Updates from: 02/11/2023 02:18:13
Category Microsoft Docs article Related commit history on GitHub Change details
admin Give Mailbox Permissions To Another User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/give-mailbox-permissions-to-another-user.md
There are a few different ways you can access a mailbox once you've been given a
## Related content
-[Manage another person's mail and calendar items](https://support.microsoft.com/office/afb79d6b-2967-43b9-a944-a6b953190af5) (article)\
+[Manage another person's mail and calendar items](https://support.microsoft.com/office/afb79d6b-2967-43b9-a944-a6b953190af5) (article)\
[Send email from another person or group](https://support.microsoft.com/office/0f4964af-aec6-484b-a65c-0434df8cdb6b) (article)\ [Change a user name and email address](../add-users/change-a-user-name-and-email-address.md) (video)
admin Remove Former Employee Step 6 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/remove-former-employee-step-6.md
description: "You can remove a former employee's Microsoft 365 license, and then
# Step 6 - Remove and delete the Microsoft 365 license from a former employee
-If you don't want to pay for a license after someone leaves your organization, you need to remove their Microsoft 365 license and then delete it from your subscription. You can assign a license to another user if you don't delete it.
+If you don't want to pay for a license after someone leaves your organization, you need to remove their Microsoft 365 license and then delete it from your subscription. You can assign a license to another user if you don't delete it. Before you remove a license you _must_ remove all holds for the user. For more information about holds, see [Remove an In-Place Hold in Exchange Online](/exchange/security-and-compliance/create-or-remove-in-place-holds).
If the mailbox needs to be accessed by authorized people who have been granted eDiscovery permissions for compliance or legal reasons, it must be assigned an Exchange Online Plan 2 license (or an Exchange Online Plan 1 license with an Exchange Online Archiving add-on license) so that a hold can be applied to the mailbox before it's deleted. After the user account is deleted, any Exchange Online license associated with the user account will be available to assign to a new user.
admin Turn Pronouns On Or Off https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/turn-pronouns-on-or-off.md
Consider notifying your users about the availability of the pronouns feature. We
[Pronouns best practices](https://support.microsoft.com/office/pronouns-best-practices-ef1701ad-711d-4c6e-b664-64c3ee188d68) (article)\ [Frequently asked questions about pronouns in Microsoft 365](https://support.microsoft.com/office/frequently-asked-questions-about-pronouns-in-microsoft-365-48135f04-e822-49b5-ba6b-e9bae2ce503a) (article)\
-[Profile cards in Microsoft 365](https://support.microsoft.com/office/profile-cards-in-microsoft-365-e80f931f-5fc4-4a59-ba6e-c1e35a85b501) (article)
+[Profile cards in Microsoft 365](https://support.microsoft.com/office/profile-cards-in-microsoft-365-e80f931f-5fc4-4a59-ba6e-c1e35a85b501) (article)\
+[Pronouns on your profile in Microsoft 365](https://support.microsoft.com/topic/232c3bfb-a947-4310-86db-b22d63663d85) (article)
admin Servicenow Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/servicenow-incidents.md
Here are how the properties on the Microsoft service health incident will map to
| Resolution note | The Microsoft service health incident was resolved on <date_time>. Please refer to the incident details in the Microsoft 365 Support tab for more information. | - To have the app automatically create ServiceNow incidents, you will need to configure the **Assignment group** and **Category** The **Assigned to** and **Subcategory** are not required but can be configured for improved routing and reporting.+
+*This documentation was made with AI assistance.*
admin Test And Deploy Microsoft 365 Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/test-and-deploy-microsoft-365-apps.md
The management of Enhanced Teams Apps is currently only available to global admi
### Block or Unblock Enhanced Teams Apps in the Integrated Apps portal
-As a global admin, you can manage Enhanced Teams Apps on the Microsoft 365 App (formerly known as Office.com) via Integrated Apps on the Microsoft 365 Admin Center.
+As a global admin, you can manage Enhanced Teams Apps on Microsoft 365 (formerly known as Office.com) and Outlook via Integrated Apps on the Microsoft 365 Admin Center.
-This feature is currently available to global admins only and only targets the Microsoft 365 App. By default, all Enhanced Teams Apps will be allowed to all users in your organization on the Microsoft 365 App.
+This feature is currently available to global admins only and only targets Microsoft 365 and Outlook. By default, all Enhanced Teams Apps will be allowed to all users in your organization on Microsoft 365 and Outlook.
-For now, any changes made to an Enhanced Teams App will only appear in the Microsoft 365 App. Outlook and Teams is not supported at this time.
+For now, any changes made to an Enhanced Teams App will only appear in Microsoft 365 and Outlook. Teams is not supported at this time.
You can control how users install these apps from the store on Integrated Apps in the Microsoft 365 Admin Center through the Available Apps and Blocked Apps.
You can control how users install these apps from the store on Integrated Apps i
1. Sign in to Microsoft 365 Admin Center as a Global Administrator. 2. Select **Settings**, then select **Integrated Apps**. 3. Select the **Available Apps** or **Blocked Apps** list. Here you can view the status of all Enhanced Teams Apps in the public catalog and any custom line-of-business apps uploaded from Teams Admin Center or Microsoft 365 Admin Center.-
- :::image type="content" alt-text="Available apps list." source="../../media/apps-status.png" lightbox="../../media/apps-status.png":::
-
- :::image type="content" alt-text="Blocked apps list." source="../../media/blocked-apps.png" lightbox="../../media/blocked-apps.png":::
- 4. Select an Enhanced Teams App to view more details about the app, applicable host products, and availability status within your organization.
-Custom line-of-business Enhanced Teams Apps uploaded from Teams Admin Center or Microsoft 365 Admin Center can be viewed on Integrated Apps. These apps will appear in the store for Teams and the Microsoft 365 App based on the policies set for the app, similar to public apps submitted via the Partner Center.
+Custom line-of-business Enhanced Teams Apps uploaded from Teams Admin Center or Microsoft 365 Admin Center can be viewed on Integrated Apps. These apps will appear in the store for Teams, Microsoft 365, and Outlook based on the policies set for the app, similar to public apps submitted via the Partner Center.
- You can manage these apps from the Teams Admin Center or the Microsoft 365 Admin Center. Any policy set from the Teams Admin Center will reflect on the Teams client.-- Any policy set from the Microsoft 365 Admin Center will reflect in the Microsoft 365 App.
+- Any policy set from the Microsoft 365 Admin Center will reflect in Microsoft 365 and Outlook.
-Since all Enhanced Teams Apps are allowed by default to all users on the Microsoft 365 App, all apps will show the status **All users in the organization can install**. This means that the app is available for all users in your organization to install and use on the Microsoft 365 App.
+Since all Enhanced Teams Apps are allowed by default to all users on Microsoft 365 and Outlook, all apps will show the status **All users in the organization can install**. This means that the app is available for all users in your organization to install and use on Microsoft 365 and Outlook.
#### How to block an app
-You can block an app for all users in your organization to restrict them from downloading and using the app on the Microsoft 365 App.
+You can block an app for all users in your organization to restrict them from downloading and using the app in Microsoft 365 and Outlook.
1. Sign in to M365 Admin Center as a Global Administrator. 2. Select **Settings**, and then select **Integrated Apps**.
You can block an app for all users in your organization to restrict them from do
6. Consent to blocking the app by selecting **Yes, I'm sure I want to block this app**. 7. Select **Block**. You can now see this app in the **Blocked Apps** list.
-When you choose to block an app, it will be blocked for all users in your organization. Blocking an app overrides any previous admin deployment or user installation on the Microsoft 365 App so that the app can no longer be used.
-
+When you choose to block an app, it will be blocked for all users in your organization. Blocking an app overrides any previous admin deployment or user installation in Microsoft 365 and Outlook so that the app can no longer be used.
> [!NOTE]
-> Currently, the Enhanced Teams App will only be blocked in the Microsoft 365 App. Teams and Outlook will continue to honor the current setting for Teams Apps made in the Teams Admin Center and for Outlook add-ins made in the Exchange Admin Center.
+> Currently, the Enhanced Teams App will only be blocked in Microsoft 365 and Outlook. Teams will continue to honor the current setting for Teams Apps made in the Teams Admin Center and for Outlook add-ins made in the Exchange Admin Center.
#### How to unblock an app
-You can unblock an Enhanced Teams App so that it can start showing up in the Microsoft 365 App.
+You can unblock an Enhanced Teams App so that it can start showing up in Microsoft 365 and Outlook.
1. Sign in to M365 Admin Center as a Global Administrator. 2. Select **Settings**, and then select **Integrated Apps**.
You can unblock an Enhanced Teams App so that it can start showing up in the Mic
6. Read the availability and deployment status that the app will revert to after unblocking. These are the last saved statuses of the app before it was blocked. 7. Select **Unblock**. You can now see this app in the **Available Apps** list and/or the **Deployed Apps** list.
- :::image type="content" alt-text="How to unblock an app." source="../../media/to-unblock-app.png" lightbox="../../media/to-unblock-app.png":::
- ### What happens to your existing settings for Teams and Outlook? Any existing settings made from the Teams Admin Center will continue to be honored on the Teams client.
-As an example, the _Foo_ Teams app recently upgraded to an Enhanced Teams app and is now available for Teams, Outlook, and the Microsoft 365 App (formerly known as Office.com).
+As an example, the _Foo_ Teams app recently upgraded to an Enhanced Teams app and is now available for Teams, Outlook, and Microsoft 365 (formerly known as Office.com).
-|&nbsp;|Impact on Teams client|Impact on the Microsoft 365 App|Impact on Outlook client|
+|&nbsp;|Impact on Teams client|Impact on Microsoft 365|Impact on Outlook client|
|||||
-|**If you had previously blocked the Foo Teams App on Teams Admin Center**|Users in your organization cannot download and use Foo on Teams.|Users in your organization can download and use Foo Enhanced Teams App on the Microsoft 365 App. This can be controlled by admins on the Microsoft 365 Admin Center.|Currently, users in your organization can access Outlook add-ins based on your settings in Exchange Admin Center.|
-|**If you had previously allowed the Foo Teams App on Teams Admin Center**|Users in your organization can download and use the Foo Enhanced Teams App on Teams.|Users in your organization can download and use Foo Enhanced Teams App on the Microsoft 365 App. This can be controlled by admins on the Microsoft 365 Admin Center.|Currently, users in your organization can access Outlook add-ins based on your settings in Exchange Admin Center.|
+|**If you had previously blocked the Foo Teams App on Teams Admin Center**|Users in your organization cannot download and use Foo on Teams.|Users in your organization can download and use Foo Enhanced Teams App in Microsoft 365. This can be controlled by admins on the Microsoft 365 Admin Center.|Users in your organization can download and use Foo Enhanced Teams App on Outlook. This can be controlled by admins on the Microsoft 365 Admin Center.|
+|**If you had previously allowed the Foo Teams App on Teams Admin Center**|Users in your organization can download and use the Foo Enhanced Teams App on Teams.|Users in your organization can download and use Foo Enhanced Teams App in Microsoft 365. This can be controlled by admins on the Microsoft 365 Admin Center.|Users in your organization can download and use Foo Enhanced Teams App on Outlook. This can be controlled by admins on the Microsoft 365 Admin Center.|
Now that _Foo_ is an Enhanced Teams App, you can make changes to its availability from the Microsoft 365 Admin Center.
-|&nbsp;|Impact on Teams client|Impact on the Microsoft 365 App|Impact on Outlook client|
+|&nbsp;|Impact on Teams client|Impact on Microsoft 365|Impact on Outlook client|
|||||
-|**If you block Foo Enhanced Teams App on Microsoft 365 Admin Center**|No impact. Users in your organization will continue to experience Teams behavior for Foo Enhanced Teams App based on the admin settings in Teams Admin Center.|Users in your organization cannot download the Foo Enhanced Teams App on the Microsoft 365 App, and cannot use any previously installed (by user/admin) Foo enhanced teams app.|Currently, users in your organization can access Outlook add-ins based on your settings in Exchange Admin Center.|
-|**If you unblock Foo Enhanced Teams App on Microsoft 365 Admin Center.**|No impact. Users in your organization will continue to experience Teams behavior for Foo Enhanced Teams App based on the admin settings in Teams Admin Center.|Users in your organization can download and use Foo Enhanced Teams App on the Microsoft 365 App. Users can use any previously installed (by user/admin) Foo Enhanced Teams App.|Currently, users in your organization can access Outlook add-ins based on your settings in Exchange Admin Center.|
+|**If you block Foo Enhanced Teams App on Microsoft 365 Admin Center**|No impact. Users in your organization will continue to experience Teams behavior for Foo Enhanced Teams App based on the admin settings in Teams Admin Center.|Users in your organization cannot download the Foo Enhanced Teams App in Microsoft 365, and cannot use any previously installed (by user/admin) Foo enhanced teams app.|Users in your organization cannot download the Foo Enhanced Teams App on Outlook, and cannot use any previously installed (by user/admin) Foo enhanced teams app.|
+|**If you unblock Foo Enhanced Teams App on Microsoft 365 Admin Center.**|No impact. Users in your organization will continue to experience Teams behavior for Foo Enhanced Teams App based on the admin settings in Teams Admin Center.|Users in your organization can download and use Foo Enhanced Teams App on Microsoft 365. Users can use any previously installed (by user/admin) Foo Enhanced Teams App.|Users in your organization can download and use Foo Enhanced Teams App on Outlook. Users can use any previously installed (by user/admin) Foo Enhanced Teams App.|
### Managing Office add-ins and Teams Apps
You can continue to [deploy Office Add-ins via Integrated Apps](test-and-deploy-
#### How to deploy an Enhanced Teams app
-As a global admin, you can now deploy an Enhanced Teams App on Teams, Outlook, and the Microsoft 365 App (formerly known as Office.com) to a specific set of users, the entire organization, or just to yourself from Integrated Apps on Microsoft 365 Admin Center. Deploying an Enhanced Teams Apps means that it will be pre-installed for the selected users on the applicable hosts of the app.
+As a global admin, you can now deploy an Enhanced Teams App on Teams, Outlook, and Microsoft 365 (formerly known as Office.com) to a specific set of users, the entire organization, or just to yourself from Integrated Apps on Microsoft 365 Admin Center. Deploying an Enhanced Teams Apps means that it will be pre-installed for the selected users on the applicable hosts of the app.
