Updates from: 10/08/2022 02:34:33
Category Microsoft Docs article Related commit history on GitHub Change details
admin Activity Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/activity-reports.md
The report will only contain a Privacy Setting property. For more information on
It'll take a few minutes for these changes to take effect on the reports in the reports dashboard. This setting also applies to the Microsoft 365 usage reports in [Microsoft Graph](/graph/api/resources/report) and [Power BI](/microsoft-365/admin/usage-analytics/usage-analytics) and [the usage reports in Microsoft Teams Admin center](/microsoftteams/teams-analytics-and-reports/teams-reporting-reference). Showing identifiable user information is a logged event in the Microsoft Purview compliance portal audit log.
-## What happens to usage data when a user account is closed?
+## What happens to usage data when a user account is deleted?
-Whenever you close a user's account, Microsoft will delete that user's usage data within 30 days. That user will still be included in the Activity chart totals for the periods she was active in, but will not appear in the User Details table.
+Whenever you delete a user's account, Microsoft will delete that user's usage data within 30 days. Deleted users will still be included in the Activity chart totals for the periods they were active in, but will not appear in the User Details table.
However, when you select a particular day, up to 28 days from the current date, the report show the user's usage for that day in the User Details table.
admin Servicenow Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/servicenow-overview.md
These are the key features you'll get with the Microsoft 365 support integration
:::image type="content" source="../../media/ServiceNow-guide/servicenow_recommended_articles.png" lightbox="../../media/ServiceNow-guide/servicenow_recommended_articles.png" alt-text="Recommended solutions description field."::: -- Microsoft service request: Escalate issues to Microsoft support agents and receive status updates for your case.
+- Microsoft service request: Escalate issues to Microsoft support agents and receive status updates for your request. With an updated workflow, you can now create a service request by adding your preferred title, description, and contact information similar to what is found in the Microsoft 365 admin portal.
- :::image type="content" source="../../media/ServiceNow-guide/servicenow-overview-service-request.png" lightbox="../../media/ServiceNow-guide/servicenow-overview-service-request.png" alt-text="Service request form.":::
+ :::image type="content" source="../../media/ServiceNow-guide/SNOW_escalation.png" lightbox="../../media/ServiceNow-guide/SNOW_escalation.png" alt-text="Screenshot that shows the recommended solutions description field.":::
+
+ :::image type="content" source="../../media/ServiceNow-guide/SNOW_escalation2.png" lightbox="../../media/ServiceNow-guide/SNOW_escalation2.png" alt-text="Screenshot that shows the recommended solutions description field.":::
## Prerequisites
Permissions required:
After the Microsoft 365 Support Integration app has been installed, two Application Cross-Scope accesses are created. If they're not created successfully, create them manually.
-## Setup the integration
+## Set up the integration
After you've downloaded the app, navigate to the Microsoft 365 setup wizard in your SNOW environment to complete the setup process.+ You can learn more about the steps by visiting the following pages:
+- If you would like to get started without setting up the Microsoft 365 support integration app, you can select the **Continue without any setup** option. This option will continue to provide basic recommended solutions.
+
+ :::image type="content" source="../../media/ServiceNow-guide/No_setup.png" lightbox="../../media/ServiceNow-guide/No_setup.png" alt-text="Recommended solutions description field.":::
+
- If your ServiceNow environment allows Basic Authentication (access with ServiceNow user credential) for inbound webservice calls, then follow instructions in [Set up Microsoft 365 support integration with ServiceNow Basic Authentication](servicenow-basic-authentication.md). - If your ServiceNow environment does NOT allows Basic Authentication (access with ServiceNow user credential) for inbound webservice calls, then follow instructions in [Set up Microsoft 365 support integration with Azure AD Auth Token](servicenow-aad-oauth-token.md). - This configuration will require an SSO tenant in order for the AAD Auth Token to work correctly.
admin Test And Deploy Microsoft 365 Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/test-and-deploy-microsoft-365-apps.md
You can manage testing and deployment of purchased and licensed Microsoft 365 Ap
8. If the app has a status of **Update pending**, you can click on the app to open the Manage pane and update the app. +
+> [!NOTE]
+> _Is this a test deployment_ is an administrative tag to determine if the app is still in testing phase. It has no technical impact.
