business Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-australia-business-number.md
description: "Australia business number sensitive information type entity defini
# Australia business number + ## Format 11 digits with optional delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- businessid# - business ID - abn-- businessno#
+- businessno#
compliance Sit Defn Australia Company Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-australia-company-number.md
description: "Australia company number sensitive information type entity definit
+ ## Format nine digits with delimiters
compliance Sit Defn Australia Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-australia-drivers-license-number.md
description: "Australia driver's license number sensitive information type entit
# Australia drivers license number + ## Format nine letters and digits
compliance Sit Defn Australia Medical Account Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-australia-medical-account-number.md
description: "Australia medical account number sensitive information type entity
# Australia medical account number + ## Format 10-11 digits
compliance Sit Defn Australia Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-australia-passport-number.md
description: "Australia passport number sensitive information type entity defini
# Australia passport number + ## Format eight or nine alphanumeric characters
A DLP policy has low confidence that it's detected this type of sensitive inform
- department of immigration - national identity card - travel document-- issuing authority
+- issuing authority
compliance Sit Defn Australia Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-australia-physical-addresses.md
description: "Australia physical addresses sensitive information type entity def
Unbundled named entity, detects patterns related to physical address from Australia. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level medium
compliance Sit Defn Australia Tax File Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-australia-tax-file-number.md
description: "Australia tax file number sensitive information type entity defini
# Australia tax file number + ## Format eight to nine digits
compliance Sit Defn Austria Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-austria-drivers-license-number.md
description: "Austria drivers license number sensitive information type entity d
# Austria drivers license number + ## Format eight digits without spaces and delimiters
compliance Sit Defn Austria Identity Card https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-austria-identity-card.md
description: "Austria identity card sensitive information type entity definition
# Austria identity card + ## Format A 24-character combination of letters, digits, and special characters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- identity number - national id-- personalausweis republik ├╢sterreich
+- personalausweis republik ├╢sterreich
compliance Sit Defn Austria Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-austria-passport-number.md
description: "Austria passport number sensitive information type entity definiti
# Austria passport number + ## Format One letter followed by an optional space and seven digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Austria Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-austria-physical-addresses.md
description: "Austria physical addresses sensitive information type entity defin
This unbundled named entity detects patterns related to physical address from Austria. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Austria Social Security Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-austria-social-security-number.md
description: "Austria social security number sensitive information type entity d
# Austria social security number + ## Format 10 digits in the specified format
A DLP policy has medium confidence that it's detected this type of sensitive inf
- ssn - versicherungscode - versicherungsnummer-- zdravstveno zavarovanje
+- zdravstveno zavarovanje
compliance Sit Defn Austria Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-austria-tax-identification-number.md
description: "Austria tax identification number sensitive information type entit
# Austria tax identification number + ## Format nine digits with optional hyphen and forward slash
A DLP policy has low confidence that it's detected this type of sensitive inform
- tin ID - tin no - tin#-- tax number
+- tax number
compliance Sit Defn Austria Value Added Tax https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-austria-value-added-tax.md
description: "Austria value added tax sensitive information type entity definiti
# Austria value added tax + ## Format 11-character alphanumeric pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- umsatzsteuer-identifikationsnummer - vat identification number - atu number-- uid number
+- uid number
compliance Sit Defn Azure Ad Client Access Token https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-ad-client-access-token.md
description: "Azure AD client access token sensitive information type entity def
# Azure AD client access token (preview) + ## Format A combination of up to 10,000 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Ad Client Secret https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-ad-client-secret.md
description: "Azure AD client secret sensitive information type entity definitio
# Azure AD client secret (preview) + ## Format A combination of up to 40 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Ad User Credentials https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-ad-user-credentials.md
description: "Azure AD user credentials sensitive information type entity defini
# Azure AD user credentials (preview) + ## Format A paired username and password related to *.onmicrosoft.com domain.
compliance Sit Defn Azure App Service Deployment Password https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-app-service-deployment-password.md
description: "Azure App Service Deployment Password sensitive information type e
# Azure App Service deployment password (preview) + ## Format A combination of 60 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Batch Shared Access Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-batch-shared-access-key.md
description: "Azure Batch Shared Access Key sensitive information type entity de
# Azure Batch Shared Access Key (preview) + ## Format A combination of 43 characters consisting of letters, digits, and special characters ending in an equals (=) sign that isn't part of the pattern.
compliance Sit Defn Azure Bot Framework Secret Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-bot-framework-secret-key.md
description: "Azure Bot Framework secret key sensitive information type entity d
# Azure Bot Framework secret key (preview) + ## Format A combination of 55 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Bot Service App Secret https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-bot-service-app-secret.md
description: "Azure Bot service app secret sensitive information type entity def
# Azure Bot service app secret (preview) + ## Format A combination of up to 40 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Cognitive Search Api Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-cognitive-search-api-key.md
description: "Azure Cognitive search API key sensitive information type entity d
# Azure Cognitive Search API key (preview) + ## Format A combination of 32 characters consisting of letters and digits.
compliance Sit Defn Azure Cognitive Service Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-cognitive-service-key.md
description: "Azure Cognitive Service key sensitive information type entity defi
# Azure Cognitive Service key (preview) + ## Format A combination of 32 characters consisting of letters and digits.
compliance Sit Defn Azure Container Registry Access Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-container-registry-access-key.md
description: "Azure Container Registry access key sensitive information type ent
# Azure Container Registry access key (preview) + ## Format A combination of 32 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Cosmos Db Account Access Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-cosmos-db-account-access-key.md
description: "Azure COSMOS DB account access key sensitive information type enti
# Azure COSMOS DB account access key (preview) + ## Format A combination of 88 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Databricks Personal Access Token https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-databricks-personal-access-token.md
description: "Azure Databricks personal access token sensitive information type
# Azure Databricks personal access token (preview) + ## Format A combination of 32 characters consisting of letters and digits.
compliance Sit Defn Azure Devops App Secret https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-devops-app-secret.md
description: "Azure DevOps app secret sensitive information type entity definiti
# Azure DevOps app secret (preview) + ## Format A combination of 52 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Devops Personal Access Token https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-devops-personal-access-token.md
description: "Azure DevOps personal access token sensitive information type enti
# Azure DevOps personal access token (preview) + ## Format A combination of 52 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Document Db Auth Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-document-db-auth-key.md
description: "Azure DocumentDB auth key sensitive information type entity defini
# Azure DocumentDB auth key + ## Format The string `DocumentDb` followed by the characters and strings outlined in the pattern below.
compliance Sit Defn Azure Eventgrid Access Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-eventgrid-access-key.md
description: "Azure EventGrid access key sensitive information type entity defin
# Azure EventGrid access key (preview) + ## Format A combination of 43 characters consisting of letters, digits, and special characters ending in an equals sign (=) that is not part of the pattern.
compliance Sit Defn Azure Function Master Api Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-function-master-api-key.md
description: "Azure Function Master / API key sensitive information type entity
# Azure Function Master / API key (preview) + ## Format A combination of 56 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Iaas Database Connection String Azure Sql Connection String https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-iaas-database-connection-string-azure-sql-connection-string.md
description: "Azure IAAS database connection string and Azure SQL connection str
# Azure IAAS database connection string and Azure SQL connection string + ## Format The string `Server`, `server`, or `data source` followed by the characters and strings outlined in the pattern below, including the string `cloudapp.azure.com` or `cloudapp.azure.net` or `database.windows.net`, and the string `Password` or `password` or `pwd`.
compliance Sit Defn Azure Iot Connection String https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-iot-connection-string.md
description: "Azure IoT connection string sensitive information type entity defi
The string `HostName` followed by the characters and strings outlined in the pattern below, including the strings `azure-devices.net` and `SharedAccessKey`. + ## Pattern - the string `HostName`
compliance Sit Defn Azure Iot Shared Access Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-iot-shared-access-key.md
description: "Azure IoT shared access key sensitive information type entity defi
# Azure IoT shared access key + ## Format A combination of 44-characters consisting of letters, digits, and special characters ending with and equals sign that isn't part of the pattern.
compliance Sit Defn Azure Logic App Shared Access Signature https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-logic-app-shared-access-signature.md
description: "Azure Logic App shared access signature sensitive information type
# Azure Logic App shared access signature (preview) + ## Format A combination of up to 76 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Machine Learning Web Service Api Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-machine-learning-web-service-api-key.md
description: "Azure Machine Learning web service API key sensitive information t
# Azure Machine Learning web service API key (preview) + ## Format A combination of 88 characters consisting of letters, digits, and special characters ending in two equals signs (==).
compliance Sit Defn Azure Maps Subscription Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-maps-subscription-key.md
description: "Azure Maps subscription key sensitive information type entity defi
# Azure Maps subscription key (preview) + ## Format A combination of 43 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Redis Cache Connection String Password https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-redis-cache-connection-string-password.md
description: "Azure Redis cache connection string password sensitive information
# Azure Redis cache connection string password (preview) + ## Format A combination of up to 20,000-characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Redis Cache Connection String https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-redis-cache-connection-string.md
description: "Azure Redis cache connection string sensitive information type ent
# Azure Redis cache connection string + ## Format The string `redis.cache.windows.net` followed by the characters and strings outlined in the pattern below, including the string `password` or `pwd`.
compliance Sit Defn Azure Sas https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-sas.md
description: "Azure SAS sensitive information type entity definition."
# Azure SAS + ## Format The string `sig` followed by the characters and strings outlined in the pattern below.
compliance Sit Defn Azure Service Bus Connection String https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-service-bus-connection-string.md
description: "Azure service bus connection string sensitive information type ent
# Azure service bus connection string + ## Format The string `EndPoint` followed by the characters and strings outlined in the pattern below, including the strings `servicebus.windows.net` and `SharedAccesKey`.
compliance Sit Defn Azure Service Bus Shared Access Signature https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-service-bus-shared-access-signature.md
description: "Azure service bus shared access signature sensitive information ty
# Azure service bus shared access signature (preview) + ## Format A combination of 44-characters consisting of letters, digits, and special characters ending with an equals sign (=) that is not part of the pattern.
compliance Sit Defn Azure Shared Access Key Web Hook Token https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-shared-access-key-web-hook-token.md
description: "Azure Shared Access key / Web Hook token sensitive information typ
# Azure Shared Access key / Web Hook token (preview) + ## Format A combination of 44 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Signalr Access Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-signalr-access-key.md
description: "Azure SignalR access key sensitive information type entity definit
# Azure SignalR access key (preview) + ## Format A combination of 43 characters consisting of letters, digits, and special characters ending in an equals sign (=) that isn't part of the pattern.
compliance Sit Defn Azure Sql Connection String https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-sql-connection-string.md
description: "Azure SQL connection string sensitive information type entity defi
# Azure SQL connection string (preview) + ## Format Up to 20,000-character combination of letters, digits, and special characters.
compliance Sit Defn Azure Storage Account Access Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-storage-account-access-key.md
description: "Azure storage account access key sensitive information type entity
# Azure storage account access key (preview) + ## Format A combination of up to 20,000 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Storage Account Key Generic https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-storage-account-key-generic.md
description: "Azure Storage account key (generic) sensitive information type ent
# Azure Storage account key (generic) + ## Format Any combination of 86 lower- or uppercase letters, digits, the forward slash (/), or plus sign (+), preceded or followed by the characters outlined in the pattern below.