1. Sign in to M365 Admin Center as a Global Administrator. 2. Select **Settings** and then select **Integrated Apps**.
As a global admin, you can now deploy an Enhanced Teams App on Teams, Outlook, a
7. Review and finish the deployment of the app. This app will now be pre-installed for all selected users in the applicable hosts. > [!NOTE]
-> The Enhanced Teams App will be deployed to all the applicable hosts to the assigned users, but will only show up in the Microsoft 365 App at this time. Once support for other hosts is built, the Enhanced Teams App will start to show up in those clients based on the last saved setting of the app.
+> The Enhanced Teams App will be deployed to all the applicable hosts to the assigned users, but will only show up in Microsoft 365 and Outlook at this time. Once support for other hosts is built, the Enhanced Teams App will start to show up in those clients based on the last saved setting of the app.
#### Edit user access or remove an Enhanced Teams App via the Integrated Apps portal
-As a global admin, you can also take management actions on the Enhanced Teams Apps such as removing the deployment or editing user access to an Enhanced Teams App. Any changes made to an Enhanced Teams App will only apply to the Microsoft 365 App at this time. Once additional hubs are supported, the changes will be reflected based on the last saved settings of the app.
+As a global admin, you can also take management actions on the Enhanced Teams Apps such as removing the deployment or editing user access to an Enhanced Teams App. Any changes made to an Enhanced Teams App will only apply to Microsoft 365 and Outlook at this time. Once additional hubs are supported, the changes will be reflected based on the last saved settings of the app.
To remove the deployment of an Enhanced Teams app:
compliance Apply Retention Labels Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-retention-labels-automatically.md
Simulation typically completes in a day. The completed simulation triggers an em
To view the simulation results, select the policy from the **Label policies** page, and from the flyout pane, select **View simulation**. You can then view any samples, review the number of matching items and the locations, edit the policy, turn on the policy, or restart the simulation.
-![An example of simulation mode for an auto-apply retention label policy.](../media/simulation-mode-animated.gif)
+Watch the following example (no audio) where an auto-labeling policy named **Personal Information** has been selected, and from the flyout pane, **View simulation** is selected. This pane is then collapsed to better see the simulation results of the policy with the available actions to turn on or restart the policy, edit or delete it. The simulation results from the overview page are displayed in three sections, **Simulation status**, **Total matches**, and **Locations**. As the **Samples for review** tab is selected, you see a list of documents that haven't yet been filtered by location. The demonstration ends but at this stage, you could select one of the listed samples to view it in the preview pane, or first filter the results.
+
+> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWWQKr]
## Before you begin
compliance Sit Create Edm Sit Unified Ux Sample File https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-create-edm-sit-unified-ux-sample-file.md
If you want to create an EDM SIT using the classic experience see, [Create EDM S
## Formatting the sample file
-The system will extract the column names from the sample file to create the schema, and will recommend base SITs to map the sample field data to. It must be formatted identically to your source sensitive information table file and should contain synthetic values that are representative of your actual data. The file can be saved in .csv (comma-separated values), .tsv (tab-separated values), or pipe-separated (|) format, but should be the same as your actual source sensitive information table file. The .tsv format is recommended in cases where your data values may included commas, such as street addresses.
+The system will extract the column names from the sample file to create the schema, and will recommend base SITs to map the sample field data to. It must be formatted identically to your source sensitive information table file and should contain synthetic values that are representative of your actual data. The file can be saved in .csv (comma-separated values), .tsv (tab-separated values), or pipe-separated (|) format, but should be the same as your actual source sensitive information table file. The .tsv format is recommended in cases where your data values may include commas, such as street addresses.
- Use about 10-20 rows of data to ensure that the system has enough samples to work with. - Field values that contain commas must be enclosed in quotes *"*.
Then your sample file must have the same column headers, but use synthetic value
|Lisa |Taylor |123-45-6789 |500000000000000 | |Andre |Lawson |234-56-7890 | 200000000000000 |
+### How to use the sample file templates
+
+If you're in any of these industry verticals:
+
+- [U.S. Healthcare data](https://go.microsoft.com/fwlink/?linkid=2224450)
+- [U.S. Financial data](https://go.microsoft.com/fwlink/?linkid=2224770)
+- [U.S. Insurance data](https://go.microsoft.com/fwlink/?linkid=2224769)
+
+You can start with these sample file templates to speed up the sample file creation process. These files contain the most commonly used column headers across the respective industries as a well as synthetic values in the fields.
+
+1. Download the sample file template for your industry.
+1. Compare the column headers in the template to your actual source data and pick the ones you want to use as primary fields in your customized sample file.
+1. Compare the formatting of your actual source data with the formatting of the synthetic values. Change the formatting of the synthetic values to match the formatting of your source data values.
+1. Save your customized sample file to use when you [create EDM SIT schema and rule package](sit-create-edm-sit-unified-ux-schema-rule-package.md).
+ <!-- ![image showing a tab separated table with four columns and three rows of synthetic representative data](../media/sit-edm-tsv-sample-file.png)-->
compliance Sit Defn Azure Storage Account Shared Access Signature High Risk Resources https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-azure-storage-account-shared-access-signature-high-risk-resources.md
This SIT is designed to match the security information that's used to grant rest
It uses several primary resources: - Patterns of Base64 encoded 256-bits symmetric key.-- Patterns of URL Encoded 256 bits symmetric key.
+- Patterns of URL Encoded 256-bits symmetric key.
- Patterns of CredentialName, CredentialFeatures, AccountIdentityName, AccountIdentityValue, ResourceType, ResourceName, Id. - Patterns of mockup values, redactions, and placeholders. - A dictionary of vocabulary
compliance Sit Get Started Exact Data Match Based Sits Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-get-started-exact-data-match-based-sits-overview.md
- [New experience](sit-create-edm-sit-unified-ux-workflow.md) - [Classic experience](sit-create-edm-sit-classic-ux-workflow.md)
-Creating and making an exact data match (EDM) based sensitive information type (SIT) available is a multi-phase process. You can use the *new experience* the existing *classic experience* or via PowerShell. This article helps you understand the differences between the two experiences and helps you pick the right one for your needs.
+Creating and making an exact data match (EDM) based sensitive information type (SIT) available is a multi-phase process. You can use the *new experience* the existing *classic experience* or PowerShell. This article helps you understand the differences between the new and classic experiences and helps you pick the right one for your needs.
EDM SITs can be used in: - Microsoft Purview Data Loss Prevention-- Auto-labeling (service adn client side)
+- Auto-labeling (service and client side)
- Microsoft Purview Insider Risk Management policies - Microsoft Purview eDiscovery - Microsoft Purview Insider Risk Management
Exact data match is available in these regions:
- US GCC - US GCCH
-You can find out what region your tenant is hosting data-at-rest in by following the procedures in [Where your Microsoft 365 customer data is stored](../enterprise/o365-data-locations.md) and referring to the data center city locations in the same article.
+You can find out what region your tenant is hosting data-at-rest in by following these procedures [Where your Microsoft 365 customer data is stored](../enterprise/o365-data-locations.md) and referring to the data center city locations in the same article.
## Required licenses and permissions
The new EDM experience combines the functionality of the EDM schema and EDM sens
### Simplified workflow
-With the new experience, the schema and SIT are created via one user experience meaning fewer clicks, better guidance on mapping primary elements to default SITs and default confidence levels for the rules.
+With the new experience, the schema and SIT are created via one user experience. This means fewer clicks, better guidance on mapping primary elements to default SITs and default confidence levels for the rules.
When you need to see the status of an EDM SIT in the creation process, the new experience reports on this in the UI.
When you need to see the status of an EDM SIT in the creation process, the new e
### Automated schema and SIT creation
-In the new experience you can provide a sample data file that has the same header values and enough rows (10-20) of representative data to the system. The system validates the format and creates the schema based on the headers. You then identify the primary fields in the schema and the system recommends the SITs that best match it to associate with the primary field. If you don't want to upload the file, you can enter the same values manually in the UI.
+In the new experience you can provide a sample data file that has the same header values and enough rows (10-20) of representative data to the system. The system validates the format and creates the schema based on the headers. You then identify the primary fields in the schema and the system recommends the SITs that best match the primary fields to associate them with. If you don't want to upload the file, you can enter the same values manually in the UI.
> [!IMPORTANT] > Be sure to use sample data values that aren't sensitive, but are in the same format as your actual sensitive data. Using non-sensitive data is essential because the sample data file doesn't get encrypted and hashed when you upload it like the actual sensitive information table does. The data from the sample data file is not retained or accessible once the EDM SIT is created.
The system generates the EDM SIT detection rules, one for each primary field. Ba
The system warns you if it finds a primary field mapped to a SIT that detects a broad range of values, called a *loosely defined SIT*. This can cause the system to perform lookups on large numbers of strings that aren't related to the kind of content that you're looking for. Mapping between these types of SITs and primary fields can result in false negatives and decrease performance. > [!NOTE]
-> As *loosely defined SIT*, like a custom one that looks for all personal identification numbers, has detection rules that allow for greater variability in the items detected. A *strongly defined SIT*, like U.S. Social Security Number, has detection rules that only allow a narrow, well defined set of items to be detected.
+> A *loosely defined SIT*, like a custom one that looks for all personal identification numbers, has detection rules that allow for greater variability in the items detected. A *strongly defined SIT*, like U.S. Social Security Number, has detection rules that only allow a narrow, well defined set of items to be detected.
The system will also warn you if the values in the primary field you select occurs multiple times in a large number of rows. This can cause large numbers of result sets to be returned and processed, which could cause a time out. Time outs can result in missed detections and poor performance.
In EDM, you can create a maximum of 10 schemas. Each time you create an EDM SIT
### You need to create or manage more than 10 EDM SITs
- Because the new experience doesn't support mapping multiple SITs to the same schema, you are limited to creating and managing 10 EDM SITS. In the classic experience, you can map multiple EDM SITs to the same schema and so have more than 10 EDM SITs. Using the new flow, you'll receive an error if you try to create an eleventh EDM schema and you won't be able to view more than 10 EDM SITs.
+Because the new experience doesn't support mapping multiple SITs to the same schema, you are limited to creating and managing 10 EDM SITS. In the classic experience, you can map multiple EDM SITs to the same schema and so have more than 10 EDM SITs. Using the new flow, you'll receive an error if you try to create an eleventh EDM schema and you won't be able to view more than 10 EDM SITs.
### You need to specify the name of your EDM schema
If you need to specify a name for your EDM SIT schemas, you have to use the clas
### You need to edit EDM schemas that were created in the classic experience
-All schemas that are created using the classic experience or uploaded as a XML file using PowerShell are not viewable or manageable in the new experience.
+All schemas that are created using the classic experience or uploaded as an XML file using PowerShell are not viewable or manageable in the new experience.
## Next steps
compliance Sit Get Started Exact Data Match Export Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-get-started-exact-data-match-export-data.md
- [New experience](sit-create-edm-sit-unified-ux-workflow.md) - [Classic experience](sit-create-edm-sit-classic-ux-workflow.md)
-The sensitive data table is a text file containing rows of values against which you will be comparing content in your documents to identify sensitive data. These values might be personally identifiable information, product records, or other sensitive data in text form that you want to detect in content and take protective actions on.
+The sensitive data table is a text file containing rows of values against which you'll be comparing content in your documents to identify sensitive data. These values might be personally identifiable information, product records, or other sensitive data in text form that you want to detect in content and take protective actions on.
Once the data has been exported in one of the supported formats, you can proceed with the creation of an EDM schema. ## Defining your EDM Sensitive type
-When defining your EDM sensitive type, one of the most critical decisions is to define which fields will be primary fields. Primary fields need to follow a detectable pattern and be defined as searchable fields (columns) in your EDM schema. Secondary fields do not need to follow any pattern since they will be compared against all the text surrounding matches to the primary fields.
+When defining your EDM sensitive type, one of the most critical decisions is to define which fields will be primary fields. Primary fields need to follow a detectable pattern and be defined as searchable fields (columns) in your EDM schema. Secondary fields don't need to follow any pattern since they'll be compared against all the text surrounding matches to the primary fields.
Use these rules to help you decide which columns you should use as primary fields: - If you must detect sensitive data based on the presence of a single value matching a field in your sensitive data table, regardless of the presence of any other sensitive data surrounding it, that column must be defined as a primary element for an EDM type. - If multiple combinations of different fields in your sensitive data table must be detected in content, identify the columns that are common to most such combinations and designate them as primary elements and combinations of the other fields as secondary elements.-- If a column you want to use as a primary field does not follow a detectable pattern, like any text string or follows detectable patterns that would be present somewhere in a large percentage of documents or emails, try to choose other better structured columns as primary elements.
+- If a column you want to use as a primary field doesn't follow a detectable pattern, like any text string or follows detectable patterns that would be present somewhere in a large percentage of documents or emails, try to choose other better structured columns as primary elements.
-For example, if you have the columns `full name`, `date of birth`, `account number`, and `Social Security Number`, even if the first and last names are the columns that will be common to the different combinations of data you want to detect, such strings donΓÇÖt follow easily identifiable patterns and may be difficult to define as a sensitive information type. This is because some names might not even start with uppercase, they may be formed by two, three or more words and may even contain numbers or other non-alphabetical characters. Date of birth can be more easily identified, but since every email and most documents will contain at least one date it is also not a good candidate. Social security numbers and account numbers are good candidates for use as primary field.
+For example, if you have the columns `full name`, `date of birth`, `account number`, and `Social Security Number`, even if the first and last names are the columns that will be common to the different combinations of data you want to detect, such strings donΓÇÖt follow easily identifiable patterns and may be difficult to define as a sensitive information type. This is because some names might not even start with uppercase, they may be formed by two, three or more words and may even contain numbers or other non-alphabetical characters. Date of birth can be more easily identified, but since every email and most documents will contain at least one date it's also not a good candidate. Social security numbers and account numbers are good candidates for use as primary field.
+
+### Sample file templates
+
+To make selecting your primary fields easier, we've put together some sample file templates for:
+
+- [U.S. Healthcare data](https://go.microsoft.com/fwlink/?linkid=2224450)
+- [U.S. Financial data](https://go.microsoft.com/fwlink/?linkid=2224770)
+- [U.S. Insurance data](https://go.microsoft.com/fwlink/?linkid=2224769)
+
+These are comma separated value (.csv) files that have the most commonly used values across those industry verticals as column headers. You should use the column headers to help you decide on your primary fields. It's a best practice to export only the source data that is required. The column headers suggest the most relevant fields.
+
+There are also Microsoft generated synthetic values in the rows.
