Updates from: 03/10/2023 03:54:15
Category Microsoft Docs article Related commit history on GitHub Change details
compliance Apply Retention Labels Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-retention-labels-automatically.md
When you create an auto-apply policy, you select a retention label to automatica
5. Depending on your selected scope:
- - If you chose **Adaptive**: On the **Choose adaptive policy scopes and locations** page, select **Add scopes** and select one or more adaptive scopes that have been created. Then, select one or more locations. The locations that you can select depend on the [scope types](purview-adaptive-scopes.md#configure-adaptive-scopes) added. For example, if you only added a scope type of **User**, you will be able to select **Exchange email** but not **SharePoint sites**.
+ - If you chose **Adaptive**: On the **Choose adaptive policy scopes and locations** page, select **Add scopes** and select one or more adaptive scopes that have been created. Then, select one or more locations. The locations that you can select depend on the [scope types](purview-adaptive-scopes.md#configure-adaptive-scopes) added. For example, if you only added a scope type of **User**, you will be able to select **Exchange mailboxes** but not **SharePoint sites**.
- If you chose **Static**: On the **Choose locations** page, toggle on or off any of the locations. For each location, you can leave it at the default to [apply the policy to the entire location](retention-settings.md#a-policy-that-applies-to-entire-locations), or [specify includes and excludes](retention-settings.md#a-policy-with-specific-inclusions-or-exclusions)
To consider when using sensitive information types to auto-apply retention label
- If you use custom sensitive information types, these can't auto-label existing items in SharePoint and OneDrive. -- For emails, you can't select specific recipients to include or exclude; only the **All recipients** setting is supported and for this configuration only, it includes mailboxes from Microsoft 365 groups.
+- For emails, you can't select specific recipients to include or exclude; only the **All mailboxes** setting is supported and for this configuration only, it includes mailboxes from Microsoft 365 groups.
#### Auto-apply labels to content with keywords or searchable properties
When you select a label to use for auto-applying retention labels for cloud atta
When you configure the locations for this option, you can select: -- **SharePoint sites** for shared files stored in SharePoint communication sites, team sites that aren't connected by Microsoft 365 groups, and classic sites.
+- **SharePoint classic and communication sites** for shared files stored in SharePoint communication sites, team sites that aren't connected by Microsoft 365 groups, and classic sites.
- **Microsoft 365 Groups** for shared files that are stored in team sites connected by Microsoft 365 groups. - **OneDrive accounts** for shared files stored in users' OneDrive.
compliance Audit Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-mailboxes.md
The value **True** indicates that mailbox audit logging is bypassed for the user
- If a mailbox is placed on hold or assigned to a retention policy in the compliance portal, audit log records are still retained for the duration that's defined by the mailbox's *AuditLogAgeLimit* property (90 days by default). To retain audit log records longer for mailboxes on hold, you need to increase mailbox's *AuditLogAgeLimit* value. -- In a multi-geo environment, cross-geo mailbox auditing isn't supported. For example, if a user is assigned permissions to access a shared mailbox in a different geo location, mailbox actions performed by that user aren't logged in the mailbox audit log of the shared mailbox. Exchange admin audit events are currently only available for the default location.
+- In a multi-geo environment, cross-geo mailbox auditing isn't supported. For example, if a user is assigned permissions to access a shared mailbox in a different geo location, mailbox actions performed by that user aren't logged in the mailbox audit log of the shared mailbox. Exchange admin audit events are available for all locations via [Microsoft Purview](/microsoft-365/compliance/audit-solutions-overview) and the [Search-UnifiedAuditLog](/powershell/module/exchange/search-unifiedauditlog) cmdlet.
compliance Auto Apply Retention Labels Scenario https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/auto-apply-retention-labels-scenario.md
Now that we've verified that the KQL query is working, let's create an auto-appl
![Specify the query in the Keyword query editor box.](../media/SPRetention19.png)
-5. On the **Choose locations to apply the policy** page, you select the content locations that you want to apply the policy to. For this scenario, we apply the policy only to SharePoint locations, because all the production documents are stored in SharePoint document libraries. Toggle the status for **Exchange email**, **OneDrive accounts**, and **Microsoft 365 Groups** to **Off**. Make sure that the status for SharePoint sites is set to **On** before you select **Next**:
+5. On the **Choose locations to apply the policy** page, you select the content locations that you want to apply the policy to. For this scenario, we apply the policy only to SharePoint locations, because all the production documents are stored in SharePoint document libraries. Toggle the status for **Exchange mailboxes**, **OneDrive accounts**, and **Microsoft 365 Group mailboxes & sites** to **Off**. Make sure that the status for SharePoint sites is set to **On** before you select **Next**:
![Choose specific sites to auto-apply labels to.](../media/SPRetentionSPlocations.png)
compliance Create Apply Retention Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-apply-retention-labels.md
Decide before you create your retention label policy whether it will be **adapti
5. Depending on your selected scope:
- - If you chose **Adaptive**: On the **Choose adaptive policy scopes and locations** page, select **Add scopes** and select one or more adaptive scopes that have been created. Then, select one or more locations. The locations that you can select depend on the [scope types](purview-adaptive-scopes.md#configure-adaptive-scopes) added. For example, if you only added a scope type of **User**, you will be able to select **Exchange email** but not **SharePoint sites**.
+ - If you chose **Adaptive**: On the **Choose adaptive policy scopes and locations** page, select **Add scopes** and select one or more adaptive scopes that have been created. Then, select one or more locations. The locations that you can select depend on the [scope types](purview-adaptive-scopes.md#configure-adaptive-scopes) added. For example, if you only added a scope type of **User**, you will be able to select **Exchange email** but not **SharePoint sites**.
- If you chose **Static**: On the **Choose locations** page, toggle on or off any of the locations. For each location, you can leave it at the default to [apply the policy to the entire location](retention-settings.md#a-policy-that-applies-to-entire-locations), or [specify includes and excludes](retention-settings.md#a-policy-with-specific-inclusions-or-exclusions)
If the labels don't appear after seven days, check the **Status** of the label p
Set-AppRetentionCompliancePolicy -Identity <policy name> -RetryDistribution ```
- - For all other policy locations, such as **Exchange email**, **SharePoint sites**, **Teams channel messages** etc.:
+ - For all other policy locations, such as **Exchange mailboxes**, **SharePoint classic and communication sites**, **Teams channel messages** etc.:
```PowerShell Set-RetentionCompliancePolicy -Identity <policy name> -RetryDistribution
compliance Create Retention Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-retention-policies.md
f1.keywords:
Previously updated : 02/21/2023 Last updated : 03/06/2023 audience: Admin
Decide before you create your retention policy whether it will be **adaptive** o
Although a retention policy can support multiple services that are identified as "locations" in the retention policy, you can't create a single retention policy that includes all the supported locations: -- Exchange email-- SharePoint site-- OneDrive accounts-- Microsoft 365 groups-- Skype for Business-- Exchange public folders-- Teams channel messages-- Teams chats-- Teams private channel messages-- Yammer community messages-- Yammer user messages
+- **Exchange mailboxes**
+- **SharePoint sites** or **SharePoint classic and communication sites**
+- **OneDrive accounts**
+- **Microsoft 365 Group mailboxes and sites**
+- **Skype for Business**
+- **Exchange public folders**
+- **Teams channel messages**
+- **Teams chats**
+- **Teams private channel messages**
+- **Yammer community messages**
+- **Yammer user messages**
If you select the Teams or Yammer locations when you create a retention policy, the other locations are automatically excluded. This means that the instructions to follow depend on whether you need to include the Teams or Yammer locations.
For technical details about how retention works for Teams, including what elemen
#### Additional retention policy needed to support Teams
-Teams is more than just chats and channel messages. If you have teams that were created from a Microsoft 365 group (formerly Office 365 group), you should additionally configure a retention policy that includes that Microsoft 365 group by using the **Microsoft 365 Groups** location. This retention policy applies to content in the group's mailbox, site, and files.
+Teams is more than just chats and channel messages. If you have teams that were created from a Microsoft 365 group (formerly Office 365 group), you should additionally configure a retention policy that includes that Microsoft 365 group by using the **Microsoft 365 Group mailboxes & sites** location. This retention policy applies to content in the group's mailbox, site, and files.
-If you have team sites that aren't connected to a Microsoft 365 group, you need a retention policy that includes the **SharePoint sites** or **OneDrive accounts** locations to retain and delete files in Teams:
+If you have team sites that aren't connected to a Microsoft 365 group, you need a retention policy that includes the **SharePoint classic and communication sites** or **OneDrive accounts** locations to retain and delete files in Teams:
- Files that are shared in chat are stored in the OneDrive account of the user who shared the file.
For technical details about how retention works for Yammer, including what eleme
#### Additional retention policies needed to support Yammer
-Yammer is more than just community messages and private messages. To retain and delete email messages for your Yammer network, configure an additional retention policy that includes any Microsoft 365 groups that are used for Yammer, by using the **Microsoft 365 Groups** location.
+Yammer is more than just community messages and private messages. To retain and delete email messages for your Yammer network, configure an additional retention policy that includes any Microsoft 365 groups that are used for Yammer, by using the **Microsoft 365 Group mailboxes & sites** location.
This location will also include files that are uploaded to Yammer communities. These files are stored in the group-connected SharePoint site for the Yammer community.
Use the following instructions for retention policies that apply to any of these
4. Depending on your selected scope:
- - If you chose **Adaptive**: On the **Choose adaptive policy scopes and locations** page, select **Add scopes** and select one or more adaptive scopes that have been created. Then, select one or more locations. The locations that you can select depend on the [scope types](purview-adaptive-scopes.md#configure-adaptive-scopes) added. For example, if you only added a scope type of **User**, you'll be able to select **Exchange email** but not **SharePoint sites**.
+ - If you chose **Adaptive**: On the **Choose adaptive policy scopes and locations** page, select **Add scopes** and select one or more adaptive scopes that have been created. Then, select one or more locations. The locations that you can select depend on the [scope types](purview-adaptive-scopes.md#configure-adaptive-scopes) added. For example, if you only added a scope type of **User**, you'll be able to select **Exchange mailboxes** but not **SharePoint sites**.
- If you chose **Static**: On the **Choose locations** page, toggle on or off any of the locations except the locations for Teams and Yammer. For each location, you can leave it at the default to [apply the policy to the entire location](retention-settings.md#a-policy-that-applies-to-entire-locations), or [specify includes and excludes](retention-settings.md#a-policy-with-specific-inclusions-or-exclusions). Information specific to locations:
- - [Exchange email and Exchange public folders](retention-settings.md#configuration-information-for-exchange-email-and-exchange-public-folders)
+ - [Exchange mailboxes and Exchange public folders](retention-settings.md#configuration-information-for-exchange-mailboxes-and-exchange-public-folders)
- [SharePoint sites and OneDrive accounts](retention-settings.md#configuration-information-for-sharepoint-sites-and-onedrive-accounts)
- - [Microsoft 365 Groups](retention-settings.md#configuration-information-for-microsoft-365-groups)
+ - [Microsoft 365 Group mailboxes & sites](retention-settings.md#configuration-information-for-microsoft-365-group-mailboxes--sites)
- [Skype for Business](retention-settings.md#configuration-information-for-skype-for-business) 5. For **Decide if you want to retain content, delete it, or both** page, specify the configuration options for retaining and deleting content.
First, the retention policy needs to be distributed to the locations that you se
Set-AppRetentionCompliancePolicy -Identity <policy name> -RetryDistribution ```
- - For all other policy locations, such as **Exchange email**, **SharePoint sites**, and **Teams channel messages**:
+ - For all other policy locations, such as **Exchange mailboxes**, **SharePoint classic and communication sites**, and **Teams channel messages**:
```PowerShell Set-RetentionCompliancePolicy -Identity <policy name> -RetryDistribution
compliance Dlp Create Deploy Policy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-create-deploy-policy.md
Endpoint
Endpoint + Teams -->
+### Scenario 2 Show policy tip as oversharing popup (preview)
+
+> [!IMPORTANT]
+> This is a hypothetical scenario with hypothetical values. It's only for illustrative purposes. You should substitute your own sensitive information types, sensitivity labels, distribution groups and users.
+
+#### Scenario 2 pre-requisites and assumptions
+
+This scenario uses the *Highly confidential* sensitivity label, so it requires that you have created and published sensitivity labels. To learn more, see:
+
+- [Learn about sensitivity labels](sensitivity-labels.md)
+- [Get started with sensitivity labels](get-started-with-sensitivity-labels.md)
+- [Create and configure sensitivity labels and their policies](create-sensitivity-labels.md)
+
+This procedure uses a hypothetical company domain at Contoso.com.
+
+#### Scenario 2 policy intent and mapping
+
+*We need to block emails to all recipients that have the ΓÇÿhighly confidentialΓÇÖ sensitivity label applied except if the recipient domain is contoso.com. We want to notify the user on send with a popup dialogue and no one can be allowed to override the block.*
++
+|Statement|Configuration question answered and configuration mapping|
+|||
+|"We need to block emails to all recipients..."|- **Where to monitor**: Exchange </br>- **Administrative scope**: Full directory </br>- **Action**: Restrict access or encrypt the content in Microsoft 365 locations > Block users from receiving email or accessing shared SharePoint, OneDrive, and Teams files > Block everyone |
+|"...that have the 'highly confidential' sensitivity label applied..."| - **What to monitor**: use the Custom template </br> - **Conditions for a match**: edit it to add the *highly confidential* sensitivity label|
+|"...except if..."| **Condition group configuration** - Create a nested boolean NOT condition group joined to the first conditions using a boolean AND|
+|"...the recipient domain is contoso.com."| **Condition for match**: Recipient domain is|
+|"...Notify..."|**User notifications**: enabled|
+|"...the user on send with a popup dialogue..."| **Policy tips**: selected </br> - **Show policy tip as a dialog for the end user before send**: selected|
+|"...and no one can be allowed to override the block...| **Allow overrides from M365 Services**: not selected|
++
+#### Steps to create policy for scenario 2
+
+> [!IMPORTANT]
+> For the purposes of this policy creation procedure, you'll accept the default include/exclude values and leave the policy turned off. You'll be changing these when you deploy the policy.
+
+1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>.
+
+1. In the Microsoft Purview compliance portal \> left navigation \> **Solutions** \> **Data loss prevention** \> **Policies** \> **+ Create policy**.
+
+1. Select **Custom** from the **Categories** list.
+
+1. Select **Custom** from the **Templates** list.
+
+1. Give the policy a name.
+
+> [!IMPORTANT]
+> Policies cannot be renamed.
+
+5. Fill in a description. You can use the policy intent statement here.
+
+1. Select **Next**.
+
+1. Select **Full directory** under **Admin units**.
+
+1. Set the **Exchange email** location status to **On**. Set all the other location status to **Off**.
+
+1. Select **Next**.
+
+1. Accept the default values for **Include** = **All** and **Exclude** = **None**.
+
+1. The **Create or customize advanced DLP rules** option should already be selected.
+
+1. Select **Next**.
+
+1. Select **Create rule**. Name the rule and provide a description.
+
+1. Select **Add condition** > **Content contains** > **Add** > **Sensitivity labels** > **Highly confidential**. Choose **Add**.
+
+1. Select **Add group** > **AND** > **NOT** > **Add condition**.
+
+1. Select **Recipient domain is** > **contoso.com**. Choose **Add**.
+
+1. Select **Add and action** > **Restrict access or encrypt the content in Microsoft 365 locations** > **Restrict access or encrypt the content in Microsoft 365 locations** > **Block users from receiving email or accessing shared SharePoint, OneDrive, and Teams file.** > **Block everyone**.
+
+1. Set **User notifications** to **On**.
+
+1. Select **Policy tips** > **Show the policy tip as a dialog for the end user before send**.
+
+1. Make sure that **Allow override from M365 services** *isn't* selected.
+
+1. Choose **Save**.
+
+1. Choose **Next** > **Keep it off** > **Next** > **Submit**.
++ ## Deployment A successful policy deployment isn't just about getting the policy into your environment to enforce controls on user actions. A haphazard, rushed deployment can negatively impact business process and annoy your users. Those consequences will slow acceptance of DLP technology in your organization and the safer behaviors it promotes. Ultimately making your sensitive items less safe in the long run.
compliance Dlp Policy Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md
f1.keywords: CSH
Previously updated : 02/27/2023 Last updated : 03/06/2023 audience: Admin
If you're new to Microsoft Purview DLP, here's a list of the core articles you'l
1. [Set goals and strategy](dlp-overview-plan-for-dlp.md#set-goals-and-strategy) 1. [Data Loss Prevention policy reference](dlp-policy-reference.md#data-loss-prevention-policy-reference) - this article that you're reading now introduces all the components of a DLP policy and how each one influences the behavior of a policy 1. [Design a DLP policy](dlp-policy-design.md) - this article walks you through creating a policy intent statement and mapping it to a specific policy configuration.
-1. [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) - This article presents some common policy intent scenarios that you'll map to configuration options, then it walks you through configuring those options.
+1. [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) - This article presents some common policy intent scenarios that you'll map to configuration options. It also walks you through configuring those options.
+
+Also, you need to be aware of the following constraints of the platform:
+
+- Maximum number of MIP + MIG policies in a tenant: 10,000
+- Maximum size of a DLP policy (100 KB)
+- Maximum number of DLP rules:
+ - In a policy: Limited by the size of the policy
+ - In a tenant: 600
+- Maximum size of an individual DLP rule: 80 KB
+- GIR evidence limit: 100, with each SIT evidence, in proportion of occurrence
+- Text extraction limit: 1 MB
+- Regex size limit for all matches predicted: 20 KB
+- Policy name length limit: 64 characters
+- Policy rule length limit: 64 characters
+- Comment length limit: 1024 characters
+- Description length limit: 1024 characters
## Policy templates
DLP policies are scoped at two different levels. The first level lets an unrestr
in your organization (depending on the locations that are selected) or to subgroups of your organization called [Administrative Unit restricted policies (preview)](#administrative-unit-restricted-policies-preview).
-At this level an administrative unit restricted admin will only be able to pick from the administrative units that they're assigned to.
+At this level, an administrative unit restricted admin will only be able to pick from the administrative units that they're assigned to.
The second level of DLP policy scoping is by the [locations](#locations) that DLP supports. At this level, both unrestricted and administrative unit restricted administrators will see only the users, distribution groups, groups, and accounts that were included in the first level of policy scoping and are available in for that location.
All the other rules are evaluated but their actions aren't enforced. Audit logs
### Conditions
-Conditions are where you define what you want the rule to look for and context in which those items are being used. They tell the rule &#8212; when you find an item that looks like *this* and is being used like *that* &#8212; it's a match and the rest of the actions in the policy should be taken on it. You can use conditions to assign different actions to different risk levels. For example, sensitive content shared internally might be lower risk and require fewer actions than sensitive content shared with people outside the organization.
+Conditions are where you define what you want the rule to look for and context in which those items are being used. They tell the ruleΓÇöwhen you find an item that looks like *this* and is being used like *thatΓÇöit's a match and the rest of the actions in the policy should be taken on it. You can use conditions to assign different actions to different risk levels. For example, sensitive content shared internally might be lower risk and require fewer actions than sensitive content shared with people outside the organization.
> [!NOTE] > Users who have non-guest accounts in a host organization's Active Directory or Azure Active Directory tenant are considered as people inside the organization.
The available context options change depending on which location you choose. If
- Sender AD Attribute contains words or phrases - Sender AD Attribute matches patterns - Sender is a member of-- Any email attachment's content could not be scanned
+- Any email attachment's content couldn't be scanned
- Any email attachment's content didn't complete scanning - Attachment is password protected - File extension is
The available context options change depending on which location you choose. If
- Content contains - Document or attachment is password protected (.pdf, Office files, .zip, and Symantec PGP encrypted files are fully supported). This predicate detects only open protected files.-- Content is not labeled (.pdf and Office files are fully supported). This predicate detects content that doesn't have a sensitivity label applied. To help ensure only supported file types are detected, you should use this condition with the **File extension is** or **File type is** conditions.-- (preview) The user accessed a sensitive website from Edge. See, [Scenario 6 Monitor or restrict user activities on sensitive service domains (preview)](endpoint-dlp-using.md#scenario-6-monitor-or-restrict-user-activities-on-sensitive-service-domains) for more information.
+- Content isn't labeled (.pdf and Office files are fully supported). This predicate detects content that doesn't have a sensitivity label applied. To help ensure only supported file types are detected, you should use this condition with the **File extension is** or **File type is** conditions.
+- (preview) The user accessed a sensitive website from Microsoft Edge. See, [Scenario 6 Monitor or restrict user activities on sensitive service domains (preview)](endpoint-dlp-using.md#scenario-6-monitor-or-restrict-user-activities-on-sensitive-service-domains) for more information.
- File extension is - File type is - See, [Endpoint activities you can monitor and take action on](endpoint-dlp-learn-about.md#endpoint-activities-you-can-monitor-and-take-action-on)
The first group contains the SITs that identify an individual and the second gro
Conditions can be grouped and joined by boolean operators (AND, OR, NOT) so that you defining a rule by stating what should be included and then define exclusions in a different group joined to the first by a NOT. To learn more about how Purview DLP implements booleans and nested groups see, [Complex rule design](dlp-policy-design.md#complex-rule-design).
+#### DLP Platform Limitations for Conditions
+
+|Predicate | Workload | Limit | Cost of Evaluation |
+|-|-|--|--|
+|Content Contains | EXO/SPO/ODB | 125 SITs per rule | High |
+|Content is shared from Microsoft 365 | EXO/SPO/ODB | - | High |
+|Sender IP address is | EXO | Individual range length <= 128; Count <= 600 |Low|
+|Has sender overridden the policy tip |EXO | - | Low |
+|Sender is | EXO | Individual email length <= 256; Count <= 600| Medium |
+|Sender is a member of | EXO | Count <= 600 | High |
+|Sender domain is | EXO | Domain name length <= 67; Count <= 600 |Low |
+|Sender address contains words | EXO |Individual word length <= 128; Count <= 600 | Low |
+|Sender address matches patterns | EXO |Regex length <= 128 char; Count <= 600 | Low |
+|Sender AD attribute contains words | EXO | Individual word length <= 128; Count <= 600 | Medium |
+|Sender AD attribute matches patterns | EXO | Regex length <= 128 char; Count <= 600 | Medium |
+|Content of email attachment(s) can't be scanned|EXO| [Supported file types](/exchange/security-and-compliance/mail-flow-rules/inspect-message-attachments#supported-file-types-for-mail-flow-rule-content-inspection) | Low |
+|Incomplete scan of email attachment content | EXO | Size > 1 MB | Low |
+|Attachment is password-protected | EXO | File types: Office files, ZIP, and 7z |Low|
+|Attachment's file extension is |EXO/SPO/ODB | Count <= 50 | High|
+|Recipient is a member of |EXO | Count <= 600 | High |
+|Recipient domain is | EXO| Domain name length <= 67; Count <= 5000 | Low |
+|Recipient is | EXO | Individual email length <= 256; Count <= 600 |Low |
+|Recipient address contains words | EXO | Individual word length <= 128; Count <= 600 | Low |
+|Recipient address matches patterns | EXO | Count <= 300 | Low|
+|Document name contains words or phrases | EXO | Individual word length <= 128; Count <=600 |Low|
+|Document Name matches patterns| EXO | Regex length <= 128 char; Count <= 300 |Low|
+|Document property is | EXO/SPO/ODB | - | Low |
+|Document size equals or is greater than | EXO | - | Low|
+|Subject contains words or phrases | EXO | Individual word length <= 128; Count <= 600| Low|
+|Header contains words or phrases | EXO | Individual word length <= 128; Count <= 600 |Low|
+|Subject or body contains words or phrases |EXO| Individual word length <= 128; Count <= 600 |Low|
+|Content character set contains words |EXO | Count <= 600 |Low|
+|Header matches patterns |EXO | Regex length <= 128 char; Count <= 300 | Low|
+|Subject matches patterns|EXO | Regex length <= 128 char; Count <= 300 | Low|
+|Subject or body matches patterns |EXO |Regex length <= 128 char; Count <= 300 | Low|
+|Message type is | EXO| - | Low|
+|Message size over | EXO | - | Low|
+|With importance | EXO | - | Low|
+|Sender AD attribute contains words |EXO| Each attribute key value pair: has Regex length <= 128 char; Count <= 600 | Medium |
+|Sender AD attribute matches patterns |EXO | Each attribute key value pair: has Regex length <= 128 char; Count <= 300 | Medium|
+|Document contains words | EXO | Individual word length <= 128; Count <= 600 | Medium|
+|Document matches patterns| EXO| Regex length <= 128 char; Count <= 300 | Medium|
++ <!--### Exceptions > [!IMPORTANT]
Whether an action takes effect or not depends on how you configure the mode of t
<!-- This section needs to explain that the actions available depend on the locations selected AND that the observed behavior of a policy is produced through an interaction of the configured actions AND the configured status (off, test, apply) of a policy. It will detail the purpose of each of the available actions and the location/desired outcome interaction and provide examples eg. how to use the Restrict Third Party apps in the context of a policy that is applied to endpoints so that users can't use a upload content to a third party site or the interaction of on-premises scanner with restrict access or remove on-premises files. Also what happens when I select multiple locations? provide abundant examples for most common scenarios-->
+#### DLP Platform Limitations for Actions
+
+|Action Name | Workload | Limits |
+||||
+|Restrict access or encrypt content in Microsoft 365| EXO/SPO/ODB | |
+|Set headers | EXO | |
+|Remove header | EXO | |
+|Redirect the message to specific users | EXO| Total of 100 across all DLP rules. Cannot be DL/SG|
+|Forward the message for approval to sender's manager | EXO | Manager should be defined in AD|
+|Forward the message for approval to specific approvers |EXO | Groups aren't supported|
+|Add recipient to the **To** box | EXO | Recipient count <= 10; Cannot be DL/SG|
+|Add recipient to the **Cc** box | EXO | Recipient count <= 10; Cannot be DL/SG|
+|Add recipient to the **Bcc** box | EXO | Recipient count <= 10; Cannot be DL/SG|
+|Add the sender's manager as recipient | EXO | Manager attribute should be defined in AD|
+|Apply HTML disclaimer| EXO| |
+|Prepend subject| EXO| |
+|Apply OME| EXO | |
+|Remove OME | EXO | |
+ ### User notifications and policy tips <!--This section introduces the business need for user notifications, what they are, their benefit, how to use them, how to customize them, and links out to
for where they are used/expected behavior-->
<!--You can use notifications and overrides to educate your users about DLP policies and help them remain compliant without blocking their work. For example, if a user tries to share a document containing sensitive information, a DLP policy can both send them an email notification and show them a policy tip in the context of the document library that allows them to override the policy if they have a business justification.-->
-When a user attempts an action on a sensitive item in a context that meets the conditions of a rule, you can let them know about it through user notification emails and in context policy tip popups. These notifications are useful because they increase awareness and help educate people about your organization's DLP policies.
+When a user attempts an action on a sensitive item in a context that meets the conditions of a rule, you can let them know about it through user notification emails and in- context policy tip popups. These notifications are useful because they increase awareness and help educate people about your organization's DLP policies.
For example, content like an Excel workbook on a OneDrive for Business site that contains personally identifiable information (PII) and is shared with a guest.
You can customize the title and body of text with using these parameters. The bo
Using this customized text
-*%%AppliedActions%% File name %%FileName%% via %%ProcessName%% is not allowed by your organization. Select 'Allow' if you want to bypass the policy %%PolicyName%%*
+*%%AppliedActions%% File name %%FileName%% via %%ProcessName%% isn't allowed by your organization. Select 'Allow' if you want to bypass the policy %%PolicyName%%*
produces this text in the customized notification:
-*pasting from the clipboard File Name: Contoso doc 1 via WINWORD.EXE is not allowed by your organization. Click 'Allow' button if you want to bypass the policy Contoso highly confidential*
+*pasting from the clipboard File Name: Contoso doc 1 via WINWORD.EXE isn't allowed by your organization. Select the 'Allow' button if you want to bypass the policy Contoso highly confidential*
> [!NOTE] > User notifications and policy tips are not available for the On-premises location
compliance Inactive Mailboxes In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/inactive-mailboxes-in-office-365.md
f1.keywords:
Previously updated : 09/12/2019 Last updated : 03/06/2023 audience: Admin
With [adaptive policy scopes](purview-adaptive-scopes.md#advantages-of-using-ada
If you don't use [adaptive policy scopes and instead use a static scope](retention.md#adaptive-or-static-policy-scopes-for-retention) with Microsoft 365 retention, consider the following: -- Static policy scopes include inactive mailboxes when you use the default **All recipients** configuration but aren't supported for [specific inclusions or exclusions](retention-settings.md#a-policy-with-specific-inclusions-or-exclusions). However, if you include or exclude a recipient that has an active mailbox at the time the policy is applied and the mailbox later goes inactive, the retention settings continue to be applied or excluded. In this scenario, [specific inclusion and exclusion limits](retention-limits.md) still apply.
+- Static policy scopes include inactive mailboxes when you use the default **All mailboxes** configuration but aren't supported for [specific inclusions or exclusions](retention-settings.md#a-policy-with-specific-inclusions-or-exclusions). However, if you include or exclude a recipient that has an active mailbox at the time the policy is applied and the mailbox later goes inactive, the retention settings continue to be applied or excluded. In this scenario, [specific inclusion and exclusion limits](retention-limits.md) still apply.
> [!NOTE]
- > This also means that any new Microsoft 365 retention settings using a static scope that is applied to the default selection of **All recipients** will automatically include all existing inactive mailboxes.
+ > This also means that any new Microsoft 365 retention settings using a static scope that is applied to the default selection of **All mailboxes** will automatically include all existing inactive mailboxes.
-- If you change the default selection of **All recipients** to include specific recipients, retention settings for the policy will no longer apply to any inactive mailboxes, which now become eligible for automatic deletion.
+- If you change the default selection of **All mailboxes** to include specific recipients, retention settings for the policy will no longer apply to any inactive mailboxes, which now become eligible for automatic deletion.
- If you want to release a retention policy that's applied to an inactive mailbox, see [Releasing a policy for retention](retention.md#releasing-a-policy-for-retention).
compliance Insider Risk Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management.md
f1.keywords:
Previously updated : 02/08/2023 Last updated : 03/09/2023 audience: itpro - highpri
In more serious situations, you may need to share the insider risk management ca
- **eDiscovery (Premium)**: Escalating a case for investigation allows you to transfer data and management of the case to Microsoft Purview eDiscovery (Premium). eDiscovery (Premium) provides an end-to-end workflow to preserve, collect, review, analyze, and export content that's responsive to your organization's internal and external investigations. It allows legal teams to manage the entire legal hold notification workflow. To learn more about eDiscovery (Premium) cases, see [Overview of Microsoft Purview eDiscovery (Premium)](ediscovery-overview.md). - **Office 365 Management APIs integration (preview)**: Insider risk management supports exporting alert information to security information and event management (SIEM) services via the Office 365 Management APIs. Having access to alert information in the platform the best fits your organization's risk processes gives you more flexibility in how to act on risk activities. To learn more about exporting alert information with Office 365 Management APIs, see [Export alerts](insider-risk-management-settings.md#export-alerts).
-> [!NOTE]
-> Thank you for your feedback and support during the preview of the ServiceNow connector. We've decided to end the preview of ServiceNow connector and discontinue support in insider risk management on November 30, 2020. We are actively evaluating alternative methods to provide customers with ServiceNow integration in insider risk management.
- ## Scenarios Insider risk management can help you detect, investigate, and take action to mitigate internal risks in your organization in several common scenarios:
compliance Purview Adaptive Scopes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/purview-adaptive-scopes.md
f1.keywords:
Previously updated : 02/27/2023 Last updated : 03/06/2023 audience: Admin
When you choose to use adaptive scopes, you're prompted to select what type of a
| Adaptive scope type | Attributes or properties supported include | |:--|:-|
-|**Users** - applies to: <br/> - Exchange email <br/> - OneDrive accounts <br/> - Teams chats <br/> - Teams private channel messages (<br/> - Yammer user messages| First Name <br/> Last name <br/>Display name <br/> Job title <br/> Department <br/> Office <br/>Street address <br/> City <br/>State or province <br/>Postal code <br/> Country or region <br/> Email addresses <br/> Alias <br/> Exchange custom attributes: CustomAttribute1 - CustomAttribute15|
-|**Microsoft 365 Groups** - applies to: <br/> - Microsoft 365 Groups <br/> - Teams channel messages (standard and shared) <br/> - Yammer community messages <br> |Name <br/> Display name <br/> Description <br/> Email addresses <br/> Alias <br/> Exchange custom attributes: CustomAttribute1 - CustomAttribute15 |
+|**Users** - applies to: <br/> - Exchange mailboxes <br/> - OneDrive accounts <br/> - Teams chats <br/> - Teams private channel messages <br/> - Yammer user messages| First Name <br/> Last name <br/>Display name <br/> Job title <br/> Department <br/> Office <br/>Street address <br/> City <br/>State or province <br/>Postal code <br/> Country or region <br/> Email addresses <br/> Alias <br/> Exchange custom attributes: CustomAttribute1 - CustomAttribute15|
|**SharePoint sites** - applies to: <br/> - SharePoint sites <br/> - OneDrive accounts |Site URL <br/>Site name <br/> SharePoint custom properties: RefinableString00 - RefinableString99 |
+|**Microsoft 365 Groups** - applies to: <br/> - Microsoft 365 Group mailboxes & sites <br/> - Teams channel messages (standard and shared) <br/> - Yammer community messages <br> |Name <br/> Display name <br/> Description <br/> Email addresses <br/> Alias <br/> Exchange custom attributes: CustomAttribute1 - CustomAttribute15 |
+ > [!NOTE] > For communications compliance policies, SharePoint sites and OneDrive accounts are not suported. Also, excluded users and Microsoft 365 groups are supported.
compliance Retention Cmdlets https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-cmdlets.md
f1.keywords:
Previously updated : 05/28/2022 Last updated : 03/06/2023 audience: Admin
When you use retention labels, these contain the retention settings and their po
## Retention cmdlets for most locations
-Use the cmdlets in the following table when the locations are **Exchange email**, **SharePoint sites**, **OneDrive accounts**, **Microsoft 365 Groups**, **Skype for Business**, **Exchange public folders**, **Teams chat messages**, or **Teams channel messages**.
+Use the cmdlets in the following table when the locations are **Exchange mailboxes**, **SharePoint sites** or **SharePoint classic and communication sites**, **OneDrive accounts**, **Microsoft 365 Group mailboxes & sites**, **Skype for Business**, **Exchange public folders**, **Teams chat messages**, or **Teams channel messages**.
Don't use these cmdlets when the locations are for Teams private channel messages, Yammer user messages, or Yammer community messages. These locations have alternative cmdlets that are identified in the [next section](#retention-cmdlets-specific-to-teams-private-channels-and-yammer). |Cmdlet|Description|Applicable locations| |:--|:--|:--|:--|
-|[Enable-ComplianceTagStorage](/powershell/module/exchange/enable-compliancetagstorage) <br /><br /> [Get-ComplianceTagStorage](/powershell/module/exchange/get-compliancetagstorage) |A one-time operation to create storage, or view that storage for retention labels |Exchange email <br /><br />SharePoint sites <br /><br /> OneDrive accounts <br /><br /> Microsoft 365 Groups|
-|[Get-ComplianceTag](/powershell/module/exchange/get-compliancetag)<br /><br> [New-ComplianceTag](/powershell/module/exchange/new-compliancetag) <br /><br> [Remove-ComplianceTag](/powershell/module/exchange/remove-compliancetag) <br /><br> [Set-ComplianceTag](/powershell/module/exchange/set-compliancetag) |View, create, delete, configure retention labels |Exchange email <br /><br /> SharePoint sites <br /><br /> OneDrive accounts<br /><br /> Microsoft 365 Groups|
-|[Get-RecordReviewNotificationTemplateConfig](/powershell/module/exchange/get-recordreviewnotificationtemplateconfig) <br /><br /> [Set-RecordReviewNotificationTemplateConfig](/powershell/module/exchange/set-recordreviewnotificationtemplateconfig) |View or configure the disposition review notification and reminder settings |Exchange email <br /><br /> SharePoint sites <br /><br /> OneDrive accounts <br /><br /> Microsoft 365 Groups|
-|[Get-RetentionCompliancePolicy](/powershell/module/exchange/get-retentioncompliancepolicy) <br /><br /> [New-RetentionCompliancePolicy](/powershell/module/exchange/new-retentioncompliancepolicy) <br /><br /> [Remove-RetentionCompliancePolicy](/powershell/module/exchange/remove-retentioncompliancepolicy) <br /><br /> [Set-RetentionCompliancePolicy](/powershell/module/exchange/set-retentioncompliancepolicy) |View, create, delete, configure retention policies and retention label policies |Exchange email <br /><br /> SharePoint sites <br /><br /> OneDrive accounts<br /><br /> Microsoft 365 Groups <br /><br /> Skype for Business <br /><br /> Exchange public folders <br /><br /> Teams chat messages <br /><br /> Teams channel messages |
-|[Get-RetentionComplianceRule](/powershell/module/exchange/get-retentioncompliancerule) <br /><br /> [New-RetentionComplianceRule](/powershell/module/exchange/new-retentioncompliancerule) <br /><br /> [Set-RetentionComplianceRule](/powershell/module/exchange/set-retentioncompliancerule) <br /><br /> [Remove-RetentionComplianceRule](/powershell/module/exchange/remove-retentioncompliancerule) | View, create, configure, delete settings (rules) for retention policies and retention labels |Exchange email <br /><br /> SharePoint sites <br /><br /> OneDrive accounts <br /><br /> Microsoft 365 Groups <br /><br /> Skype for Business <br /><br /> Exchange public folders <br /><br /> Teams chat messages <br /><br /> Teams channel messages |
+|[Enable-ComplianceTagStorage](/powershell/module/exchange/enable-compliancetagstorage) <br /><br /> [Get-ComplianceTagStorage](/powershell/module/exchange/get-compliancetagstorage) |A one-time operation to create storage, or view that storage for retention labels |Exchange mailboxes <br /><br />SharePoint sites (or SharePoint classic and communication sites) <br /><br /> OneDrive accounts <br /><br /> Microsoft 365 Group mailboxes & sites|
+|[Get-ComplianceTag](/powershell/module/exchange/get-compliancetag)<br /><br> [New-ComplianceTag](/powershell/module/exchange/new-compliancetag) <br /><br> [Remove-ComplianceTag](/powershell/module/exchange/remove-compliancetag) <br /><br> [Set-ComplianceTag](/powershell/module/exchange/set-compliancetag) |View, create, delete, configure retention labels |Exchange mailboxes <br /><br /> SharePoint sites (or SharePoint classic and communication sites) <br /><br /> OneDrive accounts <br /><br /> Microsoft 365 Group mailboxes & sites|
+|[Get-RecordReviewNotificationTemplateConfig](/powershell/module/exchange/get-recordreviewnotificationtemplateconfig) <br /><br /> [Set-RecordReviewNotificationTemplateConfig](/powershell/module/exchange/set-recordreviewnotificationtemplateconfig) |View or configure the disposition review notification and reminder settings |Exchange mailboxes <br /><br /> SharePoint sites (or SharePoint classic and communication sites) <br /><br /> OneDrive accounts <br /><br /> Microsoft 365 Group mailboxes & sites|
+|[Get-RetentionCompliancePolicy](/powershell/module/exchange/get-retentioncompliancepolicy) <br /><br /> [New-RetentionCompliancePolicy](/powershell/module/exchange/new-retentioncompliancepolicy) <br /><br /> [Remove-RetentionCompliancePolicy](/powershell/module/exchange/remove-retentioncompliancepolicy) <br /><br /> [Set-RetentionCompliancePolicy](/powershell/module/exchange/set-retentioncompliancepolicy) |View, create, delete, configure retention policies and retention label policies |Exchange email <br /><br /> SharePoint sites (or SharePoint classic and communication sites) <br /><br /> OneDrive accounts<br /><br /> Microsoft 365 Group mailboxes & sites <br /><br /> Skype for Business <br /><br /> Exchange public folders <br /><br /> Teams chat messages <br /><br /> Teams channel messages |
+|[Get-RetentionComplianceRule](/powershell/module/exchange/get-retentioncompliancerule) <br /><br /> [New-RetentionComplianceRule](/powershell/module/exchange/new-retentioncompliancerule) <br /><br /> [Set-RetentionComplianceRule](/powershell/module/exchange/set-retentioncompliancerule) <br /><br /> [Remove-RetentionComplianceRule](/powershell/module/exchange/remove-retentioncompliancerule) | View, create, configure, delete settings (rules) for retention policies and retention labels |Exchange email <br /><br /> SharePoint sites (or SharePoint classic and communication sites) <br /><br /> OneDrive accounts <br /><br /> Microsoft 365 Group mailboxes & sites <br /><br /> Skype for Business <br /><br /> Exchange public folders <br /><br /> Teams chat messages <br /><br /> Teams channel messages |
## Retention cmdlets specific to Teams private channels and Yammer Use the following cmdlets when the locations are for **Teams private channel messages**, **Yammer user messages**, or **Yammer community messages**.
-When the locations are for Teams chat messages, Teams channel messages, Exchange email, SharePoint sites, OneDrive accounts, Microsoft 365 Groups, Skype for Business, or Exchange public folders, use the cmdlets listed in the [previous section](#retention-cmdlets-for-most-locations).
