Updates from: 11/05/2022 02:49:36
Category Microsoft Docs article Related commit history on GitHub Change details
admin Add Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/add-users.md
If you're seeing this page in the admin center, you're on the **admin simplified
4. Add the email address of the user in the **Up to 5 email addresses...** text box. This will make sure the new user gets the information they need to sign into Microsoft 365 services. 5. Select **Add user** and **Download sign-in info** if you want to save this info.
+## Watch: Add multiple user
+
+Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198205).
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE5aOTI?autoplay=false]
+ ## Add multiple users at the same time in dashboard view 1. Go to **Users** > **Active users**, and select **Add multiple users**.
admin Admin Center Accessibility Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/admin-center-accessibility-overview.md
We prioritize inclusive design and accessibility in products and services. Micro
## Conformance status The [Web Content Accessibility Guidelines (WCAG)](https://www.w3.org/WAI/standards-guidelines/wcag/) defines requirements for designers and developers to improve accessibility for people with disabilities. It defines three levels of conformance: Level A, Level AA, and Level AAA. The Microsoft 365 admin center is partially conformant with WCAG 2.1 level AA. Partially conformant means that some parts of the content don't fully conform to the accessibility standard.
-Compatibility with browsers and assistive technology
+
+## Compatibility with browsers and assistive technology
The Microsoft 365 admin center is designed to be compatible with the latest versions of NVDA, Microsoft Edge, and Google Chrome. A Microsoft 365 Admin app is available for iOS and Android, and users can use Voiceover and Talkback screen readers on those devices.
business-premium M365bp Mdb Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-mdb-whats-new.md
audience: Admin Previously updated : 11/03/2022 Last updated : 11/04/2022 ms.localizationpriority: medium
f1.keywords: NOCSH
- [Microsoft 365 Business Premium](index.md) - [Microsoft Defender for Business](../security/defender-business/mdb-overview.md)
-This article lists new features in the latest release of Microsoft 365 Business Premium, which includes Microsoft Defender for Business. Features that are currently in preview are denoted with **(preview)**.
+This article lists new features in the latest release of [Microsoft 365 Business Premium](index.md) and [Microsoft Defender for Business](../security/defender-business/mdb-overview.md). Features that are currently in preview are denoted with **(preview)**.
## November 2022
This article lists new features in the latest release of Microsoft 365 Business
## March 2022 -- **Microsoft 365 Business Premium now includes Defender for Business**. See [Tech Community blog: New security solutions to help secure small and medium businesses](https://techcommunity.microsoft.com/t5/small-and-medium-business-blog/new-security-solutions-to-help-secure-small-and-medium/ba-p/3207043).
+- **Microsoft 365 Business Premium now includes Defender for Business**. See [Tech Community blog: New security solutions to help secure small and medium businesses](https://techcommunity.microsoft.com/t5/small-and-medium-business-blog/new-security-solutions-to-help-secure-small-and-medium/ba-p/3207043).
+
+## See also
+
+[What's new in Microsoft 365 Lighthouse](../lighthouse/m365-lighthouse-whats-new.md)
compliance Classifier Learn About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/classifier-learn-about.md
description: "Trainable classifiers can recognize various types of content for l
# Learn about trainable classifiers
-Categorizaing and labeling content so it can be protected and handled properly is the starting place for the information protection discipline. Microsoft Purview has three ways to classify content.
+Categorizing and labeling content so it can be protected and handled properly is the starting place for the information protection discipline. Microsoft Purview has three ways to classify content.
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
Manual categorizing requires human judgment and action. Users and admins categor
## Automated pattern-matching
-These categorization mechanisms includes finding content by:
+These categorization mechanisms include finding content by:
- Keywords or metadata values (keyword query language). - Using previously identified patterns of sensitive information like social security, credit card, or bank account numbers [(Sensitive information type entity definitions)](sensitive-information-type-entity-definitions.md).
Sensitivity and retention labels can then be automatically applied to make the c
## Classifiers
-This categorization method is well suited to content that isn't easily identified by either the manual or automated pattern-matching methods. This method of categorization is more about using a classifier to identify an item based on what the item is, not by elements that are in the item (pattern matching). A classifier learns how to identify a type of content by looking at hundreds of examples of the content you're interested in indentifying.