A DLP policy has high confidence that it's detected this type of sensitive infor
<IdMatch idRef="CEP_Regex_AzureStorageAccountKeyGeneric" /> </Pattern> </Entity>
-```
+```
compliance Sit Defn Azure Storage Account Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-storage-account-key.md
description: "Azure storage account key sensitive information type entity defini
# Azure storage account key + ## Format The string `DefaultEndpointsProtocol` followed by the characters and strings outlined in the pattern below, including the string `AccountKey`.
This sensitive information type identifies these keywords by using a regular exp
- localhost - 127.0.0.1 - testacs.<!--no-hyperlink-->com-- s-int.<!--no-hyperlink-->net
+- s-int.<!--no-hyperlink-->net
compliance Sit Defn Azure Storage Account Shared Access Signature High Risk Resources https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-storage-account-shared-access-signature-high-risk-resources.md
description: "Azure Storage account shared access signature for high risk resour
# Azure Storage account shared access signature for high risk resources (preview) + ## Format A combination of 44 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Storage Account Shared Access Signature https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-storage-account-shared-access-signature.md
description: "Azure Storage account shared access signature sensitive informatio
# Azure Storage account shared access signature (preview) + ## Format A combination of 44 characters consisting of letters, digits, and special characters.
compliance Sit Defn Azure Subscription Management Certificate https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-subscription-management-certificate.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Azure subscription management certificate sensitive information ty
# Azure subscription management certificate (preview) + ## Format A combination of up to 20,000 characters consisting of letters, digits, and special characters.
compliance Sit Defn Belgium Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-belgium-drivers-license-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Belgium driver's license number sensitive information type entity
# Belgium drivers license number + ## Format 10 digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- fuhrerscheinnummer - fuehrerscheinnummer - permis de conduire-- numéro permis conduire
+- numéro permis conduire
compliance Sit Defn Belgium National Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-belgium-national-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Belgium national number sensitive information type entity definiti
# Belgium national number + ## Format 11 digits plus optional delimiters
A DLP policy has low confidence that it's detected this type of sensitive inform
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Belgium Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-belgium-passport-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Belgium passport number sensitive information type entity definiti
# Belgium passport number + ## Format two letters followed by six digits with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Belgium Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-belgium-physical-addresses.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Belgium physical addresses sensitive information type entity defin
This unbundled named entity detects patterns related to physical addresses from Belgium. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level Medium
compliance Sit Defn Belgium Value Added Tax Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-belgium-value-added-tax-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Belgium value added tax number sensitive information type entity d
# Belgium value added tax number + ## Format 12-character alphanumeric pattern
compliance Sit Defn Blood Test Terms https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-blood-test-terms.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Blood test terms sensitive information type entity definition."
This unbundled named entity detects terms related to blood tests, such as *hCG*. It supports English terms only. It's also included in the [All medical terms and conditions](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level High
compliance Sit Defn Brand Medication Names https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-brand-medication-names.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Brand medication names sensitive information type entity definitio
This unbundled named entity detects names of brand medication, such as *Tylenol*. It supports English terms only. It's also included in the [All medical terms and conditions](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level High
compliance Sit Defn Brazil Cpf Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-brazil-cpf-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Brazil CPF number sensitive information type entity definition."
# Brazil CPF number + ## Format 11 digits that include a check digit and can be formatted or unformatted
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Imposto - Identificação - Inscrição-- Receita
+- Receita
compliance Sit Defn Brazil Legal Entity Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-brazil-legal-entity-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Brazil legal entity number (CNPJ) sensitive information type entit
# Brazil legal entity number (CNPJ) + ## Format 14 digits that include a registration number, branch number, and check digits, plus delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Pessoas jurídicas - Situação cadastral - Inscrição-- Empresa
+- Empresa
compliance Sit Defn Brazil National Identification Card https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-brazil-national-identification-card.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Brazil national identification card (RG) sensitive information typ
# Brazil national identification card (RG) + ## Format Registro Geral (old format): Nine digits
A DLP policy has high confidence that it's detected this type of sensitive infor
- registro de Iidentidade - registro geral - RG (this keyword is case-sensitive)-- RIC (this keyword is case-sensitive)
+- RIC (this keyword is case-sensitive)
compliance Sit Defn Brazil Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-brazil-physical-addresses.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Brazil physical addresses sensitive information type entity defini
This unbundled named entity detects patterns related to physical address from Brazil. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Bulgaria Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-bulgaria-drivers-license-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Bulgaria driver's license number sensitive information type entity
# Bulgaria drivers license number + ## Format nine digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- свидетелство за управление на моторно превозно средство - сумпс - шофьорска книжка-- шофьорски книжки
+- шофьорски книжки
compliance Sit Defn Bulgaria Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-bulgaria-passport-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Bulgaria passport number sensitive information type entity definit
# Bulgaria passport number + ## Format nine digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Bulgaria Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-bulgaria-physical-addresses.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Bulgaria physical addresses sensitive information type entity defi
This unbundled named entity detects patterns related to physical address from Bulgaria. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Bulgaria Uniform Civil Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-bulgaria-uniform-civil-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Bulgaria uniform civil number sensitive information type entity de
# Bulgaria uniform civil number + ## Format 10 digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- униформ граждански не - униформ граждански номер - униформгражданскиid#-- униформгражданскине.#
+- униформгражданскине.#
compliance Sit Defn Canada Bank Account Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-canada-bank-account-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Canada bank account number sensitive information type entity defin
# Canada bank account number + ## Format 7 or 12 digits
A DLP policy has high confidence that it's detected this type of sensitive infor
- institution number - deposit request - banking information-- direct deposit
+- direct deposit
compliance Sit Defn Canada Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-canada-drivers-license-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Canada driver's license number sensitive information type entity d
# Canada drivers license number + ## Format Varies by province
A DLP policy has medium confidence that it's detected this type of sensitive inf
- idcard# - identification card# - identification cards#-- identification#
+- identification#
compliance Sit Defn Canada Health Service Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-canada-health-service-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Canada health service number sensitive information type entity def
# Canada health service number + ## Format 10 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- patient hospital - psychiatrist - workers compensation-- disability
+- disability
compliance Sit Defn Canada Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-canada-passport-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Canada passport number sensitive information type entity definitio
# Canada passport number + ## Format two uppercase letters followed by six digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Passeport # - Passeport# - PasseportNon-- Passeportn ┬░
+- Passeportn ┬░
compliance Sit Defn Canada Personal Health Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-canada-personal-health-identification-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Canada personal health identification number (PHIN) sensitive info
# Canada personal health identification number (PHIN) + ## Format nine digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- New Brunswick - Nova Scotia - Prince Edward Island-- Canada
+- Canada
compliance Sit Defn Canada Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-canada-physical-addresses.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Canada physical addresses sensitive information type entity defini
This unbundled named entity detects patterns related to physical address from Canada. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level Medium
compliance Sit Defn Canada Social Insurance Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-canada-social-insurance-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Canada social insurance number sensitive information type entity d
# Canada social insurance number + ## Format nine digits with optional hyphens or spaces
A DLP policy has medium confidence that it's detected this type of sensitive inf
- DOB - Birthdate - Birthday-- Date of Birth
+- Date of Birth
compliance Sit Defn Chile Identity Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-chile-identity-card-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Chile identity card number sensitive information type entity defin
# Chile identity card number + ## Format seven to eight digits plus delimiters a check digit or letter
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Chile identity number - Chile identity # - R.U.T-- R.U.N
+- R.U.N
compliance Sit Defn China Resident Identity Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-china-resident-identity-card-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "China resident identity card (PRC) number sensitive information ty
# China resident identity card (PRC) number + ## Format 18 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- 鉴定 - 身分證 - 居民 身份證-- 鑑定
+- Θææσ«Ü
compliance Sit Defn Client Secret Api Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-client-secret-api-key.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Client secret / API key sensitive information type entity definiti
# Client secret / API key (preview) + ## Format A client secret or refresh token used in OAuth 2.0 protocol.
compliance Sit Defn Credentials In Url https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-credentials-in-url.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Credentials in URL sensitive information type entity definition."
# Credentials in URL + ## Format Paired username and password used in URL
compliance Sit Defn Credit Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-credit-card-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Credit card number sensitive information type entity definition."
# Credit card number + ## Format 14 to 19 digits that can be formatted or unformatted (dddddddddddddddd) and that must pass the Luhn test.
A DLP policy has low confidence that it's detected this type of sensitive inform
- デビット カード - デビットカード - 中国银联-- 银联
+- Θô╢Φüö
compliance Sit Defn Croatia Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-croatia-drivers-license-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Croatia driver's license number sensitive information type entity
# Croatia drivers license number + ## Format eight digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_croatia_eu_driver's_license_number - voza─ìka dozvola-- voza─ìke dozvole
+- voza─ìke dozvole
compliance Sit Defn Croatia Identity Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-croatia-identity-card-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Croatia identity card number sensitive information type entity def
This entity is included in the EU National Identification Number sensitive information type. It's available as a stand-alone sensitive information type entity. + ## Format nine digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Croatia Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-croatia-passport-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Croatia passport number sensitive information type entity definiti
# Croatia passport number + ## Format nine digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- broj putovnice - br. Putovnice-- br putovnice
+- br putovnice
compliance Sit Defn Croatia Personal Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-croatia-personal-identification-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Croatia personal identification (OIB) number sensitive information
# Croatia personal identification (OIB) number + ## Format 11 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Croatia Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-croatia-physical-addresses.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Croatia physical addresses sensitive information type entity defin
This unbundled named entity detects patterns related to physical address from Croatia. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Cyprus Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-cyprus-drivers-license-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Cyprus driver's license number sensitive information type entity d
# Cyprus drivers license number + ## Format 12 digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- άδεια οδήγησης - αριθμό άδειας οδήγησης-- άδειες οδήγησης
+- άδειες οδήγησης
compliance Sit Defn Cyprus Identity Card https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-cyprus-identity-card.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Cyprus identity card sensitive information type entity definition.
