Category | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
copilot-for-microsoft-365-admin | Copilot For Microsoft 365 Admin | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/copilot-for-microsoft-365-admin.md | Title: "Copilot for Microsoft 365 admin" + Title: "Copilot in Microsoft 365 admin centers" f1.keywords: - NOCSH -description: "Learn about Copilot for Microsoft 365 admin and how it can help simplify admin tasks." +description: "Learn about Copilot in Microsoft 365 admin centers and how it can help simplify admin tasks." +appliesto: + - ✅ Microsoft 365 Copilot -# Copilot for Microsoft 365 admin (Preview) +# Copilot in Microsoft 365 admin centers (Preview) -Copilot for Microsoft 365 admin harnesses the value of generative AI to boost IT admins' productivity by simplifying administration of Microsoft 365 and Microsoft 365 Copilot, and empowering you to focus on more strategic priorities. Copilot for Microsoft 365 admin helps admins perform tasks across different Microsoft 365 services using natural language interactions, contextual guidance, and proactive suggestions. Copilot for Microsoft 365 admin also leverages the power of Copilot to provide transferable skills across different admin centers and surfaces, breaking the barriers of switching between multiple admin tools and interfaces. +Copilot in Microsoft 365 admin centers harnesses the value of generative AI to boost IT admins' productivity by simplifying administration of Microsoft 365 and Microsoft 365 Copilot, and empowering you to focus on more strategic priorities. Copilot in Microsoft 365 admin centers helps admins perform tasks across different Microsoft 365 services using natural language interactions, contextual guidance, and proactive suggestions. Copilot in Microsoft 365 admin centers also leverages the power of Copilot to provide transferable skills across different admin centers and surfaces, breaking the barriers of switching between multiple admin tools and interfaces. >[!NOTE]-> Copilot for Microsoft 365 admin is currently available in an invite-only preview. +> Copilot in Microsoft 365 admin centers is currently available in an invite-only preview. ## Before you begin -You must have a Microsoft 365 Copilot license enabled for your tenant. To learn more about Copilot licensing, see [Get started with Microsoft 365 Copilot](microsoft-365-copilot-setup.md). +You must have a Microsoft 365 Copilot license enabled for your tenant. To learn more about Copilot licensing, see [Set up Microsoft 365 Copilot](microsoft-365-copilot-setup.md). ### Get started -To use Copilot for Microsoft 365 admin, follow these steps: +To use Copilot in Microsoft 365 admin centers, follow these steps: 1. Sign in to the Microsoft 365 admin center, or one of the specialized admin centers like Teams, SharePoint, or Exchange. -2. Select the Copilot button in the upper right shell to launch Copilot for Microsoft 365 admin. +2. Select the Copilot button in the upper right shell to launch Copilot in Microsoft 365 admin centers. -## How can I use Copilot for Microsoft 365 admin? +## How can I use Copilot in Microsoft 365 admin centers? -You can use Copilot to help manage your organization and focus on what’s important. +You can use Copilot to help manage your organization and focus on what's important. The following table describes what you can do with Microsoft: | Functionality | Description | Example prompts | ||-|-| | Search users and groups | Search your users and groups based on natural language queries. Copilot returns a list where you can view the results in active users or group lists, and export them to a CSV file for further analysis. | *"Show me users in Australia with Teams license assigned"* <br> *"Identify all groups in my organization without an owner"* <br> *"Identify all users who are unlicensed"* |-| Mailbox search | Find insights about your users’ mailboxes through natural language queries. | *“Find all the mailboxes which are hidden from address lists”* <br> *“Show me all mailboxes put on litigation hold date before 13th August 2017”* | +| Mailbox search | Find insights about your users' mailboxes through natural language queries. | *"Find all the mailboxes which are hidden from address lists"* <br> *"Show me all mailboxes put on litigation hold date before 13th August 2017"* | | Navigate admin center | Navigate to different pages, features, and experiences within the admin center. Copilot provides a breadcrumb trail and direct link to your desired page, and you can use a wayfinding query to be brought directly to that page with the Copilot chat pane still open. | *"Where do I manage role assignments?"* <br> *"Where can I see my meeting policies?"* |-| Get support | Get support for any challenges or questions that you have related to administering Microsoft 365 for your tenant. Copilot can also give you an alert for a service incident ongoing for your organization if your question is relevant to that incident, along with a self-help insight. For certain issues, Copilot can give you diagnostic solutions that will leverage the information and details you provide to help diagnose and solve your problems. | *"How do I view my bill?"* <br> *"How do I set up Multi-factor Authentication?"* <br> *“How do I restore a deleted user?”* | -| Discover products | Discover products to help take advantage of value from Microsoft 365. Copilot can help you find the right product to suit your needs. When applicable, you can initiate trials and purchases directly from the Copilot response. | *“What is included in Business Premium?”* <br> *“What is the price of Viva Goals?”* <br> *“How do I get email?”* | -| Identity management | Use Copilot to guide you in managing various aspects of identity and security within your organization’s ecosystem. | *“How many hybrid users am I syncing?”* <br> *“Which authentication methods do I have on?”* <br> *“Perform a guest access review”* | +| Get support | Get support for any challenges or questions that you have related to administering Microsoft 365 for your tenant. Copilot can also give you an alert for a service incident ongoing for your organization if your question is relevant to that incident, along with a self-help insight. For certain issues, Copilot can give you diagnostic solutions that will leverage the information and details you provide to help diagnose and solve your problems. | *"How do I view my bill?"* <br> *"How do I set up Multi-factor Authentication?"* <br> *"How do I restore a deleted user?"* | +| Discover products | Discover products to help take advantage of value from Microsoft 365. Copilot can help you find the right product to suit your needs. When applicable, you can initiate trials and purchases directly from the Copilot response. | *"What is included in Business Premium?"* <br> *"What is the price of Viva Goals?"* <br> *"How do I get email?"* | +| Identity management | Use Copilot to guide you in managing various aspects of identity and security within your organization's ecosystem. | *"How many hybrid users am I syncing?"* <br> *"Which authentication methods do I have on?"* <br> *"Perform a guest access review"* | | Device management | Copilot can help you locate resources to provision mobile app protections policies. Get deployment guidance for setting up and managing various aspects of identity and security within the tenant. | *"What is the status of my security defaults?"* <br> *"What is the identity user status in my org?"* | | Service health | Surface general status of Microsoft services, tenant health status, health advice, and recommendations. | *"Are there any service issues right now?"* <br> *"Show me health of teams"* |-| Copilot guidance | Get Microsoft 365 Copilot guidance to help you with your Copilot onboarding and deployment journey with the help of guidance and insights. | *“How do I give access to Copilot?”* <br> *“See Copilot requirements for my organization”* <br> *“How many Copilot licenses have I assigned?”* <br> *“Review Copilot user readiness”* | -| Onboard users | Onboard users to your organization with one prompt. Copilot can help with adding a new user by leveraging the information you provide in a prompt in combination with the data it has about the tenant (like domains and licenses). Copilot can seamlessly recommend a configuration for this new user, which saves time. | *“Onboard John Smith as a new user to my organization”* | -| Admin recap | See Admin recap to get a personalized and concise summary of key insights and trends across admin areas, such as Service Health, Message Center, Experience Insights, and more to save valuable time. Admin recap is personalized based on your role and usage patterns. You can copy the text for easier sharing and also personalize what shows in the recap. | *“Recap the latest admin info for me”* | +| Copilot guidance | Get Microsoft 365 Copilot guidance to help you with your Copilot onboarding and deployment journey with the help of guidance and insights. | *"How do I give access to Copilot?"* <br> *"See Copilot requirements for my organization"* <br> *"How many Copilot licenses have I assigned?"* <br> *"Review Copilot user readiness"* | +| Onboard users | Onboard users to your organization with one prompt. Copilot can help with adding a new user by leveraging the information you provide in a prompt in combination with the data it has about the tenant (like domains and licenses). Copilot can seamlessly recommend a configuration for this new user, which saves time. | *"Onboard John Smith as a new user to my organization"* | +| Admin recap | See Admin recap to get a personalized and concise summary of key insights and trends across admin areas, such as Service Health, Message Center, Experience Insights, and more to save valuable time. Admin recap is personalized based on your role and usage patterns. You can copy the text for easier sharing and also personalize what shows in the recap. | *"Recap the latest admin info for me"* | - During the preview, use the prepopulated prompt options in the Copilot pane for the best results. You can also explore the [Copilot Lab](https://copilot.cloud.microsoft/prompts), which provides a library of prompts specifically designed for Copilot for Microsoft 365 admin. With Copilot Lab, you can experiment with Copilot's capabilities, easily filter prompts by categories, and even save your favorite prompts for later use. + During the preview, use the prepopulated prompt options in the Copilot pane for the best results. You can also explore the [Copilot Prompt Gallery](https://copilot.cloud.microsoft/prompts), which provides a library of prompts specifically designed for Copilot in Microsoft 365 admin centers. With Copilot Prompt Gallery, you can experiment with Copilot's capabilities, easily filter prompts by categories, and even save your favorite prompts for later use. To maintain your security and privacy, Copilot doesn't make any configuration changes on your behalf. To learn more about security and privacy with Copilot, see [Data, Privacy, and Security for Microsoft 365 Copilot](microsoft-365-copilot-privacy.md). In preview, Copilot is automatically enabled for select customers who have purch ### How can IT admins disable the feature? If you would like to exclude certain admins from this functionality, or opt your tenant out of the preview, you can easily do so-via a security group. Start by creating a security group with the following name: "**CopilotForM365AdminExclude**", no description or additional settings are required. The Copilot for Microsoft 365 admin experience will then be disabled for any admins added to this group. +via a security group. Start by creating a security group with the following name: "**CopilotForM365AdminExclude**", no description or additional settings are required. The Copilot in Microsoft 365 admin centers experience will then be disabled for any admins added to this group. -### Which admin roles can use Copilot for Microsoft 365 admin? +### Which admin roles can use Copilot in Microsoft 365 admin centers? It will be available to all admins, and respect role-based access controls (RBAC) within the admin center, only surfacing information and controls that the particular admin has access to. Copilot doesn't make any configuration changes on behalf of an admin, keeping security integrity intact. -### Does Copilot for Microsoft 365 admin support audit logging? +### Does Copilot in Microsoft 365 admin centers support audit logging? -Copilot for Microsoft 365 admin is aligned with our commitment to providing enterprise-grade compliance capabilities for all Copilot products. These capabilities include auditing, eDiscovery & legal hold, data retention controls, and more. +Copilot in Microsoft 365 admin centers is aligned with our commitment to providing enterprise-grade compliance capabilities for all Copilot products. These capabilities include auditing, eDiscovery & legal hold, data retention controls, and more. -### How much does Copilot for Microsoft 365 admin cost? +### How much does Copilot in Microsoft 365 admin centers cost? -Copilot for Microsoft 365 admin is available to a select set of customers for private preview today. More details on pricing and bundling will be shared soon. +Copilot in Microsoft 365 admin centers is available to a select set of customers for private preview today. More details on pricing and bundling will be shared soon. |
copilot-prompt-gallery-export-prompts | Copilot Prompt Gallery Export Prompts | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/copilot-prompt-gallery-export-prompts.md | + + Title: "Export prompts that users saved or shared in Copilot Prompt Gallery" +description: "Provides admins the steps to take to export prompts that users saved or shared in Copilot Prompt Gallery" ++++++ms.localizationpriority: medium ++- privacy-copilot +- m365copilot +- magic-ai-copilot +hideEdit: true Last updated : 11/19/2024+++# Export prompts that users saved or shared in Copilot Prompt Gallery ++In [Copilot Prompt Gallery](https://copilot.cloud.microsoft/prompts), users can save or share prompts they created, including sharing prompts with a specific team (in Microsoft Teams) that they're a member of. As an admin, you can use Windows PowerShell to export data to a file about either of the following types of prompts in Copilot Prompt Gallery: ++- The saved and shared prompts of a specific user. +- The prompts shared with a specific team. ++> [!NOTE] +> The user account running the PowerShell script to export the data needs to be assigned the Global Admin role. ++## Configure your Windows PowerShell environment ++Before you can export prompts that users saved or shared in Copilot Prompt Gallery, you need to configure your PowerShell environment by doing the following steps: ++1. [Download the CopilotLabDSR PowerShell script](#download-the-copilotlabdsr-powershell-script) +2. [Install the MSAL.PS module](#install-the-msalps-module) +3. [Load the CopilotLabDSR module](#load-the-copilotlabdsr-module) ++### Download the CopilotLabDSR PowerShell script ++1. To get started, you need to [download the CopilotLabDSR PowerShell script](https://download.microsoft.com/download/b/a/b/babff430-cc1f-46e0-b98b-2997d79af5ae/tenant-admin-scripts.zip). +2. Extract the CopilotLabDSR.psm1 file from the tenant-admin-scripts.zip file to a location you can access from PowerShell. +3. In File Explorer, go to the location where you saved the CopilotLabDSR.psm1 file that you extracted. +4. Right-click on the CopilotLabDSR.psm1 file and select **Properties**. +5. On the **General** tab, select **Unblock** checkbox, and then select **Ok**. ++ You need to unblock the file because, by default, executing scripts downloaded from the internet isn't allowed. ++### Install the MSAL.PS module ++1. Check if the MSAL.PS module is installed by running the following command in PowerShell: + ```PowerShell + Get-Module -ListAvailable MSAL.PS + ``` +2. If the module isn't installed, install the module by running the following command in PowerShell: + ```PowerShell + Install-Module -Name MSAL.PS -Scope CurrentUser ++### Load the CopilotLabDSR module ++1. Run the following command in PowerShell to enable running scripts downloaded from the internet for this session only. It might prompt you to confirm by typing "Y." ++ ```PowerShell + Set-ExecutionPolicy -ExecutionPolicy Unrestricted -Scope Process + ``` ++2. Run the following command to import the module with all available cmdlets. ++ ```PowerShell + Import-module "<location where you saved the CopilotLabDSR.psm1 file that you extracted>" + ``` ++ For example, if your file is saved in C:\AdminScripts, you would type: ++ ```PowerShell + Import-module "C:\AdminScripts\CopilotLabDSR.psm1" +++## Export the saved and shared prompts of a specific user ++1. From Windows PowerShell, use the `Export- PromptsUserContent` cmdlet to export the saved or shared prompts of a specific user from Copilot Prompt Gallery. ++```powershell +Export-PromptsUserContent -UserAadIdOrPrincipalName <Entra ID or UPN of user> -ExportDirectory <output location> -PromptType <type of prompt> +``` ++| Parameter | Description | +|--|-| +| UserAadIdOrPrincipalName | Use either the Microsoft Entra ID or the User Principal Name (UPN) of the user for which you want to export content. | +| ExportDirectory | Location to store your output files. The folder should already exist. If not specified, the export files are saved to the current folder. | +| PromptType | Specify "saved" to export the prompts saved by the user. Specify "shared" to export the prompts for which a shareable link to the prompt was generated. | ++For example, the following exports Reed Smiths's saved prompts in Copilot Prompt Gallery using his UPN and downloads the export files to the location C:\PromptsExportReedSmith. ++```powershell +Export- PromptsUserContent -UserAadIdOrPrincipalName reedsmith@contoso.com -ExportDirectory C:\PromptsExportReedSmith -PromptType saved +``` ++2. When prompted to authenticate, sign in with an account that is assigned the Global Admin role, not as the user you want to export. +3. After the PowerShell cmdlet runs successfully, go to your export location to view your exported files. ++## Export prompts shared with a specific team ++1. From Windows PowerShell, use the `Export-PromptsGroupContent` cmdlet to export the prompts published to the specific team in Copilot Prompt Gallery. ++```powershell +Export-PromptsGroupContent -M365TeamsGroupId <team ID> -ExportDirectory <output location> +``` ++| Parameter | Description | +||-| +| M365TeamsGroupId | ID of the team to which the prompts were shared. | +| ExportDirectory | Location to store your output files. The folder should already exist. If not specified, the export files are saved to the current folder. | ++For example, the following exports the prompts shared in Copilot Prompt Gallery to the team with an ID of "d0efcad2-6744-0de6-0624-ea467d4293af" and downloads the export files to the location C:\PromptsExportReedSmith. ++```powershell +Export- PromptsGroupContent -M365TeamsGroupId d0efcad2-6744-0de6-0624-ea467d4293af -ExportDirectory C:\PromptsExportReedSmith +``` ++> [!TIP] +> To find the ID of the team, go to **Teams** > **Manage teams** in the [Teams admin center](https://admin.teams.microsoft.com/). ++2. When prompted to authenticate, sign in with an account that is assigned the Global Admin role. +3. After the PowerShell cmdlet runs successfully, go to your export location to view your exported files. ++## Properties contained in the export file and their descriptions ++After running the PowerShell cmdlet to export your user's data from Copilot Prompt Gallery, you'll receive one file in your download location folder. You can use the information in the following sections to help you understand the properties you see in the file you received. ++### Export file for the saved and shared prompts of a specific user ++The file name is prefixed with "User" and the Microsoft Entra ID of the user followed by the prompts type used for export. The file has the properties listed in the following table. ++| Property | Description | +|--|-| +| Prompts | An array of users saved or shared prompts information. | +| Prompt.Title | Title of the prompt given by user while saving or sharing the prompt. | +| Prompt.PromptText | Prompt text | +| Prompt.Products | A list containing the product in which user saved or shared the prompt. | +| Prompt.CreatedTime | Time when the user saved the prompt. | +| Prompt.SharedTime | Time when the user shared the prompt | +| Prompt.HydratedEntities | List of entities with type and entity information. | +| Prompt.HydratedEntities.Type | Currently People, File, and Meeting entity types are supported. | +| Prompt.HydratedEntities.Entity | Entity information based on entity type. | +| Prompt.HydratedEntities.Entity.Id | Unique entity ID. | +| Prompt.HydratedEntities.Entity.DisplayName | Person entity display name. | +| Prompt.HydratedEntities.Entity.EmailAddresses | List of email addresses for person entity. | +| Prompt.HydratedEntities.Entity.ReferenceId | Unique ID for instrumentation mapping. | +| Prompt.HydratedEntities.Entity.FileName | Name of the file entity. | +| Prompt.HydratedEntities.Entity.AccessUrl | Access URL of file entity. | +| Prompt.HydratedEntities.Entity.SpoId | SharePoint Document Identifier for File entity. | +| Prompt.HydratedEntities.Entity.OriginalId | Meeting ID of event entity. | +| Prompt.HydratedEntities.Entity.Subject | Subject of event entity. | +| Prompt.HydratedEntities.Entity.SkypeTeamsMeetingUrl | URL of event entity. | +| Prompt.HydratedEntities.Entity.Start | Start time of event entity. | +| Prompt.HydratedEntities.Entity.End | End time of event entity. | +| Prompt.HydratedEntities.Entity.OrganizerName | Organizer Name of event entity. | +| Prompt.HydratedEntities.Entity.OrganizerAddress | Organizer Address of event entity. | +| Prompt.HydratedEntities.Entity.Attendees | Attendees list of event entity. | ++### Export file for the prompts shared with a specific team ++The file name is prefixed with "Group" and the ID of the team. The file has the properties listed in the following table. ++| Property | Description | +|--|-| +| Prompts | An array of users saved or shared prompts information. | +| Prompt.Title | Title of the prompt given by user while saving or sharing the prompt. | +| Prompt.PromptText | Prompt text | +| Prompt.Products | A list containing the product in which user saved or shared the prompt. | +| Prompt.PublishedTime | Time when prompt was published to the team. | +| Prompt.PublishedBy | UPN of the user who published the prompt to the team. | +| Prompt.HydratedEntities | List of entities with type and entity information. | +| Prompt.HydratedEntities.Type | Currently People, File, and Meeting entity types are supported. | +| Prompt.HydratedEntities.Entity | Entity information based on entity type. | +| Prompt.HydratedEntities.Entity.Id | Unique entity ID. | +| Prompt.HydratedEntities.Entity.DisplayName | Person entity display name. | +| Prompt.HydratedEntities.Entity.EmailAddresses | List of email addresses for person entity. | +| Prompt.HydratedEntities.Entity.ReferenceId | Unique ID for instrumentation mapping. | +| Prompt.HydratedEntities.Entity.FileName | Name of the file entity. | +| Prompt.HydratedEntities.Entity.AccessUrl | Access URL of file entity. | +| Prompt.HydratedEntities.Entity.SpoId | SharePoint Document Identifier for File entity. | +| Prompt.HydratedEntities.Entity.OriginalId | Meeting ID of event entity. | +| Prompt.HydratedEntities.Entity.Subject | Subject of event entity. | +| Prompt.HydratedEntities.Entity.SkypeTeamsMeetingUrl | URL of event entity. | +| Prompt.HydratedEntities.Entity.Start | Start time of event entity. | +| Prompt.HydratedEntities.Entity.End | End time of event entity. | +| Prompt.HydratedEntities.Entity.OrganizerName | Organizer Name of event entity. | +| Prompt.HydratedEntities.Entity.OrganizerAddress | Organizer Address of event entity. | +| Prompt.HydratedEntities.Entity.Attendees | Attendees list of event entity. | |
copilot-prompt-gallery | Copilot Prompt Gallery | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/copilot-prompt-gallery.md | + + Title: "Understand Copilot Prompt Gallery" +f1.keywords: +- NOCSH +++ Last updated : 10/20/2024+audience: Admin +++ms.localizationpriority: medium ++- scotvorg +- m365copilot +- magic-ai-copilot +description: "Learn about the Copilot Prompt Gallery and how it works with your organization." +++# Understand Copilot Prompt Gallery - admin guide ++Copilot Prompt Gallery is a resource of Microsoft-created prompts, videos, and articles that help users understand and use Microsoft Copilot effectively. Copilot Prompt Gallery is available within Microsoft Copilot and online at [Copilot Prompt Gallery](https://copilot.cloud.microsoft/prompts). ++As an admin, you can support Copilot Prompt Gallery adoption and success within your organization. This article covers Copilot Prompt Gallery architecture, data flows, security, and privacy. ++## Overview +++Copilot Prompt Gallery is a comprehensive repository that provides users with access to a catalog of Copilot prompts. The catalog includes prompts created by Microsoft that highlight key scenarios and capabilities of Microsoft Copilot, designed to help users understand and use Microsoft Copilot more effectively. ++Copilot Prompt Gallery features videos and articles to help users get started with Copilot and maximize productivity through effective prompting. Users can save and share successful prompts, facilitating collaboration and knowledge sharing within the organization. ++Each suggested prompt in the prompt Gallery includes additional information about how to personalize it and ways to extend the prompt for even more value. This makes Copilot Prompt Gallery a single resource to help your users use Copilot confidently and effectively. ++## Data flow and compliance ++Copilot Prompt Gallery processes and manages data in a structured manner to ensure compliance and security. The following are key data flows and compliance considerations: +++- Copilot Prompt Gallery is both a website and a feature of Copilot that allows users to discover, manage, use, and share Copilot prompts. +- A user accesses Copilot Prompt Gallery, either via the Copilot Prompt Gallery website or in Copilot through an app. +- Copilot Prompt Gallery accesses Microsoft-authored prompts from the public catalog. +- Copilot Prompt Gallery accesses user-created prompts from user, group, and tenant collections in the Microsoft 365 Substrate data store. +- The prompts are stored in collections within the Substrate Data Store, which is a storage type that allows applications to store files and data and enables efficient indexing and search. There are collections for users, groups, and tenants, all of which are within the tenant boundary. All data is encrypted, transported via a secure pipeline, and is accessible only via Substrate APIs. |
includes | Copilot E5 E3 Create Apply Sensitivity Labels | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/includes/copilot-e5-e3-create-apply-sensitivity-labels.md | +++++++ +description: Create and apply Microsoft Purview sensitivity labels for Microsoft 365 Copilot. Last updated : 11/19/2024+++✅ **Create and apply [sensitivity labels](/purview/get-started-with-sensitivity-labels) to protect your data** ++[Sensitivity labels](/purview/sensitivity-labels) are a way to identify and classify the sensitivity of your organization's data, adding an extra layer of protection to your data. ++When sensitivity labels are applied to items, like documents and emails, the labels add the protection directly to this data. As a result, that protection persists, wherever the data is stored. When sensitivity labels are applied to containers, like SharePoint sites and groups, the labels add protection indirectly by controlling access to the container where the data is stored. For example, privacy settings, external user access, and access from unmanaged devices. ++The sensitivity labels can also affect Copilot results, including: ++- The label settings include protection actions, like access to sites, customizable headers and footers, and encryption. +- If the label applies encryption, Copilot checks the usage rights for the user. For Copilot to return data from that item, the user must be granted permissions to copy from it. +- A prompt session with Copilot (called Business Chat) can reference data from different types of items. Sensitivity labels are shown in the returned results. The latest response displays the sensitivity label with the [highest priority](/purview/sensitivity-labels#label-priority-order-matters). ++- If Copilot creates new content from labeled items, the sensitivity label from the source item is automatically inherited. |
includes | Copilot E5 E3 Create Dlp Policy | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/includes/copilot-e5-e3-create-dlp-policy.md | +++++++ +description: Create the Microsoft Purview Data Loss Prevention policies for Microsoft 365 Copilot. Last updated : 11/19/2024+++For Exchange Online, SharePoint Online, and OneDrive, you can use DLP to identify, monitor, and automatically protect sensitive information across emails and files, including files stored in Microsoft Teams file repositories. ++- For the steps, see [Design a DLP policy](/purview/dlp-policy-design) and [Create and Deploy data loss prevention policies](/purview/dlp-create-deploy-policy). |
includes | Copilot E5 E3 Deployment Resources | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/includes/copilot-e5-e3-deployment-resources.md | ++++++ +description: Technical and deployment resources to help customers with Microsoft 365 Copilot deployment and adoption. Last updated : 11/14/2024+++- Organizations with a minimum number of Copilot licenses are eligible for a Microsoft co-investment in deployment and adoption through eligible Microsoft Partners. ++ To learn more, see [Microsoft 365 Copilot Partner Directory](https://cloudpartners.transform.microsoft.com/copilot-directory). ++- Eligible customers can request technical and deployment assistance from Microsoft FastTrack. FastTrack provides guidance and resources to help you plan, deploy, and adopt Microsoft 365. ++ To learn more, see [FastTrack for Microsoft 365](https://aka.ms/AMC/FASTTRACK). |
includes | Copilot E5 E3 Enable Sensitivity Labels Sharepoint Onedrive | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/includes/copilot-e5-e3-enable-sensitivity-labels-sharepoint-onedrive.md | +++++++ +description: Enable Microsoft Purview sensitivity labels for files in SharePoint and OneDrive for Microsoft 365 Copilot. Last updated : 11/19/2024+++This step is a one-time configuration that is required to enable sensitivity labels for SharePoint and OneDrive. It's also required for Microsoft 365 Copilot to access encrypted files stored in these locations. ++As with all tenant-level configuration changes for SharePoint and OneDrive, it takes about 15 minutes for the change to take effect. Then users can select sensitivity labels in Office on the web and you can create policies that automatically label files in these locations. ++You have two options: ++- **Option 1**: Select **Information Protection** > **Sensitivity labels**. If you see the following message, select **Turn on now**: ++ :::image type="content" source="../media/microsoft-365-copilot-e5-guide/purview-sensitivity-labels-prompt.png" alt-text="In Microsoft Purview Information Protection, turn on sensitivity labels for SharePoint and OneDrive." lightbox="../media/microsoft-365-copilot-e5-guide/purview-sensitivity-labels-prompt.png"::: ++- **Option 2**: Use the `[Set-SPOTenant](/powershell/module/sharepoint-online/set-spotenant)` Windows PowerShell cmdlet. ++To learn more about this configuration, see [Enable sensitivity labels for files in SharePoint and OneDrive](/purview/sensitivity-labels-sharepoint-onedrive-files). |
includes | Copilot E5 E3 Open Purview Portal | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/includes/copilot-e5-e3-open-purview-portal.md | ++++++ +description: Open the Microsoft Purview portal steps for Microsoft 365 Copilot. Last updated : 11/14/2024+++1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as one of the admins listed at [Create and deploy DLP policies - Permissions](/purview/dlp-create-deploy-policy). +2. Select **Solutions** > **Data Loss Prevention**. |
includes | Copilot E5 E3 Sharepoint Advanced Management | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/includes/copilot-e5-e3-sharepoint-advanced-management.md | +++++++ +description: Create and apply Microsoft Purview sensitivity labels for Microsoft 365 Copilot. Last updated : 11/19/2024+++There are features in [SharePoint Advanced Management (SAM)](/sharepoint/get-ready-copilot-sharepoint-advanced-management) that can help you get ready for Copilot. ++✅ **Copilot goals with SAM**: ++- Declutter data sources by finding and removing inactive SharePoint sites. +- Identify SharePoint sites with overshared or sensitive content. +- Use policy to restrict access to SharePoint sites that are business critical or have sensitive content. +- Monitor site changes. ++This section walks you through different SAM features that can help you get your organization and your data ready for Copilot. ++To learn more about SAM + Copilot, see [Get ready for Copilot with SharePoint Advanced Management](/sharepoint/get-ready-copilot-sharepoint-advanced-management). ++### Ensure all sites have valid owners ++✅ **Run a [Site Ownership policy](/sharepoint/create-sharepoint-site-ownership-policy) that finds any sites that don't have at least two owners** ++A Site ownership policy automatically detects sites that don't have at least two owners and can help find potential owners. Set up the policy in simulation mode to identify owners based on your desired criteria. Then, upgrade the policy to Active mode to enable notifications to site owner candidates. ++You need site owners to help confirm the site is still active, perform [Site access review](/sharepoint/site-access-review#review-everyone-except-external-users-site-access-review-requests-for-site-owners), update content permissions, and control access when needed. ++1. Sign in to the [SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219) as a SharePoint administrator. +2. Expand **Policies** > select **Site lifecycle management**. +3. Select **Create a policy**, enter your parameters, and finish your policy. +4. When the policy runs, the report shows the number of sites that are noncompliant. You can also download the report. ++To learn more about this policy and report, see [Site ownership policy](/sharepoint/create-sharepoint-site-ownership-policy). ++### Find and cleanup inactive sites ++✅ **Create a [site lifecycle management policy](/sharepoint/site-lifecycle-management#create-an-inactive-site-policy) that finds inactive sites** ++A [site lifecycle management policy](/sharepoint/site-lifecycle-management#create-an-inactive-site-policy) automatically detects inactive sites and sends a notification email to the site owners. When you use the email, the site owners can confirm that the site is still active. ++Copilot can show data from these inactive sites in user prompts, which can lead to inaccurate and cluttered Copilot results. ++The policy also creates a report that you can download and review. The report shows the inactive sites, the last activity date, and the email notification status. ++1. Sign in to the [SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219) as a SharePoint administrator. +2. Expand **Policies** > select **Site lifecycle management**. +3. Select **Create a policy**, enter your parameters, and finish your policy. +4. When the policy runs and finds inactive sites, the policy automatically emails the site owners. The site owners should confirm if the site is still active. +5. If the site owners confirm the sites aren't needed, then put inactive sites in [read-only mode with SAM](/sharepoint/site-lifecycle-management#read-only-mode), or move the sites to [Microsoft 365 Archive with SAM](/microsoft-365/archive/archive-setup). ++To learn more about this policy and report, see [site lifecycle management policy](/sharepoint/site-lifecycle-management#create-an-inactive-site-policy). ++#### Best practices for managing inactive SharePoint sites ++- [**Use the policy execution report**](/sharepoint/site-lifecycle-management) to keep track on site owner action status in response to the notifications. +- Select the Get AI insights button to [**get AI insights**](/sharepoint/advanced-management#ai-insights) generated for the report to help you identify issues with the sites and possible actions to address these issues. +- **Give the site owners a timeline** to complete these tasks. If they don't complete the task within the timeframe, you can move the sites to [Microsoft 365 Archive](/microsoft-365/archive/archive-overview) using [SAM Inactive Sites - Archive capability](/sharepoint/site-lifecycle-management#create-an-inactive-site-policy) so that you can reactive them later if needed. ++This action helps reduce outdated content that clutters Copilot's data source, which improves the accuracy of Copilot responses. ++> [!TIP] +> Sites moved to Microsoft 365 Archive are no longer accessible by anyone in the organization outside of Microsoft Purview or admin search. Copilot won't include content from these sites when responding to user prompts. ++### Identify sites with overshared or sensitive content ++✅ **Run [Data access governance (DAG) reports](/SharePoint/data-access-governance-reports) in the SharePoint admin center** ++The [DAG reports](/SharePoint/data-access-governance-reports) give more detailed information about site sharing links, sensitivity labels, and the **`Everyone except external users`** (EEEU) permissions on your SharePoint sites. Use these reports to find overshared sites. ++Overshared sites are sites that are shared with more people than needed. Copilot can show data from these sites in responses. ++1. Sign in to the [SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219) as a SharePoint administrator. +2. Select **Reports** > **Data access governance**. Your report options: ++ | Report | Description | Task | + | | | | + | **Sharing links** | Shows the sites that have sharing links, including links shared with **Anyone**, shared with **People in your organization**, and shared with **Specific people** outside of your work or school. | Review these sites. <br/><br/>Make sure the sites are shared with only the users or groups that need access. Remove sharing for unneeded users and groups. | + | **Sensitivity labels applied to files** | Shows sites with Office files that have sensitivity labels. | Review these sites.<br/><br/> Make sure the correct labels are applied. Update the labels as needed. To learn more, see [Identify and label sensitive data](#identify-and-label-sensitive-data) (in this article). | + | **Shared with `Everyone except external users` (EEEU)** | Shows the sites that are shared with everyone in your organization except external users. | Review these sites. <br/><br/> Determine if EEEU permissions are appropriate. Many sites with EEEU are overshared. Remove the EEEU permission and assign to the users or groups as needed. | + |**Oversharing Baseline Report for Sites, OneDrives and Files**|Scans all sites in your tenant, and lists sites that share content with more than a specified number of users (you specify the number).|Sort, filter or download the report, and identify the sites with potentially overshared content.| ++You can run any of these reports individually or run all of them together. To learn more about these reports, see [Data access governance (DAG) reports](/sharepoint/data-access-governance-reports). ++#### Best practices for managing the DAG reports ++- **Run these reports weekly**, especially in the beginning stages of adopting Copilot. As you become more familiar with the reports and the data, you can adjust the frequency. ++ If you have an admin team, create an admin task to run these reports and review the data. ++ Your organization is paying for the license to run these reports and use the data to make decisions. Make sure you're getting the most out of it. ++- [**Select Get AI insights**](/sharepoint/advanced-management#ai-insights) to generate a report that helps you identify issues with the sites and possible actions to address these issues. ++### Control access to overshared SharePoint sites ++✅ **Initiate [Site access reviews](/sharepoint/site-access-review) for site owners** ++In a Data access governance (DAG) report, you can select sites with oversharing risks. Then, initiate site access reviews. Site Owners receive notification for each site that requires attention. They can use the Site reviews page to track and manage multiple review requests. ++The site owner reviews access in two main areas: SharePoint groups and individual items. They can determine if broad sharing is appropriate, or if a site is overshared and requires remediation. ++If the site owner determines that the content is overshared, they can use the Access Review dashboard to update permissions. ++✅ **Use [restricted access control policy (RAC)](/sharepoint/restricted-access-control) in the SharePoint admin center** ++A [restricted access control policy](/sharepoint/restricted-access-control) restricts access to a site with overshared content. It can restrict access to SharePoint sites and content to users in a specific group. Users not in the group can't access the site or its content, even if they previously had permissions or a shared link. ++When users in the group have permissions to the content, then that content can show in Copilot results. Users not in the group don't see this info in their Copilot results. You can set up restricted access control for individual sites or OneDrive. ++✅ **Use [restricted content discoverability policy (RCD)](/sharepoint/restricted-content-discovery) in the SharePoint admin center** ++A [restricted content discoverability policy (RCD)](/sharepoint/restricted-content-discovery) doesn't change the site access. Instead, it changes the site's content discoverability. When you apply RCD to a site, the site's content isn't discoverable by Copilot or organization-wide search results for all users. ++The SharePoint Admin can set restricted content discoverability on individual sites. ++#### Best practices for control access to overshared SharePoint sites ++- If your organization has a [Zero Trust](/security/zero-trust/copilots/zero-trust-microsoft-365-copilot) mindset, then you can apply restricted access control (RAC) to all sites. Then, adjust the permissions as needed. If you have many sites, this action can help you quickly secure your sites. But, it can cause disruptions to users. ++- If you use RAC or RCD, make sure you communicate the changes and the reasons for the changes. ++> [!TIP] +> For business-critical sites, you can also: +> +> - When you create new sites, configure a RAC or RCD policy as part of your custom site provisioning process. This step proactively avoids oversharing. +> - Consider blocking downloads from selected sites using a block download policy. For example, [block the download of Teams meeting recordings and transcripts](/microsoftteams/block-download-meeting-recording). +> - Apply encryption with "extract rights" enforced on business-critical office documents. To learn more, see [Microsoft Purview data security and compliance protections for generative AI apps](/purview/ai-microsoft-purview). ++### Monitor changes ++✅ **Run the [change history report](/sharepoint/change-history-report) in the SharePoint admin center** ++The [change history report](/sharepoint/change-history-report) tracks and monitor changes, including what changed, when the change happened, and who initiated the change. The intent is to identify recent changes that could lead to oversharing, which impacts Copilot results. ++Use this report to review the changes made to your SharePoint sites and organization settings. ++1. Sign in to the [SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219) as a SharePoint administrator. +2. Expand **Reports** > select **Change history** > **New report**. +3. Your report options: ++ | Report | Description | Task | + | | | | + | **Site settings report** | Shows the site property changes and actions ran by Site Administrators and SharePoint Administrators. | Review the changes and actions. Make sure the actions meet your security requirements. | + | **Organization settings report** | Shows changes made to organization settings, like when a site is created and if external sharing is enabled. | Review the changes and actions. Make sure the changes meet your security requirements. | ++#### Best practices for managing the change history reports ++- **Run these reports weekly**, especially in the beginning stages of adopting Copilot. As you become more familiar with the reports and the data, you can adjust the frequency. ++ If you have an admin team, create an admin task to run these reports and review the data. ++ Your organization is paying for the license to run these reports and use the data to make decisions. Make sure you're getting the most out of it. ++- Create a report for the **site level changes and the organization level changes**. The site level reports show changes made to the site properties and actions. The organization level reports show changes made to the organization settings. ++- **Review the sharing settings and access control settings**. Make sure the changes align with your security requirements. If they don't align, then work with the site owners to correct the settings. ++- **Apply [restricted access control (RAC)](/SharePoint/restricted-access-control)** to sites that appear to be overshared. Inform the site owners of the changes and why. ++ If your organization has a [Zero Trust](/security/zero-trust/copilots/zero-trust-microsoft-365-copilot) mindset, then you can apply RAC to all sites. Then, adjust the permissions as needed. If you have many sites, this action can help you quickly secure your sites. But, it can also cause disruptions to users. Make sure you communicate the changes and the reasons for the changes. |
manage-public-web-access | Manage Public Web Access | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/manage-public-web-access.md | This generated search query is different from the user’s original prompt—it - Any identifying information based on the user's Microsoft Entra ID (for example, username, domain, or tenant ID) -> [!NOTE] -> We’re making some improvements to web search query transparency in the near future. For more information, see -[Introducing web search query transparency for Microsoft 365 Copilot and Microsoft Copilot](https://techcommunity.microsoft.com/t5/microsoft-365-copilot/introducing-web-search-query-transparency-for-microsoft-365/ba-p/4253080). - When using Microsoft 365 Copilot, the generated search query doesn't include the entirety of Microsoft 365 documents associated with the prompt. However, it may also be informed by data within a Microsoft 365 document under the following conditions: - When a user enters a prompt into Copilot inside a Microsoft 365 application (for example, writing a prompt into Copilot in Microsoft Word while a relevant document is open). When a Microsoft 365 Copilot user submits their prompt with the **Web content** The user can see results from both. Additionally, if the results are from the web only, the user sees the same **From the web:** heading. +### Web search query citations ++> [!NOTE] +> This feature is rolling out to customers in the second half of November 2024. ++To provide greater visibility into the generated search queries, web search query citations are shown to users in the linked citation section of the Copilot response. The section shows the exact web search queries (derived from the user’s prompt) that were sent to the Bing search service. Showing the exact web search queries helps users understand what search queries, along with the sites searched, were used to enhance Copilot’s response to their prompt. This information can help users improve their prompts and use Copilot more effectively. ++Web search query citations are available only in Microsoft 365 Copilot Business Chat. Citations aren’t available in the Copilot pane within a Microsoft 365 app, such as Word or PowerPoint. Also, the web search queries are only available for 24 hours. ++### Web search query logging ++> [!NOTE] +> This feature is rolling out to customers in the second half of November 2024. ++Web search query logging is available so that admins can perform search, audit, and eDiscovery on the exact web search queries Copilot derived from the user's prompt. Admins can already perform these actions for prompts and responses and will be able to use their familiar tools to extend those actions to search queries. For more information, see [Audit log activities](/purview/audit-log-activities#copilot-activities), [Copilot interaction events overview](/office/office-365-management-api/copilot-schema), and [Search for and delete Copilot data in eDiscovery (preview)](/purview/edisc-search-copilot-data#identifying-web-queries-in-microsoft-365-copilot-usage). + ### Examples of generated search queries The following table provides multiple examples of a user's prompt and the generated search queries sent to Bing. It also explains how Microsoft 365 Copilot and Microsoft Copilot formulate a response. Brackets indicate placeholders for specific information referenced by the user or inferred by Copilot. Generated search queries sent to the Bing search service have the user and tenan - Answers or features like Rich Captions - Social features like Auto Suggest, Trending, and Zero Input -The Bing search service operates separately from Microsoft 365 and has different data-handling practices. The use of Bing is covered by the [Microsoft Services Agreement](https://www.microsoft.com/servicesagreement) between each user and Microsoft, together with the [Microsoft Privacy Statement](https://www.microsoft.com/privacy/privacystatement). The [Microsoft Products and Services Data Protection Addendum (DPA)](https://www.microsoft.com/licensing/docs/view/Microsoft-Products-and-Services-Data-Protection-Addendum-DPA) doesn't apply to the use of the **Web content** toggle in Microsoft 365 Copilot, Microsoft Copilot, or the Bing search service. +The Bing search service operates separately from Microsoft 365 and has different data-handling practices. The use of Bing is covered by the [Microsoft Services Agreement](https://www.microsoft.com/servicesagreement) between each user and Microsoft, together with the [Microsoft Privacy Statement](https://www.microsoft.com/privacy/privacystatement). The [Microsoft Products and Services Data Protection Addendum (DPA)](https://www.microsoft.com/licensing/docs/view/Microsoft-Products-and-Services-Data-Protection-Addendum-DPA) doesn't apply to the use of the **Web content** toggle in Microsoft 365 Copilot, Microsoft Copilot, or the Bing search service. ## Controls available to manage web search |