+ ## Find published apps for testing and full deployment You can find, test, and fully deploy published apps that don't already appear in the list on the Integrated apps page. By purchasing and licensing the apps from the admin center, you can add Microsoft and Microsoft partner apps to your list from a single location.
admin Password Policy Recommendations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/password-policy-recommendations.md
Good password practices fall into a few broad categories:
The primary goal of a more secure password system is password diversity. You want your password policy to contain lots of different and hard to guess passwords. Here are a few recommendations for keeping your organization as secure as possible. -- Maintain an eight-character minimum length requirement
+- Maintain a fourteen-character minimum length requirement
- Don't require character composition requirements. For example, \*&(^%$
bookings Bookings In Outlook https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/bookings-in-outlook.md
Use the **Get-CASMailbox** and **Set-CASMailbox** commands to check user status
Set-CASMailbox -Identity adam@contoso.com -EwsApplicationAccessPolicy EnforceBlockList -EWSBlockList @{Add="MicrosoftOWSPersonalBookings"} ```
+### Create Bookings with me
+
+1. Open [Outlook on the web](https://go.microsoft.com/fwlink/p/?LinkID=402333).
+2. Select **Calendar**.
+3. Select the **Create bookings page** link that appears in your calendar to create Bookings with me.
+ ## Frequently asked questions ### What is the difference between Bookings and Bookings with me?
business-premium M365bp Trial Playbook Microsoft Business Premium https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-trial-playbook-microsoft-business-premium.md
Title: "User trial guide: Microsoft 365 Business Premium"
+ Title: "Trial user guide: Microsoft 365 Business Premium"
f1.keywords: - NOCSH
search.appverid:
description: "Make the most of your Microsoft 365 Business Premium trial. Try out some of the key productivity and security capabilities."
-# User trial guide: Microsoft 365 Business Premium
+# Trial user guide: Microsoft 365 Business Premium
-Welcome to the Microsoft Business Premium user trial guide! This guide will help you make the most of your 30-day free trial. You can see firsthand how Microsoft 365 Business Premium increases productivity and helps safeguard your organization with advanced security capabilities. Use this guide to set up your threat protection features, analyze detected threats, and respond to cyberattacks.
+Welcome to the Microsoft Business Premium trial user guide! This guide will help you make the most of your free trial. You can see firsthand how Microsoft 365 Business Premium increases productivity and helps safeguard your organization with advanced security capabilities. Use this guide to set up your threat protection features, analyze detected threats, and respond to cyberattacks.
## Set up the Microsoft 365 Business Premium trial When you [start a trial or purchase Microsoft 365 Business Premium](get-microsoft-365-business-premium.md), your first step is to get everything set up. > [!TIP]
-> Save this user trial guide to your browser favorites. When links in the user trial guide take you away from this location, it'll be easier to return to this guide to continue.
+> Save this trial user guide to your browser favorites. When links in the trial user guide take you away from this location, it'll be easier to return to this guide to continue.
1. [Set up your trial](../business-premium/m365bp-setup.md)!
compliance Compliance Easy Trials Compliance Manager Assessment Playbook https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials-compliance-manager-assessment-playbook.md
Title: "Microsoft Purview Compliance Manager premium assessments trial playbook"
+ Title: "Microsoft Purview Compliance Manager premium assessments trial user guide"
f1.keywords: - NOCSH
search.appverid: - MOE150 - MET150
-description: "Microsoft Purview Compliance Manager premium assessments trial playbook."
+description: "Microsoft Purview Compliance Manager premium assessments trial user guide."
-# Trial playbook: Microsoft Purview Compliance Manager premium assessments
+# Trial user guide: Microsoft Purview Compliance Manager premium assessments
-Welcome to the Microsoft Purview Compliance Manager premium assessment trial playbook.
