Updates from: 02/08/2023 02:30:38
Category Microsoft Docs article Related commit history on GitHub Change details
admin Sign Up For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/sign-up-for-office-365.md
Ready to sign up? [Select a Plan](https://products.office.com/zh-cn/business/com
Before you buy, put some thought into the plan you sign up for. This will help prevent growing pains later.
-## Watch: Choose a Microsoft 365 subscription
+### Watch: Choose a Microsoft 365 subscription
Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198032).
Check out this video and others on our [YouTube channel](https://go.microsoft.co
If you found this video helpful, check out the [complete training series for small businesses and those new to Microsoft 365](../../business-video/index.yml).
-Need help with choosing a plan? Sales consultants are available to answer your questions. Go to [Compare all products](https://products.office.com/compare-all-microsoft-office-products?tab=2) and choose one of the contact support options listed at the left side of the page.
+### Need help with choosing a plan?
+
+Deciding on a plan can depend on your specific business needs. The Microsoft 365 plan chooser is designed to help you with this. The chooser will make recommendations based on your answers to questions such as the size of your business, your field of work, the devices you use, and what kind of features, IT support, and security you're looking for. See [Help me find the right plan for my business](https://go.microsoft.com/fwlink/p/?linkid=2224417).
+
+Sales consultants are available to answer your questions. Go to [Compare all products](https://products.office.com/compare-all-microsoft-office-products?tab=2) and choose one of the contact support options listed at the left side of the page.
::: moniker-end
admin What Is Microsoft 365 For Business https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/what-is-microsoft-365-for-business.md
Microsoft 365 for business provides the following plans to select from to help y
|[Microsoft 365 Business Standard](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-standard)|<ul><li>Get desktop versions of Office apps, including Outlook, Word, Excel, PowerPoint, and OneNote (plus Access and Publisher for PC only).</li><li>Host email with a 50 GB mailbox and custom email domain.</li><li>Create a hub for teamwork to connect people using Microsoft Teams.</li><li>Store and share files with 1 TB of OneDrive cloud storage per user.</li><li>Use one license to cover fully installed Office apps on five mobile devices, five tablets, and five PCs or Macs per user.</li><li>Get help anytime with around-the-clock phone and web support from Microsoft.</li></ul>| |[Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium)|<ul><li>Stay up to date with the latest versions of Word, Excel, PowerPoint, and more.</li><li>Connect with customers and coworkers using Outlook, Exchange, and Microsoft Teams.</li><li>Manage your files from anywhere with 1 TB of cloud storage on OneDrive per user.</li><li>Defend your business against advanced cyberthreats with sophisticated phishing and ransomware protection.</li><li>Control access to sensitive information using encryption to help keep data from being accidentally shared.</li><li>Secure devices that connect to your data and help keep iOS, Android, Windows, and MacOS devices safe and up to date.</li></ul>|
-For more details, you can [compare plans](https://www.microsoft.com/microsoft-365/business#coreui-heading-hiatrep).
+### Need help with choosing a plan?
+
+Deciding on a plan can depend on your specific business needs. The Microsoft 365 plan chooser is designed to help you with this. The chooser will make recommendations based on your answers to questions such as the size of your business, your field of work, the devices you use, and what kind of features, IT support, and security you're looking for. See [Help me find the right plan for my business](https://go.microsoft.com/fwlink/p/?linkid=2224417).
+
+You can also [compare plans](https://www.microsoft.com/microsoft-365/business#coreui-heading-hiatrep) yourself.
## Related content
admin Manage Feedback Product Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/manage-feedback-product-insights.md
We use NPS surveys and feedback from your end-users to provide you with insights
- See end-user comments on the top products and issues. - Export feedback and survey information to a CSV file.
-<!-- ## Watch: NPS feedback and insights
+## Watch: NPS feedback and insights
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE5d6gj]
->
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWWSNo]
## Before you begin
admin Servicenow Authentication https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/servicenow-authentication.md
The Microsoft 365 support integration app executes tests to make sure the integr
Microsoft 365 support integration is enabled for the user with one of these roles: -- x_mioms_m365_assis.insights_user
+- **x_mioms_m365_assis.insights_user**ΓÇöThis role is required to view the **Recommended Solutions & Articles** and **Microsoft Service Health** features in your ServiceNow instance.
-- x_mioms_m365_assis.administrator
+- **x_mioms_m365_assis.administrator**ΓÇöThis role is required to escalate your ServiceNow incidents to Microsoft support using your linked Microsoft 365 Admin account. Continue to the following section to link your admin account in the app's settings.
-### \[OPTIONAL\] [The user with role x_mioms_m365_assis.administrator link] Link Microsoft 365 Admin account
+### Link Microsoft 365 Admin account
-If any user has the role x_mioms_m365_assis.administrator and is using different Microsoft 365 accounts to manage a Microsoft 365 support case, they must set up their Microsoft 365 admin email by going to Microsoft 365 support \> **Link Account**.
+Continue with these instructions if you are looking to escalate your ServiceNow incidents to Microsoft support from your ServiceNow instance via the app.
+
+If any users are provisioned with the role **x_mioms_m365_assis.administrator** and are using different Microsoft 365 accounts to manage a Microsoft 365 support case, they must set up their Microsoft 365 admin email account by navigating to **Microsoft 365 support** > **Link Account**.
:::image type="content" source="../../media/ServiceNow-guide/servicenow-guide-image21.png" lightbox="../../media/ServiceNow-guide/servicenow-guide-image21.png" alt-text="Graphical user interface, text, application, chat or text message Description automatically generated":::
admin Servicenow Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/servicenow-incidents.md
+
+ Title: "Automatic ServiceNow Incident Creation"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+
+- Tier2
+- scotvorg
+- M365-subscription-management
+- Adm_TOC
++
+search.appverid:
+- MET150
+description: "A feature that creates new ServiceNow incidents when a Microsoft Service Health Incident is published for your Microsoft 365 tenant."
++
+# Automatic ServiceNow Incident Creation
+
+Starting with version 2.1.0, the Microsoft 365 support integration app introduces a new feature that allows creating ServiceNow incidents when a Microsoft Service Health Incident is published for your tenant. This feature seeks to empower IT teams, taking care of creating incidents in ServiceNow when Microsoft publishes new service health incidents.
++
+Whenever there is an update to the Microsoft Service Health Incident, the app will post the same updates to the ServiceNow incident created for it. Additionally, you can choose to have the app automatically close out the created ServiceNow incident when the Microsoft service health incident is resolved, or you can opt to manually close them out.
+
+Here are how the properties on the Microsoft service health incident will map to the properties on the ServiceNow incident.
+
+| Microsoft Service Health | ServiceNow Incident |
+| | |
+| Title | Short Description |
+| Issue type | Impact |
+| Status | Urgency |
+| All other fields | Description |
+
+## Configuration
+
+- To enable the Microsoft 365 support integration app to automatically create ServiceNow incidents, navigate to **Microsoft 365 Support** > **Service Health** in your ServiceNow instance and select the option **Enable the Microsoft 365 support integration app to create ServiceNow incidents for each Microsoft 365 service health incident**.
+- To have the app automatically close out the ServiceNow incidents, select the option **Automatically resolve ServiceNow incident when the Microsoft service health is resolved**.
+ - If the ServiceNow incident is manually resolved/closed by a user and this setting is enabled, then the app will discontinue to post updates to that incident.
+ - If the ServiceNow incident is resolved automatically, then the app will discontinue to post updates to that incident.
+ - The ServiceNow incident will be resolved with the following settings:
+
+| Resolution code | Closed/Resolved by Caller |
+| | |
+| Resolution note | The Microsoft service health incident was resolved on <date_time>. Please refer to the incident details in the Microsoft 365 Support tab for more information. |
+
+- To have the app automatically create ServiceNow incidents, you will need to configure the **Assignment group** and **Category** The **Assigned to** and **Subcategory** are not required but can be configured for improved routing and reporting.
admin Azure Ad Setup Guides https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/azure-ad-setup-guides.md
An Azure Active Directory P2 license is required to utilize the security feature
## Identity Governance
-This wizard catalog is designed to help customers with Azure Active Directory P2 functionality, including Access Reviews (AR), Privileged Identity Management (PIM) and Entitlement Management (ELM). For PIM and ELM we offer a curated list of docs and a pointer to the Azure Active Directory admin center, where the admin can configure this functionality. For AR, we offer a fully automated experience that allows admins to choose from two templates. These templates include one that allows group owners to approve guest usage in all Microsoft 365 groups. This is a top policy that customers use today.
+This catalog is designed to help customers with Azure AD P2 functionality, including access reviews, PIM, entitlement management (ELM), Access Reviews, HR-driven user provisioning, and life cycle workflows.
-Next, we offer a test template, where the admin is the reviewer of guests for a specific group they choose. If the tenant already has a review in place that covers all Microsoft 365 groups guest users, the admin will be pointed to the Azure Active Directory admin center to manage the existing review and there will be no automated experience.
+### PIM
+
+Manage usersΓÇÖ time-bound admin access with our automated system that allows eligible users to complete privileged tasks through an approval workflow without risking exposure of sensitive data or critical configuration settings.
+
+### ELM
+
+We offer a curated list of docs and a pointer to the Azure AD admin center, where the admin can configure entitlement management.
+
+### Access reviews
+
+We offer a fully automated experience that allows you to first test and then enable the most common access review settings. This allows group owners to approve guest usage in all Microsoft 365 groups.
+
+### HR-driven user provisioning
+
+Respond faster to identity changes in your HR app and eliminate manual provisioning. Sync worker profile changes with your business apps. This includes the ability to writeback managed attributes directly from the app, whether it's a hire, name, title, manager change, or termination.
+
+### Lifecycle workflows
+
+Easily manage your users' lifecycle in Azure AD by creating custom workflows to automate repetitive onboarding and offboarding tasks, eliminating the need for manual processes. Lifecycle workflows automatically execute configured tasks when users join or leave your org and provide insights for easy troubleshooting.
[Open the Identity Governance setup guide](https://admin.microsoft.com/adminportal/home?Q=azuredocs#/modernonboarding/identitygovernance)
Next, we offer a test template, where the admin is the reviewer of guests for a
The Azure Active Directory setup guide will help you set up the most common Azure AD features in a recommended order. The setup guide is split into three sections: **Initial**, **Core**, and **Advanced**. Each section recommends a set of features you should turn on.
-The setup guides contain a checklist of the tasks you need to complete and you can track your progress as you go through the guides. The guides will also link to the other setup guides when necessary.
+The setup guides contain a checklist of the tasks you need to complete, and you can track your progress as you go through the guides. The guides will also link to the other setup guides when necessary.
[Open the Azure Active Directory setup guide](https://admin.microsoft.com/adminportal/home?Q=azuredocs#/modernonboarding/azureadsetup).
Using Azure Active Directory sync tools is free and included with all Microsoft
## Secure your cloud apps with Single Sign On (SSO)
-This guide is designed to help you add cloud apps to Microsoft 365. In our guide, you can add an application to your tenant, add users to the app, assign roles, and more. If the app supports Single Sign-On (SSO), weΓÇÖll walk you through that configuration as well.
+This guide is designed to help you add cloud apps to Microsoft 365. In our guide, you can add an application to your tenant, add users to the app, assign roles, and more. If the app supports single sign-on (SSO), weΓÇÖll walk you through that configuration.
### Licensing
SSPR requires one of the following licenses:
[Open the self-service password reset setup guide](https://admin.microsoft.com/adminportal/home?Q=azuredocs#/modernonboarding/ssprsetup).
-## Multi-factor authentication (MFA)
+## Configure multi-factor authentication (MFA)
-This guide provides the current MFA status and helps IT admins select the best MFA option that meets their organization's requirements. Then we assist with configuring and enforcing the selected MFA method for the org.
+For customers with Azure P1 or Azure P2, we provide customizable Conditional Access templates that include the most common and least intrusive security standards. When Azure licensing isnΓÇÖt available, we provide a one-click solution to enable Security Defaults, a baseline protection policy for all users, or we provide steps to enable legacy (per-user) MFA.
### Licensing
-Conditional Access requires an Azure Active Directory P1 or P2 license, security defaults and per-user MFA are free and included with all Microsoft 365 subscriptions.
+Conditional Access requires an Azure Active Directory P1 or P2 license. Security defaults and per-user MFA are included with all Microsoft 365 subscriptions.
[Open the multi-factor authentication (MFA) guide](https://admin.microsoft.com/adminportal/home?Q=azuredocs#/modernonboarding/mfasetupguide)
-## The passwordless setup guide
+## Plan your passwordless setup guide
-The passwordless setup guide is designed to help you determine the best passwordless method for your environment. The methods include security keys, Windows Hello for Business, and the Microsoft Authenticator app. If the recommendation is Windows Hello for Business, there's a section to guide you through the different options. The guide asks you questions to help you craft a step-by-step plan.
+Upgrade to an alternative sign-in approach that allows users to access their devices securely with one of the following passwordless authentication methods:
+
+- Windows Hello for Business
+
+- The Microsoft Authenticator app
+
+- Security keys
+
+- Temporary Access Pass (TAP)
+
+Use the passwordless deployment guide to discover the best authentication methods to use and receive guidance on how to deploy them.
### Licensing Every paid subscription to Microsoft 365 comes with a free subscription to Azure AD. You can use Azure AD to manage your apps and create and manage user and group accounts. [Open the passwordless setup guide](https://admin.microsoft.com/adminportal/home?Q=azuredocs#/modernonboarding/passwordlesssetup).+
+## Migrate from ADFS to Azure AD
+
+We offer custom guidance for migrating from ADFS to Azure AD. Answer a few questions about your Active Directory Federation Services (AD FS) infrastructure and then implement either pass-through authentication (PTA) or password hash sync (PHS) to give users a streamlined experience while accessing your org's apps.
+
+[Open the Migrate from ADFS to Azure AD guide](https://admin.microsoft.com/adminportal/home?Q=azuredocs#/modernonboarding/MigrateADFSToMicrosoftAzureAD).
business-premium M365bp Mdb Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-mdb-whats-new.md
audience: Admin Previously updated : 01/25/2023 Last updated : 02/07/2023 ms.localizationpriority: medium - tier2 - m365-security-+ f1.keywords: NOCSH
This article lists new features in the latest release of [Microsoft 365 Business
## January 2023 -- **Attack surface reduction rules report is now available**. [Attack surface reduction rules](../security/defender-endpoint/attack-surface-reduction.md) target certain behaviors that are considered risky because they are commonly abused by attackers through malware. In the Microsoft 365 Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)), you can now view a report showing detections and configuration information for attack surface reduction rules. In the navigation pane, choose **Reports**, and under **Endpoints**, choose **Attack surface reduction rules**.
+- **Attack surface reduction capabilities are rolling out**. [Attack surface reduction capabilities in Defender for Business](../security/defender-business/mdb-asr.md) include attack surface reduction rules and a new attack surface reduction rules report. Attack surface reduction rules target certain behaviors that are considered risky because they are commonly abused by attackers through malware. In the Microsoft 365 Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)), you can now view a report showing detections and configuration information for attack surface reduction rules. In the navigation pane, choose **Reports**, and under **Endpoints**, choose **Attack surface reduction rules**.
- **Default experience for Defender for Business when an enterprise plan is added**. Defender for Business now retains its default experience ([simplified configuration and setup](../security/defender-business/mdb-simplified-configuration.md)) even if an enterprise plan, such as [Defender for Endpoint Plan 2](../security/defender-endpoint/microsoft-defender-endpoint.md) or [Microsoft Defender for Servers Plan 1 or 2](/azure/defender-for-cloud/plan-defender-for-servers) is added. To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions](/microsoft-365/security/defender-business/mdb-faq?#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions)?
commerce Try Or Buy Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/try-or-buy-microsoft-365.md
Microsoft 365 for business is a subscription service that lets you run your orga
You don't need an existing Microsoft account to sign up for a free trial. For all other procedures in this article, you must be a Global or Billing admin for your organization. For more information, see [About admin roles](../admin/add-users/about-admin-roles.md).
+### Need help with choosing a plan?
+
+Deciding on a plan can depend on your specific business needs. The Microsoft 365 plan chooser is designed to help you with this. The chooser will make recommendations based on your answers to questions such as the size of your business, your field of work, the devices you use, and what kind of features, IT support, and security you're looking for. See [Help me find the right plan for my business](https://go.microsoft.com/fwlink/p/?linkid=2224417).
+ ## Try a free trial subscription
-Are you a new customer, and you don't already have an account with Microsoft? Use these steps to create an account and sign up for a free trial subscription of Microsoft 365 Business Standard, Microsoft 365 Business Premium, or Microsoft 365 Apps for business.
+Use these steps to create an account and sign up for a free trial subscription of Microsoft 365 Business Standard, Microsoft 365 Business Premium, or Microsoft 365 Apps for business.
1. Go to the <a href="https://www.aka.ms/office365signup" target="_blank">Microsoft 365 Products site</a>. 2. Select the plan that you want to sign up for, such as **Microsoft 365 Business Standard**, scroll down the page, and select **Try free for 1 month**.
compliance Audit Log Activities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-log-activities.md
Additional auditing information for sensitivity labels:
- When you use sensitivity labels for Microsoft 365 Groups, and therefore Teams sites that are group-connected, the labels are audited with group management in Azure Active Directory. For more information, see [Audit logs in Azure Active Directory](/azure/active-directory/reports-monitoring/concept-audit-logs). - When you use sensitivity labels for Teams meeting invites, and Teams meeting options and chat, see [Search the audit log for events in Microsoft Teams](/microsoftteams/audit-log-events). - When you use sensitivity labels with Power BI, see [Audit schema for sensitivity labels in Power BI](/power-bi/enterprise/service-security-sensitivity-label-audit-schema).
+- When you use sensitivity labels with Microsoft Defender for cloud apps, see [Governing connected apps](/defender-cloud-apps/governance-actions) and the labeling information for file governance actions.
- When you apply sensitivity labels by using the Azure Information Protection client or scanner, or the Microsoft Information Protection (MIP) SDK, see [Azure Information Protection audit log reference](/azure/information-protection/audit-logs). ## Retention policy and retention label activities
compliance Communication Compliance Case Study https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-case-study.md
With all the prerequisites completed, the IT administrators and the compliance s
![Communication compliance detect inappropriate text template](../media/communication-compliance-case-template.png)
-2. On the policy template wizard, the Contoso IT administrators and compliance specialists work together to complete the three required fields: **Policy name**, **Users or groups to supervise**, and **Reviewers**.
-3. Since the policy wizard has already suggested a name for the policy, the IT administrators and compliance specialists decide to keep the suggested name and focus on the remaining fields. They select the *All users* group for the **Users or groups to supervise** field and select the compliance specialists that should investigate and remediate policy alerts for the **Reviewers** field. The last step to configure the policy and start gathering alert information is to select **Create policy**.
+2. On the policy template wizard, the Contoso IT administrators and compliance specialists work together to complete the three required fields: **Policy name**, **Users or groups in scope**, and **Reviewers**.
+3. Since the policy wizard has already suggested a name for the policy, the IT administrators and compliance specialists decide to keep the suggested name and focus on the remaining fields. They select the *All users* group for the **Users or groups in scope** field and select the compliance specialists that should investigate and remediate policy alerts for the **Reviewers** field. The last step to configure the policy and start gathering alert information is to select **Create policy**.
![Communication compliance detect inappropriate text wizard](../media/communication-compliance-case-wizard.png)
compliance Communication Compliance Channels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-channels.md
Extracted text for modern attachments is included with the associated message on
Select the extracted attachment text to view the details in the *Source* and *Plain text* views. After reviewing, you can resolve or take action on the attachment text using the command bar controls. You also have the option to download the attachment for review outside of the communication compliance review process.
-Use the following group management configurations to supervise individual user chats and channel communications in Teams:
+Use the following group management configurations to bring individual user chats and channel communications in Teams in scope:
- **For Teams chats:** Assign individual users or assign a [distribution group](https://support.office.com/article/Distribution-groups-E8BA58A8-FAB2-4AAF-8AA1-2A304052D2DE) to the communication compliance policy. This setting is for one-to-one or one-to-many user/chat relationships.-- **For Teams channel communications:** Assign every Microsoft Teams channel or Microsoft 365 group you want to analyze that contains a specific user to the communication compliance policy. If you add the same user to other Microsoft Teams channels or Microsoft 365 groups, be sure to add these new channels and groups to the communication compliance policy. If any member of the channel is a supervised user within a policy and the *Inbound* direction is configured in a policy, all messages sent within the channel are subject to review, and potential policy matches (even for users in the channel that aren't explicitly supervised). For example, User A is the owner or a member of a channel. User B and User C are members of the same channel and use language that is matched to the potentially inappropriate content policy that supervises only User A. User B and User C create policy matches for conversations within the channel even though they aren't directly supervised in the potentially inappropriate content policy. Teams conversations between User B and User C that are outside of the channel and include User A wouldn't be subject to the potentially inappropriate content policy that includes User A. To exclude channel members from supervision when other members of the channel are explicitly supervised, turn off the *Inbound* communication direction setting in the applicable communication compliance policy.-- **For Teams chats with hybrid email environments**: Communication compliance can detect chat messages for organizations with an Exchange on-premises deployment or an external email provider that have enabled Microsoft Teams. You must create a distribution group for the users with on-premises or external mailboxes. When creating a communication compliance policy, you'll assign this distribution group as the **Supervised users and groups** selection in the policy wizard. For more information about the requirements and limitations for enabling cloud-based storage and Teams support for on-premises users, see [Search for Teams chat data for on-premises users](/microsoft-365/compliance/search-cloud-based-mailboxes-for-on-premises-users).
+- **For Teams channel communications:** Assign every Microsoft Teams channel or Microsoft 365 group you want to analyze that contains a specific user to the communication compliance policy. If you add the same user to other Microsoft Teams channels or Microsoft 365 groups, be sure to add these new channels and groups to the communication compliance policy. If any member of the channel is a scoped user within a policy and the *Inbound* direction is configured in a policy, all messages sent within the channel are subject to review, and potential policy matches (even for users in the channel that aren't explicitly scoped). For example, User A is the owner or a member of a channel. User B and User C are members of the same channel and use language that is matched to the potentially inappropriate content policy that applies only to User A. User B and User C create policy matches for conversations within the channel even though they aren't directly scoped in the potentially inappropriate content policy. Teams conversations between User B and User C that are outside of the channel and include User A wouldn't be subject to the potentially inappropriate content policy that includes User A. To exclude channel members from being scoped when other members of the channel are explicitly scoped, turn off the *Inbound* communication direction setting in the applicable communication compliance policy.
+- **For Teams chats with hybrid email environments**: Communication compliance can detect chat messages for organizations with an Exchange on-premises deployment or an external email provider that have enabled Microsoft Teams. You must create a distribution group for the users with on-premises or external mailboxes. When creating a communication compliance policy, you'll assign this distribution group using the **Choose users and groups** selection in the policy wizard. For more information about the requirements and limitations for enabling cloud-based storage and Teams support for on-premises users, see [Search for Teams chat data for on-premises users](/microsoft-365/compliance/search-cloud-based-mailboxes-for-on-premises-users).
## Exchange
compliance Communication Compliance Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-configure.md
For step-by-step instructions to turn on auditing, see [Turn audit log search on
## Step 3 (optional): Set up groups for communication compliance
- When you create a communication compliance policy, you define who has their communications reviewed and who performs reviews. In the policy, you'll use email addresses to identify individuals or groups of people. To simplify your setup, you can create groups for people who have their communication reviewed and groups for people who review those communications. If you're using groups, you may need several. For example, if you want to detect communications between two distinct groups of people or if you want to specify a group that isn't going to be supervised.
+ When you create a communication compliance policy, you define who has their communications reviewed and who performs reviews. In the policy, you'll use email addresses to identify individuals or groups of people. To simplify your setup, you can create groups for people who have their communication reviewed and groups for people who review those communications. If you're using groups, you may need several. For example, if you want to detect communications between two distinct groups of people or if you want to specify a group that isn't going to be scoped.
Use the following chart to help you configure groups in your organization for communication compliance policies: | **Policy Member** | **Supported Groups** | **Unsupported Groups** | |:--|:--|:--|
-|Supervised users <br> Excluded users | Distribution groups <br> Microsoft 365 Groups | Dynamic distribution groups <br> Shared mailbox <br> Nested distribution groups <br> Mail-enabled security groups <br> Microsoft 365 groups with dynamic membership |
+|Scoped users <br> Excluded users | Distribution groups <br> Microsoft 365 Groups | Dynamic distribution groups <br> Shared mailbox <br> Nested distribution groups <br> Mail-enabled security groups <br> Microsoft 365 groups with dynamic membership |
| Reviewers | None | Distribution groups <br> Dynamic distribution groups <br> Nested distribution groups <br> Mail-enabled security groups | When you assign a *distribution group* in the policy, the policy detects all emails and Teams chats from each user in the *distribution group*. When you assign a *Microsoft 365 group* in the policy, the policy detects all emails and Teams chats sent to the *Microsoft 365 group*,* not the individual emails and chats received by each group member. Using distribution groups in communication compliance policies are recommended so that individual emails and Teams chats from each user are automatically detected.
-If you're an organization with an Exchange on-premises deployment or an external email provider and you want to detect Microsoft Teams chats for your users, you must create a distribution group for the users with on-premises or external mailboxes. Later in these steps, you'll assign this distribution group as the **Supervised users and groups** selection in the policy wizard. For more information about the requirements and limitations for enabling cloud-based storage and Teams support for on-premises users, see [Search for Teams chat data for on-premises users](/microsoft-365/compliance/search-cloud-based-mailboxes-for-on-premises-users).
+If you're an organization with an Exchange on-premises deployment or an external email provider and you want to detect Microsoft Teams chats for your users, you must create a distribution group for the users with on-premises or external mailboxes. Later in these steps, you'll assign this distribution group by using the **Choose users and groups** selection in the policy wizard. For more information about the requirements and limitations for enabling cloud-based storage and Teams support for on-premises users, see [Search for Teams chat data for on-premises users](/microsoft-365/compliance/search-cloud-based-mailboxes-for-on-premises-users).