+
+To learn how to use sample file templates, go to [How to use the sample file templates](sit-create-edm-sit-unified-ux-sample-file.md#how-to-use-the-sample-file-templates).
## Save sensitive data in .csv, .tsv, or pipe-separated format
For example, if you have the columns `full name`, `date of birth`, `account numb
The data file can include a maximum of: - Up to 100 million rows of sensitive data - Up to 32 columns (fields) per data source
- - Up to 5 columns (fields) marked as searchable
+ - Up to five columns (fields) marked as searchable
2. Structure the sensitive data in the .csv or .tsv file such that the first row includes the names of the fields used for EDM-based classification. In your file you might have field names such as "ssn", "birthdate", "firstname", "lastname". The column header names can't include spaces or underscores. For example, the sample .csv file that we use in this article is named *PatientRecords.csv*, and its columns include *PatientID*, *MRN*, *LastName*, *FirstName*, *SSN*, and more.
-3. Pay attention to the format of the sensitive data fields; in particular, fields that may contain commas in their content. For example, a street address that contains the value "Seattle,WA" would be parsed as two separate fields when parsed if the .csv format is selected. To avoid this, use the .tsv format or surrounded the comma containing values by double quotes in the sensitive data table. If comma containing values also contain spaces, you need to create a custom SIT that matches the corresponding format. For example, a SIT that detects multi-word string with commas and spaces in it.
+3. Pay attention to the format of the sensitive data fields; in particular, fields that may contain commas in their content. For example, a street address that contains the value "Seattle, WA" would be parsed as two separate fields if the .csv format is selected. To avoid this, use the .tsv format or surrounded the comma containing values by double quotes in the sensitive data table. If comma containing values also contain spaces, you need to create a custom SIT that matches the corresponding format. For example, a SIT that detects multi-word string with commas and spaces in it.
## Next step
frontline Ehr Admin Epic https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/ehr-admin-epic.md
Title: Virtual Appointments with Teams - Integration into Epic EHR---+++ audience: ITPro
Review the following information to get an understanding of the overall integrat
You'll need to request access to the Teams app.
-1. Request to download the Teams app in the [Epic App Orchard marketplace](https://apporchard.epic.com/Gallery?id=16793). Doing this triggers a request from Epic to the Microsoft EHR connector team.
+1. Request to download the Teams app in the [Epic Connection Hub](https://apporchard.epic.com/Gallery?id=16793). Doing this triggers a request from Epic to the Microsoft EHR connector team.
1. After you make your request, send an email to [TeamsForHealthcare@service.microsoft.com](mailto:teamsforhealthcare@service.microsoft.com) with your organization name, tenant ID, and the email address of your Epic technical contact. 1. The Microsoft EHR connector team will respond to your email with confirmation of enablement.
frontline Ehr Connector Troubleshoot Setup Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/ehr-connector-troubleshoot-setup-configuration.md
Title: Troubleshoot Microsoft Teams EHR connector setup and configuration---+++ audience: ITPro
Currently, group visits are only supported in Epic.
Here are some common reasons why you may be experiencing this issue when integrating with Epic, and how to resolve it. -- You're using an incorrect version of Teams. Group visits require a minimum of Teams version 1.2 and an upgrade must be requested in Epic App Market.
+- You're using an incorrect version of Teams. Group visits require a minimum of Teams version 1.2 and an upgrade must be requested in Epic Connection Hub.
- New FDI records need to be added. Your Epic analyst will need to create new FDI records for group visits to support the provider and patient join experience. Additionally, you must change the context token in the group visit FDI records from ```sessionId=%CSN%``` to ```sessionId=%CONFERENCEID%```. Contact your Epic technical specialist for help. - If you're still experiencing this issue after trying the previous steps in this list, your tenant settings may need to be changed. Contact Microsoft Support to open a support ticket for the Teams EHR connector. Indicate in the ticket that group settings need to be enabled.
security Android Configure Mam https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure-mam.md
ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier3
Last updated 09/29/2021
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Microsoft Defender for Endpoint on Android, which already protects enterprise users on Mobile Device Management (MDM) scenarios, now extends support to Mobile App Management (MAM), for devices that are not enrolled using Intune mobile device management (MDM). It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for mobile application management (MAM). This capability allows you to manage and protect your organization's data within an application.
-Microsoft Defender for Endpoint on Android threat information is applied by Intune App Protection Policies to protect these apps. App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A managed application has app protection policies applied to it and can be managed by Intune.
+Microsoft Defender for Endpoint on Android threat information is applied by Intune App Protection Policies to protect these apps. App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A managed application has app protection policies applied to it and can be managed by Intune.
Microsoft Defender for Endpoint on Android supports both the configurations of MAM.+ - **Intune MDM + MAM**: IT administrators can only manage apps using App Protection Policies on devices that are enrolled with Intune mobile device management (MDM).-- **MAM without device enrollment**: MAM without device enrollment, or MAM-WE, allows IT administrators to manage apps using [App Protection Policies](/mem/intune/apps/app-protection-policy) on devices not enrolled with Intune MDM. This provision means that apps can be managed by Intune on devices enrolled with third-party EMM providers.
+- **MAM without device enrollment**: MAM without device enrollment, or MAM-WE, allows IT administrators to manage apps using [App Protection Policies](/mem/intune/apps/app-protection-policy) on devices not enrolled with Intune MDM. This provision means that apps can be managed by Intune on devices enrolled with third-party EMM providers.
To manage apps in both these configurations customers should use Intune in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
-To enable this capability an administrator needs to configure the connection between Microsoft Defender for Endpoint and Intune, create the app protection policy, and apply the policy on targeted devices and applications.
-
+To enable this capability an administrator needs to configure the connection between Microsoft Defender for Endpoint and Intune, create the app protection policy, and apply the policy on targeted devices and applications.
+ End users also need to take steps to install Microsoft Defender for Endpoint on their device and activate the onboarding flow. ## Admin prerequisites - **Validate that the Microsoft Defender for Endpoint-Intune connector is enabled**.
- a. Go to security.microsoft.com.
+ a. Go to security.microsoft.com.
b. Select **Settings > Endpoints > Advanced Features > Microsoft Intune Connection** is turned on.
End users also need to take steps to install Microsoft Defender for Endpoint on
:::image type="content" source="images/validate-intune-connector.png" alt-text="The intune-connector status pane in the Microsoft 365 Defender portal." lightbox="images/validate-intune-connector.png"::: - **Enable Microsoft Defender for Endpoint on Android Connector for App Protection Policy (APP)**.
-
+ Configure the connector on Intune Microsoft Endpoint Manager for App protection policies: a. Go to **Tenant Administration > Connectors and Tokens > Microsoft Defender for Endpoint**.
End users also need to take steps to install Microsoft Defender for Endpoint on
:::image type="content" source="images/app-settings.png" alt-text="The application settings pane in the Microsoft 365 Defender portal." lightbox="images/app-settings.png"::: - **Create an app protection policy**.
-
- Block access or wipe data of a managed app based on Microsoft Defender for Endpoint risk signals by creating an app protection policy.
- Microsoft Defender for Endpoint can be configured to send threat signals to be used in app protection policies (APP, also known as MAM). With this capability, you can use Microsoft Defender for Endpoint to protect managed apps.
- 1. Create a policy.
- App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A policy can be a rule that is enforced when the user attempts to access or move "corporate" data, or a set of actions that are prohibited or monitored when the user is inside the app.
+ Block access or wipe data of a managed app based on Microsoft Defender for Endpoint risk signals by creating an app protection policy.
+
+ Microsoft Defender for Endpoint can be configured to send threat signals to be used in app protection policies (APP, also known as MAM). With this capability, you can use Microsoft Defender for Endpoint to protect managed apps.
+
+ 1. Create a policy.
- :::image type="content" source="images/create-policy.png" alt-text="The Create policy tab in the App protection policies page in the Microsoft 365 Defender portal." lightbox="images/create-policy.png":::
+ App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A policy can be a rule that is enforced when the user attempts to access or move "corporate" data, or a set of actions that are prohibited or monitored when the user is inside the app.
+
+ :::image type="content" source="images/create-policy.png" alt-text="The Create policy tab in the App protection policies page in the Microsoft 365 Defender portal." lightbox="images/create-policy.png":::
2. Add apps.
-
- a. Choose how you want to apply this policy to apps on different devices. Then add at least one app.
- Use this option to specify whether this policy applies to unmanaged devices. In Android, you can specify the policy applies to Android Enterprise, Device Admin, or Unmanaged devices. You can also choose to target your policy to apps on devices of any management state.
-Because mobile app management doesn't require device management, you can protect company data on both managed and unmanaged devices. The management is centered on the user identity, which removes the requirement for device management. Companies can use app protection policies with or without MDM at the same time. For example, consider an employee that uses both a phone issued by the company, and their own personal tablet. The company phone is enrolled in MDM and protected by app protection policies while the personal device is protected by app protection policies only.
+
+ a. Choose how you want to apply this policy to apps on different devices. Then add at least one app.
+
+ Use this option to specify whether this policy applies to unmanaged devices. In Android, you can specify the policy applies to Android Enterprise, Device Admin, or Unmanaged devices. You can also choose to target your policy to apps on devices of any management state.
+
+ Because mobile app management doesn't require device management, you can protect company data on both managed and unmanaged devices. The management is centered on the user identity, which removes the requirement for device management. Companies can use app protection policies with or without MDM at the same time. For example, consider an employee that uses both a phone issued by the company, and their own personal tablet. The company phone is enrolled in MDM and protected by app protection policies while the personal device is protected by app protection policies only.
b. Select Apps.
- A managed app is an app that has app protection policies applied to it, and can be managed by Intune. Any app that has been integrated with the [Intune SDK](/mem/intune/developer/app-sdk) or wrapped by the [Intune App Wrapping Tool](/mem/intune/developer/apps-prepare-mobile-application-management) can be managed using Intune app protection Policies. See the official list of [Microsoft Intune protected apps](/mem/intune/apps/apps-supported-intune-apps) that have been built using these tools and are available for public use.
- *Example: Outlook as a managed app*
+ A managed app is an app that has app protection policies applied to it, and can be managed by Intune. Any app that has been integrated with the [Intune SDK](/mem/intune/developer/app-sdk) or wrapped by the [Intune App Wrapping Tool](/mem/intune/developer/apps-prepare-mobile-application-management) can be managed using Intune app protection Policies. See the official list of [Microsoft Intune protected apps](/mem/intune/apps/apps-supported-intune-apps) that have been built using these tools and are available for public use.
+
+ *Example: Outlook as a managed app*
- :::image type="content" source="images/managed-app.png" alt-text="The Public apps pane in the Microsoft 365 Defender portal." lightbox="images/managed-app.png":::
+ :::image type="content" source="images/managed-app.png" alt-text="The Public apps pane in the Microsoft 365 Defender portal." lightbox="images/managed-app.png":::
+ 3. Set sign-in security requirements for your protection policy.
- 3. Set sign-in security requirements for your protection policy.
Select **Setting > Max allowed device threat level** in **Device Conditions** and enter a value. Then select **Action: "Block Access"**. Microsoft Defender for Endpoint on Android shares this Device Threat Level. :::image type="content" source="images/conditional-launch.png" alt-text="The Device conditions pane in the Microsoft 365 Defender portal" lightbox="images/conditional-launch.png":::
-
+ - **Assign user groups for whom the policy needs to be applied.**
-
- Select **Included groups**. Then add the relevant groups.
+
+ Select **Included groups**. Then add the relevant groups.
:::image type="content" source="images/assignment.png" alt-text="The Included groups pane in the Microsoft 365 Defender portal." lightbox="images/assignment.png"::: ## End-user prerequisites+ - The broker app must be installed.
- - Intune Company Portal
-
+ - Intune Company Portal
+ - Users have the required licenses for the managed app and have the app installed.
-### End-user onboarding
+### End-user onboarding
-1. Sign in to a managed application, for example, Outlook. The device is registered and the application protection policy is synchronized to the device. The application protection policy recognizes the device's health state.
+1. Sign in to a managed application, for example, Outlook. The device is registered and the application protection policy is synchronized to the device. The application protection policy recognizes the device's health state.
2. Select **Continue**. A screen is presented which recommends downloading and setting up of Microsoft Defender for Endpoint on Android app.
-3. Select **Download**. You will be redirected to the app store (Google play).
+3. Select **Download**. You will be redirected to the app store (Google play).
4. Install the Microsoft Defender for Endpoint (Mobile) app and launch back Managed app onboarding screen. :::image type="content" source="images/download-mde.png" alt-text="The illustrative pages that contain the procedure of downloading MDE and launching back the app-onboarding screen." lightbox="images/download-mde.png":::
-
+ 5. Click **Continue > Launch**. The Microsoft Defender for Endpoint app onboarding/activation flow is initiated. Follow the steps to complete onboarding. You will automatically be redirected back to Managed app onboarding screen, which now indicates that the device is healthy.
-6. Select **Continue** to log into the managed application.
+6. Select **Continue** to log into the managed application.
+
+## Configure Web protection
-## Configure Web protection
Defender for Endpoint on Android allows IT Administrators to configure web protection. Web protection is available within the [Microsoft Endpoint Manager Admin center](https://endpoint.microsoft.com). Web protection helps to secure devices against web threats and protect users from phishing attacks. Note that anti-phishing and custom indicators (URL and IP addresses) are supported as part of web protection. Web content filtering is currently not supported on mobile platforms.
Web protection helps to secure devices against web threats and protect users fro
3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app. 4. In the **Settings** page, under the **General Configuration Settings**, add the following keys and set their value as required.
- - **antiphishing**
- - **vpn**
-
+ - **antiphishing**
+ - **vpn**
+ To disable web protection, enter 0 for the antiphishing and VPN values.+ To disable only the use of VPN by web protection, enter these values: - 0 for vpn - 1 for antiphishing
-
-1. Add **DefenderMAMConfigs** key and set the value as 1.
+
+ Add **DefenderMAMConfigs** key and set the value as 1.
5. Assign this policy to users. By default, this value is set to false. 6. Review and create the policy. ## Configure Network Protection
-1. In Microsoft Endpoint Manager Admin center, navigate to **Apps > App configuration policies**. Create a new App configuration policy. Click Managed Apps.
-2. Provide a name and description to uniquely identify the policy. Target the policy to **'Selected apps'** and search for **'Microsoft Defender Endpoint for Android'**. Click the entry and then click **Select** and then **Next**.