+When the locations are for Teams chat messages, Teams channel messages, Exchange email, SharePoint sites (or SharePoint classic and communication sites), OneDrive accounts, Microsoft 365 Group mailboxes & sites, Skype for Business, or Exchange public folders, use the cmdlets listed in the [previous section](#retention-cmdlets-for-most-locations).
|Cmdlet|Description|Applicable locations| |:--|:--|:--|:--|
compliance Retention Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-settings.md
f1.keywords:
Previously updated : 02/16/2021 Last updated : 03/06/2023 audience: Admin
When you choose to use static scopes, you must then decide whether to apply the
Except Skype for Business, the default is that all instances for the selected locations are automatically included in the policy without you having to specify them as included.
-For example, **All recipients** for the **Exchange email** location. With this default setting, all existing user mailboxes will be included in the policy, and any new mailboxes created after the policy is applied will automatically inherit the policy.
+For example, **All mailboxes** for the **Exchange email** location. With this default setting, all existing user mailboxes will be included in the policy, and any new mailboxes created after the policy is applied will automatically inherit the policy.
#### A policy with specific inclusions or exclusions
To use the optional configuration to scope your retention settings, make sure th
> [!WARNING] > If you configure instances to include and then remove the last one, the configuration reverts to **All** for the location. Make sure this is the configuration that you intend before you save the policy. >
-> For example, if you specify one SharePoint site to include in your retention policy that's configured to delete data, and then remove the single site, by default all SharePoint sites will then be subject to the retention policy that permanently deletes data. The same applies to includes for Exchange recipients, OneDrive accounts, Teams chat users, and so on.
+> For example, if you specify one SharePoint site to include in your retention policy that's configured to delete data, and then remove the single site, by default all SharePoint sites will then be subject to the retention policy that permanently deletes data. The same applies to includes for Exchange mailboxes, OneDrive accounts, Teams chat users, and so on.
> > In this scenario, toggle the location off if you don't want the **All** setting for the location to be subject to the retention policy. Alternatively, specify exclude instances to be exempt from the policy.
To use the optional configuration to scope your retention settings, make sure th
Locations in policies for retention identify specific Microsoft 365 services that support retention settings, such as Exchange email and SharePoint sites. Use the following section for the locations that have configuration details and possible exceptions that you need to be aware of when you select them for your policy.
-### Configuration information for Exchange email and Exchange public folders
+### Configuration information for Exchange mailboxes and Exchange public folders
-Both the **Exchange email** location and the **Exchange public folders** location require mailboxes to have at least 10 MB of data before retention settings will apply to them.
+Both the **Exchange mailboxes** location and the **Exchange public folders** location require mailboxes to have at least 10 MB of data before retention settings will apply to them.
-The **Exchange email** location supports retention for users' email, calendar, and other mailbox items, by applying retention settings at the level of a mailbox. Shared mailboxes and resource mailboxes for equipment and rooms are also supported.
+The **Exchange mailboxes** location supports retention for users' email, calendar, and other mailbox items, by applying retention settings at the level of a mailbox. Shared mailboxes and resource mailboxes for equipment and rooms are also supported.
-Email contacts and Microsoft 365 group mailboxes aren't supported for Exchange email. For Microsoft 365 group mailboxes, select the **Microsoft 365 Groups** location instead. Although the Exchange location initially allows a group mailbox to be selected for a static scope, when you try to save the retention policy, you receive an error that "RemoteGroupMailbox" isn't a valid selection for this location.
+Email contacts and Microsoft 365 group mailboxes aren't supported for Exchange email. For Microsoft 365 group mailboxes, select the **Microsoft 365 Group mailboxes & sites** location instead. Although the Exchange location initially allows a group mailbox to be selected for a static scope, when you try to save the retention policy, you receive an error that "RemoteGroupMailbox" isn't a valid selection for this location.
Depending on your policy configuration, [inactive mailboxes](inactive-mailboxes-in-office-365.md) might be included or not: -- Static policy scopes include inactive mailboxes when you use the default **All recipients** configuration but aren't supported for [specific inclusions or exclusions](#a-policy-with-specific-inclusions-or-exclusions). However, if you include or exclude a recipient that has an active mailbox at the time the policy is applied and the mailbox later goes inactive, the retention settings continue to be applied or excluded.
+- Static policy scopes include inactive mailboxes when you use the default **All mailboxes** configuration but aren't supported for [specific inclusions or exclusions](#a-policy-with-specific-inclusions-or-exclusions). However, if you include or exclude a recipient that has an active mailbox at the time the policy is applied and the mailbox later goes inactive, the retention settings continue to be applied or excluded.
- Adaptive policy scopes, by default, include inactive mailboxes when they meet the scope's query. You can exclude them by using the advanced query builder and the OPATH property *IsInactiveMailbox*:
The **Exchange public folders** location applies retention settings to all publi
#### Exceptions for auto-apply policies configured for sensitive information types
-When you configure an auto-apply policy that uses sensitive information types and select the **Exchange email** location:
+When you configure an auto-apply policy that uses sensitive information types and select the **Exchange mailboxes** location:
- See the important callout for [Auto-apply labels to content with specific types of sensitive information](apply-retention-labels-automatically.md#auto-apply-labels-to-content-with-specific-types-of-sensitive-information). ### Configuration information for SharePoint sites and OneDrive accounts
-When you choose the **SharePoint sites** location, the policy for retention can retain and delete documents in SharePoint communication sites, team sites that aren't connected by Microsoft 365 groups, and classic sites. Unless you're using [adaptive policy scopes](#exceptions-for-adaptive-policy-scopes), team sites connected by Microsoft 365 groups aren't supported with this option and instead, use the **Microsoft 365 Groups** location that applies to content in the group's mailbox, site, and files.
+The location name for the SharePoint sites location changes, depending on whether you're using [adaptive policy scopes or static policy scopes](retention.md#adaptive-or-static-policy-scopes-for-retention). The name change reflects what type of sites are included:
+
+- Static policy scopes: **SharePoint classic and communication sites**
+ - Can retain and delete documents in SharePoint communication sites, team sites that aren't connected by Microsoft 365 groups, and classic sites. Team sites connected by Microsoft 365 groups aren't supported with this option and instead, use the **Microsoft 365 Group mailboxes & sites** location that applies to content in the group's mailbox, site, and files.
+
+- Adaptive policy scopes: **SharePoint sites**
+ - Can retain and delete documents in OneDrive sites and Microsoft 365 group-connected sites in addition to SharePoint communication sites, team sites that aren't connected by Microsoft 365 groups, and classic sites.
> [!TIP]
-> You can use a [filter in the SharePoint admin center](/sharepoint/customize-admin-center-site-list) or a [SharePoint PowerShell command](/powershell/module/sharepoint-online/get-sposite#example-10) to confirm whether a site is group-connected. For static scopes, these sites are supported with the **Microsoft 365 Groups** location.
+> You can use a [filter in the SharePoint admin center](/sharepoint/customize-admin-center-site-list) or a [SharePoint PowerShell command](/powershell/module/sharepoint-online/get-sposite#example-10) to confirm whether a site is group-connected.
For detailed information about what's included and excluded when you configure retention settings for SharePoint and OneDrive, see [What's included for retention and deletion](retention-policies-sharepoint.md#whats-included-for-retention-and-deletion).
To specify individual OneDrive accounts, see [Get a list of all user OneDrive UR
> > Because of the challenges of reliably specifying URLs for individual users to include or exclude for static scopes, [adaptive scopes](purview-adaptive-scopes.md) with the **User** scope type are better suited for this purpose.
-#### Exceptions for adaptive policy scopes
-
-When you configure a policy for retention that uses adaptive policy scopes and select the **SharePoint sites** location:
--- OneDrive sites and Microsoft 365 group-connected sites are included in addition to SharePoint communication sites, team sites that aren't connected by Microsoft 365 groups, and classic sites.
-### Configuration information for Microsoft 365 Groups
+### Configuration information for Microsoft 365 Group mailboxes & sites
-To retain or delete content for a Microsoft 365 group (formerly Office 365 group), use the **Microsoft 365 Groups** location. For retention policies, this location includes the group mailbox and SharePoint teams site. For retention labels, this location includes the SharePoint teams site only.
+To retain or delete content for a Microsoft 365 group (formerly Office 365 group), use the **Microsoft 365 Group mailboxes & sites** location. For retention policies, this location includes the group mailbox and SharePoint teams site. For retention labels, this location includes the SharePoint teams site only.
For detailed information about which items are included and excluded for Microsoft 365 Groups: - For group mailboxes, see [What's included for retention and deletion](retention-policies-exchange.md#whats-included-for-retention-and-deletion) for Exchange retention.
For detailed information about which items are included and excluded for Microso
Mailboxes that you target with this policy location require at least 10 MB of data before retention settings will apply to them. > [!NOTE]
-> Even though a Microsoft 365 group has an Exchange mailbox, a retention policy for the **Exchange email** location won't include content in Microsoft 365 group mailboxes.
+> Even though a Microsoft 365 group has an Exchange mailbox, a retention policy for the **Exchange mailboxes** location won't include content in Microsoft 365 group mailboxes.
-If you use static scopes: Although the **Exchange email** location for a static scope initially allows you to specify a group mailbox to be included or excluded, when you try to save the retention policy, you'll see an error that "RemoteGroupMailbox" isn't a valid selection for the Exchange location.
+If you use static scopes: Although the **Exchange mailboxes** location for a static scope initially allows you to specify a group mailbox to be included or excluded, when you try to save the retention policy, you'll see an error that "RemoteGroupMailbox" isn't a valid selection for the Exchange location.
By default, a retention policy applied to a Microsoft 365 group includes the group mailbox and SharePoint teams site. Files stored in the SharePoint teams site are covered with this location, but not Teams chats or Teams channel messages that have their own retention policy locations.
To return to the default value of both the mailbox and SharePoint site for the s
#### Exceptions for auto-apply policies configured for sensitive information types
-When you configure an auto-apply policy that uses sensitive information types and select the **Microsoft 365 Groups** location:
+When you configure an auto-apply policy that uses sensitive information types and select the **Microsoft 365 Group mailboxes & sites** location:
-- Microsoft 365 group mailboxes aren't included. To include these mailboxes in your policy, select the **Exchange email** location instead.
+- Microsoft 365 group mailboxes aren't included. To include these mailboxes in your policy, select the **Exchange mailboxes** location instead.
#### What happens if a Microsoft 365 group is deleted after a policy is applied When a policy for retention (static policy scope or adaptive) is applied to a Microsoft 365 group, and that group is then deleted from Azure Active Directory: -- The group-connected SharePoint site is preserved and continues to be managed by the retention policy with the **Microsoft 365 Groups** location. The site is still accessible to the people who had access to it before the group was deleted, and any new permissions must now be managed via SharePoint.
+- The group-connected SharePoint site is preserved and continues to be managed by the retention policy with the **Microsoft 365 Group mailboxes & sites** location. The site is still accessible to the people who had access to it before the group was deleted, and any new permissions must now be managed via SharePoint.
At this point, you can't exclude the site from the Microsoft 365 Groups location, because you can't specify the deleted group. If you need to release the retention policy from this site, contact Microsoft Support. For example, [open a support request in the Microsoft 365 Admin Center](/microsoft-365/admin/get-help-support#online-support).
compliance Retention https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention.md
Unlike retention policies, retention settings from retention labels travel with
Retention policies can be applied to the following locations: -- Exchange email-- SharePoint site
+- Exchange mailboxes
+- SharePoint classic and communication sites
- OneDrive accounts-- Microsoft 365 Groups
+- Microsoft 365 Group mailboxes and sites
- Skype for Business - Exchange public folders-- Teams channel messages
+- Teams channel messages (standard channels and [shared channels](/MicrosoftTeams/shared-channels))
- Teams chats - Teams private channel messages - Yammer community messages - Yammer user messages
-> [!NOTE]
-> Teams channel messages now include [shared channels](/MicrosoftTeams/shared-channels) (currently in preview) as well as standard channels.
- You can very efficiently apply a single policy to multiple locations, or to specific locations or users. For the start of the retention period, you can choose when the content was created or, supported only for files and the SharePoint, OneDrive, and Microsoft 365 Groups locations, when the content was last modified.
Explanation for the four different principles:
2. When you have retention policies only: If a retention policy for a location uses an adaptive scope or a static scope that includes specific instances (such as specific users for Exchange email) that retention policy takes precedence over a static scope that is configured for all instances for the same location.
- A static scope that is configured for all instances for a location is sometimes referred to as an "org-wide policy". For example, **Exchange email** and the default setting of **All recipients**. Or, **SharePoint sites** and the default setting of **All sites**. When retention policies aren't org-wide but have been configured with an adaptive scope or a static scope that includes specific instances, they have equal precedence at this level.
+ A static scope that is configured for all instances for a location is sometimes referred to as an "org-wide policy". For example, **Exchange mailboxes** and the default setting of **All mailboxes**. Or, **SharePoint classic and communication sites** and the default setting of **All sites**. When retention policies aren't org-wide but have been configured with an adaptive scope or a static scope that includes specific instances, they have equal precedence at this level.
**Example 1 for this third principle (policies)**: An email message is subject to two retention policies. The first retention policy is unscoped and deletes items after ten years. The second retention policy is scoped to specific mailboxes and deletes items after five years.
Additional information for specific locations:
- If the retention policy is implicitly applied to a mailbox and the configured retention action is to retain, the retention policy continues to apply and an inactive mailbox never becomes eligible for automatic deletion. When the retain action no longer applies because the retention period has expired, the Exchange admin can now [manually delete the inactive mailbox](delete-an-inactive-mailbox.md)
- An implicit retention policy requires a static policy scope with the **All recipients** (for Exchange email) or **All groups** (for Microsoft 365 Groups) configuration.
+ An implicit retention policy requires a static policy scope with the **All mailboxes** (for Exchange email) or **All groups** (for Microsoft 365 Groups) configuration.
For more information about inactive mailboxes that have retention policies applied, see [Inactive mailboxes and Microsoft 365 retention](inactive-mailboxes-in-office-365.md#inactive-mailboxes-and-microsoft-365-retention).
compliance Sensitivity Labels Aip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-aip.md
f1.keywords:
Previously updated : 03/06/2023 Last updated : 03/09/2023 audience: Admin
The following configurations from the AIP add-in that aren't yet supported by bu
- [Label inheritance from email attachments](/azure/information-protection/rms-client/clientv2-admin-guide-customizations#for-email-messages-with-attachments-apply-a-label-that-matches-the-highest-classification-of-those-attachments) - [Oversharing popup messages for Outlook](/azure/information-protection/rms-client/clientv2-admin-guide-customizations#implement-pop-up-messages-in-outlook-that-warn-justify-or-block-emails-being-sent)
+ - The equivalent of this configuration is now rolling out in preview. For more information, see the scenario guidance to [show a policy tip as oversharing popup](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup-preview)
- [Default sublabel for a parent label](/azure/information-protection/rms-client/clientv2-admin-guide-customizations#specify-a-default-sublabel-for-a-parent-label)
- - This option is currently rolling out in preview. For more information, see [Specify a default sublabel for a parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label)
+ - This option is currently rolling out in general availability. For more information, see [Specify a default sublabel for a parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label)
- [Remove external content markings](/azure/information-protection/rms-client/clientv2-admin-guide-customizations#remove-headers-and-footers-from-other-labeling-solution) ## Features not planned to be supported by built-in labeling for Office apps
compliance Sensitivity Labels Meetings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-meetings.md
description: "Configure sensitivity labels to protect calendar items, and Teams
>*[Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).* > [!NOTE]
-> For this scenario, Outlook calendar events remain in preview for Windows, and rolling out in general availability for macOS.
+> For this scenario, Outlook calendar events are still rolling out in general availability for Windows and macOS.
> > You won't be able to configure all the options referenced on this page if a [Teams Premium license](/MicrosoftTeams/enhanced-teams-experience) isn't found for your tenant. For those settings, you'll see an information bar in the Microsoft Purview compliance portal that your organization doesn't have this license.
Example showing a Teams meeting invite that has the label **Highly confidential*
To apply a sensitivity label to meeting invites and appointments using Outlook, users must use Outlook on the web from a desktop computer, or use built-in labeling from Microsoft 365 Apps for enterprise: -- **Outlook for Windows**: Rolling out to Current Channel (Preview)
+- **Outlook for Windows**: Rolling out to Current Channel, version 2302+
- **Outlook for Mac**: Rolling out to version 16.70+ The AIP add-in for Outlook doesn't support applying labels to meeting invites.
compliance Sensitivity Labels Versions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-versions.md
Previously updated : 03/06/2023 Last updated : 03/09/2023 audience: Admin
The numbers listed are the minimum Office application versions required for each
|--|-:|-||-|-| |[AIP add-in disabled by default](sensitivity-labels-aip.md#how-to-configure-newer-versions-of-office-to-enable-the-aip-add-in)| Preview: [Current Channel (Preview)](https://office.com/insider) | Not relevant | Not relevant | Not relevant| Not relevant | |Manually apply, change, or remove label <br /> - [Files and emails](https://support.microsoft.com/office/apply-sensitivity-labels-to-your-files-and-email-in-office-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9)| Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ | 16.21+ | 4.7.1+ | 4.0.39+ | Yes |
-|Manually apply, change, or remove label <br /> - [Calendar items](sensitivity-labels-meetings.md)| Preview: Rolling out to [Current Channel (Preview)](https://office.com/insider) | Rolling out: 16.70+ <sup>\*</sup> | Under review | Under review | Yes |
+|Manually apply, change, or remove label <br /> - [Calendar items](sensitivity-labels-meetings.md)| Current Channel: Rolling to 2302+ | Rolling out: 16.70+ <sup>\*</sup> | Under review | Under review | Yes |
|[Multi-language support](create-sensitivity-labels.md#additional-label-settings-with-security--compliance-powershell)| Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ | 16.21+ | 4.7.1+ | 4.0.39+ | Yes | |[Apply a default label](sensitivity-labels.md#what-label-policies-can-do) | Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ | 16.21+ | 4.7.1+ | 4.0.39+ | Yes | |[Require a justification to change a label](sensitivity-labels.md#what-label-policies-can-do) | Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ | 16.21+ | 4.7.1+ | 4.0.39+ | Yes |
The numbers listed are the minimum Office application versions required for each
|[Sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) and [display label color](sensitivity-labels-office-apps.md#label-colors) | Preview: Rolling out to [Current Channel (Preview)](https://office.com/insider) | Under review | Under review | Under review | Under review | |[Default sublabel for parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label)| Current Channel: Rolling out to 2302+ | Under review | Under review | Under review | Under review | |[Scope labels to files or emails](sensitivity-labels-office-apps.md#scope-labels-to-just-files-or-emails) | Current Channel: 2301+ | Rolling out: 16.70+ <sup>\*</sup> | Rolling out 4.2309+| Rolling out 4.2309+ | Yes |
+|[Preventing oversharing as DLP policy tip](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup-preview)| Preview: Rolling out to [Beta Channel](https://office.com/insider) | Under review | Under review | Under review | Under review |
**Footnotes:**
compliance Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/whats-new.md
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
### Sensitivity labels -- **General availability (GA)**: Outlook for Mac is now rolling out in general availability for [protected meetings](sensitivity-labels-meetings.md).
+- **General availability (GA)**: Both Outlook for Windows and Outlook for Mac are rolling out in general availability for [protected meetings](sensitivity-labels-meetings.md).
- **General availability (GA)**: Now rolling out in general availability for built-in labeling for Windows, support for a [default sublabel for a parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label) as a parity feature for the AIP add-in. - **Rolling out**: The ability to [scope labels to files and emails](sensitivity-labels-office-apps.md#scope-labels-to-just-files-or-emails), so that for example, a sensitivity label is visible to users in Outlook but not in Word, Excel, or PowerPoint. This configuration can be used as a parity feature for the AIP add-in, which could be disabled per app. - **Removal of restrictions for prevent copying chat for protected meetings**: The label setting that [prevents copying chat to the clipboard](sensitivity-labels-meetings.md#prevent-copying-chat-to-the-clipboard-label-setting) now supports users outside your organization and also users who join a chat but weren't invited to the meeting.
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
### Data lifecycle management and records management - **Rolling out in preview**: Auto-labeling retention policies now support [simulation mode](apply-retention-labels-automatically.md#learn-about-simulation-mode), so you can test out your policy configuration and view results before deploying in production.-- The configuration and management of [adaptive policy scopes](retention.md#adaptive-or-static-policy-scopes-for-retention) is moving to a new location in the Microsoft Purview compliance portal: **Roles & Scopes** \> **Adaptive scopes**.
+- **Configuration improvements**: The configuration for retention policies and retention label policies in the Microsoft Purview compliance portal has been improved for the selection and configuration of locations. Some of the location names have changed to better reflect what's included for the location, and a new **Applicable Content** column is added for additional information.
+- **Relocation for adaptive scopes**: The configuration and management of [adaptive policy scopes](retention.md#adaptive-or-static-policy-scopes-for-retention) is moving to a new location in the Microsoft Purview compliance portal: **Roles & Scopes** \> **Adaptive scopes**.
- New troubleshooting resources: - [Identify errors in Microsoft 365 retention and retention label policies](/microsoft-365/troubleshoot/retention/identify-errors-in-retention-and-retention-label-policies) - [Resolve errors in Microsoft 365 retention and retention label policies](/microsoft-365/troubleshoot/retention/resolve-errors-in-retention-and-retention-label-policies)
enterprise Cross Tenant Mailbox Migration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/cross-tenant-mailbox-migration.md
When a mailbox is migrated cross-tenant with this feature, only user visible con
## Licensing
-Cross Tenant User Data Migration is available as an add-on to the Microsoft 365 subscription plans below and is only available to customers with an active Enterprise Agreement customer. User licenses are per migration (onetime fee). Contact your Microsoft account team for details.
+> [!IMPORTANT]
+> This cross-tenant functionality is only available to customers with Enterprise Agreements. Licensing is not available via other purchase options at this time.
+
+Cross Tenant User Data Migration is available as an add-on to the following Microsoft 365 subscription plans for Enterprise Agreement customers. User licenses are per migration (onetime fee). Please contact your Microsoft account team for details.
Microsoft 365 Business Basic/Business Standard/Business Premium/F1/F3/E3/E5/; Office 365 F3/E1/E3/E5; Exchange Online; SharePoint Online; OneDrive for Business.
enterprise Multi Geo Capabilities In Exchange Online https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/multi-geo-capabilities-in-exchange-online.md
Exchange Online synchronizes the **PreferredDataLocation** property from Azure A
- Public folders are supported in multi-geo organizations. However, the public folders must remain in the central geo location. You can't move public folders to satellite geo locations. -- In a multi-geo environment, cross-geo mailbox auditing is not supported. For example, if a user is assigned permissions to access a shared mailbox in a different geo location, mailbox actions performed by that user are not logged in the mailbox audit log of the shared mailbox. Exchange admin audit events are also only available for the default location. For more information, see [Manage mailbox auditing](../compliance/enable-mailbox-auditing.md).
+- In a multi-geo environment, cross-geo mailbox auditing is not supported. For example, if a user is assigned permissions to access a shared mailbox in a different geo location, mailbox actions performed by that user are not logged in the mailbox audit log of the shared mailbox. Exchange admin audit events are available for all locations via [Microsoft Purview](/microsoft-365/compliance/audit-solutions-overview) and the [Search-UnifiedAuditLog](/powershell/module/exchange/search-unifiedauditlog) cmdlet. For more information, see [Manage mailbox auditing](../compliance/enable-mailbox-auditing.md).
enterprise O365 Data Locations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/o365-data-locations.md
description: "Determine where your Microsoft 365 customer data is stored worldwi
See the following links to understand workload data location. -- Exchange Online (EXO) [Exchange Online Data Location](m365-dr-workload-exo.md#how-can-i-determine-customer-data-location)
+- Exchange Online [Data Residency for Exchange Online](/microsoft-365/enterprise/m365-dr-workload-exo)
- SharePoint Online (ODSP) and OneDrive for Business [Data Location](m365-dr-workload-spo.md#how-can-i-determine-customer-data-location) - Microsoft Teams [Data Location](m365-dr-workload-teams.md#how-can-i-determine-customer-data-location) - Microsoft Defender for Office (MDO P1) [Data Location](m365-dr-workload-mdo-p1.md#how-can-i-determine-customer-data-location)
enterprise Use Microsoft 365 Cdn With Spo https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/use-microsoft-365-cdn-with-spo.md
You can manage the state of the Office 365 CDN in your tenant using the [spo cdn
To enable the Office 365 Public CDN in your tenant execute: ```cli
-spo cdn set --type Public --enabled true
+m365 spo cdn set --type Public --enabled true
``` To enable the Office 365 SharePoint CDN, execute: ```cli
-spo cdn set --type Private --enabled true
+m365 spo cdn set --type Private --enabled true
``` #### View the current status of the Office 365 CDN
To check if the particular type of Office 365 CDN is enabled or disabled, use th
To check if the Office 365 Public CDN is enabled, execute: ```cli
-spo cdn get --type Public
+m365 spo cdn get --type Public
``` ### View the Office 365 CDN origins
spo cdn get --type Public
To view the currently configured Office 365 Public CDN origins execute: ```cli
-spo cdn origin list --type Public
+m365 spo cdn origin list --type Public
``` See [Default CDN origins](use-microsoft-365-cdn-with-spo.md#default-cdn-origins) for information about the origins that are provisioned by default when you enable the Office 365 CDN.
See [Default CDN origins](use-microsoft-365-cdn-with-spo.md#default-cdn-origins)
Use the [spo cdn origin add](https://pnp.github.io/cli-microsoft365/cmd/spo/cdn/cdn-origin-add/) command to define a CDN origin. You can define multiple origins. The origin is a URL that points to a SharePoint library or folder that contains the assets that you want to be hosted by the CDN. ```cli
-spo cdn origin add --type [Public | Private] --origin <path>
+m365 spo cdn origin add --type [Public | Private] --origin <path>
``` Where `path` is the relative path to the folder that contains the assets. You can use wildcards in addition to relative paths.
Where `path` is the relative path to the folder that contains the assets. You ca
To include all assets in the **Master Page Gallery** of all sites as a public origin, execute: ```cli
-spo cdn origin add --type Public --origin */masterpage
+m365 spo cdn origin add --type Public --origin */masterpage
``` To configure a private origin for a specific site collection, execute: ```cli
-spo cdn origin add --type Private --origin sites/site1/siteassets
+m365 spo cdn origin add --type Private --origin sites/site1/siteassets
``` > [!NOTE]
Use the [spo cdn origin remove](https://pnp.github.io/cli-microsoft365/cmd/spo/c
To remove a public origin from the CDN configuration, execute: ```cli
-spo cdn origin remove --type Public --origin */masterpage
+m365 spo cdn origin remove --type Public --origin */masterpage
``` > [!NOTE]
By default, the following file types are included in the CDN: _.css, .eot, .gif,
To add the _JSON_ file type to the default list of file types included in the public CDN, execute: ```cli
-spo cdn policy set --type Public --policy IncludeFileExtensions --value "CSS,EOT,GIF,ICO,JPEG,JPG,JS,MAP,PNG,SVG,TTF,WOFF,JSON"
+m365 spo cdn policy set --type Public --policy IncludeFileExtensions --value "CSS,EOT,GIF,ICO,JPEG,JPG,JS,MAP,PNG,SVG,TTF,WOFF,JSON"
``` ### Change the list of site classifications you want to exclude from the Office 365 CDN
Use the [spo cdn policy set](https://pnp.github.io/cli-microsoft365/cmd/spo/cdn/
To exclude sites classified as _HBI_ from the public CDN, execute ```cli
-spo cdn policy set --type Public --policy ExcludeRestrictedSiteClassifications --value "HBI"
+m365 spo cdn policy set --type Public --policy ExcludeRestrictedSiteClassifications --value "HBI"
``` ### Disable the Office 365 CDN
spo cdn policy set --type Public --policy ExcludeRestrictedSiteClassifications -
To disable the Office 365 CDN use the `spo cdn set` command, for example: ```cli
-spo cdn set --type Public --enabled false
+m365 spo cdn set --type Public --enabled false
``` </details>
You can check to see which origins are present with the following PowerShell com
Get-SPOTenantCdnOrigins -CdnType Public ```
-Or you can check with the Office 365 CLI:
+Or you can check with the CLI for Microsoft 365:
```cli
-spo cdn origin list
+m365 spo cdn origin list
``` To add the origin in PowerShell:
To add the origin in PowerShell:
Add-SPOTenantCdnOrigin -CdnType Public -OriginUrl */CLIENTSIDEASSETS ```
-To add the origin in the Office 365 CLI:
+To add the origin using the CLI for Microsoft 365:
```cli
-spo cdn origin add --origin */CLIENTSIDEASSETS
+m365 spo cdn origin add --origin */CLIENTSIDEASSETS
``` ### What PowerShell modules and CLI shells do I need to work with the Office 365 CDN?
-You can choose to work with the Office 365 CDN using either the **SharePoint Online Management Shell** PowerShell module or the **Office 365 CLI**.
+You can choose to work with the Office 365 CDN using either the **SharePoint Online Management Shell** PowerShell module or the **CLI for Microsoft 365**.
+ [Getting started with SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online)
-+ [Installing the Office 365 CLI](https://pnp.github.io/cli-microsoft365/user-guide/installing-cli/)
++ [Installing the CLI for Microsoft 365](https://pnp.github.io/cli-microsoft365/user-guide/installing-cli/) ## See also
frontline Ehr Connector Troubleshoot Setup Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/ehr-connector-troubleshoot-setup-configuration.md
Last updated 01/11/2023
# Troubleshoot Microsoft Teams EHR connector setup and configuration
-This article provides guidance for how to troubleshoot common setup and configuration issues for the Microsoft Teams Electronic Health Record (EHR) connector. Use it to help resolve blockers that you may experience when you set up and configure the EHR connector to integrate with your [Oracle Health EHR](ehr-admin-cerner.md) or [Epic EHR](ehr-admin-epic.md) system.
+This article provides guidance for how to troubleshoot common setup and configuration issues for the Microsoft Teams Electronic Health Record (EHR) connector. Use it to help resolve blockers that you may experience when you set up and configure the EHR connector to integrate with your [Oracle Health EHR](ehr-admin-oracle-health.md) or [Epic EHR](ehr-admin-epic.md) system.
## FHIR URL isn't working
After the web browser join setting is turned on, patients can join virtual appoi
### Patients can send chat messages to providers in Teams after the virtual appointment ends from within the appointment. How can we block this?
-This scenario can happen because of several reasons.
+This scenario can happen because of several reasons.
#### The provider leaves the appointment but didn't end it
To learn more, see the following Citrix documentation:
## Related articles -- [Virtual Appointments with Teams - Integration into Oracle Health EHR](ehr-admin-cerner.md)
+- [Virtual Appointments with Teams - Integration into Oracle Health EHR](ehr-admin-oracle-health.md)
- [Virtual Appointments with Teams - Integration into Epic EHR](ehr-admin-epic.md) - [EHR connector Virtual Appointments report](ehr-connector-report.md) - [Get started with Microsoft 365 for healthcare organizations](teams-in-hc.md)
frontline Shifts Connector Prerequisites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/includes/shifts-connector-prerequisites.md
Previously updated : 03/31/2022 Last updated : 03/9/2023 audience: admin
Before you get started, make sure you have the following prerequisites:
- Administration API URL If you donΓÇÖt have this information, contact Blue Yonder support. The account is created at the root enterprise level by a Blue Yonder enterprise administrator. It must have API Access, Client Admin, and Store Manager access. The account and password are required to create a connection.
+ [![Screenshot of the required access in Blue Yonder WFM.](../media/shifts-connector-by-permission.png)](../media/shifts-connector-by-permission.png#lightbox)
- Federated SSO authentication is enabled in your Blue Yonder WFM environment. Contact Blue Yonder support to make sure federated SSO is enabled. They'll need the following information: - federatedSSOValidationService: `https://wfmconnector.teams.microsoft.com/api/v1/fedauth/{tenantId}/6A51B888-FF44-4FEA-82E1-839401E9CD74/authorize` where {tenantId} is your tenantId - proxyHeader: X-MS-AuthToken - At least one team is set up in Teams.-- You added a Microsoft 365 system account as a team owner to all teams you want to map.</br> [Create this account in Microsoft 365](/microsoft-365/admin/add-users/add-users) and assign it a Microsoft 365 license. Then, add the account as a team owner to all teams that you want to map. The Shifts connector uses this account when syncing Shifts changes from Blue Yonder WFM. Therefore, we recommend that you create an account specifically for this purpose and not use your personal user account.
+- You added a Microsoft 365 system account as a team owner to all teams you want to map.</br> [Create this account in Microsoft 365](/microsoft-365/admin/add-users/add-users) and assign it a Microsoft 365 license. Then, add the account as a team owner to all teams that you want to map. The Shifts connector uses this account when syncing Shifts changes from Blue Yonder WFM. Therefore, we recommend that you create an account specifically for this purpose and not use your personal user account.
frontline Teams In Hc https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/teams-in-hc.md
description: Learn about the telemedicine features in Microsoft 365 and Microsof
- seo-marvel-apr2020 - seo-marvel-jun2020 Previously updated : 02/01/2023 Last updated : 03/03/2023 # Get started with Microsoft 365 for healthcare organizations
The following scenarios are available for healthcare organizations:
| Scenario | Description | Requirements | | -- | -- | -- |
-| [Virtual Appointments with Teams and Electronic Healthcare Record (EHR) integration](#virtual-appointments-and-electronic-healthcare-record-ehr-integration) | Schedule, manage, and conduct virtual appointments with patients. This scenario connects Teams and the Cerner or Epic platform to support virtual appointments. | Active subscription to Microsoft Cloud for Healthcare or subscription to Microsoft Teams EHR connector standalone offer. <br> Users must have an appropriate Microsoft 365 or Office 365 license that includes Teams meetings*. <br> Organizations must have Cerner version November 2018 or later or Epic version November 2018 or later. <br>Details for [Cerner EHR](ehr-admin-cerner.md#before-you-begin) and [Epic EHR](ehr-admin-epic.md#before-you-begin) requirements |
+| [Virtual Appointments with Teams and Electronic Healthcare Record (EHR) integration](#virtual-appointments-and-electronic-healthcare-record-ehr-integration) | Schedule, manage, and conduct virtual appointments with patients. This scenario connects Teams and the Oracle Health or Epic platform to support virtual appointments. | Active subscription to Microsoft Cloud for Healthcare or subscription to Microsoft Teams EHR connector standalone offer. <br> Users must have an appropriate Microsoft 365 or Office 365 license that includes Teams meetings*. <br> Organizations must have Oracle Health version November 2018 or later or Epic version November 2018 or later. <br>Details for [Oracle Health EHR](ehr-admin-oracle-health.md#before-you-begin) and [Epic EHR](ehr-admin-epic.md#before-you-begin) requirements |
| [Virtual Appointments with Teams](#virtual-appointments-and-electronic-healthcare-record-ehr-integration) | Schedule, manage, and conduct virtual appointments with patients. This scenario relies on the Virtual Appointments app or the Bookings app to support virtual appointments. | The Virtual Appointments app or the Bookings app must be enabled for your organization. <br> All staff who conduct meetings must have a license that supports Teams Meeting scheduling*.| | [Care coordination and collaboration](#care-coordination-and-collaboration) | Clinicians and staff can collaborate internally on schedules, documents, tasks, and so on.| Users must have an appropriate license*. |
Use the following poster to start envisioning what your organization can do with
Use the complete meetings platform in Teams to schedule, manage, and conduct virtual appointments with patients. -- If your organization already uses an Electronic Health Record (EHR) system, you can integrate Teams for a more seamless experience. Teams Electronic Health Record (EHR) connector makes it easy for clinicians to launch a virtual patient appointment or consultation with another provider in Teams directly from the EHR system. To learn more, see [Virtual Appointments with Teams - Integration into Cerner EHR](ehr-admin-cerner.md) and [Virtual Appointments with Teams - Integration into Epic EHR](ehr-admin-epic.md).
+- If your organization already uses an Electronic Health Record (EHR) system, you can integrate Teams for a more seamless experience. Teams Electronic Health Record (EHR) connector makes it easy for clinicians to launch a virtual patient appointment or consultation with another provider in Teams directly from the EHR system. To learn more, see [Virtual Appointments with Teams - Integration into Oracle Health EHR](ehr-admin-oracle-health.md) and [Virtual Appointments with Teams - Integration into Epic EHR](ehr-admin-epic.md).
- If you aren't using a supported EHR system, you can use the Virtual Appointments app the Bookings app in Teams. To learn more, see [Virtual Appointments with Teams](virtual-appointments.md). ![Virtual Appointments with Microsoft Teams.](media/virtual-visits-teams.png)
includes Advanced Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/advanced-management.md
+![Information icon](../media/info.png) **Some features in this article require [Microsoft Syntex - SharePoint Advanced Management](/sharepoint/advanced-management)**
+
includes Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/support.md
+
+ Title: Microsoft Defender for Endpoint third-party troubleshooting support Disclaimer
+description: Disclaimer for third-party troubleshooting Microsoft Defender for Endpoint.
Last updated : 03/08/2023+++++++
+> [!IMPORTANT]
+> This article contains information about third-party tools. This is provided to help complete integration scenarios, however, Microsoft does not provide troubleshooting support for third-party tools. <br>
+>Contact the third-party vendor for support.
security Analyzer Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/analyzer-report.md
Use the following example to understand the report.
- On top, the script version and script runtime are listed for reference - The **Device Information** section provides basic OS and device identifiers to uniquely identify the device on which the analyzer has run. - The **Endpoint Security Details** provides general information about Microsoft Defender for Endpoint-related processes including Microsoft Defender Antivirus and the sensor process. If important processes aren't online as expected, the color will change to red.
-
-- The **Endpoint Security Details** provides general information about Microsoft Defender for Endpoint-related processes including Microsoft Defender Antivirus and the sensor process. If important processes aren't online as expected, the color will change to red. :::image type="content" source="images/85f56004dc6bd1679c3d2c063e36cb80.png" alt-text="The Check Results Summary page" lightbox="images/85f56004dc6bd1679c3d2c063e36cb80.png"::: -- On **Check Results Summary**, you'll have an aggregated count for error,
+- On **Check Results Summary**, you'll have an aggregated count for error,
warning, or informational events detected by the analyzer.--- On **Detailed Results**, you'll see a list (sorted by severity) with
+- On **Detailed Results**, you'll see a list (sorted by severity) with
the results and the guidance based on the observations made by the analyzer. ## Open a support ticket to Microsoft and include the Analyzer results
security Android Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-intune.md
Title: Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
+ Title: Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
description: Describes how to deploy Microsoft Defender for Endpoint on Android with Microsoft Intune keywords: microsoft, defender, Microsoft Defender for Endpoint, mde, android, installation, deploy, uninstallation,
ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier3
Learn how to deploy Defender for Endpoint on Android with Microsoft Intune Compa
### Add as Android store app 1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \>
-**Android Apps** \> **Add \> Android store app** and choose **Select**.
+**Android Apps** \> **Add** \> **Android store app** and choose **Select**.
:::image type="content" source="images/mda-addandroidstoreapp.png" alt-text="The Add Android store application pane in the Microsoft Intune admin center portal" lightbox="images/mda-addandroidstoreapp.png":::
Follow the steps below to add Microsoft Defender for Endpoint app into your mana
- Click **Select App**, choose **Microsoft Defender**, select **OK** and then **Next**. :::image type="content" source="images/android-create-app.png" alt-text=" Screenshot of the Associated app details pane." lightbox="images/android-create-app.png":::
-
- 1. Select **Permissions > Add**. From the list, select the available app permissions > **OK**.
- 2. Select an option for each permission to grant with this policy:
- - **Prompt** - Prompts the user to accept or deny.
+ 1. Select **Permissions** \> **Add**. From the list, select the available app permissions \> **OK**.
+ 1. Select an option for each permission to grant with this policy:
+
+ - **Prompt** - Prompts the user to accept or deny.
- **Auto grant** - Automatically approves without notifying the user.
- - **Auto deny** - Automatically denies without notifying the user.
+ - **Auto deny** - Automatically denies without notifying the user.
- 1. Go to the **Configuration settings** section and choose **'Use configuration designer'** in Configuration settings format.
+ 1. Go to the **Configuration settings** section and choose **'Use configuration designer'** in Configuration settings format.
:::image type="content" alt-text="Image of android create app configuration policy." source="images/configurationformat.png" lightbox="images/configurationformat.png":::
Follow the steps below to add Microsoft Defender for Endpoint app into your mana
The app configuration policy for Defender for Endpoint is now assigned to the selected user group. - 10. Select **Microsoft Defender** app in the list \> **Properties** \> **Assignments** \> **Edit**.
security Azure Server Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/azure-server-integration.md
The following capabilities are included in this integration:
> The integration between Microsoft Defender for servers and Microsoft Defender for Endpoint has been expanded to support [Windows Server 2019 and Windows Virtual Desktop (WVD)](/azure/security-center/release-notes#microsoft-defender-for-endpoint-integration-with-azure-defender-now-supports-windows-server-2019-and-windows-10-virtual-desktop-wvd-in-preview). - Windows servers monitored by Microsoft Defender for Cloud will also be available in Defender for Endpoint - Microsoft Defender for Cloud seamlessly connects to the Defender for Endpoint tenant, providing a single view across clients and servers. In addition, Defender for Endpoint alerts will be available in the Microsoft Defender for Cloud console.-- Server investigation - Microsoft Defender for Cloud customers can access the Microsoft 365 Defender portal to perform detailed investigation to uncover the scope of a potential breach.
