Category | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
admin | Increase Threat Protection | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/increase-threat-protection.md | For additional details about securing data and managed devices in Microsoft 365 | 1 | **[Use multifactor authentication](multi-factor-authentication-microsoft-365.md)** | [Multifactor authentication](multi-factor-authentication-microsoft-365.md) (MFA), also known as two-step verification, requires members of your organization to use a code or authentication app on their phone to sign into Microsoft 365. It's a critical first step to protecting your business data. Using MFA can prevent hackers who learn your password from taking over.<br/><br/>See [Turn on multifactor authentication](../../business-premium/m365bp-turn-on-mfa.md). | | 2 | **[Protect your administrator accounts](../../business-premium/m365bp-protect-admin-accounts.md)** | Administrator accounts (used by people called "admins") have elevated privileges, making these accounts more susceptible to cyberattacks. You'll need to set up and manage the appropriate number of admin and user accounts for your business. We also recommend adhering to the information security principle of least privilege, which means that users and applications should be granted access only to the data and operations they require to perform their jobs. <br/><br/>See [Protect your administrator accounts](../../business-premium/m365bp-protect-admin-accounts.md). | | 3 | **[Use preset security policies](/defender-office-365/preset-security-policies)** | Your subscription includes [preset security policies](../../security/office-365-security/preset-security-policies.md) that use recommended settings for anti-spam, anti-malware, and anti-phishing protection. Set your policies in the [Microsoft Defender portal](https://security.microsoft.com) to at least **Standard** protection. <br/><br/>See [Protect against malware and other cyberthreats](../../business-premium/m365bp-protect-against-malware-cyberthreats.md). |-| 4 | **[Protect all devices](../../business-premium/m365bp-set-up-unmanaged-devices.md)** | Every device is a possible attack avenue into your network and must be configured properly, even devices that are owned personally but also used for work. <br/><br/>See these articles: <br/>- [Help users set up MFA](https://support.microsoft.com/office/ace1d096-61e5-449b-a875-58eb3d74de14)<br/>- [Protect unmanaged Windows and Mac devices](../../business-premium/m365bp-protect-pcs-macs.md) <br/>- [Secure managed devices](../../business-premium/m365bp-managed-devices-setup.md) (requires Microsoft 365 Business Premium or Microsoft Defender for Business) | +| 4 | **[Protect all devices](../../business-premium/m365bp-set-up-unmanaged-devices.md)** | Every device is a possible attack avenue into your network and must be configured properly, even devices that are owned personally but also used for work. <br/><br/>See these articles: <br/>- [Help users set up MFA](https://support.microsoft.com/office/ace1d096-61e5-449b-a875-58eb3d74de14)<br/>- [Protect unmanaged Windows and Mac devices](../../business-premium/m365bp-users-protect-unmanaged-devices.md) <br/>- [Secure managed devices](../../business-premium/m365bp-managed-devices-setup.md) (requires Microsoft 365 Business Premium or Microsoft Defender for Business) | | 5 | **[Adjust sharing settings for SharePoint and OneDrive files and folders](../../business-premium/m365bp-protect-against-malware-cyberthreats.md#3-adjust-sharing-settings-for-sharepoint-and-onedrive-files-and-folders)** | Default sharing settings for SharePoint and OneDrive are set to the most permissive level, which might be a more permissive level than you should use. We recommend reviewing, and if necessary changing, the settings to better protect your business. Grant members of your organization only the access they need to do their jobs. <br/><br/>See [Adjust sharing settings for SharePoint and OneDrive files and folders](../../business-premium/m365bp-protect-against-malware-cyberthreats.md#3-adjust-sharing-settings-for-sharepoint-and-onedrive-files-and-folders). | ## Related content |
archive | Archive Pricing | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/archive/archive-pricing.md | Monthly archive usage is calculated as the sum of the usage of all currently arc To see the pricing for Microsoft 365 Archive, see [Pay-as-you-go services and pricing for Microsoft Syntex](/microsoft-365/syntex/syntex-pay-as-you-go-services). +> [!NOTE] +> Unlicensed archived OneDrive sites cannot use additional SharePoint storage to bypass archive costs. For more information, see [Manage unlicensed OneDrive user accounts](/SharePoint/unlicensed-onedrive-accounts#frequently-asked-questions). + ## Pricing calculator The Microsoft 365 Archive pricing calculator is a tool that helps you estimate the costs that you incur to archive your Microsoft 365 data. |
