Updates from: 03/11/2023 03:57:23
Category Microsoft Docs article Related commit history on GitHub Change details
admin Increase Threat Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/increase-threat-protection.md
search.appverid: - BCS160 - MET150
-description: "Set up Microsoft Defender for Office 365 and safeguard sensitive data against phishing, malware, and other threats."
+description: "Make choices to safeguard sensitive organizational data against phishing, malware, and other threats."
# Increase threat protection for Microsoft 365 for business
-Check out [Microsoft 365 small business help](https://go.microsoft.com/fwlink/?linkid=2197659) on YouTube.
-
-This article helps you increase the protection in your Microsoft 365 subscription to protect against phishing, malware, and other threats. These recommendations are appropriate for organizations with an increased need for security, like law offices and health care clinics.
-
-Before you begin, check your Office 365 Secure Score. Office 365 Secure Score analyzes your organization's security based on your regular activities and security settings, and assigns a score. Begin by taking note of your current score. To increase your score, complete the actions recommended in this article. The goal isn't to achieve the maximum score, but to be aware of opportunities to protect your environment that don't negatively affect productivity for your users.
-
-For more information, see [Microsoft Secure Score](../../security/defender/microsoft-secure-score.md).
-
-## Watch: Raise the level of protection against malware in mail
-
-Your Office 365 or Microsoft 365 environment includes protection against malware. You can increase this protection by blocking attachments with file types that are commonly used for malware.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4OA7Z?autoplay=false]
-
-1. From the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>, choose **Show more**, **Admin centers**, and then **Security**.
-
-1. Go to **Email & collaboration** \> **Policies & rules** \> **Threat policies**.
-
-1. From the policies available, choose **Anti-malware**.
-
-To increase malware protection in email:
-
-1. In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Anti-malware** in the **Policies** section.
-
-1. On the **Anti-malware** page, double-click on **Default (Default)**. A flyout appears.
-
-1. Select **Edit protection settings** at the bottom of the flyout.
-
-1. under **Protection settings**, select the checkbox next to **Enable the common attachments filter**. The file types that are blocked are listed directly below this control. Make sure that you add these file types:
-
- `ade, adp, ani, bas, bat, chm, cmd, com, cpl, crt, hlp, ht, hta, inf, ins, isp, job, js, jse, lnk, mda, mdb, mde, mdz, msc, msi, msp, mst, pcd, reg, scr, sct, shs, url, vb, vbe, vbs, wsc, wsf, wsh, exe, pif`
-
- To add or delete file types, select **Customize file types** at the end of the list.
-
-1. Select **Save.**
-
-For more information, see [Anti-malware protection in EOP](../../security/office-365-security/anti-malware-protection-about.md).
-
-## Watch: Protect against ransomware
-
-Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198018).
-
-Ransomware restricts access to data by encrypting files or locking computer screens. It then attempts to extort money from victims by asking for "ransom," usually in the form of cryptocurrencies like Bitcoin, in exchange for access to data.
-
-To protect against ransomware, create one or more mail flow rules to block file extensions that are commonly used for ransomware. (You added these rules in the [Watch: Raise the level of protection against malware in mail](#watch-raise-the-level-of-protection-against-malware-in-mail) step.) You can also warn users who receive these attachments in email.
-
-In addition to the files that you blocked in the previous step, it's a good practice to create a rule to warn users before opening Office file attachments that include macros. Ransomware can be hidden inside macros, so warn users not to open these files from people they don't know.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWrWGt?autoplay=false]
-
-1. From the admin center at [https://admin.microsoft.com](https://admin.microsoft.com), choose **Exchange** under **Admin centers**.
-
-1. From the menu on the left, choose **mail flow**.
-
-1. On the rules tab, choose the arrow next to the plus (+) symbol, and then choose **Create a new rule**.
-
-1. On the **new rule** page, enter a name for your rule, scroll to the bottom, and then choose **More options**.
-
-To create a mail transport rule:
-
-1. Go to the admin center at <https://admin.microsoft.com>, and choose **Admin centers** \> **Exchange**.
-
-2. In the **mail flow** category, select **rules**.
-
-3. Select **+**, and then select **Create a new rule**.
-
-4. Select **More options** at the bottom of the dialog box to see the full set of options.
-
-5. Apply the settings in the following table for the rule. Use the default values for the rest of the settings, unless you want to change them.
-
-6. Select **Save**.
-
-|Setting|Warn users before opening attachments of Office files|
-|||
-|Name|Anti-ransomware rule: warn users|
-|Apply this rule if . . .|Any attachment . . . file extension matches . . .|
-|Specify words or phrases|Add these file types: <br/> dotm, docm, xlsm, sltm, xla, xlam, xll, pptm, potm, ppam, ppsm, sldm|
-|Do the following . . .|Notify the recipient with a message|
-|Provide message text|Do not open these types of files from people you do not know because they might contain macros with malicious code.|
-
-For more information, see:
--- [Ransomware: how to reduce risk](https://www.microsoft.com/security/blog/2020/04/28/ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk/)--- [Restore your OneDrive](https://support.microsoft.com/office/fa231298-759d-41cf-bcd0-25ac53eb8a15)-
-## Stop auto-forwarding for email
-
-Hackers who gain access to a user's mailbox can steal mail by setting the mailbox to automatically forward email. This can happen even without the user's awareness. To prevent this from happening, configure a mail flow rule.
-
-To create a mail transport rule, follow these steps:
-
-1. In the Microsoft 365 admin center, select **Admin centers** \> **Exchange**.
-
-2. In the **mail flow** category, select **rules**.
-
-3. Select **+**, and then select **Create a new rule**.
-
-4. To see all the options, select **More options** at the bottom of the dialog box.
+**Applies to**
-5. Apply the settings in the following table. Use the default values for the rest of the settings, unless you want to change them.
+- Microsoft 365 Business Basic
+- Microsoft 365 Business Standard
+- Microsoft 365 Business Premium
-6. Select **Save**.
-
-|Setting|Warn users before opening attachments of Office files|
-|||
-|Name|Prevent auto forwarding of email to external domains|
-|Apply this rule if ...|The sender . . . is external/internal . . . Inside the organization|
-|Add condition|The message properties . . . include the message type . . . Auto-forward|
-|Do the following ...|Block the message . . . reject the message and include an explanation.|
-|Provide message text|Auto-forwarding email outside this organization is prevented for security reasons.|
-
-## Watch: Protect your email from phishing attacks
-
-Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198014).
-
-If you've configured one or more custom domains for your Office 365 or Microsoft 365 environment, you can configure targeted anti-phishing protection. Anti-phishing protection, part of Microsoft Defender for Office 365, can help protect your organization from malicious impersonation-based phishing attacks and other phishing attacks. If you haven't configured a custom domain, you don't need to do this.
-
-We recommend that you get started with this protection by creating a policy to protect your most important users and your custom domain.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWvt9r?autoplay=false]
-
-1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>.
-
-2. Go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Anti-phishing** in the **Policies** section.
-
-3. On the **Anti-phishing** page, select **+ Create**. A wizard launches that steps you through defining your anti-phishing policy.
-
-4. Specify the name, description, and settings for your policy as recommended in the following table. For more details, see [Learn about anti-phishing policy in Microsoft Defender for Office 365 options](../../security/office-365-security/anti-phishing-policies-about.md).
-
-5. After you've reviewed your settings, choose **Create this policy** or **Save**, as appropriate.
-
-|Setting or option|Recommended setting|
-|||
-|Name|Domain and most valuable campaign staff|
-|Description|Ensure most important staff and our domain are not being impersonated.|
-|Add users to protect|Select **+ Add a condition, The recipient is**. Type user names or enter the email address of the candidate, campaign manager, and other important staff members. You can add up to 20 internal and external addresses that you want to protect from impersonation.|
-|Add domains to protect|Select **+ Add a condition, The recipient domain is**. Enter the custom domain associated with your Microsoft 365 subscription, if you defined one. You can enter more than one domain.|
-|Choose actions|If email is sent by an impersonated user: Choose **Redirect message to another email address**, and then type the email address of the security administrator; for example, *Alice<span><span>@contoso.com*. If email is sent by an impersonated domain: Choose **Quarantine message**.|
-|Mailbox intelligence|By default, mailbox intelligence is selected when you create a new anti-phishing policy. Leave this setting **On** for best results.|
-|Add trusted senders and domains|Here you can add your own domain, or any other trusted domains.|
-|Applied to|Select **The recipient domain is**. Under **Any of these**, select **Choose**. Select **+ Add**. Select the check box next to the name of the domain, for example, *contoso.<span><span>com*, in the list, and then select **Add**. Select **Done**.|
-
-## Watch: Protect against malicious attachments and files with Safe Attachments
-
-Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198019).
-
-People regularly send, receive, and share attachments, such as documents, presentations, spreadsheets, and more. It's not always easy to tell whether an attachment is safe or malicious just by looking at an email message. Microsoft Defender for Office 365, formerly called Microsoft 365 ATP, or Advanced Threat Protection, includes Safe Attachment protection, but this protection is not turned on by default. We recommend that you create a new rule to begin using this protection. This protection extends to files in SharePoint, OneDrive, and Microsoft Teams.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWtn3I?autoplay=false]
-
-1. Go to the [admin center](https://admin.microsoft.com), and select **Setup**.
-1. Scroll down to **Increase protection from advanced threats**. Select **View**, **Manage**, and then **ATP safe attachments**.
-1. Select your safe attachments rule, and then choose the **Edit** icon.
-1. Select **settings**, and then verify that Block is selected.
-1. Scroll down. Choose **Enable redirect**, and enter your email address or the address of the person you want to review the blocked attachments.
-1. Select **applied to**, and then select your domain name.
-1. Choose any additional domains you own (such as your onmicrosoft.com domain) that you would like the rule applied to. Select **add**, and then **OK**.
-1. Select **Save**.
-
-Your ATP safe attachments rule has been updated. Now that protection is in place, you won't be able to open a malicious file from Outlook, OneDrive, SharePoint, or Teams. Affected files will have red shields next to them. If someone attempts to open a blocked file, they'll receive a warning message.
-
-After your policy has been in place for a while, visit the Reports page to see what has been scanned.
-
-1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>, and sign in with your admin account.
-
-2. Go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Anti-malware** in the **Policies** section.
-
-3. Select **+ Create** to create a new policy.
-
-4. Apply the settings in the following table.
-
-5. After you have reviewed your settings, select **Create this policy** or **Save**, as appropriate.
-
-|Setting or option|Recommended setting|
-|||
-|Name|Block current and future emails with detected malware.|
-|Description|Block current and future emails and attachments with detected malware.|
-|Save attachments unknown malware response|Select **Block - Block the current and future emails and attachments with detected malware**.|
-|Redirect attachment on detection|Enable redirection (select this box) Enter the admin account or a mailbox setup for quarantine. Apply the above selection if malware scanning for attachments times out or error occurs (select this box).|
-|Applied to|The recipient domain is . . . select your domain.|
-
-For more information, see [Set up anti-phishing policies in Microsoft Defender for Office 365](../../security/office-365-security/anti-phishing-policies-about.md).
-
-## Watch: Protect against phishing attacks with Safe Links
-
-Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198201).
-
-Hackers sometimes hide malicious websites in links in email or other files. Safe Links, part of Microsoft Defender for Office 365, can help protect your organization by providing time-of-click verification of web addresses (URLs) in email messages and Office documents. Protection is defined through Safe Links policies.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWvdwy?autoplay=false]
-
-Microsoft Defender for Office 365, formerly called Microsoft 365 ATP, or Advanced Threat Protection, helps protect your business against malicious sites when people click links in Office apps.
-
-1. Go to the [admin center](https://admin.microsoft.com), and select **Setup**.
-
-1. Scroll down to **Increase protection from advanced threats**. Select **Manage**,and then **Safe Links**.
-
-1. Select **Global Settings** and in **Block the following URLs**, enter the URL that you want to block.
-
-We recommend that you do the following:
--- Modify the default policy to increase protection.--- Add a new policy targeted to all recipients in your domain.-
-To set up Safe Links, complete the following steps:
-
-1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>, and sign in with your admin account.
-
-2. o to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Anti-malware** in the **Policies** section.
-
-3. Select **+ Create** to create a new policy, or modify the default policy.
-
-To modify the default policy:
-
-1. Double-click the **Default** policy. A flyout appears.
-
-2. Select **Edit protection settings** at the bottom of the flyout.
+Check out [Microsoft 365 small business help](https://go.microsoft.com/fwlink/?linkid=2197659) on YouTube.
-3. After modifying the default policy, select **Save**.
+This article suggests top tasks for small businesses to increase protection available against phishing, malware, and other threats with a Microsoft 365 subscription. These recommendations are also appropriate for organizations with an increased need for security, like law offices and health care clinics.
-|Setting or option|Recommended setting|
-|||
-|Name|Safe links policy for all recipients in the domain|
-|Select the action for unknown potentially malicious URLs in messages|Select **On - URLs will be rewritten and checked against a list of known malicious links when user clicks on the link**.|
-|Use Safe Attachments to scan downloadable content|Select this box.|
-|Applied to|The recipient domain is . . . select your domain.|
+Before you begin, note your current Microsoft Secure Score. The goal isn't to achieve the maximum score, but to be aware of opportunities to protect your small organization that don't negatively affect productivity for your users. Microsoft Secure Score analyzes your organization's security based on your regular activities and security settings, and assigns a score. To increase your score, complete the actions recommended in this article.
-For more information, see [Safe Links](../../security/office-365-security/safe-links-about.md).
+For more information, see [Microsoft Secure Score](../../security/defender/microsoft-secure-score.md).
-## Go to Intune admin center
+For additional details about securing data and managed devices in Microsoft 365 Business Premium, see [How to secure your business data with Microsoft 365 for business](../../business-premium/secure-your-business-data.md).
-1. Sign in to [Azure portal](https://portal.azure.com/).
+## Top tasks to make sure your subscription is secure
-2. Select **All services** and type in *Intune* in the **Search Box**.
+| Step | Task | Description |
+|:--:|:|:|
+| 1 | **[Use multi-factor authentication](multi-factor-authentication-microsoft-365.md)**. | [Multi-factor authentication](multi-factor-authentication-microsoft-365.md) (MFA), also known as two-step verification, requires members of your organization to use a code or authentication app on their phone to sign into Microsoft 365. It's a critical first step to protecting your business data. Using MFA can prevent hackers who learn your password from taking over.<br/><br/>See [Security defaults and MFA](../../business-premium/m365bp-conditional-access.md). |
+| 2 | **[Protect your administrator accounts](../../business-premium/m365bp-protect-admin-accounts.md)**. | Administrator accounts (also called admins) have elevated privileges, making these accounts more susceptible to cyberattacks. You'll need to set up and manage the right number of admin and user accounts for your business. We also recommend adhering to the information security principle of least privilege, which means that users and applications should be granted access only to the data and operations they require to perform their jobs. <br/><br/>See [Protect your administrator accounts](../../business-premium/m365bp-protect-admin-accounts.md). |
+| 3 | **[Use preset security policies](../../business-premium/m365bp-increase-protection.md)** | Your subscription includes [preset security policies](../../security/office-365-security/preset-security-policies.md) that use recommended settings for anti-spam, anti-malware, and anti-phishing protection. Set your policies in the [Microsoft 365 Defender portal](https://security.microsoft.com) to at least **Standard** protection. <br/><br/>See [Protect against malware and other cyberthreats](../../business-premium/m365bp-increase-protection.md). |
+| 4 | **[Protect all devices](../../business-premium/m365bp-devices-overview.md)**. | Every device is a possible attack avenue into your network and must be configured properly, even devices that are owned personally but also used for work. <br/><br/>See these articles: <br/>- [Help users set up MFA on their devices](https://support.microsoft.com/office/set-up-your-microsoft-365-sign-in-for-multi-factor-authentication-ace1d096-61e5-449b-a875-58eb3d74de14)<br/>- [Protect unmanaged Windows and Mac computers](../../business-premium/m365bp-protect-pcs-macs.md) <br/>- [Set up managed devices](../../business-premium/m365bp-managed-devices-setup.md) (requires Microsoft 365 Business Premium or Microsoft Defender for Business) |
+| 5 | **[Set sharing settings for SharePoint and OneDrive files and folders](../../business-premium/m365bp-increase-protection.md)**. | Default sharing settings for SharePoint and OneDrive are set to the most permissive level, which might be a more permissive level than you should use. We recommend reviewing, and if necessary changing, the settings to better protect your business. Grant member of your organization only the access they need to do their jobs. <br/><br/>See [Set sharing settings for SharePoint and OneDrive files and folders](../../business-premium/m365bp-increase-protection.md#set-sharing-settings-for-sharepoint-and-onedrive-files-and-folders). |
-3. Once the results appear, select the start next to **Microsoft Intune** to make it a favorite and easy to find later.
+## Related content
-In addition to the admin center, you can use Intune to enroll and manage your organization's devices. For more information, see [Capabilities by enrollment method for Windows devices](/intune/enrollment/enrollment-method-capab) and [Enrollment options for devices managed by Intune](/intune/enrollment-options).
+- [How to secure your business data with Microsoft 365 for business](../../business-premium/secure-your-business-data.md)
bookings Metrics And Activity Tracking https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/metrics-and-activity-tracking.md
- Title: "Metrics and activity tracking in Microsoft Bookings"--- Previously updated : 06/24/2020----- Tier2-- scotvorg
-description: "Various metrics are available on the main Bookings page, allowing you to easily track revenue and customer activity."
--
-# Microsoft Bookings metrics and activity tracking
-
-Various metrics are available on the main Bookings page, allowing you to easily track revenue and customer activity.
-
-| Metric | Description |
-|:|:|
-| Bookings activities | The 30-day activity period shows the last 30 days, including today. **Bookings made**, **Estimated revenue**, and **Customers booked** are all calculated. |
-| Bookings made | The number of bookings that are either taking place today or have taken place in the last 30 days. You may use this information to see if youΓÇÖre meeting your estimated sales expectations and to forecast for the next 30 days. |
-| Estimated revenue | This shows the estimated revenue that youΓÇÖve earned through Bookings and is calculated based on the price that youΓÇÖve defined for each service. This is an estimate because you may have charged a different fee at service time, the fee was set to an hourly charge, youΓÇÖve gotten tips, or a customer hasn't paid yet. For example, if your service is charging $10 per hour and the booking is 2 hours long, Bookings will only estimate $10 for that service.<br/><br/>**Important:** This is only an estimate and does not guarantee your actual revenue. |
-| Customers booked | The number of customers who have booked appointments for today and for the last 30 days.<br/><br/>**Note:** This metric shows the number of customers who have booked appointments, not the total number of appointments. For example, if one customer booked three appointments in the last 30 days and two more customers made one booking each, youΓÇÖll see three customers booked. |
business-premium Secure Your Business Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/secure-your-business-data.md
+
+ Title: How to secure your business data with Microsoft 365 for business
+f1.keywords:
+- CSH
+++
+audience: Admin
+++ Last updated : 01/23/2023
+ms.localizationpriority: medium
+
+- highpri
+- Adm_O365
+- Adm_TOC
+- m365-security
+- tier1
+
+- VSBFY23
+- MSStore_Link
+- AdminSurgePortfolio
+- okr_smb
+- AdminTemplateSet
+- admindeeplinkMAC
+- admindeeplinkDEFENDER
+- adminvideo
+- admindeeplinkEXCHANGE
+- business_assist
+search.appverid:
+- BCS160
+- MET150
+- MOE150
+description: "Learn best pratices to protect your business from ransomware, phishing, and malicious URLs or attachments with Microsoft 365 for business."
++
+# Secure your business data with Microsoft 365 for business
+
+**Applies to**
+
+- Microsoft 365 Business Basic
+- Microsoft 365 Business Standard
+- Microsoft 365 Business Premium
+
+> [!TIP]
+> This article is designed for small and medium-sized businesses who have up to 300 users. If you're looking for information for enterprise organizations, see [Deploy ransomware protection for your Microsoft 365 tenant](../solutions/ransomware-protection-microsoft-365.md).
+
+Microsoft 365 for business plans, such as Microsoft 365 Business Basic, Standard, and Premium, include security capabilities, such as antiphishing, antispam, and antimalware protection. Microsoft 365 Business Premium includes even more capabilities, such as device security, advanced threat protection, and information protection. This article describes how to secure your data with Microsoft 365 for business. This article also includes information to [compare capabilities across Microsoft 365 for business plans](#comparing-microsoft-365-for-business-plans).
+
+## Secure your business data
+
+| Step | Task | Description |
+|:--:|:|:|
+| 1 | **[Use multi-factor authentication](../admin/security-and-compliance/multi-factor-authentication-microsoft-365.md)**. | [Multi-factor authentication](../admin/security-and-compliance/multi-factor-authentication-microsoft-365.md) (MFA), also known as two-step verification, requires people to use a code or authentication app on their phone to sign into Microsoft 365, and is a critical first step to protecting your business data. Using MFA can prevent hackers from taking over if they know your password. Security defaults can simplify the process of enabling MFA. <br/><br/>See [security defaults and MFA](m365bp-conditional-access.md). |
+| 2 | **[Protect your administrator accounts](m365bp-protect-admin-accounts.md)**. | Administrator accounts (also called admins) have elevated privileges, making these accounts more susceptible to cyberattacks. You'll need to set up and manage the right number of admin and user accounts for your business. We also recommend adhering to the information security principle of least privilege, which means that users and applications should be granted access only to the data and operations they require to perform their jobs. <br/><br/>See [Protect your administrator accounts](m365bp-protect-admin-accounts.md). |
+| 3 | **[Use preset security policies](m365bp-increase-protection.md)**. | Your subscription includes [preset security policies](../security/office-365-security/preset-security-policies.md) that use recommended settings for anti-spam, anti-malware, and anti-phishing protection. <br/><br/>See [Protect against malware and other cyberthreats](m365bp-increase-protection.md). |
+| 4 | **[Protect all devices](m365bp-devices-overview.md)**. | Every device is a possible attack avenue into your network and must be configured properly, even those devices that are personally owned but used for work. <br/><br/>See the following articles: <br/>- [Help users set up MFA on their devices](https://support.microsoft.com/office/set-up-your-microsoft-365-sign-in-for-multi-factor-authentication-ace1d096-61e5-449b-a875-58eb3d74de14)<br/>- [Protect unmanaged Windows and Mac computers](m365bp-protect-pcs-macs.md) <br/>- [Set up managed devices](m365bp-managed-devices-setup.md) (requires Microsoft 365 Business Premium or Microsoft Defender for Business) |
+| 5 | **[Train everyone on email best practices](m365bp-avoid-phishing-and-attacks.md)**. | Email can contain malicious attacks cloaked as harmless communications. Email systems are especially vulnerable, because email is handled by everyone in the organization, and safety relies on humans making consistently good decisions with those communications. Train everyone to know what to watch for spam or junk mail, phishing attempts, spoofing, and malware in their email. <br/><br/>See [Protect yourself against phishing and other attacks](m365bp-avoid-phishing-and-attacks.md). |
+| 6 | **[Use Microsoft Teams for collaboration and sharing](m365bp-collaborate-share-securely.md)**. | The best way to collaborate and share securely is to use Microsoft Teams. With Microsoft Teams, all your files and communications are in a protected environment and aren't being stored in unsafe ways outside of it.<br/><br/> See the following articles: <br/>- [Use Microsoft Teams for collaboration](create-teams-for-collaboration.md) <br/>- [Set up meetings with Microsoft Teams](set-up-meetings.md) <br/>- [Share files and videos in a safe environment](share-files-and-videos.md) |
+| 7 | **[Set sharing settings for SharePoint and OneDrive files and folders](m365bp-increase-protection.md)**. | Your default sharing levels for SharePoint and OneDrive might be set to a more permissive level than you should use. We recommend reviewing and if necessary, changing the default settings to better protect your business. Grant people only the access they need to do their jobs. <br/><br/>See [Set sharing settings for SharePoint and OneDrive files and folders](m365bp-increase-protection.md#set-sharing-settings-for-sharepoint-and-onedrive-files-and-folders). |
+| 8 | **[Use Microsoft 365 Apps on devices](https://support.microsoft.com/topic/train-your-users-on-office-and-microsoft-365-7cba3c97-7f19-46ed-a1c6-763971a26c27)**. | Outlook and Microsoft 365 Apps (also referred to as Office apps) enable people to work productively and more securely across devices. Whether you're using the web or desktop version of an app, you can start a document on one device, and pick it up later on another device. Instead of sending files as email attachments, you can share links to documents that are stored in SharePoint or OneDrive. <br/><br/>See the following articles: <br/>- [Install Office apps on all devices](m365bp-install-office-apps.md).<br/>- [Train your users on Office and Microsoft 365](https://support.microsoft.com/topic/train-your-users-on-office-and-microsoft-365-7cba3c97-7f19-46ed-a1c6-763971a26c27) |
+| 9 | **[Manage calendar sharing for your business](m365bp-increase-protection.md#manage-calendar-sharing)**. | You can help people in your organization share their calendars appropriately for better collaboration. You can manage what level of detail they can share, such as by limiting the details that are shared to free/busy times only. <br/><br/>See [Manage calendar sharing](m365bp-increase-protection.md#manage-calendar-sharing). |
+| 10 | **[Maintain your environment](m365bp-maintain-environment.md)**. | After your initial setup and configuration of Microsoft 365 for business is complete, your organization needs a maintenance and operations plan. As employees come and go, you'll need to add or remove users, reset passwords, and maybe even reset devices to factory settings. You'll also want to make sure people have only the access they need to do their jobs. <br/><br/>See [Maintain your environment](m365bp-maintain-environment.md). |
+
+## Comparing Microsoft 365 for business plans
+
+Microsoft 365 for business plans include Microsoft Exchange, Microsoft Teams, SharePoint, and OneDrive for secure email, collaboration, and file storage. These plans also include baseline antiphishing, antimalware, and antispam protection. With Microsoft 365 Business Premium, you get more capabilities, such as device management, advanced threat protection, and information protection. The following table compares capabilities in Microsoft 365 for business plans.
+
+| Capability | [Microsoft 365 Business Basic](../admin/setup/setup-business-basic.md)| [Microsoft 365 Business Standard](../admin/setup/setup-business-standard.md) | [Microsoft 365 Business Premium](index.md) |
+|:|:--:|:--:|:--:|
+| **Outlook and Web/mobile versions of Office apps** <br/>Word, Excel, and PowerPoint | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) |![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) |
+| **Desktop versions of Office apps**<br/>Word, Excel, PowerPoint, Publisher, and Access <sup>[[See note 1](#fn1)]</sup> | | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) |
+| **Secure communication, collaboration, and file storage**<br/>Microsoft Teams, Exchange, OneDrive, and SharePoint | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) |
+| **Antispam, antiphishing, and antimalware protection** for email <br/>[Exchange Online Protection overview](../security/office-365-security/eop-about.md) | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) |
+| **Mobile device management** and mobile app management <br/>[Microsoft Intune](/mem/intune/fundamentals/what-is-intune) | See note <sup>[[2](#fn2)]</sup> | See note <sup>[[2](#fn2)]</sup> | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) |
+| **Advanced device security** with next-generation protection, firewall, attack surface reduction, automated investigation and response, and more <br/>[Defender for Business](../security/defender-business/mdb-overview.md) | See note <sup>[[3](#fn3)]</sup> | See note <sup>[[3](#fn3)]</sup> | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) |
+| **Advanced protection for email and documents** with advanced anti-phishing, Safe Links, Safe Attachments, and real-time detections<br/>[Microsoft Defender for Office 365 Plan 1](../security/office-365-security/defender-for-office-365.md) | See note <sup>[[4](#fn4)]</sup> | See note <sup>[[4](#fn4)]</sup> | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) |
+| **Information protection** capabilities to discover, classify, protect, and govern sensitive information <br/>[Azure Information Protection](/azure/information-protection/what-is-information-protection) | | | ![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png) |
+
+(<a id="fn1">1</a>) Microsoft Publisher and Microsoft Access run on Windows laptops and desktops only.
+
+(<a id="fn2">2</a>) Microsoft Intune is included with certain Microsoft 365 plans, such as Microsoft 365 Business Premium. Basic Mobility and Security capabilities are included in Microsoft 365 Business Basic and Standard. [Choose between Basic Mobility and Security or Intune](../admin/basic-mobility-security/choose-between-basic-mobility-and-security-and-intune.md).
+
+(<a id="fn3">3</a>) Defender for Business is included in Microsoft 365 Business Premium. Defender for Business can also be added on to Microsoft 365 Business Basic or Standard. See [Get Defender for Business](/microsoft-365/security/defender-business/get-defender-business).
+
+(<a id="fn4">4</a>) Defender for Office 365 Plan 1 is included in Microsoft 365 Business Premium. Defender for Office 365 Plan 1 can also be added on to Microsoft 365 Business Basic or Standard. See [Defender for Office 365 Plan 1 and Plan 2](/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview).
+
+> [!TIP]
+> For more information about what each plan includes, see [Reimagine productivity with Microsoft 365 and Microsoft Teams](https://www.microsoft.com/en-us/microsoft-365/business/compare-all-microsoft-365-business-products-b?ef_id=8c2a86ec9ea514a008c6e419e036519c:G:s&OCID=AIDcmmwf9kwzdj_SEM_8c2a86ec9ea514a008c6e419e036519c:G:s&lnkd=Bing_O365SMB_Brand&msclkid=8c2a86ec9ea514a008c6e419e036519c).
++
+## See also
+
+- [What is Defender for Business?](../security/defender-business/mdb-overview.md)
+- [Microsoft 365 Business PremiumΓÇöcybersecurity for small business](/microsoft-365/business-premium/)
+- [Compare security features in Microsoft 365 plans for small and medium-sized businesses](../security/defender-business/compare-mdb-m365-plans.md) (for more details about Defender for Business and Microsoft 365 Business Premium)
+- [Compare Microsoft endpoint security plans](../security/defender-endpoint/defender-endpoint-plan-1-2.md) (for securing and managing devices)
+
compliance Create And Manage Inactive Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-and-manage-inactive-mailboxes.md
For step-by-step procedures, see [Change the hold duration for an inactive mailb
## Recover an inactive mailbox
-If a former employee returns to your organization, or if a new employee is hired to take on the job responsibilities of the departed employee, you can recover the contents of the inactive mailbox.
+If a former employee returns to your organization, or if a new employee is hired to take on the job responsibilities of the former employee, you can recover the contents of the inactive mailbox.
When you recover an inactive mailbox, the mailbox is converted to a new mailbox, the contents and folder structure of the inactive mailbox are retained, and the mailbox is linked to a new user account. After it's recovered, the inactive mailbox no longer exists.
compliance Dlp Create Deploy Policy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-create-deploy-policy.md
Endpoint
Endpoint + Teams -->
-### Scenario 2 Show policy tip as oversharing popup (preview)
-
-> [!IMPORTANT]
-> This is a hypothetical scenario with hypothetical values. It's only for illustrative purposes. You should substitute your own sensitive information types, sensitivity labels, distribution groups and users.
-
-#### Scenario 2 pre-requisites and assumptions
-
-This scenario uses the *Highly confidential* sensitivity label, so it requires that you have created and published sensitivity labels. To learn more, see:
--- [Learn about sensitivity labels](sensitivity-labels.md)-- [Get started with sensitivity labels](get-started-with-sensitivity-labels.md)-- [Create and configure sensitivity labels and their policies](create-sensitivity-labels.md)-
-This procedure uses a hypothetical company domain at Contoso.com.
-
-#### Scenario 2 policy intent and mapping
-
-*We need to block emails to all recipients that have the ΓÇÿhighly confidentialΓÇÖ sensitivity label applied except if the recipient domain is contoso.com. We want to notify the user on send with a popup dialogue and no one can be allowed to override the block.*
--
-|Statement|Configuration question answered and configuration mapping|
-|||
-|"We need to block emails to all recipients..."|- **Where to monitor**: Exchange </br>- **Administrative scope**: Full directory </br>- **Action**: Restrict access or encrypt the content in Microsoft 365 locations > Block users from receiving email or accessing shared SharePoint, OneDrive, and Teams files > Block everyone |
-|"...that have the 'highly confidential' sensitivity label applied..."| - **What to monitor**: use the Custom template </br> - **Conditions for a match**: edit it to add the *highly confidential* sensitivity label|
-|"...except if..."| **Condition group configuration** - Create a nested boolean NOT condition group joined to the first conditions using a boolean AND|
-|"...the recipient domain is contoso.com."| **Condition for match**: Recipient domain is|
-|"...Notify..."|**User notifications**: enabled|
-|"...the user on send with a popup dialogue..."| **Policy tips**: selected </br> - **Show policy tip as a dialog for the end user before send**: selected|
-|"...and no one can be allowed to override the block...| **Allow overrides from M365 Services**: not selected|
--
-#### Steps to create policy for scenario 2
-
-> [!IMPORTANT]
-> For the purposes of this policy creation procedure, you'll accept the default include/exclude values and leave the policy turned off. You'll be changing these when you deploy the policy.
-
-1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>.
-
-1. In the Microsoft Purview compliance portal \> left navigation \> **Solutions** \> **Data loss prevention** \> **Policies** \> **+ Create policy**.
-
-1. Select **Custom** from the **Categories** list.
-
-1. Select **Custom** from the **Templates** list.