+Welcome to the Microsoft Purview Compliance Manager premium assessment trial user guide.
This playbook will help you make the most of your 90-day free trial by teaching you how to use the comprehensive set of premium assessment templates (add-on).
compliance Compliance Easy Trials Compliance Playbook https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials-compliance-playbook.md
Title: "Microsoft Purview solutions trial playbook"
+ Title: "Microsoft Purview solutions trial user guide"
f1.keywords: - NOCSH
search.appverid: - MOE150 - MET150
-description: "Microsoft Purview solutions trial playbook."
+description: "Microsoft Purview solutions trial user guide."
-# Trial playbook: Microsoft Purview solutions
+# Trial user guide: Microsoft Purview solutions
-Welcome to the Microsoft Purview solutions trial playbook. This playbook will help you make the most of your free trial by helping you discover robust and comprehensive capabilities of Microsoft Purview and security products.
+Welcome to the Microsoft Purview solutions trial user guide. This playbook will help you make the most of your free trial by helping you discover robust and comprehensive capabilities of Microsoft Purview and security products.
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
Help your organization assess risks and efficiently respond to nations, regional
[More information on the Compliance Manager premium assessments trial](compliance-easy-trials-compliance-manager-assessments.md).
-[Trial playbook: Microsoft Purview Compliance Manager premium assessments](compliance-easy-trials-compliance-manager-assessment-playbook.md)
+[Trial user guide: Microsoft Purview Compliance Manager premium assessments](compliance-easy-trials-compliance-manager-assessment-playbook.md)
### Microsoft Priva Privacy Risk Management and Microsoft Priva Subject Rights Requests
Proactively identify and protect against privacy risks such as data hoarding, da
[Learn more about Microsoft Priva](/privacy/solutions/privacymanagement/privacy-management).
-[Trial playbook: Microsoft Priva](/privacy/solutions/privacymanagement/privacy-management-trial-playbook)
+[Trial user guide: Microsoft Priva](/privacy/solutions/privacymanagement/privacy-management-trial-playbook)
## Additional resources
compliance Compliance Easy Trials https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials.md
Your trial will be effective immediately for 90 days. It can take up to two hour
You can start using Purview solutions as soon as you see them in the Microsoft Purview compliance portal. Nothing is created automatically and users won't be affected. When you navigate to each solution, you may be guided to make extra setup configurations to start using features.
-Use our [trial playbook](compliance-easy-trials-compliance-playbook.md) to help you get started.
+Use our [trial user guide](compliance-easy-trials-compliance-playbook.md) to help you get started.
#### Finding support
compliance Data Classification Increase Accuracy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-increase-accuracy.md
The **Match**, **Not a match** experience is available in:
|Fingerprint SIT| No|No|Yes| |Exact data match SIT|No|No|No| |Named entities| No| No| No|
+|Credential scan| No| No| No|
|Built-in Trainable classifiers|No| Yes| Yes| |Custom trainable classifier |No| No| Yes|
compliance Use Notifications And Policy Tips https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/use-notifications-and-policy-tips.md
For each rule in a DLP policy, you can:
> > - Email notifications can be sent only to individual recipients, not groups or distribution lists. > - Only new content will trigger an email notification. Editing existing content will trigger policy tips, but not email notifications.
-> - External senders don't receive notifications. Notifications go only to internal users.
+> - External senders receive only a templatized notification without full details to prevent any unintended loss of information about the policy configuration.
![Email notification options.](../media/4e7b9500-2a78-44e6-9067-09f4bfd50301.png)
compliance Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/whats-new.md
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
+## September 2022
+
+### Data Classification
+
+- [Increase classifier accuracy (preview)](data-classification-increase-accuracy.md) - This article shows you how to confirm whether items matched by a classifier are true positive (a Match) or a false positive (Not a match) and provide Match, or Not a match feedback. You can use that feedback to tune your classifiers to increase accuracy. You can also send redacted versions of the document and the Match, Not a Match feedback to Microsoft if you want to help increase the accuracy of the classifiers that Microsoft provides.