+1. In Microsoft Endpoint Manager Admin center, navigate to **Apps** \> **App configuration policies**. Create a new App configuration policy. Click Managed Apps.
+
+2. Provide a name and description to uniquely identify the policy. Target the policy to **'Selected apps'** and search for **'Microsoft Defender Endpoint for Android'**. Click the entry and then click **Select** and then **Next**.
-3. Add the key and value from the table below. Ensure that the **ΓÇ£DefenderMAMConfigsΓÇ¥** key is present in every policy that you create using Managed Apps route. For Managed Devices route, this key should not exist. When you are done, click **Next**.
+3. Add the key and value from the table below. Ensure that the **"DefenderMAMConfigs"** key is present in every policy that you create using Managed Apps route. For Managed Devices route, this key should not exist. When you are done, click **Next**.
- | Key | Value Type | Default (true-enable, false-disable) | Description |
- | | | | |
- | `DefenderNetworkProtectionEnable` | Integer | 0 | 1 - Enable , 0 - Disable ; This setting is used by IT admins to enable or disable the network protection capabilities in the defender app|
- |`DefenderAllowlistedCACertificates`| String | None | None-Disable; This setting is managed by an admin to establish trust for root CA and self signed certificates.|
- |`DefenderCertificateDetection`|Integer| 1 |0 - Disable , 1 - Audit mode , 2 - Enable ; When network protection is enabled, Audit mode for certificate detection is enabled by default. In audit mode, notification alerts are sent to SOC admins, but no end user notifications are displayed to the user when Defender detects a bad certificate. Admins can disable this detection with 0 as the value and enable full feature functionality by setting 2 as the value. When this feature is enabled with value as 2, end user notifications are sent to the user when Defender detects a bad certificate. Alerts are also sent to SOC Admins. |
- | `DefenderOpenNetworkDetection` | Integer | 0 | 1 - enable, 0 - disable; This setting is managed by IT Admins to enable or disable open network detection informational alerts with no end user detection experience. |
- | `DefenderEndUserTrustFlowEnable` | String | false | true - enable, false - disable; This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks. |
- | `DefenderNetworkProtectionAutoRemediation` | String | true | true - enable, false - disable; This setting is used by the IT admin to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer Wi-Fi access points or deleting suspicious certificates detected by Defender. |
- | `DefenderNetworkProtectionPrivacy` | String | true | true - enable, false - disable; This setting is managed by IT admins to enable or disable privacy in network protection. |
-
-4. Include or exclude the groups you want the policy to apply to. Proceed to review and submit the policy.
+ | Key | Value Type | Default (true-enable, false-disable) | Description |
+ | | | | |
+ | `DefenderNetworkProtectionEnable` | Integer | 0 | 1 - Enable , 0 - Disable ; This setting is used by IT admins to enable or disable the network protection capabilities in the defender app|
+ |`DefenderAllowlistedCACertificates`| String | None | None-Disable; This setting is managed by an admin to establish trust for root CA and self signed certificates.|
+ |`DefenderCertificateDetection`|Integer| 1 |0 - Disable , 1 - Audit mode , 2 - Enable ; When network protection is enabled, Audit mode for certificate detection is enabled by default. In audit mode, notification alerts are sent to SOC admins, but no end user notifications are displayed to the user when Defender detects a bad certificate. Admins can disable this detection with 0 as the value and enable full feature functionality by setting 2 as the value. When this feature is enabled with value as 2, end user notifications are sent to the user when Defender detects a bad certificate. Alerts are also sent to SOC Admins. |
+ | `DefenderOpenNetworkDetection` | Integer | 0 | 1 - enable, 0 - disable; This setting is managed by IT Admins to enable or disable open network detection informational alerts with no end user detection experience. |
+ | `DefenderEndUserTrustFlowEnable` | String | false | true - enable, false - disable; This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks. |
+ | `DefenderNetworkProtectionAutoRemediation` | String | true | true - enable, false - disable; This setting is used by the IT admin to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer Wi-Fi access points or deleting suspicious certificates detected by Defender. |
+ | `DefenderNetworkProtectionPrivacy` | String | true | true - enable, false - disable; This setting is managed by IT admins to enable or disable privacy in network protection. |
+
+4. Include or exclude the groups you want the policy to apply to. Proceed to review and submit the policy.
## Configure privacy controls+ Admins can use the following steps to enable privacy and not collect the domain name, app details and network information as part of the alert report for corresponding threats. 1. In Microsoft Endpoint Manager admin center, go to **Apps > App configuration policies > Add > Managed apps**.
Admins can use the following steps to enable privacy and not collect the domain
1. Under the Select Public Apps, choose **Microsoft Defender for Endpoint** as the target app.
-1. In Settings page, under the General Configuration Settings add **DefenderExcludeURLInReport**, **DefenderExcludeAppInReport** as the keys and value as true.
+1. In Settings page, under the General Configuration Settings add **DefenderExcludeURLInReport**, **DefenderExcludeAppInReport** as the keys and value as true.
1. Add **DefenderMAMConfigs** key and set the value as 1.
Admins can use the following steps to enable privacy and not collect the domain
1. Review and create the policy.
-## Optional permissions
-Microsoft Defender for Endpoint on Android enables Optional Permissions in the onboarding flow. Currently the permissions required by MDE are mandatory in the onboarding flow. With this feature, admin can deploy MDE on Android devices with MAM policies without enforcing the mandatory VPN and Accessibility Permissions during onboarding. End Users can onboard the app without the mandatory permissions and can later review these permissions.
+## Optional permissions
+
+Microsoft Defender for Endpoint on Android enables Optional Permissions in the onboarding flow. Currently the permissions required by MDE are mandatory in the onboarding flow. With this feature, admin can deploy MDE on Android devices with MAM policies without enforcing the mandatory VPN and Accessibility Permissions during onboarding. End Users can onboard the app without the mandatory permissions and can later review these permissions.
### Configure optional permission
Use the following steps to enable Optional permissions for devices.
1. Select **Microsoft Defender for Endpoint** in public apps.
-1. In Settings page, select **Use configuration designer** and **DefenderOptionalVPN** or **DefenderOptionalAccessibility** or **both** as the key and value type as Boolean.
+1. In Settings page, select **Use configuration designer** and **DefenderOptionalVPN** or **DefenderOptionalAccessibility** or **both** as the key and value type as Boolean.
1. Add **DefenderMAMConfigs** key and set the value as 1.
For users with key set as true, the users will be able to onboard the app withou
1. Select **Next** and assign this profile to targeted devices/users.
-### User flow
+### User flow
Users can install and open the app to start the onboarding process.
Users can install and open the app to start the onboarding process.
4. Later, users can enable Web protection from within the app. This will install the VPN configuration on the device.
-> [!NOTE]
+> [!NOTE]
> The Optional permissions setting is different from the Disable Web protection setting. Optional permissions only help to skip the permissions during onboarding but it's available for the end user to later review and enable while Disable Web protection allows users to onboard the Microsoft Defender for Endpoint app without the Web Protection. It cannot be enabled later. ## Related topics - [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)-- [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)
+- [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)
security Attack Surface Reduction Rules Deployment Operationalize https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-operationalize.md
- m365solution-asr-rules - highpri - tier1 Previously updated : 1/18/2022 Last updated : 02/10/2023 search.appverid: met150
Through advanced hunting, it is possible to extract ASR rules information, creat
ASR events shown in the advancing hunting portal are throttled to unique processes seen every hour. The time of the ASR event is the first time the event is seen within that hour.
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="images/asr-defender365-advanced-hunting3.png" alt-text="The Advanced hunting query command line in the Microsoft 365 Defender portal" lightbox="images/asr-defender365-advanced-hunting3.png":::
+```kusto
+DeviceEvents
+| where Timestamp > ago(30d)
+| where ActionType startswith "Asr"
+| summarize EventCount=counst() by ActionType
+```
> [!div class="mx-imgBorder"] > :::image type="content" source="images/asr-defender365-advanced-hunting4.png" alt-text="The Advanced hunting query results in the Microsoft 365 Defender portal" lightbox="images/asr-defender365-advanced-hunting4.png":::
The above shows that 187 events were registered for AsrLsassCredentialTheft:
If you want to focus on the AsrOfficeChildProcess rule and get details on the actual files and processes involved, change the filter for ActionType and replace the summarize line with a projection of the wanted fields (in this case they are DeviceName, FileName, FolderPath, etc.).
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="images/asr-defender365-advanced-hunting4b.png" alt-text="The Advanced hunting query focused example in the Microsoft 365 Defender portal" lightbox="images/asr-defender365-advanced-hunting4b.png":::
+```kusto
+DeviceEvents
+| where (Actiontype startswith "AsrOfficechild")
+| extend RuleId=extractison("$Ruleid", AdditionalFields, typeof(string))
+| project DeviceName, FileName, FolderPath, ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine
+```
> [!div class="mx-imgBorder"] > :::image type="content" source="images/asr-defender365-advanced-hunting5b.png" alt-text="The Advanced hunting query focused results in the Microsoft 365 Defender portal" lightbox="images/asr-defender365-advanced-hunting5b.png":::
security Network Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-devices.md
If there's a difference between the two versions, the update process determines
It's possible to disable automatic updates of the scanner by going to the **MDATP Network Scanner Updater** inside the Windows Task Scheduler. To do this: -- In Windows, go to **Computer Management** > **Task Scheduler** > **Task Scheduler Library**.-- Select **MDATP Network Scanner Updater** > right-click > and select **Disable**.
+- In Windows, go to **Computer Management** \> **Task Scheduler** \> **Task Scheduler Library**.
+- Select **MDATP Network Scanner Updater** \> right-click \> and select **Disable**.
- To re-enable, right-click on **MDATP Network Scanner Updater** and select **Enable**. ## Configure a new network device authenticated scan
-1. Go to **Settings** > **Device discovery** > **Authenticated scans** in the [Microsoft 365 Defender portal](https://security.microsoft.com).
+1. Go to **Settings** \> **Device discovery** \> **Authenticated scans** in the [Microsoft 365 Defender portal](https://security.microsoft.com).
2. Select **Add new scan** and choose **Network device authenticated scan** and select **Next**. :::image type="content" source="../../media/defender-endpoint/network-authenticated-scan.png" alt-text="Screenshot of the add new network device authenticated scan screen" lightbox="../../media/defender-endpoint/network-authenticated-scan.png":::
It's possible to disable automatic updates of the scanner by going to the **MDAT
4. Enter a **Scan name**. 5. Select the **Scanning device:** The onboarded device you'll use to scan the network devices. 6. Enter the **Target (range):** The IP address ranges or hostnames you want to scan. You can either enter the addresses or import a CSV file. Importing a file will override any manually added addresses.
-7. Select the **Scan interval:** By default, the scan will run every four hours, you can change the scan interval or have it only run once, by selecting ΓÇÿDo not repeatΓÇÖ.
+7. Select the **Scan interval:** By default, the scan will run every four hours, you can change the scan interval or have it only run once, by selecting 'Do not repeat'.
8. Choose your **Authentication method**. - You can select to **Use azure KeyVault for providing credentials:** If you manage your credentials in Azure KeyVault you can enter the Azure KeyVault URL and Azure KeyVault secret name to be accessed by the scanning device to provide credentials. 9. Select **Next** to run or skip the test scan. 10. Select **Next** to review the settings and the select **Submit** to create your new network device authenticated scan.
->[!Note]
->To prevent device duplication in the network device inventory, make sure each IP address is configured only once across multiple scanning devices.
+> [!NOTE]
+> To prevent device duplication in the network device inventory, make sure each IP address is configured only once across multiple scanning devices.
### Scan and add network devices
security Schedule Antivirus Scan In Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/schedule-antivirus-scan-in-mde.md
ms.localizationpriority: medium
Last updated 12/02/2022 audience: ITPro-+ - m365-security - tier3
See the following system requirements needed to schedule Microsoft Defender Anti
## Scheduling Microsoft Defender Antivirus scan in Red Hat Linux
-You can schedule cron jobs to initiate Microsoft Defender Antivirus scans on a schedule. For more information, see [How to schedule scans with Microsoft Defender for Endpoint on Linux](linux-schedule-scan-mde.md). This process works well if the device is always up and running.
+You can schedule cron jobs to initiate Microsoft Defender Antivirus scans on a schedule. For more information, see [How to schedule scans with Microsoft Defender for Endpoint on Linux](linux-schedule-scan-mde.md). This process works well if the device is always up and running.
-But if the Linux devices are shut down or offline during the cron schedule, the scan won't run. In these situations, you can use **anacron** to read the timestamp and find the last executed job. If the device was shut down during the scheduled cron job, it needs to wait until the next scheduled time. By using **anacron**, the system will detect the last time the scan was run. If the device didn't run the cron job, it will automatically start it.
+But if the Linux devices are shut down or offline during the cron schedule, the scan won't run. In these situations, you can use **anacron** to read the timestamp and find the last executed job. If the device was shut down during the scheduled cron job, it needs to wait until the next scheduled time. By using **anacron**, the system will detect the last time the scan was run. If the device didn't run the cron job, it will automatically start it.
### Schedule Microsoft Defender Antivirus scans in Red Hat Linux Use the following steps to schedule scans:
-1. Connect to the RedHat server using Putty.
-1. Edit the anacron file:
+1. Connect to the RedHat server using PuTTY.
+1. Edit the anacron file:
- ```vi /etc/anacron```
-
- :::image type="content" source="images/vi_etc_anacron.png" alt-text="anacron file":::
+ ```shell
+ vi /etc/anacron
+ ```
- ```
- # /etc/anacrontab: configuration file for anacron
- # See anacron (8) and anacrontab (5) for details.
- SHELL=/bin/sh
- PATH=/sbin:/bin:/usr/sbin:/usr/bin
- RANDOM_DELAY=45
- # Anacron jobs will start between 8pm and 11pm.
- START_HOURS_RANGE=20-23
- # delay will be 5 minutes + RANDOM_DELAY for cron.daily
- ```
+ :::image type="content" source="images/vi_etc_anacron.png" alt-text="anacron file":::
+
+ ```shell
+ # /etc/anacrontab: configuration file for anacron
+ # See anacron (8) and anacrontab (5) for details.
+ SHELL=/bin/sh
+ PATH=/sbin:/bin:/usr/sbin:/usr/bin
+ RANDOM_DELAY=45
+ # Anacron jobs will start between 8pm and 11pm.