-
-1. Give the policy a name.
-
-> [!IMPORTANT]
-> Policies cannot be renamed.
-
-5. Fill in a description. You can use the policy intent statement here.
-
-1. Select **Next**.
-
-1. Select **Full directory** under **Admin units**.
-
-1. Set the **Exchange email** location status to **On**. Set all the other location status to **Off**.
-
-1. Select **Next**.
-
-1. Accept the default values for **Include** = **All** and **Exclude** = **None**.
-
-1. The **Create or customize advanced DLP rules** option should already be selected.
-
-1. Select **Next**.
-
-1. Select **Create rule**. Name the rule and provide a description.
-
-1. Select **Add condition** > **Content contains** > **Add** > **Sensitivity labels** > **Highly confidential**. Choose **Add**.
-
-1. Select **Add group** > **AND** > **NOT** > **Add condition**.
-
-1. Select **Recipient domain is** > **contoso.com**. Choose **Add**.
-
-1. Select **Add and action** > **Restrict access or encrypt the content in Microsoft 365 locations** > **Restrict access or encrypt the content in Microsoft 365 locations** > **Block users from receiving email or accessing shared SharePoint, OneDrive, and Teams file.** > **Block everyone**.
-
-1. Set **User notifications** to **On**.
-
-1. Select **Policy tips** > **Show the policy tip as a dialog for the end user before send**.
-
-1. Make sure that **Allow override from M365 services** *isn't* selected.
-
-1. Choose **Save**.
-
-1. Choose **Next** > **Keep it off** > **Next** > **Submit**.
-- ## Deployment A successful policy deployment isn't just about getting the policy into your environment to enforce controls on user actions. A haphazard, rushed deployment can negatively impact business process and annoy your users. Those consequences will slow acceptance of DLP technology in your organization and the safer behaviors it promotes. Ultimately making your sensitive items less safe in the long run.
compliance Dlp Policy Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md
f1.keywords: CSH
Previously updated : 03/06/2023 Last updated : 02/27/2023 audience: Admin
If you're new to Microsoft Purview DLP, here's a list of the core articles you'l
1. [Set goals and strategy](dlp-overview-plan-for-dlp.md#set-goals-and-strategy) 1. [Data Loss Prevention policy reference](dlp-policy-reference.md#data-loss-prevention-policy-reference) - this article that you're reading now introduces all the components of a DLP policy and how each one influences the behavior of a policy 1. [Design a DLP policy](dlp-policy-design.md) - this article walks you through creating a policy intent statement and mapping it to a specific policy configuration.
-1. [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) - This article presents some common policy intent scenarios that you'll map to configuration options. It also walks you through configuring those options.
-
-Also, you need to be aware of the following constraints of the platform:
--- Maximum number of MIP + MIG policies in a tenant: 10,000-- Maximum size of a DLP policy (100 KB)-- Maximum number of DLP rules:
- - In a policy: Limited by the size of the policy
- - In a tenant: 600
-- Maximum size of an individual DLP rule: 80 KB-- GIR evidence limit: 100, with each SIT evidence, in proportion of occurrence-- Text extraction limit: 1 MB-- Regex size limit for all matches predicted: 20 KB-- Policy name length limit: 64 characters-- Policy rule length limit: 64 characters-- Comment length limit: 1024 characters-- Description length limit: 1024 characters
+1. [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) - This article presents some common policy intent scenarios that you'll map to configuration options, then it walks you through configuring those options.
## Policy templates
DLP policies are scoped at two different levels. The first level lets an unrestr
in your organization (depending on the locations that are selected) or to subgroups of your organization called [Administrative Unit restricted policies (preview)](#administrative-unit-restricted-policies-preview).
-At this level, an administrative unit restricted admin will only be able to pick from the administrative units that they're assigned to.
+At this level an administrative unit restricted admin will only be able to pick from the administrative units that they're assigned to.
The second level of DLP policy scoping is by the [locations](#locations) that DLP supports. At this level, both unrestricted and administrative unit restricted administrators will see only the users, distribution groups, groups, and accounts that were included in the first level of policy scoping and are available in for that location.
All the other rules are evaluated but their actions aren't enforced. Audit logs
### Conditions
-Conditions are where you define what you want the rule to look for and context in which those items are being used. They tell the ruleΓÇöwhen you find an item that looks like *this* and is being used like *thatΓÇöit's a match and the rest of the actions in the policy should be taken on it. You can use conditions to assign different actions to different risk levels. For example, sensitive content shared internally might be lower risk and require fewer actions than sensitive content shared with people outside the organization.
+Conditions are where you define what you want the rule to look for and context in which those items are being used. They tell the rule &#8212; when you find an item that looks like *this* and is being used like *that* &#8212; it's a match and the rest of the actions in the policy should be taken on it. You can use conditions to assign different actions to different risk levels. For example, sensitive content shared internally might be lower risk and require fewer actions than sensitive content shared with people outside the organization.
> [!NOTE] > Users who have non-guest accounts in a host organization's Active Directory or Azure Active Directory tenant are considered as people inside the organization.
The available context options change depending on which location you choose. If
- Sender AD Attribute contains words or phrases - Sender AD Attribute matches patterns - Sender is a member of-- Any email attachment's content couldn't be scanned
+- Any email attachment's content could not be scanned
- Any email attachment's content didn't complete scanning - Attachment is password protected - File extension is
The available context options change depending on which location you choose. If
- Content contains - Document or attachment is password protected (.pdf, Office files, .zip, and Symantec PGP encrypted files are fully supported). This predicate detects only open protected files.-- Content isn't labeled (.pdf and Office files are fully supported). This predicate detects content that doesn't have a sensitivity label applied. To help ensure only supported file types are detected, you should use this condition with the **File extension is** or **File type is** conditions.-- (preview) The user accessed a sensitive website from Microsoft Edge. See, [Scenario 6 Monitor or restrict user activities on sensitive service domains (preview)](endpoint-dlp-using.md#scenario-6-monitor-or-restrict-user-activities-on-sensitive-service-domains) for more information.
+- Content is not labeled (.pdf and Office files are fully supported). This predicate detects content that doesn't have a sensitivity label applied. To help ensure only supported file types are detected, you should use this condition with the **File extension is** or **File type is** conditions.
+- (preview) The user accessed a sensitive website from Edge. See, [Scenario 6 Monitor or restrict user activities on sensitive service domains (preview)](endpoint-dlp-using.md#scenario-6-monitor-or-restrict-user-activities-on-sensitive-service-domains) for more information.
- File extension is - File type is - See, [Endpoint activities you can monitor and take action on](endpoint-dlp-learn-about.md#endpoint-activities-you-can-monitor-and-take-action-on)
The first group contains the SITs that identify an individual and the second gro
Conditions can be grouped and joined by boolean operators (AND, OR, NOT) so that you defining a rule by stating what should be included and then define exclusions in a different group joined to the first by a NOT. To learn more about how Purview DLP implements booleans and nested groups see, [Complex rule design](dlp-policy-design.md#complex-rule-design).
-#### DLP Platform Limitations for Conditions
-
-|Predicate | Workload | Limit | Cost of Evaluation |
-|-|-|--|--|
-|Content Contains | EXO/SPO/ODB | 125 SITs per rule | High |
-|Content is shared from Microsoft 365 | EXO/SPO/ODB | - | High |
-|Sender IP address is | EXO | Individual range length <= 128; Count <= 600 |Low|
-|Has sender overridden the policy tip |EXO | - | Low |
-|Sender is | EXO | Individual email length <= 256; Count <= 600| Medium |
-|Sender is a member of | EXO | Count <= 600 | High |
-|Sender domain is | EXO | Domain name length <= 67; Count <= 600 |Low |
-|Sender address contains words | EXO |Individual word length <= 128; Count <= 600 | Low |
-|Sender address matches patterns | EXO |Regex length <= 128 char; Count <= 600 | Low |
-|Sender AD attribute contains words | EXO | Individual word length <= 128; Count <= 600 | Medium |
-|Sender AD attribute matches patterns | EXO | Regex length <= 128 char; Count <= 600 | Medium |
-|Content of email attachment(s) can't be scanned|EXO| [Supported file types](/exchange/security-and-compliance/mail-flow-rules/inspect-message-attachments#supported-file-types-for-mail-flow-rule-content-inspection) | Low |
-|Incomplete scan of email attachment content | EXO | Size > 1 MB | Low |
-|Attachment is password-protected | EXO | File types: Office files, ZIP, and 7z |Low|
-|Attachment's file extension is |EXO/SPO/ODB | Count <= 50 | High|
-|Recipient is a member of |EXO | Count <= 600 | High |
-|Recipient domain is | EXO| Domain name length <= 67; Count <= 5000 | Low |
-|Recipient is | EXO | Individual email length <= 256; Count <= 600 |Low |
-|Recipient address contains words | EXO | Individual word length <= 128; Count <= 600 | Low |
-|Recipient address matches patterns | EXO | Count <= 300 | Low|
-|Document name contains words or phrases | EXO | Individual word length <= 128; Count <=600 |Low|
-|Document Name matches patterns| EXO | Regex length <= 128 char; Count <= 300 |Low|
-|Document property is | EXO/SPO/ODB | - | Low |
-|Document size equals or is greater than | EXO | - | Low|
-|Subject contains words or phrases | EXO | Individual word length <= 128; Count <= 600| Low|
-|Header contains words or phrases | EXO | Individual word length <= 128; Count <= 600 |Low|
-|Subject or body contains words or phrases |EXO| Individual word length <= 128; Count <= 600 |Low|
-|Content character set contains words |EXO | Count <= 600 |Low|
-|Header matches patterns |EXO | Regex length <= 128 char; Count <= 300 | Low|
-|Subject matches patterns|EXO | Regex length <= 128 char; Count <= 300 | Low|
-|Subject or body matches patterns |EXO |Regex length <= 128 char; Count <= 300 | Low|
-|Message type is | EXO| - | Low|
-|Message size over | EXO | - | Low|
-|With importance | EXO | - | Low|
-|Sender AD attribute contains words |EXO| Each attribute key value pair: has Regex length <= 128 char; Count <= 600 | Medium |
-|Sender AD attribute matches patterns |EXO | Each attribute key value pair: has Regex length <= 128 char; Count <= 300 | Medium|
-|Document contains words | EXO | Individual word length <= 128; Count <= 600 | Medium|
-|Document matches patterns| EXO| Regex length <= 128 char; Count <= 300 | Medium|
-- <!--### Exceptions > [!IMPORTANT]
Whether an action takes effect or not depends on how you configure the mode of t
<!-- This section needs to explain that the actions available depend on the locations selected AND that the observed behavior of a policy is produced through an interaction of the configured actions AND the configured status (off, test, apply) of a policy. It will detail the purpose of each of the available actions and the location/desired outcome interaction and provide examples eg. how to use the Restrict Third Party apps in the context of a policy that is applied to endpoints so that users can't use a upload content to a third party site or the interaction of on-premises scanner with restrict access or remove on-premises files. Also what happens when I select multiple locations? provide abundant examples for most common scenarios-->
-#### DLP Platform Limitations for Actions
-
-|Action Name | Workload | Limits |
-||||
-|Restrict access or encrypt content in Microsoft 365| EXO/SPO/ODB | |
-|Set headers | EXO | |
-|Remove header | EXO | |
-|Redirect the message to specific users | EXO| Total of 100 across all DLP rules. Cannot be DL/SG|
-|Forward the message for approval to sender's manager | EXO | Manager should be defined in AD|
-|Forward the message for approval to specific approvers |EXO | Groups aren't supported|
-|Add recipient to the **To** box | EXO | Recipient count <= 10; Cannot be DL/SG|
-|Add recipient to the **Cc** box | EXO | Recipient count <= 10; Cannot be DL/SG|
-|Add recipient to the **Bcc** box | EXO | Recipient count <= 10; Cannot be DL/SG|
-|Add the sender's manager as recipient | EXO | Manager attribute should be defined in AD|
-|Apply HTML disclaimer| EXO| |
-|Prepend subject| EXO| |
-|Apply OME| EXO | |
-|Remove OME | EXO | |
- ### User notifications and policy tips <!--This section introduces the business need for user notifications, what they are, their benefit, how to use them, how to customize them, and links out to
for where they are used/expected behavior-->
<!--You can use notifications and overrides to educate your users about DLP policies and help them remain compliant without blocking their work. For example, if a user tries to share a document containing sensitive information, a DLP policy can both send them an email notification and show them a policy tip in the context of the document library that allows them to override the policy if they have a business justification.-->
-When a user attempts an action on a sensitive item in a context that meets the conditions of a rule, you can let them know about it through user notification emails and in- context policy tip popups. These notifications are useful because they increase awareness and help educate people about your organization's DLP policies.
+When a user attempts an action on a sensitive item in a context that meets the conditions of a rule, you can let them know about it through user notification emails and in context policy tip popups. These notifications are useful because they increase awareness and help educate people about your organization's DLP policies.
For example, content like an Excel workbook on a OneDrive for Business site that contains personally identifiable information (PII) and is shared with a guest.
You can customize the title and body of text with using these parameters. The bo
Using this customized text
-*%%AppliedActions%% File name %%FileName%% via %%ProcessName%% isn't allowed by your organization. Select 'Allow' if you want to bypass the policy %%PolicyName%%*
+*%%AppliedActions%% File name %%FileName%% via %%ProcessName%% is not allowed by your organization. Select 'Allow' if you want to bypass the policy %%PolicyName%%*
produces this text in the customized notification:
-*pasting from the clipboard File Name: Contoso doc 1 via WINWORD.EXE isn't allowed by your organization. Select the 'Allow' button if you want to bypass the policy Contoso highly confidential*
+*pasting from the clipboard File Name: Contoso doc 1 via WINWORD.EXE is not allowed by your organization. Click 'Allow' button if you want to bypass the policy Contoso highly confidential*
> [!NOTE] > User notifications and policy tips are not available for the On-premises location
compliance Ediscovery Keyword Queries And Search Conditions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-keyword-queries-and-search-conditions.md
f1.keywords:
Previously updated : 01/01/2023 Last updated : 03/08/2023 audience: Admin f1_keywords:
The table includes an example of the _property:value_ syntax for each property a
|Importance|The importance of an email message, which a sender can specify when sending a message. By default, messages are sent with normal importance, unless the sender sets the importance as **high** or **low**.|`importance:high` <p> `importance:medium` <p> `importance:low`|Messages that are marked as high importance, medium importance, or low importance.| |IsRead|Indicates whether messages have been read. Use the values **true** or **false**.|`isread:true` <p> `isread:false`|The first example returns messages with the IsRead property set to **True**. The second example returns messages with the IsRead property set to **False**.| |ItemClass|Use this property to search specific third-party data types that your organization imported to Office 365. Use the following syntax for this property: `itemclass:ipm.externaldata.<third-party data type>*`|`itemclass:ipm.externaldata.Facebook* AND subject:contoso` <p> `itemclass:ipm.externaldata.Twitter* AND from:"Ann Beebe" AND "Northwind Traders"`|The first example returns Facebook items that contain the word "contoso" in the Subject property. The second example returns Twitter items that were posted by Ann Beebe and that contain the keyword phrase "Northwind Traders". <p> For a complete list of values to use for third-party data types for the ItemClass property, see [Use Content search to search third-party data that was imported to Office 365](use-content-search-to-search-third-party-data-that-was-imported.md).|
-|Kind|The type of email message to search for. Possible values: <p> contacts <p> docs <p> email <p> externaldata <p> faxes <p> im <p> journals <p> meetings <p> microsoftteams (returns items from chats, meetings, and calls in Microsoft Teams) <p> notes <p> posts <p> rssfeeds <p> tasks <p> voicemail|`kind:email` <p> `kind:email OR kind:im OR kind:voicemail` <p> `kind:externaldata`|The first example returns email messages that meet the search criteria. The second example returns email messages, instant messaging conversations (including Skype for Business conversations and chats in Microsoft Teams), and voice messages that meet the search criteria. The third example returns items that were imported to mailboxes in Microsoft 365 from third-party data sources, such as Twitter, Facebook, and Cisco Jabber, that meet the search criteria. For more information, see [Archiving third-party data in Office 365](https://www.microsoft.com/?ref=go).|
+|Kind|The type of email message to search for. Possible values: <p> contacts <p> docs <p> email <p> externaldata <p> faxes <p> im <p> journals <p> meetings <p> microsoftteams (returns items from chats, meetings, and calls in Microsoft Teams) <p> notes <p> posts <p> rssfeeds <p> tasks <p> voicemail|`kind:email` <p> `kind:email OR kind:im OR kind:voicemail` <p> `kind:externaldata`|The first example returns email messages that meet the search criteria. The second example returns email messages, instant messaging conversations (including Skype for Business conversations and chats in Microsoft Teams), and voice messages that meet the search criteria. The third example returns items that were imported to mailboxes in Microsoft 365 from third-party data sources, such as Twitter, Facebook, and Cisco Jabber that meet the search criteria. For more information, see [Archiving third-party data in Office 365](https://www.microsoft.com/?ref=go).|
|Participants|All the people fields in an email message. These fields are From, To, Cc, and Bcc.<sup>1</sup>|`participants:garthf@contoso.com` <p> `participants:contoso.com`|Messages sent by or sent to garthf@contoso.com. The second example returns all messages sent by or sent to a user in the contoso.com domain.<br>([See Recipient Expansion](ediscovery-keyword-queries-and-search-conditions.md#recipient-expansion))| |Received|The date that an email message was received by a recipient.|`received:2021-04-15` <p> `received>=2021-01-01 AND received<=2021-03-31`|Messages that were received on April 15, 2021. The second example returns all messages received between January 1, 2021 and March 31, 2021.| |Recipients|All recipient fields in an email message. These fields are To, Cc, and Bcc.<sup>1</sup>|`recipients:garthf@contoso.com` <p> `recipients:contoso.com`|Messages sent to garthf@contoso.com. The second example returns messages sent to any recipient in the contoso.com domain.<br>([See Recipient Expansion](ediscovery-keyword-queries-and-search-conditions.md#recipient-expansion))|
Some special characters aren't included in the search index and therefore aren't
`+ - = : ! @ # % ^ & ; _ / ? ( ) [ ] { }`
+## Searchable sensitive data types
+
+You can use eDiscovery search tools in the compliance portal to search for sensitive data, such as credit card numbers or social security numbers, that is stored in documents on SharePoint and OneDrive for Business sites. You can do this by using the `SensitiveType` property and the name (or ID) of a sensitive information type in a keyword query. For example, the query `SensitiveType:"Credit Card Number"` returns documents that contain a credit card number. The query `SensitiveType:"U.S. Social Security Number (SSN)"` returns documents that contain a U.S. social security number.
+
+To see a list of the sensitive information types that you can search for, go to **Data classifications** \> **Sensitive info types** in the compliance portal. Or you can use the **Get-DlpSensitiveInformationType** cmdlet in Security & Compliance PowerShell to display a list of sensitive information types.
+
+For more information about creating queries using the `SensitiveType` property, see [Form a query to find sensitive data stored on sites](form-a-query-to-find-sensitive-data-stored-on-sites.md).
+
+### Limitations for searching sensitive data types
+
+- To search for custom sensitive information types, you have to specify the ID of the sensitive information type in the `SensitiveType` property. Using the name of a custom sensitive information type (as shown in the example for built-in sensitive information types in the previous section) will return no results. Use the **Publisher** column on the **Sensitive info types** page in the compliance portal (or the **Publisher** property in PowerShell) to differentiate between built-in and custom sensitive information types. Built-in sensitive data types have a value of `Microsoft Corporation` for the **Publisher** property.
+
+ To display the name and ID for the custom sensitive data types in your organization, run the following command in Security & Compliance PowerShell:
+ ```powershell
+ Get-DlpSensitiveInformationType | Where-Object {$_.Publisher -ne "Microsoft Corporation"} | FT Name,Id
+ ```
+ Then you can use the ID in the `SensitiveType` search property to return documents that contain the custom sensitive data type; for example, `SensitiveType:7e13277e-6b04-3b68-94ed-1aeb9d47de37`
+- You can't use sensitive information types and the `SensitiveType` search property to search for sensitive data at-rest in Exchange Online mailboxes. This includes 1:1 chat messages, 1:N group chat messages, and team channel conversations in Microsoft Teams because all of this content is stored in mailboxes. However, you can use data loss prevention (DLP) policies to protect sensitive email data in transit. For more information, see [Learn about data loss prevention](dlp-learn-about-dlp.md) and [Search for and find personal data](/compliance/regulatory/gdpr).
+ ## Searching for site content shared with external users You can also use eDiscovery search tools in the compliance portal to search for documents stored on SharePoint and OneDrive for Business sites that have been shared with people outside of your organization. This can help you identify sensitive or proprietary information that's being shared outside your organization. You can do this by using the `ViewableByExternalUsers` property in a keyword query. This property returns documents or sites that have been shared with external users by using one of the following sharing methods:
compliance Ediscovery Partially Indexed Items In Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-partially-indexed-items-in-content-search.md
f1.keywords:
Previously updated : 01/01/2023 Last updated : 03/01/2023 audience: Admin f1_keywords:
Keep the following in mind about partially indexed items:
|**Export configuration**|**Indexed items that match search query**|**Partially indexed items that match search query**|**Partially indexed items that don't match search query**| |:--|:--|:--|:--|
- |Export only indexed items <br/> |Exported<br/> |Exported (included with the indexed items that are exported)<br/> |Not exported <br/>|
+ |Export only indexed items <br/> |Exported<br/> |Exported (included with the indexed items exported)<br/> |Not exported <br/>|
|Export only partially indexed items <br/> |Not exported <br/> |Exported (as partially indexed items)<br/> |Exported (as partially indexed items)|
- |Export indexed and partially indexed items <br/> |Exported<br/> |Exported (included with the indexed items that are exported)<br/> |Exported (as partially indexed items)<br/>|
+ |Export indexed and partially indexed items <br/> |Exported<br/> |Exported (included with the indexed items exported)<br/> |Exported (as partially indexed items)<br/>|
|||| ## Workaround for using a date range to exclude partially indexed items
-In Content search and Microsoft Purview eDiscovery (Standard), you can't use a date range to exclude partially indexed items from being returned by a search query. In other words, partially indexed items that fall outside of a date range are still included as partially indexed items in the search statistics and when you export partially indexed items. In eDiscovery (Premium), you can exclude partially indexed items by using a date range in a search query.
+In Content search and Microsoft Purview eDiscovery, you can't use a date range to exclude partially indexed items from being returned by a search query. In other words, partially indexed items that fall outside of a date range are still included as partially indexed items in the search statistics and when you export partially indexed items.
As a workaround for this limitation, we recommend the following procedure.
compliance Insider Risk Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management.md
f1.keywords:
Previously updated : 03/09/2023 Last updated : 02/08/2023 audience: itpro - highpri
In more serious situations, you may need to share the insider risk management ca
- **eDiscovery (Premium)**: Escalating a case for investigation allows you to transfer data and management of the case to Microsoft Purview eDiscovery (Premium). eDiscovery (Premium) provides an end-to-end workflow to preserve, collect, review, analyze, and export content that's responsive to your organization's internal and external investigations. It allows legal teams to manage the entire legal hold notification workflow. To learn more about eDiscovery (Premium) cases, see [Overview of Microsoft Purview eDiscovery (Premium)](ediscovery-overview.md). - **Office 365 Management APIs integration (preview)**: Insider risk management supports exporting alert information to security information and event management (SIEM) services via the Office 365 Management APIs. Having access to alert information in the platform the best fits your organization's risk processes gives you more flexibility in how to act on risk activities. To learn more about exporting alert information with Office 365 Management APIs, see [Export alerts](insider-risk-management-settings.md#export-alerts).
+> [!NOTE]
+> Thank you for your feedback and support during the preview of the ServiceNow connector. We've decided to end the preview of ServiceNow connector and discontinue support in insider risk management on November 30, 2020. We are actively evaluating alternative methods to provide customers with ServiceNow integration in insider risk management.
+ ## Scenarios Insider risk management can help you detect, investigate, and take action to mitigate internal risks in your organization in several common scenarios:
compliance Restore An Inactive Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/restore-an-inactive-mailbox.md
>*[Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).*
-An inactive mailbox (which is a type of soft-deleted mailbox) is used to retain a former employee's email after they leave your organization. If another employee takes on the job responsibilities of the departed employee or if that employee returns to your organization, there are two ways that you can make the contents of the inactive mailbox available to a user:
+An inactive mailbox (which is a type of soft-deleted mailbox) is used to retain a former employee's email after they leave your organization. If another employee takes on the job responsibilities of the former employee or if that employee returns to your organization, there are two ways that you can make the contents of the inactive mailbox available to a user:
-- **Restore an inactive mailbox** If another employee takes on the job responsibilities of the departed employee, or if another user needs access to the contents of the inactive mailbox, you can restore (or merge) the contents of the inactive mailbox to an existing mailbox. You can also restore the archive from an inactive mailbox. After it's restored, the inactive mailbox is preserved and is retained as an inactive mailbox. This article describes the procedures for restoring an inactive mailbox.
+- **Restore an inactive mailbox** If another employee takes on the job responsibilities of the former employee, or if another user needs access to the contents of the inactive mailbox, you can restore (or merge) the contents of the inactive mailbox to an existing mailbox. You can also restore the archive from an inactive mailbox. After it's restored, the inactive mailbox is preserved and is retained as an inactive mailbox. This article describes the procedures for restoring an inactive mailbox.
-- **Recover an inactive mailbox** If the departed employee returns to your organization, or if a new employee is hired to take on the job responsibilities of the departed employee, you can recover the contents of the inactive mailbox. This method converts the inactive mailbox to a new mailbox that contains the contents of the inactive mailbox. After it's recovered, the inactive mailbox no longer exists. For the step-by-step procedures, see [Recover an inactive mailbox in Office 365](recover-an-inactive-mailbox.md).
+- **Recover an inactive mailbox** If the former employee returns to your organization, or if a new employee is hired to take on the job responsibilities of the former employee, you can recover the contents of the inactive mailbox. This method converts the inactive mailbox to a new mailbox that contains the contents of the inactive mailbox. After it's recovered, the inactive mailbox no longer exists. For the step-by-step procedures, see [Recover an inactive mailbox in Office 365](recover-an-inactive-mailbox.md).
See the [More information](#more-information) section in this article for more details about the differences between restoring and recovering an inactive mailbox.
compliance Sensitivity Labels Aip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-aip.md
f1.keywords:
Previously updated : 03/09/2023 Last updated : 03/06/2023 audience: Admin
However, you might find you don't need to use PowerShell to configure the suppor
The following configurations from the AIP add-in that aren't yet supported by built-in labeling include: - [Label inheritance from email attachments](/azure/information-protection/rms-client/clientv2-admin-guide-customizations#for-email-messages-with-attachments-apply-a-label-that-matches-the-highest-classification-of-those-attachments)+ - [Oversharing popup messages for Outlook](/azure/information-protection/rms-client/clientv2-admin-guide-customizations#implement-pop-up-messages-in-outlook-that-warn-justify-or-block-emails-being-sent)
- - The equivalent of this configuration is now rolling out in preview. For more information, see the scenario guidance to [show a policy tip as oversharing popup](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup-preview)
+ - The equivalent of this configuration is now rolling out in preview. For more information, see the [migration playbook to configure oversharing popups](https://microsoft.github.io/ComplianceCxE/playbooks/AIP2MIP/Features/Collaboration/OversharingPopups/)
+ - [Default sublabel for a parent label](/azure/information-protection/rms-client/clientv2-admin-guide-customizations#specify-a-default-sublabel-for-a-parent-label) - This option is currently rolling out in general availability. For more information, see [Specify a default sublabel for a parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label)+ - [Remove external content markings](/azure/information-protection/rms-client/clientv2-admin-guide-customizations#remove-headers-and-footers-from-other-labeling-solution) ## Features not planned to be supported by built-in labeling for Office apps
compliance Sensitivity Labels Meetings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-meetings.md
description: "Configure sensitivity labels to protect calendar items, and Teams
>*[Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).* > [!NOTE]
-> For this scenario, Outlook calendar events are still rolling out in general availability for Windows and macOS.
+> For this scenario, Outlook calendar events remain in preview for Windows, and rolling out in general availability for macOS.
> > You won't be able to configure all the options referenced on this page if a [Teams Premium license](/MicrosoftTeams/enhanced-teams-experience) isn't found for your tenant. For those settings, you'll see an information bar in the Microsoft Purview compliance portal that your organization doesn't have this license.
Example showing a Teams meeting invite that has the label **Highly confidential*
To apply a sensitivity label to meeting invites and appointments using Outlook, users must use Outlook on the web from a desktop computer, or use built-in labeling from Microsoft 365 Apps for enterprise: -- **Outlook for Windows**: Rolling out to Current Channel, version 2302+
+- **Outlook for Windows**: Rolling out to Current Channel (Preview)
- **Outlook for Mac**: Rolling out to version 16.70+ The AIP add-in for Outlook doesn't support applying labels to meeting invites.
compliance Sensitivity Labels Versions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-versions.md
Previously updated : 03/09/2023 Last updated : 03/06/2023 audience: Admin
The numbers listed are the minimum Office application versions required for each
|--|-:|-||-|-| |[AIP add-in disabled by default](sensitivity-labels-aip.md#how-to-configure-newer-versions-of-office-to-enable-the-aip-add-in)| Preview: [Current Channel (Preview)](https://office.com/insider) | Not relevant | Not relevant | Not relevant| Not relevant | |Manually apply, change, or remove label <br /> - [Files and emails](https://support.microsoft.com/office/apply-sensitivity-labels-to-your-files-and-email-in-office-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9)| Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ | 16.21+ | 4.7.1+ | 4.0.39+ | Yes |
-|Manually apply, change, or remove label <br /> - [Calendar items](sensitivity-labels-meetings.md)| Current Channel: Rolling to 2302+ | Rolling out: 16.70+ <sup>\*</sup> | Under review | Under review | Yes |
+|Manually apply, change, or remove label <br /> - [Calendar items](sensitivity-labels-meetings.md)| Preview: Rolling out to [Current Channel (Preview)](https://office.com/insider) | Rolling out: 16.70+ <sup>\*</sup> | Under review | Under review | Yes |
|[Multi-language support](create-sensitivity-labels.md#additional-label-settings-with-security--compliance-powershell)| Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ | 16.21+ | 4.7.1+ | 4.0.39+ | Yes | |[Apply a default label](sensitivity-labels.md#what-label-policies-can-do) | Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ | 16.21+ | 4.7.1+ | 4.0.39+ | Yes | |[Require a justification to change a label](sensitivity-labels.md#what-label-policies-can-do) | Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ | 16.21+ | 4.7.1+ | 4.0.39+ | Yes |
The numbers listed are the minimum Office application versions required for each
|[Sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) and [display label color](sensitivity-labels-office-apps.md#label-colors) | Preview: Rolling out to [Current Channel (Preview)](https://office.com/insider) | Under review | Under review | Under review | Under review | |[Default sublabel for parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label)| Current Channel: Rolling out to 2302+ | Under review | Under review | Under review | Under review | |[Scope labels to files or emails](sensitivity-labels-office-apps.md#scope-labels-to-just-files-or-emails) | Current Channel: 2301+ | Rolling out: 16.70+ <sup>\*</sup> | Rolling out 4.2309+| Rolling out 4.2309+ | Yes |
-|[Preventing oversharing as DLP policy tip](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup-preview)| Preview: Rolling out to [Beta Channel](https://office.com/insider) | Under review | Under review | Under review | Under review |
**Footnotes:**
compliance Sit Modify Edm Schema Configurable Match https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-modify-edm-schema-configurable-match.md
Exact Data Match (EDM) based classification enables you to create custom sensiti
- a-z - \" - \,
+ - \n (new line)
+ - \t (tab)
6. [Connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell).
compliance Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/whats-new.md
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
### Sensitivity labels -- **General availability (GA)**: Both Outlook for Windows and Outlook for Mac are rolling out in general availability for [protected meetings](sensitivity-labels-meetings.md).
+- **General availability (GA)**: Outlook for Mac is now rolling out in general availability for [protected meetings](sensitivity-labels-meetings.md).
- **General availability (GA)**: Now rolling out in general availability for built-in labeling for Windows, support for a [default sublabel for a parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label) as a parity feature for the AIP add-in.
+- **General availability (GA)**: For labeling built into Windows, macOS, iOS, and Android, auditing actions for sensitivity labels include encryption details such as a change in the encryption status and settings, and the Rights Management owner.
+- **In preview**: The ability to [scope labels to files and emails](sensitivity-labels-office-apps.md#scope-labels-to-just-files-or-emails), so that for example, a sensitivity label is visible to users in Outlook but not in Word, Excel, or PowerPoint. This configuration can be used as a parity feature for the AIP add-in, which could be disabled per app.
+- **In preview**: Prevent [oversharing of labeled emails as a DLP policy tip](dlp-create-deploy-policy.md). This DLP policy configuration is an equivalent for the AIP add-in with PowerShell advanced settings that implement pop-up messages in Outlook that warn, justify, or block emails being sent.
+- **Removal of restrictions for prevent copying chat for protected meetings**: The label setting that [prevents copying chat to the clipboard](sensitivity-labels-meetings.md#prevent-copying-chat-to-the-clipboard-label-setting) now supports users outside your organization and also users who join a chat but weren't invited to the meeting.