-To manage supervised users in large enterprise organizations, you may need to detect messages for all users across large groups. You can use PowerShell to configure a distribution group for a global communication compliance policy for the assigned group. This enables you to detect messages for thousands of users with a single policy and keep the communication compliance policy updated as new employees join your organization.
+To manage scoped users in large enterprise organizations, you may need to detect messages for all users across large groups. You can use PowerShell to configure a distribution group for a global communication compliance policy for the assigned group. This enables you to detect messages for thousands of users with a single policy and keep the communication compliance policy updated as new employees join your organization.
1. Create a dedicated [distribution group](/powershell/module/exchange/new-distributiongroup) for your global communication compliance policy with the following properties: Make sure that this distribution group isn't used for other purposes or other Office 365 services.
For more information about configuring Yammer in Native Mode, see:
- Confirm or update the policy name. Policy names can't be changed once the policy is created.
- - Choose the users or groups to supervise, including choosing users or groups you'd like to exclude. When using the conflict of interest template, you'll select two groups or two users to detect internal communications.
+ - Choose the users or groups to apply the policy to, including the users or groups you'd like to exclude. When using the conflict of interest template, you'll select two groups or two users to detect internal communications.
- Choose the reviewers for the policy. Reviewers are individual users and all reviewers must have mailboxes hosted on Exchange Online. Reviewers added here are the reviewers that you can choose from when escalating an alert in the investigation and remediation workflow. When reviewers are added to a policy, they automatically receive an email message that notifies them of the assignment to the policy and provides links to information about the review process.
For more information about configuring Yammer in Native Mode, see:
- Give the policy a name and description. Policy names can't be changed once the policy is created.
- - Choose the users or groups to supervise, including all users in your organization, specific users and groups, or other users and groups you'd like to exclude.
+ - Choose the users or groups to apply the policy to, including all users in your organization, specific users and groups, or other users and groups you'd like to exclude.
- Choose the reviewers for the policy. Reviewers are individual users and all reviewers must have mailboxes hosted on Exchange Online. Reviewers added here are the reviewers that you can choose from when escalating an alert in the investigation and remediation workflow. When reviewers are added to a policy, they automatically receive an email message that notifies them of the assignment to the policy and provides links to information about the review process.
For more information about configuring Yammer in Native Mode, see:
- Choose if you'd like to include sensitive information types. This step is where you can select default and custom sensitive info types. Pick from existing custom sensitive information types or custom keyword dictionaries in the communication compliance policy wizard. You can create these items before running the wizard if needed. You can also create new sensitive information types from within the communication compliance policy wizard.
- - Choose if you'd like to enable classifiers. Classifiers can detect potentially inappropriate language and images sent or received in the body of email messages or other types of text. You can choose the following built-in classifiers: *Threat*, *Profanity*, *Targeted harassment*, *Adult images*, *Racy images*, and *Gory images*.
+ - Choose if you'd like to enable classifiers. Classifiers can detect potentially inappropriate language and images sent or received in the body of email messages or other types of text. You can choose the following built-in classifiers: *Targeted threat*, *Profanity*, *Targeted harassment*, *Adult images*, *Racy images*, and *Gory images*.
- Enable [optical character recognition (OCR)](/microsoft-365/compliance/communication-compliance-policies#optical-character-recognition-ocr) to identify embedded or attached images in messages for printed or handwritten text that match policy conditions. For custom policies, one or more conditional settings associated with text, keywords, classifiers, or sensitive info types must be configured in the policy to enable the selection of optical character recognition (OCR) documents.
After you create a communication compliance policy, it's a good idea to test it
Follow these steps to test your communication compliance policy:
-1. Open an email client, Microsoft Teams, or Yammer while signed in as a supervised user defined in the policy you want to test.
+1. Open an email client, Microsoft Teams, or Yammer while signed in as a scoped user defined in the policy you want to test.
2. Send an email, Microsoft Teams chat, or Yammer message that meets the criteria you've defined in the communication compliance policy. This test can be a keyword, attachment size, domain, etc. Make sure you determine if your configured conditional settings in the policy are too restrictive or too lenient.
compliance Communication Compliance Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-plan.md
Choose from these solution role group options when configuring and managing comm
| **Communication Compliance Investigators** | Use this group to assign permissions to users that will act as communication compliance investigators. Users assigned to this role group can view message metadata and content, escalate to additional reviewers, escalate to an eDiscovery (Premium) case, send notifications to users, and resolve the alert. | | **Communication Compliance Viewers** | Use this group to assign permissions to users that will manage communication reports. Users assigned to this role group can access all reporting widgets on the communication compliance home page and can view all communication compliance reports. |
-### Supervised users
+### Scoped users
-Before you start using communication compliance, you must determine who needs their communications reviewed. In the policy, user email addresses identify individuals or groups of people to supervise. Some examples of these groups are Microsoft 365 Groups, Exchange-based distribution lists, Yammer communities, and Microsoft Teams channels. You also can exclude specific users or groups from checking with a specific exclusion group or a list of groups. For more information about groups types supported in communication compliance policies, see [Get started with communication compliance](/microsoft-365/compliance/communication-compliance-configure#step-3-optional-set-up-groups-for-communication-compliance).
+Before you start using communication compliance, you must determine who needs their communications reviewed. In the policy, user email addresses identify individuals or groups of people to apply the policy to. Some examples of these groups are Microsoft 365 Groups, Exchange-based distribution lists, Yammer communities, and Microsoft Teams channels. You also can exclude specific users or groups from checking with a specific exclusion group or a list of groups. For more information about groups types supported in communication compliance policies, see [Get started with communication compliance](/microsoft-365/compliance/communication-compliance-configure#step-3-optional-set-up-groups-for-communication-compliance).
> [!IMPORTANT] > Users covered by communication compliance policies must have either a Microsoft 365 E5 Compliance license, an Office 365 Enterprise E3 license with the Advanced Compliance add-on, or be included in an Office 365 Enterprise E5 subscription. If you don't have an existing Enterprise E5 plan and want to try communication compliance, you can [sign up for a trial of Office 365 Enterprise E5](https://go.microsoft.com/fwlink/p/?LinkID=698279). ### Reviewers
-When you create a communication compliance policy, you must determine who reviews the messages of the supervised users. In the policy, user email addresses identify individuals or groups of people to review supervised communications. All reviewers must have mailboxes hosted on Exchange Online, must be assigned to either the *Communication Compliance Analysts* or *Communication Compliance Investigators* role groups, and must be assigned in the policy they need to investigate. When reviewers are added to a policy, they automatically receive an email message that notifies them of the assignment to the policy and provides links to information about the review process.
+When you create a communication compliance policy, you must determine who reviews the messages of the scoped users. In the policy, user email addresses identify individuals or groups of people to review scoped communications. All reviewers must have mailboxes hosted on Exchange Online, must be assigned to either the *Communication Compliance Analysts* or *Communication Compliance Investigators* role groups, and must be assigned in the policy they need to investigate. When reviewers are added to a policy, they automatically receive an email message that notifies them of the assignment to the policy and provides links to information about the review process.
-### Groups for supervised users and reviewers
+### Groups for scoped users and reviewers
-To simplify your setup, we recommend you create groups for people who need their communications reviewed and groups for people who review those communications. If you're using groups, you might need several. For example, if you want to identify communications between two distinct groups of people, or if you want to specify a group that isn't supervised. When you assign a Distribution group in the policy, the policy detects all emails from each user in Distribution group. When you assign a Microsoft 365 group in the policy, the policy detects all emails sent to that group, not the individual emails received by each group member.
+To simplify your setup, we recommend you create groups for people who need their communications reviewed and groups for people who review those communications. If you're using groups, you might need several. For example, if you want to identify communications between two distinct groups of people, or if you want to specify a group that isn't in scope. When you assign a Distribution group in the policy, the policy detects all emails from each user in Distribution group. When you assign a Microsoft 365 group in the policy, the policy detects all emails sent to that group, not the individual emails received by each group member.
Adding groups and distribution lists to communication compliance policies are part of the overall conditions and rules set, so the maximum number of groups and distribution lists that a policy supports varies depending on the number of conditions also added to the policy. Each policy should support approximately 20 groups or distribution lists, depending on the number of additional conditions present in the policy.
The following chart can help you configure groups in your organization for commu
| **Policy Member** | **Supported Groups** | **Unsupported Groups** | |:--|:--|:--|
-|Supervised users <br> Excluded users | Distribution groups <br> Microsoft 365 Groups | Dynamic distribution groups <br> Nested distribution groups <br> Mail-enabled security groups <br> Microsoft 365 groups with dynamic membership |
+|Scoped users <br> Excluded users | Distribution groups <br> Microsoft 365 Groups | Dynamic distribution groups <br> Nested distribution groups <br> Mail-enabled security groups <br> Microsoft 365 groups with dynamic membership |
| Reviewers | None | Distribution groups <br> Dynamic distribution groups <br> Nested distribution groups <br> Mail-enabled security groups | ### Privacy
compliance Communication Compliance Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-policies.md
Policy templates are pre-defined policy settings that you can use to quickly cre
|:--|:--|:--| | **Inappropriate text** | Detect inappropriate text | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Inbound, Outbound, Internal <br> - Review Percentage: 100% <br> - Conditions: Threat, Discrimination, and Targeted harassment classifiers | | **Inappropriate images** | Detect inappropriate images | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Inbound, Outbound, Internal <br> - Review Percentage: 100% <br> - Conditions: Adult and Racy image classifiers |
-| **Sensitive information** | Monitor for sensitive info | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Inbound, Outbound, Internal <br> - Review Percentage: 10% <br> - Conditions: Sensitive information, out-of-the-box content patterns, and types, custom dictionary option, attachments larger than 1 MB |
-| **Regulatory compliance** | Monitor for regulatory compliance | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Inbound, Outbound <br> - Review Percentage: 10% <br> - Conditions: custom dictionary option, attachments larger than 1 MB |
-| **Conflict of interest** | Monitor for conflict of interest | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Internal <br> - Review Percentage: 100% <br> - Conditions: None |
+| **Sensitive information** | Detect sensitive info types | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Inbound, Outbound, Internal <br> - Review Percentage: 10% <br> - Conditions: Sensitive information, out-of-the-box content patterns, and types, custom dictionary option, attachments larger than 1 MB |
+| **Regulatory compliance** | Detect financial regulatory compliance | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Inbound, Outbound <br> - Review Percentage: 10% <br> - Conditions: custom dictionary option, attachments larger than 1 MB |
+| **Conflict of interest** | Detect conflict of interest | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Internal <br> - Review Percentage: 100% <br> - Conditions: None |
Communications are scanned every 24 hours from the time policies are created. For example, if you create an inappropriate content policy at 11:00 AM, the policy will gather communication compliance signals every 24 hours at 11:00 AM daily. Editing a policy doesn't change this time. To view the last scan date and Coordinated Universal Time (UTC) for a policy, navigate to the *Last policy scan* column on the **Policy** page. After creating a new policy, it may take up to 24 hours to view the first policy scan date and time.
Admins should immediately assign custom reviewers to this policy as appropriate
1. Sign into [Microsoft Purview compliance portal](https://compliance.microsoft.com/) using credentials for an admin account in your Microsoft 365 organization. 2. In the compliance portal, go to **Communication compliance**. 3. On the **Policy** tab, select the *User-reported messages* policy and select **Edit**.
-4. On the **Monitor for user-reported messages** pane, assign reviewers for the policy. Reviewers must have mailboxes hosted on Exchange Online. When reviewers are added to a policy, they automatically receive an email message that notifies them of the assignment to the policy and provides links to information about the review process.
+4. On the **Detect user-reported messages** pane, assign reviewers for the policy. Reviewers must have mailboxes hosted on Exchange Online. When reviewers are added to a policy, they automatically receive an email message that notifies them of the assignment to the policy and provides links to information about the review process.
5. Select **Save**. The *Report a concern* option is enabled by default and can be controlled via Teams messaging policies in the [Teams Admin Center](/microsoftteams/manage-teams-in-modern-portal). Users in your organization will automatically get the global policy, unless you create and assign a custom policy. Edit the settings in the global policy or create and assign one or more custom policies to turn on or turn off the *Report a concern* option. To learn more, see [Manage messaging policies in Teams](/microsoftteams/messaging-policies-in-teams).
You can choose to select **All users** or to define specific users in a communic
By default, the **Direction is** condition is displayed and can't be removed. Communication direction settings in a policy are chosen individually or together: -- **Inbound**: Detects communications sent **to** supervised users from external and internal senders, including other supervised users in the policy.-- **Outbound**: Detects communications sent **from** supervised users to external and internal recipients, including other supervised users in the policy.-- **Internal**: Detects communications **between** the supervised users or groups in the policy.
+- **Inbound**: Detects communications sent **to** scoped users from external and internal senders, including other scoped users in the policy.
+- **Outbound**: Detects communications sent **from** scoped users to external and internal recipients, including other scoped users in the policy.
+- **Internal**: Detects communications **between** the scoped users or groups in the policy.
### Sensitive information types
The following table explains more about each condition.
| **Message is classified with any of these labels** <br><br> **Message is not classified with any of these labels** | To apply the policy when certain retention labels are included or excluded in a message. Retention labels must be configured separately and configured labels are chosen as part of this condition. Each label you choose is applied separately (only one of these labels must apply for the policy to apply to the message). For more information about retention labels, see [Learn about retention policies and retention labels](/microsoft-365/compliance/retention).| | **Message contains any of these words** <br><br> **Message contains none of these words** | To apply the policy when certain words or phrases are included or excluded in a message, enter each word separated with a comma. Do not include spaces between items separated by a comma. For phrases of two words or more, use quotation marks around the phrase. Each word or phrase you enter is applied separately (only one word must apply for the policy to apply to the message). For more information about entering words or phrases, see the next section [Matching words and phrases to emails or attachments](#matching-words-and-phrases-to-emails-or-attachments).| | **Attachment contains any of these words** <br><br> **Attachment contains none of these words** | To apply the policy when certain words or phrases are included or excluded in a message attachment (such as a Word document), enter each word separated with a comma. Do not include spaces between items separated by a comma. For phrases of two words or more, use quotation marks around the phrase. Each word or phrase you enter is applied separately (only one word must apply for the policy to apply to the attachment). For more information about entering words or phrases, see the next section [Matching words and phrases to emails or attachments](#matching-words-and-phrases-to-emails-or-attachments).|
-| **Attachment is any of these file types** <br><br> **Attachment is none of these file types** | To supervise communications that include or exclude specific types of attachments, enter the file extensions (such as .exe or .pdf). If you want to include or exclude multiple file extensions, enter file types separated by a comma (example *.exe,.pdf,.zip*). Do not include spaces between items separated by a comma. Only one attachment extension must match for the policy to apply.|
+| **Attachment is any of these file types** <br><br> **Attachment is none of these file types** | To bring communications into scope that include or exclude specific types of attachments, enter the file extensions (such as .exe or .pdf). If you want to include or exclude multiple file extensions, enter file types separated by a comma (example *.exe,.pdf,.zip*). Do not include spaces between items separated by a comma. Only one attachment extension must match for the policy to apply.|
| **Message size is larger than** <br><br> **Message size is not larger than** | To review messages based on a certain size, use these conditions to specify the maximum or minimum size a message can be before it's subject to review. For example, if you specify **Message size is larger than** \> **1.0 MB**, all messages that are 1.01 MB and larger are subject to review. You can choose bytes, kilobytes, megabytes, or gigabytes for this condition.| | **Attachment is larger than** <br><br> **Attachment is not larger than** | To review messages based on the size of their attachments, specify the maximum or minimum size an attachment can be before the message and its attachments are subject to review. For example, if you specify **Attachment is larger than** \> **2.0 MB**, all messages with attachments 2.01 MB and over are subject to review. You can choose bytes, kilobytes, megabytes, or gigabytes for this condition.|
compliance Communication Compliance Reports Audits https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-reports-audits.md
Message details reports contain the following information for each message item
## Audit
-In some instances, you must provide information to regulatory or compliance auditors to prove supervision of user activities and communications. This information may be a summary of all activities associated with a defined organizational policy or anytime a communication compliance policy changes. Communication compliance policies have built-in audit trails for complete readiness for internal or external audits. Detailed audit histories of every create, edit, and delete action are captured by your communication policies to provide proof of supervisory procedures.
+In some instances, you must provide information to regulatory or compliance auditors to prove that user activities and communications are scoped. This information may be a summary of all activities associated with a defined organizational policy or anytime a communication compliance policy changes. Communication compliance policies have built-in audit trails for complete readiness for internal or external audits. Detailed audit histories of every create, edit, and delete action are captured by your communication policies to provide proof of scoped procedures.
> [!IMPORTANT] > Auditing must be enabled for your organization before communication compliance events will be recorded. To enable auditing, see [Enable the audit log](/microsoft-365/compliance/communication-compliance-configure#step-2-required-enable-the-audit-log). When activities trigger events that are captured in the Microsoft 365 Audit log, it may take up to 48 hours before these events can be viewed in communication compliance policies.
To view communication compliance review activities for a policy, select the **Ex
You can also view audit activities in the unified audit log or with the [Search-UnifiedAuditLog](/powershell/module/exchange/search-unifiedauditlog) PowerShell cmdlet. To learn more about audit log retention policies, see [Manage audit log retention policies](/microsoft-365/compliance/audit-log-retention-policies).
-For example, the following example returns the activities for all the supervisory review activities (policies and rules):
+For example, the following example returns the activities for all the scoped review activities (policies and rules):
```PowerShell Search-UnifiedAuditLog -StartDate $startDate -EndDate $endDate -RecordType AeD -Operations SupervisoryReviewTag
This example returns activities that match your current communication compliance
Search-UnifiedAuditLog -StartDate $startDate -EndDate $endDate -Operations SupervisionRuleMatch ```
-Communication compliance policy matches are stored in a supervision mailbox for each policy. In some cases, you may need to check the size of your supervision mailbox for a policy to make sure you aren't approaching the current 100-GB storage size or 1 million message limit. If the mailbox limit is reached, policy matches aren't captured and you'll need to create a new policy (with the same settings) to continue to capture matches for the same activities.
+Communication compliance policy matches are stored in a scoped mailbox for each policy. In some cases, you may need to check the size of your scoped mailbox for a policy to make sure you aren't approaching the current 100-GB storage size or 1 million message limit. If the mailbox limit is reached, policy matches aren't captured and you'll need to create a new policy (with the same settings) to continue to capture matches for the same activities.
-To check the size of a supervision mailbox for a policy, complete the following steps:
+To check the size of a scoped mailbox for a policy, complete the following steps:
1. [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). 2. Run the following command:
compliance Communication Compliance Solution Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-solution-overview.md
Users are given [permissions](/microsoft-365/compliance/communication-compliance
Communication compliance empowers organizations to detect, triage, and remediate communications with potential business conduct and/or regulatory compliance violations. Communication compliance provides the following policy templates that use machine learning classifiers for users: -- **Business conduct**: Corporate sabotage (preview), discrimination, profanity, threat, and targeted harassment classifiers
+- **Business conduct**: Corporate sabotage (preview), Discrimination, Profanity, Threat, and Targeted harassment classifiers
- **Regulatory compliance**: Customer complaints, gifts & entertainment (preview), money laundering (preview), regulatory collusion (preview), stock manipulation (preview), unauthorized disclosure (preview) classifiers ## Metrics used to evaluate and measure performance
compliance Communication Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance.md
Communication compliance policies can assist with reviewing messages in your org
- **Regulatory compliance**
- Most organizations must comply with some type of regulatory compliance standards as part of their normal operating procedures. These regulations often require organizations to implement some type of supervisory or oversight process for messaging that is appropriate for their industry. The Financial Industry Regulatory Authority (FINRA) Rule 3110 is a good example of a requirement for organizations to have supervisory procedures in place to check user communications and the types of businesses in which it engages. Another example may be a need to review broker-dealer communications in your organization to safeguard against potential insider trading, collusion, or bribery activities. Communication compliance policies can help your organization meet these requirements by providing a process to both analyze and report on corporate communications. For more information on support for financial organizations, see [Key compliance and security considerations for US banking and capital markets](../solutions/financial-services-secure-collaboration.md).
+ Most organizations must comply with some type of regulatory compliance standards as part of their normal operating procedures. These regulations often require organizations to implement some type of scoping or oversight process for messaging that is appropriate for their industry. The Financial Industry Regulatory Authority (FINRA) Rule 3110 is a good example of a requirement for organizations to have scoping procedures in place to check user communications and the types of businesses in which it engages. Another example may be a need to review broker-dealer communications in your organization to safeguard against potential insider trading, collusion, or bribery activities. Communication compliance policies can help your organization meet these requirements by providing a process to both analyze and report on corporate communications. For more information on support for financial organizations, see [Key compliance and security considerations for US banking and capital markets](../solutions/financial-services-secure-collaboration.md).
## Key feature areas
New interactive dashboards for alerts, policy matches, actions, and trends help
Communication compliance policies check, detect, and capture messages across several communication channels to help you quickly review and remediate compliance issues: -- **Microsoft Teams**: Chat communications for public and private [Microsoft Teams](/MicrosoftTeams/Teams-overview) channels and individual chats are supported in communication compliance as a standalone channel source or with other Microsoft 365 services. You'll need to manually add individual users, distribution groups, or specific Microsoft Teams channels when you select users and groups to supervise in a communication compliance policy. Teams users can also self-report potentially inappropriate messages in private and group channels and chats for review and remediation.
+- **Microsoft Teams**: Chat communications for public and private [Microsoft Teams](/MicrosoftTeams/Teams-overview) channels and individual chats are supported in communication compliance as a standalone channel source or with other Microsoft 365 services. You'll need to manually add individual users, distribution groups, or specific Microsoft Teams channels when you select users and groups to apply a communication compliance policy to. Teams users can also self-report potentially inappropriate messages in private and group channels and chats for review and remediation.
- **Exchange Online**: All mailboxes hosted on [Exchange Online](/Exchange/exchange-online) in your Microsoft 365 organization are eligible for analyses. Emails and attachments matching communication compliance policy conditions are instantly available for investigation and in compliance reports. Exchange Online is now an optional source channel and is no longer required in communication compliance policies. - **Yammer**: Private messages and public community conversations in [Yammer](/yammer/yammer-landing-page) are supported in communication compliance policies. Yammer is an optional channel and must be in [native mode](/yammer/configure-your-yammer-network/overview-native-mode) to support checking of messages and attachments. - **Third-party sources**: You can check messages from [third-party sources](/microsoft-365/compliance/archiving-third-party-data) for data imported into mailboxes in your Microsoft 365 organization. Communication compliance supports connections to several popular platforms, including Instant Bloomberg and others.
You can choose from the following policy templates in the Microsoft Purview comp
- **Detect inappropriate text**: Use this template to quickly create a policy that uses built-in classifiers to automatically detect text in messages that may be considered inappropriate, abusive, or offensive. - **Detect inappropriate images**: Use this template to quickly create a policy that uses built-in classifiers to automatically detect content that contains adult and racy images that may be considered as inappropriate in your organization.-- **Monitor for sensitive information**: Use this template to quickly create a policy to check communications containing defined sensitive information types or keywords to help make sure that important data isn't shared with people that shouldn't have access.-- **Monitor for financial regulatory compliance**: Use this template to quickly create a policy to check communications for references to standard financial terms associated with regulatory standards.-- **Monitor for conflict of interest**: Use this template to quickly create a policy to detect communications between two groups or two users to help avoid conflicts of interest.
+- **Detect sensitive info types**: Use this template to quickly create a policy to check communications containing defined sensitive information types or keywords to help make sure that important data isn't shared with people that shouldn't have access.
+- **Detect financial regulatory compliance**: Use this template to quickly create a policy to check communications for references to standard financial terms associated with regulatory standards.
+- **Detect conflict of interest**: Use this template to quickly create a policy to detect communications between two groups or two users to help avoid conflicts of interest.
- **Custom policy**: Use this template to configure specific communication channels, individual detection conditions, and the amount of content to detect and review in your organization. - **User-reported messages policy**: This system policy supports user reported messages from channel, group, and private chat messages. Enabled by default in the Teams admin center.
compliance Compliance Manager Assessments https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-assessments.md
Learn how to get a broad [view of all users with access to assessments](complian
##### Note about multiple roles - A user can have one role that applies to an assessment, while also holding another role that applies broadly to overall Compliance Manager access.+ - For example, if you've assigned a user a **Compliance Manager Reader** role in Microsoft Purview compliance portal **Permissions,** you can also assign that user a **Compliance Manager Assessor** role for a specific assessment. In effect, the user will hold the two roles at the same time, but their ability to edit data will be limited to the assessment to which they've been assigned the **Assessor** role.
- - Removing an assessment-based role won't remove the user's overall Compliance Manager role if they have one.
+ - Removing an assessment-based role won't remove the user's overall Compliance Manager role if they have one. If you want to change a user's overall role, you'll have to change it from the **Permissions** page in the Microsoft Purview compliance portal.
- For an individual assessment, one user can only hold one assessment-based role at a time. - For example, if a user holds a reader role for a GDPR assessment and you want to change them to a contributor role, you'll first need to remove their reader role, and then re-assign them the reader role.
compliance Device Onboarding Configure Proxy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-configure-proxy.md
See [Netsh Command Syntax, Contexts, and Formatting](/windows-server/networking/
If a proxy or firewall is blocking all traffic by default and allowing only specific domains through, add the domains listed in the downloadable sheet to the allowed domains list.
-This [downloadable spreadsheet](https://download.microsoft.com/download/8/e-urls.xlsx) lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an allow rule specifically for them.
+This [downloadable spreadsheet](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx) lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an allow rule specifically for them.
If a proxy or firewall has HTTPS scanning (SSL inspection) enabled, exclude the domains listed in the above table from HTTPS scanning. If a proxy or firewall is blocking anonymous traffic, as Endpoint DLP is connecting from system context, make sure anonymous traffic is permitted in the previously listed URLs.
compliance Get Started With Sensitivity Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-with-sensitivity-labels.md
description: "Prescriptive steps for admins, licensing requirements, and common
For information about what sensitivity labels are and how they can help you protect your organization's data, see [Learn about sensitivity labels](sensitivity-labels.md).