+- Server investigation - Microsoft Defender for Cloud customers can access the Microsoft 365 Defender portal to perform detailed investigation to uncover the scope of a potential breach.
> [!IMPORTANT]
-> - When you use Microsoft Defender for Cloud to monitor servers, a Defender for Endpoint tenant is automatically created (in the US for US users, in the EU for European and UK users).<br>
-Data collected by Defender for Endpoint is stored in the geo-location of the tenant as identified during provisioning.
+>
+> - When you use Microsoft Defender for Cloud to monitor servers, a Defender for Endpoint tenant is automatically created (in the US for US users, in the EU for European and UK users).
+> Data collected by Defender for Endpoint is stored in the geo-location of the tenant as identified during provisioning.
> - If you use Defender for Endpoint before using Microsoft Defender for Cloud, your data will be stored in the location you specified when you created your tenant even if you integrate with Microsoft Defender for Cloud at a later time.
-> - Once configured, you cannot change the location where your data is stored. If you need to move your data to another location, you need to contact Microsoft Support to reset the tenant. <br>
-Server endpoint monitoring utilizing this integration has been disabled for Office 365 GCC customers.
--
+> - Once configured, you cannot change the location where your data is stored. If you need to move your data to another location, you need to contact Microsoft Support to reset the tenant.
+> Server endpoint monitoring utilizing this integration has been disabled for Office 365 GCC customers.
## Related topics+ - [Onboard previous versions of Windows](onboard-downlevel.md) - [Onboard Windows Server 2012 R2, 2016, SAC version 1803, and 2019](configure-server-endpoints.md)
security Configure Endpoints Vdi https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-vdi.md
The following configuration settings are recommended:
- `%Programfiles%\FSLogix\Apps\frxsvc.exe` - File extensions to exclude from scans and real-time protection:
- - `%Programfiles%\FSLogix\Apps\frxccd.sys`
+ - `%Programfiles%\FSLogix\Apps\frxccd.sys`
- `%Programfiles%\FSLogix\Apps\frxdrv.sys` - `%Programfiles%\FSLogix\Apps\frxdrvvt.sys` - `%TEMP%*.VHD`
The following configuration settings are recommended:
- `%Windir%\TEMP*.VHD` - `%Windir%\TEMP*.VHDX` - `\\storageaccount.file.core.windows.net\share**.VHD`
- - `\\storageaccount.file.core.windows.net\share**.VHDX`
+ - `\\storageaccount.file.core.windows.net\share**.VHDX`
#### Real-time Protection
security Defender Endpoint Plan 1 2 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2.md
The following table summarizes what's included in Microsoft endpoint security pl
| Plan | What's included | |:|:|
-| [Defender for Endpoint Plan 1](defender-endpoint-plan-1.md) | - [Next-generation protection](defender-endpoint-plan-1.md#next-generation-protection) (includes antimalware and antivirus)<br/>- [Attack surface reduction](defender-endpoint-plan-1.md#attack-surface-reduction)<br/>- [Manual response actions](defender-endpoint-plan-1.md#manual-response-actions)<br/>- [Centralized management](defender-endpoint-plan-1.md#centralized-management)<br/>- [Security reports](defender-endpoint-plan-1.md#reporting)<br/>- [APIs](defender-endpoint-plan-1.md#apis)<br/>- [Support for Windows 10, iOS, Android OS, and macOS devices](defender-endpoint-plan-1.md#cross-platform-support)|
+| [Defender for Endpoint Plan 1](defender-endpoint-plan-1.md) | - [Next-generation protection](defender-endpoint-plan-1.md#next-generation-protection) (includes antimalware and antivirus)<br/>- [Attack surface reduction](defender-endpoint-plan-1.md#attack-surface-reduction)<br/>- [Manual response actions](defender-endpoint-plan-1.md#manual-response-actions)<br/>- [Centralized management](defender-endpoint-plan-1.md#centralized-management)<br/>- [Security reports](defender-endpoint-plan-1.md#reporting)<br/>- [APIs](defender-endpoint-plan-1.md#apis)<br/>- [Support for Windows 10, iOS, Android OS, and macOS devices](defender-endpoint-plan-1.md#cross-platform-support)|
| [Defender for Endpoint Plan 2](microsoft-defender-endpoint.md) | All of the Defender for Endpoint Plan 1 capabilities, plus:<br/>- [Device discovery](device-discovery.md)<br/>- [Device inventory](machines-view-overview.md)<br/>- [Core Defender Vulnerability Management capabilities](../defender-vulnerability-management/defender-vulnerability-management-capabilities.md)<br/>- [Threat Analytics](threat-analytics.md)<br/>- [Automated investigation and response](automated-investigations.md)<br/>- [Advanced hunting](advanced-hunting-overview.md)<br/>- [Endpoint detection and response](overview-endpoint-detection-response.md)<br/>- [Endpoint Attack Notifications](endpoint-attack-notifications.md)<br/>- Support for [Windows](configure-endpoints.md) (client only) and [non-Windows platforms](configure-endpoints-non-windows.md) (macOS, iOS, Android, and Linux) | | [Defender Vulnerability Management add-on](../defender-vulnerability-management/defender-vulnerability-management-capabilities.md) | More Defender Vulnerability Management capabilities for Defender for Endpoint Plan 2: <br/>- [Security baselines assessment](../defender-vulnerability-management/tvm-security-baselines.md)<br/>- [Block vulnerable applications](../defender-vulnerability-management/tvm-block-vuln-apps.md)<br/>- [Browser extensions](../defender-vulnerability-management/tvm-browser-extensions.md)<br/>- [Digital certificate assessment](../defender-vulnerability-management/tvm-certificate-inventory.md)<br/>- [Network share analysis](../defender-vulnerability-management/tvm-network-share-assessment.md)<br/> - [Hardware and firmware assessment](../defender-vulnerability-management/tvm-hardware-and-firmware.md) <br/> - [Authenticated scan for Windows](../defender-vulnerability-management/windows-authenticated-scan.md) <br/> - Support for [Windows](configure-endpoints.md) (client and server) and [non-Windows platforms](configure-endpoints-non-windows.md) (macOS, iOS, Android, and Linux) | | [Defender for Business](../defender-business/mdb-overview.md) <sup>[[1](#fn1)]</sup> | [Services optimized for small and medium-sized businesses](../defender-business/compare-mdb-m365-plans.md) include: <br/>- Email protection<br/>- Antispam protection<br/>- Antimalware protection<br/>- Next-generation protection<br/>- Attack surface reduction<br/>- Endpoint detection and response<br/>- Automated investigation and response <br/>- Vulnerability management<br/>- Centralized reporting<br/>- APIs (for integration with custom apps or reporting solutions)<br/>- [Integration with Microsoft 365 Lighthouse](../defender-business/mdb-lighthouse-integration.md) |
security Deployment Vdi Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md
-+ - m365-security - tier2 - ContentEngagementFY23
search.appverid: met150
> [!TIP] > This article is designed for customers who are using Microsoft Defender Antivirus capabilities only. If you have Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus alongside additional device protection capabilities), skip this article and proceed to [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft 365 Defender](configure-endpoints-vdi.md).
-You can use Microsoft Defender Antivirus in a remote desktop (RDS) or non-persistent virtual desktop infrastructure (VDI) environment. Following the guidance in this article, you can configure updates to download directly to your RDS or VDI environments when a user signs in.
+You can use Microsoft Defender Antivirus in a remote desktop (RDS) or non-persistent virtual desktop infrastructure (VDI) environment. Following the guidance in this article, you can configure updates to download directly to your RDS or VDI environments when a user signs in.
This guide describes how to configure Microsoft Defender Antivirus on your VMs for optimal protection and performance, including how to:
This guide describes how to configure Microsoft Defender Antivirus on your VMs f
- [Scan out-of-date machines or machines that have been offline for a while](#scan-vms-that-have-been-offline) - [Apply exclusions](#exclusions) - > [!IMPORTANT]
-> Although a VDI can be hosted on Windows Server 2012 or Windows Server 2016, virtual machines (VMs) should be running Windows 10, version 1607 at a minimum, due to increased protection technologies and features that are unavailable in earlier versions of Windows.
+> Although a VDI can be hosted on Windows Server 2012 or Windows Server 2016, virtual machines (VMs) should be running Windows 10, version 1607 at a minimum, due to increased protection technologies and features that are unavailable in earlier versions of Windows.
## Set up a dedicated VDI file share for security intelligence
Security intelligence packages are typically published once every three to four
You can also set up your single server or machine to fetch the updates on behalf of the VMs at an interval and place them in the file share for consumption. This configuration is possible when the devices have the share and read access (NTFS permissions) to the share so they can grab the updates. To set this configuration up, follow these steps:
- 1. Create an SMB/CIFS file share.
-
+ 1. Create an SMB/CIFS file share.
+ 2. Use the following example to create a file share with the following share permissions. ```PowerShell
This configuration is possible when the devices have the share and read access (
- -- -- -- mdatp$ * Everyone Allow Read ```
-
+ > [!NOTE]
- > An NTFS permission is added for **Authenticated Users:Read:**.
+ > An NTFS permission is added for **Authenticated Users:Read:**.
For this example, the file share is:
security Exposed Apis List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/exposed-apis-list.md
Topic | Description
[**Alert** methods and properties](alerts.md) | Run API calls such as \- get alerts, create alert, update alert and more. [Export **Assessment** per-device methods and properties](get-assessment-methods-properties.md) | Run API calls to gather vulnerability assessments on a per-device basis, such as: \- export secure configuration assessment, export software inventory assessment, export software vulnerabilities assessment, and delta export software vulnerabilities assessment. [**Automated investigation** methods and properties](investigation.md) | Run API calls such as \- get collection of Investigation.
-[Export device health methods and properties](device-health-api-methods-properties.md) | Run API Calls such as - GET /api/public/avdeviceshealth.
+[Export device health methods and properties](device-health-api-methods-properties.md) | Run API Calls such as \- GET /api/public/avdeviceshealth.
[**Domain**-related alerts](get-domain-related-alerts.md) | Run API calls such as \- get domain-related devices, domain statistics and more. [**File** methods and properties](files.md) | Run API calls such as \- get file information, file related alerts, file related devices, and file statistics. [**Indicators** methods and properties](ti-indicator.md) | Run API call such as \- get Indicators, create Indicator, and delete Indicators.
security Linux Deploy Defender For Endpoint With Chef https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-deploy-defender-for-endpoint-with-chef.md
Last updated 04/07/2021
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037) + Before you begin: Install unzip if it's not already installed. The Chef components are already installed and a Chef repository exists (chef generate repo \<reponame\>) to store the cookbook that will be used to deploy to Defender for Endpoint on Chef managed Linux servers.
security Linux Install With Ansible https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-with-ansible.md
This article describes how to deploy Defender for Endpoint on Linux using Ansibl
- [Deployment](#deployment) - [References](#references) ++ ## Prerequisites and system requirements Before you get started, see [the main Defender for Endpoint on Linux page](microsoft-defender-endpoint-linux.md) for a description of prerequisites and system requirements for the current software version.
security Linux Install With Puppet https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-with-puppet.md
This article describes how to deploy Defender for Endpoint on Linux using Puppet
- [Deployment](#deployment) - [Check onboarding status](#check-onboarding-status) ++ ## Prerequisites and system requirements For a description of prerequisites and system requirements for the current software version, see [the main Defender for Endpoint on Linux page](microsoft-defender-endpoint-linux.md).
security Linux Install With Saltack https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-with-saltack.md
This article describes how to deploy Defender for Endpoint on Linux using Saltst
- [Deployment](#deployment) - [References](#references) + ## Prerequisites and system requirements Before you get started, see [the main Defender for Endpoint on Linux page](microsoft-defender-endpoint-linux.md) for a description of prerequisites and system requirements for the current software version.
security Linux Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-whatsnew.md
This article is updated frequently to let you know what's new in the latest rele
- [What's new in Defender for Endpoint on macOS](mac-whatsnew.md) - [What's new in Defender for Endpoint on iOS](ios-whatsnew.md)
+<details>
+ <summary>March-2023 (Build: 101.98.05 | Release version: 30.123012.19805.0)</summary>
+
+&ensp;Released: **March , 08,2023**<br/>
+&ensp;Published: **March 08, 2023**<br/>
+&ensp;Build: **101.98.05**<br/>
+&ensp;Release version: **30.123012.19805.0**<br/>
+&ensp;Engine version: **1.1.19900.2**<br/>
+&ensp;Signature version: **1.379.1299.0**<br/>
+
+**What's new**
+
+- There are multiple fixes and new changes in this release
+ - Improved Data Completeness for Network Connection events.
+ - Improved Data Collection capabilities for file ownership/permissions changes
+ - seManage in part of the package, to that seLinux policies can be configured in different distro (fixed).
+ - Bug fix
+ - Improved enterprise daemon stability.
+ - AuditD stop path clean-up:
+ - Improve the stability of mdatp stop flow.
+ - Added new field to wdavstate to keep track of platform update time.
+ - Stability improvements to parsing Defender for Endpoint onboarding blob.
+ - Scan does not proceed if a valid license is not present (fixed)
+ - Added performance tracing option to xPlatClientAnalyzer, with tracing enabled mdatp process will be dumping the flow in all_process.zip file that can be used for analysis of performance issues.
+ - Added support in Defender for Endpoint for the below RHEL-6 kernel versions
+ - 2.6.32-754.43.1.el6.x86_64
+ - 2.6.32-754.49.1.el6.x86_64
+ - Other fixes
+
+**Known issues**
+
+- While upgrading mdatp to version 101.94.13, you may notice that health is false, with health_issues as "no active supplementary event provider". This may happen due to misconfigured/conflicting auditd rules on existing machines. To mitigate the issue, the auditd rules on the existing machines needs to be fixed. The following steps can help you to identify such auditd rules (these commands need to be run as super user). Please take backup of following file: /etc/audit/rules.d/audit.rules as these steps are only to identify failures.
++
+```bash
+echo -c >> /etc/audit/rules.d/audit.rules
+augenrules --load
+```
+
+- While upgrading from mdatp version 101.75.43 or 101.78.13, you may encounter a kernel hang. Run the following commands before attempting to upgrade to version 101.98.05. More information about the underlying issue can be found at [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901)
+
+There are two ways to mitigate the problem in upgrading.
+
+Use your package manager to uninstall the 101.75.43 or 101.78.13 mdatp version.
+Example:
+```bash
+sudo apt purge mdatp
+sudo apt-get install mdatp
+```
+
+As an alternative to the above, you can follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
+
+In case you don't want to uninstall mdatp you can disable rtp and mdatp in sequence before upgrade.
+Caution: Some customers(<1%) are experiencing issues with this method.
+
+ ```bash
+sudo mdatp config real-time-protection --value=disabled
+sudo systemctl disable mdatp
+```
+
+</details>
+
<details> <summary>Jan-2023 (Build: 101.94.13 | Release version: 30.122112.19413.0)</summary>
security Live Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/live-response.md
Before you can initiate a session on a device, make sure you fulfill the followi
You'll need to enable the live response capability in the [Advanced features settings](advanced-features.md) page. > [!NOTE]
- > Only admins and users who have "Manage Portal Settings" permissions can enable live response.
- >
- > Automated Investigation must be enabled in the [Advanced features settings](advanced-features.md) prior to enabling live response.
+ > Only admins and users who have "Manage Portal Settings" permissions can enable live response.
- **Enable live response for servers from the advanced settings page** (recommended).
security Mac Install With Jamf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-install-with-jamf.md
Last updated 12/18/2020
Learn how to deploy Microsoft Defender for Endpoint on macOS with Jamf Pro. This is a multi-step process. You'll need to complete all of the following steps:
security Web Content Filtering https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-content-filtering.md
ms.localizationpriority: medium
Last updated 01/31/2023 audience: ITPro-+ - m365-security - tier2
Web content filtering is available on the major web browsers, with blocks perfor
- Users are prevented from accessing websites in blocked categories, whether they're browsing on-premises or away. - Your security team can access web reports in the same central location, with visibility over actual blocks and web usage. - If you are using Defender for Endpoint, your security team can conveniently deploy policies to groups of users using device groups defined in [Microsoft Defender for Endpoint role-based access control settings](/microsoft-365/security/defender-endpoint/rbac).-- If you are using Defender for Business, you can define one web content filtering policy that will be applied to all users.
+- If you are using Defender for Business, you can define one web content filtering policy that will be applied to all users.
## Prerequisites
Before trying out this feature, make sure you meet the requirements described in
|:|:| | Subscription | Your subscription must include one of the following:<br/>- [Windows 10/11 Enterprise E5](/windows/deployment/deploy-enterprise-licenses)<br/>- [Microsoft 365 E5](https://www.microsoft.com/microsoft-365/enterprise/e5?activetab=pivot%3aoverviewtab)<br/>- Microsoft 365 E5 Security<br/>- [Microsoft 365 E3](https://www.microsoft.com/microsoft-365/enterprise/e3?activetab=pivot%3aoverviewtab)<br/>- [Microsoft Defender for Endpoint Plan 1 or Plan 2](../defender/eval-defender-endpoint-overview.md)<br/>- [Microsoft Defender for Business](../defender-business/mdb-overview.md)<br/>- [Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium)| | Portal access | You must have access to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>. |
-| Operating system | Your organization's devices must be running one of the following operating systems with the [latest antivirus/antimalware updates](manage-updates-baselines-microsoft-defender-antivirus.md): <br/>- Windows 11<br/>- Windows 10 Anniversary Update (version 1607) or later |
+| Operating system | Your organization's devices must be running one of the following operating systems with the [latest antivirus/antimalware updates](manage-updates-baselines-microsoft-defender-antivirus.md): <br/>- Windows 11<br/>- Windows 10 Anniversary Update (version 1607) or later |
| Related protection | [Windows Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) and [network protection](network-protection.md) must be enabled on your organization's devices. | ## Data handling
The result is that categories 1 - 4 are all blocked. This is illustrated in the
1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a> and sign in.
-2. In the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Advanced Features**.
+2. In the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Advanced Features**.
-3. Scroll down until you see **Web content filtering**.
+3. Scroll down until you see **Web content filtering**.
4. Switch the toggle to **On**, and then select **Save preferences**.
Policies can be deployed to block any of the following parent or child categorie
<details> <summary>Adult content</summary>
-**Cults**: Sites related to groups or movements whose members demonstrate passion for a belief system that is different from those that are socially accepted.
+**Cults**: Sites related to groups or movements whose members demonstrate passion for a belief system that is different from those that are socially accepted.
**Gambling**: Online gambling and sites that promote gambling skills and practice.
Policies can be deployed to block any of the following parent or child categorie
**Peer-to-peer**: Sites that host peer-to-peer (P2P) software or facilitate the sharing of files using P2P software. **Streaming media & downloads**: Sites whose primary function is the distribution of streaming media, or sites that allow users to search, watch, or listen to streaming media.
-
+ </details> <details> <summary>Legal liability</summary>
-**Child abuse images**: Sites that include child abuse images or pornography.
+**Child abuse images**: Sites that include child abuse images or pornography.
**Criminal activity**: Sites that give instruction on, advice about or promotion of illegal activities.
Policies can be deployed to block any of the following parent or child categorie
**Illegal software**: Sites that contain or promote the use of malware, spyware, botnets, phishing scams, or piracy & copyright theft.
-**School cheating**: Sites related to plagiarism or school cheating.
+**School cheating**: Sites related to plagiarism or school cheating.
**Self-harm**: Sites that promote self-harm, including cyberbullying sites that contain abusive and/or threatening messages towards users.
Policies can be deployed to block any of the following parent or child categorie
**Social networking**: Sites that provide social networking services. **Web-based email**: Sites offering web-based mail services.
-
+ </details> <details>
Policies can be deployed to block any of the following parent or child categorie
**Newly registered domains**: Sites that have been newly registered in the past 30 days and have not yet been moved to another category. **Parked domains**: Sites that have no content or are parked for later use.
-
+ **NOTE**: Uncategorized contains only newly registered domains and parked domains, and does not include all other sites outside of these categories.
-
+ </details> ### Create a policy
Only Microsoft Edge is supported if your device's OS configuration is Server (**
Only Microsoft Edge is supported and network protection is not supported on Windows Azure Virtual Desktop multi-session hosts.
-Network protection does not currently support SSL inspection, which might result in some sites being allowed by web content filtering that would normally be blocked. Sites would be allowed due to a lack of visibility into encrypted traffic after the TLS handshake has taken place and an inability to parse certain redirects. This includes redirections from some web-based mail login pages to the mailbox page. As an accepted workaround, you can create a custom block indicator for the login page to ensure no users are able to access the site. Keep in mind, this might block their access to other services associated with the same website.
+Network protection does not currently support SSL inspection, which might result in some sites being allowed by web content filtering that would normally be blocked. Sites would be allowed due to a lack of visibility into encrypted traffic after the TLS handshake has taken place and an inability to parse certain redirects. This includes redirections from some web-based mail login pages to the mailbox page. As an accepted workaround, you can create a custom block indicator for the login page to ensure no users are able to access the site. Keep in mind, this might block their access to other services associated with the same website.
If you are using Microsoft 365 Business Premium or Microsoft Defender for Business, you can define one web content filtering policy for your environment. That policy will apply to all users by default.
security Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management.md
Defender Vulnerability Management leverage Microsoft's threat intelligence, brea
Enable security administrators and IT administrators to collaborate and seamlessly remediate issues with built-in workflows. - **Remediation requests sent to IT** - Create a remediation task in Microsoft Intune from a specific security recommendation.-- **Block vulnerable applications** - Mitigate risk with the ability to block vulnerable applications for specific device groups.
+- **Block vulnerable applications** - Mitigate risk with the ability to block vulnerable applications for specific device groups.
- **Alternate mitigations** - Gain insights on other mitigations, such as configuration changes that can reduce risk associated with software vulnerabilities. - **Real-time remediation status** - Real-time monitoring of the status and progress of remediation activities across the organization.
security Advanced Hunting Deviceinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceinfo-table.md
- tier3 - m365-security Previously updated : 02/16/2021 Last updated : 03/07/2023 # DeviceInfo
Last updated 02/16/2021
The `DeviceInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about devices in the organization, including OS version, active users, and computer name. Use this reference to construct queries that return information from this table.
+> [!IMPORTANT]
+> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+ For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md). | Column name | Data type | Description |
For information on other tables in the advanced hunting schema, [see the advance
|`AdditionalFields` | `string` | Additional information about the event in JSON array format | |`DeviceCategory` | `string` | Broader classification that groups certain device types under the following categories: Endpoint, Network device, IoT, Unknown | |`DeviceType` | `string` | Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer |
-|`DeviceSubType` | `string` | Additional modifier for certain types of devices, for example, a mobile device can be a tablet or a smartphone; only available if device discovery finds enough information about this attribute |
+|`DeviceSubtype` | `string` | Additional modifier for certain types of devices, for example, a mobile device can be a tablet or a smartphone; only available if device discovery finds enough information about this attribute |
|`Model` | `string` | Model name or number of the product from the vendor or manufacturer, only available if device discovery finds enough information about this attribute | |`Vendor` | `string` | Name of the product vendor or manufacturer, only available if device discovery finds enough information about this attribute | |`OSDistribution` | `string` | Distribution of the OS platform, such as Ubuntu or RedHat for Linux platforms | |`OSVersionInfo` | `string` | Additional information about the OS version, such as the popular name, code name, or version number | |`MergedDeviceIds` | `string` | Previous device IDs that have been assigned to the same device | |`MergedToDeviceId` | `string` | The most recent device ID assigned to a device |
+|`SensorHealthState` | `string` | Indicates health of the deviceΓÇÖs EDR sensor, if onboarded to Microsoft Defender For Endpoint |
+| `IsExcluded`| `bool` | Determines if the device is currently excluded from Microsoft Defender for Vulnerability Management experiences |
+|`ExclusionReason` | `string` | Indicates the reason for device exclusion |
+| `AssetValue`| `string` | Indicates the value of a device as assigned by the user |
+| `ExposureLevel` | `string` | Indicates the exposure level of a device |
+
-The `DeviceInfo` table provides device information based on heartbeats, which are periodic reports or signals from a device. Every fifteen minutes, the device sends a partial heartbeat that contains frequently changing attributes like `LoggedOnUsers`. Once a day, a full heartbeat containing the device's attributes is sent.
+The `DeviceInfo` table provides device information based on periodic reports or signals (heartbeats) from a device. Complete reports are sent every hour and every time a change happens to a previous heartbeat.
You can use the following sample query to get the latest state of a device:
security Advanced Hunting Devicenetworkinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicenetworkinfo-table.md
- m365-security - tier3 Previously updated : 02/16/2021 Last updated : 03/07/2023 # DeviceNetworkInfo
Last updated 02/16/2021
The `DeviceNetworkInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about networking configuration of machines, including network adapters, IP and MAC addresses, and connected networks or domains. Use this reference to construct queries that return information from this table.
+> [!IMPORTANT]
+> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+ For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md). | Column name | Data type | Description |
For information on other tables in the advanced hunting schema, [see the advance
| `DefaultGateways` | `string` | Default gateway addresses in JSON array format | | `IPAddresses` | `string` | JSON array containing all the IP addresses assigned to the adapter, along with their respective subnet prefix and IP address space, such as public, private, or link-local | | `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns |
+| `NetworkAdapterVendor` | `string` | Name of the manufacturer or vendor of the network adapter |
## Related topics - [Advanced hunting overview](advanced-hunting-overview.md)
security Advanced Hunting Find Ransomware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-find-ransomware.md
Microsoft Azure:
Microsoft Defender for Cloud Apps: -- [Create anomaly detection policies in Defender for Cloud Apps](/cloud-app-security/anomaly-detection-policy)
+- [Create anomaly detection policies in Defender for Cloud Apps](/cloud-app-security/anomaly-detection-policy)
Microsoft Security team blog posts:
security Advanced Hunting Query Builder Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder-results.md
Title: Work with query results in guided mode for hunting in Microsoft 365 Defender
-description: Use and customize query results in guided mode for advanced hunting in Microsoft 365 Defender
+description: Use and customize query results in guided mode for advanced hunting in Microsoft 365 Defender
keywords: guided mode, advanced hunting, threat hunting, cyber threat hunting, Microsoft 365 Defender, microsoft 365, m365, search, query, telemetry, custom detections, schema, kusto search.product: eADQiWindows 10XVcnh search.appverid: met150
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier2
Last updated 08/11/2022
> [!IMPORTANT] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-In hunting using guided mode, the results of the query appear in the **Results** tab.
+In hunting using guided mode, the results of the query appear in the **Results** tab.
-[![Screenshot of results tab](../../media/guided-hunting/results-view.png) ](../../media/guided-hunting/results-view.png#lightbox)
+[![Screenshot of results tab](../../media/guided-hunting/results-view.png)](../../media/guided-hunting/results-view.png#lightbox)
You can work on the results further by exporting them to a CSV file by selecting **Export**. This downloads the CSV file for your use. You can view other information in the Results view:+ - Number of records in the results list (beside the Search button) - Duration of the query run time - Resource usage of the query ## View more columns
-A few standard columns are included in the results for easy viewing.
+A few standard columns are included in the results for easy viewing.
To view more columns:
-1. Select **Customize columns** in the upper right-hand portion of the results view.
-
-
-2. From here, select the columns to include in the results view and deselect columns to hide.
+1. Select **Customize columns** in the upper right-hand portion of the results view.
+2. From here, select the columns to include in the results view and deselect columns to hide.
-[ ![Screenshot of list of columns you can add to the results view](../../media/guided-hunting/results-view-customize-columns.png) ](../../media/guided-hunting/results-view-customize-columns-tb.png#lightbox)
+ [![Screenshot of list of columns you can add to the results view](../../media/guided-hunting/results-view-customize-columns.png)](../../media/guided-hunting/results-view-customize-columns-tb.png#lightbox)
3. Select **Apply** to view results with the added columns. Use the scroll bars if necessary. - ## See also+ - [Advanced hunting quotas and usage parameters](advanced-hunting-limits.md) - [Switch to advanced mode](advanced-hunting-query-builder-details.md#switch-to-advanced-mode-after-building-a-query) - [Refine your query in guided mode](advanced-hunting-query-builder-details.md)
security Advanced Hunting Query Builder https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder.md
When you choose one data source, for instance, **Endpoints**, the query builder
Once the query is ready, select the blue **Run query** button. If the button is grayed out, it means the query needs to be filled out or edited further.
->[!NOTE]
+> [!NOTE]
> The basic filter view uses the **AND** operator only, meaning running the query generates results for which all set filters are true.
Once the query is ready, select the blue **Run query** button. If the button is
Another quick way to get familiar with guided hunting is to load sample queries using the **Load sample queries** dropdown menu. ![Screenshot of guided mode query builder load sample queries list](../../media/guided-hunting/load-sample-queries.png)
->[!NOTE]
+> [!NOTE]
> Selecting a sample query overrides the existing query. Once the sample query is loaded, select **Run query**.
To specify a set of data to be used in the query, select **Select a filter**. Ex
Type the section's titles in the search box at the top of the list to find the filter. Sections ending in *info* contain filters that provide information about the different components you can look at and filters for the states of entities. Sections ending in *events* contain filters that allow you to look for any monitored event on the entity. For instance, to hunt for activities involving certain devices, you can use the filters under the **Device events** section.
->[!NOTE]
+> [!NOTE]
> Choosing a filter that isn't in the basic filters list deactivates or grays out the toggle to return to the basic filters view. To reset the query or remove existing filters in the current query, select **Clear all**. This also reactivates the basic filters list.
security Advanced Hunting Query Emails Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-emails-devices.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier1
Last updated 02/16/2021
- Microsoft 365 Defender [Advanced hunting](advanced-hunting-overview.md) in Microsoft 365 Defender allows you to proactively hunt for threats across:+ - Devices managed by Microsoft Defender for Endpoint - Emails processed by Microsoft 365 - Cloud app activities, authentication events, and domain controller activities tracked by Microsoft Defender for Cloud Apps and Microsoft Defender for Identity
-With this level of visibility, you can quickly hunt for threats that traverse sections of your network, including sophisticated intrusions that arrive on email or the web, elevate local privileges, acquire privileged domain credentials, and move laterally to across your devices.
+With this level of visibility, you can quickly hunt for threats that traverse sections of your network, including sophisticated intrusions that arrive on email or the web, elevate local privileges, acquire privileged domain credentials, and move laterally to across your devices.
Here are general techniques and sample queries based on various hunting scenarios that can help you explore how you might construct queries when hunting for such sophisticated threats. ## Get entity info
-Use these queries to learn how you can quickly get information about user accounts, devices, and files.
+
+Use these queries to learn how you can quickly get information about user accounts, devices, and files.
### Obtain user accounts from email addresses+ When constructing queries across [tables that cover devices and emails](advanced-hunting-schema-tables.md), you will likely need to obtain user account names from sender or recipient email addresses. You can generally do this for either recipient or sender address using the *local-host* from the email address. In the snippet below, we use the [tostring()](/azure/data-explorer/kusto/query/tostringfunction) Kusto function to extract the local-host right before the `@` from recipient email addresses in the column `RecipientEmailAddress`.
In the snippet below, we use the [tostring()](/azure/data-explorer/kusto/query/t
//Query snippet showing how to extract the account name from an email address AccountName = tostring(split(RecipientEmailAddress, "@")[0]) ```+ The query below shows how this snippet can be used: ```kusto
EmailEvents
### Merge the IdentityInfo table
-You can get account names and other account information by merging or joining the [IdentityInfo table](advanced-hunting-identityinfo-table.md). The query below obtains the list of phishing and malware detections from the [EmailEvents table](advanced-hunting-emailevents-table.md) and then joins that information with the `IdentityInfo` table to get detailed information about each recipient.
+You can get account names and other account information by merging or joining the [IdentityInfo table](advanced-hunting-identityinfo-table.md). The query below obtains the list of phishing and malware detections from the [EmailEvents table](advanced-hunting-emailevents-table.md) and then joins that information with the `IdentityInfo` table to get detailed information about each recipient.
```kusto EmailEvents
EmailEvents
//Get email processing events where the messages were identified as either phishing or malware | where ThreatTypes has "Malware" or ThreatTypes has "Phish" //Merge email events with identity info to get recipient details
-| join (IdentityInfo | distinct AccountUpn, AccountDisplayName, JobTitle,
-Department, City, Country) on $left.RecipientEmailAddress == $right.AccountUpn
+| join (IdentityInfo | distinct AccountUpn, AccountDisplayName, JobTitle,
+Department, City, Country) on $left.RecipientEmailAddress == $right.AccountUpn
//Show important message and recipient details
-| project Timestamp, NetworkMessageId, Subject, ThreatTypes,
-SenderFromAddress, RecipientEmailAddress, AccountDisplayName, JobTitle,
+| project Timestamp, NetworkMessageId, Subject, ThreatTypes,
+SenderFromAddress, RecipientEmailAddress, AccountDisplayName, JobTitle,
Department, City, Country ```
-Watch this [short video](https://www.youtube.com/watch?v=8qZx7Pp5XgM) to learn how you can use Kusto Query Language to join tables.
+Watch this [short video](https://www.youtube.com/watch?v=8qZx7Pp5XgM) to learn how you can use Kusto Query Language to join tables.
### Get device information The [advanced hunting schema](advanced-hunting-schema-tables.md) provides extensive device information in various tables. For example, the [DeviceInfo table](advanced-hunting-deviceinfo-table.md) provides comprehensive device information based on event data aggregated regularly. This query uses the `DeviceInfo` table to check if a potentially compromised user (`<account-name>`) has logged on to any devices and then lists the alerts that have been triggered on those devices.
->[!Tip]
+> [!TIP]
> This query uses `kind=inner` to specify an [inner-join](/azure/data-explorer/kusto/query/joinoperator?pivots=azuredataexplorer#inner-join-flavor), which prevents deduplication of left side values for `DeviceId`. ```kusto
DeviceInfo
| project AlertId //List all alerts on devices that user has logged on to | join AlertInfo on AlertId
-| project AlertId, Timestamp, Title, Severity, Category
+| project AlertId, Timestamp, Title, Severity, Category
``` - ### Get file event information
-Use the following query to get information on file related events.
+Use the following query to get information on file related events.
```kusto DeviceInfo
DeviceInfo
| where ClientVersion startswith "20.1" | summarize by DeviceId | join kind=inner (
- DeviceFileEvents
+ DeviceFileEvents
| where Timestamp > ago(1d) ) on DeviceId | take 10 ``` - ### Get network event information Use the following query to get information on network related events.
DeviceInfo
| where ClientVersion startswith "20.1" | summarize by DeviceId | join kind=inner (
- DeviceNetworkEvents
+ DeviceNetworkEvents
| where Timestamp > ago(1d) ) on DeviceId | take 10
DeviceInfo
| where ClientVersion startswith "20.1" | summarize by DeviceId | join kind=inner (
- DeviceNetworkEvents
+ DeviceNetworkEvents
| where Timestamp > ago(1d) ) on DeviceId | take 10 ``` - ### Example query for macOS devices Use the following example query to see all devices running macOS with a version older than Catalina.
DeviceInfo
| take 10 ``` - ## Hunting scenarios ### List logon activities of users that received emails that were not zapped successfully
DeviceInfo
[Zero-hour auto purge (ZAP)](../office-365-security/zero-hour-auto-purge.md) addresses malicious emails after they have been received. If ZAP fails, malicious code might eventually run on the device and leave accounts compromised. This query checks for logon activity made by the recipients of emails that were not successfully addressed by ZAP. ```kusto
-EmailPostDeliveryEvents
+EmailPostDeliveryEvents
| where Timestamp > ago(7d) //List malicious emails that were not zapped successfully | where ActionType has "ZAP" and ActionResult == "Error"
-| project ZapTime = Timestamp, ActionType, NetworkMessageId , RecipientEmailAddress
+| project ZapTime = Timestamp, ActionType, NetworkMessageId , RecipientEmailAddress
//Get logon activity of recipients using RecipientEmailAddress and AccountUpn | join kind=inner IdentityLogonEvents on $left.RecipientEmailAddress == $right.AccountUpn | where Timestamp between ((ZapTime-24h) .. (ZapTime+24h)) //Show only pertinent info, such as account name, the app or service, protocol, the target device, and type of logon
-| project ZapTime, ActionType, NetworkMessageId , RecipientEmailAddress, AccountUpn,
+| project ZapTime, ActionType, NetworkMessageId , RecipientEmailAddress, AccountUpn,
LogonTime = Timestamp, AccountDisplayName, Application, Protocol, DeviceName, LogonType ```
This query finds the 10 latest logons performed by email recipients within 30 mi
//Define new table for malicious emails let MaliciousEmails=EmailEvents //List emails detected as malware, getting only pertinent columns
-| where ThreatTypes has "Malware"
+| where ThreatTypes has "Malware"
| project TimeEmail = Timestamp, Subject, SenderFromAddress, AccountName = tostring(split(RecipientEmailAddress, "@")[0]); MaliciousEmails | join ( //Merge malicious emails with logon events to find logons by recipients IdentityLogonEvents | project LogonTime = Timestamp, AccountName, DeviceName
-) on AccountName
+) on AccountName
//Check only logons within 30 minutes of receipt of an email | where (LogonTime - TimeEmail) between (0min.. 30min) | take 10
IdentityLogonEvents
### Review PowerShell activities after receipt of emails from known malicious sender
-Malicious emails often contain documents and other specially crafted attachments that run PowerShell commands to deliver additional payloads. If you are aware of emails coming from a known malicious sender (`MaliciousSender@example.com`), you can use this query to list and review PowerShell activities that occurred within 30 minutes after an email was received from the sender.
+Malicious emails often contain documents and other specially crafted attachments that run PowerShell commands to deliver additional payloads. If you are aware of emails coming from a known malicious sender (`MaliciousSender@example.com`), you can use this query to list and review PowerShell activities that occurred within 30 minutes after an email was received from the sender.
```kusto //Define new table for emails from specific sender
DeviceProcessEvents
//Add line below to check only events initiated by Outlook //| where InitiatingProcessParentFileName =~ "outlook.exe" | project TimeProc = Timestamp, AccountName, DeviceName, InitiatingProcessParentFileName, InitiatingProcessFileName, FileName, ProcessCommandLine
-) on AccountName
+) on AccountName
//Check only PowerShell activities within 30 minutes of receipt of an email | where (TimeProc - TimeEmail) between (0min.. 30min) ```
security Advanced Hunting Query Language https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-language.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365initiative-m365-defender - tier1
Last updated 02/16/2021
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)] - **Applies to:** - Microsoft 365 Defender
-Advanced hunting is based on the [Kusto query language](/azure/kusto/query/). You can use Kusto operators and statements to construct queries that locate information in a specialized [schema](advanced-hunting-schema-tables.md).
+Advanced hunting is based on the [Kusto query language](/azure/kusto/query/). You can use Kusto operators and statements to construct queries that locate information in a specialized [schema](advanced-hunting-schema-tables.md).
Watch this short video to learn some handy Kusto query language basics. > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWRwfJ]
-
+ To understand these concepts better, run your first query. ## Try your first query
-In the Microsoft 365 Defender portal, go to **Hunting** to run your first query. Use the following example:
+In the Microsoft 365 Defender portal, go to **Hunting** to run your first query. Use the following example:
```kusto // Finds PowerShell execution events that could involve a download
union DeviceProcessEvents, DeviceNetworkEvents
"Shellcode", "http", "https")
-| project Timestamp, DeviceName, InitiatingProcessFileName, InitiatingProcessCommandLine,
+| project Timestamp, DeviceName, InitiatingProcessFileName, InitiatingProcessCommandLine,
FileName, ProcessCommandLine, RemoteIP, RemoteUrl, RemotePort, RemoteIPType | top 100 by Timestamp ```
FileName, ProcessCommandLine, RemoteIP, RemoteUrl, RemotePort, RemoteIPType
### Describe the query and specify the tables to search
-A short comment has been added to the beginning of the query to describe what it is for. This comment helps if you later decide to save the query and share it with others in your organization.
+A short comment has been added to the beginning of the query to describe what it is for. This comment helps if you later decide to save the query and share it with others in your organization.
```kusto // Finds PowerShell execution events that could involve a download
Afterwards, the query looks for strings in command lines that are typically used
"https") ```
-### Customize result columns and length
+### Customize result columns and length
Now that your query clearly identifies the data you want to locate, you can define what the results look like. `project` returns specific columns, and `top` limits the number of results. These operators help ensure the results are well-formatted and reasonably large and easy to process. ```kusto
-| project Timestamp, DeviceName, InitiatingProcessFileName, InitiatingProcessCommandLine,
+| project Timestamp, DeviceName, InitiatingProcessFileName, InitiatingProcessCommandLine,
FileName, ProcessCommandLine, RemoteIP, RemoteUrl, RemotePort, RemoteIPType | top 100 by Timestamp ``` Select **Run query** to see the results.
->[!TIP]
->You can view query results as charts and quickly adjust filters. For guidance, [read about working with query results](advanced-hunting-query-results.md)
--
+> [!TIP]
+> You can view query results as charts and quickly adjust filters. For guidance, [read about working with query results](advanced-hunting-query-results.md)
## Learn common query operators
To learn more about these data types, [read about Kusto scalar data types](/azur
## Get help as you write queries Take advantage of the following functionality to write queries faster:-- **Autosuggest**ΓÇöas you write queries, advanced hunting provides suggestions from IntelliSense. +
+- **Autosuggest**ΓÇöas you write queries, advanced hunting provides suggestions from IntelliSense.