# Cyprus identity card + ## Format 10 digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- kimlik karti - national identification number - personal id number-- ταυτοτητασ
+- ταυτοτητασ
compliance Sit Defn Cyprus Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-cyprus-passport-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Cyprus passport number sensitive information type entity definitio
# Cyprus passport number + ## Format one letter followed by 6-8 digits with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_cyprus_eu_passport_date - expires on-- issued on
+- issued on
compliance Sit Defn Cyprus Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-cyprus-physical-addresses.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Cyprus physical addresses sensitive information type entity defini
This unbundled named entity detects patterns related to physical address from Cyprus. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Cyprus Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-cyprus-tax-identification-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Cyprus tax identification number sensitive information type entity
# Cyprus tax identification number + ## Format eight digits and one letter in the specified pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- αριθμός φορολογικού μητρώου - κωδικός φορολογικού μητρώου - φορολογική ταυτότητα-- φορολογικού κωδικού
+- φορολογικού κωδικού
compliance Sit Defn Czech Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-czech-drivers-license-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Czech driver's license number sensitive information type entity de
# Czech drivers license number + ## Format two letters followed by six digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- řidičský prúkaz - řidičské průkazy - číslo řidičského průkazu-- čísla řidičských průkazů
+- čísla řidičských průkazů
compliance Sit Defn Czech Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-czech-passport-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Czech passport number sensitive information type entity definition
# Czech passport number + ## Format eight digits without spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Czech Personal Identity Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-czech-personal-identity-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Czech personal identity number sensitive information type entity d
# Czech personal identity number + ## Format nine digits with optional forward slash (old format)
A DLP policy has medium confidence that it's detected this type of sensitive inf
- tin id - tin no - tin#-- unique identification number
+- unique identification number
compliance Sit Defn Czech Republic Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-czech-republic-physical-addresses.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Czech Republic physical addresses sensitive information type entit
This unbundled named entity detects patterns related to physical address from the Czech Republic. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Denmark Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-denmark-drivers-license-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Denmark driver's license number sensitive information type entity
# Denmark drivers license number + ## Format eight digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_denmark_eu_driver's_license_number - k├╕rekort-- k├╕rekortnummer
+- k├╕rekortnummer
compliance Sit Defn Denmark Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-denmark-passport-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Denmark passport number sensitive information type entity definiti
# Denmark passport number + ## Format nine digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Denmark Personal Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-denmark-personal-identification-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Denmark personal identification number sensitive information type
# Denmark personal identification number + ## Format 10 digits containing a hyphen
A DLP policy has low confidence that it's detected this type of sensitive inform
- sygesikringskortnr - sygesikringskortnummer - sygesikringsnr-- sygesikringsnummer
+- sygesikringsnummer
compliance Sit Defn Denmark Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-denmark-physical-addresses.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Denmark physical addresses sensitive information type entity defin
This unbundled named entity detects patterns related to physical address from Denmark. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Diseases https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-diseases.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Diseases sensitive information type entity definition."
This unbundled named entity detects text that matches disease names, such as *diabetes*. It supports English terms only. It's also included in the [All medical terms and conditions](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level
-High
+High
compliance Sit Defn Drug Enforcement Agency Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-drug-enforcement-agency-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Drug Enforcement Agency (DEA) number sensitive information type en
# Drug Enforcement Agency (DEA) number + ## Format two letters followed by seven digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- dea - dea# - drug enforcement administration-- drug enforcement agency
+- drug enforcement agency
compliance Sit Defn Estonia Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-estonia-drivers-license-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Estonia driver's license number sensitive information type entity
# Estonia drivers license number + ## Format two letters followed by six digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- permis de conduire - juhilubade numbrid - juhiloa number-- juhiluba
+- juhiluba
compliance Sit Defn Estonia Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-estonia-passport-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Estonia passport number sensitive information type entity definiti
# Estonia passport number + ## Format one letter followed by seven digits with no spaces or delimiters
dokumendi nr
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Estonia Personal Identification Code https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-estonia-personal-identification-code.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Estonia Personal Identification Code sensitive information type en
# Estonia personal identification code + ## Format 11 digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Estonia Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-estonia-physical-addresses.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "Estonia physical addresses sensitive information type entity defin
This unbundled named entity detects patterns related to physical address from Estonia. It's also included in the [All Physical Addresses](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Eu Debit Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-eu-debit-card-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
description: "EU debit card number sensitive information type entity definition.
# EU debit card number + ## Format 16 to 19 digits
Yes
A DLP policy has high confidence that it's detected this type of sensitive information if, within a proximity of 300 characters: - The function `Func_eu_debit_card` finds content that matches the pattern.-- At least one of the following is true:
+- At least one of the following cases is true:
- A keyword from `Keyword_eu_debit_card` is found. - A keyword from `Keyword_card_terms_dict` is found. - A keyword from `Keyword_card_security_terms_dict` is found.
compliance Sit Defn Eu Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-eu-drivers-license-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
compliance Sit Defn Eu National Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-eu-national-identification-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
compliance Sit Defn Eu Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-eu-passport-number.md
f1_keywords:
ms.localizationpriority: medium -- tier2
+- tier3
- purview-compliance hideEdit: true feedback_system: None
compliance Sit Defn Finland Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-finland-drivers-license-number.md
description: "Finland driver's license number sensitive information type entity
# Finland drivers license number + ## Format 10 digits containing a hyphen
A DLP policy has medium confidence that it's detected this type of sensitive inf
- k├╢rkortnummer - f├╢rare lic. - ajokortit-- ajokortin numerot
+- ajokortin numerot
compliance Sit Defn Finland European Health Insurance Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-finland-european-health-insurance-number.md
description: "Finland european health insurance number sensitive information typ
# Finland european health insurance number + ## Format 20-digit number
compliance Sit Defn Finland National Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-finland-national-id.md
description: "Finland national ID sensitive information type entity definition."
# Finland national ID + ## Format six digits plus a character indicating a century plus three digits plus a check digit
A DLP policy has medium confidence that it's detected this type of sensitive inf
- verokortti - veronumero - verotunniste-- verotunnus
+- verotunnus
compliance Sit Defn Finland Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-finland-passport-number.md
description: "Finland passport number sensitive information type entity definiti
This entity is available in the EU Passport Number sensitive information type and is available as a stand-alone sensitive information type entity. + ## Format combination of nine letters and digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Finland Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-finland-physical-addresses.md
description: "Finland physical addresses sensitive information type entity defin
This unbundled named entity detects patterns related to physical address from Finland. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn France Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-france-drivers-license-number.md
description: "France driver's license number sensitive information type entity d
This entity is available in the EU Driver's License Number sensitive information type and is available as a stand-alone sensitive information type entity. + ## Format 12 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- license number - licence numbers - license numbers-- numéros de licence
+- numéros de licence
compliance Sit Defn France Health Insurance Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-france-health-insurance-number.md
description: "France health insurance number sensitive information type entity d
# France health insurance number + ## Format 21-digit number
A DLP policy has medium confidence that it's detected this type of sensitive inf
- insurance card - carte vitale-- carte d'assuré social
+- carte d'assuré social
compliance Sit Defn France National Id Card https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-france-national-id-card.md
description: "France national id card (CNI) sensitive information type entity de
# France national id card (CNI) + ## Format 12 digits
A DLP policy has low confidence that it's detected this type of sensitive inform
- national identity - nationalidno# - numéro d'assurance maladie-- numéro de carte vitale
+- numéro de carte vitale
compliance Sit Defn France Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-france-passport-number.md
description: "France passport number sensitive information type entity definitio
This entity is available in the EU Passport Number sensitive information type. It's also available as a stand-alone sensitive information type entity. + ## Format nine digits and letters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn France Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-france-physical-addresses.md
description: "France physical addresses sensitive information type entity defini
This unbundled named entity detects patterns related to physical address from France. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn France Social Security Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-france-social-security-number.md
description: "France social security number (INSEE) sensitive information type e
# France social security number (INSEE) + ## Format 15 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- socialsecuritynumber - social security number - social security code-- social insurance number
+- social insurance number
compliance Sit Defn France Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-france-tax-identification-number.md
description: "France tax identification number sensitive information type entity
# France tax identification number + ## Format 13 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn France Value Added Tax Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-france-value-added-tax-number.md
description: "France value added tax number sensitive information type entity de
# France value added tax number + ## Format 13 character alphanumeric pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- taxe sur la valeur ajoutée - n° tva - numéro de tva-- numéro d'identification siren
+- numéro d'identification siren
compliance Sit Defn General Password https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-general-password.md
description: "General password sensitive information type entity definition."
# General Password (preview) + ## Format Up to 20,000-character combination of letters, digits, and special characters.
compliance Sit Defn General Symmetric Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-general-symmetric-key.md
description: "General Symmetric key sensitive information type entity definition
# General Symmetric key (preview) + ## Format A combination of 44 characters consisting of letters, digits, and special characters.
compliance Sit Defn Generic Medication Names https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-generic-medication-names.md
description: "Generic medication names sensitive information type entity definit
This unbundled named entity detects names of generic medications, such as *acetaminophen*. It supports English terms only. It's also included in the [All medical terms and conditions](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level
-High
+High
compliance Sit Defn Germany Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-germany-drivers-license-number.md
description: "Germany driver's license number sensitive information type entity
This sensitive information type entity is included in the EU Driver's License Number sensitive information type. It's also available as a stand-alone sensitive information type entity. + ## Format combination of 11 digits and letters
compliance Sit Defn Germany Identity Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-germany-identity-card-number.md
description: "Germany identity card number sensitive information type entity def
# Germany identity card number + ## Format since 1 November 2010: Nine to 11 letters and digits
A DLP policy has low confidence that it's detected this type of sensitive inform
- personalausweis - persönliche id nummer - persönliche identifikationsnummer-- persönliche-id-nummer
+- persönliche-id-nummer
compliance Sit Defn Germany Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-germany-passport-number.md
description: "Germany passport number sensitive information type entity definiti
# Germany passport number + ## Format 9 to 11 characters
A DLP policy has low confidence that it's detected this type of sensitive inform
- passportnumber - passport number - passportnumbers-- passport numbers
+- passport numbers
compliance Sit Defn Germany Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-germany-physical-addresses.md
description: "Germany physical addresses sensitive information type entity defin
This unbundled named entity detects patterns related to physical address from Germany. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Germany Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-germany-tax-identification-number.md
description: "Germany tax identification number sensitive information type entit
# Germany tax identification number + ## Format 11 digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- tin# - zinn# - zinn-- zinnnummer
+- zinnnummer
compliance Sit Defn Germany Value Added Tax Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-germany-value-added-tax-number.md
description: "Germany value added tax number sensitive information type entity d
# Germany value added tax number + ## Format 11 character alphanumeric pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- vat# mehrwertsteuer - mwst - mehrwertsteuer identifikationsnummer-- mehrwertsteuer nummer
+- mehrwertsteuer nummer
compliance Sit Defn Github Personal Access Token https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-github-personal-access-token.md
description: "GitHub personal access token sensitive information type entity def
# GitHub personal access token (preview) + ## Format A combination of 40 characters consisting of letters, digits, and special characters.
compliance Sit Defn Google Api Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-google-api-key.md
description: "Google API key sensitive information type entity definition."