+
+### Data loss prevention
+
+- [Design a data loss prevention policy complex rule design (preview)](dlp-policy-design.md#complex-rule-design-preview) - The DLP rule builder supports boolean logic (AND, OR, NOT) and nested groups. New video and content added that walks you through this new functionality.
+
+### Trainable classifiers
+
+- [Trainable classifiers definitions](classifier-tc-definitions.md) - more than 20 new classifiers have been added, so the definitions for all trainable classifiers have been broken out into this new article.
+ ## August 2022 ### Compliance Manager
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
### Microsoft Priva -- [Microsoft Priva trial playbook](/privacy/priva/priva-trial-playbook) - refreshed and simplified guidance to align with recent documentation updates
+- [Microsoft Priva trial user guide](/privacy/priva/priva-trial-playbook) - refreshed and simplified guidance to align with recent documentation updates
### Sensitive Information Types
security Get Defender Business Servers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/get-defender-business-servers.md
Here's how to get Microsoft Defender for Business servers (preview):
## See also -- [See the trial playbook: Microsoft Defender for Business](trial-playbook-defender-business.md).
+- [See the trial user guide: Microsoft Defender for Business](trial-playbook-defender-business.md).
- [Use the setup wizard in Microsoft Defender for Business](mdb-use-wizard.md). - [See the setup and configuration process for Defender for Business](mdb-setup-configuration.md). - [See how to get help and support for Defender for Business](mdb-get-help.md) (just in case you need help).
security Get Defender Business https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/get-defender-business.md
If you have signed up for a trial, after you receive your acceptance email, you
3. Proceed to [Add users and assign licenses](mdb-add-users.md). > [!TIP]
-> See the [Trial playbook for Defender for Business](trial-playbook-defender-business.md).
+> See the [Trial user guide for Defender for Business](trial-playbook-defender-business.md).
## Get Microsoft 365 Business Premium
When you're ready to get started, you'll work with two main portals: the Microso
## Next steps -- [See the trial playbook: Microsoft Defender for Business](trial-playbook-defender-business.md).
+- [See the trial user guide: Microsoft Defender for Business](trial-playbook-defender-business.md).
- [Use the setup wizard in Microsoft Defender for Business](mdb-use-wizard.md). - [See the setup and configuration process for Defender for Business](mdb-setup-configuration.md). - [See how to get help and support for Defender for Business](mdb-get-help.md) (just in case you need help).
security Mdb Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-overview.md
With Defender for Business, you can help protect the devices and data your busin
- [Find out how to get Defender for Business](get-defender-business.md). - **Learn how to set up your threat protection capabilities**.
- - [Use the trial playbook: Defender for Business](trial-playbook-defender-business.md).
+ - [See the trial user guide: Defender for Business](trial-playbook-defender-business.md).
- [Learn about the simplified configuration process](mdb-simplified-configuration.md). - [See how to set up and configure Defender for Business](mdb-setup-configuration.md).
security Trial Playbook Defender Business https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/trial-playbook-defender-business.md
Title: "Microsoft Defender for Business trial guide"
+ Title: "Microsoft Defender for Business trial user guide"
f1.keywords: - NOCSH
- m365-security - tier1 ms.localizationpriority: high Previously updated : 09/02/2022 Last updated : 10/07/2022 search.appverid:
description: "Make the most of your Defender for Business trial with this guide.
-# Trial guide: Microsoft Defender for Business
+# Trial user guide: Microsoft Defender for Business
-**Welcome to the Defender for Business trial guide!**
+**Welcome to the Defender for Business trial user guide!**
-This guide is designed to help you make the most of your 30-day free trial. Use the recommendations in this article from the Microsoft Defender team to learn how Defender for Business can help elevate your security from traditional antivirus protection to next-generation protection, endpoint detection and response, and vulnerability management.
+This guide will help you set up and use key features of your free trial. Using recommendations in this article from the Microsoft Defender team, learn how Defender for Business can help elevate your security from traditional antivirus protection to next-generation protection, endpoint detection and response, and vulnerability management.