business-premium | M365bp Device Groups Mdb | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-device-groups-mdb.md | Title: Working with device groups in Microsoft 365 Business Premium description: "Learn about device groups and how to apply policies with Intune in Microsoft 365 Business Premium, and increase protection from cyberattacks." search.appverid: MET150--++ audience: Admin |
business-premium | M365bp Device States | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-device-states.md | Title: "View device status with Microsoft Defender for Business" f1.keywords: - NOCSH--++ audience: Admin |
business-premium | M365bp Managed Unmanaged Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-managed-unmanaged-devices.md | Title: Secure managed and unmanaged devices description: Identify personal, unmanaged devices and company-owned devices, and learn how to secure them.--++ Last updated 05/31/2024 To protect unmanaged devices, such as BYOD devices, your organization's IT or se For their part in protecting unmanaged devices, users can: -- **Turn on encryption and firewall protection**. Disk encryption protects data when devices are lost or stolen. Firewall protection helps protect devices from unwanted contact initiated by other computers when you're connected to the Internet or a network. To learn more, see [Protect unmanaged Windows PCs and Macs in Microsoft 365 Business Premium](m365bp-protect-pcs-macs.md).+- **Turn on encryption and firewall protection**. Disk encryption protects data when devices are lost or stolen. Firewall protection helps protect devices from unwanted contact initiated by other computers when you're connected to the Internet or a network. To learn more, see [Protect unmanaged Windows PCs and Macs in Microsoft 365 Business Premium](m365bp-users-protect-unmanaged-devices.md). - **Make sure antivirus/antimalware software is installed and up to date on all devices**. To learn more, see [Stay protected with Windows Security](https://support.microsoft.com/windows/stay-protected-with-windows-security-2ae0363d-0ada-c064-8b56-6a39afb6a963). - **Keep their devices up to date with operating system and application updates**. To learn more, see [Keep your PC up to date](https://support.microsoft.com/windows/keep-your-pc-up-to-date-de79813c-7919-5fed-080f-0871c7bd9bde). - **Consider allowing their devices to be managed by your security team**. Microsoft 365 Business Premium includes advanced protection from ransomware, malware, phishing, and other threats. To learn more, select the **Managed devices** tab (in this article). |
business-premium | M365bp Mdb Whats New | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-mdb-whats-new.md | description: Learn about new features and capabilities in Microsoft 365 Business search.appverid: - MET150 - BCS160--++ audience: Admin |
business-premium | M365bp Onboard Devices Mdb | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-onboard-devices-mdb.md | Title: Onboard your organization's devices to Microsoft Defender for Business description: Onboard your organization's devices to Microsoft Defender for Business search.appverid: MET150--++ audience: Admin |
business-premium | M365bp Protect Managed Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-managed-devices.md | Title: "Secure managed devices with Microsoft 365 Business Premium" f1.keywords: - NOCSH--++ audience: Admin |
business-premium | M365bp Review Remediation Actions Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-review-remediation-actions-devices.md | Title: Review remediation actions in Microsoft Defender XDR description: See how to view remediations that were taken automatically or that are awaiting approval in the Action center. search.appverid: MET150--++ audience: Admin |
business-premium | M365bp Review Threats Take Action | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-review-threats-take-action.md | Title: "Review detected threats on devices and take action" f1.keywords: NOCSH--++ audience: Admin |
business-premium | M365bp Security Incident Management | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-security-incident-management.md | Title: "Security incident management" f1.keywords: - NOCSH--++ audience: Admin |