microsoft-365-copilot-ai-security | Microsoft 365 Copilot Ai Security | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-ai-security.md | +appliesto: + - ✅ Microsoft 365 Copilot # AI security for Microsoft 365 Copilot AI has revolutionized many sectors, providing unprecedented capabilities and efficiencies. For example, [Microsoft 365 Copilot](/office365/servicedescriptions/office-365-platform-service-description/microsoft-365-copilot), our AI-powered productivity tool, coordinates large language models (LLMs), content in Microsoft Graphs, and the Microsoft 365 productivity apps such as Word, Excel, PowerPoint, Outlook, Teams, SharePoint, and others. This integration provides real-time intelligent assistance, enabling users to enhance their creativity, productivity, and skills. -Customers are keen to explore these opportunities, and they’re thoughtfully considering the important aspects of security that come with them. Based on our interactions with customers who are on their AI transformation journey, we understand that topics such as data security, privacy, model robustness, and cyberattacks are top of mind. +Customers are keen to explore these opportunities, and they're thoughtfully considering the important aspects of security that come with them. Based on our interactions with customers who are on their AI transformation journey, we understand that topics such as data security, privacy, model robustness, and cyberattacks are top of mind. Microsoft understands how critical these considerations are, which is why we employ a robust defense-in-depth strategy to help protect productivity tools like Microsoft 365 Copilot against security risks. This multi-layered approach involves a combination of advanced threat intelligence, rigorous security practices, and proactive safeguards. For example, in addition to our own red-teaming exercises to test Microsoft 365 Copilot, we engaged Casaba Security to test nine Copilot implementations across the Microsoft 365 product suite. We promptly addressed and resolved the findings of [their testing](https://servicetrust.microsoft.com/DocumentPage/67d59873-b315-4768-a057-8583cd84680a), which focused on identifying Open Worldwide Application Security Project's (OWASP) top 10 for LLM as well as traditional security vulnerabilities in supporting application infrastructure. Microsoft takes extensive steps to ensure that Microsoft 365 Copilot is compliant with our existing privacy, security, and compliance commitments to our customers. And as AI technologies and use cases continue to evolve, our work is never done: Microsoft is committed to continuously advancing protections for Copilot, learning from our own monitoring and testing of our systems, as well as working with customers, partners, and the broader security industry. -This article provides an overview of Microsoft’s overall security posture for AI, and how different Microsoft security solutions work together to help secure your data and interactions in Microsoft 365 Copilot and other AI applications. We will update this article with new information about emerging risks and innovations in solutions as they become available. +This article provides an overview of Microsoft's overall security posture for AI, and how different Microsoft security solutions work together to help secure your data and interactions in Microsoft 365 Copilot and other AI applications. We will update this article with new information about emerging risks and innovations in solutions as they become available. ## Securing Microsoft 365 Copilot Our comprehensive security posture for AI has the following pillars: - **Security development lifecycle (SDL)**: Our rigorous SDL integrates security considerations throughout the entire AI development process. This proactive approach ensures vulnerabilities are identified and mitigated from the very beginning. - **Threat research, detection, and mitigation**: We actively invest in strategies to detect and mitigate threats to our AI models. This includes ongoing vulnerability monitoring and developing countermeasures against potential attacks. Microsoft Threat Intelligence, our global network of researchers, also monitors the [threat landscape](https://www.microsoft.com/security/blog/threat-intelligence/ai-threats/) for threat actors and cyberattacks that might take advantage of AI applications. -Microsoft safeguards privacy, security, and reliability for Microsoft 365 Copilot’s AI features, from the user input stage through the system output stage. Microsoft 365 Copilot is compliant with our existing [privacy, security, and compliance commitments](microsoft-365-copilot-privacy.md), including the General Data Protection Regulation (GDPR) and European Union (EU) Data Boundary. In keeping with these commitments, Microsoft handles the information in any prompts entered using Copilot, and the retrieved data and generated responses remain secured as Customer Data and subject to our contractual data handling requirements. +Microsoft safeguards privacy, security, and reliability for Microsoft 365 Copilot's AI features, from the user input stage through the system output stage. Microsoft 365 Copilot is compliant with our existing [privacy, security, and compliance commitments](microsoft-365-copilot-privacy.md), including the General Data Protection Regulation (GDPR) and European Union (EU) Data Boundary. In keeping with these commitments, Microsoft handles the information in any prompts entered using Copilot, and the retrieved data and generated responses remain secured as Customer Data and subject to our contractual data handling requirements. The following sections cover how Microsoft addresses various aspects of privacy, security, and compliance that are important customer considerations for adopting Microsoft 365 Copilot. ### Access control and permissions management -Microsoft 365 Copilot accesses resources on behalf of the user, so it can only access resources the user already has permission to access. If the user doesn’t have access to a document for example, then Microsoft 365 Copilot working on the user’s behalf will also not have access either. +Microsoft 365 Copilot accesses resources on behalf of the user, so it can only access resources the user already has permission to access. If the user doesn't have access to a document for example, then Microsoft 365 Copilot working on the user's behalf will also not have access either. The data that it uses to generate responses is processed by Microsoft pursuant to contractual data handling requirements, including being encrypted in transit, helping safeguard privacy and prevent data leakage. In addition, Microsoft 365 data, including data from Microsoft Graph and SharePoint, adheres to access control and auditing mechanisms. Microsoft 365 Copilot inherits data loss prevention (DLP) policies to prevent da ### Protecting data during model training -Microsoft 365 Copilot uses pretrained LLM models hosted by Microsoft; it doesn’t use Customer Data to train these models. In addition, prompt and grounding data isn’t used to train AI models and is never shared with OpenAI or other third parties. +Microsoft 365 Copilot uses pretrained LLM models hosted by Microsoft; it doesn't use Customer Data to train these models. In addition, prompt and grounding data isn't used to train AI models and is never shared with OpenAI or other third parties. ### Honoring data residency requirements There are [new tools in Azure AI](https://azure.microsoft.com/blog/announcing-ne ### Protecting copyright and intellectual property -Microsoft has built-in protections against the generation of protected content, which includes the industry’s first [Customer Copyright Commitment](https://blogs.microsoft.com/on-the-issues/2023/09/07/copilot-copyright-commitment-ai-legal-concerns/) program to defend customers and compensate for any adverse judgments, in the event of a copyright infringement lawsuit. +Microsoft has built-in protections against the generation of protected content, which includes the industry's first [Customer Copyright Commitment](https://blogs.microsoft.com/on-the-issues/2023/09/07/copilot-copyright-commitment-ai-legal-concerns/) program to defend customers and compensate for any adverse judgments, in the event of a copyright infringement lawsuit. ### Meeting regulatory requirements Microsoft 365 Copilot meets regulatory requirements for eDiscovery, audit loggin - Audit logging: Audit logs generated by Microsoft 365 Copilot can be retained for up to 180 days for Audit (Standard) customers and up to one year for Audit (Premium) license holders, with the option to extend up to 10 years. -- Compliance with Microsoft Purview: Microsoft Purview provides data security and compliance protections for generative AI apps like Copilot. The Microsoft Purview AI Hub, currently in preview, provides easy-to-use graphical tools and reports to quickly gain insights into AI use within the organization. One-click policies help [protect data and comply with regulatory requirements](/purview/ai-microsoft-purview). +- Compliance with Microsoft Purview: Microsoft Purview provides data security and compliance protections for generative AI apps like Copilot. The Microsoft Purview Data Security Posture Management for AI, currently in preview, provides easy-to-use graphical tools and reports to quickly gain insights into AI use within the organization. One-click policies help [protect data and comply with regulatory requirements](/purview/ai-microsoft-purview). - Admin controls: Admins can use Microsoft Purview to view and manage stored data, set retention policies, and perform eDiscovery searches. Both admin and user-initiated deletion options are available via Purview. Microsoft 365 Copilot meets regulatory requirements for eDiscovery, audit loggin ### Are the results of Microsoft 365 Copilot reliable? -While Microsoft safeguards provide strong threat mitigation against misinformation and compromise, as with any AI application, Microsoft 365 Copilot’s responses might not always be accurate. You should still apply human judgment to check these responses. +While Microsoft safeguards provide strong threat mitigation against misinformation and compromise, as with any AI application, Microsoft 365 Copilot's responses might not always be accurate. You should still apply human judgment to check these responses. ### How does Microsoft treat my prompts and responses? The third-party vulnerability assessment of Microsoft 365 Copilot can be downloa Microsoft has released Python Risk Identification Toolkit for generative AI ([PyRIT](https://github.com/Azure/PyRIT)), an open access automation framework that aims to empower security professionals and machine learning engineers to proactively [find risks](https://www.microsoft.com/security/blog/2024/02/22/announcing-microsofts-open-automation-framework-to-red-team-generative-ai-systems/) in their own generative AI systems. -### Does Microsoft 365 Copilot have access to data I don’t have when grounding content? +### Does Microsoft 365 Copilot have access to data I don't have when grounding content? Microsoft 365 Copilot accesses resources on behalf of the user, so it can only access resources you already have permission to access. The following steps can help administrators control user access and therefore li - [Use Microsoft SharePoint Premium - SharePoint Advanced Management](/sharepoint/advanced-management), which offers reports and tools to analyze and manage overly permissive access-control lists and sharing links across the environment. - [Review information protection considerations](/purview/ai-microsoft-purview-considerations#information-protection-considerations-for-copilot) for Copilot. Microsoft 365 Copilot honors EXTRACT permissions and automatically [inherits sensitivity labels](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-purview-service-description#microsoft-purview-information-protection-sensitivity-labeling) from referenced content to Copilot-generated responses and files. - [Apply sensitivity labels](https://support.microsoft.com/office/apply-sensitivity-labels-to-your-files-and-email-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9) to your Microsoft 365 files and email. For Microsoft Purview customers, administrators can [create and configure sensitivity labels](/purview/create-sensitivity-labels) that they want to make available for apps and other services.-- [Use Microsoft Purview AI Hub](/purview/ai-microsoft-purview) (currently in preview) to discover sensitive data shared with Copilot, see files referenced in Copilot responses, and discover unlabeled files referenced by Copilot and associated SharePoint sites, thereby letting you identify and protect files at risk of overexposure.+- [Use Microsoft Purview Data Security Posture Management for AI](/purview/ai-microsoft-purview) (currently in preview) to discover sensitive data shared with Copilot, see files referenced in Copilot responses, and discover unlabeled files referenced by Copilot and associated SharePoint sites, thereby letting you identify and protect files at risk of overexposure. - Set up policies that remove old and unused data and limit data sprawl due to data oversharing with [Microsoft Purview Data Lifecycle Management](/purview/data-lifecycle-management). ### How can I use Microsoft security solutions to protect data and AI application interactions? Our comprehensive security solutions—including Microsoft Defender, Entra,  - **Govern AI use responsibly** by retaining and logging interactions, detecting policy violations, and investigating incidents -For example, we recently introduced new Microsoft Defender and Purview capabilities that provide purpose-built tools for robust security and governance of generative AI applications and their data. In addition, the seamless integration of [Microsoft Copilot for Security](/copilot/security/microsoft-security-copilot) across our products streamlines the overall process and experience for security analysts. By prioritizing security and offering these advanced features, Microsoft empowers organizations to confidently apply the benefits and opportunities AI applications provide. +For example, we recently introduced new Microsoft Defender and Purview capabilities that provide purpose-built tools for robust security and governance of generative AI applications and their data. In addition, the seamless integration of [Microsoft Security Copilot](/copilot/security/microsoft-security-copilot) across our products streamlines the overall process and experience for security analysts. By prioritizing security and offering these advanced features, Microsoft empowers organizations to confidently apply the benefits and opportunities AI applications provide. ### Where should I report vulnerabilities in Microsoft 365 Copilot and other AI applications? -If you discover new vulnerabilities in any AI platform, we encourage you to follow responsible disclosure practices for the platform owner. Microsoft’s own procedure (for Copilot) is explained in this page: [Microsoft AI Bounty Program](https://www.microsoft.com/msrc/bounty-ai). +If you discover new vulnerabilities in any AI platform, we encourage you to follow responsible disclosure practices for the platform owner. Microsoft's own procedure (for Copilot) is explained in this page: [Microsoft AI Bounty Program](https://www.microsoft.com/msrc/bounty-ai). |
microsoft-365-copilot-architecture-data-protection-auditing | Microsoft 365 Copilot Architecture Data Protection Auditing | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-architecture-data-protection-auditing.md | + + Title: Microsoft 365 Copilot data protection and auditing architecture +f1.keywords: +- NOCSH +++ Last updated : 11/19/2024+audience: Admin ++++ms.localizationpriority: medium ++- scotvorg +- m365copilot +- magic-ai-copilot +- essentials-overview +description: Learn how data protection and auditing work with Microsoft 365 Copilot. Learn more about sensitivity labels in Microsoft Purview, oversharing controls in SharePoint, and auditing tools that affect eDiscovery and retention policies. ++appliesto: + - ✅ Microsoft 365 Copilot +++# Microsoft 365 Copilot data protection and auditing architecture ++[Microsoft 365 Copilot](microsoft-365-copilot-overview.md) honors your security & data protection controls, and includes tools for auditing usage data. This article describes and illustrates: ++- How Copilot works with Microsoft Purview sensitivity labels. +- The controls you can use to prevent oversharing data in SharePoint sites and OneDrive. +- Where Copilot usage data is stored and how you can discover, audit, and retain this data. ++This article applies to: ++- Microsoft 365 Copilot ++## How Microsoft 365 Copilot works with sensitivity labels and encryption ++Copilot works together with your Microsoft Purview sensitivity labels and encryption to provide an extra layer of protection. ++The following diagram provides a visual representation of how Copilot honors your information protection controls using sensitivity labels and encryption. +++Let's take a look: ++- You open a file in a [supported Office app](/purview/sensitivity-labels-office-apps). When the file opens, the sensitivity label name and content markings that are configured for the label are shown. ++ - When the sensitivity label applies encryption, the user must have the EXTRACT and VIEW usage rights for Copilot to summarize the data. ++ - Items encrypted by the [Azure Rights Management](/azure/information-protection/office-apps-services-support) service without a sensitivity label still require EXTRACT or VIEW usage rights for the user for Copilot to summarize the data. ++- In a prompt session with Copilot (called [Business Chat](https://support.microsoft.com/topic/get-started-with-microsoft-365-copilot-business-chat-5b00a52d-7296-48ee-b938-b95b7209f737)), the labels are displayed for data that is returned. The current response shows the label with the highest priority. +- When you use Copilot to create new content based on items that have a sensitivity label, the new content automatically inherits the sensitivity label with the highest priority and that label's protection settings. ++- Protection extends to data stored outside of your Microsoft 365 tenant when the file is opened in an Office app. ++ For example, there's a file with a sensitivity label saved outside of your Microsoft 365 tenant, like on a user's personal device, a network share, or in cloud storage. When this file is opened in an Office app, the protection settings go with the file. ++To learn more, see: ++- [Get started with sensitivity labels](/purview/get-started-with-sensitivity-labels) +- [Microsoft Purview strengthens information protection for Copilot](/purview/ai-microsoft-purview#microsoft-purview-strengthens-information-protection-for-copilot) ++## Oversharing controls you can use with Microsoft 365 Copilot ++Microsoft 365 includes controls to help you prevent oversharing data through Copilot. ++The following diagram provides a visual representation of some of the features in your Microsoft 365 E3+ and SharePoint Advanced Management licenses that help you prevent oversharing. +++Let's take a look: ++1. [Restricted SharePoint Search](/sharepoint/restricted-sharepoint-search) allows you to limit organization-wide search and Copilot experiences to selected SharePoint sites. By default, this setting is off and the [allowed list](/sharepoint/restricted-sharepoint-search-allowed-list) is empty. It serves as a temporary solution to review and apply proper permission settings to your sites. ++2. SharePoint includes more built-in controls: ++ - Use **Specific people links** instead of organization-wide sharing by default. + - Hide broad scoped permissions from users, like the **Everyone Except External Users** claim. + - Site admins can use site level controls to restrict member sharing, and ensure **Site Owners** handle access requests. ++3. In SharePoint Advanced Management, use **[data access governance reports](/SharePoint/data-access-governance-reports)** to identify sites that contain potentially overshared or sensitive content. ++4. With **[Restricted Content Discovery](/sharepoint/restricted-content-discovery)**, organizations can put a flag on sites so that users can't find them through Copilot or Org-wide search. Restricted content discovery doesn't change users' existing permissions. Users with access can still visit sites and open files. ++5. In SharePoint Advanced Management, create an **[inactive site policy](/sharepoint/site-lifecycle-management#create-an-inactive-site-policy)** to automatically manage and reduce inactive sites. ++6. In SharePoint Advanced Management, you can restrict access to SharePoint and OneDrive sites to users in a specific group by using the **[restricted access control policy](/sharepoint/restricted-access-control)**. Users that aren't members of the specified group can't access the site or content, even if they had prior permissions or a shared link. This policy can be used with Microsoft 365 Group-connected, Teams-connected, and non-group connected sites. ++ To learn more, see: ++ - [SharePoint restricted access control policy](/sharepoint/restricted-access-control) + - [OneDrive restricted access control policy](/sharepoint/onedrive-site-access-restriction) ++7. Microsoft Purview includes capabilities to limit oversharing: ++ - Use [Microsoft Purview sensitivity labels](/purview/sensitivity-labels) that apply encryption to restrict which files Copilot can access. The user must have the EXTRACT and VIEW usage rights for Copilot to summarize the data. ++ - Use [Data Loss Prevention (DLP) for Microsoft 365 Copilot](/purview/dlp-microsoft365-copilot-location-learn-about) to prevent Copilot from accessing content that has specific sensitivity labels applied. ++## Where Copilot usage data is stored and how you can audit it ++Copilot usage data is stored in several places. You can use the tools provided with Microsoft 365 E5 to discover, audit, and apply retention policies. ++The following diagram provides a visual representation of the different features in your Microsoft 365 E5 license that help you search and audit Copilot data. +++Let's take a look: ++1. Use [Microsoft Purview audit logs](/purview/audit-solutions-overview) to identify how, when, and where Copilot interactions occurred and which items were accessed, including any sensitivity labels on those items. ++2. Use [Microsoft Purview eDiscovery](/purview/edisc) to search for keywords in Copilot prompts and responses that might be inappropriate. You can also include this info in an eDiscovery case to review, export, or put this data on hold for an ongoing legal investigation. ++3. Use [Microsoft Purview Communication Compliance](/purview/communication-compliance) to detect and alert inappropriate or risky Copilot prompts and responses, like personal data or highly confidential information. ++4. Use [Microsoft Purview retention policies](/purview/retention) to keep a copy of deleted Copilot conversations so they're available to eDiscovery. ++ Or, if you have a compliance requirement to delete data after a specific period of time, use retention policies to automatically delete Copilot prompts and responses. ++5. During a Copilot prompt and response session (called interactions), Copilot can provide links to the source files. These embedded links are called **[cloud attachments](/purview/retention-policies-sharepoint#how-retention-works-with-cloud-attachments)**. ++ When a retention label is automatically applied, the specific version of the cloud attachments used in the interaction is retained. The version is kept even if the original file is edited or deleted from SharePoint or OneDrive. ++ This original or deleted version of the file is stored in the **[Preservation Hold Library](/purview/retention-policies-sharepoint#how-retention-works-for-sharepoint-and-onedrive)** in SharePoint or OneDrive. It remains accessible to eDiscovery searches. ++6. In a Copilot interaction, users can upload local files. These uploaded files are automatically stored in the **Microsoft Copilot Chat Files folder** in the user's OneDrive. ++ As with other files in OneDrive, Copilot-related files are accessible for eDiscovery searches and can be automatically retained or deleted with a retention policy. ++7. Content created by **[Copilot Pages](https://techcommunity.microsoft.com/blog/microsoft365copilotblog/copilot-pages-for-it-adminssep-2024-update/4241521)** is stored in a **user-owned SharePoint Embedded container** (one per user). As with other files in SharePoint, this Copilot-related content is accessible for eDiscovery searches and can be automatically retained or deleted with a retention policy. ++To learn more, see [Learn about retention for Copilot](/purview/retention-policies-copilot). ++## Related content ++- [Microsoft 365 Copilot architecture and how it works](microsoft-365-copilot-license-feature-overview.md) +- [Read about Data, Privacy, and Security for Microsoft 365 Copilot](microsoft-365-copilot-privacy.md) +- [Microsoft 365 license feature comparison list for Microsoft 365 Copilot](microsoft-365-copilot-license-feature-overview.md) |
microsoft-365-copilot-architecture | Microsoft 365 Copilot Architecture | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-architecture.md | + + Title: How does Microsoft 365 Copilot work? +f1.keywords: +- NOCSH +++ Last updated : 11/19/2024+audience: Admin ++++ms.localizationpriority: medium ++- scotvorg +- m365copilot +- magic-ai-copilot +- essentials-overview +description: Learn how Microsoft 365 Copilot works within the service boundary of your Microsoft 365 tenant. And, how it uses Microsoft Graph to get your organization data based on user permissions. Copilot also honors Conditional Access and multifactor authentication (MFA). ++appliesto: + - ✅ Microsoft 365 Copilot +++# Microsoft 365 Copilot architecture and how it works ++When you create a Microsoft 365 subscription, a tenant is automatically created for your organization. Your tenant sits inside the **Microsoft 365 service boundary**, where [Microsoft 365 Copilot](microsoft-365-copilot-overview.md) can access your organization's data. ++This data includes information that the user can access, including their activities, and the content they create & interact with in Microsoft 365 apps. +++Copilot is a shared service, just like many other services in Microsoft 365. When using Copilot in your tenant: ++- Your customer data stays within the Microsoft 365 service boundary. +- Your data is secured based on existing security, compliance, and privacy policies already deployed by your organization. ++This article describes how Microsoft 365 Copilot works, including the data flow in a user prompt, how Copilot access data, and how Copilot honors Conditional Access and multifactor authentication (MFA). ++This article applies to: ++- Microsoft 365 Copilot ++## User prompts and Copilot responses ++When users open a Microsoft 365 app, like Word or PowerPoint, they can use Copilot to get real-time data. ++The following diagram provides a visual representation of how a Copilot prompt works. +++Let's take a look: ++1. In a Microsoft 365 app, a user enters a prompt in Copilot. ++2. Copilot preprocesses the input prompt using **grounding** and accesses Microsoft Graph in the user's tenant. ++ - Grounding improves the specificity of your prompt, and helps you get answers that are relevant and actionable to your specific task. The prompt can include text from input files or other content Copilot discovers. ++ - The data Copilot uses to generate responses is encrypted in transit. ++3. Copilot sends the grounded prompt to the LLM. The LLM uses the prompt to generate a response that is contextually relevant to the user's task. ++4. Copilot returns the response to the app and the user. ++## User access and data privacy ++Copilot only accesses data that an individual user is authorized to access, based on, for example, existing Microsoft 365 role-based access controls. Copilot doesn't access data that the user doesn't have permission to access. ++The following diagram provides a visual representation of how Copilot and user access work together. +++Let's take a look: ++- On devices, users open an app and enter a prompt in Copilot. ++- Copilot uses [Microsoft Graph](/graph/overview) to access user data that's in the user's unique context. This user data includes emails, chats, and documents that the user has permission to access. ++ There are Microsoft 365 services that help control access and security to your organization's data. These services include Restricted SharePoint Search (RSS), SharePoint Advanced Management (SAM), and Microsoft Purview. To learn more, see [Microsoft 365 E3 and E5 feature comparison list for Microsoft 365 Copilot](microsoft-365-copilot-license-feature-overview.md). ++- Copilot can't access data that the user doesn't have permission to access. In the diagram, the grayed-out data represents data that Copilot can't access. ++- When a user enters a prompt and Copilot responds, this **interaction** is stored in the user's Copilot chat history. Users can review and reuse their previous prompts. They can also [delete their chat history](https://support.microsoft.com/office/delete-your-microsoft-365-copilot-activity-history-76de8afa-5eaf-43b0-bda8-0076d6e0390f). ++To learn more, see [Data stored about user interactions with Microsoft 365 Copilot](microsoft-365-copilot-privacy.md#data-stored-about-user-interactions-with-microsoft-365-copilot) ++## Copilot honors Conditional Access and MFA ++Copilot honors Conditional Access policies and multifactor authentication (MFA). +++This means: ++- If you [enable and configure Conditional Access policies](/entra/identity/conditional-access/plan-conditional-access), make sure your users are allowed to access Microsoft 365 services. You can manage access based on conditions you configure, including enforcing device compliance policies you set. To learn more, see [Protect AI with Conditional Access policy](/entra/identity/conditional-access/policy-all-users-copilot-ai-security). ++ If you use Microsoft Intune, then you can use Intune compliance policies and Conditional Access together. To learn more, see [Use compliance policies to set rules for devices you manage with Intune](/mem/intune/protect/device-compliance-get-started). ++- Copilot uses the same MFA features you configure for your tenant. With MFA, like all Microsoft 365 services, users must provide multiple forms of verification before they're allowed to access Copilot. ++ If your tenant is using [security defaults](/microsoft-365/solutions/empower-people-to-work-remotely-secure-sign-in), then MFA is enabled by default. If MFA isn't enabled, then Microsoft recommends [enabling MFA](/entra/identity/authentication/tutorial-enable-azure-mfa). ++## Related content ++- [Microsoft 365 Copilot data protection and auditing architecture](microsoft-365-copilot-architecture-data-protection-auditing.md) +- [Setup and deploy Microsoft 365 Copilot](microsoft-365-copilot-setup.md) +- [Read about Data, Privacy, and Security for Microsoft 365 Copilot](microsoft-365-copilot-privacy.md) |
microsoft-365-copilot-blueprint-oversharing | Microsoft 365 Copilot Blueprint Oversharing | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-blueprint-oversharing.md | + + Title: Microsoft 365 Copilot blueprint for oversharing +description: Use this deployment blueprint to help prevent oversharing when using Microsoft 365 Copilot. +f1.keywords: +- NOCSH +++ Last updated : 11/19/2024++audience: Admin +++ms.localizationpriority: medium ++- scotvorg +- m365copilot +- magic-ai-copilot +- essentials-overview ++appliesto: + - ✅ Microsoft 365 Copilot +++# Address internal oversharing concerns in Microsoft 365 Copilot deployment blueprint ++[Microsoft 365 Copilot](microsoft-365-copilot-overview.md) works with different Microsoft services to help you get your data ready for Copilot. ++For Copilot administrators, it can be overwhelming to know where to start. Existing administrators can also be unfamiliar with how some features can enhance their data security. ++To address the need for shorter, actionable, and prescriptive guidance, you can use this deployment blueprint. ++In this deployment blueprint, we provide a recommended approach to address internal oversharing concerns throughout a Microsoft 365 Copilot deployment. ++The blueprint breaks the deployment into three phases: ++- Pilot +- Deploy +- Operate ++The blueprint provides: ++- An overview of the most common causes of internal oversharing in Microsoft SharePoint +- A recommended, staged approach to avoid oversharing in a Microsoft 365 Copilot deployment +- Recommended actions specific to E3 or E5 licenses at each stage +- Detailed guidance for using the tools in the SharePoint Admin Center, SharePoint Advanced Management (SAM), and Microsoft Purview to identify and mitigate oversharing and ongoing governance concerns. +++## Phase 1 - Pilot ++The initial stage provides steps for customers to quickly enable a Microsoft 365 Copilot pilot. ++During this stage, you generate reports to identify the most frequently used and potentially overshared sites. Based on these insights, you decide to allow or restrict SharePoint sites from being accessed and searched by Copilot during testing. ++The primary goal is to begin the Copilot deployment with a limited group of users. And later, expand iteratively based on the generated reports and learnings. ++## Phase 2 - Deploy ++The second stage, Deploy at scale, helps customers in fully deploying Copilot across the entire organization. ++This stage focuses on identifying oversharing risks and restricting Copilot's access to and processing of sensitive information. ++During this stage, the overall data security posture is improved by ensuring organizational controls are set to avoid unintentional oversharing and to increase visibility into potential security gaps. ++## Phase 3 - Operate ++The third stage aims to mitigate risks and streamline oversight by regularly generating oversharing reports and implementing corrective actions. ++It also focuses on: ++- Enhancing the security of sensitive data through automatic labeling +- Improving Copilot responses by reducing data volume and minimizing the potential for oversharing ++## Download the blueprint and documentation ++| Deployment model | Description | +||| +|**Address oversharing in Microsoft 365 Copilot**<br/><br/> [![Address internal oversharing concerns in Microsoft 365 Copilot](media/microsoft-365-copilot-blueprint-oversharing/blueprint-oversharing-copilot-thumbprint.png)](https://aka.ms/Copilot/OversharingBlueprintPDF) <br/> Updated November 2024 | Use this deployment model to assist organizations in identifying and mitigating internal oversharing risks. <br/><br/>**This model includes**<br/><ul><li>Blueprint with high level activities and presentation [PDF](https://aka.ms/Copilot/OversharingBlueprintPDF) \| [PowerPoint](https://aka.ms/Copilot/OversharingBlueprintPPT)</li></ul> | ++### Documentation resources ++- [E3 customers – prepare your data for Copilot](microsoft-365-copilot-e3-guide.md) ++ Learn how to use the features included in your E3 license to prepare your data for Microsoft 365 Copilot. ++- [E5 customers – prepare your data for Copilot](microsoft-365-copilot-e5-guide.md) ++ Learn how to use the features included in your E5 license to prepare your data for Microsoft 365 Copilot. ++## Related content ++- [Microsoft Purview blueprint: Secure by default](/purview/deploymentmodels/depmod-securebydefault-intro) |
microsoft-365-copilot-e3-guide | Microsoft 365 Copilot E3 Guide | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-e3-guide.md | + + Title: Get your data ready for Microsoft 365 Copilot with E3 license +description: The E3 deployment for Microsoft 365 Copilot uses a E3 license, SharePoint Advanced Management, and Microsoft Purview. These services help your organization get ready for Copilot. This IT admin guide helps you prevent oversharing, declutter data sources, and monitor site changes. Get your organization and data ready for Copilot by following the steps in this article. +f1.keywords: +- NOCSH +++ Last updated : 11/19/2024++audience: Admin +++ms.localizationpriority: medium ++- scotvorg +- m365copilot +- magic-ai-copilot +- essentials-overview ++appliesto: + - ✅ Microsoft 365 Copilot +++# Microsoft 365 Copilot admin guide for E3 licenses ++When you're preparing your organization for [Microsoft 365 Copilot](microsoft-365-copilot-overview.md) or you're ready to start using Copilot, there are features in your E3 license that can help get your data ready. ++When users enter a prompt, Copilot can respond with data that the user has permission to access. Overshared and outdated data can lead to inaccurate results from Copilot. ++This article provides guidance for IT admins with **Microsoft 365 E3** and **SharePoint Advanced Management (SAM)** licenses. With the features included in these licenses, you: ++- Use SharePoint Advanced Management (SAM) to help prevent oversharing, declutter data sources, restrict SharePoint searches, and monitor SharePoint site changes. +- Use Microsoft Purview to create sensitivity labels, identify and protect sensitive data, and delete the content you don't need. ++When you use the features described in this article, your organization is better prepared for Copilot, including getting more accurate results from Copilot. ++This article applies to: ++- Microsoft 365 Copilot +- Microsoft SharePoint Premium - SharePoint Advanced Management (SAM) +- Microsoft Purview ++> [!NOTE] +> If you have an E5 license, then see [Microsoft 365 Copilot admin guide for E5 licenses](microsoft-365-copilot-e5-guide.md). For a comparison of the features in the licenses, see [Compare Microsoft 365 Copilot license feature overview](microsoft-365-copilot-license-feature-overview.md). ++## Before you begin ++- Microsoft recommends you also follow the steps in [Microsoft 365 Copilot - best practices with SharePoint](/sharepoint/sharepoint-copilot-best-practices). It helps you optimize your search in SharePoint, update sharing settings in SharePoint & OneDrive, and check permissions & site access on your SharePoint sites. ++- The following licenses are required to use the features in this article: ++ - **[Microsoft 365 E3](https://www.microsoft.com/microsoft-365/enterprise/e3)** or **[Office 365 E3](https://www.microsoft.com/microsoft-365/enterprise/office-365-e3)** ++ - **[Microsoft Purview](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-purview-service-description)** - Included with your E3 license ++ For a list of the features and services you get with your license, see [Microsoft 365, Office 365, Enterprise Mobility + Security, and Windows 11 Subscriptions](https://aka.ms/M365EnterprisePlans). ++ - **[Microsoft SharePoint Premium - SharePoint Advanced Management](/sharepoint/advanced-management#licensing)** ++ There are some features in SharePoint Advanced Management (SAM) that are included with your Microsoft 365 Copilot license. To get the full version of SAM and use all the features described in this article, you need the [Microsoft SharePoint Premium - SharePoint Advanced Management](/sharepoint/advanced-management#licensing) license. ++ - **[Microsoft 365 Copilot](microsoft-365-copilot-licensing.md)** ++ Depending on your subscription plan, you might be able purchase Microsoft 365 Copilot licenses through the [Microsoft 365 admin center](https://admin.microsoft.com) (**Billing** > **Purchase services**), Microsoft partners, or your Microsoft account team. ++ Microsoft 365 Copilot licenses are also available as an add-on to other licensing plans. To learn more, see [Understand licensing for Microsoft 365 Copilot](microsoft-365-copilot-licensing.md). ++- This article uses the following admin centers. These admin centers require a specific role to complete the tasks in the article. ++ - **[SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219)**: Sign in as the [SharePoint administrator](/sharepoint/sharepoint-admin-role). + - **[Microsoft Purview portal](https://purview.microsoft.com)**: There are different roles, depending on the task you need to complete. To learn more, see: ++ - [Permissions required to create and manage sensitivity labels](/purview/get-started-with-sensitivity-labels#permissions-required-to-create-and-manage-sensitivity-labels) + - [Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview](/defender-office-365/scc-permissions) ++## Step 1 - Use SharePoint Advanced Management (SAM) features +++## Step 2 - Restrict SharePoint Search (RSS) ++✅ **Copilot goal: Expand the RSS allowed list** ++As you get ready for Copilot, you review and configure the correct permissions on your SharePoint sites. The next step is to enable Restricted SharePoint Search (RSS). ++RSS is a temporary solution that gives you time to review and configure the correct permissions on your SharePoint sites. You add the reviewed & corrected sites to an allowed list. ++- If you enabled RSS, then add more sites to the allowed list. You can add up to 100 sites to the allowed list. Copilot can show data from the allowed list sites in user prompts. ++To learn more, see: ++- [Restricted SharePoint Search](/sharepoint/restricted-sharepoint-search) +- [Curate the allowed list for Restricted SharePoint Search](/sharepoint/restricted-sharepoint-search-allowed-list) +- [Blog - Introducing Restricted SharePoint Search to help you get started with Microsoft 365 Copilot](https://techcommunity.microsoft.com/t5/microsoft-365-copilot/introducing-restricted-sharepoint-search-to-help-you-get-started/ba-p/4071060) ++### Add sites to the RSS allowed list ++1. Get a list of the sites that you want to add to the allowed list. ++ - **Option 1 - Use the Sharing links report** ++ 1. Sign in to the [SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219) as a SharePoint administrator. + 1. Select **Reports** > **Data access governance** > **Sharing links** > **View reports**. + 1. Select one of the reports, like **"Anyone" links**. This report shows a list of sites with the highest number of **Anyone** links created. These links let anyone access files and folders without signing in. These sites are candidates to allow in tenant/org wide search. ++ - **Option 2 - Use the sort and filter options for Active sites** ++ 1. Sign in to the [SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219) as a SharePoint administrator. + 1. Select **Sites** > **Active sites**. + 1. Use the sort and filter options to find the most active site, including page views. These sites are candidates to allow in a tenant/organization wide search. ++ :::image type="content" source="media/microsoft-365-copilot-e3-guide/sharepoint-active-sites-filter.png" alt-text="In SharePoint admin center, select active sites and then use the All sites filter."::: ++2. Use the `Add-SPOTenantRestrictedSearchAllowedList` PowerShell cmdlet to add the sites to the allowed list. ++ To learn more about this cmdlet, see [Use PowerShell Scripts for Restricted SharePoint Search](/sharepoint/restricted-sharepoint-search-admin-scripts). ++## Step 3 - Use Microsoft Purview ++There are features in Microsoft Purview that can help you get ready for Copilot. ++✅ **Copilot goals with Purview**: ++- Identify and label sensitive data in your Microsoft 365 and Office files. +- Detect and protect sensitive information from unauthorized sharing or leakage. +- Delete the content you don't need. +- Review and analyze Copilot prompts and responses. ++To learn more about Microsoft Purview, see [Microsoft 365 Copilot in Microsoft Purview Overview](/purview/copilot-in-purview-overview). ++### Identify and label sensitive data +++This section walks you through the steps to create and use sensitivity labels in Microsoft Purview. You create your own label names and configurations. To learn more about sensitivity labels, see: ++- [Get started with sensitivity labels](/purview/get-started-with-sensitivity-labels) +- [Microsoft Purview strengthens information protection for Copilot](/purview/ai-microsoft-purview#microsoft-purview-strengthens-information-protection-for-copilot) ++#### 1. Create sensitivity labels ++1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as an admin in one of the groups listed at [Sensitivity labels - permissions](/purview/get-started-with-sensitivity-labels#permissions-required-to-create-and-manage-sensitivity-labels). +2. Select **Solutions** > **Information protection** > **Sensitivity labels** > **Create a label**. +3. In the scope, select **Files and other data assets**. This scope allows your labels to be applied to documents and emails. +4. Continue creating the sensitivity labels you need. ++To learn more, see: ++- [Create and configure sensitivity labels and their policies](/purview/create-sensitivity-labels) ++#### 2. Publish your labels and educate your users ++1. Add your labels to a publishing policy. When they're published, users can manually apply the labels in their Office apps. The publishing policies also have settings that you need to consider, like a default label and requiring users to label their data. ++ To learn more, see [Publish sensitivity labels by creating a label policy](/purview/create-sensitivity-labels#publish-sensitivity-labels-by-creating-a-label-policy). ++2. Educate your users and provide guidance on when to apply the correct sensitivity label. ++ Users should change the label if needed, especially for more sensitive content. ++ To help you with this step, see [End-user documentation for sensitivity labels](/purview/get-started-with-sensitivity-labels#end-user-documentation-for-sensitivity-labels). ++3. Monitor your labels. Select **Information protection** > **Reports**. You can see the usage of your labels. ++#### 3. Enable sensitivity labels for files in SharePoint and OneDrive +++#### 4. Apply a sensitivity label to your SharePoint document libraries ++You can use a sensitivity label on your SharePoint document libraries, and make this label the default label that applies to all document libraries. This configuration is appropriate when your document libraries store files with the same level of sensitivity. ++The SharePoint site admin can do this task. ++1. In your SharePoint site, select **Documents** > **Settings** icon > **Library settings** > **More library settings**. +2. In **Default sensitivity labels** (Apply label to items in this list or library), select your custom sensitivity label from the drop-down list. +3. **Save** your changes. ++When set: ++- SharePoint automatically applies the label to the files, which can include [files with a lower sensitivity label](/purview/sensitivity-labels-sharepoint-default-label#will-an-existing-label-be-overridden). +- It provides a baseline level of protection that's specific to the document library. It doesn't require content inspection and doesn't rely on end users. ++To learn more, see: ++- [Overview - Default sensitivity labels for SharePoint document libraries](/purview/sensitivity-labels-sharepoint-default-label) +- [Steps - Add a sensitivity label to SharePoint document library](https://support.microsoft.com/office/add-a-sensitivity-label-to-sharepoint-document-library-54b1602b-db0a-4bcb-b9ac-5e20cbc28089) ++### Detect sensitive information and protect it from unauthorized sharing or leakage ++✅ **Use [data loss prevention (DLP) policies](/purview/dlp-learn-about-dlp) to help protect against unintentional sharing** ++[Microsoft Purview Data Loss Prevention (DLP)](/purview/dlp-learn-about-dlp) helps organizations protect sensitive information by helping guard against unauthorized sharing or leakage. The intent is to dynamically protect sensitive information, like financial data, social security numbers, and health records, from being overshared. ++You can create DLP policies to protect sensitive information with your Microsoft 365 services, like Exchange, SharePoint, and OneDrive accounts. ++This section introduces you to the DLP policy creation process. DLP policies are a powerful tool. Make sure you: ++- Understand the data you're protecting and the goals you want to achieve. +- Take time to design a policy before you implement it. You want to avoid any unintended issues. It's not recommended to create a policy, and then only tune the policy by trial-and-error. +- If you're new to Microsoft Purview DLP, it's helpful to work through [Data loss prevention - Before you begin](/purview/dlp-learn-about-dlp#before-you-begin) before you start designing a policy. This step helps you understand the concepts and the tools you use to create and manage DLP policies. ++#### 1. Open the Microsoft Purview portal +++#### 2. Create DLP policies +++#### 3. Test and monitor your policies ++For DLP policies, you can: ++- **Test your policies** using [simulation mode](/purview/dlp-test-dlp-policies). Simulation mode allows you to see the effect of an individual policy without enforcing the policy. Use it to find the items that match your policy. ++- **Monitor your policies** with alerts and built-in reports, including risky user activities outside of DLP policies. ++To learn more, see: ++- [Viewing policy application results](/purview/insider-risk-management-activities) +- [Get started with the data loss prevention analytics](/purview/dlp-analytics-get-started) ++### Delete the content you don't need ++✅ **Use [data lifecycle management](/purview/data-lifecycle-management) for automatic data retention or deletion** ++[Data lifecycle management](/purview/data-lifecycle-management) uses retention policies and optionally, retention labels. They're typically used to retain content for compliance reasons and can also automatically delete stale information. ++For example, your organization might have regulatory requirements that require you to keep content for a certain period of time. Or, you might have content that you want to delete because it's old, outdated, or no longer needed. ++If you have stale data in your organization, then create and use retention policies. These policies help Copilot return more accurate information from your documents and emails. ++Settings in a retention policy apply at the container level, like a SharePoint site or an Exchange mailbox. These settings are automatically inherited by the data in that container. If you need [exceptions for individual emails or documents](/purview/create-retention-labels-data-lifecycle-management), then use retention labels. For example, you have a retention policy to delete data in OneDrive if the data is older than one year. But, users can apply retention labels to keep specific documents from automatic deletion. ++1. To create retention policies, sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as a Compliance Administrator. ++ To learn more about the permissions, see [Data Lifecycle Management - Permissions](/purview/get-started-with-data-lifecycle-management#permissions-for-retention-policies-and-retention-labels). ++2. Select **Solutions** > **Data Lifecycle Management** > **Policies** > **Retention policies**. ++3. Select **New retention policy** and follow the instructions. ++ Retention policies manage automatic retention and deletion for Microsoft 365 workloads & Microsoft 365 Copilot interactions. To learn more, including the steps to create the policy, see [Create and configure retention policies](/purview/create-retention-policies). ++4. Optional. Use retention labels when you need an exception to a retention policy. If you don't need an exception to a retention policy, then you don't need to create a retention label. ++ - In **Data Lifecycle Management**, select **Retention labels** > **Create a label**. ++ Follow the configuration instructions. To learn more, including the steps to create the policy, see [How to create retention labels for data lifecycle management](/purview/create-retention-labels-data-lifecycle-management#how-to-create-retention-labels-for-data-lifecycle-management). ++ After you create the retention labels, publish the labels and apply the labels to documents and emails. To learn more, see [Publish retention labels and apply them in apps](/purview/create-apply-retention-labels). ++5. If you applied retention labels, monitor them to see how they're being used. ++ 1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as one of the admins listed at [Content explorer - Permissions](/purview/data-classification-content-explorer). ++ 2. Use [content explorer](/purview/data-classification-content-explorer) to get information on the items using retention labels. ++ There are a few ways to open content explorer: ++ - **Data Lifecycle Management** > **Explorers** + - **Data Loss Prevention** > **Explorers** + - **Information protection** > **Explorers** ++To learn more, see: ++- [Learn about retention policies and retention labels](/purview/retention) +- [Common settings for retention policies and retention label policies](/purview/retention-settings) ++### Review and analyze Copilot prompts and responses ++✅ **Use [Data Security Posture Management (DSPM) for AI](/purview/ai-microsoft-purview) or [eDiscovery](/purview/edisc) to analyze Copilot user prompts and responses** ++When users enter a prompt and get a response from Copilot, you can view and search these interactions. Specifically, these features help you: ++- Find sensitive information or inappropriate content included in Copilot activities. +- Respond to a data spillage incident when confidential or malicious information is released through Copilot-related activity. ++There are two ways to review and analyze Copilot prompts and responses - **Data Security Posture Management for AI** and **eDiscovery**. ++# [DSPM for AI](#tab/aihub) ++[Data Security Posture Management (DSPM) for AI](/purview/ai-microsoft-purview#microsoft-purview-ai-hub-provides-insights-policies-and-controls-for-ai-apps) (previously called AI Hub) is a central location in the Microsoft Purview portal that proactively monitors AI use. It includes eDiscovery and you can use it to analyze and review Copilot prompts and responses. ++1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as an admin in one of the groups listed at [Data Security Posture Management for AI - Permissions](/purview/ai-microsoft-purview-permissions). +2. Select **Solutions** > **DSPM for AI** > **Activity explorer**. +3. Select an existing activity in the list. For example, if there's a **Sensitive info types** activity, select it. +4. Select **View related AI interaction activity**. In **Interaction details**, you can see the app and export an activity. ++To learn more, see: ++- [Microsoft Purview Data Security Posture Management for AI](/purview/ai-microsoft-purview-considerations) +- [Data Security Posture Management for AI - Activity explorer events](/purview/ai-microsoft-purview-considerations#activity-explorer-events) ++# [eDiscovery](#tab/edisc) ++[eDiscovery](/purview/edisc) uses cases to identify, hold, export, and analyze content found in mailboxes and sites. You can this feature to analyze Copilot prompts and responses. ++1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as an admin in one of the groups [eDiscovery - Permissions](/purview/ediscovery-assign-permissions). +2. Select **Solutions** > **eDiscovery** > **Cases**. +3. Create a **case** and a **search** query. A search query searches in-place content, like email, documents, and instant messaging conversations. ++ When you create a search query, you enter the [Data sources that have Copilot data](/purview/edisc-search-copilot-data#data-sources-for-copilot-data). ++4. The data returned is the Copilot prompts and responses. You can review and export this information. If the data contains sensitive information, you can also delete it. ++To learn more, see [Search for Copilot interactions in eDiscovery](/purview/edisc-search-copilot-data). ++++## Technical and deployment resources available to you +++## Related content ++- [Microsoft 365 Copilot requirements and prerequisites](/copilot/microsoft-365/microsoft-365-copilot-requirements) +- [Provision Microsoft 365 Copilot](/copilot/microsoft-365/microsoft-365-copilot-setup) +- [Microsoft 365 Copilot adoption resources](https://adoption.microsoft.com/copilot) |