## February 2023
enterprise Multi Geo Capabilities In Exchange Online https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/multi-geo-capabilities-in-exchange-online.md
Exchange Online synchronizes the **PreferredDataLocation** property from Azure A
- Public folders are supported in multi-geo organizations. However, the public folders must remain in the central geo location. You can't move public folders to satellite geo locations. -- In a multi-geo environment, cross-geo mailbox auditing is not supported. For example, if a user is assigned permissions to access a shared mailbox in a different geo location, mailbox actions performed by that user are not logged in the mailbox audit log of the shared mailbox. Exchange admin audit events are available for all locations via [Microsoft Purview](/microsoft-365/compliance/audit-solutions-overview) and the [Search-UnifiedAuditLog](/powershell/module/exchange/search-unifiedauditlog) cmdlet. For more information, see [Manage mailbox auditing](../compliance/enable-mailbox-auditing.md).
+- In a multi-geo environment, cross-geo mailbox auditing is not supported. For example, if a user is assigned permissions to access a shared mailbox in a different geo location, mailbox actions performed by that user are not logged in the mailbox audit log of the shared mailbox. Exchange admin audit events are also only available for the default location. For more information, see [Manage mailbox auditing](../compliance/enable-mailbox-auditing.md).
enterprise O365 Data Locations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/o365-data-locations.md
description: "Determine where your Microsoft 365 customer data is stored worldwi
See the following links to understand workload data location. -- Exchange Online [Data Residency for Exchange Online](/microsoft-365/enterprise/m365-dr-workload-exo)
+- Exchange Online (EXO) [Exchange Online Data Location](m365-dr-workload-exo.md#how-can-i-determine-customer-data-location)
- SharePoint Online (ODSP) and OneDrive for Business [Data Location](m365-dr-workload-spo.md#how-can-i-determine-customer-data-location) - Microsoft Teams [Data Location](m365-dr-workload-teams.md#how-can-i-determine-customer-data-location) - Microsoft Defender for Office (MDO P1) [Data Location](m365-dr-workload-mdo-p1.md#how-can-i-determine-customer-data-location)
frontline Shifts Connector Prerequisites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/includes/shifts-connector-prerequisites.md
Previously updated : 03/9/2023 Last updated : 03/31/2022 audience: admin
Before you get started, make sure you have the following prerequisites:
- Site manager API URL - Administration API URL
- If you donΓÇÖt have this information, contact Blue Yonder support. The account is created at the root enterprise level by a Blue Yonder enterprise administrator. It must have API Access, Client Admin, and Store Manager access. The account and password are required to create a connection.
- [![Screenshot of the required access in Blue Yonder WFM.](../media/shifts-connector-by-permission.png)](../media/shifts-connector-by-permission.png#lightbox)
+ If you donΓÇÖt have this information, contact Blue Yonder support. The account is created at the root enterprise level by a Blue Yonder enterprise administrator. It must have API Access, Client Admin, Store Manager, and Worker access. The account and password are required to create a connection.
- Federated SSO authentication is enabled in your Blue Yonder WFM environment. Contact Blue Yonder support to make sure federated SSO is enabled. They'll need the following information: - federatedSSOValidationService: `https://wfmconnector.teams.microsoft.com/api/v1/fedauth/{tenantId}/6A51B888-FF44-4FEA-82E1-839401E9CD74/authorize` where {tenantId} is your tenantId - proxyHeader: X-MS-AuthToken - At least one team is set up in Teams.-- You added a Microsoft 365 system account as a team owner to all teams you want to map.</br> [Create this account in Microsoft 365](/microsoft-365/admin/add-users/add-users) and assign it a Microsoft 365 license. Then, add the account as a team owner to all teams that you want to map. The Shifts connector uses this account when syncing Shifts changes from Blue Yonder WFM. Therefore, we recommend that you create an account specifically for this purpose and not use your personal user account.
+- You added a Microsoft 365 system account as a team owner to all teams you want to map.</br> [Create this account in Microsoft 365](/microsoft-365/admin/add-users/add-users) and assign it a Microsoft 365 license. Then, add the account as a team owner to all teams that you want to map. The Shifts connector uses this account when syncing Shifts changes from Blue Yonder WFM. Therefore, we recommend that you create an account specifically for this purpose and not use your personal user account.
includes Advanced Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/advanced-management.md
-![Information icon](../media/info.png) **Some features in this article require [Microsoft Syntex - SharePoint Advanced Management](/sharepoint/advanced-management)**
-
security Faqs Tamper Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/faqs-tamper-protection.md
description: Frequently asked questions on configuring tamper protection.
keywords: malware, defender, antivirus, tamper protection ms.localizationpriority: medium Previously updated : 03/06/2023 Last updated : 03/09/2023 audience: ITPro
If you're using Configuration Manager, version 2006, with tenant attach, tamper
If you're an organization using [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint), you can choose from several options to manage tamper protection: - The [Microsoft 365 Defender portal](manage-tamper-protection-microsoft-365-defender.md) (turn tamper protection on or off, tenant wide)-- [Intune](manage-tamper-protection-intune.md) (turn tamper protection on or off, and/or configure tamper protection for some or all users)
+- [Intune](manage-tamper-protection-intune.md) (turn tamper protection on or off for some or all devices, and edit tamper-protected antivirus exclusions)
- [Configuration Manager](manage-tamper-protection-configuration-manager.md) (with tenant attach, you can configure tamper protection for some or all devices by using the Windows Security experience profile) - [Windows Security app](manage-tamper-protection-individual-device.md) (for an individual device used at home or that isn't centrally managed by a security team)
If tamper protection prevents your IT or security team from performing a necessa
## Can I change individual tamper-protected settings?
-If tamper protection is turned on for your organization, you won't be able to make changes to individual settings that are tamper protected. However, if you're managing tamper protection and devices in Intune, you can edit exclusions for Microsoft Defender Antivirus. See [Tamper protection for exclusions](manage-tamper-protection-intune.md#tamper-protection-for-exclusions).
+If tamper protection is turned on for your organization, you won't be able to make changes to individual settings that are tamper protected. However, if you're using Intune or Configuration Manager, you can exclude devices from tamper protection. And if you're using Intune, you can edit exclusions for Microsoft Defender Antivirus. See [Tamper protection for antivirus exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions).
## Does tamper protection apply to Microsoft Defender Antivirus exclusions?
-New functionality is rolling out now to protect Microsoft Defender Antivirus exclusions on devices that are managed by Intune. Certain conditions must be met. See [What about exclusions](prevent-changes-to-security-settings-with-tamper-protection.md#what-about-exclusions)?
+New functionality is rolling out now to protect Microsoft Defender Antivirus exclusions on devices that are managed by Intune. Certain conditions must be met. See [Tamper protection for antivirus exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions).
## How does configuring tamper protection in Intune affect how I manage Microsoft Defender Antivirus with Group Policy?
If you're using Intune to configure and manage tamper protection, you can target
## What settings can't be changed when tamper protection is turned on?
-When tamper protection is turned on, tamper-protected settings can't be changed from their default value, even if you're using Intune to manage your security settings. Changes might appear to be successful in Intune, but won't actually be allowed by tamper protection. For the most current list of tamper protected settings, contact support.
+When tamper protection is turned on, tamper-protected settings can't be changed from their default value, even if you're using Intune or Configuration Manager to manage your security settings. Changes might appear to be successful in Intune or Configuration Manager, but won't actually be allowed by tamper protection. For a list of settings, see [What happens when tamper protection is turned on](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on)?
## If tamper protection is turned on in Microsoft 365 Defender, can Intune override it?
Use Intune to deploy [DisableLocalAdminMerge](/windows/client-management/mdm/def
## How can I confirm whether exclusions are tamper protected on a Windows device?
-You can use a registry key to determine whether the functionality to protect Microsoft Defender Antivirus exclusions is enabled.
-
-1. On a Windows device open Registry Editor. (Read-only mode is fine; you won't be editing the registry key.)
-
-2. Go to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features` (or `HKLM\SOFTWARE\Microsoft\Windows Defender\Features`), and look for a `REG_DWORD` entry called **TPExclusions**.
-
- - If **TPExclusions** has a value of `1`, then all required conditions are met, and the new functionality to protect exclusions is enabled on the device. In this case, exclusions are tamper protected.
- - If **TPExclusions** has a value of `0`, then tamper protection isn't currently protecting exclusions on the device.
-
-> [!CAUTION]
-> Do not change the value of **TPExclusions**. Use the preceding procedure for information only. Changing the key will have no effect on whether tamper protection applies to exclusions.
+See [How to determine whether antivirus exclusions are tamper protected on a Windows device](manage-tamper-protection-intune.md#how-to-determine-whether-antivirus-exclusions-are-tamper-protected-on-a-windows-device).
## Can I configure tamper protection with Microsoft Configuration Manager?
security Live Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/live-response.md
Before you can initiate a session on a device, make sure you fulfill the followi
You'll need to enable the live response capability in the [Advanced features settings](advanced-features.md) page. > [!NOTE]
- > Only admins and users who have "Manage Portal Settings" permissions can enable live response.
+ > Only admins and users who have "Manage Portal Settings" permissions can enable live response.
+ >
+ > Automated Investigation must be enabled in the [Advanced features settings](advanced-features.md) prior to enabling live response.
- **Enable live response for servers from the advanced settings page** (recommended).
security Manage Tamper Protection Configuration Manager https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-tamper-protection-configuration-manager.md
description: Turn tamper protection on or off using tenant attach with Configuration Manager. keywords: malware, defender, antivirus, tamper protection, Configuration Manager
-ms.pagetype: security
-ms.sitesec: library
ms.localizationpriority: medium Previously updated : 03/06/2023 Last updated : 03/09/2023 audience: ITPro
search.appverid: met150
**Platforms** - Windows
-If you're using [version 2006 of Configuration Manager](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2006), you can manage tamper protection settings on Windows 10, Windows 10 Enterprise multi-session, Windows 11, Windows 11 Enterprise multi-session, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, and Windows Server 2022 by using a method called *tenant attach*. Tenant attach enables you to sync your on-premises-only Configuration Manager devices into the Intune admin center, and then deliver endpoint security configuration policies to on-premises collections & devices.
+[Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) helps protect certain [security settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on), such as virus and threat protection, from being disabled or changed. If you're part of your organization's security team, and you're using [version 2006 of Configuration Manager](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2006), you can manage tamper protection for devices by using a method called *tenant attach*. Tenant attach enables you to sync your on-premises-only Configuration Manager devices into the Intune admin center, and then deliver endpoint security configuration policies to on-premises collections & devices.
-> [!NOTE]
-> The procedure can be used to extend tamper protection to devices running Windows 10, Windows 10 Enterprise multi-session, Windows 11, Windows 11 Enterprise multi-session, Windows Server 2019, and Windows Server 2022. Make sure to review the prerequisites and other information in the resources mentioned in this procedure. For Windows Server 2012 R2 running the modern, unified solution [version 2203 of Configuration Manager](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2203) is required.
+Using Configuration Manager with tenant attach, you can turn tamper protection on (or off) for some or all devices.
+
+> [!IMPORTANT]
+> When tamper protection is turned on, [tamper-protected settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-is-tamper-protection) cannot be changed from their default values. To avoid breaking management experiences, including Intune and Configuration Manager, keep in mind that changes to tamper-protected settings might appear to succeed but are actually blocked by tamper protection. You can use [Intune](manage-tamper-protection-intune.md) and Configuration Manager to exclude devices from tamper protection. And, if you're managing tamper protection through Intune, you can change [tamper-protected antivirus exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions).
+ 1. Set up tenant attach. To learn more, see [Get started: Create and deploy endpoint security policies from the admin center](/mem/configmgr/tenant-attach/endpoint-security-get-started).
If you're using [version 2006 of Configuration Manager](/mem/configmgr/core/plan
- In the **Platform** list, select **Windows 10, Windows 11, and Windows Server (ConfigMgr)**. - In the **Profile** list, select **Windows Security experience (preview)**.
-3. Deploy the policy to your device collection.
+3. On the **Configuration settings** step, under **Windows Security**, set **Enable tamper protection to prevent Microsoft Defender from being disabled** to **Enabled**.
+
+4. Finish selecting options and settings for your policy.
-## Need help with this method?
+5. Deploy the policy to your devices.
-See the following resources:
+## See also
+- [Protect macOS security settings with tamper protection](tamperprotection-macos.md)
- [Settings for the Windows Security experience profile in Microsoft Intune](/mem/intune/protect/antivirus-security-experience-windows-settings) - [Tech Community Blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin)
security Manage Tamper Protection Individual Device https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-tamper-protection-individual-device.md
description: Turn tamper protection on or off for an individual device. keywords: malware, defender, antivirus, tamper protection
-ms.pagetype: security
-ms.sitesec: library
ms.localizationpriority: medium Previously updated : 03/06/2023 Last updated : 03/08/2023 audience: ITPro
search.appverid: met150
**Platforms** - Windows
+[Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) helps protect certain [security settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on), such as virus and threat protection, from being disabled or changed.
-If you're a home user, or you aren't subject to settings managed by a security team, you can use the Windows Security app to manage tamper protection. You must have appropriate admin permissions on your device to do change security settings, such as tamper protection.
-
-Here's what you see in the Windows Security app:
-
+If you're a home user, or you aren't subject to settings managed by a security team, you can use the Windows Security app to manage tamper protection on an individual Windows device. You must have appropriate admin permissions on your device to do change security settings, such as tamper protection.
1. On a Windows device, select **Start**, and start typing *Security*. In the search results, select **Windows Security**.
Here's what you see in the Windows Security app:
3. Set **Tamper Protection** to **On** or **Off**.
+Here's what you see in the Windows Security app:
+++ > [!NOTE] > Tamper protection blocks attempts to modify Microsoft Defender Antivirus settings through the registry. >
security Manage Tamper Protection Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-tamper-protection-intune.md
description: Turn tamper protection on or off for your organization in Microsoft
keywords: malware, defender, antivirus, tamper protection, Microsoft Intune ms.localizationpriority: medium Previously updated : 03/06/2023 Last updated : 03/09/2023 audience: ITPro
search.appverid: met150
**Platforms** - Windows
-[Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) helps protect your security settings from being disabled or changed. If your organization uses [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), you manage tamper protection for your organization in the [Intune admin center](https://endpoint.microsoft.com). With Intune, you can enable tamper protection on some, but not all devices. You can also tamper protect exclusions that are defined for Microsoft Defender Antivirus.
+[Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) helps protect certain [security settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on), such as virus and threat protection, from being disabled or changed. If you're part of your organization's security team, and you're using [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), you can manage tamper protection for your organization in the [Intune admin center](https://endpoint.microsoft.com).
-Tamper protection is part of anti-tampering capabilities that include [standard protection attack surface reduction rules](attack-surface-reduction-rules-reference.md).
+Using Intune, you can:
+
+- [Turn tamper protection on (or off) for some or all devices](#turn-tamper-protection-on-or-off-in-microsoft-intune).
+- [Tamper protect antivirus exclusions](#tamper-protection-for-antivirus-exclusions) that are defined for Microsoft Defender Antivirus.
> [!IMPORTANT]
-> If you're using Microsoft Intune to manage Defender for Endpoint settings, we recommend setting [DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp#configurationdisablelocaladminmerge) to true on devices.
+> If you're using Microsoft Intune to manage Defender for Endpoint settings, make sure to set [DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp#configurationdisablelocaladminmerge) to true on devices.
>
-> When tamper protection is turned on, tamper protected settings cannot be changed from their default value. Changes might appear to be successful in Intune, but will not actually be allowed by tamper protection. For the most current list of tamper protected settings, contact support.
+> When tamper protection is turned on, [tamper-protected settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on) cannot be changed from their default values. To avoid breaking management experiences, including Intune and Configuration Manager, keep in mind that changes to tamper-protected settings might appear to succeed but are actually blocked by tamper protection. You can use Intune and [Configuration Manager](manage-tamper-protection-configuration-manager.md) to exclude devices from tamper protection. And, if you're managing tamper protection through Intune, you can change [tamper-protected antivirus exclusions](#tamper-protection-for-antivirus-exclusions).
## Requirements for managing tamper protection in Intune -- You must have appropriate [permissions](/microsoft-365/security/defender-endpoint/assign-portal-access) assigned, such as global admin, security admin, or security operations.-- Your organization uses [Intune to manage devices](/mem/endpoint-manager-getting-started). (Intune licenses are required; Intune is included in Microsoft 365 E3/E5, Enterprise Mobility + Security E3/E5, Microsoft 365 Business Premium, Microsoft 365 F1/F3, Microsoft 365 Government G3/G5, and corresponding education licenses.)-- Your Windows devices must be running Windows 10 [version 1709 or later](/lifecycle/announcements/revised-end-of-service-windows-10-1709) or Windows 11. (For more information about releases, see [Windows release information](/windows/release-health/release-information).)
+- You must have appropriate permissions assigned through roles, such as Global Administrator or Security Administrator. (See [Azure Active Directory roles with Intune access](/mem/intune/fundamentals/role-based-access-control#azure-active-directory-roles-with-intune-access).)
+
+- Your organization uses [Intune to manage devices](/mem/intune/fundamentals/manage-devices). (Intune licenses are required; Intune is included in Microsoft 365 E3/E5, Enterprise Mobility + Security E3/E5, Microsoft 365 Business Premium, Microsoft 365 F1/F3, Microsoft 365 Government G3/G5, and corresponding education licenses.)
+
+- Windows devices must be running Windows 10 [version 1709 or later](/lifecycle/announcements/revised-end-of-service-windows-10-1709) or Windows 11. (For more information about releases, see [Windows release information](/windows/release-health/release-information).)
+ - You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above).-- Your devices must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version `1.1.15500.X` (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)+
+- Devices must be using anti-malware platform version `4.18.1906.3` (or above) and anti-malware engine version `1.1.15500.X` (or above). (See [Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)
+ - Your Intune and Defender for Endpoint tenants must share the same Microsoft Entra (Azure Active Directory) infrastructure.+ - Your devices must be onboarded to Defender for Endpoint. > [!NOTE]
-> If your devices are not enrolled in Microsoft Defender for Endpoint, tamper protection will show as **Not Applicable** until the onboarding process completes.
+> If devices are not enrolled in Microsoft Defender for Endpoint, tamper protection will show as **Not Applicable** until the onboarding process completes.
> Tamper protection can prevent changes to security settings from occurring. If you see an error code with Event ID 5013, see [Review event logs and error codes to troubleshoot issues with Microsoft Defender Antivirus](troubleshoot-microsoft-defender-antivirus.md). ## Turn tamper protection on (or off) in Microsoft Intune
Tamper protection is part of anti-tampering capabilities that include [standard
2. Create a profile that includes the following setting:
- - **TamperProtection (Device): Enable**
-
-3. Assign the profile to one or more groups.
+ - **TamperProtection (Device): On**
-## How to tell if a Windows device is managed by Intune
+3. Finish selecting options and settings for your policy.
-You can use a registry key to confirm whether a Windows device is managed by Intune, or co-managed by Intune and Configuration Manager.
+4. Deploy the policy to devices.
-1. On a Windows device open Registry Editor. (Read-only mode is fine; you won't be editing the registry key.)
+## Tamper protection for antivirus exclusions
-2. Go to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender` (or `HKLM\SOFTWARE\Microsoft\Windows Defender`), and look for a `REG_DWORD` entry called **ManagedDefenderProductType**.
-
- - If **ManagedDefenderProductType** has a value of `6`, then the device is managed by Intune.
- - If **ManagedDefenderProductType** has a value of `7`, then the device is [co-managed](/mem/configmgr/comanage/overview) by Intune and Configuration Manager.
+If your organization has [exclusions defined for Microsoft Defender Antivirus](configure-exclusions-microsoft-defender-antivirus.md), tamper protection will protect those exclusions, provided all of the following conditions are met:
-> [!CAUTION]
-> Do not change the value of **ManagedDefenderProductType**. Use the preceding procedure for information only. Changing the key will have no effect on how the device is managed.
+- Devices are running Windows Defender platform `4.18.2211.5` or later. (See [Monthly platform and engine versions](manage-updates-baselines-microsoft-defender-antivirus.md#monthly-platform-and-engine-versions).)
-## Tamper protection for exclusions
+- `DisableLocalAdminMerge` is enabled. (See [DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp).)
-If your organization has [exclusions defined for Microsoft Defender Antivirus](configure-exclusions-microsoft-defender-antivirus.md), tamper protection will protect those exclusions, provided all of the following conditions are met:
+- Tamper protection is deployed through Intune, and devices are managed by Intune only.
-- Tamper protection is deployed and managed by using Intune, and devices are managed by Intune.-- `DisableLocalAdminMerge` is enabled. (See [DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp).) - Microsoft Defender Antivirus exclusions are managed in Microsoft Intune. (See [Settings for Microsoft Defender Antivirus policy in Microsoft Intune for Windows devices](/mem/intune/protect/antivirus-microsoft-defender-settings-windows).)-- Devices are running Windows Defender platform `4.18.2211.5` or later. (See [Monthly platform and engine versions](manage-updates-baselines-microsoft-defender-antivirus.md#monthly-platform-and-engine-versions).)-- Functionality to protect exclusions is enabled on devices. (See [How to determine whether the functionality is enabled on a Windows device](#how-to-determine-whether-the-functionality-to-protect-exclusions-is-enabled-on-a-windows-device).)+
+- Functionality to protect Microsoft Defender Antivirus exclusions is enabled on devices. (See [How to determine whether antivirus exclusions are tamper protected on a Windows device](#how-to-determine-whether-antivirus-exclusions-are-tamper-protected-on-a-windows-device).)
> [!TIP]
-> For more detailed information about exclusions, see [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
+> For more detailed information about Microsoft Defender Antivirus exclusions, see [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
-### How to determine whether the functionality to protect exclusions is enabled on a Windows device
+## How to determine whether antivirus exclusions are tamper protected on a Windows device
You can use a registry key to determine whether the functionality to protect Microsoft Defender Antivirus exclusions is enabled. Note that the following procedure describes how to view, but not change, tamper protection status.
You can use a registry key to determine whether the functionality to protect Mic
2. To confirm that the device is managed by Intune only, go to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender` (or `HKLM\SOFTWARE\Microsoft\Windows Defender`), and look for a `REG_DWORD` entry called **ManagedDefenderProductType**. - If **ManagedDefenderProductType** has a value of `6`, then the device is managed by Intune only (*this value is required for exclusions to be tamper protected*).
- - If **ManagedDefenderProductType** has a value of `7`, then the device is co-managed, such as by Intune and Configuration Manager.
+ - If **ManagedDefenderProductType** has a value of `7`, then the device is co-managed, such as by Intune and Configuration Manager (*this value indicates that exclusions are not currently tamper protected*).
-3. To confirm that tamper protection is deployed and that exclusions are tamper protected, go to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features` (or `HKLM\SOFTWARE\Microsoft\Windows Defender\Features`), and look for the `REG_DWORD` entries that are listed in the following table:
+3. To confirm that tamper protection is deployed and that exclusions are tamper protected, go to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features` (or `HKLM\SOFTWARE\Microsoft\Windows Defender\Features`), and look for a `REG_DWORD` entry called **TPExclusions**.
- | REG_DWORD | Value | What it means |
- |:|:|:|
- | **TamperProtection** | 5 | Tamper protection is deployed to the device. |
- | **TamperProtectionSource** | 64 | Tamper protection is managed by Intune. |
- | **TPExclusions** | 1 | Required conditions are met, and the new functionality to protect exclusions is enabled on the device. In this case, exclusions are tamper protected. |
- | **TPExclusions** | 0 | Tamper protection isn't currently protecting exclusions on the device. |
+ - If **TPExclusions** has a value of `1`, then all required conditions are met, and the new functionality to protect exclusions is enabled on the device. In this case, exclusions are tamper protected.
+ - If **TPExclusions** has a value of `0`, then tamper protection isn't currently protecting exclusions on the device. (*If you meet all the requirements and this state seems incorrect, contact support*.)
> [!CAUTION]
-> Do not change the value of the registry keys. Use the preceding procedure for information only. Changing keys will have no effect on whether tamper protection applies to exclusions.
-
+> **Do not change the value of the registry keys**. Use the preceding procedure for information only. Changing keys will have no effect on whether tamper protection applies to exclusions.
+## See also
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
+- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
+- [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
security Manage Tamper Protection Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-tamper-protection-microsoft-365-defender.md
Title: Manage tamper protection for your organization using Microsoft 365 Defender-+ description: Turn tamper protection on or off for your tenant using the Microsoft 365 Defender portal. keywords: malware, defender, antivirus, tamper protection, Microsoft 365 Defender
-ms.pagetype: security
-ms.sitesec: library
ms.localizationpriority: medium Previously updated : 03/06/2023 Last updated : 03/09/2023 audience: ITPro
search.appverid: met150
**Platforms** - Windows
-[Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) helps protect your security settings from being disabled or changed. Tamper protection is part of anti-tampering capabilities that include [standard protection attack surface reduction rules](attack-surface-reduction-rules-reference.md). Tamper protection is an important part of your security strategy, as it helps prevent important security settings from being disabled or turned off.
+[Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) helps protect certain [security settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on), such as virus and threat protection, from being disabled or changed. If you're part of your organization's security team, you can turn tamper protection on (or off) tenant wide by using the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)).
-You can turn tamper protection on (or off) tenant wide by using the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)).
+> [!IMPORTANT]
+> If tamper protection is [deployed and managed through Intune](manage-tamper-protection-intune.md), turning tamper protection on or off in the Microsoft 365 Defender portal won't impact the state of tamper protection. It will restrict tamper-protected settings to their secure default values. For more information, see [What happens when tamper protection is turned on](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on)?
## Requirements for managing tamper protection in the Microsoft 365 Defender portal -- You must have appropriate [permissions](/microsoft-365/security/defender-endpoint/assign-portal-access) assigned, such as global admin, security admin, or security operations.
+- You must have appropriate permissions assigned through roles, such as Global Administrator or Security Administrator. (See [Microsoft 365 Defender role-based access control (RBAC)](../defender/manage-rbac.md).)
-- Your Windows devices must be running one of the following versions of Windows:
-
- - Windows 11
- - Windows 11 Enterprise multi-session
- - Windows 10
- - Windows 10 Enterprise multi-session
- - Windows Server 2022
- - Windows Server 2019
- - Windows Server, version 1803 or later
- - Windows Server 2016
- - Windows Server 2012 R2
+- Devices must be running certain versions of Windows or macOS. (See [On what devices can tamper protection be enabled?](prevent-changes-to-security-settings-with-tamper-protection.md#on-what-devices-can-tamper-protection-be-enabled).)
-For more information about releases, see [Windows 10 release information](/windows/release-health/release-information).
+- Devices must be [onboarded to Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/onboarding).
+
+- Devices must be using anti-malware platform version `4.18.2010.7` (or above) and anti-malware engine version `1.1.17600.5` (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)
-- Your devices must be [onboarded to Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/onboarding).-- Your devices must be using anti-malware platform version `4.18.2010.7` (or above) and anti-malware engine version `1.1.17600.5` (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).) - [Cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) must be turned on. > [!NOTE]
-> When tamper protection is enabled via the Microsoft 365 Defender portal, cloud-delivered protection is required, so that the enabled state of tamper protection can be controlled.
-> Starting with the November 2021 update (platform version `4.18.2111.5`), if cloud-delivered protection is not turned on for a device and tamper protection is turned on in the Microsoft 365 Defender portal, then cloud-delivered protection will be automatically turned on for that device along with tamper protection.
+> When tamper protection is enabled via the Microsoft 365 Defender portal, [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) is required so that the enabled state of tamper protection can be controlled.
+> Starting with the November 2021 update (platform version `4.18.2111.5`), if cloud-delivered protection is not already turned on for a device, when tamper protection is turned on, cloud-delivered protection will be turned on automatically on the device.
## Turn tamper protection on (or off) in the Microsoft 365 Defender portal
For more information about releases, see [Windows 10 release information](/windo
## Important points to keep in mind -- When you manage tamper protection in the Microsoft 365 Defender portal, the setting is applied tenant wide, affecting all of your devices that are running Windows 10, Windows 10 Enterprise multi-session, Windows 11, Windows 11 Enterprise multi-session, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019 or Windows Server 2022. To turn tamper protection on for some devices but off for others, use either [Manage tamper protection for your organization using Microsoft Intune](manage-tamper-protection-intune.md) or [Manage tamper protection using tenant attach with Configuration Manager, version 2006](manage-tamper-protection-configuration-manager.md).-- Currently, the option to manage tamper protection in the Microsoft 365 Defender portal is on by default for new deployments. For existing deployments, tamper protection is available on an opt-in basis. To opt in, in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>, choose **Settings** \> **Endpoints** \> **Advanced features** \> **Tamper protection**.-- If you're using the Microsoft 365 Defender portal to manage tamper protection, you don't have to use Intune or the tenant attach method.-- If your organization is currently using Microsoft Intune to manage security settings (such as tamper protection), turning tamper protection on or off in the Microsoft 365 Defender portal won't override settings managed in Intune.-- If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft 365 Defender portal.
+- When you enable tamper protection in the Microsoft 365 Defender portal, the setting is applied tenant wide, and will restrict [tamper-protected settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on) to their secure defaults. You can use [Intune](manage-tamper-protection-intune.md) or [Configuration Manager with tenant attach](manage-tamper-protection-configuration-manager.md) to exclude devices from tamper protection. You can also use Intune to [tamper-protect antivirus exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions).
+
+- Currently, the option to manage tamper protection in the Microsoft 365 Defender portal is on by default for new deployments, as part of [built-in protection, which helps guard against ransomware](built-in-protection.md). For existing deployments, tamper protection is available on an opt-in basis. To opt in, in the [Microsoft 365 Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139), choose **Settings** \> **Endpoints** \> **Advanced features** \> **Tamper protection**.
+
+## See also
+- [Built-in protection helps guard against ransomware](built-in-protection.md)
+- [What happens when tamper protection is turned on?](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on)
+- [Protect macOS security settings with tamper protection](tamperprotection-macos.md)
security Microsoft Defender Endpoint Android https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-android.md
This topic describes how to install, configure, update, and use Defender for End
- Mobile phones and tablets running Android 8.0 and above. **Mobile phones running Android go and other mobile devices running Android are not currently supported.** - Intune Company Portal app is downloaded from [Google Play](https://play.google.com/store/apps/details?id=com.microsoft.windowsintune.companyportal) and installed. Device enrollment is required for Intune device compliance policies to be enforced.
+ > [!NOTE]
+ > Microsoft Defender for Endpoint on Android isn't supported on userless or shared devices.
+ ### Installation instructions Microsoft Defender for Endpoint on Android supports installation on both modes of enrolled devices - the legacy Device Administrator and Android Enterprise modes. **Currently, Personally-owned devices with work profile, Corporate-owned devices with work profile, and Corporate-owned fully managed user device enrollments are supported in Android Enterprise. Support for other Android Enterprise modes will be announced when ready.**
security Prevent Changes To Security Settings With Tamper Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md
description: Use tamper protection to prevent malicious apps from changing impor
keywords: malware, defender, antivirus, tamper protection ms.localizationpriority: medium Previously updated : 03/07/2023 Last updated : 03/09/2023 audience: ITPro
search.appverid: met150
- Windows - [macOS](tamperprotection-macos.md) - ## What is tamper protection?
-Tamper protection is a capability in Microsoft Defender for Endpoint that helps protect certain security settings from being disabled or changed. During some kinds of cyber attacks, bad actors try to disable security features, such as antivirus protection, on devices. Disabling security features provides bad actors with easier access to your data, the ability to install malware, and the ability to exploit your data, identity, and devices. Tamper protection helps guard against these types of activities.
+Tamper protection is a capability in Microsoft Defender for Endpoint that helps protect certain security settings, such as virus and threat protection, from being disabled or changed. During some kinds of cyber attacks, bad actors try to disable security features on devices. Disabling security features provides bad actors with easier access to your data, the ability to install malware, and the ability to exploit your data, identity, and devices. Tamper protection helps guard against these types of activities.
Tamper protection is part of anti-tampering capabilities that include [standard protection attack surface reduction rules](attack-surface-reduction-rules-reference.md). Tamper protection is an important part of [built-in protection](built-in-protection.md). ## What happens when tamper protection is turned on?
-When tamper protection is turned on, tamper protected settings cannot be changed from their default values.
+When tamper protection is turned on, tamper-protected settings can't be changed from their default values:
-- Virus and threat protection are enabled.
+- Virus and threat protection is enabled.
- Real-time protection is turned on. - Behavior monitoring is turned on. - Antivirus protection, including IOfficeAntivirus (IOAV) is enabled.
When tamper protection is turned on, tamper protected settings cannot be changed
- Security intelligence updates occur. - Automatic actions are taken on detected threats. - Notifications are visible in the Windows Security app on Windows devices.-- Archives and network files can be scanned.
+- Archived files are scanned.
+
+> [!NOTE]
+> As of signature release `1.383.1159.0`, due to confusion around the default value for "Allow Scanning Network Files", tamper protection no longer locks this setting to its default value. In managed environments, the default value is enabled.
