Updates from: 02/02/2022 06:54:45
Category Microsoft Docs article Related commit history on GitHub Change details
admin Remove Former Employee Step 5 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/remove-former-employee-step-5.md
description: "Follow these steps to block a former employee's mobile device acce
# Step 5 - Wipe and block a former employee's mobile device
-If your former employee had an organization phone, you can use the <a href=" https://go.microsoft.com/fwlink/p/?linkid=2059104" target="_blank">Exchange admin center</a> to wipe and block that device so that all organization data is removed from the device and it can no longer connect to Office 365. If your organization uses Basic Mobility and Security to manage mobile devices, you can wipe and block those devices using Basic Mobility and Security.
+If your former employee had an organization phone, you can use the <a href="https://go.microsoft.com/fwlink/p/?linkid=2059104" target="_blank">Exchange admin center</a> to wipe and block that device so that all organization data is removed from the device and it can no longer connect to Office 365. If your organization uses Basic Mobility and Security to manage mobile devices, you can wipe and block those devices using Basic Mobility and Security.
## Wipe mobile device using the Exchange admin center
admin Change Address Contact And More https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/change-address-contact-and-more.md
As an admin, you can change your alternate email address for resetting passwords
5. Edit the address in the **Alternate email** box, then select **Next**. 6. Enter the code sent to the alternate email address and select **OK** to verify the change.
-To learn about changing other profile information, see [Change your contact preferences](change-contact-preferences.md) or [Change your display language](https://support.microsoft.com/office/6f238bff-5252-441e-b32b-655d5d85d15b.aspx).
+To learn about changing other profile information, see [Change your contact preferences](change-contact-preferences.md) or [Change your display language](https://support.microsoft.com/office/6f238bff-5252-441e-b32b-655d5d85d15b).
### Email signatures
admin Servicenow Basic Authentication https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/servicenow-basic-authentication.md
These steps are required to set up the integration between your ServiceNow insta
:::image type="content" source="../../media/ServiceNow-guide/servicenow-guide-image9.png" lightbox="../../media/ServiceNow-guide/servicenow-guide-image9.png" alt-text="Graphical user interface, table Description automatically generated"::: - 1. \[ServiceNow Admin\] Go to **Microsoft 365 Support &gt; Setup** to open the integration workflow. > [!NOTE]
These steps are required to set up the integration between your ServiceNow insta
1. \[ServiceNow Admin\] Configure the environment and setup type. If this installation is on a test environment, select the option This is a test environment. You will be able to quickly disable this option after the setup and all of your tests are completed later.
- If your instance allows Basic Authentication for inbound connections, select Yes, otherwise please refer to the [Advanced Setup with AAD](servicenow-aad-oauth-token.md).
-
- :::image type="content" source="../../media/ServiceNow-guide/snowbasic-2.png" lightbox="../../media/ServiceNow-guide/snowbasic-2.png" alt-text="Graphical user interface, text, application, email Description automatically generated":::
-
+ If your instance allows Basic Authentication for inbound connections, select Yes, otherwise please refer to the [Advanced Setup with AAD](servicenow-aad-oauth-token.md). :::image type="content" source="../../media/ServiceNow-guide/snowbasic-2.png" lightbox="../../media/ServiceNow-guide/snowbasic-2.png" alt-text="Graphical user interface, text, application, email Description automatically generated":::
1. \[ServiceNow Admin\] Enter your Microsoft 365 tenant domain.
These steps are required to set up the integration between your ServiceNow insta
1. Register the Azure Active Directory (AAD) App. 1. After completing the instructions in the prerequisites section, click **Done**. Otherwise, follow the instructions in the wizard to create the necessary application registration in AAD. :::image type="content" source="../../media/ServiceNow-guide/snowbasic-4.png" lightbox="../../media/ServiceNow-guide/snowbasic-4.png" alt-text="Graphical user interface, text, application, email Description automatically generated":::+ 1. Register the ServiceNow OAuth App. 1. After completing the instructions in the prerequisites section, select the newly created OAuth application registration and click Next. Otherwise, follow the instructions to create the entity in ServiceNow and then select the new application registration. :::image type="content" source="../../media/ServiceNow-guide/snowbasic-5.png" lightbox="../../media/ServiceNow-guide/snowbasic-5.png" alt-text="Graphical user interface, text, application, email Description automatically generated":::
These steps are required to set up the integration between your ServiceNow insta
1. \[ServiceNow Admin\] Configure Inbound settings. 1. Configure the Inbound OAuth API endpoint. 1. After completing the instructions in the prerequisites section, select the newly created OAuth application registration and click Done. Otherwise, follow the instructions to create the entity in then select the new REST endpoint registration.
+
:::image type="content" source="../../media/ServiceNow-guide/snowbasic-6.png" lightbox="../../media/ServiceNow-guide/snowbasic-6.png" alt-text="Graphical user interface, text, application, email Description automatically generated":::+ 1. Configure the Integration User. 1. After completing the instructions in the prerequisites section, select the newly created integration user and click Next. Otherwise, follow the instructions to create the entity in ServiceNow and then select the new integration user.
+
:::image type="content" source="../../media/ServiceNow-guide/snowbasic-7.png" lightbox="../../media/ServiceNow-guide/snowbasic-7.png" alt-text="Graphical user interface, text, application, email Description automatically generated"::: + 1. \[Microsoft 365 Tenant Admin\] Complete the integration in the Microsoft 365 Admin Portal. Verify the information below is correct. DO NOT select **Next** at this time.
admin Increase Threat Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/increase-threat-protection.md
For more information, see:
- [Ransomware: how to reduce risk](https://www.microsoft.com/security/blog/2020/04/28/ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk/) -- [Restore your OneDrive](https://support.microsoft.com/office/fa231298-759d-41cf-bcd0-25ac53eb8a15.aspx)
+- [Restore your OneDrive](https://support.microsoft.com/office/fa231298-759d-41cf-bcd0-25ac53eb8a15)
## Stop auto-forwarding for email
Hackers sometimes hide malicious websites in links in email or other files. Safe
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWvdwy?autoplay=false]
-Microsoft Defender for Office 365 , formerly called Microsoft 365 ATP, or Advanced Threat Protection, helps protect your business against malicious sites when people click links in Office apps.
+Microsoft Defender for Office 365, formerly called Microsoft 365 ATP, or Advanced Threat Protection, helps protect your business against malicious sites when people click links in Office apps.
1. Go to the [admin center](https://admin.microsoft.com), and select **Setup**.
admin Set Up Multi Factor Authentication https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication.md
For most subscriptions modern authentication is automatically turned on, but if
[Set up multifactor authentication](set-up-multi-factor-authentication.md) (video)
-[Turn on multi-factor authentication for your phone](https://support.microsoft.com/office/ace1d096-61e5-449b-a875-58eb3d74de14) (video)
+[Turn on multi-factor authentication for your phone](https://support.microsoft.com/office/ace1d096-61e5-449b-a875-58eb3d74de14)
admin Parity Between Azure Information Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/services-in-china/parity-between-azure-information-protection.md
The following list includes the existing gaps between AIP for Office 365 operate
- The AIP area of the Azure portal is unavailable to customers in China. Use [PowerShell commands](#step-6-install-the-aip-on-premises-scanner-and-manage-content-scan-jobs) instead of performing actions in the portal, such as managing and running your content scan jobs.
+- AIP endpoints in Office 365 operated by 21Vianet are different than the endpoints required for other cloud services. Network connectivity from clients to the following endpoints is required:
+ - Download label and label policies: `*.protection.partner.outlook.cn`
+ - Azure Rights Management service: `*.aadrm.cn`
+ ## Configure AIP for customers in China To configure AIP for customers in China:
commerce Enter Your Product Key https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/enter-your-product-key.md
Last updated 11/13/2020
If you purchased Microsoft 365 Business Standard from a retail store, this article helps you activate your subscription. **Need something else?**
- **For help with Microsoft 365 Family or Microsoft 365 Personal**, see [Using product keys with Office](https://support.microsoft.com/office/12a5763a-d45c-4685-8c95-a44500213759.aspx).
+ **For help with Microsoft 365 Family or Microsoft 365 Personal**, see [Using product keys with Office](https://support.microsoft.com/office/12a5763a-d45c-4685-8c95-a44500213759).
**Volume licensing customer?** If you bought Microsoft 365 for business through a [Microsoft Open License Program](https://go.microsoft.com/fwlink/p/?LinkID=613298), see the article, [Enter your product key purchased from Microsoft Open](purchases-from-microsoft-open.md). ## Activate a new subscription
commerce Product Key Errors And Solutions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/product-key-errors-and-solutions.md
If there's an error message when you try to redeem a product key for **Microsoft
**Need help immediately?** [Call Microsoft Support](../admin/get-help-support.md).
- **For help with a Microsoft 365 Family or Microsoft 365 Personal product key**, see [Using product keys with Office](https://support.microsoft.com/office/12a5763a-d45c-4685-8c95-a44500213759.aspx).
+ **For help with a Microsoft 365 Family or Microsoft 365 Personal product key**, see [Using product keys with Office](https://support.microsoft.com/office/12a5763a-d45c-4685-8c95-a44500213759).
## Product key error help with Microsoft 365 for business | Error message when you enter your product key... | Try this... | |--|-|
-| "Sorry, this is an invalid product key. Try entering it again. If your product key is for Microsoft 365 Personal or Microsoft 365 Family, redeem it at office.com/setup." <br/><br/>If you're using Office 365 Solo in Japan: "Sorry, this is an invalid product key. Try entering it again. If your product key is for Office 365 Solo, redeem it at office.com/setup." | If you're setting up [Microsoft 365 Family or Personal](https://support.microsoft.com/office/28cbc8cf-1332-4f04-9123-9b660abb629e.aspx), you need to redeem your product key at [https://www.office.com/setup](https://www.office.com/setup). Otherwise, for business customers, carefully check the numbers and characters you're entering. |
+| "Sorry, this is an invalid product key. Try entering it again. If your product key is for Microsoft 365 Personal or Microsoft 365 Family, redeem it at office.com/setup." <br/><br/>If you're using Office 365 Solo in Japan: "Sorry, this is an invalid product key. Try entering it again. If your product key is for Office 365 Solo, redeem it at office.com/setup." | If you're setting up [Microsoft 365 Family or Personal](https://support.microsoft.com/office/28cbc8cf-1332-4f04-9123-9b660abb629e), you need to redeem your product key at [https://www.office.com/setup](https://www.office.com/setup). Otherwise, for business customers, carefully check the numbers and characters you're entering. |
| "The product key you entered isn't valid. Try entering it again." Or "This product key isn't valid. Please enter a different product key." | Carefully check the numbers and characters you are entering. Mistakes can be made with 0 and o, 5 and S, l and I, and so on. If the issue persists, please contact the reseller where you bought your product key. | | "You have already entered this product key. Enter a different key." | Check the product keys you already entered to see if the key has already been added. If you are renewing a subscription using a product key, you must use a new and unused product key. <br/><br/>Need to buy a new key? Visit the [Microsoft Store](https://go.microsoft.com/fwlink/p/?LinkId=529160) or a third-party reseller, orΓÇöif you're working with a partnerΓÇöcontact your partner. <br/><br/>If the issue persists, please [contact support](../admin/get-help-support.md). If you're working with a partner, contact your partner for product key support. | | "The product key you entered has expired. Enter a different key." | You must use a new and unused product key to renew a current subscription or activate a new subscription.<br/><br/>Need to buy a new key? Visit the [Microsoft Store](https://go.microsoft.com/fwlink/p/?LinkId=529160) or a third-party reseller, orΓÇöif you're working with a partnerΓÇöcontact your partner. |
commerce Purchases From Microsoft Open https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/purchases-from-microsoft-open.md
- commerce_purchase search.appverid: MET150
-description: "Learn how to activate, renew, or add licenses to an Microsoft 365 for business subscription."
+description: "Learn how to activate, renew, or add licenses to a Microsoft 365 for business subscription."
Last updated 10/21/2020
Last updated 10/21/2020
If you purchased Microsoft 365 for business from a [Microsoft Open License Program](https://go.microsoft.com/fwlink/p/?LinkID=613298), this article is for you. Volume licensing customers who purchased a product key can follow this topic to activate, renew, or add licenses to a subscription.
- **Need help immediately?**[Call Microsoft Support](../admin/get-help-support.md).
+ **Need help immediately?** [Call Microsoft Support](../admin/get-help-support.md).
**Need something else?**
-
- **For help with Microsoft 365 Home, or Personal**, see [Using product keys with Office](https://support.microsoft.com/office/12a5763a-d45c-4685-8c95-a44500213759.aspx).
+
+ **For help with Microsoft 365 Home, or Personal**, see [Using product keys with Office](https://support.microsoft.com/office/12a5763a-d45c-4685-8c95-a44500213759).
- **For help with Microsoft 365 Business Standard purchased from a retail store**, see [Enter your product key purchased from a retail store](enter-your-product-key.md).
+ **For help with Microsoft 365 Business Standard purchased from a retail store**, see [Enter your product key purchased from a retail store](enter-your-product-key.md).
## Activate, renew, or add licenses to a subscription purchased from Microsoft Open If you bought Microsoft 365 from a Microsoft Open License Program, the system automatically enters the key for you when you activate, renew, or add licenses to a subscription.
-1. After you purchase a key from an Microsoft 365 partner, check your inbox for an email from Microsoft containing an activation link.
-
+1. After you purchase a key from a Microsoft 365 partner, check your inbox for an email from Microsoft containing an activation link.
+ > [!TIP] > The email is sent to the person listed as the online administrator in the volume licensing agreement. If you're not sure who is designated as the online administrator, ask your Microsoft 365 partner. 2. Follow the link in the email to sign in with your work or school account, accept the Open License Agreement, and renew the subscription. For a step-by-step walkthrough, download the PDF guide, [Activate Online
-
+ > [!NOTE]
-> Volume licensing customers can also choose to activate subscriptions in the [Volume Licensing Service Center](https://go.microsoft.com/fwlink/p/?LinkID=282016). To learn how, download the PDF guide, [Activate Online Services in the Volume Licensing Service Center](https://go.microsoft.com/fwlink/p/?LinkId=618096).
+> Volume licensing customers can also choose to activate subscriptions in the [Volume Licensing Service Center](https://go.microsoft.com/fwlink/p/?LinkID=282016). To learn how, download the PDF guide, [Activate Online Services in the Volume Licensing Service Center](https://go.microsoft.com/fwlink/p/?LinkId=618096).
## What's next?
commerce Cancel Your Subscription https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/cancel-your-subscription.md
After 90 days, the subscription moves into the deleted state. Any data you leave
- **Admin access** Admins can still sign in and access the admin center, and buy other subscriptions as needed. As a global or billing admin, you have 90 days to [reactivate the subscription](reactivate-your-subscription.md) with all data intact. -- **User access** Your users won't be able to use services like OneDrive for Business, or access customer data like email or documents on team sites. Office applications, like Word and Excel, will eventually move into a read-only, reduced functionality mode and display [Unlicensed Product notifications](https://support.microsoft.com/office/0d23d3c0-c19c-4b2f-9845-5344fedc4380.aspx).
+- **User access** Your users won't be able to use services like OneDrive for Business, or access customer data like email or documents on team sites. Office applications, like Word and Excel, will eventually move into a read-only, reduced functionality mode and display [Unlicensed Product notifications](https://support.microsoft.com/office/0d23d3c0-c19c-4b2f-9845-5344fedc4380).
To learn more, see [What happens to my data and access when my subscription ends?](what-if-my-subscription-expires.md)
To change your NS records, see [Remove a domain](../../admin/get-help-with-domai
When the cancellation becomes effective, your users lose access to their data. Before you cancel the subscription, have them save their OneDrive for Business or SharePoint Online files to another location. Any customer data that you leave behind might be deleted after 30 days, and is deleted no later than 180 days after cancellation. -- To move email, contacts, tasks, and calendar information to another account, see [Export or backup email, contacts, and calendar to an Outlook .pst file](https://support.microsoft.com/office/14252b52-3075-4e9b-be4e-ff9ef1068f91.aspx).
+- To move email, contacts, tasks, and calendar information to another account, see [Export or backup email, contacts, and calendar to an Outlook .pst file](https://support.microsoft.com/office/14252b52-3075-4e9b-be4e-ff9ef1068f91).
- To save a document library or list content (such as contacts) from a SharePoint Online environment (OneDrive for Business or team sites) to file shares or to a local computer, see [Manual migration of SharePoint Online content](/sharepoint/troubleshoot/migration-tool/content-manual-migration). ### Uninstall Office (optional)
-If you canceled your subscription, and didn't [move users to a different subscription](move-users-different-subscription.md) that includes Microsoft 365, Microsoft 365 runs in reduced functionality mode. When this happens, users can only read and print documents, and Microsoft 365 applications display [Unlicensed Product notifications](https://support.microsoft.com/office/0d23d3c0-c19c-4b2f-9845-5344fedc4380.aspx). To avoid any confusion, have your users [uninstall Office](https://support.microsoft.com/office/9dd49b83-264a-477a-8fcc-2fdf5dbf61d8.aspx) from their machines.
+If you canceled your subscription, and didn't [move users to a different subscription](move-users-different-subscription.md) that includes Microsoft 365, Microsoft 365 runs in reduced functionality mode. When this happens, users can only read and print documents, and Microsoft 365 applications display [Unlicensed Product notifications](https://support.microsoft.com/office/0d23d3c0-c19c-4b2f-9845-5344fedc4380). To avoid any confusion, have your users [uninstall Office](https://support.microsoft.com/office/9dd49b83-264a-477a-8fcc-2fdf5dbf61d8) from their machines.
## Next steps
commerce Verify Academic Eligibility https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/verify-academic-eligibility.md
You can find the expiration date for your free trial subscription on the **Your
If your school doesn't qualify as a Microsoft Qualified Academic Institution, you can still buy commercial offers in the admin center on the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=868433" target="_blank">Purchase services</a> page. If your organization is a nonprofit group, your group might be eligible for subscriptions for non-profits. To learn more, see [Discounts and donations for nonprofits](https://www.microsoft.com/nonprofits/eligibility).
-If you have questions about your school's academic eligibility decision, [contact support]((../../admin/get-help-support.md).
+If you have questions about your school's academic eligibility decision, [contact support](../../admin/get-help-support.md).
## Next steps
commerce What If My Subscription Expires https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/what-if-my-subscription-expires.md
Read through this important information before you contact [Microsoft 365 suppor
## What happens to data when a subscription expires? - If your subscription expires, it goes through the following stages: Expired / Disabled / Deleted. The Expired stage starts immediately after the subscription has reached its end date.-- If you turn off recurring billing on your annual subscription, it goes through the same stages as an expired subscription. The first stage starts are the anniversary of the annual subscription, not starting on the date that you turned off the subscription's recurring billing setting.
+- If you turn off recurring billing on your annual subscription, it goes through the same stages as an expired subscription. The first-stage starts are the anniversary of the annual subscription, not starting on the date that you turned off the subscription's recurring billing setting.
- If you cancel your monthly subscription, it is disabled immediately (at the date of cancellation). This means your users lose access to the Microsoft 365 assets immediately and only admins have access to the data for the next 90 days. The following table explains what you can expect when a paid Microsoft 365 for business subscription expires.
Here's what to expect for you and your users if you cancel a subscription.
- **Admin access** Admins can still sign in and access the admin center, and buy other subscriptions as needed. As a global or billing admin, you have 90 days to [reactivate the subscription](reactivate-your-subscription.md) with all data intact. -- **User access** Your users won't be able to use services like OneDrive for Business, or access customer dataΓÇöfor example, email or documents on team sites. Office applications, like Word and Excel, will eventually move into a read-only, reduced functionality mode and display [Unlicensed Product notifications](https://support.microsoft.com/office/0d23d3c0-c19c-4b2f-9845-5344fedc4380.aspx).
+- **User access** Your users won't be able to use services like OneDrive for Business, or access customer dataΓÇöfor example, email or documents on team sites. Office applications, like Word and Excel, will eventually move into a read-only, reduced functionality mode and display [Unlicensed Product notifications](https://support.microsoft.com/office/0d23d3c0-c19c-4b2f-9845-5344fedc4380).
To learn how to cancel, see [Cancel your subscription](cancel-your-subscription.md).
As an admin, you still have access to the admin center. Don't worryΓÇöglobal or
**What to expect:** If you don't reactivate your subscription while it is in the Expired stage, it moves into a Disabled stage, which lasts for 90 days for most subscriptions, in most countries and regions. For Volume Licensing products, the Disabled stage lasts 30 days.
-In this state, your access decreases significantly. Your users can't sign in, or access services like email or SharePoint Online. Office applications eventually move into a read-only, reduced functionality mode and display [Unlicensed Product notifications](https://support.microsoft.com/office/0d23d3c0-c19c-4b2f-9845-5344fedc4380.aspx). You can still sign in and get to the admin center, but can't assign licenses to users. Your customer data, including all user data, email, and files on team sites, is available only to you and other admins.
+In this state, your access decreases significantly. Your users can't sign in, or access services like email or SharePoint Online. Office applications eventually move into a read-only, reduced functionality mode and display [Unlicensed Product notifications](https://support.microsoft.com/office/0d23d3c0-c19c-4b2f-9845-5344fedc4380). You can still sign in and get to the admin center, but can't assign licenses to users. Your customer data, including all user data, email, and files on team sites, is available only to you and other admins.
As a global or billing admin, you can [reactivate the subscription](reactivate-your-subscription.md) and continue using Microsoft 365 with all of your customer data intact. If you choose not to reactivate, [back up your data](back-up-data-before-switching-plans.md).
At this point, you can't reactivate the subscription. However, as a global or bi
> [!NOTE] > > - Adding a new subscription of the same type that has been deleted does not restore the data that was associated with the deleted subscription.
-> - If a CSP license is suspended, there is no 30 day Expired stage, and services are disabled immediately. Data is deleted after 90 days if the tenant is not reactivated by adding a new license.
+> - If a CSP license is suspended, there is no 30-day Expired stage, and services are disabled immediately. Data is deleted after 90 days if the tenant is not reactivated by adding a new license.
### What happens when my trial ends?
When your trial ends, you can't continue using Microsoft 365 for free. You have
- **Buy Microsoft 365.** When your trial expires, it moves into the Expired stage, giving you another 30 days (for most trials, in most countries and regions) to purchase Microsoft 365. To learn how to convert your trial into a paid subscription, see [Buy a subscription from your free trial](../try-or-buy-microsoft-365.md#buy-a-subscription-from-your-free-trial). - **Extend your trial.** Need more time to evaluate Microsoft 365? In certain cases, you can [extend your trial](../extend-your-trial.md).-- **Cancel the trial or let it expire.** If you decide not to buy Microsoft 365, you can let your trial expire or [cancel it](cancel-your-subscription.md). Back up any data you want to keep. Soon after the 30 day Expired stage, your trial account information and data is permanently erased.
+- **Cancel the trial or let it expire.** If you decide not to buy Microsoft 365, you can let your trial expire or [cancel it](cancel-your-subscription.md). Back up any data you want to keep. Soon after the 30-day Expired stage, your trial account information and data is permanently erased.
> [!NOTE] >
compliance Auditing Troubleshooting Scenarios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/auditing-troubleshooting-scenarios.md
audience: Admin-+ ms.localizationpriority: medium
compliance Communication Compliance Channels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-channels.md
search.appverid:
# Detect channel signals with communication compliance
-With communication compliance policies, you can choose to scan messages in one or more of the following communication platforms as a group or as standalone sources. Communications captured across these platforms are retained for seven years for each policy by default, even if users leave your organization and their mailboxes are deleted.
+With communication compliance policies, you can choose to scan messages in one or more of the following communication platforms as a group or as standalone sources. Original messages captured across these platforms are retained in the original platform location in accordance with your organization's [retention and hold policies](/microsoft-365/compliance/information-governance). Copies of messages used by communication compliance policies for analysis and investigation are retained for as long as policy is in place, even if users leave your organization and their mailboxes are deleted. When a communication policy is deleted, copies of messages associated with the policy are also deleted.