+This categorization method is well suited to content that isn't easily identified by either the manual or automated pattern-matching methods. This method of categorization is more about using a classifier to identify an item based on what the item is, not by elements that are in the item (pattern matching). A classifier learns how to identify a type of content by looking at hundreds of examples of the content you're interested in identifying.
> [!NOTE] > In Preview - You can view the trainable classifiers in content explorer by expanding **Trainable Classifiers** in the filters panel. The trainable classifiers will automatically display the number of incidents found in SharePoint, Teams, and OneDrive, without requiring any labeling.
compliance Dlp Configure Endpoint Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-configure-endpoint-settings.md
You can control whether sensitive files that are protected by your policies can
When the **Service domains** list is set to **Allow**, DLP policies won't be applied when a user attempts to upload a sensitive file to any of the domains on the list.
-If the list mode is set to **Allow**, any user activity involving a sensitive item and a domain that's on the list will be audited. The activity is allowed. When a user attempts an activity involving a sensitive item and a domain that *isn't* on the list then DLP policies, and the actions defined in the polices, are applied.
+If the list mode is set to **Allow**, any user activity involving a sensitive item and a domain that's on the list will be audited. The activity is allowed. When a user attempts an activity involving a sensitive item and a domain that *isn't* on the list then DLP policies, and the actions defined in the policies, are applied.
For example, with this configuration:
File activity will always be audited for onboarded devices, regardless of whethe
Use this setting to define groups of printers that you want to assign policy actions to that are different from the global printing actions. For example, say you want your DLP policy to block printing of contracts to all printers, except for printers that are in the legal department.
-This feature is available for devices running any of the following Windows versions :
+This feature is available for devices running any of the following Windows versions:
- Windows 10 and later (20H2, 21H1, 21H2) - Win 11 21H2, 22H2
The most common use case is to use printers groups as an allowlist as in the abo
Use this setting to define groups of removable storage devices, like USB thumb drives, that you want to assign policy actions to that are different from the global printing actions. For example, say you want your DLP policy to block copying of items with engineering specifications to all removeable storage devices, except for USB connected hard drives that are used to back up data and are then sent offsite.
-This feature is available for devices running any of the following Windows versions :
+This feature is available for devices running any of the following Windows versions:
- Windows 10 and later (20H2, 21H1, 21H2) - Win 11 21H2, 22H2
compliance Endpoint Dlp Using https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-using.md
There are three procedures.
7. Enter the path to the folder on local machines where you want the original sensitive files to be moved to. For example:
- **'%homedrive%%homepath%\Microsoft DLP\Quarantine'** for the username *Isaiah langer* will place the moved items in a folder named:
+ **'%homedrive%%homepath%\Microsoft DLP\Quarantine'** for the username *Isaiah Langer* will place the moved items in a folder named:
*C:\Users\IsaiahLanger\Microsoft DLP\Quarantine\OneDrive*
In this scenario, we'll define a group of printers that the legal department use
### Create and use printer groups 1. In the Microsoft Purview compliance portal open **Data loss prevention** > **Endpoint DLP settings** > **Printer groups**.
-1. Select **Create printer group** and give the group a name. In this scenarion, we'll use `Legal printers`.
+1. Select **Create printer group** and give the group a name. In this scenario, we'll use `Legal printers`.