+
+> [!IMPORTANT]
+> When tamper protection is turned on, the tamper-protected settings listed above cannot be changed from their default values. To avoid breaking management experiences, including [Intune](manage-tamper-protection-intune.md) and [Configuration Manager](manage-tamper-protection-configuration-manager.md), keep in mind that changes made to tamper-protected settings might appear to succeed but are actually blocked by tamper protection. You can use Intune and Configuration Manager to exclude devices from tamper protection. And, if you're managing tamper protection through Intune, you can [change tamper-protected antivirus exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions).
-Tamper protection doesn't prevent you from viewing your security settings. And, tamper protection doesn't affect how non-Microsoft antivirus apps register with the Windows Security app. If your organization is using Defender for Endpoint, individual users can't change the tamper protection setting; in those cases, tamper protection is managed by your security team. (See [How do I configure or manage tamper protection](#how-do-i-configure-or-manage-tamper-protection)?)
+Tamper protection doesn't prevent you from viewing your security settings. And, tamper protection doesn't affect how non-Microsoft antivirus apps register with the Windows Security app. If your organization is using Defender for Endpoint, individual users can't change the tamper protection setting; in those cases, tamper protection is managed by your security team. For more information, see [How do I configure or manage tamper protection](#how-do-i-configure-or-manage-tamper-protection)?
## On what devices can tamper protection be enabled?
Tamper protection is available for devices that are running one of the following
- Windows Server 2022, Windows Server 2019, and Windows Server, version 1803 or later - Windows Server 2016 and Windows Server 2012 R2 (using the modern, unified solution)
-Tamper protection is also available for Mac. For more information, see [Protect macOS security settings with tamper protection](tamperprotection-macos.md).
+Tamper protection is also available for Mac, although it works a little differently than on Windows. For more information, see [Protect macOS security settings with tamper protection](tamperprotection-macos.md).
-> [!IMPORTANT]
-> Built-in protection includes turning tamper protection on by default. To learn more about built-in protection, see:
+> [!TIP]
+> [Built-in protection](built-in-protection.md) includes turning tamper protection on by default. For more information, see:
> - [Built-in protection helps guard against ransomware](built-in-protection.md) (article) > - [Tamper protection will be turned on for all enterprise customers](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/tamper-protection-will-be-turned-on-for-all-enterprise-customers/ba-p/3616478) (Tech Community blog post)
-## How do I configure or manage tamper protection?
-
-You can use Microsoft Intune and other methods to configure or manage tamper protection, as listed in the following table:
-
-| Method | Description |
-|:|:|
-| The [Microsoft 365 Defender portal](https://security.microsoft.com) | Turn tamper protection on (or off), tenant wide. Note that this method won't override settings managed in Microsoft Intune. <br/><br/>For more information, see [Manage tamper protection for your organization using Microsoft 365 Defender](manage-tamper-protection-microsoft-365-defender.md). |
-| The [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) | Turn tamper protection on (or off), tenant wide, or all or some devices. Using this method, you can also [tamper protect exclusions](manage-tamper-protection-intune.md#tamper-protection-for-exclusions) for Microsoft Defender Antivirus. <br/><br/>For more information, see [Manage tamper protection for your organization using Intune](manage-tamper-protection-intune.md). |
-| Configuration Manager | Turn tamper protection on or off by using Configuration Manager (with tenant attach). Note that this method won't override settings managed in Intune. <br/><br/>For more information, see [Manage tamper protection for your organization using tenant attach with Configuration Manager, version 2006](manage-tamper-protection-configuration-manager.md). |
-| Windows Security app | Turn tamper protection on (or off) on an individual device that is not managed by a security team (such as devices for home use). Note that this method won't override settings managed by the Microsoft 365 Defender portal, Intune, or Configuration Manager, and it isn't intended to be used by organizations. <br/><br/>For more information, see [Manage tamper protection on an individual device](manage-tamper-protection-individual-device.md). |
-
-> [!IMPORTANT]
-> When tamper protection is turned on, tamper-protected settings cannot be changed from their default values. It might appear that changes made were successful, but changes are not actually allowed by tamper protection.
-
-## What about exclusions?
-
-Under certain conditions, tamper protection will protect exclusions that are defined for Microsoft Defender Antivirus. For more information, see [Tamper protection for exclusions](manage-tamper-protection-intune.md#tamper-protection-for-exclusions).
-
-## Are you using Windows Server 2012 R2, 2016, or Windows version 1709, 1803, or 1809?
+### Are you using Windows Server 2012 R2, 2016, or Windows version 1709, 1803, or 1809?
If you're using Windows Server 2012 R2 using the modern unified solution, Windows Server 2016, Windows 10 version 1709, 1803, or [1809](/windows/release-health/status-windows-10-1809-and-windows-server-2019), you won't see **Tamper Protection** in the Windows Security app. Instead, you can use PowerShell to determine whether tamper protection is enabled.
If you're using Windows Server 2012 R2 using the modern unified solution, Window
3. In the list of results, look for `IsTamperProtected` or `RealTimeProtectionEnabled`. (A value of *true* means tamper protection is enabled.)
+## How do I configure or manage tamper protection?
+
+You can use Microsoft Intune and other methods to configure or manage tamper protection, as listed in the following table:
+
+| Method | What you can do |
+|:|:|
+| The [Microsoft 365 Defender portal](https://security.microsoft.com) | Turn tamper protection on (or off), tenant wide. This method won't override settings that are managed in Microsoft Intune or Configuration Manager with tenant attach. <br/><br/>See [Manage tamper protection for your organization using Microsoft 365 Defender](manage-tamper-protection-microsoft-365-defender.md). |
+| The [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) | Turn tamper protection on (or off), tenant wide, for some or all devices. Using this method, you can also [tamper protect antivirus exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions) that are defined for Microsoft Defender Antivirus. <br/><br/>See [Manage tamper protection for your organization using Intune](manage-tamper-protection-intune.md). |
+| [Configuration Manager](manage-tamper-protection-configuration-manager.md) | Turn tamper protection on (or off) for some or all devices by using Configuration Manager with tenant attach. This method won't override settings managed in Intune. <br/><br/>See [Manage tamper protection for your organization using tenant attach with Configuration Manager, version 2006](manage-tamper-protection-configuration-manager.md). |
+| [Windows Security app](manage-tamper-protection-individual-device.md) | Turn tamper protection on (or off) on an individual device that isn't managed by a security team (such as devices for home use). This method won't override tamper protection settings that are managed by the Microsoft 365 Defender portal, Intune, or Configuration Manager, and it isn't intended to be used by organizations. <br/><br/>See [Manage tamper protection on an individual device](manage-tamper-protection-individual-device.md). |
+
+## What about exclusions?
+
+Under certain conditions, tamper protection can now protect antivirus exclusions that are defined for Microsoft Defender Antivirus. For more information, see [Tamper protection for exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions).
+ ## View information about tampering attempts Tampering attempts typically indicate that a larger cyberattack has taken place. Bad actors try to change security settings as a way to persist and stay undetected. If you're part of your organization's security team, you can view information about such attempts, and then take appropriate actions to mitigate threats.
security Advanced Hunting Deviceinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceinfo-table.md
- tier3 - m365-security Previously updated : 03/07/2023 Last updated : 02/16/2021 # DeviceInfo
Last updated 03/07/2023
The `DeviceInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about devices in the organization, including OS version, active users, and computer name. Use this reference to construct queries that return information from this table.
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
- For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md). | Column name | Data type | Description |
For information on other tables in the advanced hunting schema, [see the advance
|`AdditionalFields` | `string` | Additional information about the event in JSON array format | |`DeviceCategory` | `string` | Broader classification that groups certain device types under the following categories: Endpoint, Network device, IoT, Unknown | |`DeviceType` | `string` | Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer |
-|`DeviceSubtype` | `string` | Additional modifier for certain types of devices, for example, a mobile device can be a tablet or a smartphone; only available if device discovery finds enough information about this attribute |
+|`DeviceSubType` | `string` | Additional modifier for certain types of devices, for example, a mobile device can be a tablet or a smartphone; only available if device discovery finds enough information about this attribute |
|`Model` | `string` | Model name or number of the product from the vendor or manufacturer, only available if device discovery finds enough information about this attribute | |`Vendor` | `string` | Name of the product vendor or manufacturer, only available if device discovery finds enough information about this attribute | |`OSDistribution` | `string` | Distribution of the OS platform, such as Ubuntu or RedHat for Linux platforms | |`OSVersionInfo` | `string` | Additional information about the OS version, such as the popular name, code name, or version number | |`MergedDeviceIds` | `string` | Previous device IDs that have been assigned to the same device | |`MergedToDeviceId` | `string` | The most recent device ID assigned to a device |
-|`SensorHealthState` | `string` | Indicates health of the deviceΓÇÖs EDR sensor, if onboarded to Microsoft Defender For Endpoint |
-| `IsExcluded`| `bool` | Determines if the device is currently excluded from Microsoft Defender for Vulnerability Management experiences |
-|`ExclusionReason` | `string` | Indicates the reason for device exclusion |
-| `AssetValue`| `string` | Indicates the value of a device as assigned by the user |
-| `ExposureLevel` | `string` | Indicates the exposure level of a device |
-
-The `DeviceInfo` table provides device information based on periodic reports or signals (heartbeats) from a device. Complete reports are sent every hour and every time a change happens to a previous heartbeat.
+The `DeviceInfo` table provides device information based on heartbeats, which are periodic reports or signals from a device. Every fifteen minutes, the device sends a partial heartbeat that contains frequently changing attributes like `LoggedOnUsers`. Once a day, a full heartbeat containing the device's attributes is sent.
You can use the following sample query to get the latest state of a device:
security Advanced Hunting Devicenetworkinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicenetworkinfo-table.md
- m365-security - tier3 Previously updated : 03/07/2023 Last updated : 02/16/2021 # DeviceNetworkInfo
Last updated 03/07/2023
The `DeviceNetworkInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about networking configuration of machines, including network adapters, IP and MAC addresses, and connected networks or domains. Use this reference to construct queries that return information from this table.
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
- For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md). | Column name | Data type | Description |
For information on other tables in the advanced hunting schema, [see the advance
| `DefaultGateways` | `string` | Default gateway addresses in JSON array format | | `IPAddresses` | `string` | JSON array containing all the IP addresses assigned to the adapter, along with their respective subnet prefix and IP address space, such as public, private, or link-local | | `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns |
-| `NetworkAdapterVendor` | `string` | Name of the manufacturer or vendor of the network adapter |
## Related topics - [Advanced hunting overview](advanced-hunting-overview.md)
security Configure Siem Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-siem-defender.md
ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier2
Last updated 10/25/2021
> - [Microsoft 365 Defender Incidents](incident-queue.md) consists of collections of correlated alerts and their evidence. > - [Microsoft 365 Defender Streaming API](streaming-api.md) streams event data from Microsoft 365 Defender to event hubs or Azure storage accounts.
-Microsoft 365 Defender supports security information and event management (SIEM) tools ingesting information from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for a registered AAD application representing the specific SIEM solution or connector installed in your environment.
+Microsoft 365 Defender supports security information and event management (SIEM) tools ingesting information from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for a registered AAD application representing the specific SIEM solution or connector installed in your environment.
For more information, see:
For more information, see:
- [Hello World example](api-hello-world.md) - [Get access with application context](api-create-app-web.md)
-There are two primary models to ingest security information:
+There are two primary models to ingest security information:
-1. Ingesting Microsoft 365 Defender incidents and their contained alerts from a REST API in Azure.
+1. Ingesting Microsoft 365 Defender incidents and their contained alerts from a REST API in Azure.
-2. Ingesting streaming event data either through Azure Event Hubs or Azure Storage Accounts.
+2. Ingesting streaming event data either through Azure Event Hubs or Azure Storage Accounts.
-Microsoft 365 Defender currently supports the following SIEM solution integrations:
+Microsoft 365 Defender currently supports the following SIEM solution integrations:
- [Ingesting incidents from the incidents REST API](#ingesting-incidents-from-the-incidents-rest-api) - [Ingesting streaming event data via Event Hub](#ingesting-streaming-event-data-via-event-hubs)
Microsoft 365 Defender currently supports the following SIEM solution integratio
## Ingesting incidents from the incidents REST API ### Incident schema- For more information on Microsoft 365 Defender incident properties including contained alert and evidence entities metadata, see [Schema mapping](../defender/api-list-incidents.md#schema-mapping). ### Splunk
Using the new, fully supported Splunk Add-on for Microsoft Security that support
- Ingesting Defender for Endpoint alerts (from the Defender for Endpoint's Azure endpoint) and updating these alerts -- Support for updating Microsoft 365 Defender Incidents and/or Microsoft Defender for Endpoint Alerts and the respective dashboards has been moved to the Microsoft 365 App for Splunk.
+- Support for updating Microsoft 365 Defender Incidents and/or Microsoft Defender for Endpoint Alerts and the respective dashboards has been moved to the Microsoft 365 App for Splunk.
For more information on:
Framework (CEF).
For more information on the new ArcSight SmartConnector for Microsoft 365 Defender, see [ArcSight Product Documentation](https://community.microfocus.com/cyberres/productdocs/w/connector-documentation/39246/smartconnector-for-microsoft-365-defender). The SmartConnector replaces the previous FlexConnector for Microsoft Defender for Endpoint that has been deprecated.-
+
### Elastic Elastic Security combines SIEM threat detection features with endpoint prevention and response capabilities in one solution.
For more information on the event types supported by the Streaming API, see [Sup
### Splunk
-Use the Splunk Add-on for Microsoft Cloud Services to ingest events from Azure Event Hubs.
+Use the Splunk Add-on for Microsoft Cloud Services to ingest events from Azure Event Hubs.
For more information on the Splunk Add-on for Microsoft Cloud Services, see the [Microsoft Cloud Services Add-on on Splunkbase](https://splunkbase.splunk.com/app/3110/).
+
### IBM QRadar-
-Use the new IBM QRadar Microsoft 365 Defender Device Support Module (DSM) that calls the [Microsoft 365 Defender Streaming API](streaming-api.md) that allows ingesting streaming event data from Microsoft 365 Defender products via Event Hubs or Azure Storage Account. For more information on supported event types, see [Supported event types](supported-event-types.md).
+>Use the new IBM QRadar Microsoft 365 Defender Device Support Module (DSM) that calls the [Microsoft 365 Defender Streaming API](streaming-api.md) that allows ingesting streaming event data from Microsoft 365 Defender products via Event Hubs or Azure Storage Account. For more information on supported event types, see [Supported event types](supported-event-types.md).
### Elastic
security Create Custom Rbac Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/create-custom-rbac-roles.md
search.appverid: met150
The following steps guide you on how to create custom roles in Microsoft 365 Defender RBAC.
-> [!IMPORTANT]
-> You must be a Global Administrator or Security Administrator in Azure Active Directory, or have all the **Authorization** permissions assigned in Microsoft 365 Defender RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
+>[!Important]
+>You must be a Global Administrator or Security Administrator in Azure Active Directory, or have all the **Authorization** permissions assigned in Microsoft 365 Defender RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
1. Sign in to the [Microsoft 365 Defender portal](https://security.microsoft.com). 2. In the navigation pane, select **Permissions**.
The following steps guide you on how to create custom roles in Microsoft 365 Def
For more information on the RBAC custom permissions, see [About RBAC custom permissions](custom-permissions-details.md).
- > [!NOTE]
+ >[!Note]
> If all read-only or all read and manage permissions are assigned, any new permissions added to this category in the future will be automatically assigned under this role. > > If you have assigned custom permissions and new permissions are added to this category, you will need to re-assign your roles with the new permissions if needed.
The following steps guide you on how to create custom roles in Microsoft 365 Def
If a user selects all read-only permissions for a single data source, for example, Microsoft Defender for Endpoint, they will not be able to read alerts for Microsoft Defender for Office 365 or Microsoft Defender for Identity.
- > [!NOTE]
+ >[!Note]
> By selecting **Choose all data sources** all supported data sources within Microsoft 365 Defender RBAC and any future data sources that are added will be automatically assigned to this assignment. 11. In **Assigned users and groups** choose the Azure Active Directory security groups or individual users to assign the role to, and select **Add**.
- > [!NOTE]
+ >[!Note]
> In Microsoft 365 Defender RBAC, you can create as many assignments as needed under the same role with same permissions. For example, you can have an assignment within a role that has access to all data sources and then a separate assignment for a team that only needs access to Endpoint alerts from the Defender for Endpoint data source. This enables maintaining the minimum number of roles. 12. Select **Next** to review and finish creating the role and then select **Submit**.
To access and manage roles and permissions, without being a Global Administrator
11. In **Assigned users and groups** ΓÇô choose the Azure Active Directory security groups or individual users to assign the role to, and select **Add**. 12. Select **Next** to review and finish creating the role and then select **Submit**.
-> [!NOTE]
-> For the Microsoft 365 Defender security portal to start enforcing the permissions and assignments configured in your new or imported roles, you'll need to activate the new Microsoft 365 Defender RBAC model. For more information, see [Activate Microsoft 365 Defender RBAC](activate-defender-rbac.md).
+>[!Note]
+>For the Microsoft 365 Defender security portal to start enforcing the permissions and assignments configured in your new or imported roles, youΓÇÖll need to activate the new Microsoft 365 Defender RBAC model. For more information, see [Activate Microsoft 365 Defender RBAC](activate-defender-rbac.md).
## Next steps
security Custom Detection Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-detection-rules.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365initiative-m365-defender - tier2
Last updated 02/16/2021
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)] + **Applies to:** - Microsoft 365 Defender
Custom detection rules are rules you can design and tweak using [advanced huntin
## Required permissions for managing custom detections To manage custom detections, you need to be assigned one of these roles:- - **Security settings (manage)**ΓÇöUsers with this [Microsoft 365 Defender permission](/microsoft-365/security/defender/manage-rbac) can manage security settings in the Microsoft 365 Defender portal. - **Security administrator**ΓÇöUsers with this [Azure Active Directory role](/azure/active-directory/roles/permissions-reference#security-administrator) can manage security settings in the Microsoft 365 Defender portal and other portals and services. - **Security operator**ΓÇöUsers with this [Azure Active Directory role](/azure/active-directory/roles/permissions-reference#security-operator) can manage alerts and have global read-only access to security-related features, including all information in the Microsoft 365 Defender portal. This role is sufficient for managing custom detections only if role-based access control (RBAC) is turned off in Microsoft Defender for Endpoint. If you have RBAC configured, you also need the **manage security settings** permission for Defender for Endpoint.
-You can also manage custom detections that apply to data from specific Microsoft 365 Defender solutions if you have permissions for them. If you only have manage permissions for Microsoft 365 Defender for Office, for instance, you can create custom detections using `Email` tables but not `Identity` tables.
+You can also manage custom detections that apply to data from specific Microsoft 365 Defender solutions if you have permissions for them. If you only have manage permissions for Microsoft 365 Defender for Office, for instance, you can create custom detections using `Email` tables but not `Identity` tables.
To manage required permissions, a **global administrator** can: -- Assign the **security administrator** or **security operator** role in [Microsoft 365 admin center](https://admin.microsoft.com/) under **Roles** \> **Security admin**.-- Check RBAC settings for Microsoft Defender for Endpoint in [Microsoft 365 Defender](https://security.microsoft.com/) under **Settings** \> **Permissions** > **Roles**. Select the corresponding role to assign the **manage security settings** permission.
+- Assign the **security administrator** or **security operator** role in [Microsoft 365 admin center](https://admin.microsoft.com/) under **Roles** > **Security admin**.
+- Check RBAC settings for Microsoft Defender for Endpoint in [Microsoft 365 Defender](https://security.microsoft.com/) under **Settings** > **Permissions** > **Roles**. Select the corresponding role to assign the **manage security settings** permission.
> [!NOTE] > To manage custom detections, **security operators** will need the **manage security settings** permission in Microsoft Defender for Endpoint if RBAC is turned on. ## Create a custom detection rule-
-### 1. Prepare the query
+### 1. Prepare the query.
In the Microsoft 365 Defender portal, go to **Advanced hunting** and select an existing query or create a new query. When using a new query, run the query to identify errors and understand possible results.
-> [!IMPORTANT]
-> To prevent the service from returning too many alerts, each rule is limited to generating only 100 alerts whenever it runs. Before creating a rule, tweak your query to avoid alerting for normal, day-to-day activity.
+>[!IMPORTANT]
+>To prevent the service from returning too many alerts, each rule is limited to generating only 100 alerts whenever it runs. Before creating a rule, tweak your query to avoid alerting for normal, day-to-day activity.
-#### Required columns in the query results
+#### Required columns in the query results
To create a custom detection rule, the query must return the following columns: - `Timestamp`ΓÇöused to set the timestamp for generated alerts - `ReportId`ΓÇöenables lookups for the original records - One of the following columns that identify specific devices, users, or mailboxes:
- - `DeviceId`
- - `DeviceName`
- - `RemoteDeviceName`
- - `RecipientEmailAddress`
- - `SenderFromAddress` (envelope sender or Return-Path address)
- - `SenderMailFromAddress` (sender address displayed by email client)
- - `RecipientObjectId`
- - `AccountObjectId`
- - `AccountSid`
- - `AccountUpn`
- - `InitiatingProcessAccountSid`
- - `InitiatingProcessAccountUpn`
- - `InitiatingProcessAccountObjectId`
+ - `DeviceId`
+ - `DeviceName`
+ - `RemoteDeviceName`
+ - `RecipientEmailAddress`
+ - `SenderFromAddress` (envelope sender or Return-Path address)
+ - `SenderMailFromAddress` (sender address displayed by email client)
+ - `RecipientObjectId`
+ - `AccountObjectId`
+ - `AccountSid`
+ - `AccountUpn`
+ - `InitiatingProcessAccountSid`
+ - `InitiatingProcessAccountUpn`
+ - `InitiatingProcessAccountObjectId`
-> [!NOTE]
-> Support for additional entities will be added as new tables are added to the [advanced hunting schema](advanced-hunting-schema-tables.md).
+>[!NOTE]
+>Support for additional entities will be added as new tables are added to the [advanced hunting schema](advanced-hunting-schema-tables.md).
Simple queries, such as those that don't use the `project` or `summarize` operator to customize or aggregate results, typically return these common columns. There are various ways to ensure more complex queries return these columns. For example, if you prefer to aggregate and count by entity under a column such as `DeviceId`, you can still return `Timestamp` and `ReportId` by getting it from the most recent event involving each unique `DeviceId`. + > [!IMPORTANT] > Avoid filtering custom detections using the `Timestamp` column. The data used for custom detections is pre-filtered based on the detection frequency. + The sample query below counts the number of unique devices (`DeviceId`) with antivirus detections and uses this count to find only the devices with more than five detections. To return the latest `Timestamp` and the corresponding `ReportId`, it uses the `summarize` operator with the `arg_max` function. ```kusto
DeviceEvents
> [!TIP] > For better query performance, set a time filter that matches your intended run frequency for the rule. Since the least frequent run is _every 24 hours_, filtering for the past day will cover all new data.
-### 2. Create new rule and provide alert details
+### 2. Create new rule and provide alert details.
With the query in the query editor, select **Create detection rule** and specify the following alert details:
With the query in the query editor, select **Create detection rule** and specify
- **Severity**ΓÇöpotential risk of the component or activity identified by the rule - **Category**ΓÇöthreat component or activity identified by the rule - **MITRE ATT&CK techniques**ΓÇöone or more attack techniques identified by the rule as documented in the [MITRE ATT&CK framework](https://attack.mitre.org/). This section is hidden for certain alert categories, including malware, ransomware, suspicious activity, and unwanted software-- **Description**ΓÇömore information about the component or activity identified by the rule
+- **Description**ΓÇömore information about the component or activity identified by the rule
- **Recommended actions**ΓÇöadditional actions that responders might take in response to an alert #### Rule frequency- When you save a new rule, it runs and checks for matches from the past 30 days of data. The rule then runs again at fixed intervals, applying a lookback duration based on the frequency you choose: - **Every 24 hours**ΓÇöruns every 24 hours, checking data from the past 30 days
When you save a new rule, it runs and checks for matches from the past 30 days o
When you edit a rule, it will run with the applied changes in the next run time scheduled according to the frequency you set. The rule frequency is based on the event timestamp and not the ingestion time.
-> [!TIP]
-> Match the time filters in your query with the lookback duration. Results outside of the lookback duration are ignored.
++
+>[!TIP]
+> Match the time filters in your query with the lookback duration. Results outside of the lookback duration are ignored.
Select the frequency that matches how closely you want to monitor detections. Consider your organization's capacity to respond to the alerts. ##### Tables that support Continuous (NRT) frequency
-Near real-time detections are supported for the following tables:
-
+Near real-time detections are supported for the following tables:
- `AlertEvidence`-- `DeviceEvents`-- `DeviceFileCertificateInfo`-- `DeviceFileEvents`-- `DeviceImageLoadEvents`-- `DeviceLogonEvents`-- `DeviceNetworkEvents`-- `DeviceNetworkInfo`-- `DeviceInfo`-- `DeviceProcessEvents`-- `DeviceRegistryEvents`-- `EmailAttachmentInfo`-- `EmailEvents`-- `EmailPostDeliveryEvents`-- `EmailUrlInfo`-- `UrlClickEvents`
+- `DeviceEvents`
+- `DeviceFileCertificateInfo`
+- `DeviceFileEvents`
+- `DeviceImageLoadEvents`
+- `DeviceLogonEvents`
+- `DeviceNetworkEvents`
+- `DeviceNetworkInfo`
+- `DeviceInfo`
+- `DeviceProcessEvents`
+- `DeviceRegistryEvents`
+- `EmailAttachmentInfo`
+- `EmailEvents`
+- `EmailPostDeliveryEvents`
+- `EmailUrlInfo`
+- `UrlClickEvents`
-> [!NOTE]
+>[!NOTE]
> Only columns that are generally available can support **Continuous (NRT)** frequency.
-### 3. Choose the impacted entities
-
+### 3. Choose the impacted entities.
Identify the columns in your query results where you expect to find the main affected or impacted entity. For example, a query might return sender (`SenderFromAddress` or `SenderMailFromAddress`) and recipient (`RecipientEmailAddress`) addresses. Identifying which of these columns represent the main impacted entity helps the service aggregate relevant alerts, correlate incidents, and target response actions. You can select only one column for each entity type (mailbox, user, or device). Columns that are not returned by your query can't be selected.
-### 4. Specify actions
-
+### 4. Specify actions.
Your custom detection rule can automatically take actions on devices, files, users, or emails that are returned by the query. + :::image type="content" source="../../media/ah-custom-actions.png" alt-text="Screenshot that shows actions for custom detections in the Microsoft 365 Defender portal." lightbox="../../media/ah-custom-actions.png":::
-#### Actions on devices
+#### Actions on devices
These actions are applied to devices in the `DeviceId` column of the query results:- - **Isolate device**ΓÇöuses Microsoft Defender for Endpoint to apply full network isolation, preventing the device from connecting to any application or service. [Learn more about Microsoft Defender for Endpoint machine isolation](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#isolate-devices-from-the-network) - **Collect investigation package**ΓÇöcollects device information in a ZIP file. [Learn more about the Microsoft Defender for Endpoint investigation package](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#collect-investigation-package-from-devices) - **Run antivirus scan**ΓÇöperforms a full Microsoft Defender Antivirus scan on the device
These actions are applied to devices in the `DeviceId` column of the query resul
#### Actions on files -- When selected, the **Allow/Block** action can be applied to the file. Blocking files are only allowed if you have *Remediate* permissions for files and if the query results have identified a file ID, such as a SHA1. Once a file is blocked, other instances of the same file in all devices are also blocked. You can control which device group the blocking is applied to, but not specific devices.
+- When selected, the **Allow/Block** action can be applied to the file. Blocking files are only allowed if you have *Remediate* permissions for files and if the query results have identified a file ID, such as a SHA1. Once a file is blocked, other instances of the same file in all devices are also blocked. You can control which device group the blocking is applied to, but not specific devices.
- When selected, the **Quarantine file** action can be applied to files in the `SHA1`, `InitiatingProcessSHA1`, `SHA256`, or `InitiatingProcessSHA256` column of the query results. This action deletes the file from its current location and places a copy in quarantine. ++ #### Actions on users -- When selected, the **Mark user as compromised** action is taken on users in the `AccountObjectId`, `InitiatingProcessAccountObjectId`, or `RecipientObjectId` column of the query results. This action sets the users risk level to "high" in Azure Active Directory, triggering corresponding [identity protection policies](/azure/active-directory/identity-protection/overview-identity-protection).
+- When selected, the **Mark user as compromised** action is taken on users in the `AccountObjectId`, `InitiatingProcessAccountObjectId`, or `RecipientObjectId` column of the query results. This action sets the users risk level to "high" in Azure Active Directory, triggering corresponding [identity protection policies](/azure/active-directory/identity-protection/overview-identity-protection).
- Select **Disable user** to temporarily prevent a user from logging in.-- Select **Force password reset** to prompt the user to change their password on the next sign in session.
+- Select **Force password reset** to prompt the user to change their password on the next sign in session.
-Both the Disable user and Force password reset options require the user SID, which are in the columns `AccountSid`, `InitiatingProcessAccountSid`, `RequestAccountSid`, and `OnPremSid`.
+Both the Disable user and Force password reset options require the user SID, which are in the columns `AccountSid`, `InitiatingProcessAccountSid`, `RequestAccountSid`, and `OnPremSid`.
For more details on user actions, read [Remediation actions in Microsoft Defender for Identity](/defender-for-identity/remediation-actions). #### Actions on emails--- If the custom detection yields email messages, you can select **Move to mailbox folder** to move the email to a selected folder (any of **Junk**, **Inbox**, or **Deleted items** folders).
+- If the custom detection yields email messages, you can select **Move to mailbox folder** to move the email to a selected folder (any of **Junk**, **Inbox**, or **Deleted items** folders).
- Alternatively, you can select **Delete email** and then choose to either move the emails to Deleted Items (**Soft delete**) or delete the selected emails permanently (**Hard delete**). The columns `NetworkMessageId` and `RecipientEmailAddress` must be present in the query output to apply actions to email messages.
-### 5. Set the rule scope
+### 5. Set the rule scope.
Set the scope to specify which devices are covered by the rule. The scope influences rules that check devices and doesn't affect rules that check only mailboxes and user accounts or identities. When setting the scope, you can select:
When setting the scope, you can select:
Only data from devices in scope will be queried. Also, actions will be taken only on those devices.
-### 6. Review and turn on the rule
-
+### 6. Review and turn on the rule.
After reviewing the rule, select **Create** to save it. The custom detection rule immediately runs. It runs again based on configured frequency to check for matches, generate alerts, and take response actions.
-> [!IMPORTANT]
-> Custom detections should be regularly reviewed for efficiency and effectiveness. To make sure you are creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in [Manage existing custom detection rules](#manage-existing-custom-detection-rules).
->
-> You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules.
-## Manage existing custom detection rules
+>[!Important]
+>Custom detections should be regularly reviewed for efficiency and effectiveness. To make sure you are creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in [Manage existing custom detection rules](#manage-existing-custom-detection-rules). <br>
+You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules.
+
+## Manage existing custom detection rules
You can view the list of existing custom detection rules, check their previous runs, and review the alerts they have triggered. You can also run a rule on demand and modify it.
-> [!TIP]
+>[!TIP]
> Alerts raised by custom detections are available over alerts and incident APIs. For more information, see [Supported Microsoft 365 Defender APIs](api-supported.md). ### View existing rules
To view all existing custom detection rules, navigate to **Hunting** > **Custom
To view comprehensive information about a custom detection rule, go to **Hunting** > **Custom detection rules** and then select the name of rule. You can then view general information about the rule, including information, its run status, and scope. The page also provides the list of triggered alerts and actions.
+*Custom detection rule details*
You can also take the following actions on the rule from this page:
You can also take the following actions on the rule from this page:
### View and manage triggered alerts
-In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
+In the rule details screen (**Hunting** > **Custom detections** > **[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
- Manage the alert by setting its status and classification (true or false alert) - Link the alert to an incident - Run the query that triggered the alert on advanced hunting ### Review actions
+In the rule details screen (**Hunting** > **Custom detections** > **[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
-In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
+>[!TIP]
+>To quickly view information and take action on an item in a table, use the selection column [&#10003;] at the left of the table.
-> [!TIP]
-> To quickly view information and take action on an item in a table, use the selection column [&#10003;] at the left of the table.
-
-> [!NOTE]
-> Some columns in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft 365 Defender](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft 365 Defender by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
+>[!NOTE]
+>Some columns in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft 365 Defender](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft 365 Defender by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
## See also- - [Custom detections overview](custom-detections-overview.md) - [Advanced hunting overview](advanced-hunting-overview.md) - [Learn the advanced hunting query language](advanced-hunting-query-language.md)
security Edit Delete Rbac Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/edit-delete-rbac-roles.md
In Microsoft 365 Defender role-based access control (RBAC), you can edit and del
The following steps guide you on how to edit roles in Microsoft 365 Defender RBAC:
-> [!IMPORTANT]
-> You must be a Global Administrator or Security Administrator in Azure Active Directory, or have all the **Authorization** permissions assigned in Microsoft 365 Defender RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
+>[!Important]
+>You must be a Global Administrator or Security Administrator in Azure Active Directory, or have all the **Authorization** permissions assigned in Microsoft 365 Defender RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
1. Sign in to the [Microsoft 365 Defender portal](https://security.microsoft.com) as global administrator or security administrator. 2. In the navigation pane, select **Permissions**.