## Microsoft Teams
Select the extracted attachment text to view the details in the *Source*, *Plain
Use the following group management configurations to supervise individual user chats and channel communications in Teams: - **For Teams chat communications:** Assign individual users or assign a [distribution group](https://support.office.com/article/Distribution-groups-E8BA58A8-FAB2-4AAF-8AA1-2A304052D2DE) to the communication compliance policy. This setting is for one-to-one or one-to-many user/chat relationships.-- **For Teams Channel communications:** Assign every Microsoft Teams channel or Microsoft 365 group you want to scan that contains a specific user to the communication compliance policy. If you add the same user to other Microsoft Teams channels or Microsoft 365 groups, be sure to add these new channels and groups to the communication compliance policy. If any member of the channel is a supervised user within a policy and the *Inbound* direction is configured in a policy, all messages sent within the channel are subject to review and potential policy matches (even for users in the channel that aren't explicitly supervised). For example, User A is the owner or a member of a channel. User B and User C are members of the same channel and use language that is matched to the inappropriate content policy that supervises only User A. User B and User C create policy matches for conversations within the channel even though they aren't directly supervised in the inappropriate content policy. Teams conversations between User B and User C that are outside of the channel that includes User A would not be subject to the inappropriate content policy that includes User A. To exclude channel members from supervision when other members of the channel are explicitly supervised, turn off the *Inbound* communication direction setting in the applicable communication compliance policy.
+- **For Teams Channel communications:** Assign every Microsoft Teams channel or Microsoft 365 group you want to scan that contains a specific user to the communication compliance policy. If you add the same user to other Microsoft Teams channels or Microsoft 365 groups, be sure to add these new channels and groups to the communication compliance policy. If any member of the channel is a supervised user within a policy and the *Inbound* direction is configured in a policy, all messages sent within the channel are subject to review and potential policy matches (even for users in the channel that aren't explicitly supervised). For example, User A is the owner or a member of a channel. User B and User C are members of the same channel and use language that is matched to the inappropriate content policy that supervises only User A. User B and User C create policy matches for conversations within the channel even though they aren't directly supervised in the inappropriate content policy. Teams conversations between User B and User C that are outside of the channel that includes User A wouldn't be subject to the inappropriate content policy that includes User A. To exclude channel members from supervision when other members of the channel are explicitly supervised, turn off the *Inbound* communication direction setting in the applicable communication compliance policy.
- **For Teams chat communications with hybrid email environments**: Communication compliance can monitor chat messages for users for organizations with an Exchange on-premises deployment or an external email provider that have enabled Microsoft Teams. You must create a distribution group for the users with on-premises or external mailboxes to monitor. When creating a communication compliance policy, you'll assign this distribution group as the **Supervised users and groups** selection in the policy wizard. For more information about the requirements and limitations for enabling cloud-based storage and Teams support for on-premises users, see [Search for Teams chat data for on-premises users](search-cloud-based-mailboxes-for-on-premises-users.md). ## Exchange email
compliance Compliance Manager Assessments https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-assessments.md
Title: "Build and manage assessments in Microsoft Compliance Manager" f1.keywords: - NOCSH--++ audience: Admin
To delete an assessment, follow the steps below:
3. A window will appear asking you to confirm that you want to permanently delete the assessment. Select **Delete assessment** to close the window. YouΓÇÖll get a confirmation window that your assessment was deleted from Compliance Manager.
-If you delete the only assessment in a group, then that group is also deleted from Compliance Manager.
- > [!NOTE] > You can't delete all of your assessments. Organizations need at least one assessment for Compliance Manager to function properly. If the assessment you want to delete is the only one, add another assessment before deleting the other assessment.
compliance Create Retention Labels Information Governance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-retention-labels-information-governance.md
As part of your governance information strategy to retain what you need and dele
Whereas retention policies automatically apply to all items at the container level (such as SharePoint sites, user mailboxes, and so on), retention labels apply to individual items, such as a SharePoint document or an email message.
-Because of the [principles of retention](retention.md#the-principles-of-retention-or-what-takes-precedence), you can use retention labels to supplement a retention policy for specific SharePoint, OneDrive, or Exchange items that need to be retained longer, or deleted sooner than the specified settings in a retention policy for the same location.
+Make sure you understand the [principles of retention](retention.md#the-principles-of-retention-or-what-takes-precedence) before you use retention labels to supplement a retention policy for specific SharePoint, OneDrive, or Exchange items. Typically, you'll use retention labels to retain specific items longer than an applied retention policy, but they can also be used to apply a different deletion period.
For example: The majority of content on your SharePoint sites need to be retained for three years, which is covered with a retention policy. But you have some contract documents that must be retained for seven years. These exceptions can be addressed with retention labels. After assigning the retention policy to all SharePoint sites, you apply the retention labels to the contract documents. All SharePoint items will be retained for three years, and just the contract documents will be retained for seven years.
compliance Dlp Alerts Dashboard Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-alerts-dashboard-get-started.md
Here's a list of MIP role groups that are in preview. To learn more about the, s
To learn how to configure an alert in your DLP policy, see [Where to start with data loss prevention](create-test-tune-dlp-policy.md#where-to-start-with-data-loss-prevention).
+> [!IMPORTANT]
+> Your organizations audit log retention policy configuration controls how long an alert remains visible in the console. See, [Manage audit log retention policies](audit-log-retention-policies.md#manage-audit-log-retention-policies) for more information.
+ ### Aggregate event alert configuration If your org is licensed for [aggregated alert configuration options](#licensing-for-alert-configuration-options),
compliance Import Epic Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/import-epic-data.md
Setting up an Epic connector consists of the following tasks:
## Before you set up the connector -- The user who creates the Epic connector in Step 3 must be assigned the Mailbox Import Export role in Exchange Online. By default, this role isn't assigned to any role group in Exchange Online. You can add the Mailbox Import Export role to the Organization Management role group in Exchange Online. Or you can create a new role group, assign the Mailbox Import Export role, and then add the appropriate users as members. For more information, see the [Create role groups](\Exchange\permissions-exo\role-groups#create-role-groups) or [Modify role groups](\Exchange\permissions-exo\role-groups#modify-role-groups) sections in the article "Manage role groups in Exchange Online".
+- The user who creates the Epic connector in Step 3 must be assigned the Mailbox Import Export role in Exchange Online. By default, this role isn't assigned to any role group in Exchange Online. You can add the Mailbox Import Export role to the Organization Management role group in Exchange Online. Or you can create a new role group, assign the Mailbox Import Export role, and then add the appropriate users as members. For more information, see the [Create role groups](/Exchange/permissions-exo/role-groups#create-role-groups) or [Modify role groups](/Exchange/permissions-exo/role-groups#modify-role-groups) sections in the article "Manage role groups in Exchange Online".
- You need to determine how to retrieve or export the data from your organization's Epic EHR system (on a daily basis) and create a text file that's described in Step 2. The script that you run in Step 4 will push the data in the text file to the API endpoint.
Here's an example of the syntax for the Epic connector script using actual value
If the upload is successful, the script displays the **Upload Successful** message. > [!NOTE]
-> If you have problems running the previous command because of execution policies, see [About Execution Policies](\powershell\module\microsoft.powershell.core\about\about_execution_policies) and [Set-ExecutionPolicy](\powershell\module\microsoft.powershell.security\set-executionpolicy) for guidance about setting execution policies.
+> If you have problems running the previous command because of execution policies, see [About Execution Policies](/powershell/module/microsoft.powershell.core/about/about_execution_policies) and [Set-ExecutionPolicy](/powershell/module/microsoft.powershell.security/set-executionpolicy) for guidance about setting execution policies.
## Step 5: Monitor the Epic connector
compliance Import Healthcare Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/import-healthcare-data.md
Setting up a Healthcare connector consists of the following tasks:
## Before you set up the connector -- The user who creates the Healthcare connector in Step 3 must be assigned the Mailbox Import Export role in Exchange Online. By default, this role isn't assigned to any role group in Exchange Online. You can add the Mailbox Import Export role to the Organization Management role group in Exchange Online. Or you can create a new role group, assign the Mailbox Import Export role, and then add the appropriate users as members. For more information, see the [Create role groups](\Exchange\permissions-exo\role-groups#create-role-groups) or [Modify role groups](\Exchange\permissions-exo\role-groups#modify-role-groups) sections in the article "Manage role groups in Exchange Online".
+- The user who creates the Healthcare connector in Step 3 must be assigned the Mailbox Import Export role in Exchange Online. By default, this role isn't assigned to any role group in Exchange Online. You can add the Mailbox Import Export role to the Organization Management role group in Exchange Online. Or you can create a new role group, assign the Mailbox Import Export role, and then add the appropriate users as members. For more information, see the [Create role groups](/Exchange/permissions-exo/role-groups#create-role-groups) or [Modify role groups](/Exchange/permissions-exo/role-groups#modify-role-groups) sections in the article "Manage role groups in Exchange Online".
- You need to determine how to retrieve or export the data from your organization's healthcare EHR system (on a daily basis) and create a text file that's described in Step 2. The script that you run in Step 4 will push the data in the text file to the API endpoint.
Here's an example of the syntax for the Healthcare connector script using actual
If the upload is successful, the script displays the **Upload Successful** message. > [!NOTE]
-> If you have problems running the previous command because of execution policies, see [About Execution Policies](\powershell\module\microsoft.powershell.core\about\about_execution_policies) and [Set-ExecutionPolicy](\powershell\module\microsoft.powershell.security\set-executionpolicy) for guidance about setting execution policies.
+> If you have problems running the previous command because of execution policies, see [About Execution Policies](/powershell/module/microsoft.powershell.core/about/about_execution_policies) and [Set-ExecutionPolicy](/powershell/module/microsoft.powershell.security/set-executionpolicy) for guidance about setting execution policies.
## Step 5: Monitor the Healthcare connector
compliance Retention Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-settings.md
When you've decided whether to use an adaptive or static scope, use the followin
### Configuration information for adaptive scopes
-> [!NOTE]
-> Adaptive scopes as a new feature is currently in preview and subject to change. The alternative option is a static scope, which provides the same behavior before adaptive scopes were introduced and can be used if adaptive scopes don't meet your business requirements.
- When you choose to use adaptive scopes, you are prompted to select what type of adaptive scope you want. There are three different types of adaptive scopes and each one supports different attributes or properties: | Adaptive scope type | Attributes or properties supported include |
Before you configure your adaptive scope, use the previous section to identify w
1. In the [Microsoft 365 compliance center](https://compliance.microsoft.com/), navigate to one of the following locations:
- - If you are using records management:
+ - If you are using the records management solution:
- **Solutions** > **Records management** > **Adaptive scopes** tab > + **Create scope**
- - If you are not using records management:
+ - If you are using the information governance solution:
- **Solutions** > **Information governance** > **Adaptive scopes** tab > + **Create scope** Don't immediately see your solution in the navigation pane? First select **Show all**.
compliance Retention https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention.md
Often, the policies will take effect and labels will be visible quicker than 7 d
## Adaptive or static policy scopes for retention
-> [!NOTE]
-> Adaptive policy scopes as a new feature is currently in preview and subject to change. The alternative option is a static scope, which provides the same behavior before adaptive scopes were introduced and can be used if adaptive scopes don't meet your business requirements.
- When you create a retention policy or retention label policy, you must choose between adaptive and static to define the scope of the policy. - An **adaptive scope** uses a query that you specify, so the membership isn't static but dynamic by running daily against the attributes or properties that you specify for the selected locations. You can use multiple adaptive scopes with a single policy.
To watch a recorded webinar (requires registration), visit [Deep Dive on Adaptiv
## Policy lookup
-> [!NOTE]
-> Policy lookup is currently in preview and subject to change.
- You can configure multiple retention policies for Microsoft 365 locations, as well as multiple retention label policies that you publish or auto-apply. To find the policies for retention that are assigned to specific users, sites, and Microsoft 365 groups, use **Policy lookup** from the **Information governance** solution in the Microsoft 365 compliance center: ![Policy lookup to find the policies for retention that are assigned to specific users, sites, and Microsoft 365 groups ](../media/policy-lookup.png)
compliance Search The Audit Log In Security And Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance.md
In most services, auditing is enabled by default after you initially turn on aud
No. The auditing service pipeline is near real time, and therefore can't support de-duplication.
-**Does auditing data flow across geographies?**
+**Where is auditing data stored?**
-In general, no. We currently have auditing pipeline deployments in the NA (North America), EMEA (Europe, Middle East, and Africa) and APAC (Asia Pacific) regions. However, we may need to transfer data across these regions for load-balancing during live-site issues. When we do perform these activities, the data in transit is encrypted. For multi-geo organizations, the audit data collected from all regions of the organization will be stored only in the organization's home region.
+We currently have auditing pipeline deployments in the NA (North America), EMEA (Europe, Middle East, and Africa) and APAC (Asia Pacific) regions. Tenants homed in these regions will have their auditing data stored in region. For multi-geo tenants, the audit data collected from all regions of the tenant will be stored only in tenant's home region. However, we may flow the data across these regions for load-balancing and only during live-site issues. When we do perform these activities, the data in transit is encrypted.
**Is auditing data encrypted?**
compliance Use Content Search For Targeted Collections https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/use-content-search-for-targeted-collections.md
To display a list of mailbox folders or site documentlink (path) names:
if (!$ExoSession) { Import-Module ExchangeOnlineManagement
- Connect-ExchangeOnline
+ Connect-ExchangeOnline -ShowBanner:$false -CommandName Get-MailboxFolderStatistics
} $folderQueries = @() $folderStatistics = Get-MailboxFolderStatistics $emailAddress
contentunderstanding Index https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/contentunderstanding/index.md
The resources on this page are designed to get you started with learning about a
## Get started
-The resources in this section help you learn more about the two methods of data classification and extraction used by SharePoint Syntex: form processing and document understanding.
+The resources in this section help you learn more about the three methods of data classification and extraction used by SharePoint Syntex: document understanding, form processing, and prebuilt.
> [!NOTE] > You can get started with SharePoint Syntex without buying licenses by [creating a content center from the SharePoint admin center](create-a-content-center.md). Unlicensed users can create document understanding models but can't apply them to a document library.
The resources in this section help your users learn how to create and configure
|Learn how to work with models|[Create a content center](./create-a-content-center.md)<br><br>[Create a classifier](./create-a-classifier.md)<br><br>[Duplicate a model](./duplicate-a-model.md)<br><br>[Rename a model](./rename-a-model.md)<br><br>[Create an extractor](./create-an-extractor.md)<br><br>[Rename an extractor](./rename-an-extractor.md)<br><br>[Create a form processing model](./create-a-form-processing-model.md)<br><br>[Explanation types](./explanation-types-overview.md)<br><br>[Use explanation templates](./explanation-templates.md)<br><br>[Apply a document understanding model](./apply-a-model.md)<br><br>[Learn about document understanding models through the sample model](./learn-about-document-understanding-models-through-the-sample-model.md)<br><br>| |Apply a retention label to your model|[Apply a retention label to a document understanding model](./apply-a-retention-label-to-a-model.md)| |Apply a sensitivity label to your model|[Apply a sensitivity label to a document understanding model](./apply-a-sensitivity-label-to-a-model.md)|
+|Use prebuilt models to extract info from documents |[Use a prebuilt model to extract info from invoices or receipts](./prebuilt-models.md)|
|Use trained models in other content centers |[Publish and discover document understanding models](./model-discovery.md)| |Perform metadata-based queries on document libraries|[Search for metadata in document libraries](./metadata-search.md)| |Use Managed Metadata services term store taxonomy when creating an extractor|[Leverage term store taxonomy when creating an extractor](./leverage-term-store-taxonomy.md)|
contentunderstanding Prebuilt Models https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/contentunderstanding/prebuilt-models.md
Title: Create and configure a prebuilt model in Microsoft SharePoint Syntex
+ Title: Use a prebuilt model to extract info from invoices or receipts in Microsoft SharePoint Syntex
- enabler-strategic - m365initiative-syntex ms.localizationpriority: medium- description: Learn how to create and configure a prebuilt model in SharePoint Syntex.
-# Create and configure a prebuilt model in Microsoft SharePoint Syntex
+# Use a prebuilt model to extract info from invoices or receipts in Microsoft SharePoint Syntex
-> [!NOTE]
-> The content for this feature is currently in development.
+Prebuilt models are pretrained to recognize documents and the structured information in the documents. Instead of having to create a new custom model from scratch, you can iterate on an existing pretrained model to add specific fields that fit the needs of your organization.
-Prebuilt models are pretrained to recognize documents and the components in documents. They also work on image files and PDF files. You can immediately apply prebuilt models to libraries as they are. They don't need additional training or labeling, and no training file is needed.
+Prebuilt models use optical character recognition (OCR) combined with deep learning models to identify and extract predefined text and data fields common to specific document types. You start by analyzing one of your files against the prebuilt model. You then select the detected fields that make sense for your purpose. If the model doesn't detect the fields that you need, you can analyze again by using a different file.
-You can also customize a prebuilt model, review it to see how it works on your documents and customize the names to match your documents or naming convention. You can also turn off suggested components that aren't applicable.
+Currently, there are two prebuilt models available: invoice and receipt.
+- The *invoice prebuilt model* analyzes and extracts key information from sales invoices. The API analyzes invoices in various formats and [extracts key invoice information](/azure/applied-ai-services/form-recognizer/concept-invoice#field-extraction) such as customer name, billing address, due date, and amount due.
+- The *receipt prebuilt model* analyzes and extracts key information from sales receipts. The API analyzes printed and handwritten receipts and [extracts key receipt information](/azure/applied-ai-services/form-recognizer/concept-receipt#field-extraction) such as merchant name, merchant phone number, transaction date, tax, and transaction total.
+
+Additional prebuilt models will be available in future releases.
+
+## Create a prebuilt model
+
+Follow these steps to create a prebuilt model to classify documents in SharePoint Syntex.
+
+1. From the **Models** page, select **Create a model**.
+
+ ![Screenshot of the Models page showing the Create a model button.](../media/content-understanding/prebuilt-create-model-button.png)
+
+2. On the **Create a model** panel, in the **Name** field, type the name of the model.
+
+ ![Screenshot of the New document understanding model panel showing the model types available.](../media/content-understanding/prebuilt-create-panel.png)
+
+3. In the **Model type** section, select one of the prebuilt models:
+ - **Invoice processing prebuilt**
+ - **Receipt processing prebuilt**
+
+ If you want to create a traditional, untrained document understanding model instead of a prebuilt model, select **Custom document understanding**.
+
+4. If you want to change the content type or add a retention label, select **Advanced settings**.
+
+ > [!NOTE]
+ > Sensitivity labels are not available for prebuilt models at this time.
+
+5. Select **Create**. The model will be saved in the **Models** library.
+
+## Add a file to analyze
+
+1. On the **Models** page, in the **Add a file to analyze** section, select **Add file**.
+
+ ![Screenshot of the new models page showing the Add a file to analyze section.](../media/content-understanding/prebuilt-add-file-to-analyze.png)
+
+2. On the **Files to analyze the model** page, select **Add** to find the file you want to use.
+
+ ![Screenshot of the Files to analyze the model page showing the Add button.](../media/content-understanding/prebuilt-add-file-button.png)
+
+3. On the **Add a file from the training files library** page, select the file, and then select **Add**.
+
+ ![Screenshot of the Add a file from the training files library page.](../media/content-understanding/prebuilt-add-file-from-training-library.png)
+
+6. On the **Files to analyze the model** page, select **Next**.
+
+## Select extractors for your model
+
+On the extractor details page, you'll see the document area on the right and the **Extractors** panel on the left. The **Extractors** panel shows the list of extractors that have been identified in the document.
+
+ ![Screenshot of the extractor details page and Extractor panel.](../media/content-understanding/prebuilt-extractor-details-page.png)
+
+The entity fields that are highlighted in green in the document area are the items that were detected by the model when it analyzed the file. When you select an entity to extract, the highlighted field will change to blue. If you later decide not to include the entity, the highlighted field will change to gray. The highlights make it easier to see the current state of the extractors you have selected.
+
+> [!TIP]
+> You can use the scroll wheel on your mouse or the controls at the bottom of the document area to zoom in or out as needed to read the entity fields.
+
+### Select an extractor entity
+
+You can select an extractor either from the document area or from the **Extractors** panel, depending on your preference.
+
+- To select an extractor from the document area, select the entity field.
+
+ ![Screenshot of the document area showing how to select an entity field.](../media/content-understanding/prebuilt-document-area-select-field.png)
+
+- To select an extractor from the **Extractors** panel, select the checkbox to the right of the entity name.
+
+ ![Screenshot of the Extractors panel showing how to select an entity field.](../media/content-understanding/prebuilt-extractors-panel-select-field.png)
+
+When you select an extractor, a **Select extractor?** box is displayed in the document area. The box shows the extractor name, the original value, and the option to select it as an extractor. For certain data types such as numbers or dates, it will also show an extracted value.
+
+ ![Screenshot of the Select extractor box on the extractor details page.](../media/content-understanding/prebuilt-select-distractor-box.png)
+
+The original value is what is actually in the document. The extracted value is what will be written into the column in SharePoint. When the model is applied to a library, you can use column formatting to specify how you want it to look in the document.
+
+Continue to select additional extractors you want to you use. You can also add other files to analyze for this model configuration.
+
+## Rename an extractor
+
+You can rename an extractor either from the model home page or from the **Extractors** panel. You might consider renaming selected extractors because these names will be used as the column names when the model is applied to the library.
+
+To rename an extractor from the model home page:
+
+1. In the **Extractors** section, select the extractor you want to rename, and then select **Rename**.
+
+ ![Screenshot of the Extractors section with the Rename option highlighted.](../media/content-understanding/prebuilt-model-page-rename-extractor.png)
+
+2. On the **Rename entity extractor** panel, enter the new name of the extractor, and then select **Rename**.
+
+To rename an extractor from the **Extractors** panel:
+
+1. Select the extractor you want to rename, and then select **Rename**.
+
+ ![Screenshot of the Extractors panel showing how to rename an extractor.](../media/content-understanding/prebuilt-extractors-panel-rename-field.png)
+
+2. In the **Rename extractor** box, enter the new name of the extractor, and then select **Rename**.
+
+## Apply the model
+
+- To save changes and return to the model home page, on the **Extractors** panel, select **Save and exit**.
+
+- If you're ready to apply the model to a library, in the document area, select **Next**. On the **Add to library** panel, choose the library to which you want to add the model, and then select **Add**.
+
+## See also
+
+[Apply a document understanding model](apply-a-model.md)
lighthouse M365 Lighthouse Deploy Standard Tenant Configurations Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-deploy-standard-tenant-configurations-overview.md
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthous
Microsoft 365 Lighthouse baselines provide a repeatable and scalable way for you to assess and manage Microsoft 365 security settings across multiple customer tenants. Baselines also help monitor core security policies and tenant compliance standards with configurations that secure users, devices, and data.
-Designed to help partners enable customer adoption of security at their own pace, Lighthouse provides a standard set of baseline parameters and pre-defined configurations for Microsoft 365 services. These security configurations help measure your tenants' Microsoft 365 security and compliance progress.
+Designed to help partners enable customer adoption of security at their own pace, Lighthouse provides a standard set of baseline parameters and pre-defined configurations for Microsoft 365 services. These security configurations help measure your tenants' Microsoft 365 security and compliance progress.
You can view the default baseline and its deployment steps from within Lighthouse. To apply baselines to a tenant, select **Tenants** in the left navigation pane, and then select a tenant. Next, go to the **Deployment plans** tab and implement the desired baseline. ## Standard baseline security templates
-Lighthouse standard baseline configurations for security workloads are designed to help all managed tenants reach an acceptable state of security coverage and compliance.
+Lighthouse standard baseline configurations for security workloads are designed to help all managed tenants reach an acceptable state of security coverage and compliance.
The baseline configurations in the following table come standard with the Lighthouse default baseline.<br><br>
-| Baseline configuration | Description |
+| Baseline configuration | Description |
|--|--|
-| Require MFA for admins | A report-only Conditional Access policy requiring multifactor authentication for admins. It's required for all cloud applications. |
-| Require MFA for end users | A report-only Conditional Access policy that requires multifactor authentication for users. It's required for all cloud applications. |
-| Block legacy authentication | A report-only Conditional Access policy to block legacy client authentication. |
-| Set up device enrollment | Device enrollment to allow your tenant devices to enroll in Microsoft Endpoint Manager. This is done by setting up Auto Enrollment between Azure Active Directory and Microsoft Endpoint Manager. |
-| Configure Microsoft Defender Antivirus for Windows 10 and later | A Device Configuration profile for Windows devices with pre-configured Microsoft Defender Antivirus settings. |
+| Require MFA for admins | A Conditional Access policy requiring multifactor authentication for admins. It's required for all cloud applications. |
+| Require MFA for end users | A Conditional Access policy that requires multifactor authentication for users. It's required for all cloud applications. |
+| Block legacy authentication | A Conditional Access policy to block legacy client authentication. |
+| Set up device enrollment | Device enrollment to allow your tenant devices to enroll in Microsoft Endpoint Manager. This is done by setting up Auto Enrollment between Azure Active Directory and Microsoft Endpoint Manager. |
+| Configure Microsoft Defender Antivirus for Windows 10 and later | A Device Configuration profile for Windows devices with pre-configured Microsoft Defender Antivirus settings. |
| Configure a device compliance policy for Windows 10 and later | A Windows device policy with pre-configured settings to meet basic compliance requirements. | ## Related content
-[Deploy Microsoft 365 Lighthouse baselines](m365-lighthouse-deploy-baselines.md) (article)\
+[Deploy Microsoft 365 Lighthouse baselines](m365-lighthouse-deploy-baselines.md) (article)\
[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
managed-desktop Admin Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/managed-desktop/working-with-managed-desktop/admin-support.md
# Admin support for Microsoft Managed Desktop
-You can submit support tickets or feedback requests to Microsoft using the Microsoft Managed Desktop Admin portal. Support requests are always prioritized over feedback submissions. Support requests are triaged and managed according to severity as outlined in the [severity definition table](#sev). Feedback is reviewed and a response provided where requested.