-If you have [Azure Information Protection](/azure/information-protection/what-is-information-protection) and are still using Azure Information Protection labels that were managed from the Azure portal, you must migrate these labels to the [unified labeling platform](/azure/information-protection/faqs#how-can-i-determine-if-my-tenant-is-on-the-unified-labeling-platform). We then recommend you disable the AIP add-in for Office apps, to benefit from the newer, built-in labeling experience. For more information, see [Migrate the Azure Information Protection (AIP) add-in to built-in labeling for Office apps](sensitivity-labels-aip.md).
- When you're ready to start protecting your organization's data by using sensitivity labels: 1. **Create the labels.** Create and name your sensitivity labels according to your organization's classification taxonomy for different sensitivity levels of content. Use common names or terms that make sense to your users. If you don't already have an established taxonomy, consider starting with label names such as Personal, Public, General, Confidential, and Highly Confidential. You can then use sublabels to group similar labels by category. When you create a label, use the tooltip text to help users select the appropriate label.
These permissions are required only to create and configure sensitivity labels a
## Support for administrative units
-Now in preview, sensitivity labels support [administrative units that have been configured in Azure Active Directory](/azure/active-directory/roles/administrative-units):
+Now rolling out in preview, sensitivity labels support [administrative units that have been configured in Azure Active Directory](/azure/active-directory/roles/administrative-units):
- You can assign administrative units to members of role groups that are used with Microsoft Purview Information Protection. Edit these role groups and select individual members, and then the **Assign admin units** option to select administrative units from Azure Active Directory. These administrators are now restricted to managing just the users in those administrative units.
A successful strategy to deploy sensitivity labels for an organization is to cre
Using the table in the next section, we recommend identifying your top one or two scenarios that map to your most impactful business requirements. After these scenarios are deployed, return to the list to identify the next one or two priorities for deployment.
+> [!NOTE]
+> If you're using the AIP add-in for labeling in Office apps, we recommend you move to built-in labeling. For more information, see [Migrate the Azure Information Protection (AIP) add-in to built-in labeling for Office apps](sensitivity-labels-aip.md).
+ ## Common scenarios for sensitivity labels All scenarios require you to [Create and configure sensitivity labels and their policies](create-sensitivity-labels.md).
compliance Get Started With Service Trust Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-with-service-trust-portal.md
ms.localizationpriority: medium search.appverid: MET150
-mscollection:
+ - tier3 - purview-compliance
compliance Insider Risk Management Content Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-content-explorer.md
Title: Review date with the insider risk management content explorer
+ Title: Review data with the insider risk management content explorer
description: Learn about insider risk management Content explorer in Microsoft Purview keywords: Microsoft 365, Microsoft Purview, insider risk, risk management, compliance ms.localizationpriority: medium
- purview-compliance
-# Review date with the insider risk management content explorer
+# Review data with the insider risk management content explorer
> [!IMPORTANT] > Microsoft Purview Insider Risk Management correlates various signals to identify potential malicious or inadvertent insider risks, such as IP theft, data leakage and security violations. Insider risk management enables customers to create policies to manage security and compliance. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to help ensure user-level privacy.
To examine the emails and files captured by the policies included in a specific
> [!IMPORTANT] > After an alert is confirmed to a case, Content explorer won't display any details for that case if the organization has not assigned a user to either the *Insider Risk Management Investigators* or *Insider Risk Management* role group.
-For new cases, it usually takes about an hour for content to populate in Content explorer. For cases with large amounts of content, it may take longer to create a snapshot. If content is still loading in Content explorer, you will see a progress indicator that displays the completion percentage.
+For new cases, it usually takes about an hour for content to populate in Content explorer. For cases with large amounts of content, it may take longer to create a snapshot. If content is still loading in Content explorer, you'll see a progress indicator that displays the completion percentage.
In some cases, data associated with a case may not be available as a snapshot for review in Content explorer. This situation may occur when case data has been deleted or moved, or when a temporary error occurs when processing case data. If this situation occurs, select **View files** in the warning bar to view the file names, file path, and reason for the failure for each file. If needed, this information can be exported to a .csv (comma-separated values) file.
-If the content includes Information Rights Management permissions, these permissions are maintained for the copied content and users assigned the *Insider Risk Management Investigators* role will need these permissions and rights if they need to open and view the files. Each file and message are automatically assigned a unique file ID in the insider risk management case for management purposes. Documents associated with device indicator activities are not included in Content explorer.
+If the content includes Information Rights Management permissions, these permissions are maintained for the copied content and users assigned the *Insider Risk Management Investigators* role will need these permissions and rights if they need to open and view the files. Each file and message are automatically assigned a unique file ID in the insider risk management case for management purposes. Documents associated with device indicator activities aren't included in Content explorer.
> [!NOTE] > Content explorer includes user activities related to Microsoft 365 service files, such as user activity on SharePoint, Exchange, Microsoft Teams, and OneDrive for Business.
To add or remove column headings for the content queue, use the **Edit columns**
| **Bcc** | Available for email messages, the users in the Bcc message field. | | **Cc** | Available for email messages, the users in the Cc message field. | | **Compound path** | Human readable path that describes the source of the item. |
-| **Conversation ID** | Conversation Id from the message. |
+| **Conversation ID** | Conversation ID from the message. |
| **Conversation index** | Conversation index from the message. | | **Created time** | The time the file or email message was created. | | **Date (UTC)** | For email, the date a message was received by a recipient or sent by the sender. For documents, the date a document was last modified. Date is in Coordinated Universal Time (UTC).| | **Dominant theme** | Dominant theme as calculated for analytics. | | **Email set ID** | Group ID for all messages in the same email set. |
-| **Family ID** | Family Id groups together all items; for email, this column includes the message and all attachments; for documents, this column includes the document and any embedded items. |
+| **Family ID** | Family ID groups together all items; for email, this column includes the message and all attachments; for documents, this column includes the document and any embedded items. |
| **File class** | For content from SharePoint and OneDrive: **Document**; for content from Exchange: **Email** or **Attachment**. | | **File ID** | Document identifier unique within the case. | | **File type icon** | The extension of a file; for example, docx, one, pptx, or xlsx. This field is the same property as the FileExtension site property. | | **ID** | The GUID identifier for the file. |
-| **Immutable ID** | Immutable Id as stored in Office 365. |
+| **Immutable ID** | Immutable ID as stored in Office 365. |
| **Inclusive type** | Inclusive type calculated for analytics: **0** - not inclusive; **1** - inclusive; **2** - inclusive minus; **3** - inclusive copy. | | **Last modified** | The date that a document was last changed. | | **Marked as representative** | One document from each set of exact duplicates is marked as representatives. |
compliance Insider Risk Management Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-policies.md
Complete the following steps to copy an existing policy:
3. On the policy details page, select Copy. 4. In the policy wizard, name the new policy and update the policy configuration as needed.
-## Immediately start scoring security-related user activity
+## Immediately start scoring user activity
-There may be scenarios where you need to immediately start assigning risk scores to users with insider risk policies outside of the insider risk management triggering event workflow. Use **Start scoring activity for users** on the **Policies** tab to manually add a user (or users) to one or more insider risk policies for a specific amount of time, to immediately start assigning risk scores to their activity, and to bypass the requirement for a user to have a triggering indicator (like a DLP policy match). You can also add a reason for adding the user to the policy, which will appear on the users' activity timeline. Users manually added to policies are displayed in the **Users** dashboard and alerts are created if activity meets the policy alert thresholds. You can add up to 4,000 users per policy when adding users for immediate scoring.
+There may be scenarios where you need to start assigning risk scores to users with insider risk policies outside of the insider risk management triggering event workflow. Use **Start scoring activity for users** on the **Policies** tab to manually add a user (or users) to one or more insider risk policies for a specific amount of time, to start assigning risk scores to their activity, and to bypass the requirement for a user to have a triggering indicator (like a DLP policy match or an Employment End Date from the HR Connector). You can also add a reason for adding the user to the policy, which will appear on the users' activity timeline. Users manually added to policies are displayed in the **Users** dashboard and alerts are created if the activity meets the policy alert thresholds. At any given time, you can have up to 4,000 users in scope that have been manually added using the **Start scoring activity for users** feature.
Some scenarios where you may want to immediately start scoring user activities:
compliance Ome Version Comparison https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ome-version-comparison.md
To assess whether this deprecation impacts your organization, see [How to migrat
|*Sending an encrypted mail* |Through Exchange mail flow rules|End-user initiated from Outlook desktop or Outlook on the Web; or through Exchange mail flow rules|End-user initiated from Outlook desktop, Outlook for Mac, or Outlook on the Web; through Exchange mail flow rules (also known as transport rules) and data loss prevention (DLP)| |*Rights management template* | N/A |Do Not Forward option and custom templates|Do Not Forward option, encrypt-only option, and custom templates| |*Recipient type* |Internal and external recipients|Internal recipients only |Internal and external recipients|
-|*Experience for internal recipient*|Recipients receive an HTML message, which they download and open in a web browser or mobile app|Native inline experience in Outlook clients|Native inline experience for recipients in the same organization using Outlook clients. Recipients can read message from OME portal using clients other than Outlook (no download or app required).|
+|*Experience for internal recipient*|Recipients receive an HTML message, which they download and open in a web browser or mobile app|Native inline experience in Outlook clients|Native inline experience for recipients in the same organization using Outlook clients. Recipients can read message from encrypted message portal using clients other than Outlook (no download or app required).|
|*Experience for external recipient*|Recipients receive an HTML message, which they download and open in a web browser or mobile app|N/A|Native inline experience for Microsoft 365 recipients. All other recipients can read message from OME portal (no download or app required).| |*Attachment permissions* |No restrictions on attachments|Attachments are protected|Attachments are protected for the Do Not Forward option and custom templates. Admins can choose whether attachments for the encrypt-only option are protected or not.| |*Bring your own key (BYOK) support*|None |None |BYOK supported |
The new capabilities provide the following advantages:
## Microsoft Purview Advanced Message Encryption capabilities
-Microsoft Purview Advanced Message Encryption offers additional capabilities on top of Microsoft Purview Message Encryption. You must have Microsoft Purview Message Encryption set up in your organization in order to use Advanced Message Encryption. Also, in order to use these capabilities, recipients must view and reply to secure mail through the Microsoft Purview Message Encryption Portal. The advanced capabilities include:
+Microsoft Purview Advanced Message Encryption offers more capabilities on top of Microsoft Purview Message Encryption. You must have Microsoft Purview Message Encryption set up in your organization in order to use Advanced Message Encryption. Also, in order to use these capabilities, recipients must view and reply to secure mail through the Microsoft Purview Message Encryption Portal. The advanced capabilities include:
- Message revocation
Microsoft Purview Advanced Message Encryption offers additional capabilities on
- Multiple branding templates
-Advanced Message Encryption is not supported in GCC High.
+Advanced Message Encryption isn't supported in GCC High.
For information on using Advanced Message Encryption, see [Microsoft Purview Advanced Message Encryption](ome-advanced-message-encryption.md).
compliance Sensitivity Labels Sharepoint Onedrive Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-sharepoint-onedrive-files.md
If you are currently protecting documents in SharePoint by using SharePoint Info
## Requirements
-These new capabilities work with [sensitivity labels](sensitivity-labels.md) only. If you currently have Azure Information Protection labels, first migrate them to sensitivity labels so that you can enable these features for new files that you upload. For instructions, see [How to migrate Azure Information Protection labels to unified sensitivity labels](/azure/information-protection/configure-policy-migrate-labels).
+These new capabilities work with [sensitivity labels](sensitivity-labels.md) only.
Use the OneDrive sync app version 19.002.0121.0008 or later on Windows, and version 19.002.0107.0008 or later on Mac. Both these versions were released January 28, 2019, and are currently released to all rings. For more information, see the [OneDrive release notes](https://support.office.com/article/845dcf18-f921-435e-bf28-4e24b95e5fc0). After you enable sensitivity labels for Office files in SharePoint and OneDrive, users who run an older version of the sync app are prompted to update it.
Uploading a labeled document, and then extracting and displaying that sensitivit
For these files, either apply a label without encryption so that they can later be opened in Office on the web, or instruct users to open the files in their desktop apps. Files that are labeled and encrypted only in Office on the web aren't affected. -- SharePoint and OneDrive don't automatically apply sensitivity labels to existing files that you've already encrypted using Azure Information Protection labels. Instead, for the features to work after you enable sensitivity labels for Office files in SharePoint and OneDrive, complete these tasks:-
- 1. Make sure you have [migrated the Azure Information Protection labels](/azure/information-protection/configure-policy-migrate-labels) to sensitivity labels and [published them](create-sensitivity-labels.md#publish-sensitivity-labels-by-creating-a-label-policy) from the Microsoft Purview compliance portal.
- 2. Download the labeled files and then upload them to their original location in SharePoint or OneDrive.
+- SharePoint and OneDrive don't automatically apply sensitivity labels to existing files that have been encrypted using the older-style Azure Information Protection labels that used to be published from the Azure portal. For the features to work after you enable sensitivity labels for Office files in SharePoint and OneDrive, download these files and then upload them to their original location in SharePoint or OneDrive.
- SharePoint and OneDrive can't process encrypted files when the label that applied the encryption has any of the following [configurations for encryption](encryption-sensitivity-labels.md#configure-encryption-settings): - **Let users assign permissions when they apply the label** and the checkbox **In Word, PowerPoint, and Excel, prompt users to specify permissions** is selected. This setting is sometimes referred to as "user-defined permissions".
compliance Sensitivity Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels.md
The sensitivity labels that are built into Microsoft 365 Apps on Windows, macOS,
If you're using the AIP add-in for labeling in Office apps, we recommend you move to built-in labeling. For more information, see [Migrate the Azure Information Protection (AIP) add-in to built-in labeling for Office apps](sensitivity-labels-aip.md).
-### Azure Information Protection labels
-
-Label management for Azure Information Protection labels in the Azure portal was deprecated **March 31, 2021**. Learn more from the official [deprecation notice](https://techcommunity.microsoft.com/t5/azure-information-protection/announcing-timelines-for-sunsetting-label-management-in-the/ba-p/1226179).
-
-If your tenant isn't yet on the [unified labeling platform](/azure/information-protection/faqs#how-can-i-determine-if-my-tenant-is-on-the-unified-labeling-platform), you must first activate unified labeling before you can use sensitivity labels. For instructions, see [How to migrate Azure Information Protection labels to unified sensitivity labels](/azure/information-protection/configure-policy-migrate-labels).
- ## Sensitivity labels and the Microsoft Information Protection SDK Because a sensitivity label is stored in the metadata of a document, third-party apps and services can read from and write to this labeling metadata to supplement your labeling deployment. Additionally, software developers can use the [Microsoft Information Protection SDK](/information-protection/develop/overview#microsoft-information-protection-sdk) to fully support labeling and encryption capabilities across multiple platforms. To learn more, see the [General Availability announcement on the Tech Community blog](https://techcommunity.microsoft.com/t5/Microsoft-Information-Protection/Microsoft-Information-Protection-SDK-Now-Generally-Available/ba-p/263144).
enterprise Office 365 Cdn Quickstart https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-cdn-quickstart.md
You can use the built-in **Office 365 Content Delivery Network (CDN)** to host s
For more detailed information guidance see [Use the Office 365 Content Delivery Network (CDN) with SharePoint Online](use-microsoft-365-cdn-with-spo.md).
+> [!CAUTION]
+> Private CDN configuration is in the process of deprecation. You are no longer required to configure a private CDN. Image file types are served through a private CDN out of the box. However, if a private CDN is in use for other file types, like JS or CSS, we recommend using a public CDN for better performance. Going forward, non-image file types will not be supported through private CDNs.
+ >[!NOTE] >The Office 365 CDN is only available to tenants in the production (worldwide) cloud. Tenants in the US Government, China and Germany clouds do not currently support the Office 365 CDN.
frontline Advanced Virtual Appointments Activity Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/advanced-virtual-appointments-activity-report.md
- M365-collaboration - m365-frontline - m365initiative-meetings
+ - tier1
description: Learn how to use the Advanced Virtual Appointments activity report, which provides usage information for advanced Virtual Appointments capabilities that are available with Teams Premium. appliesto: - Microsoft Teams
frontline Virtual Appointments App https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/virtual-appointments-app.md
- highpri - EngageScoreSep2022 - m365initiative-meetings
+ - tier1
description: Get an overview of how to use the Virtual Appointments app in Teams to schedule, manage, conduct and view analytics on virtual appointments in your organization. appliesto:
frontline Virtual Appointments Call Quality https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/virtual-appointments-call-quality.md
- M365-collaboration - m365-frontline - m365initiative-meetings
+ - tier1
description: Learn how to use the Call Quality Dashboard for Virtual Appointments in Microsoft Teams to troubleshoot issues and analyze call quality. appliesto: - Microsoft Teams
frontline Virtual Appointments Usage Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/virtual-appointments-usage-report.md
- M365-collaboration - m365-frontline - m365initiative-meetings
+ - tier1
description: Learn how to use the Virtual Appointments usage report in the Microsoft Teams admin center to get an overview of virtual appointment activity in your organization. appliesto: - Microsoft Teams
Here's what you'll see on each tab of the report.
The graphs you'll see here depend on the license you have. |Callout |Description | |--|-|
The graphs you'll see here depend on the license you have.
### Duration |Callout |Description | |--|-|
The graphs you'll see here depend on the license you have.
This tab shows appointments scheduled through Bookings. |Callout |Description | |--|-|
lighthouse M365 Lighthouse Requirements https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-requirements.md
In addition, each MSP customer tenant must meet the following requirements to be
- Must have delegated access set up for the Managed Service Provider (MSP) to be able to manage the customer tenant > [!NOTE] > Either Granular Delegated Admin Privileges (GDAP) or a Delegated Admin Privileges (DAP) relationship is required to onboard customers to Lighthouse. An indirect reseller relationship is no longer required to onboard to Lighthouse. If DAP and GDAP coexist in a customer tenant, GDAP permissions take precedence for MSP technicians in GDAP-enabled security groups.-- Must have at least one Microsoft 365 Business Premium, Microsoft 365 E3, Microsoft 365 E5, Windows 365 Business, or Microsoft Defender for Business license
+- Must have at least one license of Microsoft 365 Business Premium, Microsoft 365 E3, Microsoft 365 E5, Windows 365 Business, or Microsoft Defender for Business
- Must have no more than 2500 licensed users - Must reside in the same geographic region (Americas, European Union, or Asia plus Australia) as the partner organization that manages them
security Mdb Asr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-asr.md
description: Get an overview of attack surface reduction capabilities in Microso
Previously updated : 02/03/2023 Last updated : 02/07/2023
audience: Admin
Your attack surfaces as all the places and ways that your organization's network and devices are vulnerable to cyberthreats and attacks. Unsecured devices, unrestricted access to any URL on a company device, and allowing any type of app or script to run on company devices are all examples of attack surfaces. They leave your company vulnerable to cyberattacks.
-To help protect your network and devices, Microsoft Defender for Business includes several attack surface reduction capabilities. This article provides an overview of those capabilities, and includes links to more detailed information.
+To help protect your network and devices, Microsoft Defender for Business includes several attack surface reduction capabilities that are rolling out now. This article provides an overview of those capabilities, and includes links to more detailed information.
## Attack surface reduction in Defender for Business
We recommend enabling the following standard protection rules as soon as possibl
- [Block abuse of exploited vulnerable signed drivers](../defender-endpoint/attack-surface-reduction-rules-reference.md#block-abuse-of-exploited-vulnerable-signed-drivers) - [Block persistence through WMI event subscription](../defender-endpoint/attack-surface-reduction-rules-reference.md#block-persistence-through-wmi-event-subscription)
-These rules help protect your network and devices but shouldn't cause disruption for users. **To enable these rules quickly and easily, try the [Simplified standard protection option](../defender-endpoint/attack-surface-reduction-rules-report.md#simplified-standard-protection-option)**.
-
-If you prefer, you can set up your ASR rules by using Microsoft Intune.
+These rules help protect your network and devices but shouldn't cause disruption for users. Use Intune to set up your ASR rules.
### To set up ASR rules using Intune 1. As a global administrator, in the Microsoft Intune admin center ([https://intune.microsoft.com/](https://intune.microsoft.com/)), go to **Endpoint security** > **Attack surface reduction**.
-2. Select an existing policy, or choose **Create policy** to create a new policy.
+2. Choose **Create policy** to create a new policy.
- - For **Platform**, choose **Windows 10 and later**.
+ - For **Platform**, choose **Windows 10, Windows 11, and Windows Server**.
- For Profile, select **Attack Surface Reduction Rules**, and then choose **Create**. 3. Set up your policy as follows:
If you prefer, you can set up your ASR rules by using Microsoft Intune.
5. On the **Review + create** step, review the information, and then choose **Create**.
+> [!TIP]
+> If you prefer, you can set up your ASR rules in audit mode at first to see detections before files or processes are actually blocked. For more detailed information about ASR rules, see [ASR rules deployment overview](../defender-endpoint/attack-surface-reduction-rules-deployment.md).
+ ### View your attack surface reduction report 1. As a global administrator, in the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the navigation pane, choose **Reports**.
security Mdb Configure Security Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-configure-security-settings.md
ms.localizationpriority: medium Previously updated : 01/31/2023 Last updated : 02/07/2023 f1.keywords: NOCSH
Security policies to review and configure include:
- **[Next-generation protection policies](#view-or-edit-your-next-generation-protection-policies)**, which determine antivirus and antimalware protection for your company's devices - **[Firewall protection and rules](#view-or-edit-your-firewall-policies-and-custom-rules)**, which determine what network traffic is allowed to flow to and from your company's devices-- **[Attack surface reduction rules](#enable-standard-attack-surface-reduction-rules)**, which help protect your network and devices from cyberthreats and attacks
+- **[Attack surface reduction rules](#enable-standard-attack-surface-reduction-rules)** (rolling out now), which help protect your network and devices from cyberthreats and attacks
- **[Web content filtering](#set-up-web-content-filtering)**, which prevents people from visiting certain websites (URLs) based on categories, such as adult content or legal liability - **[Advanced features](#review-settings-for-advanced-features)**, such as automated investigation and response and endpoint detection and response (EDR) in block mode
Use this article as a guide to managing your security policies and settings.
7. [View other settings in the Microsoft 365 Defender portal](#view-and-edit-other-settings-in-the-microsoft-365-defender-portal). 8. [Proceed to your next steps](#next-steps). - ## Choose where to manage security policies and devices Defender for Business features a [simplified configuration process](mdb-simplified-configuration.md) that helps streamline the setup and configuration process. If you select the simplified configuration process, you can view and manage your security policies in the Microsoft 365 Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)). However, you're not limited to this option. If you've been using Microsoft Intune, you can keep using Intune.
Depending on whether you're using the Microsoft 365 Defender portal or Intune to
- Attack surface reduction rules (see [Enable your standard protection ASR rules](mdb-asr.md#enable-your-standard-protection-asr-rules)). - Controlled folder access (see [Set up controlled folder access](mdb-asr.md#set-up-controlled-folder-access)).-- Network protection (on by default with [next-generation protection](mdb-next-gen-configuration-settings.md)).-- Web protection (on by default with [web content filtering](#set-up-web-content-filtering)).-- Firewall protection (on by default with [firewall policies](mdb-firewall.md)).
+- Network protection (turned on by default with [next-generation protection](mdb-next-gen-configuration-settings.md)).
+- Web protection (turned on by default with [web content filtering](#set-up-web-content-filtering)).
+- Firewall protection (turned on by default with [firewall policies](mdb-firewall.md)).