The following steps guide you on how to edit roles in Microsoft 365 Defender RBA
:::image type="content" source="../../media/defender/m365-defender-rbac-edit-roles.png" alt-text="Screenshot of the activate workloads page" lightbox="../../media/defender/m365-defender-rbac-edit-roles.png":::
-> [!NOTE]
-> After editing an imported role, the changes made in Microsoft 365 Defender RBAC will not be reflected back in the individual product RBAC model.
+
+>[!Note]
+>After editing an imported role, the changes made in Microsoft 365 Defender RBAC will not be reflected back in the individual product RBAC model.
## Delete Roles
To delete roles in Microsoft 365 Defender RBAC, select the role or roles you wan
If the workload is active, by removing the role all assigned user permission will be deleted.
-> [!NOTE]
-> After deleting an imported role, the role won't be deleted from the individual product RBAC model. If needed, you can re-import it to the Microsoft 365 Defender RBAC list of roles.
+>[!Note]
+>After deleting an imported role, the role won't be deleted from the individual product RBAC model. If needed, you can re-import it to the Microsoft 365 Defender RBAC list of roles.
## Next steps
security Eval Defender Endpoint Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-overview.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
Last updated 07/09/2021
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario - m365solution-evalutatemtp
- Microsoft 365 Defender
-This article outlines the process to enable and pilot Microsoft Defender for Endpoint. Before starting this process, be sure you've reviewed the overall process for [evaluating Microsoft 365 Defender](eval-overview.md), and you've [created the Microsoft 365 Defender evaluation environment](eval-create-eval-environment.md).
+
+This article outlines the process to enable and pilot Microsoft Defender for Endpoint. Before starting this process, be sure you've reviewed the overall process for [evaluating Microsoft 365 Defender](eval-overview.md), and you've [created the Microsoft 365 Defender evaluation environment](eval-create-eval-environment.md).
+<br>
Use the following steps to enable and pilot Microsoft Defender for Endpoint. :::image type="content" source="../../media/defender/m365-defender-endpoint-eval-steps.png" alt-text="The steps for adding Microsoft Defender for Endpoint to the Microsoft Defender evaluation environment" lightbox="../../media/defender/m365-defender-endpoint-eval-steps.png"::: + The following table describes the steps in the illustration.
-|Step|Description|
-|||
-|[Step 1. Review architecture requirements and key concepts](eval-defender-endpoint-architecture.md)|Understand the Defender for Endpoint architecture and the capabilities available to you.|
-|[Step 2. Enable the evaluation environment](eval-defender-endpoint-enable-eval.md)|Follow the steps to set up the evaluation environment.|
-|[Step 3. Set up the pilot](eval-defender-endpoint-pilot.md)|Verify your pilot group, run simulations, and become familiar with key features and dashboards.|
+ |Step |Description
+|||
+| [Step 1. Review architecture requirements and key concepts](eval-defender-endpoint-architecture.md) | Understand the Defender for Endpoint architecture and the capabilities available to you. |
+|[Step 2. Enable the evaluation environment](eval-defender-endpoint-enable-eval.md) | Follow the steps to set up the evaluation environment. |
+|[Step 3. Set up the pilot ](eval-defender-endpoint-pilot.md) | Verify your pilot group, run simulations, and become familiar with key features and dashboards. |
security Eval Defender Identity Architecture https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-architecture.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
Last updated 07/09/2021
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario - m365solution-evalutatemtp
# Review architecture requirements and key concepts for Microsoft Defender for Identity + **Applies to:** - Microsoft 365 Defender
Defender for Identity protects your on-premises Active Directory users and/or us
## Understand the architecture
-The following diagram illustrates the baseline architecture for Defender for Identity.
+The following diagram illustrates the baseline architecture for Defender for Identity.
:::image type="content" source="../../media/defender/m365-defender-identity-architecture.png" alt-text="The identity architecture for Microsoft Defender for Identity" lightbox="../../media/defender/m365-defender-identity-architecture.png"::: In this illustration: - Sensors installed on AD domain controllers parse logs and network traffic and send them to Microsoft Defender for Identity for analysis and reporting.-- Sensors can also parse Active Directory Federation Services (AD FS) when Azure AD is configured to use federated authentication (dotted line in illustration).
+- Sensors can also parse Active Directory Federation Services (AD FS) when Azure AD is configured to use federated authentication (dotted line in illustration).
- Microsoft Defender for Identity shares signals to Microsoft 365 Defender for extended detection and response (XDR). Defender for Identity sensors can be directly installed on the following servers:
Defender for Identity sensors can be directly installed on the following servers
For a deeper look into the architecture of Defender for Identity, including integration with Defender for Cloud Apps, see [Microsoft Defender for Identity architecture](/defender-for-identity/architecture). + ## Understand key concepts The following table identified key concepts that are important to understand when evaluating, configuring, and deploying Microsoft Defender for Identity.
The following table identified key concepts that are important to understand whe
| Entity profiles | Entity profiles provide a comprehensive deep-dive investigation of users, computers, devices, and resources along with their access history. | [Understanding entity profiles](/defender-for-identity/entity-profiles) | | Lateral movement paths | A key component of MDI security insights is identifying lateral movement paths in which an attacker uses non-sensitive accounts to gain access to sensitive accounts or machines throughout your network. | [Microsoft Defender for Identity Lateral Movement Paths (LMPs)](/defender-for-identity/use-case-lateral-movement-path) | | Network Name Resolution | Network Name Resolution (NNR) is a component of MDI functionality which captures activities based on network traffic, Windows events, ETW, etc. and correlates this raw data to the relevant computers involved in each activity. | [What is Network Name Resolution?](/defender-for-identity/nnr-policy) |
-| Reports | Defender for Identity reports allow you to schedule or immediately generate and download reports that provide system and entity status information. You can create reports about system health, security alerts, and potential lateral movement paths detected in your environment. | [Microsoft Defender for Identity Reports](/defender-for-identity/reports) |
+| Reports | Defender for Identity reports allow you to schedule or immediately generate and download reports that provide system and entity status information. You can create reports about system health, security alerts, and potential lateral movement paths detected in your environment. | [Microsoft Defender for Identity Reports ](/defender-for-identity/reports) |
| Role groups | Defender for Identity offers role-based groups and delegated access to safeguard data according to your organization's specific security and compliance needs which includes Administrators, Users and Viewers. | [Microsoft Defender for Identity role groups](/defender-for-identity/role-groups) | | Administrative portal | In addition to the Microsoft 365 Defender portal, the Defender for Identity portal can be used to monitor and respond to suspicious activity. | [Working with the Microsoft Defender for Identity portal](/defender-for-identity/workspace-portal) | | Microsoft Defender for Cloud Apps integration | Microsoft Defender for Cloud Apps integrates with Microsoft Defender for Identity to provide user entity behavioral analytics (UEBA) across a hybrid environment - both cloud app and on-premises | Microsoft Defender for Identity integration |
The following table identified key concepts that are important to understand whe
Defender for Identity requires some prerequisite work to ensure that your on-premises identity and networking components meet minimum requirements. Use this article as a checklist to ensure your environment is ready: [Microsoft Defender for Identity prerequisites](/defender-for-identity/prerequisites). + ## Next steps Step 2 of 3: [Enable the evaluation environment Defender for Identity](eval-defender-identity-enable-eval.md) Return to the overview for [Evaluate Microsoft Defender for Identity](eval-defender-identity-overview.md)
-Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md)
+Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md)
security Eval Defender Identity Enable Eval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-enable-eval.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
Last updated 07/09/2021
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario - m365solution-evalutatemtp
This article is [Step 2 of 2](eval-defender-identity-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Identity. For more information about this process, see the [overview article](eval-defender-identity-overview.md).
-Use the following steps to set up your Microsoft Defender for Identity environment.
+Use the following steps to set up your Microsoft Defender for Identity environment.
:::image type="content" source="../../media/defender/m365-defender-identity-eval-enable-steps.png" alt-text="The steps to enable Microsoft Defender for Identity in the Microsoft Defender evaluation environment" lightbox="../../media/defender/m365-defender-identity-eval-enable-steps.png":::
Use the following steps to set up your Microsoft Defender for Identity environme
## Step 1. Set up the Defender for Identity Instance
-Sign in to the Defender for Identity portal to create your instance and then connect this instance to your Active Directory environment.
+Sign in to the Defender for Identity portal to create your instance and then connect this instance to your Active Directory environment.
-|Step|Description|More information|
-||||
-|1|Create the Defender for Identity instance|[Quickstart: Create your Microsoft Defender for Identity instance](/defender-for-identity/install-step1)|
-|2|Connect the Defender for Identity instance to your Active Directory forest|[Quickstart: Connect to your Active Directory Forest](/defender-for-identity/install-step2)|
+| Step | Description |More information |
+||||
+|1 | Create the Defender for Identity instance | [Quickstart: Create your Microsoft Defender for Identity instance](/defender-for-identity/install-step1) |
+|2 | Connect the Defender for Identity instance to your Active Directory forest | [Quickstart: Connect to your Active Directory Forest](/defender-for-identity/install-step2) |
## Step 2. Install and configure the sensor Next, download, install, and configure the Defender for Identity sensor on the domain controllers and AD FS servers in your on-premises environment.
-|Step|Description|More information|
-||||
-|1|Determine how many Microsoft Defender for Identity sensors you need.|[Plan capacity for Microsoft Defender for Identity](/defender-for-identity/capacity-planning)|
-|2|Download the sensor setup package|[Quickstart: Download the Microsoft Defender for Identity sensor setup package](/defender-for-identity/install-step3)|
-|3|Install the Defender for Identity sensor|[Quickstart: Install the Microsoft Defender for Identity sensor](/defender-for-identity/install-step4)|
-|4|Configure the sensor|[Configure Microsoft Defender for Identity sensor settings](/defender-for-identity/install-step5)|
+| Step | Description |More information |
+||||
+|1 | Determine how many Microsoft Defender for Identity sensors you need. | [Plan capacity for Microsoft Defender for Identity](/defender-for-identity/capacity-planning) |
+|2 | Download the sensor setup package | [Quickstart: Download the Microsoft Defender for Identity sensor setup package](/defender-for-identity/install-step3) |
+|3 | Install the Defender for Identity sensor | [Quickstart: Install the Microsoft Defender for Identity sensor](/defender-for-identity/install-step4) |
+|4 | Configure the sensor | [Configure Microsoft Defender for Identity sensor settings ](/defender-for-identity/install-step5) |
## Step 3. Configure event log and proxy settings on machines with the sensor On the machines that you installed the sensor on, configure Windows event log collection and Internet proxy settings to enable and enhance detection capabilities.
-|Step|Description|More information|
-||||
-|1|Configure Windows event log collection|[Configure Windows Event collection](/defender-for-identity/configure-windows-event-collection)|
-|2|Configure Internet proxy settings|[Configure endpoint proxy and Internet connectivity settings for your Microsoft Defender for Identity Sensor](/defender-for-identity/configure-proxy)|
+| Step | Description |More information |
+||||
+|1 | Configure Windows event log collection | [Configure Windows Event collection](/defender-for-identity/configure-windows-event-collection) |
+|2 | Configure Internet proxy settings | [Configure endpoint proxy and Internet connectivity settings for your Microsoft Defender for Identity Sensor](/defender-for-identity/configure-proxy) |
## Step 4. Allow Defender for Identity to identify local admins on other computers
-Microsoft Defender for Identity lateral movement path detection relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity Service account.
+Microsoft Defender for Identity lateral movement path detection relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity Service account.
To ensure Windows clients and servers allow your Defender for Identity account to perform SAM-R, a modification to Group Policy must be made to add the Defender for Identity service account in addition to the configured accounts listed in the Network access policy. Make sure to apply group policies to all computers **except domain controllers**.
-For instructions on how to do this, see [Configure Microsoft Defender for Identity to make remote calls to SAM](/defender-for-identity/install-step8-samr).
+For instructions on how to do this, see [Configure Microsoft Defender for Identity to make remote calls to SAM](/defender-for-identity/install-step8-samr).
## Next steps
security Eval Defender Identity Pilot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-pilot.md
# Pilot Microsoft Defender for Identity + **Applies to:** - Microsoft 365 Defender
Use the following steps to setup and configure the pilot for Microsoft Defender
The following table describes the steps in the illustration. - [Step 1: Configure benchmark recommendations for your identity environment](#step-1-configure-benchmark-recommendations-for-your-identity-environment)-- [Step 2: Try out capabilities ΓÇö Walk through tutorials for identifying and remediating different attack types](#step-2-try-out-capabilities--walk-through-tutorials-for-identifying-and-remediating-different-attack-types)
+- [Step 2: Try out capabilities ΓÇö Walk through tutorials for identifying and remediating different attack types ](#step-2-try-out-capabilities--walk-through-tutorials-for-identifying-and-remediating-different-attack-types)
## Step 1. Configure benchmark recommendations for your identity environment
These benchmark recommendations include [Azure security baseline for Microsoft D
The Microsoft Defender for Identity documentation includes a series of tutorials that walk through the process of identifying and remediating various attack types. Try out Defender for Identity tutorials:- - [Reconnaissance alerts](/defender-for-identity/reconnaissance-alerts) - [Compromised credential alerts](/defender-for-identity/compromised-credentials-alerts) - [Lateral movement alerts](/defender-for-identity/lateral-movement-alerts)
security Eval Defender Investigate Respond Simulate Attack https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-investigate-respond-simulate-attack.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
Last updated 07/09/2021
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario - m365solution-pilotmtpproject
# Run an attack simulation in a Microsoft 365 Defender pilot environment + This article is [Step 1 of 2](eval-defender-investigate-respond.md) in the process of performing an investigation and response of an incident in Microsoft 365 Defender using a pilot environment. For more information about this process, see the [overview](eval-defender-investigate-respond.md) article. After preparing your [pilot environment](eval-defender-investigate-respond.md), it's time to test Microsoft 365 Defender's incident response and automated investigation and remediation capabilities by creating an incident with a simulated attack and using the Microsoft 365 Defender portal to investigate and respond.
An incident in Microsoft 365 Defender is a collection of correlated alerts and a
Microsoft 365 services and apps create alerts when they detect a suspicious or malicious event or activity. Individual alerts provide valuable clues about a completed or ongoing attack. However, attacks typically employ various techniques against different types of entities, such as devices, users, and mailboxes. The result is multiple alerts for multiple entities in your tenant.
-> [!NOTE]
-> If you are brand new to security analysis and incident response, see the [Respond to your first incident walkthrough](first-incident-overview.md) to get a guided tour of a typical process of analysis, remediation, and post-incident review.
+>[!Note]
+>If you are brand new to security analysis and incident response, see the [Respond to your first incident walkthrough](first-incident-overview.md) to get a guided tour of a typical process of analysis, remediation, and post-incident review.
+>
## Simulate attacks with the Microsoft 365 Defender portal The Microsoft 365 Defender portal has built-in capabilities to create simulated attacks on your pilot environment: - Attack simulation training for Microsoft 365 Defender for Office 365 at [https://security.microsoft.com/attacksimulator](https://security.microsoft.com/attacksimulator).-
+
In the Microsoft 365 Defender portal, select **Email & collaboration > Attack simulation training**. - Attack tutorials & simulations for Microsoft 365 Defender for Endpoint at [https://security.microsoft.com/tutorials/simulations](https://security.microsoft.com/tutorials/simulations).
To view the incident:
The alerts that are shown in the dashboard can be filtered based on service resources: Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, Microsoft Defender for Endpoint, Microsoft 365 Defender, and Microsoft Defender for Office 365.
-4. Select **Open incident page** to get more information about the incident.
+3. Select **Open incident page** to get more information about the incident.
In the **Incident** page, you can see all the alerts and information related to the incident. The information includes the entities and assets that are involved in the alert, the detection source of the alerts (such as Microsoft Defender for Identity or Microsoft Defender for Endpoint), and the reason they were linked together. Reviewing the incident alert list shows the progression of the attack. From this view, you can see and investigate the individual alerts.
Select the user name to open the user's profile page where further investigation
#### Automated investigation and remediation > [!NOTE]
-> Before we walk you through this simulation, watch the following video to get familiar with what automated self-healing is, where to find it in the portal, and how it can help in your security operations:
+>Before we walk you through this simulation, watch the following video to get familiar with what automated self-healing is, where to find it in the portal, and how it can help in your security operations:
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4BzwB]
security Eval Defender Investigate Respond https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-investigate-respond.md
Use the following steps.
The following table describes the steps in the illustration.
-|Step|Description|
+|Step |Description |
|||
-|1. [Simulate attacks](eval-defender-investigate-respond-simulate-attack.md)|Simulate attacks on your evaluation environment and use the Microsoft 365 Defender portal to perform incident response.|
-|2. [Try incident response capabilities](eval-defender-investigate-respond-additional.md)|Try additional incident response features and capabilities in Microsoft 365 Defender.|
+| 1. [Simulate attacks](eval-defender-investigate-respond-simulate-attack.md) | Simulate attacks on your evaluation environment and use the Microsoft 365 Defender portal to perform incident response. |
+| 2. [Try incident response capabilities ](eval-defender-investigate-respond-additional.md) | Try additional incident response features and capabilities in Microsoft 365 Defender. |
+|||
-## Navigation you may need
+### Navigation you may need
[Create the Microsoft 365 Defender Evaluation Environment](eval-create-eval-environment.md)
security Eval Defender Mcas Architecture https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-architecture.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
Last updated 07/09/2021
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario - m365solution-evalutatemtp
# Review architecture requirements and key concepts for Microsoft Defender for Cloud Apps + **Applies to:** - Microsoft 365 Defender This article is [Step 1 of 3](eval-defender-mcas-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Cloud Apps alongside Microsoft 365 Defender. For more information about this process, see the [overview article](eval-defender-identity-overview.md).
-Before enabling Microsoft Defender for Cloud Apps, be sure you understand the architecture and can meet the requirements.
+Before enabling Microsoft Defender for Cloud Apps, be sure you understand the architecture and can meet the requirements.
## Understand the architecture
Without Defender for Cloud Apps, cloud apps that are used by your organization a
:::image type="content" source="../../media/defender/m365-defender-mcas-architecture-a.png" alt-text="The architecture for Microsoft Defender for Cloud Apps" lightbox="../../media/defender/m365-defender-mcas-architecture-a.png"::: In the illustration:
+- The use of cloud apps by an organization is unmonitored and unprotected.
+- This use falls outside the protections achieved within a managed organization.
-- The use of cloud apps by an organization is unmonitored and unprotected.-- This use falls outside the protections achieved within a managed organization.-
-### Discovering cloud apps
+#### Discovering cloud apps
The first step to managing the use of cloud apps is to discover which cloud apps are used by your organization. This next diagram illustrates how cloud discovery works with Defender for Cloud Apps. :::image type="content" source="../../media/defender/m365-defender-mcas-architecture-b.png" alt-text="The architecture for Microsoft Defender for Cloud Apps in Cloud discovery" lightbox="../../media/defender/m365-defender-mcas-architecture-b.png":::
-In this illustration, there are two methods that can be used to monitor network traffic and discover cloud apps that are being used by your organization.
-- A. Cloud App Discovery integrates with Microsoft Defender for Endpoint natively. Defender for Endpoint reports cloud apps and services being accessed from IT-managed Windows 10 and Windows 11 devices.
+In this illustration, there are two methods that can be used to monitor network traffic and discover cloud apps that are being used by your organization.
+- A. Cloud App Discovery integrates with Microsoft Defender for Endpoint natively. Defender for Endpoint reports cloud apps and services being accessed from IT-managed Windows 10 and Windows 11 devices.
- B. For coverage on all devices connected to a network, the Defender for Cloud Apps log collector is installed on firewalls and other proxies to collect data from endpoints. This data is sent to Defender for Cloud Apps for analysis.
-### Managing cloud apps
+#### Managing cloud apps
-After you discover cloud apps and analyze how these apps are used by your organization, you can begin managing cloud apps that you choose.
+After you discover cloud apps and analyze how these apps are used by your organization, you can begin managing cloud apps that you choose.
:::image type="content" source="../../media/defender/m365-defender-mcas-architecture-c.png" alt-text="The architecture for Microsoft Defender for Cloud Apps while the managing the Cloud apps" lightbox="../../media/defender/m365-defender-mcas-architecture-c.png"::: In this illustration:- - Some apps are sanctioned for use. This sanction is a simple way of beginning to manage apps. - You can enable greater visibility and control by connecting apps with app connectors. App connectors use the APIs of app providers.
-### Applying session controls to cloud apps
-Microsoft Defender for Cloud Apps serves as a reverse proxy, providing proxy access to sanctioned cloud apps. This provision allows Defender for Cloud Apps to apply session controls that you configure.
+#### Applying session controls to cloud apps
+
+Microsoft Defender for Cloud Apps serves as a reverse proxy, providing proxy access to sanctioned cloud apps. This provision allows Defender for Cloud Apps to apply session controls that you configure.
:::image type="content" source="../../media/defender/m365-defender-mcas-architecture-d.png" alt-text="The architecture for Microsoft Defender for Cloud Apps - Proxy access session control" lightbox="../../media/defender/m365-defender-mcas-architecture-d.png"::: In this illustration:- - Access to sanctioned cloud apps from users and devices in your organization is routed through Defender for Cloud Apps. - This proxy access allows session controls to be applied. - Cloud apps that you have not sanctioned or explicitly unsanctioned are not affected. Session controls allow you to apply parameters to how cloud apps are used by your organization. For example, if your organization is using Salesforce, you can configure a session policy that allows only managed devices to access your organization's data at Salesforce. A simpler example could be configuring a policy to monitor traffic from unmanaged devices so you can analyze the risk of this traffic before applying stricter policies.
-### Integrating with Azure AD with Conditional Access App Control
+#### Integrating with Azure AD with Conditional Access App Control
-You might already have SaaS apps added to your Azure AD tenant to enforce multi-factor authentication and other conditional access policies. Microsoft Defender for Cloud Apps natively integrates with Azure AD. All you have to do is configure a policy in Azure AD to use Conditional Access App Control in Defender for Cloud Apps. This routes network traffic for these managed SaaS apps through Defender for Cloud Apps as a proxy, which allows Defender for Cloud Apps to monitor this traffic and to apply session controls.
+You might already have SaaS apps added to your Azure AD tenant to enforce multi-factor authentication and other conditional access policies. Microsoft Defender for Cloud Apps natively integrates with Azure AD. All you have to do is configure a policy in Azure AD to use Conditional Access App Control in Defender for Cloud Apps. This routes network traffic for these managed SaaS apps through Defender for Cloud Apps as a proxy, which allows Defender for Cloud Apps to monitor this traffic and to apply session controls.
:::image type="content" source="../../media/defender/m365-defender-mcas-architecture-e.png" alt-text="The architecture for the Microsoft Defender for Cloud Apps - SaaS apps" lightbox="../../media/defender/m365-defender-mcas-architecture-e.png"::: In this illustration:- - SaaS apps are integrated with the Azure AD tenant. This integration allows Azure AD to enforce conditional access policies, including multi-factor authentication. - A policy is added to Azure Active Directory to direct traffic for SaaS apps to Defender for Cloud Apps. The policy specifies which SaaS apps to apply this policy to. Therefore, after Azure AD enforces any conditional access policies that apply to these SaaS apps, Azure AD then directs (proxies) the session traffic through Defender for Cloud Apps.-- Defender for Cloud Apps monitors this traffic and applies any session control policies that have been configured by administrators.
+- Defender for Cloud Apps monitors this traffic and applies any session control policies that have been configured by administrators.
You might have discovered and sanctioned cloud apps using Defender for Cloud Apps that have not been added to Azure AD. You can take advantage of Conditional Access App Control by adding these cloud apps to your Azure AD tenant and the scope of your conditional access rules.
-### Protecting your organization from hackers
+#### Protecting your organization from hackers
Defender for Cloud Apps provides powerful protection on its own. However, when combined with the other capabilities of Microsoft 365 Defender, Defender for Cloud Apps provides data into the shared signals which (together) helps stop attacks.
-It's worth repeating this illustration from the overview to this Microsoft 365 Defender evaluation and pilot guide.
+It's worth repeating this illustration from the overview to this Microsoft 365 Defender evaluation and pilot guide.
:::image type="content" source="../../media/defender/m365-defender-eval-threat-chain.png" alt-text="How Microsoft 365 Defender stops a chain of threats" lightbox="../../media/defender/m365-defender-eval-threat-chain.png":::
Focusing on the right side of this illustration, Microsoft Defender for Cloud Ap
The following table identified key concepts that are important to understand when evaluating, configuring, and deploying Microsoft Defender for Cloud Apps. + |Concept |Description |More information | ||||
-| Defender for Cloud Apps Dashboard | Presents an overview of the most important information about your organization and gives links to deeper investigation. | [Working with the dashboard](/cloud-app-security/daily-activities-to-protect-your-cloud-environment) |
+| Defender for Cloud Apps Dashboard | Presents an overview of the most important information about your organization and gives links to deeper investigation. | [Working with the dashboard ](/cloud-app-security/daily-activities-to-protect-your-cloud-environment) |
| Conditional Access App Control | Reverse proxy architecture that integrates with your Identity Provider (IdP) to give Azure AD conditional access policies and selectively enforce session controls. | [Protect apps with Microsoft Defender for Cloud Apps Conditional Access App Control](/cloud-app-security/proxy-intro-aad) | | Cloud App Catalog | The Cloud App Catalog gives you a full picture against Microsoft catalog of over 16,000 cloud apps that are ranked and scored based on more than 80 risk factors. | [Working with App risk scores](/cloud-app-security/risk-score) |
-| Cloud Discovery Dashboard | Cloud Discovery analyzes your traffic logs and is designed to give more insight into how cloud apps are being used in your organization as well as give alerts and risk levels. | [Working with discovered apps](/cloud-app-security/discovered-apps) |
+| Cloud Discovery Dashboard | Cloud Discovery analyzes your traffic logs and is designed to give more insight into how cloud apps are being used in your organization as well as give alerts and risk levels. | [Working with discovered apps ](/cloud-app-security/discovered-apps) |
|Connected Apps |Defender for Cloud Apps provides end-to-end protection for connected apps using Cloud-to-Cloud integration, API connectors, and real-time access and session controls using our Conditional App Access Controls. |[Protecting connected apps](/cloud-app-security/protect-connected-apps) |
+| | | |
## Review architecture requirements
To discover cloud apps used in your environment, you can implement one or both o
- Get up and running quickly with Cloud Discovery by integrating with Microsoft Defender for Endpoint. This native integration enables you to immediately start collecting data on cloud traffic across your Windows 11 and Windows 10 devices, on and off your network. - To discover all cloud apps accessed by all devices connected to your network, deploy the Defender for Cloud Apps log collector on your firewalls and other proxies. This deployment helps collect data from your endpoints and sends it to Defender for Cloud Apps for analysis. Defender for Cloud Apps natively integrates with some third-party proxies for even more capabilities.
-These options are included in [Step 2. Enable the evaluation environment](eval-defender-mcas-enable-eval.md).
+These options are included in [Step 2. Enable the evaluation environment](eval-defender-mcas-enable-eval.md).
### Applying Azure AD Conditional Access policies to cloud apps
Conditional Access App Control (the ability to apply Conditional Access policies
## SIEM integration
-You can integrate Microsoft Defender for Cloud Apps with your generic SIEM server or with Microsoft Sentinel to enable centralized monitoring of alerts and activities from connected apps.
+You can integrate Microsoft Defender for Cloud Apps with your generic SIEM server or with Microsoft Sentinel to enable centralized monitoring of alerts and activities from connected apps.
Additionally, Microsoft Sentinel includes a Microsoft Defender for Cloud Apps connector to provide deeper integration with Microsoft Sentinel. This arrangement enables you to not only gain visibility into your cloud apps but to also get sophisticated analytics to identify and combat cyberthreats and to control how your data travels.
security Eval Defender Mcas Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-overview.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
Last updated 07/09/2021
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario
- - m365solution-evalutatemtp
+ - m365solution-evalutatemtp
- zerotrust-solution - highpri - tier1
**Applies to:** - Microsoft 365 Defender
-This article outlines the process to enable and pilot Microsoft Defender for Cloud Apps alongside Microsoft 365 Defender. Before starting this process, be sure you've reviewed the overall process for [evaluating Microsoft 365 Defender](eval-overview.md) and you have [created the Microsoft 365 Defender evaluation environment](eval-create-eval-environment.md).
+
+This article outlines the process to enable and pilot Microsoft Defender for Cloud Apps alongside Microsoft 365 Defender. Before starting this process, be sure you've reviewed the overall process for [evaluating Microsoft 365 Defender](eval-overview.md) and you have [created the Microsoft 365 Defender evaluation environment](eval-create-eval-environment.md).
+<br>
Use the following steps to enable and pilot Microsoft Defender for Cloud Apps.
Use the following steps to enable and pilot Microsoft Defender for Cloud Apps.
||| |[Review architecture requirements and key concepts](eval-defender-mcas-architecture.md) | Understand the Defender for Cloud Apps architecture and how it integrates with Microsoft 365 Defender, Microsoft Defender for Endpoint, and Azure Active Directory. | |[Enable the evaluation environment](eval-defender-mcas-enable-eval.md) | Connect to the portal, configure integration with Defender for Identity and/or your organization's network devices, and begin to view and manage cloud apps. |
-|[Set up the pilot](eval-defender-mcas-pilot.md) | Scope your deployment to certain user groups, configure Conditional Access App Control, and try out tutorials for protecting your environment. |
+|[Set up the pilot ](eval-defender-mcas-pilot.md) | Scope your deployment to certain user groups, configure Conditional Access App Control, and try out tutorials for protecting your environment. |
security Import Rbac Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/import-rbac-roles.md
Title: Import roles to Microsoft 365 Defender RBAC
+ Title: Import roles to Microsoft 365 Defender RBAC
description: Create custom Microsoft 365 Defender Security portal role-based access control (RBAC) ms.mktglfcycl: deploy
Importing roles will migrate and maintain the roles with full parity in relation
The following steps guide you on how to import roles into Microsoft 365 Defender RBAC: > [!IMPORTANT]
-> You must be a Global Administrator or Security Administrator in Azure Active Directory, or have all the **Authorization** permissions assigned in Microsoft 365 Defender RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
+>You must be a Global Administrator or Security Administrator in Azure Active Directory, or have all the **Authorization** permissions assigned in Microsoft 365 Defender RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
1. Sign in to the [Microsoft 365 Defender portal](https://security.microsoft.com). 2. In the navigation pane, select **Permissions**.
security Integrate Microsoft 365 Defender Secops https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops.md
If you are not already familiar with Microsoft 365 Defender, see these articles:
If your organization has already implemented some aspects of Microsoft 365 Defender, these articles can either affirm or help improve your existing architecture and processes.
-> [!NOTE]
-> As a Microsoft partner, Protiviti contributed to and provided material feedback to this article.
+>[!Note]
+>As a Microsoft partner, Protiviti contributed to and provided material feedback to this article.
+>
## Target audience
security Investigate Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-users.md
Defender for Identity pulls tags out of Active Directory to give you a single in
For more information, see [Defender for Identity entity tags in Microsoft 365 Defender](/defender-for-identity/entity-tags).
-> [!NOTE]
+>[!NOTE]
> The organization tree section and the account tags are available when a Microsoft Defender for Identity license is available. ## Alerts
You can see all active alerts involving the user from the last 180 days in this
- Groups - this section includes all observed on-premises groups for the identity, as reported by Defender for Identity. - Lateral movement paths - this section includes all profiled lateral movement paths from the on-premises environment detected by Defender for Identity.
-> [!NOTE]
+>[!NOTE]
> Groups and lateral movement paths are available when a Microsoft Defender for Identity license is available. Selecting the **Lateral movements** tab lets you view a fully dynamic and clickable map where you can see the lateral movement paths to and from a user. An attacker can use the path information to infiltrate your network.
security M365d Enable Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable-faq.md
To optimize your Microsoft 365 Defender experiences, we recommend deploying *all
Microsoft 365 Defender automatically selects an optimal location for the data center where consolidated data is processed and stored. If you have Microsoft Defender for Endpoint, it selects the same location used by Defender for Endpoint.
-> [!NOTE]
-> Microsoft Defender for Endpoint automatically provisions in European Union (EU) data centers when turned on through Microsoft Defender for Cloud. Microsoft 365 Defender will automatically provision in the same EU data center for customers who have provisioned Microsoft Defender for Endpoint in this manner.
+>[!NOTE]
+>Microsoft Defender for Endpoint automatically provisions in European Union (EU) data centers when turned on through Microsoft Defender for Cloud. Microsoft 365 Defender will automatically provision in the same EU data center for customers who have provisioned Microsoft Defender for Endpoint in this manner.
The data center location is shown before and after the service is provisioned in the settings page for Microsoft 365 Defender (**Settings > Microsoft 365 Defender**). If you prefer to use another data center location, select **Need help?** in the Microsoft 365 Defender portal to contact Microsoft support.