- **Schema tree**ΓÇöa schema representation that includes the list of tables and their columns is provided next to your working area. For more information, hover over an item. Double-click an item to insert it to the query editor. - **[Schema reference](advanced-hunting-schema-tables.md#get-schema-information-in-the-security-center)**ΓÇöin-portal reference with table and column descriptions as well as supported event types (`ActionType` values) and sample queries
For a more efficient workspace, you can also use multiple tabs in the same hunti
:::image type="content" source="../../media/multitab.png" alt-text="Opening a new tab by selecting Create new in advanced hunting in the Microsoft 365 Defender portal" lightbox="../../media/multitab.png":::
-You can then run different queries without ever opening a new browser tab.
+You can then run different queries without ever opening a new browser tab.
:::image type="content" source="../../media/multitab-examples.png" alt-text="Run different queries without ever leaving the advanced hunting page in the Microsoft 365 Defender portal" lightbox="../../media/multitab-examples.png":::
->[!NOTE]
+> [!NOTE]
> Using multiple browser tabs with advanced hunting might cause you to lose your unsaved queries. To prevent this from happening, use the tab feature within advanced hunting instead of separate browser tabs. ## Use sample queries
The **Get started** section provides a few simple queries using commonly used op
:::image type="content" source="../../media/get-started-section.png" alt-text="The **Getting started** section in the **Advanced hunting** page in the Microsoft 365 Defender portal" lightbox="../../media/get-started-section.png":::
->[!NOTE]
->Apart from the basic query samples, you can also access [shared queries](advanced-hunting-shared-queries.md) for specific threat hunting scenarios. Explore the shared queries on the left side of the page or the [GitHub query repository](https://aka.ms/hunting-queries).
+> [!NOTE]
+> Apart from the basic query samples, you can also access [shared queries](advanced-hunting-shared-queries.md) for specific threat hunting scenarios. Explore the shared queries on the left side of the page or the [GitHub query repository](https://aka.ms/hunting-queries).
## Access query language documentation For more information on Kusto query language and supported operators, see [Kusto query language documentation](/azure/kusto/query/).
->[!NOTE]
->Some tables in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft 365 Defender](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft 365 Defender by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
+> [!NOTE]
+> Some tables in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft 365 Defender](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft 365 Defender by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
## Related topics
security Advanced Hunting Seenby Function https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-seenby-function.md
invoke SeenBy(x)
- where **x** is the device ID of interest
->[!TIP]
+> [!TIP]
> Enrichment functions will show supplemental information only when they are available. Availability of information is varied and depends on a lot of factors. Make sure to consider this when using SeenBy() in your queries or in creating custom detections. For best results, we recommend using the SeenBy() function with the DeviceInfo table. ### Example: Obtain list of onboarded devices that have seen a device
security Advanced Hunting Shared Queries https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-shared-queries.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier2
Last updated 02/16/2021
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)] - **Applies to:** - Microsoft 365 Defender
Last updated 02/16/2021
Under the Queries tab in advanced hunting, you can find the drop-down menus for **Shared queries**, **My queries**, and **Community queries**. You can select a downward-facing arrow to expand a menu. - :::image type="content" source="../../media/advanced-hunting-shared-queries-1.png" alt-text="Shared queries, My queries, and Community queries in the Microsoft 365 Defender portal" lightbox="../../media/advanced-hunting-shared-queries-1.png"::: -- ## Save, modify, and share a query
-You can save a new or existing query so that it is only accessible to you or shared with other users in your organization.
+You can save a new or existing query so that it is only accessible to you or shared with other users in your organization.
-1. Create or modify a query.
+1. Create or modify a query.
2. Click the **Save query** drop-down button and select **Save as**.
-
-3. Enter a name for the query.
+
+3. Enter a name for the query.
:::image type="content" source="../../media/shared-query-2.png" alt-text="The new query that is about to be saved in the Microsoft 365 Defender portal" lightbox="../../media/shared-query-2.png"::: 4. Select the folder where you'd like to save the query. - **Shared queries** ΓÇö shared to all users your organization - **My queries** ΓÇö accessible only to you
-
-5. Select **Save**.
+
+5. Select **Save**.
## Delete or rename a query+ 1. Select the three dots to the right of a query you want to rename or delete. :::image type="content" source="../../media/advanced-hunting-del-save-query.png" alt-text="Rename or delete a query in the Advanced Hunting page in the Microsoft 365 Defender portal" lightbox="../../media/advanced-hunting-del-save-query.png":::
You can save a new or existing query so that it is only accessible to you or sha
2. Select **Delete** and confirm deletion. Or select **Rename** and provide a new name for the query. ## Create a direct link to a query+ To generate a link that opens your query directly in the advanced hunting query editor, finalize your query and select **Share link**.
-## Access community queries in the GitHub repo
+## Access community queries in the GitHub repo
+ Microsoft security researchers regularly share advanced hunting queries in a [designated public repository on GitHub](https://github.com/Azure/Azure-Sentinel/tree/master/Hunting%20Queries/Microsoft%20365%20Defender). Contributions to this repository are reviewed before getting published. To contribute, [join GitHub for free](https://github.com/). You can easily find these queries in the **Community queries** drop-down menu as well. :::image type="content" source="../../media/advanced-hunting-shared-queries-2.png" alt-text="Community queries organized by folder in the Microsoft 365 Defender portal" lightbox="../../media/advanced-hunting-shared-queries-2.png":::
-Community queries are grouped into folders like *Campaigns*, *Collection*, *Defense evasion*, and the like. Further information about the query is provided as in-line comments in the query itself.
-
->[!tip]
->Microsoft security researchers also provide advanced hunting queries that you can use to locate activities and indicators associated with emerging threats. These queries are provided as part of the [threat analytics](/windows/security/threat-protection/microsoft-defender-atp/threat-analytics) reports in Microsoft 365 Defender.
+Community queries are grouped into folders like *Campaigns*, *Collection*, *Defense evasion*, and the like. Further information about the query is provided as in-line comments in the query itself.
+> [!TIP]
+> Microsoft security researchers also provide advanced hunting queries that you can use to locate activities and indicators associated with emerging threats. These queries are provided as part of the [threat analytics](/windows/security/threat-protection/microsoft-defender-atp/threat-analytics) reports in Microsoft 365 Defender.
## Related topics+ - [Advanced hunting overview](advanced-hunting-overview.md) - [Learn the query language](advanced-hunting-query-language.md) - [Work with query results](advanced-hunting-query-results.md)
security Advanced Hunting Take Action https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-take-action.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier1
Last updated 02/16/2021
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)] - **Applies to:** - Microsoft 365 Defender
You can quickly contain threats or address compromised assets that you find in [
- Quarantine files ## Required permissions+ To take action on devices through advanced hunting, you need a role in Microsoft Defender for Endpoint with [permissions to submit remediation actions on devices](/windows/security/threat-protection/microsoft-defender-atp/user-roles#permission-options). If you can't take action, contact a global administrator about getting the following permission: *Active remediation actions > Threat and vulnerability management - Remediation handling*
To take action on devices through advanced hunting, you need a role in Microsoft
To take action on emails through advanced hunting, you need a role in Microsoft Defender for Office 365 to [search and purge emails](/microsoft-365/security/office-365-security/scc-permissions). ## Take various actions on devices+ You can take the following actions on devices identified by the `DeviceId` column in your query results: - Isolate affected devices to contain an infection or prevent attacks from moving laterally
You can take the following actions on devices identified by the `DeviceId` colum
- Restrict app execution to only Microsoft-signed executable files, preventing subsequent threat activity through malware or other untrusted executables To learn more about how these response actions are performed through Microsoft Defender for Endpoint, [read about response actions on devices](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts).
-
+ ### Quarantine files+ You can deploy the *quarantine* action on files so that they are automatically quarantined when encountered. When selecting this action, you can choose between the following columns to identify which files in your query results to quarantine: - `SHA1`: In most advanced hunting tables, this column refers to the SHA-1 of the file that was affected by the recorded action. For example, if a file was copied, this affected file would be the copied file.-- `InitiatingProcessSHA1`: In most advanced hunting tables, this column refers to the file responsible for initiating the recorded action. For example, if a child process was launched, this initiator file would be part of the parent process.
+- `InitiatingProcessSHA1`: In most advanced hunting tables, this column refers to the file responsible for initiating the recorded action. For example, if a child process was launched, this initiator file would be part of the parent process.
- `SHA256`: This column is the SHA-256 equivalent of the file identified by the `SHA1` column. - `InitiatingProcessSHA256`: This column is the SHA-256 equivalent of the file identified by the `InitiatingProcessSHA1` column. To learn more about how quarantine actions are taken and how files can be restored, [read about response actions on files](/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts).
->[!NOTE]
->To locate files and quarantine them, the query results should also include `DeviceId` values as device identifiers.
+> [!NOTE]
+> To locate files and quarantine them, the query results should also include `DeviceId` values as device identifiers.
To take any of the described actions, select one or more records in your query results and then select **Take actions**. A wizard will guide you through the process of selecting and then submitting your preferred actions. :::image type="content" source="../../media/take-action-multiple.png" alt-text="Take actions option in the Microsoft 365 Defender portal" lightbox="../../media/take-action-multiple.png"::: - ## Take various actions on emails+ Apart from device-focused remediation steps, you can also take some actions on emails from your query results. Select the records you want to take action on, select **Take actions**, then under **Choose actions**, select your choice from the following:+ - `Move to mailbox folder` - select this to move the email messages to Junk, Inbox, or Deleted items folder :::image type="content" source="../../media/advanced-hunting-take-actions-email.png" alt-text="The option Take actions in the Microsoft 365 Defender portal" lightbox="../../media/advanced-hunting-take-actions-email.png":::
You can also provide a remediation name and a short description of the action ta
These email actions are applicable to [custom detections](custom-detections-overview.md) as well. - ## Review actions taken+ Each action is individually recorded in the [action center](m365d-action-center.md) under **Action center** > **History** ([security.microsoft.com/action-center/history](https://security.microsoft.com/action-center/history)). Go to the action center to check the status of each action.
-
->[!NOTE]
->Some tables in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft 365 Defender](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft 365 Defender by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
+
+> [!NOTE]
+> Some tables in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft 365 Defender](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft 365 Defender by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
## Related topics+ - [Advanced hunting overview](advanced-hunting-overview.md) - [Learn the query language](advanced-hunting-query-language.md) - [Work with query results](advanced-hunting-query-results.md)
security Alert Grading Playbooks https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbooks.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier2 -+ - autoir - admindeeplinkDEFENDER
As a security researcher or security operations center (SOC) analyst, you must h
- Assess and review the generated alerts and associated incidents. See [investigate alerts](investigate-alerts.md). - Search your tenant's security signal data and check for potential threats and suspicious activities. See [advanced hunting](advanced-hunting-overview.md).
->[!Note]
->You can provide feedback to Microsoft about true positive and false positives alerts, not only at the end of the investigation, but also during the investigation process. This can help Microsoft with future analysis and classification of security events.
->
+> [!NOTE]
+> You can provide feedback to Microsoft about true positive and false positives alerts, not only at the end of the investigation, but also during the investigation process. This can help Microsoft with future analysis and classification of security events.
## Microsoft Defender for Office 365
As a security researcher or security operations center (SOC) analyst, you must h
Save time and effort investigating and mitigating threats.
-Defender for Office 365 alerts can be classified as:
+Defender for Office 365 alerts can be classified as:
-- True positive (TP) for confirmed malicious activity.
+- True positive (TP) for confirmed malicious activity.
- False positive (FP) for confirmed non-malicious activity.
->[!Note]
->Microsoft 365 Defender portal [https://security.microsoft.com](https://security.microsoft.com) brings together functionality from existing Microsoft security portals. The Microsoft 365 Defender portal emphasizes quick access to information, simpler layouts, and bringing related information together for easier use.
->
+> [!NOTE]
+> Microsoft 365 Defender portal [https://security.microsoft.com](https://security.microsoft.com) brings together functionality from existing Microsoft security portals. The Microsoft 365 Defender portal emphasizes quick access to information, simpler layouts, and bringing related information together for easier use.
## Microsoft Defender for Cloud Apps
Defender for Cloud Apps natively integrates with leading Microsoft solutions and
The Defender for Cloud Apps framework includes the capability to protect your network against cyberthreats and anomalies, detects unusual behavior across cloud apps to identify ransomware, compromised users or rogue applications. It enables the analysis of high-risk usage and can remediate automatically to limit the risk to your organization.
-Defender for Cloud Apps alerts can be classified as:
+Defender for Cloud Apps alerts can be classified as:
-- TP for confirmed malicious activity. -- Benign true positive (B-TP) for suspicious but not malicious activity, such as a penetration test or other authorized suspicious action.
+- TP for confirmed malicious activity.
+- Benign true positive (B-TP) for suspicious but not malicious activity, such as a penetration test or other authorized suspicious action.
- FP for confirmed non-malicious activity. ## Alert grading playbooks
security Api Advanced Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-advanced-hunting.md
Permission type | Permission | Permission display name
Application | AdvancedHunting.Read.All| Run advanced queries Delegated (work or school account) | AdvancedHunting.Read | Run advanced queries
->[!Note]
+> [!NOTE]
> When obtaining a token using user credentials: > >- The user needs to have the 'View Data' role.
security Api Incident https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-incident.md
incidentName | string | The name of the Incident.
createdTime | DateTimeOffset | The date and time (in UTC) the Incident was created. lastUpdateTime | DateTimeOffset | The date and time (in UTC) the Incident was last updated. assignedTo | string | Owner of the Incident.
-severity | Enum | Severity of the Incident. Possible values are: ```UnSpecified```, ```Informational```, ```Low```, ```Medium```, and ```High```.
-status | Enum | Specifies the current status of the incident. Possible values are: ```Active```, ```InProgress```, ```Resolved```, and ```Redirected```.
+severity | Enum | Severity of the Incident. Possible values are: `UnSpecified`, `Informational`, `Low`, `Medium`, and `High`.
+status | Enum | Specifies the current status of the incident. Possible values are: `Active`, `InProgress`, `Resolved`, and `Redirected`.
classification | Enum | Specification of the incident. Possible values are: `TruePositive`, `Informational, expected activity`, and `FalsePositive`. determination | Enum | Specifies the determination of the incident. <p>Possible determination values for each classification are: <br><li> <b>True positive</b>: `Multistage attack` (MultiStagedAttack), `Malicious user activity` (MaliciousUserActivity), `Compromised account` (CompromisedUser) ΓÇô consider changing the enum name in public api accordingly, `Malware` (Malware), `Phishing` (Phishing), `Unwanted software` (UnwantedSoftware), and `Other` (Other). <li> <b>Informational, expected activity:</b> `Security test` (SecurityTesting), `Line-of-business application` (LineOfBusinessApplication), `Confirmed activity` (ConfirmedUserActivity) - consider changing the enum name in public api accordingly, and `Other` (Other). <li> <b>False positive:</b> `Not malicious` (Clean) - consider changing the enum name in public api accordingly, `Not enough data to validate` (InsufficientData), and `Other` (Other). tags | string list | List of Incident tags. comments | List of incident comments | Incident Comment object contains: comment string, createdBy string, and createTime date time. alerts | alert list | List of related alerts. See examples at [List incidents](api-list-incidents.md) API documentation.
->[!NOTE]
->Around August 29, 2022, previously supported alert determination values ('Apt' and 'SecurityPersonnel') will be deprecated and no longer available via the API.
+> [!NOTE]
+> Around August 29, 2022, previously supported alert determination values ('Apt' and 'SecurityPersonnel') will be deprecated and no longer available via the API.
## Related articles
security Api Update Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-update-incidents.md
determination|Enum|Specifies the determination of the incident. <p>Possible dete
tags|string list|List of Incident tags. comment|string|Comment to be added to the incident.
->[!NOTE]
->Around August 29, 2022, previously supported alert determination values ('Apt' and 'SecurityPersonnel') will be deprecated and no longer available via the API.
+> [!NOTE]
+> Around August 29, 2022, previously supported alert determination values ('Apt' and 'SecurityPersonnel') will be deprecated and no longer available via the API.
## Response
security Autoad Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/autoad-results.md
With Microsoft 365 Defender, when an automatic attack disruption triggers, detai
Microsoft 365 Defender automatic attack disruption is built-in in the Incident view. Reviewing the incident graph enables you to get the entire attack story and assess the attack disruption impact and status.
-Here are some examples of what it looks like:
+Here are some examples of what it looks like:
-- Disrupted incidents include a tag for ΓÇÿAttack DisruptionΓÇÖ and the specific threat type identified (i.e., ransomware). If you subscribe to incident email notifications, these tags also appear in the emails.
+- Disrupted incidents include a tag for 'Attack Disruption' and the specific threat type identified (i.e., ransomware). If you subscribe to incident email notifications, these tags also appear in the emails.
- A highlighted notification below the incident title indicating that the incident was disrupted. - Suspended users and contained devices appear with a label indicating their status.
security Automatic Attack Disruption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/automatic-attack-disruption.md
This article provides an overview of automated attack disruption and includes li
[!include[Prerelease information](../../includes/prerelease.md)]
-Automatic attack disruption is designed to contain attacks in progress, limit the impact on an organizationΓÇÖs assets, and provide more time for the SOC to remediate the attack fully. Unlike known protection methods such as prevention and blocking based on a single indicator of compromise, the attack disruption in Microsoft 365 Defender leverages the full breadth of our XDR signal to act at the incident level, taking the entire attack into account.
+Automatic attack disruption is designed to contain attacks in progress, limit the impact on an organization's assets, and provide more time for the SOC to remediate the attack fully. Unlike known protection methods such as prevention and blocking based on a single indicator of compromise, the attack disruption in Microsoft 365 Defender leverages the full breadth of our XDR signal to act at the incident level, taking the entire attack into account.
-While many XDR and SOAR solutions allow you to create your automatic response actions, the key difference to Microsoft 365 DefenderΓÇÖs automatic attack disruption is that it is built-in and uses insights from our security researchers and advanced AI models to counteract the complexities of advanced attacks. It considers the entire context of signals from different sources to determine compromised assets.
+While many XDR and SOAR solutions allow you to create your automatic response actions, the key difference to Microsoft 365 Defender's automatic attack disruption is that it is built-in and uses insights from our security researchers and advanced AI models to counteract the complexities of advanced attacks. It considers the entire context of signals from different sources to determine compromised assets.
Automatic attack disruption operates in three key stages: -- It uses Microsoft 365 DefenderΓÇÖs XDR ability to correlate signals from many different sources into a single, high-confidence incident through insights from endpoints, identities, email and collaboration tools, as well as SaaS apps.
+- It uses Microsoft 365 Defender's XDR ability to correlate signals from many different sources into a single, high-confidence incident through insights from endpoints, identities, email and collaboration tools, as well as SaaS apps.
- It identifies assets controlled by the attacker and used to spread the attack. - It automatically takes response actions across relevant Microsoft Defender products to contain the attack in real-time by isolating affected assets.
-This game-changing capability limits a threat actorΓÇÖs progress early on and dramatically reduces the overall impact of an attack, from associated costs to loss of productivity.
+This game-changing capability limits a threat actor's progress early on and dramatically reduces the overall impact of an attack, from associated costs to loss of productivity.
## Establishing high confidence when taking automatic action
-We understand that taking automatic action sometimes comes with hesitation from security teams, given the potential impact it can have on an organization. Therefore, the automatic attack disruption capabilities in Microsoft 365 Defender are designed to rely on high-fidelity signals. In addition to XDR capabilities that correlate incidents with millions of Defender product signals across email, identity, applications, documents, devices, networks, and files. Insights from the continuous investigation of thousands of incidents by MicrosoftΓÇÖs security research team ensure that automatic attack disruption maintains a high signal-to-noise ratio (SNR).
+We understand that taking automatic action sometimes comes with hesitation from security teams, given the potential impact it can have on an organization. Therefore, the automatic attack disruption capabilities in Microsoft 365 Defender are designed to rely on high-fidelity signals. In addition to XDR capabilities that correlate incidents with millions of Defender product signals across email, identity, applications, documents, devices, networks, and files. Insights from the continuous investigation of thousands of incidents by Microsoft's security research team ensure that automatic attack disruption maintains a high signal-to-noise ratio (SNR).
Investigations are integral to monitoring our signals and the attack threat landscape to ensure high quality and accurate protection.
Investigations are integral to monitoring our signals and the attack threat land
> This article describes how attack disruption works. To configure these capabilities, see [Configure attack disruption capabilities](configure-attack-disruption.md) in Microsoft 365 Defender. ## Automated response actions+ In automatic attack disruption, we leverage Microsoft-based XDR response actions. Examples of these actions are: -- [Device contain](/microsoft-365/security/defender-endpoint/respond-machine-alerts#contain-devices-from-the-network) - based on Microsoft Defender for EndpointΓÇÖs capability, this action is an automatic containment of a suspicious device to block any incoming/outgoing communication with the said device.-- [Disable user](/defender-for-identity/remediation-actions) - based on Microsoft Defender for IdentityΓÇÖs capability, this action is an automatic suspension of a compromised account to prevent additional damage like lateral movement, malicious mailbox use, or malware execution.
+- [Device contain](/microsoft-365/security/defender-endpoint/respond-machine-alerts#contain-devices-from-the-network) - based on Microsoft Defender for Endpoint's capability, this action is an automatic containment of a suspicious device to block any incoming/outgoing communication with the said device.
+- [Disable user](/defender-for-identity/remediation-actions) - based on Microsoft Defender for Identity's capability, this action is an automatic suspension of a compromised account to prevent additional damage like lateral movement, malicious mailbox use, or malware execution.
For more information, see [remediation actions](m365d-remediation-actions.md) in Microsoft 365 Defender.
On the incident page:
- A yellow banner at the top of the page that highlights the automatic action taken - The current asset status is shown in the incident graph if an action is done on an asset, e.g., account disabled or device contained
-For more information see ΓÇÿview attack disruption details and resultsΓÇÖ.
+For more information see 'view attack disruption details and results'.
## Next steps
security Configure Attack Disruption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-attack-disruption.md
Then, after you're all set up, you can view and manage containment actions in In
|Requirement|Details| ||| |Subscription requirements|One of these subscriptions: <ul><li>Microsoft 365 E5 or A5</li><li>Microsoft 365 E3 with the Microsoft 365 E5 Security add-on</li><li>Microsoft 365 E3 with the Enterprise Mobility + Security E5 add-on</li><li>Microsoft 365 A3 with the Microsoft 365 A5 Security add-on</li><li>Windows 10 Enterprise E5 or A5</li><li>Windows 11 Enterprise E5 or A5</li><li>Enterprise Mobility + Security (EMS) E5 or A5</li><li>Office 365 E5 or A5</li><li>Microsoft Defender for Endpoint</li><li>Microsoft Defender for Identity</li><li>Microsoft Defender for Cloud Apps</li><li>Defender for Office 365 (Plan 2)</li></ul> <p> See [Microsoft 365 Defender licensing requirements](./prerequisites.md#licensing-requirements).|
-|Deployment requirements|<ul><li>Deployment across Defender products (e.g., Defender for Endpoint, Defender for Office 365, Defender for Identity, and Defender for Cloud Apps)</li><ul><li>The wider the deployment, the greater the protection coverage is. For example, if a Microsoft Defender for Cloud Apps signal is used in a certain detection, then this product is required to detect the relevant specific attack scenario.</li><li>Similarly, the relevant product should be deployed to execute an automated response action. For example, Microsoft Defender for Endpoint is required to automatically contain a device. </li></ul><li>Microsoft Defender for EndpointΓÇÖs device discovery is set to ΓÇÿstandard discoveryΓÇÖ</li></ul>|
+|Deployment requirements|<ul><li>Deployment across Defender products (e.g., Defender for Endpoint, Defender for Office 365, Defender for Identity, and Defender for Cloud Apps)</li><ul><li>The wider the deployment, the greater the protection coverage is. For example, if a Microsoft Defender for Cloud Apps signal is used in a certain detection, then this product is required to detect the relevant specific attack scenario.</li><li>Similarly, the relevant product should be deployed to execute an automated response action. For example, Microsoft Defender for Endpoint is required to automatically contain a device. </li></ul><li>Microsoft Defender for Endpoint's device discovery is set to 'standard discovery'</li></ul>|
|Permissions|To configure automatic attack disruption capabilities, you must have one of the following roles assigned in either Azure Active Directory (<https://portal.azure.com>) or in the Microsoft 365 admin center (<https://admin.microsoft.com>): <ul><li>Global Administrator</li><li>Security Administrator</li></ul>To work with automated investigation and response capabilities, such as by reviewing, approving, or rejecting pending actions, see [Required permissions for Action center tasks](m365d-action-center.md#required-permissions-for-action-center-tasks).| ## Review or change the automation level for device groups
Whether automated investigations run, and whether remediation actions are taken
1. Go to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-2. Go to **Settings** > **Endpoints** > **Device groups** under **Permissions**.
+2. Go to **Settings** \> **Endpoints** \> **Device groups** under **Permissions**.
3. Review your device group policies. Look at the **Automation level** column. We recommend using **Full - remediate threats automatically**. You might need to create or edit your device groups to get the level of automation you want. To exclude a device group from automated containment, set its automation level to **no automated response**. Note that this is not highly recommended and should only be done for a limited number of devices. ## Review or change automated response exclusions for users
-Automatic attack disruption enables the exclusion of specific user accounts from automated containment actions. Excluded users wonΓÇÖt be affected by automated actions triggered by attack disruption. You must be a global administrator or security administrator to perform the following procedure:
+Automatic attack disruption enables the exclusion of specific user accounts from automated containment actions. Excluded users won't be affected by automated actions triggered by attack disruption. You must be a global administrator or security administrator to perform the following procedure:
1. Go to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-2. Go to **Settings** > **Identities** > **Automated response exclusions**. Check the user list to exclude accounts.
+2. Go to **Settings** \> **Identities** \> **Automated response exclusions**. Check the user list to exclude accounts.
:::image type="content" source="../../media/automatic-attack-disruption/Fig2-exclude-specific-users.png" alt-text="Selecting user accounts for automated response exclusion" lightbox="../../media/automatic-attack-disruption/Fig2-exclude-specific-users.png":::
-Excluding user accounts is not recommended, and accounts added to this list wonΓÇÖt be suspended in all supported attack types like business email compromise (BEC) and human-operated ransomware.
+Excluding user accounts is not recommended, and accounts added to this list won't be suspended in all supported attack types like business email compromise (BEC) and human-operated ransomware.
## Next step
security Configure Siem Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-siem-defender.md
ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier2
Last updated 10/25/2021
> - [Microsoft 365 Defender Incidents](incident-queue.md) consists of collections of correlated alerts and their evidence. > - [Microsoft 365 Defender Streaming API](streaming-api.md) streams event data from Microsoft 365 Defender to event hubs or Azure storage accounts.
-Microsoft 365 Defender supports security information and event management (SIEM) tools ingesting information from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for a registered AAD application representing the specific SIEM solution or connector installed in your environment.
+Microsoft 365 Defender supports security information and event management (SIEM) tools ingesting information from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for a registered AAD application representing the specific SIEM solution or connector installed in your environment.
For more information, see:
For more information, see:
- [Hello World example](api-hello-world.md) - [Get access with application context](api-create-app-web.md)
-There are two primary models to ingest security information:
+There are two primary models to ingest security information:
-1. Ingesting Microsoft 365 Defender incidents and their contained alerts from a REST API in Azure.
+1. Ingesting Microsoft 365 Defender incidents and their contained alerts from a REST API in Azure.
-2. Ingesting streaming event data either through Azure Event Hubs or Azure Storage Accounts.
+2. Ingesting streaming event data either through Azure Event Hubs or Azure Storage Accounts.
-Microsoft 365 Defender currently supports the following SIEM solution integrations:
+Microsoft 365 Defender currently supports the following SIEM solution integrations:
- [Ingesting incidents from the incidents REST API](#ingesting-incidents-from-the-incidents-rest-api) - [Ingesting streaming event data via Event Hub](#ingesting-streaming-event-data-via-event-hubs)
Microsoft 365 Defender currently supports the following SIEM solution integratio
## Ingesting incidents from the incidents REST API ### Incident schema+ For more information on Microsoft 365 Defender incident properties including contained alert and evidence entities metadata, see [Schema mapping](../defender/api-list-incidents.md#schema-mapping). ### Splunk
Using the new, fully supported Splunk Add-on for Microsoft Security that support
- Ingesting Defender for Endpoint alerts (from the Defender for Endpoint's Azure endpoint) and updating these alerts -- Support for updating Microsoft 365 Defender Incidents and/or Microsoft Defender for Endpoint Alerts and the respective dashboards has been moved to the Microsoft 365 App for Splunk.
+- Support for updating Microsoft 365 Defender Incidents and/or Microsoft Defender for Endpoint Alerts and the respective dashboards has been moved to the Microsoft 365 App for Splunk.
For more information on:
Framework (CEF).
For more information on the new ArcSight SmartConnector for Microsoft 365 Defender, see [ArcSight Product Documentation](https://community.microfocus.com/cyberres/productdocs/w/connector-documentation/39246/smartconnector-for-microsoft-365-defender). The SmartConnector replaces the previous FlexConnector for Microsoft Defender for Endpoint that has been deprecated.
-
+ ### Elastic Elastic Security combines SIEM threat detection features with endpoint prevention and response capabilities in one solution.
For more information on the event types supported by the Streaming API, see [Sup
### Splunk
-Use the Splunk Add-on for Microsoft Cloud Services to ingest events from Azure Event Hubs.
+Use the Splunk Add-on for Microsoft Cloud Services to ingest events from Azure Event Hubs.
For more information on the Splunk Add-on for Microsoft Cloud Services, see the [Microsoft Cloud Services Add-on on Splunkbase](https://splunkbase.splunk.com/app/3110/).
-
### IBM QRadar
->Use the new IBM QRadar Microsoft 365 Defender Device Support Module (DSM) that calls the [Microsoft 365 Defender Streaming API](streaming-api.md) that allows ingesting streaming event data from Microsoft 365 Defender products via Event Hubs or Azure Storage Account. For more information on supported event types, see [Supported event types](supported-event-types.md).
+
+Use the new IBM QRadar Microsoft 365 Defender Device Support Module (DSM) that calls the [Microsoft 365 Defender Streaming API](streaming-api.md) that allows ingesting streaming event data from Microsoft 365 Defender products via Event Hubs or Azure Storage Account. For more information on supported event types, see [Supported event types](supported-event-types.md).
### Elastic
security Create Custom Rbac Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/create-custom-rbac-roles.md
search.appverid: met150
The following steps guide you on how to create custom roles in Microsoft 365 Defender RBAC.
->[!Important]
->You must be a Global Administrator or Security Administrator in Azure Active Directory, or have all the **Authorization** permissions assigned in Microsoft 365 Defender RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
+> [!IMPORTANT]
+> You must be a Global Administrator or Security Administrator in Azure Active Directory, or have all the **Authorization** permissions assigned in Microsoft 365 Defender RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
1. Sign in to the [Microsoft 365 Defender portal](https://security.microsoft.com). 2. In the navigation pane, select **Permissions**.
The following steps guide you on how to create custom roles in Microsoft 365 Def
For more information on the RBAC custom permissions, see [About RBAC custom permissions](custom-permissions-details.md).
- >[!Note]
+ > [!NOTE]
> If all read-only or all read and manage permissions are assigned, any new permissions added to this category in the future will be automatically assigned under this role. > > If you have assigned custom permissions and new permissions are added to this category, you will need to re-assign your roles with the new permissions if needed.
The following steps guide you on how to create custom roles in Microsoft 365 Def
If a user selects all read-only permissions for a single data source, for example, Microsoft Defender for Endpoint, they will not be able to read alerts for Microsoft Defender for Office 365 or Microsoft Defender for Identity.
- >[!Note]
+ > [!NOTE]
> By selecting **Choose all data sources** all supported data sources within Microsoft 365 Defender RBAC and any future data sources that are added will be automatically assigned to this assignment. 11. In **Assigned users and groups** choose the Azure Active Directory security groups or individual users to assign the role to, and select **Add**.
- >[!Note]
+ > [!NOTE]
> In Microsoft 365 Defender RBAC, you can create as many assignments as needed under the same role with same permissions. For example, you can have an assignment within a role that has access to all data sources and then a separate assignment for a team that only needs access to Endpoint alerts from the Defender for Endpoint data source. This enables maintaining the minimum number of roles. 12. Select **Next** to review and finish creating the role and then select **Submit**.
To access and manage roles and permissions, without being a Global Administrator
11. In **Assigned users and groups** ΓÇô choose the Azure Active Directory security groups or individual users to assign the role to, and select **Add**. 12. Select **Next** to review and finish creating the role and then select **Submit**.
->[!Note]
->For the Microsoft 365 Defender security portal to start enforcing the permissions and assignments configured in your new or imported roles, youΓÇÖll need to activate the new Microsoft 365 Defender RBAC model. For more information, see [Activate Microsoft 365 Defender RBAC](activate-defender-rbac.md).
+> [!NOTE]
+> For the Microsoft 365 Defender security portal to start enforcing the permissions and assignments configured in your new or imported roles, you'll need to activate the new Microsoft 365 Defender RBAC model. For more information, see [Activate Microsoft 365 Defender RBAC](activate-defender-rbac.md).
## Next steps
security Custom Detection Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-detection-rules.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365initiative-m365-defender - tier2
Last updated 02/16/2021
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)] - **Applies to:** - Microsoft 365 Defender
Custom detection rules are rules you can design and tweak using [advanced huntin
## Required permissions for managing custom detections To manage custom detections, you need to be assigned one of these roles:+ - **Security settings (manage)**ΓÇöUsers with this [Microsoft 365 Defender permission](/microsoft-365/security/defender/manage-rbac) can manage security settings in the Microsoft 365 Defender portal. - **Security administrator**ΓÇöUsers with this [Azure Active Directory role](/azure/active-directory/roles/permissions-reference#security-administrator) can manage security settings in the Microsoft 365 Defender portal and other portals and services. - **Security operator**ΓÇöUsers with this [Azure Active Directory role](/azure/active-directory/roles/permissions-reference#security-operator) can manage alerts and have global read-only access to security-related features, including all information in the Microsoft 365 Defender portal. This role is sufficient for managing custom detections only if role-based access control (RBAC) is turned off in Microsoft Defender for Endpoint. If you have RBAC configured, you also need the **manage security settings** permission for Defender for Endpoint.
-You can also manage custom detections that apply to data from specific Microsoft 365 Defender solutions if you have permissions for them. If you only have manage permissions for Microsoft 365 Defender for Office, for instance, you can create custom detections using `Email` tables but not `Identity` tables.
+You can also manage custom detections that apply to data from specific Microsoft 365 Defender solutions if you have permissions for them. If you only have manage permissions for Microsoft 365 Defender for Office, for instance, you can create custom detections using `Email` tables but not `Identity` tables.
To manage required permissions, a **global administrator** can: -- Assign the **security administrator** or **security operator** role in [Microsoft 365 admin center](https://admin.microsoft.com/) under **Roles** > **Security admin**.-- Check RBAC settings for Microsoft Defender for Endpoint in [Microsoft 365 Defender](https://security.microsoft.com/) under **Settings** > **Permissions** > **Roles**. Select the corresponding role to assign the **manage security settings** permission.
+- Assign the **security administrator** or **security operator** role in [Microsoft 365 admin center](https://admin.microsoft.com/) under **Roles** \> **Security admin**.
+- Check RBAC settings for Microsoft Defender for Endpoint in [Microsoft 365 Defender](https://security.microsoft.com/) under **Settings** \> **Permissions** > **Roles**. Select the corresponding role to assign the **manage security settings** permission.
> [!NOTE] > To manage custom detections, **security operators** will need the **manage security settings** permission in Microsoft Defender for Endpoint if RBAC is turned on. ## Create a custom detection rule
-### 1. Prepare the query.
-In the Microsoft 365 Defender portal, go to **Advanced hunting** and select an existing query or create a new query. When using a new query, run the query to identify errors and understand possible results.
+### 1. Prepare the query
->[!IMPORTANT]
->To prevent the service from returning too many alerts, each rule is limited to generating only 100 alerts whenever it runs. Before creating a rule, tweak your query to avoid alerting for normal, day-to-day activity.
+In the Microsoft 365 Defender portal, go to **Advanced hunting** and select an existing query or create a new query. When using a new query, run the query to identify errors and understand possible results.
+> [!IMPORTANT]
+> To prevent the service from returning too many alerts, each rule is limited to generating only 100 alerts whenever it runs. Before creating a rule, tweak your query to avoid alerting for normal, day-to-day activity.
#### Required columns in the query results+ To create a custom detection rule, the query must return the following columns: - `Timestamp`ΓÇöused to set the timestamp for generated alerts - `ReportId`ΓÇöenables lookups for the original records - One of the following columns that identify specific devices, users, or mailboxes:
- - `DeviceId`
- - `DeviceName`
- - `RemoteDeviceName`
- - `RecipientEmailAddress`
- - `SenderFromAddress` (envelope sender or Return-Path address)
- - `SenderMailFromAddress` (sender address displayed by email client)
- - `RecipientObjectId`
- - `AccountObjectId`
- - `AccountSid`
- - `AccountUpn`
- - `InitiatingProcessAccountSid`
- - `InitiatingProcessAccountUpn`
- - `InitiatingProcessAccountObjectId`
+ - `DeviceId`
+ - `DeviceName`
+ - `RemoteDeviceName`
+ - `RecipientEmailAddress`
+ - `SenderFromAddress` (envelope sender or Return-Path address)
+ - `SenderMailFromAddress` (sender address displayed by email client)
+ - `RecipientObjectId`
+ - `AccountObjectId`
+ - `AccountSid`
+ - `AccountUpn`
+ - `InitiatingProcessAccountSid`
+ - `InitiatingProcessAccountUpn`
+ - `InitiatingProcessAccountObjectId`
->[!NOTE]
->Support for additional entities will be added as new tables are added to the [advanced hunting schema](advanced-hunting-schema-tables.md).
+> [!NOTE]
+> Support for additional entities will be added as new tables are added to the [advanced hunting schema](advanced-hunting-schema-tables.md).
Simple queries, such as those that don't use the `project` or `summarize` operator to customize or aggregate results, typically return these common columns. There are various ways to ensure more complex queries return these columns. For example, if you prefer to aggregate and count by entity under a column such as `DeviceId`, you can still return `Timestamp` and `ReportId` by getting it from the most recent event involving each unique `DeviceId`. - > [!IMPORTANT] > Avoid filtering custom detections using the `Timestamp` column. The data used for custom detections is pre-filtered based on the detection frequency. - The sample query below counts the number of unique devices (`DeviceId`) with antivirus detections and uses this count to find only the devices with more than five detections. To return the latest `Timestamp` and the corresponding `ReportId`, it uses the `summarize` operator with the `arg_max` function. ```kusto
DeviceEvents
> [!TIP] > For better query performance, set a time filter that matches your intended run frequency for the rule. Since the least frequent run is _every 24 hours_, filtering for the past day will cover all new data.
-### 2. Create new rule and provide alert details.
+### 2. Create new rule and provide alert details
With the query in the query editor, select **Create detection rule** and specify the following alert details:
With the query in the query editor, select **Create detection rule** and specify
- **Severity**ΓÇöpotential risk of the component or activity identified by the rule - **Category**ΓÇöthreat component or activity identified by the rule - **MITRE ATT&CK techniques**ΓÇöone or more attack techniques identified by the rule as documented in the [MITRE ATT&CK framework](https://attack.mitre.org/). This section is hidden for certain alert categories, including malware, ransomware, suspicious activity, and unwanted software-- **Description**ΓÇömore information about the component or activity identified by the rule
+- **Description**ΓÇömore information about the component or activity identified by the rule
- **Recommended actions**ΓÇöadditional actions that responders might take in response to an alert #### Rule frequency+ When you save a new rule, it runs and checks for matches from the past 30 days of data. The rule then runs again at fixed intervals, applying a lookback duration based on the frequency you choose: - **Every 24 hours**ΓÇöruns every 24 hours, checking data from the past 30 days
When you save a new rule, it runs and checks for matches from the past 30 days o
When you edit a rule, it will run with the applied changes in the next run time scheduled according to the frequency you set. The rule frequency is based on the event timestamp and not the ingestion time. --
->[!TIP]
-> Match the time filters in your query with the lookback duration. Results outside of the lookback duration are ignored.
+> [!TIP]
+> Match the time filters in your query with the lookback duration. Results outside of the lookback duration are ignored.
Select the frequency that matches how closely you want to monitor detections. Consider your organization's capacity to respond to the alerts. ##### Tables that support Continuous (NRT) frequency
-Near real-time detections are supported for the following tables:
+Near real-time detections are supported for the following tables:
+ - `AlertEvidence`-- `DeviceEvents` -- `DeviceFileCertificateInfo` -- `DeviceFileEvents` -- `DeviceImageLoadEvents` -- `DeviceLogonEvents` -- `DeviceNetworkEvents` -- `DeviceNetworkInfo` -- `DeviceInfo` -- `DeviceProcessEvents` -- `DeviceRegistryEvents` -- `EmailAttachmentInfo` -- `EmailEvents` -- `EmailPostDeliveryEvents` -- `EmailUrlInfo` -- `UrlClickEvents`
+- `DeviceEvents`
+- `DeviceFileCertificateInfo`
+- `DeviceFileEvents`
+- `DeviceImageLoadEvents`
+- `DeviceLogonEvents`
+- `DeviceNetworkEvents`
+- `DeviceNetworkInfo`
+- `DeviceInfo`
+- `DeviceProcessEvents`
+- `DeviceRegistryEvents`
+- `EmailAttachmentInfo`
+- `EmailEvents`
+- `EmailPostDeliveryEvents`
+- `EmailUrlInfo`
+- `UrlClickEvents`
->[!NOTE]
+> [!NOTE]
> Only columns that are generally available can support **Continuous (NRT)** frequency.