There are three standard attack surface reduction rules you should turn on as soon as possible. See [Enable your standard protection ASR rules](mdb-asr.md#enable-your-standard-protection-asr-rules).
security Mdb Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-preview.md
- m365-security - tier1 Last updated : 07/12/2022 # Microsoft Defender for Business preview features
security Get Scan History By Definition https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/Get-scan-history-by-definition.md
search.appverid: met150 Last updated : 12/15/2022 # Get scan history by definition
security Get Scan History By Session https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/Get-scan-history-by-session.md
search.appverid: met150 Last updated : 12/15/2022 # Get scan history by session
security Access Mssp Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/access-mssp-portal.md
search.appverid: met150 Last updated : 12/18/2020 # Access the Microsoft 365 Defender MSSP customer portal
security Add A New Scan Definition https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/add-a-new-scan-definition.md
search.appverid: met150 Last updated : 12/14/2022 # Add, update or delete a scan definition
security Add Or Remove Machine Tags https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/add-or-remove-machine-tags.md
search.appverid: met150 Last updated : 12/18/2020 # Add or remove machine tags API
security Advanced Features https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/advanced-features.md
search.appverid: met150 Last updated : 12/18/2020 # Configure advanced features in Defender for Endpoint
security Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/alerts.md
search.appverid: met150 Last updated : 12/18/2020 # Alert resource type
security Analyzer Feedback https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/analyzer-feedback.md
search.appverid: met150 Last updated : 03/23/2021 # Provide feedback on the Microsoft Defender for Endpoint client analyzer tool
security Analyzer Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/analyzer-report.md
search.appverid: met150 Last updated : 03/23/2021 # Understand the client analyzer HTML report
security Android Configure Mam https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure-mam.md
- tier3 Last updated : 09/29/2021 # Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
security Android Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure.md
search.appverid: met150 Last updated : 12/18/2020 # Configure Defender for Endpoint on Android features
security Android Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-intune.md
search.appverid: met150 Last updated : 12/18/2020 # Deploy Microsoft Defender for Endpoint on Android with Microsoft Endpoint Manager
security Android Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-privacy.md
search.appverid: met150 Last updated : 12/18/2020 # Microsoft Defender for Endpoint on Android - Privacy information
security Android Support Signin https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-support-signin.md
search.appverid: met150 Last updated : 12/18/2020 # Troubleshooting issues on Microsoft Defender for Endpoint on Android
security Android Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-whatsnew.md
search.appverid: met150 Last updated : 11/01/2021 # What's new in Microsoft Defender for Endpoint on Android
security Api Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api-explorer.md
search.appverid: met150 Last updated : 12/18/2020 # API Explorer
security Api Hello World https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api-hello-world.md
search.appverid: met150 Last updated : 12/18/2020 # Microsoft Defender for Endpoint API - Hello World
security Api Microsoft Flow https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api-microsoft-flow.md
search.appverid: met150 Last updated : 12/18/2020 # How to use Power Automate Connector to set up a Flow for events
security Api Power Bi https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api-power-bi.md
search.appverid: met150 Last updated : 12/18/2020 # Create custom reports using Power BI
security Api Release Notes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api-release-notes.md
search.appverid: met150 Last updated : 02/02/2021 # Microsoft Defender for Endpoint API release notes
security Application Deployment Via Mecm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/application-deployment-via-mecm.md
- m365-security - tier1 Last updated : 06/27/2022 - # Migrating servers from Microsoft Monitoring Agent to the unified solution **Applies to:**
security Assign Portal Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/assign-portal-access.md
- m365-security - tier2 Last updated : 12/18/2020 # Assign user access to Microsoft Defender Security Center
security Attack Simulations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-simulations.md
- m365-security - tier2 Last updated : 12/18/2020 # Experience Microsoft Defender for Endpoint through simulated attacks
security Auto Investigation Action Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/auto-investigation-action-center.md
search.appverid: met150 Last updated : 12/18/2020 # Visit the Action center to see remediation actions
security Autoir Investigation Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/autoir-investigation-results.md
- autoir - admindeeplinkDEFENDER Last updated : 03/15/2021 # View the details and results of an automated investigation
security Azure Server Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/azure-server-integration.md
- m365-security - tier3 Last updated : 05/03/2021 # Integration with Microsoft Defender for Cloud
security Basic Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/basic-permissions.md
- tier2 search.appverid: met150 Last updated : 12/18/2020 # Use basic permissions to access the portal
security Batch Update Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/batch-update-alerts.md
search.appverid: met150 Last updated : 03/15/2021 # Batch update alerts
security Behavioral Blocking Containment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/behavioral-blocking-containment.md
- m365-security - tier2 search.appverid: met150 Last updated : 12/18/2020 # Behavioral blocking and containment
security Cancel Machine Action https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/cancel-machine-action.md
- tier3 Last updated : 06/03/2021 # Cancel machine action API
security Client Behavioral Blocking https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/client-behavioral-blocking.md
- m365-security - tier2 search.appverid: met150 Last updated : 12/18/2020 # Client behavioral blocking
security Collect Investigation Package https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/collect-investigation-package.md
search.appverid: met150 Last updated : 12/18/2020 # Collect investigation package API
security Common Errors https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/common-errors.md
search.appverid: met150 Last updated : 12/18/2020 # Handling REST API errors
security Comprehensive Guidance On Linux Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/comprehensive-guidance-on-linux-deployment.md
search.appverid: met150 Last updated : 10/11/2022 # Advanced deployment guidance for Microsoft Defender for Endpoint on Linux
security Conditional Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/conditional-access.md
- tier3 Last updated : 12/18/2020 # Enable Conditional Access to better protect users, devices, and data
security Configure Automated Investigations Remediation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-automated-investigations-remediation.md
search.appverid: met150 Last updated : 12/18/2020 # Configure automated investigation and remediation capabilities in Microsoft Defender for Endpoint
security Configure Conditional Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-conditional-access.md
search.appverid: met150 Last updated : 12/18/2020 # Configure Conditional Access in Microsoft Defender for Endpoint
security Configure Device Discovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-device-discovery.md
search.appverid: met150 Last updated : 03/23/2021 # Configure device discovery
security Configure Endpoints Mdm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-mdm.md
search.appverid: met150 Last updated : 12/18/2020 # Onboard Windows devices to Defender for Endpoint using Intune
security Configure Endpoints Non Windows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-non-windows.md
- tier1 Last updated : 12/18/2020 # Onboard non-Windows devices
security Configure Endpoints Script https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-script.md
Last updated : 12/18/2020 # Onboard Windows devices using a local script
security Configure Machines Asr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-machines-asr.md
search.appverid: met150 Last updated : 12/18/2020 # Optimize ASR rule deployment and detections
security Configure Machines Onboarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-machines-onboarding.md
search.appverid: met150 Last updated : 12/18/2020 # Get devices onboarded to Microsoft Defender for Endpoint
security Configure Machines Security Baseline https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-machines-security-baseline.md
search.appverid: met150 Last updated : 12/18/2020 # Increase compliance to the Microsoft Defender for Endpoint security baseline
security Configure Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-machines.md
search.appverid: met150 Last updated : 12/18/2020 # Ensure your devices are configured properly
security Configure Microsoft Defender Antivirus Features https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-microsoft-defender-antivirus-features.md
- m365-security - tier2 search.appverid: met150 Last updated : 04/08/2021 # Configure Microsoft Defender Antivirus features
security Configure Microsoft Threat Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-microsoft-threat-experts.md
search.appverid: met150 Last updated : 12/18/2020 # Configure and manage Microsoft Defender Experts capabilities
security Configure Mssp Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-mssp-notifications.md
search.appverid: met150 Last updated : 12/18/2020 # Configure alert notifications that are sent to MSSPs
security Configure Mssp Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-mssp-support.md
search.appverid: met150 Last updated : 12/18/2020 # Configure managed security service provider integration
security Configure Process Opened File Exclusions Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md
- m365-security - tier2 search.appverid: met150 Last updated : 04/08/2021 # Configure exclusions for files opened by processes
security Configure Protection Features Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-protection-features-microsoft-defender-antivirus.md
- m365-security - tier2 search.appverid: met150 Last updated : 04/08/2021 # Configure behavioral, heuristic, and real-time protection
security Configure Proxy Internet https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-proxy-internet.md
- tier1 Last updated : 12/18/2020 # Configure device proxy and Internet connectivity settings
security Configure Server Endpoints https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-server-endpoints.md
Data collected by Defender for Endpoint is stored in the geo-location of the ten
- Follow the onboarding steps for the corresponding tool > [!IMPORTANT]
-> To be eligible to purchase Microsoft Defender for Endpoint Server SKU, you already must have purchased a combined minimum of any of the following: Windows E5/A5, Microsoft 365 E5/A5, or Microsoft 365 E5 Security subscription licenses.
+> To be eligible to acquire Microsoft Defender for Endpoint Server licenses (one per covered server instance), you must have already purchased a combined minimum of 50 licenses for one or more of the following:
+>
+> - Microsoft Defender for Endpoint (per user)
+> - Windows E5/A5
+> - Microsoft 365 E5/A5
+> - Microsoft 365 E5 Security User subscription licenses.
## Windows Server 2012 R2 and Windows Server 2016
security Configure Siem https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-siem.md
- tier2 Last updated : 12/18/2020 # Migrate from the MDE SIEM API to the Microsoft 365 Defender alerts API
security Configure Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-updates.md
- tier2 search.appverid: met150 Last updated : 05/12/2021 # Create a custom gradual rollout process for Microsoft Defender updates
security Configure Vulnerability Email Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-vulnerability-email-notifications.md
- tier2 search.appverid: met150 Last updated : 02/02/2021 # Configure vulnerability email notifications in Microsoft Defender for Endpoint
security Connected Applications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/connected-applications.md
search.appverid: met150 Last updated : 12/18/2020 # Connected applications in Microsoft Defender for Endpoint
security Contact Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/contact-support.md
search.appverid: met150 Last updated : 12/18/2020 # Contact Microsoft Defender for Endpoint support
security Corelight Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/corelight-integration.md
- tier3 Last updated : 11/22/2021 # Enable Corelight as data source in Microsoft Defender for Endpoint
security Create Alert By Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/create-alert-by-reference.md
search.appverid: met150 Last updated : 12/18/2020 # Create alert API
security Customize Controlled Folders https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/customize-controlled-folders.md
- m365-security - tier2 search.appverid: met150 Last updated : 12/18/2020 # Customize controlled folder access
security Data Collection Analyzer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/data-collection-analyzer.md
search.appverid: met150 Last updated : 03/23/2021 # Data collection for advanced troubleshooting on Windows
security Data Storage Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/data-storage-privacy.md
search.appverid: met150 Last updated : 12/18/2020 # Microsoft Defender for Endpoint data storage and privacy
security Defender Endpoint Plan 1 2 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2.md
audience: ITPro Previously updated : 01/25/2023 Last updated : 02/07/2023 ms.localizationpriority: medium
The following table summarizes what's included in Microsoft endpoint security pl
| Plan | What's included | |:|:|
-| [Defender for Endpoint Plan 1](defender-endpoint-plan-1.md) | <ul><li>[Next-generation protection](defender-endpoint-plan-1.md#next-generation-protection) (includes antimalware and antivirus)</li><li>[Attack surface reduction](defender-endpoint-plan-1.md#attack-surface-reduction)</li><li> [Manual response actions](defender-endpoint-plan-1.md#manual-response-actions)</li><li>[Centralized management](defender-endpoint-plan-1.md#centralized-management)</li><li>[Security reports](defender-endpoint-plan-1.md#reporting)</li><li>[APIs](defender-endpoint-plan-1.md#apis)</li><li>[Support for Windows 10, iOS, Android OS, and macOS devices](defender-endpoint-plan-1.md#cross-platform-support)</li></ul>|
-| [Defender for Endpoint Plan 2](microsoft-defender-endpoint.md) | All of the Defender for Endpoint Plan 1 capabilities, plus:<ul><li>[Device discovery](device-discovery.md)</li><li>[Device inventory](machines-view-overview.md)</li><li>[Core Defender Vulnerability Management capabilities](../defender-vulnerability-management/defender-vulnerability-management-capabilities.md)</li><li>[Threat Analytics](threat-analytics.md)</li><li>[Automated investigation and response](automated-investigations.md)</li><li>[Advanced hunting](advanced-hunting-overview.md)</li><li>[Endpoint detection and response](overview-endpoint-detection-response.md)</li><li>[Endpoint Attack Notifications](endpoint-attack-notifications.md)</li><li>Support for [Windows](configure-endpoints.md) (client only) and [non-Windows platforms](configure-endpoints-non-windows.md) (macOS, iOS, Android, and Linux)</li></ul> |
-| [Defender Vulnerability Management add-on](../defender-vulnerability-management/defender-vulnerability-management-capabilities.md) | More Defender Vulnerability Management capabilities for Defender for Endpoint Plan 2:<ul><li>[Security baselines assessment](../defender-vulnerability-management/tvm-security-baselines.md)</li><li>[Block vulnerable applications](../defender-vulnerability-management/tvm-block-vuln-apps.md)</li><li>[Browser extensions](../defender-vulnerability-management/tvm-browser-extensions.md)</li><li>[Digital certificate assessment](../defender-vulnerability-management/tvm-certificate-inventory.md)</li><li>[Network share analysis](../defender-vulnerability-management/tvm-network-share-assessment.md)</li><li>Support for [Windows](configure-endpoints.md) (client and server) and [non-Windows platforms](configure-endpoints-non-windows.md) (macOS, iOS, Android, and Linux)</li></ul> |
-| [Defender for Business](../defender-business/mdb-overview.md) <sup>[[1](#fn1)]</sup> | [Services optimized for small and medium-sized businesses](../defender-business/compare-mdb-m365-plans.md) include: <ul><li>Email protection</li><li>Antispam protection</li><li>Antimalware protection</li><li>Next-generation protection</li><li>Attack surface reduction</li><li>Endpoint detection and response</li><li>Automated investigation and response </li><li>Vulnerability management</li><li>Centralized reporting</li><li>APIs (for integration with custom apps or reporting solutions)</li><li>[Integration with Microsoft 365 Lighthouse](../defender-business/mdb-lighthouse-integration.md)</li></ul> |
+| [Defender for Endpoint Plan 1](defender-endpoint-plan-1.md) | - [Next-generation protection](defender-endpoint-plan-1.md#next-generation-protection) (includes antimalware and antivirus)<br/>- [Attack surface reduction](defender-endpoint-plan-1.md#attack-surface-reduction)<br/>- [Manual response actions](defender-endpoint-plan-1.md#manual-response-actions)<br/>- [Centralized management](defender-endpoint-plan-1.md#centralized-management)<br/>- [Security reports](defender-endpoint-plan-1.md#reporting)<br/>- [APIs](defender-endpoint-plan-1.md#apis)<br/>- [Support for Windows 10, iOS, Android OS, and macOS devices](defender-endpoint-plan-1.md#cross-platform-support)|
+| [Defender for Endpoint Plan 2](microsoft-defender-endpoint.md) | All of the Defender for Endpoint Plan 1 capabilities, plus:<br/>- [Device discovery](device-discovery.md)<br/>- [Device inventory](machines-view-overview.md)<br/>- [Core Defender Vulnerability Management capabilities](../defender-vulnerability-management/defender-vulnerability-management-capabilities.md)<br/>- [Threat Analytics](threat-analytics.md)<br/>- [Automated investigation and response](automated-investigations.md)<br/>- [Advanced hunting](advanced-hunting-overview.md)<br/>- [Endpoint detection and response](overview-endpoint-detection-response.md)<br/>- [Endpoint Attack Notifications](endpoint-attack-notifications.md)<br/>- Support for [Windows](configure-endpoints.md) (client only) and [non-Windows platforms](configure-endpoints-non-windows.md) (macOS, iOS, Android, and Linux) |
+| [Defender Vulnerability Management add-on](../defender-vulnerability-management/defender-vulnerability-management-capabilities.md) | More Defender Vulnerability Management capabilities for Defender for Endpoint Plan 2: <br/>- [Security baselines assessment](../defender-vulnerability-management/tvm-security-baselines.md)<br/>- [Block vulnerable applications](../defender-vulnerability-management/tvm-block-vuln-apps.md)<br/>- [Browser extensions](../defender-vulnerability-management/tvm-browser-extensions.md)<br/>- [Digital certificate assessment](../defender-vulnerability-management/tvm-certificate-inventory.md)<br/>- [Network share analysis](../defender-vulnerability-management/tvm-network-share-assessment.md)<br/>- Support for [Windows](configure-endpoints.md) (client and server) and [non-Windows platforms](configure-endpoints-non-windows.md) (macOS, iOS, Android, and Linux) |
+| [Defender for Business](../defender-business/mdb-overview.md) <sup>[[1](#fn1)]</sup> | [Services optimized for small and medium-sized businesses](../defender-business/compare-mdb-m365-plans.md) include: <br/>- Email protection<br/>- Antispam protection<br/>- Antimalware protection<br/>- Next-generation protection<br/>- Attack surface reduction<br/>- Endpoint detection and response<br/>- Automated investigation and response <br/>- Vulnerability management<br/>- Centralized reporting<br/>- APIs (for integration with custom apps or reporting solutions)<br/>- [Integration with Microsoft 365 Lighthouse](../defender-business/mdb-lighthouse-integration.md) |
(<a id="fn1">1</a>) Microsoft Defender for Business is available as a standalone subscription for small and medium-sized businesses. It's also included as part of [Microsoft 365 Business Premium](/microsoft-365/business-premium). These plans feature advanced security capabilities with a simplified setup and configuration experience. See [Compare Microsoft Defender for Business to Microsoft 365 Business Premium](/microsoft-365/security/defender-business/compare-mdb-m365-plans#compare-microsoft-defender-for-business-to-microsoft-365-business-premium).
Defender for Endpoint Plan 1 and 2 (standalone), Defender for Business (standalo
- **Microsoft Defender for Servers Plan 1 or Plan 2** (*recommended for enterprise customers*) as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering. To learn more. see [Overview of Microsoft Defender for Servers](/azure/defender-for-cloud/defender-for-servers-introduction). - **Microsoft Defender for Business servers** (*recommended for small and medium-sized businesses who have [Microsoft Defender for Business](../defender-business/mdb-overview.md)*). To learn more, see [How to get Microsoft Defender for Business servers](../defender-business/get-defender-business-servers.md).-- **Microsoft Defender for Endpoint for Servers**. See [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
+- **Microsoft Defender for Endpoint for Servers** (*if you already have these licenses*). See [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
## Mixed licensing scenarios
security Delete Library https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/delete-library.md
Last updated : 06/03/2021 # Delete a file from the live response library
security Delete Ti Indicator By Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/delete-ti-indicator-by-id.md
search.appverid: met150 Last updated : 12/18/2020 # Delete Indicator API
security Deploy Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/deploy-microsoft-defender-antivirus.md
- m365-security - tier2 search.appverid: met150 Last updated : 04/08/2021 # Deploy and enable Microsoft Defender Antivirus
security Deployment Phases https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/deployment-phases.md
search.appverid: met150 Last updated : 12/18/2020 # Microsoft Defender for Endpoint deployment overview
security Deployment Strategy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/deployment-strategy.md
search.appverid: met150 Last updated : 12/18/2020 # Plan your Microsoft Defender for Endpoint deployment
security Detect Block Potentially Unwanted Apps Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
- m365-security - tier2 search.appverid: met150 Last updated : 04/08/2021 # Detect and block potentially unwanted applications
security Device Discovery Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-discovery-faq.md
search.appverid: met150 Last updated : 03/23/2021 # Device discovery frequently asked questions
security Device Discovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-discovery.md
search.appverid: met150 Last updated : 03/23/2021 # Device discovery overview
security Device Timeline Event Flag https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-timeline-event-flag.md
search.appverid: met150 Last updated : 12/18/2020 # Microsoft Defender for Endpoint device timeline
security Download Client Analyzer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/download-client-analyzer.md
search.appverid: met150 Last updated : 03/23/2021 # Download the Microsoft Defender for Endpoint client analyzer
security Enable Controlled Folders https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-controlled-folders.md
- m365-security - tier3 Previously updated : search.appverid: met150 Last updated : 12/18/2020 # Enable controlled folder access
security Enable Microsoft Defender For Iot Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-microsoft-defender-for-iot-integration.md
- tier3 Last updated : 11/12/2021 # Onboard with Microsoft Defender for IoT
security Enable Troubleshooting Mode https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode.md
- tier2 Last updated : 10/14/2021 # Get started with troubleshooting mode in Microsoft Defender for Endpoint
security Endpoint Attack Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/endpoint-attack-notifications.md
search.appverid: met150 Last updated : 09/23/2022 # Endpoint Attack Notifications
security Evaluate Controlled Folder Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluate-controlled-folder-access.md
- m365-security - tier2 search.appverid: met150 Last updated : 12/18/2020 # Evaluate controlled folder access
security Evaluate Exploit Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluate-exploit-protection.md
- m365-security - tier2 search.appverid: met150 Last updated : 12/18/2020 # Evaluate exploit protection
security Evaluate Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluate-mde.md
- tier2 Last updated : 03/25/2021 # Evaluate Microsoft Defender for Endpoint
security Evaluate Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluate-network-protection.md
- m365-security - tier2 Previously updated : search.appverid: met150 Last updated : 12/18/2020 # Evaluate network protection
security Evaluation Lab https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluation-lab.md
search.appverid: met150 Last updated : 12/18/2020 # Microsoft Defender for Endpoint evaluation lab
security Exclude Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/exclude-devices.md
search.appverid: met150 Last updated : 02/16/2022 # Exclude devices
security Experts On Demand https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/experts-on-demand.md
search.appverid: met150 Last updated : 09/26/2022 # Ask Defender Experts
security Exploit Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/exploit-protection.md
- m365-security - tier2 search.appverid: met150 Last updated : 12/18/2020 # Protect devices from exploits
security Export Certificate Inventory Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/export-certificate-inventory-assessment.md
search.appverid: met150 Last updated : 05/02/2022 # Export certificate inventory per device
security Export Firmware Hardware Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/export-firmware-hardware-assessment.md
search.appverid: met150 Last updated : 11/24/2022 # Export Hardware and firmware assessment inventory per device
security Export Security Baseline Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/export-security-baseline-assessment.md
search.appverid: met150 Last updated : 05/02/2022 # Export security baselines assessment per device
security Feedback Loop Blocking https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/feedback-loop-blocking.md
- m365-security - tier2 search.appverid: met150 Last updated : 12/18/2020 # Feedback-loop blocking
security Fetch Alerts Mssp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/fetch-alerts-mssp.md
search.appverid: met150 Last updated : 12/18/2020 # Fetch alerts from MSSP customer tenant
security Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/files.md
search.appverid: met150 Last updated : 12/18/2020 # File resource type
security Find Defender Malware Name https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/find-defender-malware-name.md
search.appverid: met150 Last updated : 03/03/2022 # Find malware detection names for Microsoft Defender for Endpoint
security Find Machine Info By Ip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/find-machine-info-by-ip.md
search.appverid: met150 Last updated : 12/18/2020 # Find device information by internal IP API
security Find Machines By Ip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/find-machines-by-ip.md
search.appverid: met150 Last updated : 12/18/2020 # Find devices by internal IP API
security Find Machines By Tag https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/find-machines-by-tag.md
search.appverid: met150 Last updated : 02/02/2021 # Find devices by tag API
security Get Alert Info By Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-alert-info-by-id.md
search.appverid: met150 Last updated : 12/18/2020 # Get alert information by ID API
security Get Alert Related Domain Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-alert-related-domain-info.md
search.appverid: met150 Last updated : 12/18/2020 # Get alert related domain information API
security Get Alert Related Files Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-alert-related-files-info.md
search.appverid: met150 Last updated : 12/18/2020 # Get alert related files information API
security Get Alert Related Ip Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-alert-related-ip-info.md
search.appverid: met150 Last updated : 12/18/2020 # Get alert-related IPs' information API
security Get Alert Related Machine Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-alert-related-machine-info.md
search.appverid: met150 Last updated : 12/18/2020 # Get alert related machine information API
security Get Alert Related User Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-alert-related-user-info.md
search.appverid: met150 Last updated : 12/18/2020 # Get alert related user information API
security Get Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-alerts.md
search.appverid: met150 Last updated : 12/18/2020 # List alerts API
security Get All Recommendations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-all-recommendations.md
search.appverid: met150 Last updated : 12/18/2020 # List all recommendations
security Get All Scan Agents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-all-scan-agents.md
search.appverid: met150 Last updated : 12/14/2022 # Get all scan agents
security Get All Scan Definitions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-all-scan-definitions.md
search.appverid: met150 Last updated : 12/14/2022 # Get scan definitions
security Get All Vulnerabilities By Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-all-vulnerabilities-by-machines.md
search.appverid: met150 Last updated : 12/18/2020 # List vulnerabilities by machine and software
security Get All Vulnerabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-all-vulnerabilities.md
search.appverid: met150 Last updated : 12/18/2020 # List vulnerabilities
security Get Assessment Browser Extensions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-assessment-browser-extensions.md
search.appverid: met150 Last updated : 06/01/2022 # Export browser extensions assessment per device
security Get Assessment Information Gathering https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-assessment-information-gathering.md
search.appverid: met150 Last updated : 07/26/2022 # Information gathering assessment per device
security Get Assessment Methods Properties https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-assessment-methods-properties.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security-+ ms.localizationpriority: medium
search.appverid: met150 Last updated : 06/04/2021 # Export assessment methods and properties per device
security Get Assessment Non Cpe Software Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-assessment-non-cpe-software-inventory.md
search.appverid: met150 Last updated : 05/27/2022 # Export non product code software inventory assessment per device
security Get Assessment Secure Config https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-assessment-secure-config.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security-+ ms.localizationpriority: medium
search.appverid: met150 Last updated : 06/04/2021 # Export secure configuration assessment per device
security Get Assessment Software Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-assessment-software-inventory.md
search.appverid: met150 Last updated : 06/04/2021 <!-- v-jweston/jweston-1 is scheduled to resume authorship Apr/May 2023.-->
security Get Assessment Software Vulnerabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-assessment-software-vulnerabilities.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security-+ ms.localizationpriority: medium
search.appverid: met150 Last updated : 06/04/2021 # Export software vulnerabilities assessment per device
security Get Authenticated Scan Properties https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-authenticated-scan-properties.md
search.appverid: met150 Last updated : 12/14/2022 # Authenticated scan methods and properties
security Get Browser Extensions Permission Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-browser-extensions-permission-info.md