+ START_HOURS_RANGE=20-23
+ # delay will be 5 minutes + RANDOM_DELAY for cron.daily
+ ```
1. Note the following items in the file.
- 1. **Shell:** Shell is referred as ```/bin/sh```, and not as ```/bin/bash```. Remember when writing the jobs.
- 1. **RANDOM_DELAY:** Describes the maximum time in minutes for the job. This value is used to offset the jobs so there wouldn't be too many jobs running at the same time. Using this delay is ideal for VDI solutions.
- 1. **START_HOURS_RANGE:** Describes the time range to run the job.
- 1. **cron.daily:** Describes 1 as the period of days required for the frequency of job executions. 5 is the delay in minutes that anacron waits after the device restarts.
+ 1. **Shell:** Shell is referred as `/bin/sh`, and not as `/bin/bash`. Remember when writing the jobs.
+ 1. **RANDOM_DELAY:** Describes the maximum time in minutes for the job. This value is used to offset the jobs so there wouldn't be too many jobs running at the same time. Using this delay is ideal for VDI solutions.
+ 1. **START_HOURS_RANGE:** Describes the time range to run the job.
+ 1. **cron.daily:** Describes 1 as the period of days required for the frequency of job executions. 5 is the delay in minutes that anacron waits after the device restarts.
1. Review look at the anacron jobs:
- ```ls -lh /etc/cron*```
-
- :::image type="content" source="images/ls_lh_etc_cron.png" alt-text="anacron jobs":::
+ ```shell
+ ls -lh /etc/cron*
+ ```
- ```
- [root@redhat7 /] # ls -lh /etc/cron*
- - rw
- - rw - r
-
- /etc/cron.d:
- total 28k
- - rw - r
- - rw - r
- - rw - r
- - rw - r
- - rw - r
- - rw - r
- - rw
-
- /etc/cron.daily:
- total 24k
- - rwxr - xr - x. 1 root root 127 Jun 14 16:49 avscandaily
- - rwx
- - rwxr - xr - x. 1 root root 618 Jul 10 2018 man-db.cron
- - rwx
- - rwx
- - rwxr - xr - x. 1 root root 114 Apr 8 2021 rhui-update-client
-
- /etc/cron.hourly:
- total 8.0k
- - rwxr - xr - x. 1 root root 392 Nov 30 2021 0anacron
- - rwxr - xr - x. 1 root root 131 Jun 14 17:05 update
-
- /etc/cron.monthly:
- total 0
- - rwxr - xr - x. 1 root root 0 Jun 14 17:47 mdatpupdate
-
- /etc/cron.weekly:
- total 0
- ```
+ :::image type="content" source="images/ls_lh_etc_cron.png" alt-text="anacron jobs":::
+
+ ```shell
+ [root@redhat7 /] # ls -lh /etc/cron*
+ - rw
+ - rw - r
+
+ /etc/cron.d:
+ total 28k
+ - rw - r
+ - rw - r
+ - rw - r
+ - rw - r
+ - rw - r
+ - rw - r
+ - rw
+
+ /etc/cron.daily:
+ total 24k
+ - rwxr - xr - x. 1 root root 127 Jun 14 16:49 avscandaily
+ - rwx
+ - rwxr - xr - x. 1 root root 618 Jul 10 2018 man-db.cron
+ - rwx
+ - rwx
+ - rwxr - xr - x. 1 root root 114 Apr 8 2021 rhui-update-client
+
+ /etc/cron.hourly:
+ total 8.0k
+ - rwxr - xr - x. 1 root root 392 Nov 30 2021 0anacron
+ - rwxr - xr - x. 1 root root 131 Jun 14 17:05 update
+
+ /etc/cron.monthly:
+ total 0
+ - rwxr - xr - x. 1 root root 0 Jun 14 17:47 mdatpupdate
+
+ /etc/cron.weekly:
+ total 0
+ ```
-1. Ignore the ```/etc/cron.d``` directory, you will see ```/etc/corn.daily, hourly, monthly, and weekly```.
+1. Ignore the `/etc/cron.d` directory, you will see `/etc/corn.daily, hourly, monthly, and weekly`.
1. To schedule a weekly antivirus scan, you can create a file (Job) under the ```/etc/cron.weekly``` directory.
- ```cd /etc/cron.weekly```
+ ```shell
+ cd /etc/cron.weekly
- ``` vi mdavfullscan```
-
- ```Press Insert```
-
- :::image type="content" source="images/vi_mdavfullscan.png" alt-text="weekly antivirus scans":::
+ vi mdavfullscan
+ Press Insert
```
- #!/bin/sh
- set -e
- echo $(date) "Time Scan Begins" >>/logs/mdav_avacron_full_scan.log
- /bin/mdatp scan full >> /logs/mdav_avacron_full_scan.log
- echo $(date) "Time Scan Finished" >>/logs/mdav_avacron_full_scan.log
- exit 0
- ~
- ```
- ```Press Esc```
+ :::image type="content" source="images/vi_mdavfullscan.png" alt-text="weekly antivirus scans":::
- ```Type: wq!```
+ ```shell
+ #!/bin/sh
+ set -e
+ echo $(date) "Time Scan Begins" >>/logs/mdav_avacron_full_scan.log
+ /bin/mdatp scan full >> /logs/mdav_avacron_full_scan.log
+ echo $(date) "Time Scan Finished" >>/logs/mdav_avacron_full_scan.log
+ exit 0
+ ~
-1. Change the file permissions to allow the file to be executed.
+ Press Esc
- ```Chmod 755 mdavfullscan```
+ Type: wq!
+ ```
- ```ls -la```
+1. Change the file permissions to allow the file to be executed.
- :::image type="content" source="images/chmod-755-mdavfullscan.png" alt-text="7. Change file permissions":::
+ ```shell
+ Chmod 755 mdavfullscan
- ```
- [root@redhat7 cron.weekly]# ls -la
- total 16
- drwxr - xr ΓÇô x. 2 root root 26 Jun 14 19:19 .
- drwxr - xr ΓÇô x. 85 root root 8192 Jun 14 19:01 ..
- - rw - r
- [root@redhat7 cron.weekly] # chmod 755 mdavfullscan
- [root@redhat7 cron.weekly] # ls -lh
- total 4. 0k
- - rwxr - xr ΓÇô x. 1 root root 128 Jun 14 19:19 mdavfullscan
- [root@redhat7 cron.weekly] #
- ```
+ ls -la
+ ```
+
+ :::image type="content" source="images/chmod-755-mdavfullscan.png" alt-text="7. Change file permissions":::
+
+ ```shell
+ [root@redhat7 cron.weekly]# ls -la
+ total 16
+ drwxr - xr - x. 2 root root 26 Jun 14 19:19 .
+ drwxr - xr - x. 85 root root 8192 Jun 14 19:01 ..
+ - rw - r
+ [root@redhat7 cron.weekly] # chmod 755 mdavfullscan
+ [root@redhat7 cron.weekly] # ls -lh
+ total 4. 0k
+ - rwxr - xr - x. 1 root root 128 Jun 14 19:19 mdavfullscan
+ [root@redhat7 cron.weekly] #
+ ```
1. Use the command to test the weekly anacron job.
-
- ```./mdavfullscan```
+
+ ```shell
+ ./mdavfullscan
+ ```
1. Use the command to verify the job ran successfully.
- ```cat /logs/mdav_avacron_full_scan.log```
+ ```shell
+ cat /logs/mdav_avacron_full_scan.log
+ ```
:::image type="content" source="images/mdav_avacron_full_scan_log.png" alt-text="verify the job ran":::
- ```
+ ```shell
[root@redhat7 cron.weekly] # cat /logs/mdav_avacron_full_scan.log
- Tue Jun 14 20:20:44 UTC 2022 Time Scan Begins
+ Tue Jun 14 20:20:44 UTC 2022 Time Scan Begins
Scan has finished 66547 file(s) scanned 0 threat(s) detected
- Tue Jun 14 20:20:50 UTC 2022 Time Scan Finished
+ Tue Jun 14 20:20:50 UTC 2022 Time Scan Finished
[root@redhat7 cron.weekly] # ```
security Tune Performance Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/tune-performance-defender-antivirus.md
The following section describes the Get-MpPerformanceReport PowerShell cmdlet. A
```output Get-MpPerformanceReport [-Path] <String>
- [-TopScans [<Int32>]]
- [-TopPaths [<Int32>] [-TopPathsDepth [<Int32>]]]
- [-TopScansPerPath [<Int32>]]
- [-TopFilesPerPath [<Int32>]
- [-TopScansPerFilePerPath [<Int32>]]
- ]
- [-TopExtensionsPerPath [<Int32>]
- [-TopScansPerExtensionPerPath [<Int32>]]
- ]
- [-TopProcessesPerPath [<Int32>]
- [-TopScansPerProcessPerPath [<Int32>]]
- ]
- ]
- [-TopFiles [<Int32>]
- [-TopScansPerFile [<Int32>]]
- [-TopProcessesPerFile [<Int32>]
- [-TopScansPerProcessPerFile [<Int32>]]
- ]
- ]
- [-TopExtensions [<Int32>]
- [-TopScansPerExtension [<Int32>]
- [-TopPathsPerExtension [<Int32>] [-TopPathsDepth [<Int32>]]
- [-TopScansPerPathPerExtension [<Int32>]]
- ]
- [-TopProcessesPerExtension [<Int32>]
- [-TopScansPerProcessPerExtension [<Int32>]]
- ]
- [-TopFilesPerExtension [<Int32>]
- [-TopScansPerFilePerExtension [<Int32>]]
- ]
- ]
- [-TopProcesses [<Int32>]
- [-TopScansPerProcess [<Int32>]]
- [-TopExtensionsPerProcess [<Int32>]
- [-TopScansPerExtensionPerProcess [<Int32>]]
- ]
- [-TopPathsPerProcess [<Int32>] [-TopPathsDepth [<Int32>]]
- [-TopScansPerPathPerProcess [<Int32>]]
- ]
- [-TopFilesPerProcess [<Int32>]
- [-TopScansPerFilePerProcess [<Int32>]]
- ]
- ]
- [-MinDuration <String>]
- [-Raw]
+ [-TopScans [<Int32>]]
+ [-TopPaths [<Int32>] [-TopPathsDepth [<Int32>]]]
+ [-TopScansPerPath [<Int32>]]
+ [-TopFilesPerPath [<Int32>]
+ [-TopScansPerFilePerPath [<Int32>]]
+ ]
+ [-TopExtensionsPerPath [<Int32>]
+ [-TopScansPerExtensionPerPath [<Int32>]]
+ ]
+ [-TopProcessesPerPath [<Int32>]
+ [-TopScansPerProcessPerPath [<Int32>]]
+ ]
+ ]
+ [-TopFiles [<Int32>]
+ [-TopScansPerFile [<Int32>]]
+ [-TopProcessesPerFile [<Int32>]
+ [-TopScansPerProcessPerFile [<Int32>]]
+ ]
+ ]
+ [-TopExtensions [<Int32>]
+ [-TopScansPerExtension [<Int32>]
+ [-TopPathsPerExtension [<Int32>] [-TopPathsDepth [<Int32>]]
+ [-TopScansPerPathPerExtension [<Int32>]]
+ ]
+ [-TopProcessesPerExtension [<Int32>]
+ [-TopScansPerProcessPerExtension [<Int32>]]
+ ]
+ [-TopFilesPerExtension [<Int32>]
+ [-TopScansPerFilePerExtension [<Int32>]]
+ ]
+ ]
+ [-TopProcesses [<Int32>]
+ [-TopScansPerProcess [<Int32>]]
+ [-TopExtensionsPerProcess [<Int32>]
+ [-TopScansPerExtensionPerProcess [<Int32>]]
+ ]
+ [-TopPathsPerProcess [<Int32>] [-TopPathsDepth [<Int32>]]
+ [-TopScansPerPathPerProcess [<Int32>]]
+ ]
+ [-TopFilesPerProcess [<Int32>]
+ [-TopScansPerFilePerProcess [<Int32>]]
+ ]
+ ]
+ [-MinDuration <String>]
+ [-Raw]
``` #### Description: Get-MpPerformanceReport
security Windows Authenticated Scan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/windows-authenticated-scan.md
[!include[Prerelease information](../../includes/prerelease.md)]
->[!Note]
->Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
+> [!NOTE]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
Authenticated scan for Windows provides the ability to run scans on unmanaged Windows devices. You can remotely target by IP ranges or hostnames and scan Windows services by providing Microsoft Defender Vulnerability Management with credentials to remotely access the devices. Once configured the targeted unmanaged devices will be scanned regularly for software vulnerabilities.
This is applicable for devices that don't have the Defender Vulnerability Manage
## Scanner Installation
-Similar to [network device](../defender-endpoint/network-devices.md) authenticated scan, you'll need a scanning device with the scanner installed. If you donΓÇÖt already have the scanner installed, see [Install the scanner](../defender-endpoint/network-devices.md#install-the-scanner) for steps on how to download and install it.
+Similar to [network device](../defender-endpoint/network-devices.md) authenticated scan, you'll need a scanning device with the scanner installed. If you don't already have the scanner installed, see [Install the scanner](../defender-endpoint/network-devices.md#install-the-scanner) for steps on how to download and install it.
>[!NOTE] > No changes are required for pre-existing installed scanners.
To create a gMsa account:
1. On your domain controller in a PowerShell window, run:
-```powershell
-New-ADServiceAccount -name gmsa1 -PrincipalsAllowedToRetrieveManagedPassword scanner-win11-i$ -KerberosEncryptionType RC4, AES128, AES256 ΓÇôverbose
-```
+ ```powershell
+ New-ADServiceAccount -Name gmsa1 -PrincipalsAllowedToRetrieveManagedPassword scanner-win11-i$ -KerberosEncryptionType RC4, AES128, AES256 -Verbose
+ ```
- gmsa1 stands for the name of the account you are creating, and scanner-win11-I$ stands for the machine name where the scanner agent will run. Only this machine will be able to retrieve the account password. You can provide a comma separated list of machines. - Modifying an existing account can be done with *Get-ADServiceAccount* and *Set-ADServiceAccount* 2. To Install the AD Service Account, on the machine where the scanner agent will run using an elevated PowerShell window, run:
-```powershell
-Install-ADServiceAccount -Identity gmsa1
-```
+ ```powershell
+ Install-ADServiceAccount -Identity gmsa1
+ ```
-If your PowerShell doesnΓÇÖt recognize those commands, it probably means you're missing a required PowerShell module. Instructions on how to install the module vary depending on your operating system. For more information, see [Getting Started with Group Managed Service Accounts](/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts/).