-### 3. Choose the impacted entities.
+### 3. Choose the impacted entities
+ Identify the columns in your query results where you expect to find the main affected or impacted entity. For example, a query might return sender (`SenderFromAddress` or `SenderMailFromAddress`) and recipient (`RecipientEmailAddress`) addresses. Identifying which of these columns represent the main impacted entity helps the service aggregate relevant alerts, correlate incidents, and target response actions. You can select only one column for each entity type (mailbox, user, or device). Columns that are not returned by your query can't be selected.
-### 4. Specify actions.
-Your custom detection rule can automatically take actions on devices, files, users, or emails that are returned by the query.
+### 4. Specify actions
+Your custom detection rule can automatically take actions on devices, files, users, or emails that are returned by the query.
:::image type="content" source="../../media/ah-custom-actions.png" alt-text="Screenshot that shows actions for custom detections in the Microsoft 365 Defender portal." lightbox="../../media/ah-custom-actions.png"::: - #### Actions on devices+ These actions are applied to devices in the `DeviceId` column of the query results:+ - **Isolate device**ΓÇöuses Microsoft Defender for Endpoint to apply full network isolation, preventing the device from connecting to any application or service. [Learn more about Microsoft Defender for Endpoint machine isolation](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#isolate-devices-from-the-network) - **Collect investigation package**ΓÇöcollects device information in a ZIP file. [Learn more about the Microsoft Defender for Endpoint investigation package](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#collect-investigation-package-from-devices) - **Run antivirus scan**ΓÇöperforms a full Microsoft Defender Antivirus scan on the device
These actions are applied to devices in the `DeviceId` column of the query resul
#### Actions on files -- When selected, the **Allow/Block** action can be applied to the file. Blocking files are only allowed if you have *Remediate* permissions for files and if the query results have identified a file ID, such as a SHA1. Once a file is blocked, other instances of the same file in all devices are also blocked. You can control which device group the blocking is applied to, but not specific devices.
+- When selected, the **Allow/Block** action can be applied to the file. Blocking files are only allowed if you have *Remediate* permissions for files and if the query results have identified a file ID, such as a SHA1. Once a file is blocked, other instances of the same file in all devices are also blocked. You can control which device group the blocking is applied to, but not specific devices.
- When selected, the **Quarantine file** action can be applied to files in the `SHA1`, `InitiatingProcessSHA1`, `SHA256`, or `InitiatingProcessSHA256` column of the query results. This action deletes the file from its current location and places a copy in quarantine. -- #### Actions on users -- When selected, the **Mark user as compromised** action is taken on users in the `AccountObjectId`, `InitiatingProcessAccountObjectId`, or `RecipientObjectId` column of the query results. This action sets the users risk level to "high" in Azure Active Directory, triggering corresponding [identity protection policies](/azure/active-directory/identity-protection/overview-identity-protection).
+- When selected, the **Mark user as compromised** action is taken on users in the `AccountObjectId`, `InitiatingProcessAccountObjectId`, or `RecipientObjectId` column of the query results. This action sets the users risk level to "high" in Azure Active Directory, triggering corresponding [identity protection policies](/azure/active-directory/identity-protection/overview-identity-protection).
- Select **Disable user** to temporarily prevent a user from logging in.-- Select **Force password reset** to prompt the user to change their password on the next sign in session.
+- Select **Force password reset** to prompt the user to change their password on the next sign in session.
-Both the Disable user and Force password reset options require the user SID, which are in the columns `AccountSid`, `InitiatingProcessAccountSid`, `RequestAccountSid`, and `OnPremSid`.
+Both the Disable user and Force password reset options require the user SID, which are in the columns `AccountSid`, `InitiatingProcessAccountSid`, `RequestAccountSid`, and `OnPremSid`.
For more details on user actions, read [Remediation actions in Microsoft Defender for Identity](/defender-for-identity/remediation-actions). #### Actions on emails-- If the custom detection yields email messages, you can select **Move to mailbox folder** to move the email to a selected folder (any of **Junk**, **Inbox**, or **Deleted items** folders). +
+- If the custom detection yields email messages, you can select **Move to mailbox folder** to move the email to a selected folder (any of **Junk**, **Inbox**, or **Deleted items** folders).
- Alternatively, you can select **Delete email** and then choose to either move the emails to Deleted Items (**Soft delete**) or delete the selected emails permanently (**Hard delete**). The columns `NetworkMessageId` and `RecipientEmailAddress` must be present in the query output to apply actions to email messages.
+### 5. Set the rule scope
-### 5. Set the rule scope.
Set the scope to specify which devices are covered by the rule. The scope influences rules that check devices and doesn't affect rules that check only mailboxes and user accounts or identities. When setting the scope, you can select:
When setting the scope, you can select:
Only data from devices in scope will be queried. Also, actions will be taken only on those devices.
-### 6. Review and turn on the rule.
-After reviewing the rule, select **Create** to save it. The custom detection rule immediately runs. It runs again based on configured frequency to check for matches, generate alerts, and take response actions.
-
+### 6. Review and turn on the rule
->[!Important]
->Custom detections should be regularly reviewed for efficiency and effectiveness. To make sure you are creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in [Manage existing custom detection rules](#manage-existing-custom-detection-rules). <br>
-You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules.
+After reviewing the rule, select **Create** to save it. The custom detection rule immediately runs. It runs again based on configured frequency to check for matches, generate alerts, and take response actions.
+> [!IMPORTANT]
+> Custom detections should be regularly reviewed for efficiency and effectiveness. To make sure you are creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in [Manage existing custom detection rules](#manage-existing-custom-detection-rules).
+>
+> You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules.
## Manage existing custom detection rules+ You can view the list of existing custom detection rules, check their previous runs, and review the alerts they have triggered. You can also run a rule on demand and modify it.
->[!TIP]
+> [!TIP]
> Alerts raised by custom detections are available over alerts and incident APIs. For more information, see [Supported Microsoft 365 Defender APIs](api-supported.md). ### View existing rules
To view all existing custom detection rules, navigate to **Hunting** > **Custom
To view comprehensive information about a custom detection rule, go to **Hunting** > **Custom detection rules** and then select the name of rule. You can then view general information about the rule, including information, its run status, and scope. The page also provides the list of triggered alerts and actions.
-*Custom detection rule details*
You can also take the following actions on the rule from this page:
You can also take the following actions on the rule from this page:
### View and manage triggered alerts
-In the rule details screen (**Hunting** > **Custom detections** > **[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
+In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
- Manage the alert by setting its status and classification (true or false alert) - Link the alert to an incident - Run the query that triggered the alert on advanced hunting ### Review actions
-In the rule details screen (**Hunting** > **Custom detections** > **[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
->[!TIP]
->To quickly view information and take action on an item in a table, use the selection column [&#10003;] at the left of the table.
+In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
->[!NOTE]
->Some columns in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft 365 Defender](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft 365 Defender by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
+> [!TIP]
+> To quickly view information and take action on an item in a table, use the selection column [&#10003;] at the left of the table.
+
+> [!NOTE]
+> Some columns in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft 365 Defender](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft 365 Defender by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
## See also+ - [Custom detections overview](custom-detections-overview.md) - [Advanced hunting overview](advanced-hunting-overview.md) - [Learn the advanced hunting query language](advanced-hunting-query-language.md)
security Edit Delete Rbac Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/edit-delete-rbac-roles.md
In Microsoft 365 Defender role-based access control (RBAC), you can edit and del
The following steps guide you on how to edit roles in Microsoft 365 Defender RBAC:
->[!Important]
->You must be a Global Administrator or Security Administrator in Azure Active Directory, or have all the **Authorization** permissions assigned in Microsoft 365 Defender RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
+> [!IMPORTANT]
+> You must be a Global Administrator or Security Administrator in Azure Active Directory, or have all the **Authorization** permissions assigned in Microsoft 365 Defender RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
1. Sign in to the [Microsoft 365 Defender portal](https://security.microsoft.com) as global administrator or security administrator. 2. In the navigation pane, select **Permissions**.
The following steps guide you on how to edit roles in Microsoft 365 Defender RBA
:::image type="content" source="../../media/defender/m365-defender-rbac-edit-roles.png" alt-text="Screenshot of the activate workloads page" lightbox="../../media/defender/m365-defender-rbac-edit-roles.png"::: -
->[!Note]
->After editing an imported role, the changes made in Microsoft 365 Defender RBAC will not be reflected back in the individual product RBAC model.
+> [!NOTE]
+> After editing an imported role, the changes made in Microsoft 365 Defender RBAC will not be reflected back in the individual product RBAC model.
## Delete Roles
To delete roles in Microsoft 365 Defender RBAC, select the role or roles you wan
If the workload is active, by removing the role all assigned user permission will be deleted.
->[!Note]
->After deleting an imported role, the role won't be deleted from the individual product RBAC model. If needed, you can re-import it to the Microsoft 365 Defender RBAC list of roles.
+> [!NOTE]
+> After deleting an imported role, the role won't be deleted from the individual product RBAC model. If needed, you can re-import it to the Microsoft 365 Defender RBAC list of roles.
## Next steps
security Eval Defender Endpoint Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-overview.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
Last updated 07/09/2021
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario - m365solution-evalutatemtp
- Microsoft 365 Defender -
-This article outlines the process to enable and pilot Microsoft Defender for Endpoint. Before starting this process, be sure you've reviewed the overall process for [evaluating Microsoft 365 Defender](eval-overview.md), and you've [created the Microsoft 365 Defender evaluation environment](eval-create-eval-environment.md).
-<br>
+This article outlines the process to enable and pilot Microsoft Defender for Endpoint. Before starting this process, be sure you've reviewed the overall process for [evaluating Microsoft 365 Defender](eval-overview.md), and you've [created the Microsoft 365 Defender evaluation environment](eval-create-eval-environment.md).
Use the following steps to enable and pilot Microsoft Defender for Endpoint. :::image type="content" source="../../media/defender/m365-defender-endpoint-eval-steps.png" alt-text="The steps for adding Microsoft Defender for Endpoint to the Microsoft Defender evaluation environment" lightbox="../../media/defender/m365-defender-endpoint-eval-steps.png"::: - The following table describes the steps in the illustration.
- |Step |Description
-|||
-| [Step 1. Review architecture requirements and key concepts](eval-defender-endpoint-architecture.md) | Understand the Defender for Endpoint architecture and the capabilities available to you. |
-|[Step 2. Enable the evaluation environment](eval-defender-endpoint-enable-eval.md) | Follow the steps to set up the evaluation environment. |
-|[Step 3. Set up the pilot ](eval-defender-endpoint-pilot.md) | Verify your pilot group, run simulations, and become familiar with key features and dashboards. |
+|Step|Description|
+|||
+|[Step 1. Review architecture requirements and key concepts](eval-defender-endpoint-architecture.md)|Understand the Defender for Endpoint architecture and the capabilities available to you.|
+|[Step 2. Enable the evaluation environment](eval-defender-endpoint-enable-eval.md)|Follow the steps to set up the evaluation environment.|
+|[Step 3. Set up the pilot](eval-defender-endpoint-pilot.md)|Verify your pilot group, run simulations, and become familiar with key features and dashboards.|
security Eval Defender Identity Architecture https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-architecture.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
Last updated 07/09/2021
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario - m365solution-evalutatemtp
# Review architecture requirements and key concepts for Microsoft Defender for Identity - **Applies to:** - Microsoft 365 Defender
Defender for Identity protects your on-premises Active Directory users and/or us
## Understand the architecture
-The following diagram illustrates the baseline architecture for Defender for Identity.
+The following diagram illustrates the baseline architecture for Defender for Identity.
:::image type="content" source="../../media/defender/m365-defender-identity-architecture.png" alt-text="The identity architecture for Microsoft Defender for Identity" lightbox="../../media/defender/m365-defender-identity-architecture.png"::: In this illustration: - Sensors installed on AD domain controllers parse logs and network traffic and send them to Microsoft Defender for Identity for analysis and reporting.-- Sensors can also parse Active Directory Federation Services (AD FS) when Azure AD is configured to use federated authentication (dotted line in illustration).
+- Sensors can also parse Active Directory Federation Services (AD FS) when Azure AD is configured to use federated authentication (dotted line in illustration).
- Microsoft Defender for Identity shares signals to Microsoft 365 Defender for extended detection and response (XDR). Defender for Identity sensors can be directly installed on the following servers:
Defender for Identity sensors can be directly installed on the following servers
For a deeper look into the architecture of Defender for Identity, including integration with Defender for Cloud Apps, see [Microsoft Defender for Identity architecture](/defender-for-identity/architecture). - ## Understand key concepts The following table identified key concepts that are important to understand when evaluating, configuring, and deploying Microsoft Defender for Identity.
The following table identified key concepts that are important to understand whe
| Entity profiles | Entity profiles provide a comprehensive deep-dive investigation of users, computers, devices, and resources along with their access history. | [Understanding entity profiles](/defender-for-identity/entity-profiles) | | Lateral movement paths | A key component of MDI security insights is identifying lateral movement paths in which an attacker uses non-sensitive accounts to gain access to sensitive accounts or machines throughout your network. | [Microsoft Defender for Identity Lateral Movement Paths (LMPs)](/defender-for-identity/use-case-lateral-movement-path) | | Network Name Resolution | Network Name Resolution (NNR) is a component of MDI functionality which captures activities based on network traffic, Windows events, ETW, etc. and correlates this raw data to the relevant computers involved in each activity. | [What is Network Name Resolution?](/defender-for-identity/nnr-policy) |
-| Reports | Defender for Identity reports allow you to schedule or immediately generate and download reports that provide system and entity status information. You can create reports about system health, security alerts, and potential lateral movement paths detected in your environment. | [Microsoft Defender for Identity Reports ](/defender-for-identity/reports) |
+| Reports | Defender for Identity reports allow you to schedule or immediately generate and download reports that provide system and entity status information. You can create reports about system health, security alerts, and potential lateral movement paths detected in your environment. | [Microsoft Defender for Identity Reports](/defender-for-identity/reports) |
| Role groups | Defender for Identity offers role-based groups and delegated access to safeguard data according to your organization's specific security and compliance needs which includes Administrators, Users and Viewers. | [Microsoft Defender for Identity role groups](/defender-for-identity/role-groups) | | Administrative portal | In addition to the Microsoft 365 Defender portal, the Defender for Identity portal can be used to monitor and respond to suspicious activity. | [Working with the Microsoft Defender for Identity portal](/defender-for-identity/workspace-portal) | | Microsoft Defender for Cloud Apps integration | Microsoft Defender for Cloud Apps integrates with Microsoft Defender for Identity to provide user entity behavioral analytics (UEBA) across a hybrid environment - both cloud app and on-premises | Microsoft Defender for Identity integration |
The following table identified key concepts that are important to understand whe
Defender for Identity requires some prerequisite work to ensure that your on-premises identity and networking components meet minimum requirements. Use this article as a checklist to ensure your environment is ready: [Microsoft Defender for Identity prerequisites](/defender-for-identity/prerequisites). - ## Next steps Step 2 of 3: [Enable the evaluation environment Defender for Identity](eval-defender-identity-enable-eval.md) Return to the overview for [Evaluate Microsoft Defender for Identity](eval-defender-identity-overview.md)
-Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md)
+Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md)
security Eval Defender Identity Enable Eval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-enable-eval.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
Last updated 07/09/2021
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario - m365solution-evalutatemtp
This article is [Step 2 of 2](eval-defender-identity-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Identity. For more information about this process, see the [overview article](eval-defender-identity-overview.md).
-Use the following steps to set up your Microsoft Defender for Identity environment.
+Use the following steps to set up your Microsoft Defender for Identity environment.
:::image type="content" source="../../media/defender/m365-defender-identity-eval-enable-steps.png" alt-text="The steps to enable Microsoft Defender for Identity in the Microsoft Defender evaluation environment" lightbox="../../media/defender/m365-defender-identity-eval-enable-steps.png":::
Use the following steps to set up your Microsoft Defender for Identity environme
## Step 1. Set up the Defender for Identity Instance
-Sign in to the Defender for Identity portal to create your instance and then connect this instance to your Active Directory environment.
+Sign in to the Defender for Identity portal to create your instance and then connect this instance to your Active Directory environment.
-| Step | Description |More information |
-||||
-|1 | Create the Defender for Identity instance | [Quickstart: Create your Microsoft Defender for Identity instance](/defender-for-identity/install-step1) |
-|2 | Connect the Defender for Identity instance to your Active Directory forest | [Quickstart: Connect to your Active Directory Forest](/defender-for-identity/install-step2) |
+|Step|Description|More information|
+||||
+|1|Create the Defender for Identity instance|[Quickstart: Create your Microsoft Defender for Identity instance](/defender-for-identity/install-step1)|
+|2|Connect the Defender for Identity instance to your Active Directory forest|[Quickstart: Connect to your Active Directory Forest](/defender-for-identity/install-step2)|
## Step 2. Install and configure the sensor Next, download, install, and configure the Defender for Identity sensor on the domain controllers and AD FS servers in your on-premises environment.
-| Step | Description |More information |
-||||
-|1 | Determine how many Microsoft Defender for Identity sensors you need. | [Plan capacity for Microsoft Defender for Identity](/defender-for-identity/capacity-planning) |
-|2 | Download the sensor setup package | [Quickstart: Download the Microsoft Defender for Identity sensor setup package](/defender-for-identity/install-step3) |
-|3 | Install the Defender for Identity sensor | [Quickstart: Install the Microsoft Defender for Identity sensor](/defender-for-identity/install-step4) |
-|4 | Configure the sensor | [Configure Microsoft Defender for Identity sensor settings ](/defender-for-identity/install-step5) |
+|Step|Description|More information|
+||||
+|1|Determine how many Microsoft Defender for Identity sensors you need.|[Plan capacity for Microsoft Defender for Identity](/defender-for-identity/capacity-planning)|
+|2|Download the sensor setup package|[Quickstart: Download the Microsoft Defender for Identity sensor setup package](/defender-for-identity/install-step3)|
+|3|Install the Defender for Identity sensor|[Quickstart: Install the Microsoft Defender for Identity sensor](/defender-for-identity/install-step4)|
+|4|Configure the sensor|[Configure Microsoft Defender for Identity sensor settings](/defender-for-identity/install-step5)|
## Step 3. Configure event log and proxy settings on machines with the sensor On the machines that you installed the sensor on, configure Windows event log collection and Internet proxy settings to enable and enhance detection capabilities.
-| Step | Description |More information |
-||||
-|1 | Configure Windows event log collection | [Configure Windows Event collection](/defender-for-identity/configure-windows-event-collection) |
-|2 | Configure Internet proxy settings | [Configure endpoint proxy and Internet connectivity settings for your Microsoft Defender for Identity Sensor](/defender-for-identity/configure-proxy) |
+|Step|Description|More information|
+||||
+|1|Configure Windows event log collection|[Configure Windows Event collection](/defender-for-identity/configure-windows-event-collection)|
+|2|Configure Internet proxy settings|[Configure endpoint proxy and Internet connectivity settings for your Microsoft Defender for Identity Sensor](/defender-for-identity/configure-proxy)|
## Step 4. Allow Defender for Identity to identify local admins on other computers
-Microsoft Defender for Identity lateral movement path detection relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity Service account.
+Microsoft Defender for Identity lateral movement path detection relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity Service account.
To ensure Windows clients and servers allow your Defender for Identity account to perform SAM-R, a modification to Group Policy must be made to add the Defender for Identity service account in addition to the configured accounts listed in the Network access policy. Make sure to apply group policies to all computers **except domain controllers**.
-For instructions on how to do this, see [Configure Microsoft Defender for Identity to make remote calls to SAM](/defender-for-identity/install-step8-samr).
+For instructions on how to do this, see [Configure Microsoft Defender for Identity to make remote calls to SAM](/defender-for-identity/install-step8-samr).
## Next steps
security Eval Defender Identity Pilot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-pilot.md
# Pilot Microsoft Defender for Identity - **Applies to:** - Microsoft 365 Defender
Use the following steps to setup and configure the pilot for Microsoft Defender
The following table describes the steps in the illustration. - [Step 1: Configure benchmark recommendations for your identity environment](#step-1-configure-benchmark-recommendations-for-your-identity-environment)-- [Step 2: Try out capabilities ΓÇö Walk through tutorials for identifying and remediating different attack types ](#step-2-try-out-capabilities--walk-through-tutorials-for-identifying-and-remediating-different-attack-types)
+- [Step 2: Try out capabilities ΓÇö Walk through tutorials for identifying and remediating different attack types](#step-2-try-out-capabilities--walk-through-tutorials-for-identifying-and-remediating-different-attack-types)
## Step 1. Configure benchmark recommendations for your identity environment
These benchmark recommendations include [Azure security baseline for Microsoft D
The Microsoft Defender for Identity documentation includes a series of tutorials that walk through the process of identifying and remediating various attack types. Try out Defender for Identity tutorials:+ - [Reconnaissance alerts](/defender-for-identity/reconnaissance-alerts) - [Compromised credential alerts](/defender-for-identity/compromised-credentials-alerts) - [Lateral movement alerts](/defender-for-identity/lateral-movement-alerts)
security Eval Defender Investigate Respond Simulate Attack https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-investigate-respond-simulate-attack.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
Last updated 07/09/2021
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario - m365solution-pilotmtpproject
# Run an attack simulation in a Microsoft 365 Defender pilot environment - This article is [Step 1 of 2](eval-defender-investigate-respond.md) in the process of performing an investigation and response of an incident in Microsoft 365 Defender using a pilot environment. For more information about this process, see the [overview](eval-defender-investigate-respond.md) article. After preparing your [pilot environment](eval-defender-investigate-respond.md), it's time to test Microsoft 365 Defender's incident response and automated investigation and remediation capabilities by creating an incident with a simulated attack and using the Microsoft 365 Defender portal to investigate and respond.
An incident in Microsoft 365 Defender is a collection of correlated alerts and a
Microsoft 365 services and apps create alerts when they detect a suspicious or malicious event or activity. Individual alerts provide valuable clues about a completed or ongoing attack. However, attacks typically employ various techniques against different types of entities, such as devices, users, and mailboxes. The result is multiple alerts for multiple entities in your tenant.
->[!Note]
->If you are brand new to security analysis and incident response, see the [Respond to your first incident walkthrough](first-incident-overview.md) to get a guided tour of a typical process of analysis, remediation, and post-incident review.
->
+> [!NOTE]
+> If you are brand new to security analysis and incident response, see the [Respond to your first incident walkthrough](first-incident-overview.md) to get a guided tour of a typical process of analysis, remediation, and post-incident review.
## Simulate attacks with the Microsoft 365 Defender portal The Microsoft 365 Defender portal has built-in capabilities to create simulated attacks on your pilot environment: - Attack simulation training for Microsoft 365 Defender for Office 365 at [https://security.microsoft.com/attacksimulator](https://security.microsoft.com/attacksimulator).
-
+ In the Microsoft 365 Defender portal, select **Email & collaboration > Attack simulation training**. - Attack tutorials & simulations for Microsoft 365 Defender for Endpoint at [https://security.microsoft.com/tutorials/simulations](https://security.microsoft.com/tutorials/simulations).
To view the incident:
The alerts that are shown in the dashboard can be filtered based on service resources: Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, Microsoft Defender for Endpoint, Microsoft 365 Defender, and Microsoft Defender for Office 365.
-3. Select **Open incident page** to get more information about the incident.
+4. Select **Open incident page** to get more information about the incident.
In the **Incident** page, you can see all the alerts and information related to the incident. The information includes the entities and assets that are involved in the alert, the detection source of the alerts (such as Microsoft Defender for Identity or Microsoft Defender for Endpoint), and the reason they were linked together. Reviewing the incident alert list shows the progression of the attack. From this view, you can see and investigate the individual alerts.
Select the user name to open the user's profile page where further investigation
#### Automated investigation and remediation > [!NOTE]
->Before we walk you through this simulation, watch the following video to get familiar with what automated self-healing is, where to find it in the portal, and how it can help in your security operations:
+> Before we walk you through this simulation, watch the following video to get familiar with what automated self-healing is, where to find it in the portal, and how it can help in your security operations:
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4BzwB]
security Eval Defender Investigate Respond https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-investigate-respond.md
Use the following steps.
The following table describes the steps in the illustration.
-|Step |Description |
+|Step|Description|
|||
-| 1. [Simulate attacks](eval-defender-investigate-respond-simulate-attack.md) | Simulate attacks on your evaluation environment and use the Microsoft 365 Defender portal to perform incident response. |
-| 2. [Try incident response capabilities ](eval-defender-investigate-respond-additional.md) | Try additional incident response features and capabilities in Microsoft 365 Defender. |
-|||
+|1. [Simulate attacks](eval-defender-investigate-respond-simulate-attack.md)|Simulate attacks on your evaluation environment and use the Microsoft 365 Defender portal to perform incident response.|
+|2. [Try incident response capabilities](eval-defender-investigate-respond-additional.md)|Try additional incident response features and capabilities in Microsoft 365 Defender.|
-### Navigation you may need
+## Navigation you may need
[Create the Microsoft 365 Defender Evaluation Environment](eval-create-eval-environment.md)
security Eval Defender Mcas Architecture https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-architecture.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
Last updated 07/09/2021
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario - m365solution-evalutatemtp
# Review architecture requirements and key concepts for Microsoft Defender for Cloud Apps - **Applies to:** - Microsoft 365 Defender This article is [Step 1 of 3](eval-defender-mcas-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Cloud Apps alongside Microsoft 365 Defender. For more information about this process, see the [overview article](eval-defender-identity-overview.md).
-Before enabling Microsoft Defender for Cloud Apps, be sure you understand the architecture and can meet the requirements.
+Before enabling Microsoft Defender for Cloud Apps, be sure you understand the architecture and can meet the requirements.
## Understand the architecture
Without Defender for Cloud Apps, cloud apps that are used by your organization a
:::image type="content" source="../../media/defender/m365-defender-mcas-architecture-a.png" alt-text="The architecture for Microsoft Defender for Cloud Apps" lightbox="../../media/defender/m365-defender-mcas-architecture-a.png"::: In the illustration:-- The use of cloud apps by an organization is unmonitored and unprotected. -- This use falls outside the protections achieved within a managed organization.
-#### Discovering cloud apps
+- The use of cloud apps by an organization is unmonitored and unprotected.
+- This use falls outside the protections achieved within a managed organization.
+
+### Discovering cloud apps
The first step to managing the use of cloud apps is to discover which cloud apps are used by your organization. This next diagram illustrates how cloud discovery works with Defender for Cloud Apps. :::image type="content" source="../../media/defender/m365-defender-mcas-architecture-b.png" alt-text="The architecture for Microsoft Defender for Cloud Apps in Cloud discovery" lightbox="../../media/defender/m365-defender-mcas-architecture-b.png"::: - In this illustration, there are two methods that can be used to monitor network traffic and discover cloud apps that are being used by your organization.-- A. Cloud App Discovery integrates with Microsoft Defender for Endpoint natively. Defender for Endpoint reports cloud apps and services being accessed from IT-managed Windows 10 and Windows 11 devices. +
+- A. Cloud App Discovery integrates with Microsoft Defender for Endpoint natively. Defender for Endpoint reports cloud apps and services being accessed from IT-managed Windows 10 and Windows 11 devices.
- B. For coverage on all devices connected to a network, the Defender for Cloud Apps log collector is installed on firewalls and other proxies to collect data from endpoints. This data is sent to Defender for Cloud Apps for analysis.
-#### Managing cloud apps
+### Managing cloud apps
-After you discover cloud apps and analyze how these apps are used by your organization, you can begin managing cloud apps that you choose.
+After you discover cloud apps and analyze how these apps are used by your organization, you can begin managing cloud apps that you choose.
:::image type="content" source="../../media/defender/m365-defender-mcas-architecture-c.png" alt-text="The architecture for Microsoft Defender for Cloud Apps while the managing the Cloud apps" lightbox="../../media/defender/m365-defender-mcas-architecture-c.png"::: In this illustration:+ - Some apps are sanctioned for use. This sanction is a simple way of beginning to manage apps. - You can enable greater visibility and control by connecting apps with app connectors. App connectors use the APIs of app providers.
+### Applying session controls to cloud apps
-#### Applying session controls to cloud apps
-
-Microsoft Defender for Cloud Apps serves as a reverse proxy, providing proxy access to sanctioned cloud apps. This provision allows Defender for Cloud Apps to apply session controls that you configure.
+Microsoft Defender for Cloud Apps serves as a reverse proxy, providing proxy access to sanctioned cloud apps. This provision allows Defender for Cloud Apps to apply session controls that you configure.
:::image type="content" source="../../media/defender/m365-defender-mcas-architecture-d.png" alt-text="The architecture for Microsoft Defender for Cloud Apps - Proxy access session control" lightbox="../../media/defender/m365-defender-mcas-architecture-d.png"::: In this illustration:+ - Access to sanctioned cloud apps from users and devices in your organization is routed through Defender for Cloud Apps. - This proxy access allows session controls to be applied. - Cloud apps that you have not sanctioned or explicitly unsanctioned are not affected. Session controls allow you to apply parameters to how cloud apps are used by your organization. For example, if your organization is using Salesforce, you can configure a session policy that allows only managed devices to access your organization's data at Salesforce. A simpler example could be configuring a policy to monitor traffic from unmanaged devices so you can analyze the risk of this traffic before applying stricter policies.
-#### Integrating with Azure AD with Conditional Access App Control
+### Integrating with Azure AD with Conditional Access App Control
-You might already have SaaS apps added to your Azure AD tenant to enforce multi-factor authentication and other conditional access policies. Microsoft Defender for Cloud Apps natively integrates with Azure AD. All you have to do is configure a policy in Azure AD to use Conditional Access App Control in Defender for Cloud Apps. This routes network traffic for these managed SaaS apps through Defender for Cloud Apps as a proxy, which allows Defender for Cloud Apps to monitor this traffic and to apply session controls.
+You might already have SaaS apps added to your Azure AD tenant to enforce multi-factor authentication and other conditional access policies. Microsoft Defender for Cloud Apps natively integrates with Azure AD. All you have to do is configure a policy in Azure AD to use Conditional Access App Control in Defender for Cloud Apps. This routes network traffic for these managed SaaS apps through Defender for Cloud Apps as a proxy, which allows Defender for Cloud Apps to monitor this traffic and to apply session controls.
:::image type="content" source="../../media/defender/m365-defender-mcas-architecture-e.png" alt-text="The architecture for the Microsoft Defender for Cloud Apps - SaaS apps" lightbox="../../media/defender/m365-defender-mcas-architecture-e.png"::: In this illustration:+ - SaaS apps are integrated with the Azure AD tenant. This integration allows Azure AD to enforce conditional access policies, including multi-factor authentication. - A policy is added to Azure Active Directory to direct traffic for SaaS apps to Defender for Cloud Apps. The policy specifies which SaaS apps to apply this policy to. Therefore, after Azure AD enforces any conditional access policies that apply to these SaaS apps, Azure AD then directs (proxies) the session traffic through Defender for Cloud Apps.-- Defender for Cloud Apps monitors this traffic and applies any session control policies that have been configured by administrators.
+- Defender for Cloud Apps monitors this traffic and applies any session control policies that have been configured by administrators.
You might have discovered and sanctioned cloud apps using Defender for Cloud Apps that have not been added to Azure AD. You can take advantage of Conditional Access App Control by adding these cloud apps to your Azure AD tenant and the scope of your conditional access rules.
-#### Protecting your organization from hackers
+### Protecting your organization from hackers
Defender for Cloud Apps provides powerful protection on its own. However, when combined with the other capabilities of Microsoft 365 Defender, Defender for Cloud Apps provides data into the shared signals which (together) helps stop attacks.
-It's worth repeating this illustration from the overview to this Microsoft 365 Defender evaluation and pilot guide.
+It's worth repeating this illustration from the overview to this Microsoft 365 Defender evaluation and pilot guide.
:::image type="content" source="../../media/defender/m365-defender-eval-threat-chain.png" alt-text="How Microsoft 365 Defender stops a chain of threats" lightbox="../../media/defender/m365-defender-eval-threat-chain.png":::
Focusing on the right side of this illustration, Microsoft Defender for Cloud Ap
The following table identified key concepts that are important to understand when evaluating, configuring, and deploying Microsoft Defender for Cloud Apps. - |Concept |Description |More information | ||||
-| Defender for Cloud Apps Dashboard | Presents an overview of the most important information about your organization and gives links to deeper investigation. | [Working with the dashboard ](/cloud-app-security/daily-activities-to-protect-your-cloud-environment) |
+| Defender for Cloud Apps Dashboard | Presents an overview of the most important information about your organization and gives links to deeper investigation. | [Working with the dashboard](/cloud-app-security/daily-activities-to-protect-your-cloud-environment) |
| Conditional Access App Control | Reverse proxy architecture that integrates with your Identity Provider (IdP) to give Azure AD conditional access policies and selectively enforce session controls. | [Protect apps with Microsoft Defender for Cloud Apps Conditional Access App Control](/cloud-app-security/proxy-intro-aad) | | Cloud App Catalog | The Cloud App Catalog gives you a full picture against Microsoft catalog of over 16,000 cloud apps that are ranked and scored based on more than 80 risk factors. | [Working with App risk scores](/cloud-app-security/risk-score) |
-| Cloud Discovery Dashboard | Cloud Discovery analyzes your traffic logs and is designed to give more insight into how cloud apps are being used in your organization as well as give alerts and risk levels. | [Working with discovered apps ](/cloud-app-security/discovered-apps) |
+| Cloud Discovery Dashboard | Cloud Discovery analyzes your traffic logs and is designed to give more insight into how cloud apps are being used in your organization as well as give alerts and risk levels. | [Working with discovered apps](/cloud-app-security/discovered-apps) |
|Connected Apps |Defender for Cloud Apps provides end-to-end protection for connected apps using Cloud-to-Cloud integration, API connectors, and real-time access and session controls using our Conditional App Access Controls. |[Protecting connected apps](/cloud-app-security/protect-connected-apps) |
-| | | |
## Review architecture requirements
To discover cloud apps used in your environment, you can implement one or both o
- Get up and running quickly with Cloud Discovery by integrating with Microsoft Defender for Endpoint. This native integration enables you to immediately start collecting data on cloud traffic across your Windows 11 and Windows 10 devices, on and off your network. - To discover all cloud apps accessed by all devices connected to your network, deploy the Defender for Cloud Apps log collector on your firewalls and other proxies. This deployment helps collect data from your endpoints and sends it to Defender for Cloud Apps for analysis. Defender for Cloud Apps natively integrates with some third-party proxies for even more capabilities.
-These options are included in [Step 2. Enable the evaluation environment](eval-defender-mcas-enable-eval.md).
+These options are included in [Step 2. Enable the evaluation environment](eval-defender-mcas-enable-eval.md).
### Applying Azure AD Conditional Access policies to cloud apps
Conditional Access App Control (the ability to apply Conditional Access policies
## SIEM integration
-You can integrate Microsoft Defender for Cloud Apps with your generic SIEM server or with Microsoft Sentinel to enable centralized monitoring of alerts and activities from connected apps.
+You can integrate Microsoft Defender for Cloud Apps with your generic SIEM server or with Microsoft Sentinel to enable centralized monitoring of alerts and activities from connected apps.
Additionally, Microsoft Sentinel includes a Microsoft Defender for Cloud Apps connector to provide deeper integration with Microsoft Sentinel. This arrangement enables you to not only gain visibility into your cloud apps but to also get sophisticated analytics to identify and combat cyberthreats and to control how your data travels.
security Eval Defender Mcas Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-overview.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
Last updated 07/09/2021
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario
- - m365solution-evalutatemtp
+ - m365solution-evalutatemtp
- zerotrust-solution - highpri - tier1
**Applies to:** - Microsoft 365 Defender -
-This article outlines the process to enable and pilot Microsoft Defender for Cloud Apps alongside Microsoft 365 Defender. Before starting this process, be sure you've reviewed the overall process for [evaluating Microsoft 365 Defender](eval-overview.md) and you have [created the Microsoft 365 Defender evaluation environment](eval-create-eval-environment.md).
-<br>
+This article outlines the process to enable and pilot Microsoft Defender for Cloud Apps alongside Microsoft 365 Defender. Before starting this process, be sure you've reviewed the overall process for [evaluating Microsoft 365 Defender](eval-overview.md) and you have [created the Microsoft 365 Defender evaluation environment](eval-create-eval-environment.md).
Use the following steps to enable and pilot Microsoft Defender for Cloud Apps.
Use the following steps to enable and pilot Microsoft Defender for Cloud Apps.
||| |[Review architecture requirements and key concepts](eval-defender-mcas-architecture.md) | Understand the Defender for Cloud Apps architecture and how it integrates with Microsoft 365 Defender, Microsoft Defender for Endpoint, and Azure Active Directory. | |[Enable the evaluation environment](eval-defender-mcas-enable-eval.md) | Connect to the portal, configure integration with Defender for Identity and/or your organization's network devices, and begin to view and manage cloud apps. |
-|[Set up the pilot ](eval-defender-mcas-pilot.md) | Scope your deployment to certain user groups, configure Conditional Access App Control, and try out tutorials for protecting your environment. |
+|[Set up the pilot](eval-defender-mcas-pilot.md) | Scope your deployment to certain user groups, configure Conditional Access App Control, and try out tutorials for protecting your environment. |
security Import Rbac Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/import-rbac-roles.md
Title: Import roles to Microsoft 365 Defender RBAC
+ Title: Import roles to Microsoft 365 Defender RBAC
description: Create custom Microsoft 365 Defender Security portal role-based access control (RBAC) ms.mktglfcycl: deploy
Importing roles will migrate and maintain the roles with full parity in relation
The following steps guide you on how to import roles into Microsoft 365 Defender RBAC: > [!IMPORTANT]
->You must be a Global Administrator or Security Administrator in Azure Active Directory, or have all the **Authorization** permissions assigned in Microsoft 365 Defender RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
+> You must be a Global Administrator or Security Administrator in Azure Active Directory, or have all the **Authorization** permissions assigned in Microsoft 365 Defender RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
1. Sign in to the [Microsoft 365 Defender portal](https://security.microsoft.com). 2. In the navigation pane, select **Permissions**.
security Integrate Microsoft 365 Defender Secops https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops.md
If you are not already familiar with Microsoft 365 Defender, see these articles:
If your organization has already implemented some aspects of Microsoft 365 Defender, these articles can either affirm or help improve your existing architecture and processes.
->[!Note]
->As a Microsoft partner, Protiviti contributed to and provided material feedback to this article.
->
+> [!NOTE]
+> As a Microsoft partner, Protiviti contributed to and provided material feedback to this article.
## Target audience
security Investigate Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-users.md
Defender for Identity pulls tags out of Active Directory to give you a single in
For more information, see [Defender for Identity entity tags in Microsoft 365 Defender](/defender-for-identity/entity-tags).
->[!NOTE]
+> [!NOTE]
> The organization tree section and the account tags are available when a Microsoft Defender for Identity license is available. ## Alerts
You can see all active alerts involving the user from the last 180 days in this
- Groups - this section includes all observed on-premises groups for the identity, as reported by Defender for Identity. - Lateral movement paths - this section includes all profiled lateral movement paths from the on-premises environment detected by Defender for Identity.
->[!NOTE]
+> [!NOTE]
> Groups and lateral movement paths are available when a Microsoft Defender for Identity license is available. Selecting the **Lateral movements** tab lets you view a fully dynamic and clickable map where you can see the lateral movement paths to and from a user. An attacker can use the path information to infiltrate your network.
security M365d Enable Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable-faq.md
To optimize your Microsoft 365 Defender experiences, we recommend deploying *all
Microsoft 365 Defender automatically selects an optimal location for the data center where consolidated data is processed and stored. If you have Microsoft Defender for Endpoint, it selects the same location used by Defender for Endpoint.
->[!NOTE]
->Microsoft Defender for Endpoint automatically provisions in European Union (EU) data centers when turned on through Microsoft Defender for Cloud. Microsoft 365 Defender will automatically provision in the same EU data center for customers who have provisioned Microsoft Defender for Endpoint in this manner.
+> [!NOTE]
+> Microsoft Defender for Endpoint automatically provisions in European Union (EU) data centers when turned on through Microsoft Defender for Cloud. Microsoft 365 Defender will automatically provision in the same EU data center for customers who have provisioned Microsoft Defender for Endpoint in this manner.
The data center location is shown before and after the service is provisioned in the settings page for Microsoft 365 Defender (**Settings > Microsoft 365 Defender**). If you prefer to use another data center location, select **Need help?** in the Microsoft 365 Defender portal to contact Microsoft support.
By default, Microsoft 365 Defender displays time information in the UTC time zon
Microsoft regularly provides information through the various channels, including: - Blogposts in the [Microsoft 365 security & compliance tech community](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/bg-p/MicrosoftThreatProtectionBlog)-- Go to [Defender monthly news](https://aka.ms/defendernews)
+- Go to [Defender monthly news](https://aka.ms/defendernews)
- The [message center](../../admin/manage/message-center.md) in Microsoft 365 admin center
security Microsoft 365 Defender Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-portal.md
audience: ITPro
- m365-security - tier1-+ - admindeeplinkDEFENDER - intro-overview
The [Microsoft 365 Defender portal](https://sip.security.microsoft.com/homepage)
- **[Microsoft Defender for Identity](/defender-for-identity/what-is)** is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. - **[Microsoft Defender for Cloud Apps](/cloud-app-security/)** is a comprehensive cross-SaaS and PaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps.