## What is Defender for Business?
After you sign up for Defender for Business, the first step is to **[add users a
> You must be a global administrator to perform this task. The person who signed your company up for Microsoft 365 or Defender for Business is the global administrator by default. [Learn more about roles and permissions](mdb-roles-permissions.md). ### Step 2: Visit the Microsoft 365 Defender portal
-
+ The Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is the one-stop shop where you use and manage Defender for Business. It includes callouts to help you get started, cards that surface relevant information, and a navigation bar that provides easy access to the various features and capabilities. - **[Visit the Microsoft 365 Defender portal](mdb-get-started.md)**.
Defender for Business was designed to save small and medium-sized businesses tim
#### Setup wizard flow: what to expect > [!TIP]
-> **Using the setup wizard is optional.** (See [What happens if I don't use the wizard?](mdb-use-wizard.md#what-happens-if-i-dont-use-the-wizard)) If you choose not to use the wizard, or if the wizard is closed before your setup process is complete, you can complete the setup and configuration process on your own. See [Step 4](#step-4-set-up-and-configure-defender-for-business).
+> **Using the setup wizard is optional.** (See [What happens if I don't use the wizard?](mdb-use-wizard.md#what-happens-if-i-dont-use-the-wizard)). If you choose not to use the wizard, or if the wizard is closed before your setup process is complete, you can complete the setup and configuration process on your own. See [Step 4: Set up and configure Defender for Business](#step-4-set-up-and-configure-defender-for-business).
1. **[Assign user permissions](mdb-roles-permissions.md#view-or-edit-role-assignments)**. Grant your security team access to the Microsoft 365 Defender portal.
Defender for Business was designed to save small and medium-sized businesses tim
> [!NOTE] > When you use the setup wizard, the system detects if you have Windows devices that are already enrolled in Intune. You'll be asked if you want to use automatic onboarding for all or some of those devices. You can onboard all Windows devices at once or select specific devices at first and then add more devices later. [Learn more about automatic onboarding](mdb-use-wizard.md#what-is-automatic-onboarding).
-
+ To onboard other devices, see [step 4](#step-4-set-up-and-configure-defender-for-business).
-4. **[View and edit your security policies](mdb-configure-security-settings.md)**. Defender for Business includes default security policies for next-generation protection and firewall protection that can be applied to your company's devices. These preconfigured security policies use recommended settings, so you're protected as soon as your devices are onboarded to Defender for Business. And you can edit the policies or create new ones.
+4. **[View and edit your security policies](mdb-configure-security-settings.md)**. Defender for Business includes default security policies for next-generation protection and firewall protection that can be applied to your company's devices. These preconfigured security policies use recommended settings, so you're protected as soon as your devices are onboarded to Defender for Business. And you can edit the policies or create new ones.
### Step 4: Set up and configure Defender for Business
If you choose not to use the setup wizard, see the following diagram that depict
[:::image type="content" source="medi)
-If you used the setup wizard but you need to onboard more devices, such as non-Windows devices, go directly to step 4 in the following procedure:
+If you used the setup wizard but you need to onboard more devices, such as non-Windows devices, go directly to [step 4](mdb-onboard-devices.md) in the following procedure:
-1. **[Review the requirements](mdb-requirements.md)** to configure and use Defender for Business.
+1. **[Review the requirements](mdb-requirements.md)** to configure and use Defender for Business.
2. **[Assign roles and permissions](mdb-roles-permissions.md)** in the Microsoft 365 Defender portal.
If you used the setup wizard but you need to onboard more devices, such as non-W
- [Learn about types of email notifications](mdb-email-notifications.md#types-of-email-notifications). - [View and edit email notification settings](mdb-email-notifications.md#view-and-edit-email-notifications).
-4. **[Onboard devices](mdb-onboard-devices.md)**. With Defender for Business, you have several options to choose from for onboarding your company's devices. First, select the operating system you want to onboard.
+4. **[Onboard devices](mdb-onboard-devices.md)**. To onboard Windows and Mac clients, you can use a local script.