By default, Microsoft 365 Defender displays time information in the UTC time zon
Microsoft regularly provides information through the various channels, including: - Blogposts in the [Microsoft 365 security & compliance tech community](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/bg-p/MicrosoftThreatProtectionBlog)-- Go to [Defender monthly news](https://aka.ms/defendernews)
+- Go to [Defender monthly news](https://aka.ms/defendernews)
- The [message center](../../admin/manage/message-center.md) in Microsoft 365 admin center
security Microsoft 365 Defender Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-portal.md
audience: ITPro
- m365-security - tier1-+ - admindeeplinkDEFENDER - intro-overview
The [Microsoft 365 Defender portal](https://sip.security.microsoft.com/homepage)
- **[Microsoft Defender for Identity](/defender-for-identity/what-is)** is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. - **[Microsoft Defender for Cloud Apps](/cloud-app-security/)** is a comprehensive cross-SaaS and PaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps.
-Watch this short video to learn about the Microsoft 365 Defender portal.
+Watch this short video to learn about the Microsoft 365 Defender portal.
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWBKau] ## What to expect
The Microsoft 365 Defender portal helps security teams investigate and respond t
- Trials - Partner catalog
-Microsoft 365 Defender emphasizes *unity, clarity, and common goals*.
+Microsoft 365 Defender emphasizes *unity, clarity, and common goals*.
> [!NOTE] > The Microsoft 365 Defender portal is accessible without any need for customers to take migration steps or purchase a new license. For example, this new portal is accessible to administrators with an E3 subscription, just as it is to those with Microsoft Defender for Office 365 Plan 1 and Plan 2; however, Exchange Online Protection, or Defender for Office 365 Plan 1 customers see only the security features their subscription license supports. The goal of the portal is to centralize security.
You can add and remove different cards depending on your needs.
### Search across entities (Preview)
-> [!IMPORTANT]
+>[!IMPORTANT]
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. The search bar is located at the top of the page. As you type, suggestions are provided so that it's easier to find entities. The enhanced search results page centralizes the results from all entities.
-You can search across the following entities in Defender for Endpoint and Defender for Identity:
+You can search across the following entities in Defender for Endpoint and Defender for Identity:
-- **Devices** - supported for both Defender for Endpoint and Defender for Identity. Supports use of search operators.-- **Users** - supported for Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps.
+- **Devices** - supported for both Defender for Endpoint and Defender for Identity. Supports use of search operators.
+- **Users** - supported for Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps.
- **Files, IPs, and URLs** - same capabilities as in Defender for Endpoint.
- > [!NOTE]
- > IP and URL searches are exact match and don't appear in the search results page ΓÇô they lead directly to the entity page.
+ >[!NOTE]
+ >IP and URL searches are exact match and don't appear in the search results page ΓÇô they lead directly to the entity page.
-- **MDVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations).
+- **MDVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations).
## Threat analytics
Threat analytics is the Microsoft 365 Defender threat intelligence solution from
## Partner catalog Microsoft 365 Defender supports two types of partners:- - Third-party integrations to help secure users with effective threat protection, detection, investigation, and response in various security fields of endpoints, vulnerability management, email, identities, and cloud apps.-- Professional services where organizations can enhance the detection, investigation, and threat intelligence capabilities of the platform.
+- Professional services where organizations can enhance the detection, investigation, and threat intelligence capabilities of the platform.
+ ## Send us your feedback
With this learning path from Microsoft Learn, you can understand Microsoft 365 D
> [!div class="nextstepaction"] > [Start >](/training/paths/defender-detect-respond/) + ## See also - [What's new in Microsoft 365 Defender](whats-new.md)
security Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender.md
Microsoft 365 Defender services protect:
- **Identities with Defender for Identity and Azure Active Directory (Azure AD) Identity Protection** - Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Azure AD Identity Protection uses the learnings Microsoft has acquired from their position in organizations with Azure AD, the consumer space with Microsoft Accounts, and in gaming with Xbox to protect your users. - **Applications with Microsoft Defender for Cloud Apps** - Microsoft Defender for Cloud Apps is a comprehensive cross-SaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4Bzww]
+>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4Bzww]
Microsoft 365 Defender's unique cross-product layer augments the individual service components to:
security Microsoft 365 Security Center Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-mde.md
This table is a quick reference of the changes between the Microsoft Defender Se
| Area | Description of change | |||
-|Search | The search bar is located at the top of the page. Suggestions are provided as you type. You can search across the following entities in Defender for Endpoint and Defender for Identity: <br><br> - **Devices** - supported for both Defender for Endpoint and Defender for Identity. You can even use search operators, for example, you can use "contains" to search for part of a host name. <br><br> - **Users** - supported for both Defender for Endpoint and Defender for Identity. <br><br> - **Files, IPs, and URLs** - same capabilities as in Defender for Endpoint. <br> NOTE: *IP and URL searches are exact match and don't appear in the search results page ΓÇô they lead directly to the entity page. <br><br> - **MDVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations). <br><br> The enhanced search results page centralizes the results from all entities. |
+|Search | The search bar is located at the top of the page. Suggestions are provided as you type. You can search across the following entities in Defender for Endpoint and Defender for Identity: <br><br> - **Devices** - supported for both Defender for Endpoint and Defender for Identity. You can even use search operators, for example, you can use "contains" to search for part of a host name. <br><br> - **Users** - supported for both Defender for Endpoint and Defender for Identity. <br><br> - **Files, IPs, and URLs** - same capabilities as in Defender for Endpoint. <br> NOTE: *IP and URL searches are exact match and don't appear in the search results page ΓÇô they lead directly to the entity page. <br><br> - **MDVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations). <br><br> The enhanced search results page centralizes the results from all entities. |
|[Dashboard](/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard) | This is your security operations dashboard. See an overview of how many active alerts were triggered, which devices are at risk, which users are at risk, and severity level for alerts, devices, and users. You can also see if any devices have sensor issues, your overall service health, and how any unresolved alerts were detected. | |Device inventory | No changes. | |[Vulnerability management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) | Name was shortened to fit in the navigation pane. It's the same as the Microsoft Defender Vulnerability Management section, with all the pages underneath. |
security Microsoft 365 Security Mde Redirection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-mde-redirection.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier2
Once automatic redirection is enabled, accounts accessing the former Microsoft D
Learn more about what's changed: [Microsoft Defender for Endpoint in Microsoft 365 Defender](microsoft-365-security-center-mde.md).
-This includes redirection for direct access to the former portal via browser, including links pointing towards the former securitycenter.windows.com portal - such as links in email notifications, and links returned by SIEM API calls.
+This includes redirection for direct access to the former portal via browser, including links pointing towards the former securitycenter.windows.com portal - such as links in email notifications, and links returned by SIEM API calls.
External links from email notifications or SIEM APIs currently contain links to both portals. Once redirection is enabled, both links will point to Microsoft 365 Defender until the old link is eventually removed. We encourage you to adopt the new link pointing to Microsoft 365 Defender.
Refer to the table below for more on links and routing.
## When does this take effect?
-Once enabled, this update might take effect almost immediately for some accounts. But the redirection might take longer to propagate to every account in your organization. Accounts in active sessions while this setting is applied will not be ejected from their session and will only be routed to Microsoft 365 Defender after ending their current session and signing back in again.
+Once enabled, this update might take effect almost immediately for some accounts. But the redirection might take longer to propagate to every account in your organization. Accounts in active sessions while this setting is applied will not be ejected from their session and will only be routed to Microsoft 365 Defender after ending their current session and signing back in again.
### Set up portal redirection
To start routing accounts to Microsoft 365 Defender:
2. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender</a>.
-3. Navigate to **Settings** \> **Endpoints** \> **General** \> **Portal redirection** or [click here](https://security.microsoft.com/preferences2/portal_redirection).
+3. Navigate to **Settings** > **Endpoints** > **General** > **Portal redirection** or [click here](https://security.microsoft.com/preferences2/portal_redirection).
4. Toggle the Automatic redirection setting to **On**. 5. Click **Enable** to apply automatic redirection to Microsoft 365 Defender.
-> [!IMPORTANT]
-> Enabling this setting will not terminate active user sessions. Accounts who are in an active session while this setting is applied will only be directed to Microsoft 365 Defender after ending their current session and signing in again.
+>[!IMPORTANT]
+>Enabling this setting will not terminate active user sessions. Accounts who are in an active session while this setting is applied will only be directed to Microsoft 365 Defender after ending their current session and signing in again.
-> [!NOTE]
-> You must be a global administrator or have security administrator permissions in Azure Active Directory to enable or disable this setting.
+>[!NOTE]
+>You must be a global administrator or have security administrator permissions in Azure Active Directory to enable or disable this setting.
## Can I go back to using the former portal?
To revert to the former Microsoft Defender for Endpoint portal:
1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender</a> as a global administrator or using and account with security administrator permissions in Azure Active directory.
-2. Navigate to **Settings** \> **Endpoints** \> **General** \> **Portal redirection** or [open the page here](https://security.microsoft.com/preferences2/portal_redirection).
+2. Navigate to **Settings** > **Endpoints** > **General** > **Portal redirection** or [open the page here](https://security.microsoft.com/preferences2/portal_redirection).
3. Toggle the Automatic redirection setting to **Off**. 4. Click **Disable** & share feedback when prompted.
-This setting can be enabled again at any time.
+This setting can be enabled again at any time.
-Once disabled, accounts will no longer be routed to security.microsoft.com, and you will once again have access to the former portal - securitycenter.windows.com or securitycenter.microsoft.com.
+Once disabled, accounts will no longer be routed to security.microsoft.com, and you will once again have access to the former portal - securitycenter.windows.com or securitycenter.microsoft.com.
## Related information- - [Microsoft 365 Defender overview](microsoft-365-defender.md) - [Microsoft Defender for Endpoint in Microsoft 365 Defender](microsoft-365-security-center-mde.md)-- [Microsoft delivers unified SIEM and XDR to modernize security operations](https://www.microsoft.com/security/blog/?p=91813)-- [XDR versus SIEM infographic](https://afrait.com/blog/xdr-versus-siem/)-- [`The New Defender`](https://afrait.com/blog/the-new-defender/)-- [About Microsoft 365 Defender](https://www.microsoft.com/microsoft-365/security/microsoft-365-defender)
+- [Microsoft delivers unified SIEM and XDR to modernize security operations](https://www.microsoft.com/security/blog/?p=91813)
+- [XDR versus SIEM infographic](https://afrait.com/blog/xdr-versus-siem/)
+- [`The New Defender`](https://afrait.com/blog/the-new-defender/)
+- [About Microsoft 365 Defender](https://www.microsoft.com/microsoft-365/security/microsoft-365-defender)
- [Microsoft security portals and admin centers](portals.md)
security Microsoft 365 Security Mdi Redirection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-mdi-redirection.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier2
Starting January 31, 2023, the portal redirection setting will be automatically
## When does this take effect?
-Once enabled, this update might take effect almost immediately for some accounts. But the redirection might take longer to propagate to every account in your organization. Accounts in active sessions while this setting is applied won't be ejected from their session and will only be routed to Microsoft 365 Defender after ending their current session and signing back in again.
+Once enabled, this update might take effect almost immediately for some accounts. But the redirection might take longer to propagate to every account in your organization. Accounts in active sessions while this setting is applied won't be ejected from their session and will only be routed to Microsoft 365 Defender after ending their current session and signing back in again.
### Set up portal redirection
To start routing accounts to Microsoft 365 Defender:
1. Toggle the Automatic redirection setting to **On**.
-> [!IMPORTANT]
-> Enabling this setting will not terminate active user sessions. Accounts who are in an active session while this setting is applied will only be directed to Microsoft 365 Defender after ending their current session and signing in again.
+>[!IMPORTANT]
+>Enabling this setting will not terminate active user sessions. Accounts who are in an active session while this setting is applied will only be directed to Microsoft 365 Defender after ending their current session and signing in again.
-> [!NOTE]
-> You must be a global administrator or have security administrator permissions in Azure Active Directory to enable or disable this setting.
+>[!NOTE]
+>You must be a global administrator or have security administrator permissions in Azure Active Directory to enable or disable this setting.
## Can I go back to using the former portal?
To revert to the former Microsoft Defender for Identity portal:
1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender</a> as a global administrator or using and account with security administrator permissions in Azure Active directory.
-2. Navigate to **Settings** > **Identities** > **General** > **Portal redirection** or [open the page here](https://security.microsoft.com/preferences2/portal_redirection).
+2. Navigate to **Settings** > **Identities** > **General** > **Portal redirection** or [open the page here](https://security.microsoft.com/preferences2/portal_redirection).
3. Toggle the Automatic redirection setting to **Off**.
security Microsoft Secure Score Improvement Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-improvement-actions.md
audience: ITPro-+ - m365-security - tier2
+search.appverid:
- MOE150 - MET150-+ - seo-marvel-apr2020 - seo-marvel-jun2020 Last updated 02/16/2021
This view is what it will look like if you've included all possible score views:
The **recommended actions** tab lists the security recommendations that address possible attack surfaces. It also includes their status (to address, planned, risk accepted, resolved through third party, resolved through alternate mitigation, and completed). You can search, filter, and group all the recommended actions.
-Once you have completed an action it can take between 24-48 hours for the changes to be reflected in your secure score.
+Once you have completed an action it can take between 24-48 hours for the changes to be reflected in your secure score.
### Ranking
Ranking is based on the number of points left to achieve, implementation difficu
### View recommended action details
-When you select a specific recommended action, a full page flyout appears.
+When you select a specific recommended action, a full page flyout appears.
:::image type="content" source="../../media/secure-score/secure-score-improvement-action-details.png" alt-text="Screenshot that shows the flyout of a recommended action in the Microsoft 365 Defender portal." lightbox="../../media/secure-score/secure-score-improvement-action-details.png":::
Choose any statuses and record notes specific to the recommended action.
You won't be able to choose a status for Secure Score recommended actions in the "Device" category, instead, you'll be directed to the associated [Microsoft Defender Vulnerability Management security recommendation](/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation) to take action.
-> [!NOTE]
-> If you choose to create a 'Global exception' in the Defender Vulnerability management security recommendation, the status in the Microsoft Secure Score recommended action will be updated with the exception justification. Updates may take up to 2 hours.
+>[!NOTE]
+>If you choose to create a 'Global exception' in the Defender Vulnerability management security recommendation, the status in the Microsoft Secure Score recommended action will be updated with the exception justification. Updates may take up to 2 hours.
>
-> If you choose to create an 'Exception per device group' in the Defender Vulnerability manage security recommendation, Secure Score will not be updated and the recommended action will remain as 'To address'.
+>If you choose to create an 'Exception per device group' in the Defender Vulnerability manage security recommendation, Secure Score will not be updated and the recommended action will remain as 'To address'.
#### Completed recommended actions
The section called **At a glance** will tell you the category, attacks it can pr
The **Implementation** section shows any prerequisites, step-by-step next steps to complete the recommended action, the current implementation status of the recommended action, and any learn more links.
-Prerequisites include any licenses that are needed or actions to be completed before the recommended action is addressed. Make sure you have enough seats in your license to complete the recommended action and that those licenses are applied to the necessary users.
+Prerequisites include any licenses that are needed or actions to be completed before the recommended action is addressed. Make sure you have enough seats in your license to complete the recommended action and that those licenses are applied to the necessary users.
## We want to hear from you
security Microsoft Secure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score.md
audience: ITPro-+ - m365-security - Adm_TOC - tier2
+search.appverid:
- MOE150 - MET150-+ - seo-marvel-apr2020 - seo-marvel-jun2020 Last updated 02/16/2021
Microsoft Secure Score is a measurement of an organization's security posture, w
Following the Secure Score recommendations can protect your organization from threats. From a centralized dashboard in the Microsoft 365 Defender portal, organizations can monitor and work on the security of their Microsoft 365 identities, apps, and devices.
-Secure Score helps organizations:
+Secure Score helps organizations:
-- Report on the current state of the organization's security posture.-- Improve their security posture by providing discoverability, visibility, guidance, and control.-- Compare with benchmarks and establish key performance indicators (KPIs).
+* Report on the current state of the organization's security posture.
+* Improve their security posture by providing discoverability, visibility, guidance, and control.
+* Compare with benchmarks and establish key performance indicators (KPIs).
Watch this video for a quick overview of Secure score. > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWUPrP]
Organizations gain access to robust visualizations of metrics and trends, integr
:::image type="content" source="../../media/secure-score/secure-score-home-page.png" alt-text="The Microsoft Secure Score homepage in the Microsoft 365 Defender portal" lightbox="../../media/secure-score/secure-score-home-page.png":::
-> [!NOTE]
-> Currently, the Azure Active Directory related Microsoft Secure Score recommendations are not available for customer tenants registered in the following Azure Active Directory regions:
+>[!Note]
+> Currently, the Azure Active Directory related Microsoft Secure Score recommendations are not available for customer tenants registered in the following Azure Active Directory regions:
Japan, Australia, New Zealand, Fiji, Canada, United Kingdom, South Korea, France, United Arab Emirates, South America, Switzerland, Lichtenstein, Norway, Germany, Brazil, Sweden and Qatar. ## How it works
If you have a license for one of the supported Microsoft products, then you'll s
Your score is updated in real time to reflect the information presented in the visualizations and recommended action pages. Secure Score also syncs daily to receive system data about your achieved points for each action.
-> [!NOTE]
+>[!Note]
> For Microsoft Teams related recommendations, the recommendation state will get updated when changes occur in the configuration state. In addition, the recommendation state is refreshed once a month. + ### Key scenarios - [Check your current score](microsoft-secure-score-improvement-actions.md#check-your-current-score)
If you turn on security defaults, you'll be awarded full points for the followin
- Require MFA for administrative roles (10 points) - Enable policy to block legacy authentication (7 points)
-> [!IMPORTANT]
-> Security defaults include security features that provide similar security to the "sign-in risk policy" and "user risk policy" recommended actions. Instead of setting up these policies on top of the security defaults, we recommend updating their statuses to "Resolved through alternative mitigation."
+>[!IMPORTANT]
+>Security defaults include security features that provide similar security to the "sign-in risk policy" and "user risk policy" recommended actions. Instead of setting up these policies on top of the security defaults, we recommend updating their statuses to "Resolved through alternative mitigation."
## Required permissions
To have permission to access Microsoft Secure Score, you must be assigned one of
With read and write access, you can make changes and directly interact with Secure Score. You can also assign read-only access to other users. -- Global administrator-- Security administrator-- Exchange administrator-- SharePoint administrator
+* Global administrator
+* Security administrator
+* Exchange administrator
+* SharePoint administrator
### Read-only roles With read-only access, you aren't able to edit status or notes for a recommended action, edit score zones, or edit custom comparisons. -- Helpdesk administrator-- User administrator-- Service support administrator-- Security reader-- Security operator-- Global reader
+* Helpdesk administrator
+* User administrator
+* Service support administrator
+* Security reader
+* Security operator
+* Global reader
## Risk awareness
security Onboarding Defender Experts For Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/onboarding-defender-experts-for-hunting.md
audience: ITPro - m365-security
- - tier1
+ - tier1
search.appverid: met150 Last updated 07/26/2022
Last updated 07/26/2022
## Onboarding
-If you're new to Microsoft 365 Defender and Defender Experts for Hunting:
+If you're new to Microsoft 365 Defender and Defender Experts for Hunting:
1. Upon getting your welcome email, select **Log into Microsoft 365 Defender**. 2. Sign in if you already have a Microsoft account. If none, create one.
-3. The Microsoft 365 Defender quick tour will get you familiar with the security suite, where the capabilities are and how important they are. Select **Take a quick tour**.
+3. The Microsoft 365 Defender quick tour will get you familiar with the security suite, where the capabilities are and how important they are. Select **Take a quick tour**.
4. Read the short descriptions about what the Microsoft Defender Experts service is and the capabilities it provides. Select **Next**. You'll see the welcome page: ![Screenshot of the Microsoft 365 Defender welcome page with a card for the Defender Experts for Hunting service.](../../media/mte/defenderexperts/start-using-defender-experts-for-hunting.png)
If you're new to Microsoft 365 Defender and Defender Experts for Hunting:
## Receive Defender Experts Notifications The Defender Experts Notifications service includes:- - Threat monitoring and analysis, reducing dwell time and the risk to your business-- Hunter-trained artificial intelligence to discover and target both known attacks and emerging threats-- Identification of the most pertinent risks, helping SOCs maximize their effectiveness-- Help in scoping compromises and as much context as can be quickly delivered to enable a swift SOC response
+- Hunter-trained artificial intelligence to discover and target both known attacks and emerging threats
+- Identification of the most pertinent risks, helping SOCs maximize their effectiveness
+- Help in scoping compromises and as much context as can be quickly delivered to enable a swift SOC response
Refer to the following screenshot to see a sample Defender Experts Notification:
You can filter your incidents and alerts if you want to only see the Defender Ex
### Set up Defender Experts email notifications
-You can set up Microsoft 365 Defender to notify you or your staff with an email about new incidents or updates to existing incidents, including those observed by Microsoft Defender Experts. [Learn more about getting incident notifications by email](/microsoft-365/security/defender/incidents-overview#get-incident-notifications-by-email)
+You can set up Microsoft 365 Defender to notify you or your staff with an email about new incidents or updates to existing incidents, including those observed by Microsoft Defender Experts. [Learn more about getting incident notifications by email](/microsoft-365/security/defender/incidents-overview#get-incident-notifications-by-email)
1. In the Microsoft 365 Defender navigation pane, select **Settings** > **Microsoft 365 Defender** > **Email notifications** > **Incidents**. 2. Update your existing email notification rules or create a new one. [Learn more about creating a rule for email notifications](/microsoft-365/security/defender/incidents-overview#create-a-rule-for-email-notifications)
You can set up Microsoft 365 Defender to notify you or your staff with an email
> [!NOTE] > Experts on Demand is included in your Defender Experts for Hunting subscription with [monthly allocations](/microsoft-365/security/defender/before-you-begin-defender-experts#eligibility-and-licensing). However, it's not a security incident response service. It's intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
-Select **Ask Defender Experts** directly inside the Microsoft 365 security portal to get swift and accurate responses to all your threat hunting questions. Experts can provide insight to better understand the complex threats your organization may face. Experts on Demand can help to:
+Select **Ask Defender Experts** directly inside the Microsoft 365 security portal to get swift and accurate responses to all your threat hunting questions. Experts can provide insight to better understand the complex threats your organization may face. Experts on Demand can help to:
- Gather additional information on alerts and incidents, including root causes and scope - Gain clarity into suspicious devices, alerts, or incidents and take next steps if faced with an advanced attacker
security Playbook Detecting Ransomware M365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/playbook-detecting-ransomware-m365-defender.md
f1.keywords: NOCSH
Ransomware is a type of extortion attack that destroys or encrypts files and folders, preventing access to critical data or disrupting critical business systems. There are two types of ransomware: -- Commodity ransomware is malware that spreads with phishing or between devices and encrypts files before demanding a ransom.-- Human-operated ransomware is a planned and coordinated attack by active cybercriminals who employ multiple attack methods. In many cases, known techniques and tools are used to infiltrate your organization, find the assets or systems worth extorting, and then demand a ransom. Upon compromising a network, the attacker carries out reconnaissance of assets and systems which can be encrypted or extorted. The attackers then encrypt or exfiltrate data before demanding a ransom.
+* Commodity ransomware is malware that spreads with phishing or between devices and encrypts files before demanding a ransom.
+* Human-operated ransomware is a planned and coordinated attack by active cybercriminals who employ multiple attack methods. In many cases, known techniques and tools are used to infiltrate your organization, find the assets or systems worth extorting, and then demand a ransom. Upon compromising a network, the attacker carries out reconnaissance of assets and systems which can be encrypted or extorted. The attackers then encrypt or exfiltrate data before demanding a ransom.
This article describes proactive detection of new or ongoing human-operated ransomware attacks with the Microsoft 365 Defender portal, an extended detection and response (XDR) solution for the following security -- Microsoft Defender for Endpoint-- Microsoft Defender for Office 365-- Microsoft Defender for Identity-- Microsoft Defender for Cloud Apps (including the app governance add-on)-- Microsoft Azure AD Identity Protection-- Microsoft Defender for IoT-- Microsoft 365 Business Premium-- Microsoft Defender for Business
+* Microsoft Defender for Endpoint
+* Microsoft Defender for Office 365
+* Microsoft Defender for Identity
+* Microsoft Defender for Cloud Apps (including the app governance add-on)
+* Microsoft Azure AD Identity Protection
+* Microsoft Defender for IoT
+* Microsoft 365 Business Premium
+* Microsoft Defender for Business
For information about preventing ransomware attacks, see [Rapidly protect against ransomware and extortion](/security/compass/protect-against-ransomware-phase3).
Because human-operated ransomware is typically performed by active attackers who
If pre-ransom activities are detected quickly, the likelihood of a severe attack decreases. The pre-ransom stage typically includes the following techniques: initial access, reconnaissance, credential theft, lateral movement, and persistence. These techniques can initially seem unrelated and often fly under the radar. If these techniques lead to the ransom stage, it's often too late. Microsoft 365 Defender can help identify those small and seemingly unrelated incidents as possibly part of a larger ransomware campaign. -- When detected during the pre-ransom stage, smaller-scale mitigations such as isolating infected devices or user accounts can be used to disrupt and remediate the attack.-- If detection comes at a later stage, such as when the malware used to encrypt files is being deployed, more aggressive remediation steps that can cause downtime might need to be used to disrupt and remediate the attack.
+* When detected during the pre-ransom stage, smaller-scale mitigations such as isolating infected devices or user accounts can be used to disrupt and remediate the attack.
+* If detection comes at a later stage, such as when the malware used to encrypt files is being deployed, more aggressive remediation steps that can cause downtime might need to be used to disrupt and remediate the attack.
Business operation disruptions are likely when responding to a ransomware attack. The end stage of a ransomware attack is often a choice between downtime caused by attackers with major risks, or a controlled downtime to ensure network safety and give you time to fully investigate. We never recommend paying a ransom. Paying cybercriminals to get a ransomware decryption key provides no guarantee that your encrypted data will be restored. See, [Ransomware response - Microsoft Security Blog](https://www.microsoft.com/security/blog/2019/12/16/ransomware-response-to-pay-or-not-to-pay/).
In many cases, human-operated ransomware attackers use well-known and field-test
To see examples of how ransomware attacks get started with common malware, see these resources: -- [Human-operated ransomware attacks: A preventable disaster](https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/)-- [Ransomware threat analytics reports in the Microsoft 365 Defender portal](https://sip.security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,exposureLevel,MisconfiguredDevices,VulnerableDevices,reportType,createdOn,lastUpdatedOn,tags,flag)
+* [Human-operated ransomware attacks: A preventable disaster](https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/)
+* [Ransomware threat analytics reports in the Microsoft 365 Defender portal](https://sip.security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,exposureLevel,MisconfiguredDevices,VulnerableDevices,reportType,createdOn,lastUpdatedOn,tags,flag)
Being familiar with pre-ransom malware, payloads, and activities helps your analysts know what to look for to prevent the later stages of an attack.
Here are some typical techniques and tools used by ransomware attackers for the
Initial access: -- RDP brute force-- Vulnerable internet-facing system-- Weak application settings-- Phishing email
+* RDP brute force
+* Vulnerable internet-facing system
+* Weak application settings
+* Phishing email
Credential theft: -- Mimikatz-- LSA secrets-- Credential vault-- Credentials in plaintext-- Abuse of service accounts
+* Mimikatz
+* LSA secrets
+* Credential vault
+* Credentials in plaintext
+* Abuse of service accounts
Lateral movement: -- Cobalt Strike-- WMI-- Abuse of management tools-- PsExec
+* Cobalt Strike
+* WMI
+* Abuse of management tools
+* PsExec
Persistence: -- New accounts-- GPO changes-- Shadow IT tools-- Schedule tasks-- Service registration
+* New accounts
+* GPO changes
+* Shadow IT tools
+* Schedule tasks
+* Service registration
Defense evasion: -- Disabling security features-- Clearing log files-- Deleting attack artifact files-- Resetting timestamps on altered files
+* Disabling security features
+* Clearing log files
+* Deleting attack artifact files
+* Resetting timestamps on altered files
Exfiltration: -- Exfiltration of sensitive data
+* Exfiltration of sensitive data
Impact (financial leverage):-- Encryption of data in place and in backups-- Deletion of data in place and backups, which might be combined with a preceding exfiltration-- Threat of public leakage of exfiltrated, sensitive data
+* Encryption of data in place and in backups
+* Deletion of data in place and backups, which might be combined with a preceding exfiltration
+* Threat of public leakage of exfiltrated, sensitive data
### What to look for The challenge for security analysts is recognizing when an alert is part of a larger attack chain with the goal of extorting your sensitive data or crucial systems. For example, a detected phishing attack might be: -- A one-off attack to surveil the email messages of someone in the finance department of an organization.-- The pre-ransom part of an attack chain to use compromised user account credentials to discover the resources available to the user account and to compromise other user accounts with higher levels of privilege and access.
+* A one-off attack to surveil the email messages of someone in the finance department of an organization.
+* The pre-ransom part of an attack chain to use compromised user account credentials to discover the resources available to the user account and to compromise other user accounts with higher levels of privilege and access.
This section provides common attack phases and methods and the signal sources that feed into the central Microsoft 365 Defender portal, which creates alerts and incidents composed of multiple related alerts for security analysis. In some cases, there are alternate security portals to view the attack data.
This section provides common attack phases and methods and the signal sources th
Attacker is attempting to compromise a user account, device, or app.
-|Attack method|Signal source|Alternate security portals|
-||||
-|RDP brute force|Defender for Endpoint|Defender for Cloud Apps|
-|Vulnerable internet-facing system|Windows security features, Microsoft Defender for Servers|
-|Weak application settings|Defender for Cloud Apps, Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps|
-|Malicious app activity|Defender for Cloud Apps, Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps|
-|Phishing email|Defender for Office 365|
-|Password spray against Azure AD accounts|Azure AD Identity Protection via Defender for Cloud Apps|Defender for Cloud Apps|
-|Password spray against on-premises accounts|Microsoft Defender for Identity|
-|Device compromise|Defender for Endpoint|
-|Credential theft|Microsoft Defender for Identity|
-|Escalation of privilege|Microsoft Defender for Identity|
+Attack method |Signal source |Alternate security portals
+|:|:|:
+RDP brute force|Defender for Endpoint|Defender for Cloud Apps
+Vulnerable internet-facing system|Windows security features, Microsoft Defender for Servers|
+Weak application settings |Defender for Cloud Apps, Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps |
+Malicious app activity |Defender for Cloud Apps, Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps |
+Phishing email |Defender for Office 365
+Password spray against Azure AD accounts |Azure AD Identity Protection via Defender for Cloud Apps |Defender for Cloud Apps
+Password spray against on-premises accounts |Microsoft Defender for Identity
+Device compromise |Defender for Endpoint
+Credential theft |Microsoft Defender for Identity
+Escalation of privilege |Microsoft Defender for Identity
#### Recent spike in otherwise typical behavior Attacker is attempting to probe for additional entities to compromise.
-|Spike category|Signal source|Alternate security portals|
-||||
-|Sign-ins: Numerous failed attempts, attempts to logon to multiple devices in a short period, multiple first-time logons, etc.|Azure AD Identity Protection via Defender for Cloud Apps, Microsoft Defender for Identity|Defender for Cloud Apps|
-|Recently active user account, group, machine account, app|Azure AD Identity Protection via Defender for Cloud Apps (Azure AD), Defender for Identity (Active Directory Domain Services [AD DS])|Defender for Cloud Apps|
-|Recent app activity such as data access|Apps with Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps|
+Spike category |Signal source |Alternate security portals
+|: |: |:
+Sign-ins: Numerous failed attempts, attempts to logon to multiple devices in a short period, multiple first-time logons, etc. |Azure AD Identity Protection via Defender for Cloud Apps, Microsoft Defender for Identity |Defender for Cloud Apps
+Recently active user account, group, machine account, app |Azure AD Identity Protection via Defender for Cloud Apps (Azure AD), Defender for Identity (Active Directory Domain Services [AD DS]) |Defender for Cloud Apps
+Recent app activity such as data access |Apps with Defender for Cloud Apps with the app governance add-on |Defender for Cloud Apps
#### New activity Attacker is creating new entities to further their reach, install malware agents, or evade detection.
-|Activity|Signal source|Alternate security portal|
-||||
-|New apps that are installed|Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps|
-|New user accounts|Azure Identity Protection|Defender for Cloud Apps|
-|Role changes|Azure Identity Protection|Defender for Cloud Apps|
+Activity |Signal source |Alternate security portal
+|: |: |:
+New apps that are installed |Defender for Cloud Apps with the app governance add-on |Defender for Cloud Apps
+New user accounts |Azure Identity Protection |Defender for Cloud Apps
+Role changes |Azure Identity Protection |Defender for Cloud Apps
#### Suspicious behavior Attacker is downloading sensitive information, encrypting files, or otherwise collecting or damaging organization assets.