business-premium | M365bp Set Up Unmanaged Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-set-up-unmanaged-devices.md | Title: "Set up unmanaged devices with Microsoft 365 Business Premium" f1.keywords: - NOCSH--++ audience: Admin To set up unmanaged (BYOD) devices, follow these steps: 2. [Get Microsoft 365 Apps installed on devices](m365bp-users-install-m365-apps.md). -3. [Protected unmanaged Windows and Mac devices](m365bp-protect-pcs-macs.md). +3. [Protected unmanaged Windows and Mac devices](m365bp-users-protect-unmanaged-devices.md). Once you've completed these steps, proceed to [Use email securely](m365bp-use-email-securely.md). |
business-premium | M365bp Threats Detected Defender Av | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-threats-detected-defender-av.md | Title: "Threats detected by Microsoft Defender Antivirus" f1.keywords: CSH--++ audience: Admin |
business-premium | M365bp Users Install M365 Apps | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-users-install-m365-apps.md | Here's how users can install their apps: ## Next step -Set up protection for [unmanaged devices](m365bp-protect-pcs-macs.md). +Set up protection for [unmanaged devices](m365bp-users-protect-unmanaged-devices.md). |
business-premium | M365bp Users Protect Unmanaged Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-users-protect-unmanaged-devices.md | Title: "Protect unmanaged devices with Microsoft 365 Business Premium" f1.keywords: - NOCSH--++ audience: Admin |
business-premium | M365bp View Edit Create Mdb Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-view-edit-create-mdb-policies.md | Title: View or edit device protection policies description: View, edit, create, and delete device protection policies in Microsoft 365 Business Premium search.appverid: MET150--++ audience: Admin |
enterprise | Urls And Ip Address Ranges 21Vianet | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/urls-and-ip-address-ranges-21vianet.md | Title: "URLs and IP address ranges for Microsoft 365 operated by 21Vianet" Previously updated : 09/30/2024 Last updated : 10/31/2024 audience: ITPro hideEdit: true **Microsoft 365 endpoints:** [Worldwide (including GCC)](urls-and-ip-address-ranges.md) | *Microsoft 365 operated by 21 Vianet* | [Microsoft 365 U.S. Government DoD](microsoft-365-u-s-government-dod-endpoints.md) | [Microsoft 365 U.S. Government GCC High](microsoft-365-u-s-government-gcc-high-endpoints.md) | -**Last updated:** 09/30/2024 - ![RSS.](../media/5dc6bb29-25db-4f44-9580-77c735492c4b.png) [Change Log subscription](https://endpoints.office.com/version/China?allversions=true&format=rss&clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7) +**Last updated:** 10/31/2024 - ![RSS.](../media/5dc6bb29-25db-4f44-9580-77c735492c4b.png) [Change Log subscription](https://endpoints.office.com/version/China?allversions=true&format=rss&clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7) **Download:** all required and optional destinations in one [JSON formatted](https://endpoints.office.com/endpoints/China?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7) list. |
enterprise | Urls And Ip Address Ranges | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/urls-and-ip-address-ranges.md | Title: "Microsoft 365 URLs and IP address ranges" Previously updated : 09/30/2024 Last updated : 10/31/2024 audience: Admin Microsoft 365 requires connectivity to the Internet. The endpoints below should |Notes|Download|Use| ||||-|**Last updated:** 09/30/2024 - ![RSS.](../medi#pacfiles)| +|**Last updated:** 10/31/2024 - ![RSS.](../medi#pacfiles)| | Start with [Managing Microsoft 365 endpoints](managing-office-365-endpoints.md) to understand our recommendations for managing network connectivity using this data. Endpoints data is updated as needed at the beginning of each month with new IP Addresses and URLs published 30 days in advance of being active. This cadence allows for customers who don't yet have automated updates to complete their processes before new connectivity is required. Endpoints may also be updated during the month if needed to address support escalations, security incidents, or other immediate operational requirements. The data shown on this page below is all generated from the REST-based web services. If you're using a script or a network device to access this data, you should go to the [Web service](microsoft-365-ip-web-service.md) directly. |