- | Device type | Onboarding methods |
- |:|:|
- | [Windows clients](mdb-onboard-devices.md) | Choose one of the following options to onboard Windows client devices to Defender for Business:<ul><li>Local script (for onboarding devices manually in the Microsoft 365 Defender portal)</li><li>Group Policy (if you're already using Group Policy and prefer this method)</li><li>Microsoft Intune (*recommended*; included in [Microsoft 365 Business Premium](../../business-premium/index.md))</li></ul> |
- | [Mac](mdb-onboard-devices.md) | Choose one of the following options to onboard Mac:<ul><li>Local script for Mac (*recommended*)</li><li>Microsoft Intune for Mac (Intune is included in [Microsoft 365 Business Premium](../../business-premium/index.md))</li></ul><p>We recommend you use a local script to onboard Mac. Although you can [set up enrollment for Mac devices in Intune](/mem/intune/enrollment/macos-enroll), the local script is the simplest method for onboarding Mac to Defender for Business. |
- | Windows Server and Linux servers | *The ability to onboard an instance of Windows Server or Linux Server is currently in preview and requires an additional license*. See the following articles to learn more: <ul><li>[Defender for Business requirements](mdb-requirements.md)</li><li>[Onboard devices to Defender for Business](mdb-onboard-devices.md)</li></ul> |
- | [Mobile devices](mdb-onboard-devices.md) | You need Microsoft Intune to onboard mobile devices, such as Android and iOS/iPadOS devices. If you have [Microsoft 365 Business Premium](../../business-premium/index.md), Intune is part of your subscription. Intune can also be purchased separately. See the following resources to get help enrolling these devices into Intune:<ul><li>[Enroll Android devices](/mem/intune/enrollment/android-enroll)</li><li>[Enroll iOS or iPadOS devices](/mem/intune/enrollment/ios-enroll)</li></ul> |
+5. **[View and configure your security policies](mdb-configure-security-settings.md)**. After you onboard your company's devices to Defender for Business, the next step is to view and edit your security policies and settings.
-5. **[View and configure your security policies](mdb-configure-security-settings.md)**. After you onboard your company's devices to Defender for Business, the next step is to view and edit your security policies and settings. Defender for Business includes preconfigured security policies that use recommended settings. But you can edit the settings to suit your business needs.
+Defender for Business includes pre-configured security policies that use recommended settings. But you can edit the settings to suit your business needs.
- | Action | Description |
- |:|:|
- | [Choose where to manage your security policies and devices](mdb-configure-security-settings.md#choose-where-to-manage-security-policies-and-devices). | If you select the [simplified configuration process](mdb-simplified-configuration.md), you can view and manage your security policies in the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). But you're not limited to this option. If you've been using [Intune](/mem/intune/protect/), you can keep using the Microsoft Endpoint Manager admin center to manage your security policies and devices. |
- | [View or edit your next-generation protection policies](mdb-configure-security-settings.md#view-or-edit-your-next-generation-protection-policies). | Next-generation protection settings include real-time protection, block at first sight, network protection, actions to take on potentially unwanted apps, and antivirus scheduled scans. |
- | [View or edit your firewall policies](mdb-configure-security-settings.md#view-or-edit-your-firewall-policies-and-custom-rules). | Firewall protection determines what network traffic is allowed to flow to and from your company's devices. [Custom rules](mdb-custom-rules-firewall.md) can be used to define exceptions to your firewall policies. |
- | [Set up web content filtering](mdb-configure-security-settings.md#set-up-web-content-filtering). | Web content filtering enables your security team to track and regulate access to websites based on their content categories, such as adult content, high bandwidth, legal liability, leisure, or uncategorized. |
- | [Review settings for advanced features](mdb-configure-security-settings.md#review-settings-for-advanced-features). | In Defender for Business, security features are preconfigured to recommended settings. You can review and edit the settings to suit your business needs. <br/><br/>To access settings for advanced features, in the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) go to **Settings** > **Endpoints** > **General** > **Advanced features**. |