+You can submit support tickets or feedback requests to Microsoft using the Microsoft Managed Desktop Admin portal. Support requests are always prioritized over feedback submissions.
## Open a new support request
+Support requests are triaged and managed according to severity outlined in the [severity definition table](#sev). Feedback is reviewed and a response provided where requested.
+
+**To open a new support request:**
+ 1. Sign in to [Microsoft Endpoint Manager](https://endpoint.microsoft.com/) and navigate to the **Tenant administration** menu.
-2. Look for the Microsoft Managed Desktop section, and then select **Service requests**.
-3. On the **Service requests** blade, select **+ New support request**.
-4. Select the **Request type** that matches the help you need. The following table outlines the options.
+2. In the Microsoft Managed Desktop section, select **Service requests**.
+3. In the **Service requests** section, select **+ New support request**.
+4. Select the **Request type** that matches the help you need. The table below outlines the options.
5. Select the **Severity** level. For more information, see [Support request severity definitions](#sev). 6. Provide as much information about the request as possible to help the team respond quickly. Depending on the type of request, you may be required to provide different details. 7. Review all the information you provided for accuracy. 8. When you're ready, select **Create**.
-Support request type|When to use
-|
-Incident|You require the Microsoft Managed Desktop Operations team to investigate a user issue caused by, for example, a widespread impact of a change or service outage.
-Request for information|You're planning a change in networking, proxy configuration, VPN systems, certificate expiration, or just need some information about the service. A response from the Microsoft Managed Desktop Operations team is advised when communicating a change within your organization.
-Change request|You require the Microsoft Managed Desktop Operations team to make a change, such as moving devices between update groups.
+### Support request types
+
+| Support request type | When to use |
+| -- | -- |
+Incident | You require the Microsoft Managed Desktop Operations team to investigate a user issue caused by, for example, a widespread impact of a change or service outage.
+Request for information | You're planning a change in networking, proxy configuration, VPN systems, certificate expiration, or just need some information about the service. A response from the Microsoft Managed Desktop Operations team is advised when communicating a change within your organization.
+Change request | You require the Microsoft Managed Desktop Operations team to make a change, such as moving devices between update groups.
> [!IMPORTANT]
-> When you create a support request you will need to list a Primary contact, responsible for working with our Service Engineers to resolve the issue or answer any questions about a requested change. We also require that you have previously [set up an Admin contact](../get-started/add-admin-contacts.md) who will be copied on all case notifications for their relevant area of focus and be asked to take over a case if the primary contact for a case is unreachable.
+> When you create a support request you will need to provide a primary contact. This person is responsible for working with our Service Engineers to resolve the issue or answer any questions about a requested change. We also require that you have previously [set up an Admin contact](../get-started/add-admin-contacts.md) who will be copied on all case notifications for their relevant area of focus. This person will be asked to take over a case if the primary contact for a case is unreachable.
## Manage an active support request
-The primary contact for a case (and any [Admin contact](../get-started/add-admin-contacts.md) for that area of focus) will receive email notifications when a case is **Created**, **Assigned** to a Service Engineer to investigate, and **Resolved**. If at any point you have a question about the case, the best way to get in touch with our team is to reply directly to one of those emails. If we have questions about your request or need more details to take action, we will email the Primary contact listed on the support requests (copying all the relevant Admin contacts).
+The primary contact for a case (and any [Admin contact](../get-started/add-admin-contacts.md) for that area of focus) will receive email notifications when a case is **Created**, **Assigned** to a Service Engineer to investigate, and **Resolved**. If, at any point, you have a question about the case, the best way to get in touch with our team is to reply directly to one of those emails. If we have questions about your request or need more details, we'll email the primary contact listed on the support requests. All relevant admin contacts are copied in the email.
### View all your active cases
-While email is the recommended approach to interact with our team, you may want to see the summary status of all your support requests. At any time, you can use the portal to see all support requests Active during the last six months.
+While email is the recommended approach to interact with our team, you may want to see the summary status of all your support requests. At any time, you can use the portal to see all Active support requests in the last six months.
+
+**To view all your active cases:**
1. Sign in to [Microsoft Endpoint Manager](https://endpoint.microsoft.com/) and navigate to the **Tenant Administration** menu.
-2. Look for the *Microsoft Managed Desktop* section, select **Service request**.
-3. From this view, you can export the summary view or click on any case to see the details
+2. In the **Microsoft Managed Desktop** section, select **Service request**.
+3. From this view, you can export the summary view or select any case to view the details.
### Edit case details
-If you need to edit the details of a case, for example updating the primary case contact or changing the severity, you will need to follow these steps:
+You can edit case details, for example, updating the primary case contact or changing the severity.
-1. From the **Service requests** blade, in the **Tenant Administration** menu of [Microsoft Endpoint Manager](https://endpoint.microsoft.com/), use the search bar or filters to find the case you're interested in editing.
-2. Select the case to open up the request's details
-3. Scroll to the bottom of the request details and select **Edit**.
-4. Update the editable information, add attachments to the case, or add a note for the Service Engineering team, then select **Save**.
+**To edit case details:**
-Once a case is resolved it can no longer be edited. If a request has been resolved for less than 24hrs you will see the option to **reactivate** instead of **Edit**, and once reactivated you can again edit the request.
+1. Sign in to [Microsoft Endpoint Manager](https://endpoint.microsoft.com/) and navigate to the **Tenant Administration** menu.
+1. In the **Service requests** section, use the search bar or filters to find the case you want to edit.
+1. Select the case to open up the request's details.
+1. Scroll to the bottom of the request details and select **Edit**.
+1. Update the editable information, add attachments to the case, or add a note for the Service Engineering team.
+1. Select **Save**.
+
+Once a case is resolved, it can no longer be edited. If a request has been resolved for less than 24 hours, you'll see the option to **reactivate** instead of **Edit**. Once reactivated, you can again edit the request.
### Provide feedback We appreciate your feedback and use it to improve the admin support experience.
-When you are the primary contact on for a support request, you will receive an email from Microsoft Managed Desktop Operations asking about your experience after your issue has been resolved. Feedback is actively monitored and shared with engineering to improve the service and prioritize future features. Be sure to focus on your experience and not include personal information in the feedback form. For more information about privacy, see the [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement).
+When you're the primary contact on for a support request, you'll receive an email from Microsoft Managed Desktop Operations. The email will ask about your experience after your issue has been resolved. Feedback is actively monitored and shared with engineering to improve the service and prioritize future features. Be sure to focus on your experience and not include personal information in the feedback form. For more information about privacy, see the [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement).
<span id="sev" /> ## Support request severity definitions
-The initial response time is the period from when you submit your support request to when a Microsoft Managed Desktop engineer contacts you and starts working on your support request. The initial response time varies with the business impact of the request, based on the severity of the request.
+The initial response time is the period from when you submit your support request until a Microsoft Managed Desktop engineer contacts you, and starts working on your support request. The initial response time varies with the business impact of the request. It is based on the severity of the request.
> [!NOTE]
-> In this table, "admin support hours" means, that Microsoft Managed Desktop support for admins is available, for most countries, 24 hours a day **Monday through Friday**. Severity A can be worked 24 hours a day all seven days of the week.
+> In this table, "admin support hours" means, that Microsoft Managed Desktop support for admins is available, for most countries, 24 hours a day **Monday through Friday**. Severity A issues can be worked 24 hours a day all seven days of the week.
+
+| Severity level | Situation | Initial response time | Expected response from you |
+| -- | -- |-- | -- |
+| **Severity A: <br> Critical Impact** | **Critical business impact** <br>Your business has significant loss or degradation of services and requires immediate attention.<p>**Major application compatibility impact**<br>Your entire business is experiencing financial impact due to devices not responding or loss of critical functionality. | **Initial:** < 1 hour<p>**Update**: 60 minutes<br>24-hour support every day is available. | When you select Severity A, you confirm that the issue has critical business impact, with severe loss and degradation of services. <p>The issue demands an immediate response, and you commit to continuous engagement every day with the Microsoft team until resolution. Otherwise, Microsoft can, at its discretion, decrease the Severity to level B.<p> You also ensure that Microsoft has your accurate contact information.
+**Severity B: <br> Moderate Impact** | **Moderate business impact**<br>Your business has moderate loss or degradation of services, but work can reasonably continue in an impaired manner.<p>**Moderate application compatibility impact**<br>A specific business group is no longer productive, due to devices not responding or loss of critical functionality.| **Initial**: < 4 hours. <p> **Update**: 12 hours; 24 hours a day during admin support hours (Monday through Friday).| When you select Severity B, you confirm that the issue has moderate impact to your business with loss and degradation of services. However, workarounds enable reasonable, albeit temporary, business continuity. <p>The issue demands an urgent response. If you select all day every day support when you submit the support request, you commit to continuous engagement every day with the Microsoft team until resolution. Otherwise, Microsoft might, at its discretion, decrease the severity to level C. If you select admin support-hours support when you submit a Severity B incident, Microsoft will contact you during admin support hours only.<p>You also ensure that Microsoft has your accurate contact information.
+**Severity C: <br> Minimal Impact** | **Minimum business impact**<br> Your business is functioning with minor impediments of services.<p>**Minor application compatibility impact**<br>Potentially unrelated users experience minor compatibility issues that don't prevent productivity. | **Initial**: < 8 hours.<p> **Update**: 24 hours; Support 24 hours a day during admin support hours (Monday through Friday). | When you select Severity C, you confirm that the issue has minimum impact to your business with minor impediment of service.<p>For a Severity C incident, Microsoft will contact you during admin support hours only.<p>You also ensure that Microsoft has your accurate contact information.
+
+### More support request information
-Severity level|Situation|Initial response time|Expected response from you
-|||
-**Severity A ΓÇô Critical Impact**|**Critical business impact**<p>Your business has significant loss or degradation of services and require immediate attention.<p>**Major application compatibility impact**<p>Your entire business is experiencing financial impact due to devices not responding or loss of critical functionality|Initial: < 1 hour<br>Update: 60 minutes<br>24-hour support every day is available|When you select Severity A, you confirm that the issue has critical business impact, with severe loss and degradation of services. <p>The issue demands an immediate response, and you commit to continuous engagement every day with the Microsoft team until resolution. Otherwise, Microsoft can at its discretion decrease the Severity to level B.<p> You also ensure that Microsoft has your accurate contact information.
-**Severity B ΓÇô Moderate Impact**|**Moderate business impact**<p>Your business has moderate loss or degradation of services, but work can reasonably continue in an impaired manner.<p>**Moderate application compatibility impact**<p>A specific business group is no longer productive, due to devices not responding or loss of critical functionality.|Initial: < 4 hours<br>Update: 12 hours<br>24 hours a day during admin support hours (Monday through Friday).|When you select Severity B, you confirm that the issue has moderate impact to your business with loss and degradation of services, but workarounds enable reasonable, albeit temporary, business continuity. <p>The issue demands an urgent response. If you chose all day every day support when you submit the support request, you commit to a continuous engagement every day with the Microsoft team until resolution. Otherwise, Microsoft might at its discretion decrease the severity to level C. If you chose admin support-hours support when you submit a Severity B incident, Microsoft will contact you during admin support hours only.<p>You also ensure that Microsoft has your accurate contact information.
-**Severity C ΓÇô Minimal Impact**|**Minimum business impact**<p> Your business is functioning with minor impediments of services.<p>**Minor application compatibility impact**<p>Potentially unrelated users experience minor compatibility issues that do not prevent productivity|Initial: < 8 hours<br>Update: 24 hours<br>Support 24 hours a day during admin support hours (Monday through Friday)|When you select Severity C, you confirm that the issue has minimum impact to your business with minor impediment of service.<p>For a Severity C incident, Microsoft will contact you during admin support hours only.<p>You also ensure that Microsoft has your accurate contact information.
+Below is a list of extra conditions to be aware of when submitting a support request.
-- **Support languages** - All support is provided in English.-- **Severity level changes** - Microsoft might downgrade the severity level if you aren't able to provide adequate resources or responses to enable us to continue with problem resolution efforts.-- **Application compatibility** - For an application compatibility issue to be considered, there must be a reproducible error, of the same version of the application, between the previous and current version of Windows or Microsoft 365 Apps for enterprise. To resolve application compatibility issues, we requires a point of contact in your org to work with. The contact must work directly with our Fast Track team to investigate and resolve the issue.-- **Customer response time** If you aren't able to meet the expected response requirements, we'll downgrade the request by one severity level, to a minimum of Severity C. If you're unresponsive to requests for action, we'll mitigate and close the support request within 48 hours of the last request.
+| | |
+| | |
+| Support languages | All support is provided in English. |
+| Severity level changes | Microsoft might downgrade the severity level if you aren't able to provide adequate resources, or responses for us to continue to resolve the problem. |
+| Application compatibility | For an application compatibility issue to be considered, there must be a reproducible error, using the same version of the application, between the previous and current version of Windows, or Microsoft 365 Apps for enterprise. <p>To resolve application compatibility issues, we require a point of contact in your organization to work with. The contact must work directly with our Fast Track team to investigate and resolve the issue. |
+| Customer response time | If you aren't able to meet the expected response requirements, we'll downgrade the request by one severity level to the minimum severity level (Severity C). If you're unresponsive to requests for action, we'll mitigate and close the support request within 48 hours of the last request. |
## More resources - [User support for Microsoft Managed Desktop](end-user-support.md). - [Support for Microsoft Managed Desktop](../service-description/support.md).-- If you already subscribe to Microsoft Managed Desktop, you can find detailed procedures, process flows, work instructions, and FAQs in the Microsoft Managed Desktop Admin Guide in the **Online resources** page under the **Microsoft Managed Desktop** section of the **Tenant administration** menu in [Microsoft Endpoint Manager](https://endpoint.microsoft.com/).
+- If you're already subscribed to Microsoft Managed Desktop, you can find detailed procedures, process flows, work instructions, and FAQs in the Microsoft Managed Desktop Admin Guide. In [Microsoft Endpoint Manager](https://endpoint.microsoft.com/), navigate to the Tenant administration section, under Microsoft Managed Desktop, select Online resources, then select Other resources. You'll find the Admin Guide here.
managed-desktop App Usage Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/managed-desktop/working-with-managed-desktop/app-usage-report.md
# App usage report
-This report helps you understand how applications are being used across your Microsoft Managed Desktop devices. It can also act as a reference to help you assess any effect on your users when application issues are discovered.
+This report helps you understand how applications are being used across your Microsoft Managed Desktop devices. It can also act as a reference to help you assess any effect on your users when application issues are discovered.
-The information in this report includes:
+The information in this report includes:
-- Application name: Applications with any amount of reported usage will appear in this list -- Foreground usage: Time spent interacting with the foreground application shown in hours. -- Average weekday usage: Average usage per device excluding weekends -- Device count: The number of reporting devices contributing to usage per application -- % of reporting devices: The percentage of total reporting devices that have used this application
+| Column name | Description |
+| | |
+| Application name | Applications with any amount of reported usage will appear in this list. |
+| Foreground usage | Time spent interacting with the foreground application shown in hours. |
+| Average weekday usage | Average usage per device excluding weekends.
+| Device count | The number of reporting devices contributing to usage per application.
+| % of reporting devices | The percentage of total reporting devices that have used this application.
> [!IMPORTANT]
-> For devices to report data, they must be set to the Optional diagnostic data level. Learn more about [how Microsoft Managed Desktop uses Windows diagnostic data](../service-description/privacy-personal-data.md).
+> For devices to report data, they must be set to the Optional diagnostic data level. Learn more about [how Microsoft Managed Desktop uses Windows diagnostic data](../service-description/privacy-personal-data.md).\
managed-desktop Device Status Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/managed-desktop/working-with-managed-desktop/device-status-report.md
# Device status report
-This report aggregates the status of all your registered devices to show your use of the Microsoft Managed Desktop service. We categorize devices based on their activity over the last 28 days and on our ability to keep the device updated. To be updated by Windows Update as soon as possible, a device must be connected to the internet and not hibernating or paused for a minimum of six hours, two of which must be continuous. Although it's possible that a device that doesn't meet these requirements will be updated, devices that meet them have the highest likelihood of being updated.
+This report aggregates the status of all your registered devices to show your use of the Microsoft Managed Desktop service.
+
+We categorize devices based on their activity over the last 28 days, and on our ability to keep the device updated.
+
+To be updated by Windows Update as soon as possible, a device must:
+
+- Be connected to the internet.
+- Not hibernating.
+- Not paused for a minimum of six hours, two of which must be continuous.
+
+Although it's possible that a device that doesn't meet these requirements will be updated. Devices that meet them have the highest likelihood of being updated.
:::image type="content" source="../../medi-device-status.png" alt-text="Report showing donut graph of device activity status in upper left, view filters in upper right with a button to generate the report, and table of details along the bottom":::
-We report device status using these labels:
+## Device status labels
+
+We report device status using the following labels:
-- **Ready for user**: Devices that have been successfully registered with our service and are ready to be given to a user -- **Active**: Devices that are being used and have met the activity criteria (six hours, two continuous) for the most recent security update release and have checked in with Microsoft Intune at least once in the past five days. -- **Synced**: Devices that are being used and have checked in with Intune within the last 28 days -- **Out of sync**: Devices that are being used but have not checked in with Intune in the last 28 days -- **Other**: The category aggregates several error states that can occur, typically during device registration. For more details, see [Troubleshooting device registration](../get-started/register-devices-self.md#troubleshooting-device-registration).
+| Device status label | Description |
+| | |
+| Ready for user | Devices that have been successfully registered with our service, and ready to be given to a user.|
+| Active | Devices that are being used. <ul><li>They've met the activity criteria (six hours, two continuous) for the most recent security update release.</li> <li>They've checked in with Microsoft Intune at least once in the past five days.</li></ul> |
+| Synced | Devices that are being used and have checked in with Intune within the last 28 days.
+| Out of sync | Devices that are being used but haven't checked in with Intune in the last 28 days. |
+| Other | The label aggregates several error states that can occur, typically during device registration. For more information, see [Troubleshooting device registration](../get-started/register-devices-self.md#troubleshooting-device-registration). |
managed-desktop End User Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/managed-desktop/working-with-managed-desktop/end-user-support.md
# Getting help for users If you've reached the point in the [workflow](../service-description/user-support.md) where you need to request elevated device access or escalation to Microsoft, follow these steps:
-
+ >[!NOTE] >These support options are not available for devices in the Test group.
If you've reached the point in the [workflow](../service-description/user-suppor
Before you request elevated access to a device, it's best to review which actions are best suited. -- **Typical actions** are what this process is intended for and would be performed routinely while troubleshooting problems with Microsoft Managed Desktop devices. Examples include:
- - Elevating built-in system troubleshooters, the command prompt, or Windows PowerShell
- - Troubleshooting line-of-business applications
- - Using a workaround to correct something that should function by design (such as BitLocker activation or system time not updating)
- - Elevating Device Manager to do things like update drivers, uninstall a device, or scan for new changes
--- **Actions that aren't recommended** include the following:
- - Installing software or browsers
- - Installing drivers outside of Windows settings, including those for peripherals
- - Installing .msi or .exe files
- - Installing Windows features
--- **Actions that aren't supported** include the following:
- - Installing software or features that conflict with Microsoft Managed Desktop security or management capabilities or operations
- - Disabling a Windows feature that is required for Microsoft Managed Desktop, such as BitLocker
- - Modifying settings managed by your org
+| Actions | Examples |
+| | |
+| **Typical actions** are intended for the elevation request process. It is performed routinely when troubleshooting problems with Microsoft Managed Desktop devices. | <ul><li>Elevating built-in system troubleshooters, the command prompt, or Windows PowerShell Troubleshooting line-of-business applications.</li><li>Using a workaround to correct something that should function by design (such as BitLocker activation or system time not updating).</li><li>Elevating Device Manager to do things like update drivers, uninstall a device, or scan for new changes.</li></ul>
+| **Actions that aren't recommended** | <ul><li>Installing software or browsers.</li><li>Installing drivers outside of Windows settings, including drivers for peripherals.</li><li>Installing .msi or .exe files.</li><li>Installing Windows features.</li></ul>
+| **Actions that aren't supported** | <ul><li>Installing software or features that conflict with Microsoft Managed Desktop security or management capabilities or operations.</li><li>Disabling a Windows feature that is required for Microsoft Managed Desktop, such as BitLocker.</li><li>Modifying settings managed by your organization.</li><ul>
-### To request elevation
+**To request elevation:**
1. Sign in to [Microsoft Endpoint Manager](https://endpoint.microsoft.com/) and navigate to the **Devices** menu.
-2. Look for the **Microsoft Managed Desktop** section, and then select the **Devices** blade, which contains two tabsΓÇôthe **Devices** tab and the **Elevation requests** tab.
-3. To create a new elevation request on the **Device** tab, select a single device that you want to elevate, and then select **Request elevation** from the Device actions dropdown menu. A new elevation request fly-in pane will appear with the deviceΓÇÖs name prepopulated in that field.
-4. Alternatively, to create a new elevation request on the **Elevations requests** tab, select **+New elevation request.**
-5. Provide these details:
- - **Support ticket ID** from your own support ticketing system.
- - **Device name**(only when creating request from the **Elevation requests** tab): Enter the device serial number and then select the device from the menu.
+1. In the **Microsoft Managed Desktop** section, select **Devices**, which contains two tabs: the **Devices** tab and the **Elevation requests** tab.
+1. To create a new elevation request on the **Device** tab, select a single device that you want to elevate.
+1. From the Device actions dropdown menu, select **Request elevation**. A new elevation request fly-in will appear with the deviceΓÇÖs name pre-populated in that field.
+1. Instead, to create a new elevation request in the **Elevations requests** tab, select **+New elevation request.**
+1. Provide these details:
+ - **Support ticket ID**: This is from your own support ticketing system.
+ - **Device name**: This is only when creating request from the **Elevation requests** tab. Enter the device serial number and then select the device from the menu.
- **Category**: Select the category that best fits your issue. If no option seems close, then select **Other**. It's best to select a category if at all possible. - **Title**: Provide a short description of the issue on the device.
- - **Plan of action**: Provide the troubleshooting steps you plan to take once elevation is granted.
-6. Select **Submit**.
-7. The list and details of all active and closed requests can be seen on the **Elevation requests** Tab.
--
+ - **Plan of action**: Provide the troubleshooting steps you plan to take once elevation is granted.
+1. Select **Submit**.
+1. The list and details of all active and closed requests can be seen on the **Elevation requests** tab.
## Escalation requests -
-If you need to [escalate](../service-description/user-support.md#escalation-portal) an issue to Microsoft, follow these steps:
+**To [escalate](../service-description/user-support.md#escalation-portal) an issue to Microsoft:**
1. Sign in to [Microsoft Endpoint Manager](https://endpoint.microsoft.com/) and navigate to the **Tenant administration** menu.
-2. Look for the Microsoft Managed Desktop section, and then select **Service requests**.
-3. On the **Service requests** blade, select **+ New support request**.
-4. Provide a very brief description in the **Title** box. Then set the **Request type** to **Incident**.
-5. Select the **Category** and **Sub-category** that best fits your issue and select **Next**.
+2. In the Microsoft Managed Desktop section, select **Service requests**.
+3. In the **Service requests** section, select **+ New support request**.
+4. Provide a brief description in the **Title** field. Then, set the **Request type** to **Incident**.
+5. Select the **Category** and **Sub-category** that best fits your issue. Then, select **Next**.
6. In the **Details** section, provide the following information:
- - **Description**: Add any additional details that could help our team understand the problem. If you need to attach files, you can do that by coming back to the request after you submit it.
- - **Primary contact information**: Provide info about how to contact the main person responsible for working with our team.
-7. Select the **Severity** level. For more information, see Support request severity definitions.
+ - **Description**: Add any extra details that could help our team understand the problem. If you need to attach files, you can do that by coming back to the request after you submit it.