microsoft-365-copilot-e5-guide | Microsoft 365 Copilot E5 Guide | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-e5-guide.md | + + Title: Get your data ready for Microsoft 365 Copilot with E5 license +description: The E5 deployment for Microsoft 365 Copilot uses a E5 license, SharePoint Advanced Management, and Microsoft Purview. These services help your organization get ready for Copilot. This IT admin guide helps you prevent oversharing, declutter data sources, and monitor site changes. Get your organization and data ready for Copilot by following the steps in this article. +f1.keywords: +- NOCSH +++ Last updated : 11/19/2024++audience: Admin +++ms.localizationpriority: medium ++- scotvorg +- m365copilot +- magic-ai-copilot +- essentials-overview ++appliesto: + - ✅ Microsoft 365 Copilot +++# Microsoft 365 Copilot admin guide for E5 licenses ++When preparing your organization for [Microsoft 365 Copilot](microsoft-365-copilot-overview.md) or you're ready to start using Copilot, there are features in your E5 license that can help get your data ready. ++When users enter a prompt, Copilot can respond with data that the user has permission to access. Overshared and outdated data can lead to inaccurate results from Copilot. ++This article provides guidance for IT admins with **Microsoft 365 E5** and **SharePoint Advanced Management (SAM)** licenses. With the features included in these licenses, you: ++- Use SharePoint Advanced Management (SAM) to help prevent oversharing, declutter data sources, and monitor SharePoint site changes. +- Use Microsoft Purview to enable sensitivity labels, identify and protect sensitive data, restrict endpoints, and delete the content you don't need. ++When you use the features described in this article, your organization is better prepared for Copilot, including getting more accurate results from Copilot. ++This article applies to: ++- Microsoft 365 Copilot +- Microsoft SharePoint Premium - SharePoint Advanced Management (SAM) +- Microsoft Purview ++> [!NOTE] +> If you have an E3 license, then see [Microsoft 365 Copilot admin guide for E3 licenses](microsoft-365-copilot-e3-guide.md). For a comparison of the features in the licenses, see [Compare Microsoft Copilot features in E3 and E5 licenses](microsoft-365-copilot-license-feature-overview.md). ++## Before you begin ++- Microsoft recommends you also follow the steps in [Microsoft 365 Copilot - best practices with SharePoint](/sharepoint/sharepoint-copilot-best-practices). It helps you optimize your search in SharePoint, update sharing settings in SharePoint & OneDrive, and check permissions & site access on your SharePoint sites. ++- The following licenses are required to use the features in this article: ++ - **[Microsoft 365 E5](https://www.microsoft.com/microsoft-365/enterprise/e5)** or **[Office 365 E5](https://www.microsoft.com/microsoft-365/enterprise/office-365-e5)** + - **[Microsoft Purview](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-purview-service-description)** - Included with your E5 license ++ For a list of the features and services you get with your license, see [Microsoft 365, Office 365, Enterprise Mobility + Security, and Windows 11 Subscriptions](https://aka.ms/M365EnterprisePlans). ++ - **[Microsoft SharePoint Premium - SharePoint Advanced Management](/sharepoint/advanced-management#licensing)** ++ There are some features in SharePoint Advanced Management (SAM) that are included with your Microsoft 365 Copilot license. To get the full version of SAM and use all the features described in this article, you need the [Microsoft SharePoint Premium - SharePoint Advanced Management](/sharepoint/advanced-management#licensing) license. ++ - **[Microsoft 365 Copilot](microsoft-365-copilot-licensing.md)** ++ Depending on your subscription plan, you might be able purchase Microsoft 365 Copilot licenses through the [Microsoft 365 admin center](https://admin.microsoft.com) (**Billing** > **Purchase services**), Microsoft partners, or your Microsoft account team. ++ Microsoft 365 Copilot licenses are available as an add-on to other licensing plans. To learn more, see [Understand licensing for Microsoft 365 Copilot](microsoft-365-copilot-licensing.md). ++- This article uses the following admin centers. These admin centers require a specific role to complete the tasks in the article. ++ - **[SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219)**: Sign in as the [SharePoint administrator](/sharepoint/sharepoint-admin-role). + - **[Microsoft Purview portal](https://purview.microsoft.com)**: There are different roles, depending on the task you need to complete. To learn more, see: ++ - [Permissions required to create and manage sensitivity labels](/purview/get-started-with-sensitivity-labels#permissions-required-to-create-and-manage-sensitivity-labels) + - [Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview](/defender-office-365/scc-permissions) ++## Step 1 - Use SharePoint Advanced Management (SAM) features +++## Step 2 - Restrict SharePoint Search (RSS) ++✅ **Copilot goal: Disable RSS** ++As you get ready for Copilot, you review and configure the correct permissions on your SharePoint sites. You might have enabled Restricted SharePoint Search (RSS). ++RSS is a temporary solution that gives you time to review and configure the correct permissions on your SharePoint sites. You add the reviewed & corrected sites to an allowed list. ++- If your SharePoint site permissions are set correctly, then disable RSS. ++ When disabled, SharePoint search accesses all your SharePoint sites. When users enter prompts, Copilot can show data from all your sites, which shows more relevant and complete information in the response. ++ The goal is to disable RSS and allow SharePoint search to access all your sites. This action gives Copilot more data to work with, which can improve the accuracy of the responses. ++ **OR** ++- If you enabled RSS, then add more sites to the allowed list. You can add up to 100 sites to the allowed list. Copilot can show data from the allowed list sites in user prompts. ++ Remember, your goal is to review & configure the correct permissions on your SharePoint sites, and disable RSS. ++To learn more, see: ++- [Restricted SharePoint Search](/sharepoint/restricted-sharepoint-search) +- [Curate the allowed list for Restricted SharePoint Search](/sharepoint/restricted-sharepoint-search-allowed-list) +- [Blog - Introducing Restricted SharePoint Search to help you get started with Microsoft 365 Copilot](https://techcommunity.microsoft.com/t5/microsoft-365-copilot/introducing-restricted-sharepoint-search-to-help-you-get-started/ba-p/4071060) ++### Disable RSS and remove sites from the allowed list ++1. Use the `Set-SPOTenantRestrictedSearchMode` PowerShell cmdlet to disable RSS. +1. Use the `Remove-SPOTenantRestrictedSearchAllowedSite` PowerShell cmdlet to remove sites from the allowed list. ++To learn more about these cmdlets, see [Use PowerShell Scripts for Restricted SharePoint Search](/sharepoint/restricted-sharepoint-search-admin-scripts). ++### Add sites to the RSS allowed list ++1. Get a list of the sites that you want to add to the allowed list. ++ - **Option 1 - Use the Sharing links report** ++ 1. Sign in to the [SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219) as a SharePoint administrator. + 1. Select **Reports** > **Data access governance** > **Sharing links** > **View reports**. + 1. Select one of the reports, like **"Anyone" links**. This report shows a list of sites with the highest number of **Anyone** links created. These links let anyone access files and folders without signing in. These sites are candidates to allow in tenant/org wide search. ++ - **Option 2 - Use the sort and filter options for Active sites** ++ 1. Sign in to the [SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219) as a SharePoint administrator. + 1. Select **Sites** > **Active sites**. + 1. Use the sort and filter options to find the most active site, including page views. These sites are candidates to allow in a tenant/organization wide search. ++ :::image type="content" source="media/microsoft-365-copilot-e5-guide/sharepoint-active-sites-filter.png" alt-text="In SharePoint admin center, select active sites and then use the All sites filter."::: ++2. Use the `Add-SPOTenantRestrictedSearchAllowedList` PowerShell cmdlet to add the sites to the allowed list. ++ To learn more about this cmdlet, see [Use PowerShell Scripts for Restricted SharePoint Search](/sharepoint/restricted-sharepoint-search-admin-scripts). ++## Step 3 - Use Microsoft Purview features ++There are features in [Microsoft Purview](/purview/copilot-in-purview-overview) that can help you get ready for Copilot. ++✅ **Copilot goals with Purview**: ++- Identify and label sensitive data in Microsoft 365. +- Detect and protect sensitive information from unauthorized sharing or leakage. +- Delete the content you don't need. +- Detect sensitive data and noncompliant content in Copilot prompts and responses. +- Review and analyze Copilot prompts and responses. ++To learn more about how Microsoft Purview can help you to govern, protect, and manage your data, see [Learn about Microsoft Purview](/purview/purview). ++### Identify and label sensitive data +++This section walks you through the steps to create and use the default sensitivity labels from Microsoft Purview. If you need to use your own label names and configurations, create the labels manually or edit the default labels. If you already created your own sensitivity labels, you can't create the default labels. ++To learn more about sensitivity labels, see: ++- [Get started with sensitivity labels](/purview/get-started-with-sensitivity-labels) +- [Default labels and policies to protect your data](/purview/mip-easy-trials) +- [Common scenarios for sensitivity labels](/purview/get-started-with-sensitivity-labels#common-scenarios-for-sensitivity-labels) +- [Microsoft Purview strengthens information protection for Copilot](/purview/ai-microsoft-purview#microsoft-purview-strengthens-information-protection-for-copilot) ++#### 1. Create the default sensitivity labels ++1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as an admin in one of the groups listed at [Sensitivity labels - permissions](/purview/get-started-with-sensitivity-labels#permissions-required-to-create-and-manage-sensitivity-labels). ++2. Select **Solutions** > **DSPM for AI** > **Overview**. +3. In the **Recommendations** section, select **Information Protection Policy for Sensitivity Labels**. This step creates the default labels and their policies. +4. To see or edit the default labels, or to create your own labels, select **Information protection** > **Sensitivity labels**. You might have to select **Refresh**. ++When you have the default sensitivity labels: ++- The labels help protect your data and can affect Copilot results. +- Your users can start manually applying published labels to their files and emails. +- Admins can start creating policies and configuring features that automatically apply labels to files and emails. ++#### 2. Enable and configure sensitivity labels for containers ++The default sensitivity labels don't include settings for groups and sites, which let you apply a sensitivity label to a SharePoint or Teams site, or Microsoft Loop workspace. Items in the container don't inherit the sensitivity label. Instead, the label settings can restrict access to the container. This restriction provides an extra layer of security when you use Copilot. If a user can't access the site or workspace, Copilot can't access it on behalf of that user. ++For example, you can set the privacy setting to **Private**, which restricts site access to only approved members in your organization. When the label is applied to the site, it replaces any previous setting and locks it for as long as the label is applied. This feature is a more secure setting than letting anybody access the site and allowing users to change the setting. When only approved members can access the data, it helps prevent oversharing of data that Copilot might access. ++To configure any label settings for groups and sites, you must enable this capability for your tenant and then synchronize your labels. This configuration is a one-time configuration. To learn more, see [How to enable sensitivity labels for containers and synchronize labels](/purview/sensitivity-labels-teams-groups-sites#how-to-enable-sensitivity-labels-for-containers-and-synchronize-labels). ++You can then edit your sensitivity labels, or create new sensitivity labels specifically for groups and sites: ++1. For the sensitivity label scope, select **Groups & sites**. Remember, you must have already run the PowerShell commands. If you didn't, you can't select this scope. ++2. Select the groupings of settings to configure. Some of the settings have backend dependencies before they can be enforced, like Conditional Access that must be already configured. The privacy setting, which is included in **Privacy and external user access settings**, doesn't have any backend dependencies. ++3. Configure the settings you want to use and save your changes. ++For more information, including details of all the available label settings that you can configure for groups and sites, see [Use sensitivity labels to protect content in Microsoft Teams, Microsoft 365 groups, and SharePoint sites](/purview/sensitivity-labels-teams-groups-sites). ++#### 3. Publish your labels and educate your users ++1. If you're using the default sensitivity labels, the labels are automatically published to all users, even if you edit the labels. ++ If you created your own sensitivity labels, you must add your labels to a publishing policy. When they're published, users can manually apply the labels in their Office apps. For labels that include the **Groups & sites** scope, users can apply these labels to new and existing sites, teams, and Loop workspaces. The publishing policies also have settings that you need to consider, like a default label and requiring users to label their data. ++ To learn more, see [Publish sensitivity labels by creating a label policy](/purview/create-sensitivity-labels#publish-sensitivity-labels-by-creating-a-label-policy). ++2. Educate your users and provide guidance for when they should apply each sensitivity label. ++ In addition to manually applying labels, the default label policy includes applying the **General \ All Employees (unrestricted)** label as the default label for items. This label offers a base layer of protection. But, users should change the label if needed, especially for more sensitive content that requires encryption. ++ To help you with this step, see [End-user documentation for sensitivity labels](/purview/get-started-with-sensitivity-labels#end-user-documentation-for-sensitivity-labels). ++3. Monitor your labels. Select **Information protection** > **Reports**. You can see the usage of your labels. ++#### 4. Enable sensitivity labels for files in SharePoint and OneDrive +++> [!TIP] +> Although not related to Copilot, now is a good time to [enable co-authoring for encrypted files](/purview/sensitivity-labels-coauthoring), if it's not already enabled. This setting ensures the best user experience for collaboration and might be required for other labeling scenarios. ++#### 5. Set default sensitivity labels for your SharePoint document libraries ++The default labeling policy is configured to apply the default sensitivity label of **General \ All Employees (unrestricted)** for unlabeled files, emails, and meetings. You might want to override that setting with location-based labeling for SharePoint document libraries. This labeling method applies a default label to a document library. ++You have two automatic labeling options for files in the same document library: ++| Library option | When to use this option | +| -- | -- | +| **Option 1** - Default sensitivity label that can apply admin-defined permissions (the **Assign permissions now** encryption option), or no encryption. | Recommended for new document libraries and when they store files that usually have the same level of known sensitivity. For exceptions, you want users to be able to select an alternative label that doesn't apply encryption. <br/><br/> All new files that don't have a sensitivity label and uploaded to the library will be labeled with this library default label.| +| **Option 2** - Protects files that are downloaded and extends SharePoint permissions to the downloaded file copy. To configure this setting for the library, the sensitivity label must be configured with user-defined permissions (the **Let users assign permissions** encryption option). <br/><br/> Currently in preview, this configuration requires PowerShell commands at the tenant-level and then the site level before you can select a sensitivity label. | Recommended for new and existing document libraries when you want to centralize permissions and continue to protect files when they're downloaded. This option is suitable when you haven't inspected the file contents for sensitivity. <br/><br/> This option is also suitable when you can't configure the user and group permissions for the label that defines who gets access to the content. In this scenario, the business owners should control access by using SharePoint permissions and access management capabilities. However, this label configuration provides more protection because the downloaded copy of the file is permissioned the same as its source copy in real time. | ++Both options provide a baseline level of protection that's specific to the document library, doesn't require content inspection, and doesn't rely on action from end users. ++The SharePoint site admin can select a default label for the document library. ++1. In your SharePoint site, select **Documents** > **Settings** icon > **Library settings** > **More library settings**. +2. In **Default sensitivity labels** (Apply label to items in this list or library): ++ a. For a standard default sensitivity label, from the drop-down box, select a sensitivity label that's suitable for most of the files in the library. It can be a sensitivity label that is configured for admin-defined permissions, such as **Confidential \ All Employees**. Or, a sensitivity label that doesn't apply encryption, such as **Public**. Don't select **Extend protection on download, copy, or move**. ++ b. For a default sensitivity label that extends protection to files that are downloaded, copied, or moved, select **Extend protection on download, copy, or move**. Then from the drop-down box, select a sensitivity label that is configured for user-defined permissions, such as **Confidential \ Trusted People**. ++ > [!NOTE] + > The **Extend protection on download, copy, or move** checkbox isn't displayed until the prerequisite PowerShell commands are complete. ++3. **Save** your changes. ++To learn more, including how to run the PowerShell commands for the checkbox, details about the labeling outcomes for each configuration, and any limitations: ++- [Configure a default sensitivity label for a SharePoint document library](/purview/sensitivity-labels-sharepoint-default-label) +- [Configure SharePoint with a sensitivity label to extend permissions to downloaded documents](/purview/sensitivity-labels-sharepoint-extend-permissions) ++#### 6. Automatically apply sensitivity labels to files and emails ++You can automatically apply labels to files in SharePoint sites, OneDrive accounts, Exchange emails, and Office files. Automatic labeling helps to identify a higher priority label for more sensitive information that might need a more restrictive setting than a default label. ++- For the specific steps and information that you need to know, including learning about simulation mode for autolabeling policies, see [Apply a sensitivity label to content automatically](/purview/apply-sensitivity-label-automatically). ++##### Client-side autolabeling vs. service-side autolabeling ++- When you autolabel documents and emails in use by Word, Excel, PowerPoint, and Outlook, it's using client-side autolabeling. Users see the label automatically applied in their Office apps, or you can recommend the appropriate label to the user. +- When you autolabel documents stored in all SharePoint or OneDrive sites, and all emails sent using Exchange Online, it's using service-side autolabeling. There isn't any user interaction. You can label at scale for files at rest in OneDrive and SharePoint, and all emails that are sent and received. ++If you created the default sensitivity labels and policies, they include both [client-side autolabeling](/purview/mip-easy-trials#client-side-auto-labeling) and [service-side autolabeling](/purview/mip-easy-trials#service-side-auto-labeling) to detect credit card numbers and personal data. These default settings make it easy for you to test the autolabeling functionality. ++You can edit or create your own autolabeling settings to help identify your organization data that needs a specific sensitivity label to apply protection actions, like encryption. ++### Detect sensitive information and protect it from unauthorized sharing or leakage ++✅ **Use [data loss prevention (DLP) policies](/purview/dlp-learn-about-dlp) to help protect against unintentional sharing** ++[Microsoft Purview Data Loss Prevention (DLP)](/purview/dlp-learn-about-dlp) helps organizations protect sensitive information by helping guard against unauthorized sharing or leakage. The intent is to dynamically protect sensitive information, like financial data, social security numbers, and health records, from being overshared. ++You can create DLP policies to protect sensitive information in the following locations: ++- Microsoft 365 services, like Teams, Exchange, SharePoint, and OneDrive accounts +- Office applications, like Word, Excel, and PowerPoint +- Windows 10, Windows 11, and macOS (three latest released versions) endpoints +- Non-Microsoft cloud apps +- On-premises file shares and on-premises SharePoint +- Fabric and Power BI ++When DLP policies find this data, it can act and help prevent the data from showing up in Microsoft 365 Copilot results. It can also help prevent items that have specific sensitivity labels applied from being summarized by Copilot. ++To learn more, see: ++- [Create and Deploy data loss prevention policies](/purview/dlp-create-deploy-policy) +- [Learn about the Microsoft 365 Copilot policy location](/purview/dlp-microsoft365-copilot-location-learn-about) ++With DLP policies, you can use [trainable classifiers](/purview/trainable-classifiers-get-started-with), [sensitive information types](/purview/sit-sensitive-information-type-learn-about), [sensitivity labels](/purview/sensitivity-labels), and [retention labels](/purview/retention) to identify sensitive information across your organization. ++This section introduces you to the DLP policy creation process. DLP policies are a powerful tool. Make sure you: ++- Understand the data you're protecting and the goals you want to achieve. +- Take time to design a policy before you implement it. You want to avoid any unintended issues. It's not recommended to create a policy, and then only tune the policy by trial-and-error. +- Work through [Data loss prevention - Before you begin](/purview/dlp-learn-about-dlp#before-you-begin) before you start designing a policy. This step helps you understand the concepts and the tools you use to create and manage DLP policies. ++#### 1. Open the Microsoft Purview portal +++#### 2. Create DLP policies +++#### 3. Create a DLP policy for Teams ++By default, Purview includes some policies for Teams that you can enable. These policies are a quick way to get started with protecting information in Teams. ++These policies can detect when sensitive info, like bank account numbers or passport numbers, are shared in Teams messages. Then, you can create policy tips to educate users or add actions that control sharing. ++1. In **Data Loss Prevention**, select **Overview**. +2. Scroll down to see the following policies: ++ - Start monitoring unprotected sensitive info in Teams + - Automatically configure Teams DLP policies to protect files shared in team messages ++ You can turn on these policies and also review the settings in the policy: ++ :::image type="content" source="media/microsoft-365-copilot-e5-guide/purview-dlp-default-policy-teams.png" alt-text="In Microsoft Purview Data Loss Prevention (DLP), turn on the unprotected sensitive info in Teams policy."::: ++For more information on using DLP policies to protect information in Teams, see: ++- [Learn about the default data loss prevention policy for Microsoft Teams](/purview/dlp-teams-default-policy) +- [Data Loss Prevention and Microsoft Teams](/purview/dlp-microsoft-teams) ++#### 4. Create an endpoint DLP policy for your Windows and macOS devices ++Endpoint data loss prevention (Endpoint DLP) extends DLP monitoring and protection capabilities to sensitive items that are physically stored on Windows 10/11 and macOS (the three latest released major versions) devices. ++DLP can monitor and take protective actions on user activities, like: ++- Copy to USB removable device +- Copy to a network share +- Print +- Upload to a restricted cloud service domain or access from an unallowed browser ++These activities are only some of the activities that DLP can monitor and protect. For a full list, see [Learn about Endpoint Data Loss Prevention](/purview/endpoint-dlp-learn-about). ++For more information on the prerequisites and steps to create an endpoint DLP policy, see: ++- [Get started with endpoint data loss prevention](/purview/endpoint-dlp-getting-started) +- [Onboard Windows devices into Microsoft 365 overview](/purview/device-onboarding-overview) +- [Onboard macOS devices into Microsoft 365 overview](/purview/device-onboarding-macos-overview). ++> [!NOTE] +> If you use a mobile device managment (MDM) service to manage and help protect you devices, like [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), then keep using your MDM provider. The endpoint DLP policies focus on data loss prevention with your Microsoft 365 data. MDM focuses on device management. You use them simulatenously. ++#### 5. Create Adaptive Protection ++Adaptive Protection integrates information from **Insider Risk Management** with DLP. When [insider risk](/purview/insider-risk-management-adaptive-protection) identifies a user that's engaging in risky behavior, the user is dynamically assigned an [insider risk level](/purview/insider-risk-management-adaptive-protection#insider-risk-levels), like **Elevated**. ++[Adaptive Protection can automatically create DLP policies](/purview/dlp-adaptive-protection-learn) that help protect the organization against the risky behavior associated with the insider risk level. As the insider risk level changes for users, the DLP policies applied to users can also adjust. ++**Turn on Adaptive Protection**: ++1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as one of the admins listed at [Adaptive Protection - Permissions](/purview/insider-risk-management-adaptive-protection#permissions-for-adaptive-protection). +2. Select **Solutions** > **Insider Risk Management** > **Adaptive Protection**. +3. In **Dashboard**, select **Quick setup**. ++ - [Adaptive Protection - Quick Setup](/purview/insider-risk-management-adaptive-protection) is the easiest and fastest way to get started with Adaptive Protection. It automatically creates and dynamically assigns the insider risk policies, DLP policies, and a Conditional Access policy. ++ When the risk level is met, the policies automatically adjust to match the new risk level. ++ - You can also create a [custom policy](/purview/insider-risk-management-adaptive-protection#custom-setup) instead of using the quick setup. If you create a custom policy, then you must also create the DLP and Conditional Access policies. ++To learn more, see [Adaptive Protection policies](/purview/insider-risk-management-adaptive-protection). ++#### 6. Test and monitor your policies ++- For DLP policies, you can: ++ - **Test your policies** using [simulation mode](/purview/dlp-test-dlp-policies). Simulation mode allows you to see the effect of an individual policy without enforcing the policy. Use it to find the items that match your policy. ++ - **Monitor your policies** with alerts and built-in reports, including risky user activities outside of DLP policies. ++ To learn more, see: ++ - [Viewing policy application results](/purview/insider-risk-management-activities) + - [Get started with the data loss prevention analytics](/purview/dlp-analytics-get-started) ++- When you enable Adaptive Protection and your policies are configured, you can get policy metrics, users with an assigned risk level, and the policies currently in-scope for the user. ++ To learn more, see: ++ - [Help dynamically mitigate risks with Adaptive Protection](/purview/insider-risk-management-adaptive-protection) + - [Investigate insider risk management activities](/purview/insider-risk-management-activities) ++### Delete the content you don't need ++✅ **Use [data lifecycle management](/purview/data-lifecycle-management) for automatic data retention or deletion** ++[Data lifecycle management](/purview/data-lifecycle-management) uses retention policies and optionally, retention labels. They're typically used to retain content for compliance reasons and can also automatically delete stale information. ++For example, your organization might have regulatory requirements that require you to keep content for a certain period of time. Or, you might have content that you want to delete because it's old, outdated, or no longer needed. ++If you have stale data in your organization, create and use retention policies. These policies help Copilot return more accurate information from your documents and emails. ++Retention policies can also retain Copilot prompts and responses for compliance requirements, even if [users delete their Copilot activity](https://support.microsoft.com/office/delete-your-microsoft-365-copilot-activity-history-76de8afa-5eaf-43b0-bda8-0076d6e0390f). To learn more, see [Learn about retention for Copilot & AI apps](/purview/retention-policies-copilot). ++Settings in a retention policy apply at the container level, like a SharePoint site or an Exchange mailbox. These settings are automatically inherited by the data in that container. If you need [exceptions for individual emails or documents](/purview/create-retention-labels-data-lifecycle-management), use retention labels. For example, you have a retention policy to delete data in OneDrive if the data is older than one year. But, users can apply retention labels to keep specific documents from automatic deletion. ++1. To create retention policies, sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as a Compliance Administrator. ++ To learn more about the permissions, see [Data Lifecycle Management - Permissions](/purview/get-started-with-data-lifecycle-management#permissions-for-retention-policies-and-retention-labels). ++2. Select **Solutions** > **Data Lifecycle Management** > **Policies** > **Retention policies**. ++3. Select **New retention policy** and follow the instructions. For more specific information, see [Create and configure retention policies](/purview/create-retention-policies). ++4. If needed, create and apply retention labels. ++ You can use either **Data Lifecycle Management** or **Records Management** to create the labels. Records management includes more configuration options, like a [disposition review process](/purview/disposition). A disposition review is helpful if you need manual confirmation before items are automatically deleted. + + # [Data Lifecycle Management](#tab/dlm) ++ Use [Data Lifecycle Management](/purview/data-lifecycle-management) for retention policies that manage automatic retention and deletion for Microsoft 365 workloads & Microsoft 365 Copilot interactions, and retention labels for any exceptions. ++ - From **Data Lifecycle Management**, select **Retention labels** > **Create a label**. ++ Follow the configuration instructions and if you need more help, see [How to create retention labels for data lifecycle management](/purview/create-retention-labels-data-lifecycle-management#how-to-create-retention-labels-for-data-lifecycle-management). ++ # [Records Management](#tab/rm) ++ Use [Records Management](/purview/records-management) for retention labels that provide more configuration options for high-value documents and emails that typically have stricter compliance requirements. If you want to use a disposition review, then you must use Records Management. ++ 1. Sign in to the [Microsoft Purview portal](https://purview.microsoft.com/) as a member of the Records Management admin role group. ++ To learn more about the permissions, see [Records management - Permissions](/purview/get-started-with-records-management#permissions) ++ 2. Select **Solutions** > **Records Management**. ++ 3. Select **File plan** > **Create a label** > **Retention label**. ++ Follow the configuration instructions and if you need more help, see [Use file plan to create and manage retention labels](/purview/file-plan-manager). ++ ++ After you create the retention labels, you can then apply the labels to documents and emails: ++ - [Publish retention labels and apply them in apps](/purview/create-apply-retention-labels) + - [Automatically apply a retention label to retain or delete content](/purview/apply-retention-labels-automatically) ++5. If you applied retention labels, monitor them to see how they're being used. ++ 1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as one of the admins listed at: ++ - [Content explorer - Permissions](/purview/data-classification-content-explorer) + - [Activity explorer - Permissions](/purview/data-classification-activity-explorer#permissions) ++ 2. Use [Content explorer](/purview/data-classification-content-explorer) to get information on the items using retention labels. ++ There are a few ways to open Content Explorer: ++ - **Data Loss Prevention** > **Explorers** + - **Records Management** > **Explorers** + - **Information protection** > **Explorers** ++ 3. Use [activity explorer](/purview/data-classification-activity-explorer) to get a historical view of activities on your content that has retention labels. There are different filters you can use. ++ There are a few ways to open activity explorer: ++ - **Data Lifecycle Management** > **Explorers** + - **Records Management** > **Explorers** + - **Data Loss Prevention** > **Explorers** + - **Information protection** > **Explorers** ++To learn more, see: ++- [Learn about retention policies and retention labels](/purview/retention) +- [Common settings for retention policies and retention label policies](/purview/retention-settings) ++### Detect sensitive data and noncompliant content in Copilot interactions ++✅ **Create [Communication Compliance policies](/purview/communication-compliance-copilot) to monitor interactions with Microsoft 365 Copilot** ++[Communication Compliance](/purview/communication-compliance) can detect, capture, and act on potentially inappropriate messages in your organization. The inappropriate content includes sensitive or confidential information, harassing or threatening language, and sharing of adult content. ++Communication Compliance comes with some predefined policies that help you get started. We recommend you use these predefined templates. You can also create your own custom policies. ++These policies monitor and evaluate prompts and responses with Copilot. ++1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as one of the admins listed at [Communication Compliance - Permissions](/purview/communication-compliance-configure#step-1-required-enable-permissions-for-communication-compliance). ++2. Select **Solutions** > **Communication Compliance** > **Overview**. ++ If there are some required steps listed, then complete them. To learn more about these steps, see [Set up and create communication compliance policy](/purview/communication-compliance-configure). ++3. For the predefined policies, select **Create policy** > **Detect Microsoft 365 Copilot interactions**: ++ :::image type="content" source="media/microsoft-365-copilot-e5-guide/purview-communication-compliance-default-policy.png" alt-text="In Microsoft Purview Communication Compliance, create the detect Microsoft 365 Copilot interactions policy."::: ++ This Copilot policy helps you get started. There are also other predefined templates you can use. At any time, you can also create your own custom policies. ++ To learn more, see: ++ - [Configure a communication compliance policy to detect for Copilot interactions](/purview/communication-compliance-copilot) + - [Create and manage communication compliance policies](/purview/communication-compliance-policies) ++4. Monitor your policies. Regularly review the policy reports and audit logs to see any policy matches & resolved items, including activity by users. ++ To learn more, see [Use communication compliance reports and audits](/purview/communication-compliance-reports-audits). ++To learn more, see: ++- [Learn about communication compliance](/purview/communication-compliance) +- [Get started with communication compliance](/purview/communication-compliance-configure) +- [Create Communication Compliance policies](/purview/communication-compliance-policies) ++### Review and analyze Copilot prompts and responses ++✅ **Use [Data Security Posture Management (DSPM) for AI](/purview/ai-microsoft-purview) or [eDiscovery](/purview/edisc) to analyze Copilot user prompts and responses** ++When users enter a prompt and get a response from Copilot, you can view and search these interactions. Specifically, these features help you: ++- Find sensitive information or inappropriate content included in Copilot activities. +- Respond to a data spillage incident when confidential or malicious information is released through Copilot-related activity. +- With eDiscovery, you can remove sensitive information or inappropriate content included in Copilot activities. ++There are two ways to review and analyze Copilot prompts and responses - **Data Security Posture Management for AI** and **eDiscovery**. ++# [DSPM for AI](#tab/aihub) ++[Data Security Posture Management (DSPM) for AI](/purview/ai-microsoft-purview#microsoft-purview-ai-hub-provides-insights-policies-and-controls-for-ai-apps) (previously called AI Hub) is a central location in the Microsoft Purview portal that proactively monitors AI use. It includes eDiscovery and you can use it to analyze and review Copilot prompts and responses. ++1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as an admin in one of the groups listed at [Data Security Posture Management for AI - Permissions](/purview/ai-microsoft-purview-permissions). +2. Select **Solutions** > **DSPM for AI** > **Activity explorer**. +3. Select an existing activity in the list. For example, if there's a **Sensitive info types** activity, select it. +4. Select **View related AI interaction activity**. In **Interaction details**, you can see the app, and the prompt & response. You can also export an activity. ++To learn more, see: ++- [Microsoft Purview Data Security Posture Management for AI](/purview/ai-microsoft-purview-considerations) +- [Data Security Posture Management for AI - Activity explorer events](/purview/ai-microsoft-purview-considerations#activity-explorer-events) ++# [eDiscovery](#tab/edisc) ++[eDiscovery](/purview/edisc) uses cases to identify, hold, export, and analyze content found in mailboxes and sites. You can this feature to analyze Copilot prompts and responses, and delete Copilot data. ++1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as an admin in one of the groups [eDiscovery - Permissions](/purview/ediscovery-assign-permissions). +2. Select **Solutions** > **eDiscovery** > **Cases**. +3. Create a **case** and a **search** query. A search query searches in-place content, like email, documents, and instant messaging conversations. ++ When you create a search query, you enter the [Data sources that have Copilot data](/purview/edisc-search-copilot-data#data-sources-for-copilot-data). ++4. The data returned is the Copilot prompts and responses. You can review and export this information. If the data contains sensitive information, you can also delete it. ++To learn more, see [Search for and optionally delete Copilot interactions in eDiscovery](/purview/edisc-search-copilot-data). ++++## Technical and deployment resources available to you +++## Related content ++- [Microsoft 365 Copilot requirements and prerequisites](/copilot/microsoft-365/microsoft-365-copilot-requirements) +- [Provision Microsoft 365 Copilot](/copilot/microsoft-365/microsoft-365-copilot-setup) +- [Microsoft 365 Copilot adoption resources](https://adoption.microsoft.com/copilot) |
microsoft-365-copilot-enable-users | Microsoft 365 Copilot Enable Users | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-enable-users.md | +appliesto: + - ✅ Microsoft 365 Copilot # Enable users for Microsoft 365 Copilot Once you've assigned licenses, the Copilot experience will automatically appear ## Send welcome email -After licensing your users for Microsoft 365 Copilot, we recommend sending them a welcome email to introduce them to Microsoft 365 Copilot and help them understand what it can do for them. The easiest way to do this is to use the [Microsoft 365 Copilot setup guide](https://admin.microsoft.com/Adminportal/Home?Q=learndocs#/modernonboarding/microsoft365copilotsetupguide), which includes an option for sending a welcome email to your Copilot users. Here’s an example of this email: +After licensing your users for Microsoft 365 Copilot, we recommend sending them a welcome email to introduce them to Microsoft 365 Copilot and help them understand what it can do for them. The easiest way to do this is to use the [Microsoft 365 Copilot setup guide](https://admin.microsoft.com/Adminportal/Home?Q=learndocs#/modernonboarding/microsoft365copilotsetupguide), which includes an option for sending a welcome email to your Copilot users. Here's an example of this email: :::image type="content" source="media/copilot-ga-welcome-email.png" alt-text="An image of an email introducing Microsoft 365 Copilot and its capabilities that an admin can provide to users."::: |
microsoft-365-copilot-enablement-resources | Microsoft 365 Copilot Enablement Resources | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-enablement-resources.md | Title: "Adoption and enablement resources available for Microsoft 365 Copilot" + Title: Adoption resources for Microsoft 365 Copilot f1.keywords: - NOCSH Previously updated : 12/12/2023 Last updated : 11/19/2024 audience: Admin +appliesto: + - ✅ Microsoft 365 Copilot -# Adoption and enablement resources available for Microsoft 365 Copilot +# Adoption and enablement resources for Microsoft 365 Copilot -Take advantage of the many helpful resources available on the [Microsoft Adoption site](https://adoption.microsoft.com/) as you enable Microsoft 365 Copilot in your organization. This site includes many resources, including the following: +[Microsoft 365 Copilot](microsoft-365-copilot-overview.md) is an AI tool that can find information, get answers to questions, and help with tasks. -* A downloadable Success Kit to help drive user enablement and technical readiness in your organization. -* A Launch Day kit to help create hype around your rollout. -* The interactive Scenario Library with example outcomes and success measures for several different industries and roles. +**[Microsoft Adoption](https://adoption.microsoft.com/copilot)** includes resources that help you enable and use Copilot in your organization, including: -See [Microsoft 365 Copilot](https://adoption.microsoft.com/copilot/) to explore and download resources. +- A downloadable **Success Kit** to help drive user enablement and technical readiness in your organization. +- A **Launch Day** kit to help create hype around your rollout. +- The **Interactive Scenario Library** with example outcomes and success measures for several different industries and roles. +- Instructor-led **QuickStart training** sessions to learn how AI can help. ++To get started, go to [Microsoft 365 Copilot adoption](https://adoption.microsoft.com/copilot) to explore and download resources. ++## Related content ++- [Copilot Prompt Gallery](copilot-prompt-gallery.md) +- [Microsoft 365 Copilot E3 implementation guide](microsoft-365-copilot-e3-guide.md) +- [Microsoft 365 Copilot E5 implementation guide](microsoft-365-copilot-e5-guide.md) |