syntex | Prebuilt Model Simple | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-model-simple.md | + + Title: Use a prebuilt model to extract information from simple documents in Microsoft Syntex ++++ Last updated : 11/05/2024+audience: admin ++++search.appverid: ++ - enabler-strategic + - m365initiative-syntex +ms.localizationpriority: medium ++description: Learn how to use a simple document processing model in Microsoft Syntex. ++++# Use a prebuilt model to extract information from simple documents in Microsoft Syntex ++The *simple document processing model* offers a flexible, pretrained solution for extracting information from [basic structured documents](#types-of-documents), including information such as: ++- **Key-value pairs** ΓÇô Think of these like labels and their corresponding information, such as ΓÇ£Name: Adele Vance.ΓÇ¥ ++- **Selection marks** ΓÇô These are checkboxes or other marks that indicate choices or selections in a document. ++- **Named entities** ΓÇô These are specific items like names of people, places, or organizations mentioned in the text of a document. ++- **Barcodes** ΓÇô These are machine-readable representations of data that can be used for tracking or identification purposes in a document. ++Unlike other prebuilt models with fixed schemas, this model can identify keys that others might miss, providing a valuable alternative to custom model labeling and training. This model also supports barcodes and language detection. ++### Types of documents ++Simple document processing works best with the types of documents that contain structured information, such as: ++- **Forms** ΓÇô These often have clear fields and labels, making it easier to extract key-value pairs. ++- **Invoices** ΓÇô Typically include consistent layouts with tables and key-value pairs. ++- **Receipts** ΓÇô Similar to invoices, they have structured data that can be easily extracted. ++- **Contracts** ΓÇô Contain well-defined sections and clauses that can be parsed effectively. ++- **Bank statements** ΓÇô Include tables and structured data that are ideal for extraction. ++These documents benefit from the optical character recognition (OCR) capabilities and deep learning processes used to extract key-value pairs, selection marks, tables, and named entities. ++> [!NOTE] +> Currently, this model is available for .pdf and image file types and in more than 100 languages. More supported file types will be added in future releases. ++To use a simple document processing model, follow these steps: ++- Step 1: [Create the model](#step-1-create-the-model) +- Step 2: [Upload an example file to analyze](#step-2-upload-an-example-file-to-analyze) +- Step 3: [Select extractors for your model](#step-3-select-extractors-for-your-model) +- Step 4: [Apply the model](#step-4-apply-the-model) ++## Step 1: Create the model ++Follow the instructions in [Create a model in Syntex](create-syntex-model.md) to create a simple document processing model. Then continue with the following steps to complete your model. +<! +Follow the instructions in [Create a model in Syntex](create-syntex-model.md#create-a-prebuilt-model) to create a simple document processing model. Then continue with the following steps to complete your model. +> +## Step 2: Upload an example file to analyze ++1. On the **Models** page, in the **Add a file to analyze** section, select **Add a file**. ++ ![Screenshot of the new models page showing the Add a file to analyze section.](../media/content-understanding/prebuilt-add-file-to-analyze-simple.png) ++2. On the **Files to analyze the model** page, select **Add** to find the file you want to use. ++ ![Screenshot of the Files to analyze the model page showing the Add button.](../media/content-understanding/prebuilt-add-file-button.png) ++3. On the **Add a file from the training files library** page, select the file, and then select **Add**. ++ ![Screenshot of the Add a file from the training files library page.](../media/content-understanding/prebuilt-add-file-from-training-library.png) ++4. On the **Files to analyze the model** page, select **Next**. ++## Step 3: Select extractors for your model ++On the extractor details page, you see the document area on the right of the page and the **Extractors** panel on the left. The **Extractors** panel shows the list of extractors that have been identified in the document. ++ ![Screenshot of the extractor details page and Extractors panel.](../media/content-understanding/prebuilt-extractor-details-page-simple.png) ++The entity fields that are highlighted in green in the document area are the items that were detected by the model when it analyzed the file. When you select an entity to extract, the highlighted field changes to blue. If you later decide not to include the entity, the highlighted field changes to gray. The highlights make it easier to see the current state of the extractors you select. ++> [!TIP] +> To zoom in or out to read the entity fields, use your mouseΓÇÖs scroll wheel or the zoom controls at the bottom of the document area. ++### Select an extractor entity ++You can select an extractor either from the document area or from the **Extractors** panel, depending on your preference. ++- To select an extractor from the document area, select the entity field. +<!