+ - **Primary contact information**: Provide information about how to contact the main person responsible for working with our team.
+7. Select the **Severity** level. For more information, see [Support request severity definitions](../working-with-managed-desktop/admin-support.md#support-request-severity-definitions).
8. Provide as much information about the request as possible to help the team respond quickly. Depending on the type of request, you may be required to provide different details. 9. Review all the information you provided for accuracy. 10. When you're ready, select **Create**.
managed-desktop Manage Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/managed-desktop/working-with-managed-desktop/manage-apps.md
<!--Application management -->
-There are a couple of ways to manage app updates for apps that you've onboarded to Microsoft Managed Desktop and deployed to your Microsoft Managed Desktop devices. You can make app updates in Microsoft Managed Desktop portal, or Intune.
+There are a couple of ways to manage app updates, and deploy the updates to your Microsoft Managed Desktop devices. You can make app updates in Microsoft Managed Desktop portal, or Intune.
<span id="update-app-mmd" /> ## Update line-of-business apps in Microsoft Managed Desktop
-**To update your line-of-business apps in Microsoft Managed Desktop portal**
+**To update your line-of-business apps in Microsoft Managed Desktop portal:**
+ 1. Sign in to [Microsoft Managed Desktop Admin portal](https://aka.ms/mmdportal).
-2. Under **Inventory**, select **Apps**.
-3. Select the app you want to updates, and then select **Edit**.
-4. Under **Manage**, select **Properties**.
-5. Click **App package file**, and then browse to upload a new app package file.
-6. Select **App package file**.
-7. Select the folder icon and browse to the location of your updated app file. Select **Open**. The app information is updated with the package information.
-8. Verify that **App version** reflects the updated app package.
+1. Under **Inventory**, select **Apps**.
+1. Select the app you want to updates, and then select **Edit**.
+1. Under **Manage**, select **Properties**.
+1. Select **App package file**, and then browse to upload a new app package file.
+1. Select **App package file**.
+1. Select the folder icon and browse to the location of your updated app file. Select **Open**. The app information is updated with the package information.
+1. Verify that **App version** reflects the updated app package.
The updated app will be deployed to your user's devices.
The updated app will be deployed to your user's devices.
## Update line-of-business apps in Intune
-**To update your line-of-business apps in Intune**
+**To update your line-of-business apps in Intune:**
+ 1. Sign in to [Azure portal](https://portal.azure.com). 2. Select **All Services** > **Intune**. Intune is in the **Monitoring + Management** section. 3. Select **Client Apps > Apps**. 4. Find and select your app in the list of apps.
-5. In the **Overview** blade, select **Properties**.
+5. In the **Overview** section, select **Properties**.
6. Select **App package file**. 7. Select the folder icon and browse to the location of your updated app file. Select **Open**. The app information is updated with the package information. 8. Verify that **App version** reflects the updated app package.
The updated app will be deployed to your user's devices.
## Roll back an app to a previous version
-If there's an error found when a new version of an app is deployed, you can roll back to a previous version. The process outlined here is for apps where type is listed as **Windows MSI line-of-business app** or **Windows app (Win 32) - preview**
+When a new version of an app is deployed, and an error is found, you can roll back to a previous version. The process outlined below is for apps where the type is listed as **Windows MSI line-of-business app** or **Windows app (Win 32) - preview**
-**To roll back a line-of-business app to a previous version**
+**To roll back a line-of-business app to a previous version:**
1. Sign in to [Microsoft Managed Desktop Admin portal](https://aka.ms/mmdportal). 2. Under **Inventory**, select **Apps**. 3. Select the app you need to roll back, and then select **Edit**.
-4. Under **Manage**, select **Properties**.
+4. Under **Manage**, select **Properties**.
- For **Windows MSI line-of-business app** apps, select **App information**, and then under **Ignore app version**, select **Yes**.
- - For **Windows app (Win 32) - preview** apps, select **App information**, select **Detection rules**, and then select **Add**.
- If there is an MSI rule, verify that **MSI product version check** is set to **No**.
+ - For **Windows app (Win 32) - preview** apps, select **App information**, select **Detection rules**, and then select **Add**.
+ If there's an MSI rule, verify that **MSI product version check** is set to **No**.
5. [Upload a previous version of the app source file](../get-started/deploy-apps.md) to Microsoft Managed Desktop Admin portal. -
managed-desktop Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/managed-desktop/working-with-managed-desktop/reports.md
# Work with reports
-The Microsoft Endpoint Manager console brings together reporting from several products into a single location to help you monitor and investigate issues with your Azure AD organization ("tenant") configuration and devices. Microsoft Managed desktop has a section in the **Reports** menu where you can find reports specific to Microsoft Managed Desktop's management of the devices you’ve registered. Additionally, in several locations throughout Microsoft Endpoint Manager you can filter reports from other product groups to specifically include or exclude your devices that are managed by Microsoft Managed Desktop. 
+The Microsoft Endpoint Manager console brings together reporting from several products into a single location to help you monitor, and investigate issues with your Azure AD organization ("tenant") configuration and devices.
+
+Microsoft Managed Desktop has a section in the **Reports** menu where you can find reports specific to Microsoft Managed Desktop's management of the registered devices. In several locations throughout Microsoft Endpoint Manager, you can filter reports from other product groups. You can include or exclude devices that are managed by Microsoft Managed Desktop.
## Microsoft Managed Desktop reports
-Microsoft Managed Desktop provides several reports and dashboards that IT admins in your organization can use to understand various aspects of the population of devices. You can find these reports by navigating to **Managed devices** under the *Microsoft Managed Desktop* section of the **Reports** menu in Microsoft Endpoint Manager.
-On the **Summary** tab, you'll find quick metrics about device updates. Selecting **View details** of any metric will allow you to download additional information for offline analysis, including the underlying dataset for the metric.
+Microsoft Managed Desktop provides several reports and dashboards. IT admins, in your organization, can use these reports and dashboards to understand various aspects of the population of devices. In Microsoft Endpoint Manager, navigate to the Reports section, under Microsoft Managed Desktop, select Managed devices.
+
+In the **Summary** tab, you'll find quick metrics about device updates. Select **View details** of any metric to download additional information for offline analysis, including the underlying dataset for the metric.
+
+When you select the **Reports** tab, you'll see descriptions for the available detailed reports. These reports are more comprehensive and support data visualization and filtering in the portal. You can also export the underlying data for offline analysis or distribution. The following reports are available today:
-When you select the **Reports** tab, you will see descriptions for the available detailed reports. These reports are more comprehensive and support visualization and filtering of the data in the portal as well as exporting the underlying data for offline analysis or distribution. The following reports are available today:
-- The [**Device status** report](device-status-report.md) (*in preview*) shows your use of the Microsoft Managed Desktop service based on device activity and usage. -- You can use **Device status trend** (*in preview*) to monitor trends in device status over the last 60 days for your Microsoft Managed Desktop devices. Trends can help you associate device status with other changes over time, for example, new deployments. -- The [**Windows security updates** report](security-updates-report.md) (*in preview*) shows how Windows security updates are released across your Microsoft Managed Desktop devices.-- The [**Application usage** report](app-usage-report.md) provides information about typical app usage across your Microsoft Managed Desktop devices. For devices to provide data to this report, they must be set to the Optional diagnostic data level.
+| Report | Description |
+| | |
+| [**Device status** report](device-status-report.md) (*in preview*) | This report shows your use of the Microsoft Managed Desktop service based on device activity and usage. |
+| **Device status trend** (*in preview*) | This monitors trends in device status over the last 60 days for your Microsoft Managed Desktop devices. Trends can help you associate device status with other changes over time, for example, new deployments. |
+| [**Windows security updates** report](security-updates-report.md) (*in preview*) | This report shows how Windows security updates are released across your Microsoft Managed Desktop devices. |
+| [**Application usage** report](app-usage-report.md) | This report provides information about typical app usage across your Microsoft Managed Desktop devices. For devices to provide data to this report, they must be set to the Optional diagnostic data level. |
## Endpoint analytics
-Microsoft Managed Desktop is now integrated with [Endpoint analytics](/mem/analytics/overview). These reports give you insights for measuring how your organization is working and the quality of the experience delivered to your users. Endpoint analytics is in the **Reports** menu of [Microsoft Endpoint Manager](https://endpoint.microsoft.com/). To pivot a score to only include devices being managed by Microsoft Managed Desktop go to any report, select the **Filter** drop down, and then select **Microsoft Managed Desktop devices**.
-If Endpoint analytics wasn't automatically configured for your Azure AD organization ("tenant") during enrollment, you can do that yourself. For more information, see [Onboard in the Endpoint analytics portal](/mem/analytics/enroll-intune#bkmk_onboard). You can enroll all of your devices or, if you want to include only Microsoft Managed Desktop devices, select the **modern workplace device** groups for Test, First, Fast, and Broad. These reports might require different permissions. For more information, see [Permissions](/mem/analytics/overview#permissions) to ensure you have roles appropriately assigned.
+Microsoft Managed Desktop is now integrated with [Endpoint analytics](/mem/analytics/overview). These reports give you insights for measuring how your organization is working and the quality of the experience delivered to your users. You can find Endpoint analytics in the **Reports** menu of [Microsoft Endpoint Manager](https://endpoint.microsoft.com/). To pivot a score to only include devices being managed by Microsoft Managed Desktop, go to any report, select the **Filter** dropdown, and then select **Microsoft Managed Desktop devices**.
+
+If Endpoint analytics weren't automatically configured for your Azure AD organization ("tenant") during enrollment, you can do that yourself. For more information, see [Onboard in the Endpoint analytics portal](/mem/analytics/enroll-intune#bkmk_onboard). You can enroll all of your devices, or, if you want to include only Microsoft Managed Desktop devices, select the **modern workplace device** groups for Test, First, Fast, and Broad. These reports might require different permissions. For more information, see [Permissions](/mem/analytics/overview#permissions) to ensure you have roles appropriately assigned.
> [!NOTE] > To better respect user privacy, there must be more than 10 Microsoft Managed Desktop devices enrolled with Endpoint analytics to use this filter. ## Intune reports
-Microsoft Intune is one of the services we use to manage devices on your behalf. In some cases, it can be helpful to use Intune reports to specifically monitor administration of your Microsoft Managed Desktop devices. Or you might want to exclude the devices we manage from a report you use to manage other devices. The following reports let you filter capability to include or exclude Microsoft Managed Desktop devices.
+
+Microsoft Intune is one of the services we use to manage devices on your behalf. In some cases, it can be helpful to use Intune reports to specifically monitor administration of your Microsoft Managed Desktop devices. You can exclude the devices we manage from the report you use to manage other devices. The following reports let you filter capability to include or exclude Microsoft Managed Desktop devices.
- [All devices](/mem/intune/remote-actions/device-management#get-to-your-devices) - [Device compliance](/mem/intune/fundamentals/reports#device-compliance-report-organizational) - [Noncompliant devices](/mem/intune/fundamentals/reports#noncompliant-devices-report-operational) > [!NOTE]
-> Custom Microsoft Managed Desktop roles guarantee access only to the Microsoft Managed Desktop reports. To access other parts of Microsoft Endpoint Manager, such as **All devices**, see [Role-based access control with Microsoft Intune](/mem/intune/fundamentals/role-based-access-control).
+> Custom Microsoft Managed Desktop roles guarantee access only to the Microsoft Managed Desktop reports. To access other parts of Microsoft Endpoint Manager, such as **All devices**, see [Role-based access control with Microsoft Intune](/mem/intune/fundamentals/role-based-access-control).
## Microsoft Managed Desktop inventory data
-In addition to the other reports, you can export information about the devices managed by Microsoft Managed Desktop. In the **Devices** view of the **Devices** area of Microsoft Endpoint Manager, use the **Export all** tab to [download a detailed inventory report](device-inventory-report.md).
+In addition to the other reports, you can export information about the devices managed by Microsoft Managed Desktop. In Microsoft Endpoint Manager, navigate to the **Devices** section, under Microsoft Managed Desktop, select **Devices** and use the **Export all** tab to [download a detailed inventory report](device-inventory-report.md).
managed-desktop Security Updates Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/managed-desktop/working-with-managed-desktop/security-updates-report.md
# Windows security updates report
-This report provides an overview of the deployment progress of a given Windows security update for your Microsoft Managed Desktop devices. At the beginning of each security update release cycle, Microsoft Managed Desktop takes a snapshot of all the enrolled devices. The deployment target is set to 95% of **Active** devices from that population. The graph shows your deployment progress for a selected release date compared to the Microsoft Managed Desktop average. While we focus on the Active population you can also pivot this report to show your **Active + Synced** and **Out of sync** device populations. You can view the deployment progress for previous releases by changing the available filters, but device level details are only available for the current release. Device information viewable in the table following the graph is also exportable for offline analysis.
+This report provides an overview of the deployment progress, of a given Windows security update, for your Microsoft Managed Desktop devices.
+
+At the beginning of each security update release cycle, Microsoft Managed Desktop takes a snapshot of all the enrolled devices. The deployment target is set to 95% of **Active** devices from that population. The graph shows your deployment progress for a selected release date compared to the Microsoft Managed Desktop average.
+
+While we focus on the Active population, you can also pivot this report to show your **Active + Synced** and **Out of sync** device populations. You can view the deployment progress for previous releases by changing the available filters, but device level details are only available for the current release. Device information in the table following the graph is also exportable for offline analysis.
:::image type="content" source="../../medi-security-updates.png" alt-text="Report showing update installation progress over time in upper left, filters in the upper right with a button to generate the report, and table of report details along the bottom":::
-Typically, Microsoft releases security updates every second Tuesday of the month, though they can be released at other times when needed. Each release adds important updates for known security vulnerabilities. Microsoft Managed Desktop ensures that 95% of its active devices are updated with the latest available security update every month. When security updates are released at other times to urgently address new threats, Microsoft Managed Desktop deploys these updates similarly. We categorize the status of security update versions with these terms:
+Typically, Microsoft releases security updates every second Tuesday of the month. However, they can be released at other times when needed. Each release adds important updates for known security vulnerabilities
+
+Microsoft Managed Desktop ensures 95% of its active devices are updated with the latest available security update every month. When security updates are released, at other times to urgently address new threats, Microsoft Managed Desktop deploys these updates similarly.
+
+## Status categories
+
+We categorize the status of security update versions using the following terms:
-- **Current**: Devices that are running the update released in the current month -- **Previous**: Devices running the update that was released in the previous month -- **Older**: Devices running any security update released prior to the previous month
+| Status of security update | Description |
+| | |
+| Current | Devices that are running the update released in the current month. |
+| Previous | Devices running the update that was released in the previous month. |
+| Older | Devices running any security update released prior to the previous month. |
-There should only be a few devices in the **Older** category. A large or growing **Older** population probably indicates a systemic problem that you should report to Microsoft Managed Desktop so we can investigate.
+> [!NOTE]
+> There should only be a few devices in the **Older** category. A large or growing **Older** population probably indicates a systemic problem that you should report to Microsoft Managed Desktop for investigation.
managed-desktop Work With App Control https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/managed-desktop/working-with-managed-desktop/work-with-app-control.md
When you open a signer request, you'll need to provide some important publisher
1. [Gather publisher details](#gather-publisher-details). 1. Open a ticket with Microsoft Managed Desktop Operations to request the signer rule and include following details: - - Application name - Application version - Description
You can pause or roll back the deployment at any time during the rollout. To pau
1. Open the Event Viewer on that device. 1. In the Event Viewer, navigate to **Application and Services Logs\Microsoft\Windows**, and then select **AppLocker**. 1. Find any **8003** or **8006** event, and then copy information from the event:- - Application name - Application version - Description
security Android Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-whatsnew.md
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
## Threat and Vulnerability Management
-On November 2, 2021, we announced the public preview of Threat and Vulnerability management on Android and iOS. For more information, see [the techcommunity post here](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/reduce-risk-across-your-environments-with-the-latest-threat-and/ba-p/2902691).
+On January 25, 2022, we announced the general availability of Threat and Vulnerability management on Android and iOS. For more details, see [the techcommunity post here](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-general-availability-of-vulnerability-management/ba-p/3071663).
## Upcoming permission changes for Microsoft Defender for Endpoint running Android 11 or later (Nov 2021)
security Attack Surface Reduction Rules Deployment Phase 1 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-phase-1.md
Title: ASR rules deployment phase 1 - plan
description: Provides guidance to plan your attack surface reduction rules deployment. keywords: Attack surface reduction rules deployment, ASR deployment, enable asr rules, configure ASR, host intrusion prevention system, protection rules, anti-exploit rules, anti-exploit, exploit rules, infection prevention rules, Microsoft Defender for Endpoint, configure ASR rules search.product: eADQiWindows 10XVcnh- ms.prod: m365-security ms.mktglfcycl: manage ms.sitesec: library
ms.localizationpriority: medium
audience: ITPro + ms.technology: mde -+ Last updated : 1/18/2022 # ASR rules deployment phase 1: plan
security Attack Surface Reduction Rules Deployment Phase 2 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-phase-2.md
Title: ASR rules deployment phase 2 - test
description: Provides guidance to test your attack surface reduction rules deployment. keywords: Attack surface reduction rules deployment, ASR deployment, enable asr rules, configure ASR, host intrusion prevention system, protection rules, anti-exploit rules, anti-exploit, exploit rules, infection prevention rules, Microsoft Defender for Endpoint, configure ASR rules search.product: eADQiWindows 10XVcnh- ms.prod: m365-security ms.mktglfcycl: manage ms.sitesec: library
ms.localizationpriority: medium
audience: ITPro + ms.technology: mde -+ Last updated : 1/18/2022 # ASR rules deployment phase 2: test
security Attack Surface Reduction Rules Deployment Phase 3 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-phase-3.md
Title: ASR rules deployment phase 3 - implement
description: Provides guidance to implement your attack surface reduction rules deployment. keywords: Attack surface reduction rules deployment, ASR deployment, enable asr rules, configure ASR, host intrusion prevention system, protection rules, anti-exploit rules, anti-exploit, exploit rules, infection prevention rules, Microsoft Defender for Endpoint, configure ASR rules search.product: eADQiWindows 10XVcnh- ms.prod: m365-security ms.mktglfcycl: manage ms.sitesec: library
ms.localizationpriority: medium
audience: ITPro + ms.technology: mde -+ Last updated : 1/18/2022 # ASR rules deployment phase 3: implement
security Attack Surface Reduction Rules Deployment Phase 4 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-phase-4.md
Title: ASR rules deployment phase 4 - operationalize
description: Provides guidance to operationalize your attack surface reduction rules deployment. keywords: Attack surface reduction rules deployment, ASR deployment, enable asr rules, configure ASR, host intrusion prevention system, protection rules, anti-exploit rules, anti-exploit, exploit rules, infection prevention rules, Microsoft Defender for Endpoint, configure ASR rules search.product: eADQiWindows 10XVcnh- ms.prod: m365-security ms.mktglfcycl: manage ms.sitesec: library
ms.localizationpriority: medium
audience: ITPro + ms.technology: mde -+ Last updated : 1/18/2022 # ASR rules deployment phase 4: operationalize
security Attack Surface Reduction Rules Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mde -+ Last updated : 1/18/2022 # ASR rules deployment overview
security Attack Surface Reduction Rules Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference.md
Title: Attack surface reduction rules
+ Title: Attack surface reduction rules reference
description: Lists details about attack surface reduction rules on a per-rule basis. keywords: Attack surface reduction rules, ASR, asr rules, hips, host intrusion prevention system, protection rules, anti-exploit rules, antiexploit, exploit rules, infection prevention rules, Microsoft Defender for Endpoint, configure ASR rules, ASR rule description ms.prod: m365-security
ms.technology: mde Last updated : 1/18/2022
-# Attack surface reduction rules
+# Attack surface reduction rules reference
**Applies to:** - [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)
security Attack Surface Reduction https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction.md
ms.localizationpriority: medium
audience: ITPro -+ - asr - admindeeplinkDEFENDER ms.technology: mde -+ Last updated : 1/18/2022 # Use attack surface reduction rules to prevent malware infection
security Configure Proxy Internet https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-proxy-internet.md
The Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to re
> [!TIP] > For organizations that use forward proxies as a gateway to the Internet, you can use network protection to [investigate connection events that occur behind forward proxies](investigate-behind-proxy.md).
-The WinHTTP configuration setting is independent of the Windows Internet (WinINet) browsing proxy settings (see, [WinINet vs. WinHTTP](/windows/win32/wininet/wininet-vs-winhttp)) and can only discover a proxy server by using the following discovery methods:
+The WinHTTP configuration setting is independent of the Windows Internet (WinINet) browsing proxy settings (see, [WinINet vs. WinHTTP](/windows/win32/wininet/wininet-vs-winhttp)). It can only discover a proxy server by using the following discovery methods:
- Auto-discovery methods:
The WinHTTP configuration setting is independent of the Windows Internet (WinINe
- Web Proxy Auto-discovery Protocol (WPAD) > [!NOTE]
- > If you're using Transparent proxy or WPAD in your network topology, you don't need special configuration settings. For more information on Defender for Endpoint URL exclusions in the proxy, see [Enable access to Defender for Endpoint service URLs in the proxy server](#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
+ > If you're using Transparent proxy or WPAD in your network topology, you don't need special configuration settings. For more information on Defender for Endpoint URL exclusions in the proxy, see [Enable access to Defender for Endpoint service URLs in the proxy server](#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server)
- Manual static proxy configuration:
The WinHTTP configuration setting is independent of the Windows Internet (WinINe
## Configure the proxy server manually using a registry-based static proxy
-Configure a registry-based static proxy for Defender for Endpoint detection and response (EDR) sensor to report diagnostic data and communicate with Defender for Endpoint services if a computer is not permitted to connect to the Internet.
+Configure a registry-based static proxy for Defender for Endpoint Detection and Response (EDR) sensor to report diagnostic data. Also, communicate with Defender for Endpoint services, if a computer isn't permitted to connect to the Internet.
> [!NOTE] > When using this option on Windows 10, or Windows 11, or Windows Server 2019, or Windows Server 2022, it is recommended to have the following (or later) build and cumulative update rollup:
Configure a registry-based static proxy for Defender for Endpoint detection and
> > These updates improve the connectivity and reliability of the CnC (Command and Control) channel.
-The static proxy is also configurable through Group Policy (GP), both the settings under group policy values need to be set to configure the proxy server to be used for EDR. The group policy can be found under:
+The static proxy is configurable through group policy (GP), both the settings under group policy values should be configured to the proxy server for using EDR. The group policy is available in Administrative Templates.
- **Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service**.
The static proxy is also configurable through Group Policy (GP), both the settin
- **Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure connected user experiences and telemetry**:
- Configure the proxy
+ Configure the proxy.
![Image of Group Policy setting2.](images/atp-gpo-proxy2.png)
The static proxy is also configurable through Group Policy (GP), both the settin
## Configure a static proxy for Microsoft Defender Antivirus
-Microsoft Defender Antivirus [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) provides near-instant, automated protection against new and emerging threats. Note that connectivity is required for [custom indicators](manage-indicators.md) when Defender Antivirus is your active antimalware solution; and for [EDR in block mode](edr-in-block-mode.md) even when using a non-Microsoft solution as the primary antimalware solution.
+Microsoft Defender Antivirus [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) provides near-instant, automated protection against new and emerging threats. Note, the connectivity is required for [custom indicators](manage-indicators.md) when Defender Antivirus is your active anti-malware solution. For [EDR in block mode](edr-in-block-mode.md) has primary anti-malware solution when using a non-Microsoft solution.
-Configure the static proxy using the Group Policy found here:
+Configure the static proxy using the Group Policy available in Administrative Templates:
1. **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy server for connecting to the network**.
-2. Set it to **Enabled** and define the proxy server. Note that the URL must have either http:// or https://. For supported versions for https://, see [Manage Microsoft Defender Antivirus updates](manage-updates-baselines-microsoft-defender-antivirus.md).
+2. Set it to **Enabled** and define the proxy server. Note, the URL must have either http:// or https://. For supported versions for https://, see [Manage Microsoft Defender Antivirus updates](manage-updates-baselines-microsoft-defender-antivirus.md).
:::image type="content" source="images/proxy-server-mdav.png" alt-text="Proxy server for Microsoft Defender Antivirus.":::
Configure the static proxy using the Group Policy found here:
> [!NOTE] >
-> For resiliency purposes and the real-time nature of cloud-delivered protection, Microsoft Defender Antivirus will cache the last known working proxy. Ensure your proxy solution does not perform SSL inspection as this will break the secure cloud connection.