- | [View and edit other settings](mdb-configure-security-settings.md#access-your-settings-in-the-microsoft-365-defender-portal) in the Microsoft 365 Defender portal. | In addition to security policies that are applied to devices, there are other settings you can view and edit in Defender for Business. For example, you specify the time zone to use, and you can onboard (or offboard) devices. |
+Security policies to review and configure include:
+
+- [Next-generation protection policies](mdb-configure-security-settings.md#view-or-edit-your-next-generation-protection-policies) which determine antivirus and antimalware protection for your company's devices
+- [Firewall protection and rules](mdb-configure-security-settings.md#view-or-edit-your-firewall-policies-and-custom-rules) which determine what network traffic is allowed to flow to and from your company's devices
+- [Web content filtering](mdb-configure-security-settings.md#set-up-web-content-filtering)which prevents people from visiting certain websites (URLs) based on categories, such as adult content or legal liability
+- [Advanced features](mdb-configure-security-settings.md#review-settings-for-advanced-features) such as automated investigation and response and endpoint detection and response (EDR) in block mode
## Start using Defender for Business
-In the next 30 days, we recommend you try out your new security capabilities, as described in the following sections:
+For the next 30 days, hereΓÇÖs guidance from the product team on key features to try:
+
+1. [Use your Microsoft Defender Vulnerability Management dashboard](#1-use-the-defender-vulnerability-management-dashboard).
-- [Use your Microsoft Defender Vulnerability Management dashboard](#use-the-defender-vulnerability-management-dashboard) -- [View and respond to detected threats](#view-and-respond-to-detected-threats)-- [Review security policies](#review-security-policies)-- [Prepare for ongoing security management](#prepare-for-ongoing-security-management)
+2. [View and respond to detected threats](#2-view-and-respond-to-detected-threats).
-### Use the Defender Vulnerability Management dashboard
+3. [Review security policies](#3-review-security-policies).
-Defender for Business includes a Defender Vulnerability Management dashboard that's designed to save your security team time and effort. [Use your Defender Vulnerability Management dashboard](mdb-view-tvm-dashboard.md).
+4. [Prepare for ongoing security management](#4-prepare-for-ongoing-security-management).
+
+5. [Try the Document Drops Backdoor tutorial](#5-try-the-document-drops-backdoor-tutorial).
+
+### 1. Use the Defender Vulnerability Management dashboard
+
+Defender for Business includes a Defender Vulnerability Management dashboard that's designed to save your security team time and effort. Learn how to [use your Defender Vulnerability Management dashboard](mdb-view-tvm-dashboard.md).
- View your exposure score, which is associated with devices in your organization. - View your top security recommendations, such as address impaired communications with devices, turn on firewall protection, or update Microsoft Defender Antivirus definitions. - View remediation activities, such as any files that were sent to quarantine, or vulnerabilities found on devices.
-### View and respond to detected threats
+### 2. View and respond to detected threats
-As threats are detected and alerts are triggered, incidents are created. Your organization's security team can view and manage incidents in the Microsoft 365 Defender portal. [View and respond to detected threats](mdb-view-manage-incidents.md).
+As threats are detected and alerts are triggered, incidents are created. Your organization's security team can view and manage incidents in the Microsoft 365 Defender portal. Learn how to [view and respond to detected threats](mdb-view-manage-incidents.md).
- [View and manage incidents](mdb-view-manage-incidents.md). - [Respond to and mitigate threats](mdb-respond-mitigate-threats.md). - [Review mediation actions in the Action Center](mdb-review-remediation-actions.md). - [View and use reports](mdb-reports.md).
-### Review security policies
+### 3. Review security policies
+
+In Defender for Business, security settings are configured through policies that are applied to devices. Defender for Business includes pre-configured policies to help protect your company's devices as soon as they are onboarded, safeguarding your organization against identity, device, application, and document security threats.
-In Defender for Business, security settings are configured through policies that are applied to devices. Defender for Business includes preconfigured policies to help protect your company's devices as soon as they are onboarded, safeguarding your organization against identity, device, application, and document security threats. [Review security policies](mdb-view-edit-create-policies.md).