microsoft-365-copilot-license-feature-overview | Microsoft 365 Copilot License Feature Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-license-feature-overview.md | + + Title: Compare Microsoft Copilot features in E3 and E5 licenses +description: Lists and compares the features available in Microsoft 365 E3 and E5 licenses that can help you get your data ready for Microsoft 365 Copilot. +f1.keywords: +- NOCSH +++ Last updated : 11/19/2024+audience: Admin ++++ms.localizationpriority: medium ++- scotvorg +- m365copilot +- magic-ai-copilot +- essentials-overview ++appliesto: + - ✅ Microsoft 365 Copilot +++# Microsoft 365 license feature comparison list to address oversharing for Microsoft 365 Copilot ++[Microsoft 365 Copilot](microsoft-365-copilot-overview.md) is an AI-powered productivity assistant that can help users with different tasks, like finding information and creating content. You can use Copilot in your Microsoft 365 apps, like Word, Outlook, and Teams. ++Since Copilot accesses the data your users have access to, it's important to make sure your data is ready for Copilot. This task involves ensuring that your data is shared only with the people who need access. While also making sure that the data is labeled for sensitivity where necessary. ++There are different features in the Microsoft 365 E3 and E5 licenses that can help you get your data ready for Copilot. These features can: ++- Help prevent oversharing +- Declutter data sources +- Identify and label sensitive data in your Microsoft 365 and Office files ++Use the information in this article to become familiar with the features available to you, based on your license. It can also help you decide which license is right for you based on the features your organization wants and needs. ++If you're currently [licensed for Copilot](microsoft-365-copilot-licensing.md) or plan to get it, this article can help. ++This article applies to: ++- Microsoft 365 Copilot +- Microsoft SharePoint Premium - SharePoint Advanced Management (SAM) +- Microsoft Purview ++## Microsoft 365 license feature table ++The following table lists some of the features that can help get your data ready for Copilot. These features affect Copilot results and can help you manage Copilot interactions (prompts and responses). ++| | E3 license | E5 license | +| | | | +| License requirements | - Microsoft 365 E3 or Office 365 E3 <br/>- SharePoint Advanced Management <br/>- Microsoft 365 Copilot | - Microsoft 365 E5 or Office 365 E5 <br/>- SharePoint Advanced Management <br/>- Microsoft 365 Copilot | +| Restricted SharePoint Search (RSS) | ✅ | ✅ | +| | | | +| **Microsoft Purview features** | | | +| Sensitivity labels | ✅ <br/><br/> You can: <br/><br/>- Create custom labels. <br/> - Manually apply labels. | ✅ <br/><br/> You can: <br/><br/> - Create custom labels. <br/> - Use default built-in labels. <br/> - Manually apply labels. <br/> - Automatically apply labels. <br/> - Can apply labels to containers, like a SharePoint or Teams site | +| Data loss prevention (DLP)| ✅ <br/><br/>Policies can target: <br/><br/>- SharePoint <br/> - Exchange <br/> - OneDrive | ✅ <br/><br/> Policies can target: <br/><br/>- SharePoint <br/> - Exchange <br/> - OneDrive <br/> - Teams <br/> - Endpoints | +| Adaptive Protection | n/a | ✅ | +| Data lifecycle management | ✅ <br/><br/> You can: <br/><br/> - Create retention policies<br/> - Manually apply retention labels<br/> - Use Content explorer | ✅ <br/><br/> You can: <br/><br/> - Create retention policies<br/> - Manually apply retention labels<br/> - Automatically apply retention labels <br/> - Use Content explorer <br/> - Use Activity explorer <br/> - Can use Data Lifecycle Management or Records Management | +| Communication Compliance | n/a | ✅ | +| eDiscovery | ✅ <br/><br/>Can search. | ✅ <br/><br/> Can search and delete. | +| Data Security Posture Management for AI (previously called AI Hub) | ✅ | ✅ | +| | | | +| **SharePoint Advanced Management (SAM) features** | | | +| Site ownership policy | ✅ | ✅ | +| Site lifecycle management | ✅ | ✅ | +| Data access governance (DAG) reports | ✅ | ✅ | +| Restricted access control (RAC) | ✅ | ✅ | +| Restricted content discoverability policy (RCD) | ✅ | ✅ | +| Change history report | ✅ | ✅ | ++++To learn more about these features and how they can prepare your data for Copilot, see: ++- [Microsoft 365 Copilot admin guide for E3 licenses](microsoft-365-copilot-e3-guide.md) +- [Microsoft 365 Copilot admin guide for E5 licenses](microsoft-365-copilot-e5-guide.md) ++To learn more about licensing, see: ++- [Microsoft 365 Copilot licensing](microsoft-365-copilot-licensing.md) +- [Microsoft Purview service description](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-purview-service-description) +- [Microsoft SharePoint Premium - SharePoint Advanced Management licensing](/sharepoint/advanced-management#licensing) ++## More features to help get your data ready for Copilot ++Microsoft continues to invest in features that help you get ready for Copilot. This section describes some more services and features that are available to you. ++### Data Security Posture Management for AI in Microsoft Purview ++[Data Security Posture Management for AI](/purview/ai-microsoft-purview) is a central location that helps you secure data for AI apps and proactively monitor AI use. It has preconfigured policies that focus on AI and reports that give information into AI use within your organization. ++To access Data Security Posture Management for AI (previously called AI Hub), use the following steps: ++1. Sign into the [Microsoft Purview portal](https://purview.microsoft.com/) as an admin in one of the groups listed at [Microsoft Purview Data Security Posture Management for AI - permissions](/purview/ai-microsoft-purview-permissions). +1. Select **Solutions** > **Data Security Posture Management for AI** > **Recommendations**. +1. Create the recommended policies. +1. Select **Reports** to view details of the Copilot interactions. ++To learn more about these policies, see [Data Security Posture Management for AI - one-click policies](/purview/ai-microsoft-purview-considerations#one-click-policies-from-the-ai-hub). ++### Copilot dashboard in Viva Insights ++[Viva Insights](/viva/insights/introduction) provides actionable insights to help your organization get ready to deploy AI, drive adoption, and measure the effect of Copilot. ++The dashboard shows metrics on readiness, adoption, impact, and sentiment. ++1. Open the Teams app. +2. In the Teams vertical toolbar, select the ellipses > **Viva Insights**. +3. On the navigation panel, select **Copilot Dashboard**. ++To learn more, see [Microsoft Copilot Dashboard for Microsoft 365 customers](/viva/insights/org-team-insights/copilot-dashboard). ++### Microsoft Security Copilot ++[Security Copilot](/copilot/security/microsoft-security-copilot) is a natural language, assistive AI experience. It helps support security professionals in various end-to-end scenarios, like incident response, threat hunting, intelligence gathering, posture management, and more. ++Security Copilot integrates with other services that help you manage device and data security, like Microsoft Purview, Microsoft Defender, and Microsoft Intune. ++To learn more, see: ++- [Get started with Microsoft Security Copilot](/copilot/security/get-started-security-copilot) +- [Access training and more technical readiness resources at the Microsoft Security Copilot Adoption hub](https://aka.ms/SecurityCopilot/Adoption) ++## Get started with your E3 or E5 features ++The next step is to start using the features in your license: ++- [Microsoft 365 Copilot admin guide for E3 licenses](microsoft-365-copilot-e3-guide.md) +- [Microsoft 365 Copilot admin guide for E5 licenses](microsoft-365-copilot-e5-guide.md) ++## Related content ++- [Microsoft 365 Copilot licensing](microsoft-365-copilot-licensing.md) +- [Microsoft 365 Copilot admin guide for E3 licenses](microsoft-365-copilot-e3-guide.md) +- [Microsoft 365 Copilot admin guide for E5 licenses](microsoft-365-copilot-e5-guide.md) +- [Microsoft 365 Copilot adoption resources](https://adoption.microsoft.com/copilot) |
microsoft-365-copilot-licensing | Microsoft 365 Copilot Licensing | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-licensing.md | f1.keywords: Previously updated : 09/12/2024 Last updated : 11/19/2024 audience: Admin +appliesto: + - ✅ Microsoft 365 Copilot # Understand licensing requirements for Microsoft 365 Copilot -Microsoft 365 Copilot is available as an [add-on plan](https://www.microsoft.com/microsoft-365/microsoft-copilot) with one of the following licensing prerequisites: +Microsoft 365 Copilot is available as an [add-on plan](https://www.microsoft.com/microsoft-365/microsoft-copilot) with one of the following licensing prerequisites. -**For Business and Enterprise:** +## For Business and Enterprise - **Microsoft 365 plans:** - Microsoft 365 E5 Microsoft 365 Copilot is available as an [add-on plan](https://www.microsoft.com - **Other plans:** - Microsoft ClipChamp -**For Education Faculty and Higher Education Students Aged 18+:** +## For Education Faculty and Higher Education Students Aged 18+ - Microsoft 365 A1* - Microsoft 365 A3* |
microsoft-365-copilot-overview | Microsoft 365 Copilot Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-overview.md | Title: "Microsoft 365 Copilot overview" + Title: What is Microsoft 365 Copilot? f1.keywords: - NOCSH Previously updated : 09/12/2024 Last updated : 11/19/2024 audience: Admin+ ms.localizationpriority: medium-description: Learn how Microsoft 365 Copilot works, how it uses Microsoft Graph to get your organization user data, and the common Copilot features in Microsoft 365 apps, like Word, Excel, PowerPoint, and Teams. +description: Learn about what Microsoft 365 Copilot is and the common Copilot features in Microsoft 365 apps, like Word, Excel, PowerPoint, and Teams. +appliesto: + - ✅ Microsoft 365 Copilot # Microsoft 365 Copilot overview -[Microsoft 365 Copilot](/office365/servicedescriptions/office-365-platform-service-description/microsoft-365-copilot) is an AI-powered productivity tool. +**Microsoft 365 Copilot is an AI-powered productivity tool**. -It provides real-time intelligence that enables users to complete tasks more efficiently, enhance their productivity & skills, and improve their overall work experience. Users get content relevant to their tasks, like drafting, summarizing, and answering questions; all in the context of their work within their Microsoft 365 app. +It provides real-time intelligence that enables users to complete tasks more efficiently, enhance their productivity & skills, and improve their overall work experience. From a business impact perspective, users get content relevant to their work tasks, like drafting, summarizing, and answering questions; all in the context of their work within their Microsoft 365 app. Microsoft 365 Copilot: Microsoft 365 Copilot: - Uses content in Microsoft Graph, like emails, chats, and documents that users have permission to access. - Pairs with the Microsoft 365 productivity apps that you use every day, like Word, Excel, PowerPoint, Outlook, Teams, and others. -To learn more, see: --- [Your new way of working: Microsoft 365 Copilot](https://www.microsoft.com/microsoft-365/blog/2024/03/28/your-new-way-of-working-copilot-for-microsoft-365)-- [Microsoft 365 Copilot intro](https://www.microsoft.com/microsoft-365/business/copilot-for-microsoft-365)--This article describes how Microsoft 365 Copilot works, the components it uses, and the Copilot features in Microsoft 365 apps. --## How Microsoft 365 Copilot works --The following diagram provides a visual representation of how Microsoft 365 Copilot works. ---Let's take a look: --1. Copilot receives an input prompt from a user in a Microsoft 365 app, like Word or PowerPoint. --2. Copilot preprocesses the input prompt using **grounding**. -- Grounding improves the specificity of your prompt, and helps you get answers that are relevant and actionable to your specific task. The prompt can include text from input files or other content Copilot discovers. -- Copilot only accesses data that an individual user is authorized to access, based on, for example, existing Microsoft 365 role-based access controls. Copilot doesn't access data that the user doesn't have permission to access. -- To learn more, see [Data stored about user interactions with Microsoft 365 Copilot](microsoft-365-copilot-privacy.md#data-stored-about-user-interactions-with-microsoft-365-copilot). --3. Copilot sends the grounded prompt to the LLM. The LLM uses the prompt to generate a response that is contextually relevant to the user's task. --4. Copilot takes this response from the LLM and post-processes it. -5. This post-processing includes more grounding calls to Microsoft Graph, responsible AI checks, security, compliance and Purview tasks, and command generation. +To learn more, see: -Copilot returns the response to the app, where the user can review and assess the response. +- [Microsoft 365 Copilot architecture and how it works](microsoft-365-copilot-architecture.md) +- [Microsoft 365 Copilot service description](/office365/servicedescriptions/office-365-platform-service-description/microsoft-365-copilot) -The user's prompt and Copilot's response to that prompt is the **content of interactions**. The record of those interactions is in the user's Copilot interaction history. So, users can review and reuse their previous prompts. +This article describes the different components that Microsoft 365 Copilot uses and the Copilot features in Microsoft 365 apps. To learn more about the architecture and how Copilot works, see [Microsoft 365 Copilot architecture and how it works](microsoft-365-copilot-architecture.md). ## Copilot works with Microsoft 365 apps, Graph, and LLMs To learn more, see [Semantic index for Copilot](/microsoftsearch/semantic-index- Microsoft 365 productivity apps (like Word, Excel, PowerPoint, Outlook, Teams, loop, and more) work with Copilot to support users in the context of their work. > [!TIP]-> To learn how users can use Copilot within Microsoft 365 apps, including sample prompts, see [Copilot Lab](https://copilot.cloud.microsoft/prompts). +> To learn how users can use Copilot within Microsoft 365 apps, including sample prompts, see [Copilot Prompt Gallery](https://copilot.cloud.microsoft/prompts). Some of these features include: Some of these features include: | **OneNote** | **Draft**—Use prompts to draft plans, generate ideas, create lists, and organize information to help you find what you need. | | **Forms** | **Draft**—Use prompts to draft questions and suggestions that help you create surveys, polls, and other forms. | +## Microsoft 365 services that help support Copilot ++In your Microsoft 365 license, there are services and features that can help you get your data and organization ready for Copilot. ++- **SharePoint Advanced Managed (SAM)** ++ Microsoft SharePoint Premium – SharePoint Advanced Management (SAM) can help you reduce oversharing and cleanup inactive sites. These tasks help declutter Copilot's data sources and improve the quality of the responses. ++ To learn more, see [Get ready for Microsoft 365 Copilot with SharePoint Advanced Management (SAM)](/sharepoint/get-ready-copilot-sharepoint-advanced-management). ++- **Restricted SharePoint Search** ++ Restricted SharePoint Search (RSS) RSS gives you time to review and configure the correct permissions on your SharePoint sites. You add the reviewed & corrected sites to an allowed list that Copilot can access. ++ To learn more, see [Restricted SharePoint Search](/sharepoint/restricted-sharepoint-search). ++- **Microsoft Purview** ++ Microsoft Purview can classify and label your data based on the sensitivity of the content. It can also help prevent unauthorized sharing or leakage and review Copilot prompts and responses. ++ To learn more, see [Microsoft Purview data security and compliance protections for generative AI apps](/purview/ai-microsoft-purview). ++To learn more about the features available with your license, see: ++- [Microsoft 365 license feature comparison list for Microsoft 365 Copilot](microsoft-365-copilot-license-feature-overview.md) +- [Microsoft 365 Copilot admin guide for E3 licenses](microsoft-365-copilot-e3-guide.md) +- [Microsoft 365 Copilot admin guide for E5 licenses](microsoft-365-copilot-e5-guide.md) + ## Related content -- [Understand licensing for Microsoft 365 Copilot](microsoft-365-copilot-licensing.md)-- [Get started with Microsoft 365 Copilot](microsoft-365-copilot-setup.md)-- [Read about Data, Privacy, and Security for Microsoft 365 Copilot](microsoft-365-copilot-privacy.md)-- [Learn more about Copilot Lab](https://copilot.cloud.microsoft/prompts)+- [Licensing for Microsoft 365 Copilot](microsoft-365-copilot-licensing.md) +- [Setup and deploy Microsoft 365 Copilot](microsoft-365-copilot-setup.md) +- [Data, Privacy, and Security for Microsoft 365 Copilot](microsoft-365-copilot-privacy.md) +- [Learn about the Copilot Prompt Gallery](https://copilot.cloud.microsoft/prompts) - Watch: - [Copilot system explained by Microsoft](https://www.youtube.com/watch?v=E5g20qmeKpg) |
microsoft-365-copilot-page | Microsoft 365 Copilot Page | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-page.md | +appliesto: + - ✅ Microsoft 365 Copilot # Manage Microsoft 365 Copilot settings in the Microsoft 365 admin center -You can manage Microsoft 365 Copilot through the Microsoft 365 admin center by going to the Settings tab on the Copilot page. Manage how users in your organization interact with Microsoft 365 Copilot, Copilot for Security, and more. +You can manage Microsoft 365 Copilot through the Microsoft 365 admin center by going to the Settings tab on the Copilot page. Manage how users in your organization interact with Microsoft 365 Copilot, Security Copilot, and more. ## Before you begin You can manage Copilot licenses, including assigning and unassigning licenses, f ### Manage how your organization interacts with Microsoft Copilot -For users signed in with a Microsoft Entra account, Microsoft Copilot offers [enterprise data protection](/copilot/microsoft-365/enterprise-data-protection) (EDP) in an experience designed for work and education. Users who aren’t signed in, or are signed in with a personal account, can use the public version of Copilot, accessed primarily through [copilot.microsoft.com](https://copilot.microsoft.com/) and [bing.com/chat](https://bing.com/chat). +For users signed in with a Microsoft Entra account, Microsoft Copilot offers [enterprise data protection](/copilot/microsoft-365/enterprise-data-protection) (EDP) in an experience designed for work and education. Users who aren't signed in, or are signed in with a personal account, can use the public version of Copilot, accessed primarily through [copilot.microsoft.com](https://copilot.microsoft.com/) and [bing.com/chat](https://bing.com/chat). To ensure that users in your organization access Copilot with enterprise data protection for work and education, follow these [instructions on managing Copilot](/copilot/manage). Copilot can reference web content to improve the quality of its responses, but o This link navigates you to the Microsoft Purview compliance portal where you can manage sensitivity labels, retention policies, Copilot interactions, audit records for Copilot, search Copilot interactions, and configure how Microsoft 365 Copilot interacts and references protected documents. Learn more about [how to protect and manage Microsoft 365 Copilot interactions with Microsoft Purview](/purview/ai-microsoft-purview). -### Microsoft Copilot for Security +### Microsoft Security Copilot -This link directs you to the Copilot for Security portal to manage settings. Copilot for Security is a separate product and license from Microsoft 365 Copilot. If purchased, you can use this link to navigate to Copilot for Security settings page. To learn more, see [Copilot for Security](/copilot/security/). +This link directs you to the Security Copilot portal to manage settings. Security Copilot is a separate product and license from Microsoft 365 Copilot. If purchased, you can use this link to navigate to Security Copilot settings page. To learn more, see [Security Copilot](/copilot/security/). ### Microsoft 365 Copilot feedback logs |
microsoft-365-copilot-requirements | Microsoft 365 Copilot Requirements | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-requirements.md | f1.keywords: Previously updated : 09/12/2024 Last updated : 11/19/2024 audience: Admin +appliesto: + - ✅ Microsoft 365 Copilot # Microsoft 365 Copilot requirements The following are the prerequisites for using Microsoft 365 Copilot. Microsoft 3 [Microsoft 365 Apps](/deployoffice/about-microsoft-365-apps) must be deployed. In the Microsoft 365 admin center, use the [Microsoft 365 Apps setup guide](https://admin.microsoft.com/Adminportal/Home?Q=learndocs#/modernonboarding/microsoft365copilotsetupguide) to deploy to your users. > [!NOTE]+> > - For Copilot to work in Word Online, Excel Online, and PowerPoint Online, you need to have third-party cookies enabled. > - Review your privacy settings for Microsoft 365 Apps because those settings might have an effect on the availability of Microsoft 365 Copilot features. For more information, see [Microsoft 365 Copilot and privacy controls for connected experiences](microsoft-365-copilot-privacy.md#microsoft-365-copilot-and-privacy-controls-for-connected-experiences). > - Copilot isn't available when using device-based licensing for Microsoft 365 Apps for enterprise. In addition to [standard Microsoft 365 domains and IPs](/microsoft-365/enterpris - *.bing.com, *.bingapis.com - challenges.cloudflare.com ->[!IMPORTANT] +> [!IMPORTANT] > Several Copilot integrations rely on WebSockets (WSS) to deliver a streamlined user experience. Some customer networks may not be configured to handle WSS connections properly, which may result in Copilot application failures. Typical network configurations that impact WSS include:+> >- WSS protocol is blocked by the network perimeter >- Network devices attempting to perform TLS inspection of connections >- Proxy servers enforcing aggressive connection timeouts In the future, we plan to consolidate Copilot experiences for Microsoft 365 unde ## More resources - [Microsoft 365 Copilot setup guide](https://admin.microsoft.com/Adminportal/Home?Q=learndocs#/modernonboarding/microsoft365copilotsetupguide)-- [Copilot Lab](https://copilot.cloud.microsoft/prompts)+- [Copilot Prompt Gallery](https://copilot.cloud.microsoft/prompts) - [Microsoft 365 Copilot - Microsoft Community Hub](https://techcommunity.microsoft.com/t5/microsoft-365-copilot/ct-p/Microsoft365Copilot) |
microsoft-365-copilot-setup | Microsoft 365 Copilot Setup | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/microsoft-365-copilot-setup.md | Title: "Get your organization and data ready for Microsoft 365 Copilot" + Title: "Set up Microsoft 365 Copilot" f1.keywords: - NOCSH Previously updated : 09/24/2024 Last updated : 11/19/2024 audience: Admin +appliesto: + - ✅ Microsoft 365 Copilot -# Get started with Microsoft 365 Copilot - admin guide +# Set up Microsoft 365 Copilot - admin guide [Microsoft 365 Copilot](microsoft-365-copilot-overview.md) is an AI-powered productivity tool that uses large language models (LLMs). It integrates with your data, with Microsoft Graph, and with Microsoft 365 Apps. It works alongside popular Microsoft 365 Apps, like Word, Excel, PowerPoint, Outlook, Teams, and more. Copilot provides real-time intelligent assistance, enabling users to enhance their creativity, productivity, and skills. -This article covers how IT admins can prepare their organization for Copilot. +This article provides guidance for administrators on preparing their organization for Microsoft 365 Copilot. It covers foundational implementation and readiness activities, licensing, and steps to ensure a secure and compliant deployment. -> [!TIP] -> If you're an end user, then the [Copilot Lab](https://copilot.cloud.microsoft/prompts) is a good resource. --## Before you begin --This section gives an overview of the prerequisites (licensing and admin centers access), and apps that can use Copilot. There might be more requirements at [Microsoft Copilot 365 requirements](microsoft-365-copilot-requirements.md). --### Prerequisites +## Prerequisites - This article uses the following admin centers. These admin centers require a specific role to complete the tasks in the article. - - **[Microsoft 365 admin center](https://admin.microsoft.com)**: There are different roles, depending on the task you need to complete. To learn more about roles, see [Commonly used Microsoft 365 admin center roles](/microsoft-365/admin/add-users/about-admin-roles#commonly-used-microsoft-365-admin-center-roles). + - **[Microsoft 365 admin center](https://admin.microsoft.com)**: There are different roles depending on the task you need to complete. To learn more about roles, see [Commonly used Microsoft 365 admin center roles](/microsoft-365/admin/add-users/about-admin-roles#commonly-used-microsoft-365-admin-center-roles). - **[SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219)**: Sign in as the [SharePoint administrator](/sharepoint/sharepoint-admin-role).- - **[Microsoft Purview portal](https://purview.microsoft.com)**: There are different roles, depending on the task you need to complete. To learn more, see: -+ - **[Microsoft Purview portal](https://purview.microsoft.com)**: There are different roles depending on the task you need to complete. To learn more, see: - [Permissions required to create and manage sensitivity labels](/purview/get-started-with-sensitivity-labels#permissions-required-to-create-and-manage-sensitivity-labels) - [Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview](/defender-office-365/scc-permissions) -- You must have an appropriate **subscription plan to purchase Microsoft 365 Copilot**.-- You can purchase Microsoft 365 Copilot licenses through the [Microsoft 365 admin center](https://admin.microsoft.com) (**Billing** > **Purchase services**), Microsoft partners, or your Microsoft account team. +- You must have an appropriate subscription plan to purchase Microsoft 365 Copilot. Microsoft 365 Copilot licenses are available as an add-on to other licensing plans. To learn more, see [Understand licensing for Microsoft 365 Copilot](microsoft-365-copilot-licensing.md). + You can purchase Microsoft 365 Copilot licenses through the [Microsoft 365 admin center](https://admin.microsoft.com) (**Billing** > **Purchase services**), Microsoft partners, or your Microsoft account team. + - More licenses might be required to use some of the features describes in this article, like Microsoft Purview and SharePoint Advanced Management. To learn more, see: This section gives an overview of the prerequisites (licensing and admin centers - [Microsoft Purview service description](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-purview-service-description) - [Microsoft SharePoint Premium - SharePoint Advanced Management overview](/sharepoint/advanced-management#licensing) -### App requirements --- **Microsoft 365 Apps** - Including desktop applications, like Word, Excel, PowerPoint, Outlook, and Teams. Copilot is available in web versions of the apps when a license is assigned. To get started with the implementation process, see [Deployment guide for Microsoft 365 Apps](/deployoffice/deployment-guide-microsoft-365-apps).--- **OneDrive Account** - You need a OneDrive account for several features within Microsoft 365 Copilot, like saving and sharing your files. For more information, see [Sign in or create an account for OneDrive](https://support.microsoft.com/office/video-sign-in-or-create-an-account-for-onedrive-3adf09fd-90e3-4420-8c4e-b55e2cde40d2?ui=en-us&rs=en-us&ad=us).--- **Outlook for Windows** - For seamless integration of Microsoft 365 Copilot with Outlook, new Outlook (Windows, Mac, Web, Mobile) is recommended. Copilot does support classic Outlook (Windows). You can switch to Outlook Mobile to access the new Outlook experience. For more information, see [Getting started with the new Outlook for Windows](https://support.microsoft.com/office/getting-started-with-the-new-outlook-for-windows-656bb8d9-5a60-49b2-a98b-ba7822bc7627).--- **Microsoft Teams** - To use Microsoft 365 Copilot with Microsoft Teams, you must [download the Teams desktop client or web client](https://www.microsoft.com/microsoft-teams/download-app), or sign into the web app at [https://teams.microsoft.com](https://teams.microsoft.com/). Both the current and the new version of Teams are supported. For more information, see [Microsoft Teams desktop client](/microsoftteams/get-clients?tabs=Windows).-- To enable Copilot in Teams to reference meeting content after the meeting end, transcription or meeting recording must be enabled. To learn more about configuring transcription and recording, see [Configure transcription and captions for Teams meetings](/microsoftteams/meeting-transcription-captions) and [Teams meeting recording](/microsoftteams/meeting-recording). --- **Microsoft Loop** - To use Copilot in Microsoft Loop, you must have Loop enabled for your tenant. For more information on enabling Loop, see [Get started with Microsoft Loop](https://support.microsoft.com/office/get-started-with-microsoft-loop-9f4d8d4f-dfc6-4518-9ef6-069408c21f0c).--- **Microsoft Whiteboard** - To use Microsoft 365 Copilot with Microsoft Whiteboard, you must have Whiteboard enabled for your tenant. To learn more about Microsoft Whiteboard, see [Manage access to Microsoft Whiteboard for your organization](/microsoft-365/whiteboard/manage-whiteboard-access-organizations).--## Step 1 - Optimize search in SharePoint --✅ **Optimize your SharePoint content for search** --When a user makes a request to Copilot, it processes the request and then generates a response with LLMs. LLMs leverage content from Microsoft Graph and web content (optional). --Content in Microsoft Graph includes emails, files, meetings, chats, calendars, and contacts. A significant portion of this data is [stored in SharePoint](/sharepoint/get-ready-copilot-sharepoint-advanced-management#copilot-and-sharepoint). Copilot gathers SharePoint content in the same way SharePoint Search gathers content. --To get the most out of Copilot and get the best results, optimize your SharePoint content for search: --- [Make sure the content can be found](/sharepoint/make-sure-content-can-be-found)-- [Make sure the search results look great](/sharepoint/make-search-results-look-great)-- [Plan your content](/microsoftsearch/plan-your-content)-- Clean up unused sites in [SharePoint admin center](/sharepoint/delete-site-collection#delete-a-site-in-the-new-sharepoint-admin-center) or [with SharePoint Advanced Management](/sharepoint/get-ready-copilot-sharepoint-advanced-management#step-2-clean-up-unused-sites)--Microsoft 365 Copilot allows users to find and access their content through natural language prompting. Copilot ensures data security and privacy by following existing obligations and integrating with your organization's policies. It uses your Microsoft Graph content with the same access controls as other Microsoft 365 services. --To learn more about privacy with Microsoft 365 Copilot, see [Data, Privacy, and Security for Microsoft 365 Copilot](microsoft-365-copilot-privacy.md). --## Step 2 - Apply principles of Just Enough Access --### Prevent oversharing and control access with SharePoint and OneDrive --To get ready for your organization’s Microsoft 365 Copilot adoption, there are a few [highly recommended steps you can take with SharePoint and OneDrive](/sharepoint/get-ready-copilot-sharepoint-advanced-management). --To start, you can: --✅ **Reduce accidental oversharing with SharePoint sharing settings** --To minimize accidental content oversharing with Copilot results, implement sharing settings at the organization and site levels: --1. At the organization level: -- - Update [sharing settings for SharePoint and OneDrive](/sharepoint/turn-external-sharing-on-or-off) for your tenant from organization-wide sharing to specific people links. - - Consider hiding broad-scope permissions from your end users. For example, use the SharePoint `Set-SPOTenant` PowerShell cmdlet to [hide "Everyone Except External Users" in the People Picker control](/powershell/module/sharepoint-online/set-spotenant) so end users can't use it. - - Use [Restricted SharePoint Search (RSS)](/sharepoint/restricted-sharepoint-search) to temporarily restrict Copilot results up to 100 selected SharePoint sites. Child sites of Hub sites aren't counted toward the 100 limit. -- RSS gives you time to review & audit site permissions. It should be used only as a temporary solution to give your organization time to adopt Copilot. --2. Reduce accidental oversharing at the site level: -- - Educate site admins on the site-level controls they can use to [restrict members from sharing](/sharepoint/change-external-sharing-site). - - Make sure that [Site Owners receive a request to access the site](https://support.microsoft.com/office/set-up-and-manage-access-requests-94b26e0b-2822-49d4-929a-8455698654b3). - - [Change the external sharing setting for a user's OneDrive](/sharepoint/user-external-sharing-settings). When a user saves a file to OneDrive, it's in the end user's personal storage. The user has full control over the file and can share it with others. To ensure data security, review OneDrive sharing features. --✅ **Check permissions and site access in SharePoint admin center** --To ensure data is secure, review SharePoint site access and permissions. Prioritize sites that contain sensitive information. --1. In the [SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219), see **Active Sites** > select a site > **Edit** > **Settings**. -- **Private** means that only users in your organization with access to the site can find it. **Public** (default) means anyone in your organization can find the site and access its content. -- :::image type="content" source="media/sharepoint-active-sites-setting.png" alt-text="Screenshot showing the SharePoint admin center active sites panel." lightbox="media/sharepoint-active-sites-setting.png"::: +- To view Microsoft 365 app requirements, see [Microsoft 365 Copilot requirements](microsoft-365-copilot-requirements.md). -1. In the **Membership** tab, review access to site owners, members, and visitors. Ensure that only the necessary users have access to the site. +## Readiness activities -✅ **Identify sites with potentially overshared content and control access** +To ensure a smooth transition to Microsoft 365 Copilot, admins should undertake the following readiness activities: -1. Use the following SharePoint Advanced Management (SAM) activity-based reports to quickly identify the most actively overshared sites: +- **Set up a test environment** Establish a test environment with necessary licenses to validate configurations and test scenarios. +- **Conduct pilot testing** Perform pilot testing with a select group of users to identify any issues and gather feedback. +- **Develop a communication plan** Create a communication plan to inform users about the upcoming changes and provide them with the necessary resources and support. +- **Review Conditional Access policies** Ensure that conditional access policies are appropriately configured. Microsoft 365 Copilot supports tenant-level Conditional Access Policies in SharePoint Online. To learn more, see [Conditional Access](/entra/identity/conditional-access/overview). +- **Review SharePoint Search and Advanced Management Policies** Use SharePoint Advanced Management (SAM) to control access to content, prevent oversharing, and manage content lifecycle. For detailed steps, see [Get ready for Microsoft 365 Copilot with SharePoint Advanced Management (SAM)](/sharepoint/get-ready-copilot-sharepoint-advanced-management). Additionally, consider implementing restricted SharePoint search to limit the discoverability of sensitive content. To learn more, see [Address internal oversharing concerns in Microsoft 365 Copilot deployment blueprint](microsoft-365-copilot-blueprint-oversharing.md). +- **Ensure network compliance** Review and ensure that your network meets the requirements for Microsoft 365 Copilot services. To learn more, see [Microsoft 365 Copilot network requirements](microsoft-365-copilot-requirements.md#network-requirements). - - [Usage of "Everyone Except External Users"](/sharepoint/data-access-governance-reports#content-shared-with-everyone-except-external-users-eeeu-reports) - - [Usage of “People in your organization" sharing links](/sharepoint/data-access-governance-reports#sharing-links-reports) - - [Usage of "Anyone" sharing links](/sharepoint/data-access-governance-reports#sharing-links-reports) +## Security measures -2. [Initiate a Site Access Review](/sharepoint/restricted-access-control) for site owners to confirm overshared content and take remediation steps. SharePoint admins can use the [Restricted Access Control Policy](/sharepoint/restricted-access-control) to restrict access to a site with overshared content. +To ensure a secure and compliant environment for Microsoft 365 Copilot, it's crucial to implement robust security measures. Some key components of this are Multifactor authentication (MFA), audit logging, and restricting sensitive information. These measures help protect against unauthorized access and provide visibility into user and admin activities. -For business-critical sites, there are features in SharePoint Advanced Management and Microsoft Purview you can use: +### Multifactor authentication (MFA) -- Use [Restricted Access Control (RAC)](/sharepoint/restricted-access-control) to proactively protect against oversharing. When you create new sites, configure a RAC policy as part of your custom site provisioning process. This step proactively avoids oversharing.-- Consider blocking downloads from selected sites using a block download policy. For example, [block the download of Teams meeting recordings and transcripts](/microsoftteams/block-download-meeting-recording).-- Apply encryption with "extract rights" enforced on business-critical office documents. To learn more, see [Microsoft Purview data security and compliance protections for generative AI apps](/purview/ai-microsoft-purview).+Multifactor authentication (MFA) is a critical security measure that requires users to provide two or more verification factors to gain access to a resource such as an application or online account. Implementing MFA helps protect against unauthorized access and enhances the security of your organization's data. To learn more, see [Microsoft Entra multifactor authentication](/entra/identity/authentication/concept-mfa-howitworks). -> [!NOTE] -> SharePoint Advanced Management has more features to help you get ready for Copilot fast and at scale. To learn more, see [Get ready for Copilot for Microsoft 365 with SharePoint Advanced Management (SAM)](/sharepoint/get-ready-copilot-sharepoint-advanced-management). +#### Steps to implement MFA -### Sensitivity labels from Microsoft Purview +- **Enable MFA for all users** Ensure that MFA is enabled for all users in your organization. This can be done through the Microsoft 365 admin center. To learn more, see [Set up multifactor authentication for Microsoft 365](/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication). +- **Configure Conditional Access policies** Set up Conditional Access policies to enforce MFA based on user risk, location, and device compliance. For a tutorial, see [Secure user sign-in events with Microsoft Entra multifactor authentication](/entra/identity/authentication/tutorial-enable-azure-mfa). +- **Educate users** Provide training and resources to help users understand the importance of MFA and how to use it effectively. -✅ **Use sensitivity labels to protect your data** +### Audit logging -In the [Microsoft Purview portal](https://purview.microsoft.com), you can create [sensitivity labels](/purview/create-sensitivity-label) (**Information protection** > **Sensitivity labels**). Use these labels to identify how sensitive the data is in your organization. When they're applied to items like documents and emails, the labels add an extra layer of protection and can affect Copilot results. +Audit logging is essential for tracking and monitoring activities within your Microsoft 365 environment. It helps administrators detect and respond to potential security incidents and ensures compliance with regulatory requirements. To learn more, see [Audit logging and monitoring overview](/compliance/assurance/assurance-audit-logging). +#### Steps to implement audit logging -The extra later of protection includes: +- **Enable unified audit logging** Turn on unified audit logging in the Microsoft Purview compliance portal to capture all user and admin activities. +- **Configure audit log retention** Set up retention policies to ensure that audit logs are retained for the required period based on your organization's compliance needs. +- **Monitor and review logs** Regularly monitor and review audit logs to identify any suspicious activities or potential security threats. -- Copilot Business Chat can reference data from different types of items. The sensitivity label with the highest priority is visible to users.+### Restrict sensitive info from Copilot -- If the label applies encryption, Copilot checks the usage rights for the user. For Copilot to return data from that item, the user must be granted permissions to copy from it.+To protect sensitive information during the deployment and use of Microsoft 365 Copilot, follow these steps to identify, assess, and mitigate oversharing risks. These measures will help maintain data security and compliance within your organization: -With sensitivity labels, you can: +- **Identify most popular sites and assess oversharing** Export the top 100 most used sites from the SharePoint admin center and run the SharePoint Advanced Management (SAM) permission state report. To learn more, see [Secure by default with Microsoft Purview and protect against oversharing](/purview/deploymentmodels/depmod-securebydefault-intro). +- **Grant Copilot access to popular, low-risk sites** Cross-reference the report results from SAM and the Microsoft Purview Data Security Posture Management (DSPM) Oversharing posture assessment with the top 100 used sites. +- **Turn on proactive audit and protection** Disable "everyone except external users" (EEEU) at the tenant level and enable Purview Audit to monitor Copilot interaction activity. To learn more, see [Protect your sensitive data with Microsoft Purview](/purview/information-protection). +- **Implement access controls and labeling** Initiate SAM Access Review for all sites that are overshared and apply SAM restricted access control on business-critical sites. To learn more, see [Get ready for Microsoft 365 Copilot with SharePoint Advanced Management (SAM)](/sharepoint/get-ready-copilot-sharepoint-advanced-management). -1. **Create labels or activate default labels**: If you don't already have sensitivity labels, you might be eligible to have some [default labels](/purview/mip-easy-trials#default-sensitivity-labels) automatically created for you, like Public, General, and Confidential. The default labels are suitable for items like files, emails, and meetings. You can modify the default labels and always create your own labels. +For detailed steps, see [Address internal oversharing concerns in Microsoft 365 Copilot deployment blueprint](microsoft-365-copilot-blueprint-oversharing.md). - To learn more, see: +## Get started and deploy - - [Create and configure sensitivity labels and their policies](/purview/create-sensitivity-labels) - - [Default labels and policies to protect your data](/purview/mip-easy-trials) --2. **Define the data sensitivity requirements** and review your SharePoint sites & files in OneDrive. Focus on the most critical repositories and determine the sensitivity of the data on these sites. -- If you're piloting Copilot, deploy Copilot licenses to users who have access to these critical sites. Then, iterate through the rest of your repositories and expand your user base. -- For a more detailed strategy to deploy and drive adoption, see [Step 7 - Deploy to some users and measure adoption](#step-7deploy-to-some-users-and-measure-adoption) (in this article). --3. **Enable and apply sensitivity labels**: [Enable sensitivity labels for files in SharePoint and OneDrive](/purview/sensitivity-labels-sharepoint-onedrive-files). Then, with a publishing label policy, you can configure a default label and users can manually apply your labels. To label at scale, use [autolabeling](/purview/apply-sensitivity-label-automatically) to automatically apply labels based on sensitive information detected. -- For more information about the different ways that you can apply sensitivity labels, see [Common scenarios for sensitivity labels](/purview/get-started-with-sensitivity-labels#common-scenarios-for-sensitivity-labels). -- One of the available labeling methods is to apply sensitivity labels based on content found in documents when you use [data loss prevention (DLP) policies](/purview/dlp-learn-about-dlp). DLP policies can automatically apply sensitivity labels when specific types of information are identified in a document, like personal data that includes addresses, tax information, or passport numbers. -- With DLP policies, you can also: -- - Use the [trainable classifier tool](/purview/trainable-classifiers-get-started-with) to identify categories of content, like source code, financial documents, and HR. - - Set up [endpoint DLP policies](/purview/endpoint-dlp-learn-about) that restrict users from specific actions, like copying content to clipboard or removable USB devices, or printing. --Once applied, the sensitivity labels enforce your protection settings. --To learn more about sensitivity labels, see [Learn about sensitivity labels](/purview/sensitivity-labels). --### Copilot activity and Microsoft Purview --✅ **Audit Copilot activity, create retention policies, and use eDiscovery and communication compliance** --In the [Microsoft Purview portal](https://purview.microsoft.com), you can use the following features to search for specific content and activities that include Copilot prompts and responses. --- **Audit**-- You can search for specific activities, activities performed by specific users, and activities that occurred with a date range. To learn more, see [Learn about auditing solutions in Microsoft Purview](/purview/audit-solutions-overview). --- **Retention policies**-- Configure retention policies to retain the Copilot prompts and responses if this data is needed for compliance reasons, even if users delete their chat history. To learn more, see [Learn about retention for Copilot](/purview/retention-policies-copilot). --- **eDiscovery and communication compliance**-- Use eDiscovery and communication compliance policies to analyze Copilot user prompts and responses. The policies can detect inappropriate or risky interactions, or sharing of confidential information. -- To learn more, see [Microsoft Purview eDiscovery solutions](/purview/ediscovery) and [Configure a communication compliance policy to detect for Copilot interactions](/purview/communication-compliance-copilot?tabs=purview-portal). --> [!TIP] -> To learn more about these Microsoft Purview security and compliance protections for Copilot, and how Microsoft Purview AI Hub can help you more quickly deploy them, see [Microsoft Purview data security and compliance protections for generative AI apps](/purview/ai-microsoft-purview). --## Step 3 - Review app privacy +### Step 1 - Review app privacy ✅ **Review your Microsoft 365 apps privacy settings** The privacy settings in your Microsoft 365 apps can affect the availability of M To learn more, see [Microsoft 365 Copilot and privacy controls for connected experiences](microsoft-365-copilot-privacy.md#microsoft-365-copilot-and-privacy-controls-for-connected-experiences). -## Step 4 - Update channels +### Step 2 - Evaluate data governance maturity and data security controls ++✅ **Use the Microsoft 365 Copilot Optimization Assessment** ++Before deploying Microsoft 365 Copilot, it's essential to evaluate your organization's data governance maturity and data security controls. This can be achieved by completing the [Microsoft 365 Copilot Optimization Assessment](https://www.microsoft.com/solutionassessments/). Based on the outcomes of the assessment, determine your path forward to ensure that your organization is ready for Copilot deployment. ++### Step 3 - Update channels ✅ **Use the Current Channel or Monthly Enterprise Channel to update apps** Your options: There are multiple ways you can manage channels for user devices. To learn more, see [Change update channel of Microsoft 365 to enable Copilot](/deployoffice/updates/change-channel-for-copilot). -## Step 5 - Provision Microsoft 365 Copilot licenses +### Step 4 - Provision Microsoft 365 Copilot licenses ✅ **Assign Copilot licenses using the Microsoft 365 admin center** To learn more, see: - Enable Copilot in your organization at [Enable users for Microsoft 365 Copilot](microsoft-365-copilot-enable-users.md). - You can assign licenses in bulk to [groups of users through the Azure admin center](/entra/identity/users/licensing-groups-assign) or [assign licenses to users with PowerShell](/microsoft-365/enterprise/assign-licenses-to-user-accounts-with-microsoft-365-powershell). For more information, see [Assign Microsoft 365 licenses to users](/microsoft-365/admin/manage/assign-licenses-to-users). -## Step 6 - Configure settings for Copilot +### Step 5 - Configure settings for Copilot ✅ **Configure more Copilot features** You can: - Configure plugins and permissions - Enable the use of web data as grounding data in Copilot -To learn more, see [Manage Microsoft 365 Copilot with the Copilot page](microsoft-365-copilot-page.md). +To learn more, see [Manage Microsoft 365 Copilot settings](microsoft-365-copilot-page.md). -## Step 7 - Deploy to some users and measure adoption +### Step 6 - Deploy to some users and measure adoption ++When you're ready to assign Copilot licenses to your users, there are three phases that you can follow: ++1. **Pilot**: Assign licenses to a small group of users to test the deployment and gather feedback. +2. **Deploy**: Assign licenses to a larger group of users. +3. **Operate**: Monitor usage and adoption, and make adjustments as needed. ++To learn more about these phases, and possible actions you can take in each phase, see the [Microsoft deployment blueprint to address oversharing in Microsoft 365 Copilot](microsoft-365-copilot-privacy.md#committed-to-responsible-ai). ++#### Pilot ✅ **Create a group of early adopters** To help drive adoption, create a group of early adopters. This group can help yo With your established community of early adopters or Champions, they can better speak to their peers within their organization and contextualize the value of Copilot to best suit their needs. This framework also provides IT departments with a scalable way to handle questions through Champions, developing a team of experts across your organization. - To learn more about driving adoption, visit the [Microsoft 365 Copilot adoption hub](https://adoption.microsoft.com/Copilot/). +To learn more about driving adoption, visit the [Microsoft 365 Copilot adoption hub](https://adoption.microsoft.com/Copilot/). ++#### Deploy ++✅ **Fully deploy Copilot licenses to all users in your organization** ++To deploy Copilot licenses to all users in your organization, follow these steps: ++1. Use the Microsoft 365 admin center to assign licenses to individual users or groups of users, depending on your needs. +2. Make sure that all users have the appropriate licenses assigned to them before you begin using Copilot. This will ensure that everyone has access to the features they need and can participate fully in the Copilot experience. ++During this phase, you may also want to: ++- Focus on preventing oversharing by limiting external sharing, restricting access to certain files or folders, and setting up alerts to notify you of any unusual activity. To learn more, see [Site governance, permission, and sharing for site owners](https://support.microsoft.com/office/overview-site-governance-permission-and-sharing-for-site-owners-95e83c3d-e1b0-4aae-9d08-e94dcaa4942e). +- Use sensitivity labels to classify and protect sensitive information. These labels allow you to automatically encrypt files containing sensitive data or restrict access to files marked as "confidential." To learn more, see [Get started with sensitivity labels](/purview/get-started-with-sensitivity-labels). ++#### Operate ✅ **Get insights and user sentiment** -To measure the impact of Copilot on your organization, use the [Copilot Dashboard from Viva Insights](/viva/insights/org-team-insights/copilot-dashboard). Viva Insights gives organizational leaders and IT decision makers insights into readiness, adoption, impact, and user sentiment. +To measure the impact of Copilot on your organization, use the [Copilot Dashboard from Viva Insights](/viva/insights/org-team-insights/copilot-dashboard), and the [Microsoft 365 usage reports in the admin center](/microsoft-365/admin/activity-reports/activity-reports). These tools provide organizational leaders and IT decision makers with insights into readiness, adoption, impact, and user sentiment. To learn more, see: - [Open the Microsoft Copilot Dashboard (Preview) from Viva Insights](https://aka.ms/copilotdashboard) - [Learn more about the Microsoft Copilot Dashboard (Preview) from Viva Insights](/viva/insights/org-team-insights/copilot-dashboard)+- [Microsoft 365 reports in the admin center – Microsoft 365 Copilot usage](/microsoft-365/admin//activity-reports/microsoft-365-copilot-usage) +- [Microsoft 365 reports in the admin center – Microsoft 365 Copilot readiness](/microsoft-365/admin//activity-reports/microsoft-365-copilot-readiness) ++## Copilot with enterprise data protection ++To enhance data security, enable enterprise data protection (EDP) in Copilot for all users in your organization. Follow these steps: ++- **Log in to Copilot** Access Copilot on [copilot.microsoft.com](https://copilot.microsoft.com/) and ensure that enterprise data protection is enabled. +- **Review documentation** Review the [Enterprise Data Protection in Microsoft 365 Copilot documentation](enterprise-data-protection.md) to ensure that EDP is available and properly configured for your users. ## More resources |