+> For resiliency purposes and the real-time nature of cloud-delivered protection, Microsoft Defender Antivirus will cache the last known working proxy. Ensure your proxy solution does not perform SSL inspection. This will break the secure cloud connection.
> > Microsoft Defender Antivirus will not use the static proxy to connect to Windows Update or Microsoft Update for downloading updates. Instead, it will use a system-wide proxy if configured to use Windows Update, or the configured internal update source according to the [configured fallback order](manage-protection-updates-microsoft-defender-antivirus.md). >
-> If required, you can use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy auto-config (.pac)** for connecting to the network if you need to set up advanced configurations with multiple proxies, Use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define addresses** to bypass proxy server to prevent Microsoft Defender Antivirus from using a proxy server for those destinations.
+> If required, you can use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy auto-config (.pac)** for connecting to the network. If you need to set up advanced configurations with multiple proxies, use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define addresses** to bypass proxy server and prevent Microsoft Defender Antivirus from using a proxy server for those destinations.
>
-> You can also use PowerShell with the `Set-MpPreference` cmdlet to configure these options:
+> You can use PowerShell with the `Set-MpPreference` cmdlet to configure these options:
> > - ProxyBypass > - ProxyPacUrl > - ProxyServer > [!NOTE]
-> To use proxy correctly, configure these three different proxy settings:
+> To use the proxy correctly, configure these three different proxy settings:
> - Microsoft Defender for Endpoint (MDE) > - AV (Antivirus) > - Endpoint Detection and Response (EDR)
Use netsh to configure a system-wide static proxy.
> [!NOTE] > > - This will affect all applications including Windows services which use WinHTTP with default proxy.</br>
-> - Laptops that are changing topology (for example: from office to home) will malfunction with netsh. Use the registry-based static proxy configuration.
+> - Laptops that are changing topology (for example: from office to home) will malfunction with netsh command. Use the registry-based static proxy configuration.
1. Open an elevated command line: 1. Go to **Start** and type **cmd**.
See [Netsh Command Syntax, Contexts, and Formatting](/windows-server/networking/
## Enable access to Microsoft Defender for Endpoint service URLs in the proxy server
-If a proxy or firewall is blocking all traffic by default and allowing only specific domains through, add the domains listed in the downloadable sheet to the allowed domains list.
+By default, if a proxy or firewall is blocking all traffic by default and allowing only specific domains, then add the domains listed in the downloadable sheet to the allowed domains list.
-The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. Ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an *allow* rule specifically for them.
+The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect. Ensure there are no firewall or network filtering rules to deny access for these URLs. Optional, you may need to create an *allow* rule specifically for them.
<br>
The following downloadable spreadsheet lists the services and their associated U
| If a proxy or firewall has HTTPS scanning (SSL inspection) enabled, exclude the domains listed in the above table from HTTPS scanning.
-In your firewall, open all the URLs where the geography column is WW. For rows where the geography column is not WW, open the URLs to your specific data location. To verify your data location setting, see [Verify data storage location and update data retention settings for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/data-retention-settings).
+In your firewall, open all the URLs where the geography column is WW. For rows where the geography column isn't WW, open the URLs to your specific data location. To verify your data location setting, see [Verify data storage location and update data retention settings for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/data-retention-settings).
> [!NOTE]
-> settings-win.data.microsoft.com is only needed if you have Windows devices running version 1803 or earlier.<br>
+> Windows devices running with version 1803 or earlier needs `settings-win.data.microsoft.com`. <br>
> > URLs that include v20 in them are only needed if you have Windows devices running version 1803 or later. For example, `us-v20.events.data.microsoft.com` is needed for a Windows device running version 1803 or later and onboarded to US Data Storage region. >
-> The above spreadsheet relates to MDE EDR, if you are using Microsoft Defender Antivirus in your environment, see [Configure network connections to the Microsoft Defender Antivirus cloud service](/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus).
-If a proxy or firewall is blocking anonymous traffic, as Defender for Endpoint sensor is connecting from system context, make sure anonymous traffic is permitted in the previously listed URLs.
+If a proxy or firewall is blocking anonymous traffic as Defender for Endpoint sensor, and it's connecting from system context to make sure anonymous traffic is permitted in the previously listed URLs.
> [!NOTE] > Microsoft does not provide a proxy server. These URLs are accessible via the proxy server that you configure. ### Microsoft Monitoring Agent (MMA) - proxy and firewall requirements for older versions of Windows client or Windows Server
-The information below list the proxy and firewall configuration information required to communicate with Log Analytics agent (often referred to as Microsoft Monitoring Agent) for the previous versions of Windows such as Windows 7 SP1, Windows 8.1, and Windows Server 2008 R2*
+The information in the list of proxy and firewall configuration information is required to communicate with Log Analytics agent (often referred to as Microsoft Monitoring Agent) for previous versions of Windows, such as Windows 7 SP1, Windows 8.1, and Windows Server 2008 R2*.
<br>
The information below list the proxy and firewall configuration information requ
|*.azure-automation.net|Port 443|Outbound|Yes| > [!NOTE]
-> *These connectivity requirements also apply to the previous Microsoft Defender for Endpoint for Windows Server 2016 and Windows Server 2012 R2 that requires the MMA. Instructions to onboard these operating systems with the new unified solution are at [Onboard Windows servers](configure-server-endpoints.md), or to migrate to the new unified solution at [Server migration scenarios in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/server-migration).
+> *These connectivity requirements apply to the previous Microsoft Defender for Endpoint of Windows Server 2016, and Windows Server 2012 R2 that requires MMA. Instructions to onboard these operating systems with the new unified solution are at [Onboard Windows servers](configure-server-endpoints.md), or migrate to the new unified solution at [Server migration scenarios in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/server-migration).
> [!NOTE]
-> As a cloud-based solution, the IP range can change. It's recommended you move to DNS resolving setting.
+> As a cloud-based solution, the IP range can change. It's recommended, you move to DNS resolving setting.
## Confirm Microsoft Monitoring Agent (MMA) Service URL Requirements See the following guidance to eliminate the wildcard (*) requirement for your specific environment when using the Microsoft Monitoring Agent (MMA) for previous versions of Windows.
-1. Onboard a previous operating system with the Microsoft Monitoring Agent (MMA) into Defender for Endpoint (for more information, see [Onboard previous versions of Windows on Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2010326) and [Onboard Windows servers](configure-server-endpoints.md).
+1. Onboard a previous operating system with the Microsoft Monitoring Agent (MMA) into Defender for Endpoint (for more information, see [Onboard previous versions of Windows on Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2010326) and [Onboard Windows servers](configure-server-endpoints.md)).
2. Ensure the machine is successfully reporting into the Microsoft 365 Defender portal.
-3. Run the TestCloudConnection.exe tool from "C:\Program Files\Microsoft Monitoring Agent\Agent" to validate the connectivity and to see the required URLs for your specific workspace.
+3. Run the TestCloudConnection.exe tool from "C:\Program Files\Microsoft Monitoring Agent\Agent" to validate the connectivity, and to get the required URLs for your specific workspace.
4. Check the Microsoft Defender for Endpoint URLs list for the complete list of requirements for your region (refer to the Service URLs [Spreadsheet](https://download.microsoft.com/download/8/e-urls.xlsx)). ![Image of administrator in Windows PowerShell.](images/admin-powershell.png)
-The wildcards (\*) used in \*.ods.opinsights.azure.com, \*.oms.opinsights.azure.com, and \*.agentsvc.azure-automation.net URL endpoints can be replaced with your specific Workspace ID. The Workspace ID is specific to your environment and workspace and can be found in the Onboarding section of your tenant within the Microsoft 365 Defender portal.
+The wildcards (\*) used in \*.ods.opinsights.azure.com, \*.oms.opinsights.azure.com, and \*.agentsvc.azure-automation.net URL endpoints can be replaced with your specific Workspace ID. The Workspace ID is specific to your environment and workspace. It can be found in the Onboarding section of your tenant within the Microsoft 365 Defender portal.
The \*.blob.core.windows.net URL endpoint can be replaced with the URLs shown in the "Firewall Rule: \*.blob.core.windows.net" section of the test results. > [!NOTE]
-> In the case of onboarding via Microsoft Defender for Cloud, multiple workspaces maybe used. You will need to perform the TestCloudConnection.exe procedure above on an onboarded machine from each workspace (to determine if there are any changes to the *.blob.core.windows.net URLs between the workspaces).
+> In the case of onboarding via Microsoft Defender for Cloud, multiple workspaces can be used. You will need to perform the TestCloudConnection.exe procedure on the onboarded machine from each workspace (to determine, if there are any changes to the *.blob.core.windows.net URLs between the workspaces).
## Verify client connectivity to Microsoft Defender for Endpoint service URLs
-Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Defender for Endpoint service URLs.
+Verify, the proxy configuration is completed successfully. The WinHTTP can then discover and communicate through the proxy server in your environment, and then the proxy server will allow traffic to the Defender for Endpoint service URLs.
-1. Download the [Microsoft Defender for Endpoint Client Analyzer tool](https://aka.ms/mdeanalyzer) to the PC where Defender for Endpoint sensor is running on.
+1. Download the [Microsoft Defender for Endpoint Client Analyzer tool](https://aka.ms/mdeanalyzer) to the PC, where Defender for Endpoint sensor is running on.
2. Extract the contents of MDEClientAnalyzer.zip on the device.
-3. Open an elevated command-line:
+3. Open an elevated command line:
1. Go to **Start** and type **cmd**. 1. Right-click **Command prompt** and select **Run as administrator**.
Verify the proxy configuration completed successfully, that WinHTTP can discover
HardDrivePath\MDEClientAnalyzer.cmd ```
- Replace *HardDrivePath* with the path where the MDEClientAnalyzer tool was downloaded to, for example:
+ Replace *HardDrivePath* with the path, where the MDEClientAnalyzer tool was downloaded. For example:
```PowerShell C:\Work\tools\MDEClientAnalyzer\MDEClientAnalyzer.cmd ```
-5. Extract the *MDEClientAnalyzerResult.zip* file created by tool in the folder used in the *HardDrivePath*.
+5. The tool creates and extracts the *MDEClientAnalyzerResult.zip* file in the folder to use in the *HardDrivePath*.
-6. Open *MDEClientAnalyzerResult.txt* and verify that you have performed the proxy configuration steps to enable server discovery and access to the service URLs.
+6. Open *MDEClientAnalyzerResult.txt* and verify that you've performed the proxy configuration steps, to enable server discovery and access to the service URLs.
- The tool checks the connectivity of Defender for Endpoint service URLs that Defender for Endpoint client is configured to interact with. It then prints the results into the *MDEClientAnalyzerResult.txt* file for each URL that can potentially be used to communicate with the Defender for Endpoint services. For example:
+ The tool checks the connectivity of Defender for Endpoint service URLs. Ensure the Defender for Endpoint client is configured to interact. The tool will print the results in the *MDEClientAnalyzerResult.txt* file for each URL that can potentially be used to communicate with the Defender for Endpoint services. For example:
```text Testing URL : https://xxx.microsoft.com/xxx
Verify the proxy configuration completed successfully, that WinHTTP can discover
5 - Command line proxy: Doesn't exist ```
-If at least one of the connectivity options returns a (200) status, then the Defender for Endpoint client can communicate with the tested URL properly using this connectivity method.
+If any one of the connectivity options returns a (200) status, then the Defender for Endpoint client can communicate with the tested URL properly using this connectivity method.
-However, if the connectivity check results indicate a failure, an HTTP error is displayed (see HTTP Status Codes). You can then use the URLs in the table shown in [Enable access to Defender for Endpoint service URLs in the proxy server](#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). The URLs you'll use will depend on the region selected during the onboarding procedure.
+However, if the connectivity check results indicate a failure, an HTTP error is displayed (see HTTP Status Codes). You can then use the URLs in the table shown in [Enable access to Defender for Endpoint service URLs in the proxy server](#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). The URLs available for use will depend on the region selected during the onboarding procedure.
> [!NOTE]
-> The Connectivity Analyzer tool cloud connectivity checks are not compatible with Attack Surface Reduction rule [Block process creations originating from PSExec and WMI commands](attack-surface-reduction-rules-reference.md#block-process-creations-originating-from-psexec-and-wmi-commands). You will need to temporarily disable this rule to run the connectivity tool. Alternatively, you can temporarily add [ASR exclusions](attack-surface-reduction-rules-deployment-phase-3.md#customize-attack-surface-reduction-rules) when running the analyzer.
+> The Connectivity Analyzer tool's cloud connectivity checks are not compatible with Attack Surface Reduction rule [Block process creations originating from PSExec and WMI commands](attack-surface-reduction-rules-reference.md#block-process-creations-originating-from-psexec-and-wmi-commands). You will need to temporarily disable this rule, to run the connectivity tool. Alternatively, you can temporarily add [ASR exclusions](attack-surface-reduction-rules-deployment-phase-3.md#customize-attack-surface-reduction-rules) when running the analyzer.
>
-> When the TelemetryProxyServer is set, in Registry or via Group Policy, Defender for Endpoint will fall back to direct if it can't access the defined proxy.
+> When the TelemetryProxyServer is set in Registry or via Group Policy, Defender for Endpoint will fall back, it fails to access the defined proxy.
## Related topics -- [Configure and validate Microsoft Defender Antivirus network connections](configure-network-connections-microsoft-defender-antivirus.md) - [Use Group Policy settings to configure and manage Microsoft Defender Antivirus](use-group-policy-microsoft-defender-antivirus.md) - [Onboard Windows devices](configure-endpoints.md) - [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)
security Configure Server Endpoints https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-server-endpoints.md
The following specifics apply to the new unified solution package for Windows Se
- On Windows Server 2012 R2, Network Events may not populate in the timeline. This issue requires a Windows Update released as part of the [October 12, 2021 monthly rollup (KB5006714)](https://support.microsoft.com/topic/october-12-2021-kb5006714-monthly-rollup-4dc4a2cd-677c-477b-8079-dcfef2bda09e). - Operating system upgrades are not supported. Offboard then uninstall before upgrading. - Automatic exclusions for *server roles* are not supported on Windows Server 2012 R2; however, built-in exclusions for operating system files are. For more information about adding exclusions, see [Virus scanning recommendations for Enterprise computers that are running currently supported versions of Windows](https://support.microsoft.com/topic/virus-scanning-recommendations-for-enterprise-computers-that-are-running-currently-supported-versions-of-windows-kb822158-c067a732-f24a-9079-d240-3733e39b40bc).
+- Currently, if you choose to offboard and uninstall the modern, unified solution and re-onboard the previous MMA-based EDR sensor, you may encounter repeated `MsSenseS.exe` crashes.
+
+As a workaround, remove the following registry keys if they exist:
+- `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security\fdedb2b8-61e4-4a7e-8b15-abf214a08fcc`
+- `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security\c60418cc-7e07-400f-ae3b-d521c5dbd96f`
+
+You can use the following commands:
+
+```cmd
+reg delete HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security /v fdedb2b8-61e4-4a7e-8b15-abf214a08fcc /f
+reg delete HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security /v c60418cc-7e07-400f-ae3b-d521c5dbd96f /f
+```
+No restart is required.
<a name="integration-with-azure-defender"></a>
Microsoft Defender for Endpoint integrates seamlessly with Microsoft Defender fo
For more information, see [Integration with Microsoft Defender for Cloud](azure-server-integration.md). > [!NOTE]
-> For Windows Server 2012 R2 and 2016 running the modern unified solution preview, integration with Microsoft Defender for Cloud / Microsoft Defender for servers for alerting and automated deployment is not yet available. Whilst you can install the new solution on these machines, no alerts will be displayed in Microsoft Defender for Cloud.
+> For Windows Server 2012 R2 and 2016 running the modern unified solution preview, integration with Microsoft Defender for Cloud / Microsoft Defender for servers for alerting and automated deployment is not yet available. Whilst you can manually install the new solution on these machines, no alerts will be displayed in Microsoft Defender for Cloud.
> [!NOTE] > - The integration between Microsoft Defender for servers and Microsoft Defender for Endpoint has been expanded to support Windows Server 2022, [Windows Server 2019, and Windows Virtual Desktop (WVD)](/azure/security-center/release-notes#microsoft-defender-for-endpoint-integration-with-azure-defender-now-supports-windows-server-2019-and-windows-10-virtual-desktop-wvd-in-preview).
security Controlled Folders https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/controlled-folders.md
ms.localizationpriority: medium
audience: ITPro Previously updated : 06/10/2021-+ ms.technology: mde -+ Last updated : # Protect important folders with controlled folder access
Controlled folder access requires enabling [Microsoft Defender Antivirus real-ti
Defender for Endpoint provides detailed reporting into events and blocks as part of its [alert investigation scenarios](investigate-alerts.md) in the Microsoft 365 Defender portal. (See [Microsoft Defender for Endpoint in Microsoft 365 Defender](../defender/microsoft-365-security-center-mde.md).)
-You can query Microsoft Defender for Endpoint data by using [Advanced hunting](/microsoft-365/security/defender-endpoint/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender.md), you can use [advanced hunting](advanced-hunting-overview.md) to see how controlled folder access settings would affect your environment if they were enabled.
+You can query Microsoft Defender for Endpoint data by using [Advanced hunting](https://docs.microsoft.com/microsoft-365/security/defender-endpoint/advanced-hunting-overview?view=o365-worldwide). If you're using [audit mode](audit-windows-defender.md), you can use [advanced hunting](advanced-hunting-overview.md) to see how controlled folder access settings would affect your environment if they were enabled.
Example query:
security Customize Controlled Folders https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/customize-controlled-folders.md
ms.localizationpriority: medium
audience: ITPro -+ Previously updated : 10/19/2021 ms.technology: mde -+ Last updated : # Customize controlled folder access
> [!TIP] > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019, Windows Server 2022, Windows 10, and windows 11 clients. This article describes how to customize controlled folder access capabilities, and includes the following sections:
+Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients. This article describes how to customize controlled folder access capabilities, and includes the following sections:
- [Protect additional folders](#protect-additional-folders) - [Add apps that should be allowed to access protected folders](#allow-specific-apps-to-make-changes-to-controlled-folders)
security Customize Exploit Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/customize-exploit-protection.md
ms.technology: mde-+ Last updated : # Customize exploit protection
security Data Collection Analyzer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/data-collection-analyzer.md
Run '**MDEClientAnalyzer.cmd /?**' to see the list of available parameters and t
![Image of client analyzer parameters in command line.](images/d89a1c04cf8441e4df72005879871bd0.png) > [!NOTE]
-> When any advanced troubleshooting parameter is used, the analyzer also calls into [MpCmdRun.exe](/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data-update-compliance) to collect Microsoft Defender Antivirus related support logs.
+> When any advanced troubleshooting parameter is used, the analyzer also calls into [MpCmdRun.exe] [https://docs.microsoft.com/microsoft-365/security/defender-endpoint/command-line-arguments-microsoft-defender-antivirus](https://docs.microsoft.com/microsoft-365/security/defender-endpoint/command-line-arguments-microsoft-defender-antivirus?view=o365-worldwide) to collect Microsoft Defender Antivirus related support logs.
**-h** - Calls into [Windows Performance Recorder](/windows-hardware/test/wpt/wpr-command-line-options) to collect a verbose general performance trace in addition to the standard log set.
security Enable Attack Surface Reduction https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction.md
ms.technology: mde Previously updated : 12/06/2021-+ Last updated : 1/18/2022 # Enable attack surface reduction rules
security Enable Controlled Folders https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-controlled-folders.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mde-+ Last updated : # Enable controlled folder access
security Enable Exploit Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-exploit-protection.md
ms.technology: mde + Last updated 10/19/2021- # Enable exploit protection
security Enable Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-network-protection.md
ms.technology: mde-+ Last updated : # Turn on network protection
security Evaluate Controlled Folder Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluate-controlled-folder-access.md
audience: ITPro
-+ ms.technology: mde-+ Last updated : # Evaluate controlled folder access
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-enablesiem-abovefoldlink)
-[Controlled folder access](controlled-folders.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps. Controlled folder access is supported on Windows Server 2019, Windows Server 2022, Windows 10, and windows 11 clients.
+[Controlled folder access](controlled-folders.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps. Controlled folder access is supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients.
It is especially useful in helping protect against [ransomware](https://www.microsoft.com/wdsi/threats/ransomware) that attempts to encrypt your files and hold them hostage.
security Evaluate Exploit Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluate-exploit-protection.md
ms.localizationpriority: medium
audience: ITPro Previously updated : 01/06/2021 ms.technology: mde -+ Last updated : # Evaluate exploit protection
security Evaluate Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluate-network-protection.md
ms.technology: mde-+ Last updated : # Evaluate network protection
security Exploit Protection Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/exploit-protection-reference.md
ms.localizationpriority: medium
audience: ITPro Previously updated : 10/19/2021 ms.technology: mde -+ Last updated : 10/19/2021 # Exploit Protection Reference
This mitigation specifically blocks any binary that is not signed by Microsoft.
### Description
-Control flow guard (CFG) mitigates the risk of attackers using memory corruption vulnerabilities by protecting indirect function calls. For example, an attacker may user a buffer overflow vulnerability to overwrite memory containing a function pointer, and replace that function pointer with a pointer to executable code of their choice (which may also have been injected into the program).
+Control flow guard (CFG) mitigates the risk of attackers using memory corruption vulnerabilities by protecting indirect function calls. For example, an attacker may use a buffer overflow vulnerability to overwrite memory containing a function pointer, and replace that function pointer with a pointer to executable code of their choice (which may also have been injected into the program).
This mitigation is provided by injecting another check at compile time. Before each indirect function call, another instructions are added which verify that the target is a valid call target before it is called. If the target is not a valid call target, then the application is terminated. As such, only applications that are compiled with CFG support can benefit from this mitigation.
security Exploit Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/exploit-protection.md
ms.localizationpriority: high
audience: ITPro Previously updated : 10/19/2021 ms.technology: mde -+ Last updated : 10/19/2021 # Protect devices from exploits
security Import Export Exploit Protection Emet Xml https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/import-export-exploit-protection-emet-xml.md
ms.technology: mde-+ Last updated : # Import, export, and deploy exploit protection configurations
security Microsoft Defender Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint.md
Defender for Endpoint directly integrates with various Microsoft solutions, incl
- Microsoft Defender for Office - Skype for Business
-**[Microsoft 365 Defender](/microsoft-365/security/defender/microsoft-threat-protection)**
+**[Microsoft 365 Defender](https://docs.microsoft.com/microsoft-365/security/defender/microsoft-365-defende)**
With Microsoft 365 Defender, Defender for Endpoint and various Microsoft security solutions form a unified pre- and post-breach enterprise defense suite that natively integrates across endpoint, identity, email, and applications to detect, prevent, investigate, and automatically respond to sophisticated attacks.
security Migration Guides https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/migration-guides.md
Let us know what you think! Submit your feedback at the bottom of the page. We'l
- [Microsoft Defender for Endpoint](/windows/security/threat-protection) - [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/office-365-atp)-- [Microsoft 365 Defender](/microsoft-365/security/defender/microsoft-threat-protection?)
+- [Microsoft 365 Defender](/microsoft-365/security/defender/microsoft-365-defender)
security Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection.md
ms.technology: mde -+ Last updated : # Protect your network
security Overview Attack Surface Reduction https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction.md
ms.localizationpriority: medium audience: ITPro- ms.technology: mde Previously updated : 10/14/2021+ Last updated : 1/18/2022 # Understand and use attack surface reduction capabilities
security Respond Machine Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/respond-machine-alerts.md
As part of the investigation or response process, you can remotely initiate an a
>[!IMPORTANT] >- This action is not currently supported for macOS and Linux. Use live response to run the action. For more information on live response, see [Investigate entities on devices using live response](live-response.md)
->- A Microsoft Defender Antivirus (Microsoft Defender AV) scan can run alongside other antivirus solutions, whether Microsoft Defender AV is the active antivirus solution or not. Microsoft Defender AV can be in Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md).
+>- A Microsoft Defender Antivirus (Microsoft Defender AV) scan can run alongside other antivirus solutions, whether Microsoft Defender AV is the active antivirus solution or not. Microsoft Defender AV can be in Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](https://docs.microsoft.com/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-compatibility?view=o365-worldwide).
One you have selected **Run antivirus scan**, select the scan type that you'd like to run (quick or full) and add a comment before confirming the scan.
security Run Av Scan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-av-scan.md
Initiate Microsoft Defender Antivirus scan on a device.
> [!IMPORTANT] > > - This action is available for devices on Windows 10, version 1709 or later, and on Windows 11.
-> - A Microsoft Defender Antivirus (Microsoft Defender AV) scan can run alongside other antivirus solutions, whether Microsoft Defender Antivirus is the active antivirus solution or not. Microsoft Defender Antivirus can be in Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md).