1. Select **Add printer** and provide a name. You can define printers by: 1. Friendly printer name 1. USB product ID
compliance Information Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-protection.md
To apply flexible protection actions that include encryption, access restriction
[Rights Management connector](/azure/information-protection/deploy-rms-connector) |Protection-only for existing on-premises deployments that use Exchange or SharePoint Server, or file servers that run Windows Server and File Classification Infrastructure (FCI). | [Steps to deploy the RMS connector](/azure/information-protection/deploy-rms-connector#steps-to-deploy-the-rms-connector) |[Azure Information Protection unified labeling scanner](/azure/information-protection/deploy-aip-scanner)| Discovers, labels, and protects sensitive information that resides in data stores that are on premises. | [Configuring and installing the Azure Information Protection unified labeling scanner](/azure/information-protection/deploy-aip-scanner-configure-install)| |[Microsoft Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security)| Discovers, labels, and protects sensitive information that resides in data stores that are in the cloud. | [Discover, classify, label, and protect regulated and sensitive data stored in the cloud](/cloud-app-security/best-practices#discover-classify-label-and-protect-regulated-and-sensitive-data-stored-in-the-cloud)|
-|[Microsoft Purview Data Map](/azure/purview/overview) |Identifies sensitive data and applies automatic labeling to content in Microsoft Purview Data Map assets. These include files in storage such as Azure Data Lake and Azure Files, and schematized data such as columns in Azure SQL DB, and Cosmos DB. |[Labeling in Microsoft Purview Data Map](/azure/purview/create-sensitivity-label) |
+|[Microsoft Purview Data Map](/azure/purview/overview) |Identifies sensitive data and applies automatic labeling to content in Microsoft Purview Data Map assets. These include files in storage such as Azure Data Lake and Azure Files, and schematized data such as columns in Azure SQL DB and Azure Cosmos DB. |[Labeling in Microsoft Purview Data Map](/azure/purview/create-sensitivity-label) |
|[Microsoft Information Protection SDK](/information-protection/develop/overview#microsoft-information-protection-sdk)|Extends sensitivity labels to third-party apps and services. <br /><br /> Example scenario: [Set and get a sensitivity label (C++)](/information-protection/develop/quick-file-set-get-label-cpp) |[Microsoft Information Protection (MIP) SDK setup and configuration](/information-protection/develop/setup-configure-mip)|
compliance Office 365 Service Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/office-365-service-encryption.md
audience: ITPro Previously updated : 10/3/2019 Last updated : 11/04/2022 ms.localizationpriority: null search.appverid: - MET150
In addition to using volume-level encryption, Exchange Online, Microsoft Teams,
[!INCLUDE [purview-preview](../includes/purview-preview.md)] ## Microsoft-managed keys+ Microsoft manages all cryptographic keys including the root keys for service encryption. This option is currently enabled by default for Exchange Online, SharePoint Online, OneDrive for Business. Microsoft-managed keys provide default service encryption unless you decide to onboard using Customer Key. If, at a later date, you decide to stop using Customer Key without following the data purge path, then your data stays encrypted using the Microsoft-managed keys. Your data is always encrypted at this default level at a minimum. ## Customer Key
-You supply root keys used with service encryption and you manage these keys using Azure Key Vault. Microsoft manages all other keys. This option is called Customer Key, and it is currently available for Exchange Online, SharePoint Online, and OneDrive for Business. (Previously referred to as Advanced Encryption with BYOK. See [Enhancing transparency and control for Office 365 customers](https://www.microsoft.com/en-us/microsoft-365/blog/2015/04/21/enhancing-transparency-and-control-for-office-365-customers/) for the original announcement.)
+
+You supply root keys used with service encryption and you manage these keys using Azure Key Vault. Microsoft manages all other keys. This option is called Customer Key, and it's currently available for Exchange Online, SharePoint Online, and OneDrive for Business. (Previously referred to as Advanced Encryption with BYOK.)
Service encryption provides multiple benefits:
Service encryption provides multiple benefits:
- Enhances the ability of Microsoft 365 to meet the demands of customers that have specific compliance requirements regarding encryption.
-Using Customer Key, you can generate your own cryptographic keys using either an on-premises Hardware Service Module (HSM) or Azure Key Vault (AKV). Regardless of how you generate the key, you use AKV to control and manage the cryptographic keys used by Office 365. Once your keys are stored in AKV, they can be used as the root of one of the keychains that encrypts your mailbox data or files.
+Using Customer Key, you can generate your own cryptographic keys. You can use an on-premises Hardware Service Module (HSM) or Azure Key Vault (AKV) to generate your keys. AKV lets you control and manage the cryptographic keys used by Microsoft 365. Customer Key uses the keys stored in the AKV as the root of one of the keychains that encrypts your mailbox data or files.