# Google API key (preview) + ## Format A combination of 39 characters consisting of letters, digits, and special characters.
compliance Sit Defn Greece Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-greece-drivers-license-number.md
description: "Greece driver's license number sensitive information type entity d
This entity is included in the EU Driver's License Number sensitive information type. It's also available as a stand-alone sensitive information type entity. + ## Format nine digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- δεια οδήγησης - Adeia odigisis - Άδεια οδήγησης-- Δίπλωμα οδήγησης
+- Δίπλωμα οδήγησης
compliance Sit Defn Greece National Id Card https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-greece-national-id-card.md
description: "Greece national ID card sensitive information type entity definiti
# Greece national ID card + ## Format Combination of 7-8 letters and numbers plus a dash
A DLP policy has low confidence that it's detected this type of sensitive inform
- identity card - tautotita - ταυτότητα-- ταυτότητας
+- ταυτότητας
compliance Sit Defn Greece Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-greece-passport-number.md
description: "Greece passport number sensitive information type entity definitio
# Greece passport number + ## Format Two letters followed by seven digits with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- αριθμός διαβατηρίου - αριθμούς διαβατηρίου-- αριθμός διαβατηριο
+- αριθμός διαβατηριο
compliance Sit Defn Greece Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-greece-physical-addresses.md
description: "Greece physical addresses sensitive information type entity defini
This unbundled named entity detects patterns related to physical address from Greece. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Greece Social Security Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-greece-social-security-number.md
description: "Greece Social Security Number (AMKA) sensitive information type en
# Greece Social Security Number (AMKA) + ## Format 11 digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- social security number - amka - a.m.k.a.-- Αριθμού Μητρώου Κοινωνικής Ασφάλισης
+- Αριθμού Μητρώου Κοινωνικής Ασφάλισης
compliance Sit Defn Greece Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-greece-tax-identification-number.md
description: "Greece tax identification number sensitive information type entity
# Greece tax identification number + ## Format Nine digits without spaces and delimiters
compliance Sit Defn Hong Kong Identity Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-hong-kong-identity-card-number.md
description: "Hong Kong identity card (HKID) number sensitive information type e
# Hong Kong identity card (HKID) number + ## Format Combination of 8-9 letters and numbers plus optional parentheses around the final character
A DLP policy has low confidence that it's detected this type of sensitive inform
- 香港特別行政區非永久性居民身份證 - 香港特別行政區非永久性居民身份証 - 香港特別行政區非永久性居民身分證-- 香港特別行政區非永久性居民身分証
+- 香港特別行政區非永久性居民身分証
compliance Sit Defn Http Authorization Header https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-http-authorization-header.md
description: "Http authorization header sensitive information type entity defini
# Http authorization header (preview) + ## Format An authorization header used in HTTP request.
compliance Sit Defn Hungary Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-hungary-drivers-license-number.md
description: "Hungary driver's license number sensitive information type entity
# Hungary drivers license number + ## Format Two letters followed by six digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- vezetoi engedely - vezetői engedély-- vezetői engedélyek
+- vezetői engedélyek
compliance Sit Defn Hungary Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-hungary-passport-number.md
description: "Hungary passport number sensitive information type entity definiti
# Hungary passport number + ## Format Two letters followed by six or seven digits with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Hungary Personal Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-hungary-personal-identification-number.md
description: "Hungary personal identification number sensitive information type
# Hungary personal identification number + ## Format 11 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- sz. ig. - sz.ig. - személyazonosító igazolvány-- személyi igazolvány
+- személyi igazolvány
compliance Sit Defn Hungary Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-hungary-physical-addresses.md
description: "Hungary physical addresses sensitive information type entity defin
This unbundled named entity detects patterns related to physical address from Hungary. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Hungary Social Security Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-hungary-social-security-number.md
description: "Hungary social security number (TAJ) sensitive information type en
# Hungary social security number (TAJ) + ## Format Nine digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- általános forgalmi adó szám - hozzáadottérték adó - áfa szám-- magyar áfa szám
+- magyar áfa szám
compliance Sit Defn Hungary Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-hungary-tax-identification-number.md
description: "Hungary tax identification number sensitive information type entit
# Hungary tax identification number + ## Format 10 digits with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- tin id - tin no - tin#-- vat number
+- vat number
compliance Sit Defn Hungary Value Added Tax Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-hungary-value-added-tax-number.md
description: "Hungary value added tax number sensitive information type entity d
# Hungary value added tax number + ## Format 10 character alphanumeric pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- közösségi adószám - általános forgalmi adó szám - hozzáadottérték adó-- áfa szám
+- áfa szám
compliance Sit Defn Iceland Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-iceland-physical-addresses.md
description: "Iceland physical addresses sensitive information type entity defin
This unbundled named entity detects patterns related to physical address from Iceland. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Impairments Us Disability Evaluation Under Social Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-impairments-us-disability-evaluation-under-social-security.md
description: "Impairments Listed In The U.S. Disability Evaluation Under Social
This unbundled named entity detects names of impairments listed in the U.S. Disability Evaluation Under Social Security, such as *muscular dystrophy*. It supports English terms only. It's also included in the [All medical terms and conditions](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level
-High
+High
compliance Sit Defn India Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-india-drivers-license-number.md
description: "India Driver's License Number sensitive information type entity de
# India Drivers License Number + ## Format 15 character alphanumeric pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- driving permit - dl no - dlno-- dl number
+- dl number
compliance Sit Defn India Gst Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-india-gst-number.md
description: "India GST Number sensitive information type entity definition."
# India GST Number + ## Format 15 character alphanumeric pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- gst - gstin - goods and services tax-- goods and service tax
+- goods and service tax
compliance Sit Defn India Permanent Account Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-india-permanent-account-number.md
description: "India permanent account number (PAN) sensitive information type en
# India permanent account number (PAN) + ## Format 10 letters or digits
A DLP policy has low confidence that it's detected this type of sensitive inform
### Keyword_india_permanent_account_number - Permanent Account Number-- PAN
+- PAN
compliance Sit Defn India Unique Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-india-unique-identification-number.md
description: "India unique identification (Aadhaar) number sensitive information
# India unique identification (Aadhaar) number + ## Format 12 digits containing optional spaces or dashes
A DLP policy has medium confidence that it's detected this type of sensitive inf
- aadhar# - uid - आधार-- uidai
+- uidai
compliance Sit Defn India Voter Id Card https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-india-voter-id-card.md
description: "India Voter Id Card sensitive information type entity definition."
# India Voter Id Card + ## Format 10 character alphanumeric pattern
A DLP policy has low confidence that it's detected this type of sensitive inform
- electoral photo identity card - EPIC - ECI-- election commmision
+- election commmision
compliance Sit Defn Indonesia Identity Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-indonesia-identity-card-number.md
description: "Indonesia identity card (KTP) number sensitive information type en
# Indonesia identity card (KTP) number + ## Format 16 digits containing optional periods
A DLP policy has high confidence that it's detected this type of sensitive infor
- KTP - Kartu Tanda Penduduk-- Nomor Induk Kependudukan
+- Nomor Induk Kependudukan
compliance Sit Defn International Banking Account Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-international-banking-account-number.md
description: "International banking account number (IBAN) sensitive information
# International banking account number (IBAN) + ## Format Country code (two letters) plus check digits (two digits) plus bban number (up to 30 characters)
compliance Sit Defn International Classification Of Diseases Icd 10 Cm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-international-classification-of-diseases-icd-10-cm.md
description: "International classification of diseases (ICD-10-CM) sensitive inf
# International classification of diseases (ICD-10-CM) + ## Format Dictionary
A DLP policy has medium confidence that it's detected this type of sensitive inf
Any term from the `Dictionary_icd_10_updated` keyword dictionary, which is based on the [International Classification of Diseases, Tenth Revision, Clinical Modification (ICD-10-CM)](https://icd10cmtool.cdc.gov/). This type looks only for the term, not the insurance codes.
-Any term from the `Dictionary_icd_10_codes` keyword dictionary, which is based on the [International Classification of Diseases, Tenth Revision, Clinical Modification (ICD-10-CM)](https://icd10cmtool.cdc.gov/). This type looks only for insurance codes, not the description.
+Any term from the `Dictionary_icd_10_codes` keyword dictionary, which is based on the [International Classification of Diseases, Tenth Revision, Clinical Modification (ICD-10-CM)](https://icd10cmtool.cdc.gov/). This type looks only for insurance codes, not the description.
compliance Sit Defn International Classification Of Diseases Icd 9 Cm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-international-classification-of-diseases-icd-9-cm.md
description: "International classification of diseases (ICD-9-CM) sensitive info
# International classification of diseases (ICD-9-CM) + ## Format Dictionary
A DLP policy has medium confidence that it's detected this type of sensitive inf
Any term from the `Dictionary_icd_9_updated` keyword dictionary, which is based on the [International Classification of Diseases,Ninth Revision, Clinical Modification (ICD-9-CM)](https://go.microsoft.com/fwlink/?linkid=852605). This type looks only for the term, not the insurance codes.
-Any term from the `Dictionary_icd_9_codes` keyword dictionary, which is based on the [International Classification of Diseases,Ninth Revision, Clinical Modification (ICD-9-CM)](https://go.microsoft.com/fwlink/?linkid=852605). This type looks only for insurance codes, not the description.
+Any term from the `Dictionary_icd_9_codes` keyword dictionary, which is based on the [International Classification of Diseases,Ninth Revision, Clinical Modification (ICD-9-CM)](https://go.microsoft.com/fwlink/?linkid=852605). This type looks only for insurance codes, not the description.
compliance Sit Defn Ip Address V4 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-ip-address-v4.md
description: "IP address v4 sensitive information type entity definition."
# IP Address v4 + ## Format Complex pattern that accounts for formatted (periods) and unformatted (no periods) versions of the IPv4 addresses.
A DLP policy has medium confidence that it's detected this type of sensitive inf
- ip address - ip addresses - internet protocol-- IP-כתובת ה
+- IP-כתובת ה
compliance Sit Defn Ip Address V6 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-ip-address-v6.md
description: "IP address v6 sensitive information type entity definition."
# IP Address v6 + ## Format Complex pattern that accounts for formatted IPv6 numbers (which include colons)
A DLP policy has medium confidence that it's detected this type of sensitive inf
- ip address - ip addresses - internet protocol-- IP-כתובת ה
+- IP-כתובת ה
compliance Sit Defn Ip Address https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-ip-address.md
description: "IP address sensitive information type entity definition."