-- + ![Screenshot of the document area showing how to select an entity field.](../media/content-understanding/prebuilt-document-area-select-field-contracts.png) +> +- To select an extractor from the **Extractors** panel, in the **Extract** column, select the corresponding checkbox to the right of the entity name. +<! + ![Screenshot of the Extractors panel showing how to select an entity field.](../media/content-understanding/prebuilt-extractors-panel-select-field-contracts.png) +> +When you select an extractor, the **Select extractor?** box is displayed in the document area. The box shows the key name (the name generated for the extractor), the detected value (the value of that field in the document), the column type, and the option to select the entity as an extractor. ++ ![Screenshot of the Select extractor box on the extractor details page.](../media/content-understanding/prebuilt-select-distractor-box-simple.png) ++The key name is used as the column name when the model is applied to a SharePoint library. You can change the key name to be more descriptive if you like. The column type shows how the information is displayed in a library. You can change the column type to show how you want the information displayed. When the model is applied to a library, you can use column formatting to specify how you want it to look in the document. ++Continue to select other extractors you want to you use. You can also add other files to analyze for this model configuration. ++### Rename an extractor ++There are three ways you can rename an extractor: ++- In the document area of the extractor details page, select the entity field. On the **Select extractor?** box, in the **Key name** field, enter a new name for the extractor. ++- On the **Extractors** panel of the extractor details page, select the extractor you want to rename, and then select **Rename**. ++- From the model home page, in the **Extractors** section, select the extractor you want to rename, and then select **Rename**. +<! +To rename an extractor from the model home page : ++1. In the **Extractors** section of the extractor details page, select the extractor you want to rename, and then select **Rename**. ++ ![Screenshot of the Extractors section with the Rename option highlighted.](../media/content-understanding/prebuilt-model-page-rename-extractor.png) ++2. On the **Rename entity extractor** panel, enter the new name of the extractor, and then select **Rename**. ++To rename an extractor from the **Extractors** panel: ++1. Select the extractor you want to rename, and then select **Rename**. ++ ![Screenshot of the Extractors panel showing how to rename an extractor.](../media/content-understanding/prebuilt-extractors-panel-rename-field.png) ++2. In the **Rename extractor** box, enter the new name of the extractor, and then select **Rename**. +> ++### Set a page range for processing ++For this model, you can specify to process a range of pages for a file rather than the entire file. On the **Extractors** panel, in the **Page range** section, select the page you want processed. By default, the **Page range** setting is empty. If no page range is provided, the entire document is processed. For more information, see [Set a page range to extract information from specific pages](page-range.md). ++### Detect the language of a document ++For this model, you can detect the language of a document and extract it to a column. On the **Extractors** panel, in the **Language detection** section, toggle to turn on language detection. It shows you the ISO code the detected language. ++ ![Screenshot of the Language detection section of the Extractors panel.](../media/content-understanding/prebuilt-simple-language-detection.png) ++You also can turn on or off language detection from the **Model settings** panel for the model. ++## Step 4: Apply the model ++- To save changes and return to the model home page, on the **Extractors** panel, select **Save and exit**. ++- If you're ready to apply the model to a library, in the document area, select **Next**. On the **Add to library** panel, choose the library to which you want to add the model, and then select **Add**. + |