pin-copilot | Pin Copilot | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/pin-copilot.md | To learn more about the Microsoft Copilot announcement, see [Frequently asked qu - [Data, Privacy, and Security for Microsoft 365 Copilot](microsoft-365-copilot-privacy.md) - [Microsoft 365 Copilot technical documentation hub](index.yml)-- [Copilot Lab](https://copilot.cloud.microsoft/prompts)+- [Copilot Prompt Gallery](https://copilot.cloud.microsoft/prompts) |
provide-feedback | Provide Feedback | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/provide-feedback.md | +appliesto: + - ✅ Microsoft 365 Copilot # Submit admin-initiated Copilot feedback from the Microsoft 365 admin center To provide feedback to Microsoft on behalf of a user who encountered a problem w :::image type="content" source="media/copilot-feedback-get-started.png" alt-text="Screenshot showing the side pane to get started with submitting user feedback for Copilot." lightbox="media/copilot-feedback-get-started.png"::: -3. Enter the email address of the user who reported the issue. Then, choose the number of rounds of conversations that you’d like to share with Microsoft, and then select **Review**. +3. Enter the email address of the user who reported the issue. Then, choose the number of rounds of conversations that you'd like to share with Microsoft, and then select **Review**. > [!NOTE] > The maximum number of conversations you can share is 30. -4. After a short wait, you’ll receive a JSON file containing the user's conversations with Copilot for the past X interactions (utterance/response pairs) that you select, along with their feedback logs. The file is redacted to protect Microsoft IP, if any. You can use any JSON viewer tool to inspect the data and include additional comments for the feedback. The file will be available for download once it's generated. +4. After a short wait, you'll receive a JSON file containing the user's conversations with Copilot for the past X interactions (utterance/response pairs) that you select, along with their feedback logs. The file is redacted to protect Microsoft IP, if any. You can use any JSON viewer tool to inspect the data and include additional comments for the feedback. The file will be available for download once it's generated. -5. Decide whether or not to move forward with the feedback submission to Microsoft. If you choose to share the data, select **Submit**. If you don’t want to share the data, select **Cancel**. +5. Decide whether or not to move forward with the feedback submission to Microsoft. If you choose to share the data, select **Submit**. If you don't want to share the data, select **Cancel**. -6. If you select, **Submit**, the log files will be sent to Microsoft along with your consent and you’ll see a confirmation message. If you select **Cancel**, no data will be sent to Microsoft, and you’ll see cancellation message. Microsoft doesn’t collect anything before you select **Submit**. +6. If you select, **Submit**, the log files will be sent to Microsoft along with your consent and you'll see a confirmation message. If you select **Cancel**, no data will be sent to Microsoft, and you'll see cancellation message. Microsoft doesn't collect anything before you select **Submit**. 7. Once you select **Submit**, the user who you submitted feedback on behalf of receives an automatic email from Microsoft to inform them about the feedback submission. |
admin | Microsoft 365 Copilot Usage | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/microsoft-365-copilot-usage.md | description: "Learn how to get the Microsoft 365 Copilot usage report and gain i The Microsoft 365 Usage dashboard shows you the activity overview across the Microsoft 365 productivity apps in your organization. It enables you to drill into individual product-level reports to give you more granular insight about the activities within each app. To view all reports, check out the [Reports overview article](activity-reports.md). -In the Microsoft 365 Copilot usage report, which is in continuous enhancement, you can view a summary of how users’ adoption, retention, and engagement are with Microsoft 365 Copilot, and the activity of every Copilot user in your organization. For Copilot activity on a given day, the report becomes available within 72 hours of the end of that day (in UTC). +In the Microsoft 365 Copilot usage report, which is in continuous enhancement, you can view a summary of how users' adoption, retention, and engagement are with Microsoft 365 Copilot, and the activity of every Copilot user in your organization. For Copilot activity on a given day, the report becomes available within 72 hours of the end of that day (in UTC). ## How do I get to the Microsoft 365 Copilot usage report? To learn more about using organizational messages for Microsoft 365 Copilot, see You can also export the report data into an Excel .csv file by selecting the ellipses and then **Export** in the top-right corner. -You can view a table list to show each Microsoft 365 Copilot enabled user’s last activity date among Microsoft 365 Copilot products. +You can view a table list to show each Microsoft 365 Copilot enabled user's last activity date among Microsoft 365 Copilot products. :::image type="content" alt-text="Screenshot showing the activity for the Microsoft 365 Copilot usage report." source="../../media/copilot-usage-last-activity.png" lightbox="../../media/copilot-usage-last-activity.png"::: A user is considered active in a given app if they performed an intentional acti ### What's the difference between the user activity table and audit log? -The audit log data that powers Microsoft Purview solutions, such as AI hub, are built for data security and compliance purposes, and provide comprehensive visibility into Copilot interactions for these use cases (for example, to discover data oversharing risks or to collect interactions for regulatory compliance or legal purposes). They are not, however, intended to be used as the basis for Copilot usage reporting. Any aggregated metrics that customers build on top of this data, such as "prompt count" or "active user count," may not be consistent with the corresponding data points in the official Copilot usage reports provided by Microsoft. Microsoft cannot provide guidance on how to use audit log data as the basis for usage reporting, nor can Microsoft guarantee that aggregated usage metrics built on top of audit log data will match similar usage metrics reported in other tools. +The audit log data that powers Microsoft Purview solutions, such as Data Security Posture Management for AI (prevoius called AI Hub), are built for data security and compliance purposes, and provide comprehensive visibility into Copilot interactions for these use cases (for example, to discover data oversharing risks or to collect interactions for regulatory compliance or legal purposes). They are not, however, intended to be used as the basis for Copilot usage reporting. Any aggregated metrics that customers build on top of this data, such as "prompt count" or "active user count," may not be consistent with the corresponding data points in the official Copilot usage reports provided by Microsoft. Microsoft cannot provide guidance on how to use audit log data as the basis for usage reporting, nor can Microsoft guarantee that aggregated usage metrics built on top of audit log data will match similar usage metrics reported in other tools. To access accurate information on Microsoft 365 Copilot usage, use one of the following reports: the [Microsoft 365 Copilot usage report](microsoft-365-copilot-usage.md) in the Microsoft 365 Admin Center or the [Copilot Dashboard](/viva/insights/org-team-insights/copilot-dashboard) in Viva Insights. To access accurate information on Microsoft 365 Copilot usage, use one of the fo No. Meanwhile, Copilot chat in Outlook usage is counted towards Copilot chat active users. -### What’s the scope of the user-level table? +### What's the scope of the user-level table? The user-level table in the report is configured to show all users who were licensed for Microsoft 365 Copilot at any point over the past 180 days, even if the user has since had the license removed or never had any Copilot active usage. |
admin | Manage Feedback Ms Org | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/manage-feedback-ms-org.md | f1.keywords: Previously updated : 10/21/2024 Last updated : 11/19/2024 audience: Admin The following information only applies to United States government customers usi ### GCC environment - Cloud Policy service for Microsoft 365 is available in this environment as of September 24, 2024.-- Not all products currently support feedback collection in this environment. We anticipate most products will support feedback collection by November 15, 2024. To prepare for this rollout, we recommend you review and configure the policy settings in the way that is appropriate for your organization.+- Not all products currently support feedback collection in this environment, but we're working to implement that support. To prepare for feedback collection, we recommend you review and configure the policy settings in the way that is appropriate for your organization. - When the **Allow users to submit feedback to Microsoft** policy is set to **Not Configured** in this environment, it has the same effect as if you set the policy to **Disabled**. - The Feedback portal and in-product surveys arenΓÇÖt available in this environment, so setting these policies wonΓÇÖt have any effect at this time. - The following policies are always treated as **Disabled** in this environment regardless of how you set the policies: |
admin | Customize Reports | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/usage-analytics/customize-reports.md | You can start by connecting directly to the ODATA reporting APIs from Microsoft 1. Go to **get data** \> **Other** \> **ODATA Feed** \> **Connect**. -2. In the URL window enter "https://<i></i>reports.office.com/pbi/v1.0/\<tenantid\>" +2. In the URL window, enter `https://reports.office.com/pbi/v1.0/<tenantid>`. **NOTE:** The reporting APIs are in preview and are subject to change until they go into production. |
business-premium | M365 Campaigns Setup | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365-campaigns-setup.md | After you have subscribed to Microsoft 365 for Campaigns, your next step is to g ## Before you begin your setup process +[Sign in and set up Microsoft 365 Business Premium](m365-business-premium-setup.md) + Make sure that you meet the following requirements before you begin your setup process: |Requirement|Description| Make sure that you meet the following requirements before you begin your setup p |Permissions|To complete the initial setup process, you must have an appropriate role assigned. [Learn more about admin roles](../admin/add-users/about-admin-roles.md).| |Browser requirements|Microsoft Edge, Safari, Chrome or Firefox. [Learn more about browser requirements](https://www.microsoft.com/microsoft-365/microsoft-365-and-office-resources#coreui-heading-uyetipy).| |Operating systems (client)|**Windows**: Windows 10 or 11 Pro <br/> **macOS**: One of the three most recent versions of macOS|-|Operating systems (servers)|Windows Server or Linux Server <br/> (Requires an additional license, such as [Microsoft Defender for Business servers](../security/defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).)| +|Operating systems (servers)|Windows Server or Linux Server <br/> (Requires an additional license, such as [Microsoft Defender for Business servers](/defender-business/get-defender-business#how-to-get-microsoft-defender-for-business-servers).)| > [!TIP] > For more detailed information about Microsoft 365, Office, and system requirements, see [Microsoft 365 and Office Resources](https://www.microsoft.com/microsoft-365/microsoft-365-and-office-resources). |
business-premium | M365bp Device Groups Mdb | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-device-groups-mdb.md | You can create a new device group while you are in the process of creating or ed 8. On the **Device groups** step, review the list of device groups for the policy. If needed, remove a group from the list. Then choose **Next**. -9. On the **Configuration settings** page, review and edit settings as needed, and then choose **Next**. For more information about these settings, see [Understand next-generation configuration settings in Microsoft Defender for Business](../security/defender-business/mdb-next-gen-configuration-settings.md). +9. On the **Configuration settings** page, review and edit settings as needed, and then choose **Next**. For more information about these settings, see [Understand next-generation configuration settings in Microsoft Defender for Business](/defender-business/mdb-next-generation-protection). 10. On the **Review your policy** step, review all the settings, make any needed edits, and then choose **Create policy** or **Update policy**. |
business-premium | M365bp Device States | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-device-states.md | description: "View device health with Defender for Business in Microsoft 365 Bus # View device status in Microsoft Defender for Business -Microsoft Defender for Business is included with Microsoft 365 Business Premium, as of March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md). +Microsoft Defender for Business is included with Microsoft 365 Business Premium, as of March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](/defender-business/mdb-overview). You can view and monitor device health state by using Defender for Business capabilities. You can view and monitor device health state by using Defender for Business capa ## See also - [View and edit device protection policies](m365bp-view-edit-create-mdb-policies.md)-- [What is Microsoft Defender for Business?](../security/defender-business/mdb-overview.md)+- [What is Microsoft Defender for Business?](/defender-business/mdb-overview) - [Best practices for securing Microsoft 365 for business plans](secure-your-business-data.md) |
business-premium | M365bp Intune Admin Roles In The Mac | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-intune-admin-roles-in-the-mac.md | Before the partner can assign these roles to users, you must add the partner as ## See also -[Resources for Microsoft partners working with small and medium-sized businesses](../security/defender-business/mdb-partners.md) +[Resources for Microsoft partners working with small and medium-sized businesses](/defender-business/mdb-partners) |
business-premium | M365bp Managed Unmanaged Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-managed-unmanaged-devices.md | To protect managed devices, your organization's IT or security team can: - **Use Windows Autopilot to get a user's Windows device ready for first use**. With Autopilot you can install business critical apps, apply policies, and enable features like BitLocker before the device is given to a user. You can also use Autopilot to reset, repurpose, and recover Windows devices. To learn more, see [Windows Autopilot](/mem/autopilot/windows-autopilot). - **Upgrade Windows devices from previous versions of Windows to Windows 10 Pro or Windows 11 Pro**. Before onboarding, Windows client devices should be running Windows 10 Pro or Enterprise, or Windows 11 Pro or Enterprise. If your organization has Windows devices running Windows 7 Pro, Windows 8 Pro, or Windows 8.1 Pro, your Microsoft 365 Business Premium subscription entitles you to upgrade those devices at no additional cost. To learn more, see [Upgrade Windows devices to Windows 10 or 11 Pro](m365bp-upgrade-windows-pro.md).-- **Onboard devices and protect them with [mobile threat defense](../security/defender-business/mdb-mtd.md) capabilities**. Microsoft Defender for Business is included with Microsoft 365 Business Premium. It includes advanced protection from ransomware, malware, phishing, and other threats. If you prefer to use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) instead, you can use Intune to enroll and manage devices. To learn more, see [Onboard devices to Microsoft Defender for Business](m365bp-onboard-devices-mdb.md).+- **Onboard devices and protect them with [mobile threat defense](/defender-business/mdb-mtd) capabilities**. Microsoft Defender for Business is included with Microsoft 365 Business Premium. It includes advanced protection from ransomware, malware, phishing, and other threats. If you prefer to use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) instead, you can use Intune to enroll and manage devices. To learn more, see [Onboard devices to Microsoft Defender for Business](m365bp-onboard-devices-mdb.md). - **View and monitor device health in the Microsoft Defender portal** (<https://security.microsoft.com>). You can view details, such as health state and exposure level for all onboarded devices. You can also take actions, such as running an antivirus scan or starting an automated investigation on a device that has detected threats or vulnerabilities. To learn more, see [Monitor onboarded devices](m365bp-device-states.md) and [Review detected threats](m365bp-review-threats-take-action.md). For their part in protecting managed devices, users can: To learn more about protecting managed devices, see [Set up and secure managed d To protect unmanaged devices, such as BYOD devices, your organization's IT or security team can: -- **Encourage users to keep their antivirus protection turned on and up to date**. Devices should have the latest technology and features needed to protect against new malware and attack techniques. Microsoft regularly releases security intelligence updates and product updates. To learn more, see [Microsoft Defender Antivirus security intelligence and product updates](../security/defender-endpoint/microsoft-defender-antivirus-updates.md).-- **Consider onboarding unmanaged devices and protecting them with [mobile threat defense](../security/defender-business/mdb-mtd.md) capabilities**. Or, if you prefer to use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), you can use Intune to enroll and manage devices. To learn more, see [Onboard devices to Microsoft Defender for Business](m365bp-onboard-devices-mdb.md).+- **Encourage users to keep their antivirus protection turned on and up to date**. Devices should have the latest technology and features needed to protect against new malware and attack techniques. Microsoft regularly releases security intelligence updates and product updates. To learn more, see [Microsoft Defender Antivirus security intelligence and product updates](/defender-endpoint/microsoft-defender-antivirus-updates). +- **Consider onboarding unmanaged devices and protecting them with [mobile threat defense](/defender-business/mdb-mtd) capabilities**. Or, if you prefer to use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), you can use Intune to enroll and manage devices. To learn more, see [Onboard devices to Microsoft Defender for Business](m365bp-onboard-devices-mdb.md). - **View and monitor device health in the Microsoft Defender portal** (<https://security.microsoft.com>). After devices are onboarded to Defender for Business (or Intune), you can view details, such as health state and exposure level for onboarded devices. You can also take actions, such as running an antivirus scan or starting an automated investigation on a device that has detected threats or vulnerabilities. To learn more, see [Monitor onboarded devices](m365bp-device-states.md) and [Review detected threats](m365bp-review-threats-take-action.md). For their part in protecting unmanaged devices, users can: |
business-premium | M365bp Mdb Maintain Environment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-mdb-maintain-environment.md | description: "Keep your systems, devices, user accounts, and security policies u # Monitor and maintain Microsoft 365 Business Premium and Defender for Business -After you have set up and configured [Microsoft 365 Business Premium](m365bp-overview.md) or the standalone version of [Microsoft Defender for Business](../security/defender-business/mdb-overview.md), your next step is to prepare a plan for maintenance and operations. It's important to keep your systems, devices, user accounts, and security policies up to date to help protect against cyberattacks. You can use this article as a guide to prepare your plan. +After you have set up and configured [Microsoft 365 Business Premium](m365bp-overview.md) or the standalone version of [Microsoft Defender for Business](/defender-business/mdb-overview), your next step is to prepare a plan for maintenance and operations. It's important to keep your systems, devices, user accounts, and security policies up to date to help protect against cyberattacks. You can use this article as a guide to prepare your plan. As you prepare your plan, you can organize the various tasks into two main categories, as listed in the following table: As you prepare your plan, you can organize the various tasks into two main categ Security tasks are typically performed by security administrators and security operators. - [Learn more about admin roles](../admin/add-users/about-admin-roles.md)-- [Assign security roles and permissions](../security/defender-business/mdb-roles-permissions.md)+- [Assign security roles and permissions](/defender-business/mdb-roles-permissions) ### Daily security tasks Security tasks are typically performed by security administrators and security o |Task|Description| |||-|**Manage false positives/negatives**|A false positive is an entity, such as a file or a process that was detected and identified as malicious even though the entity isn't actually a threat. A false negative is an entity that wasn't detected as a threat, even though it actually is malicious. False positives/negatives can occur with any threat protection solution, including Microsoft Defender for Office 365 and Microsoft Defender for Business, which are both included in Microsoft 365 Business Premium. Fortunately, steps can be taken to address and reduce these kinds of issues. <br/><br/>For false positives/negatives on devices, see [Address false positives/negatives in Microsoft Defender for Endpoint](../security/defender-endpoint/defender-endpoint-false-positives-negatives.md).<br/><br/>For false positives/negatives in email, see the following articles: <br/>- [How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365](/defender-office-365/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365)<br/>- [How to handle Legitimate emails getting blocked (False Positive), using Microsoft Defender for Office 365](/defender-office-365/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365)| -|**Strengthen your security posture**|Defender for Business includes a vulnerability management dashboard that provides you with exposure score and enables you to view information about exposed devices and see relevant security recommendations. You can use your Defender Vulnerability Management dashboard to reduce exposure and improve your organization's security posture. <br/><br/>See the following articles:<br/>- [Use your vulnerability management dashboard in Microsoft Defender for Business](../security/defender-business/mdb-view-tvm-dashboard.md)<br/>- [Dashboard insights](../security/defender-vulnerability-management/tvm-dashboard-insights.md)| -|**Adjust security policies**|[Reports](../security/defender-business/mdb-reports.md) are available so that you can view information about detected threats, device status, and more. Sometimes it's necessary to adjust your security policies. For example, you might apply strict protection to some user accounts or devices, and standard protection to others. <br/><br/>See the following articles: <br/>- For device protection: [View or edit policies in Microsoft Defender for Business](../security/defender-business/mdb-view-edit-create-policies.md) <br/>- For email protection: [Recommended settings for EOP and Microsoft Defender for Office 365 security](../security/office-365-security/recommended-settings-for-eop-and-office365.md)| +|**Manage false positives/negatives**|A false positive is an entity, such as a file or a process that was detected and identified as malicious even though the entity isn't actually a threat. A false negative is an entity that wasn't detected as a threat, even though it actually is malicious. False positives/negatives can occur with any threat protection solution, including Microsoft Defender for Office 365 and Microsoft Defender for Business, which are both included in Microsoft 365 Business Premium. Fortunately, steps can be taken to address and reduce these kinds of issues. <br/><br/>For false positives/negatives on devices, see [Address false positives/negatives in Microsoft Defender for Endpoint](/defender-endpoint/defender-endpoint-false-positives-negatives).<br/><br/>For false positives/negatives in email, see the following articles: <br/>- [How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365](/defender-office-365/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365)<br/>- [How to handle Legitimate emails getting blocked (False Positive), using Microsoft Defender for Office 365](/defender-office-365/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365)| +|**Strengthen your security posture**|Defender for Business includes a vulnerability management dashboard that provides you with exposure score and enables you to view information about exposed devices and see relevant security recommendations. You can use your Defender Vulnerability Management dashboard to reduce exposure and improve your organization's security posture. <br/><br/>See the following articles:<br/>- [Use your vulnerability management dashboard in Microsoft Defender for Business](/defender-business/mdb-view-tvm-dashboard)<br/>- [Dashboard insights](/defender-vulnerability-management/tvm-dashboard-insights)| +|**Adjust security policies**|[Reports](/defender-business/mdb-reports) are available so that you can view information about detected threats, device status, and more. Sometimes it's necessary to adjust your security policies. For example, you might apply strict protection to some user accounts or devices, and standard protection to others. <br/><br/>See the following articles: <br/>- For device protection: [View or edit policies in Microsoft Defender for Business](/defender-business/mdb-view-edit-create-policies) <br/>- For email protection: [Recommended settings for EOP and Microsoft Defender for Office 365 security](../security/office-365-security/recommended-settings-for-eop-and-office365.md)| |**Analyze admin submissions**|Sometimes it's necessary to submit entities, such as email messages, URLs, or attachments to Microsoft for further analysis. Reporting items can help reduce the occurrence of false positives/negatives and improve threat detection accuracy. <br/><br/>See the following articles: <br/>- [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](../security/office-365-security/submissions-admin.md)<br/>- [Admin review for user reported messages](../security/office-365-security/submissions-admin-review-user-reported-messages.md)|-|**Protect priority user accounts**|Not all user accounts have access to the same company information. Some accounts have access to sensitive information, such as financial data, product development information, partner access to critical build systems, and more. If compromised, accounts that have access to highly confidential information pose a serious threat. We call these types of accounts priority accounts. Priority accounts include (but aren't limited to) CEOs, CISOs, CFOs, infrastructure admin accounts, build system accounts, and more.<br/><br/>See the following articles: <br/>- [Protect your administrator accounts](m365bp-protect-admin-accounts.md) <br/>- [Security recommendations for priority accounts in Microsoft 365](../security/office-365-security/priority-accounts-security-recommendations.md)| -|**Protect high-risk devices**|The overall risk assessment of a device is based on a combination of factors, such as the types and severity of active alerts on the device. As your security team resolves active alerts, approves remediation activities, and suppresses subsequent alerts, the risk level decreases. <br/><br/>See [Manage devices in Microsoft Defender for Business](../security/defender-business/mdb-manage-devices.md).| -|**Onboard or offboard devices**|As devices are replaced or retired, new devices are purchased, or your business needs change, you can onboard or offboard devices from Defender for Business. <br/><br/>See the following articles: <br/>- [Onboard devices to Microsoft Defender for Business](../security/defender-business/mdb-onboard-devices.md) <br/>- [Offboard a device from Microsoft Defender for Business](../security/defender-business/mdb-offboard-devices.md)| +|**Protect priority user accounts**|Not all user accounts have access to the same company information. Some accounts have access to sensitive information, such as financial data, product development information, partner access to critical build systems, and more. If compromised, accounts that have access to highly confidential information pose a serious threat. We call these types of accounts priority accounts. Priority accounts include (but aren't limited to) CEOs, CISOs, CFOs, infrastructure admin accounts, build system accounts, and more.<br/><br/>See the following articles: <br/>- [Protect your administrator accounts](m365bp-protect-admin-accounts.md) <br/>- [Security recommendations for priority accounts in Microsoft 365](/defender-office-365/priority-accounts-security-recommendations)| +|**Protect high-risk devices**|The overall risk assessment of a device is based on a combination of factors, such as the types and severity of active alerts on the device. As your security team resolves active alerts, approves remediation activities, and suppresses subsequent alerts, the risk level decreases. <br/><br/>See [Manage devices in Microsoft Defender for Business](/defender-business/mdb-manage-devices).| +|**Onboard or offboard devices**|As devices are replaced or retired, new devices are purchased, or your business needs change, you can onboard or offboard devices from Defender for Business. <br/><br/>See the following articles: <br/>- [Onboard devices to Microsoft Defender for Business](/defender-business/mdb-onboard-devices) <br/>- [Offboard a device from Microsoft Defender for Business](/defender-business/mdb-offboard-devices)| |**Remediate an item**|Microsoft 365 Business Premium includes several [remediation actions](#remediation-actions-for-devices). Some actions are taken automatically, and others await approval by your security team.<br/><br/>1. In the Microsoft Defender portal (<https://security.microsoft.com>), in the navigation pane, go to **Assets** > **Devices**.<br/><br/>2. Select a device, such as one with a high risk level or exposure level. A flyout pane opens and displays more information about alerts and incidents generated for that item.<br/><br/>3. On the flyout, view the information that is displayed. Select the ellipsis (...) to open a menu that lists available actions.<br/><br/>4. Select an available action. For example, you might choose **Run antivirus scan**, which will cause Microsoft Defender Antivirus to start a quick scan on the device. Or, you could select **Initiate Automated Investigation** to trigger an automated investigation on the device.| ### [**Defender for Business**](#tab/MDB) |Task|Description| |||-|**Manage false positives/negatives**|A false positive is an entity, such as a file or a process that was detected and identified as malicious even though the entity isn't actually a threat. A false negative is an entity that wasn't detected as a threat, even though it actually is malicious. False positives/negatives can occur with any threat protection solution, including Microsoft Defender for Office 365 and Microsoft Defender for Business, which are both included in Microsoft 365 Business Premium. Fortunately, steps can be taken to address and reduce these kinds of issues. <br/><br/>For false positives/negatives on devices, see [Address false positives/negatives in Microsoft Defender for Endpoint](../security/defender-endpoint/defender-endpoint-false-positives-negatives.md).<br/><br/>For false positives/negatives in email, see the following articles: <br/>- [How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365](/defender-office-365/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365)<br/>- [How to handle Legitimate emails getting blocked (False Positive), using Microsoft Defender for Office 365](/defender-office-365/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365)| -|**Strengthen your security posture**|Defender for Business includes a vulnerability management dashboard that provides you with exposure score and enables you to view information about exposed devices and see relevant security recommendations. You can use your Defender Vulnerability Management dashboard to reduce exposure and improve your organization's security posture. <br/><br/>See the following articles:<br/>- [Use your vulnerability management dashboard in Microsoft Defender for Business](../security/defender-business/mdb-view-tvm-dashboard.md)<br/>- [Dashboard insights](../security/defender-vulnerability-management/tvm-dashboard-insights.md)| -|**Adjust security policies**|[Reports](../security/defender-business/mdb-reports.md) are available so that you can view information about detected threats, device status, and more. Sometimes it's necessary to adjust your security policies. For example, you might apply strict protection to some user accounts or devices, and standard protection to others. <br/><br/>See the following articles: <br/>- For device protection: [View or edit policies in Microsoft Defender for Business](../security/defender-business/mdb-view-edit-create-policies.md) <br/>- For email protection: [Recommended settings for EOP and Microsoft Defender for Office 365 security](../security/office-365-security/recommended-settings-for-eop-and-office365.md)| -|**Analyze admin submissions**|Sometimes it's necessary to submit entities, such as email messages, URLs, or attachments to Microsoft for further analysis. Reporting items can help reduce the occurrence of false positives/negatives and improve threat detection accuracy. <br/><br/>See the following articles: <br/>- [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](../security/office-365-security/submissions-admin.md)<br/>- [Admin review for user reported messages](../security/office-365-security/submissions-admin-review-user-reported-messages.md)| -|**Protect priority user accounts**|Not all user accounts have access to the same company information. Some accounts have access to sensitive information, such as financial data, product development information, partner access to critical build systems, and more. If compromised, accounts that have access to highly confidential information pose a serious threat. We call these types of accounts priority accounts. Priority accounts include (but aren't limited to) CEOs, CISOs, CFOs, infrastructure admin accounts, build system accounts, and more.<br/><br/>See the following articles: <br/>- [Protect your administrator accounts](m365bp-protect-admin-accounts.md) <br/>- [Security recommendations for priority accounts in Microsoft 365](../security/office-365-security/priority-accounts-security-recommendations.md)| -|**Protect high-risk devices**|The overall risk assessment of a device is based on a combination of factors, such as the types and severity of active alerts on the device. As your security team resolves active alerts, approves remediation activities, and suppresses subsequent alerts, the risk level decreases. <br/><br/>See [Manage devices in Microsoft Defender for Business](../security/defender-business/mdb-manage-devices.md).| -|**Onboard or offboard devices**|As devices are replaced or retired, new devices are purchased, or your business needs change, you can onboard or offboard devices from Defender for Business. <br/><br/>See the following articles: <br/>- [Onboard devices to Microsoft Defender for Business](../security/defender-business/mdb-onboard-devices.md) <br/>- [Offboard a device from Microsoft Defender for Business](../security/defender-business/mdb-offboard-devices.md)| +|**Manage false positives/negatives**|A false positive is an entity, such as a file or a process that was detected and identified as malicious even though the entity isn't actually a threat. A false negative is an entity that wasn't detected as a threat, even though it actually is malicious. False positives/negatives can occur with any threat protection solution, including Microsoft Defender for Office 365 and Microsoft Defender for Business, which are both included in Microsoft 365 Business Premium. Fortunately, steps can be taken to address and reduce these kinds of issues. <br/><br/>For false positives/negatives on devices, see [Address false positives/negatives in Microsoft Defender for Endpoint](/defender-endpoint/defender-endpoint-false-positives-negatives).<br/><br/>For false positives/negatives in email, see the following articles: <br/>- [How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365](/defender-office-365/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365)<br/>- [How to handle Legitimate emails getting blocked (False Positive), using Microsoft Defender for Office 365](/defender-office-365/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365)| +|**Strengthen your security posture**|Defender for Business includes a vulnerability management dashboard that provides you with exposure score and enables you to view information about exposed devices and see relevant security recommendations. You can use your Defender Vulnerability Management dashboard to reduce exposure and improve your organization's security posture. <br/><br/>See the following articles:<br/>- [Use your vulnerability management dashboard in Microsoft Defender for Business](/defender-business/mdb-view-tvm-dashboard)<br/>- [Dashboard insights](/defender-vulnerability-management/tvm-dashboard-insights)| +|**Adjust security policies**|[Reports](/defender-business/mdb-reports) are available so that you can view information about detected threats, device status, and more. Sometimes it's necessary to adjust your security policies. For example, you might apply strict protection to some user accounts or devices, and standard protection to others. <br/><br/>See the following articles: <br/>- For device protection: [View or edit policies in Microsoft Defender for Business](/defender-business/mdb-view-edit-create-policies) <br/>- For email protection: [Recommended settings for EOP and Microsoft Defender for Office 365 security](/defender-office-365/recommended-settings-for-eop-and-office365)| +|**Analyze admin submissions**|Sometimes it's necessary to submit entities, such as email messages, URLs, or attachments to Microsoft for further analysis. Reporting items can help reduce the occurrence of false positives/negatives and improve threat detection accuracy. <br/><br/>See the following articles: <br/>- [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](/defender-office-365/submissions-admin)<br/>- [Admin review for user reported messages](/defender-office-365/submissions-admin-review-user-reported-messages)| +|**Protect priority user accounts**|Not all user accounts have access to the same company information. Some accounts have access to sensitive information, such as financial data, product development information, partner access to critical build systems, and more. If compromised, accounts that have access to highly confidential information pose a serious threat. We call these types of accounts priority accounts. Priority accounts include (but aren't limited to) CEOs, CISOs, CFOs, infrastructure admin accounts, build system accounts, and more.<br/><br/>See the following articles: <br/>- [Protect your administrator accounts](m365bp-protect-admin-accounts.md) <br/>- [Security recommendations for priority accounts in Microsoft 365](/defender-office-365/priority-accounts-security-recommendations)| +|**Protect high-risk devices**|The overall risk assessment of a device is based on a combination of factors, such as the types and severity of active alerts on the device. As your security team resolves active alerts, approves remediation activities, and suppresses subsequent alerts, the risk level decreases. <br/><br/>See [Manage devices in Microsoft Defender for Business](/defender-business/mdb-manage-devices).| +|**Onboard or offboard devices**|As devices are replaced or retired, new devices are purchased, or your business needs change, you can onboard or offboard devices from Defender for Business. <br/><br/>See the following articles: <br/>- [Onboard devices to Microsoft Defender for Business](/defender-business/mdb-onboard-devices) <br/>- [Offboard a device from Microsoft Defender for Business](/defender-business/mdb-offboard-devices)| |**Remediate an item**|Defender for Business includes several [remediation actions](#remediation-actions-for-devices). Some actions are taken automatically, and others await approval by your security team.<br/><br/>1. In the Microsoft Defender portal (<https://security.microsoft.com>), in the navigation pane, go to **Assets** > **Devices**.<br/><br/>2. Select a device, such as one with a high risk level or exposure level. A flyout pane opens and displays more information about alerts and incidents generated for that item.<br/><br/>3. On the flyout, view the information that is displayed. Select the ellipsis (...) to open a menu that lists available actions.<br/><br/>4. Select an available action. For example, you might choose **Run antivirus scan**, which will cause Microsoft Defender Antivirus to start a quick scan on the device. Or, you could select **Initiate Automated Investigation** to trigger an automated investigation on the device.| If you're new to Microsoft 365, take a moment to get an [Overview of the Microso |Task|Resources to learn more| ||| |Use Windows Autopilot to set up and preconfigure new devices or to reset, repurpose, and recover devices<br/>(*applies to Microsoft 365 Business Premium*)|[Overview of Windows Autopilot](/mem/autopilot/windows-autopilot)|-|View current status of and manage devices|[Manage devices in Microsoft Defender for Business](../security/defender-business/mdb-manage-devices.md)| -|Onboard devices to Defender for Business|[Onboard devices to Defender for Business](../security/defender-business/mdb-onboard-devices.md)| -|Offboard devices from Defender for Business|[Offboard a device from Defender for Business](../security/defender-business/mdb-offboard-devices.md)| +|View current status of and manage devices|[Manage devices in Microsoft Defender for Business](/defender-business/mdb-manage-devices)| +|Onboard devices to Defender for Business|[Onboard devices to Defender for Business](/defender-business/mdb-onboard-devices)| +|Offboard devices from Defender for Business|[Offboard a device from Defender for Business](/defender-business/mdb-offboard-devices)| |Manage devices with Intune|[What does device management with Intune mean?](/mem/intune/fundamentals/what-is-device-management)<br/><br/>[Manage your devices and control device features in Microsoft Intune](/mem/intune/fundamentals/manage-devices)| ### Domains If you're new to Microsoft 365, take a moment to get an [Overview of the Microso ## See also - [Security incident management](m365bp-security-incident-management.md)-- [Reports in Defender for Business](../security/defender-business/mdb-reports.md)+- [Reports in Defender for Business](/defender-business/mdb-reports) - [Microsoft 365 for business security best practices](secure-your-business-data.md) |