+If your PowerShell doesn't recognize those commands, it probably means you're missing a required PowerShell module. Instructions on how to install the module vary depending on your operating system. For more information, see [Getting Started with Group Managed Service Accounts](/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts/).
### Devices to be scanned Use the table below for guidance on the configurations required, along with the permissions needed for the scanning account, on each device to be scanned:
->[!NOTE]
+> [!NOTE]
> The below steps are only one recommended way to configure the permissions on each device to be scanned and uses the Performance Monitor Users group. You can also configure the permissions in the following ways: > > - Add the account to a different user group and give all the permissions required to that group. > - Give these permissions explicitly to the scanning account.
+>
+> To configure and apply the permission to a group of devices to be scanned using a group policy, see [Configure a group of devices with a group policy](#configure-a-group-of-devices-with-a-group-policy).
->[!NOTE]
->To configure and apply the permission to a group of devices to be scanned using a group policy, see [Configure a group of devices with a group policy](#configure-a-group-of-devices-with-a-group-policy).
-
-| Devices to be scanned requirements | Description |
+|Devices to be scanned requirements|Description|
|:|:|
-|Windows Management Instrumentation (WMI) is enabled | To enable remote Windows Management Instrumentation (WMI): </br> </br> - Verify the Windows Management Instrumentation service is running. </br> - Go to **Control Panel** &gt; **All Control Panel Items** &gt; **Windows Defender Firewall** &gt; **Allowed applications** and ensure Windows Management Instrumentation (WMI) is allowed through Windows Firewall.|
-|Scanning account is a member of Performance Monitor Users group| The scanning account must be a member of the **Performance Monitor Users** group on the device to be scanned.|
-|Performance Monitor Users group has 'Enable Account' and 'Remote Enable' permissions on Root/CIMV2 WMI namespace | To verify or enable these permissions: </br> </br> - Run wmimgmt.msc </br> - Right click **WMI Control (Local)** and select **Properties**</br> - Go to the Security tab</br> - Select the relevant WMI namespace and select **Security**</br> - Add the specified group and select to allow the specific permissions</br> - Select **Advanced**, choose the specified entry and select **Edit**</br> - Set **Applies To** to ΓÇ£This namespace and subnamespacesΓÇ¥|
-|**Performance Monitor Users** group should have permissions on DCOM operations| To verify or enable these permissions: </br></br> - Run dcomcnfg </br> - Navigate to **Component Services** > **Computers** > **My Computer** </br> - Right click My Computer and choose **Properties** </br> - Go to the COM Security tab </br> - Go to **Launch and Activation Permissions** and select **Edit Limits** </br> - Add the specified group and select to allow **Remote Activation** |
+|Windows Management Instrumentation (WMI) is enabled|To enable remote Windows Management Instrumentation (WMI): <ul><li>Verify the Windows Management Instrumentation service is running.</li><li>Go to **Control Panel** \> **All Control Panel Items** \> **Windows Defender Firewall** \> **Allowed applications** and ensure Windows Management Instrumentation (WMI) is allowed through Windows Firewall.</li></ul>|
+|Scanning account is a member of Performance Monitor Users group|The scanning account must be a member of the **Performance Monitor Users** group on the device to be scanned.|
+|Performance Monitor Users group has 'Enable Account' and 'Remote Enable' permissions on Root/CIMV2 WMI namespace|To verify or enable these permissions: <ul><li>Run wmimgmt.msc.</li><li>Right click **WMI Control (Local)** and select **Properties**.</li><li>Go to the Security tab.</li><li>Select the relevant WMI namespace and select **Security**.</li><li>Add the specified group and select to allow the specific permissions.</li><li>Select **Advanced**, choose the specified entry and select **Edit**.</li><li>Set **Applies To** to "This namespace and subnamespaces".</li></ul>|
+|**Performance Monitor Users** group should have permissions on DCOM operations|To verify or enable these permissions: <ul><li>Run dcomcnfg.</li><li>Navigate to **Component Services** \> **Computers** \> **My Computer**.</li><li>Right click My Computer and choose **Properties**.</li><li>Go to the COM Security tab.</li><li>Go to **Launch and Activation Permissions** and select **Edit Limits**.</li><li>Add the specified group and select to allow **Remote Activation**.</li></ul>|
### Configure a group of devices with a group policy
A group policy will let you bulk apply the configurations required, as well as t
Follow these steps on a domain controller to configure a group of devices at the same time:
-| Step | Description |
-|:|:|
-|Create a new Group Policy Object| - On the domain controller open the Group Policy Management Console </br> - Follow these steps to [Create a Group Policy Object](/windows/security/threat-protection/windows-firewall/create-a-group-policy-object) </br> - Once your Group Policy Object (GPO) is created, right-click on your GPO and select **Edit** to open the Group Policy Management Editor console and complete the steps below |
-|Enable Windows Management Instrumentation (WMI)| To enable remote Windows Management Instrumentation (WMI): </br> </br> - Go to **Computer Configuration** &gt; **Policies** &gt; **Windows Settings** &gt; **Security Settings** &gt; **System Services** </br> - Right-click **Windows Management Instrumentation** </br> - Select the **Define this policy setting** box and choose **Automatic**|
-|Allow WMI through the firewall| To allow Windows Management Instrumentation (WMI) through the firewall: </br> </br> - Go to **Computer Configuration** &gt; **Policies** &gt; **Windows Settings** &gt; **Security Settings** &gt; **Windows Defender Firewall and Advanced Security** &gt; **Inbound Rules** </br> - Right-click and select **New Rule** </br> - Choose **Predefined** and select **Windows Management Instrumentation (WMI)** from the list. Then select **Next** </br> - Select the **Windows Management Instrumentation (WMI-In)** checkbox. Then select **Next** </br> - Select **Allow the connection**. Then select **Finish** </br> - Right-click the newly added rule and select **Properties** </br> - Go to the **Advanced** tab and uncheck the **Private** and **Public** options as only **Domain** is required|
-|Grant permissions to perform DCOM operations| To grant permissions to perform DCOM operations: </br> </br> - Go to **Computer Configuration** &gt; **Policies** &gt; **Windows Settings** &gt; **Security Settings** &gt; **Local Policies** &gt; **Security Operations** </br> - Right-click **DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax** and select **Properties** </br> - Select **Define this policy setting** box and select **Edit Security** </br> - Add the user or group you are granting permissions to and select **Remote Activation** |
-|Grant permissions to the Root\CIMV2 WMI namespace by running a PowerShell script via group policy: | - Create a PowerShell, see [Example PowerShell script](#example-powershell-script) for a recommended script you can modify according to your needs. </br> - Go to **Computer Configuration**&gt; **Policies** &gt; **Windows Settings** &gt;**Scripts (Startup/Shutdown)** &gt; **Startup** </br> - Go to the **PowerShell Scripts** tab </br> - Select **Show Files** and copy the script you created to this folder </br> - Return to the scripts configuration windows and select **Add** </br> - Enter the script name </br> |
+|Step|Description|
+|||
+|Create a new Group Policy Object|<ul><li>On the domain controller open the Group Policy Management Console.</li><li>Follow these steps to [Create a Group Policy Object](/windows/security/threat-protection/windows-firewall/create-a-group-policy-object).</li><li>Once your Group Policy Object (GPO) is created, right-click on your GPO and select **Edit** to open the Group Policy Management Editor console and complete the steps below.</li></ul>|
+|Enable Windows Management Instrumentation (WMI)|To enable remote Windows Management Instrumentation (WMI): <ul><li>Go to **Computer Configuration** \> **Policies** \> **Windows Settings** \> **Security Settings** \> **System Services**.</li><li>Right-click **Windows Management Instrumentation**.</li><li>Select the **Define this policy setting** box and choose **Automatic**.</li></ul>|
+|Allow WMI through the firewall|To allow Windows Management Instrumentation (WMI) through the firewall: <ul><li>Go to **Computer Configuration** \> **Policies** \> **Windows Settings** \> **Security Settings** \> **Windows Defender Firewall and Advanced Security** \> **Inbound Rules**.</li><li>Right-click and select **New Rule**.</li><li>Choose **Predefined** and select **Windows Management Instrumentation (WMI)** from the list. Then select **Next**.</li><li>Select the **Windows Management Instrumentation (WMI-In)** checkbox. Then select **Next**.</li><li>Select **Allow the connection**. Then select **Finish**.</li><li>Right-click the newly added rule and select **Properties**.</li><li>Go to the **Advanced** tab and uncheck the **Private** and **Public** options as only **Domain** is required.</li></ul>|
+|Grant permissions to perform DCOM operations|To grant permissions to perform DCOM operations: <ul><li>Go to **Computer Configuration** \> **Policies** \> **Windows Settings** \> **Security Settings** \> **Local Policies** \> **Security Operations**.</li><li>Right-click **DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax** and select **Properties**.</li><li>Select **Define this policy setting** box and select **Edit Security**.</li><li>Add the user or group you are granting permissions to and select **Remote Activation**.</li></ul>|
+|Grant permissions to the Root\CIMV2 WMI namespace by running a PowerShell script via group policy:|<ul><li>Create a PowerShell script. See the [Example PowerShell script](#example-powershell-script) later in this article for a recommended script you can modify according to your needs.</li><li>Go to **Computer Configuration** \> **Policies** \> **Windows Settings** \> **Scripts (Startup/Shutdown)** \> **Startup**</li><li>Go to the **PowerShell Scripts** tab.</li><li>Select **Show Files** and copy the script you created to this folder</li><li>Return to the scripts configuration windows and select **Add**.</li><li>Enter the script name.</li></ul>|
#### Example PowerShell script
To configure a new authenticated scan:
3. Enter a **Scan name**. 4. Select the **Scanning device:** The onboarded device you'll use to scan the unmanaged devices. 5. Enter the **Target (range):** The IP address ranges or hostnames you want to scan. You can either enter the addresses or import a CSV file. Importing a file will override any manually added addresses.
-6. Select the **Scan interval:** By default, the scan will run every four hours, you can change the scan interval or have it only run once, by selecting ΓÇÿDo not repeatΓÇÖ.
-7. Choose your **Authentication method** - there are two options to choose from:
+6. Select the **Scan interval:** By default, the scan will run every four hours, you can change the scan interval or have it only run once, by selecting 'Do not repeat'.
+7. Choose your **Authentication method** - there are two options to choose from:
- Kerberos (preferred) - Negotiate
- >[!Note]
+ > [!NOTE]
> Negotiate option will fallback to NTLM in cases where Kerberos fails. Using NTLM is not recommended as it is not a secure protocol. 8. Enter the credentials Microsoft Defender Vulnerability Management will use to remotely access the devices:
To configure a new authenticated scan:
9. Select **Next** to run or skip the test scan. For more information on test scans, see [Scan and add network devices](../defender-endpoint/network-devices.md#scan-and-add-network-devices). 10. Select **Next** to review the settings and then select **Submit** to create your new authenticated scan.
->[!Note]
->As the authenticated scanner currently uses an encryption algorithm that is not compliant with [Federal Information Processing Standards (FIPS)](/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing/), the scanner can't operate when an organization enforces the use of FIPS compliant algorithms.
+> [!NOTE]
+> As the authenticated scanner currently uses an encryption algorithm that is not compliant with [Federal Information Processing Standards (FIPS)](/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing/), the scanner can't operate when an organization enforces the use of FIPS compliant algorithms.
> > To allow algorithms that are not compliant with FIPS, set the following value in the registry for the devices where the scanner will run: Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy with a DWORD value named **Enabled** and value of **0x0** >
->FIPS compliant algorithms are only used in relation to departments and agencies of the United States federal government.
+> FIPS compliant algorithms are only used in relation to departments and agencies of the United States federal government.
### Authenticated scan for Windows APIs
security Investigate Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-alerts.md
Last updated 02/16/2021
- Microsoft 365 Defender
->[!Note]
->This article describes security alerts in Microsoft 365 Defender. However, you can use activity alerts to send email notifications to yourself or other admins when users perform specific activities in Microsoft 365. For more information, see [Create activity alerts - Microsoft Purview | Microsoft Docs](../../compliance/create-activity-alerts.md).
+> [!NOTE]
+> This article describes security alerts in Microsoft 365 Defender. However, you can use activity alerts to send email notifications to yourself or other admins when users perform specific activities in Microsoft 365. For more information, see [Create activity alerts - Microsoft Purview | Microsoft Docs](../../compliance/create-activity-alerts.md).
Alerts are the basis of all incidents and indicate the occurrence of malicious or suspicious events in your environment. Alerts are typically part of a broader attack and provide clues about an incident.
Microsoft 365 Defender alerts may come from solutions like Microsoft Defender fo
### Configure AAD IP alert service
-1. Go to the Microsoft 365 Defender portal ([security.microsoft.com](https://security.microsoft.com)), select **Settings** > **Microsoft 365 Defender**.
+1. Go to the Microsoft 365 Defender portal ([security.microsoft.com](https://security.microsoft.com)), select **Settings** > **Microsoft 365 Defender**.
2. From the list, select **Alert service settings**, and then configure your **Azure AD identity protection** alert service.
Microsoft 365 Defender alerts may come from solutions like Microsoft Defender fo
By default, only the most relevant alerts for the security operation center are enabled. If you want to get all AAD IP risk detections, you can change it in the **Alert service settings** section.
-You can also access **Alert service settings** directly from the **Incidents** page in the Microsoft 365 Defender portal.
+You can also access **Alert service settings** directly from the **Incidents** page in the Microsoft 365 Defender portal.
> [!IMPORTANT] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
As needed for in-process incidents, continue your [investigation](investigate-in
- [Investigate incidents](investigate-incidents.md) - [Investigate data loss incidents](investigate-dlp.md) - [Azure Active Directory Identity Protection](/azure/active-directory/identity-protection/overview-identity-protection)
+-
security Anti Malware Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-policies-configure.md
Creating a custom anti-malware policy in the Microsoft 365 Defender portal creat
**When these types are found**: Select one of the following values:
- - **Reject the message with a non-delivery report (NDR)**
- - **Quarantine the message** (this is the default value)
+ - **Reject the message with a non-delivery report (NDR)** (this is the default value)
+ - **Quarantine the message**
- **Enable zero-hour auto purge for malware**: If you select this option, ZAP quarantines malware messages that have already been delivered. For more information, see [Zero-hour auto purge (ZAP) in Exchange Online](zero-hour-auto-purge.md).