search.appverid: met150 Last updated : 06/01/2022 # Get browser extensions permission information
security Get Device Secure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-device-secure-score.md
search.appverid: met150 Last updated : 12/18/2020 # Get device secure score
security Get Discovered Vulnerabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-discovered-vulnerabilities.md
search.appverid: met150 Last updated : 12/18/2020 # Get discovered vulnerabilities
security Get Domain Related Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-domain-related-alerts.md
search.appverid: met150 Last updated : 12/18/2020 # Get domain-related alerts API
security Get Domain Related Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-domain-related-machines.md
search.appverid: met150 Last updated : 12/18/2020 # Get domain-related machines API
security Get Domain Statistics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-domain-statistics.md
search.appverid: met150 Last updated : 12/18/2020 # Get domain statistics API
security Get Exposure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-exposure-score.md
search.appverid: met150 Last updated : 12/18/2020 # Get exposure score
security Get File Information https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-file-information.md
search.appverid: met150 Last updated : 12/18/2020 # Get file information API
security Get File Related Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-file-related-alerts.md
search.appverid: met150 Last updated : 12/18/2020 # Get file-related alerts API
security Get File Related Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-file-related-machines.md
search.appverid: met150 Last updated : 12/18/2020 # Get file-related machines API
security Get File Statistics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-file-statistics.md
search.appverid: met150 Last updated : 12/18/2020 # Get file statistics API
security Get Installed Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-installed-software.md
search.appverid: met150 Last updated : 12/18/2020 # Get installed software
security Get Investigation Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-investigation-collection.md
search.appverid: met150 Last updated : 12/18/2020 # List Investigations API
security Get Investigation Object https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-investigation-object.md
search.appverid: met150 Last updated : 12/18/2020 # Get Investigation API
security Get Ip Related Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-ip-related-alerts.md
search.appverid: met150 Last updated : 12/18/2020 # Get IP related alerts API
security Get Ip Statistics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-ip-statistics.md
search.appverid: met150 Last updated : 12/18/2020 # Get IP statistics API
security Get Live Response Result https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-live-response-result.md
Last updated : 06/03/2021 # Get live response results
security Get Machine By Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-machine-by-id.md
search.appverid: met150 Last updated : 12/18/2020 # Get machine by ID API
security Get Machine Group Exposure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-machine-group-exposure-score.md
search.appverid: met150 Last updated : 12/18/2020 # List exposure score by device group
security Get Machine Log On Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-machine-log-on-users.md
search.appverid: met150 Last updated : 12/18/2020 # Get machine logon users API
security Get Machine Related Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-machine-related-alerts.md
search.appverid: met150 Last updated : 12/18/2020 # Get machine related alerts API
security Get Machineaction Object https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-machineaction-object.md
search.appverid: met150 Last updated : 12/18/2020 # Get machineAction API
security Get Machineactions Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-machineactions-collection.md
search.appverid: met150 Last updated : 12/18/2020 # List MachineActions API
security Get Machines By Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-machines-by-software.md
search.appverid: met150 Last updated : 12/18/2020 # List devices by software
security Get Machines By Vulnerability https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-machines-by-vulnerability.md
search.appverid: met150 Last updated : 12/18/2020 # List devices by vulnerability
security Get Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-machines.md
search.appverid: met150 Last updated : 12/18/2020 # List machines API
security Get Missing Kbs Machine https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-missing-kbs-machine.md
search.appverid: met150 Last updated : 12/18/2020 # Get missing KBs by device ID
security Get Missing Kbs Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-missing-kbs-software.md
search.appverid: met150 Last updated : 12/18/2020 # Get missing KBs by software ID
security Get Package Sas Uri https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-package-sas-uri.md
search.appverid: met150 Last updated : 12/18/2020 # Get package SAS URI API
security Get Recommendation By Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-recommendation-by-id.md
search.appverid: met150 Last updated : 12/18/2020 # Get recommendation by ID
security Get Recommendation Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-recommendation-machines.md
search.appverid: met150 Last updated : 12/18/2020 # List devices by recommendation
security Get Recommendation Vulnerabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-recommendation-vulnerabilities.md
search.appverid: met150 Last updated : 12/18/2020 # List vulnerabilities by recommendation
security Get Remediation All Activities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-remediation-all-activities.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security-+ ms.localizationpriority: medium
search.appverid: met150 Last updated : 04/25/2021 # List all remediation activities
security Get Remediation Exposed Devices Activities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-remediation-exposed-devices-activities.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security-+ ms.localizationpriority: medium
search.appverid: met150 Last updated : 04/25/2021 # List exposed devices of one remediation activity
security Get Remediation Methods Properties https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-remediation-methods-properties.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security-+ ms.localizationpriority: medium
search.appverid: met150 Last updated : 04/24/2021 # Remediation activity methods and properties
security Get Remediation One Activity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-remediation-one-activity.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security-+ ms.localizationpriority: medium
search.appverid: met150 Last updated : 04/25/2021 # Get one remediation activity by ID
security Get Security Baselines Assessment Configurations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-security-baselines-assessment-configurations.md
search.appverid: met150 Last updated : 05/02/2022 # List security baselines assessment configurations
security Get Security Baselines Assessment Profiles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-security-baselines-assessment-profiles.md
search.appverid: met150 Last updated : 05/02/2022 # List all security baselines assessment profiles
security Get Security Recommendations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-security-recommendations.md
search.appverid: met150 Last updated : 12/18/2020 # Get security recommendations
security Get Software By Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-software-by-id.md
search.appverid: met150 Last updated : 12/18/2020 # Get software by ID
security Get Software Ver Distribution https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-software-ver-distribution.md
search.appverid: met150 Last updated : 12/18/2020 # List software version distribution
security Get Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-software.md
search.appverid: met150 Last updated : 12/18/2020 # List software inventory API
security Get Started Partner Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-started-partner-integration.md
search.appverid: met150 Last updated : 12/18/2020 # Become a Microsoft Defender for Endpoint partner
security Get Ti Indicators Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-ti-indicators-collection.md
search.appverid: met150 Last updated : 12/18/2020 # List Indicators API
security Get User Related Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-user-related-alerts.md
search.appverid: met150 Last updated : 12/18/2020 # Get user-related alerts API
security Get User Related Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-user-related-machines.md
search.appverid: met150 Last updated : 12/18/2020 # Get user-related machines API
security Get Vuln By Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-vuln-by-software.md
search.appverid: met150 Last updated : 12/18/2020 # List vulnerabilities by software
security Get Vulnerability By Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-vulnerability-by-id.md
search.appverid: met150 Last updated : 12/18/2020 # Get vulnerability by ID
security Grant Mssp Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/grant-mssp-access.md
search.appverid: met150 Last updated : 12/18/2020 # Grant managed security service provider (MSSP) access (preview)
security Health Status https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/health-status.md
search.appverid: met150 Last updated : 05/06/2021 # Investigate agent health issues
security Helpful Resources https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/helpful-resources.md
search.appverid: met150 Last updated : 12/18/2020 # Helpful Microsoft Defender for Endpoint resources
security Import Export Exploit Protection Emet Xml https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/import-export-exploit-protection-emet-xml.md
- m365-security - tier2 Previously updated : search.appverid: met150 Last updated : 12/18/2020 # Import, export, and deploy exploit protection configurations
security Import Ti Indicators https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/import-ti-indicators.md
search.appverid: met150 Last updated : 02/02/2021 # Import Indicators API
security Indicator Certificates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/indicator-certificates.md
search.appverid: met150 Last updated : 12/18/2020 # Create indicators based on certificates
security Indicator Ip Domain https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/indicator-ip-domain.md
search.appverid: met150 Last updated : 12/18/2020 # Create indicators for IPs and URLs/domains
security Indicator Manage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/indicator-manage.md
search.appverid: met150 Last updated : 12/18/2020 # Manage indicators
security Information Protection Investigation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/information-protection-investigation.md
search.appverid: met150 Last updated : 12/18/2020 # Microsoft Defender for Endpoint sensitivity labels protect and prioritize incident response
security Initiate Autoir Investigation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/initiate-autoir-investigation.md
search.appverid: met150 Last updated : 12/18/2020 # Start Investigation API
security Investigate Behind Proxy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-behind-proxy.md
search.appverid: met150 Last updated : 12/18/2020 # Investigate connection events that occur behind forward proxies
security Investigate Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-incidents.md
- tier1 Last updated : 12/18/2020 # Investigate incidents in Microsoft Defender for Endpoint
security Investigate Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-machines.md
search.appverid: met150 Last updated : 12/18/2020 # Investigate devices in the Microsoft Defender for Endpoint Devices list
security Investigation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigation.md
search.appverid: met150 Last updated : 12/18/2020 # Investigation resource type
security Ios Configure Features https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-configure-features.md
search.appverid: met150 Last updated : 12/18/2020 # Configure Microsoft Defender for Endpoint on iOS features
security Ios Install Unmanaged https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-install-unmanaged.md
search.appverid: met150 Last updated : 07/18/2021 # Deploy Microsoft Defender for Endpoint on iOS with Mobile Application Manager
security Ios Install https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-install.md
search.appverid: met150 Last updated : 12/18/2020 # Deploy Microsoft Defender for Endpoint on iOS with Microsoft Endpoint Manager
security Ios Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-privacy.md
search.appverid: met150 Last updated : 12/18/2020 # Privacy information - Microsoft Defender for Endpoint on iOS
security Ios Troubleshoot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-troubleshoot.md
search.appverid: met150 Last updated : 05/15/2021 # Troubleshoot issues and find answers to FAQs on Microsoft Defender for Endpoint on iOS
search.appverid: met150
> [!NOTE] > **Control Filter not working as expected on Supervised devices**
-Control Filter is not working as expected from iOS 16.1 onwards. This has impacted the Web Protection capability for Supervised devices without local loopback VPN. The issue has been acknowledge by iOS platform. As a temporary fix, the loopback VPN has been enabled for the affected devices where the users will be asked to setup the loopback VPN. The fix is available with the new version - 1.1.36120102. The issue is expected to be resolved with iOS 16.3. Once the issue is resolved by Apple, we will re-enable the support for Control filter.
+Control Filter is not working as expected from iOS 16.1 onwards. This has impacted the Web Protection capability for Supervised devices without local loopback VPN. The issue has been resolved with iOS 16.3. Support for Control Filter is re-enabled with the new version - 1.1.38010102.
This topic provides troubleshooting information to help you address issues that may arise as you use Microsoft Defender for Endpoint on iOS.
security Isolate Machine https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/isolate-machine.md
search.appverid: met150 Last updated : 12/18/2020 # Isolate machine API
security Linux Deploy Defender For Endpoint With Chef https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-deploy-defender-for-endpoint-with-chef.md
search.appverid: met150 Last updated : 04/07/2021 # Deploy Defender for Endpoint on Linux with Chef
security Linux Exclusions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-exclusions.md
search.appverid: met150 Last updated : 12/18/2020 # Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
security Linux Install Manually https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-manually.md
search.appverid: met150 Last updated : 12/18/2020 # Deploy Microsoft Defender for Endpoint on Linux manually
security Linux Install With Ansible https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-with-ansible.md
search.appverid: met150 Last updated : 12/18/2020 # Deploy Microsoft Defender for Endpoint on Linux with Ansible
security Linux Install With Puppet https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-with-puppet.md
search.appverid: met150 Last updated : 12/18/2020 # Deploy Microsoft Defender for Endpoint on Linux with Puppet
security Linux Install With Saltack https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-with-saltack.md
search.appverid: met150 Last updated : 01/19/2023 # Deploy Microsoft Defender for Endpoint on Linux with Saltstack
security Linux Preferences https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-preferences.md
To verify that your /etc/opt/microsoft/mdatp/managed/mdatp_managed.json is worki
- automatic_definition_update_enabled > [!NOTE]
-> For the mdatp_managed.json to take effect, no restart of the `mdatp` deamon is required.
-
+> No restart of mdatp daemon is required for changes to _most_ configurations in mdatp_managed.json to take effect.
+ **Exception:** The following configurations require a daemon restart to take effect:
+> - cloud-diagnostic
+> - log-rotation-parameters
## Configuration profile deployment
security Linux Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-privacy.md
search.appverid: met150 Last updated : 12/18/2020 # Privacy for Microsoft Defender for Endpoint on Linux
security Linux Pua https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-pua.md
search.appverid: met150 Last updated : 12/18/2020 # Detect and block potentially unwanted applications with Microsoft Defender for Endpoint on Linux
security Linux Resources https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-resources.md
search.appverid: met150 Last updated : 12/18/2020 # Resources
security Linux Schedule Scan Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-schedule-scan-mde.md
search.appverid: met150 Last updated : 10/22/2021 # Schedule scans with Microsoft Defender for Endpoint (Linux)
security Linux Static Proxy Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-static-proxy-configuration.md
search.appverid: met150 Last updated : 12/18/2020 # Configure Microsoft Defender for Endpoint on Linux for static proxy discovery
security Linux Support Connectivity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-connectivity.md
search.appverid: met150 Last updated : 12/18/2020 # Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux
security Linux Support Events https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-events.md
search.appverid: met150 Last updated : 02/02/2021 # Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux
security Linux Support Install https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-install.md
search.appverid: met150 Last updated : 12/18/2020 # Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux
security Linux Support Rhel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-rhel.md
- tier3 Last updated : 10/06/2021 # Troubleshoot issues for Microsoft Defender for Endpoint on Linux RHEL6
security Linux Update Mde Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-update-mde-linux.md
search.appverid: met150 Last updated : 10/06/2021 # Schedule an update of the Microsoft Defender for Endpoint (Linux)
security Linux Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-updates.md
search.appverid: met150 Last updated : 12/18/2020 # Deploy updates for Microsoft Defender for Endpoint on Linux
security List Library Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/list-library-files.md
Last updated : 06/03/2021 # List library files
security List Recommendation Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/list-recommendation-software.md
search.appverid: met150 Last updated : 08/11/2021 # List software by recommendation
security Live Response Command Examples https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/live-response-command-examples.md
search.appverid: met150 Last updated : 12/18/2020 # Live response command examples
security Live Response Library Methods https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/live-response-library-methods.md
- tier3 Last updated : 06/03/2021 # Live response library methods and properties
security Live Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/live-response.md
search.appverid: met150 Last updated : 12/18/2020 # Investigate entities on devices using live response
security Mac Device Control Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-intune.md
search.appverid: met150 Last updated : 03/22/2021 # Examples of device control policies for Intune
security Mac Device Control Jamf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-jamf.md
search.appverid: met150 Last updated : 03/22/2021 # Examples of device control policies for JAMF
security Mac Device Control Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-overview.md
search.appverid: met150 Last updated : 03/22/2021 # Device control for macOS
security Mac Exclusions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-exclusions.md
search.appverid: met150 Last updated : 12/18/2020 # Configure and validate exclusions for Microsoft Defender for Endpoint on macOS
security Mac Install Jamfpro Login https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-install-jamfpro-login.md
search.appverid: met150 Last updated : 12/18/2020 # Log in to Jamf Pro
search.appverid: met150
:::image type="content" source="images/jamf-pro-dashboard.png" alt-text="The Jamf Pro dashboard2" lightbox="images/jamf-pro-dashboard.png":::
-3. You will see the settings that are available.
+3. You'll see the settings that are available.
:::image type="content" source="images/jamfpro-settings.png" alt-text="The Jamf Pro dashboard3" lightbox="images/jamfpro-settings.png":::
security Mac Install Manually https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-install-manually.md
search.appverid: met150 Last updated : 12/18/2020 # Manual deployment for Microsoft Defender for Endpoint on macOS
security Mac Install With Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-install-with-intune.md
search.appverid: met150 Last updated : 12/18/2020 # Deploy Microsoft Defender for Endpoint on macOS with Microsoft Endpoint Manager
security Mac Install With Jamf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-install-with-jamf.md
search.appverid: met150 Last updated : 12/18/2020 # Deploying Microsoft Defender for Endpoint on macOS with Jamf Pro
security Mac Install With Other Mdm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-install-with-other-mdm.md
search.appverid: met150 Last updated : 12/18/2020 # Deployment with a different Mobile Device Management (MDM) system for Microsoft Defender for Endpoint on macOS
security Mac Jamfpro Device Groups https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-jamfpro-device-groups.md
search.appverid: met150 Last updated : 12/18/2020 # Set up Microsoft Defender for Endpoint on macOS device groups in Jamf Pro
security Mac Jamfpro Enroll Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-jamfpro-enroll-devices.md
search.appverid: met150 Last updated : 12/18/2020 # Enroll Microsoft Defender for Endpoint on macOS devices into Jamf Pro
security Mac Jamfpro Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-jamfpro-policies.md
search.appverid: met150 Last updated : 12/18/2020 # Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro
security Mac Preferences https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-preferences.md
search.appverid: met150 Last updated : 12/18/2020 # Set preferences for Microsoft Defender for Endpoint on macOS
security Mac Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-privacy.md
search.appverid: met150 Last updated : 12/18/2020 # Privacy for Microsoft Defender for Endpoint on macOS
security Mac Pua https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-pua.md
search.appverid: met150 Last updated : 12/18/2020 # Detect and block potentially unwanted applications with Microsoft Defender for Endpoint on macOS
security Mac Resources https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-resources.md
search.appverid: met150 Last updated : 12/18/2020 # Resources for Microsoft Defender for Endpoint on macOS
security Mac Schedule Scan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-schedule-scan.md
search.appverid: met150 Last updated : 03/26/2021 # Schedule scans with Microsoft Defender for Endpoint on macOS
security Mac Support Install https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-support-install.md
search.appverid: met150 Last updated : 12/18/2020 # Troubleshoot installation issues for Microsoft Defender for Endpoint on macOS
security Mac Support Kext https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-support-kext.md
search.appverid: met150 Last updated : 12/18/2020 # Troubleshoot kernel extension issues in Microsoft Defender for Endpoint on macOS
security Mac Support License https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-support-license.md
search.appverid: met150 Last updated : 12/18/2020 # Troubleshoot license issues for Microsoft Defender for Endpoint on macOS
security Mac Support Perf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-support-perf.md
search.appverid: met150 Last updated : 12/18/2020 # Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
security Mac Sysext Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-sysext-policies.md
Last updated : 12/18/2020 # New configuration profiles for macOS Big Sur and newer versions of macOS
security Mac Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-updates.md
search.appverid: met150 Last updated : 12/18/2020 # Deploy updates for Microsoft Defender for Endpoint on macOS
security Machine Groups https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machine-groups.md
search.appverid: met150 Last updated : 12/18/2020 # Create and manage device groups
security Machine Tags https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machine-tags.md
search.appverid: met150 Last updated : 12/18/2020 # Create and manage device tags
security Machine https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machine.md
search.appverid: met150 Last updated : 12/18/2020 # Machine resource type
security Machineaction https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machineaction.md
search.appverid: met150 Last updated : 12/18/2020 # MachineAction resource type
security Machines View Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machines-view-overview.md
search.appverid: met150 Last updated : 12/18/2020 # Device inventory
security Manage Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-alerts.md
search.appverid: met150 Last updated : 12/18/2020 # Manage Microsoft Defender for Endpoint alerts
security Manage Automation File Uploads https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-automation-file-uploads.md
search.appverid: met150 Last updated : 12/18/2020 # Manage automation file uploads
security Manage Automation Folder Exclusions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-automation-folder-exclusions.md
search.appverid: met150 Last updated : 12/18/2020 # Manage automation folder exclusions
security Manage Gradual Rollout https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-gradual-rollout.md
search.appverid: met150 Last updated : 06/23/2021 # Manage the gradual rollout process for Microsoft Defender updates
security Manage Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-incidents.md
- tier2 Last updated : 12/18/2020 # Manage Microsoft Defender for Endpoint incidents
security Manage Indicators https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-indicators.md
search.appverid: met150 Last updated : 12/18/2020 # Create indicators
security Manage Mde Post Migration Other Tools https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-mde-post-migration-other-tools.md
search.appverid: met150 Last updated : 10/22/2021 # Manage Microsoft Defender for Endpoint with PowerShell, WMI, and MPCmdRun.exe
security Manage Outdated Endpoints Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-outdated-endpoints-microsoft-defender-antivirus.md
- m365-security - tier3 search.appverid: met150 Last updated : 04/08/2021 # Manage Microsoft Defender Antivirus updates and scans for endpoints that are out of date
security Manage Protection Updates Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-protection-updates-microsoft-defender-antivirus.md
- m365-security - tier2 search.appverid: met150 Last updated : 04/08/2021 # Manage the sources for Microsoft Defender Antivirus protection updates
security Manage Suppression Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-suppression-rules.md
search.appverid: met150 Last updated : 12/18/2020 # Manage suppression rules
security Manage Updates Mobile Devices Vms Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md
- m365-security - tier2 search.appverid: met150 Last updated : 04/08/2021 # Manage updates for mobile devices and virtual machines (VMs)
security Management Apis https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/management-apis.md
search.appverid: met150 Last updated : 12/18/2020 # Overview of management and APIs
security Microsoft Cloud App Security Config https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-cloud-app-security-config.md
search.appverid: met150 Last updated : 12/18/2020 # Configure Microsoft Defender for Cloud Apps in Microsoft Defender for Endpoint
security Microsoft Defender Endpoint Android https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-android.md
search.appverid: met150 Last updated : 03/22/2021 # Microsoft Defender for Endpoint on Android
security Microsoft Defender Endpoint Ios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-ios.md
search.appverid: met150 Last updated : 03/22/2021 # Microsoft Defender for Endpoint on iOS
security Microsoft Defender Endpoint Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-linux.md
search.appverid: met150 Last updated : 03/22/2021 # Microsoft Defender for Endpoint on Linux
security Microsoft Defender Endpoint Mac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-mac.md
search.appverid: met150 Last updated : 03/22/2021 # Microsoft Defender for Endpoint on Mac
security Microsoft Defender Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint.md
search.appverid: met150 Last updated : 03/24/2021 # Microsoft Defender for Endpoint
security Microsoft Defender Security Center Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-security-center-antivirus.md
- m365-security - tier2 search.appverid: met150 Last updated : 04/08/2021 # Microsoft Defender Antivirus in the Windows Security app
security Migrating Asr Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/migrating-asr-rules.md
- m365-security - tier2 search.appverid: met150 Last updated : 03/26/2021 # Migrating from a third-party HIPS to ASR rules
security Mssp Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mssp-support.md
search.appverid: met150 Last updated : 12/18/2020 # Managed security service provider partnership opportunities
security Network Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-devices.md
search.appverid: met150 Last updated : 03/30/2021 # Network device discovery and vulnerability management
security Network Protection Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection-linux.md
- m365-security - tier2 Previously updated : search.appverid: met150 Last updated : 08/09/2022 + <!--v-jweston/jweston-1 is to resume authorship appx. April/May 2023.--> # Network protection for Linux
security Next Generation Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/next-generation-protection.md
- m365-security - tier1 search.appverid: met150 Last updated : 07/06/2021 # Next-generation protection overview
security Non Windows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/non-windows.md
search.appverid: met150 Last updated : 12/18/2020 # Microsoft Defender for Endpoint on other platforms
security Offboard Machine Api https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/offboard-machine-api.md
search.appverid: met150 Last updated : 12/18/2020 # Offboard machine API
security Offboard Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/offboard-machines.md
search.appverid: met150 Last updated : 12/18/2020 # Offboard devices from the Microsoft Defender for Endpoint service
security Office 365 Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/office-365-microsoft-defender-antivirus.md
- m365-security - tier2 search.appverid: met150 Last updated : 04/08/2021 # Better together: Microsoft Defender Antivirus and Office 365
security Onboard Downlevel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-downlevel.md
search.appverid: met150 Last updated : 12/18/2020 # Onboard previous versions of Windows
security Onboard Offline Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-offline-machines.md
search.appverid: met150 Last updated : 12/18/2020 # Onboard devices without Internet access to Microsoft Defender for Endpoint
security Onboard Windows Client https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-windows-client.md
search.appverid: met150 Last updated : 05/19/2022 # Defender for Endpoint onboarding Windows Client
security Onboard Windows Multi Session Device https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-windows-multi-session-device.md
- tier3 search.appverid: met150 Last updated : 10/04/2021 # Onboard Windows devices in Azure Virtual Desktop
security Onboard Windows Server https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-windows-server.md
search.appverid: met150 Last updated : 05/19/2022 # Defender for Endpoint onboarding Windows Server
search.appverid: met150
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:**+ - Windows Server 2008 R2 - Windows Server 2012 R2 - Windows Server 2016
For guidance on how to download and use Windows Security Baselines for Windows s
## License requirement
-In order to be eligible to purchase Microsoft Defender for Endpoint Server SKU, you must have already purchased a combined minimum of any of the following: Windows E5/A5, Microsoft 365 E5/A5, or Microsoft 365 E5 Security subscription licenses.