+> - A Microsoft Defender Antivirus (Microsoft Defender AV) scan can run alongside other antivirus solutions, whether Microsoft Defender Antivirus is the active antivirus solution or not. Microsoft Defender Antivirus can be in Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](https://docs.microsoft.com/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-compatibility?view=o365-worldwide).
## Permissions
security Threat Protection Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/threat-protection-integration.md
With Microsoft 365 Defender, Microsoft Defender for Endpoint, and various Micros
## Related topics - [Configure integration and other advanced features](advanced-features.md)-- [Microsoft 365 Defender overview](/microsoft-365/security/defender/microsoft-threat-protection)-- [Turn on Microsoft 365 Defender](/microsoft-365/security/defender/mtp-enable)
+- [Microsoft 365 Defender overview](/microsoft-365/security/defender/microsoft-365-defender)
+- [Turn on Microsoft 365 Defender](/microsoft-365/security/defender/m365d-enable)
- [Protect users, data, and devices with Conditional Access](conditional-access.md)
security Whats New In Microsoft Defender Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
For more information on Microsoft Defender for Endpoint on other operating syste
- [What's new in Defender for Endpoint on iOS](ios-whatsnew.md) - [What's new in Defender for Endpoint on Linux](linux-whatsnew.md)
+## January 2022
+
+- Threat and vulnerability management for Android and iOS is now generally available. [Learn more](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-general-availability-of-vulnerability-management/ba-p/3071663).
+ ## December 2021 - Threat and vulnerability management can help identify Log4j vulnerabilities in applications and components. [Learn more](https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/#TVM).
For more information on Microsoft Defender for Endpoint on other operating syste
- [Microsoft Tunnel VPN integration](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-new-capabilities-on-android-and-ios/ba-p/2442730) <br> Microsoft Tunnel VPN capabilities is now integrated with Microsoft Defender for Endpoint app for Android. This unification enables organizations to offer a simplified end user experience with one security app ΓÇô offering both mobile threat defense and the ability to access on-prem resources from their mobile device, while security and IT teams are able to maintain the same admin experiences they are familiar with. -- [Jailbreak detection on iOS](/microsoft-365/security/defender-endpoint/ios-configure-features.md#conditional-access-with-defender-for-endpoint-on-ios) <br> Jailbreak detection capability in Microsoft Defender for Endpoint on iOS is now generally available. This adds to the phishing protection that already exists. For more information, see [Setup Conditional Access Policy based on device risk signals](/microsoft-365/security/defender-endpoint/ios-configure-features.md#conditional-access-with-defender-for-endpoint-on-ios).
+- [Jailbreak detection on iOS](https://docs.microsoft.com/microsoft-365/security/defender-endpoint/ios-configure-features?view=o365-worldwide#conditional-access-with-defender-for-endpoint-on-ios) <br> Jailbreak detection capability in Microsoft Defender for Endpoint on iOS is now generally available. This adds to the phishing protection that already exists. For more information, see [Setup Conditional Access Policy based on device risk signals](https://docs.microsoft.com/microsoft-365/security/defender-endpoint/ios-configure-features?view=o365-worldwide).
## March 2021
security Why Use Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/why-use-microsoft-defender-antivirus.md
Although you can use a non-Microsoft antivirus solution with Microsoft Defender
|8|Auditing events|Auditing event signals are available in [endpoint detection and response capabilities](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response). (These signals are not available with non-Microsoft antivirus solutions.)| |9|Geographic data|Compliant with ISO 270001 and data retention, geographic data is provided according to your organization's selected geographic sovereignty. See [Compliance offerings: ISO/IEC 27001:2013 Information Security Management Standards](/microsoft-365/compliance/offering-iso-27001).| |10|File recovery via OneDrive|If you are using Microsoft Defender Antivirus together with [Office 365](/Office365/Enterprise), and your device is attacked by ransomware, your files are protected and recoverable. [OneDrive Files Restore and Windows Defender take ransomware protection one step further](https://techcommunity.microsoft.com/t5/Microsoft-OneDrive-Blog/OneDrive-Files-Restore-and-Windows-Defender-takes-ransomware/ba-p/188001).|
-|11|Technical support|By using Microsoft Defender for Endpoint together with Microsoft Defender Antivirus, you have one company to call for technical support. [Troubleshoot service issues](/microsoft-365/security/defender-endpoint/troubleshoot-mde) and [review event logs and error codes with Microsoft Defender Antivirus](troubleshoot-microsoft-defender-antivirus.md).|
+|11|Technical support|By using Microsoft Defender for Endpoint together with Microsoft Defender Antivirus, you have one company to call for technical support. [Troubleshoot service issues](https://docs.microsoft.com/microsoft-365/security/defender-endpoint/troubleshoot-mdatp)and [review event logs and error codes with Microsoft Defender Antivirus](troubleshoot-microsoft-defender-antivirus.md).|
## Learn More
security Migrate To Defender For Office 365 Onboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-onboard.md
Congratulations! You have completed your [migration to Microsoft Defender for Of
Now you begin the normal operation and maintenance of Defender for Office 365. Monitor and watch for issues that are similar to what you experienced during the pilot, but on a larger scale. The [spoof intelligence insight](learn-about-spoof-intelligence.md) and the [impersonation insight](impersonation-insight.md) will be most helpful, but consider making the following activities a regular occurrence: -- Review user submissions, especially [user-reported phishing messages](/microsoft-365/security/office-365-security/automated-investigation-response-office.md#example-a-user-reported-phish-message-launches-an-investigation-playbook).
+- Review user submissions, especially [user-reported phishing messages](https://docs.microsoft.com/microsoft-365/security/office-365-security/automated-investigation-response-office)
- Review overrides in the [Threat protection status report](view-email-security-reports.md#threat-protection-status-report). - Use [Advanced Hunting](/microsoft-365/security/defender/advanced-hunting-example) queries to look for tuning opportunities and risky messages.
security Zero Hour Auto Purge https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-hour-auto-purge.md
ZAP will not quarantine any message that's in the process of [Dynamic Delivery](
## How to see if ZAP moved your message
-To determine if ZAP moved your message, you can use the [Mailflow view for the Mailflow status report](view-email-security-reports.md#mailflow-view-for-the-mailflow-status-report) or [Threat Explorer (and real-time detections)](threat-explorer.md). Note that as a system action, ZAP is not logged in the Exchange mailbox audit logs.
+To determine if ZAP moved your message, you have the following options:
+
+- **Number of messages**: Use the [Mailflow view in the Mailflow status report](view-email-security-reports.md#mailflow-view-for-the-mailflow-status-report) to see the number of ZAP-affected messages for the specified date range.
+- **Message details**: Use [Threat Explorer (and real-time detections)](threat-explorer.md) to filter **All email** events by the value **ZAP** for the **Additional action** column.
+
+**Note**: ZAP is not logged in the Exchange mailbox audit logs as as system action.
## Zero-hour auto purge (ZAP) FAQ
solutions Energy Secure Collaboration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/energy-secure-collaboration.md
# Key Compliance and Security Considerations for the Energy Industry ![Illustration metaphor for a global view of various industries using the cloud.](../media/solution-arch-center/MSC17_global_016.png) ## Introduction
-The energy industry provides society with fuel and critical infrastructure that people rely on every day. In order to ensure the reliability of infrastructure related to bulk power systems, regulatory authorities impose strict standards on energy industry organizations. These regulatory standards relate not only to the generation and transmission of power, but also to the data and communications that are critical to the day to day operations of energy companies.
+The energy industry provides society with fuel and critical infrastructure that people rely on every day. In order to ensure the reliability of infrastructure related to bulk power systems, regulatory authorities impose strict standards on energy industry organizations. These regulatory standards relate not only to the generation and transmission of power, but also to the data and communications that are critical to the day-to-day operations of energy companies.
-Organizations in the energy industry work with and exchange numerous types of information as part of their regular operations, including customer data, capital engineering design documentation, resource location maps, project management artifacts, performance metrics, field service reports, environmental data, and performance metrics. As these organizations look to transform their operations and collaboration systems into modern digital platforms, they are looking to Microsoft as a trusted Cloud Service Provider (CSP) and Microsoft 365 as their best-of-breed collaboration platform. Since Microsoft 365 is intrinsically built on the Microsoft Azure platform, organizations should examine both platforms as they consider their compliance and security controls when moving to the Cloud.
+Organizations in the energy industry work with and exchange many types of information as part of their regular operations. This includes customer data, capital engineering design documentation, resource location maps, project management artifacts, performance metrics, field service reports, environmental data, and performance metrics. As these organizations look to transform their operations and collaboration systems into modern digital platforms, they are looking to Microsoft as a trusted Cloud Service Provider (CSP) and Microsoft 365 as their best-of-breed collaboration platform. Since Microsoft 365 is built on the Microsoft Azure platform, organizations should examine both platforms as they consider their compliance and security controls when moving to the Cloud.
-In North America, the North America Electric Reliability Corporation (NERC) enforces reliability standards that are referred to as NERC [Critical Infrastructure Protection (CIP) standards](https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx). NERC is subject to oversight by the U.S. Federal Energy Regulatory Commission (FERC) and governmental authorities in Canada. All bulk power system owners, operators, and users must register with NERC and must comply with NERC CIP standards. Cloud Service Providers and third-party vendors such as Microsoft are not subject to NERC CIP standards; however, the CIP standards include objectives that should be considered when Registered Entities use vendors in the operation of the Bulk Electric System (BES). Microsoft customers operating Bulk Electric Systems are wholly responsible for ensuring their own compliance with NERC CIP standards.
+In North America, the North America Electric Reliability Corporation (NERC) enforces reliability standards that are referred to as NERC [Critical Infrastructure Protection (CIP) standards](https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx). NERC is subject to oversight by the U.S. Federal Energy Regulatory Commission (FERC) and governmental authorities in Canada. All bulk power system owners, operators, and users must register with NERC and must comply with NERC CIP standards. Cloud Service Providers and third-party vendors such as Microsoft are not subject to NERC CIP standards. However, the CIP standards include objectives that should be considered when Registered Entities use vendors in the operation of the Bulk Electric System (BES). Microsoft customers operating Bulk Electric Systems are wholly responsible for ensuring their own compliance with NERC CIP standards.
For information about Microsoft cloud services and NERC, see the following resources: - [NERC CIP Standards and Cloud Computing](https://aka.ms/AzureNERC)
For information about Microsoft cloud services and FedRAMP, see the following re
- [Office 365 FedRAMP reports](https://servicetrust.microsoft.com/ViewPage/MSComplianceGuideV3?docTab=7027ead0-3d6b-11e9-b9e1-290b1eb4cdeb_FedRAMP_Reports)
-These achievements are significant for the energy industry because a comparison between the FedRAMP Moderate control set and NERC CIP requirements shows that FedRAMP Moderate controls encompass all the NERC CIP requirements. For additional information, Microsoft has developed a [Cloud Implementation Guide for NERC Audits](https://servicetrust.microsoft.com/ViewPage/TrustDocuments?command=Download&downloadType=Document&downloadId=68df41b2-873d-4e4b-a7c8-8a0d4fdefb88&docTab=6d000410-c9e9-11e7-9a91-892aae8839ad_Compliance_Guides) that includes a control mapping between the current set of NERC CIP standards and FedRAMP Moderate control set as documented in NIST 800-53 Rev 4.
+These achievements are significant for the energy industry because a comparison between the FedRAMP Moderate control set and NERC CIP requirements shows that FedRAMP Moderate controls encompass all the NERC CIP requirements. For additional information, Microsoft developed a [Cloud Implementation Guide for NERC Audits](https://servicetrust.microsoft.com/ViewPage/TrustDocuments?command=Download&downloadType=Document&downloadId=68df41b2-873d-4e4b-a7c8-8a0d4fdefb88&docTab=6d000410-c9e9-11e7-9a91-892aae8839ad_Compliance_Guides) that includes a control mapping between the current set of NERC CIP standards and FedRAMP Moderate control set as documented in NIST 800-53 Rev 4.
As the energy industry looks to modernize their collaboration platforms, careful consideration is required for the configuration and deployment of collaboration tools and security controls, including: - Assessment of common collaboration scenarios
As the energy industry looks to modernize their collaboration platforms, careful
- Regulatory compliance requirements - Associated risks to data, customers and the organization
-Microsoft 365 is a modern workplace cloud environment that can provide secure and flexible collaboration across the enterprise, as well as controls and policy enforcement to adhere to the most stringent regulatory compliance frameworks. Through the following topics, this paper will explore how the Microsoft 365 platform helps the energy industry move to a modern collaboration platform, while helping keep data and systems both secure and compliant with regulations:
+Microsoft 365 is a modern workplace cloud environment. It provides secure and flexible collaboration across the enterprise, including controls and policy enforcement to adhere to the most stringent regulatory compliance frameworks. Through the following topics, this paper explores how Microsoft 365 helps the energy industry move to a modern collaboration platform while helping to keep data and systems both secure and compliant with regulations:
- Provide a Comprehensive Collaboration Platform with Microsoft Teams - Provide Secure and Compliant Collaboration in the Energy Industry - Identify Sensitive Data and Prevent Data Loss
Microsoft 365 is a modern workplace cloud environment that can provide secure an
As a Microsoft partner, Protiviti contributed to and provided material feedback to this article. ## Provide a Comprehensive Collaboration Platform with Microsoft Teams
-Collaboration typically requires multiple forms of communication, the ability to store and access documents, and the ability to integrate other applications as needed. Whether they are global enterprises or local companies, employees in the energy sector typically need to collaborate and communicate with members of other departments or across teams. They also often need to communicate with external partners, vendors, or clients. As a result, utilizing systems that create silos or make it difficult to share information is typically not recommended. That said, we still want to ensure that employees are sharing information securely and according to policy.
+Collaboration typically requires multiple forms of communication, the ability to store and access documents, and the ability to integrate other applications as needed. Whether they are global enterprises or local companies, employees in the energy sector typically need to collaborate and communicate with members of other departments or across teams. They also often need to communicate with external partners, vendors, or clients. As a result, using systems that create silos or make it difficult to share information is typically not recommended. That said, we still want to ensure that employees are sharing information securely and according to policy.
-Providing employees with a modern, cloud-based collaboration platform, which allows them to choose and easily integrate the tools that make them most productive, empowers them to find the best ways to work and collaborate. Using Microsoft Teams, in conjunction with security controls and governance policies to protect the organization, can help your workforce to easily collaborate in the cloud.
+Providing employees with a modern and cloud-based collaboration platform, that allows them to choose and easily integrate the tools that make them most productive, empowers them to find the best ways to work and collaborate. Using Microsoft Teams, together with security controls and governance policies to protect the organization, can help your workforce to easily collaborate in the cloud.
-Microsoft Teams provides a collaboration hub for your organization, which quickly brings people together to work effectively and collaborate with other team members on common initiatives or projects. It allows team members to conduct conversations, collaborate, and co-author documents. It enables people to store and share files with team members or those outside the team. It also allows them to hold live meetings with integrated enterprise voice and video. Microsoft Teams can be customized with easy access to Microsoft apps such as Planner, Dynamics 365, Power BI, and other third-party line-of-business applications. Teams simplifies access to Office 365 services and third-party apps to centralize collaboration and communication needs for the organization.
+Microsoft Teams provides a collaboration hub for your organization to bring people together to work and collaborate together on common initiatives or projects. It allows team members to conduct conversations, collaborate, and co-author documents. It enables people to store and share files with team members or those outside the team. It also allows them to hold live meetings with integrated enterprise voice and video. Microsoft Teams can be customized with easy access to Microsoft apps such as Planner, Dynamics 365, Power BI, and other third-party line-of-business applications. Teams simplifies access to Office 365 services and third-party apps to centralize collaboration and communication needs for the organization.
-Every Microsoft Team is backed by an Office 365 Group. An Office 365 Group is considered the membership provider for numerous Office 365 services, including Microsoft Teams. As such, Office 365 Groups are used to securely control which users are considered members and which are owners of the group, thereby restricting the members and owners of the Team. This allows us to easily control which users have access to varying capabilities within Teams. As a result, Team members and owners may only access the capabilities that they are permitted to utilize.
+Every Microsoft Team is backed by an Office 365 Group. An Office 365 Group is considered the membership provider for Office 365 services, including Microsoft Teams. Office 365 Groups are used to securely control which users are considered members and which are owners of the group. This allows us to easily control which users have access to varying capabilities within Teams. As a result, Team members and owners may only access the capabilities that they are permitted to utilize.
-A common scenario where Microsoft Teams can benefit energy organizations is collaborating with contractors or external firms as part of a field service programs such as vegetation management. Contractors are typically engaged to manage vegetation or remove trees around power system installations, and they often need to receive work instructions, communicate with dispatchers and other field service personnel, take and share pictures of external surroundings, sign off when work is complete and share data back with head office. Traditionally, these programs have been run using phone, text, paper work orders, or custom applications. This can present numerous challenges including:
+A common scenario where Microsoft Teams can benefit energy organizations is collaborating with contractors or external firms as part of a field service program, such as vegetation management. Contractors are typically engaged to manage vegetation or remove trees around power system installations. They often need to receive work instructions, communicate with dispatchers and other field service personnel, take and share pictures of external surroundings, sign off when work is complete, and share data back with head office. Traditionally, these programs have been run using phone, text, paper work orders, or custom applications. This can present many challenges including:
- Processes are manual or analog, making metrics difficult to track - Communications are not all captured in one place - Data is siloed and not necessarily shared with all employees that need it - Work may not be performed consistently or efficiently - Custom applications are not integrated with collaboration tools, making it difficult to extract and share data or measure performance
-Microsoft Teams can provide an easy-to-use collaboration space to securely share information and conduct conversations between team members and external field service contractors. Teams can be used to conduct meetings, place voice calls, centrally store and share work orders, collect field data, upload photos, integrate with business process solutions (built with Power Apps and Power Automate), and integrate line of business apps. This type of field service data may be considered low impact; however, efficiencies can be gained by centralizing communications and access data between employees and field service personnel in these scenarios.
+Microsoft Teams can provide an easy-to-use collaboration space to securely share information and conduct conversations between team members and external field service contractors. Teams can be used to conduct meetings, place voice calls, centrally store and share work orders, collect field data, upload photos, integrate with business process solutions (built with Power Apps and Power Automate), and integrate line-of-business apps. This type of field service data may be considered low impact; however, efficiencies can be gained by centralizing communications and access data between employees and field service personnel in these scenarios.
-Another example where Microsoft Teams can benefit the energy industry is when field service personnel are working to restore service during an outage. Field staff often require fast access to schematic data for substations, generating stations, or blue prints for assets in the field. This data is considered high impact and must be protected according to NERC CIP regulations. Field service work during outages requires communication between field staff and office employees, and in turn with end customers. Centralizing communications and data sharing in Microsoft Teams provides field staff with an easy method to both access critical data and communicate information or status back to head office.
+Another example where Microsoft Teams can benefit the energy industry is when field service personnel are working to restore service during an outage. Field staff often requires fast access to schematic data for substations, generating stations, or blue prints for assets in the field. This data is considered high impact and must be protected according to NERC CIP regulations. Field service work during outages requires communication between field staff and office employees, and in turn with end customers. Centralizing communications and data sharing in Microsoft Teams provides field staff with an easy method to both access critical data and communicate information or status back to head office.
For example, Microsoft Teams enables field staff to join conference calls while on route to an outage. Field staff can also take photos or video of their environment and share those with head office, which is particularly important when field equipment does not match schematics. Data and status collected from the field can then be surfaced to office employees and leadership through data visualization tools such as Power BI. Ultimately, Microsoft Teams can make field staff more efficient and productive in these critical situations. ### Teams: Improve collaboration and reduce compliance risk Microsoft 365 provides common policy capabilities for Microsoft Teams through its use of Office 365 Groups as an underlying membership provider. These policies can help improve collaboration and help meet compliance needs.
-**Office 365 Group Naming Policies** help to ensure that Office 365 Groups, and therefore Microsoft Teams, are named according to corporate policy. The name of a Team can present challenges if not named appropriately ΓÇô for example, employees may not know which teams to work or share information within if they are incorrectly named. Group naming policies can enforce good hygiene and may also prevent use of specific words, such as reserved words or inappropriate terminology.
+**Office 365 Group Naming Policies** help ensure that Office 365 Groups, and therefore Microsoft Teams, are named according to corporate policy. The name of a Team can present challenges if not named appropriately. For example, employees might not know which teams to work or share information within if they are incorrectly named. Group naming policies help enforce good hygiene and may also prevent use of specific words, such as reserved words or inappropriate terminology.
**Office 365 Group Expiration Policies** help to ensure that Office 365 Groups, and therefore Microsoft Teams, are not retained for longer periods of time than required by the organization. This capability helps to prevent two key information management issues: - The proliferation of Microsoft Teams that are not necessary or used - The over-retention of data that is no longer required by the organization
-Administrators may specify an expiration period in days for Office 365 Groups, such as 90, 180 or 365 days. If a service which is backed by an Office 365 group is inactive for the expiration period, group owners are notified and if no action is taken then the Office 365 Group and all its related services including Microsoft Teams will be deleted.
+Administrators can specify an expiration period in days for Office 365 Groups (such as 90, 180 or 365 days). If a service backed by an Office 365 group is inactive for the expiration period, group owners are notified. If no action is taken, then the Office 365 Group and all its related services including Microsoft Teams are deleted.
-The over-retention of data in a Microsoft Team can pose litigation risks to organizations, and the use of expiration policies is a recommended method for protecting the organization. Combined with built-in retention labels and policies, Microsoft 365 helps ensure that organizations are only retaining the data required to meet regulatory compliance obligations.
+The over-retention of data in a Microsoft Team can pose litigation risks to organizations. The use of expiration policies is a recommended method for protecting the organization. Combined with built-in retention labels and policies, Microsoft 365 helps ensure that organizations are only retaining the data required to meet regulatory compliance obligations.
### Teams: Integrate custom requirements with ease
-Microsoft Teams enables self-service creation of Teams by default. However, many regulated organizations wish to control and understand which collaboration spaces are currently in use by employees, which spaces contain sensitive data, and who the owners are of spaces throughout their organization. To facilitate these controls, Microsoft 365 allows organizations to disable self-service Teams creation and, using built-in Microsoft 365 business process automation tools such as Power Apps and Power Automate, allows organizations to build simple processes to request a new Team. Completing an easy to use form, an approval can be automatically requested by a manager. Once approved, the Team can be automatically provisioned and the requestor is sent a link to their new Team. By building such processes, organizations may also integrate custom requirements to facilitate other business processes.
+Microsoft Teams enables self-service creation of Teams by default. However, many regulated organizations want to control and understand which collaboration spaces are currently in use by employees, which spaces contain sensitive data, and who the owners are of spaces throughout their organization. To facilitate these controls, Microsoft 365 allows organizations to disable self-service Teams creation. Also, using built-in Microsoft 365 business process automation tools, such as Power Apps and Power Automate, allows organizations to build simple processes to request a new Team. Completing an easy to use form, an approval can be automatically requested by a manager. Once approved, the Team can be automatically provisioned and the requestor is sent a link to their new Team. By building such processes, organizations can also integrate custom requirements to facilitate other business processes.
## Provide Secure and Compliant Collaboration in the Energy Industry
-As mentioned, Microsoft Office 365 and Office 365 U.S. Government have each achieved FedRAMP ATO at the Moderate Impact Level, and Azure and Azure Government have achieved a FedRAMP High P-ATO which represents the highest level of FedRAMP authorization. Additionally, the FedRAMP moderate control set encompasses all of the NERC CIP requirements, thereby allowing energy industry organizations ("registered entities") to leverage existing FedRAMP authorizations as a scalable and efficient approach to addressing NERC audit requirements. However, its important to note that FedRAMP is not a point-in-time certification but an assessment and authorization program that includes provisions for [continuous monitoring](https://www.fedramp.gov/assets/resources/documents/CSP_Continuous_Monitoring_Strategy_Guide.pdf). Although this provision applies primarily to the CSP, Microsoft customers operating Bulk Electric Systems are responsible for ensuring their own compliance with NERC CIP standards and it is generally a recommended practice to continuously monitor the organization's compliance posture to help ensure ongoing compliance with regulations.