# IP address + ## Format ### IPv4:
For IPv6, a DLP policy has high confidence that it's detected this type of sensi
- ip address - ip addresses - internet protocol-- IP-כתובת ה
+- IP-כתובת ה
compliance Sit Defn Ireland Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-ireland-drivers-license-number.md
description: "Ireland driver's license number sensitive information type entity
# Ireland drivers license number + ## Format Six digits followed by four letters
For IPv6, a DLP policy has high confidence that it's detected this type of sensi
- ip address - ip addresses - internet protocol-- IP-כתובת ה
+- IP-כתובת ה
compliance Sit Defn Ireland Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-ireland-passport-number.md
description: "Ireland passport number sensitive information type entity definiti
# Ireland passport number + ## Format Two letters or digits followed by seven digits with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Ireland Personal Public Service Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-ireland-personal-public-service-number.md
description: "Ireland personal public service (PPS) number sensitive information
# Ireland personal public service (PPS) number + ## Format Old format (until 31 December 2012):
A DLP policy has low confidence that it's detected this type of sensitive inform
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Ireland Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-ireland-physical-addresses.md
description: "Ireland physical addresses sensitive information type entity defin
This unbundled named entity detects patterns related to physical address from Ireland. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Israel Bank Account Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-israel-bank-account-number.md
description: "Israel bank account number sensitive information type entity defin
# Israel bank account number + ## Format 13 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Bank Account Number - Bank Account - Account Number-- מספר חשבון בנק
+- מספר חשבון בנק
compliance Sit Defn Israel National Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-israel-national-identification-number.md
description: "Israel national identification number sensitive information type e
# Israel national identification number + ## Format nine digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- identity number - israeliidentitynumber - personal id-- unique id
+- unique id
compliance Sit Defn Italy Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-italy-drivers-license-number.md
description: "Italy driver's license number sensitive information type entity de
This type entity is included in the EU Driver's License Number sensitive information type. It's also available as a stand-alone sensitive information type entity. + ## Format a combination of 10 letters and digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- patente di guida - patente guida - patenti di guida-- patenti guida
+- patenti guida
compliance Sit Defn Italy Fiscal Code https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-italy-fiscal-code.md
description: "Italy fiscal code sensitive information type entity definition."
# Italy fiscal code + ## Format a 16-character combination of letters and digits in the specified pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Italy Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-italy-passport-number.md
description: "Italy passport number sensitive information type entity definition
# Italy passport number + ## Format two letters or digits followed by seven digits with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Italy Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-italy-physical-addresses.md
description: "Italy physical addresses sensitive information type entity definit
This unbundled named entity detects patterns related to physical address from Italy. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Italy Value Added Tax Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-italy-value-added-tax-number.md
description: "Italy value added tax number sensitive information type entity def
# Italy value added tax number + ## Format 13 character alphanumeric pattern with optional delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- vat no - vat# - iva-- iva#
+- iva#
compliance Sit Defn Japan Bank Account Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-japan-bank-account-number.md
description: "Japan bank account number sensitive information type entity defini
# Japan bank account number + ## Format seven or eight digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- 支店番号 - 支店コード-- 店番号
+- 店番号
compliance Sit Defn Japan Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-japan-drivers-license-number.md
description: "Japan driver's license number sensitive information type entity de
# Japan drivers license number + ## Format 12 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- 運転免許証# - 運転免許# - 免許証#-- 免許#
+- 免許#
compliance Sit Defn Japan My Number Corporate https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-japan-my-number-corporate.md
description: "Japan My Number - Corporate sensitive information type entity defi
# Japan My Number - Corporate + ## Format 13-digit number
A DLP policy has medium confidence that it's detected this type of sensitive inf
- 個人識別番号 - 個人識別ナンバー - 法人番号-- 指定通知書
+- 指定通知書
compliance Sit Defn Japan My Number Personal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-japan-my-number-personal.md
description: "Japan My Number - Personal sensitive information type entity defin
# Japan My Number - Personal + ## Format 12-digit number
A DLP policy has low confidence that it's detected this type of sensitive inform
- 個人番号カード - 個人識別番号 - 個人識別ナンバー-- 通知カード
+- 通知カード
compliance Sit Defn Japan Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-japan-passport-number.md
description: "Japan passport number sensitive information type entity definition
# Japan passport number + ## Format two letters followed by seven digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- 旅券番号 - 旅券番号# - 旅券番号♯-- 旅券ナンバー
+- 旅券ナンバー
compliance Sit Defn Japan Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-japan-physical-addresses.md
description: "Japan physical addresses sensitive information type entity definit
This unbundled named entity detects patterns related to physical address from Japan. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Japan Residence Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-japan-residence-card-number.md
description: "Japan residence card number sensitive information type entity defi
# Japan residence card number + ## Format 12 letters and digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Residence card # - 在留カード番号 - 在留カード-- 在留番号
+- 在留番号
compliance Sit Defn Japan Resident Registration Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-japan-resident-registration-number.md
description: "Japan resident registration number sensitive information type enti
# Japan resident registration number + ## Format 11 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- 外国人登録証明書番号 - 証明書番号 - 登録番号-- 外国人登録証
+- 外国人登録証
compliance Sit Defn Japan Social Insurance Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-japan-social-insurance-number.md
description: "Japan social insurance number (SIN) sensitive information type ent
# Japan social insurance number (SIN) + ## Format 7-12 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- 健康保険被保険者整理番号 - 雇用保険被保険者整理番号 - 厚生年金-- 厚生年金被保険者整理番号
+- 厚生年金被保険者整理番号
compliance Sit Defn Lab Test Terms https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-lab-test-terms.md
description: "Lab test terms sensitive information type entity definition."
This unbundled named entity detects terms related to lab tests, such as *Insulin C-peptide*. It supports English terms only. It's also included in the [All medical terms and conditions](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level
-High
+High
compliance Sit Defn Latvia Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-latvia-drivers-license-number.md
description: "Latvia driver's license number sensitive information type entity d
# Latvia drivers license number + ## Format three letters followed by six digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- autovad─½t─üja apliec─½ba - autovad─½t─üja apliec─½bas-- vad─½t─üja apliec─½ba
+- vad─½t─üja apliec─½ba
compliance Sit Defn Latvia Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-latvia-passport-number.md
description: "Latvia passport number sensitive information type entity definitio
# Latvia passport number + ## Format two letters or digits followed by seven digits with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Latvia Personal Code https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-latvia-personal-code.md
description: "Latvia personal code sensitive information type entity definition.
# Latvia personal code + ## Format 11 digits and an optional hyphen
A DLP policy has medium confidence that it's detected this type of sensitive inf
- tin id - tin no - tin#-- voter's number
+- voter's number
compliance Sit Defn Latvia Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-latvia-physical-addresses.md
description: "Latvia physical addresses sensitive information type entity defini
This unbundled named entity detects patterns related to physical address from Latvia. It's also included in the [All Physical Addresses](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level Medium
compliance Sit Defn Liechtenstein Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-liechtenstein-physical-addresses.md
description: "Liechtenstein physical addresses sensitive information type entity
This unbundled named entity detects patterns related to physical address from Liechtenstein. It's also included in the [All Physical Addresses](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Lifestyles Relate To Medical Conditions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-lifestyles-relate-to-medical-conditions.md
description: "Lifestyles that relate to medical conditions sensitive information
This unbundled named entity detects terms related to lifestyles that might result in a medical condition, such as *smoking*. It supports English terms only. It's also included in the [All medical terms and conditions](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level
-High
+High
compliance Sit Defn Lithuania Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-lithuania-drivers-license-number.md
description: "Lithuania driver's license number sensitive information type entit
# Lithuania drivers license number + ## Format eight digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- vairuotojo pa┼╛ym─ùjimas - vairuotojo pa┼╛ym─ùjimo numeris-- vairuotojo pa┼╛ym─ùjimo numeriai
+- vairuotojo pa┼╛ym─ùjimo numeriai
compliance Sit Defn Lithuania Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-lithuania-passport-number.md
description: "Lithuania passport number sensitive information type entity defini
# Lithuania passport number + ## Format eight digits or letters with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Lithuania Personal Code https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-lithuania-personal-code.md
description: "Lithuania personal code sensitive information type entity definiti
# Lithuania personal code + ## Format 11 digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- unikalus identifikavimo numeris - unique identification number - unique identity number-- uniqueidentityno#
+- uniqueidentityno#
compliance Sit Defn Lithuania Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-lithuania-physical-addresses.md
description: "Lithuania physical addresses sensitive information type entity def
This unbundled named entity detects patterns related to physical address from Lithuania. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Luxemburg Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-luxemburg-drivers-license-number.md
description: "Luxemburg driver's license number sensitive information type entit
# Luxemburg drivers license number + ## Format six digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_luxemburg_eu_driver's_license_number - fahrerlaubnis-- Führerschäin
+- Führerschäin
compliance Sit Defn Luxemburg National Identification Number Natural Persons https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-luxemburg-national-identification-number-natural-persons.md
description: "Luxemburg national identification number (natural persons) sensiti
# Luxemburg national identification number (natural persons) + ## Format 13 digits with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- pers├╢nliche identifikationsnummer - unique id - unique identity-- uniqueidkey#
+- uniqueidkey#
compliance Sit Defn Luxemburg National Identification Number Non Natural Persons https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-luxemburg-national-identification-number-non-natural-persons.md
description: "Luxemburg national identification number (non-natural persons) sen
# Luxemburg national identification number (non-natural persons) + ## Format 11 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- tin# - zinn# - zinn-- zinnzahl
+- zinnzahl
compliance Sit Defn Luxemburg Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-luxemburg-passport-number.md
description: "Luxemburg passport number sensitive information type entity defini
# Luxemburg passport number + ## Format eight digits or letters with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Luxemburg Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-luxemburg-physical-addresses.md
description: "Luxemburg physical addresses sensitive information type entity def
This unbundled named entity detects patterns related to physical address from Luxemburg. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Malaysia Identification Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-malaysia-identification-card-number.md
description: "Malaysia identification card number sensitive information type ent
# Malaysia identification card number + ## Format 12 digits containing optional hyphens
A DLP policy has high confidence that it's detected this type of sensitive infor
- malaysia identity card - malaysian identity card - nric-- personal identification card
+- personal identification card
compliance Sit Defn Malta Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-malta-drivers-license-number.md
description: "Malta driver's license number sensitive information type entity de
# Malta drivers license number + ## Format Combination of two characters and six digits in the specified pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_malta_eu_driver's_license_number - li─ïenzja tas-sewqan-- li─ïenzji tas-sewwieq
+- li─ïenzji tas-sewwieq
compliance Sit Defn Malta Identity Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-malta-identity-card-number.md
description: "Malta identity card number sensitive information type entity defin
# Malta identity card number + ## Format seven digits followed by one letter
A DLP policy has low confidence that it's detected this type of sensitive inform
- personal numeric code - unique identification number - unique identity number-- uniqueidentityno#
+- uniqueidentityno#
compliance Sit Defn Malta Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-malta-passport-number.md
description: "Malta passport number sensitive information type entity definition
# Malta passport number + ## Format seven digits without spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Malta Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-malta-physical-addresses.md
description: "Malta physical addresses sensitive information type entity definit
This unbundled named entity detects patterns related to physical address from Malta. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Malta Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-malta-tax-identification-number.md
description: "Malta tax identification number sensitive information type entity
# Malta tax identification number + ## Format For Maltese nationals:
A DLP policy has low confidence that it's detected this type of sensitive inform
- tin# - unique identification number - unique identity number-- uniqueidentityno#
+- uniqueidentityno#
compliance Sit Defn Medical Specialities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-medical-specialities.md
description: "Medical specialities sensitive information type entity definition.