+To be eligible to acquire Microsoft Defender for Endpoint Server licenses (one per covered server instance), you must have already purchased a combined minimum of 50 licenses for one or more of the following:
+
+- Microsoft Defender for Endpoint (per user)
+- Windows E5/A5
+- Microsoft 365 E5/A5
+- Microsoft 365 E5 Security User subscription licenses
## Windows Server onboarding overview
security Onboarding Endpoint Configuration Manager https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboarding-endpoint-configuration-manager.md
search.appverid: met150 Last updated : 12/18/2020 # Onboarding using Microsoft Endpoint Configuration Manager
security Onboarding Endpoint Manager https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboarding-endpoint-manager.md
search.appverid: met150 Last updated : 12/18/2020 # Onboarding using Microsoft Endpoint Manager
security Onboarding Notification https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboarding-notification.md
- tier2 Last updated : 12/18/2020 # Create a notification rule when a local onboarding or offboarding script is used
security Onboarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboarding.md
search.appverid: met150 Last updated : 12/18/2020 # Onboard to the Microsoft Defender for Endpoint service
security Overview Client Analyzer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/overview-client-analyzer.md
search.appverid: met150 Last updated : 03/23/2021 # Troubleshoot sensor health using Microsoft Defender for Endpoint Client Analyzer
security Overview Endpoint Detection Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response.md
search.appverid: met150 Last updated : 12/18/2020 # Overview of endpoint detection and response
security Partner Applications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/partner-applications.md
search.appverid: met150 Last updated : 12/18/2020 # Partner applications in Microsoft Defender for Endpoint
security Partner Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/partner-integration.md
search.appverid: met150 Last updated : 12/18/2020 # Microsoft Defender for Endpoint partner opportunities and scenarios
security Post Ti Indicator https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/post-ti-indicator.md
search.appverid: met150 Last updated : 12/18/2020 # Submit or Update Indicator API
security Preferences Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/preferences-setup.md
search.appverid: met150 Last updated : 12/18/2020 # Configure general Defender for Endpoint settings
security Prepare Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/prepare-deployment.md
search.appverid: met150 Last updated : 12/18/2020 # Prepare Microsoft Defender for Endpoint deployment
security Preview Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/preview-settings.md
- tier2 Last updated : 12/18/2020 + # Turn on the preview experience in Microsoft Defender for Endpoint [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
security Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/preview.md
- tier2 Last updated : 12/18/2020 # Microsoft Defender for Endpoint preview features
security Production Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/production-deployment.md
search.appverid: met150 Last updated : 12/18/2020 # Set up Microsoft Defender for Endpoint deployment
security Professional Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/professional-services.md
search.appverid: met150 Last updated : 09/28/2022 # Professional services supported by Microsoft 365 Defender
security Raw Data Export Event Hub https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/raw-data-export-event-hub.md
search.appverid: met150 Last updated : 12/18/2020 # Configure Microsoft Defender for Endpoint to stream Advanced Hunting events to your Azure Event Hubs
security Raw Data Export Storage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/raw-data-export-storage.md
search.appverid: met150 Last updated : 12/18/2020 # Configure Microsoft Defender for Endpoint to stream Advanced Hunting events to your Storage account
security Raw Data Export https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/raw-data-export.md
search.appverid: met150 Last updated : 12/18/2020 # Raw Data Streaming API
security Rbac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/rbac.md
search.appverid: met150 Last updated : 12/18/2020 # Manage portal access using role-based access control
security Recommendation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/recommendation.md
search.appverid: met150 Last updated : 12/18/2020 # Recommendation resource type
security Report Monitor Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/report-monitor-microsoft-defender-antivirus.md
- m365-security - tier2 search.appverid: met150 Last updated : 04/08/2021 # Report on Microsoft Defender Antivirus
security Respond File Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/respond-file-alerts.md
search.appverid: met150 Last updated : 12/18/2020 # Take response actions on a file
security Restrict Code Execution https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/restrict-code-execution.md
search.appverid: met150 Last updated : 12/18/2020 # Restrict app execution API
security Run Advanced Query Api https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-advanced-query-api.md
search.appverid: met150 Last updated : 12/18/2020 # Advanced hunting API
security Run Advanced Query Sample Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-advanced-query-sample-powershell.md
search.appverid: met150 Last updated : 12/18/2020 # Advanced Hunting using PowerShell
security Run Advanced Query Sample Python https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-advanced-query-sample-python.md
search.appverid: met150 Last updated : 12/18/2020 # Advanced Hunting using Python
security Run Analyzer Windows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-analyzer-windows.md
search.appverid: met150 Last updated : 03/23/2021 # Run the client analyzer on Windows
security Run Av Scan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-av-scan.md
ms.localizationpriority: medium audience: ITPro
-m
+ - m365-security - tier3 search.appverid: met150 Last updated : 12/18/2020 # Run antivirus scan API
security Run Live Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-live-response.md
Last updated : 06/03/2021 # Run live response commands on a device
security Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/score.md
search.appverid: met150 Last updated : 12/18/2020 # Score resource type
security Set Device Value https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/set-device-value.md
search.appverid: met150 Last updated : 12/18/2020 # Set device value API
security Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/software.md
search.appverid: met150 Last updated : 12/18/2020 # Software resource type
security Stop And Quarantine File https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/stop-and-quarantine-file.md
search.appverid: met150 Last updated : 12/18/2020 # Stop and quarantine file API
security Supported Capabilities By Platform https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/supported-capabilities-by-platform.md
search.appverid: met150 Last updated : 08/26/2022 # Supported Microsoft Defender for Endpoint capabilities by platform
security Supported Response Apis https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/supported-response-apis.md
Last updated : 12/18/2020 # Supported Microsoft Defender for Endpoint query APIs
security Tamperprotection Macos https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/tamperprotection-macos.md
search.appverid: met150 Last updated : 05/10/2022 # Protect macOS security settings with tamper protection
security Techniques Device Timeline https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/techniques-device-timeline.md
- tier2 Last updated : 03/15/2021 # Techniques in the device timeline
security Technological Partners https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/technological-partners.md
search.appverid: met150 Last updated : 09/28/2022 # Technological partners of Microsoft 365 Defender
security Threat Analytics Analyst Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/threat-analytics-analyst-reports.md
search.appverid: met150 Last updated : 12/18/2020 # The analyst report in threat analytics
security Threat Analytics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/threat-analytics.md
- tier1 Last updated : 12/18/2020 # Track and respond to emerging threats through threat analytics
security Threat Indicator Concepts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/threat-indicator-concepts.md
search.appverid: met150 Last updated : 12/18/2020 # Understand threat intelligence concepts
security Threat Protection Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/threat-protection-integration.md
search.appverid: met150 Last updated : 12/18/2020 # Microsoft Defender for Endpoint and other Microsoft solutions
security Threat Protection Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/threat-protection-reports.md
search.appverid: met150 Last updated : 12/18/2020 # Threat protection report in Microsoft Defender for Endpoint
security Ti Indicator https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ti-indicator.md
search.appverid: met150 Last updated : 12/18/2020 # Indicator resource type
security Time Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/time-settings.md
search.appverid: met150 Last updated : 12/18/2020 # Microsoft 365 Defender time zone settings
security Troubleshoot Asr Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-asr-rules.md
- m365-security - tier3 search.appverid: met150 Last updated : 04/21/2021 # Report and troubleshoot Microsoft Defender for Endpoint ASR Rules
security Troubleshoot Cloud Connect Mdemac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-cloud-connect-mdemac.md
search.appverid: met150 Last updated : 03/25/2021 # Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on macOS
security Troubleshoot Collect Support Log https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-collect-support-log.md
search.appverid: met150 Last updated : 12/18/2020 # Collect support logs in Microsoft Defender for Endpoint using live response
security Troubleshoot Live Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-live-response.md
search.appverid: met150 Last updated : 12/18/2020 # Troubleshoot Microsoft Defender for Endpoint live response issues
security Troubleshoot Mdatp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-mdatp.md
search.appverid: met150 Last updated : 12/18/2020 # Troubleshoot service issues
security Troubleshoot Microsoft Defender Antivirus When Migrating https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus-when-migrating.md
- m365-security - tier1 search.appverid: met150 Last updated : 04/08/2021 # Troubleshoot Microsoft Defender Antivirus while migrating from a third-party solution
security Troubleshoot Np https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-np.md
- m365-security - tier3 search.appverid: met150 Last updated : 12/18/2020 # Troubleshoot network protection
security Troubleshoot Onboarding Error Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-onboarding-error-messages.md
search.appverid: met150 Last updated : 12/18/2020 # Troubleshoot subscription and portal access issues
security Troubleshoot Onboarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-onboarding.md
search.appverid: met150 Last updated : 12/18/2020 # Troubleshoot Microsoft Defender for Endpoint onboarding issues
security Troubleshoot Reporting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-reporting.md
- m365-security - tier3 search.appverid: met150 Last updated : 04/08/2021 # Troubleshoot Microsoft Defender Antivirus reporting in Update Compliance
security Troubleshoot Security Config Mgt https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-security-config-mgt.md
search.appverid: met150 Last updated : 10/19/2021 # Troubleshoot onboarding issues related to Security Management for Microsoft Defender for Endpoint
security Troubleshoot Siem https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-siem.md
search.appverid: met150 Last updated : 12/18/2020 # Troubleshoot SIEM tool integration issues
security Troubleshooting Mode Scenarios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshooting-mode-scenarios.md
- tier3 Last updated : 05/04/2022 # Troubleshooting mode scenarios in Microsoft Defender for Endpoint
security Unisolate Machine https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/unisolate-machine.md
search.appverid: met150 Last updated : 12/18/2020 # Release device from isolation API
security Unrestrict Code Execution https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/unrestrict-code-execution.md
search.appverid: met150 Last updated : 12/18/2020 # Remove app restriction API
security Update Alert https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/update-alert.md
search.appverid: met150 Last updated : 12/18/2020 # Update alert
security Update Machine Method https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/update-machine-method.md
search.appverid: met150 Last updated : 06/11/2021 # Update machine
security Upload Library https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/upload-library.md
Last updated : 06/03/2021 # Upload files to the live response library
security User Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/user-roles.md
search.appverid: met150 Last updated : 12/18/2020 # Create and manage roles for role-based access control
security User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/user.md
search.appverid: met150 Last updated : 12/18/2020 # User resource type
security View Incidents Queue https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/view-incidents-queue.md
search.appverid: met150 Last updated : 12/18/2020 # View and organize the Microsoft Defender for Endpoint Incidents queue
security Vulnerability https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/vulnerability.md
search.appverid: met150 Last updated : 12/18/2020 # Vulnerability resource type
security Web Protection Monitoring https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-protection-monitoring.md
- tier2 Last updated : 12/18/2020 # Monitor web browsing security
security Web Protection Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-protection-response.md
search.appverid: met150 Last updated : 12/18/2020 # Respond to web threats
security Why Use Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/why-use-microsoft-defender-antivirus.md
- m365-security - tier2 search.appverid: met150 Last updated : 04/08/2021 # Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint
security Defender Vulnerability Management Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-faq.md
- tier1 search.appverid: met150 Last updated : 06/02/2022 # Microsoft Defender Vulnerability Management frequently asked questions
security Defender Vulnerability Management Trial https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-trial.md
- tier1 search.appverid: met150 Last updated : 07/13/2022 # About the Microsoft Defender Vulnerability Management public preview trial
security Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management.md
search.appverid: met150 Last updated : 05/09/2022 # What is Microsoft Defender Vulnerability Management
security Threat And Vuln Mgt Event Timeline https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/threat-and-vuln-mgt-event-timeline.md
- tier1 search.appverid: met150 Last updated : 03/04/2022 # Event timeline
security Trial User Guide Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/trial-user-guide-defender-vulnerability-management.md
search.appverid: met150 Last updated : 11/02/2022 # Trial user guide: Microsoft Defender Vulnerability Management
security Tvm Assign Device Value https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-assign-device-value.md
- tier1 search.appverid: met150 Last updated : 03/04/2022 # Assign device value
security Tvm Block Vuln Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-block-vuln-apps.md
- tier1 search.appverid: met150 Last updated : 04/12/2022 # Block vulnerable applications (beta)
security Tvm Browser Extensions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-browser-extensions.md
- tier1 search.appverid: met150 Last updated : 04/11/2022 # Browser extensions assessment
security Tvm Certificate Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-certificate-inventory.md
- tier1 search.appverid: met150 Last updated : 04/11/2022 # Certificate inventory
security Tvm Dashboard Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-dashboard-insights.md
search.appverid: met150 Last updated : 03/04/2022 # Dashboard insights
security Tvm End Of Support Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-end-of-support-software.md
- tier1 search.appverid: met150 Last updated : 03/04/2022 # Plan for end-of-support software and software versions
security Tvm Exception https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-exception.md
- tier1 search.appverid: met150 Last updated : 03/04/2022 # Create and view exceptions for security recommendations
security Tvm Exposure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-exposure-score.md
- tier1 search.appverid: met150 Last updated : 03/04/2022 # Exposure score in Defender Vulnerability Management
security Tvm Hardware And Firmware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-hardware-and-firmware.md
- tier1 search.appverid: met150 Last updated : 11/23/2022 # Hardware and firmware assessment
security Tvm Hunt Exposed Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-hunt-exposed-devices.md
- tier1 search.appverid: met150 Last updated : 03/04/2022 # Hunt for exposed devices
security Tvm Manage Log4shell Guidance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-manage-Log4shell-guidance.md
search.appverid: met150 Last updated : 06/29/2022 # Learn how to manage the Log4Shell vulnerability in Microsoft Defender for Endpoint
security Tvm Microsoft Secure Score Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-microsoft-secure-score-devices.md
- tier2 search.appverid: met150 Last updated : 03/04/2022 # Microsoft Secure Score for Devices
security Tvm Network Share Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-network-share-assessment.md
- tier2 search.appverid: met150 Last updated : 04/27/2022 # Network share configuration assessment
security Tvm Prerequisites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-prerequisites.md
- tier2 search.appverid: met150 Last updated : 03/04/2022 # Prerequisites & permissions for Microsoft Defender Vulnerability Management
security Tvm Remediation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-remediation.md
- tier1 search.appverid: met150 Last updated : 03/04/2022 # Remediate vulnerabilities
security Tvm Security Baselines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-security-baselines.md
- tier1 search.appverid: met150 Last updated : 04/12/2022 # Security baselines assessment
security Tvm Security Recommendation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-security-recommendation.md
- tier1 search.appverid: met150 Last updated : 03/04/2022 # Security recommendations
security Tvm Software Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-software-inventory.md
- tier1 search.appverid: met150 Last updated : 03/04/2022 # Software inventory in Defender Vulnerability Management
security Tvm Supported Os https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-supported-os.md
- tier2 search.appverid: met150 Last updated : 03/04/2022 # Supported operating systems, platforms and capabilities
security Tvm Usage Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-usage-insights.md
- tier1 search.appverid: met150 Last updated : 10/06/2022 # Software usage insights
security Tvm Vulnerable Devices Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-vulnerable-devices-report.md
- tier1 search.appverid: met150 Last updated : 03/04/2022 # Vulnerable devices report
security Tvm Weaknesses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-weaknesses.md
- tier1 search.appverid: met150 Last updated : 03/04/2022 # Vulnerabilities in my organization
security Tvm Zero Day Vulnerabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-zero-day-vulnerabilities.md
- tier1 search.appverid: met150 Last updated : 03/04/2022 # Mitigate zero-day vulnerabilities
security Whats New In Microsoft Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management.md
- m365-security-compliance - tier2 Last updated : 07/25/2022 # What's new in Microsoft Defender Vulnerability Management Public Preview
security Windows Authenticated Scan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/windows-authenticated-scan.md
The following section lists the pre-requisites you need to configure to use Auth
### Scanning account
-A scanning account is required to remotely access the devices. This must be a [Group Managed Service Account (gMsa)](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview/). To create a gMsa account:
+A scanning account is required to remotely access the devices. This must be a [Group Managed Service Account (gMsa)](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview/).
+
+>[!NOTE]
+> We recommend the gMSA account is a least privileged account with only the required scanning permissions and is set to cycle the password regularly.
+
+To create a gMsa account:
1. On your domain controller in a PowerShell window, run:
security Advanced Hunting Take Action https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-take-action.md
- m365-security - tier1 Last updated : 02/16/2021 # Take action on advanced hunting query results
security Advanced Hunting Urlclickevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-urlclickevents-table.md
- m365-security - tier3 Last updated : 04/27/2022 # UrlClickEvents
security Alert Grading For Malicious Exchange Connectors https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-for-malicious-exchange-connectors.md
search.appverid: - MOE150 - MET150 Last updated : 08/05/2022 # Alert grading for malicious exchange connectors
security Alert Grading Password Spray https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-password-spray.md
ms.sitesec: library
ms.pagetype: security f1.keywords: - NOCSH-+ ms.localizationpriority: medium
search.appverid: - MOE150 - met150 Last updated : 08/09/2022 # Suspicious password spray-related IP activity
AlertInfo
## See also - [Overview of alert grading](alert-grading-playbooks.md)-- [Investigate alerts](investigate-alerts.md)
+- [Investigate alerts](investigate-alerts.md)
security Alert Grading Playbook Email Forwarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-email-forwarding.md
search.appverid: - MOE150 - met150 Last updated : 01/18/2022 # Alert grading for suspicious email forwarding activity
security Alert Grading Playbook Inbox Forwarding Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-inbox-forwarding-rules.md
search.appverid: - MOE150 - met150 Last updated : 01/21/2022 # Alert grading for suspicious inbox forwarding rules
security Alert Grading Playbook Inbox Manipulation Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-inbox-manipulation-rules.md
search.appverid: - MOE150 - met150 Last updated : 01/21/2022 # Alert grading for suspicious inbox manipulation rules
security Alert Grading Playbooks https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbooks.md
- autoir - admindeeplinkDEFENDER Last updated : 01/14/2022 # Alert grading playbooks
security Api Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-access.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # Access the Microsoft 365 Defender APIs
security Api Advanced Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-advanced-hunting.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # Microsoft 365 Defender Advanced hunting API
security Api Articles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-articles.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # Other security and threat protection APIs
security Api Create App User Context https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-create-app-user-context.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # Create an app to access Microsoft 365 Defender APIs on behalf of a user
security Api Create App Web https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-create-app-web.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # Create an app to access Microsoft 365 Defender without a user
security Api Error Codes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-error-codes.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # Common Microsoft 365 Defender REST API error codes
security Api Get Incident https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-get-incident.md
search.appverid: met150 Last updated : 06/10/2021 # Get incident information API
security Api Hello World https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-hello-world.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # Hello World for Microsoft 365 Defender REST API
security Api Incident https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-incident.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # Microsoft 365 Defender incidents API and the incidents resource type
security Api List Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-list-incidents.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # List incidents API in Microsoft 365 Defender
security Api Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-overview.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # Overview of Microsoft 365 Defender APIs
security Api Partner Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-partner-access.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # Create an app with partner access to Microsoft 365 Defender APIs
security Api Supported https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-supported.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # Supported Microsoft 365 Defender APIs
security Api Update Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-update-incidents.md
search.appverid:
- MOE150 - MET150 Last updated : 02/16/2021 # Update incidents API
security Before You Begin Defender Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/before-you-begin-defender-experts.md
- tier1 search.appverid: met150 Last updated : 07/26/2022 # Before you begin using Defender Experts for Hunting
security Configure Email Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-email-notifications.md
search.appverid: met150 Last updated : 10/11/2022 # Configure alert notifications in Microsoft 365 Defender
security Configure Event Hub https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-event-hub.md
- tier2 Last updated : 06/08/2021 # Configure your Event Hubs
security Configure Siem Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-siem-defender.md
- m365-security - tier2 Last updated : 10/25/2021 # Integrate your SIEM tools with Microsoft 365 Defender
security Custom Detection Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-detection-rules.md
- m365initiative-m365-defender - tier2 Last updated : 02/16/2021 # Create and manage custom detections rules
security Custom Detections Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-detections-overview.md
- m365-security - tier2 Last updated : 02/16/2021 # Custom detections overview
security Data Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/data-privacy.md
search.appverid: - MOE150 - MET150 Last updated : 02/16/2021 # Microsoft 365 Defender data security and privacy
security Defender Experts For Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/defender-experts-for-hunting.md
- tier1 search.appverid: met150 Last updated : 05/05/2022 # Microsoft Defender Experts for Hunting
security Defender Experts Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/defender-experts-report.md
- tier1 Last updated : 06/14/2022 # Understand the Defender Experts for Hunting report in Microsoft 365 Defender
security Deploy Supported Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/deploy-supported-services.md
search.appverid: - MOE150 - MET150 Last updated : 02/16/2021 # Deploy supported services
security Device Profile https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/device-profile.md
- tier2 search.appverid: met150 Last updated : 02/16/2021 # Device profile page
security Dex Xdr Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/dex-xdr-overview.md
- tier1 search.appverid: met150 Last updated : 11/17/2022 # Expanded Microsoft Defender Experts for XDR preview
security Eval Defender Mcas Enable Eval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-enable-eval.md
- highpri - tier1 Last updated : 05/14/2021 # Enable the evaluation environment for Microsoft Defender for Cloud Apps
security Eval Defender Office 365 Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-office-365-overview.md
- highpri - tier1 Last updated : 05/27/2021 # Step 3. Enable and pilot Microsoft Defender for Office 365
security Eval Defender Promote To Production https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-promote-to-production.md
- highpri - tier1 Last updated : 05/13/2021 # Step 7. Promote your Microsoft 365 Defender evaluation environment to production
security Export Incidents Queue https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/export-incidents-queue.md
search.appverid: - MOE150 - MET150 Last updated : 07/11/2022 # Export incidents queue to CSV files
security Feedback https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/feedback.md
search.appverid: - MOE150 - MET150 Last updated : 02/16/2021 # Provide feedback on Microsoft 365 Defender
security Fetch Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/fetch-incidents.md
- tier3 Last updated : 10/25/2021 # Fetch Microsoft 365 Defender incidents
security First Incident Analyze https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-analyze.md
search.appverid: - MOE150 - MET150 Last updated : 04/20/2021 + # Step 1. Triage and analyze your first incident [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security First Incident Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-overview.md
search.appverid: - MOE150 - MET150 Last updated : 04/20/2021 + # Responding to your first incident [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security First Incident Path Identity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-path-identity.md
search.appverid: - MOE150 - MET150 Last updated : 04/20/2021 + # Example of an identity-based attack [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security First Incident Path Phishing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-path-phishing.md
search.appverid: - MOE150 - MET150 Last updated : 04/20/2021 + # Example of a phishing email attack [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security First Incident Post https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-post.md
search.appverid: - MOE150 - MET150 Last updated : 04/20/2021 + # Step 3. Perform a post-incident review of your first incident [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security First Incident Prepare https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-prepare.md
search.appverid: - MOE150 - MET150 Last updated : 04/20/2021 + # Prepare your security posture for your first incident [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security First Incident Remediate https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-remediate.md
search.appverid: - MOE150 - MET150 Last updated : 04/20/2021 + # Step 2. Remediate your first incident [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security Frequently Asked Questions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/frequently-asked-questions.md
- tier1 search.appverid: met150 Last updated : 11/17/2022 + # Frequently asked questions **Applies to:**
security Get Started Xdr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/get-started-xdr.md
- tier1 search.appverid: met150 Last updated : 11/17/2022 # Get started with Microsoft Defender Experts for XDR
security Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/get-started.md
- tier1 Last updated : 02/16/2021 # Get started with Microsoft 365 Defender
security Incident Queue https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incident-queue.md
search.appverid: - MOE150 - MET150 Last updated : 02/16/2021 # Prioritize incidents in Microsoft 365 Defender
security Incident Response Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incident-response-overview.md
search.appverid: - MOE150 - MET150 Last updated : 10/13/2021 # Investigate and respond with Microsoft 365 Defender
security Incidents Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incidents-overview.md
search.appverid: - MOE150 - MET150 Last updated : 02/16/2021 # Incident response with Microsoft 365 Defender
security Integrate Microsoft 365 Defender Secops Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-plan.md
search.appverid: - MOE150 - MET150 Last updated : 07/15/2021 + # Step 1. Plan for Microsoft 365 Defender operations readiness [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security Integrate Microsoft 365 Defender Secops Readiness https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-readiness.md
search.appverid: - MOE150 - MET150 Last updated : 07/15/2021 + # Step 2. Perform a SOC integration readiness assessment using the Zero Trust Framework [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security Integrate Microsoft 365 Defender Secops Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-roles.md
search.appverid: - MOE150 - MET150 Last updated : 07/15/2021 + # Step 4. Define Microsoft 365 Defender roles, responsibilities, and oversight [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security Integrate Microsoft 365 Defender Secops Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-services.md
search.appverid: - MOE150 - MET150 Last updated : 07/15/2021 + # Step 3. Plan for Microsoft 365 Defender integration with your SOC catalog of services [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security Integrate Microsoft 365 Defender Secops Tasks https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-tasks.md
search.appverid: - MOE150 - MET150 Last updated : 07/15/2021 + # Step 6. Identify SOC maintenance tasks [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security Integrate Microsoft 365 Defender Secops Use Cases https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-use-cases.md
search.appverid: - MOE150 - MET150 Last updated : 07/15/2021 + # Step 5. Develop and test use cases [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security Integrate Microsoft 365 Defender Secops https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops.md
search.appverid: - MOE150 - MET150 Last updated : 07/15/2021 + # Integrating Microsoft 365 Defender into your security operations [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security Investigate Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-alerts.md
search.appverid: - MOE150 - met150 Last updated : 02/16/2021 # Investigate alerts in Microsoft 365 Defender
security Investigate Dlp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-dlp.md
search.appverid: - MOE150 - met150 Last updated : 05/23/2022 # Investigate data loss incidents with Microsoft 365 Defender
security Investigate Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-incidents.md
search.appverid: - MOE150 - MET150 Last updated : 02/16/2021 # Investigate incidents in Microsoft 365 Defender
security Investigate Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-users.md
f1.keywords:
Previously updated : audience: ITPro - m365-security
search.appverid: met150 Last updated : 02/16/2021 + # Investigate users in Microsoft 365 Defender [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security M365d Autoir Report False Positives Negatives https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir-report-false-positives-negatives.md
- autoir - admindeeplinkDEFENDER Last updated : 02/17/2021 # Address false positives or false negatives in Microsoft 365 Defender
security M365d Enable Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable-faq.md
search.appverid: - MOE150 - MET150 Last updated : 02/17/2021 # Frequently asked questions when turning on Microsoft 365 Defender
security M365d Enable https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable.md
search.appverid: - MOE150 - MET150 Last updated : 02/17/2021 # Turn on Microsoft 365 Defender
security M365d Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-permissions.md
search.appverid: - MOE150 - MET150 Last updated : 02/17/2021 # Manage access to Microsoft 365 Defender with Azure Active Directory global roles
security M365d Remediation Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-remediation-actions.md
Last updated : 02/17/2021 # Remediation actions in Microsoft 365 Defender
security M365d Time Zone https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-time-zone.md
search.appverid: - MOE150 - MET150 Last updated : 02/17/2021 # Set the time zone for Microsoft 365 Defender
security Manage Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/manage-incidents.md
search.appverid: - MOE150 - MET150 Last updated : 02/16/2021 # Manage incidents in Microsoft 365 Defender
security Microsoft 365 Defender Integration With Azure Sentinel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-integration-with-azure-sentinel.md
search.appverid: - MOE150 - MET150 Last updated : 05/26/2021 + # Microsoft 365 Defender integration with Microsoft Sentinel [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security Microsoft 365 Defender Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-portal.md
- intro-overview adobe-target: true Last updated : 07/01/2022 # Microsoft 365 Defender portal
security Microsoft 365 Defender Train Security Staff https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-train-security-staff.md
search.appverid: - MOE150 - MET150 Last updated : 01/03/2022 # Train your security staff for Microsoft 365 Defender
security Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender.md
- intro-overview adobe-target: true Last updated : 02/17/2021 # What is Microsoft 365 Defender?