business-premium | M365bp Mdb Whats New | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-mdb-whats-new.md | f1.keywords: NOCSH **Applies to:** - [Microsoft 365 Business Premium](m365bp-overview.md)-- [Microsoft Defender for Business](../security/defender-business/mdb-overview.md)+- [Microsoft Defender for Business](/defender-business/mdb-overview) -This article lists new features in the latest release of [Microsoft 365 Business Premium](m365bp-overview.md) and [Microsoft Defender for Business](../security/defender-business/mdb-overview.md). Features that are currently in preview are denoted with **(preview)**. +This article lists new features in the latest release of [Microsoft 365 Business Premium](m365bp-overview.md) and [Microsoft Defender for Business](/defender-business/mdb-overview). Features that are currently in preview are denoted with **(preview)**. ## July 2024 This article lists new features in the latest release of [Microsoft 365 Business ## January 2024 -- **Ability to manage endpoint security subscription settings**. Defender for Business customers who have a mix of subscriptions (such as Defender for Business and Defender for Endpoint Plan 2 licenses) can now change their subscription settings to apply Defender for Endpoint Plan 2 features and capabilities across devices. See [Manage your endpoint security subscription settings across client devices](../security/defender-business/mdb-manage-subscription.md).+- **Ability to manage endpoint security subscription settings**. Defender for Business customers who have a mix of subscriptions (such as Defender for Business and Defender for Endpoint Plan 2 licenses) can now change their subscription settings to apply Defender for Endpoint Plan 2 features and capabilities across devices. See [Manage your endpoint security subscription settings across client devices](/defender-business/mdb-manage-subscription). ## December 2023 -- **Streaming API is now generally available for Defender for Business**. For partners or customers looking to build their own security operations center, the Defender for Endpoint streaming API is now available for Defender for Business and Microsoft 365 Business Premium. See [Use the streaming API with Microsoft Defender for Business](../security/defender-business/mdb-streaming-api.md).+- **Streaming API is now generally available for Defender for Business**. For partners or customers looking to build their own security operations center, the Defender for Endpoint streaming API is now available for Defender for Business and Microsoft 365 Business Premium. See [Use the streaming API with Microsoft Defender for Business](/defender-business/mdb-streaming-api). ## October 2023 -- **Automated attack disruption** capabilities are coming to Defender for Business! Learn how these capabilities can disrupt a human-operated attack almost immediately. See [Automatic attack disruption in Microsoft Defender for Business](../security/defender-business/mdb-attack-disruption.md).+- **Automated attack disruption** capabilities are coming to Defender for Business! Learn how these capabilities can disrupt a human-operated attack almost immediately. See [Automatic attack disruption in Microsoft Defender for Business](/defender-business/mdb-attack-disruption). - **October is Cybersecurity Awareness Month**. See [how we're making it easier for small and medium-sized businesses to stay secure]( https://aka.ms/cybersecuritysmb). This article lists new features in the latest release of [Microsoft 365 Business > [!TIP] > **Read all about the exciting, new capabilities releasing in July 2023 in the [Tech Community blog: New SMB security innovations from Microsoft Inspire 2023](https://aka.ms/SMBSecurityJulyBlog)**. -- **Mobile threat defense is rolling out**. Mobile threat defense includes operating system-level threat and vulnerability management, web protection, and app security. It's not generally available in Defender for Business and Microsoft 365 Business Premium. [Learn more about mobile threat defense](../security/defender-business/mdb-mtd.md).+- **Mobile threat defense is rolling out**. Mobile threat defense includes operating system-level threat and vulnerability management, web protection, and app security. It's not generally available in Defender for Business and Microsoft 365 Business Premium. [Learn more about mobile threat defense](/defender-business/mdb-mtd). -- **Automatic attack disruption** is rolling out. During an ongoing attack, automatic attack disruption capabilities swiftly contain compromised devices to help stop lateral movement within the network and minimize the overall impact of the attack. Automatic attack disruption is included in Defender for Business and Microsoft 365 Business Premium. [Learn more about automatic attack disruption](../security/defender/automatic-attack-disruption.md).+- **Automatic attack disruption** is rolling out. During an ongoing attack, automatic attack disruption capabilities swiftly contain compromised devices to help stop lateral movement within the network and minimize the overall impact of the attack. Automatic attack disruption is included in Defender for Business and Microsoft 365 Business Premium. [Learn more about automatic attack disruption](/defender-xdr/automatic-attack-disruption). -- **Security summary reports** are rolling out. Use these reports to view threats that were prevented by Defender for Business, Microsoft Secure Score status, and recommendations for improving security. See [Reports in Microsoft Defender for Business](../security/defender-business/mdb-reports.md).+- **Security summary reports** are rolling out. Use these reports to view threats that were prevented by Defender for Business, Microsoft Secure Score status, and recommendations for improving security. See [Reports in Microsoft Defender for Business](/defender-business/mdb-reports). -- **Streaming API (preview) is now available for Defender for Business**. For partners or customers looking to build their own security operations center, the Defender for Endpoint streaming API is now in preview for Defender for Business and Microsoft 365 Business Premium. The API supports streaming of device file, registry, network, sign-in events and more to Azure Event Hub, Azure Storage, and Microsoft Sentinel to support advanced hunting and attack detection. See [Use the streaming API (preview) with Microsoft Defender for Business](../security/defender-business/mdb-streaming-api.md).+- **Streaming API (preview) is now available for Defender for Business**. For partners or customers looking to build their own security operations center, the Defender for Endpoint streaming API is now in preview for Defender for Business and Microsoft 365 Business Premium. The API supports streaming of device file, registry, network, sign-in events and more to Azure Event Hub, Azure Storage, and Microsoft Sentinel to support advanced hunting and attack detection. See [Use the streaming API (preview) with Microsoft Defender for Business](/defender-business/mdb-streaming-api). - **Managed detection and response integration with Blackpoint Cyber**. This solution is ideal for customers who don't have the resources to invest in an in-house security operations center and for partners who want to augment their IT team with security experts to investigate, triage, and remediate the alerts generated by Defender for Business and Business Premium. [Learn more bout Blackpoint Cyber](https://aka.ms/BlackpointMSFT). This article lists new features in the latest release of [Microsoft 365 Business ## March 2023 -- **Mobile threat defense (preview) is added to Defender for Business**. The ability to [onboard iOS and Android devices](../security/defender-business/mdb-onboard-devices.md) to the standalone version of Defender for Business is now in preview! These capabilities provide OS-level threat and vulnerability management, web protection, and app security to help you and employees stay more secure on the go. See [Mobile threat defense capabilities in Microsoft Defender for Business](../security/defender-business/mdb-mtd.md).+- **Mobile threat defense (preview) is added to Defender for Business**. The ability to [onboard iOS and Android devices](/defender-business/mdb-onboard-devices) to the standalone version of Defender for Business is now in preview! These capabilities provide OS-level threat and vulnerability management, web protection, and app security to help you and employees stay more secure on the go. See [Mobile threat defense capabilities in Microsoft Defender for Business](/defender-business/mdb-mtd). -- **Monthly security summary report (preview) is added to Defender for Business** (preview). The new monthly security summary report shows how secure your organization is across identity, devices, information, and apps. You can view threats detected (and blocked) by Defender for Business together with your current status from Microsoft Secure Score. Recommendations to improve your security are also provided. See [Reports in Microsoft Defender for Business](../security/defender-business/mdb-reports.md).+- **Monthly security summary report (preview) is added to Defender for Business** (preview). The new monthly security summary report shows how secure your organization is across identity, devices, information, and apps. You can view threats detected (and blocked) by Defender for Business together with your current status from Microsoft Secure Score. Recommendations to improve your security are also provided. See [Reports in Microsoft Defender for Business](/defender-business/mdb-reports). - **Device exposure score is now visible in Microsoft 365 Lighthouse** (preview). Microsoft Cloud Solution Providers (CSPs) who are using [Microsoft 365 Lighthouse](../lighthouse/m365-lighthouse-overview.md) can now view and manage device exposure scores across customer tenants. These capabilities enable partners to discover which customers' devices are at risk because of vulnerabilities. See [Overview of the Vulnerability management page in Microsoft 365 Lighthouse](/microsoft-365/lighthouse/m365-lighthouse-vulnerability-management-page-overview). ## January 2023 -- **Attack surface reduction capabilities are rolling out**. [Attack surface reduction capabilities in Defender for Business](../security/defender-business/mdb-asr.md) include attack surface reduction rules and a new attack surface reduction rules report. Attack surface reduction rules target certain behaviors that are considered risky because they're commonly abused by attackers through malware. In the Microsoft Defender portal (<https://security.microsoft.com>), you can now view a report showing detections and configuration information for attack surface reduction rules. In the navigation pane, choose **Reports**, and under **Endpoints**, choose **Attack surface reduction rules**.+- **Attack surface reduction capabilities are rolling out**. [Attack surface reduction capabilities in Defender for Business](/defender-business/mdb-asr) include attack surface reduction rules and a new attack surface reduction rules report. Attack surface reduction rules target certain behaviors that are considered risky because they're commonly abused by attackers through malware. In the Microsoft Defender portal (<https://security.microsoft.com>), you can now view a report showing detections and configuration information for attack surface reduction rules. In the navigation pane, choose **Reports**, and under **Endpoints**, choose **Attack surface reduction rules**. -- **Default experience for Defender for Business when an enterprise plan is added**. Defender for Business now retains its default experience ([simplified configuration and setup](../security/defender-business/mdb-simplified-configuration.md)) even if an enterprise plan, such as [Defender for Endpoint Plan 2](../security/defender-endpoint/microsoft-defender-endpoint.md) or [Microsoft Defender for Servers Plan 1 or 2](/azure/defender-for-cloud/plan-defender-for-servers) is added. To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions](/microsoft-365/security/defender-business/mdb-faq?#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions)?+- **Default experience for Defender for Business when an enterprise plan is added**. Defender for Business now retains its default experience ([simplified configuration and setup](/defender-business/mdb-setup-configuration)) even if an enterprise plan, such as [Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint) or [Microsoft Defender for Servers Plan 1 or 2](/azure/defender-for-cloud/plan-defender-for-servers) is added. To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions](/microsoft-365/security/defender-business/mdb-faq?#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions)? ## November 2022 -- **[Microsoft Defender for Business servers](../security/defender-business/get-defender-business-servers.md)**, a new add-on for Defender for Business, is now generally available. To learn more, see the following articles:- - [How to get Microsoft Defender for Business servers](../security/defender-business/get-defender-business-servers.md) +- **[Microsoft Defender for Business servers](/defender-business/get-defender-business)**, a new add-on for Defender for Business, is now generally available. To learn more, see the following articles: + - [How to get Microsoft Defender for Business servers](/defender-business/get-defender-business) - [Tech Community Blog: Server security made simple for small businesses](https://techcommunity.microsoft.com/t5/small-and-medium-business-blog/server-security-made-simple-for-small-businesses/ba-p/3648928) -- **License reporting (preview) in Defender for Business**. A new report (rolling out in preview) enables you to view your Defender for Business license usage. To learn more, see [Reports in Microsoft Defender for Business](../security/defender-business/mdb-reports.md).+- **License reporting (preview) in Defender for Business**. A new report (rolling out in preview) enables you to view your Defender for Business license usage. To learn more, see [Reports in Microsoft Defender for Business](/defender-business/mdb-reports). ## July 2022 This article lists new features in the latest release of [Microsoft 365 Business - **Defender for Business** (standalone) is now generally available. To learn more, see the following resources: - [Tech Community blog: Introducing Microsoft Defender for Business](https://techcommunity.microsoft.com/t5/small-and-medium-business-blog/introducing-microsoft-defender-for-business/ba-p/2898701)- - [What is Microsoft Defender for Business?](../security/defender-business/mdb-overview.md) - - [Get Microsoft Defender for Business](../security/defender-business/get-defender-business.md) + - [What is Microsoft Defender for Business?](/defender-business/mdb-overview) + - [Get Microsoft Defender for Business](/defender-business/get-defender-business) ## March 2022 |
business-premium | M365bp Onboard Devices Mdb | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-onboard-devices-mdb.md | -Microsoft 365 Business Premium includes [Microsoft Defender for Business](../security/defender-business/mdb-overview.md), an endpoint security solution for small and medium-sized businesses. Defender for Business provides next-generation protection (antivirus, antimalware, and cloud-delivered protection), firewall protection, web content filtering, and more for your company's devices. Protection is applied when you onboard devices and apply security policies to those devices. +Microsoft 365 Business Premium includes [Microsoft Defender for Business](/defender-business/mdb-overview), an endpoint security solution for small and medium-sized businesses. Defender for Business provides next-generation protection (antivirus, antimalware, and cloud-delivered protection), firewall protection, web content filtering, and more for your company's devices. Protection is applied when you onboard devices and apply security policies to those devices. To onboard devices to Defender for Business, you can choose from several options: This article also includes: - [How to offboard a device](#offboard-a-device) if a device is replaced or someone leaves the organization > [!IMPORTANT]-> If something goes wrong and your onboarding process fails, see [Microsoft Defender for Business troubleshooting](../security/defender-business/mdb-troubleshooting.yml). +> If something goes wrong and your onboarding process fails, see [Microsoft Defender for Business troubleshooting](/defender-business/mdb-troubleshooting). ## Use automatic onboarding for Windows devices that are already enrolled in Intune Note that the automatic onboarding option applies to Windows client devices only > [!TIP] > If you're prompted to use automatic onboarding, we recommend selecting the "all devices enrolled" option. That way, when Windows devices are enrolled in Intune later on, they'll be onboarded to Defender for Business automatically. -To learn more about automatic onboarding, see [Use the wizard to set up Microsoft Defender for Business](../security/defender-business/mdb-use-wizard.md). +To learn more about automatic onboarding, see [Use the wizard to set up Microsoft Defender for Business](/defender-business/mdb-setup-configuration). ## Use a local script to onboard Windows and Mac devices to Defender for Business You can use a local script to onboard Windows and Mac devices. When you run the onboarding script on a device, it creates a trust with Microsoft Entra ID (if that trust doesn't already exist), enrolls the device in Intune (if it isn't already enrolled), and then onboards the device to Defender for Business. You can onboard up to 10 devices at a time using the local script. -See [Onboard devices to Microsoft Defender for Business](../security/defender-business/mdb-onboard-devices.md) for detailed instructions. +See [Onboard devices to Microsoft Defender for Business](/defender-business/mdb-onboard-devices) for detailed instructions. ## Onboard mobile devices using the Microsoft Defender app -You can now onboard Android and iOS devices using the Microsoft Defender app. With [mobile threat defense capabilities in Defender for Business](../security/defender-business/mdb-mtd.md), users download the Microsoft Defender app from Google Play or the Apple App Store, sign in, and complete onboarding steps. +You can now onboard Android and iOS devices using the Microsoft Defender app. With [mobile threat defense capabilities in Defender for Business](/defender-business/mdb-mtd), users download the Microsoft Defender app from Google Play or the Apple App Store, sign in, and complete onboarding steps. -For detailed instructions, see the **Mobile devices** tab in [Onboard devices to Microsoft Defender for Business](../security/defender-business/mdb-onboard-devices.md). +For detailed instructions, see the **Mobile devices** tab in [Onboard devices to Microsoft Defender for Business](/defender-business/mdb-onboard-devices). -To learn more about mobile threat defense, see [Mobile threat defense capabilities in Microsoft Defender for Business](../security/defender-business/mdb-mtd.md). +To learn more about mobile threat defense, see [Mobile threat defense capabilities in Microsoft Defender for Business](/defender-business/mdb-mtd). ## Use Intune to enroll devices See [Device enrollment in Microsoft Intune](/mem/intune/enrollment/device-enroll ## What about servers? -To onboard servers, an additional license, such as Microsoft Defender for Business servers, is required. See [How to get Microsoft Defender for Business servers](../security/defender-business/get-defender-business-servers.md). +To onboard servers, an additional license, such as Microsoft Defender for Business servers, is required. See [How to get Microsoft Defender for Business servers](/defender-business/get-defender-business). ## Run a detection test on a Windows device If you want to offboard a device, use one of the following procedures: 5. Select **Download offboarding package**. We recommend saving the offboarding package to a removable drive. 6. Run the script on each device that you want to offboard. Need help with this task? See the following resources:- - Windows devices: [Offboard Windows devices using a local script](../security/defender-endpoint/configure-endpoints-script.md#offboard-devices-using-a-local-script) - - Mac: [Uninstalling on Mac](../security/defender-endpoint/mac-resources.md#uninstalling) + - Windows devices: [Offboard Windows devices using a local script](/defender-endpoint/configure-endpoints-script#offboard-devices-using-a-local-script) + - Mac: [Uninstalling on Mac](/defender-endpoint/mac-resources#uninstalling) > [!IMPORTANT] > Offboarding a device causes the devices to stop sending data to Defender for Business. However, data received prior to offboarding is retained for up to six (6) months. |
business-premium | M365bp Protect Against Malware Cyberthreats | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-against-malware-cyberthreats.md | This article describes how to increase your threat protection with Microsoft 365 ## 1. Review and apply preset security policies for email and collaboration -Your subscription includes [preset security policies](../security/office-365-security/preset-security-policies.md) that use recommended settings for anti-spam, anti-malware, and anti-phishing protection. By default, built-in protection is enabled; however, consider applying standard or strict protection for increased security. +Your subscription includes [preset security policies](/defender-office-365/preset-security-policies) that use recommended settings for anti-spam, anti-malware, and anti-phishing protection. By default, built-in protection is enabled; however, consider applying standard or strict protection for increased security. :::image type="content" source="media/m365bp-presetsecuritypolicies.png" alt-text="Screenshot of preset security policies." lightbox="media/m365bp-presetsecuritypolicies.png"::: If users are assigned multiple policies, an order of priority is used to apply t Strict protection overrides all other policies, and other policies override built-in protection. -To learn more about preset security policies, see [Preset security policies in EOP and Microsoft Defender for Office 365](../security/office-365-security/preset-security-policies.md). +To learn more about preset security policies, see [Preset security policies in EOP and Microsoft Defender for Office 365](/defender-office-365/preset-security-policies). ### How do I assign preset security policies to users? To assign preset security policies, follow these steps: > [!TIP] > To learn more about assigning preset security policies, see the following articles: >-> - [Use the Microsoft Defender portal to assign Standard and Strict preset security policies to users](../security/office-365-security/preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users) -> - [Recommended settings for email and collaboration content](../security/office-365-security/recommended-settings-for-eop-and-office365.md) (Microsoft 365 Business Premium includes Exchange Online Protection and Microsoft Defender for Office 365 Plan 1) +> - [Use the Microsoft Defender portal to assign Standard and Strict preset security policies to users](/defender-office-365/preset-security-policies#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users) +> - [Recommended settings for email and collaboration content](/defender-office-365/recommended-settings-for-eop-and-office365) (Microsoft 365 Business Premium includes Exchange Online Protection and Microsoft Defender for Office 365 Plan 1) ## 2. Turn on Microsoft Defender for Business -Microsoft 365 Business Premium includes [Defender for Business](../security/defender-business/mdb-overview.md), which provides advanced protection for your organization's devices, including client computers, tablets, and mobile phones. Server protection is also available if you have Microsoft Defender for Business servers. +Microsoft 365 Business Premium includes [Defender for Business](/defender-business/mdb-overview), which provides advanced protection for your organization's devices, including client computers, tablets, and mobile phones. Server protection is also available if you have Microsoft Defender for Business servers. To turn on Defender for Business, you actually initiate the provisioning process. To turn on Defender for Business, you actually initiate the provisioning process 3. Do one of the following steps: - Proceed to [3. Adjust sharing settings for SharePoint and OneDrive files and folders](#3-adjust-sharing-settings-for-sharepoint-and-onedrive-files-and-folders) (recommended) and set up Defender for Business later, when you get to [Mission 6: Secure managed devices with Microsoft 365 Business Premium](m365bp-protect-managed-devices.md).- - [Set up and configure Microsoft Defender for Business](../security/defender-business/mdb-setup-configuration.md) now, and then return to this article to complete the remaining steps. + - [Set up and configure Microsoft Defender for Business](/defender-business/mdb-setup-configuration) now, and then return to this article to complete the remaining steps. ## 3. Adjust sharing settings for SharePoint and OneDrive files and folders If your users are allowed to share their calendars, see [these instructions](htt The [preset security policies](#what-are-preset-security-policies) described earlier in this article provide strong protection for most businesses. However, you're not limited to using preset security policies only. You can define your own custom security policies to suit your company's needs. -For more information about using preset security policies or custom policies, see [Determine your protection policy strategy](../security/office-365-security/mdo-deployment-guide.md#determine-your-protection-policy-strategy). +For more information about using preset security policies or custom policies, see [Determine your protection policy strategy](/defender-office-365/mdo-deployment-guide#determine-your-protection-policy-strategy). -For our recommended policy settings, see the tables in [Recommended settings for EOP and Microsoft Defender for Office 365 security](../security/office-365-security/recommended-settings-for-eop-and-office365.md). +For our recommended policy settings, see the tables in [Recommended settings for EOP and Microsoft Defender for Office 365 security](/defender-office-365/recommended-settings-for-eop-and-office365). To create and configure security policies, see the following articles: -- [Configure anti-malware policies in EOP](../security/office-365-security/anti-malware-policies-configure.md)-- [Configure anti-spam policies in EOP](../security/office-365-security/anti-spam-policies-configure.md)-- [Configure anti-phishing policies in Microsoft Defender for Office 365](../security/office-365-security/anti-phishing-policies-mdo-configure.md)-- [Set up Safe Attachments policies in Microsoft Defender for Office 365](../security/office-365-security/safe-attachments-policies-configure.md)-- [Set up Safe Links policies in Microsoft Defender for Office 365](../security/office-365-security/safe-links-policies-configure.md)+- [Configure anti-malware policies in EOP](/defender-office-365/anti-malware-policies-configure) +- [Configure anti-spam policies in EOP](/defender-office-365/anti-spam-policies-configure) +- [Configure anti-phishing policies in Microsoft Defender for Office 365](/defender-office-365/anti-phishing-policies-mdo-configure) +- [Set up Safe Attachments policies in Microsoft Defender for Office 365](/defender-office-365/safe-attachments-policies-configure) +- [Set up Safe Links policies in Microsoft Defender for Office 365](/defender-office-365/safe-links-policies-configure) ## Next steps |
business-premium | M365bp Protect Managed Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-managed-devices.md | description: "Learn how to secure managed devices from security threats and cybe :::image type="content" source="media/mission6.png" alt-text="Diagram with Set Up and Secure Managed Devices highlighted." lightbox="media/mission6.png"::: -Microsoft 365 Business Premium includes [Microsoft Defender for Business](../security/defender-business/mdb-overview.md) to help protect your organization's devices from ransomware, malware, phishing, and other threats. +Microsoft 365 Business Premium includes [Microsoft Defender for Business](/defender-business/mdb-overview) to help protect your organization's devices from ransomware, malware, phishing, and other threats. > [!NOTE] > This article applies primarily to managed devices. Guidance for protecting unmanaged devices is available here: [Set up unmanaged (BYOD) devices](m365bp-set-up-unmanaged-devices.md). Your tasks are to: ## See also -- [Manage devices in Microsoft Defender for Business](../security/defender-business/mdb-manage-devices.md)+- [Manage devices in Microsoft Defender for Business](/defender-business/mdb-manage-devices) - [Set up a security operations process](m365bp-security-operations-guide.md). - [Learn about security incident management](m365bp-security-incident-management.md). - [Learn how to maintain your environment](m365bp-mdb-maintain-environment.md). |
business-premium | M365bp Review Remediation Actions Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-review-remediation-actions-devices.md | The following table lists remediation actions that are available: |Source|Actions| |||-|[Automated attack disruption](../security/defender-business/mdb-attack-disruption.md) (NEW!)|<ul><li>Contain a device</li><li>Contain a user account on a device</li></ul>| -|[Automated investigations](../security/defender-endpoint/automated-investigations.md)|<ul><li>Quarantine a file/li><li>Remove a registry key/li><li>Kill a process/li><li>Stop a service/li><li>Disable a driver/li><li>Remove a scheduled task</li></ul>| -|[Manual response actions](../security/defender-endpoint/respond-machine-alerts.md)|<ul><li>Run antivirus scan/li><li>Isolate device/li><li>Add an indicator to block or allow a file</li></ul>| -|[Live response](../security/defender-endpoint/live-response.md)|<ul><li>Collect forensic data/li><li>Analyze a file/li><li>Run a script/li><li>Send a suspicious entity to Microsoft for analysis/li><li>Remediate a file/li><li>Proactively hunt for threats</li></ul>| +|[Automated attack disruption](/defender-business/mdb-attack-disruption) (NEW!)|<ul><li>Contain a device</li><li>Contain a user account on a device</li></ul>| +|[Automated investigations](/defender-endpoint/automated-investigations)|<ul><li>Quarantine a file/li><li>Remove a registry key/li><li>Kill a process/li><li>Stop a service/li><li>Disable a driver/li><li>Remove a scheduled task</li></ul>| +|[Manual response actions](/defender-endpoint/respond-machine-alerts)|<ul><li>Run antivirus scan/li><li>Isolate device/li><li>Add an indicator to block or allow a file</li></ul>| +|[Live response](/defender-endpoint/live-response)|<ul><li>Collect forensic data/li><li>Analyze a file/li><li>Run a script/li><li>Send a suspicious entity to Microsoft for analysis/li><li>Remediate a file/li><li>Proactively hunt for threats</li></ul>| |
business-premium | M365bp Review Threats Take Action | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-review-threats-take-action.md | If you have a file that you think was missed or wrongly classified as malware, y [Best practices for securing Microsoft 365 for business plans](secure-your-business-data.md) -[Overview of Microsoft Defender for Business](../security/defender-business/mdb-overview.md) (Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022) +[Overview of Microsoft Defender for Business](/defender-business/mdb-overview) (Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022) |
business-premium | M365bp Security Incident Management | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-security-incident-management.md | Want to see how it works? Watch this short video on a typical incident response. To learn more about incident responses, see the following articles: -- [Review security recommendations](../security/defender-business/mdb-view-tvm-dashboard.md?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json).+- [Review security recommendations](/defender-business/mdb-view-tvm-dashboard?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json). - [Review detected threats and take action](m365bp-review-threats-take-action.md). - [Review remediation actions](m365bp-review-remediation-actions-devices.md).-- [Respond to a compromised email account](../security/office-365-security/responding-to-a-compromised-email-account.md).+- [Respond to a compromised email account](/defender-office-365/responding-to-a-compromised-email-account). |
business-premium | M365bp Security Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-security-overview.md | Microsoft 365 Business Premium includes security, compliance, identity, and mana 6. [Secure Microsoft 365 Copilot](m365bp-secure-copilot.md) > [!TIP]-> If you're a Microsoft partner, see [Resources for Microsoft partners working with small and medium-sized businesses](../security/defender-business/mdb-partners.md) and download our security guide and checklist! +> If you're a Microsoft partner, see [Resources for Microsoft partners working with small and medium-sized businesses](/defender-business/mdb-partners) and download our security guide and checklist! |
business-premium | M365bp Trial Playbook Microsoft Business Premium | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-trial-playbook-microsoft-business-premium.md | When you [start a trial or purchase Microsoft 365 Business Premium](get-microsof > [!TIP] > Save this trial user guide to your browser favorites. When links in the trial user guide take you away from this location, it'll be easier to return to this guide to continue. -1. [Set up your trial](../business-premium/m365-business-premium-setup.md)! +1. [Set up your trial](m365-business-premium-setup.md)! After you start your trial and complete the setup process, it can take up to two hours for changes to take effect. 2. [Turn on multifactor authentication](m365bp-turn-on-mfa.md) (MFA). You can use security defaults to get set up right away, or use Conditional Access policies to meet more stringent requirements. -3. Use your [preset security policies](../security/office-365-security/preset-security-policies.md). These policies represent a baseline protection profile that's suitable for most users. Standard protection includes: +3. Use your [preset security policies](/defender-office-365/preset-security-policies). These policies represent a baseline protection profile that's suitable for most users. Standard protection includes: - - [Safe Links](../security/office-365-security/safe-links-about.md), [Safe Attachments](../security/office-365-security/safe-attachments-about.md) and [Anti-Phishing](../security/office-365-security/anti-phishing-protection-about.md) policies that are scoped to the entire tenant or the subset of users you choose during the trial setup process. (Your trial subscription is for up to 25 users.) + - [Safe Links](/defender-office-365/safe-links-about), [Safe Attachments](/defender-office-365/safe-attachments-about) and [Anti-Phishing](/defender-office-365/anti-phishing-protection-about) policies that are scoped to the entire tenant or the subset of users you choose during the trial setup process. (Your trial subscription is for up to 25 users.) - Protection for productivity apps, such as [SharePoint](/sharepoint/introduction), [OneDrive](/onedrive/one-drive-quickstart-small-business), [Microsoft 365 Apps](/deployoffice/about-microsoft-365-apps), and [Microsoft Teams](/microsoftteams/teams-overview). When you try or buy Microsoft 365 Business Premium, you can use your own domain, ## Onboard and protect devices -Microsoft 365 Business Premium includes Defender for Business, a new security solution to protect devices. See [Onboard devices to Microsoft Defender for Business](../security/defender-business/mdb-onboard-devices.md). +Microsoft 365 Business Premium includes Defender for Business, a new security solution to protect devices. See [Onboard devices to Microsoft Defender for Business](/defender-business/mdb-onboard-devices). 1. Go to the Microsoft Defender portal (<https://security.microsoft.com>) and sign in. -2. Go to **Assets** > **Devices**. If Defender for Business isn't already set up, you're prompted to run the [setup wizard](../security/defender-business/mdb-use-wizard.md). +2. Go to **Assets** > **Devices**. If Defender for Business isn't already set up, you're prompted to run the [setup wizard](/defender-business/mdb-setup-configuration). -3. [Onboard devices](../security/defender-business/mdb-onboard-devices.md). +3. [Onboard devices](/defender-business/mdb-onboard-devices). -4. [Review your security policies](../security/defender-business/mdb-configure-security-settings.md). +4. [Review your security policies](/defender-business/mdb-configure-security-settings). ## Use Microsoft 365 Apps on devices Microsoft 365 Business Premium includes Defender for Business, a new security so 1. Access the Microsoft Defender portal at <https://security.microsoft.com>. -2. Take some time to [familiarize yourself with the portal](../security/defender-business/mdb-get-started.md). +2. Take some time to [familiarize yourself with the portal](/defender-business/mdb-get-started). -3. Now, [assess your security posture](../security/defender/microsoft-secure-score.md), and see how you can improve your score. +3. Now, [assess your security posture](/defender-xdr/microsoft-secure-score), and see how you can improve your score. -4. Learn how to [respond to a security incident](../security/defender-business/mdb-respond-mitigate-threats.md). +4. Learn how to [respond to a security incident](/defender-business/mdb-respond-mitigate-threats). -5. Lastly, [review remediation actions](../security/defender-business/mdb-review-remediation-actions.md). +5. Lastly, [review remediation actions](/defender-business/mdb-review-remediation-actions). ## See also - [Microsoft 365 Business Premium - cybersecurity for small business](m365bp-overview.md)-- [What is Microsoft Defender for Business?](../security/defender-business/mdb-overview.md)+- [What is Microsoft Defender for Business?](/defender-business/mdb-overview) |
business-premium | M365bp View Edit Create Mdb Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-view-edit-create-mdb-policies.md | Microsoft 365 Business Premium includes two main types of policies to protect yo Additional policies include: -- **Web content filtering**, which enables your security team to track and regulate access to websites based on content categories (such as adult content, high bandwidth, legal liability, and leisure). For more information, see [Web content filtering in Microsoft Defender for Business](../security/defender-business/mdb-web-content-filtering.md).-- **Controlled folder access**, which allows only trusted apps to access protected folders on Windows devices. Think of this capability as ransomware protection. For more information, see [Set up or edit your controlled folder access policy in Microsoft Defender for Business](../security/defender-business/mdb-controlled-folder-access.md).-- **Attack surface reduction rules** that help reduce the places and ways your business might be vulnerable to cyberthreats and attacks. For more information, see [Enable your attack surface reduction rules in Microsoft Defender for Business](../security/defender-business/mdb-asr.md).+- **Web content filtering**, which enables your security team to track and regulate access to websites based on content categories (such as adult content, high bandwidth, legal liability, and leisure). For more information, see [Web content filtering in Microsoft Defender for Business](/defender-business/mdb-web-content-filtering). +- **Controlled folder access**, which allows only trusted apps to access protected folders on Windows devices. Think of this capability as ransomware protection. For more information, see [Set up or edit your controlled folder access policy in Microsoft Defender for Business](/defender-business/mdb-controlled-folder-access). +- **Attack surface reduction rules** that help reduce the places and ways your business might be vulnerable to cyberthreats and attacks. For more information, see [Enable your attack surface reduction rules in Microsoft Defender for Business](/defender-business/mdb-asr). These policies are part of Microsoft Defender for Business, included in your Microsoft 365 Business Premium subscription. Information is provided for working with policies in the Microsoft Defender portal or in the Microsoft Intune admin center. The following details apply to working with your policies in the Microsoft Defen 6. On the **Configuration settings** tab, review the settings. If necessary, you can edit the settings for your policy. To get help with this task, see the following articles: - - [Understand next-generation configuration settings](../security/defender-business/mdb-next-generation-protection.md) - - [Firewall settings](../security/defender-business/mdb-firewall.md) + - [Understand next-generation configuration settings](/defender-business/mdb-next-generation-protection) + - [Firewall settings](/defender-business/mdb-firewall) After you have specified your next-generation protection settings, choose **Next**. The following details apply to working with your policies in the Microsoft Defen 4. On the **General information** tab, take the following steps: 1. Specify a name and description. This information will help you and your team identify the policy later on.- 2. Review the policy order, and edit it if necessary. (For more information, see [Policy order](../security/defender-business/mdb-policy-order.md).) + 2. Review the policy order, and edit it if necessary. For more information, see [Policy order](/defender-business/mdb-policy-order). 3. Choose **Next**. 5. On the **Device groups** tab, either create a new device group, or use an existing group. Policies are assigned to devices through device groups. Here are some things to keep in mind: The following details apply to working with your policies in the Microsoft Defen - When you set up your device group, you specify certain criteria, such as the operating system version. Devices that meet the criteria are included in that device group, unless you exclude them. - All device groups, including the default and custom device groups that you define, are stored in Microsoft Entra ID. - To learn more about device groups, see [Device groups in Microsoft Defender for Business](../security/defender-business/mdb-create-edit-device-groups.md). + To learn more about device groups, see [Device groups in Microsoft Defender for Business](/defender-business/mdb-create-edit-device-groups). -6. On the **Configuration settings** tab, specify the settings for your policy, and then choose **Next**. For more information about the individual settings, see [Understand next-generation configuration settings in Microsoft Defender for Business](../security/defender-business/mdb-next-generation-protection.md). +6. On the **Configuration settings** tab, specify the settings for your policy, and then choose **Next**. For more information about the individual settings, see [Understand next-generation configuration settings in Microsoft Defender for Business](/defender-business/mdb-next-generation-protection). 7. On the **Review your policy** tab, review the general information, targeted devices, and configuration settings. |
business-premium | Secure Your Business Data | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/secure-your-business-data.md | description: "Learn best practices to protect your data using Microsoft 365 Busi > [!TIP] > **This article is for small and medium-sized businesses who have up to 300 users**. > If you're looking for information for enterprise organizations, see [Deploy ransomware protection for your Microsoft 365 tenant](../solutions/ransomware-protection-microsoft-365.md).-> If you're a Microsoft partner, see [Resources for Microsoft partners working with small and medium-sized businesses](../security/defender-business/mdb-partners.md). +> If you're a Microsoft partner, see [Resources for Microsoft partners working with small and medium-sized businesses](/defender-business/mdb-partners). Microsoft 365 Business Basic, Standard, and Premium all include antiphishing, antispam, and antimalware protection to protect your email online. Microsoft 365 Business Premium includes even more security capabilities, such as advanced cybersecurity protection for: The following table summarizes how to secure your data using Microsoft 365 for b |- [Conditional Access](m365bp-turn-on-mfa.md) (for more stringent requirements)|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| |**2. Set up and protect your administrator accounts**. See [Protect your admin accounts](m365bp-protect-admin-accounts.md).|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| |**3. Use preset security policies to protect email and collaboration content**. See [Review and apply preset security policies](/microsoft-365/business-premium/m365bp-protect-against-malware-cyberthreats#1-review-and-apply-preset-security-policies-for-email-and-collaboration).|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|-|- [Anti-spam, anti-malware, and anti-phishing protection](../security/office-365-security/eop-about.md) for email|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| -|- [Advanced anti-phishing, spoof settings, impersonation settings, Safe Links, and Safe Attachments](../security/office-365-security/mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) for email and Office documents|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|- [Anti-spam, anti-malware, and anti-phishing protection](/defender-office-365/eop-about) for email|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Advanced anti-phishing, spoof settings, impersonation settings, Safe Links, and Safe Attachments](/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) for email and Office documents|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| |**4. Protect all devices**, including personal and company devices. See [Secure managed and unmanaged devices](m365bp-managed-unmanaged-devices.md).|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| |- [Microsoft 365 Apps](m365bp-users-install-m365-apps.md) (Word, Excel, PowerPoint, and more) installed on users' computers, phones, and tablets|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|| |- [Windows 10 or 11 Pro Upgrade](m365bp-upgrade-windows-pro.md) from Windows 7 Pro, Windows 8 Pro, or Windows 8.1 Pro|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| |- [Advanced threat protection](m365bp-onboard-devices-mdb.md) for users' computers, phones, and tablets|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| |**5. Train everyone on email best practices**. See [Protect yourself against phishing and other attacks](m365bp-avoid-phishing-and-attacks.md).|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|-|- [Anti-spam, anti-malware, and anti-phishing protection](../security/office-365-security/eop-about.md) for email|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| -|- [Advanced threat protection](../security/office-365-security/mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) for email and Office documents|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|- [Anti-spam, anti-malware, and anti-phishing protection](/defender-office-365/eop-about) for email|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Advanced threat protection](/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) for email and Office documents|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| |**6. Use Microsoft Teams for collaboration and sharing**.|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| |- [Microsoft Teams](create-teams-for-collaboration.md) for communication, collaboration, and sharing|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| |- [Safe Links & Safe Attachments](/defender-office-365/mdo-support-teams-about) with Microsoft Teams|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| |
enterprise | Configure Search For Multi Geo | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/configure-search-for-multi-geo.md | With a GET request, you specify the query parameters in the URL. With a POST req #### Sample GET request that's fanned out to **all** geo locations ```http-https:// \<tenant\>/\_api/search/query?querytext='sharepoint'&Properties='EnableMultiGeoSearch:true'&ClientType='my\_client\_id' +https://<tenant>/_api/search/query?querytext='sharepoint'&Properties='EnableMultiGeoSearch:true'&ClientType='my_client_id' ``` #### Sample GET request to fan out to **some** geo locations ```http-https:// \<tenant\>/\_api/search/query?querytext='site'&ClientType='my_client_id'&Properties='EnableMultiGeoSearch:true, MultiGeoSearchConfiguration:[{DataLocation\\:"NAM"\\,Endpoint\\:"https\\://contosoNAM.sharepoint.com"\\,SourceId\\:"B81EAB55-3140-4312-B0F4-9459D1B4FFEE"}\\,{DataLocation\\:"CAN"\\,Endpoint\\:"https\\://contosoCAN.sharepoint-df.com"}]' +https://<tenant>/_api/search/query?querytext='site'&ClientType='my_client_id'&Properties='EnableMultiGeoSearch:true, MultiGeoSearchConfiguration:[{DataLocation\\:"NAM"\\,Endpoint\\:"https\\://contosoNAM.sharepoint.com"\\,SourceId\\:"B81EAB55-3140-4312-B0F4-9459D1B4FFEE"}\\,{DataLocation\\:"CAN"\\,Endpoint\\:"https\\://contosoCAN.sharepoint-df.com"}]' ``` > [!NOTE] |
enterprise | Managing Office 365 Endpoints | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/managing-office-365-endpoints.md | See an IP associated with Microsoft 365 that you want more information on? 1. Check if the IP address is included in a larger published range using a CIDR calculator, such as these for [IPv4](https://www.ipaddressguide.com/cidr) or [IPv6](https://www.ipaddressguide.com/ipv6-cidr). For example, 40.96.0.0/13 includes the IP Address 40.103.0.1 despite 40.96 not matching 40.103. 2. See if a partner owns the IP with a [whois query](https://dnsquery.org/). If it's Microsoft owned, it might be an internal partner. Many partner network endpoints are listed as belonging to the _default_ category, for which IP addresses aren't published. 3. The IP address might not be part of Microsoft 365 or a dependency. Microsoft 365 network endpoint publishing doesn't include all of Microsoft network endpoints.-4. Check the certificate. With a browser, connect to the IP address using *HTTPS://\<IP_ADDRESS\>* and check the domains listed on the certificate to understand what domains are associated with the IP address. If it's a Microsoft-owned IP address and not on the list of Microsoft 365 IP addresses, it's likely the IP address is associated with a Microsoft CDN such as *MSOCDN.NET* or another Microsoft domain without published IP information. If you do find the domain on the certificate is one where we claim to list the IP address, please let us know. +4. Check the certificate. With a browser, connect to the IP address using `https://<IP_address>` and check the domains listed on the certificate to understand what domains are associated with the IP address. If it's a Microsoft-owned IP address and not on the list of Microsoft 365 IP addresses, it's likely the IP address is associated with a Microsoft CDN such as *MSOCDN.NET* or another Microsoft domain without published IP information. If you do find the domain on the certificate is one where we claim to list the IP address, please let us know. ### Some Microsoft 365 URLs point to CNAME records instead of A records in the DNS. What do I have to do with the CNAME records? <a name="bkmk_cname"> </a> |
enterprise | Microsoft 365 Vpn Implement Split Tunnel | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/microsoft-365-vpn-implement-split-tunnel.md | The current Optimize URLs can be found in the table below. Under most circumstan > | | | | > | <https://outlook.office365.com> | TCP 443 | This is one of the primary URLs Outlook uses to connect to its Exchange Online server and has a high volume of bandwidth usage and connection count. Low network latency is required for online features including: instant search, other mailbox calendars, free / busy lookup, manage rules and alerts, Exchange online archive, emails departing the outbox. | > | <https://outlook.office.com> | TCP 443 | This URL is used for Outlook Online Web Access to connect to Exchange Online server, and is sensitive to network latency. Connectivity is particularly required for large file upload and download with SharePoint Online. |-> | `https://\<tenant\>.sharepoint.com` | TCP 443 | This is the primary URL for SharePoint Online and has high-bandwidth usage. | -> | `https://\<tenant\>-my.sharepoint.com` | TCP 443 | This is the primary URL for OneDrive for Business and has high bandwidth usage and possibly high connection count from the OneDrive for Business Sync tool. | +> | `https:/<tenant>.sharepoint.com` | TCP 443 | This is the primary URL for SharePoint Online and has high-bandwidth usage. | +> | `https://<tenant>-my.sharepoint.com` | TCP 443 | This is the primary URL for OneDrive for Business and has high bandwidth usage and possibly high connection count from the OneDrive for Business Sync tool. | > | Teams Media IPs (no URL) | UDP 3478, 3479, 3480, and 3481 | Relay Discovery allocation and real-time traffic. These are the endpoints used for Skype for Business and Microsoft Teams Media traffic (calls, meetings, etc.). Most endpoints are provided when the Microsoft Teams client establishes a call (and are contained within the required IPs listed for the service). Use of the UDP protocol is required for optimal media quality. | In the above examples, **tenant** should be replaced with your Microsoft 365 tenant name. For example, **contoso.onmicrosoft.com** would use _contoso.sharepoint.com_ and _contoso-my.sharepoint.com_. |
enterprise | Modern Desktop Deployment And Management Lab | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/modern-desktop-deployment-and-management-lab.md | The following sections describe the scenarios supported by the lab guides. - [Desktop Deployment series videos from Microsoft Mechanics](https://www.aka.ms/watchhowtoshift) - [Microsoft Configuration Manager OS Deployment](/mem/configmgr/osd/understand/introduction-to-operating-system-deployment) - [Deployment guide for Microsoft 365 Apps](/deployoffice/deployment-guide-microsoft-365-apps)-- [Getting Started with Intune](/intune/get-started-evaluation)+- [Getting Started with Intune](/mem/intune/fundamentals/what-is-intune) ## Related resources |