This unbundled named entity detects terms related to medical specialties, such as *dermatology*. It supports English terms only. It's also included in the [All medical terms and conditions](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level
-High
+High
compliance Sit Defn Medicare Beneficiary Identifier Card https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-medicare-beneficiary-Identifier-card.md
description: "Medicare Beneficiary Identifier (MBI) card sensitive information t
# Medicare Beneficiary Identifier (MBI) card + ## Format 11 character alphanumeric pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- medicare beneficiary identifier - medicare beneficiary no - medicare beneficiary number-- medicare beneficiary#
+- medicare beneficiary#
compliance Sit Defn Mexico Unique Population Registry Code https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-mexico-unique-population-registry-code.md
description: "Mexico Unique Population Registry Code (CURP) sensitive informatio
# Mexico Unique Population Registry Code (CURP) + ## Format 18 character alphanumeric pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- personal Identidad Clave - ClaveÚnica - claveunica-- clavepersonalIdentidad
+- clavepersonalIdentidad
compliance Sit Defn Microsoft Bing Maps Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-microsoft-bing-maps-key.md
description: "Microsoft Bing maps key sensitive information type entity definiti
# Microsoft Bing maps key (preview) + ## Format A combination of 64 characters consisting of letters, digits, and special characters.
compliance Sit Defn Netherlands Citizens Service Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-netherlands-citizens-service-number.md
description: "Netherlands citizen's service (BSN) number sensitive information t
# Netherlands citizens service (BSN) number + ## Format eight or nine digits containing optional spaces
A DLP policy has high confidence that it's detected this type of sensitive infor
- uniek identiteitsnummer - unique identification number - unique identity number-- uniqueidentityno#
+- uniqueidentityno#
compliance Sit Defn Netherlands Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-netherlands-drivers-license-number.md
description: "Netherlands driver's license number sensitive information type ent
# Netherlands drivers license number + ## Format 10 digits without spaces and delimiters
compliance Sit Defn Netherlands Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-netherlands-passport-number.md
description: "Netherlands passport number sensitive information type entity defi
# Netherlands passport number + ## Format nine letters or digits with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- paspoort nummer - paspoortnummers - paspoortnummer-- paspoort nr
+- paspoort nr
compliance Sit Defn Netherlands Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-netherlands-physical-addresses.md
description: "Netherlands physical addresses sensitive information type entity d
This unbundled named entity detects patterns related to physical address from the Netherlands. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Netherlands Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-netherlands-tax-identification-number.md
description: "Netherlands tax identification number sensitive information type e
# Netherlands tax identification number + ## Format nine digits without spaces or delimiters
A DLP policy has low confidence that it's detected this type of sensitive inform
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Netherlands Value Added Tax Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-netherlands-value-added-tax-number.md
description: "Netherlands value added tax number sensitive information type enti
# Netherlands value added tax number + ## Format 14 character alphanumeric pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- vat# - wearde tafoege tax getal - btw n├╗mer-- btw-nummer
+- btw-nummer
compliance Sit Defn New Zealand Bank Account Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-new-zealand-bank-account-number.md
description: "New Zealand bank account number sensitive information type entity
# New Zealand bank account number + ## Format 14-digit to 16-digit pattern with optional delimiter
A DLP policy has medium confidence that it's detected this type of sensitive inf
- bank account - bank_acct_id - bank_acct_branch-- bank_acct_nbr
+- bank_acct_nbr
compliance Sit Defn New Zealand Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-new-zealand-drivers-license-number.md
description: "New Zealand driver's license number sensitive information type ent
# New Zealand drivers license number + ## Format eight character alphanumeric pattern
A DLP policy has low confidence that it's detected this type of sensitive inform
- international driving permit - international driving permits - nz automobile association-- new zealand automobile association
+- new zealand automobile association
compliance Sit Defn New Zealand Inland Revenue Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-new-zealand-inland-revenue-number.md
description: "New Zealand inland revenue number sensitive information type entit
# New Zealand inland revenue number + ## Format eight or nine digits with optional delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- nz ird - new zealand ird - ird number-- inland revenue number
+- inland revenue number
compliance Sit Defn New Zealand Ministry Of Health Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-new-zealand-ministry-of-health-number.md
description: "New Zealand ministry of health number sensitive information type e
# New Zealand ministry of health number + ## Format three letters and four digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- New Zealand - National Health Index - NHI#-- National Health Index#
+- National Health Index#
compliance Sit Defn New Zealand Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-new-zealand-physical-addresses.md
description: "New Zealand physical addresses sensitive information type entity d
This unbundled named entity detects patterns related to physical address from New Zealand. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn New Zealand Social Welfare Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-new-zealand-social-welfare-number.md
description: "New Zealand social welfare number sensitive information type entit
# New Zealand social welfare number + ## Format nine digits
A DLP policy has low confidence that it's detected this type of sensitive inform
- social welfare# - social welfare No. - social welfare number-- swn#
+- swn#
compliance Sit Defn Norway Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-norway-identification-number.md
description: "Norway identification number sensitive information type entity def
# Norway identification number + ## Format 11 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- ID Number - Identification - Personnummer-- F├╕dselsnummer
+- F├╕dselsnummer
compliance Sit Defn Norway Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-norway-physical-addresses.md
description: "Norway physical addresses sensitive information type entity defini
This unbundled named entity detects patterns related to physical address from Norway. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Philippines Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-philippines-passport-number.md
description: "Philippines passport number sensitive information type entity defi
# Philippines passport number + ## Format seven or eight or nine alphanumeric characters
compliance Sit Defn Philippines Unified Multi Purpose Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-philippines-unified-multi-purpose-identification-number.md
description: "Philippines unified multi-purpose identification number sensitive
# Philippines unified multi-purpose identification number + ## Format 12 digits separated by hyphens
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Unified Multi-Purpose ID - UMID - Identity Card-- Pinag-isang Multi-Layunin ID
+- Pinag-isang Multi-Layunin ID
compliance Sit Defn Poland Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-poland-drivers-license-number.md
description: "Poland driver's license number sensitive information type entity d
# Poland drivers license number + ## Format 11 or 14 digits containing two forward slashes
compliance Sit Defn Poland Identity Card https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-poland-identity-card.md
description: "Poland identity card sensitive information type entity definition.
# Poland identity card + ## Format three letters and six digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Nazwa i nr dowodu osobistego - Nazwa i nr dowodu tożsamości - Dowód Tożsamości-- dow. os.
+- dow. os.
compliance Sit Defn Poland National Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-poland-national-id.md
description: "Poland national ID (PESEL) sensitive information type entity defin
# Poland national ID (PESEL) + ## Format 11 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- nr-pesel - numer identyfikacyjny - pesel-- tożsamości narodowej
+- tożsamości narodowej
compliance Sit Defn Poland Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-poland-passport-number.md
description: "Poland passport number sensitive information type entity definitio
This sensitive information type entity is included in the EU Passport Number sensitive information type. It's also available as a stand-alone sensitive information type entity. + ## Format two letters and seven digits
A DLP policy has low confidence that it's detected this type of sensitive inform
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Poland Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-poland-physical-addresses.md
description: "Poland physical addresses sensitive information type entity defini
This unbundled named entity detects patterns related to physical address from Poland. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Poland Regon Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-poland-regon-number.md
description: "Poland REGON number sensitive information type entity definition."
# Poland REGON number + ## Format 9-digit or 14-digit number
A DLP policy has low confidence that it's detected this type of sensitive inform
- numer statystyczny - numeru regon - numerstatystyczny#-- numeruregon#
+- numeruregon#
compliance Sit Defn Poland Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-poland-tax-identification-number.md
description: "Poland tax identification number sensitive information type entity
# Poland tax identification number + ## Format 11 digits with no spaces or delimiters
A DLP policy has high confidence that it's detected this type of sensitive infor
- vat number - vatid# - vatid-- vatno#
+- vatno#
compliance Sit Defn Portugal Citizen Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-portugal-citizen-card-number.md
description: "Portugal citizen card number sensitive information type entity def
# Portugal citizen card number + ## Format eight digits
A DLP policy has high confidence that it's detected this type of sensitive infor
- número de identificação civil - número de identificação fiscal - número do documento-- portugal bi number
+- portugal bi number
compliance Sit Defn Portugal Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-portugal-drivers-license-number.md
description: "Portugal driver's license number sensitive information type entity
# Portugal drivers license number + ## Format two patterns - two letters followed by 5-8 digits with special characters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- permissão de condução - permissão condução - Licença condução Portugal-- carta de condução
+- carta de condução
compliance Sit Defn Portugal Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-portugal-passport-number.md
description: "Portugal passport number sensitive information type entity definit
# Portugal passport number + ## Format one letter followed by six digits with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Portugal Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-portugal-physical-addresses.md
description: "Portugal physical addresses sensitive information type entity defi
This unbundled named entity detects patterns related to physical address from Portugal. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Portugal Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-portugal-tax-identification-number.md
description: "Portugal tax identification number sensitive information type enti
# Portugal tax identification number + ## Format nine digits with optional spaces
A DLP policy has low confidence that it's detected this type of sensitive inform
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Qatari Id Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-qatari-id-card-number.md
description: "Qatari ID card number sensitive information type entity definition
# Qatari ID card number + ## Format eleven digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Date of Birth - Birth Date - date of issue -- date of expiry
+- date of expiry
compliance Sit Defn Romania Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-romania-drivers-license-number.md
description: "Romania driver's license number sensitive information type entity
# Romania drivers license number + ## Format one character followed by eight digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- permisului conducere - permisele de conducere - permisele conducere-- permis conducere
+- permis conducere
compliance Sit Defn Romania Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-romania-passport-number.md
description: "Romania passport number sensitive information type entity definiti
# Romania passport number + ## Format eight or nine digits without spaces and delimiters
Pașaport nr
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Romania Personal Numeric Code https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-romania-personal-numeric-code.md
description: "Romania personal numeric code (CNP) sensitive information type ent
# Romania personal numeric code (CNP) + ## Format 13 digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- unique identification number - unique identity number - uniqueidentityno#-- uniqueidentityno
+- uniqueidentityno
compliance Sit Defn Romania Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-romania-physical-addresses.md
description: "Romania physical addresses sensitive information type entity defin
This unbundled named entity detects patterns related to physical address from Romania. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Russia Passport Number Domestic https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-russia-passport-number-domestic.md
description: "Russia passport number domestic sensitive information type entity
# Russia passport number domestic + ## Format 10-digit number
A DLP policy has medium confidence that it's detected this type of sensitive inf
- паспорт# - паспортid# - номер паспорта-- номерпаспорта#
+- номерпаспорта#
compliance Sit Defn Russia Passport Number International https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-russia-passport-number-international.md
description: "Russia passport number international sensitive information type en
# Russia passport number international + ## Format nine-digit number
A DLP policy has medium confidence that it's detected this type of sensitive inf
- паспорт# - паспортid# - номер паспорта-- номерпаспорта#
+- номерпаспорта#
compliance Sit Defn Saudi Arabia National Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-saudi-arabia-national-id.md
description: "Saudi Arabia National ID sensitive information type entity definit
# Saudi Arabia National ID + ## Format 10 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Identification Card - I card number - ID number-- الوطنية الهوية بطاقة رقم
+- الوطنية الهوية بطاقة رقم
compliance Sit Defn Singapore National Registration Identity Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-singapore-national-registration-identity-card-number.md
description: "Singapore national registration identity card (NRIC) number sensit
# Singapore national registration identity card (NRIC) number + ## Format nine letters and digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Foreign Identification Number - FIN - 身份证-- 身份證
+- 身份證
compliance Sit Defn Slack Access Token https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slack-access-token.md
description: "Slack access token sensitive information type entity definition."