+Learn how to [review security policies](mdb-view-edit-create-policies.md).
-- [Learn about your default policies](mdb-view-edit-create-policies.md#default-policies-in-defender-for-business).-- [View your existing policies](mdb-view-edit-create-policies.md#view-your-existing-policies).-- [Understand policy order](mdb-policy-order.md). -- [Understand next-generation configuration settings](mdb-next-gen-configuration-settings.md).-- [Review your default firewall settings](mdb-firewall.md#default-firewall-settings-in-defender-for-business).-- [Understand firewall settings you can configure](mdb-firewall.md#firewall-settings-you-can-configure-in-defender-for-business).-- [Set up web content filtering](mdb-configure-security-settings.md#set-up-web-content-filtering). Web-content filtering enables your security team to track and regulate access to websites based on their content categories. It's not turned on by default, so you need to set it up if you want this capability for your organization.
-
-### Prepare for ongoing security management
+### 4. Prepare for ongoing security management
New security events, such as threat detection on a device, adding new devices, and employees joining or leaving the organization, will require you to manage security. In Defender for Business, there are many ways for you to manage device security.
New security events, such as threat detection on a device, adding new devices, a
- [Onboard a device to Defender for Business](mdb-manage-devices.md#onboard-a-device). - [Offboard a device from Defender for Business](mdb-manage-devices.md#offboard-a-device).
+### 5. Try the Document Drops Backdoor tutorial
+
+Quickly see how Defender for Business works by trying a tutorial.
+
+Simulate an attack that introduces file-based malware on a test device. The tutorial describes how to use the simulation file and what to watch for in the Microsoft 365 Defender portal.
+
+>[!NOTE]
+> This tutorial requires Microsoft Word to be installed on your test device.
+
+To access the tutorial, do the following:
+
+1. Go to the [Microsoft 365 Defender portal](https://security.microsoft.com) and sign in.
+
+2. In the navigation pane, under **Endpoints**, choose **Tutorials**.
+
+3. Choose **Document Drops Backdoor**.
+ ## Additional resources - [Overview of Defender for Business](mdb-overview.md)
security Built In Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/built-in-protection.md
audience: Admin Previously updated : 09/21/2022 Last updated : 10/07/2022 ms.localizationpriority: medium
f1.keywords: NOCSH
> **You don't have to wait for built-in protection to come to you**! You can protect your organization's devices now by configuring these capabilities: > - [Enable cloud protection](why-cloud-protection-should-be-on-mdav.md) > - [Turn tamper protection on](prevent-changes-to-security-settings-with-tamper-protection.md)
-> - [Set basic attack surface reduction rules to block mode](attack-surface-reduction-rules-deployment.md)
+> - [Set standard attack surface reduction rules to block mode](attack-surface-reduction-rules-deployment.md)
> - [Enable network protection in block mode](enable-network-protection.md) ## What is built-in protection, and how does it work?
whiteboard Index https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/index.md
description: Find resources about how to set up and manage Microsoft Whiteboard.
# Introduction to Microsoft Whiteboard
-Microsoft Whiteboard in Microsoft 365 is a free-form, digital canvas where people, content, and ideas come together. Whiteboard lets team members collaborate in real time, wherever you are. It also gives your ideas room to grow with an infinite canvas designed for pen, touch, and keyboard.
+Microsoft Whiteboard in Microsoft 365 is a free-form, digital new canvas where people, content, and ideas come together. Whiteboard lets team members collaborate in real time, wherever you are. It also gives your ideas room to grow with an infinite canvas designed for pen, touch, and keyboard.
## Get started
The resources in this section help the admin in your organization to set up and
| If you're looking for this information | Go to this resource | |:--|:--|
-|Find PowerShell cmdlet help references to manage Microsoft Whiteboard|[PowerShell for Whiteboard](/powershell/module/whiteboard/)|
+|Find PowerShell cmdlet help references to manage Microsoft Whiteboard|[PowerShell for Whiteboard](/powershell/module/whiteboard/)|