Creating an anti-malware policy in PowerShell is a two-step process:
To create a malware filter policy, use this syntax: ```PowerShell
-New-MalwareFilterPolicy -Name "<PolicyName>" [-AdminDisplayName "<OptionalComments>"] [-CustomNotifications <$true | $false>] [<Inbound notification options>] [<Outbound notification options>] [-QuarantineTag <QuarantineTagName>]
+New-MalwareFilterPolicy -Name "<PolicyName>" [-AdminDisplayName "<OptionalComments>"] [-EnableFileFilter <$true | $false>] [-FileTypeAction <Reject | Quarantine>] [-FileTypes FileType1,FileType2,...FileTypeN] [-CustomNotifications <$true | $false>] [<Inbound notification options>] [<Outbound notification options>] [-QuarantineTag <QuarantineTagName>]
``` This example creates a new malware filter policy named Contoso Malware Filter Policy with these settings: - Notify admin@contoso.com when malware is detected in a message from an internal sender.
+- The common attachments filter is enabled (`-EnableFileFilter $true`) and the default list of file types is used (we aren't using the _FileTypes_ parameter).
+- Messages detected by the common attachments filter are rejected with an NDR (we aren't using the _FileTypeAction_ parameter, and the default value is `Reject`).
- The default [quarantine policy](quarantine-policies.md) for malware detections is used (we aren't using the _QuarantineTag_ parameter). ```PowerShell
-New-MalwareFilterPolicy -Name "Contoso Malware Filter Policy" -EnableInternalSenderAdminNotifications $true -InternalSenderAdminAddress admin@contoso.com
+New-MalwareFilterPolicy -Name "Contoso Malware Filter Policy" -EnableFileFilter $true -EnableInternalSenderAdminNotifications $true -InternalSenderAdminAddress admin@contoso.com
``` For detailed syntax and parameter information, see [New-MalwareFilterPolicy](/powershell/module/exchange/new-malwarefilterpolicy).
security Anti Malware Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-protection-about.md
In EOP, messages that are found to contain malware in _any_ attachments are quar
- [Quarantine policies](quarantine-policies.md) - [Manage quarantined messages and files as an admin in EOP](quarantine-admin-manage-messages-files.md).
+As explained in the next section, anti-malware policies also contain a _common attachments filter_. Message that contain the specified file types are _automatically_ identified as malware. You can choose whether to quarantine or reject the messages.
+ For more information about anti-malware protection, see the [Anti-malware protection FAQ](anti-malware-protection-faq.yml). To configure anti-malware policies, see [Configure anti-malware policies](anti-malware-policies-configure.md).
security Identity Access Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/identity-access-policies.md
The following steps will help create a Conditional Access policy to require devi
#### Subscription activation
-Organizations using the [Subscription Activation](/windows/deployment/windows-10-subscription-activation) feature to enable users to ΓÇ£step-upΓÇ¥ from one version of Windows to another, may want to exclude the Universal Store Service APIs and Web Application, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f from their device compliance policy.
+Organizations using the [Subscription Activation](/windows/deployment/windows-10-subscription-activation) feature to enable users to "step-up" from one version of Windows to another, may want to exclude the Universal Store Service APIs and Web Application, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f from their device compliance policy.
### Always require MFA
security Install App Guard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/install-app-guard.md
Last updated 08/07/2020
**Applies to:** Word, Excel, and PowerPoint for Microsoft 365 Apps, Windows 10 Enterprise, Windows 11 Enterprise
-Microsoft Defender Application Guard for Office (Application Guard for Office) helps prevent untrusted files from accessing trusted resources, keeping your enterprise safe from new and emerging attacks. This article walks admins through setting up supported devices for Application Guard for Office.
+Microsoft Defender Application Guard for Office (Application Guard for Office) helps prevent untrusted files from accessing trusted resources, keeping your enterprise safe from new and emerging attacks. This article walks admins through setting up supported devices for Application Guard for Office.
## Prerequisites ### Licensing requirements
-* Microsoft 365 E5 or Microsoft 365 E5 Security
-* [Safe Documents in Microsoft 365](/microsoft-365/security/office-365-security/safe-documents-in-e5-plus-security-about)
+- Microsoft 365 E5 or Microsoft 365 E5 Security
+- [Safe Documents in Microsoft 365](/microsoft-365/security/office-365-security/safe-documents-in-e5-plus-security-about)
### Minimum hardware requirements
-* **CPU**: 64-bit, 4 cores (physical or virtual), virtualization extensions (Intel VT-x OR AMD-V), Core i5 equivalent or higher recommended
-* **Physical memory**: 8-GB RAM
-* **Hard disk**: 10 GB of free space on the system drive (SSD recommended)
+- **CPU**: 64-bit, 4 cores (physical or virtual), virtualization extensions (Intel VT-x OR AMD-V), Core i5 equivalent or higher recommended
+- **Physical memory**: 8-GB RAM
+- **Hard disk**: 10 GB of free space on the system drive (SSD recommended)
### Minimum software requirements
-* **Windows**: Windows 10 Enterprise edition, Client Build version 2004 (20H1) build 19041 or later. All versions of Windows 11 are supported.
-* **Office**: Microsoft 365 Apps with build 16.0.13530.10000 or later. For Current Channel and Monthly Enterprise Channel installations, this equals to version 2011. For Semi-Annual Enterprise Channel and Semi-Annual Enterprise Channel (Preview), the minimum version is 2108 or later. Both 32-bit and 64-bit versions are supported.
-* **Update package**: Windows 10 cumulative monthly security update [KB4571756](https://support.microsoft.com/help/4571756/windows-10-update-KB4571756)
+- **Windows**: Windows 10 Enterprise edition, Client Build version 2004 (20H1) build 19041 or later. All versions of Windows 11 are supported.
+- **Office**: Microsoft 365 Apps with build 16.0.13530.10000 or later. For Current Channel and Monthly Enterprise Channel installations, this equals to version 2011. For Semi-Annual Enterprise Channel and Semi-Annual Enterprise Channel (Preview), the minimum version is 2108 or later. Both 32-bit and 64-bit versions are supported.
+- **Update package**: Windows 10 cumulative monthly security update [KB4571756](https://support.microsoft.com/help/4571756/windows-10-update-KB4571756)
For detailed system requirements, refer to [System requirements for Microsoft Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard). Also, please refer to your computer manufacturer's guides on how to enable virtualization technology. To learn more about Microsoft 365 Apps update channels, see [Overview of update channels for Microsoft 365 Apps](/deployoffice/overview-update-channels).
When you first open an untrusted file, you see an Office splash screen like the
After the file opens, there are a few visual indicators that signal that the file is open inside Application Guard for Office:
-* A callout in the ribbon
+- A callout in the ribbon
:::image type="content" source="../../media/ag09-confirm.png" alt-text="The Doc file showing small App Guard note" lightbox="../../media/ag09-confirm.png":::
-* The application icon with a shield in the taskbar
+- The application icon with a shield in the taskbar
![Icon in taskbar.](../../media/ag12-limitations.png)
Office supports the following policies to configure Application Guard for Office
> [!NOTE] > For the following policies to take effect, users are required to sign out and sign in again to Windows: >
-> * Configure copy and paste from Office documents opened in Application Guard
-> * Disable hardware acceleration in Application Guard for Office
-> * Restrict printing for documents opened in Application Guard for Office
-> * Turn off camera and microphone access to documents opened in Application Guard for Office
+> - Configure copy and paste from Office documents opened in Application Guard
+> - Disable hardware acceleration in Application Guard for Office
+> - Restrict printing for documents opened in Application Guard for Office
+> - Turn off camera and microphone access to documents opened in Application Guard for Office
## Submit feedback
Application Guard for Office is integrated with Microsoft Defender for Endpoint
## Limitations and considerations
-* Application Guard for Office is a protected mode that isolates untrusted documents so that they can't access trusted corporate resources, an intranet, the user's identity, and arbitrary files on the computer. As a result, if a user tries to access a feature that has a dependency on such accessΓÇöfor example, inserting a picture from a local file on diskΓÇöthe access fails and displays a prompt like the following example. To enable an untrusted document to access trusted resources, users must remove Application Guard protection from the document.
+- Application Guard for Office is a protected mode that isolates untrusted documents so that they can't access trusted corporate resources, an intranet, the user's identity, and arbitrary files on the computer. As a result, if a user tries to access a feature that has a dependency on such accessΓÇöfor example, inserting a picture from a local file on diskΓÇöthe access fails and displays a prompt like the following example. To enable an untrusted document to access trusted resources, users must remove Application Guard protection from the document.
:::image type="content" source="../../media/ag09-confirm.png" alt-text="The Dialog box stating safety message and the feature status" lightbox="../../media/ag09-confirm.png"::: > [!NOTE] > Advise users to only remove protection if they trust the file and the source of the file.
-* Active content like macros and ActiveX controls are disabled in Application Guard for Office. To enable active content, the Application Guard protection must be removed.
+- Active content like macros and ActiveX controls are disabled in Application Guard for Office. To enable active content, the Application Guard protection must be removed.
-* Untrusted files from network shares or files shared from OneDrive, OneDrive for Business, or SharePoint Online open as read-only in Application Guard. Users can save a local copy of such files to continue working in the container or remove protection to directly work with the original file.
+- Untrusted files from network shares or files shared from OneDrive, OneDrive for Business, or SharePoint Online open as read-only in Application Guard. Users can save a local copy of such files to continue working in the container or remove protection to directly work with the original file.
-* Files that are protected by Information Rights Management (IRM) are blocked by default. If users want to open such files in Protected View, an administrator must configure policy settings for unsupported file types for the organization.
+- Files that are protected by Information Rights Management (IRM) are blocked by default. If users want to open such files in Protected View, an administrator must configure policy settings for unsupported file types for the organization.
-* Any customizations to Office applications in Application Guard for Office do not persist after a user signs out and signs in again or after the device restarts.
+- Any customizations to Office applications in Application Guard for Office do not persist after a user signs out and signs in again or after the device restarts.
-* Only Accessibility tools that use the UIA framework can provide an accessible experience for files opened in Application Guard for Office.
+- Only Accessibility tools that use the UIA framework can provide an accessible experience for files opened in Application Guard for Office.
-* Network connectivity is required for the first launch of Application Guard after installation.
+- Network connectivity is required for the first launch of Application Guard after installation.
-* In the document's info section, the *Last Modified By* property may display **WDAGUtilityAccount** as the user. WDAGUtilityAccount is the anonymous account used by Application Guard. The desktop user's identity isn't available inside the Application Guard container.
+- In the document's info section, the *Last Modified By* property may display **WDAGUtilityAccount** as the user. WDAGUtilityAccount is the anonymous account used by Application Guard. The desktop user's identity isn't available inside the Application Guard container.
## Performance optimizations for Application Guard for Office
When this heuristic is met, Office will pre-create an Application Guard containe
## Known issues
-* The default setting for unsupported file types protection policy is to block opening untrusted unsupported file types that are encrypted or have Information Rights Management (IRM) set. This includes files that are encrypted by using sensitivity labels from Microsoft Purview Information Protection.
-* HTML files are not supported at this time.
-* Application Guard for Office currently does not work with NTFS compressed volumes. If you are seeing an error "ERROR_VIRTUAL_DISK_LIMITATION" please try uncompressing the volume.
-* If you are seeing an error mentioning that the hypervisor may not be enabled, check the following:
- * Virtualization is enabled in BIOS
- * Hyper-V is turned on
- * The Host Network Service is running
-* Updates to .NET might cause files to fail to open in Application Guard. This can be resolved by restarting the machine.
-* Application Guard requires "Virtual Machines" to be granted "Logon as a service" permission, and "wdagutilityaccount" must **not** be added to the "Deny logon as a service" security policy setting. 
-* Please see [Frequently asked questions - Microsoft Defender Application Guard for additional information.](/windows/security/threat-protection/microsoft-defender-application-guard/faq-md-app-guard)
+- The default setting for unsupported file types protection policy is to block opening untrusted unsupported file types that are encrypted or have Information Rights Management (IRM) set. This includes files that are encrypted by using sensitivity labels from Microsoft Purview Information Protection.
+- HTML files are not supported at this time.
+- Application Guard for Office currently does not work with NTFS compressed volumes. If you are seeing an error "ERROR_VIRTUAL_DISK_LIMITATION" please try uncompressing the volume.
+- If you are seeing an error mentioning that the hypervisor may not be enabled, check the following items:
+ - Virtualization is enabled in the BIOS.
+ - Hyper-V is turned on.
+ - The Host Network Service is running.
+- Updates to .NET might cause files to fail to open in Application Guard. This can be resolved by restarting the machine.
+- Application Guard requires "Virtual Machines" to be granted "Logon as a service" permission, and "wdagutilityaccount" must **not** be added to the "Deny logon as a service" security policy setting.