# Slack access token (preview) + ## Format A combination of up to 34 characters consisting of letters, digits, and special characters.
compliance Sit Defn Slovakia Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slovakia-drivers-license-number.md
description: "Slovakia driver's license number sensitive information type entity
# Slovakia drivers license number + ## Format one character followed by seven digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- vodičský preukaz - vodičské preukazy - vodičského preukazu-- vodičských preukazov
+- vodi─ìsk├╜ch preukazov
compliance Sit Defn Slovakia Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slovakia-passport-number.md
description: "Slovakia passport number sensitive information type entity definit
# Slovakia passport number + ## Format eight or nine character alphanumeric pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Slovakia Personal Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slovakia-personal-number.md
description: "Slovakia personal number sensitive information type entity definit
# Slovakia personal number + ## Format nine or 10 digits containing optional backslash
A DLP policy has low confidence that it's detected this type of sensitive inform
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Slovakia Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slovakia-physical-addresses.md
description: "Slovakia physical addresses sensitive information type entity defi
This unbundled named entity detects patterns related to physical address from Slovakia. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level Medium
compliance Sit Defn Slovenia Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slovenia-drivers-license-number.md
description: "Slovenia driver's license number sensitive information type entity
# Slovenia drivers license number + ## Format nine digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- vozniška številka licence - vozniških dovoljenj - številka vozniškega dovoljenja-- številke vozniških dovoljenj
+- številke vozniških dovoljenj
compliance Sit Defn Slovenia Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slovenia-passport-number.md
description: "Slovenia passport number sensitive information type entity definit
# Slovenia passport number + ## Format two letters followed by seven digits with no spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Slovenia Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slovenia-physical-addresses.md
description: "Slovenia physical addresses sensitive information type entity defi
This unbundled named entity detects patterns related to physical address from Slovenia. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Slovenia Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slovenia-tax-identification-number.md
description: "Slovenia tax identification number sensitive information type enti
# Slovenia tax identification number + ## Format eight digits with no spaces or delimiters
A DLP policy has low confidence that it's detected this type of sensitive inform
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Slovenia Unique Master Citizen Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slovenia-unique-master-citizen-number.md
description: "Slovenia Unique Master Citizen Number sensitive information type e
# Slovenia Unique Master Citizen Number + ## Format 13 digits without spaces or delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- unique master citizen number - unique registration number - uniqueidentityno #-- uniqueidentityno#
+- uniqueidentityno#
compliance Sit Defn South Africa Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-south-africa-identification-number.md
description: "South Africa identification number sensitive information type enti
13 digits that may contain spaces + ## Pattern 13 digits:
A DLP policy has high confidence that it's detected this type of sensitive infor
- Identity card - ID-- Identification
+- Identification
compliance Sit Defn South Korea Resident Registration Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-south-korea-resident-registration-number.md
description: "South Korea resident registration number sensitive information typ
# South Korea resident registration number + ## Format 13 digits containing a hyphen
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Citizen's Registration Number - Jumin deungnok beonho - RRN-- 주민등록번호
+- 주민등록번호
compliance Sit Defn Spain Dni https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-spain-dni.md
description: "Spain DNI sensitive information type entity definition."
# Spain DNI + ## Format eight digits followed by one character
A DLP policy has medium confidence that it's detected this type of sensitive inf
- personal identification number - personal identity no - unique identity number-- uniqueid#
+- uniqueid#
compliance Sit Defn Spain Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-spain-drivers-license-number.md
description: "Spain driver's license number sensitive information type entity de
# Spain drivers license number + ## Format eight digits followed by one character
A DLP policy has medium confidence that it's detected this type of sensitive inf
- carnet conducir - carnet de conducir - licencia de manejo-- licencia manejo
+- licencia manejo
compliance Sit Defn Spain Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-spain-passport-number.md
description: "Spain passport number sensitive information type entity definition
# Spain passport number + ## Format an eight- or nine-character combination of letters and numbers with no spaces or delimiters
compliance Sit Defn Spain Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-spain-physical-addresses.md
description: "Spain physical addresses sensitive information type entity definit
This unbundled named entity detects patterns related to physical address from Spain. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Spain Social Security Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-spain-social-security-number.md
description: "Spain social security number (SSN) sensitive information type enti
# Spain social security number (SSN) + ## Format 11-12 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- socialsecurityno - social security no - social security number-- n├║mero de la seguridad social
+- n├║mero de la seguridad social
compliance Sit Defn Spain Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-spain-tax-identification-number.md
description: "Spain tax identification number sensitive information type entity
# Spain tax identification number + ## Format seven or eight digits and one or two letters in the specified pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Sql Server Connection String https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-sql-server-connection-string.md
description: "SQL Server connection string sensitive information type entity def
# SQL Server connection string + ## Format The string `User Id`, `User ID`, `uid`, or `UserId` followed by the characters and strings outlined in the pattern below.
This sensitive information type identifies these keywords by using a regular exp
- localhost - 127.0.0.1 - testacs.<!--no-hyperlink-->com-- s-int.<!--no-hyperlink-->net
+- s-int.<!--no-hyperlink-->net
compliance Sit Defn Surgical Procedures https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-surgical-procedures.md
description: "Surgical procedures sensitive information type entity definition."
This unbundled named entity detects terms related to surgical procedures, such as *appendectomy*. It supports English terms only. It's also included in the [All medical terms and conditions](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level
-High
+High
compliance Sit Defn Sweden Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-sweden-drivers-license-number.md
description: "Sweden driver's license number sensitive information type entity d
# Sweden drivers license number + ## Format 10 digits containing a hyphen
A DLP policy has medium confidence that it's detected this type of sensitive inf
- שאָפער דערלויבעניש נומער - förare lic. - דריווערס דערלויבעניש-- körkortsnummer
+- k├╢rkortsnummer
compliance Sit Defn Sweden National Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-sweden-national-id.md
description: "Sweden national ID sensitive information type entity definition."
# Sweden national ID + ## Format 10 or 12 digits and an optional delimiter
A DLP policy has medium confidence that it's detected this type of sensitive inf
- personal id - personnummer# - personnummer-- skatteidentifikationsnummer
+- skatteidentifikationsnummer
compliance Sit Defn Sweden Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-sweden-passport-number.md
description: "Sweden passport number sensitive information type entity definitio
# Sweden passport number + ## Format eight digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_eu_passport_date - date of issue-- date of expiry
+- date of expiry
compliance Sit Defn Sweden Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-sweden-physical-addresses.md
description: "Sweden physical addresses sensitive information type entity defini
This unbundled named entity detects patterns related to physical address from Sweden. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Sweden Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-sweden-tax-identification-number.md
description: "Sweden tax identification number sensitive information type entity
# Sweden tax identification number + ## Format 10 digits and a symbol in the specified pattern
A DLP policy has medium confidence that it's detected this type of sensitive inf
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Swift Code https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-swift-code.md
description: "SWIFT code sensitive information type entity definition."
# SWIFT code + ## Format four letters followed by 5-31 letters or digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- BIC コード - 金融機関識別コード - 金融機関コード-- 銀行コード
+- 銀行コード
compliance Sit Defn Switzerland Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-switzerland-physical-addresses.md
description: "Switzerland physical addresses sensitive information type entity d
This unbundled named entity detects patterns related to physical address from Switzerland. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Switzerland Ssn Ahv Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-switzerland-ssn-ahv-number.md
description: "Switzerland SSN AHV number sensitive information type entity defin
# Switzerland SSN AHV number + ## Format 13-digit number
A DLP policy has medium confidence that it's detected this type of sensitive inf
- einzigartige identität nicht - sozialversicherungsnummer - identification personnelle id-- numéro de sécurité sociale
+- numéro de sécurité sociale
compliance Sit Defn Taiwan National Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-taiwan-national-identification-number.md
description: "Taiwan national identification number sensitive information type e
# Taiwan national identification number + ## Format one letter (in English) followed by nine digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- 簽名 - 蓋章 - 簽名或蓋章-- 簽章
+- 簽章
compliance Sit Defn Taiwan Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-taiwan-passport-number.md
description: "Taiwan passport number sensitive information type entity definitio
# Taiwan passport number + ## Format - biometric passport number: nine digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Passport # - 护照 - 中華民國護照-- Zhōnghuá Mínguó hùzhào
+- Zhōnghuá Mínguó hùzhào
compliance Sit Defn Taiwan Resident Certificate Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-taiwan-resident-certificate-number.md
description: "Taiwan-resident certificate (ARC/TARC) number sensitive informatio
# Taiwan-resident certificate (ARC/TARC) number + ## Format 10 letters and digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- TARC - 居留證 - 外僑居留證-- 台灣地區居留證
+- 台灣地區居留證
compliance Sit Defn Thai Population Identification Code https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-thai-population-identification-code.md
description: "Thai population identification code sensitive information type ent
# Thai population identification code + ## Format 13 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- บัตรประชาชน - รหัสบัตรประชาชน - บัตรประชาชน-- รหัสบัตรประชาชน
+- รหัสบัตรประชาชน
compliance Sit Defn Turkey National Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-turkey-national-identification-number.md
description: "Turkey national identification number sensitive information type e
# Turkey national identification number + ## Format 11 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- TC Kimlik No - TC Kimlik numarası - Vatandaşlık numarası-- Vatandaşlık no
+- Vatandaşlık no
compliance Sit Defn Turkey Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-turkey-physical-addresses.md
description: "Turkey physical addresses sensitive information type entity defini
This unbundled named entity detects patterns related to physical address from Turkey. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Types Of Medication https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-types-of-medication.md
description: "Types of medication sensitive information type entity definition."