-Another benefit of Customer Key is the control you have over the ability of Microsoft to process your data. If you want to remove data from Office 365, such as if you want to terminate service with Microsoft or remove a portion of your data stored in the cloud, you can do so and use Customer Key as a technical control. Removing data ensures that no one, including Microsoft, can access or process the data. Customer Key is in addition and complementary to Customer Lockbox that you use to control access to your data by Microsoft personnel.
+Customer Key provides you more control over how Microsoft processes your data. For example, You can use Customer Key as a technical control if you want to terminate service with Microsoft or remove a portion of your data stored in the cloud. Removing data ensures no one, including Microsoft, can access or process the data. Customer Key is in addition and complementary to Customer Lockbox that you use to control access to your data by Microsoft personnel.
-To learn how to set up Customer Key for Microsoft 365 for Exchange Online, Microsoft Teams, SharePoint Online, including Team Sites, and OneDrive for Business, see these articles:
+To learn how to set up Customer Key for Exchange Online, Microsoft Teams, SharePoint Online, including Team Sites, and OneDrive for Business, see these articles:
-- [Service encryption with Customer Key](customer-key-overview.md)
+- [Service encryption with Microsoft Purview Customer Key](customer-key-overview.md)
- [Set up Customer Key](customer-key-set-up.md) - [Manage Customer Key](customer-key-manage.md) -- [Roll or rotate a customer key or an availability key](customer-key-availability-key-roll.md)
+- [Roll or rotate a Customer Key or an availability key](customer-key-availability-key-roll.md)
- [Understand the availability key](customer-key-availability-key-understand.md)
compliance Sensitive Information Type Entity Definitions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitive-information-type-entity-definitions.md
This article is a list of all sensitive information type (SIT) entity definition
- [Azure Cognitive Search API key](sit-defn-azure-cognitive-search-api-key.md) - [Azure Cognitive Service key](sit-defn-azure-cognitive-service-key.md) - [Azure Container Registry access key](sit-defn-azure-container-registry-access-key.md)-- [Azure COSMOS DB account access key](sit-defn-azure-cosmos-db-account-access-key.md)
+- [Azure Cosmos DB account access key](sit-defn-azure-cosmos-db-account-access-key.md)
- [Azure Databricks personal access token](sit-defn-azure-databricks-personal-access-token.md) - [Azure DevOps app secret](sit-defn-azure-devops-app-secret.md) - [Azure DevOps personal access token](sit-defn-azure-devops-personal-access-token.md)
This article is a list of all sensitive information type (SIT) entity definition
- [Ukraine passport international](sit-defn-ukraine-passport-international.md) - [User login credentials](sit-defn-user-login-credentials.md) - [X.509 certificate private key](sit-defn-x-509-certificate-private-key.md)-
compliance Sensitivity Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels.md
You can use sensitivity labels to:
- **Extend sensitivity labels to Power BI**: When you turn on this capability, you can apply and view labels in Power BI, and protect data when it's saved outside the service. -- **Extend sensitivity labels to assets in Microsoft Purview Data Map**: When you turn on this capability, currently in preview, you can apply your sensitivity labels to files and schematized data assets in Microsoft Purview Data Map. The schematized data assets include SQL, Azure SQL, Azure Synapse, Azure Cosmos, and AWS RDS.
+- **Extend sensitivity labels to assets in Microsoft Purview Data Map**: When you turn on this capability, currently in preview, you can apply your sensitivity labels to files and schematized data assets in Microsoft Purview Data Map. The schematized data assets include SQL, Azure SQL, Azure Synapse, Azure Cosmos DB, and AWS RDS.
- **Extend sensitivity labels to third-party apps and services.** Using the Microsoft Information Protection SDK, third-party apps can read sensitivity labels and apply protection settings.
compliance Sit Defn Azure Cosmos Db Account Access Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-cosmos-db-account-access-key.md
Title: "Azure COSMOS DB account access key entity definition"
+ Title: "Azure Cosmos DB account access key entity definition"
f1.keywords: - CSH
hideEdit: true feedback_system: None recommendations: false
-description: "Azure COSMOS DB account access key sensitive information type entity definition."
+description: "Azure Cosmos DB account access key sensitive information type entity definition."