+- Please see [Frequently asked questions - Microsoft Defender Application Guard for additional information.](/windows/security/threat-protection/microsoft-defender-application-guard/faq-md-app-guard).
security Recommended Settings For Eop And Office365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365.md
To create and configure anti-malware policies, see [Configure anti-malware polic
|Security feature name|Default|Standard|Strict|Comment| ||::|::|::|| |**Protection settings**|||||
-|**Enable the common attachments filter** <br><br> _EnableFileFilter_|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|This setting quarantines messages that contain attachments based on file type, regardless of the attachment content. For the list of file types, see [Anti-malware policies](anti-malware-protection-about.md#anti-malware-policies).|
-|Common attachment filter notifications (**When these file types are found**) <br><br> _FileTypeAction_|**Quarantine the message** <br><br> `Quarantine`|**Quarantine the message** <br><br> `Quarantine`|**Quarantine the message** <br><br> `Quarantine`||
+|**Enable the common attachments filter** <br><br> _EnableFileFilter_|Selected <br><br> `$true`<sup>\*</sup>|Selected <br><br> `$true`|Selected <br><br> `$true`|The common attachment filter identifies messages that contain attachments based on file type, regardless of the attachment content. For the list of file types, see [Anti-malware policies](anti-malware-protection-about.md#anti-malware-policies). <br><br> <sup>\*</sup>The common attachments filter is on by default in new anti-malare policies that you create in the Microsoft 365 Defender portal. The common attahcments filter is off by default in the default anti-malware policy and in new policies that you create in PowerShell.|
+|Common attachment filter notifications (**When these file types are found**) <br><br> _FileTypeAction_|**Reject the message with a non-delivery report (NDR)** <br><br> `Reject`|**Reject the message with a non-delivery report (NDR)** <br><br> `Reject`|**Reject the message with a non-delivery report (NDR)** <br><br> `Reject`||
|**Enable zero-hour auto purge for malware** <br><br> _ZapEnabled_|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|| |**Quarantine policy**|AdminOnlyAccessPolicy|AdminOnlyAccessPolicy|AdminOnlyAccessPolicy|When you create a new anti-malware policy, a blank value means the default quarantine policy is used to define the historical capabilities for messages that were quarantined as malware (AdminOnlyAccessPolicy with no quarantine notifications). <br><br> Standard and Strict preset security policies use the default quarantine policy (AdminOnlyAccessPolicy with no quarantine notifications) as described in the table [here](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features). <br><br> Admins can create and select custom quarantine policies that define more capabilities for users in the default or custom anti-malware policies. For more information, see [Quarantine policies](quarantine-policies.md).| |**Admin notifications**|||||
In PowerShell, you use the [New-SafeLinksPolicy](/powershell/module/exchange/new
|Security feature name|Default in custom|Built-in protection|Standard|Strict|Comment| ||::|::|::|::|| |**URL & click protection settings**||||||
-|**Action on potentially malicious URLs within Emails**||||||
-|**On: Safe Links checks a list of known, malicious links when users click links in email** <br><br> _EnableSafeLinksForEmail_|Not selected <br><br> `$false`|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`||
+|**Email**|||||The settings in this section affect URL rewriting and time of click protection in email messages.|
+|**On: Safe Links checks a list of known, malicious links when users click links in email. URLs are rewritten by default.** <br><br> _EnableSafeLinksForEmail_|Not selected <br><br> `$false`|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`||
|**Apply Safe Links to email messages sent within the organization** <br><br> _EnableForInternalSenders_|Not selected <br><br> `$false`|Not selected <br><br> `$false`|Selected <br><br> `$true`|Selected <br><br> `$true`|| |**Apply real-time URL scanning for suspicious links and links that point to files** <br><br> _ScanUrls_|Not selected <br><br> `$false`|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|| |**Wait for URL scanning to complete before delivering the message** <br><br> _DeliverMessageAfterScan_|Not selected <br><br> `$false`|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|| |**Do not rewrite URLs, do checks via Safe Links API only** <br><br> _DisableURLRewrite_|Not selected <br><br> `$false`|Selected <br><br> `$true`|Not selected <br><br> `$false`|Not selected <br><br> `$false`|| |**Do not rewrite the following URLs in email** <br><br> _DoNotRewriteUrls_|Blank <br><br> `$null`|Blank <br><br> `$null`|Blank <br><br> `$null`|Blank <br><br> `$null`|We have no specific recommendation for this setting. <br><br> **Note**: Entries in the "Do not rewrite the following URLs" list are not scanned or wrapped by Safe Links during mail flow. Use [allow URL entries in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-urls-in-the-submissions-portal) so URLs are not scanned or wrapped by Safe Links during mail flow _and_ at time of click.|
-|**Action for potentially malicious URLs in Microsoft Teams**||||||
-|**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams** <br><br> _EnableSafeLinksForTeams_|Not selected <br><br> `$false`|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`||
-|**Action for potentially malicious URLs in Microsoft Office apps**||||||
-|**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Office apps** <br><br> _EnableSafeLinksForOffice_|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|Use Safe Links in supported Office 365 desktop and mobile (iOS and Android) apps. For more information, see [Safe Links settings for Office apps](safe-links-about.md#safe-links-settings-for-office-apps).|
+|**Teams**|||||The setting in this section affects time of click protection in Microsoft Teams.|
+|**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams. URLs are not rewritten.** <br><br> _EnableSafeLinksForTeams_|Not selected <br><br> `$false`|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`||
+|**Office 365 apps**|||||The setting in this section affects time of click protection in Office apps.|
+|**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Office apps. URLs are not rewritten.** <br><br> _EnableSafeLinksForOffice_|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|Use Safe Links in supported Office 365 desktop and mobile (iOS and Android) apps. For more information, see [Safe Links settings for Office apps](safe-links-about.md#safe-links-settings-for-office-apps).|
|**Click protection settings**|||||| |**Track user clicks** <br><br> _TrackClicks_|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|Selected <br><br> `$true`|| |**Let users click through to the original URL** <br><br> _AllowClickThrough_|Selected <br><br> `$true`|Selected <br><br> `$true`|Not selected <br><br> `$false`|Not selected <br><br> `$false`|Turning off this setting (setting _AllowClickThrough_ to `$false`) prevents click through to the original URL.|
security Safe Links About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-about.md
As long as Safe Links protection is turned on, URLs are scanned prior to message
The settings in Safe Links policies that apply to email messages are described in the following list: -- **On: Safe Links checks a list of known, malicious links when users click links in email**: Turn on or turn off Safe Links scanning in email messages. The recommended value is selected (on), and results in the following actions:
+- **On: Safe Links checks a list of known, malicious links when users click links in email. URLs are rewritten by default.**: Turn on or turn off Safe Links scanning in email messages. The recommended value is selected (on), and results in the following actions:
- Safe Links scanning is turned on in Outlook (C2R) on Windows. - URLs are rewritten and users are routed through Safe Links protection when they click URLs in messages. - When clicked, URLs are checked against a list of known malicious URLs and the ["Block the following URLs" list](#block-the-following-urls-list-for-safe-links).
At a high level, here's how Safe Links protection works on URLs in email message
## Safe Links settings for Microsoft Teams
-You turn on or turn off Safe Links protection for Microsoft Teams in Safe Links policies. Specifically, you use the **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams** setting. The recommended value is on (selected).
+You turn on or turn off Safe Links protection for Microsoft Teams in Safe Links policies. Specifically, you use the **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams. URLs are not rewritten** setting in the **Teams** section. The recommended value is on (selected).
> [!NOTE] > When you turn on or turn off Safe Links protection for Teams, it might take up to 24 hours for the change to take effect.
At a high level, here's how Safe Links protection works for URLs in Microsoft Te
Safe Links protection for Office apps checks links in Office documents, not links in email messages. But, it can check links in attached Office documents in email messages after the document is opened.
-You turn on or turn off Safe Links protection for Office apps in Safe Links policies. Specifically, you use the **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Office apps** setting. The recommended value is on (selected).
+You turn on or turn off Safe Links protection for Office apps in Safe Links policies. Specifically, you use the **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Office apps. URLs are not rewritten** setting in the **Office 365 apps** section. The recommended value is on (selected).
Safe Links protection for Office apps has the following client requirements:
security Safe Links Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-policies-configure.md
Creating a custom Safe Links policy in the Microsoft 365 Defender portal creates
5. On the **URL & click protection settings** page that appears, configure the following settings:
- - **Action on potentially malicious URLs within Emails (Email & Time of Click)** section:
- - **On: Safe Links checks a list of known, malicious links when users click links in email**: Select this option to turn on Safe Links protection for links in email messages. If you select this option, the following settings are available:
- - **Apply Safe Links to email messages sent within the organization (Email ΓÇô Intraorg & Time of Click)**: Select this option to apply the Safe Links policy to messages between internal senders and internal recipients. Turning this on will enable link wrapping for all intraorg messages.
- - **Apply real-time URL scanning for suspicious links and links that point to files (Email)**: Select this option to turn on real-time scanning of links in email messages from external senders. If you select this option, the following setting is available:
- - **Wait for URL scanning to complete before delivering the message (Email)**: Select this option to wait for real-time URL scanning to complete before delivering the message from external senders. The recommended setting is **On**.
- - **Do not rewrite URLs, do checks via SafeLinks API only (Time of Click)**: Select this option to prevent URL wrapping and skip reputation check during mail flow. Safe Links is called exclusively via APIs at the time of URL click by Outlook clients that support it.
+ - **Email** section:
+ - **On: Safe Links checks a list of known, malicious links when users click links in email. URLs are rewritten by default**: Select this option to turn on Safe Links protection for links in email messages (URL rewriting and time of click protection). If you select this option, the following settings are available:
+ - **Apply Safe Links to email messages sent within the organization**: Select this option to apply the Safe Links policy to messages between internal senders and internal recipients. Turning this on will enable link wrapping for all intra-organization messages.
+ - **Apply real-time URL scanning for suspicious links and links that point to files**: Select this option to turn on real-time scanning of links in email messages from external senders. If you select this option, the following setting is available:
+ - **Wait for URL scanning to complete before delivering the message**: Select this option to wait for real-time URL scanning to complete before delivering the message from external senders. The recommended setting is **On**.
+ - **Do not rewrite the following URLs in email** section: Click **Manage (nn) URLs** to allow access to specific URLs that would otherwise be blocked by Safe Links.
- - **Do not rewrite the following URLs in email** section: Click **Manage (nn) URLs** to allow access to specific URLs that would otherwise be blocked by Safe Links.
+ > [!NOTE]
+ > Entries in the "Do not rewrite the following URLs" list are not scanned or wrapped by Safe Links during mail flow. Use [URL allow entries in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-urls-in-the-submissions-portal) to override the Safe Links URL verdict.
- > [!NOTE]
- > Entries in the "Do not rewrite the following URLs" list are not scanned or wrapped by Safe Links during mail flow. Use [URL allow entries in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-urls-in-the-submissions-portal) to override the Safe Links URL verdict.
+ 1. In the **Manage URLs to not rewrite** flyout that appears, click ![Add URLs icon.](../../media/m365-cc-sc-create-icon.png) **Add URLs**.
+ 2. In the **Add URLs** flyout that appears, type the URL or value that you want, select the entry that appears below the box, and then click **Save**. Repeat this step as many times as necessary.
- 1. In the **Manage URLs to not rewrite** flyout that appears, click ![Add URLs icon.](../../media/m365-cc-sc-create-icon.png) **Add URLs**.
- 2. In the **Add URLs** flyout that appears, type the URL or value that you want, select the entry that appears below the box, and then click **Save**. Repeat this step as many times as necessary.
+ For entry syntax, see [Entry syntax for the "Do not rewrite the following URLs" list](safe-links-about.md#entry-syntax-for-the-do-not-rewrite-the-following-urls-list).
- For entry syntax, see [Entry syntax for the "Do not rewrite the following URLs" list](safe-links-about.md#entry-syntax-for-the-do-not-rewrite-the-following-urls-list).
+ To remove an entry, click ![Remove icon.](../../media/m365-cc-sc-remove-selection-icon.png) next to the entry.
- To remove an entry, click ![Remove icon.](../../media/m365-cc-sc-remove-selection-icon.png) next to the entry.
+ When you're finished, click **Save**.
- When you're finished, click **Save**.
+ 3. Back on the **Manage URLs to not rewrite** flyout, click **Done** or do maintenance on the list of entries:
- 3. Back on the **Manage URLs to not rewrite** flyout, click **Done** or do maintenance on the list of entries:
+ To remove entries from the list, can use the ![Search icon.](../../media/m365-cc-sc-search-icon.png) **Search** box to find the entry.
- To remove entries from the list, can use the ![Search icon.](../../media/m365-cc-sc-search-icon.png) **Search** box to find the entry.
+ To select a single entry, click on the value in the **URLs** column.
- To select a single entry, click on the value in the **URLs** column.
+ To select multiple entries one at a time, click the blank area to the left of the value.
- To select multiple entries one at a time, click the blank area to the left of the value.
+ To select all entries at one, click the blank area to the left of the **URLs** column header.
- To select all entries at one, click the blank area to the left of the **URLs** column header.
+ With one or more entries selected, click the ![Add URLs icon.](../../media/m365-cc-sc-create-icon.png) or ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) icons that appear.
- With one or more entries selected, click the ![Add URLs icon.](../../media/m365-cc-sc-create-icon.png) or ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) icons that appear.
+ When you're finished, click **Done**.
- When you're finished, click **Done**.
-
- - **Actions for potentially malicious URLs in Microsoft Teams (Time of Click)** section:
- - **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams**: Select this option to enable Safe Links protection for links in Teams. Note that this setting might take up to 24 hours to take effect.
+ - **Teams** section:
+ - **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams. URLs are not rewritten**: Select this option to enable Safe Links protection for links in Teams. Note that this setting might take up to 24 hours to take effect. This setting affects time of click protection.
> [!NOTE] > Currently, Safe Links protection for Microsoft Teams is not available in Microsoft 365 GCC High or Microsoft 365 DoD.
- - **Actions for potentially malicious URLs in Microsoft Office apps (Time of Click)** section:
- - **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Office apps**: Select this option to enable Safe Links protection for links in files in supported Office desktop, mobile, and web apps.
+ - **Office 365 apps** section:
+ - **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Office apps. URLs are not rewritten.**: Select this option to enable Safe Links protection for links in files in supported Office desktop, mobile, and web apps. This setting affects time of click protection.
- **Click protection settings** section: - **Track user clicks**: Leave this option selected to enable the tracking user clicks on URLs. If you select this option, the following options are available:
solutions Choose Domain To Create Groups https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/choose-domain-to-create-groups.md
Let's say you want to control what sub-domains Microsoft 365 groups are created
To change the priority or email address templates for an existing EAP, use the Set-EmailAddressPolicy cmdlet. ```
-Set-EmailAddressPolicy -Name StudentsGroups -EnabledEmailAddressTemplates "SMTP:@students.groups.contoso.com","smtp:@groups.contoso.com", "smtp:@students.contoso.com" ManagedByFilter {Department -eq 'Students'} -Priority 2
-
+Set-EmailAddressPolicy -Name StudentsGroups -EnabledEmailAddressTemplates "SMTP:@students.groups.contoso.com","smtp:@groups.contoso.com", "smtp:@students.contoso.com"
``` Changing an EAP has no impact on the groups that have already been provisioned.
syntex Solution Manage Contracts In Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/solution-manage-contracts-in-microsoft-365.md
This solution relies on the following functionality, all available as part of a
New to Microsoft Syntex? Learn how to use Syntex to manage content using AI.
-The [Get started with Microsoft Syntex](/training/paths/syntex-get-started) learning path will teach how you can use unstructured, freeform, and unstructured document processing models to classify documents, extract text, and label your documents for quick and easy knowledge management.
+The [Introduction to Microsoft Syntex](/training/modules/syntex-intro) learning path will teach how you can use unstructured, freeform, and unstructured document processing models to classify documents, extract text, and label your documents for quick and easy knowledge management.
## Create the solution