security Microsoft 365 Security Mde Redirection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-mde-redirection.md
- tier2 Last updated : 02/16/2021 + # Redirecting accounts from Microsoft Defender for Endpoint to Microsoft 365 Defender [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security Microsoft 365 Security Mdi Redirection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-mdi-redirection.md
- tier2 Last updated : 04/28/2022 + # Redirecting accounts from Microsoft Defender for Identity to Microsoft 365 Defender [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security Microsoft Secure Score History Metrics Trends https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-history-metrics-trends.md
search.appverid: - MOE150 - MET150 Last updated : 02/16/2021 # Track your Microsoft Secure Score history and meet goals
security Microsoft Secure Score Improvement Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-improvement-actions.md
search.appverid:
- seo-marvel-apr2020 - seo-marvel-jun2020 Last updated : 02/16/2021 # Assess your security posture with Microsoft Secure Score
security Microsoft Secure Score Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-whats-new.md
search.appverid:
- seo-marvel-apr2020 - seo-marvel-jun2020 Last updated : 02/16/2021 # What's new in Microsoft Secure Score
security Microsoft Secure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score.md
search.appverid:
- seo-marvel-apr2020 - seo-marvel-jun2020 Last updated : 02/16/2021 # Microsoft Secure Score
security Mssp Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/mssp-access.md
search.appverid:
- m365-security - tier2 Last updated : 02/16/2021 # Provide managed security service provider (MSSP) access
security Onboarding Defender Experts For Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/onboarding-defender-experts-for-hunting.md
- tier1 search.appverid: met150 Last updated : 07/26/2022 # Start using Microsoft Defender Experts for Hunting
security Opt Out Of Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/opt-out-of-preview.md
- tier1 search.appverid: met150 Last updated : 11/17/2022 # Opt out of Microsoft Defender Experts for XDR preview
security Portals https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/portals.md
- tier2 search.appverid: met150 Last updated : 02/16/2021 # Microsoft security portals and admin centers
security Prerequisites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/prerequisites.md
search.appverid: - MOE150 - MET150 Last updated : 02/16/2021 # Microsoft 365 Defender prerequisites
security Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/preview.md
search.appverid: - MOE150 - MET150 Last updated : 02/16/2021 # Microsoft 365 Defender preview features
security Secure Score Data Storage Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/secure-score-data-storage-privacy.md
search.appverid: met150 Last updated : 11/17/2022 # Microsoft Secure Score data storage and privacy
security Session Cookie Theft Alert https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/session-cookie-theft-alert.md
- autoir - admindeeplinkDEFENDER Last updated : 10/18/2022 # Alert grading for session cookie theft alert
security Setup M365deval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/setup-m365deval.md
- highpri - tier1 Last updated : 02/17/2021 # Set up your Microsoft 365 Defender trial in a lab environment
security Start Using Mdex Xdr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/start-using-mdex-xdr.md
- tier1 search.appverid: met150 Last updated : 11/17/2022 - # Start using Defender Experts for XDR preview service [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
security Streaming Api Event Hub https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/streaming-api-event-hub.md
- tier3 Last updated : 06/02/2021 # Configure Microsoft 365 Defender to stream Advanced Hunting events to your Azure Event Hub
security Streaming Api Storage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/streaming-api-storage.md
- tier3 Last updated : 06/02/2021 # Configure Microsoft 365 Defender to stream Advanced Hunting events to your Storage account
security Streaming Api https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/streaming-api.md
- m365-security - tier3 Last updated : 06/02/2021 # Streaming API
security Supported Event Types https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/supported-event-types.md
- m365-security - tier3 Last updated : 09/09/2021 # Supported Microsoft 365 Defender streaming event types in event streaming API
security Threat Analytics Analyst Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/threat-analytics-analyst-reports.md
- tier1 Last updated : 02/16/2021 # Understand the analyst report in threat analytics in Microsoft 365 Defender
security Threat Analytics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/threat-analytics.md
search.appverid: met150 Last updated : 02/16/2021 # Threat analytics in Microsoft 365 Defender
security Tickets https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/tickets.md
search.appverid:
- MET150 - seo-marvel-apr2020 Last updated : 02/16/2021 + # Integrate ServiceNow tickets into the Microsoft 365 Defender portal and compliance center [!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
security Top Scoring Industry Tests https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/top-scoring-industry-tests.md
- tier2 search.appverid: met150 Last updated : 02/16/2021 # Top scoring in industry tests
security Troubleshoot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/troubleshoot.md
search.appverid: - MOE150 - MET150 Last updated : 02/16/2021 # Troubleshoot Microsoft 365 Defender service issues
security Usgov https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/usgov.md
- m365-security-compliance - tier3 Last updated : 12/07/2021 # Microsoft 365 Defender for US Government customers
security Coinminer Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/coinminer-malware.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 + # Coin miners Cybercriminals are always looking for new ways to make money. With the rise of digital currencies, also known as cryptocurrencies, criminals see a unique opportunity to infiltrate an organization and secretly mine for coins by reconfiguring malware.
security Coordinated Malware Eradication https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/coordinated-malware-eradication.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # Coordinated Malware Eradication
security Cybersecurity Industry Partners https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/cybersecurity-industry-partners.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # Industry collaboration programs
security Developer Resources https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/developer-resources.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # Software developer resources
security Exploits Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/exploits-malware.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 + # Exploits and exploit kits Exploits take advantage of vulnerabilities in software. A vulnerability is like a hole in your software that malware can use to get onto your device. Malware exploits these vulnerabilities to bypass your computer's security safeguards to infect your device.
security Fileless Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/fileless-threats.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # Fileless threats
security Macro Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/macro-malware.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 + # Macro malware Macros are a powerful way to automate common tasks in Microsoft Office and can make people more productive. However, macro malware uses this functionality to infect your device.
security Malware Naming https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/malware-naming.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 + # Malware names We name the malware and unwanted software that we detect according to the Computer Antivirus Research Organization (CARO) malware naming scheme. The scheme uses the following format:
security Microsoft Bug Bounty Program https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/microsoft-bug-bounty-program.md
ms.localizationpriority: medium search.appverid: met150 Last updated : 03/18/2022 # About the Microsoft Bug Bounty Program
security Phishing Trends https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/phishing-trends.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # Phishing trends and techniques
security Phishing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/phishing.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # How to protect against phishing attacks
security Portal Submission Troubleshooting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/portal-submission-troubleshooting.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # Troubleshooting malware submission errors caused by administrator block
security Prevent Malware Infection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/prevent-malware-infection.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 + # Prevent malware infection Malware authors are always looking for new ways to infect computers. Follow the tips below to stay protected and minimize threats to your data and accounts.
security Rootkits Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/rootkits-malware.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 + # Rootkits Malware authors use rootkits to hide malware on your device, allowing malware to persist as long as possible. A successful rootkit can potentially remain in place for years if it's undetected. During this time, it will steal information and resources.
security Safety Scanner Download https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/safety-scanner-download.md
- tier2 search.appverid: met150 Last updated : 02/06/2023+ + # Microsoft Safety Scanner Download Microsoft Safety Scanner is a scan tool designed to find and remove malware from Windows computers. Simply download it and run a scan to find malware and try to reverse changes made by identified threats.
Microsoft Safety Scanner is a scan tool designed to find and remove malware from
- **[Download Microsoft Safety Scanner (64-bit)](https://go.microsoft.com/fwlink/?LinkId=212732)** > [!NOTE]
-> Starting November 2019, Safety Scanner will be SHA-2 signed exclusively. Your devices must be updated to support SHA-2 in order to run Safety Scanner. To learn more, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](https://support.microsoft.com/help/4472027/2019-sha-2-code-signing-support-requirement-for-windows-and-wsus).
+> Safety Scanner is exclusively SHA-2 signed. Your devices must be updated to support SHA-2 in order to run Safety Scanner. To learn more, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](https://support.microsoft.com/help/4472027/2019-sha-2-code-signing-support-requirement-for-windows-and-wsus).
## Important information
security Submission Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/submission-guide.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # Submit files for analysis
security Supply Chain Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/supply-chain-malware.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # Supply chain attacks
security Support Scams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/support-scams.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 + # Tech support scams Tech support scams are an industry-wide issue where scammers use scare tactics to trick users into paying for unnecessary technical support services that supposedly fix contrived device, platform, or software problems.
security Trojans Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/trojans-malware.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # Trojans
security Understanding Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/understanding-malware.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 + # Understanding malware & other threats Malware is a term used to describe malicious applications and code that can cause damage and disrupt normal use of devices. Malware can allow unauthorized access, use system resources, steal passwords, lock you out of your computer and ask for ransom, and more.
security Unwanted Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/unwanted-software.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 + # Unwanted software Unwanted software are programs that alter the Windows experience without your consent or control. This can take the form of modified browsing experience, lack of control over downloads and installation, misleading messages, or unauthorized changes to Windows settings.
security Virus Information Alliance Criteria https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/virus-information-alliance-criteria.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # Virus Information Alliance
security Virus Initiative Criteria https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/virus-initiative-criteria.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # Microsoft Virus Initiative
security Worms Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/worms-malware.md
- tier2 search.appverid: met150 Last updated : 03/18/2022 # Worms
security Admin Review Reported Message https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/admin-review-reported-message.md
description: Learn how to review messages that are reported and give feedback to
search.appverid: met150 Last updated : 05/27/2021 # Admin review for reported messages
security Anti Malware Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-policies-configure.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
- seo-marvel-apr2020 Last updated : 11/28/2022 # Configure anti-malware policies in EOP
security Anti Malware Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-protection-about.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn about anti-malware protection and anti-malware pol
Last updated : 11/28/2022 # Anti-malware protection in EOP
security Anti Malware Protection For Spo Odfb Teams About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-protection-for-spo-odfb-teams-about.md
f1.keywords:
Previously updated : audience: Admin - ms.localizationpriority: medium search.appverid: - SPO160
description: Learn about how SharePoint Online detects viruses in files that use
Last updated : 11/29/2022 # Built-in virus protection in SharePoint Online, OneDrive, and Microsoft Teams
security Anti Phishing From Email Address Validation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-from-email-address-validation.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - OWC150
description: Admins can learn about the types of email addresses that are accept
Last updated : 11/30/2022 # How EOP validates the From address to prevent phishing
security Anti Phishing Mdo Impersonation Insight https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-mdo-impersonation-insight.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
- seo-marvel-apr2020 Last updated : 11/30/2022 # Impersonation insight in Defender for Office 365
security Anti Phishing Policies About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-about.md
audience: ITPro Previously updated : - ms.localizationpriority: medium ms.assetid: 5a6f2d7f-d998-4f31-b4f5-f7cbf6f38578
description: Admins can learn about the anti-phishing policies that are availabl
search.appverid: met150 Last updated : 11/30/2022 # Anti-phishing policies in Microsoft 365
security Anti Phishing Policies Eop Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-eop-configure.md
audience: ITPro Previously updated :- ms.localizationpriority: medium ms.assetid:
description: Admins can learn how to create, modify, and delete the anti-phishin
search.appverid: met150 Last updated : 11/30/2022 # Configure anti-phishing policies in EOP
security Anti Phishing Policies Mdo Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-mdo-configure.md
audience: ITPro Previously updated :- ms.localizationpriority: medium ms.assetid:
description: Admins can learn how to create, modify, and delete the advanced ant
search.appverid: met150 Last updated : 11/30/2022 # Configure anti-phishing policies in Microsoft Defender for Office 365
security Anti Phishing Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-protection-about.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn about the anti-phishing protection features in Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Last updated : 11/30/2022 # Anti-phishing protection in Microsoft 365
security Anti Phishing Protection Spoofing About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-protection-spoofing-about.md
f1.keywords:
Previously updated : audience: ITPro - search.appverid: - MET150 ms.assetid: d24bb387-c65d-486e-93e7-06a4f1a436c0
ms.localizationpriority: high
description: Admins can learn about the anti-spoofing features that are available in Exchange Online Protection (EOP), which can help mitigate against phishing attacks from spoofed senders and domains. Last updated : 11/30/2022 # Anti-spoofing protection in EOP
security Anti Phishing Protection Tuning https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-protection-tuning.md
description: Admins can learn to identify the reasons why and how a phishing message got through in Microsoft 365, and what to do to prevent more phishing messages in the future. Last updated : 11/30/2022 # Tune anti-phishing protection
security Anti Spam Backscatter About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-backscatter-about.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: In this article, you'll learn about Backscatter and Microsoft Exchange Online Protection (EOP) Last updated : 12/01/2022 # Backscatter in EOP
security Anti Spam Bulk Complaint Level Bcl About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-bulk-complaint-level-bcl-about.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn about bulk complaint level (BCL) values that are used in Exchange Online Protection (EOP). Last updated : 12/01/2022 # Bulk complaint level (BCL) in EOP
security Anti Spam Policies Asf Settings About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-policies-asf-settings-about.md
description: Admins can learn about the Advanced Spam Filter (ASF) settings that are available in anti-spam policies in Exchange Online Protection (EOP). Last updated : 12/01/2022 # Advanced Spam Filter (ASF) settings in EOP
security Anti Spam Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-policies-configure.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: high search.appverid: - MET150
description: Admins can learn how to view, create, modify, and delete anti-spam policies in Exchange Online Protection (EOP). Last updated : 12/01/2022 # Configure anti-spam policies in EOP
security Anti Spam Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-protection-about.md
f1.keywords:
Previously updated : audience: Admin - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn about the anti-spam settings and filters that will help prevent spam in Exchange Online Protection (EOP). Last updated : 12/01/2022 # Anti-spam protection in EOP
security Anti Spam Spam Confidence Level Scl About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-spam-confidence-level-scl-about.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn about the spam confidence level (SCL) that applied to messages in Exchange Online Protection (EOP). Last updated : 12/01/2022 # Spam confidence level (SCL) in EOP
security Anti Spam Spam Vs Bulk About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-spam-vs-bulk-about.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn about the differences between junk email (spam) and bulk email (gray mail) in Exchange Online Protection (EOP). Last updated : 12/01/2022 # What's the difference between junk email and bulk email in EOP?
security Anti Spoofing Spoof Intelligence https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spoofing-spoof-intelligence.md
f1.keywords:
Previously updated : audience: Admin - ms.localizationpriority: medium search.appverid: - MOE150
description: Admins can learn about the spoof intelligence insight in Exchange Online Protection (EOP). Last updated : 12/01/2022 # Spoof intelligence insight in EOP
security Attack Simulation Training End User Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-end-user-notifications.md
description: Admins can learn how to create end-user notification email messages for Attack simulation training in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Last updated : 04/21/2022 # End-user notifications for Attack simulation training
security Attack Simulation Training Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-faq.md
description: Admins can learn about deployment considerations and frequently asked questions regarding Attack simulation and training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations. Last updated : 02/18/2021 # Attack simulation training deployment considerations and FAQ
security Attack Simulation Training Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-get-started.md
description: Admins can learn how to use Attack simulation training to run simulated phishing and password attacks in their Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations. Last updated : 01/11/2021 # Get started using Attack simulation training in Defender for Office 365
security Attack Simulation Training Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-insights.md
description: Admins can learn how Attack simulation training in the Microsoft 365 Defender portal affects users and can gain insights from simulation and training outcomes. search.appverid: met150 Last updated : 11/05/2020 # Insights and reports for Attack simulation training in Defender for Office 365
security Attack Simulation Training Login Pages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-login-pages.md
description: Admins can learn how to create and manage login pages for simulated phishing attacks in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Last updated : 05/24/2022 # Login pages in Attack simulation training
security Attack Simulation Training Payload Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-payload-automations.md
description: Admins can learn how to use payload automations (payload harvesting) to collect and launch automated simulations for Attack simulation training in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Last updated : 10/05/2021 # Payload automations for Attack simulation training
security Attack Simulation Training Payloads https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-payloads.md
description: Admins can learn how to create and manage payloads for Attack simulation training in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Last updated : 10/31/2020 # Payloads in Attack simulation training in Defender for Office 365
security Attack Simulation Training Simulation Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations.md
description: Admins can learn how to create automated simulations that contain specific techniques and payloads that launch when the specified conditions are met in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Last updated : 10/11/2021 # Simulation automations for Attack simulation training
security Attack Simulation Training Simulations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-simulations.md
description: Admins can learn how to simulate phishing attacks and train their users on phishing prevention using Attack simulation training in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Last updated : 12/01/2022 # Simulate a phishing attack with Attack simulation training in Defender for Office 365
security Attack Simulation Training Training Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-training-campaigns.md
description: Admins can learn how to create training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Last updated : 01/13/2023 # Training campaigns in Attack simulation training
security Attack Simulation Training Training Modules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-training-modules.md
description: Admins can learn about the Training modules that are available to use in Training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Last updated : 01/13/2023 # Training modules for Training campaigns in Attack simulation training
security Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/campaigns.md
Previously updated : audience: ITPro ms.localizationpriority: medium
description: Learn about Campaigns in Microsoft Defender for Office 365. Last updated : 10/16/2019 # Campaigns in Microsoft Defender for Office 365
security Configuration Analyzer For Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/configuration-analyzer-for-security-policies.md
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn how to use the configuration analyzer to find and fix security policies that are below the settings in Standard protection and Strict protection in preset security policies. Last updated : 07/23/2020 # Configuration analyzer for protection policies in EOP and Microsoft Defender for Office 365
security Configure Junk Email Settings On Exo Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/configure-junk-email-settings-on-exo-mailboxes.md
Title: Configure junk email settings on Exchange Online mailboxes
Previously updated : audience: Admin - ms.localizationpriority: medium search.appverid: - MOE150
description: Admins can learn how to configure the junk email settings in Exchange Online mailboxes. Many of these settings are available to users in Outlook or Outlook on the web. Last updated : 03/11/2020 # Configure junk email settings on Exchange Online mailboxes
security Connection Filter Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connection-filter-policies-configure.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn how to configure connection filtering in Exchange Online Protection (EOP) to allow or block emails from email servers. Last updated : 12/01/2022 # Configure connection filtering
security Connectors Detect Respond To Compromise https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connectors-detect-respond-to-compromise.md
audience: ITPro Previously updated : ms.localizationpriority: medium ms.assetid:
description: Learn how to recognize and respond to a compromised connector in Mi
search.appverid: met150 Last updated : 12/01/2022 # Respond to a compromised connector
security Connectors Mail Flow Intelligence https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connectors-mail-flow-intelligence.md
description: Admins can learn about the error codes that are associated with mes
Last updated : 12/01/2022 # Mail flow intelligence in EOP
security Connectors Remove Blocked https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connectors-remove-blocked.md
audience: ITPro Previously updated : ms.localizationpriority: medium ms.assetid:
description: Learn how to remove blocked connectors in Microsoft 365 Defender.
search.appverid: met150 Last updated : 12/01/2022 # Remove blocked connectors from the Restricted entities portal
security Create Block Sender Lists In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/create-block-sender-lists-in-office-365.md
f1.keywords:
Previously updated : audience: ITPro
search.appverid:
description: Admins can learn about the available and preferred options to block inbound messages in Exchange Online Protection (EOP). Last updated : 09/13/2019 # Create blocked sender lists in EOP
security Create Safe Sender Lists In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/create-safe-sender-lists-in-office-365.md
f1.keywords:
Previously updated : audience: ITPro
description: Admins can learn about the available and preferred options to allow inbound messages in Exchange Online Protection (EOP). Last updated : 09/13/2019 # Create safe sender lists in EOP
security Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/defender-for-office-365.md
description: Best setup of Microsoft Defender for Office 365 including Safe Attachments, Safe Links, advanced anti-phishing tools, reporting tools, and threat intelligence capabilities. Last updated : 01/15/2021 + # Microsoft Defender for Office 365 > [!IMPORTANT]
security Email Analysis Investigations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-analysis-investigations.md
- seo-marvel-mar2020 Last updated : 07/12/2021 # Email analysis in investigations for Microsoft Defender for Office 365
security Email Authentication About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-about.md
f1.keywords:
Previously updated : audience: ITPro - search.appverid: - MET150 ms.assetid:
ms.localizationpriority: high
description: Admins can learn how EOP uses email authentication (SPF, DKIM, and DMARC) to help prevent spoofing, phishing, and spam. Last updated : 12/01/2022 # Email authentication in EOP
DMARC prevents spoofing by examining the **From** address in messages. The **Fro
However, DNS records for SPF, DKIM, and DMARC (collectively known as email authentication policies) are optional. Domains with strong email authentication policies like microsoft.com and skype.com are protected from spoofing. But domains with weaker email authentication policies, or no policy at all, are prime targets for being spoofed.
-As of March 2018, only 9% of domains of companies in the Fortune 500 publish strong email authentication policies. The remaining 91% of companies might be spoofed by an attacker. Unless some other email filtering mechanism is in-place, email from spoofed senders in these domains might be delivered to users.
-
-![DMARC policies of Fortune 500 companies.](../../media/84e77d34-2073-4a8e-9f39-f109b32d06df.jpg)
-
-The proportion of small-to-medium sized companies that publish strong email authentication policies is smaller. And the number is even smaller for email domains outside North America and western Europe.
-
-Lack of strong email authentication policies is a large problem. While organizations might not understand how email authentication works, attackers fully understand, and they take advantage. Because of phishing concerns and the limited adoption of strong email authentication policies, Microsoft uses *implicit email authentication* to check inbound email.
+Lack of strong email authentication policies is a large problem. While organizations might not understand how email authentication works, attackers fully understand and they take advantage. Because of phishing concerns and the limited adoption of strong email authentication policies, Microsoft uses *implicit email authentication* to check inbound email.
Implicit email authentication is an extension of regular email authentication policies. These extensions include: sender reputation, sender history, recipient history, behavioral analysis, and other advanced techniques. In the absence of other signals from these extensions, messages sent from domains that don't use email authentication policies will be marked as spoof.
security Email Authentication Anti Spoofing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-anti-spoofing.md
description: Learn how Microsoft 365 uses the Sender Policy Framework (SPF) TXT record in DNS to ensure that destination email systems trust messages sent from your custom domain. Last updated : 12/01/2022 # How Microsoft 365 uses Sender Policy Framework (SPF) to prevent spoofing
security Email Authentication Dkim Support About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-dkim-support-about.md
description: Learn about the validation of DKIM signed messages in Exchange Online Protection and Exchange Online Last updated : 12/02/2022 # Support for validation of DKIM signed messages
security Help And Support For Eop https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/help-and-support-for-eop.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium ms.assetid: 64535a0a-1044-413f-8bc2-ed8e8a0bc54c description: Microsoft provides help for EOP in a variety of places and methods including self-support and assisted-support.