-Watch this short video to learn about the Microsoft 365 Defender portal.
+Watch this short video to learn about the Microsoft 365 Defender portal.
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWBKau] ## What to expect
The Microsoft 365 Defender portal helps security teams investigate and respond t
- Trials - Partner catalog
-Microsoft 365 Defender emphasizes *unity, clarity, and common goals*.
+Microsoft 365 Defender emphasizes *unity, clarity, and common goals*.
> [!NOTE] > The Microsoft 365 Defender portal is accessible without any need for customers to take migration steps or purchase a new license. For example, this new portal is accessible to administrators with an E3 subscription, just as it is to those with Microsoft Defender for Office 365 Plan 1 and Plan 2; however, Exchange Online Protection, or Defender for Office 365 Plan 1 customers see only the security features their subscription license supports. The goal of the portal is to centralize security.
You can add and remove different cards depending on your needs.
### Search across entities (Preview)
->[!IMPORTANT]
+> [!IMPORTANT]
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. The search bar is located at the top of the page. As you type, suggestions are provided so that it's easier to find entities. The enhanced search results page centralizes the results from all entities.
-You can search across the following entities in Defender for Endpoint and Defender for Identity:
+You can search across the following entities in Defender for Endpoint and Defender for Identity:
-- **Devices** - supported for both Defender for Endpoint and Defender for Identity. Supports use of search operators. -- **Users** - supported for Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps.
+- **Devices** - supported for both Defender for Endpoint and Defender for Identity. Supports use of search operators.
+- **Users** - supported for Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps.
- **Files, IPs, and URLs** - same capabilities as in Defender for Endpoint.
- >[!NOTE]
- >IP and URL searches are exact match and don't appear in the search results page ΓÇô they lead directly to the entity page.
+ > [!NOTE]
+ > IP and URL searches are exact match and don't appear in the search results page ΓÇô they lead directly to the entity page.
-- **MDVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations).
+- **MDVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations).
## Threat analytics
Threat analytics is the Microsoft 365 Defender threat intelligence solution from
## Partner catalog Microsoft 365 Defender supports two types of partners:-- Third-party integrations to help secure users with effective threat protection, detection, investigation, and response in various security fields of endpoints, vulnerability management, email, identities, and cloud apps.-- Professional services where organizations can enhance the detection, investigation, and threat intelligence capabilities of the platform.
+- Third-party integrations to help secure users with effective threat protection, detection, investigation, and response in various security fields of endpoints, vulnerability management, email, identities, and cloud apps.
+- Professional services where organizations can enhance the detection, investigation, and threat intelligence capabilities of the platform.
## Send us your feedback
With this learning path from Microsoft Learn, you can understand Microsoft 365 D
> [!div class="nextstepaction"] > [Start >](/training/paths/defender-detect-respond/) - ## See also - [What's new in Microsoft 365 Defender](whats-new.md)
security Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender.md
Microsoft 365 Defender services protect:
- **Identities with Defender for Identity and Azure Active Directory (Azure AD) Identity Protection** - Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Azure AD Identity Protection uses the learnings Microsoft has acquired from their position in organizations with Azure AD, the consumer space with Microsoft Accounts, and in gaming with Xbox to protect your users. - **Applications with Microsoft Defender for Cloud Apps** - Microsoft Defender for Cloud Apps is a comprehensive cross-SaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps.
->[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4Bzww]
+> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4Bzww]
Microsoft 365 Defender's unique cross-product layer augments the individual service components to:
security Microsoft 365 Security Center Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-mde.md
This table is a quick reference of the changes between the Microsoft Defender Se
| Area | Description of change | |||
-|Search | The search bar is located at the top of the page. Suggestions are provided as you type. You can search across the following entities in Defender for Endpoint and Defender for Identity: <br><br> - **Devices** - supported for both Defender for Endpoint and Defender for Identity. You can even use search operators, for example, you can use "contains" to search for part of a host name. <br><br> - **Users** - supported for both Defender for Endpoint and Defender for Identity. <br><br> - **Files, IPs, and URLs** - same capabilities as in Defender for Endpoint. <br> NOTE: *IP and URL searches are exact match and don't appear in the search results page ΓÇô they lead directly to the entity page. <br><br> - **MDVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations). <br><br> The enhanced search results page centralizes the results from all entities. |
+|Search | The search bar is located at the top of the page. Suggestions are provided as you type. You can search across the following entities in Defender for Endpoint and Defender for Identity: <br><br> - **Devices** - supported for both Defender for Endpoint and Defender for Identity. You can even use search operators, for example, you can use "contains" to search for part of a host name. <br><br> - **Users** - supported for both Defender for Endpoint and Defender for Identity. <br><br> - **Files, IPs, and URLs** - same capabilities as in Defender for Endpoint. <br> NOTE: *IP and URL searches are exact match and don't appear in the search results page ΓÇô they lead directly to the entity page. <br><br> - **MDVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations). <br><br> The enhanced search results page centralizes the results from all entities. |
|[Dashboard](/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard) | This is your security operations dashboard. See an overview of how many active alerts were triggered, which devices are at risk, which users are at risk, and severity level for alerts, devices, and users. You can also see if any devices have sensor issues, your overall service health, and how any unresolved alerts were detected. | |Device inventory | No changes. | |[Vulnerability management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) | Name was shortened to fit in the navigation pane. It's the same as the Microsoft Defender Vulnerability Management section, with all the pages underneath. |
security Microsoft 365 Security Mde Redirection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-mde-redirection.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier2
Once automatic redirection is enabled, accounts accessing the former Microsoft D
Learn more about what's changed: [Microsoft Defender for Endpoint in Microsoft 365 Defender](microsoft-365-security-center-mde.md).
-This includes redirection for direct access to the former portal via browser, including links pointing towards the former securitycenter.windows.com portal - such as links in email notifications, and links returned by SIEM API calls.
+This includes redirection for direct access to the former portal via browser, including links pointing towards the former securitycenter.windows.com portal - such as links in email notifications, and links returned by SIEM API calls.
External links from email notifications or SIEM APIs currently contain links to both portals. Once redirection is enabled, both links will point to Microsoft 365 Defender until the old link is eventually removed. We encourage you to adopt the new link pointing to Microsoft 365 Defender.
Refer to the table below for more on links and routing.
## When does this take effect?
-Once enabled, this update might take effect almost immediately for some accounts. But the redirection might take longer to propagate to every account in your organization. Accounts in active sessions while this setting is applied will not be ejected from their session and will only be routed to Microsoft 365 Defender after ending their current session and signing back in again.
+Once enabled, this update might take effect almost immediately for some accounts. But the redirection might take longer to propagate to every account in your organization. Accounts in active sessions while this setting is applied will not be ejected from their session and will only be routed to Microsoft 365 Defender after ending their current session and signing back in again.
### Set up portal redirection
To start routing accounts to Microsoft 365 Defender:
2. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender</a>.
-3. Navigate to **Settings** > **Endpoints** > **General** > **Portal redirection** or [click here](https://security.microsoft.com/preferences2/portal_redirection).
+3. Navigate to **Settings** \> **Endpoints** \> **General** \> **Portal redirection** or [click here](https://security.microsoft.com/preferences2/portal_redirection).
4. Toggle the Automatic redirection setting to **On**. 5. Click **Enable** to apply automatic redirection to Microsoft 365 Defender.
->[!IMPORTANT]
->Enabling this setting will not terminate active user sessions. Accounts who are in an active session while this setting is applied will only be directed to Microsoft 365 Defender after ending their current session and signing in again.
+> [!IMPORTANT]
+> Enabling this setting will not terminate active user sessions. Accounts who are in an active session while this setting is applied will only be directed to Microsoft 365 Defender after ending their current session and signing in again.
->[!NOTE]
->You must be a global administrator or have security administrator permissions in Azure Active Directory to enable or disable this setting.
+> [!NOTE]
+> You must be a global administrator or have security administrator permissions in Azure Active Directory to enable or disable this setting.
## Can I go back to using the former portal?
To revert to the former Microsoft Defender for Endpoint portal:
1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender</a> as a global administrator or using and account with security administrator permissions in Azure Active directory.
-2. Navigate to **Settings** > **Endpoints** > **General** > **Portal redirection** or [open the page here](https://security.microsoft.com/preferences2/portal_redirection).
+2. Navigate to **Settings** \> **Endpoints** \> **General** \> **Portal redirection** or [open the page here](https://security.microsoft.com/preferences2/portal_redirection).
3. Toggle the Automatic redirection setting to **Off**. 4. Click **Disable** & share feedback when prompted.
-This setting can be enabled again at any time.
+This setting can be enabled again at any time.
-Once disabled, accounts will no longer be routed to security.microsoft.com, and you will once again have access to the former portal - securitycenter.windows.com or securitycenter.microsoft.com.
+Once disabled, accounts will no longer be routed to security.microsoft.com, and you will once again have access to the former portal - securitycenter.windows.com or securitycenter.microsoft.com.
## Related information+ - [Microsoft 365 Defender overview](microsoft-365-defender.md) - [Microsoft Defender for Endpoint in Microsoft 365 Defender](microsoft-365-security-center-mde.md)-- [Microsoft delivers unified SIEM and XDR to modernize security operations](https://www.microsoft.com/security/blog/?p=91813) -- [XDR versus SIEM infographic](https://afrait.com/blog/xdr-versus-siem/) -- [`The New Defender`](https://afrait.com/blog/the-new-defender/) -- [About Microsoft 365 Defender](https://www.microsoft.com/microsoft-365/security/microsoft-365-defender)
+- [Microsoft delivers unified SIEM and XDR to modernize security operations](https://www.microsoft.com/security/blog/?p=91813)
+- [XDR versus SIEM infographic](https://afrait.com/blog/xdr-versus-siem/)
+- [`The New Defender`](https://afrait.com/blog/the-new-defender/)
+- [About Microsoft 365 Defender](https://www.microsoft.com/microsoft-365/security/microsoft-365-defender)
- [Microsoft security portals and admin centers](portals.md)
security Microsoft 365 Security Mdi Redirection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-mdi-redirection.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier2
Starting January 31, 2023, the portal redirection setting will be automatically
## When does this take effect?
-Once enabled, this update might take effect almost immediately for some accounts. But the redirection might take longer to propagate to every account in your organization. Accounts in active sessions while this setting is applied won't be ejected from their session and will only be routed to Microsoft 365 Defender after ending their current session and signing back in again.
+Once enabled, this update might take effect almost immediately for some accounts. But the redirection might take longer to propagate to every account in your organization. Accounts in active sessions while this setting is applied won't be ejected from their session and will only be routed to Microsoft 365 Defender after ending their current session and signing back in again.
### Set up portal redirection
To start routing accounts to Microsoft 365 Defender:
1. Toggle the Automatic redirection setting to **On**.
->[!IMPORTANT]
->Enabling this setting will not terminate active user sessions. Accounts who are in an active session while this setting is applied will only be directed to Microsoft 365 Defender after ending their current session and signing in again.
+> [!IMPORTANT]
+> Enabling this setting will not terminate active user sessions. Accounts who are in an active session while this setting is applied will only be directed to Microsoft 365 Defender after ending their current session and signing in again.
->[!NOTE]
->You must be a global administrator or have security administrator permissions in Azure Active Directory to enable or disable this setting.
+> [!NOTE]
+> You must be a global administrator or have security administrator permissions in Azure Active Directory to enable or disable this setting.
## Can I go back to using the former portal?
To revert to the former Microsoft Defender for Identity portal:
1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender</a> as a global administrator or using and account with security administrator permissions in Azure Active directory.
-2. Navigate to **Settings** > **Identities** > **General** > **Portal redirection** or [open the page here](https://security.microsoft.com/preferences2/portal_redirection).
+2. Navigate to **Settings** > **Identities** > **General** > **Portal redirection** or [open the page here](https://security.microsoft.com/preferences2/portal_redirection).
3. Toggle the Automatic redirection setting to **Off**.
security Microsoft Secure Score Improvement Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-improvement-actions.md
audience: ITPro-+ - m365-security - tier2
+search.appverid:
- MOE150 - MET150-+ - seo-marvel-apr2020 - seo-marvel-jun2020 Last updated 02/16/2021
This view is what it will look like if you've included all possible score views:
The **recommended actions** tab lists the security recommendations that address possible attack surfaces. It also includes their status (to address, planned, risk accepted, resolved through third party, resolved through alternate mitigation, and completed). You can search, filter, and group all the recommended actions.
-Once you have completed an action it can take between 24-48 hours for the changes to be reflected in your secure score.
+Once you have completed an action it can take between 24-48 hours for the changes to be reflected in your secure score.
### Ranking
Ranking is based on the number of points left to achieve, implementation difficu
### View recommended action details
-When you select a specific recommended action, a full page flyout appears.
+When you select a specific recommended action, a full page flyout appears.
:::image type="content" source="../../media/secure-score/secure-score-improvement-action-details.png" alt-text="Screenshot that shows the flyout of a recommended action in the Microsoft 365 Defender portal." lightbox="../../media/secure-score/secure-score-improvement-action-details.png":::
Choose any statuses and record notes specific to the recommended action.
You won't be able to choose a status for Secure Score recommended actions in the "Device" category, instead, you'll be directed to the associated [Microsoft Defender Vulnerability Management security recommendation](/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation) to take action.
->[!NOTE]
->If you choose to create a 'Global exception' in the Defender Vulnerability management security recommendation, the status in the Microsoft Secure Score recommended action will be updated with the exception justification. Updates may take up to 2 hours.
+> [!NOTE]
+> If you choose to create a 'Global exception' in the Defender Vulnerability management security recommendation, the status in the Microsoft Secure Score recommended action will be updated with the exception justification. Updates may take up to 2 hours.
>
->If you choose to create an 'Exception per device group' in the Defender Vulnerability manage security recommendation, Secure Score will not be updated and the recommended action will remain as 'To address'.
+> If you choose to create an 'Exception per device group' in the Defender Vulnerability manage security recommendation, Secure Score will not be updated and the recommended action will remain as 'To address'.
#### Completed recommended actions
The section called **At a glance** will tell you the category, attacks it can pr
The **Implementation** section shows any prerequisites, step-by-step next steps to complete the recommended action, the current implementation status of the recommended action, and any learn more links.
-Prerequisites include any licenses that are needed or actions to be completed before the recommended action is addressed. Make sure you have enough seats in your license to complete the recommended action and that those licenses are applied to the necessary users.
+Prerequisites include any licenses that are needed or actions to be completed before the recommended action is addressed. Make sure you have enough seats in your license to complete the recommended action and that those licenses are applied to the necessary users.
## We want to hear from you
security Microsoft Secure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score.md
audience: ITPro-+ - m365-security - Adm_TOC - tier2
+search.appverid:
- MOE150 - MET150-+ - seo-marvel-apr2020 - seo-marvel-jun2020 Last updated 02/16/2021
Microsoft Secure Score is a measurement of an organization's security posture, w
Following the Secure Score recommendations can protect your organization from threats. From a centralized dashboard in the Microsoft 365 Defender portal, organizations can monitor and work on the security of their Microsoft 365 identities, apps, and devices.
-Secure Score helps organizations:
+Secure Score helps organizations:
-* Report on the current state of the organization's security posture.
-* Improve their security posture by providing discoverability, visibility, guidance, and control.
-* Compare with benchmarks and establish key performance indicators (KPIs).
+- Report on the current state of the organization's security posture.
+- Improve their security posture by providing discoverability, visibility, guidance, and control.
+- Compare with benchmarks and establish key performance indicators (KPIs).
Watch this video for a quick overview of Secure score. > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWUPrP]
Organizations gain access to robust visualizations of metrics and trends, integr
:::image type="content" source="../../media/secure-score/secure-score-home-page.png" alt-text="The Microsoft Secure Score homepage in the Microsoft 365 Defender portal" lightbox="../../media/secure-score/secure-score-home-page.png":::
->[!Note]
-> Currently, the Azure Active Directory related Microsoft Secure Score recommendations are not available for customer tenants registered in the following Azure Active Directory regions:
+> [!NOTE]
+> Currently, the Azure Active Directory related Microsoft Secure Score recommendations are not available for customer tenants registered in the following Azure Active Directory regions:
Japan, Australia, New Zealand, Fiji, Canada, United Kingdom, South Korea, France, United Arab Emirates, South America, Switzerland, Lichtenstein, Norway, Germany, Brazil, Sweden and Qatar. ## How it works
If you have a license for one of the supported Microsoft products, then you'll s
Your score is updated in real time to reflect the information presented in the visualizations and recommended action pages. Secure Score also syncs daily to receive system data about your achieved points for each action.
->[!Note]
+> [!NOTE]
> For Microsoft Teams related recommendations, the recommendation state will get updated when changes occur in the configuration state. In addition, the recommendation state is refreshed once a month. - ### Key scenarios - [Check your current score](microsoft-secure-score-improvement-actions.md#check-your-current-score)
If you turn on security defaults, you'll be awarded full points for the followin
- Require MFA for administrative roles (10 points) - Enable policy to block legacy authentication (7 points)
->[!IMPORTANT]
->Security defaults include security features that provide similar security to the "sign-in risk policy" and "user risk policy" recommended actions. Instead of setting up these policies on top of the security defaults, we recommend updating their statuses to "Resolved through alternative mitigation."
+> [!IMPORTANT]
+> Security defaults include security features that provide similar security to the "sign-in risk policy" and "user risk policy" recommended actions. Instead of setting up these policies on top of the security defaults, we recommend updating their statuses to "Resolved through alternative mitigation."
## Required permissions
To have permission to access Microsoft Secure Score, you must be assigned one of
With read and write access, you can make changes and directly interact with Secure Score. You can also assign read-only access to other users.
-* Global administrator
-* Security administrator
-* Exchange administrator
-* SharePoint administrator
+- Global administrator
+- Security administrator
+- Exchange administrator
+- SharePoint administrator
### Read-only roles With read-only access, you aren't able to edit status or notes for a recommended action, edit score zones, or edit custom comparisons.
-* Helpdesk administrator
-* User administrator
-* Service support administrator
-* Security reader
-* Security operator
-* Global reader
+- Helpdesk administrator
+- User administrator
+- Service support administrator
+- Security reader
+- Security operator
+- Global reader
## Risk awareness
security Onboarding Defender Experts For Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/onboarding-defender-experts-for-hunting.md
audience: ITPro - m365-security
- - tier1
+ - tier1
search.appverid: met150 Last updated 07/26/2022
Last updated 07/26/2022
## Onboarding
-If you're new to Microsoft 365 Defender and Defender Experts for Hunting:
+If you're new to Microsoft 365 Defender and Defender Experts for Hunting:
1. Upon getting your welcome email, select **Log into Microsoft 365 Defender**. 2. Sign in if you already have a Microsoft account. If none, create one.
-3. The Microsoft 365 Defender quick tour will get you familiar with the security suite, where the capabilities are and how important they are. Select **Take a quick tour**.
+3. The Microsoft 365 Defender quick tour will get you familiar with the security suite, where the capabilities are and how important they are. Select **Take a quick tour**.
4. Read the short descriptions about what the Microsoft Defender Experts service is and the capabilities it provides. Select **Next**. You'll see the welcome page: ![Screenshot of the Microsoft 365 Defender welcome page with a card for the Defender Experts for Hunting service.](../../media/mte/defenderexperts/start-using-defender-experts-for-hunting.png)
If you're new to Microsoft 365 Defender and Defender Experts for Hunting:
## Receive Defender Experts Notifications The Defender Experts Notifications service includes:+ - Threat monitoring and analysis, reducing dwell time and the risk to your business-- Hunter-trained artificial intelligence to discover and target both known attacks and emerging threats -- Identification of the most pertinent risks, helping SOCs maximize their effectiveness -- Help in scoping compromises and as much context as can be quickly delivered to enable a swift SOC response
+- Hunter-trained artificial intelligence to discover and target both known attacks and emerging threats
+- Identification of the most pertinent risks, helping SOCs maximize their effectiveness
+- Help in scoping compromises and as much context as can be quickly delivered to enable a swift SOC response
Refer to the following screenshot to see a sample Defender Experts Notification:
You can filter your incidents and alerts if you want to only see the Defender Ex
### Set up Defender Experts email notifications
-You can set up Microsoft 365 Defender to notify you or your staff with an email about new incidents or updates to existing incidents, including those observed by Microsoft Defender Experts. [Learn more about getting incident notifications by email](/microsoft-365/security/defender/incidents-overview#get-incident-notifications-by-email)
+You can set up Microsoft 365 Defender to notify you or your staff with an email about new incidents or updates to existing incidents, including those observed by Microsoft Defender Experts. [Learn more about getting incident notifications by email](/microsoft-365/security/defender/incidents-overview#get-incident-notifications-by-email)
1. In the Microsoft 365 Defender navigation pane, select **Settings** > **Microsoft 365 Defender** > **Email notifications** > **Incidents**. 2. Update your existing email notification rules or create a new one. [Learn more about creating a rule for email notifications](/microsoft-365/security/defender/incidents-overview#create-a-rule-for-email-notifications)
You can set up Microsoft 365 Defender to notify you or your staff with an email
> [!NOTE] > Experts on Demand is included in your Defender Experts for Hunting subscription with [monthly allocations](/microsoft-365/security/defender/before-you-begin-defender-experts#eligibility-and-licensing). However, it's not a security incident response service. It's intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
-Select **Ask Defender Experts** directly inside the Microsoft 365 security portal to get swift and accurate responses to all your threat hunting questions. Experts can provide insight to better understand the complex threats your organization may face. Experts on Demand can help to:
+Select **Ask Defender Experts** directly inside the Microsoft 365 security portal to get swift and accurate responses to all your threat hunting questions. Experts can provide insight to better understand the complex threats your organization may face. Experts on Demand can help to:
- Gather additional information on alerts and incidents, including root causes and scope - Gain clarity into suspicious devices, alerts, or incidents and take next steps if faced with an advanced attacker
security Playbook Detecting Ransomware M365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/playbook-detecting-ransomware-m365-defender.md
f1.keywords: NOCSH
Ransomware is a type of extortion attack that destroys or encrypts files and folders, preventing access to critical data or disrupting critical business systems. There are two types of ransomware:
-* Commodity ransomware is malware that spreads with phishing or between devices and encrypts files before demanding a ransom.
-* Human-operated ransomware is a planned and coordinated attack by active cybercriminals who employ multiple attack methods. In many cases, known techniques and tools are used to infiltrate your organization, find the assets or systems worth extorting, and then demand a ransom. Upon compromising a network, the attacker carries out reconnaissance of assets and systems which can be encrypted or extorted. The attackers then encrypt or exfiltrate data before demanding a ransom.
+- Commodity ransomware is malware that spreads with phishing or between devices and encrypts files before demanding a ransom.
+- Human-operated ransomware is a planned and coordinated attack by active cybercriminals who employ multiple attack methods. In many cases, known techniques and tools are used to infiltrate your organization, find the assets or systems worth extorting, and then demand a ransom. Upon compromising a network, the attacker carries out reconnaissance of assets and systems which can be encrypted or extorted. The attackers then encrypt or exfiltrate data before demanding a ransom.
This article describes proactive detection of new or ongoing human-operated ransomware attacks with the Microsoft 365 Defender portal, an extended detection and response (XDR) solution for the following security
-* Microsoft Defender for Endpoint
-* Microsoft Defender for Office 365
-* Microsoft Defender for Identity
-* Microsoft Defender for Cloud Apps (including the app governance add-on)
-* Microsoft Azure AD Identity Protection
-* Microsoft Defender for IoT
-* Microsoft 365 Business Premium
-* Microsoft Defender for Business
+- Microsoft Defender for Endpoint
+- Microsoft Defender for Office 365
+- Microsoft Defender for Identity
+- Microsoft Defender for Cloud Apps (including the app governance add-on)
+- Microsoft Azure AD Identity Protection
+- Microsoft Defender for IoT
+- Microsoft 365 Business Premium
+- Microsoft Defender for Business
For information about preventing ransomware attacks, see [Rapidly protect against ransomware and extortion](/security/compass/protect-against-ransomware-phase3).
Because human-operated ransomware is typically performed by active attackers who
If pre-ransom activities are detected quickly, the likelihood of a severe attack decreases. The pre-ransom stage typically includes the following techniques: initial access, reconnaissance, credential theft, lateral movement, and persistence. These techniques can initially seem unrelated and often fly under the radar. If these techniques lead to the ransom stage, it's often too late. Microsoft 365 Defender can help identify those small and seemingly unrelated incidents as possibly part of a larger ransomware campaign.
-* When detected during the pre-ransom stage, smaller-scale mitigations such as isolating infected devices or user accounts can be used to disrupt and remediate the attack.
-* If detection comes at a later stage, such as when the malware used to encrypt files is being deployed, more aggressive remediation steps that can cause downtime might need to be used to disrupt and remediate the attack.
+- When detected during the pre-ransom stage, smaller-scale mitigations such as isolating infected devices or user accounts can be used to disrupt and remediate the attack.
+- If detection comes at a later stage, such as when the malware used to encrypt files is being deployed, more aggressive remediation steps that can cause downtime might need to be used to disrupt and remediate the attack.
Business operation disruptions are likely when responding to a ransomware attack. The end stage of a ransomware attack is often a choice between downtime caused by attackers with major risks, or a controlled downtime to ensure network safety and give you time to fully investigate. We never recommend paying a ransom. Paying cybercriminals to get a ransomware decryption key provides no guarantee that your encrypted data will be restored. See, [Ransomware response - Microsoft Security Blog](https://www.microsoft.com/security/blog/2019/12/16/ransomware-response-to-pay-or-not-to-pay/).
In many cases, human-operated ransomware attackers use well-known and field-test
To see examples of how ransomware attacks get started with common malware, see these resources:
-* [Human-operated ransomware attacks: A preventable disaster](https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/)
-* [Ransomware threat analytics reports in the Microsoft 365 Defender portal](https://sip.security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,exposureLevel,MisconfiguredDevices,VulnerableDevices,reportType,createdOn,lastUpdatedOn,tags,flag)
+- [Human-operated ransomware attacks: A preventable disaster](https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/)
+- [Ransomware threat analytics reports in the Microsoft 365 Defender portal](https://sip.security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,exposureLevel,MisconfiguredDevices,VulnerableDevices,reportType,createdOn,lastUpdatedOn,tags,flag)
Being familiar with pre-ransom malware, payloads, and activities helps your analysts know what to look for to prevent the later stages of an attack.
Here are some typical techniques and tools used by ransomware attackers for the
Initial access:
-* RDP brute force
-* Vulnerable internet-facing system
-* Weak application settings
-* Phishing email
+- RDP brute force
+- Vulnerable internet-facing system
+- Weak application settings
+- Phishing email
Credential theft:
-* Mimikatz
-* LSA secrets
-* Credential vault
-* Credentials in plaintext
-* Abuse of service accounts
+- Mimikatz
+- LSA secrets
+- Credential vault
+- Credentials in plaintext
+- Abuse of service accounts
Lateral movement:
-* Cobalt Strike
-* WMI
-* Abuse of management tools
-* PsExec
+- Cobalt Strike
+- WMI
+- Abuse of management tools
+- PsExec
Persistence:
-* New accounts
-* GPO changes
-* Shadow IT tools
-* Schedule tasks
-* Service registration
+- New accounts
+- GPO changes
+- Shadow IT tools
+- Schedule tasks
+- Service registration
Defense evasion:
-* Disabling security features
-* Clearing log files
-* Deleting attack artifact files
-* Resetting timestamps on altered files
+- Disabling security features
+- Clearing log files
+- Deleting attack artifact files
+- Resetting timestamps on altered files
Exfiltration:
-* Exfiltration of sensitive data
+- Exfiltration of sensitive data
Impact (financial leverage):
-* Encryption of data in place and in backups
-* Deletion of data in place and backups, which might be combined with a preceding exfiltration
-* Threat of public leakage of exfiltrated, sensitive data
+- Encryption of data in place and in backups
+- Deletion of data in place and backups, which might be combined with a preceding exfiltration
+- Threat of public leakage of exfiltrated, sensitive data
### What to look for The challenge for security analysts is recognizing when an alert is part of a larger attack chain with the goal of extorting your sensitive data or crucial systems. For example, a detected phishing attack might be:
-* A one-off attack to surveil the email messages of someone in the finance department of an organization.
-* The pre-ransom part of an attack chain to use compromised user account credentials to discover the resources available to the user account and to compromise other user accounts with higher levels of privilege and access.
+- A one-off attack to surveil the email messages of someone in the finance department of an organization.
+- The pre-ransom part of an attack chain to use compromised user account credentials to discover the resources available to the user account and to compromise other user accounts with higher levels of privilege and access.
This section provides common attack phases and methods and the signal sources that feed into the central Microsoft 365 Defender portal, which creates alerts and incidents composed of multiple related alerts for security analysis. In some cases, there are alternate security portals to view the attack data.
This section provides common attack phases and methods and the signal sources th
Attacker is attempting to compromise a user account, device, or app.
-Attack method |Signal source |Alternate security portals
-|:|:|:
-RDP brute force|Defender for Endpoint|Defender for Cloud Apps
-Vulnerable internet-facing system|Windows security features, Microsoft Defender for Servers|
-Weak application settings |Defender for Cloud Apps, Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps |
-Malicious app activity |Defender for Cloud Apps, Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps |
-Phishing email |Defender for Office 365
-Password spray against Azure AD accounts |Azure AD Identity Protection via Defender for Cloud Apps |Defender for Cloud Apps
-Password spray against on-premises accounts |Microsoft Defender for Identity
-Device compromise |Defender for Endpoint
-Credential theft |Microsoft Defender for Identity
-Escalation of privilege |Microsoft Defender for Identity
+|Attack method|Signal source|Alternate security portals|
+||||
+|RDP brute force|Defender for Endpoint|Defender for Cloud Apps|
+|Vulnerable internet-facing system|Windows security features, Microsoft Defender for Servers|
+|Weak application settings|Defender for Cloud Apps, Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps|
+|Malicious app activity|Defender for Cloud Apps, Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps|
+|Phishing email|Defender for Office 365|
+|Password spray against Azure AD accounts|Azure AD Identity Protection via Defender for Cloud Apps|Defender for Cloud Apps|
+|Password spray against on-premises accounts|Microsoft Defender for Identity|
+|Device compromise|Defender for Endpoint|
+|Credential theft|Microsoft Defender for Identity|
+|Escalation of privilege|Microsoft Defender for Identity|
#### Recent spike in otherwise typical behavior Attacker is attempting to probe for additional entities to compromise.
-Spike category |Signal source |Alternate security portals
-|: |: |:
-Sign-ins: Numerous failed attempts, attempts to logon to multiple devices in a short period, multiple first-time logons, etc. |Azure AD Identity Protection via Defender for Cloud Apps, Microsoft Defender for Identity |Defender for Cloud Apps
-Recently active user account, group, machine account, app |Azure AD Identity Protection via Defender for Cloud Apps (Azure AD), Defender for Identity (Active Directory Domain Services [AD DS]) |Defender for Cloud Apps
-Recent app activity such as data access |Apps with Defender for Cloud Apps with the app governance add-on |Defender for Cloud Apps
+|Spike category|Signal source|Alternate security portals|
+||||
+|Sign-ins: Numerous failed attempts, attempts to logon to multiple devices in a short period, multiple first-time logons, etc.|Azure AD Identity Protection via Defender for Cloud Apps, Microsoft Defender for Identity|Defender for Cloud Apps|
+|Recently active user account, group, machine account, app|Azure AD Identity Protection via Defender for Cloud Apps (Azure AD), Defender for Identity (Active Directory Domain Services [AD DS])|Defender for Cloud Apps|
+|Recent app activity such as data access|Apps with Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps|
#### New activity Attacker is creating new entities to further their reach, install malware agents, or evade detection.
-Activity |Signal source |Alternate security portal
-|: |: |:
-New apps that are installed |Defender for Cloud Apps with the app governance add-on |Defender for Cloud Apps
-New user accounts |Azure Identity Protection |Defender for Cloud Apps
-Role changes |Azure Identity Protection |Defender for Cloud Apps
+|Activity|Signal source|Alternate security portal|
+||||
+|New apps that are installed|Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps|
+|New user accounts|Azure Identity Protection|Defender for Cloud Apps|
+|Role changes|Azure Identity Protection|Defender for Cloud Apps|
#### Suspicious behavior Attacker is downloading sensitive information, encrypting files, or otherwise collecting or damaging organization assets.
-Behavior |Signal source
-|: |:
-Malware spread to multiple devices |Defender for Endpoint
-Resource scanning |Defender for Endpoint, Defender for Identity
-Changes in mailbox forwarding rules |Defender for Office 365
-Data exfiltration and encryption |Defender for Office 365
+|Behavior|Signal source|
+|||
+|Malware spread to multiple devices|Defender for Endpoint|
+|Resource scanning|Defender for Endpoint, Defender for Identity|
+|Changes in mailbox forwarding rules|Defender for Office 365|
+|Data exfiltration and encryption|Defender for Office 365|
-**Monitor for Adversary Disabling Security** ΓÇô as this is often part of human-operated ransomware (HumOR) attack chain
+-*Monitor for Adversary Disabling Security** ΓÇô as this is often part of human-operated ransomware (HumOR) attack chain
-* **Event Logs Clearing** ΓÇô especially the Security Event log and PowerShell Operational logs
-* **Disabling of security tools/controls** (associated with some groups)
+- **Event Logs Clearing** ΓÇô especially the Security Event log and PowerShell Operational logs
+- **Disabling of security tools/controls** (associated with some groups)
## Detect ransomware attacks with the Microsoft 365 Defender portal The Microsoft 365 Defender portal provides a centralized view for information on detections, impacted assets, automated actions taken, and related evidence a combination of:
-* An incident queue, which groups related alerts for an attack to provide the full attack scope, impacted assets, and automated remediation actions.
-* An alerts queue, which lists all of the alerts being tracked by Microsoft 365 Defender.
+- An incident queue, which groups related alerts for an attack to provide the full attack scope, impacted assets, and automated remediation actions.
+- An alerts queue, which lists all of the alerts being tracked by Microsoft 365 Defender.
### Incident and alert sources Microsoft 365 Defender portal centralizes signals from:
-* Microsoft Defender for Endpoint
-* Microsoft Defender for Office 365
-* Microsoft Defender for Identity
-* Microsoft Defender for Cloud Apps (including the app governance add-on)
-* Microsoft Azure AD Identity Protection
-* Microsoft Defender for IoT
+- Microsoft Defender for Endpoint
+- Microsoft Defender for Office 365
+- Microsoft Defender for Identity
+- Microsoft Defender for Cloud Apps (including the app governance add-on)
+- Microsoft Azure AD Identity Protection
+- Microsoft Defender for IoT
This table lists some typical attacks and their corresponding signal source for Microsoft 365 Defender.
-Attacks and incidents |Signal source
-|: |:
-Cloud identity: Password spray, numerous failed attempts, attempts to log on to multiple devices in a short period, multiple first-time logons, recently active user accounts |Azure AD Identity Protection
-On-premises identity (AD DS) compromise |Defender for Identity
-Phishing |Defender for Office 365
-Malicious apps |Defender for Cloud Apps or Defender for Cloud Apps with app governance add-on
-Endpoint (device) compromise |Defender for Endpoint
-IoT-capable device compromise |Defender for IoT
+|Attacks and incidents|Signal source|
+|||
+|Cloud identity: Password spray, numerous failed attempts, attempts to log on to multiple devices in a short period, multiple first-time logons, recently active user accounts|Azure AD Identity Protection|
+|On-premises identity (AD DS) compromise|Defender for Identity|
+|Phishing|Defender for Office 365|
+|Malicious apps|Defender for Cloud Apps or Defender for Cloud Apps with app governance add-on|
+|Endpoint (device) compromise|Defender for Endpoint|
+|IoT-capable device compromise|Defender for IoT|
### Filtering ransomware-identified incidents
You can easily filter the incidents queue for incidents that have been categoriz
Each filter setting for the incidents queue creates a URL that you can save and access later as a link. These URLs can be bookmarked or otherwise saved and used when needed at a single click. For example, you can create bookmarks for:
-* Incidents containing the "ransomware" category. Here is the corresponding [link](https://security.microsoft.com/incidents?filters=AlertStatus%3DNew%257CInProgress,category%3Dransomware&page_size=30&fields=expand,name,tags,severity,investigationStates,category,impactedEntities,alertCount,serviceSource,detectionSource,firstEventTime,lastEventTime,sensitivity,status,incidentAssignment,classification,determination,rbacGroup).
-* Incidents with a specified **Actor** name known to be performing ransomware attacks.
-* Incidents with a specified **Associated threat** name known to be used in ransomware attacks.
-* Incidents containing a custom tag that your SecOps team uses for incidents that are known to be part of a larger, coordinated ransomware attack.
+- Incidents containing the "ransomware" category. Here is the corresponding [link](https://security.microsoft.com/incidents?filters=AlertStatus%3DNew%257CInProgress,category%3Dransomware&page_size=30&fields=expand,name,tags,severity,investigationStates,category,impactedEntities,alertCount,serviceSource,detectionSource,firstEventTime,lastEventTime,sensitivity,status,incidentAssignment,classification,determination,rbacGroup).
+- Incidents with a specified **Actor** name known to be performing ransomware attacks.
+- Incidents with a specified **Associated threat** name known to be used in ransomware attacks.
+- Incidents containing a custom tag that your SecOps team uses for incidents that are known to be part of a larger, coordinated ransomware attack.
### Filtering ransomware-identified threat analytics reports
From the **Detection details** section of many threat analytics reports, you can
### Microsoft 365 Defender APIs
-You can also use the Microsoft 365 Defender APIs to query the Microsoft 365 Defender incidents and alerts data in your tenant. A custom app can filter the data, filter it based on custom settings, and then provide a filtered list of links to alerts and incidents that you can easily select to go right to that alert or incident. See [List incidents API in Microsoft 365 Defender | Microsoft Docs](/api-list-incidents.md). You can also integrate your SIEM with Microsoft Defender, see [Integrate your SIEM tools with Microsoft 365 Defender](/configure-siem-defender.md).
+You can also use the Microsoft 365 Defender APIs to query the Microsoft 365 Defender incidents and alerts data in your tenant. A custom app can filter the data, filter it based on custom settings, and then provide a filtered list of links to alerts and incidents that you can easily select to go right to that alert or incident. See [List incidents API in Microsoft 365 Defender| Microsoft Docs](/api-list-incidents.md). You can also integrate your SIEM with Microsoft Defender, see [Integrate your SIEM tools with Microsoft 365 Defender](/configure-siem-defender.md).
### Microsoft 365 Defender Sentinel Integration
Microsoft Sentinel's Microsoft 365 Defender incident integration allows you to s
For proactive scanning of ransomware activities, you should assemble a catalog of advanced hunting queries for commonly used ransomware attack methods for identities, endpoints, apps, and data. Here are some key sources for ready-to-use advanced hunting queries:
-* The [Hunt for ransomware](/advanced-hunting-find-ransomware.md) article
-* GitHub repository for advanced hunting queries:
- * [Ransomware-specific](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware) queries
- * [All categories](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware) of queries
-* Threat analytics reports
- * Advanced hunting section of the [Ransomware: A pervasive and ongoing threat](https://security.microsoft.com/threatanalytics3/05658b6c-dc62-496d-ad3c-c6a795a33c27/analystreport) analyst report
- * Advanced hunting section of other analyst reports
+- The [Hunt for ransomware](/advanced-hunting-find-ransomware.md) article
+- GitHub repository for advanced hunting queries:
+ - [Ransomware-specific](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware) queries
+ - [All categories](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware) of queries
+- Threat analytics reports
+ - Advanced hunting section of the [Ransomware: A pervasive and ongoing threat](https://security.microsoft.com/threatanalytics3/05658b6c-dc62-496d-ad3c-c6a795a33c27/analystreport) analyst report
+ - Advanced hunting section of other analyst reports
### Automated hunting
Advanced hunting queries can also be used to create custom detection rules and a
To create a custom detection rule, select **Create custom detection** rule from the page of an advanced hunting query. Once created, you can specify:
-* How often to run the custom detection rule
-* The severity of the alert created by the rule
-* The MITRE attack phase for the created alert
-* Impacted entities
-* Actions to take on impacted entities
+- How often to run the custom detection rule
+- The severity of the alert created by the rule
+- The MITRE attack phase for the created alert
+- Impacted entities
+- Actions to take on impacted entities
## Prepare your SecOps Team for focused ransomware detection Preparing your SecOps team for proactive ransomware detection requires:
-* Pre-work for your SecOps team and organization
-* Security analyst training, as needed
-* Ongoing operational work to incorporate the latest attacks and detection experiences of your security analysts
+- Pre-work for your SecOps team and organization
+- Security analyst training, as needed
+- Ongoing operational work to incorporate the latest attacks and detection experiences of your security analysts
### Pre-work for your SecOps team and organization
Consider these steps to get your SecOps team and organization ready for focused
4. Create the set of custom detection rules for specific advanced hunting queries that create alerts for known ransomware attack methods, including their schedule, alert naming, and automated actions. 5. Determine the set of [custom tags](/manage-incidents.md) or standards to create new one to identify incidents that are known to be part of a larger, coordinated ransomware attack 6. Determine the set of operational tasks for ransomware incident and alert management. For example:-
-* Processes for Tier 1 analyst scanning of incoming incidents and alerts and assignment to Tier 2 analysts for investigation.