+As mentioned, Microsoft Office 365 and Office 365 U.S. Government have each achieved FedRAMP ATO at the Moderate Impact Level. Azure and Azure Government have achieved a FedRAMP High P-ATO which represents the highest level of FedRAMP authorization. Additionally, the FedRAMP moderate control set encompasses all of the NERC CIP requirements, thereby allowing energy industry organizations ("registered entities") to leverage existing FedRAMP authorizations as a scalable and efficient approach to addressing NERC audit requirements. However, it's important to note that FedRAMP is not a point-in-time certification but an assessment and authorization program that includes provisions for [continuous monitoring](https://www.fedramp.gov/assets/resources/documents/CSP_Continuous_Monitoring_Strategy_Guide.pdf). Although this provision applies primarily to the CSP, Microsoft customers operating Bulk Electric Systems are responsible for ensuring their own compliance with NERC CIP standards. It is generally a recommended practice to continuously monitor the organization's compliance posture to help ensure ongoing compliance with regulations.
Microsoft provides a key tool to assist with monitoring compliance with regulations over time: -- **Microsoft Compliance Manager** helps the organization understand its current compliance posture and the actions which it can take to help improve that posture. Compliance Manager calculates a risk-based score measuring progress in completing actions that help reduce risks around data protection and regulatory standards. Compliance Manager provides an initial score based on the Microsoft 365 data protection baseline. This baseline is a set of controls that includes common industry regulations and standards. While this score is a good starting point, Compliance Manager becomes more powerful once an organization adds assessments that are more relevant to their industry. Compliance Manager supports a number of regulatory standards that are relevant for NERC CIP compliance obligations, including the [FedRAMP Moderate Control Set](https://www.fedramp.gov/documents/), [NIST 800-53 Rev. 4](https://go.microsoft.com/fwlink/?linkid=2109075), and [AICPA SOC 2](https://go.microsoft.com/fwlink/?linkid=2115184). Energy industry organizations may also create or import custom control sets if needed.
+- **Microsoft Compliance Manager** helps the organization understand its current compliance posture and the actions it can take to help improve that posture. Compliance Manager calculates a risk-based score measuring progress in completing actions that help reduce risks around data protection and regulatory standards. Compliance Manager provides an initial score based on the Microsoft 365 data protection baseline. This baseline is a set of controls that include common industry regulations and standards. While this score is a good starting point, Compliance Manager becomes more powerful once an organization adds assessments that are more relevant to their industry. Compliance Manager supports a number of regulatory standards that are relevant for NERC CIP compliance obligations, including the [FedRAMP Moderate Control Set](https://www.fedramp.gov/documents/), [NIST 800-53 Rev. 4](https://go.microsoft.com/fwlink/?linkid=2109075), and [AICPA SOC 2](https://go.microsoft.com/fwlink/?linkid=2115184). Energy industry organizations may also create or import custom control sets if needed.
-The workflow-based capabilities built into Compliance Manager allow energy organizations to transform and digitize their regulatory compliance processes. Traditionally, challenges faced by compliance teams in the energy industry include:
+The workflow capabilities built into Compliance Manager allow energy organizations to transform and digitize their regulatory compliance processes. Traditionally, compliance teams in the energy industry face the following challenges:
- Inconsistent reporting or tracking of progress on remediation actions - Inefficient or ineffective processes - Insufficient resources or lack of ownership - Lack of real-time information and human error
-By automating aspects of regulatory compliance processes through the use of Compliance Manager, organizations can reduce the administrative burden on legal and compliance functions. This tooling can help address these challenges by providing more up to date information on remediation actions, more consistent reporting, and documented ownership of actions which is linked to the implementation of actions. Organizations can automatically track remediation actions over time and see overall efficiency gains. This can in turn enable staff to focus more effort on gaining insights and developing strategies to help navigate risk more effectively.
+By automating aspects of regulatory compliance processes through the use of Compliance Manager, organizations can reduce the administrative burden on legal and compliance functions. This tooling can help address these challenges by providing more up-to-date information on remediation actions, more consistent reporting, and documented ownership of actions (linked to the implementation of actions). Organizations can automatically track remediation actions over time and see overall efficiency gains. This enables staff to focus more effort on gaining insights and developing strategies to help navigate risk more effectively.
-Compliance Manager does not express an absolute measure of organizational compliance with any particular standard or regulation. It expresses the extent to which you have adopted controls which can reduce the risks to personal data and individual privacy. Recommendations from Compliance Manager should not be interpreted as a guarantee of compliance. The customer actions provided in Compliance Manager are recommendations; it is up to each organization to evaluate the effectiveness of these recommendations in their respective regulatory environment prior to implementation. Recommendations found in Compliance Manager should not be interpreted as a guarantee of compliance.
+Compliance Manager does not express an absolute measure of organizational compliance with any particular standard or regulation. It expresses the extent to which you have adopted controls which can reduce the risks to personal data and individual privacy. Recommendations from Compliance Manager should not be interpreted as a guarantee of compliance. The customer actions provided in Compliance Manager are recommendations. It is up to each organization to evaluate the effectiveness of these recommendations to meet their regulatory obligations prior to implementation. Recommendations found in Compliance Manager should not be interpreted as a guarantee of compliance.
-Many cyber security related controls are included in the [FedRAMP Moderate Control Set](https://www.fedramp.gov/documents/) and [NERC CIP standards](https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx). However, key controls related to the Microsoft 365 platform include security management controls (CIP-003-6), account and access management/access revocation (CIP-004-6), electronic security perimeter (CIP-005-5), security event monitoring, and incident response (CIP-008-5). The following foundational Microsoft 365 capabilities help to address the risks and requirements included in these topics.
+Many cyber security-related controls are included in the [FedRAMP Moderate Control Set](https://www.fedramp.gov/documents/) and [NERC CIP standards](https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx). However, key controls related to the Microsoft 365 platform include security management controls (CIP-003-6), account and access management/access revocation (CIP-004-6), electronic security perimeter (CIP-005-5), security event monitoring, and incident response (CIP-008-5). The following foundational Microsoft 365 capabilities help to address the risks and requirements included in these topics.
### Secure User Identities and Control Access
-Protecting access to documents and applications begins with strongly securing user identities. As a foundation, this requires providing a secure platform for the enterprise to store and manage identities and providing a trusted means of authentication. It also requires dynamically controlling access to these applications. As employees work, they may move from application to application or across multiple locations and devices. As a result, access to data must be authenticated at each step of the way. In addition, the authentication process must support a strong protocol and multiple factors of authentication (one-time SMS pass code, authenticator app, certificate, etc.) so that we can ensure that identities have not been compromised. Finally, enforcing risk-based access policies are a key recommendation to protecting data and applications from insider threats, inadvertent data leaks and data exfiltration.
+Protecting access to documents and applications begins with strongly securing user identities. As a foundation, this requires providing a secure platform for the enterprise to store and manage identities and providing a trusted means of authentication. It also requires dynamically controlling access to these applications. As employees work, they may move from application to application or across multiple locations and devices. As a result, access to data must be authenticated at each step of the way. In addition, the authentication process must support a strong protocol and multiple factors of authentication (one-time SMS pass code, authenticator app, certificate, etc.) to ensure that identities have not been compromised. Finally, enforcing risk-based access policies are a key recommendation to protecting data and applications from insider threats, inadvertent data leaks, and data exfiltration.
Microsoft 365 provides a secure identify platform with **Azure Active Directory (Azure AD)** where identities are centrally stored and securely managed. Azure Active Directory, along with a host of related Microsoft 365 security services, forms the basis for providing employees with the access they need to work securely while also protecting the organization from threats. **Azure AD Multi-Factor Authentication (MFA)** is built into the platform and provides an additional layer of protection to help ensure users are who they say they are when accessing sensitive data and applications. Azure MFA requires at least two forms of authentication, such as a password and a known mobile device. It supports several second factor authentication options, including: the Microsoft Authenticator app, a one-time passcode delivered via SMS, receiving a phone call where a user must enter a PIN, and smart cards or certificate-based authentication. In the event a password is compromised, a potential hacker still needs the user's phone to gain access to organizational data. In addition, Microsoft 365 uses Modern Authentication as a key protocol, bringing the same strong authentication experience from web browsers to collaboration tools, including Microsoft Outlook and Microsoft Office apps.
-**Azure AD Conditional Access** provides a robust solution for automating access control decisions and enforcing policies to protect company assets. A common example is when an employee wishes to access an application containing sensitive customer data, and they are automatically required to perform a multi-factor authentication to specifically access that application. Azure Conditional Access brings together signals from a user's access request, such as properties about the user, their device, location, network, and the app or repository they are trying to access. It can dynamically evaluate every attempt to access the application against configured policies. If user or device's risk is elevated, or if other conditions are not met, Azure AD can automatically enforce policy such as dynamically requiring MFA, restricting or even blocking access. This helps ensure that sensitive assets are protected in dynamically changing environments.
+**Azure AD Conditional Access** provides a robust solution for automating access control decisions and enforcing policies to protect company assets. A common example is when an employee tries to access an application containing sensitive customer data and they are automatically required to perform a multi-factor authentication. Azure Conditional Access brings together signals from a user's access request (such as properties about the user, their device, location, network, and the app or repository they are trying to access). It dynamically evaluates every attempt to access the application against policies you configure. If the user or device risk is elevated, or if other conditions are not met, Azure AD automatically enforces policy (such as dynamically requiring MFA, restricting, or even blocking access). This helps ensure that sensitive assets are protected in dynamically changing environments.
**Microsoft Defender for Office 365** provides an integrated service to protect organizations from malicious links and malware delivered through email. One of the most common attack vectors impacting users today is email phishing attacks. These attacks can be carefully targeted at specific high-profile employees and can be crafted to be very convincing. They typically contain some call to action requiring a user to click a malicious link or open an attachment with malware. Once infected, an attacker can steal a user's credentials and move laterally across the organization. They can also exfiltrate emails and data looking for sensitive information. Microsoft Defender for Office 365 evaluates links at click-time for potentially malicious sites and blocks them. Email attachments are opened in a protected sandbox prior to delivering them to a user's mailbox.
-**Microsoft Defender for Cloud Apps** provides organizations with the ability further enforce policies at a granular level and detect behavioral anomalies based on individual user profiles that are automatically defined using Machine Learning. Defender for Cloud Apps can build on Azure Conditional Access policies, to further protect sensitive assets by evaluating additional signals related to user behavior and properties of the documents being accessed. Over time, Defender for Cloud Apps will learn what is considered typical behavior for each employee, with regard to the data they access and the applications they use. Based on learned behavioral patterns, policies can automatically enforce security controls if an employee goes outside of that behavioral profile. For example, if an employee typically accesses an accounting app from 9am to 5pm, Monday to Friday, but that same user begins to access that application heavily on a Sunday evening, Defender for Cloud Apps can dynamically enforce policies to require the user to re-authenticate. This helps ensure that credentials have not been compromised. In addition, Defender for Cloud Apps can help discover and identify Shadow IT in the organization, helping InfoSec teams ensure that employees are using sanctioned tools when working with sensitive data. Finally, Defender for Cloud Apps can protect sensitive data anywhere in the Cloud, even outside of the Microsoft 365 platform. It allows organizations to sanction (or un-sanction) specific external Cloud apps, controlling access and monitoring when users work in those applications.
+**Microsoft Defender for Cloud Apps** provides organizations with the ability enforce policies at a granular level. This includes detecting behavioral anomalies based on individual user profiles that are automatically defined using Machine Learning. Defender for Cloud Apps builds on Azure Conditional Access policies by evaluating additional signals related to user behavior and properties of the documents being accessed. Over time, Defender for Cloud Apps learns the typical behavior for each employee (the data they access and the applications they use). Based on learned behavioral patterns, policies can automatically enforce security controls if an employee goes outside of that behavioral profile. For example, if an employee typically accesses an accounting app from 9:00 a.m. to 5:00 p.m., Monday to Friday, but that same user begins to access that application heavily on a Sunday evening, Defender for Cloud Apps can dynamically enforce policies to require the user to re-authenticate. This helps ensure that credentials have not been compromised. In addition, Defender for Cloud Apps can help discover and identify Shadow IT in the organization. This helps InfoSec teams ensure that employees use sanctioned tools when working with sensitive data. Finally, Defender for Cloud Apps can protect sensitive data anywhere in the Cloud, even outside of the Microsoft 365 platform. It allows organizations to sanction (or un-sanction) specific external Cloud apps, controlling access and monitoring when users work in those applications.
-**Azure Active Directory**, and the related Microsoft 365 security services, provide the foundation upon which a modern cloud collaboration platform can be rolled out to energy industry organizations so that access to data and applications can be strongly secured and regulatory compliance obligations can be met. To summarize, these tools provide the following key capabilities:
+**Azure Active Directory**, and the related Microsoft 365 security services, provide the foundation upon which a modern cloud collaboration platform can be rolled out to energy industry organizations. Azure Active Directory includes controls to protect access to data and applications. In addition to providing strong security, these controls help organizations meet regulatory compliance obligations.
+
+Azure Active Directory and Microsoft 365 services and are deeply integrated and provides the following important capabilities:
- Centrally store and securely manage user identities-- Use a strong authentication protocol including multi-factor authentication to authenticate users on access requests and provide a consistent and robust authentication experience across any application-- Dynamically validate policies on all access requests, incorporating multiple signals into the policy decision making process, including identity, user/group membership, application, device, network, location, and real-time risk score
+- Use a strong authentication protocol, including multi-factor authentication, to authenticate users on access requests
+- Provide a consistent and robust authentication experience across any application
+- Dynamically validate policies on all access requests, incorporating multiple signals into the policy decision-making process (including identity, user/group membership, application, device, network, location, and real-time risk score)
- Validate granular policies based on user behavior and file properties and dynamically enforce additional security measures when required - Identify shadow IT in the organization and allow InfoSec teams to sanction or block cloud applications - Monitor and control access to Microsoft and non-Microsoft cloud applications - Proactively protect against email phishing and ransomware attacks ## Identify Sensitive Data and Prevent Data Loss
-The FedRAMP Moderate Control Set and NERC CIP standards also include information protection as a key control requirement (CIP-011-2). These requirements specifically address the need to identify information related to BES (Bulk Electric System) Cyber System Information, the protection and secure handling of that information, including storage, transit, and use. Specific examples of BES Cyber System Information may include security procedures or security information about systems that are fundamental to operating the bulk electric system (BES Cyber Systems, Physical Access Control Systems, and Electronic Access Control or monitoring systems) that is not publicly available and could be used to allow unauthorized access or unauthorized distribution. However, the same need exists to identify and protect customer information that is critical to the day to day operations of energy organizations.
+The FedRAMP Moderate Control Set and NERC CIP standards also include information protection as a key control requirement (CIP-011-2). These requirements specifically address the need to identify information related to BES (Bulk Electric System) Cyber System Information and the protection and secure handling of that information (including storage, transit, and use). Specific examples of BES Cyber System Information can include security procedures or security information about systems that are fundamental to operating the bulk electric system (BES Cyber Systems, Physical Access Control Systems, and Electronic Access Control or monitoring systems) that is not publicly available and could be used to allow unauthorized access or unauthorized distribution. However, the same need exists to identify and protect customer information that is critical to the day-to-day operations of energy organizations.
Microsoft 365 allows sensitive data to be identified and protected within the organization through a combination of powerful capabilities, including:
Microsoft 365 allows sensitive data to be identified and protected within the or
- **Office 365 Data Loss Prevention (DLP)** for automated identification of sensitive data using sensitive data types (i.e. regular expressions) and keywords, and policy enforcement
-**Microsoft Information Protection (MIP)** allows employees to classify documents and emails with sensitivity labels. Sensitivity labels can be applied manually by users to documents within the Microsoft Office apps and to emails within Microsoft Outlook. Sensitivity labels can in turn automatically apply document markings, protection through encryption, and enforce rights management. They may also be applied automatically, by configuring policies which use keywords and sensitive data types (credit card numbers, social security numbers, identity numbers, etc.) to automatically find and classify sensitive data.
+**Microsoft Information Protection (MIP)** allows employees to classify documents and emails with sensitivity labels. Sensitivity labels can be applied manually by users to documents within the Microsoft Office apps and to emails within Microsoft Outlook. Sensitivity labels can automatically apply document markings, protection through encryption, and enforce rights management. Sensitivity labels can also be applied automatically by configuring policies which use keywords and sensitive data types (credit card numbers, social security numbers, identity numbers, etc.).
-In addition, Microsoft provides trainable classifiers which use machine learning models to identify sensitive data based on what the content is, as opposed to simply through pattern matching or by the elements within the content. A classifier learns how to identify a type of content by looking at numerous examples of the content to be classified. Training a classifier begins by providing it with examples of content within a particular category. Once it processes those examples, the model is tested by providing it with a mix of both matching and non-matching examples. The classifier then predicts whether a given example falls into the category or not. A person then confirms the results, sorting the positives, negatives, false positives, and false negatives to help increase the accuracy of the classifier's predictions. When the trained classifier is published, it processes content in SharePoint Online, Exchange Online, and OneDrive for Business, and automatically classifies the content.
+Microsoft also provides trainable classifiers. These use machine learning models to identify sensitive data based on what the content is, as opposed to simply through pattern matching or by the elements within the content. A classifier learns how to identify a type of content by looking at many examples of the content to be classified. Training a classifier begins by providing it with examples of content within a particular category. Once it processes the examples, the model is tested by providing it with a mix of both matching and non-matching examples. The classifier then predicts whether a given example falls into the category or not. A person then confirms the results, sorting the positives, negatives, false positives, and false negatives to help increase the accuracy of the classifier's predictions. When the trained classifier is published, it processes and automatically classifies content in SharePoint Online, Exchange Online, and OneDrive for Business.
-Applying sensitivity labels to documents and emails will embed metadata within the object which identifies the chosen sensitivity, thereby allowing the sensitivity to travel with the data. As a result, even if a labeled document is stored on a user's desktop or within an on-premise system, it is still protected. This in turn enables other Microsoft 365 solutions such as Microsoft Defender for Cloud Apps or network edge devices to identify sensitive data and automatically enforce security controls. Sensitivity labels have the added benefit of educating employees as to which data within an organization is considered sensitive, and how to handle that data should they receive it.
+Applying sensitivity labels to documents and emails embeds metadata within the object which identifies the chosen sensitivity, thereby allowing the sensitivity to travel with the data. As a result, even if a labeled document is stored on a user's desktop or within an on-premise system, it is still protected. This enables other Microsoft 365 solutions, such as Microsoft Defender for Cloud Apps or network edge devices, to identify sensitive data and automatically enforce security controls. Sensitivity labels have the added benefit of educating employees about which data within an organization is considered sensitive and how to handle that data.
-**Office 365 Data Loss Prevention (DLP)** will automatically identify documents, emails and conversations which contain sensitive data by scanning them for sensitive data types and then enforcing policy on those objects. Policies are enforced on documents within SharePoint and OneDrive for Business. They are also enforced when users send email, and in Microsoft Teams within chat and channel conversations. Policies may be configured to look for keywords, sensitive data types, retention labels and whether data is shared within the organization or externally. Controls are provided to help organizations fine-tune DLP policies to better avoid false positives. When sensitive data is found, customizable policy tips may be displayed to users within Microsoft 365 applications, informing them that their content contains sensitive data and/or proposing corrective actions. Policies can also prevent users from accessing documents, sharing documents, or sending emails which contain certain types of sensitive data. Microsoft 365 supports over 100 built-in sensitive data types, and organizations can configure custom sensitive data types to meet their policies.
+**Office 365 Data Loss Prevention (DLP)** automatically identifies documents, emails, and conversations that contain sensitive data. It does this by scanning these for sensitive data types and then enforcing policy on those objects. Policies are enforced on documents within SharePoint and OneDrive for Business. Policies are also enforced when users send email and in Microsoft Teams within chat and channel conversations. Policies may be configured to look for keywords, sensitive data types, retention labels, and whether data is shared within the organization or externally. Controls are provided to help organizations fine-tune DLP policies to better avoid false positives. When sensitive data is found, customizable policy tips can be displayed to users within Microsoft 365 applications. Policy tips inform users that their content contains sensitive data and can propose corrective actions. Policies can also prevent users from accessing documents, sharing documents, or sending emails that contain certain types of sensitive data. Microsoft 365 supports over 100 built-in sensitive data types. Organizations can configure custom sensitive data types to meet their policies.
-Rolling out MIP and DLP policies to organizations requires careful planning and typically a user education program so that employees understand the organization's data classification schema and which types of data are considered sensitive. Providing employees with tools and education programs that help them identify sensitive data and help them understand how to handle it makes them part of the solution for mitigating information security risks.
+Rolling out MIP and DLP policies to organizations requires careful planning. It also requires user education so employees understand the organization's data classification schema and which types of data are sensitive. Providing employees with tools and education programs that help them identify sensitive data and help them understand how to handle it makes them part of the solution for mitigating information security risks.
## Govern Data by Effectively Managing Records
-Regulations require many organizations to manage the retention of key organizational documents according to a managed corporate retention schedule. Organizations face regulatory compliance risks if data is under-retained (deleted too early), or legal risks if data is over-retained (kept too long). Effective records management strategies help to ensure that organizational documents are retained according to predetermined retention periods which are designed to minimize risk to the organization. Retention periods are prescribed in a centrally managed organizational record retention schedule, and they are based on the nature of each type of document, on regulatory compliance requirements for retaining specific types of data, and on the defined policies of the organization.
+Regulations require many organizations to manage the retention of key organizational documents according to a managed corporate retention schedule. Organizations face regulatory compliance risks if data is under-retained (deleted too early), or legal risks if data is over-retained (kept too long). Effective records management strategies help ensure that organization documents are retained according to predetermined retention periods which are designed to minimize risk to the organization. Retention periods are prescribed in a centrally managed organizational record retention schedule. Retention periods are based on the nature of each type of document, the regulatory compliance requirements for retaining specific types of data, and the defined policies of the organization.
-Assigning record retention periods accurately across organizational documents may require a granular process which assigns retention periods uniquely to individual documents. The vast number of documents within energy industry organizations, coupled with the fact that in many cases retention periods can be triggered by organizational events (such as contracts expiring or an employee leaving the organization), make applying record retention policies at scale challenging for many organizations.
+Assigning record retention periods accurately across organizational documents may require a granular process which assigns retention periods uniquely to individual documents. Applying record retention policies at scale can be challenging for many reasons. These reasons include the vast number of documents within energy industry organizations together with the fact that, in many cases, retention periods can be triggered by organizational events (such as contracts expiring or an employee leaving the organization).
Microsoft 365 provides capabilities for defining retention labels and policies to easily implement records management requirements. A record manager defines a retention label, which represents a "record type" in a traditional retention schedule. The retention label contains settings which define: - How long a record is retained for
Microsoft 365 provides capabilities for defining retention labels and policies t
- What triggers the retention period to start (created date, last modified date, labeled date, or an event), and - If the document or email is a record (meaning it cannot be edited or deleted)
-Retention labels are then published to SharePoint or OneDrive sites, Exchange mailboxes, and Office 365 Groups. Users may then apply retention labels manually to documents and emails, or record managers can use rules to automatically apply retention labels. Auto-apply rules can be based on keywords or sensitive data found within documents or emails, such as credit card numbers, social security numbers or other personally identifiable information (PII) or they can be based on SharePoint metadata.
+Retention labels are then published to SharePoint or OneDrive sites, Exchange mailboxes, and Office 365 Groups. Users may then apply retention labels manually to documents and emails. Or, record managers can use rules to automatically apply retention labels. Auto-apply rules can be based on keywords or sensitive data found within documents or emails, such as credit card numbers, social security numbers, or other personally identifiable information (PII). Auto-apply rules can also be based on SharePoint metadata.
-The FedRAMP Moderate Control Set and NERC CIP standards also include Asset Reuse and Disposal as a key control requirement (CIP-011-2). These requirements once again specifically address BES (Bulk Electric System) Cyber System Information. However, other jurisdictional regulations will require energy industry organizations to manage and dispose of records effectively for numerous types of information. This will include financial statements, capital project information, budgets, customer data, etc. In all cases, energy organizations will be required to maintain robust records management programs and evidence related to the defensible disposition of corporate records.
+The FedRAMP Moderate Control Set and NERC CIP standards also include Asset Reuse and Disposal as a key control requirement (CIP-011-2). These requirements once again specifically address BES (Bulk Electric System) Cyber System Information. However, other jurisdictional regulations will require energy industry organizations to manage and dispose of records effectively for many types of information. This information includes financial statements, capital project information, budgets, customer data, etc. In all cases, energy organizations are required to maintain robust records management programs and evidence related to the defensible disposition of corporate records.
-With each retention label, Office 365 allows record managers to determine if a disposition review is required. Then when those record types come up for disposition, after their retention period has expired, a review must be conducted by the designated disposition reviewers before content is deleted. Once the disposition review is approved, content deletion will proceed, however evidence of the deletion, the user that performed the deletion and date/time in which it occurred is still retained for multiple years (as a certificate of destruction). If organizations require longer or permanent retention of certificates of destruction, Microsoft Sentinel may be used for long term cloud-based storage of log and audit data. Microsoft Sentinel gives organizations full control over the long term storage and retention of activity data, log data and retention/disposition data.