-|Behavior|Signal source|
-|||
-|Malware spread to multiple devices|Defender for Endpoint|
-|Resource scanning|Defender for Endpoint, Defender for Identity|
-|Changes in mailbox forwarding rules|Defender for Office 365|
-|Data exfiltration and encryption|Defender for Office 365|
+Behavior |Signal source
+|: |:
+Malware spread to multiple devices |Defender for Endpoint
+Resource scanning |Defender for Endpoint, Defender for Identity
+Changes in mailbox forwarding rules |Defender for Office 365
+Data exfiltration and encryption |Defender for Office 365
--*Monitor for Adversary Disabling Security** ΓÇô as this is often part of human-operated ransomware (HumOR) attack chain
+**Monitor for Adversary Disabling Security** ΓÇô as this is often part of human-operated ransomware (HumOR) attack chain
-- **Event Logs Clearing** ΓÇô especially the Security Event log and PowerShell Operational logs-- **Disabling of security tools/controls** (associated with some groups)
+* **Event Logs Clearing** ΓÇô especially the Security Event log and PowerShell Operational logs
+* **Disabling of security tools/controls** (associated with some groups)
## Detect ransomware attacks with the Microsoft 365 Defender portal The Microsoft 365 Defender portal provides a centralized view for information on detections, impacted assets, automated actions taken, and related evidence a combination of: -- An incident queue, which groups related alerts for an attack to provide the full attack scope, impacted assets, and automated remediation actions.-- An alerts queue, which lists all of the alerts being tracked by Microsoft 365 Defender.
+* An incident queue, which groups related alerts for an attack to provide the full attack scope, impacted assets, and automated remediation actions.
+* An alerts queue, which lists all of the alerts being tracked by Microsoft 365 Defender.
### Incident and alert sources Microsoft 365 Defender portal centralizes signals from: -- Microsoft Defender for Endpoint-- Microsoft Defender for Office 365-- Microsoft Defender for Identity-- Microsoft Defender for Cloud Apps (including the app governance add-on)-- Microsoft Azure AD Identity Protection-- Microsoft Defender for IoT
+* Microsoft Defender for Endpoint
+* Microsoft Defender for Office 365
+* Microsoft Defender for Identity
+* Microsoft Defender for Cloud Apps (including the app governance add-on)
+* Microsoft Azure AD Identity Protection
+* Microsoft Defender for IoT
This table lists some typical attacks and their corresponding signal source for Microsoft 365 Defender.
-|Attacks and incidents|Signal source|
-|||
-|Cloud identity: Password spray, numerous failed attempts, attempts to log on to multiple devices in a short period, multiple first-time logons, recently active user accounts|Azure AD Identity Protection|
-|On-premises identity (AD DS) compromise|Defender for Identity|
-|Phishing|Defender for Office 365|
-|Malicious apps|Defender for Cloud Apps or Defender for Cloud Apps with app governance add-on|
-|Endpoint (device) compromise|Defender for Endpoint|
-|IoT-capable device compromise|Defender for IoT|
+Attacks and incidents |Signal source
+|: |:
+Cloud identity: Password spray, numerous failed attempts, attempts to log on to multiple devices in a short period, multiple first-time logons, recently active user accounts |Azure AD Identity Protection
+On-premises identity (AD DS) compromise |Defender for Identity
+Phishing |Defender for Office 365
+Malicious apps |Defender for Cloud Apps or Defender for Cloud Apps with app governance add-on
+Endpoint (device) compromise |Defender for Endpoint
+IoT-capable device compromise |Defender for IoT
### Filtering ransomware-identified incidents
You can easily filter the incidents queue for incidents that have been categoriz
Each filter setting for the incidents queue creates a URL that you can save and access later as a link. These URLs can be bookmarked or otherwise saved and used when needed at a single click. For example, you can create bookmarks for: -- Incidents containing the "ransomware" category. Here is the corresponding [link](https://security.microsoft.com/incidents?filters=AlertStatus%3DNew%257CInProgress,category%3Dransomware&page_size=30&fields=expand,name,tags,severity,investigationStates,category,impactedEntities,alertCount,serviceSource,detectionSource,firstEventTime,lastEventTime,sensitivity,status,incidentAssignment,classification,determination,rbacGroup).-- Incidents with a specified **Actor** name known to be performing ransomware attacks.-- Incidents with a specified **Associated threat** name known to be used in ransomware attacks.-- Incidents containing a custom tag that your SecOps team uses for incidents that are known to be part of a larger, coordinated ransomware attack.
+* Incidents containing the "ransomware" category. Here is the corresponding [link](https://security.microsoft.com/incidents?filters=AlertStatus%3DNew%257CInProgress,category%3Dransomware&page_size=30&fields=expand,name,tags,severity,investigationStates,category,impactedEntities,alertCount,serviceSource,detectionSource,firstEventTime,lastEventTime,sensitivity,status,incidentAssignment,classification,determination,rbacGroup).
+* Incidents with a specified **Actor** name known to be performing ransomware attacks.
+* Incidents with a specified **Associated threat** name known to be used in ransomware attacks.
+* Incidents containing a custom tag that your SecOps team uses for incidents that are known to be part of a larger, coordinated ransomware attack.
### Filtering ransomware-identified threat analytics reports
From the **Detection details** section of many threat analytics reports, you can
### Microsoft 365 Defender APIs
-You can also use the Microsoft 365 Defender APIs to query the Microsoft 365 Defender incidents and alerts data in your tenant. A custom app can filter the data, filter it based on custom settings, and then provide a filtered list of links to alerts and incidents that you can easily select to go right to that alert or incident. See [List incidents API in Microsoft 365 Defender| Microsoft Docs](/api-list-incidents.md). You can also integrate your SIEM with Microsoft Defender, see [Integrate your SIEM tools with Microsoft 365 Defender](/configure-siem-defender.md).
+You can also use the Microsoft 365 Defender APIs to query the Microsoft 365 Defender incidents and alerts data in your tenant. A custom app can filter the data, filter it based on custom settings, and then provide a filtered list of links to alerts and incidents that you can easily select to go right to that alert or incident. See [List incidents API in Microsoft 365 Defender | Microsoft Docs](/api-list-incidents.md). You can also integrate your SIEM with Microsoft Defender, see [Integrate your SIEM tools with Microsoft 365 Defender](/configure-siem-defender.md).
### Microsoft 365 Defender Sentinel Integration
Microsoft Sentinel's Microsoft 365 Defender incident integration allows you to s
For proactive scanning of ransomware activities, you should assemble a catalog of advanced hunting queries for commonly used ransomware attack methods for identities, endpoints, apps, and data. Here are some key sources for ready-to-use advanced hunting queries: -- The [Hunt for ransomware](/advanced-hunting-find-ransomware.md) article-- GitHub repository for advanced hunting queries:
- - [Ransomware-specific](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware) queries
- - [All categories](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware) of queries
-- Threat analytics reports
- - Advanced hunting section of the [Ransomware: A pervasive and ongoing threat](https://security.microsoft.com/threatanalytics3/05658b6c-dc62-496d-ad3c-c6a795a33c27/analystreport) analyst report
- - Advanced hunting section of other analyst reports
+* The [Hunt for ransomware](/advanced-hunting-find-ransomware.md) article
+* GitHub repository for advanced hunting queries:
+ * [Ransomware-specific](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware) queries
+ * [All categories](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware) of queries
+* Threat analytics reports
+ * Advanced hunting section of the [Ransomware: A pervasive and ongoing threat](https://security.microsoft.com/threatanalytics3/05658b6c-dc62-496d-ad3c-c6a795a33c27/analystreport) analyst report
+ * Advanced hunting section of other analyst reports
### Automated hunting
Advanced hunting queries can also be used to create custom detection rules and a
To create a custom detection rule, select **Create custom detection** rule from the page of an advanced hunting query. Once created, you can specify: -- How often to run the custom detection rule-- The severity of the alert created by the rule-- The MITRE attack phase for the created alert-- Impacted entities-- Actions to take on impacted entities
+* How often to run the custom detection rule
+* The severity of the alert created by the rule
+* The MITRE attack phase for the created alert
+* Impacted entities
+* Actions to take on impacted entities
## Prepare your SecOps Team for focused ransomware detection Preparing your SecOps team for proactive ransomware detection requires: -- Pre-work for your SecOps team and organization-- Security analyst training, as needed-- Ongoing operational work to incorporate the latest attacks and detection experiences of your security analysts
+* Pre-work for your SecOps team and organization
+* Security analyst training, as needed
+* Ongoing operational work to incorporate the latest attacks and detection experiences of your security analysts
### Pre-work for your SecOps team and organization
Consider these steps to get your SecOps team and organization ready for focused
4. Create the set of custom detection rules for specific advanced hunting queries that create alerts for known ransomware attack methods, including their schedule, alert naming, and automated actions. 5. Determine the set of [custom tags](/manage-incidents.md) or standards to create new one to identify incidents that are known to be part of a larger, coordinated ransomware attack 6. Determine the set of operational tasks for ransomware incident and alert management. For example:
- - Processes for Tier 1 analyst scanning of incoming incidents and alerts and assignment to Tier 2 analysts for investigation.
- - Manually running advanced hunting queries and their schedule (daily, weekly, monthly).
- - Ongoing changes based on ransomware attack investigation and mitigation experiences.
+
+* Processes for Tier 1 analyst scanning of incoming incidents and alerts and assignment to Tier 2 analysts for investigation.
+* Manually running advanced hunting queries and their schedule (daily, weekly, monthly).
+* Ongoing changes based on ransomware attack investigation and mitigation experiences.
### Security analyst training As needed, you can provide your security analysts with internal training for: -- Common ransomware attack chains (MITRE attack tactics and common threat techniques and malware)-- Incidents and alerts and how to locate and analyze them in the Microsoft 365 Defender portal using:
- - Alerts and incidents already created by Microsoft 365 Defender
- - Pre-scanned URL-based filters for the Microsoft 365 Defender portal
- - Programmatically via the incidents API
-- Advanced hunting queries to use and their manual schedule (daily, weekly, monthly)-- Custom detection rules to use and their settings-- Custom incident tags-- The latest [threat analytics reports for ransomware](https://security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,reportType,createdOn,lastUpdatedOn,tags,flag) attacks in the Microsoft 365 Defender portal
+* Common ransomware attack chains (MITRE attack tactics and common threat techniques and malware)
+* Incidents and alerts and how to locate and analyze them in the Microsoft 365 Defender portal using:
+ * Alerts and incidents already created by Microsoft 365 Defender
+ * Pre-scanned URL-based filters for the Microsoft 365 Defender portal
+ * Programmatically via the incidents API
+* Advanced hunting queries to use and their manual schedule (daily, weekly, monthly)
+* Custom detection rules to use and their settings
+* Custom incident tags
+* The latest [threat analytics reports for ransomware](https://security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,reportType,createdOn,lastUpdatedOn,tags,flag) attacks in the Microsoft 365 Defender portal
### Ongoing work based on operational learning and new threats As part of your SecOps team's ongoing tool and process best practices and security analysts' experiences, you should: -- Update your catalog of advanced hunting queries with:
- - New queries based on the latest threat analytics reports in the Microsoft 365 Defender portal or the [Advanced Hunting GitHub repository](<https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware>).
- - Changes to existing ones to optimize for threat identification or for better alert quality.
-- Update custom detection rules based on new or changed advanced hunting queries.-- Update the set of operational tasks for ransomware detection.
+* Update your catalog of advanced hunting queries with:
+ * New queries based on the latest threat analytics reports in the Microsoft 365 Defender portal or the [Advanced Hunting GitHub repository](<https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware>).
+ * Changes to existing ones to optimize for threat identification or for better alert quality.
+* Update custom detection rules based on new or changed advanced hunting queries.
+* Update the set of operational tasks for ransomware detection.
security Prerequisites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/prerequisites.md
For more information, [view the Microsoft 365 Enterprise service plans](https://
### Check your existing licenses Go to Microsoft 365 admin center ([admin.microsoft.com](https://admin.microsoft.com/)) to view your existing licenses. In the admin center, go to **Billing** > **Licenses**.
-> [!NOTE]
+>[!NOTE]
> You need to be assigned either the **Billing admin** or **Global reader** [role in Azure AD](/azure/active-directory/roles/permissions-reference) to be able to see license information. If you encounter access problems, contact a global admin. ## Required permissions
security Setup M365deval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/setup-m365deval.md
ms.localizationpriority: medium audience: ITPro-+ - m365-security - m365solution-scenario - m365solution-evalutatemtp
Last updated 02/17/2021
-# Set up your Microsoft 365 Defender trial in a lab environment
+# Set up your Microsoft 365 Defender trial in a lab environment
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)] + **Applies to:**-- Microsoft 365 Defender
+- Microsoft 365 Defender
-This topic guides you to set up a dedicated lab environment. For information on setting up a trial in production, see the new [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) guide.
+This topic guides you to set up a dedicated lab environment. For information on setting up a trial in production, see the new [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) guide.
## Create an Office 365 E5 trial tenant-
-> [!NOTE]
-> If you already have an existing Office 365 or Azure Active Directory subscription, you can skip the Office 365 E5 trial tenant creation steps.
+>[!NOTE]
+>If you already have an existing Office 365 or Azure Active Directory subscription, you can skip the Office 365 E5 trial tenant creation steps.
1. Go to the [Office 365 E5 product portal](https://www.microsoft.com/microsoft-365/business/office-365-enterprise-e5-business-software?activetab=pivot%3aoverviewtab) and select **Free trial**. :::image type="content" source="../../media/mtp-eval-9.png" alt-text="The Office 365 E5 free trial page" lightbox="../../media/mtp-eval-9.png":::-
+
2. Complete the trial registration by entering your email address (personal or corporate). Click **Set up account**. :::image type="content" source="../../media/mtp-eval-10.png" alt-text="The Office 365 E5 trial registration setup page" lightbox="../../media/mtp-eval-10.png":::
-3. Fill in your first name, last name, business phone number, company name, company size, and country or region.
+3. Fill in your first name, last name, business phone number, company name, company size, and country or region.
:::image type="content" source="../../media/mtp-eval-11.png" alt-text="The Office 365 E5 trial registration setup page asking for name, phone, and company details" lightbox="../../media/mtp-eval-11.png":::-
+
> [!NOTE] > The country or region you set here determines the data center region your Office 365 will be hosted.-
-4. Choose your verification preference: through a text message or call. Click **Send Verification Code**.
+
+4. Choose your verification preference: through a text message or call. Click **Send Verification Code**.
:::image type="content" source="../../media/mtp-eval-12.png" alt-text="The Office 365 E5 trial registration setup page asking for verification preference" lightbox="../../media/mtp-eval-12.png"::: 5. Set the custom domain name for your tenant, then click **Next**. :::image type="content" source="../../media/mtp-eval-13.png" alt-text="The Office 365 E5 trial registration setup page where you can set up your custom domain name" lightbox="../../media/mtp-eval-13.png":::-
+
6. Set up the first identity, which will be a Global Administrator for the tenant. Fill in **Name** and **Password**. Click **Sign up**. :::image type="content" source="../../media/mtp-eval-14.png" alt-text="The Office 365 E5 trial registration setup page where you can set your business identity" lightbox="../../media/mtp-eval-14.png":::
This topic guides you to set up a dedicated lab environment. For information on
8. Connect your corporate domain to the Office 365 tenant. [Optional] Choose **Connect a domain you already own** and type in your domain name. Click **Next**. :::image type="content" source="../../media/mtp-eval-16.png" alt-text="The Office 365 E5 Setup page where you should personalize your sign-in and email" lightbox="../../media/mtp-eval-16.png":::-
+
9. Add a TXT or MX record to validate the domain ownership. Once you've added the TXT or MX record to your domain, select **Verify**. :::image type="content" source="../../media/mtp-eval-17.png" alt-text="The Office 365 E5 setup page where you should add a TXT of MX record to verify your domain" lightbox="../../media/mtp-eval-17.png":::-
+
10. [Optional] Create more user accounts for your tenant. You can skip this step by clicking **Next**. :::image type="content" source="../../media/mtp-eval-18.png" alt-text="The Office 365 E5 setup page where you can add more users" lightbox="../../media/mtp-eval-18.png":::-
-11. [Optional] Download Office apps. Click **Next** to skip this step.
+
+11. [Optional] Download Office apps. Click **Next** to skip this step.
:::image type="content" source="../../media/mtp-eval-19.png" alt-text="The Office 365 E5 page where you can install your Office apps" lightbox="../../media/mtp-eval-19.png"::: 12. [Optional] Migrate email messages. Again, you can skip this step. :::image type="content" source="../../media/mtp-eval-20.png" alt-text="The Office 365 E5 where you can set whether to migrate email messages or not" lightbox="../../media/mtp-eval-20.png":::-
-13. Choose online services. Select **Exchange** and click **Next**.
+
+13. Choose online services. Select **Exchange** and click **Next**.
:::image type="content" source="../../media/mtp-eval-21.png" alt-text="The Office 365 E5 where you can choose your online services" lightbox="../../media/mtp-eval-21.png"::: 14. Add MX, CNAME, and TXT records to your domain. When completed, select **Verify**. :::image type="content" source="../../media/mtp-eval-22.png" alt-text="The Office 365 E5 here you can add your DNS records" lightbox="../../media/mtp-eval-22.png":::-
+
15. Congratulations, you have completed the provisioning of your Office 365 tenant. :::image type="content" source="../../media/mtp-eval-23.png" alt-text="The Office 365 E5 setup completion confirmation page" lightbox="../../media/mtp-eval-23.png":::
+
## Enable Microsoft 365 trial subscription
-> [!NOTE]
-> Signing up for a trial gives you 25 user licenses to use for a month. See [Try or buy a Microsoft 365 subscription](../../commerce/try-or-buy-microsoft-365.md) for details.
+>[!NOTE]
+>Signing up for a trial gives you 25 user licenses to use for a month. See [Try or buy a Microsoft 365 subscription](../../commerce/try-or-buy-microsoft-365.md) for details.
1. From [Microsoft 365 Admin Center](https://admin.microsoft.com/), click **Billing** and then navigate to **Purchase services**.
-2. Select **Microsoft 365 E5** and click **Start free trial**.
+2. Select **Microsoft 365 E5** and click **Start free trial**.
:::image type="content" source="../../media/mtp-eval-24.png" alt-text="The Microsoft 365 E5 Start free trial page" lightbox="../../media/mtp-eval-24.png"::: 3. Choose your verification preference: through a text message or call. Once you have decided, enter the phone number, select **Text me** or **Call me** depending on your selection. :::image type="content" source="../../media/mtp-eval-25.png" alt-text="The Microsoft 365 E5 Start free trial page asking for contact details to send code to prove you are not a robot" lightbox="../../media/mtp-eval-25.png":::-
+
4. Enter the verification code and click **Start your free trial**. :::image type="content" source="../../media/mtp-eval-26.png" alt-text="The Microsoft 365 E5 Start free trial page where you can fill out verification code the system sent to prove you are not a robot" lightbox="../../media/mtp-eval-26.png":::
This topic guides you to set up a dedicated lab environment. For information on
5. Click **Try now** to confirm your Microsoft 365 E5 trial. :::image type="content" source="../../media/mtp-eval-27.png" alt-text="The Microsoft 365 E5 Start free trial page where you should clock the Try now button to start" lightbox="../../media/mtp-eval-27.png":::-
+
6. Go to the **Microsoft 365 Admin Center** > **Users** > **Active users**. Select your user account, select **Manage product licenses**, then swap the license from Office 365 E5 to **Microsoft 365 E5**. Click **Save**. :::image type="content" source="../../media/mtp-eval-28.png" alt-text="The Microsoft 365 Admin Center page where you can select the Microsoft 365 E5 license" lightbox="../../media/mtp-eval-28.png":::-
+
7. Select the global administrator account again then click **Manage username**. :::image type="content" source="../../media/mtp-eval-29.png" alt-text="The Microsoft 365 Admin Center page where you can select Account and Manage username" lightbox="../../media/mtp-eval-29.png":::
This topic guides you to set up a dedicated lab environment. For information on
:::image type="content" source="../../media/mtp-eval-30.png" alt-text="The Microsoft 365 Admin Center page where you can change your domain preference" lightbox="../../media/mtp-eval-30.png"::: ## Next step- |[Phase 3: Configure & Onboard](config-m365d-eval.md) | Configure each Microsoft 365 Defender pillar for your Microsoft 365 Defender trial lab or pilot environment and onboard your endpoints. |:-|:--|
security Threat Analytics Analyst Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/threat-analytics-analyst-reports.md
The analyst report also provides the detections from Microsoft Defender Antiviru
These detections are available on devices with [Microsoft Defender Antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10) turned on. When these detections occur on devices that have been onboarded to Microsoft Defender for Endpoint, they also trigger alerts that light up the charts in the report.
-> [!NOTE]
-> The analyst report also lists **generic detections** that can identify a wide-range of threats, in addition to components or behaviors specific to the tracked threat. These generic detections don't reflect in the charts.
+>[!NOTE]
+>The analyst report also lists **generic detections** that can identify a wide-range of threats, in addition to components or behaviors specific to the tracked threat. These generic detections don't reflect in the charts.
### Endpoint detection and response (EDR) alerts
While detections allow you to identify and stop the tracked threat automatically
Advanced hunting queries in the analyst reports have been vetted by Microsoft analysts and are ready for you to run in the [advanced hunting query editor](https://security.microsoft.com/advanced-hunting). You can also use the queries to create [custom detection rules](custom-detection-rules.md) that trigger alerts for future matches.
-> [!NOTE]
+>[!NOTE]
> Threat analytics is also available in [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/threat-analytics). However, it does not have the data integration between Microsoft Defender for Office and Microsoft Defender for Endpoint. ## Related topics
security Threat Analytics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/threat-analytics.md
Threat analytics is our in-product threat intelligence solution from expert Micr
Watch this short video to learn more about how threat analytics can help you track the latest threats and stop them.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWwJfU]
+>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWwJfU]
You can access threat analytics either from the upper left-hand side of Microsoft 365 security portal's navigation bar, or from a dedicated dashboard card that shows the top threats to your org, both in terms of impact, and in terms of exposure.
security Tickets https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/tickets.md
Last updated 02/16/2021
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
-> [!CAUTION]
-> **The preview period for the ServiceNow connector has ended**
->
-> This capability is no longer available. Thank you for your feedback and continued support while we determine next steps.
+>[!CAUTION]
+>**The preview period for the ServiceNow connector has ended**<br>
+>This capability is no longer available. Thank you for your feedback and continued support while we determine next steps.
ServiceNow is a popular cloud computing platform that helps companies manage digital workflows for enterprise operations. Their Now platform has IT workflows, employee workflows, and customer workflows.
security Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/whats-new.md
For more information on what's new with other Microsoft Defender security produc
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter). ## March 2023-- (Preview) Complete device reports for the [`DeviceInfo` table](advanced-hunting-deviceinfo-table.md) in advanced hunting are now sent *every hour* (instead of the previous daily cadence). In addition, complete device reports are also sent whenever there is a change to any previous report. New columns were also added to the `DeviceInfo` table, along with several improvements to existing data in `DeviceInfo` and [DeviceNetworkInfo](advanced-hunting-devicenetworkinfo-table.md) tables.++ - (Preview) Near real-time custom detection is now available for public preview in advanced hunting custom detections. There is a new [Continuous (NRT)](custom-detection-rules.md) frequency, which checks data from events as they are collected and processed in near real-time. ## February 2023
security Criteria https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/criteria.md
You can assist Microsoft by [submitting unknown or suspicious software for analy
The next sections provide an overview of the classifications we use for applications and the types of behaviors that lead to that classification.
-> [!NOTE]
+>[!NOTE]
> New forms of malware and potentially unwanted applications are being developed and distributed rapidly. The following list may not be comprehensive, and Microsoft reserves the right to adjust, expand, and update these without prior notice or announcement. ## Unknown ΓÇô Unrecognized software
security Microsoft 365 Zero Trust https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/microsoft-365-zero-trust.md
Use this article together with this poster.
| Item | Description | |:--|:--|
-|[![Illustration of the Microsoft 365 Zero Trust deployment plan.](../medi)</li></ul>
+|[![Illustration of the Microsoft 365 Zero Trust deployment plan.](../medi)</li></ul>
## Zero Trust security architecture
In this illustration:
- Threat protection capabilities are built on top of this foundation to provide real-time monitoring and remediation of security threats. - Information protection and governance provide sophisticated controls targeted at specific types of data to protect your most valuable information and to help you comply with compliance standards, including protecting personal information. + This article assumes you have already configured cloud identity. If you need guidance for this objective, see [**Deploy your identity infrastructure for Microsoft 365**](/microsoft-365/enterprise/deploy-identity-solution-overview). ## Step 1. Configure Zero Trust identity and device access protection ΓÇö starting-point policies
security Anti Phishing Policies About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-about.md
For detected domain impersonation attempts, the following actions are available:
- **Don't apply any action**: This is the default value. - **Redirect message to other email addresses**: Sends the message to the specified recipients instead of the intended recipients. - **Move messages to the recipients' Junk Email folders**: The message is delivered to the mailbox and moved to the Junk Email folder. For more information, see [Configure junk email settings on Exchange Online mailboxes in Microsoft 365](configure-junk-email-settings-on-exo-mailboxes.md).-
+
- **Quarantine the message**: Sends the message to quarantine instead of the intended recipients. For information about quarantine, see the following articles: - [Quarantine in Microsoft 365](quarantine-email-messages.md) - [Manage quarantined messages and files as an admin in Microsoft 365](manage-quarantined-messages-and-files.md)
For impersonation attempts detected by mailbox intelligence, the following actio
- **Quarantine the message**: If you select this action, you can also select the quarantine policy that applies to messages that are quarantined by mailbox intelligence protection. Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Quarantine policies](quarantine-policies.md). - **Deliver the message and add other addresses to the Bcc line** - **Delete the message before it's delivered**-
+
#### Impersonation safety tips Impersonation safety tips appear to users when messages are identified as impersonation attempts. The following safety tips are available:
security Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/defender-for-office-365.md
Last updated 01/31/2023
# Microsoft Defender for Office 365 > [!IMPORTANT]
-> If your browser is being blocked by Safe Links and Safe Attachment pages, see [Advanced Outlook.com security for Microsoft 365 subscribers](https://support.microsoft.com/office/advanced-outlook-com-security-for-microsoft-365-subscribers-882d2243-eab9-4545-a58a-b36fee4a46e2?storagetype=live).
+>If your browser is being blocked by Safe Links and Safe Attachment pages, see [Advanced Outlook.com security for Microsoft 365 subscribers](https://support.microsoft.com/office/advanced-outlook-com-security-for-microsoft-365-subscribers-882d2243-eab9-4545-a58a-b36fee4a46e2?storagetype=live).
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
security Email Analysis Investigations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-analysis-investigations.md
Here are additional enhancements to email analysis in investigations.
During the email clustering analysis, all clustering queries will ignore security mailboxes set up as Security Operations mailboxes in the Advanced Delivery policy. Similarly, the email clustering queries will ignore phish simulation (education) messages that are configured in the Advanced Delivery policy. Neither the SecOps nor the PhishEdu exclusion values are shown in the query to keep the clustering attributes simple and easy to read. This exclusion ensures that threat intelligence and operational mailboxes (SecOps mailboxes) and the phish simulations (PhishEdu) are ignored during threat analysis and do not get removed during any remediation.
-> [!NOTE]
-> When opening an email cluster to view it in Explorer from the email cluster details, the PhishEdu and SecOps mailbox filters will be applied in Explorer but will not be shown. If you change the Explorer filters, dates, or refresh the query within the page ΓÇô then the PhishEdu/SecOps filter exclusions will get removed and emails that match these will be shown once again. If you refresh the Explorer page using the browser refresh function, the original query filters will get re-loaded, including the PhishEdu/SecOps filters ΓÇô but removing any subsequent changes you had made.
+>[!Note]
+>When opening an email cluster to view it in Explorer from the email cluster details, the PhishEdu and SecOps mailbox filters will be applied in Explorer but will not be shown. If you change the Explorer filters, dates, or refresh the query within the page ΓÇô then the PhishEdu/SecOps filter exclusions will get removed and emails that match these will be shown once again. If you refresh the Explorer page using the browser refresh function, the original query filters will get re-loaded, including the PhishEdu/SecOps filters ΓÇô but removing any subsequent changes you had made.
+>
## AIR updates pending email action status
security Email Authentication Dkim Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-dkim-configure.md
DKIM lets you add a digital signature to outbound email messages in the message
In basic, a private key encrypts the header in a domain's outgoing email. The public key is published in the domain's DNS records, and receiving servers can use that key to decode the signature. DKIM verification helps the receiving servers confirm the mail is really coming from your domain and not someone *spoofing* your domain. > [!TIP]
-> You can choose to do nothing about DKIM for your custom domain too. If you don't set up DKIM for your custom domain, Microsoft 365 creates a private and public key pair, enables DKIM signing, and then configures the Microsoft 365 default policy for your custom domain.
+>You can choose to do nothing about DKIM for your custom domain too. If you don't set up DKIM for your custom domain, Microsoft 365 creates a private and public key pair, enables DKIM signing, and then configures the Microsoft 365 default policy for your custom domain.
Microsoft-365's built-in DKIM configuration is sufficient coverage for most customers. However, you should manually configure DKIM for your custom domain in the following circumstances:
security Mdo Data Retention https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-data-retention.md
f1.keywords:
Previously updated : 3/9/2023 Last updated : 1/31/2023 audience: ITPro
- m365-security - tier2
-description: Admins can learn how long Defender for Office 365 features retain data.
+description: Microsoft Defender for Office 365 data retention informationThreat Explorer/ Real-Time detections
search.appverid: met150
search.appverid: met150
By default, data across different features is retained for a maximum of 30 days. However, for some of the features, you can specify the retention period based on policy. See the following table for the different retention periods for each feature. > [!NOTE]
-> Microsoft Defender for Office 365 comes in two different subscriptions: **Plan 1** and **Plan 2**. If you have **Threat Explorer** at <https://security.microsoft.com/threatexplorer>, you have Plan 2. Otherwise, you have **Real-time Detections** at <https://security.microsoft.com/realtimereports> as part of **Plan 1**.
->
-> Your Defender for Office 365 subscription affects the tools that are available to you, so make sure you know which subscription you have as you learn.
+> Microsoft Defender for Office 365 comes in two different Plan types. You can tell if you have **Plan 1** if you have 'Real-time Detections', and **Plan 2**, if you have Threat Explorer. The Plan you have influences the tools you will see, so be certain that you're aware of your Plan as you learn.
## Defender for Office 365 Plan 1 |Feature|Retention period| |||
-|Alert metadata details (Microsoft Defender for Office alerts)|90 days.|
-|Entity metadata details (Email)|30 days.|
-|Activity alert details (audit logs)|7 days.|
-|Email entity page|30 days.|
-|Quarantine|30 days (configurable; 30 days is the maximum).|
-|Reports|90 days for aggregated data. <br/><br/> 30 days for detailed information.|
-|Submissions|30 days.|
-|Real-Time detections|30 days.|
+|Alert metadata details (Microsoft Defender for Office alerts) | 90 days |
+|Entity metadata details (Emails) | 30 days |
+|Activity alert details (audit logs) | 7 days |
+|Email entity page | 30 days |
+|Quarantine | 30 days (configurable up to 30 days maximum) |
+|Reports | 90 days (for all aggregated data) <br>30 days (for all detailed information except below) <br> 10 days (for Threat protection status report detail and spoof mail report details) <br> 7 days (for URL protection report details) <br>
+|Submissions | 30 days |
+|Threat Explorer/ Real-Time detections | 30 days |
## Defender for Office 365 Plan 2
Defender for Office 365 Plan 1 capabilities, plus:
|Feature|Retention period| |||
-|Action Center|180 days. <br/><br/> Office Action Center 30 days.|
-|Advanced Hunting|30 days.|
-|AIR (Automated investigation and response)|60 days for investigations metadata. <br/><br/> 30 days for email metadata.|
-|Attack simulation training data|18 months.|
-|Campaigns|30 days.|
-|Incidents|30 days.|
-|Remediation|30 days|
-|Threat Analytics|30 days.|
-|Threat Explorer|30 days.|
-|Threat Trackers|30 days.|
+|Action Center | 180 days, 30 days (Office Action center) |
+|Advanced Hunting | 30 days |
+|AIR (Automated Investigation and Response) | 60 days (for investigations meta data)<br> 30 days (for email meta data) |
+|Attack Simulation Data | 18 months |
+|Campaigns | 30 days |
+|Incidents | 30 days|
+|Remediation | 30 days |
+|Threat Analytics | 30 days |
+|Threat Trackers | 30 days |
security Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-policies.md
In _supported_ protection features that quarantine email messages, you can assig
|&nbsp;&nbsp;&nbsp;User impersonation (_TargetedUserProtectionAction_)|Yes (_TargetedUserQuarantineTag_)| |&nbsp;&nbsp;&nbsp;Domain impersonation (_TargetedDomainProtectionAction_)|Yes (_TargetedDomainQuarantineTag_)| |&nbsp;&nbsp;&nbsp;Mailbox intelligence impersonation (_MailboxIntelligenceProtectionAction_)|Yes (_MailboxIntelligenceQuarantineTag_)|
-|**[Anti-malware policies](anti-malware-policies-configure.md)**|Yes (_QuarantineTag_)|
+|**[Anti-malware policies](anti-malware-policies-configure.md)**|Yes ( _QuarantineTag_)|
|**[Safe Attachments protection](safe-attachments-about.md)**|| |&nbsp;&nbsp;&nbsp;Email messages with attachments that are quarantined as malware by Safe Attachments policies (_Enable_ and _Action_)|Yes (_QuarantineTag_)| |&nbsp;&nbsp;&nbsp;Files that are quarantined as malware by [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)|No|
security Recover From Ransomware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recover-from-ransomware.md
Microsoft Azure:
Microsoft Defender for Cloud Apps: -- [Create anomaly detection policies in Defender for Cloud Apps](/cloud-app-security/anomaly-detection-policy)
+- [Create anomaly detection policies in Defender for Cloud Apps](/cloud-app-security/anomaly-detection-policy)
Microsoft Security team blog posts:
security Reports Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/reports-defender-for-office-365.md
To view the report, open the [Microsoft 365 Defender portal](https://security.mi
The available views on the **URL protection** report page are described in the following sections.