-* Manually running advanced hunting queries and their schedule (daily, weekly, monthly).
-* Ongoing changes based on ransomware attack investigation and mitigation experiences.
+ - Processes for Tier 1 analyst scanning of incoming incidents and alerts and assignment to Tier 2 analysts for investigation.
+ - Manually running advanced hunting queries and their schedule (daily, weekly, monthly).
+ - Ongoing changes based on ransomware attack investigation and mitigation experiences.
### Security analyst training As needed, you can provide your security analysts with internal training for:
-* Common ransomware attack chains (MITRE attack tactics and common threat techniques and malware)
-* Incidents and alerts and how to locate and analyze them in the Microsoft 365 Defender portal using:
- * Alerts and incidents already created by Microsoft 365 Defender
- * Pre-scanned URL-based filters for the Microsoft 365 Defender portal
- * Programmatically via the incidents API
-* Advanced hunting queries to use and their manual schedule (daily, weekly, monthly)
-* Custom detection rules to use and their settings
-* Custom incident tags
-* The latest [threat analytics reports for ransomware](https://security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,reportType,createdOn,lastUpdatedOn,tags,flag) attacks in the Microsoft 365 Defender portal
+- Common ransomware attack chains (MITRE attack tactics and common threat techniques and malware)
+- Incidents and alerts and how to locate and analyze them in the Microsoft 365 Defender portal using:
+ - Alerts and incidents already created by Microsoft 365 Defender
+ - Pre-scanned URL-based filters for the Microsoft 365 Defender portal
+ - Programmatically via the incidents API
+- Advanced hunting queries to use and their manual schedule (daily, weekly, monthly)
+- Custom detection rules to use and their settings
+- Custom incident tags
+- The latest [threat analytics reports for ransomware](https://security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,reportType,createdOn,lastUpdatedOn,tags,flag) attacks in the Microsoft 365 Defender portal
### Ongoing work based on operational learning and new threats As part of your SecOps team's ongoing tool and process best practices and security analysts' experiences, you should:
-* Update your catalog of advanced hunting queries with:
- * New queries based on the latest threat analytics reports in the Microsoft 365 Defender portal or the [Advanced Hunting GitHub repository](<https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware>).
- * Changes to existing ones to optimize for threat identification or for better alert quality.
-* Update custom detection rules based on new or changed advanced hunting queries.
-* Update the set of operational tasks for ransomware detection.
+- Update your catalog of advanced hunting queries with:
+ - New queries based on the latest threat analytics reports in the Microsoft 365 Defender portal or the [Advanced Hunting GitHub repository](<https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware>).
+ - Changes to existing ones to optimize for threat identification or for better alert quality.
+- Update custom detection rules based on new or changed advanced hunting queries.
+- Update the set of operational tasks for ransomware detection.
security Prerequisites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/prerequisites.md
For more information, [view the Microsoft 365 Enterprise service plans](https://
### Check your existing licenses Go to Microsoft 365 admin center ([admin.microsoft.com](https://admin.microsoft.com/)) to view your existing licenses. In the admin center, go to **Billing** > **Licenses**.
->[!NOTE]
+> [!NOTE]
> You need to be assigned either the **Billing admin** or **Global reader** [role in Azure AD](/azure/active-directory/roles/permissions-reference) to be able to see license information. If you encounter access problems, contact a global admin. ## Required permissions
security Setup M365deval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/setup-m365deval.md
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario - m365solution-evalutatemtp
Last updated 02/17/2021
-# Set up your Microsoft 365 Defender trial in a lab environment
+# Set up your Microsoft 365 Defender trial in a lab environment
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)] - **Applies to:**-- Microsoft 365 Defender
+- Microsoft 365 Defender
-This topic guides you to set up a dedicated lab environment. For information on setting up a trial in production, see the new [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) guide.
+This topic guides you to set up a dedicated lab environment. For information on setting up a trial in production, see the new [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) guide.
## Create an Office 365 E5 trial tenant
->[!NOTE]
->If you already have an existing Office 365 or Azure Active Directory subscription, you can skip the Office 365 E5 trial tenant creation steps.
+
+> [!NOTE]
+> If you already have an existing Office 365 or Azure Active Directory subscription, you can skip the Office 365 E5 trial tenant creation steps.
1. Go to the [Office 365 E5 product portal](https://www.microsoft.com/microsoft-365/business/office-365-enterprise-e5-business-software?activetab=pivot%3aoverviewtab) and select **Free trial**. :::image type="content" source="../../media/mtp-eval-9.png" alt-text="The Office 365 E5 free trial page" lightbox="../../media/mtp-eval-9.png":::
-
+ 2. Complete the trial registration by entering your email address (personal or corporate). Click **Set up account**. :::image type="content" source="../../media/mtp-eval-10.png" alt-text="The Office 365 E5 trial registration setup page" lightbox="../../media/mtp-eval-10.png":::
-3. Fill in your first name, last name, business phone number, company name, company size, and country or region.
+3. Fill in your first name, last name, business phone number, company name, company size, and country or region.
:::image type="content" source="../../media/mtp-eval-11.png" alt-text="The Office 365 E5 trial registration setup page asking for name, phone, and company details" lightbox="../../media/mtp-eval-11.png":::
-
+ > [!NOTE] > The country or region you set here determines the data center region your Office 365 will be hosted.
-
-4. Choose your verification preference: through a text message or call. Click **Send Verification Code**.
+
+4. Choose your verification preference: through a text message or call. Click **Send Verification Code**.
:::image type="content" source="../../media/mtp-eval-12.png" alt-text="The Office 365 E5 trial registration setup page asking for verification preference" lightbox="../../media/mtp-eval-12.png"::: 5. Set the custom domain name for your tenant, then click **Next**. :::image type="content" source="../../media/mtp-eval-13.png" alt-text="The Office 365 E5 trial registration setup page where you can set up your custom domain name" lightbox="../../media/mtp-eval-13.png":::
-
+ 6. Set up the first identity, which will be a Global Administrator for the tenant. Fill in **Name** and **Password**. Click **Sign up**. :::image type="content" source="../../media/mtp-eval-14.png" alt-text="The Office 365 E5 trial registration setup page where you can set your business identity" lightbox="../../media/mtp-eval-14.png":::
This topic guides you to set up a dedicated lab environment. For information on
8. Connect your corporate domain to the Office 365 tenant. [Optional] Choose **Connect a domain you already own** and type in your domain name. Click **Next**. :::image type="content" source="../../media/mtp-eval-16.png" alt-text="The Office 365 E5 Setup page where you should personalize your sign-in and email" lightbox="../../media/mtp-eval-16.png":::
-
+ 9. Add a TXT or MX record to validate the domain ownership. Once you've added the TXT or MX record to your domain, select **Verify**. :::image type="content" source="../../media/mtp-eval-17.png" alt-text="The Office 365 E5 setup page where you should add a TXT of MX record to verify your domain" lightbox="../../media/mtp-eval-17.png":::
-
+ 10. [Optional] Create more user accounts for your tenant. You can skip this step by clicking **Next**. :::image type="content" source="../../media/mtp-eval-18.png" alt-text="The Office 365 E5 setup page where you can add more users" lightbox="../../media/mtp-eval-18.png":::
-
-11. [Optional] Download Office apps. Click **Next** to skip this step.
+
+11. [Optional] Download Office apps. Click **Next** to skip this step.
:::image type="content" source="../../media/mtp-eval-19.png" alt-text="The Office 365 E5 page where you can install your Office apps" lightbox="../../media/mtp-eval-19.png"::: 12. [Optional] Migrate email messages. Again, you can skip this step. :::image type="content" source="../../media/mtp-eval-20.png" alt-text="The Office 365 E5 where you can set whether to migrate email messages or not" lightbox="../../media/mtp-eval-20.png":::
-
-13. Choose online services. Select **Exchange** and click **Next**.
+
+13. Choose online services. Select **Exchange** and click **Next**.
:::image type="content" source="../../media/mtp-eval-21.png" alt-text="The Office 365 E5 where you can choose your online services" lightbox="../../media/mtp-eval-21.png"::: 14. Add MX, CNAME, and TXT records to your domain. When completed, select **Verify**. :::image type="content" source="../../media/mtp-eval-22.png" alt-text="The Office 365 E5 here you can add your DNS records" lightbox="../../media/mtp-eval-22.png":::
-
+ 15. Congratulations, you have completed the provisioning of your Office 365 tenant. :::image type="content" source="../../media/mtp-eval-23.png" alt-text="The Office 365 E5 setup completion confirmation page" lightbox="../../media/mtp-eval-23.png":::
-
## Enable Microsoft 365 trial subscription
->[!NOTE]
->Signing up for a trial gives you 25 user licenses to use for a month. See [Try or buy a Microsoft 365 subscription](../../commerce/try-or-buy-microsoft-365.md) for details.
+> [!NOTE]
+> Signing up for a trial gives you 25 user licenses to use for a month. See [Try or buy a Microsoft 365 subscription](../../commerce/try-or-buy-microsoft-365.md) for details.
1. From [Microsoft 365 Admin Center](https://admin.microsoft.com/), click **Billing** and then navigate to **Purchase services**.
-2. Select **Microsoft 365 E5** and click **Start free trial**.
+2. Select **Microsoft 365 E5** and click **Start free trial**.
:::image type="content" source="../../media/mtp-eval-24.png" alt-text="The Microsoft 365 E5 Start free trial page" lightbox="../../media/mtp-eval-24.png"::: 3. Choose your verification preference: through a text message or call. Once you have decided, enter the phone number, select **Text me** or **Call me** depending on your selection. :::image type="content" source="../../media/mtp-eval-25.png" alt-text="The Microsoft 365 E5 Start free trial page asking for contact details to send code to prove you are not a robot" lightbox="../../media/mtp-eval-25.png":::
-
+ 4. Enter the verification code and click **Start your free trial**. :::image type="content" source="../../media/mtp-eval-26.png" alt-text="The Microsoft 365 E5 Start free trial page where you can fill out verification code the system sent to prove you are not a robot" lightbox="../../media/mtp-eval-26.png":::
This topic guides you to set up a dedicated lab environment. For information on
5. Click **Try now** to confirm your Microsoft 365 E5 trial. :::image type="content" source="../../media/mtp-eval-27.png" alt-text="The Microsoft 365 E5 Start free trial page where you should clock the Try now button to start" lightbox="../../media/mtp-eval-27.png":::
-
+ 6. Go to the **Microsoft 365 Admin Center** > **Users** > **Active users**. Select your user account, select **Manage product licenses**, then swap the license from Office 365 E5 to **Microsoft 365 E5**. Click **Save**. :::image type="content" source="../../media/mtp-eval-28.png" alt-text="The Microsoft 365 Admin Center page where you can select the Microsoft 365 E5 license" lightbox="../../media/mtp-eval-28.png":::
-
+ 7. Select the global administrator account again then click **Manage username**. :::image type="content" source="../../media/mtp-eval-29.png" alt-text="The Microsoft 365 Admin Center page where you can select Account and Manage username" lightbox="../../media/mtp-eval-29.png":::
This topic guides you to set up a dedicated lab environment. For information on
:::image type="content" source="../../media/mtp-eval-30.png" alt-text="The Microsoft 365 Admin Center page where you can change your domain preference" lightbox="../../media/mtp-eval-30.png"::: ## Next step+ |[Phase 3: Configure & Onboard](config-m365d-eval.md) | Configure each Microsoft 365 Defender pillar for your Microsoft 365 Defender trial lab or pilot environment and onboard your endpoints. |:-|:--|
security Threat Analytics Analyst Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/threat-analytics-analyst-reports.md
The analyst report also provides the detections from Microsoft Defender Antiviru
These detections are available on devices with [Microsoft Defender Antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10) turned on. When these detections occur on devices that have been onboarded to Microsoft Defender for Endpoint, they also trigger alerts that light up the charts in the report.
->[!NOTE]
->The analyst report also lists **generic detections** that can identify a wide-range of threats, in addition to components or behaviors specific to the tracked threat. These generic detections don't reflect in the charts.
+> [!NOTE]
+> The analyst report also lists **generic detections** that can identify a wide-range of threats, in addition to components or behaviors specific to the tracked threat. These generic detections don't reflect in the charts.
### Endpoint detection and response (EDR) alerts
While detections allow you to identify and stop the tracked threat automatically
Advanced hunting queries in the analyst reports have been vetted by Microsoft analysts and are ready for you to run in the [advanced hunting query editor](https://security.microsoft.com/advanced-hunting). You can also use the queries to create [custom detection rules](custom-detection-rules.md) that trigger alerts for future matches.
->[!NOTE]
+> [!NOTE]
> Threat analytics is also available in [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/threat-analytics). However, it does not have the data integration between Microsoft Defender for Office and Microsoft Defender for Endpoint. ## Related topics
security Threat Analytics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/threat-analytics.md
Threat analytics is our in-product threat intelligence solution from expert Micr
Watch this short video to learn more about how threat analytics can help you track the latest threats and stop them.
->[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWwJfU]
+> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWwJfU]
You can access threat analytics either from the upper left-hand side of Microsoft 365 security portal's navigation bar, or from a dedicated dashboard card that shows the top threats to your org, both in terms of impact, and in terms of exposure.
security Tickets https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/tickets.md
Last updated 02/16/2021
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
->[!CAUTION]
->**The preview period for the ServiceNow connector has ended**<br>
->This capability is no longer available. Thank you for your feedback and continued support while we determine next steps.
+> [!CAUTION]
+> **The preview period for the ServiceNow connector has ended**
+>
+> This capability is no longer available. Thank you for your feedback and continued support while we determine next steps.
ServiceNow is a popular cloud computing platform that helps companies manage digital workflows for enterprise operations. Their Now platform has IT workflows, employee workflows, and customer workflows.
security Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/whats-new.md
For more information on what's new with other Microsoft Defender security produc
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter). ## March 2023--
+- (Preview) Complete device reports for the [`DeviceInfo` table](advanced-hunting-deviceinfo-table.md) in advanced hunting are now sent *every hour* (instead of the previous daily cadence). In addition, complete device reports are also sent whenever there is a change to any previous report. New columns were also added to the `DeviceInfo` table, along with several improvements to existing data in `DeviceInfo` and [DeviceNetworkInfo](advanced-hunting-devicenetworkinfo-table.md) tables.
- (Preview) Near real-time custom detection is now available for public preview in advanced hunting custom detections. There is a new [Continuous (NRT)](custom-detection-rules.md) frequency, which checks data from events as they are collected and processed in near real-time. ## February 2023
security Criteria https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/criteria.md
You can assist Microsoft by [submitting unknown or suspicious software for analy
The next sections provide an overview of the classifications we use for applications and the types of behaviors that lead to that classification.
->[!NOTE]
+> [!NOTE]
> New forms of malware and potentially unwanted applications are being developed and distributed rapidly. The following list may not be comprehensive, and Microsoft reserves the right to adjust, expand, and update these without prior notice or announcement. ## Unknown ΓÇô Unrecognized software
security Microsoft 365 Zero Trust https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/microsoft-365-zero-trust.md
Use this article together with this poster.
| Item | Description | |:--|:--|
-|[![Illustration of the Microsoft 365 Zero Trust deployment plan.](../medi)</li></ul>
+|[![Illustration of the Microsoft 365 Zero Trust deployment plan.](../medi)</li></ul>
## Zero Trust security architecture
In this illustration:
- Threat protection capabilities are built on top of this foundation to provide real-time monitoring and remediation of security threats. - Information protection and governance provide sophisticated controls targeted at specific types of data to protect your most valuable information and to help you comply with compliance standards, including protecting personal information. - This article assumes you have already configured cloud identity. If you need guidance for this objective, see [**Deploy your identity infrastructure for Microsoft 365**](/microsoft-365/enterprise/deploy-identity-solution-overview). ## Step 1. Configure Zero Trust identity and device access protection ΓÇö starting-point policies
security Anti Phishing Policies About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-about.md
For detected domain impersonation attempts, the following actions are available:
- **Don't apply any action**: This is the default value. - **Redirect message to other email addresses**: Sends the message to the specified recipients instead of the intended recipients. - **Move messages to the recipients' Junk Email folders**: The message is delivered to the mailbox and moved to the Junk Email folder. For more information, see [Configure junk email settings on Exchange Online mailboxes in Microsoft 365](configure-junk-email-settings-on-exo-mailboxes.md).
-
+ - **Quarantine the message**: Sends the message to quarantine instead of the intended recipients. For information about quarantine, see the following articles: - [Quarantine in Microsoft 365](quarantine-email-messages.md) - [Manage quarantined messages and files as an admin in Microsoft 365](manage-quarantined-messages-and-files.md)
For impersonation attempts detected by mailbox intelligence, the following actio
- **Quarantine the message**: If you select this action, you can also select the quarantine policy that applies to messages that are quarantined by mailbox intelligence protection. Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Quarantine policies](quarantine-policies.md). - **Deliver the message and add other addresses to the Bcc line** - **Delete the message before it's delivered**
-
+ #### Impersonation safety tips Impersonation safety tips appear to users when messages are identified as impersonation attempts. The following safety tips are available:
security Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/defender-for-office-365.md
Last updated 01/31/2023
# Microsoft Defender for Office 365 > [!IMPORTANT]
->If your browser is being blocked by Safe Links and Safe Attachment pages, see [Advanced Outlook.com security for Microsoft 365 subscribers](https://support.microsoft.com/office/advanced-outlook-com-security-for-microsoft-365-subscribers-882d2243-eab9-4545-a58a-b36fee4a46e2?storagetype=live).
+> If your browser is being blocked by Safe Links and Safe Attachment pages, see [Advanced Outlook.com security for Microsoft 365 subscribers](https://support.microsoft.com/office/advanced-outlook-com-security-for-microsoft-365-subscribers-882d2243-eab9-4545-a58a-b36fee4a46e2?storagetype=live).
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
security Email Analysis Investigations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-analysis-investigations.md
Here are additional enhancements to email analysis in investigations.
During the email clustering analysis, all clustering queries will ignore security mailboxes set up as Security Operations mailboxes in the Advanced Delivery policy. Similarly, the email clustering queries will ignore phish simulation (education) messages that are configured in the Advanced Delivery policy. Neither the SecOps nor the PhishEdu exclusion values are shown in the query to keep the clustering attributes simple and easy to read. This exclusion ensures that threat intelligence and operational mailboxes (SecOps mailboxes) and the phish simulations (PhishEdu) are ignored during threat analysis and do not get removed during any remediation.
->[!Note]
->When opening an email cluster to view it in Explorer from the email cluster details, the PhishEdu and SecOps mailbox filters will be applied in Explorer but will not be shown. If you change the Explorer filters, dates, or refresh the query within the page ΓÇô then the PhishEdu/SecOps filter exclusions will get removed and emails that match these will be shown once again. If you refresh the Explorer page using the browser refresh function, the original query filters will get re-loaded, including the PhishEdu/SecOps filters ΓÇô but removing any subsequent changes you had made.
->
+> [!NOTE]
+> When opening an email cluster to view it in Explorer from the email cluster details, the PhishEdu and SecOps mailbox filters will be applied in Explorer but will not be shown. If you change the Explorer filters, dates, or refresh the query within the page ΓÇô then the PhishEdu/SecOps filter exclusions will get removed and emails that match these will be shown once again. If you refresh the Explorer page using the browser refresh function, the original query filters will get re-loaded, including the PhishEdu/SecOps filters ΓÇô but removing any subsequent changes you had made.
## AIR updates pending email action status
security Email Authentication Dkim Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-dkim-configure.md
DKIM lets you add a digital signature to outbound email messages in the message
In basic, a private key encrypts the header in a domain's outgoing email. The public key is published in the domain's DNS records, and receiving servers can use that key to decode the signature. DKIM verification helps the receiving servers confirm the mail is really coming from your domain and not someone *spoofing* your domain. > [!TIP]
->You can choose to do nothing about DKIM for your custom domain too. If you don't set up DKIM for your custom domain, Microsoft 365 creates a private and public key pair, enables DKIM signing, and then configures the Microsoft 365 default policy for your custom domain.
+> You can choose to do nothing about DKIM for your custom domain too. If you don't set up DKIM for your custom domain, Microsoft 365 creates a private and public key pair, enables DKIM signing, and then configures the Microsoft 365 default policy for your custom domain.
Microsoft-365's built-in DKIM configuration is sufficient coverage for most customers. However, you should manually configure DKIM for your custom domain in the following circumstances:
security Mdo Data Retention https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-data-retention.md
f1.keywords:
Previously updated : 1/31/2023 Last updated : 3/9/2023 audience: ITPro
- m365-security - tier2
-description: Microsoft Defender for Office 365 data retention informationThreat Explorer/ Real-Time detections
+description: Admins can learn how long Defender for Office 365 features retain data.
search.appverid: met150
search.appverid: met150
By default, data across different features is retained for a maximum of 30 days. However, for some of the features, you can specify the retention period based on policy. See the following table for the different retention periods for each feature. > [!NOTE]
-> Microsoft Defender for Office 365 comes in two different Plan types. You can tell if you have **Plan 1** if you have 'Real-time Detections', and **Plan 2**, if you have Threat Explorer. The Plan you have influences the tools you will see, so be certain that you're aware of your Plan as you learn.
+> Microsoft Defender for Office 365 comes in two different subscriptions: **Plan 1** and **Plan 2**. If you have **Threat Explorer** at <https://security.microsoft.com/threatexplorer>, you have Plan 2. Otherwise, you have **Real-time Detections** at <https://security.microsoft.com/realtimereports> as part of **Plan 1**.
+>
+> Your Defender for Office 365 subscription affects the tools that are available to you, so make sure you know which subscription you have as you learn.
## Defender for Office 365 Plan 1 |Feature|Retention period| |||
-|Alert metadata details (Microsoft Defender for Office alerts) | 90 days |
-|Entity metadata details (Emails) | 30 days |
-|Activity alert details (audit logs) | 7 days |
-|Email entity page | 30 days |
-|Quarantine | 30 days (configurable up to 30 days maximum) |
-|Reports | 90 days (for all aggregated data) <br>30 days (for all detailed information except below) <br> 10 days (for Threat protection status report detail and spoof mail report details) <br> 7 days (for URL protection report details) <br>
-|Submissions | 30 days |
-|Threat Explorer/ Real-Time detections | 30 days |
+|Alert metadata details (Microsoft Defender for Office alerts)|90 days.|
+|Entity metadata details (Email)|30 days.|
+|Activity alert details (audit logs)|7 days.|
+|Email entity page|30 days.|
+|Quarantine|30 days (configurable; 30 days is the maximum).|
+|Reports|90 days for aggregated data. <br/><br/> 30 days for detailed information.|
+|Submissions|30 days.|
+|Real-Time detections|30 days.|
## Defender for Office 365 Plan 2
Defender for Office 365 Plan 1 capabilities, plus:
|Feature|Retention period| |||
-|Action Center | 180 days, 30 days (Office Action center) |
-|Advanced Hunting | 30 days |
-|AIR (Automated Investigation and Response) | 60 days (for investigations meta data)<br> 30 days (for email meta data) |
-|Attack Simulation Data | 18 months |
-|Campaigns | 30 days |
-|Incidents | 30 days|
-|Remediation | 30 days |
-|Threat Analytics | 30 days |
-|Threat Trackers | 30 days |
+|Action Center|180 days. <br/><br/> Office Action Center 30 days.|
+|Advanced Hunting|30 days.|
+|AIR (Automated investigation and response)|60 days for investigations metadata. <br/><br/> 30 days for email metadata.|
+|Attack simulation training data|18 months.|
+|Campaigns|30 days.|
+|Incidents|30 days.|
+|Remediation|30 days|
+|Threat Analytics|30 days.|
+|Threat Explorer|30 days.|
+|Threat Trackers|30 days.|
security Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-policies.md
Last updated 3/3/2023
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)] **Applies to:**
+- [Exchange Online Protection](eop-about.md)
- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
-Quarantine policies (formerly known as _quarantine tags_) in Exchange Online Protection (EOP) and Microsoft Defender for Office 365 allow admins to control what users are able to do to quarantined messages based on why the message was quarantined. Quarantine policies are available in all Microsoft 365 organizations with Exchange Online mailboxes.
+Quarantine policies (formerly known as _quarantine tags_) in Exchange Online Protection (EOP) and Microsoft Defender for Office 365 allow admins to control what users are able to do to quarantined messages based on why the message was quarantined.
Traditionally, users have been allowed or denied levels of interactivity for quarantine messages based on why the message was quarantined. For example, users can view and release messages that were quarantined by anti-spam filtering as spam or bulk, but they can't view or release messages that were quarantined as high confidence phishing or malware.
In _supported_ protection features that quarantine email messages, you can assig
|&nbsp;&nbsp;&nbsp;User impersonation (_TargetedUserProtectionAction_)|Yes (_TargetedUserQuarantineTag_)| |&nbsp;&nbsp;&nbsp;Domain impersonation (_TargetedDomainProtectionAction_)|Yes (_TargetedDomainQuarantineTag_)| |&nbsp;&nbsp;&nbsp;Mailbox intelligence impersonation (_MailboxIntelligenceProtectionAction_)|Yes (_MailboxIntelligenceQuarantineTag_)|
-|**[Anti-malware policies](anti-malware-policies-configure.md)**|Yes ( _QuarantineTag_)|
+|**[Anti-malware policies](anti-malware-policies-configure.md)**|Yes (_QuarantineTag_)|
|**[Safe Attachments protection](safe-attachments-about.md)**|| |&nbsp;&nbsp;&nbsp;Email messages with attachments that are quarantined as malware by Safe Attachments policies (_Enable_ and _Action_)|Yes (_QuarantineTag_)| |&nbsp;&nbsp;&nbsp;Files that are quarantined as malware by [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)|No|
security Recover From Ransomware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recover-from-ransomware.md
Microsoft Azure:
Microsoft Defender for Cloud Apps: -- [Create anomaly detection policies in Defender for Cloud Apps](/cloud-app-security/anomaly-detection-policy)
+- [Create anomaly detection policies in Defender for Cloud Apps](/cloud-app-security/anomaly-detection-policy)
Microsoft Security team blog posts:
security Use The Delist Portal To Remove Yourself From The Office 365 Blocked Senders Lis https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/use-the-delist-portal-to-remove-yourself-from-the-office-365-blocked-senders-lis.md
where _IP address_ is the IP address of the computer on which the mail server r
## Verify senders before removing them from the blocked senders list There are good reasons for senders to wind up on the blocked senders list, but mistakes can happen. Take a look at this video for a balanced explanation of blocked senders and delisting.
-<p>
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMhvD]
There are good reasons for senders to wind up on the blocked senders list, but m
See [Create safe sender lists in EOP](create-safe-sender-lists-in-office-365.md) and [Outbound spam protection in EOP](outbound-spam-protection-about.md) to prevent an IP from being blocked. ### How to fix error code 5.7.511
-
+ When there's a problem delivering an email message that you sent, Microsoft 365 or Office 365 sends an email notification to let you know. The email notification is known a delivery status notification or DSN. The most common type of DSN is a non-delivery report (also known as an NDR or bounce message) that tells you that a message wasn't delivered. In certain situations, Microsoft must conduct additional investigations against traffic from your IP address. If you receive and NDR with code 5.7.511, you **will not** be able to use the delist portal.
-
-> 550 5.7.511 Access denied, banned sender[xxx.xxx.xxx.xxx]. To request removal from this list, forward this message to delist@microsoft.com. For more information, go to https://go.microsoft.com/fwlink/?LinkId=526653.
-
-In the email to request removal from this list, provide the full NDR code and IP address. Microsoft will contact you within 48 hours with the next steps.
+
+> 550 5.7.511 Access denied, banned sender[xxx.xxx.xxx.xxx]. To request removal from this list, forward this message to delist@microsoft.com. For more information, go to https://go.microsoft.com/fwlink/?LinkId=526653.
+
+In the email to request removal from this list, provide the full NDR code and IP address. Microsoft will contact you within 48 hours with the next steps.
## More information
security Security Posture Solution Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/security-posture-solution-overview.md
It has never been more important to be able to detect and defend your organization against cyber security threats. Knowing your assets, using the built-in configurations available to you, and taking recommended actions helps you build great security posture and resilience while also empowering you to respond rapidly to new and evolving threats.
-As an organizationΓÇÖs security posture is constantly changing alongside the cybersecurity landscape, making security posture improvements should be a continuous process. This article provides an overview of how you can strengthen your organization's security posture using capabilities available in Microsoft 365 Defender and other Microsoft security products, such as Microsoft Defender for Endpoint and Microsoft Defender Vulnerability Management.
+As an organization's security posture is constantly changing alongside the cybersecurity landscape, making security posture improvements should be a continuous process. This article provides an overview of how you can strengthen your organization's security posture using capabilities available in Microsoft 365 Defender and other Microsoft security products, such as Microsoft Defender for Endpoint and Microsoft Defender Vulnerability Management.
It will help you better understand your overall security posture and provide a framework to help you continually assess, improve, and maintain a security posture to fit your organization's security needs.
solutions Configure Teams Highly Sensitive Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/configure-teams-highly-sensitive-protection.md
f1.keywords: NOCSH
Previously updated : 05/01/2020 Last updated : 03/09/2023 audience: ITPro
+ms.localizationpriority: normal
search.appverid: - MET150 - highpri
+- Tier1
- Ent_O365 - Strat_O365_Enterprise - m365solution-3tiersprotection
description: "Learn how to deploy teams with protection for highly sensitive dat
# Configure teams with protection for highly sensitive data + In this article, we look at setting up a team for a highly sensitive level of protection. Be sure you've completed the steps in [Deploy teams with baseline protection](configure-teams-baseline-protection.md) before following the steps in this article. For this tier of protection, we create a sensitivity label that can be used across your organization for highly sensitive teams and files. Only members of your organization and guests that you have specified will be able to decrypt files that use this label. If you need to further isolate permissions so that only members of a specific team can decrypt files, see [Deploy a team with security isolation](secure-teams-security-isolation.md). The highly sensitive tier offers the following additional protections over the baseline tier: -- A sensitivity label for the team that allows you to turn guest sharing on or off and blocks access to SharePoint content for unmanaged devices. This label can also be used to classify and encrypt files.-- A more restrictive default sharing link type
+- A sensitivity label for the team that allows you to turn guest sharing on or off and enforces a conditional access for access to the SharePoint site. The label is also used as a default label for files.
- Only team owners can create private channels.-- Access requests for the associated SharePoint site are turned off.
+- Site access is restricted to team members.
## Video demonstration
For details about sharing with guests securely, see the following resources:
- [Limit accidental exposure to files when sharing with people outside your organization](./share-limit-accidental-exposure.md) - [Create a secure guest sharing environment](./create-secure-guest-sharing-environment.md)
-To allow or block guest sharing, we use a combination of a sensitivity label for the team and site-level sharing controls for the associated SharePoint site, both discussed later.
+To allow or block guest sharing, we'll use controls available in sensitivity labels.
++
+## Authentication context
+
+We'll use an [Azure Active Directory authentication context](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#configure-authentication-contexts) to enforce more stringent access conditions when users access SharePoint sites.
+
+First, add an authentication context in Azure Active Directory.
+
+To add an authentication context
+1. In [Azure Active Directory Conditional Access](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ConditionalAccessBlade), under **Manage**, click **Authentication context**.
+
+2. Click **New authentication context**.
+
+3. Type a name and description and select the **Publish to apps** check box.
+
+ ![Screenshot of add authentication context UI.](../media/aad-add-authentication-context.png)
+
+4. Click **Save**.
+
+Next, create a conditional access policy that applies to that authentication context and that requires guests to agree to a terms of use as a condition of access.
+
+To create a conditional access policy
+1. In [Azure Active Directory Conditional Access](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ConditionalAccessBlade), click **New policy**.
+
+1. Type a name for the policy.
+
+1. On the **Users and groups** tab, choose the **Select users and groups** option, and then select the **Guest or external users** check box.
+
+1. Choose **B2B collaboration guest users** from the dropdown.
+
+1. On the **Cloud apps or actions** tab, under **Select what this policy applies to**, choose **Authentication context**, and select the check box for the authentication context that you created.
+
+ ![Screenshot of authentication context options in cloud apps or actions settings for a conditional access policy.](../media/aad-authentication-context-ca-policy-apps.png)
+
+1. On the **Grant** tab, select **Require multifactor authentication**, and then click **Select**.
+
+1. Choose if you want to enable the policy, and then click **Create**.
+
+We'll point to the authentication context in the sensitivity label.
## Sensitivity labels
-For the highly sensitive level of protection, we'll be using a sensitivity label to classify the team. This label can also be used to classify and encrypt individual files in this or other teams or in other file locations such as SharePoint or OneDrive.
+For the highly sensitive level of protection, we'll be using a sensitivity label to classify the team. We'll also use this label to classify and encrypt individual files in the team. (It can also be used on files in other file locations such as SharePoint or OneDrive.)
-As a first step, you must enable sensitivity labels for Teams. See [Use sensitivity labels to protect content in Microsoft Teams, Office 365 Groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md) for details.
+As a first step, you must enable sensitivity labels for Teams. See [Use sensitivity labels to protect content in Microsoft Teams, Microsoft 365 Groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md) for details.
If you already have sensitivity labels deployed in your organization, consider how this label fits with your overall label strategy. You can change the name or settings if needed to meet the needs of your organization.
Once you have enabled sensitivity labels for Teams, the next step is to create t
To create a sensitivity label 1. Open the [Microsoft Purview compliance portal](https://compliance.microsoft.com).
-2. Under **Solutions**, click **Information protection**.
-3. Click **Create a label**.
-4. Give the label a name. We suggest **Highly sensitive**, but you can choose a different name if that one is already in use.
-5. Add a display name and description, and then click **Next**.
-6. On the **Define the scope for this label page**, select **Files & emails** and **Groups & sites** and click **Next**.
-7. On the **Choose protection settings for files and emails** page, select **Encrypt files and emails**, and then click **Next**.
-8. On the **Encryption** page, choose **Configure encryption settings**.
-9. Under **Assign permissions to specific users and groups**, click **Assign permissions**.
-10. Click **Add all users and groups in your organization**.
-11. If there are guests who should have permissions to decrypt files, click **Add users or groups** and add them.
-12. Click **Save**, and then click **Next**.
-13. On the *Auto-labeling for files and emails** page, click **Next**.
-14. On the **Define protection settings for groups and sites** page, select **Privacy and external user access settings** and **Device access and external sharing settings** and click **Next**.
-15. On the **Define privacy and external user access settings** page, under **Privacy**, select the **Private** option.
-16. If you want to allow guest access, under **External user access**, select **Let Microsoft 365 Group owners add people outside your organization to the group as guests**.
-17. Click **Next**.
-18. On the **Define external sharing and device access settings** page, select **Control external sharing from labeled SharePoint sites**.
-19. Under **Content can be shared with**, choose **New and existing guests** if you're allowing guest access or **Only people in your organization** if not.
-20. Under **Access from unmanaged devices**, choose **Block access**. (If you're allowing guests and they don't have managed devices, you may want to choose **Allow limited, web-only access**.)
-21. Click **Next**.
-22. On the **Auto-labeling for database columns** page, click **Next**.
-23. Click **Create label**, and then click **Done**.
+1. Under **Solutions**, click **Information protection**.
+1. On the **Labels** tab, click **Create a label**.
+1. Give the label a name. We suggest **Highly sensitive**, but you can choose a different name if that one is already in use.
+1. Add a display name and description, and then click **Next**.
+1. On the **Define the scope for this label page**, select **Files & emails** and **Groups & sites** and clear **Include meetings**.
+1. Click **Next**.
+1. On the **Choose protection settings for files and emails** page, select **Apply or remove encryption**, and then click **Next**.
+1. On the **Encryption** page, choose **Configure encryption settings**.
+1. Under **Assign permissions to specific users and groups**, click **Assign permissions**.
+1. Click **Add all users and groups in your organization**.
+1. If there are guests who should have permissions to decrypt files, click **Add users or groups** and add them.
+1. Click **Save**, and then click **Next**.
+1. On the **Auto-labeling for files and emails** page, click **Next**.
+1. On the **Define protection settings for groups and sites** page, select **Privacy and external user access settings** and **External sharing and Conditional Access settings** and click **Next**.
+1. On the **Define privacy and external user access settings** page, under **Privacy**, select the **Private** option.
+1. If you want to allow guest access, under **External user access**, select **Let Microsoft 365 Group owners add people outside your organization to the group as guests**.
+1. Click **Next**.
+1. On the **Define external sharing and device access settings** page, select **Control external sharing from labeled SharePoint sites**.
+1. Under **Content can be shared with**, choose **New and existing guests** if you're allowing guest access or **Only people in your organization** if not.
+1. Select **Use Azure AD Conditional Access to protect labeled SharePoint sites**.
+1. Select the **Choose an existing authentication context** option, and then select the authentication context that you created from the dropdown list.
+1. Click **Next**.
+1. On the **Auto-labeling for database columns** page, click **Next**.
+1. Click **Create label**, and then click **Done**.
Once you've created the label, you need to publish it to the users who will use it. For sensitive protection, we'll make the label available to all users. You publish the label in the Microsoft Purview compliance portal, on the **Label policies** tab of the **Information protection** page. If you have an existing policy that applies to all users, add this label to that policy. If you need to create a new policy, see [Publish sensitivity labels by creating a label policy](../compliance/create-sensitivity-labels.md#publish-sensitivity-labels-by-creating-a-label-policy).
You can also use [teams policies](/MicrosoftTeams/teams-policies) to control who
## SharePoint settings Each time you create a new team with the highly sensitive label, there are two steps to do in SharePoint:
+- Restrict access to the site to members of the team only
+- Choose a default sensitivity label for the document library connected to the team.
+
+### Restrict site access to team members
+
+Each time you create a new team with the highly sensitive label, you need to turn on restricted site access on the associated SharePoint site. This prevents people from outside the team from accessing the site or its content. (This requires a Microsoft Syntex - SharePoint Advanced Management license.)
+
+[SharePoint PowerShell](/powershell/sharepoint/sharepoint-online/introduction-sharepoint-online-management-shell) is required to configure restricted site access.
+
+If you haven't used restricted site access before, you need to turn it on for your organization. To do this, run the following command:
+
+```Powershell
+Set-SPOTenant -EnableRestrictedAccessControl $true
+```
+
+> [!NOTE]
+> If you have Microsoft 365 Multi-Geo, you must run this command for each geo-location you want to use restricted access control.
+
+Wait for approximately one hour before turning on restricted access control for the site.
+
+To restrict site access for the site connected to your team, run the following command:
+
+```Powershell
+Set-SPOSite -Identity <siteurl> -RestrictedAccessControl $true
+```
+
+### Choose a default sensitivity label for files
-- Update the guest sharing settings for the site in the SharePoint admin center to update the default sharing link to *People with existing access*.-- Update the site sharing settings in the site itself to prevent members from sharing files, folders, or the site, and turn off access requests.
+We'll use the sensitivity label that we created as the default sensitivity label for the site document library that is connected to Teams. This will automatically apply the highly sensitive label to any new label-compatible files that are uploaded to the library, encrypting them. (This requires a Microsoft Syntex - SharePoint Advanced Management license.)
-### Site default sharing link settings
+To set a default sensitivity label for a document library
-To update the site default sharing link type
+1. In Teams, navigate to the **General** channel of the team you want to update.
-1. Open the SharePoint admin center, and under **Sites**, select <a href="https://go.microsoft.com/fwlink/?linkid=2185220" target="_blank">**Active sites**</a>.
-1. Select the site that is associated with team.
-1. On the **Policies** tab, under **External sharing**, select **Edit**.
-1. Under Default sharing link type, clear the **Same as organization-level setting** check box, and select **People with existing access**.
-1. Select **Save**.
+1. In the tool bar for the team, click **Files**.
-Note that if you add private or shared channels to the team, each creates a new SharePoint site with the default sharing settings. You can update them in the SharePoint admin center by selecting the sites associated with the team.
+1. Click **Open in SharePoint**.
-### Site sharing settings
+1. In the SharePoint site, open **Settings** and then choose **Library settings**.
-To help ensure that the SharePoint site does not get shared with people who are not members of the team, we limit such sharing to owners. We also limit sharing of files and folders to team owners. This helps ensure that owners are aware whenever a file is shared with someone outside the team.
+1. From the **Library settings** flyout pane, select **Default sensitivity labels**, and then select the highly sensitive label from the drop-down box.
-To configure owners-only site sharing
-1. In Teams, navigate to the **General** tab of the team you want to update.
-2. In the tool bar for the team, click **Files**.
-3. Click the ellipsis, and then click **Open in SharePoint**.
-4. In the tool bar of the underlying SharePoint site, click the settings icon, and then click **Site permissions**.
-5. In the **Site permissions** pane, under **Site sharing**, click **Change how members can share**.
-6. Under **Sharing permissions**, choose **Only site owners can share files, folders, and the site**.
-7. Set **Allow access requests** to **Off**, and then click **Save**.
+For more details about how default library labels work, see [Configure a default sensitivity label for a SharePoint document library](/microsoft-365/compliance/sensitivity-labels-sharepoint-default-label).
## See Also
solutions Configure Teams Sensitive Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/configure-teams-sensitive-protection.md
f1.keywords: NOCSH
Previously updated : 05/01/2020 Last updated : 03/09/2023 audience: ITPro
+ms.localizationpriority: normal
search.appverid: - MET150 - highpri
+- Tier1
- Ent_O365 - Strat_O365_Enterprise - m365solution-3tiersprotection
description: "Learn how to deploy teams with protection for sensitive data."