+With each retention label, Office 365 allows record managers to determine if a disposition review is required. Then when those record types come up for disposition, after their retention period has expired, a review must be conducted by the designated disposition reviewers before content is deleted. Once the disposition review is approved, content deletion will proceed. However, evidence of the deletion (the user that performed the deletion and date/time in which it occurred) is still retained for multiple years as a certificate of destruction. If organizations require longer or permanent retention of certificates of destruction, Microsoft Sentinel may be used for long-term cloud-based storage of log and audit data. Microsoft Sentinel gives organizations full control over the long-term storage and retention of activity data, log data, and retention/disposition data.
## Comply with FERC and FTC Regulations for Energy Markets
-The U.S. Federal Energy Regulatory Commission (FERC) oversees [regulations related to energy markets and trading for the electric energy and natural gas markets](https://www.ferc.gov/CalendarFiles/20161117125529-WhitePaperCompliance.pdf). The U.S. Federal Trade Commission (FTC) oversees similar [regulations in the petroleum market](https://www.ftc.gov/sites/default/files/documents/rules/prohibition-energy-market-manipulation-rule/091113mmrguide.pdf). In both cases these regulatory bodies set out rules and guidance to prohibit energy market manipulation. FERC, for example, recommends that energy organizations invest in technology resources to monitor trading, trader communications, and compliance with internal controls. They further recommend that energy organizations evaluate, on a regular basis, the ongoing effectiveness of the organization's compliance program.
+The U.S. Federal Energy Regulatory Commission (FERC) oversees [regulations related to energy markets and trading for the electric energy and natural gas markets](https://www.ferc.gov). The U.S. Federal Trade Commission (FTC) oversees similar [regulations in the petroleum market](https://www.ftc.gov/sites/default/files/documents/rules/prohibition-energy-market-manipulation-rule/091113mmrguide.pdf). In both cases these regulatory bodies set out rules and guidance to prohibit the manipulation of energy markets. FERC, for example, recommends that energy organizations invest in technology resources to monitor trading, trader communications, and compliance with internal controls. Regulators also recommend that energy organizations evaluate, on a regular basis, the ongoing effectiveness of the organization's compliance program.
-Traditionally, communication monitoring solutions are costly, and they can be complex to configure and manage. Also, organizations can experience challenges with monitoring the numerous, varying communication channels available to employees. Microsoft 365 provides several built-in robust capabilities for monitoring employee communications, supervising employee activities, and helping to comply with FERC regulations for energy markets.
+Traditionally, communication monitoring solutions are costly and they can be complex to configure and manage. Also, organizations can experience challenges with monitoring the many, varying communication channels available to employees. Microsoft 365 provides several built-in robust capabilities for monitoring employee communications, supervising employee activities, and helping to comply with FERC regulations for energy markets.
### Implement Supervisory Control
-Microsoft 365 enables organizations to configure supervision policies which capture employee communications (based on configured conditions) and allow these to be reviewed by designated supervisors. Supervision policies can capture internal/external email and attachments, Microsoft Teams chat and channel communications, Skype for Business Online chat communications and attachments, along with communications through third-party services (such as Facebook or Dropbox).
+Microsoft 365 enables organizations to configure supervision policies which capture employee communications (based on configured conditions) and allow these to be reviewed by designated supervisors. Supervision policies can capture internal/external email and attachments, Microsoft Teams chat and channel communications, Skype for Business Online chat communications and attachments, and communications through third-party services (such as Facebook or Dropbox).
-The comprehensive nature of communications that may be captured and reviewed within an organization, and the extensive conditions with which policies may be configured, allow Microsoft 365 Supervision Policies to help organizations comply with FERC energy market regulations. Supervision policies may be configured to review communications for individuals or groups. In addition, supervisors may be configured to be individuals or groups. Comprehensive conditions may be configured to capture communications based on inbound or outbound messages, domains, retention labels, keywords or phrases, keyword dictionaries, sensitive data types, attachments, message size, or attachment size. Reviewers are provided with a dashboard where they can review flagged communications, act on communications that potentially violate policies, or mark flagged items as resolved. They may also review the results of previous reviews and items that were have been resolved.
+The comprehensive nature of communications that may be captured and reviewed within an organization and the extensive conditions with which policies may be configured allow Microsoft 365 Supervision Policies to help organizations comply with FERC energy market regulations. Supervision policies can be configured to review communications for individuals or groups. In addition, supervisors may be configured to be individuals or groups. Comprehensive conditions may be configured to capture communications based on inbound or outbound messages, domains, retention labels, keywords or phrases, keyword dictionaries, sensitive data types, attachments, message size, or attachment size. Reviewers are provided with a dashboard where they can review flagged communications, act on communications that potentially violate policies, or mark flagged items as resolved. They may also review the results of previous reviews and items that have been resolved.
-Microsoft 365 provides reports which allow supervision policy review activities to be audited based on the policy and the reviewer. The available reports may be used to validate that supervision policies are working as defined by the organizations written supervision policies. They may also be used to identify communications requiring review and which communications are not compliant with corporate policy. Finally, all activities related to configuring supervision policies and reviewing communications are audited in the Office 365 unified audit log.
+Microsoft 365 provides reports which allow supervision policy review activities to be audited based on the policy and the reviewer. The available reports can be used to validate that supervision policies are working as defined by the organizations written supervision policies. Reports can also be used to identify communications that require review, including communications that are not compliant with corporate policy. Finally, all activities related to configuring supervision policies and reviewing communications are audited in the Office 365 unified audit log.
Microsoft 365 Supervision Policies allow organizations to monitor communications for compliance with corporate policies, such as human resources harassment violations and offensive language in company communications. It also allows organizations to reduce risk, by monitoring communications when organizations are undergoing sensitive organizational changes, such as mergers and acquisitions, or leadership changes. ### Communication Compliance
-With many communication channels available to employees, organizations increasingly require effective solutions for monitoring or supervising communications in regulated industries such as energy trading markets. The recently launched Communication Compliance solution built into Microsoft 365 helps organizations overcome common challenges such as increasing numbers of communication channels and message volume, as well as the risk of potential fines for policy violations.
+With many communication channels available to employees, organizations increasingly require effective solutions for monitoring or supervising communications in regulated industries such as energy trading markets. The recently launched Communication Compliance solution built into Microsoft 365 helps organizations overcome common challenges. These challenges can include increasing numbers of communication channels and message volume and the risk of potential fines for policy violations.
Communication Compliance can monitor multiple communication channels and use machine learning models to identify potential policy violations, including Office 365 email, Microsoft Teams, Skype for Business Online, Facebook, Twitter and Bloomberg instant messages. Communication Compliance helps compliance teams effectively and efficiently review messages for potential violations of: - Corporate Policies, such as acceptable use, ethical standards, and corporate specific policies - sensitivity or sensitive business disclosures, such as unauthorized communications about sensitive projects like upcoming acquisitions, mergers, earnings disclosures, reorganizations, or leadership team changes - Regulatory compliance requirements, such as employee communications regarding the types of businesses or transactions in which an organization engages in compliance with FERC regulations for energy markets
-Communication Compliance provides built-in threat, harassment, and profanity classifiers to help reduce false positives when reviewing communications. This saves reviewers time during the investigation and remediation process. It helps reviewers focus on specific messages within long threads that have been highlighted by policy alerts. This helps compliance teams more quickly identify and remediate risks. It provides compliance teams with the ability to easily configure and fine-tune policies, adjusting the solution to the organization's specific needs and reducing false positives. Communication Compliance can also track user behavior over time, highlighting potential patterns in risky behavior or policy violations. Finally, it provides flexible built-in remediation workflows so that reviewers can quickly take action and escalate to legal or human resources teams according to defined corporate processes.
+Communication Compliance provides built-in threat, harassment, and profanity classifiers to help reduce false positives when reviewing communications. This saves reviewers time during the investigation and remediation process. It helps reviewers focus on specific messages within long threads that have been highlighted by policy alerts. This helps compliance teams more quickly identify and remediate risks. It provides compliance teams with the ability to easily configure and fine-tune policies, adjusting the solution to the organization's specific needs and reducing false positives. Communication Compliance can also track user behavior over time, highlighting potential patterns in risky behavior or policy violations. Finally, it provides flexible built-in remediation workflows. These workflows help reviewers quickly take action to escalate to legal or human resources teams according to defined corporate processes.
## Protect Against Data Exfiltration and Insider Risk
-A common threat to enterprises is data exfiltration, or the act of extracting data from an organization. This can be a significant concern for energy organizations due to the sensitive nature of the information that may be accessed by employees or field service staff day to day. This includes both BES (Bulk Electric System) Cyber System information as well as business related information and customer data. With the increasing methods of communications available and numerous tools for moving data, advanced tools are typically required to mitigate risks of data leaks, policy violations and insider risk.
+A common threat to enterprises is data exfiltration, or the act of extracting data from an organization. This can be a significant concern for energy organizations due to the sensitive nature of the information that may be accessed by employees or field service staff day-to-day. This data includes both BES (Bulk Electric System) Cyber System information as well as business-related information and customer data. With the increasing methods of communications available and many tools for moving data, advanced tools are typically required to mitigate risks of data leaks, policy violations, and insider risk.
### Insider Risk Management
-Enabling employees with online collaboration tools that may be accessed anywhere inherently brings risk to an organization. Employees may inadvertently or maliciously leak data to attackers or to competitors. Alternatively, they may exfiltrate data for personal use or take data with them to a future employer. These scenarios' present serious risks to organizations from a security and a compliance standpoint. Identifying these risks when they occur and quickly mitigating them requires both intelligent tools for data collection and collaboration across departments such as legal, human resources, and information security.
+Enabling employees with online collaboration tools that may be accessed anywhere inherently brings risk to an organization. Employees may inadvertently or maliciously leak data to attackers or to competitors. Alternatively, they may exfiltrate data for personal use or take data with them to a future employer. These scenarios present serious risks to organizations from a security and a compliance standpoint. Identifying these risks when they occur and quickly mitigating them requires both intelligent tools for data collection and collaboration across departments such as legal, human resources, and information security.
-Microsoft 365 has recently launched the Insider Risk Management console which uses signals across Microsoft 365 services and machine learning models to monitor user behavior for signs of insider risk. This tool presents data to investigators so that they can easily identify risky behavioral patterns and escalate cases based on pre-determined workflows.
+Microsoft 365 has recently launched the Insider Risk Management console which uses signals across Microsoft 365 services and machine learning models to monitor user behavior for signs of insider risk. This tool presents data to investigators so that they can easily identify risky behavior patterns and escalate cases based on pre-determined workflows.
-For example, Insider Risk Management can correlate signals from a user's Windows 10 desktop, such as copying files to a USB drive or emailing a personal email account, with activities from online services such as Office 365 email, SharePoint Online, Microsoft Teams, OneDrive for Business, etc. to identify data exfiltration patterns. It can also correlate these activities with employees leaving an organization which is a common behavioral pattern associated with data exfiltration. It can monitor multiple activities and behavior over time, and when common patterns emerge, it can raise alerts and help investigators focus on key activities to verify a policy violation with a high degree of confidence. Insider Risk Management can also obfuscate data from investigators to help meet data privacy regulations, while still surfacing key activities that help them efficiently perform investigations. When ready, it allows investigators to package and securely send key activity data to human resources and legal departments, following common escalation workflows for raising cases for remediation action.
+For example, Insider Risk Management can correlate signals from a user's Windows 10 desktop (such as copying files to a USB drive or emailing a personal email account) with activities from online services (such as Office 365 email, SharePoint Online, Microsoft Teams, OneDrive for Business) to identify data exfiltration patterns. It can also correlate these activities with employees leaving an organization which is a common behavioral pattern associated with data exfiltration. It can monitor multiple activities and behavior over time. When common patterns emerge, it can raise alerts and help investigators focus on key activities to verify a policy violation with a high degree of confidence. Insider Risk Management can also obfuscate data from investigators to help meet data privacy regulations while still surfacing key activities that help them efficiently perform investigations. When ready, it allows investigators to package and securely send key activity data to human resources and legal departments following common escalation workflows for raising cases for remediation action.
-Insider Risk Management is a significant increase in capabilities in Microsoft 365 for monitoring and investigating insider risks, while allowing organizations to still meet data privacy regulations and follow established escalations paths when cases require higher-level action.
+Insider Risk Management is a significant increase in capabilities in Microsoft 365 for monitoring and investigating insider risks while allowing organizations to still meet data privacy regulations and follow established escalations paths when cases require higher-level action.
## Conclusion Microsoft 365 provides an integrated and comprehensive solution which enables easy-to-use cloud-based collaboration across the enterprise with Microsoft Teams. Microsoft Teams also enables better communication and collaboration with field service staff, helping energy organizations to be more efficient and effective. Better collaboration across the enterprise and with field staff can ultimately help energy organizations to better serve customers.
solutions Healthcare Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/healthcare-overview.md
Learn how you can use Microsoft 365, Dynamics 365, and Azure to digitize, modern
|Resource |Description | |||
-| [Virtual visits with Microsoft Teams and the Bookings app](https://docs.microsoft.com/microsoftteams/expand-teams-across-your-org/bookings-virtual-visits) | The Bookings app in Microsoft Teams gives organizations a simple way to schedule and manage virtual appointments for staff and attendees. Use it to schedule virtual appointments such as healthcare visits, financial consultations, interviews, customer support, virtual shopping experiences, education office hours, and more. |
+| [Virtual visits with Microsoft Teams and the Bookings app](/microsoftteams/expand-teams-across-your-org/bookings-virtual-visits) | The Bookings app in Microsoft Teams gives organizations a simple way to schedule and manage virtual appointments for staff and attendees. Use it to schedule virtual appointments such as healthcare visits, financial consultations, interviews, customer support, virtual shopping experiences, education office hours, and more. |
|[Microsoft Vaccination Management](/dynamics365/industry/vaccination-management/overview)| This solution connects eligible people with vaccination facilities through online registration and appointment scheduling. It also provides vaccine inventory management, includes an app to check in residents and record vaccinations, and provides insights about the vaccination program through a centralized dashboard.|
-|[Teams for Healthcare ](https://docs.microsoft.com/MicrosoftTeams/expand-teams-across-your-org/healthcare/teams-in-hc) | Microsoft Teams offers a number of telemedicine features useful for hospitals and other Healthcare organizations. <br>- Virtual visits and Electronic Healthcare Record (EHR) integration<br>- Teams policy packates<br>- Secure messaging<br>- Teams templates<br>- Care coordination and collaboration |
-|[Microsoft Cloud for Healthcare](https://docs.microsoft.com/industry/healthcare/overview) | Learn about Microsoft Cloud for Healthcare and how it brings together trusted capabilities to customers and partners that enhance patient engagement, empowers health team collaboration, and improves clinical and operational data insights to improve decision-making and operational efficiencies. |
-| [Azure architecture and solutions for healthcare](https://docs.microsoft.com/azure/architecture/industries/healthcare)| Learn how you can use Microsoft Azure services to digitize, modernize, and enhance your healthcare solution at Azure for healthcare|
+|[Teams for Healthcare ](/MicrosoftTeams/expand-teams-across-your-org/healthcare/teams-in-hc) | Microsoft Teams offers a number of telemedicine features useful for hospitals and other Healthcare organizations. <br>- Virtual visits and Electronic Healthcare Record (EHR) integration<br>- Teams policy packages<br>- Secure messaging<br>- Teams templates<br>- Care coordination and collaboration |
+|[Microsoft Cloud for Healthcare](/industry/healthcare/overview) | Learn about Microsoft Cloud for Healthcare and how it brings together trusted capabilities to customers and partners that enhance patient engagement, empowers health team collaboration, and improves clinical and operational data insights to improve decision-making and operational efficiencies. |
+| [Azure architecture and solutions for healthcare](/azure/architecture/industries/healthcare)| Learn how you can use Microsoft Azure services to digitize, modernize, and enhance your healthcare solution at Azure for healthcare|
| | | ## Videos you can share with your team
Learn how you can use Microsoft 365, Dynamics 365, and Azure to digitize, modern
-<br>
+<br>
solutions Information Protection Deploy Assess https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/information-protection-deploy-assess.md
description: Determine the data privacy regulations, the relevant scenarios, you
# Assess data privacy risks and identify sensitive items with Microsoft 365
-Assessing the data privacy regulations and risks that your organization is subject to is a key first step before implementing any related improvement actions, including those achievable with Microsoft 365 features and services.
+Assessing the data privacy regulations and risks that your organization is subject to is a first step before implementing any related improvement actions, including actions achievable with Microsoft 365 features and services.
## Potentially applicable data privacy regulations
-For a good reference on the broader regulatory framework for data privacy regulations, see the [Microsoft Services Trust Portal](https://servicetrust.microsoft.com/) and the [series of articles on the General Data Protection Regulation (GDPR) regulation](/compliance/regulatory/gdpr), as well as other materials on the regulations you may be subject to in your industry or region.
+For a good reference on the broader regulatory framework for data privacy regulations, see the [Microsoft Services Trust Portal](https://servicetrust.microsoft.com/) and the [series of articles on the General Data Protection Regulation (GDPR) regulation](/compliance/regulatory/gdpr). Also review materials on the regulations you may be subject to in your industry or region.
### GDPR
-The GDPR, the most well-known and cited of the data privacy regulations, regulates the collection, storage, processing, and sharing of any personal data that relates to an identified or identifiable natural person that is a resident of the European Union (EU).
+The GDPR is the most well-known and cited of the data privacy regulations. It regulates the collection, storage, processing, and sharing of any personal data that relates to an identified or identifiable natural person that is a resident of the European Union (EU).
According to GDPR Article 4:
Most organizations will have some exposure to one of the above scenarios. Taking
## Step 2: Assess your readiness for complying with data privacy regulations
-Although specific to GDPR, the questions posed in the free [Microsoft GDPR assessment tool](https://www.microsoft.com/cyberassessment/en/gdpr/uso365) provide a good start towards understanding your overall data privacy readiness.
+Although specific to GDPR, the questions posed in the free [Microsoft GDPR assessment tool](https://clouddamcdnprodep.azureedge.net/gdc/1863571/original) provide a good start towards understanding your overall data privacy readiness.
Organizations subject to other data privacy regulations, such as CCPA in the United States or Brazil's LGPD, may also benefit from this tool's inventory of readiness due overlapping provisions with the GDPR.
solutions Productivity Illustrations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/productivity-illustrations.md
Knowing which method (or combinations of methods) to use and when to use them de
| Item | Description | |:--|:--|
-|[![Teams logical architecture poster.](../media/solutions-architecture-center/contoso-corporate-communication-thumb.png)](https://download.microsoft.com/download/0/3/4/034fbee5-ecf4-4559-86d3-815e898f21ea/contoso-corporate-communication-poster.pdf) <br/> [PDF](https://download.microsoft.com/download/0/3/4/034fbee5-ecf4-4559-86d3-815e898f21ea/contoso-corporate-communication-poster.pdf) \| [Visio](https://download.microsoft.com/download/0/3/4/034fbee5-ecf4-4559-86d3-815e898f21ea/contoso-corporate-communication-poster.vsdx) <br>Updated January 2022 |This poster illustrates how Contoso keeps employees informed and engaged across popular communication scenarios. Contoso uses a variety of M365 apps, including a new offering, Viva Connections.<br/><br/>**Related solution guides** <br/> <ul><li>[Organizational communications: Guidance, methods, and products](/sharepoint/corporate-communications-overview)|
+|[![Contoso corporate communications scenario poster.](../media/solutions-architecture-center/contoso-corporate-communication-thumb.png)](https://download.microsoft.com/download/0/3/4/034fbee5-ecf4-4559-86d3-815e898f21ea/contoso-corporate-communication-poster.pdf) <br/> [PDF](https://download.microsoft.com/download/0/3/4/034fbee5-ecf4-4559-86d3-815e898f21ea/contoso-corporate-communication-poster.pdf) \| [Visio](https://download.microsoft.com/download/0/3/4/034fbee5-ecf4-4559-86d3-815e898f21ea/contoso-corporate-communication-poster.vsdx) <br>Updated January 2022 |This poster illustrates how Contoso keeps employees informed and engaged across popular communication scenarios. Contoso uses a variety of M365 apps, including a new offering, Viva Connections.<br/><br/>**Related solution guides** <br/> <ul><li>[Organizational communications: Guidance, methods, and products](/sharepoint/corporate-communications-overview)|
Microsoft provides tools to migrate your on-premises network file shares and Sha
| Item | Description | |:--|:--|
-|[![Model poster: Migrate to Microsoft 365.](../media/solutions-architecture-center/msft-migration-thumb.png)](https://download.microsoft.com/download/0/5/b/05b7fb7c-1557-4ebb-9036-c5fc3a4cd94c/Migration-posters-mm-spmt.pdf) <p> [PDF](https://download.microsoft.com/download/0/5/b/05b7fb7c-1557-4ebb-9036-c5fc3a4cd94c/m365-migration-posters-mm-spmt.pdf)\|[Visio](https://download.microsoft.com/download/0/5/b/05b7fb7c-1557-4ebb-9036-c5fc3a4cd94c/m-365-migration-posters-mm-spmt.vsdx) <p> Updated March 2021 |Includes: <ul><li> File share migration</li><li>SharePoint Server migration</li></ul> <p> For more information, see [Migrate your content to Microsoft 365](/sharepointmigration/migrate-to-sharepoint-online).|
+|[![Model poster: Migrate to Microsoft 365.](../media/solutions-architecture-center/msft-migration-thumb.png)](https://download.microsoft.com/download/0/5/b/05b7fb7c-1557-4ebb-9036-c5fc3a4cd94c/m365-migration-posters-mm-spmt.pdf) <p> [PDF](https://download.microsoft.com/download/0/5/b/05b7fb7c-1557-4ebb-9036-c5fc3a4cd94c/m365-migration-posters-mm-spmt.pdf)\|[Visio](https://download.microsoft.com/download/0/5/b/05b7fb7c-1557-4ebb-9036-c5fc3a4cd94c/m-365-migration-posters-mm-spmt.vsdx) <p> Updated March 2021 |Includes: <ul><li> File share migration</li><li>SharePoint Server migration</li></ul> <p> For more information, see [Migrate your content to Microsoft 365](/sharepointmigration/migrate-to-sharepoint-online).|
## Microsoft 365 information protection and compliance capabilities
solutions Retail Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/retail-overview.md
+
+ Title: Microsoft 365 solutions for the retail industry
+description: Learn about solution and architecture resources for the retail industry using Microsoft 365
+++
+ms.audience: ITPro
+
+ms.localizationpriority: medium
+
+- M365-subscription-management
+- M365solutions
+f1.keywords: NOCSH
++
+# Microsoft 365 solutions for the retail industry
+
+Microsoft provides many capabilities to help retail organizations serve customers, fulfill orders, manage the supply chain, and help retail teams stay on top of tasks and work together. Microsoft also provides a comprehensive platform for the retail industry, Microsoft Cloud for Retail, which includes components from Microsoft 365, Dynamics 365, and Microsoft Azure. Modernization and digital transformation of retail environments is key to keeping up with the ever-changing economy.
+
+<br>
+
+> [!VIDEO https://www.youtube.com/embed/Vn5x7VM7UwQ]
+
+<br>
+
+Learn how you can use Microsoft 365, Dynamics 365, and Azure to digitize, modernize, and enhance your retail solution.
+
+## Resources for retail
+
+|Resource |Description |
+|||
+|[Teams for Retail ](/microsoftteams/expand-teams-across-your-org/teams-for-retail-landing-page) | Microsoft 365 and Microsoft Teams offer several capabilities that can help retail organizations with their daily operations and digital transformation. <br>- In-store and cross-store communication <br>- Virtual fittings and consultations <br>- Simplify business processes <br>- Corporate communications <br>- Onboarding new employees |
+|[Microsoft Cloud for Retail](/industry/retail/overview) | Learn about Microsoft Cloud for Retail and how it accelerates business growth by providing trusted retail industry solutions that integrate with retailerΓÇÖs existing systems. |
+|[Azure architecture and solutions for retail](/azure/architecture/industries/retail)| Learn how you can use Microsoft Azure services to digitize, modernize, and enhance your retail solutions at Azure Solutions for the Retail industry. |
+| | |
+
+## Videos you can share with your team
+
+Learn about Microsoft Cloud for Retail:
+
+<br>
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWRygC]
+
+<br>
+
+Learn how you can empower your associates with real-time store communications and collaboration with Microsoft Teams and the Microsoft Cloud for Retail:
+
+<br>
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWxAgt]
+
+<br>