-# Azure COSMOS DB account access key
+# Azure Cosmos DB account access key
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
SITs that have checksums use a unique calculation to check if the information is
## Definition
-This SIT is designed to match the security information that's used to provide access to administrative resources for [Azure COSMOS Database](/azure/cosmos-db/secure-access-to-data) accounts.
+This SIT is designed to match the security information that's used to provide access to administrative resources for [Azure Cosmos DB](/azure/cosmos-db/secure-access-to-data) accounts.
It uses several primary resources:
security Supported Capabilities By Platform https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/supported-capabilities-by-platform.md
The following table gives information about the supported Microsoft Defender for
|Operating System |Windows 10 & 11 |Windows Server 2012 R2 <sup>[[1](#fn1)]</sup>, <br> 2016 <sup>[[1](#fn1)]</sup>, <br> 2019 & 2022, <br> 1803+ |macOS |Linux| |||||| |**Prevention** | | | | |
-|Attack Surface Reduction rules | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) | ![No](images/svg/check-no.svg) |
-|Controlled folder access | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) | ![No](images/svg/check-no.svg) |
+|[Attack Surface Reduction rules](attack-surface-reduction.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) | ![No](images/svg/check-no.svg) |
+|[Controlled folder access](controlled-folders.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) | ![No](images/svg/check-no.svg) |
|Device Control | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) |
-|Firewall | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) | ![No](images/svg/check-no.svg) |
-|Network Protection | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> |
-|Next-generation protection | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) |
-|Tamper Protection | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) |
-|Web Protection | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> |
+|[Firewall](host-firewall-reporting.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) | ![No](images/svg/check-no.svg) |
+|[Network Protection](network-protection.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> |
+|[Next-generation protection](next-generation-protection.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) |
+|[Tamper Protection](prevent-changes-to-security-settings-with-tamper-protection.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) |
+|[Web Protection](web-protection-overview.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> |
|||||| |**Detection** | | | | |
-|Advanced Hunting | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) |
-|Custom file indicators | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) |
-|Custom network indicators | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> |
-|EDR Block | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) | ![No](images/svg/check-no.svg) |
-|Passive Mode | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) |
+|[Advanced Hunting](../defender/advanced-hunting-overview.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) |
+|[Custom file indicators](indicator-file.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) |
+|[Custom network indicators](indicator-ip-domain.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> |
+|[EDR Block](edr-in-block-mode.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) | ![No](images/svg/check-no.svg) |
+|[Passive Mode](microsoft-defender-antivirus-compatibility.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) |
|Sense detection sensor | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | |Endpoint & network device discovery | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) | ![No](images/svg/check-no.svg) | ![No](images/svg/check-no.svg) |
-|Vulnerability management | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) |
+|[Vulnerability management](../defender-vulnerability-management/defender-vulnerability-management.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) |
|||||| |**Response** | | | ||
-|Automated Investigation & Response (AIR) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) | ![No](images/svg/check-no.svg) |
-|Device response capabilities: collect investigation package, run AV scan | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)][[3](#fn3)]</sup> | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)][[3](#fn3)]</sup> |
-|Device isolation | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)][[3](#fn3)]</sup> | ![No](images/svg/check-no.svg) |
+|[Automated Investigation & Response (AIR)](automated-investigations.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) | ![No](images/svg/check-no.svg) |
+|[Device response capabilities: collect investigation package, run AV scan](respond-machine-alerts.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)][[3](#fn3)]</sup> | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)][[3](#fn3)]</sup> |
+|[Device isolation](respond-machine-alerts.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)][[3](#fn3)]</sup> | ![No](images/svg/check-no.svg) |
|File response capabilities: collect file, deep analysis, block file, stop, and quarantine processes | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) <sup>[[4](#fn4)]</sup> | ![No](images/svg/check-no.svg) <sup>[[4](#fn4)]</sup> |
-|Live Response | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> |
+|[Live Response](live-response.md) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> | ![Yes.](images/svg/check-yes.svg) <sup>[[2](#fn2)]</sup> |
(<a id="fn1">1</a>) Refers to the modern, unified solution for Windows Server 2012 R2 and 2016. For more information, see [Onboard Windows Servers to the Defender for Endpoint service](configure-server-endpoints.md).