# Configure teams with protection for sensitive data + In this article, we look at setting up a team for a sensitive level of protection. Be sure you've completed the steps in [Deploy teams with baseline protection](configure-teams-baseline-protection.md) before following the steps in this article. The sensitive tier offers the following additional protections over the baseline tier: -- A sensitivity label for the team that allows you to turn guest sharing on or off and limits access to SharePoint content to web-only for unmanaged devices. This label can also be used to classify files.
+- A sensitivity label for the team that allows you to turn guest sharing on or off and limits access to SharePoint content to web-only for unmanaged devices. This label is also used as the default label for files.
- A more restrictive default sharing link type - Only team owners can create private channels.
To allow or block guest sharing, we use a combination of a sensitivity label for
## Sensitivity labels
-For the sensitive level of protection, we'll be using a sensitivity label to classify the team. This label can also be used to classify individual files in this or other teams, or in other file locations such as SharePoint or OneDrive.
+For the sensitive level of protection, we'll be using a sensitivity label to classify the team. We'll also use this label to classify individual files in the team. (It can also be used on files in other file locations such as SharePoint or OneDrive.)
-As a first step, you must enable sensitivity labels for Teams. See [Use sensitivity labels to protect content in Microsoft Teams, Office 365 Groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md) for details.
+As a first step, you must enable sensitivity labels for Teams. See [Use sensitivity labels to protect content in Microsoft Teams, Microsoft 365 Groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md) for details.
If you already have sensitivity labels deployed in your organization, consider how this label fits with your overall label strategy. You can change the name or settings if needed to meet the needs of your organization.
Once you have enabled sensitivity labels for Teams, the next step is to create t
To create a sensitivity label 1. Open the [Microsoft Purview compliance portal](https://compliance.microsoft.com).
-2. Under **Solutions**, click **Information protection**.
-3. Click **Create a label**.
-4. Give the label a name. We suggest **Sensitive**, but you can choose a different name if that one is already in use.
-5. Add a display name and description, and then click **Next**.
-6. On the **Define the scope for this label page**, select **Files & emails** and **Groups & sites** and click **Next**.
-7. On the **Choose protection settings for files and emails** page, click **Next**.
-8. On the *Auto-labeling for files and emails** page, click **Next**.
-9. On the **Define protection settings for groups and sites** page, select **Privacy and external user access settings** and **Device access and external sharing settings** and click **Next**.
-10. On the **Define privacy and external user access settings** page, under **Privacy**, select the **Private** option.
-11. If you want to allow guest access, under **External user access**, select **Let Microsoft 365 Group owners add people outside your organization to the group as guests**.
-12. Click **Next**.
-13. On the **Define external sharing and device access settings** page, select **Control external sharing from labeled SharePoint sites**.
-14. Under **Content can be shared with**, choose **New and existing guests** if you're allowing guest access or **Only people in your organization** if not.
-15. Under **Access from unmanaged devices**, choose **Allow limited, web-only access**.
-16. Click **Next**.
-17. On the **Auto-labeling for database columns** page, click **Next**.
-18. Click **Create label**, and then click **Done**.
+1. Under **Solutions**, click **Information protection**.
+1. Click **Create a label**.
+1. Give the label a name. We suggest **Sensitive**, but you can choose a different name if that one is already in use.
+1. Add a display name and description, and then click **Next**.
+1. On the **Define the scope for this label page**, select **Files & emails** and **Groups & sites** and clear **Include meetings**.
+1. Click **Next**.
+1. On the **Choose protection settings for files and emails** page, click **Next**.
+1. On the **Auto-labeling for files and emails** page, click **Next**.
+1. On the **Define protection settings for groups and sites** page, select **Privacy and external user access settings** and **External sharing and Conditional Access settings** and click **Next**.
+1. On the **Define privacy and external user access settings** page, under **Privacy**, select the **Private** option.
+1. If you want to allow guest access, under **External user access**, select **Let Microsoft 365 Group owners add people outside your organization to the group as guests**.
+1. Click **Next**.
+1. On the **Define external sharing and device access settings** page, select **Control external sharing from labeled SharePoint sites**.
+1. Under **Content can be shared with**, choose **New and existing guests** if you're allowing guest access or **Only people in your organization** if not.
+1. Select **Use Azure AD Conditional Access to protect labeled SharePoint sites**.
+1. Choose the **Determine whether users can access SharePoint sites from unmanaged devices** option, and then choose **Allow limited, web-only access**.
+1. Click **Next**.
+1. On the **Auto-labeling for database columns** page, click **Next**.
+1. Click **Create label**, and then click **Done**.
Once you've created the label, you need to publish it to the users who will use it. For sensitive protection, we'll make the label available to all users. You publish the label in the Microsoft Purview compliance portal, on the **Label policies** tab of the **Information protection** page. If you have an existing policy that applies to all users, add this label to that policy. If you need to create a new policy, see [Publish sensitivity labels by creating a label policy](../compliance/create-sensitivity-labels.md#publish-sensitivity-labels-by-creating-a-label-policy).
You can also use [teams policies](/MicrosoftTeams/teams-policies) to control who
## SharePoint settings
-Each time you create a new team with the sensitive label, there are two steps to do in SharePoint:
+Each time you create a new team with the sensitive label, there are three steps to do in SharePoint:
- Update the guest sharing settings for the site in the SharePoint admin center to update the default sharing link to *Specific people*. - Update the site sharing settings in the site itself to prevent members from sharing the site.
+- Choose a default sensitivity label for the document library connected to the team.
### Site default sharing link settings
To configure owners-only site sharing
5. In the **Site permissions** pane, under **Site sharing**, click **Change how members can share**. 6. Under **Sharing permissions**, choose **Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**, and then click **Save**.
+### Choose a default sensitivity label for files
+
+We'll use the sensitivity label that we created as the default sensitivity label for the site document library that is connected to Teams. This will automatically apply the highly sensitive label to any new label-compatible files that are uploaded to the library. (This requires a Microsoft Syntex - SharePoint Advanced Management license.)
+
+To set a default sensitivity label for a document library
+
+1. In Teams, navigate to the **General** channel of the team you want to update.
+
+1. In the tool bar for the team, click **Files**.
+
+1. Click **Open in SharePoint**.
+
+1. In the SharePoint site, open **Settings** and then choose **Library settings**.
+
+1. From the **Library settings** flyout pane, select **Default sensitivity labels**, and then select the highly sensitive label from the drop-down box.
+
+For more details about how default library labels work, see [Configure a default sensitivity label for a SharePoint document library](/microsoft-365/compliance/sensitivity-labels-sharepoint-default-label).
## Related topics
solutions Configure Teams Three Tiers Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/configure-teams-three-tiers-protection.md
f1.keywords: NOCSH
Previously updated : 05/01/2020 Last updated : 03/09/2023 audience: ITPro
+ms.localizationpriority: normal
search.appverid: - MET150 - highpri
+- Tier1
- Ent_O365 - Strat_O365_Enterprise - M365-security-compliance
- Ent_Architecture - seo-marvel-jun2020 recommendations: false description: Learn how to configure Teams for better file sharing security using three tiers of protection, balancing security with ease of collaboration. # Configure Teams with three tiers of protection
-The articles in this series provide recommendations for configuring teams in Microsoft Teams and their associated SharePoint sites for file protection that balances security with ease of collaboration.
+
+The articles in this series provide recommendations for configuring teams in Microsoft Teams, and their associated SharePoint sites, for file protection that balances security with ease of collaboration.
This article defines four different configurations, starting with a public team with the most open sharing policies. Each additional configuration represents a meaningful step up in protection, while the ability to access and collaborate on files stored within teams is reduced to the relevant set of team members.
The configurations in this article align with Microsoft's recommendations for th
- Baseline protection -- sensitive protection
+- Sensitive protection
- Highly sensitive protection For more information about these tiers and capabilities recommended for each tier, see [Microsoft cloud for enterprise architects illustrations](./cloud-architecture-models.md)
+For information about creating a Teams meeting environment that meets your compliance requirements, see [Configure Teams meetings with three tiers of protection](/MicrosoftTeams/configure-meetings-three-tiers-protection).
+ ## Three tiers at a glance The following table summarizes the configurations for each tier. Use these configurations as starting point recommendations and adjust the configurations to meet the needs of your organization. You may not need every tier.
The following table summarizes the configurations for each tier. Use these confi
|Private or public team|Public|Private|Private|Private| |Who has access?|Everybody in the organization, including B2B users.|Only members of the team. Others can request access to the associated site.|Only members of the team.|Only members of the team.| |Private channels|Owners and members can create private channels|Owners and members can create private channels|Only owners can create private channels|Only owners can create private channels|
-|Shared channels|Owners and members can create shared channels|Owners and members can create shared channels|Only owners can create shared channels|Only owners can create shared channels|
|Site-level guest access|**New and existing guests** (default).|**New and existing guests** (default).|**New and existing guests** or **Only people in your organization** depending on team needs.|**New and existing guests** or **Only people in your organization** depending on team needs.|
-|Site sharing settings|**Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**.|**Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**.|**Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**.|**Only site owners can share files, folders, and the site**.<br>Access requests **Off**.|
-|Site-level unmanaged device access|**Full access from desktop apps, mobile apps, and the web** (default).|**Full access from desktop apps, mobile apps, and the web** (default).|**Allow limited, web-only access**.|**Block access**.|
+|Site-level conditional access|**Full access from desktop apps, mobile apps, and the web** (default).|**Full access from desktop apps, mobile apps, and the web** (default).|**Allow limited, web-only access**.|Custom conditional access policy|
|Default sharing link type|**Only people in your organization**|**Only people in your organization**|**Specific people**|**People with existing access**|
-|Sensitivity labels|None|None|Sensitivity label used to classify the team and control guest sharing and unmanaged device access.|Sensitivity label used to classify the team and control guest sharing and unmanaged device access. Label can also be used on files to encrypt files.|
+|Sensitivity labels|None|None|Sensitivity label used to classify the team and control guest sharing and unmanaged device access.|Sensitivity label used to classify the team, control guest sharing, and specify a conditional access policy. Default file label is used on files to encrypt them.|
+|Site sharing settings|**Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**.|**Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**.|**Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**.|N/A (Controlled by site-level restricted access control.)|
+|Site-level restricted access control|None|None|None|Team members only|
A variation of the Highly sensitive option, [Teams with security isolation](secure-teams-security-isolation.md) uses a unique sensitivity label for one team, which provides additional security. You can use this label to encrypt files, and only members of that team will be able to read them.
Teams for sensitive and highly sensitive protection are private teams in which s
## Sensitivity labels
-The sensitive and highly sensitive tiers use sensitivity labels to help secure the team and its files. To implement these tiers, you must enable [sensitivity labels to protect content in Microsoft Teams, Office 365 Groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md).
+The sensitive and highly sensitive tiers use sensitivity labels to help secure the team and its files. To implement these tiers, you must enable [sensitivity labels to protect content in Microsoft Teams, Microsoft 365 Groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md).
-While the baseline tier does not require sensitivity labels, consider creating a "general" label and then requiring that all teams be labeled. This will help ensure that users make a conscious choice about sensitivity when they create a team. If you plan to deploy the sensitive or highly sensitive tiers, we do recommend creating a "general" label that you can use for baseline teams and for files that are not sensitive.
+While the baseline tier does not require sensitivity labels, consider creating a "general" label and then requiring that all teams be labeled. This will help ensure that users make a conscious choice about sensitivity when they create a team. If you plan to deploy the sensitive or highly sensitive tiers, we do recommend creating a "general" label that you can use for baseline teams and for files that are not sensitive. For the highly sensitive tier, we'll also specify a default sensitivity label for document libraries so that Office files and other compatible files will have that label automatically applied when they're uploaded.
If you're new to using sensitivity labels, we recommend reading [Get started with sensitivity labels](../compliance/get-started-with-sensitivity-labels.md) to get started.
By default, team owners and members can share the site itself with people outsid
While teams do not have a read-only permission option, the SharePoint site does. If you have stakeholders of partner groups who need to be able to view team files but not edit them, consider adding them directly to the SharePoint site with Read permissions.
+For the highly sensitive tier, we'll restrict access to the site to members of the team only. This restriction will also prevent sharing files with people outside the team.
+ ## Sharing files and folders
-By default, both owners and members of the team can share files and folders with people outside the team. This may include people outside your organization, if you have allowed guest sharing. In all three tiers, we update the default sharing link type to help avoid accidental oversharing. In the highly sensitive tier, we restrict such sharing to team owners only.
+By default, both owners and members of the team can share files and folders with people outside the team. This may include people outside your organization, if you have allowed guest sharing. In all three tiers, we update the default sharing link type to help avoid accidental oversharing. In the highly sensitive tier, we restrict such sharing to team owners only. As noted above, in the highly sensitive tier, file access is limited to team members only.
## Sharing with people outside your organization
If you plan to use guest sharing, we recommend configuring [SharePoint and OneDr
Teams guest sharing is on by default, but you can turn it off if needed in the sensitive and highly sensitive tiers by using a sensitivity label. Shared channels are on by default, but require setting up cross-organizational relationships for each organization you want to collaborate with. See [Collaborate with external participants in a channel](collaborate-teams-direct-connect.md) for details.
-In the highly sensitive tier, we configure the sensitivity label to encrypt files to which it is applied. If you need guests to have access to these files, you must give them permissions when you create the label. External participants in shared channels can't be given permissions to sensitivity labels and can't access content encrypted by a sensitivity label.
+In the highly sensitive tier, we configure the default library sensitivity label to encrypt files to which it is applied. If you need guests to have access to these files, you must give them permissions when you create the label. External participants in shared channels can't be given permissions to sensitivity labels and can't access content encrypted by a sensitivity label.
We highly recommend that you leave guest sharing on for the baseline tier and for the sensitive or highly sensitive tiers if you need to collaborate with people outside your organization. The guest sharing features in Microsoft 365 provide a much more secure and governable sharing experience than sending files as attachments in email messages. It also reduces the risk of shadow IT where users use ungoverned consumer products to share with legitimate external collaborators.
-If you regularly collaborate with other organizations that use Azure AD, shared channels may be a good option. Shared channels appear seamlessly in the other organization's Teams client and allow external participants to use their regular user account for their organization rather than having to login in separately using a guest account.
+If you regularly collaborate with other organizations that use Azure AD, shared channels may be a good option. Shared channels appear seamlessly in the other organization's Teams client and allow external participants to use their regular user account for their organization rather than having to log in separately using a guest account.
See the following references to create a secure and productive guest sharing environment for your organization:
See the following references to create a secure and productive guest sharing env
- [Limit accidental exposure to files when sharing with people outside your organization](share-limit-accidental-exposure.md) - [Create a secure guest sharing environment](create-secure-guest-sharing-environment.md)
-## Access from unmanaged devices
+## Conditional access policies
+
+Azure AD conditional access offers many options for determining how people access Microsoft 365, including limitations based on location, risk, device compliance, and other factors. We recommend you read [What is Conditional Access?](/azure/active-directory/conditional-access/overview) and consider which additional policies might be appropriate for your organization.
+
+For the sensitive and highly sensitive tiers, we use sensitivity labels to restrict access to SharePoint content.
+
-For the sensitive and highly sensitive tiers, we restrict access to SharePoint content with sensitivity labels. Azure AD conditional access offers many options for determining how people access Microsoft 365, including limitations based on location, risk, device compliance, and other factors. We recommend you read [What is Conditional Access?](/azure/active-directory/conditional-access/overview) and consider which additional policies might be appropriate for your organization.
+For the sensitive tier, we'll restrict access to web-only for unmanaged devices. (Note that guests often don't have devices that are managed by your organization. If you allow guests in any of the tiers, consider what kinds of devices they'll be using to access teams and sites and set your unmanaged device policies accordingly.)
-Note that guests often don't have devices that are managed by your organization. If you allow guests in any of the tiers, consider what kinds of devices they'll be using to access teams and sites and set your unmanaged device policies accordingly.
+For the highly sensitive tier, we'll use [Azure Active Directory authentication context](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#configure-authentication-contexts) with the sensitivity label to trigger a custom conditional access policy when people access the SharePoint site associate with the team.
-### Control device access across Microsoft 365
+### Conditional access across Teams-related services
-The unmanaged devices setting in sensitivity labels only affect SharePoint access. If you want to expand control of unmanaged devices beyond SharePoint, you can [Create an Azure Active Directory conditional access policy for all apps and services in your organization](/azure/active-directory/conditional-access/howto-conditional-access-policy-compliant-device) instead. To configure this policy specifically for [Microsoft 365 services](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#office-365), select the **Office 365** cloud app under **Cloud apps or actions**.
+The conditional access settings in sensitivity labels only affect SharePoint access. If you want to expand conditional access beyond SharePoint, you can [Create an Azure Active Directory conditional access policy for all apps and services in your organization](/azure/active-directory/conditional-access/howto-conditional-access-policy-compliant-device) instead. To configure this policy specifically for [Microsoft 365 services](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#office-365), select the **Office 365** cloud app under **Cloud apps or actions**.
-![Screenshot of the Office 365 cloud app in an Azure Active Directory conditional access policy.](/sharepoint/sharepointonline/media/azure-ca-office365-policy.png)
+![Screenshot of the Office 365 cloud app in an Azure Active Directory conditional access policy.](../media/azure-ca-office365-policy.png)
Using a policy that affects all Microsoft 365 services can lead to better security and a better experience for your users. For example, when you block access to unmanaged devices in SharePoint only, users can access the chat in a team with an unmanaged device, but will lose access when they try to access the **Files** tab. Using the Office 365 cloud app helps avoid issues with [service dependencies](/azure/active-directory/conditional-access/service-dependencies).
Using a policy that affects all Microsoft 365 services can lead to better securi
Start by [configuring the baseline level of protection](configure-teams-baseline-protection.md). If needed you can add [sensitive protection](configure-teams-sensitive-protection.md) and [highly sensitive protection](configure-teams-highly-sensitive-protection.md) on top of the baseline.
-## See also
+## Related topics
[Security and compliance in Microsoft Teams](/microsoftteams/security-compliance-overview)
solutions Productivity Illustrations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/productivity-illustrations.md
Depending on your environment, some tools are better suited for certain architec
| Item | Description | |:--|:--|
-|[![Thumb image for Microsoft Defender for Endpoint deployment strategy.](../medie-deployment-strategy.vsdx) <br>Updated September 2021| The architectural material helps you plan your deployment for the following architectures: <ul><li> Cloud-native </li><li> Co-management </li><li> On-premise</li><li>Evaluation and local onboarding</li> |
+|[![Thumb image for Microsoft Defender for Endpoint deployment strategy.](../medie-deployment-strategy.vsdx) <br>Updated September 2021| The architectural material helps you plan your deployment for the following architectures: <ul><li> Cloud-native </li><li> Co-management </li><li> On-premises</li><li>Evaluation and local onboarding</li> |
<!-- <a name="BKMK_O365IDP"></a>
Updated June 2021
For more information, see the article for this poster: [Set up your infrastructure for hybrid work with Microsoft 365](empower-people-to-work-remotely.md).
-## Microsoft Teams with security isolation
-
-With Microsoft 365, you can configure a private team in Microsoft Teams and use SharePoint site security settings and a unique sensitivity label to encrypt files so that only team members can decrypt them.
-
-[![Microsoft Teams with security isolation poster.](../media/secure-teams-security-isolation/team-security-isolation-poster.png)](../downloads/team-security-isolation-poster.pdf) <br/>
-[PDF](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/team-security-isolation-poster.pdf) | [PowerPoint](https://download.microsoft.com/download/8/0/5/8057fc16-c044-40b6-a652-7ed555ba2895/team-security-isolation-poster.pptx) <br>
-Updated August 2020
-
-For more information, see the article for this poster: [Configure a team with security isolation](secure-teams-security-isolation.md).
-- ## See Also [Architectural models for SharePoint, Exchange, Skype for Business, and Lync](../enterprise/architectural-models-for-sharepoint-exchange-skype-for-business-and-lync.md)
solutions Secure Teams Security Isolation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/secure-teams-security-isolation.md
- Title: "Configure a team with security isolation by using a unique sensitivity label"--- Previously updated : 05/01/2020----- highpri-- M365-subscription-management-- Strat_O365_Enterprise-- m365solution-3tiersprotection-- m365solution-securecollab--- Ent_Solutions-- admindeeplinkCOMPLIANCE-- admindeeplinkSPO
-recommendations: false
-description: "Learn how to create a team with a unique sensitivity label for security."
--
-# Configure a team with security isolation by using a unique sensitivity label
-
-This article provides you with recommendations and steps to configure a private team in Microsoft Teams and use a unique sensitivity label to encrypt files so that only team members can decrypt them.
-
-Beyond the private access, this article describes how to configure the associated SharePoint site, which you can access from the **Files** section of a team channel, for the additional security needed to store highly regulated data.
-
-The elements of configuration for a team with security isolation are:
--- A private team-- Additional security on the associated SharePoint site for the team that:
- - Prevents members of the site from sharing the site with others.
- - Prevents non-members of the site from requesting access to the site.
-- A sensitivity label specifically for this team that:
- - Prevents access to SharePoint content from unmanaged devices
- - Allows or denies guest access to the team, depending on your requirements
- - Encrypts documents to which the label is applied
-
-> [!IMPORTANT]
-> Be sure you have enabled [sensitivity labels to protect content in Microsoft Teams, Office 365 groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md) before you proceed with the steps in this article.
-
-Watch this video for an overview of the deployment process.
-<br>
-<br>
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4mGHf]
-
-<a name="poster"></a>
-For a 1-page summary of this scenario, see the [Microsoft Teams with security isolation poster](../downloads/team-security-isolation-poster.pdf).
-
-[![Microsoft Teams with security isolation poster.](../media/secure-teams-security-isolation/team-security-isolation-poster.png)](../downloads/team-security-isolation-poster.pdf)
-
-You can also download this poster in [PDF](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/team-security-isolation-poster.pdf) or [PowerPoint](https://download.microsoft.com/download/8/0/5/8057fc16-c044-40b6-a652-7ed555ba2895/team-security-isolation-poster.pptx) formats and print it on letter, legal, or tabloid (11 x 17) size paper.
-
-Try this configuration in your own test lab environment with [these instructions](team-security-isolation-dev-test.md).
-
-See how the Contoso Corporation used an isolated team for a top-secret project in [this case study](contoso-team-for-top-secret-project.md).
-
-## Initial protections
-
-To help protect access to the team and its underlying SharePoint site, review the following best practices:
-- [Identity and device access policies](../security/office-365-security/identity-access-policies.md)-- [SharePoint Online access policies](../security/office-365-security/sharepoint-file-access-policies.md)-- [Deploy teams with baseline protection](configure-teams-baseline-protection.md)-
-## Guest sharing
-
-Depending on the nature of your business, you may or may not want to enable guest sharing for this team. If you do plan to collaborate with people outside your organization in the team, enable guest sharing.
-
-For details about sharing with guests securely, see the following resources:
--- [Limit accidental exposure to files when sharing with people outside your organization](./share-limit-accidental-exposure.md)-- [Create a secure guest sharing environment](./create-secure-guest-sharing-environment.md)-
-To allow or block guest sharing, we use a combination of a sensitivity label for the team and site-level sharing controls for the associated SharePoint site, both discussed later.
-
-## Create a private team
-
-Since we are creating a sensitivity label specifically for this team, the next step is to create the team. If you have an existing team, you can use that.
-
-To create a team for sensitive information
-1. In Teams, click **Teams** on the left side of the app, then click **Join or create a team** at the bottom of the teams list.
-2. Click **Create team** (first card, top left corner).
-3. Choose **Build a team from scratch**.
-4. In the **Sensitivity** list, keep the default.
-5. Under **Privacy**, click **Private**.
-6. Type a name for the team that is related to your sensitive project. For example, **Project Saturn**.
-7. Click **Create**.
-8. Add users to the team, and then click **Close**.
-
-## Private channel settings
-
-We recommend restricting creating private channels to team owners.
-
-To restrict private channel creation
-1. In the team, click **More options**, and then click **Manage team**.
-2. On the **Settings** tab, expand **Member permissions**.
-3. Clear the **Allow members to create private channels** check box.
-
-You can also use [teams policies](/MicrosoftTeams/teams-policies) to control who can create private channels.
-
-## Create a sensitivity label
-
-To configure a team for security isolation, we'll be using a sensitivity label created specifically for this team. This label is used at the team level to control guest sharing and to block access from unmanaged devices. It can also be used to classify and encrypt individual files in the team so that only team owners and members can open them.
-
-If you have an internal partner or stakeholder group who should be able to view encrypted documents but not edit them, you can add them to the label with view-only permissions. You can then add these people to the team's SharePoint site with Reader permissions, and they will have read-only access to the site where the documents are kept, but not the team itself.
-
-To create a sensitivity label
-
-1. Open the Microsoft Purview compliance portal, and under **Solutions**, select <a href="https://go.microsoft.com/fwlink/p/?linkid=2174015" target="_blank">**Information protection**</a>.
-1. Click **Create a label**.
-1. Give the label a name. We suggest naming it after the team that you'll be using it with.
-1. Add a display name and description, and then click **Next**.
-1. On the **Define the scope for this label page**, select **Files & emails** and **Groups & sites** and click **Next**.
-1. On the **Choose protection settings for files and emails** page, select **Encrypt files and emails**, and then click **Next**.
-1. On the **Encryption** page, choose **Configure encryption settings**.
-1. Click **Add users or groups**, select the team that you created, and then click **Add**
-1. Click **Choose permissions**.
-1. Choose **Co-Author** from the dropdown list, and then click **Save**.
-1. If you want to include users or groups with read-only access to files with the label:
- 1. Click **Assign permissions**.
- 1. Click **Add users or groups**, select the users or groups that you want to add, and then click **Add**.
- 1. Click **Choose permissions**.
- 1. Choose **Viewer** from the dropdown list, and then click **Save**.
-13. Click **Save**, and then click **Next**.
-14. On the *Auto-labeling for files and emails** page, click **Next**.
-15. On the **Define protection settings for groups and sites** page, select **Privacy and external user access settings** and **Device access and external sharing settings** and click **Next**.
-16. On the **Define privacy and external user access settings** page, under **Privacy**, select the **Private** option.
-17. If you want to allow guest access, under **External user access**, select **Let Microsoft 365 Group owners add people outside your organization to the group as guests**.
-18. Click **Next**.
-19. On the **Define external sharing and device access settings** page, select **Control external sharing from labeled SharePoint sites**.
-20. Under **Content can be shared with**, choose **New and existing guests** if you're allowing guest access or **Only people in your organization** if not.
-21. Under **Access from unmanaged devices**, choose **Block access**.
-22. Click **Next**.
-23. On the **Auto-labeling for database columns** page, click **Next**.
-24. Click **Create label**, and then click **Done**.
-
-Once you've created the label, you need to publish it to the users who will use it. In this case, we'll make the label available only to people in the team.
-
-To publish a sensitivity label:
-
-1. In the Microsoft Purview compliance portal, on the <a href="https://go.microsoft.com/fwlink/p/?linkid=2174015" target="_blank">**Information protection** page</a>, choose the **Label policies** tab.
-2. Click **Publish labels**.
-3. On the **Choose sensitivity labels to publish** page, click **Choose sensitivity labels to publish**.
-4. Select the label that you created, and then click **Add**.
-5. Click **Next**.
-6. On the Publish to users and groups page, click **Choose users and groups**.
-7. Click **Add**, and then select the team that you created.
-8. Click **Add**, and then click **Done**.
-9. Click **Next**.
-10. On the Policy settings page, select the **Users must provide justification to remove a label or lower classification label** check box, and then click **Next**.
-11. Type a name for the policy, and then click **Next**.
-12. Click **Submit** and then click **Done**.
-
-## Apply the label to the team
-
-Once the label has been published, you must apply it to the team in order for the guest sharing and managed devices settings to take effect. This is done in the SharePoint admin center. Note, it may take some time for the label to become available after it's been published.
-
-To apply the sensitivity label
-
-1. Open the SharePoint admin center, and under **Sites**, select <a href="https://go.microsoft.com/fwlink/?linkid=2185220" target="_blank">**Active sites**</a>.
-1. Select the site that is associated with team.
-1. On the **Policies** tab, under **Sensitivity**, select **Edit**.
-1. Select the label that you created, and then select **Save**.
-
-## SharePoint settings
-
-There are three steps to do in SharePoint:
--- Update the guest sharing settings for the site in the SharePoint admin center to match what you chose when you created the label, and update the default sharing link to *People with existing access*.-- Update the site sharing settings in the site itself to prevent members from sharing files, folders, or the site, and turn off access requests.-- If you added people or groups to the label with Viewer permissions, you can add them to the SharePoint site with Read permissions.-
-### SharePoint guest settings
-
-The guest sharing setting that you chose when you created the label (which only affects team membership) should match the guest sharing settings for the associated SharePoint site as follows:
-
-|Label setting|SharePoint site setting|
-|:|:-|
-|**Let Office 365 group owners add people outside the organization to the group** selected|**New and existing guests** (default for new teams)|
-|**Let Office 365 group owners add people outside the organization to the group** not selected|**Only people in your organization**|
-
-We'll also update the default sharing link type to reduce the risk of accidentally sharing files and folders to a wider audience than intended.
-
-To update site settings
-
-1. Open the SharePoint admin center, and under **Sites**, select <a href="https://go.microsoft.com/fwlink/?linkid=2185220" target="_blank">**Active sites**</a>
-1. Select the site that is associated with team.
-1. On the **Policies** tab, under **External sharing**, select **Edit**.
-1. If you allowed guest sharing when you created the sensitive label, ensure that **New and existing guests** is selected. If you didn't allow sharing when you created the label, choose **Only people in your organization**.
-1. Under Default sharing link type, clear the **Same as organization-level setting** check box, and select **People with existing access**.
-1. Select **Save**.
-
-#### Private channels
-
-If you add private channels to the team, each private channel creates a new SharePoint site with the default sharing settings. These sites are not visible in the SharePoint admin center, so you must use the [Set-SPOSite](/powershell/module/sharepoint-online/set-sposite) PowerShell cmdlet with the following parameters to update the guest sharing settings:
--- `-SharingCapability Disabled` to turn off guest sharing (it's on by default)-- `-DefaultSharingLinkType Internal` to change the default sharing link to *Specific people*-
-If you don't plan to use private channels with your team, consider turning off the ability for team members to create them under **Member permissions** in [team settings](https://support.microsoft.com/office/ce053b04-1b8e-4796-baa8-90dc427b3acc).
-
-### Site sharing settings
-
-To help ensure that the SharePoint site does not get shared with people who are not members of the team, we limit such sharing to owners. We also limit sharing of files and folders to team owners. This helps ensure that owners are aware whenever a file is shared with someone outside the team.
-
-To configure owners-only site sharing
-1. In Teams, navigate to the **General** tab of the team you want to update.
-2. In the tool bar for the team, click **Files**.
-3. Click the ellipsis, and then click **Open in SharePoint**.
-4. In the tool bar of the underlying SharePoint site, click the settings icon, and then click **Site permissions**.
-5. In the Site permissions pane, under **Sharing Settings**, click **Change sharing settings**.
-6. Under **Sharing permissions**, choose **Only site owners can share files, folders, and the site**, and then click **Save**.
-
-### Custom site permissions
-
-If you added people with Viewer permissions to the sensitivity label, you can add them to the SharePoint site with Read access so they have easy access to the files.
-
-To add users to the site
-1. In the site, click the settings icon, and then click **Site permissions**.
-2. Click **Invite people**, and then click **Share site only**.
-3. Type the names of the users and groups that you want to invite.
-4. For each person or group that you add, change their permissions from **Edit** to **Read**.
-5. Choose if you want to send them an email with a link to the site.
-6. Click **Add**.
-
-## Additional protections
-
-Microsoft 365 offers additional methods for securing your content. Consider if the following options would help improve security for your organization.
--- Have your guests agree to a [terms of use](/azure/active-directory/conditional-access/terms-of-use).-- Configure a [session timeout policy](/azure/active-directory/conditional-access/howto-conditional-access-session-lifetime) for guests.-- Create [sensitive information types](../compliance/sensitive-information-type-learn-about.md) and use [data loss protection](../compliance/dlp-learn-about-dlp.md) to set policies around accessing sensitive information.-- Use [Azure Active Directory access](/azure/active-directory/governance/access-reviews-overview) reviews to periodically review team access and membership.-
-## Drive user adoption for team members
-
-With the team in place, it's time to drive the adoption of this team and its additional security to team members.
-
-### Train your users
-
-Members of the team can access the team and all of its resources, including chats, meetings, and other apps. When working with files from the **Files** section of a channel, members of the team should assign the sensitivity label to the files they create.
-
-When the label gets applied to the file, it is encrypted. Members of the team can open it and collaborate in real time. If the file leaves the site and gets forwarded to a malicious user, they will have to supply credentials of a user account that is member of the team to open the file and view its contents.
-
-Train your team members:
--- On the importance of using the new team for chats, meetings, files, and the other resources of the SharePoint site and the consequences of a highly regulated data leak, such as legal ramifications, regulatory fines, ransomware, or loss of competitive advantage.-- How to access the team.-- How to create new files on the site and upload new files stored locally.-- How to label files with the correct sensitivity label for the team.-- How the label protects files even when they are leaked off the site.-
-This training should include hands-on exercises so that your team members can experience these capabilities and their results.
-
-### Conduct periodic reviews of usage and address team member feedback
-
-In the weeks after training:
--- Quickly address team member feedback and fine tune policies and configurations.-- Analyze usage for the team and compare it with usage expectations.-- Verify that highly regulated files have been properly labeled with the sensitivity label. (You can see which files have a label assigned by viewing a folder in SharePoint and adding the **Sensitivity** column through the **Show/hide columns** option of **Add column**.-
-Retrain your users as needed.
-
-## See also
-
-[Azure AD Privileged Identity Management](/azure/active-directory/privileged-identity-management/pim-configure)
syntex Content Processing Create Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/content-processing-create-rules.md
description: Learn how to create a rule to move or copy a file to another ShareP
# Create a rule to move or copy a file from one document library to another in Microsoft Syntex
-Microsoft Syntex lets you build simple rules-driven actions in document libraries based on metadata. From a document library, you can create rules to automate tasks such as sending a notification when metadata changes in a file, when a new file is created in the library, or when files are moved or copied based on metadata extracted by Syntex models.
-
- ![Diagram of the create rules workflow.](../media/content-understanding/create-rule.png)
-
-You'll choose a condition that triggers the rule and the action that the rule will take.
-For example, you can create a rule to move files tagged with a specific customer to a specific library or folder. These rules help you structure your content architecture with the power of AI-driven processing.
-
-Document libraries can have multiple move and copy rules to support moving and copying files to different destination libraries based on metadata criteria.
-
-> [!NOTE]
-> This feature is available only for users who are licensed for Syntex.
-
-## Move or copy a file
- To move or copy a file from one document library to another, follow these steps. 1. In the document library, select **Automate** > **Rules** > **Create a rule**.
To move or copy a file from one document library to another, follow these steps.
![Screenshot of the document library showing the Automate > Rules > Manage rules option.](../media/content-understanding/content-processing-manage-rule.png)
-2. On the **Manage rules** page, you can see the rules that have been applied. You can turn on or off a rule or [create a new rule](#move-or-copy-a-file) to automate actions on a specific document library.
+2. On the **Manage rules** page, you can see the rules that have been applied. You can turn on or off a rule or [create a new rule](#create-a-rule-to-move-or-copy-a-file-from-one-document-library-to-another-in-microsoft-syntex) to automate actions on a specific document library.
![Screenshot of the Manage rules page showing the rule and actions.](../media/content-understanding/content-processing-manage-rules-page.png)
In the document library, in the upper-right corner of the page, select the detai
> [!NOTE] > Currently, the activity feed shows only move activity. Copy activity will be available in a future release.+
+## See also
+
+[Overview of content processing](content-processing-overview.md)
syntex Content Processing Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/content-processing-overview.md
+
+ Title: Overview of content processing in Microsoft Syntex
++++ Last updated : 03/08/2023
+audience: admin
++
+search.appverid:
+
+ - enabler-strategic
+ - m365initiative-syntex
+ms.localizationpriority: medium
+description: Learn how to create rules to automate tasks in Microsoft Syntex.
++
+# Overview of content processing in Microsoft Syntex
+
+Microsoft Syntex lets you build simple rules-driven actions in document libraries based on metadata. From a document library, you can create rules to automate tasks such as sending a notification when metadata changes in a file, when a new file is created in the library, or when files are moved or copied based on metadata extracted by Syntex models.
+
+ ![Diagram of the create rules workflow.](../media/content-understanding/create-rule.png)
+
+You'll choose a condition that triggers the rule and the action that the rule will take.
+For example, you can create a rule to move files tagged with a specific customer to a specific library or folder. These rules help you structure your content architecture with the power of AI-driven processing.
+
+Document libraries can have multiple move and copy rules to support moving and copying files to different destination libraries based on metadata criteria.
+
+> [!NOTE]
+> This feature is available only for users who are licensed for Syntex.
+
+## See also
+
+[Create a rule to move or copy a file from one document library to another](content-processing-create-rules.md)
syntex Syntex Pay As You Go Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/syntex-pay-as-you-go-services.md
When you use Microsoft Syntex pay-as-you-go, services are billed using Syntex me
|Service|What's counted?|What's billed?| |:-|:--|:-|
-|Unstructured document processing|The number of pages processed for Word, PDF, or TIFF files; the number of sheets for Excel files; the number of slides for PowerPoint files; or the number of files for other file types. You won't be charged for model training. You will be charged for processing whether or not there's a positive classification, or any entities extracted.<br><br>Processing occurs on document upload and on subsequent updates. Processing is counted for each model applied. For example, if you have two models applied to a library and you upload or update a five-page document in that library, the total pages processed is 10.|$0.10/page|
-|Prebuilt document processing|The number of pages processed for PDF or image files. You won't be charged for model training. You will be charged for processing whether or not there's a positive classification, or any entities extracted.<br><br>Processing occurs on document upload and on subsequent updates. Processing is counted for each model applied. For example, if you have two models applied to a library and you upload or update a five-page document in that library, the total pages processed is 10.|$0.01/page|
+|Unstructured document processing|The number of pages processed for Word, PDF, or TIFF files; the number of sheets for Excel files; the number of slides for PowerPoint files; or the number of files for other file types. Each of these counts as one transaction. You won't be charged for model training. You will be charged for processing whether or not there's a positive classification, or any entities extracted.<br><br>Processing occurs on document upload and on subsequent updates. Processing is counted for each model applied. For example, if you have two models applied to a library and you upload or update a five-page document in that library, the total pages processed is 10.|$0.10/transaction|
+|Prebuilt document processing|The number of pages processed for PDF or image files. Each of these counts as one transaction. You won't be charged for model training. You will be charged for processing whether or not there's a positive classification, or any entities extracted.<br><br>Processing occurs on document upload and on subsequent updates. Processing is counted for each model applied. For example, if you have two models applied to a library and you upload or update a five-page document in that library, the total pages processed is 10.|$0.01/transaction|
## Related topics
whiteboard Manage Data Organizations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-data-organizations.md
Previously updated : 11/04/2021 Last updated : 03/08/2023 audience: admin
Data controls planned for future releases:
- Analytics - More eDiscovery support
-### Transferring whiteboard when a user leaves the company
+### Transfer whiteboard when a user leaves the company
To preserve a former user's OneDrive files, including .whiteboard files, first give yourself access to their OneDrive, and then move the files you want to keep. -- In the admin center, go to the **Users** > [Active users](https://go.microsoft.com/fwlink/p/?linkid=834822) page. -- Select a user. -- On the user properties page, select **OneDrive**. Under Get access to files, select **Create link to files**. -- Select the link to open the file location. -- Select the files or folders that you want to move, and then select **Move to**.
+1. In the admin center, go to the **Users** > [Active users](https://go.microsoft.com/fwlink/p/?linkid=834822) page.
+2. Select a user.
+3. On the user properties page, selectΓÇ»**OneDrive**. UnderΓÇ»**Get access to files**, selectΓÇ»**Create link to files**.
+4. Select the link to open the file location.
+5. Select the files or folders that you want to move, and then selectΓÇ»**Move to**.
-Learn more about preserving former userΓÇÖs content: [Step 5 - Give another employee access to OneDrive and Outlook data - Microsoft 365 admin | Microsoft Learn](/admin/add-users/remove-former-employee-step-5)
+Learn more about preserving a former userΓÇÖs content: [Step 5 - Give another employee access to OneDrive and Outlook data - Microsoft 365 admin | Microsoft Learn](/admin/add-users/remove-former-employee-step-5)
-### Managing moved whiteboards
+### Manage moved whiteboards
-Once the .whiteboard file appears in the OneDrive for Business of the new owner, they can open, edit, rename or delete the files.
+Once the .whiteboard file appears in the OneDrive for Business of the new owner, they can open, edit, rename, or delete the files.
-- Open office.com and in the app launcher, select OneDrive. -- In the left-hand navigation pane, select My Files. -- Open the folder called Whiteboards. -- In the list of files, select the moved file and click the ... button to get rename, delete and other options.
+1. Open office.com and in the app launcher, select **OneDrive**.
+2. In the left-hand navigation pane, select **My Files**.
+3. Open the folder named **Whiteboards**.
+4. In the list of files, select the moved file and select the **...** button to get rename, delete, and other options.
## See also