enterprise | Multitenant Org Faq | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/multitenant-org-faq.md | + + Title: Multitenant orgs FAQ +description: Frequently asked questions regarding multitenant organizations +++++ Last updated : 11/01/2024++++# Multitenant org FAQ ++Read about frequently asked questions for Microsoft multitenant organizations. These frequently asked questions (FAQs) are periodically updated to include new articles. ++## MTO lifecycle ++### How is a multitenant organization (MTO) set-up? ++Administrators create an [MTO](https://techcommunity.microsoft.com/blog/microsoft_365blog/multi-tenant-organization-capabilities-now-available-in-microsoft-365/4122812) in the Microsoft 365 admin center and configure collaboration capabilities for users across the tenants. [MTO configuration](/microsoft-365/enterprise/plan-multi-tenant-org-overview) includes the creation of cross-tenant sync jobs. ++### Are cross-tenant sync jobs auto generated when an MTO is created? ++When an MTO is created or a tenant joins an existing one, cross-tenant sync jobs are autogenerated to enable sync between any existing tenants and the new one. However, these jobs start executing periodically only after a tenant admin shares users to be synced across the MTO. ++### Can existing cross-tenant sync jobs created in the Entra ID portal be used? ++Existing cross-tenant sync jobs with B2B collaboration members can be used instead of the ones automatically created when you set up an MTO. These existing B2B members will be able to use MTO features after the MTO is created.  ++### Can I delete the auto-generated MTO_Sync job created during MTO setup? ++When an MTO is created, it generates cross-tenant sync jobs with the prefix "MTO_Sync" that can be seen in the Entra ID Portal. These jobs can be deleted but then might be recreated automatically, which can be safely ignored. ++### What happens to the cross-tenant sync jobs when a tenant leaves an MTO? ++Cross-tenant sync jobs are unaffected when leaving an MTO. We recommend that administrators review their cross-tenant syncs, [cross-tenant sync setting](/entra/identity/multi-tenant-organizations/cross-tenant-synchronization-overview#cross-tenant-synchronization-setting), and [automatic redemption setting](/entra/identity/multi-tenant-organizations/cross-tenant-synchronization-overview#automatic-redemption-setting) when a tenant leaves an MTO.  ++### What happens when a synced user already exists on as a B2B user on the target tenant? ++B2B guest users won't be affected by the MTO creation and their experience won't change. If you want existing guests to experience MTO features, they need to be [converted](/entra/external-id/user-properties#convert-usertype) to member users.   ++If the user exists as a B2B member, they'll automatically experience MTO capabilities upon MTO creation.  ++### What happens when a synced user already exists as a contact on the target tenant? ++The contact objects remain unaffected by the creation of an MTO or cross-tenant sync jobs. Cross-tenant sync creates B2B member objects which might cause duplicate entries to show when the user is searched for. We recommend cleaning up main contacts before implementing MTO. [Common considerations for multitenant user management in Microsoft Entra ID - Microsoft Entra | Microsoft Learn](/entra/architecture/multi-tenant-common-considerations#issues-with-using-mail-contact-objects-instead-of-external-users-or-members)  ++### Can security groups be synced across tenants? ++While groups can be used to sync users across tenants via Entra cross-tenant sync, the security groups themselves can't be synced across tenants. ++### Can source attributes be mapped to different attributes on the target tenant? ++++Yes, you can [customize](/entra/identity/multi-tenant-organizations/cross-tenant-synchronization-configure#step-9-review-attribute-mappings) your attribute mappings.  ++### How should "Visible to Users" property be set for the cross-tenant sync jobs? ++This setting is available in the cross-tenant sync job properties in the Microsoft Entra ID portal. The property determines if the app shows up on end user portals like myapps.microsoft.com. It's recommended that "Visible to Users" is set to No for sync jobs. ++### Can MTO users register applications in Microsoft Entra ID in other tenants? ++This depends on what roles can register apps. We recommend restricting to the app developer role. ++### Can the access permissions of the MTO user be restricted? ++Use [Conditional Access](/entra/identity/conditional-access/overview) policies to restrict access to MTO users similar to other provisioned users.   ++### Can an MTO be created across worldwide geographies? ++An MTO can span tenants in multiple locations if they are in the **same** cloud. However, an MTO can't be set up between tenants that are located in different cloud environments. For instance, if you have a tenant in the commercial cloud and another in GCCH, creating an MTO between them isn't supported yet. ++### Is MTO available in special clouds? And can I set up MTO between my cloud tenants? ++MTO is available within GCC, GCC-H, and DOD clouds. However, the MTO tenants can ONLY have tenants which are within the **same** cloud.  ++### What is the MTO licensing requirement? ++Use of the multitenant organization feature requires a user to have Microsoft Entra ID P1 licenses or above. For more information, see [Entra multitenant organization licensing requirements](/entra/identity/multi-tenant-organizations/multi-tenant-organization-overview#license-requirements) and [Entra cross-tenant sync licensing requirements](/entra/identity/multi-tenant-organizations/cross-tenant-synchronization-overview#license-requirements).  ++The guiding principle is that one human only needs one license. So, if you're licensed in your home tenant, you don’t need an another license on the resource tenant.   ++## Teams ++### Is cross-tenant sync setup sufficient to leverage MTO functionality on Teams? ++MTO-specific Teams functionality requires an MTO to be set up. [External access](/microsoft-365/enterprise/plan-multi-tenant-org-overview#trusted-organizations-in-external-access) policy setup and [B2B direct connect](/microsoft-365/enterprise/plan-multi-tenant-org-overview#shared-channels-in-multitenant-organizations) policy setup that is part of the MTO setup is essential to leverage MTO functionality on Teams. Learn more about Teams multitenant capabilities [here](https://techcommunity.microsoft.com/t5/microsoft-teams-blog/announcing-more-seamless-collaboration-in-microsoft-teams-for/ba-p/3901092). It's important to keep in mind that these capabilities are only available on the mobile (iOS and Android) and new Teams desktop client. The customers using web client wouldn't see any benefits or optimized experience for MTO.  ++### Do old chats get merged when a user is converted from a B2B guest to a member? ++Old chats aren't merged when a user is converted from a guest to a member. The user still sees the chat thread with B2B members, however, sending new chat messages in that thread is blocked. All search entry points will redirect the user to chat with home tenant ID of the user from broader MTO group and chats going forward won't fragment. ++### Can MTO users create Teams and invite guests on other tenants? ++MTO users can create teams and invite guests from other tenants. ++### Why are some users unable to see their home tenants after a tenant switch to MTO tenant? ++This is a known issue that might impact a small set of users. Microsoft is working on a fix that would be rolling out soon. Reach out to Microsoft support if users in your organization are impacted.  ++### Does MTO work when using Teams on the web? ++Microsoft Teams on the web isn't currently supported in an MTO. However, a version of the Teams web app is being optimized for MTO features in the future. ++### A few users are unable to see all MTO tenants in the drop-down. Is this expected? ++It's possible that some users won’t see all MTO tenants in the account picker drop-down. When this happens, navigate to Accounts and orgs tab in the app settings on the new Teams desktop client. Turn on toggle next to the org you want to show in the account picker.  ++![A screenshot showing toggle for other orgs to show in the account picker.](media/multitenant-org-faq/teams-account-picker.png) ++### Is the org chart and profile picture visible for MTO users? ++The org chart and profile picture are available for MTO users and can be viewed in Teams. We do recommend using cross-tenant sync to sync all user properties including the manager attribute. ++### Is the profile picture visible for MTO users? ++The profile picture is visible for MTO users in Teams. However, it isn't yet available in other clients. The profile picture is made available through a Teams feature and not through cross-tenant sync.  ++### What meeting join experience is offered to users joining a meeting hosted on a different tenant? ++Users are automatically redirected to use their B2B member identity in the meeting host tenant to join the meeting. When tenants have MFA requirements that enforce users to verify their account status, the system might default to their home tenant identity. For such cases, we recommend users change and pick their B2B member account on the host tenant. This can be done on the meeting pre-join screen before joining the meeting.  ++### What chat and meeting artifacts are available to MTO users? ++Users who joined the meeting using their B2B member identity can view meeting chat and other meeting artifacts (including meeting recordings/transcripts) by using their B2B member identity in the meeting host tenant (tenant switch would be required).  ++### Can Teams rooms or conference rooms be booked in an MTO? ++Teams and conference room booking across tenants aren't yet supported in an MTO.   ++### Can I still use Teams Federation with MTO? ++There's no impact on Teams Federation. Customers are still able to chat via that method. MTO would make Teams chat easier by providing a more seamless People search and centralized chat notification experience within the MTO group. ++## SharePoint Online (SPO)  ++### Are org shareable links visible to all MTO users by default? Can this be restricted? ++Org Shareable links or “Anyone in my organization” links are redeemable by all MTO users since MTO users are B2B member users. However, the link would have to be shared with the MTO user somehow, whether that is by chat, email or on a document somewhere etc.  ++### What changes occur in Teams when a B2B guest user is converted to a member after MTO creation? ++When a B2B guest user is converted to a member, they can leverage MTO experiences. Users that previously had guest access to a file don't lose access once their account is converted to a member.  ++### Attributes for some users aren't accurate on the SharePoint sites. Is this a known issue? ++Cached SPUser records in specific SPO/ODC sites or attributes for the user records such as UserType aren't automatically updated from Microsoft Entra ID when changes are made via MTO formation. We currently rely on a timer job to update these records in the short term with a long-term solution for a dynamic sync with Entra in progress. Tenants who formed an MTO before the short-term solution rolled out across all farms may run into access denied issues. If access denied issues are consistently occurring, reach out the Microsoft Support team to initiate the manual process to resolve the gaps.  + |
frontline | Ehr Connector Troubleshoot Setup Configuration | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/ehr-connector-troubleshoot-setup-configuration.md | You can configure a Citrix environment to route certain URLs back to the local m To learn more, see the following Citrix documentation: - [Optimization for Microsoft Teams](https://docs.citrix.com/en-us/citrix-virtual-apps-desktops/multimedia/opt-ms-teams.html)-- [Browser content redirection](https://docs.citrix.com//en-us/citrix-virtual-apps-desktops/multimedia/browser-content-redirection.html)+- [Browser content redirection](https://docs.citrix.com/en-us/citrix-virtual-apps-desktops/multimedia/browser-content-redirection.html) ## Related articles |
frontline | Shifts Custom Wfm Integration | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/shifts-custom-wfm-integration.md | Shifts calls this endpoint for every change (including changes initiated from th The following diagram shows the flow of data. > [!NOTE]-> See [WfiRequest](#wfirequest) in the **Endpoint reference** section of this article for more information on Request and Response models. +> For more information on Request and Response models, see [WfiRequest](#wfirequest) in the **Endpoint reference** section of this article. **Return response code**<br> Any response from the integration, including an error, must have an HTTP response code `200 OK`. The response body must have the status and error message that reflects the appropriate sub call error state. Any response from the integration other than `200 OK` is treated as an error and returned to the caller (client or Microsoft Graph). This endpoint handles requests from Shifts to fetch eligible time-off reasons or The following diagram shows the flow of data. **Return response code**<br> Any response from the integration, including an error, must have an HTTP response code `200 OK`. The response body must include the status and error message that reflects the appropriate sub call error state. Any response from the integration other than `200 OK` is treated as an error and returned to the caller (client or Microsoft Graph). The following example shows a request from Shifts that asks which shifts are eli { "requests": [ {- "id": " SHFT_5e2b51ac-dc47-4a66-83ea-1bbbf81ac029", + "id": "SHFT_5e2b51ac-dc47-4a66-83ea-1bbbf81ac029", "method": "GET", "url": "/shifts/SHFT_5e2b51ac-dc47-4a66-83ea-1bbbf81ac029/requestableShifts?requestType=SwapRequest&startTime=2024-10-01T04:00:00.0000000Z&endTime=2024-11-01T03:59:59.9990000Z" } The following response shows that the shift can be swapped with the shift whose { "responses": [ { - "id": " SHFT_5e2b51ac-dc47-4a66-83ea-1bbbf81ac029", + "id": "SHFT_5e2b51ac-dc47-4a66-83ea-1bbbf81ac029", "status": 200, "body": { "data": ["SHFT_98e96e23-966b-43be-b90d-4697037b67af"], In this example, an error response is returned because the connector couldn't re { "responses": [ {- "id": " SHFT_5e2b51ac-dc47-4a66-83ea-1bbbf81ac029", + "id": "SHFT_5e2b51ac-dc47-4a66-83ea-1bbbf81ac029", "status": 503, "body": { "data": null, See the [Microsoft Graph API v1.0 reference](/graph/api/resources/shift?view=gra The following diagram shows the flow of data. #### Initial sync For the first sync, the connector should read data in your WFM system and write After the first sync, you can choose to: - **Synchronously update Shifts with changes in your WFM system**: Send an update to Shifts for every change made in your WFM system.-- **Asynchronously update Shifts with changes in your WFM system**: Perform a periodic sync by writing all changes that occurred in your WFM system within a certain timeframe (for example, 30 seconds, 10 minutes) to Shifts.+- **Asynchronously update Shifts with changes in your WFM system**: Perform a periodic sync by writing all changes that occurred in your WFM system within a certain timeframe (for example, 10 minutes) to Shifts. All write operations to Shifts, including write operations initiated by the connector, trigger a call to the connectorΓÇÖs /update endpoint. We recommend you include the `X-MS-WFMPassthrough: workforceIntegratonId` header to all write calls so the connector can identify and handle them appropriately. For example, if your WFM system initiated the change, approve it without applying an update to your WFM system. Number of elements in a request: |Property |Type |Description | |||| |id |String|ID of the entity|-|method |String|Use `POST` to create an entity, `PUT` to update an entity, `DELETE` to delete an entity. | +|method |String|`POST` to create an entity, `PUT` to update an entity, `DELETE` to delete an entity. | |url|String|The format is `/{EntityType}/{EntityId}`. Possible values for `{EntityType}` are `shifts`, `swapRequests`, `timeoffReasons`, `openshifts`, `openshiftrequests`, `offershiftrequests`, `timesoff`, `timeOffRequests`. For example, `/shifts/SHFT_12345678-1234-1234-1234-1234567890ab`.| |header|WfiRequestHeader |Header| |body|ShiftsEntity |Must match `{EntityType}` in the **url** property. Use one of [shift](/graph/api/resources/shift?view=graph-rest-1.0), [swapShiftsChangeRequest](/graph/api/resources/swapshiftschangerequest?view=graph-rest-1.0), [timeOffReason](/graph/api/resources/timeoffreason?view=graph-rest-1.0), [openshift](/graph/api/resources/openshift?view=graph-rest-1.0), [openShiftChangeRequest](/graph/api/resources/openshiftchangerequest?view=graph-rest-beta), [offerShiftRequests](/graph/api/resources/offershiftrequest?view=graph-rest-1.0), [timeOff](/graph/api/resources/timeoff?view=graph-rest-1.0), [timeOffRequest](/graph/api/resources/timeoffrequest?view=graph-rest-1.0). For example, `/shifts/SHFT_12345678-1234-1234-1234-1234567890ab`.| -#### For POST /teams/{teamsId}/read +##### For POST /teams/{teamsId}/read |Property |Type |Description | |||| |id |String|ID of the entity|-|method |Is always `GET`.| +|method |String|Is always `GET`.| |url|String|<ul><li>**TimeOffReasons**: The format is `/users/{userId}/timeOffReasons?requestType=TimeOffReason`. For example, `/users/aa162a04-bec6-4b81-ba99-96caa7b2b24d/timeOffReasons?requestType=TimeOffReason`.</li><li>**SwapRequest**: The format is `/shifts/{ShiftsId}/requestableShifts?requestType=SwapRequest\u0026startTime={startTime}\u0026endTime={endTime}`. For example, `shifts/SHFT_1132430e-365e-4dc5-b8b0-b800592a81a8/requestableShifts?requestType=SwapRequest\u0026startTime=2024-10-01T07:00:00.0000000Z\u0026endTime=2024-11-01T06:59:59.9990000Z`. </li></ul>| |header|WfiRequestHeader |Header| |body|ShiftsEntity |Is always `null`.| Number of elements in a request: |Property |Type |Description | |||| |id|String|ID of the entity|-|method|String|The method being invoked on this item. For example, POST, PUT.| |status|String|Result of the operation| |body|WfiResponseBody|WfiResponseBody| -#### WfiResponse +#### WfiResponseBody |Property |Type |Description | |||| |
frontline | Switch From Enterprise To Frontline | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/switch-from-enterprise-to-frontline.md | Here's some differences to be aware when using Microsoft 365 for the web. For a |Service or feature|Some differences |Learn more| ||||-|**Word for the web**|<ul><li> Can open and edit macro-enabled documents (.docm) and templates (.dotm) but macros don't run.</li><li>Can open but not edit Information Rights Management (IRM)-protected documents.</li></ul>|<ul><li>[Word for the web service description](/office365/servicedescriptions/office-online-service-description/word-online)</li><li>[Word Features Comparison: Web vs Desktop](https://support.microsoft.com//office/differences-between-using-a-document-in-the-browser-and-in-word-3e863ce3-e82c-4211-8f97-5b33c36c55f8)</li></ul>| +|**Word for the web**|<ul><li> Can open and edit macro-enabled documents (.docm) and templates (.dotm) but macros don't run.</li><li>Can open but not edit Information Rights Management (IRM)-protected documents.</li></ul>|<ul><li>[Word for the web service description](/office365/servicedescriptions/office-online-service-description/word-online)</li><li>[Word Features Comparison: Web vs Desktop](https://support.microsoft.com/office/differences-between-using-a-document-in-the-browser-and-in-word-3e863ce3-e82c-4211-8f97-5b33c36c55f8)</li></ul>| |**Excel for the web**|<ul><li>Can open and edit macro-enabled workbooks (.xlsm) but macros don't run.</li><li>[File size limitations](https://support.microsoft.com/office/file-size-limits-for-workbooks-in-sharepoint-9e5bc6f8-018f-415a-b890-5452687b325e)<ul><li>To view or interact with a workbook stored in SharePoint Online, the workbook must be less than 100 MB.</li><li>To open a workbook that's attached to an email message in Outlook on the web, the workbook must be less than 10 MB.</li></ul></ul>|<ul><li>[Excel for the web service description](/office365/servicedescriptions/office-online-service-description/excel-online)</li><li>[Differences between using a workbook in the browser and in Excel](https://support.microsoft.com/office/differences-between-using-a-workbook-in-the-browser-and-in-excel-f0dc28ed-b85d-4e1d-be6d-5878005db3b6)</li><li>Most Excel functions work in a browser as they do in Excel. For a list of exceptions, see [Functions in Excel and in Excel for the web](https://support.microsoft.com/office/differences-between-using-a-workbook-in-the-browser-and-in-excel-f0dc28ed-b85d-4e1d-be6d-5878005db3b6#__functions).</li></ul>| |**OneNote for the web**|<ul><li>Search is limited to the current section.</li><li>Zoom in and out isn't available. Instead, users can use their browser's zoom feature.</li></ul>|<ul><li>[OneNote for the web service description](/office365/servicedescriptions/office-online-service-description/onenote-online)</li><li>[Differences between using a notebook in the browser and in OneNote](https://support.microsoft.com/office/differences-between-using-a-notebook-in-the-browser-and-in-onenote-a3d1fc13-ac74-456b-b391-b633a62aa83f)</li></ul>| |**PowerPoint for the web**|<ul><li>Can open files up to 2 GB.</li><li>Can open and edit macro-enabled presentations (.pptm, .potm, .ppam, .potx, .ppsm) but macros don't run.</li></ul>|<ul><li>[PowerPoint for the web service description](/office365/servicedescriptions/office-online-service-description/powerpoint-online)</li><li>[How certain features behave in web-based PowerPoint](https://support.microsoft.com/office/how-certain-features-behave-in-web-based-powerpoint-a931f0c8-1305-4428-8f7c-9cfa00ef28c5)</li></ul>| |
lighthouse | M365 Lighthouse Copilot Insights Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-copilot-insights-overview.md | description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthous > [!NOTE] > We're continuously enhancing Copilot insights. Let us know what improvements you'd like us to make to this feature to help you drive and manage Microsoft 365 Copilot usage by providing feedback. In <a href="https://go.microsoft.com/fwlink/p/?linkid=2168110" target="_blank">Lighthouse</a>, select the **Give feedback** widget in the lower-right corner of any page, or go to the [Microsoft 365 Lighthouse feedback page](https://aka.ms/m365lighthouseuservoice). -Copilot insights help you easily manage and monitor Microsoft 365 Copilot success across your customer tenants—from a single **Copilot insights** page in Lighthouse. In addition to recommending customers who are likely to benefit from Copilot, the page shows Copilot usage and license assignments, Copilot adoption insights, and links to key resources to help you become a Copilot expert, including Copilot Lab, learning paths, training videos, the latest Copilot product updates, and more. The page also provides links to resources that you can share with your customers to help them succeed with Copilot. +Copilot insights help you easily manage and monitor Microsoft 365 Copilot success across your customer tenants—from a single **Copilot insights** page in Lighthouse. In addition to recommending customers who are likely to benefit from Copilot, the page shows Copilot usage and license assignments, Copilot adoption insights, and links to key resources to help you become a Copilot expert, including Copilot Prompt Gallery, learning paths, training videos, the latest Copilot product updates, and more. The page also provides links to resources that you can share with your customers to help them succeed with Copilot. ## Access Copilot insights |
lighthouse | M365 Lighthouse Overview Of Permissions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-overview-of-permissions.md | The following table provides an overview of each Lighthouse RBAC role. For a lis | Lighthouse RBAC role | Overview | ||| | Account Manager | Account Managers have full access to Sales Advisor pages and data across the entire partner tenant.<br><br>Account Managers can export Sales Advisor data. |-| Administrator | Administrators have full administrative permissions in Lighthouse. <br><br>Administrators can manage RBAC and GDAP permissions and can create baselines, tags, and alerts.<br><br>Administrators are automatically assigned the Privileged Role Administrator, User Administrator, and Group Administrator roles in Microsoft Entra ID and the Admin Agent role in Partner Center. | +| Administrator | Administrators have full administrative permissions in Lighthouse. <br><br>Administrators can manage RBAC and GDAP permissions, view audit logs, and create baselines, tags, and alerts.<br><br>Administrators are automatically assigned the Privileged Role Administrator, User Administrator, and Group Administrator roles in Microsoft Entra ID and the Admin Agent role in Partner Center. | +| Author | Authors can manage tenants, tags, alert rules, and baselines to deploy tenant configurations. | | Operator | Operators manage customer tenants in Lighthouse based on the GDAP permissions assigned to them for each customer tenant that they manage.<br><br>Operators can view high-level customer tenant status and manage alerts.<br><br>Lighthouse users who hold at least one Microsoft Entra role are automatically assigned the Operator role.<br><br>**Note:** Lighthouse Administrators can use templates on the **Delegated access** page to assign GDAP permissions to Lighthouse users. | | Reader | Readers have read-only access to data in Lighthouse.<br><br>Lighthouse Readers can view high-level customer tenant status and alerts. | The following table provides an overview of each Lighthouse RBAC role. For a lis The following table describes the actions that each Lighthouse RBAC role can perform in Lighthouse. For some actions, you need to hold a Microsoft Entra role in addition to a Lighthouse RBAC role. For other actions, only a Microsoft Entra role is required. Microsoft Entra role requirements are indicated in the last column of the table. For a complete list of Microsoft Entra roles and the actions they can perform, see [Microsoft Entra built-in roles](/azure/active-directory/roles/permissions-reference). -| Area | Actions | Account Manager | Administrator | Operator | Reader | Need Microsoft Entra role? | -|||::|::|::|::|::| -| **Home page** | View data on cards | | | | | Yes | -| | Add users | | | | | Yes | -| | Reset password | | | | | Yes | -| | Offboard users | | | | | Yes | -| **Alerts** | View alerts and alert rules | ✓ | ✓ | | ✓ | No | -| | Manage alerts (change severity, status, or assignment) | | ✓ | | | No | -| | Create, edit, and delete alert rules | | ✓ | | | No | -| **Copilot insights** | View opportunities and adoption data | | | | | Yes| -| **Tenants** | View the **Tenants** page | ✓ | ✓ | ✓ | ✓ | No | -| | View tenant details | | | | | Yes | -| | Export data | ✓ | ✓ | ✓ | ✓ | No | -| | View tags | ✓ | ✓ | ✓ | ✓ | No | -| | Create, update, and delete tags in Lighthouse | | ✓ | | | No | -| | Assign and remove tags from tenants | | ✓ | | | No | -| | Activate and inactivate a tenant | | ✓ | | | No | -| | View delegated access status | ✓ | ✓ | ✓ | ✓ | No | -| | View Microsoft Secure Score | | | | | Yes | -| | View baseline assignments | ✓ | ✓ | ✓ | ✓ | No | -| | View deployment status | | | ✓ | | Yes | -| | View apps and services usage | | | ✓ | | Yes | -| | View and edit customer contact and website info | ✓ | ✓ | ✓ | ✓ | No | -| **Users** | Search for users | | | | | Yes | -| | View user metrics | | | | | Yes | -| | Onboard new users | | | | | Yes | -| | Offboard users | | | | | Yes | -| | View inactive users | | | | | Yes | -| | View shared mailboxes | | | | | Yes | -| | View and manage risky users | | | | | Yes | -| | View and manage multifactor authentication | | | | | Yes | -| | View and manage self-service password reset | | | | | Yes | -| **Devices** | View device security data | | | | | Yes | -| | View vulnerability management data | | | | | Yes | -| | View device compliance data | | | | | Yes | -| | View threat management data | | | | | Yes | -| | View device health data | | | | | Yes | -| | View Windows 365 data | | | | | Yes | -| | View Windows event logs | | | | | Yes | -| **Apps** | View app performance and app management data | | | | | Yes | -| **Quarantined messages** | View and manage quarantined messages | | | | | Yes | -| **Baselines** | View baselines (default, custom) and task details | | ✓ | ✓ | ✓ | No| -| | Create, clone, edit, and assign baselines | | ✓ | | | No | -| | View deployment insights | | | | | Yes | -| **Service health** | Monitor service health<sup>1</sup> | | | | | No | -| **Support** | Create and manage service requests<sup>2</sup> | | | | | No | -| **Audit logs** | View audit logs | | ✓ | | | Yes -| **Permissions** | View the **Lighthouse Permissions** page | | ✓ | | | No| -| | Set up and manage Lighthouse permissions | | ✓ | | | No | -| | View, set up, and manage GDAP on the **Delegated access** page | | ✓ | | | No | -| **Sales Advisor** | View opportunities | ✓ | ✓ | | | No | -| | View subscription renewals | ✓ | ✓ | | | No | -| | View license requests | ✓ | ✓ | | | No | +| Area | Actions | Account Manager | Administrator | Author | Operator | Reader | Need Microsoft Entra role? | +|||::|::|::|::|::|::| +| **Home page** | View data on cards | | | | | | Yes | +| | Add users | | | | | | Yes | +| | Reset password | | | | | | Yes | +| | Offboard users | | | | | | Yes | +| **Alerts** | View alerts and alert rules | ✓ | ✓ | ✓ | | ✓ | No | +| | Manage alerts (change severity, status, or assignment) | | ✓ | ✓ | | | No | +| | Create, edit, and delete alert rules | | ✓ | ✓ | | | No | +| **Copilot insights** | View opportunities and adoption data | | | | | | Yes| +| **Tenants** | View the **Tenants** page | ✓ | ✓ | ✓ | ✓ | ✓ | No | +| | View tenant details | | | | | | Yes | +| | Export data | ✓ | ✓ | ✓ | ✓ | ✓ | No | +| | View tags | ✓ | ✓ | ✓ | ✓ | ✓ | No | +| | Create, update, and delete tags in Lighthouse | | ✓ | ✓ | | | No | +| | Assign and remove tags from tenants | | ✓ | ✓ | | | No | +| | Activate and inactivate a tenant | | ✓ | ✓ | | | No | +| | View delegated access status | ✓ | ✓ | ✓ | ✓ | ✓ | No | +| | View Microsoft Secure Score | | | | | | Yes | +| | View baseline assignments | ✓ | ✓ | ✓ | ✓ | ✓ | No | +| | View deployment status | | | | ✓ | | Yes | +| | View apps and services usage | | | | ✓ | | Yes | +| | View and edit customer contact and website info | ✓ | ✓ | | ✓ | ✓ | No | +| **Users** | Search for users | | | | | | Yes | +| | View user metrics | | | | | | Yes | +| | Onboard new users | | | | | | Yes | +| | Offboard users | | | | | | Yes | +| | View inactive users | | | | | | Yes | +| | View shared mailboxes | | | | | | Yes | +| | View and manage risky users | | | | | | Yes | +| | View and manage multifactor authentication | | | | | | Yes | +| | View and manage self-service password reset | | | | | | Yes | +| **Devices** | View device security data | | | | | | Yes | +| | View vulnerability management data | | | | | | Yes | +| | View device compliance data | | | | | | Yes | +| | View threat management data | | | | | | Yes | +| | View device health data | | | | | | Yes | +| | View Windows 365 data | | | | | | Yes | +| | View Windows event logs | | | | | | Yes | +| **Apps** | View app performance and app management data | | | | | | Yes | +| **Quarantined messages** | View and manage quarantined messages | | | | | | Yes | +| **Baselines** | View baselines (default, custom) and task details | | ✓ | ✓ | ✓ | ✓ | No | +| | Create, clone, edit, and assign baselines | | ✓ | ✓ | | | No | +| | Extract a task from a tenant to add to a baseline | | ✓ | ✓ | | | Yes | +| | View deployment insights | | | | | | Yes | +| **Service health** | Monitor service health<sup>1</sup> | | | | | | No | +| **Support** | Create and manage service requests<sup>2</sup> | | | | | | No | +| **Audit logs** | View audit logs | | ✓ | | | | Yes +| **Permissions** | View the **Lighthouse Permissions** page | | ✓ | | | | No | +| | Set up and manage Lighthouse permissions | | ✓ | | | | No | +| | View, set up, and manage GDAP on the **Delegated access** page | | ✓ | | | | No | +| **Sales Advisor** | View opportunities | ✓ | ✓ | | | | No | +| | View subscription renewals | ✓ | ✓ | | | | No | +| | View license requests | ✓ | ✓ | | | | No | <sup>1</sup> To monitor service health, Lighthouse users must hold at least one Microsoft Entra role in the partner tenant with the following property set: **microsoft.office365.serviceHealth/allEntities/allTasks**. The users must also have at least the Admin Agent role or Helpdesk Agent role assigned to them in Partner Center. |
lighthouse | M365 Lighthouse Whats New | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-whats-new.md | We're continuously adding new features to [Microsoft 365 Lighthouse](m365-lighth > > To see which new features are currently available in your partner tenant, go to the **Home** page of Microsoft 365 Lighthouse, and then either select the **What's new** link in the upper-right corner of the page or select **What's new** on the **What's new & learning resources** card. +## November 2024 ++### New Lighthouse RBAC roles to manage partner tenant permissions ++Microsoft 365 Lighthouse now includes the following role-based access control (RBAC) roles that you can use to manage partner tenant permissions in Lighthouse. To assign these roles, you must be a Lighthouse Administrator or a Privileged Role Administrator in Microsoft Entra ID in the partner tenant. ++- Lighthouse Account Manager +- Lighthouse Administrator +- Lighthouse Author +- Lighthouse Operator (automatically assigned to users with GDAP permissions for a customer tenant) +- Lighthouse Reader ++Each role has a set of permissions that determines which data users can access and change within the partner tenant. For example, you can assign the Lighthouse Account Manager role to users who require access to Sales Advisor. ++To assign RBAC roles, in the left navigation pane in Lighthouse, select **Permissions** > **Lighthouse permissions**. ++[Go to the Lighthouse permissions page now](https://lighthouse.microsoft.com/#view/Microsoft_Intune_MTM/RBAC.ReactView) ++To learn more, see [Overview of permissions in Microsoft 365 Lighthouse](m365-lighthouse-overview-of-permissions.md). ++## October 2024 ++### Easily access tenant details from any page in Lighthouse ++We've made it easy for you to access customer tenant details from any page in Lighthouse. Previously, you had to go to the **Tenants** page and then select a tenant from the list to view the details for that tenant. Now, when you select a tenant from the **Tenants** filter on any page, a link appears next to the filter that takes you directly to the details page for the selected tenant. This functionality helps you more efficiently manage your customer tenants by giving you one-click access to important tenant information no matter where you are in Lighthouse. + ## September 2024 ### Delegated access page To learn more about delegated access, see [Overview of the Delegated access page ### Use Copilot insights in Lighthouse to drive Copilot success -The new **Copilot insights** page lets you easily manage and monitor Copilot success across your customer tenants—all in one place. In addition to recommending customers who are likely to find value from Copilot, the page shows Copilot usage and license assignment and provides links to key resources for you to become a Copilot expert, including Copilot Lab, learning paths, and training videos. The page also shows deployment progress for tasks that we specifically recommend for enabling Copilot. +The new **Copilot insights** page lets you easily manage and monitor Copilot success across your customer tenants—all in one place. In addition to recommending customers who are likely to find value from Copilot, the page shows Copilot usage and license assignment and provides links to key resources for you to become a Copilot expert, including Copilot Prompt Gallery, learning paths, and training videos. The page also shows deployment progress for tasks that we specifically recommend for enabling Copilot. Moreover, Copilot insights help you pinpoint customers who may need Copilot setup guidance or training. Use the insights to ensure all Copilot users are enabled and set up for success. |
security | Top Security Tasks For Remote Work | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/top-security-tasks-for-remote-work.md | Recent blog articles on this topic: Training users can save your users and security operations team a lot of time and frustration. Savvy users are less likely to open attachments or click links in questionable email messages, and they're more likely to avoid suspicious websites. -The Harvard Kennedy School [Cybersecurity Campaign Handbook](https://go.microsoft.com/fwlink/?linkid=2015598&clcid=0x409) provides excellent guidance on establishing a strong culture of security awareness within your organization, including training users to identify phishing attacks. +The Harvard Kennedy School [Cybersecurity Campaign Handbook](https://go.microsoft.com/fwlink/p/?linkid=2015598) provides excellent guidance on establishing a strong culture of security awareness within your organization, including training users to identify phishing attacks. Microsoft 365 provides the following resources to help inform users in your organization: |
solutions | Apps Assign Step 1 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/apps-assign-step-1.md | If you haven't already added users to your Intune tenant, you can add them using ## Add users to Intune As part of setting up Intune, you may have already added users to your Intune tenant. If not, you can add either mulitple users or single users. Adding a user to Intune creates a new Microsoft Entra ID account.+ - [Add multiple users to Intune](#add-multiple-users-to-intune) - [Add a single users to Intune](#add-single-users-to-intune) As part of setting up Intune, you may have already added users to your Intune te ### Add multiple users to Intune -The most efficient way to add users is in bulk in the Intune admin center. Adding users to your Intune tenant involves creating and uploading a *.csv* file containing the full list of members for your organization. For more information about downloading the *.csv* file, understanding the fields within the *.csv* file, and uploading the *.csv* file, see [Add multiple Intune users in the Microsoft Intune admin center](/intune/fundamentals/users-add#add-multiple-intune-users-in-the-microsoft-intune-admin-center). +The most efficient way to add users is in bulk in the Intune admin center. Adding users to your Intune tenant involves creating and uploading a *.csv* file containing the full list of members for your organization. For more information about downloading the *.csv* file, understanding the fields within the *.csv* file, and uploading the *.csv* file, see [Add multiple Intune users in the Microsoft Intune admin center](/mem/intune/fundamentals/users-add#add-multiple-intune-users-in-the-microsoft-intune-admin-center). Other ways to add users to your tenant include the following methods:+ - [Add multiple users from your on-premises Active Directory](/mem/intune/fundamentals/users-add#sync-active-directory-and-add-users-to-intune). - [Invite multiple Microsoft Entra B2B users](/entra/external-id/tutorial-bulk-invite). |
solutions | Apps Config Step 2 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/apps-config-step-2.md | Outlook for iOS/iPadOS and Android supports the following configuration scenario - **Data protection settings** > [!IMPORTANT]-> For configuration scenarios that require device enrollment on Android, the devices must be enrolled in Android Enterprise, and Outlook for Android must be deployed via the managed Google Play store. For more information, see [Set up enrollment of Android work profile devices](/intune/android-work-profile-enroll) and [Add app configuration policies for managed Android devices](/intune/app-configuration-policies-use-android). +> For configuration scenarios that require device enrollment on Android, the devices must be enrolled in Android Enterprise, and Outlook for Android must be deployed via the managed Google Play store. For more information, see [Set up enrollment of Android work profile devices](/mem/intune/enrollment/android-work-profile-enroll) and [Add app configuration policies for managed Android devices](/mem/intune/apps/app-configuration-policies-use-android). |Configuration scenario|Description| ||| |
solutions | Collaboration Governance Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/collaboration-governance-overview.md | This set of illustrations uses one of the most regulated industries, financial s |:--|:--| |[![Model poster: Microsoft Purview information protection and compliance capabilities.](../media/solutions-architecture-center/m365-compliance-illustrations-thumb.png)](https://download.microsoft.com/download/3/a/6/3a6ab1a3-feb0-4ee2-8e77-62415a772e53/m365-compliance-illustrations.pdf) <br/> English: [Download as a PDF](https://download.microsoft.com/download/3/a/6/3a6ab1a3-feb0-4ee2-8e77-62415a772e53/m365-compliance-illustrations.pdf) \| [Download as a Visio](https://download.microsoft.com/download/3/a/6/3a6ab1a3-feb0-4ee2-8e77-62415a772e53/m365-compliance-illustrations.vsdx) <br/> Japanese: [Download as a PDF](https://download.microsoft.com/download/6/f/1/6f1a7d0e-dd8e-442e-b073-8e94327ae4f8/m365-compliance-illustrations.pdf) \| [Download as a Visio](https://download.microsoft.com/download/6/f/1/6f1a7d0e-dd8e-442e-b073-8e94327ae4f8/m365-compliance-illustrations.vsdx) <br/> Updated November 2020|Includes: <ul><li> Microsoft Purview Information Protection and Microsoft Purview Data Loss Prevention</li><li>Retention policies and retention labels </li><li>Information barriers</li><li>Communication compliance</li><li>Insider risk</li><li>Third-party data ingestion</li>| -## Related topics +## Related resources [Microsoft 365 security documentation](../security/index.yml) [Microsoft Purview documentation](../compliance/index.yml) -[Governance & Security Practices for Microsoft 365 - Microsoft Ignite](https://ignite.microsoft.com/sessions/bd7aa4f7-f9a6-4dc0-a900-bd06254e1281) +[Video Governance & Security Practices for Microsoft 365 - Microsoft Ignite | OD13](https://www.youtube.com/watch?v=zdSkL8a_7Kw) |
solutions | Energy Secure Collaboration | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/energy-secure-collaboration.md | The energy industry provides society with fuel and critical infrastructure that Organizations in the energy industry work with and exchange many types of information as part of their regular operations. This information includes customer data, capital engineering design documentation, resource location maps, project management artifacts, performance metrics, field service reports, environmental data, and performance metrics. As these organizations look to transform their operations and collaboration systems into modern digital platforms, they're looking to Microsoft as a trusted Cloud Service Provider (CSP) and Microsoft 365 as their best-of-breed collaboration platform. Since Microsoft 365 is built on the Microsoft Azure platform, organizations should examine both platforms as they consider their compliance and security controls when moving to the Cloud. -In North America, the North America Electric Reliability Corporation (NERC) enforces reliability standards that are referred to as NERC [Critical Infrastructure Protection (CIP) standards](https://nercstg.nerc.com/pa/Stand/Pages/CIPStandards.aspx). NERC is subject to oversight by the U.S. Federal Energy Regulatory Commission (FERC) and governmental authorities in Canada. All bulk power system owners, operators, and users must register with NERC and must comply with NERC CIP standards. Cloud Service Providers and third-party vendors such as Microsoft aren't subject to NERC CIP standards. However, the CIP standards include objectives that should be considered when Registered Entities use vendors in the operation of the Bulk Electric System (BES). Microsoft customers operating Bulk Electric Systems are wholly responsible for ensuring their own compliance with NERC CIP standards. +In North America, the North America Electric Reliability Corporation (NERC) enforces reliability standards that are referred to as NERC [Critical Infrastructure Protection (CIP) standards](https://www.nerc.com/pa/Stand/Pages/ReliabilityStandards.aspx). NERC is subject to oversight by the U.S. Federal Energy Regulatory Commission (FERC) and governmental authorities in Canada. All bulk power system owners, operators, and users must register with NERC and must comply with NERC CIP standards. Cloud Service Providers and third-party vendors such as Microsoft aren't subject to NERC CIP standards. However, the CIP standards include objectives that should be considered when Registered Entities use vendors in the operation of the Bulk Electric System (BES). Microsoft customers operating Bulk Electric Systems are wholly responsible for ensuring their own compliance with NERC CIP standards. For information about Microsoft cloud services and NERC, see the following resources: As mentioned, Microsoft Office 365 and Office 365 U.S. Government have each achi Microsoft provides a key tool to assist with monitoring compliance with regulations over time: -- **Microsoft Purview Compliance Manager** helps the organization understand its current compliance posture and the actions it can take to help improve that posture. Compliance Manager calculates a risk-based score measuring progress in completing actions that help reduce risks around data protection and regulatory standards. Compliance Manager provides an initial score based on the Microsoft 365 data protection baseline. This baseline is a set of controls that include common industry regulations and standards. While this score is a good starting point, Compliance Manager becomes more powerful once an organization adds assessments that are more relevant to their industry. Compliance Manager supports a number of regulatory standards that are relevant for NERC CIP compliance obligations, including the [FedRAMP Moderate Control Set](https://www.fedramp.gov/documents/), [NIST 800-53 Rev. 4](https://go.microsoft.com/fwlink/?linkid=2109075), and [AICPA SOC 2](https://go.microsoft.com/fwlink/?linkid=2115184). Energy industry organizations might also create or import custom control sets if needed.+- **Microsoft Purview Compliance Manager** helps the organization understand its current compliance posture and the actions it can take to help improve that posture. Compliance Manager calculates a risk-based score measuring progress in completing actions that help reduce risks around data protection and regulatory standards. Compliance Manager provides an initial score based on the Microsoft 365 data protection baseline. This baseline is a set of controls that include common industry regulations and standards. While this score is a good starting point, Compliance Manager becomes more powerful once an organization adds assessments that are more relevant to their industry. Compliance Manager supports a number of regulatory standards that are relevant for NERC CIP compliance obligations, including the [FedRAMP Moderate Control Set](https://www.fedramp.gov/documents/), [NIST 800-53 Rev. 4](https://go.microsoft.com/fwlink/?linkid=2109075), and [AICPA SOC 2](https://go.microsoft.com/fwlink/p/?linkid=2115184). Energy industry organizations might also create or import custom control sets if needed. The workflow capabilities built into Compliance Manager allow energy organizations to transform and digitize their regulatory compliance processes. Traditionally, compliance teams in the energy industry face the following challenges: By automating aspects of regulatory compliance processes through the use of Comp Compliance Manager doesn't express an absolute measure of organizational compliance with any particular standard or regulation. It expresses the extent to which you have adopted controls which can reduce the risks to personal data and individual privacy. Recommendations from Compliance Manager shouldn't be interpreted as a guarantee of compliance. The customer actions provided in Compliance Manager are recommendations. It's up to each organization to evaluate the effectiveness of these recommendations to meet their regulatory obligations prior to implementation. Recommendations found in Compliance Manager shouldn't be interpreted as a guarantee of compliance. -Many cyber security-related controls are included in the [FedRAMP Moderate Control Set](https://www.fedramp.gov/documents/) and [NERC CIP standards](https://nercstg.nerc.com/pa/Stand/Pages/CIPStandards.aspx). However, key controls related to the Microsoft 365 platform include security management controls (CIP-003-6), account and access management/access revocation (CIP-004-6), electronic security perimeter (CIP-005-5), security event monitoring, and incident response (CIP-008-5). The following foundational Microsoft 365 capabilities help to address the risks and requirements included in these articles. +Many cyber security-related controls are included in the [FedRAMP Moderate Control Set](https://www.fedramp.gov/documents/) and [NERC CIP standards](https://www.nerc.com/pa/Stand/Pages/ReliabilityStandards.aspx). However, key controls related to the Microsoft 365 platform include security management controls (CIP-003-6), account and access management/access revocation (CIP-004-6), electronic security perimeter (CIP-005-5), security event monitoring, and incident response (CIP-008-5). The following foundational Microsoft 365 capabilities help to address the risks and requirements included in these articles. ### Secure User Identities and Control Access |
solutions | Ransomware Protection Microsoft 365 Information | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/ransomware-protection-microsoft-365-information.md | Microsoft 365: - [Maximize Ransomware Resiliency with Azure and Microsoft 365](https://azure.microsoft.com/resources/maximize-ransomware-resiliency-with-azure-and-microsoft-365/) - [Ransomware incident response playbooks](/security/ransomware/) - [Malware and ransomware protection](/compliance/assurance/assurance-malware-and-ransomware-protection)-- [Protect your Windows 10 PC from ransomware](https://support.microsoft.com//windows/protect-your-pc-from-ransomware-08ed68a7-939f-726c-7e84-a72ba92c01c3)+- [Protect your Windows 10 PC from ransomware](https://support.microsoft.com/windows/protect-your-pc-from-ransomware-08ed68a7-939f-726c-7e84-a72ba92c01c3) - [Handling ransomware in SharePoint Online](/sharepoint/troubleshoot/security/handling-ransomware-in-sharepoint-online) - [Threat analytics reports for ransomware](https://security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,reportType,createdOn,lastUpdatedOn,tags,flag) in the Microsoft Defender portal |
solutions | Ransomware Protection Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/ransomware-protection-microsoft-365.md | Microsoft 365: - [Maximize Ransomware Resiliency with Azure and Microsoft 365](https://azure.microsoft.com/resources/maximize-ransomware-resiliency-with-azure-and-microsoft-365/) - [Ransomware incident response playbooks](/security/ransomware/) - [Malware and ransomware protection](/compliance/assurance/assurance-malware-and-ransomware-protection)-- [Protect your Windows 10 PC from ransomware](https://support.microsoft.com//windows/protect-your-pc-from-ransomware-08ed68a7-939f-726c-7e84-a72ba92c01c3)+- [Protect your Windows 10 PC from ransomware](https://support.microsoft.com/windows/protect-your-pc-from-ransomware-08ed68a7-939f-726c-7e84-a72ba92c01c3) - [Handling ransomware in SharePoint Online](/sharepoint/troubleshoot/security/handling-ransomware-in-sharepoint-online) - [Threat analytics reports for ransomware](https://security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,reportType,createdOn,lastUpdatedOn,tags,flag) in the Microsoft Defender portal |