This unbundled named entity detects medication names, such as *insulin*. It supports English terms only. It's also included in the [All medical terms and conditions](sit-defn-all-medical-terms-conditions.md) bundled named entity SIT. + ## Confidence level
-High
+High
compliance Sit Defn Uk Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-uk-drivers-license-number.md
description: "U.K. driver's license number sensitive information type entity def
# U.K. drivers license number + ## Format Combination of 18 letters and digits in the specified format
compliance Sit Defn Uk Electoral Roll Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-uk-electoral-roll-number.md
description: "U.K. electoral roll number sensitive information type entity defin
# U.K. electoral roll number + ## Format two letters followed by 1-4 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- council nomination - nomination form - electoral register-- electoral roll
+- electoral roll
compliance Sit Defn Uk National Health Service Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-uk-national-health-service-number.md
description: "U.K. national health service number sensitive information type ent
# U.K. national health service number + ## Format 10-17 digits separated by spaces
A DLP policy has high confidence that it's detected this type of sensitive infor
- DOB - D.O.B - Date of Birth-- Birth Date
+- Birth Date
compliance Sit Defn Uk National Insurance Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-uk-national-insurance-number.md
description: "U.K. national insurance number (NINO) sensitive information type e
This sensitive information type entity is included in the EU National Identification Number sensitive information type. It's also available as a stand-alone sensitive information type entity. + ## Format seven characters or nine characters separated by spaces or dashes
A DLP policy has medium confidence that it's detected this type of sensitive inf
- insurance# - insurancenumber - nationalinsurance#-- nationalinsurancenumber
+- nationalinsurancenumber
compliance Sit Defn Uk Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-uk-physical-addresses.md
description: "U.K. physical addresses sensitive information type entity definiti
This unbundled named entity detects patterns related to physical address from the U.K.. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Uk Unique Taxpayer Reference Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-uk-unique-taxpayer-reference-number.md
description: "U.K. Unique Taxpayer Reference Number sensitive information type e
# U.K. Unique Taxpayer Reference Number + ## Format 10 digits without spaces and delimiters
A DLP policy has medium confidence that it's detected this type of sensitive inf
- taxnumber - tin id - tin no-- tin#
+- tin#
compliance Sit Defn Ukraine Passport Domestic https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-ukraine-passport-domestic.md
description: "Ukraine passport domestic sensitive information type entity defini
# Ukraine passport domestic + ## Format nine digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- passport no - паспорт України - номер паспорта-- персональний
+- персональний
compliance Sit Defn Ukraine Passport International https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-ukraine-passport-international.md
description: "Ukraine passport international sensitive information type entity d
# Ukraine passport international + ## Format eight-character alphanumeric pattern
compliance Sit Defn Us Bank Account Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-us-bank-account-number.md
description: "U.S. bank account number sensitive information type entity definit
# U.S. bank account number + ## Format 6-17 digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
- Debit Acct Number - Debit Acct # - Debit Acct No.-- Debit Account No.
+- Debit Account No.
compliance Sit Defn Us Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-us-drivers-license-number.md
description: "U.S. driver's license number sensitive information type entity def
# U.S. drivers license number + ## Format Depends on the state
A DLP policy has low confidence that it's detected this type of sensitive inform
### Keyword_[state_name]_drivers_license_name - state abbreviation (for example, "NY")-- state name (for example, "New York")
+- state name (for example, "New York")
compliance Sit Defn Us Individual Taxpayer Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-us-individual-taxpayer-identification-number.md
description: "U.S. individual taxpayer identification number (ITIN) sensitive in
# U.S. individual taxpayer identification number (ITIN) + ## Format nine digits that start with a "9" and contain a "7" or "8" as the fourth digit, optionally formatted with spaces or dashes
A DLP policy has low confidence that it's detected this type of sensitive inform
- tax payer - itins - taxid-- individual taxpayer
+- individual taxpayer
compliance Sit Defn Us Physical Addresses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-us-physical-addresses.md
description: "U.S. physical addresses sensitive information type entity definiti
This unbundled named entity detects patterns related to physical address from the U.S.. It's also included in the [All Physical Addresses](sit-defn-all-physical-addresses.md) bundled named entity SIT. + ## Confidence level
-Medium
+Medium
compliance Sit Defn Us Social Security Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-us-social-security-number.md
description: "U.S. social security number (SSN) sensitive information type entit
# U.S. social security number (SSN) + ## Format nine digits, which may be in a formatted or unformatted pattern
A DLP policy has low confidence that it's detected this type of sensitive inform
- SSNS - SSN# - SS#-- SSID
+- SSID
compliance Sit Defn Us Uk Passport Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-us-uk-passport-number.md
description: "U.S./U.K. passport number sensitive information type entity defini
# U.S./U.K. passport number + ## Format nine digits
A DLP policy has medium confidence that it's detected this type of sensitive inf
### Keywords_uk_eu_passport_number - british passport-- uk passport
+- uk passport
compliance Sit Defn User Login Credentials https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-user-login-credentials.md
description: "User login credentials sensitive information type entity definitio
# User login credentials (preview) + ## Format A paired username and password used in general authentication process.
compliance Sit Defn X 509 Certificate Private Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-x-509-certificate-private-key.md
description: "X.509 certificate private key sensitive information type entity de
# X.509 certificate private key (preview) + ## Format A combination of up to 20,000 characters consisting of letters, digits, and special characters.
compliance Sit Edm Notifications Activities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-edm-notifications-activities.md
When you [create custom sensitive information types with exact data match (EDM)]
> [!NOTE] The ability to create notifications for EDM activities is available for the World Wide and GCC clouds only. + ## Pre-requisites The account you use must be one of the following:
compliance Sit Functions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-functions.md
Sensitive information types (SIT) can use functions as primary elements to ident
This article explains what these functions look for, to help you understand how the predefined sensitive information types work. For more information, see [Sensitive information type entity definitions](sensitive-information-type-entity-definitions.md) + ## Table of functions |Function name | Function action | Is a validator|
compliance Sit Get Started Exact Data Match Based Sits Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-get-started-exact-data-match-based-sits-overview.md
# Get started with exact data match based sensitive information types + ## Applies to - [New experience](sit-create-edm-sit-unified-ux-workflow.md)
or
- [Learn about exact data match based sensitive information types](sit-learn-about-exact-data-match-based-sits.md) - [Export source data for exact data match based sensitive information type](sit-get-started-exact-data-match-export-data.md#export-source-data-for-exact-data-match-based-sensitive-information-type) - [Create exact data match sensitive information type workflow new experience](sit-create-edm-sit-unified-ux-workflow.md)-- [Create exact data match sensitive information type workflow classic experience](sit-create-edm-sit-classic-ux-workflow.md)
+- [Create exact data match sensitive information type workflow classic experience](sit-create-edm-sit-classic-ux-workflow.md)
compliance Sit Get Started Exact Data Match Create Rule Package https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-get-started-exact-data-match-create-rule-package.md
# Create exact data match sensitive information type/rule package + ## Applies to - [Classic experience](sit-create-edm-sit-classic-ux-workflow.md)
compliance Sit Get Started Exact Data Match Create Schema https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-get-started-exact-data-match-create-schema.md
# Create the schema for exact data match based sensitive information types + ## Applies to - Classic experience
compliance Sit Get Started Exact Data Match Export Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-get-started-exact-data-match-export-data.md
# Export source data for exact data match based sensitive information type + ## Applies to - [New experience](sit-create-edm-sit-unified-ux-workflow.md)
compliance Sit Get Started Exact Data Match Hash Upload https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-get-started-exact-data-match-hash-upload.md
This article shows you how to hash and upload your sensitive information source table. + ## Applies to - [Create exact data match sensitive information type new experience](sit-create-edm-sit-unified-ux-workflow.md)
compliance Sit Get Started Exact Data Match Test https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-get-started-exact-data-match-test.md
# Test an exact data match sensitive information type + ## Applies to - [New experience](sit-create-edm-sit-unified-ux-workflow.md)
compliance Sit Learn About Exact Data Match Based Sits https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-learn-about-exact-data-match-based-sits.md
EDM-based classification enables you to create custom sensitive information type
> > This support is available for sensitive information types. See, [Information protection support for double byte character sets release notes (preview)](mip-dbcs-relnotes.md) for more information. + ## What's different in an EDM SIT When you work with EDM SITs, it's helpful to understand a few concepts that are unique to them.
compliance Sit Manage Custom Sits Compliance Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-manage-custom-sits-compliance-center.md
This article walks you through the steps to modify and remove an existing custom sensitive information type in the Compliance center. + ## Modify custom sensitive information types in the Compliance Center 1. In the Compliance Center, go to **Data classification** \> **Sensitive info types** and choose the sensitive information type from the list that you want to modify choose **Edit**.
compliance Sit Modify A Custom Sensitive Information Type In Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-modify-a-custom-sensitive-information-type-in-powershell.md
In Security & Compliance PowerShell, modifying a custom sensitive information ty
To connect to Security & Compliance PowerShell, see [Security & Compliance PowerShell](/powershell/exchange/exchange-online-powershell). + ## Step 1: Export the existing rule package to an XML file > [!NOTE]
compliance Sit Modify Edm Schema Configurable Match https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-modify-edm-schema-configurable-match.md
# Modify Exact Data Match schema to use configurable match + ## Applies to - Exact data match (EDM) sensitive information type (SIT) creation using PowerShell.
compliance Sit Modify Keyword Dictionary https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-modify-keyword-dictionary.md
description: "Learn how to modify a keyword dictionary in the Microsoft Purview
You might need to modify keywords in one of your keyword dictionaries, or modify one of the built-in dictionaries. You can do this through PowerShell or through the Compliance center. + ## Modify a keyword dictionary in Compliance center Keyword dictionaries can be used as `Primary elements` or `Supporting elements` in sensitive information type (SIT) patterns. You can edit a keyword dictionary while creating a SIT or in an existing SIT. For example to edit an existing keyword dictionary:
compliance Sit Regex Validators Additional Checks https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-regex-validators-additional-checks.md
> [!IMPORTANT] > Microsoft Customer Service & Support can't assist with creating custom classifications or regular expression patterns. Support engineers can provide limited support for the feature, such as, providing sample regular expression patterns for testing purposes, or assisting with troubleshooting an existing regular expression pattern that's not triggering as expected, but can't provide assurances that any custom content-matching development will fulfill your requirements or obligations. + ## Sensitive Information Type regular expression validators ### Checksum validator
compliance Sit Remove A Custom Sensitive Information Type In Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-remove-a-custom-sensitive-information-type-in-powershell.md