search.appverid: met150 Last updated : 09/16/2019 # Help and support for EOP
security How Policies And Protections Are Combined https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/how-policies-and-protections-are-combined.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium - m365-security
description: Admins can learn about the application order of protections in Exch
search.appverid: met150 Last updated : 09/17/2019 # Order and precedence of email protection
security Identity Access Policies Guest Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/identity-access-policies-guest-access.md
- highpri search.appverid: met150 Last updated : 10/08/2020 # Policies for allowing guest access and B2B external user access
security Identity Access Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/identity-access-policies.md
- highpri search.appverid: met150 Last updated : 10/08/2020 + # Common security policies for Microsoft 365 organizations Organizations have lots to worry about when deploying Microsoft 365 for their organization. The Conditional Access, app protection, and device compliance policies referenced in this article are based on Microsoft's recommendations and the three guiding principles of [Zero Trust](/security/zero-trust/zero-trust-overview):
security Identity Access Prerequisites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/identity-access-prerequisites.md
- highpri search.appverid: met150 Last updated : 10/08/2020 # Prerequisite work for implementing Zero Trust identity and device access policies
security Install App Guard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/install-app-guard.md
description: Get the latest in hardware-based isolation. Prevent current and emerging attacks like exploits or malicious links from disrupting employee productivity and enterprise security. Last updated : 08/07/2020 # Application Guard for Office for admins
security Mail Flow About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mail-flow-about.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium ms.assetid: e109077e-cc85-4c19-ae40-d218ac7d0548
search.appverid: met150 Last updated : 12/02/2022 # Mail flow in EOP
security Mail Flow Inbound Ipv6 Support About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mail-flow-inbound-ipv6-support-about.md
description: Admin can learn how to configure support for anonymous inbound email from IPv6 sources in Exchange Online and Exchange Online Protection. Last updated : 12/02/2022 # Add support for anonymous inbound email over IPv6 in Microsoft 365
security Mail Flow Troubleshooting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mail-flow-troubleshooting.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: This article provides troubleshooting information for issues with sending email to inboxes in Microsoft 365 & best practices for bulk mailing to Microsoft 365 customers. Last updated : 12/02/2022 # Troubleshooting mail sent to Microsoft 365
security Mdo Portal Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-portal-permissions.md
f1.keywords:
Previously updated : ms.audience: Admin audience: Admin
- seo-marvel-apr2020 Last updated : 12/02/2022 # Microsoft Defender for Office 365 permissions in the Microsoft 365 Defender portal
security Mdo Sec Ops Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-guide.md
audience: Admin Previously updated : - ms.localizationpriority: medium search.appverid: - MET150
description: A prescriptive playbook for SecOps personnel to manage Microsoft Defender for Office 365. Last updated : 03/11/2022 # Microsoft Defender for Office 365 Security Operations Guide
security Mdo Sec Ops Manage Incidents And Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-manage-incidents-and-alerts.md
audience: Admin Previously updated : - ms.localizationpriority: medium search.appverid: - MET150
description: SecOps personnel can learn how to use the Incidents queue in Microsoft 365 Defender to manage incidents in Microsoft Defender for Office 365. Last updated : 04/07/2022 # Manage incidents and alerts from Microsoft Defender for Office 365 in Microsoft 365 Defender
security Message Headers Eop Mdo https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/message-headers-eop-mdo.md
description: Admins can learn about the header fields that are added to messages
Last updated : 12/02/2022 # Anti-spam message headers in Microsoft 365
security Message Trace Scc https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/message-trace-scc.md
description: Admins can use the message trace link in the Microsoft 365 Defender
search.appverid: met150 Last updated : 09/13/2019 # Message trace in the Microsoft 365 Defender portal
security Mfi Mail Flow Map Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mfi-mail-flow-map-report.md
description: Admins can learn how to use the Mail flow map in the Mail flow dash
search.appverid: met150 Last updated : 09/13/2019 # Mail flow map in the Security & Compliance Center
security Microsoft 365 Continuous Access Evaluation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/microsoft-365-continuous-access-evaluation.md
- highpri search.appverid: met150 Last updated : 10/25/2021 # Continuous access evaluation for Microsoft 365
security Microsoft 365 Policies Configurations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/microsoft-365-policies-configurations.md
- highpri search.appverid: met150 Last updated : 10/08/2020 # Zero Trust identity and device access configurations
security Microsoft Defender For Office 365 Product Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview.md
description: Security in Office 365, from EOP to Defender for Office 365 Plans 1
adobe-target: true Last updated : 09/15/2022 # Microsoft Defender for Office 365 security product overview
security Migrate To Defender For Office 365 Onboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-onboard.md
audience: Admin Previously updated : ms.localizationpriority: medium search.appverid:
description: "Complete the steps for migrating from a third-party protection service or device to Microsoft Defender for Office 365 protection." Last updated : 10/28/2021 # Migrate to Microsoft Defender for Office 365 - Phase 3: Onboard
security Migrate To Defender For Office 365 Prepare https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-prepare.md
audience: Admin Previously updated : ms.localizationpriority: medium search.appverid:
description: "Prerequisite steps for migrating from a third-party protection service or device to Microsoft Defender for Office 365 protection." Last updated : 10/28/2021 # Migrate to Microsoft Defender for Office 365 - Phase 1: Prepare
security Migrate To Defender For Office 365 Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-setup.md
audience: Admin Previously updated : ms.localizationpriority: medium search.appverid:
description: "Take the steps to begin migrating from a third-party protection service or device to Microsoft Defender for Office 365 protection." Last updated : 10/28/2021 # Migrate to Microsoft Defender for Office 365 - Phase 2: Setup
security Migrate To Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365.md
audience: Admin Previously updated : ms.localizationpriority: medium search.appverid:
description: Learn the right way to migrate from third-party protection services or devices like Google Postini, the Barracuda Spam and Virus Firewall, or Cisco IronPort to Microsoft Defender for Office 365 protection. Last updated : 10/28/2021 # Migrate from a third-party protection service or device to Microsoft Defender for Office 365
security Outbound Spam High Risk Delivery Pool About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-high-risk-delivery-pool-about.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Learn how the delivery pools are used to protect the reputation of email servers in the Microsoft 365 datacenters. Last updated : 12/02/2022 # Outbound delivery pools
security Outbound Spam Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-policies-configure.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn how to view, create, modify, and delete outbound spam policies in Exchange Online Protection (EOP). Last updated : 12/02/2022 # Configure outbound spam filtering in EOP
security Outbound Spam Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-protection-about.md
f1.keywords:
Previously updated : audience: Admin - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn about the outbound spam controls in Exchange Online Protection (EOP), and what to do if you need to send mass mailings. Last updated : 12/02/2022 # Outbound spam protection in EOP
security Preset Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/preset-security-policies.md
audience: ITPro Previously updated : ms.localizationpriority: medium ms.assetid:
description: Admins can learn how to apply Standard and Strict policy settings a
search.appverid: met150 Last updated : 07/21/2020 # Preset security policies in EOP and Microsoft Defender for Office 365
security Priority Accounts Security Recommendations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/priority-accounts-security-recommendations.md
audience: Admin Previously updated : - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn how to elevate the security settings and use reports, alerts, and investigations for priority accounts in their Microsoft 365 organizations. Last updated : 12/08/2022 # Security recommendations for priority accounts in Microsoft 365
security Quarantine About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-about.md
f1.keywords:
Previously updated : audience: Admin - ms.localizationpriority: medium search.appverid: - MOE150
description: Admins can learn about quarantine in Exchange Online Protection (EOP) that holds potentially dangerous or unwanted messages. Last updated : 12/02/2022 # Quarantined email messages in EOP and Defender for Office 365
security Quarantine Admin Manage Messages Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-admin-manage-messages-files.md
Title: Manage quarantined messages and files as an admin
Previously updated : audience: Admin - ms.localizationpriority: medium search.appverid: - MOE150
description: Admins can learn how to view and manage quarantined messages for all users in Exchange Online Protection (EOP). Admins in organizations with Microsoft Defender for Office 365 can also manage quarantined files in SharePoint Online, OneDrive for Business, and Microsoft Teams. Last updated : 12/02/2022 # Manage quarantined messages and files as an admin in EOP
security Quarantine End User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-end-user.md
f1.keywords:
Previously updated : audience: Consumer/IW - ms.localizationpriority: high search.appverid: - MET150
description: Users can learn how to view and manage quarantined messages in Exch
adobe-target: true Last updated : 12/02/2022 # Find and release quarantined messages as a user in EOP
security Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-policies.md
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn how to use quarantine policies to control what users are able to do to quarantined messages. Last updated : 08/03/2021 # Quarantine policies
security Quarantine Quarantine Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-quarantine-notifications.md
f1.keywords:
Previously updated : audience: Admin - ms.localizationpriority: medium search.appverid: - MOE150
description: Admins can learn about end-user spam notifications for quarantined messages in Exchange Online Protection (EOP). Last updated : 12/02/2022 # Use quarantine notifications to release and report quarantined messages
security Quarantine Shared Mailbox Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-shared-mailbox-messages.md
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Users can learn how to view and act on quarantined messages that were sent to shared mailboxes that they have permissions to. Last updated : 12/02/2022 # View and release quarantined messages from shared mailboxes
security Recommended Settings For Eop And Office365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365.md
f1.keywords:
- NOCSH Previously updated : audience: ITPro
description: What are best practices for Exchange Online Protection (EOP) and Defender for Office 365 security settings? What's the current recommendations for standard protection? What should be used if you want to be more strict? And what extras do you get if you also use Defender for Office 365? Last updated : 01/15/2021 # Recommended settings for EOP and Microsoft Defender for Office 365 security
security Recover From Ransomware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recover-from-ransomware.md
Title: Recover from a ransomware attack
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Microsoft 365 admins can learn how to recover from a ransomware attack. Last updated : 01/21/2020 # Recover from a ransomware attack in Microsoft 365
security Reference Policies Practices And Guidelines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/reference-policies-practices-and-guidelines.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Microsoft has developed various policies, procedures, and adopted several industry best practices to help protect our users from abusive, unwanted, or malicious email. Last updated : 09/13/2019 # Reference: Policies, practices, and guidelines
security Remediate Malicious Email Delivered Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/remediate-malicious-email-delivered-office-365.md
audience: admin
f1.keywords: - NOCSH ms.localizationpriority: medium- search.appverid: MET150 description: Threat remediation Last updated : 07/10/2020 # Remediate malicious email delivered in Office 365
security Removing User From Restricted Users Portal After Spam https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/removing-user-from-restricted-users-portal-after-spam.md
f1.keywords:
Previously updated : audience: ITPro f1_keywords:
- seo-marvel-apr2020 Last updated : 09/13/2019 # Remove blocked users from the Restricted users portal in Microsoft 365
security Reports Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/reports-defender-for-office-365.md
f1.keywords:
Previously updated : audience: ITPro ms.localizationpriority: medium
- seo-marvel-apr2020 Last updated : 12/02/2022 # View Defender for Office 365 reports in the Microsoft 365 Defender portal
security Reports Email Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/reports-email-security.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
- seo-marvel-apr2020 Last updated : 12/02/2022 # View email security reports in the Microsoft 365 Defender portal
security Responding To A Compromised Email Account https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account.md
search.appverid:
description: Learn how to recognize and respond to a compromised email account using tools available in Microsoft 365. Last updated : 09/16/2019 + # Responding to a Compromised Email Account [!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
security Safe Attachments About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-about.md
audience: Admin Previously updated : - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn about the Safe Attachments feature in Microsoft Defender for Office 365. Last updated : 12/05/2022 # Safe Attachments in Microsoft Defender for Office 365
security Safe Attachments For Spo Odfb Teams About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-about.md
audience: Admin Previously updated : - ms.localizationpriority: medium search.appverid: - MET150
description: Learn about Microsoft Defender for Office 365 for files in SharePoint Online, OneDrive for Business, and Microsoft Teams. Last updated : 12/05/2022 # Safe Attachments for SharePoint, OneDrive, and Microsoft Teams
security Safe Attachments For Spo Odfb Teams Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-configure.md
audience: ITPro Previously updated : ms.localizationpriority: medium search.appverid: - MET150
- seo-marvel-apr2020 Last updated : 12/05/2022 # Turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams
security Safe Attachments Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-policies-configure.md
description: Learn about how to define Safe Attachments policies to protect your
Last updated : 12/05/2022 # Set up Safe Attachments policies in Microsoft Defender for Office 365
security Safe Documents In E5 Plus Security About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-documents-in-e5-plus-security-about.md
Previously updated : audience: ITPro ms.localizationpriority: medium
description: Learn about Safe Documents in Microsoft 365 A5 or E5 Security. Last updated : 12/05/2022 # Safe Documents in Microsoft 365 A5 or E5 Security
security Safe Links Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-policies-configure.md
audience: Admin Previously updated :- ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn how to view, create, modify, and delete Safe Links policies and global Safe Links settings in Microsoft Defender for Office 365. Last updated : 12/05/2022 # Set up Safe Links policies in Microsoft Defender for Office 365
security Safe Links Policies Global Settings Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-policies-global-settings-configure.md
audience: Admin Previously updated :- ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn how to view and configure global settings (the 'Block the following URLs' list and protection for Office 365 apps) for Safe Links in Microsoft Defender for Office 365. Last updated : 12/05/2022 # Configure global settings for Safe Links in Microsoft Defender for Office 365
security Scc Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/scc-permissions.md
f1.keywords:
Previously updated : audience: Admin f1_keywords:
- seo-marvel-apr2020 Last updated : 12/05/2022 # Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview compliance
security Secure Email Recommended Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/secure-email-recommended-policies.md
- highpri search.appverid: met150 Last updated : 10/08/2020 # Policy recommendations for securing email
security Sending Mail To Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/sending-mail-to-office-365.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Learn as a guest sender, how can you increase the ability to deliver email to users in Microsoft 365. Also learn how to report junk email & phishing attempts as a guest. Last updated : 09/13/2019 # Sending mail to Microsoft 365
security Services For Non Customers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/services-for-non-customers.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: To help maintain user trust in the use of email, Microsoft has put in place various policies and technologies to help protect our users. Last updated : 09/13/2019 # Services for non-customers sending mail to Microsoft 365
security Sharepoint File Access Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/sharepoint-file-access-policies.md
- highpri search.appverid: met150 Last updated : 10/08/2020 # Policy recommendations for securing SharePoint sites and files
security Skip Filtering Phishing Simulations Sec Ops Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes.md
f1.keywords:
Previously updated : audience: ITPro
description: Admins can learn how to use the advanced delivery policy in Exchange Online Protection (EOP) to identify messages that should not be filtered in specific supported scenarios (third-party phishing simulations and messages delivered to security operations (SecOps) mailboxes. Last updated : 12/20/2022 # Configure the delivery of third-party phishing simulations to users and unfiltered messages to SecOps mailboxes
security Assess The Impact Of Security Configuration Changes With Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/assess-the-impact-of-security-configuration-changes-with-explorer.md
- tier3 search.appverid: met150 Last updated : 07/14/2022 # Assess the impact of security configuration changes with Explorer
security Connect Microsoft Defender For Office 365 To Microsoft Sentinel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/connect-microsoft-defender-for-office-365-to-microsoft-sentinel.md
- tier3 search.appverid: met150 Last updated : 05/24/2022 # Connect Microsoft Defender for Office 365 to Microsoft Sentinel
security Defense In Depth Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/defense-in-depth-guide.md
- tier3 search.appverid: met150 Last updated : 08/31/2022 # Getting the best security value from Microsoft Defender for Office 365 when you have third party email filtering
security Deploy And Configure The Report Message Add In https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/deploy-and-configure-the-report-message-add-in.md
- tier3 search.appverid: met150 Last updated : 07/14/2022 # Deploy and configure the report message add-in to users
security Ensuring You Always Have The Optimal Security Controls With Preset Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/ensuring-you-always-have-the-optimal-security-controls-with-preset-security-policies.md
search.appverid: met150 Last updated : 05/10/2022 # Set up steps for the Standard or Strict preset security policies in Microsoft Defender for Office 365
security How To Configure Quarantine Permissions With Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-configure-quarantine-permissions-with-quarantine-policies.md
search.appverid: met150 Last updated : 05/10/2022 # How to configure quarantine permissions and policies
security How To Enable Dmarc Reporting For Microsoft Online Email Routing Address Moera And Parked Domains https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-enable-dmarc-reporting-for-microsoft-online-email-routing-address-moera-and-parked-domains.md
search.appverid: met150 Last updated : 07/14/2022 # How to enable DMARC Reporting for Microsoft Online Email Routing Address (MOERA) and parked Domains
security How To Handle False Negatives In Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365.md
search.appverid: met150 Last updated : 06/01/2022 # How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365
security How To Handle False Positives In Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365.md
search.appverid: met150 Last updated : 06/01/2022 # How to handle Legitimate emails getting blocked (False Positive), using Microsoft Defender for Office 365
security How To Prioritize And Manage Automated Investigations And Response Air https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-prioritize-and-manage-automated-investigations-and-response-air.md
search.appverid: met150 Last updated : 05/24/2022 # Prioritize and manage Automated Investigations and Response (AIR)
security How To Prioritize Manage Investigate And Respond To Incidents In Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-prioritize-manage-investigate-and-respond-to-incidents-in-microsoft-365-defender.md
search.appverid: met150 Last updated : 05/24/2022 # Prioritize, Manage, Investigate & Respond to Incidents in Microsoft 365 Defender
security How To Run Attack Simulations For Your Team https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-run-attack-simulations-for-your-team.md
search.appverid: met150 Last updated : 05/10/2022 # How to run attack simulations for your team
security How To Setup Attack Simulation Training For Automated Attacks And Training https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-setup-attack-simulation-training-for-automated-attacks-and-training.md
search.appverid: met150 Last updated : 05/10/2022 # How to setup automated attacks and training within Attack simulation training
security Optimize And Correct Security Policies With Configuration Analyzer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/optimize-and-correct-security-policies-with-configuration-analyzer.md
search.appverid: met150 Last updated : 05/10/2022 # Optimize and correct security policies with configuration analyzer
security Protect Your C Suite With Priority Account Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/protect-your-c-suite-with-priority-account-protection.md
search.appverid: met150 Last updated : 05/10/2022 # Protect your c-suite with priority account protection
security Reducing Attack Surface In Microsoft Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/reducing-attack-surface-in-microsoft-teams.md
search.appverid: met150 Last updated : 01/05/2023 - # Reduce the attack surface for Microsoft Teams Microsoft Teams is a widely used collaboration tool, where many users are now spending their time. Attackers know this and are pivoting. Below are a set of steps you can perform to reduce the attack surface in Teams and help keep your organization more secure.
security Review Allow Entries https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/review-allow-entries.md
search.appverid: met150 Last updated : 01/04/2023 # Introduction
security Search For Emails And Remediate Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/search-for-emails-and-remediate-threats.md
search.appverid: met150 Last updated : 05/10/2022 # Steps to use manual email remediation in Threat Explorer
security Stay Informed With Message Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/stay-informed-with-message-center.md
search.appverid: met150 Last updated : 06/06/2022 # Set up a digest notification of changes to Microsoft Defender for Office 365 using the message center
security Step By Step Guide Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/step-by-step-guide-overview.md
search.appverid: met150 Last updated : 06/06/2022 # Welcome to the Microsoft Defender for Office 365 step-by-step guides
security Track And Respond To Emerging Threats With Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/track-and-respond-to-emerging-threats-with-campaigns.md
search.appverid: met150 Last updated : 09/01/2022 # Track and respond to emerging threats with campaigns in Microsoft Defender for Office 365
security Utilize Microsoft Defender For Office 365 In Sharepoint Online https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/utilize-microsoft-defender-for-office-365-in-sharepoint-online.md
search.appverid: met150 Last updated : 08/03/2022 # Use Microsoft Defender for Office 365 with SharePoint Online
security Submissions Admin https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-admin.md
description: Admins can learn how to use the Submissions portal in the Microsoft 365 Defender portal to submit legitimate email getting blocked, suspicious email, suspected phishing email, spam, other potentially harmful messages, URLs, and email attachments to Microsoft for rescanning. Last updated : 12/05/2022 # Use the Submissions portal to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft
security Submissions Error Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-error-messages.md
description: Learn about the errors that admins might encounter when they try to
search.appverid: met150 Last updated : 01/12/2023 # Errors during admin submissions
security Submissions Outlook Report Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-outlook-report-messages.md
description: Learn how to report false positives and false negatives in Outlook
search.appverid: met150 Last updated : 12/05/2022 # Report false positives and false negatives in Outlook
security Submissions Report Messages Files To Microsoft https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-report-messages-files-to-microsoft.md
Watch this video that shows more information about the unified submissions exper
## Report suspicious email messages to Microsoft
+> [!NOTE]
+> When you report an email entity to Microsoft, everything associated with the email is copied to include it in the continual algorithm reviews. This copy includes the email content, email headers, and related data about email routing. Any message attachments are also included.
+>
+> Microsoft treats your feedback as your organization's permission to analyze all the information to fine tune the message hygiene algorithms. Your message is held in secured and audited data centers in the USA. The submission is deleted as soon as it's no longer required. Microsoft personnel might read your submitted messages and attachments, which is normally not permitted for email in Microsoft 365. However, your email is still treated as confidential between you and Microsoft, and your email or attachments isn't shared with any other party as part of the review process.
+ |Method|Submission type|Comments| |||| |[The built-in Report button](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook-on-the-web)|User|Currently, this method is available only in Outlook on the web (formerly known as Outlook Web App or OWA).|
Admins can also submit email attachments and other suspected files to Microsoft
> Information is blocked from going outside the organization when data isn't supposed to leave the tenant boundary for compliance purposes (for example, in U.S. Government organizations: Microsoft 365 GCC, GCC High, and DoD). Reporting a message or file to Microsoft from one of these organizations will have the following message in the result details: > > **Further investigation needed**. Your tenant doesn't allow data to leave the environment, so nothing was found during the initial scan. You'll need to contact Microsoft support to have this item reviewed.-
-> [!NOTE]
-> When you report an email entity to Microsoft, everything associated with the email is copied to include it in the continual algorithm reviews. This copy includes the email content, email headers, and related data about email routing. Any message attachments are also included.
->
-> Microsoft treats your feedback as your organization's permission to analyze all the information to fine tune the message hygiene algorithms. Your message is held in secured and audited data centers in the USA. The submission is deleted as soon as it's no longer required. Microsoft personnel might read your submitted messages and attachments, which is normally not permitted for email in Microsoft 365. However, your email is still treated as confidential between you and Microsoft, and your email or attachments isn't shared with any other party as part of the review process.
-
security Submissions Submit Files To Microsoft https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-submit-files-to-microsoft.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Admins and end-users can learn about submitting undetected malware or mis-identified malware attachments to Microsoft for analysis. Last updated : 12/05/2022 # Submit malware, non-malware, and other suspicious files to Microsoft for analysis
security Submissions User Reported Messages Files Custom Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-user-reported-messages-files-custom-mailbox.md
f1.keywords:
Previously updated : audience: ITPro ms.localizationpriority: medium
description: "Admins can configure where user reported messages go for analysis: to an internal reporting mailbox, to Microsoft, or to both. Other settings complete the reporting experience for users when they report good or bad messages." Last updated : 12/05/2022 # User reported message settings
When the toggle is **On** ![Toggle on.](../../media/scc-toggle-on.png) and you'v
- **My reporting mailbox only**: User reported messages go only to the specified reporting mailbox for an admin or the security operations team to analyze.
- In the **Add a mailbox to send reported messages to** box that appears, enter the email address of an existing Exchange Online mailbox to use as the reporting mailbox that holds user reported messages from Microsoft reporting tools. Distribution groups are not allowed.
+ In the **Add a mailbox to send reported messages to** box that appears, enter the email address of an existing Exchange Online mailbox to use as the reporting mailbox that holds user reported messages from Microsoft reporting tools. Distribution groups and routing to an external or on-premises mailbox are not allowed.
Messages don't go to Microsoft for analysis unless an admin manually submits the message from the **Emails** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=email>.
security Tenant Allow Block List Email Spoof Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-email-spoof-configure.md
f1.keywords:
Previously updated : audience: ITPro ms.localizationpriority: medium
description: Admins can learn how to allow or block email and spoofed sender entries in the Tenant Allow/Block List in the Security portal. Last updated : 12/05/2022 # Allow or block email using the Tenant Allow/Block List
security Tenant Allow Block List Files Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-files-configure.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
description: Admins can learn how to allow or block files in the Tenant Allow/Block List in the Security portal. Last updated : 12/05/2022 # Allow or block files using the Tenant Allow/Block List
security Tenant Allow Block List Urls Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-urls-configure.md
f1.keywords:
Previously updated : audience: ITPro ms.localizationpriority: medium
description: Admins can learn how to allow or block URLs in the Tenant Allow/Block List in the Security portal. Last updated : 12/05/2022 # Allow or block URLs using the Tenant Allow/Block List
security Tenant Wide Setup For Increased Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-wide-setup-for-increased-security.md
description: Manual configurations for Exchange Online Protection, Microsoft Defender for Office 365, Plan 1 and 2, and Microsoft 365 Defender, for complete protection of your Office 365 subscription. Last updated : 09/13/2019 # Configure your Microsoft 365 tenant for increased security
security Threat Explorer About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-explorer-about.md
- seo-marvel-apr2020 Last updated : 12/05/2022 # Threat Explorer and Real-time detections
security Threat Trackers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-trackers.md
description: Learn about Threat Trackers, including new Noteworthy Trackers, to help your organization stay on top of security concerns. Last updated : 09/13/2019 # Threat Trackers - New and Noteworthy
security Trial User Guide Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/trial-user-guide-defender-for-office-365.md
search.appverid:
description: "Microsoft Defender for Office 365 solutions trial user guide." Last updated : 11/03/2022 # Trial user guide: Microsoft Defender for Office 365
security Try Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/try-microsoft-defender-for-office-365.md
ROBOTS: Last updated : 03/28/2022 # Try Microsoft Defender for Office 365
security Use Arc Exceptions To Mark Trusted Arc Senders https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/use-arc-exceptions-to-mark-trusted-arc-senders.md
description: Authenticated Received Chain (ARC) is email authentication that tries to preserve authentication results across devices and any indirect mailflows that come between the sender and recipient. Here's how to make exceptions for your trusted ARC Senders. Last updated : 05/17/2022 # Make a list of trusted ARC Senders to trust *legitimate* indirect mailflows
security Walkthrough Spoof Intelligence Insight https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/walkthrough-spoof-intelligence-insight.md
f1.keywords:
Previously updated : audience: ITPro - ms.localizationpriority: medium search.appverid: - MET150
Last updated : 09/13/2019 # Manage spoofed senders using the spoof intelligence policy and spoof intelligence insight in EOP
security Zero Hour Auto Purge https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-hour-auto-purge.md
f1.keywords:
Previously updated : audience: Admin - ms.localizationpriority: medium search.appverid: - MOE150
description: Zero-hour auto purge (ZAP) retroactively moves delivered messages in an Exchange Online mailbox to the Junk Email folder or quarantine that are found to be spam, phishing, or that contain malware after delivery. Last updated : 09/13/2019 # Zero-hour auto purge (ZAP) in Exchange Online
syntex Prebuilt Model Invoice https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-model-invoice.md
The prebuilt *invoices model* analyzes and extracts key information from sales i
To use an invoices model, follow these steps: -- Step 1: [Create an invoices model](#create-an-invoices-model)-- Step 2: [Upload an example file to analyze](#upload-an-example-file-to-analyze)-- Step 3: [Select extractors for your model](#select-extractors-for-your-model)-- Step 4: [Apply the model](#apply-the-model)
+- Step 1: [Create an invoices model](#step-1-create-an-invoices-model)
+- Step 2: [Upload an example file to analyze](#step-2-upload-an-example-file-to-analyze)
+- Step 3: [Select extractors for your model](#step-3-select-extractors-for-your-model)
+- Step 4: [Apply the model](#step-4-apply-the-model)
-## Create an invoices model
+## Step 1: Create an invoices model
Follow the instructions in [Create a model in Syntex](create-syntex-model.md) to create a prebuilt invoices model. Then continue with the following steps to complete your model. -
-<!
-## Create an invoices model
-
-Follow these steps to create a trained invoices model.
-
-1. From the **Models** page, select **Create a model**.
-
- ![Screenshot of the Models page showing the Create a model button.](../media/content-understanding/create-a-model-from-the-models-page.png)
--
-2. On the **View options for classification and extraction** page, in the **Use a trained model** section, select **Invoices**.
-
- ![Screenshot of the View options for classification and extraction page showing the custom models and trained models.](../media/content-understanding/view-options-for-classification-and-extraction-page.png)
-
-3. To continue, follow these [instructions to continue to create an invoices model](create-syntex-model.md#invoices).
-
- > [!NOTE]
- > Sensitivity labels are not available for trained models at this time.
->
-
-## Upload an example file to analyze
+## Step 2: Upload an example file to analyze
1. On the **Models** page, in the **Add a file to analyze** section, select **Add file**.
- ![Screenshot of the new models page showing the Add a file to analyze section.](../media/content-understanding/prebuilt-add-file-to-analyze.png)
+ ![Screenshot of the new models page showing the Add a file to analyze section.](../media/content-understanding/prebuilt-add-file-to-analyze-invoice.png)
2. On the **Files to analyze the model** page, select **Add** to find the file you want to use.
Follow these steps to create a trained invoices model.
4. On the **Files to analyze the model** page, select **Next**.
-## Select extractors for your model
+## Step 3: Select extractors for your model
On the extractor details page, you'll see the document area on the right and the **Extractors** panel on the left. The **Extractors** panel shows the list of extractors that have been identified in the document.
To rename an extractor from the **Extractors** panel:
2. In the **Rename extractor** box, enter the new name of the extractor, and then select **Rename**.
-## Apply the model
+## Step 4: Apply the model
- To save changes and return to the model home page, on the **Extractors** panel, select **Save and exit**.
syntex Prebuilt Model Receipt https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-model-receipt.md
Follow the instructions in [Create a model in Syntex](create-syntex-model.md) to
1. On the **Models** page, in the **Add a file to analyze** section, select **Add file**.
- ![Screenshot of the new models page showing the Add a file to analyze section.](../media/content-understanding/prebuilt-add-file-to-analyze.png)
+ ![Screenshot of the new models page showing the Add a file to analyze section.](../media/content-understanding/prebuilt-add-file-to-analyze-receipt.png)
2. On the **Files to analyze the model** page, select **Add** to find the file you want to use.
whiteboard Manage Whiteboard Access Organizations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-whiteboard-access-organizations.md
To enable or disable Whiteboard for your tenant, do the following steps:
## Show or hide Whiteboard
-To show or hide Whiteboard in meetings, see [Meeting policy settings](/microsoftteams/meeting-policies-content-sharing).
+To show or hide Whiteboard in meetings, see [Meeting policy settings](/microsoftteams/meeting-policies-content-sharing). To control the availability of the Whiteboard app for each user within the organization, see [App Policies settings](/microsoftteams/app-policies).
## Prevent access to Whiteboard