syntex | Create Syntex Model | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/create-syntex-model.md | Title: Create an enterprise model in Microsoft Syntex -+ Previously updated : 06/28/2024 Last updated : 11/19/2024 audience: admin For this article, we start in the **Models** library. For information about the If you want to create a local model, see [Create a model on a local SharePoint site](create-local-model.md). -## Create a model --From the **Models** library, select **Create a model**. +## Create a custom model +1. From the **Models** library, select **Create a model**. +<! ![Screenshot of the Models library showing the Create a model button.](../media/content-understanding/create-a-model-from-the-models-page.png) +> +2. On the **Options for model creation** page, select the **Custom models** tab. -On the **Options for model creation** page, there are two sections: --- [**Train a custom model**](#train-a-custom-model)- -- [**Set up a prebuilt model**](#set-up-a-prebuilt-model)--![Screenshot of the Options for model creation page showing the custom models and prebuilt models.](../media/content-understanding/options-for-model-creation-3.png) --> [!NOTE] -> All model options might not be available. These options are configured by your Microsoft 365 admin. --## Train a custom model + ![Screenshot showing the Custom models section on the Options for model creation page.](../media/content-understanding/create-custom-model-options.png) -The **Train a custom model** section shows the training method for the type of custom models you want to create. --![Screenshot of the Train a custom model section on the Options for model creation page.](../media/content-understanding/build-a-custom-model-section.png) --- **Teaching method** ΓÇô Creates an [unstructured document processing model](document-understanding-overview.md).+ > [!NOTE] + > These available model options are configured by your Microsoft 365 admin. All model options might not be available. +<! +3. Select the type of custom model you want to create. Choose from the following prebuilt model types: -- **Freeform selection method** ΓÇô Creates a [freeform document processing model](form-processing-overview.md).+ - **Single class model** ΓÇô Creates an [unstructured document processing model](document-understanding-overview.md). -- **Layout method** ΓÇô Creates a [structured document processing model](form-processing-overview.md).+ - **Freeform extraction model** ΓÇô Creates a [freeform document processing model](form-processing-overview.md). -Select one of the following tabs to continue with the custom model you want to use. + - **Structured extraction model** ΓÇô Creates a [structured document processing model](form-processing-overview.md). +> +3. Select one of the following tabs to continue with the custom model you want to use. -# [Teaching method](#tab/teaching-method) +# [Single class model](#tab/single-class-model) -Use the **Teaching method** to create an [unstructured document processing model](document-understanding-overview.md). +Use the **Single class model** to create an [unstructured document processing model](document-understanding-overview.md). -1. Select **Teaching method**. +1. Select **Single class model**. -2. On the **Teaching method: Details** page, you'll find more information about the model. If you want to proceed with creating the model, select **Next**. +2. On the **Single class model: Details** page, you'll find more information about the model. If you want to proceed with creating the model, select **Next**. -3. On the right panel of the **Create a model with the teaching method** page, enter the following information. +3. On the right panel of the **Create a model using a single class model** page, enter the following information. - **Model name** ΓÇô Enter the name of the model, for example *Service agreements*. - **Description** ΓÇô Enter information about how this model will be used. ![Screenshot of the right panel of the Create a model with the teaching method page.](../media/content-understanding/create-a-model-panel.png) - + 4. Under **Advanced settings**: - In the **Content type** section, choose whether to create a new content type or to use an existing one. - - In the **Compliance** section, under **Retention labels**, select the retention label you want to add. Under **Sensitivity labels**, select the sensitivity label you want to add. If a compliance label has been already applied to the library where the file is stored, it will be shown. + - In the **Compliance** section, select the retention label or sensitivity label you want to add. If a label has been already applied to the library where the file is stored, it will be selected. 5. When you're ready to create the model, select **Create**. 6. You're now ready to [train the model](create-a-classifier.md). -# [Freeform selection method](#tab/freeform-selection-method) +# [Freeform extraction model](#tab/freeform-extraction-model) -Use the **Freeform selection method** to create a [freeform document processing model](form-processing-overview.md). +Use the **Freeform extraction model** to create a [freeform document processing model](form-processing-overview.md). -1. Select **Freeform selection method**. +1. Select **Freeform extraction model**. -2. On the **Freeform selection method: Details** page, you'll find more information about the model. If you want to proceed with creating the model, select **Next**. +2. On the **Freeform extraction model: Details** page, you'll find more information about the model. If you want to proceed with creating the model, select **Next**. -3. On the right panel of the **Create a model with the freeform selection method** page, enter the following information. +3. On the right panel of the **Create a model using the freeform extraction model** page, enter the following information. - **Model name** ΓÇô Enter the name of the model, for example *Service agreements*. - **Description** ΓÇô Enter information about how this model will be used. ![Screenshot of the right panel of the Create a model with the Freeform selection method page.](../media/content-understanding/create-a-model-panel.png) - + 4. Under **Advanced settings**: - In the **Content type** section, choose whether to create a new content type or to use an existing one. - - In the **Compliance** section, under **Retention labels**, select the retention label you want to add. If a compliance label has been already applied to the library where the file is stored, it will be shown. -- > [!NOTE] - > Sensitivity labels are not available for **Freeform selection method** (freeform document processing models) at this time. + - In the **Compliance** section, select the retention label or sensitivity label you want to add. If a label has been already applied to the library where the file is stored, it will be selected. 5. When you're ready to create the model, select **Create**. Use the **Freeform selection method** to create a [freeform document processing > [!NOTE] > When published, this model type is available for reuse by others who do not own the model. Currently, this model can be edited and shared for editing only by the model owner. -# [Layout method](#tab/layout-method) +# [Structured extraction model](#tab/structured-extraction-model) -Use the **Layout method** to create a [structured document processing model](form-processing-overview.md). +Use the **Structured extraction model** to create a [structured document processing model](form-processing-overview.md). -1. Select **Layout method**. +1. Select **Structured extraction model**. -2. On the **Layout method: Details** page, you'll find more information about the model. If you want to proceed with creating the model, select **Next**. +2. On the **Structured extraction model: Details** page, you'll find more information about the model. If you want to proceed with creating the model, select **Next**. -3. On the right panel of the **Create a model with the layout method** page, enter the following information. +3. On the right panel of the **Create a model using the structured extraction model** page, enter the following information. - **Model name** ΓÇô Enter the name of the model, for example *Service agreements*. - **Description** ΓÇô Enter information about how this model will be used. - ![Screenshot of the right panel of the Create a model with the layout method page.](../media/content-understanding/create-a-model-panel.png) - + ![Screenshot of the right panel of the Create a model with the structured extraction model page.](../media/content-understanding/create-a-model-panel.png) + 4. Under **Advanced settings**: - In the **Content type** section, choose whether to create a new content type or to use an existing one. - - In the **Compliance** section, under **Retention labels**, select the retention label you want to add. If a compliance label has been already applied to the library where the file is stored, it will be shown. -- > [!NOTE] - > Sensitivity labels are not available for **Layout method** (structured document processing models) at this time. + - In the **Compliance** section, select the retention label or sensitivity label you want to add. If a label has been already applied to the library where the file is stored, it will be selected. 5. When you're ready to create the model, select **Create**. Use the **Layout method** to create a [structured document processing model](for -## Set up a prebuilt model +## Create a prebuilt model -The **Set up a prebuilt model** section shows the types of prebuilt models you can use. +1. From the **Models** library, select **Create a model**. +<! +![Screenshot of the Models library showing the Create a model button.](../media/content-understanding/create-a-model-from-the-models-page.png) +> +2. On the **Options for model creation** page, select the **Prebuilt models** tab. ++ ![Screenshot showing the Prebuilt models section on the Options for model creation page.](../media/content-understanding/build-a-prebuilt-model-section.png) +<! +3. Choose from the following prebuilt models: ![Screenshot of the Use a prebuilt model section on the Set up a prebuilt model page.](../media/content-understanding/use-a-trained-model-section-2.png) The **Set up a prebuilt model** section shows the types of prebuilt models you c - Invoice processing - Receipt processing - Sensitive information processing--Select one of the following tabs to continue with the prebuilt model you want to use. +- Simple document processing +> +3. Select one of the following tabs to continue with the prebuilt model you want to use. # [Contract processing](#tab/contract-processing) -1. Select **Contract processing**. +1. Select **Contract processing model**. 2. On the **Contract processing: Details** page, you'll find more information about the model. If you want to proceed with using the model, select **Next**. Select one of the following tabs to continue with the prebuilt model you want to - In the **Content type** section, choose whether to create a new content type or to use an existing one. - - In the **Compliance** section, under **Retention labels**, select the retention label you want to add. If a retention label has been already applied to the library where the file is stored, it will be selected. -- > [!NOTE] - > Sensitivity labels are not available for prebuilt models at this time. + - In the **Compliance** section, select the retention label or sensitivity label you want to add. If a label has been already applied to the library where the file is stored, it will be selected. 5. When you're ready to create the model, select **Create**. Select one of the following tabs to continue with the prebuilt model you want to # [Invoice processing](#tab/invoice-processing) -1. Select **Invoice processing**. +1. Select **Invoice processing model**. 2. On the **Invoice processing: Details** page, you'll find more information about the model. If you want to proceed with using the model, select **Next**. Select one of the following tabs to continue with the prebuilt model you want to - In the **Content type** section, choose whether to create a new content type or to use an existing one. - - In the **Compliance** section, under **Retention labels**, select the retention label you want to add. If a retention label has been already applied to the library where the file is stored, it will be selected. -- > [!NOTE] - > Sensitivity labels are not available for prebuilt models at this time. + - In the **Compliance** section, select the retention label or sensitivity label you want to add. If a label has been already applied to the library where the file is stored, it will be selected. 5. When you're ready to create the model, select **Create**. Select one of the following tabs to continue with the prebuilt model you want to # [Receipt processing](#tab/receipt-processing) -1. Select **Receipt processing**. +1. Select **Receipt processing model**. 2. On the **Receipt processing: Details** page, you'll find more information about the model. If you want to proceed with using the model, select **Next**. Select one of the following tabs to continue with the prebuilt model you want to - In the **Content type** section, choose whether to create a new content type or to use an existing one. - - In the **Compliance** section, under **Retention labels**, select the retention label you want to add. If a retention label has been already applied to the library where the file is stored, it will be selected. + - In the **Compliance** section, select the retention label or sensitivity label you want to add. If a label has been already applied to the library where the file is stored, it will be selected. 5. When you're ready to create the model, select **Create**. Select one of the following tabs to continue with the prebuilt model you want to # [Sensitive information processing](#tab/sensitive-information-processing) -1. Select **Sensitive information processing**. +1. Select **Sensitive information processing model**. 2. On the **Sensitive information processing: Details** page, you find information about the model and can see examples of a document library looks with entities detected and entities extracted. If you want to proceed with using the model, select **Next**. Select one of the following tabs to continue with the prebuilt model you want to 5. You're now ready to [complete setting up the model](prebuilt-model-sensitive-info.md#set-up-a-sensitive-information-model). +# [Simple document processing](#tab/simple-document-processing) ++1. Select **Simple document processing model**. ++2. On the **Simple document processing: Details** page, you'll find more information about the model. If you want to proceed with using the model, select **Next**. ++3. On the **Create a simple document processing model** page, on right panel, enter the following information. ++ - **Model name** ΓÇô Enter the name of the model, for example *Service agreement*. ++ - **Description** ΓÇô Enter information about how this model will be used. ++ ![Screenshot of the right panel of the Create a simple document processing model page.](../media/content-understanding/create-a-model-panel-simple.png) ++4. If you want to change the content type or add compliance labels, select **Advanced settings**. ++ ![Screenshot of the Advanced settings section on the Create a simple document processing model page.](../media/content-understanding/create-model-advanced-settings.png) ++ - In the **Content type** section, choose whether to create a new content type or to use an existing one. ++ - In the **Compliance** section, select the retention label or sensitivity label you want to add. If a label has been already applied to the library where the file is stored, it will be selected. ++5. When you're ready to create the model, select **Create**. ++6. You're now ready to [complete setting up the model](prebuilt-model-simple.md#step-2-upload-an-example-file-to-analyze). + |
syntex | Difference Between Document Understanding And Form Processing Model | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/difference-between-document-understanding-and-form-processing-model.md | Use the following table to see differences in custom models to help identify the | Feature | Unstructured document processing | Freeform document processing | Structured document processing | | - | - | - | - |-| Associated with this training method in the UI | ![Tile for teaching method.](../media/content-understanding/teaching-method-tile.png) | ![Tile for freeform seletion method.](../media/content-understanding/freeform-selection-method-tile.png) | ![Tile for layout method.](../media/content-understanding/layout-method-tile.png) | +| Associated with this option in the UI | Single class model | Freeform extraction model | Structured extraction model | | Use for this type of content | Unstructured or semi-structured file formats, for example Office documents where there are differences in the layout, but still similar information to be extracted. | Unstructured and free-form file formats, for example documents that have no set structure such as letters, contracts, and statements of work. | Structured and semi-structured file formats, for example PDFs for forms content such as invoices or purchase orders where the layout and formatting is similar. | | Model creation | Model created in SharePoint in a new site, the content center. | Model created in [AI Builder](/ai-builder/overview) with seamless access from SharePoint document library.| Model created in [AI Builder](/ai-builder/overview) with seamless access from SharePoint document library. | | Classification type | Trainable classifier with optional extractors using machine teaching to assign document location on what data to extract. | Not applicable | Not applicable | Use the following table to see differences in custom models to help identify the | Capacity | No capacity restrictions. | Uses the default Power Platform environment (custom environments with Dataverse database supported). | Uses the default Power Platform environment (custom environments with Dataverse database supported). | | Supported languages| Supports [more than 40 languages](/ai-builder/form-processing-model-requirements#model-for-unstructured-and-free-form-documents). | Supports [more than 40 languages](/ai-builder/form-processing-model-requirements#model-for-unstructured-and-free-form-documents). | Supports [more than 100 languages](/ai-builder/form-processing-model-requirements#model-for-structured-and-semi-structured-documents). | +<! +| Associated with this training method in the UI | ![Tile for teaching method.](../media/content-understanding/teaching-method-tile.png) | ![Tile for freeform seletion method.](../media/content-understanding/freeform-selection-method-tile.png) | ![Tile for layout method.](../media/content-understanding/layout-method-tile.png) | +> |
syntex | Document Understanding Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/document-understanding-overview.md | description: Learn about the unstructured document processing model in Microsoft </br>> -Use the unstructured document processing model ([teaching method](create-syntex-model.md#train-a-custom-model)) to automatically classify files and extract information. It works best for unstructured documents, such as letters or contracts. +Use the unstructured document processing model ([teaching method](create-syntex-model.md#create-a-custom-model)) to automatically classify files and extract information. It works best for unstructured documents, such as letters or contracts. > [!NOTE] > Microsoft respects the privacy and ownership of data you use to train and process models in Syntex. None of your organization's data is used or transferred by Microsoft to train AI models, large-language models, or any other models. Your data remains securely within your organizationΓÇÖs tenant. For more information, see [Microsoft data protection and privacy](https://www.microsoft.com/en-us/trust-center/privacy). |
syntex | Esignature Setup | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/esignature-setup.md | You must be a [SharePoint Administrator](/entra/identity/role-based-access-contr 4. On the Syntex page, in the **Document & image services** section, select **eSignature**. +5. On the **eSignature** panel, select **Let people in your organization use eSignature**. ++6. Select **Save**. +<! 5. For existing customers, read the [terms of service](/legal/microsoft-365/esignature-terms-of-service), and then select **Turn on** to enable the service. 6. For new Syntex customers, the SharePoint eSignature service is turned on once you enter your billing information and accept the [terms of service](/legal/microsoft-365/esignature-terms-of-service). On the **eSignature** page: - To turn off the service, select **Turn off**. - To manage which sites the service is available, see [Manage sites](#manage-sites).+> -### Manage sites --By default, SharePoint eSignature is turned on for libraries in all SharePoint sites. Follow these steps to limit which sites users can use eSignature. +### Add other signature providers 1. On the Syntex page, in the **Document & image services** section, select **eSignature**. -2. On the **eSignature** panel, under **Sites where eSignature can be used**, select **Select sites**. -- 1. Choose the site or sites on which this service should be enabled. +2. On the **eSignature** panel, in the **Which signature providers can be used?** section, select the providers you want to use. - 1. To restrict user access to this service, select **No sites** or **Selected sites (up to 100)**. Follow the instructions to either select the sites or upload a CSV listing a maximum of 100 sites. Be sure to add your content center site if you want it to be included. You can then manage site access permissions for the sites you selected. + ![Screenshot showing the Edit signature providers panel.](../media/content-understanding/esignature-edit-providers-panel.png) - 1. Select **Save**. +3. Select **Save**. > [!NOTE]-> The first eSignature request in a Microsoft 365 tenant might take a little longer to execute than usual. It can take a few seconds to a few minutes; however, subsequent requests are executed normally. We recommend that admins create the first eSignature request in a SharePoint site as the final setup step. --### Turn off eSignature --1. On the Syntex page, in the **Document & image services** section, select **eSignature**. +> Although [pay-as-you-go billing](syntex-azure-billing.md) must be set up to use eSignature, you are not charged for using other signature providers. -2. If SharePoint eSignature is turned on, on the **eSignature** panel, the **Turn off** button is visible. To turn off SharePoint eSignature, select **Turn off**. +### Manage sites -### Add other signature providers +By default, SharePoint eSignature is turned on for libraries in all SharePoint sites. Follow these steps to restrict the sites where users can use eSignature. 1. On the Syntex page, in the **Document & image services** section, select **eSignature**. -2. On the **eSignature** panel, under **Other signature providers**, select **Add or remove signature providers**. +2. On the **eSignature** panel, in the **Where can eSignature be used?** section, select **Selected sites (up to 100)**. Follow the instructions to either select the sites or upload a CSV listing a maximum of 100 sites. Be sure to add your content center site if you want it to be included. You can then manage site access permissions for the sites you selected. -3. On the **Add or remove other signature providers** panel, select the provider you want to add. +3. Select **Save**. - ![Screenshot showing the Edit signature providers panel.](../media/content-understanding/esignature-edit-providers-panel.png) +> [!NOTE] +> The first eSignature request in a Microsoft 365 tenant might take a little longer to execute than usual. It can take a few seconds to a few minutes; however, subsequent requests are executed normally. We recommend that admins create the first eSignature request in a SharePoint site as the final setup step. -4. Select **Save**. +### Turn off eSignature -> [!NOTE] -> Although [pay-as-you-go billing](syntex-azure-billing.md) must be set up to use eSignature, you are not charged for using other signature providers. +1. On the Syntex page, in the **Document & image services** section, select **eSignature**. ++2. On the **eSignature** panel, clear the **Let people in your organization use eSignature** check box. ## External recipients ### Microsoft Entra B2B -Microsoft Entra B2B provides authentication and management of new guests. External signers or recipients are considered as guests within your tenant. To be able to send requests to new signers outside your organization, you need to enable [Microsoft Entra B2B integration for SharePoint and OneDrive](/sharepoint/sharepoint-azureb2b-integration). Consider whether this meets your compliance and security requirements when enabling eSignature. -A guest user would no longer be able to access the request document or the final signed document if they are deleted from the tenant while the request is still ongoing and you would need to resend the eSignature request if this happens. If you need to delete a guest user, make sure they aren't a party to any ongoing request. This setting does not impact existing in your existing Azure Active Directory guest users. +Microsoft Entra B2B provides authentication and management of new guests. External signers or recipients are considered as guests within your tenant. To be able to send requests to new signers outside your organization, you need to enable [Microsoft Entra B2B integration for SharePoint and OneDrive](/sharepoint/sharepoint-azureb2b-integration). Consider whether this meets your compliance and security requirements when enabling eSignature. ++If a guest user is deleted from the tenant while the request is still ongoing, they will no longer be able to access the request document or the final signed document. In such cases, you will need to resend the eSignature request. Before deleting a guest user, ensure they are not involved in any ongoing requests. This setting doesn't affect your existing Azure Active Directory guest users. ### Authentication Before a signature request is sent and at the completion of the request, certain ### Document retention -When a signature request is created for a document in SharePoint, the SharePoint eSignature service creates a working copy of the document. It's this working copy that is sent out to all recipients for signing, and it's how the sender can track the status of their requests. The working copy of the request is stored in a hidden document library in SharePoint. The signature will be added to the working copy of the request document only after all parties have signed. If any party has not signed, the document will appear as unsigned, even if one party has already added their signature. +When a signature request is created for a document in SharePoint, the SharePoint eSignature service creates a working copy of the document. It's this working copy that is sent out to all recipients for signing, and it's how the sender can track the status of their requests. The working copy of the request is stored in a hidden document library in SharePoint. The signature will be added to the working copy of the request document only after all parties have signed. If any party hasn't signed, the document appears as unsigned, even if one party has already added their signature. -The working copy of the request is stored and retained for five years or in accordance with the document retention policy set up by the SharePoint or tenant admin. Learn more about [retention policies](/purview/retention-policies-sharepoint). +The working copy of the request is stored and retained for five years, or according to the document retention policy established by the SharePoint or tenant admin. Learn more about [retention policies](/purview/retention-policies-sharepoint). ### Expiration of URL links in email |
syntex | Form Processing Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/form-processing-overview.md | description: Learn how to use AI Builder to create structured or freeform docume </br>> -Use the structured document processing model ([layout method](create-syntex-model.md#train-a-custom-model)) to automatically identify field and table values. It works best for structured or semi-structured documents, such as forms and invoices. +Use the structured document processing model ([layout method](create-syntex-model.md#create-a-custom-model)) to automatically identify field and table values. It works best for structured or semi-structured documents, such as forms and invoices. -Use the freeform document processing model ([freeform selection method](create-syntex-model.md#train-a-custom-model)) to automatically extract information from unstructured and freeform documents, such as letters and contracts. +Use the freeform document processing model ([freeform selection method](create-syntex-model.md#create-a-custom-model)) to automatically extract information from unstructured and freeform documents, such as letters and contracts. > [!NOTE] > Microsoft respects the privacy and ownership of data you use to train and process models in Syntex. None of your organization's data is used or transferred by Microsoft to train AI models, large-language models, or any other models. Your data remains securely within your organizationΓÇÖs tenant. For more information, see [Microsoft data protection and privacy](https://www.microsoft.com/en-us/trust-center/privacy). |
syntex | Model Types Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/model-types-overview.md | description: Learn about custom models and prebuilt models in Microsoft Syntex. </br>> -Content understanding in Microsoft Syntex starts with document processing models. Document processing models let you identify and classify documents that are uploaded to SharePoint document libraries, and then to extract the information you need from each file. +Understanding your content in Microsoft Syntex starts with document processing models. Document processing models let you identify and classify documents that are uploaded to SharePoint document libraries, and then to extract the information you need from each file. When applied to a SharePoint document library, the model is associated with a content type and has columns to store the information being extracted. The content type you create is stored in the SharePoint content type gallery. You can also choose to use existing content types to use their schema. -Syntex uses [custom models](#custom-models) and [prebuilt models](#prebuilt-models). +Syntex uses [custom models](#custom-models) and [prebuilt models](#prebuilt-models). -![Diagram showing the types of Syntex custom and prebuilt models.](../media/content-understanding/syntex-model-types-diagram-4.png) +![Diagram showing the types of Syntex custom and prebuilt models.](../media/content-understanding/syntex-model-types-diagram-5.png) Models can be either *enterprise models*, which are created in a [content center](create-a-content-center.md), or *local models*, which are created on your [local SharePoint site](create-local-model.md). Custom models include: - [Structured document processing](#structured-document-processing) To view the side-by-side differences in custom models, see [Compare custom models](./difference-between-document-understanding-and-form-processing-model.md).--When you create a custom model, you'll select the training method associated with the model type. For example, if you want to create an unstructured document processing model, on the **Options for model creation** page where you create a model, you'll choose the **Teaching method** option. The following table shows the training method associated with each custom model type. +<! +When you create a custom model, you'll select the training method associated with the model type. For example, if you want to create an unstructured document processing model, on the **Options for model creation** page where you create a model, you'll choose the **Single class model** option. The following table shows the training method associated with each custom model type. |Unstructured<br> document processing |Freeform<br> document processing |Structured<br> document processing | |||| When you create a custom model, you'll select the training method associated wit > [!NOTE] > To make the **Freeform selection method** and the **Layout method** options available to users, they first must be configured in the Microsoft 365 admin center.-+> ### Unstructured document processing Use the unstructured document processing model to automatically classify documents and extract information from them. It works best with unstructured documents, such as letters or contracts. These documents must have text that can be identified based on phrases or patterns. The identified text designates both the type of file it is (its classification) and what you'd like to extract (its extractors). For example, an unstructured document could be a contract renewal letter that ca This model type supports the widest range of file types and supports [more than 40 languages](/ai-builder/form-processing-model-requirements#model-for-unstructured-and-free-form-documents). -When you create an unstructured document processing model, use the **Teaching method** option. +When you create an unstructured document processing model, use the **Single class model** option. For more information, see [Overview of unstructured document processing](document-understanding-overview.md). Because your organization receives letters and documents in large quantities fro This model type is the best option for documents in PDF or image files when you don't require automatic classification of the type of document, and it supports [more than 40 languages](/ai-builder/form-processing-model-requirements#model-for-unstructured-and-free-form-documents). -When you create a freeform document processing model, use the **Freeform selection method** option. +When you create a freeform document processing model, use the **Freeform extraction model** option. For more information, see [Overview of structured and freeform document processing](form-processing-overview.md). Structured document processing models use Microsoft Power Apps [AI Builder](/ai- This model type supports the [widest range of languages](/ai-builder/form-processing-model-requirements#model-for-structured-and-semi-structured-documents) and is trained to understand the layout of your form from example documents, and then learns to look for the data you need to extract from similar locations. Forms usually have a more structured layout where entities are in the same location (for example, a social security number on a tax form). -When you create a structured document processing model, use the **Layout method** option. +When you create a structured document processing model, use the **Structured extraction model** option. For more information, see [Overview of structured and freeform document processing](form-processing-overview.md). Prebuilt models include: - [Invoice processing](#invoice-processing) - [Receipt processing](#receipt-processing) - [Sensitive information processing](#sensitive-information-processing)--![Screenshot of the Options for model creation page showing the prebuilt model options.](../media/content-understanding/use-a-trained-model-section-2.png) -+- [Simple document processing](#simple-document-processing) +<! +![Screenshot of the Options for model creation page showing the prebuilt model options.](../media/content-understanding/build-a-prebuilt-model-section.png) +> Prebuilt models are pretrained to recognize documents and the structured information in the documents. Instead of having to create a new custom model from scratch, you can iterate on an existing pretrained model to add specific fields that fit the needs of your organization. ### Contract processing For more information about receipt processing models, see [Use a prebuilt model The prebuilt sensitive information processing model analyzes, detects, and extracts key information from documents. The API analyzes contracts in various formats and extracts key sensitive information such as social security numbers, financial account numbers, driver license identification numbers, and other personal information. For more information about sensitive information processing models, see [Use a prebuilt model to detect sensitive information from documents](prebuilt-model-sensitive-info.md).++### Simple document processing ++The prebuilt simple document processing model offers a flexible, pretrained solution for extracting key-value pairs, selection marks, and named entities from basic structured documents. Unlike other prebuilt models with fixed schemas, this model can identify keys that others might miss, providing a valuable alternative to custom model labeling and training. This model also supports barcodes and language detection. ++For more information about simple document processing models, see [Use a prebuilt model to detect sensitive information from documents](prebuilt-model-simple.md). |
syntex | Prebuilt Model Contract | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-model-contract.md | To use a contracts model, follow these steps: ## Step 1: Create a contracts model -Follow the instructions in [Create a model in Syntex](create-syntex-model.md#set-up-a-prebuilt-model) to create a contracts prebuilt model. Then continue with the following steps to complete your model. +Follow the instructions in [Create a model in Syntex](create-syntex-model.md#create-a-prebuilt-model) to create a contracts prebuilt model. Then continue with the following steps to complete your model. ## Step 2: Upload an example file to analyze |
syntex | Prebuilt Model Invoice | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-model-invoice.md | To use an invoices model, follow these steps: ## Step 1: Create an invoices model -Follow the instructions in [Create a model in Syntex](create-syntex-model.md#set-up-a-prebuilt-model) to create an invoices prebuilt model. Then continue with the following steps to complete your model. +Follow the instructions in [Create a model in Syntex](create-syntex-model.md#create-a-prebuilt-model) to create an invoices prebuilt model. Then continue with the following steps to complete your model. ## Step 2: Upload an example file to analyze |
syntex | Prebuilt Model Receipt | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-model-receipt.md | To use a receipts model, follow these steps: ## Step 1: Create a receipts model -Follow the instructions in [Create a model in Syntex](create-syntex-model.md#set-up-a-prebuilt-model) to create a receipts prebuilt model. Then continue with the following steps to complete your model. +Follow the instructions in [Create a model in Syntex](create-syntex-model.md#create-a-prebuilt-model) to create a receipts prebuilt model. Then continue with the following steps to complete your model. ## Step 2: Upload an example file to analyze |
syntex | Prebuilt Model Simple | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-model-simple.md | To use a simple document processing model, follow these steps: ## Step 1: Create the model -Follow the instructions in [Create a model in Syntex](create-syntex-model.md) to create a simple document processing model. Then continue with the following steps to complete your model. +Follow the instructions in [Create a model in Syntex](create-syntex-model.md#create-a-prebuilt-model) to create a simple document processing model. Then continue with the following steps to complete your model. <! Follow the instructions in [Create a model in Syntex](create-syntex-model.md#create-a-prebuilt-model) to create a simple document processing model. Then continue with the following steps to complete your model. > |
syntex | Prebuilt Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-overview.md | After publishing your model, use the content center to apply it to any SharePoin ## Available prebuilt models -Currently, there are four prebuilt models available: [contracts](prebuilt-model-contract.md), [invoices](prebuilt-model-invoice.md), [receipts](prebuilt-model-receipt.md), and [sensitive information](prebuilt-model-sensitive-info.md). +Currently, there are five prebuilt processing models available: [contracts](prebuilt-model-contract.md), [invoices](prebuilt-model-invoice.md), [receipts](prebuilt-model-receipt.md), [sensitive information](prebuilt-model-sensitive-info.md), and [simple document](prebuilt-model-simple.md). -- **Contracts.** The prebuilt *contracts model* analyzes and extracts key information from contract documents. The API analyzes contracts in various formats and extracts key contract information, such as client name and address, contract duration, and renewal date.+- **[Contracts](prebuilt-model-contract.md).** The prebuilt *contracts processing model* analyzes and extracts key information from contract documents. The API analyzes contracts in various formats and extracts key contract information, such as client name and address, contract duration, and renewal date. -- **Invoices.** The *invoices prebuilt model* analyzes and extracts key information from sales invoices. The API analyzes invoices in various formats and [extracts key invoice information](/azure/applied-ai-services/form-recognizer/concept-invoice#field-extraction) such as customer name, billing address, due date, and amount due.+- **[Invoices](prebuilt-model-invoice.md).** The *invoices processing model* analyzes and extracts key information from sales invoices. The API analyzes invoices in various formats and [extracts key invoice information](/azure/applied-ai-services/form-recognizer/concept-invoice#field-extraction) such as customer name, billing address, due date, and amount due. -- **Receipts.** The *receipts prebuilt model* analyzes and extracts key information from sales receipts. The API analyzes printed and handwritten receipts and [extracts key receipt information](/azure/applied-ai-services/form-recognizer/concept-receipt#field-extraction) such as merchant name, merchant phone number, transaction date, tax, and transaction total.+- **[Receipts](prebuilt-model-receipt.md).** The *receipts processing model* analyzes and extracts key information from sales receipts. The API analyzes printed and handwritten receipts and [extracts key receipt information](/azure/applied-ai-services/form-recognizer/concept-receipt#field-extraction) such as merchant name, merchant phone number, transaction date, tax, and transaction total. -- **Sensitive information.** The *sensitive information prebuilt model* analyzes, detects, and extracts key information from documents. The API analyzes documents in various formats and [detects and extracts key sensitive information](prebuilt-model-sensitive-info-entities.md), such as personal and financial identification numbers, physical and email addresses, and phone numbers.+- **[Sensitive information](prebuilt-model-sensitive-info.md).** The *sensitive information model* analyzes, detects, and extracts key information from documents. The API analyzes documents in various formats and [detects and extracts key sensitive information](prebuilt-model-sensitive-info-entities.md), such as personal and financial identification numbers, physical and email addresses, and phone numbers. ++- **[Simple document](prebuilt-model-simple.md).** The *simple document processing model* offers a flexible, pretrained solution for extracting key-value pairs, selection marks, and named entities from basic structured documents. This model also supports barcodes and language detection. <![detects sensitive information](/azure/ai-services/language-service/personally-identifiable-information/concepts/entity-categories)> Additional prebuilt models will be available in future releases. ## Requirements and limitations -For information about requirements to consider when choosing this model, see [Requirements and limitations for models in Microsoft Syntex](requirements-and-limitations.md). ---- +For information about requirements to consider when choosing this model, see [Requirements and limitations for models in Microsoft Syntex](requirements-and-limitations.md#prebuilt-models). |
syntex | Requirements And Limitations | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/requirements-and-limitations.md | Prebuilt models: - [Invoice processing](#invoice-processing) - [Receipt processing](#receipt-processing) - [Sensitive information processing](#sensitive-information-processing)+- [Simple document processing](#simple-document-processing) ## Custom models Prebuilt models: | ![Paragraph symbol.](/office/media/icons/paragraph-writing-blue.png) | **OCR considerations** <br>This model uses optical character recognition (OCR) technology to scan .pdf files, image files, and .tiff files. OCR processing works best on documents that meet the following requirements: <br> - File format of .jpg, .png, or .pdf (text or scanned). Text-embedded .pdf files are better, because there won't be any errors in character extraction and location. <br> - For .pdf and .tiff files, up to 2,000 pages can be processed. <br> - The file size must be less than 50 MB. <br> - For images, dimensions must be between 50 x 50 and 10,000 x 10,000 pixels. <br> - For .pdf files, dimensions must be at most 11 x 17 inches, corresponding to Legal or A3 paper sizes and smaller. <br> - The total size of the training data is 500 pages or less.<br>Supports languages for both [handwritten text](/azure/ai-services/computer-vision/language-support#handwritten-text) and [print text](/azure/ai-services/computer-vision/language-support#print-text). | | ![Globe symbol.](/office/media/icons/globe-internet.png) | **Multi-Geo environments** <br>When setting up Syntex in a [Microsoft 365 Multi-Geo](/microsoft-365/enterprise/microsoft-365-multi-geo) environment, you can only configure it to use the model type in the central location. If you want to use this model type in a satellite location, contact Microsoft support. | | ![Objects symbol.](/office/media/icons/objects-blue.png) | **Multi-model libraries** <br>If two or more trained models are applied to the same library, the file is classified using the model that has the highest average confidence score. The extracted entities will be from the applied model only. |++### Simple document processing ++| Icon | Description | +| - | - | +| ![Files symbol.](/office/media/icons/files-blue.png) | **Supported file types** <br>This model supports the following file types: .bmp, .jpeg, .pdf, .png, and .tiff. | +| ![Conversation symbol.](/office/media/icons/chat-room-conversation-blue.png) | **Supported languages** <br>This model supports documents in more than 100 languages. | +| ![Paragraph symbol.](/office/media/icons/paragraph-writing-blue.png) | **OCR considerations** <br>This model uses optical character recognition (OCR) technology to scan .pdf files, image files, and .tiff files. OCR processing works best on documents that meet the following requirements: <br> - File format of .jpg, .png, or .pdf (text or scanned). Text-embedded .pdf files are better, because there won't be any errors in character extraction and location. <br> - For .pdf and .tiff files, up to 2,000 pages can be processed. <br> - The file size must be less than 50 MB. <br> - For images, dimensions must be between 50 x 50 and 10,000 x 10,000 pixels. <br> - For .pdf files, dimensions must be at most 11 x 17 inches, corresponding to Legal or A3 paper sizes and smaller. <br> - The total size of the training data is 500 pages or less. | +| ![Globe symbol.](/office/media/icons/globe-internet.png) | **Multi-Geo environments** <br>When setting up Syntex in a [Microsoft 365 Multi-Geo](/microsoft-365/enterprise/microsoft-365-multi-geo) environment, you can only configure it to use the model type in the central location. If you want to use this model type in a satellite location, contact Microsoft support. | +| ![Objects symbol.](/office/media/icons/objects-blue.png) | **Multi-model libraries** <br>If two or more trained models are applied to the same library, the file is classified using the model that has the highest average confidence score. The extracted entities will be from the applied model only. | |
syntex | Agreements Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/solutions/agreements-overview.md | description: Learn how to get started with the SharePoint Agreements solution. # Introduction to SharePoint Agreements > [!NOTE]-> SharePoint Agreements is now generally available for early access customers. Contact your Microsoft representative or submit your nomination for the limited GA here: [Sign up for limited GA](https://aka.ms/AgreementsSelectiveGA). For a list of articles to help you set up and use this feature, see [Help documentation](#help-documentation). +> SharePoint Agreements is now generally available for early access users. Contact your Microsoft representative or submit your nomination for the limited GA here: [Sign up for limited GA](https://aka.ms/AgreementsSelectiveGA). For a list of articles to help you set up and use this feature, see [Help documentation](#help-documentation). ## Overview With SharePoint Agreements, you can: ||| |[Key concepts](agreements-key-concepts.md) |Learn the key concepts in SharePoint Agreements. | |[Frequently asked questions](agreements-faq.md) |Get answers to frequently asked questions about SharePoint Agreements. |-|[Licensing requirements](agreements-license-requirements.md) |Learn how to get and assign licenses for SharePoint Agreements. | -|[Set up the solution](agreements-setup.md) |Learn how to set up and manage workspaces, add the Agreements app in Microsoft Teams, and more. | -|[Get users ready](agreements-user-prereqs.md) |Learn how to get users ready to use all of the solution features. | -|[Create a template](agreements-create-template.md) |Learn how to create and publish templates, set up fields and sections, configure workflows, and more. | -|[Update a template](agreements-update-template.md) |Learn how to find and edit existing templates, and publish updates to a template. | -|[Manage sections in a template](agreements-manage-sections.md) |Learn how to publish a new section, insert a section into a template, edit a section, and configure section settings. | -|[Create an agreement](agreements-create-agreement.md) |Learn how to create an agreement from a template in Microsoft Teams and in Microsoft Word. | -|[Analyze section revisions](agreements-analyze-sections.md) |Learn how to use the **Analyze section revisions** feature to detect changes in embedded sections, summarize the changes, and offer suggestions. | +|[Licensing requirements](agreements-license-requirements.md) |Get and assign licenses for SharePoint Agreements. | +|[Set up the solution](agreements-setup.md) |Set up and manage workspaces, add the Agreements app in Microsoft Teams, and more. | +|[Get users ready](agreements-user-prereqs.md) |Get users ready to use all of the solution features. | +|[Create a template](agreements-create-template.md) |Create and publish templates, set up fields and sections, configure workflows, and more. | +|[Update a template](agreements-update-template.md) |Find and edit existing templates, and publish updates to a template. | +|[Manage sections in a template](agreements-manage-sections.md) |Publish a new section, insert a section into a template, edit a section, and configure section settings. | +|[Create an agreement](agreements-create-agreement.md) |Create an agreement from a template in Microsoft Teams and in Microsoft Word. | +|[Analyze section revisions](agreements-analyze-sections.md) |Use the **Analyze section revisions** feature to detect changes in embedded sections, summarize the changes, and offer suggestions. | |[View reports](agreements-reports.md) |Learn about the reports that are available to monitor all agreements, their statuses, and other essential metrics. | |[Receive approval notifications](agreements-notifications.md) |Learn about approval notifications in the Approvals app and in email. |-|[Import an agreement](agreements-import-agreement.md) |Learn how to add existing agreements by uploading signed documents. | +|[Import an agreement](agreements-import-agreement.md) |Add existing agreements by uploading signed documents. | |
syntex | Syntex Licensing | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/syntex-licensing.md | Pay-as-you-go currently supports the following Syntex - Microsoft 365 Archive - Microsoft 365 Backup -More Syntex services will be added as they become available. +More services will be added as they become available. ### Feature limited preview Pay-as-you-go licensing includes access to additional Syntex features for a limi - Accounts payable accelerator - Taxonomy features (including import using SKOS, SKOS formatting reference, push content type to hub, and term store reports) - PDF merge and extract pages-- Content processing: Move or copy a file, set a content type from file name+- Content processing rules (including move or copy a file, set a content type, and translate a document) For more information, see [Microsoft Syntex features limited time license agreement](feature-limited-license.md). |
syntex | Syntex Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/syntex-overview.md | You create *modern templates* based on the business documents you use most. You ![Icon for Receipts model.](../media/content-understanding/trained-receipts-model.png) :::column-end::: :::column span="3":::- Use a [prebuilt model](prebuilt-overview.md) to save time processing and extracting information from [contracts](prebuilt-model-contract.md), [invoices](prebuilt-model-invoice.md), and [receipts](prebuilt-model-receipt.md), and detecting and extracting [sensitive information](prebuilt-model-sensitive-info.md) from documents. Prebuilt models are pretrained to recognize common business documents and the structured information in the documents. + Use a [prebuilt model](prebuilt-overview.md) to save time processing and extracting information from [contracts](prebuilt-model-contract.md), [invoices](prebuilt-model-invoice.md), [receipts](prebuilt-model-receipt.md), [sensitive information](prebuilt-model-sensitive-info.md) documents, and [simple documents](prebuilt-model-simple.md). Prebuilt models are pretrained to recognize common business documents and the structured information in the documents. :::column-end::: :::row-end::: |