+> [!NOTE]
+> This is a *protection trend report*, meaning data represents trends in a larger dataset. As a result, the data in the charts is not available in real time here, but the data in the details table is, so you may see a slight discrepancy between the two. The charts are refreshed once every four hours and contain data for the last 90 days. For detailed real-time information, see [View phishing URL and click verdict data](threat-explorer-about.md#view-phishing-url-and-click-verdict-data).
+ ### View data by URL click protection action :::image type="content" source="../../media/url-threat-protection-report-url-click-protection-action-view.png" alt-text="The view namely URL click protection action in the URL protection report" lightbox="../../media/url-threat-protection-report-url-click-protection-action-view.png":::
If you click **Filters**, you can modify the report and the details table by sel
When you're finished configuring the filters, click **Apply**, **Cancel**, or ![Clear filters icon](../../media/m365-cc-sc-clear-filters-icon.png) **Clear filters**.
-The details table below the chart provides the following near-real-time view of all clicks that happened within the organization for the last 30 days:
+The details table below the chart provides the following near-real-time view of all clicks that happened within the organization for the last 7 days:
- **Click time** - **User**
security Use The Delist Portal To Remove Yourself From The Office 365 Blocked Senders Lis https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/use-the-delist-portal-to-remove-yourself-from-the-office-365-blocked-senders-lis.md
where _IP address_ is the IP address of the computer on which the mail server r
## Verify senders before removing them from the blocked senders list There are good reasons for senders to wind up on the blocked senders list, but mistakes can happen. Take a look at this video for a balanced explanation of blocked senders and delisting.
+<p>
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMhvD]
There are good reasons for senders to wind up on the blocked senders list, but m
See [Create safe sender lists in EOP](create-safe-sender-lists-in-office-365.md) and [Outbound spam protection in EOP](outbound-spam-protection-about.md) to prevent an IP from being blocked. ### How to fix error code 5.7.511-
+
When there's a problem delivering an email message that you sent, Microsoft 365 or Office 365 sends an email notification to let you know. The email notification is known a delivery status notification or DSN. The most common type of DSN is a non-delivery report (also known as an NDR or bounce message) that tells you that a message wasn't delivered. In certain situations, Microsoft must conduct additional investigations against traffic from your IP address. If you receive and NDR with code 5.7.511, you **will not** be able to use the delist portal.-
-> 550 5.7.511 Access denied, banned sender[xxx.xxx.xxx.xxx]. To request removal from this list, forward this message to delist@microsoft.com. For more information, go to https://go.microsoft.com/fwlink/?LinkId=526653.
-
-In the email to request removal from this list, provide the full NDR code and IP address. Microsoft will contact you within 48 hours with the next steps.
+
+> 550 5.7.511 Access denied, banned sender[xxx.xxx.xxx.xxx]. To request removal from this list, forward this message to delist@microsoft.com. For more information, go to https://go.microsoft.com/fwlink/?LinkId=526653.
+
+In the email to request removal from this list, provide the full NDR code and IP address. Microsoft will contact you within 48 hours with the next steps.
## More information
security Security Posture Solution Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/security-posture-solution-overview.md
It has never been more important to be able to detect and defend your organization against cyber security threats. Knowing your assets, using the built-in configurations available to you, and taking recommended actions helps you build great security posture and resilience while also empowering you to respond rapidly to new and evolving threats.
-As an organization's security posture is constantly changing alongside the cybersecurity landscape, making security posture improvements should be a continuous process. This article provides an overview of how you can strengthen your organization's security posture using capabilities available in Microsoft 365 Defender and other Microsoft security products, such as Microsoft Defender for Endpoint and Microsoft Defender Vulnerability Management.
+As an organizationΓÇÖs security posture is constantly changing alongside the cybersecurity landscape, making security posture improvements should be a continuous process. This article provides an overview of how you can strengthen your organization's security posture using capabilities available in Microsoft 365 Defender and other Microsoft security products, such as Microsoft Defender for Endpoint and Microsoft Defender Vulnerability Management.
It will help you better understand your overall security posture and provide a framework to help you continually assess, improve, and maintain a security posture to fit your organization's security needs.
solutions Configure Teams Highly Sensitive Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/configure-teams-highly-sensitive-protection.md
f1.keywords: NOCSH
Previously updated : 03/09/2023 Last updated : 05/01/2020 audience: ITPro
+ms.localizationpriority: high
search.appverid: - MET150 - highpri-- Tier1 - Ent_O365 - Strat_O365_Enterprise - m365solution-3tiersprotection
description: "Learn how to deploy teams with protection for highly sensitive dat
# Configure teams with protection for highly sensitive data - In this article, we look at setting up a team for a highly sensitive level of protection. Be sure you've completed the steps in [Deploy teams with baseline protection](configure-teams-baseline-protection.md) before following the steps in this article. For this tier of protection, we create a sensitivity label that can be used across your organization for highly sensitive teams and files. Only members of your organization and guests that you have specified will be able to decrypt files that use this label. If you need to further isolate permissions so that only members of a specific team can decrypt files, see [Deploy a team with security isolation](secure-teams-security-isolation.md). The highly sensitive tier offers the following additional protections over the baseline tier: -- A sensitivity label for the team that allows you to turn guest sharing on or off and enforces a conditional access for access to the SharePoint site. The label is also used as a default label for files.
+- A sensitivity label for the team that allows you to turn guest sharing on or off and blocks access to SharePoint content for unmanaged devices. This label can also be used to classify and encrypt files.
+- A more restrictive default sharing link type
- Only team owners can create private channels.-- Site access is restricted to team members.
+- Access requests for the associated SharePoint site are turned off.
## Video demonstration
For details about sharing with guests securely, see the following resources:
- [Limit accidental exposure to files when sharing with people outside your organization](./share-limit-accidental-exposure.md) - [Create a secure guest sharing environment](./create-secure-guest-sharing-environment.md)
-To allow or block guest sharing, we'll use controls available in sensitivity labels.
--
-## Authentication context
-
-We'll use an [Azure Active Directory authentication context](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#configure-authentication-contexts) to enforce more stringent access conditions when users access SharePoint sites.
-
-First, add an authentication context in Azure Active Directory.
-
-To add an authentication context
-1. In [Azure Active Directory Conditional Access](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ConditionalAccessBlade), under **Manage**, click **Authentication context**.
-
-2. Click **New authentication context**.
-
-3. Type a name and description and select the **Publish to apps** check box.
-
- ![Screenshot of add authentication context UI.](../media/aad-add-authentication-context.png)
-
-4. Click **Save**.
-
-Next, create a conditional access policy that applies to that authentication context and that requires guests to agree to a terms of use as a condition of access.
-
-To create a conditional access policy
-1. In [Azure Active Directory Conditional Access](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ConditionalAccessBlade), click **New policy**.
-
-1. Type a name for the policy.
-
-1. On the **Users and groups** tab, choose the **Select users and groups** option, and then select the **Guest or external users** check box.
-
-1. Choose **B2B collaboration guest users** from the dropdown.
-
-1. On the **Cloud apps or actions** tab, under **Select what this policy applies to**, choose **Authentication context**, and select the check box for the authentication context that you created.
-
- ![Screenshot of authentication context options in cloud apps or actions settings for a conditional access policy.](../media/aad-authentication-context-ca-policy-apps.png)
-
-1. On the **Grant** tab, select **Require multifactor authentication**, and then click **Select**.
-
-1. Choose if you want to enable the policy, and then click **Create**.
-
-We'll point to the authentication context in the sensitivity label.
+To allow or block guest sharing, we use a combination of a sensitivity label for the team and site-level sharing controls for the associated SharePoint site, both discussed later.
## Sensitivity labels
-For the highly sensitive level of protection, we'll be using a sensitivity label to classify the team. We'll also use this label to classify and encrypt individual files in the team. (It can also be used on files in other file locations such as SharePoint or OneDrive.)
+For the highly sensitive level of protection, we'll be using a sensitivity label to classify the team. This label can also be used to classify and encrypt individual files in this or other teams or in other file locations such as SharePoint or OneDrive.
-As a first step, you must enable sensitivity labels for Teams. See [Use sensitivity labels to protect content in Microsoft Teams, Microsoft 365 Groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md) for details.
+As a first step, you must enable sensitivity labels for Teams. See [Use sensitivity labels to protect content in Microsoft Teams, Office 365 Groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md) for details.
If you already have sensitivity labels deployed in your organization, consider how this label fits with your overall label strategy. You can change the name or settings if needed to meet the needs of your organization.
Once you have enabled sensitivity labels for Teams, the next step is to create t
To create a sensitivity label 1. Open the [Microsoft Purview compliance portal](https://compliance.microsoft.com).
-1. Under **Solutions**, click **Information protection**.
-1. On the **Labels** tab, click **Create a label**.
-1. Give the label a name. We suggest **Highly sensitive**, but you can choose a different name if that one is already in use.
-1. Add a display name and description, and then click **Next**.
-1. On the **Define the scope for this label page**, select **Files & emails** and **Groups & sites** and clear **Include meetings**.
-1. Click **Next**.
-1. On the **Choose protection settings for files and emails** page, select **Apply or remove encryption**, and then click **Next**.
-1. On the **Encryption** page, choose **Configure encryption settings**.
-1. Under **Assign permissions to specific users and groups**, click **Assign permissions**.
-1. Click **Add all users and groups in your organization**.
-1. If there are guests who should have permissions to decrypt files, click **Add users or groups** and add them.
-1. Click **Save**, and then click **Next**.
-1. On the **Auto-labeling for files and emails** page, click **Next**.
-1. On the **Define protection settings for groups and sites** page, select **Privacy and external user access settings** and **External sharing and Conditional Access settings** and click **Next**.
-1. On the **Define privacy and external user access settings** page, under **Privacy**, select the **Private** option.
-1. If you want to allow guest access, under **External user access**, select **Let Microsoft 365 Group owners add people outside your organization to the group as guests**.
-1. Click **Next**.
-1. On the **Define external sharing and device access settings** page, select **Control external sharing from labeled SharePoint sites**.
-1. Under **Content can be shared with**, choose **New and existing guests** if you're allowing guest access or **Only people in your organization** if not.
-1. Select **Use Azure AD Conditional Access to protect labeled SharePoint sites**.
-1. Select the **Choose an existing authentication context** option, and then select the authentication context that you created from the dropdown list.
-1. Click **Next**.
-1. On the **Auto-labeling for database columns** page, click **Next**.
-1. Click **Create label**, and then click **Done**.
+2. Under **Solutions**, click **Information protection**.
+3. Click **Create a label**.
+4. Give the label a name. We suggest **Highly sensitive**, but you can choose a different name if that one is already in use.
+5. Add a display name and description, and then click **Next**.
+6. On the **Define the scope for this label page**, select **Files & emails** and **Groups & sites** and click **Next**.
+7. On the **Choose protection settings for files and emails** page, select **Encrypt files and emails**, and then click **Next**.
+8. On the **Encryption** page, choose **Configure encryption settings**.
+9. Under **Assign permissions to specific users and groups**, click **Assign permissions**.
+10. Click **Add all users and groups in your organization**.
+11. If there are guests who should have permissions to decrypt files, click **Add users or groups** and add them.
+12. Click **Save**, and then click **Next**.
+13. On the *Auto-labeling for files and emails** page, click **Next**.
+14. On the **Define protection settings for groups and sites** page, select **Privacy and external user access settings** and **Device access and external sharing settings** and click **Next**.
+15. On the **Define privacy and external user access settings** page, under **Privacy**, select the **Private** option.
+16. If you want to allow guest access, under **External user access**, select **Let Microsoft 365 Group owners add people outside your organization to the group as guests**.
+17. Click **Next**.
+18. On the **Define external sharing and device access settings** page, select **Control external sharing from labeled SharePoint sites**.
+19. Under **Content can be shared with**, choose **New and existing guests** if you're allowing guest access or **Only people in your organization** if not.
+20. Under **Access from unmanaged devices**, choose **Block access**. (If you're allowing guests and they don't have managed devices, you may want to choose **Allow limited, web-only access**.)
+21. Click **Next**.
+22. On the **Auto-labeling for database columns** page, click **Next**.
+23. Click **Create label**, and then click **Done**.
Once you've created the label, you need to publish it to the users who will use it. For sensitive protection, we'll make the label available to all users. You publish the label in the Microsoft Purview compliance portal, on the **Label policies** tab of the **Information protection** page. If you have an existing policy that applies to all users, add this label to that policy. If you need to create a new policy, see [Publish sensitivity labels by creating a label policy](../compliance/create-sensitivity-labels.md#publish-sensitivity-labels-by-creating-a-label-policy).
You can also use [teams policies](/MicrosoftTeams/teams-policies) to control who
## SharePoint settings Each time you create a new team with the highly sensitive label, there are two steps to do in SharePoint:-- Restrict access to the site to members of the team only-- Choose a default sensitivity label for the document library connected to the team.-
-### Restrict site access to team members
-
-Each time you create a new team with the highly sensitive label, you need to turn on restricted site access on the associated SharePoint site. This prevents people from outside the team from accessing the site or its content. (This requires a Microsoft Syntex - SharePoint Advanced Management license.)
-
-[SharePoint PowerShell](/powershell/sharepoint/sharepoint-online/introduction-sharepoint-online-management-shell) is required to configure restricted site access.
-
-If you haven't used restricted site access before, you need to turn it on for your organization. To do this, run the following command:
-
-```Powershell
-Set-SPOTenant -EnableRestrictedAccessControl $true
-```
-
-> [!NOTE]
-> If you have Microsoft 365 Multi-Geo, you must run this command for each geo-location you want to use restricted access control.
-
-Wait for approximately one hour before turning on restricted access control for the site.
-
-To restrict site access for the site connected to your team, run the following command:
-
-```Powershell
-Set-SPOSite -Identity <siteurl> -RestrictedAccessControl $true
-```
-
-### Choose a default sensitivity label for files
-We'll use the sensitivity label that we created as the default sensitivity label for the site document library that is connected to Teams. This will automatically apply the highly sensitive label to any new label-compatible files that are uploaded to the library, encrypting them. (This requires a Microsoft Syntex - SharePoint Advanced Management license.)
+- Update the guest sharing settings for the site in the SharePoint admin center to update the default sharing link to *People with existing access*.
+- Update the site sharing settings in the site itself to prevent members from sharing files, folders, or the site, and turn off access requests.
-To set a default sensitivity label for a document library
+### Site default sharing link settings
-1. In Teams, navigate to the **General** channel of the team you want to update.
+To update the site default sharing link type
-1. In the tool bar for the team, click **Files**.
+1. Open the SharePoint admin center, and under **Sites**, select <a href="https://go.microsoft.com/fwlink/?linkid=2185220" target="_blank">**Active sites**</a>.
+1. Select the site that is associated with team.
+1. On the **Policies** tab, under **External sharing**, select **Edit**.
+1. Under Default sharing link type, clear the **Same as organization-level setting** check box, and select **People with existing access**.
+1. Select **Save**.
-1. Click **Open in SharePoint**.
+Note that if you add private or shared channels to the team, each creates a new SharePoint site with the default sharing settings. You can update them in the SharePoint admin center by selecting the sites associated with the team.
-1. In the SharePoint site, open **Settings** and then choose **Library settings**.
+### Site sharing settings
-1. From the **Library settings** flyout pane, select **Default sensitivity labels**, and then select the highly sensitive label from the drop-down box.
+To help ensure that the SharePoint site does not get shared with people who are not members of the team, we limit such sharing to owners. We also limit sharing of files and folders to team owners. This helps ensure that owners are aware whenever a file is shared with someone outside the team.
-For more details about how default library labels work, see [Configure a default sensitivity label for a SharePoint document library](/microsoft-365/compliance/sensitivity-labels-sharepoint-default-label).
+To configure owners-only site sharing
+1. In Teams, navigate to the **General** tab of the team you want to update.
+2. In the tool bar for the team, click **Files**.
+3. Click the ellipsis, and then click **Open in SharePoint**.
+4. In the tool bar of the underlying SharePoint site, click the settings icon, and then click **Site permissions**.
+5. In the **Site permissions** pane, under **Site sharing**, click **Change how members can share**.
+6. Under **Sharing permissions**, choose **Only site owners can share files, folders, and the site**.
+7. Set **Allow access requests** to **Off**, and then click **Save**.
## See Also
solutions Configure Teams Sensitive Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/configure-teams-sensitive-protection.md
f1.keywords: NOCSH
Previously updated : 03/09/2023 Last updated : 05/01/2020 audience: ITPro
+ms.localizationpriority: high
search.appverid: - MET150 - highpri-- Tier1 - Ent_O365 - Strat_O365_Enterprise - m365solution-3tiersprotection
description: "Learn how to deploy teams with protection for sensitive data."
# Configure teams with protection for sensitive data - In this article, we look at setting up a team for a sensitive level of protection. Be sure you've completed the steps in [Deploy teams with baseline protection](configure-teams-baseline-protection.md) before following the steps in this article. The sensitive tier offers the following additional protections over the baseline tier: -- A sensitivity label for the team that allows you to turn guest sharing on or off and limits access to SharePoint content to web-only for unmanaged devices. This label is also used as the default label for files.
+- A sensitivity label for the team that allows you to turn guest sharing on or off and limits access to SharePoint content to web-only for unmanaged devices. This label can also be used to classify files.
- A more restrictive default sharing link type - Only team owners can create private channels.
To allow or block guest sharing, we use a combination of a sensitivity label for
## Sensitivity labels
-For the sensitive level of protection, we'll be using a sensitivity label to classify the team. We'll also use this label to classify individual files in the team. (It can also be used on files in other file locations such as SharePoint or OneDrive.)
+For the sensitive level of protection, we'll be using a sensitivity label to classify the team. This label can also be used to classify individual files in this or other teams, or in other file locations such as SharePoint or OneDrive.
-As a first step, you must enable sensitivity labels for Teams. See [Use sensitivity labels to protect content in Microsoft Teams, Microsoft 365 Groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md) for details.
+As a first step, you must enable sensitivity labels for Teams. See [Use sensitivity labels to protect content in Microsoft Teams, Office 365 Groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md) for details.
If you already have sensitivity labels deployed in your organization, consider how this label fits with your overall label strategy. You can change the name or settings if needed to meet the needs of your organization.
Once you have enabled sensitivity labels for Teams, the next step is to create t
To create a sensitivity label 1. Open the [Microsoft Purview compliance portal](https://compliance.microsoft.com).
-1. Under **Solutions**, click **Information protection**.
-1. Click **Create a label**.
-1. Give the label a name. We suggest **Sensitive**, but you can choose a different name if that one is already in use.
-1. Add a display name and description, and then click **Next**.
-1. On the **Define the scope for this label page**, select **Files & emails** and **Groups & sites** and clear **Include meetings**.
-1. Click **Next**.
-1. On the **Choose protection settings for files and emails** page, click **Next**.
-1. On the **Auto-labeling for files and emails** page, click **Next**.
-1. On the **Define protection settings for groups and sites** page, select **Privacy and external user access settings** and **External sharing and Conditional Access settings** and click **Next**.
-1. On the **Define privacy and external user access settings** page, under **Privacy**, select the **Private** option.
-1. If you want to allow guest access, under **External user access**, select **Let Microsoft 365 Group owners add people outside your organization to the group as guests**.
-1. Click **Next**.
-1. On the **Define external sharing and device access settings** page, select **Control external sharing from labeled SharePoint sites**.
-1. Under **Content can be shared with**, choose **New and existing guests** if you're allowing guest access or **Only people in your organization** if not.
-1. Select **Use Azure AD Conditional Access to protect labeled SharePoint sites**.
-1. Choose the **Determine whether users can access SharePoint sites from unmanaged devices** option, and then choose **Allow limited, web-only access**.
-1. Click **Next**.
-1. On the **Auto-labeling for database columns** page, click **Next**.
-1. Click **Create label**, and then click **Done**.
+2. Under **Solutions**, click **Information protection**.
+3. Click **Create a label**.
+4. Give the label a name. We suggest **Sensitive**, but you can choose a different name if that one is already in use.
+5. Add a display name and description, and then click **Next**.
+6. On the **Define the scope for this label page**, select **Files & emails** and **Groups & sites** and click **Next**.
+7. On the **Choose protection settings for files and emails** page, click **Next**.
+8. On the *Auto-labeling for files and emails** page, click **Next**.
+9. On the **Define protection settings for groups and sites** page, select **Privacy and external user access settings** and **Device access and external sharing settings** and click **Next**.
+10. On the **Define privacy and external user access settings** page, under **Privacy**, select the **Private** option.
+11. If you want to allow guest access, under **External user access**, select **Let Microsoft 365 Group owners add people outside your organization to the group as guests**.
+12. Click **Next**.
+13. On the **Define external sharing and device access settings** page, select **Control external sharing from labeled SharePoint sites**.
+14. Under **Content can be shared with**, choose **New and existing guests** if you're allowing guest access or **Only people in your organization** if not.
+15. Under **Access from unmanaged devices**, choose **Allow limited, web-only access**.
+16. Click **Next**.
+17. On the **Auto-labeling for database columns** page, click **Next**.
+18. Click **Create label**, and then click **Done**.
Once you've created the label, you need to publish it to the users who will use it. For sensitive protection, we'll make the label available to all users. You publish the label in the Microsoft Purview compliance portal, on the **Label policies** tab of the **Information protection** page. If you have an existing policy that applies to all users, add this label to that policy. If you need to create a new policy, see [Publish sensitivity labels by creating a label policy](../compliance/create-sensitivity-labels.md#publish-sensitivity-labels-by-creating-a-label-policy).
You can also use [teams policies](/MicrosoftTeams/teams-policies) to control who
## SharePoint settings
-Each time you create a new team with the sensitive label, there are three steps to do in SharePoint:
+Each time you create a new team with the sensitive label, there are two steps to do in SharePoint:
- Update the guest sharing settings for the site in the SharePoint admin center to update the default sharing link to *Specific people*. - Update the site sharing settings in the site itself to prevent members from sharing the site.-- Choose a default sensitivity label for the document library connected to the team. ### Site default sharing link settings
To configure owners-only site sharing
5. In the **Site permissions** pane, under **Site sharing**, click **Change how members can share**. 6. Under **Sharing permissions**, choose **Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**, and then click **Save**.
-### Choose a default sensitivity label for files
-
-We'll use the sensitivity label that we created as the default sensitivity label for the site document library that is connected to Teams. This will automatically apply the highly sensitive label to any new label-compatible files that are uploaded to the library. (This requires a Microsoft Syntex - SharePoint Advanced Management license.)
-
-To set a default sensitivity label for a document library
-
-1. In Teams, navigate to the **General** channel of the team you want to update.
-
-1. In the tool bar for the team, click **Files**.
-
-1. Click **Open in SharePoint**.
-
-1. In the SharePoint site, open **Settings** and then choose **Library settings**.
-
-1. From the **Library settings** flyout pane, select **Default sensitivity labels**, and then select the highly sensitive label from the drop-down box.
-
-For more details about how default library labels work, see [Configure a default sensitivity label for a SharePoint document library](/microsoft-365/compliance/sensitivity-labels-sharepoint-default-label).
## Related topics
solutions Configure Teams Three Tiers Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/configure-teams-three-tiers-protection.md
f1.keywords: NOCSH
Previously updated : 03/09/2023 Last updated : 05/01/2020 audience: ITPro
+ms.localizationpriority: high
search.appverid: - MET150 - highpri-- Tier1 - Ent_O365 - Strat_O365_Enterprise - M365-security-compliance
- Ent_Architecture - seo-marvel-jun2020
+ms.assetid: 1d51bd87-17bf-457c-b698-61821de3afa0
recommendations: false description: Learn how to configure Teams for better file sharing security using three tiers of protection, balancing security with ease of collaboration. # Configure Teams with three tiers of protection -
-The articles in this series provide recommendations for configuring teams in Microsoft Teams, and their associated SharePoint sites, for file protection that balances security with ease of collaboration.
+The articles in this series provide recommendations for configuring teams in Microsoft Teams and their associated SharePoint sites for file protection that balances security with ease of collaboration.
This article defines four different configurations, starting with a public team with the most open sharing policies. Each additional configuration represents a meaningful step up in protection, while the ability to access and collaborate on files stored within teams is reduced to the relevant set of team members.
The configurations in this article align with Microsoft's recommendations for th
- Baseline protection -- Sensitive protection
+- sensitive protection
- Highly sensitive protection For more information about these tiers and capabilities recommended for each tier, see [Microsoft cloud for enterprise architects illustrations](./cloud-architecture-models.md)
-For information about creating a Teams meeting environment that meets your compliance requirements, see [Configure Teams meetings with three tiers of protection](/MicrosoftTeams/configure-meetings-three-tiers-protection).
- ## Three tiers at a glance The following table summarizes the configurations for each tier. Use these configurations as starting point recommendations and adjust the configurations to meet the needs of your organization. You may not need every tier.
The following table summarizes the configurations for each tier. Use these confi
|Private or public team|Public|Private|Private|Private| |Who has access?|Everybody in the organization, including B2B users.|Only members of the team. Others can request access to the associated site.|Only members of the team.|Only members of the team.| |Private channels|Owners and members can create private channels|Owners and members can create private channels|Only owners can create private channels|Only owners can create private channels|
+|Shared channels|Owners and members can create shared channels|Owners and members can create shared channels|Only owners can create shared channels|Only owners can create shared channels|
|Site-level guest access|**New and existing guests** (default).|**New and existing guests** (default).|**New and existing guests** or **Only people in your organization** depending on team needs.|**New and existing guests** or **Only people in your organization** depending on team needs.|
-|Site-level conditional access|**Full access from desktop apps, mobile apps, and the web** (default).|**Full access from desktop apps, mobile apps, and the web** (default).|**Allow limited, web-only access**.|Custom conditional access policy|
+|Site sharing settings|**Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**.|**Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**.|**Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**.|**Only site owners can share files, folders, and the site**.<br>Access requests **Off**.|
+|Site-level unmanaged device access|**Full access from desktop apps, mobile apps, and the web** (default).|**Full access from desktop apps, mobile apps, and the web** (default).|**Allow limited, web-only access**.|**Block access**.|
|Default sharing link type|**Only people in your organization**|**Only people in your organization**|**Specific people**|**People with existing access**|
-|Sensitivity labels|None|None|Sensitivity label used to classify the team and control guest sharing and unmanaged device access.|Sensitivity label used to classify the team, control guest sharing, and specify a conditional access policy. Default file label is used on files to encrypt them.|
-|Site sharing settings|**Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**.|**Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**.|**Site owners and members, and people with Edit permissions can share files and folders, but only site owners can share the site**.|N/A (Controlled by site-level restricted access control.)|
-|Site-level restricted access control|None|None|None|Team members only|
+|Sensitivity labels|None|None|Sensitivity label used to classify the team and control guest sharing and unmanaged device access.|Sensitivity label used to classify the team and control guest sharing and unmanaged device access. Label can also be used on files to encrypt files.|
A variation of the Highly sensitive option, [Teams with security isolation](secure-teams-security-isolation.md) uses a unique sensitivity label for one team, which provides additional security. You can use this label to encrypt files, and only members of that team will be able to read them.
Teams for sensitive and highly sensitive protection are private teams in which s
## Sensitivity labels
-The sensitive and highly sensitive tiers use sensitivity labels to help secure the team and its files. To implement these tiers, you must enable [sensitivity labels to protect content in Microsoft Teams, Microsoft 365 Groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md).
+The sensitive and highly sensitive tiers use sensitivity labels to help secure the team and its files. To implement these tiers, you must enable [sensitivity labels to protect content in Microsoft Teams, Office 365 Groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md).
-While the baseline tier does not require sensitivity labels, consider creating a "general" label and then requiring that all teams be labeled. This will help ensure that users make a conscious choice about sensitivity when they create a team. If you plan to deploy the sensitive or highly sensitive tiers, we do recommend creating a "general" label that you can use for baseline teams and for files that are not sensitive. For the highly sensitive tier, we'll also specify a default sensitivity label for document libraries so that Office files and other compatible files will have that label automatically applied when they're uploaded.
+While the baseline tier does not require sensitivity labels, consider creating a "general" label and then requiring that all teams be labeled. This will help ensure that users make a conscious choice about sensitivity when they create a team. If you plan to deploy the sensitive or highly sensitive tiers, we do recommend creating a "general" label that you can use for baseline teams and for files that are not sensitive.
If you're new to using sensitivity labels, we recommend reading [Get started with sensitivity labels](../compliance/get-started-with-sensitivity-labels.md) to get started.
By default, team owners and members can share the site itself with people outsid
While teams do not have a read-only permission option, the SharePoint site does. If you have stakeholders of partner groups who need to be able to view team files but not edit them, consider adding them directly to the SharePoint site with Read permissions.
-For the highly sensitive tier, we'll restrict access to the site to members of the team only. This restriction will also prevent sharing files with people outside the team.
- ## Sharing files and folders
-By default, both owners and members of the team can share files and folders with people outside the team. This may include people outside your organization, if you have allowed guest sharing. In all three tiers, we update the default sharing link type to help avoid accidental oversharing. In the highly sensitive tier, we restrict such sharing to team owners only. As noted above, in the highly sensitive tier, file access is limited to team members only.
+By default, both owners and members of the team can share files and folders with people outside the team. This may include people outside your organization, if you have allowed guest sharing. In all three tiers, we update the default sharing link type to help avoid accidental oversharing. In the highly sensitive tier, we restrict such sharing to team owners only.
## Sharing with people outside your organization
If you plan to use guest sharing, we recommend configuring [SharePoint and OneDr
Teams guest sharing is on by default, but you can turn it off if needed in the sensitive and highly sensitive tiers by using a sensitivity label. Shared channels are on by default, but require setting up cross-organizational relationships for each organization you want to collaborate with. See [Collaborate with external participants in a channel](collaborate-teams-direct-connect.md) for details.
-In the highly sensitive tier, we configure the default library sensitivity label to encrypt files to which it is applied. If you need guests to have access to these files, you must give them permissions when you create the label. External participants in shared channels can't be given permissions to sensitivity labels and can't access content encrypted by a sensitivity label.
+In the highly sensitive tier, we configure the sensitivity label to encrypt files to which it is applied. If you need guests to have access to these files, you must give them permissions when you create the label. External participants in shared channels can't be given permissions to sensitivity labels and can't access content encrypted by a sensitivity label.
We highly recommend that you leave guest sharing on for the baseline tier and for the sensitive or highly sensitive tiers if you need to collaborate with people outside your organization. The guest sharing features in Microsoft 365 provide a much more secure and governable sharing experience than sending files as attachments in email messages. It also reduces the risk of shadow IT where users use ungoverned consumer products to share with legitimate external collaborators.
-If you regularly collaborate with other organizations that use Azure AD, shared channels may be a good option. Shared channels appear seamlessly in the other organization's Teams client and allow external participants to use their regular user account for their organization rather than having to log in separately using a guest account.
+If you regularly collaborate with other organizations that use Azure AD, shared channels may be a good option. Shared channels appear seamlessly in the other organization's Teams client and allow external participants to use their regular user account for their organization rather than having to login in separately using a guest account.
See the following references to create a secure and productive guest sharing environment for your organization:
See the following references to create a secure and productive guest sharing env
- [Limit accidental exposure to files when sharing with people outside your organization](share-limit-accidental-exposure.md) - [Create a secure guest sharing environment](create-secure-guest-sharing-environment.md)
-## Conditional access policies
-
-Azure AD conditional access offers many options for determining how people access Microsoft 365, including limitations based on location, risk, device compliance, and other factors. We recommend you read [What is Conditional Access?](/azure/active-directory/conditional-access/overview) and consider which additional policies might be appropriate for your organization.
-
-For the sensitive and highly sensitive tiers, we use sensitivity labels to restrict access to SharePoint content.
-
+## Access from unmanaged devices
-For the sensitive tier, we'll restrict access to web-only for unmanaged devices. (Note that guests often don't have devices that are managed by your organization. If you allow guests in any of the tiers, consider what kinds of devices they'll be using to access teams and sites and set your unmanaged device policies accordingly.)
+For the sensitive and highly sensitive tiers, we restrict access to SharePoint content with sensitivity labels. Azure AD conditional access offers many options for determining how people access Microsoft 365, including limitations based on location, risk, device compliance, and other factors. We recommend you read [What is Conditional Access?](/azure/active-directory/conditional-access/overview) and consider which additional policies might be appropriate for your organization.
-For the highly sensitive tier, we'll use [Azure Active Directory authentication context](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#configure-authentication-contexts) with the sensitivity label to trigger a custom conditional access policy when people access the SharePoint site associate with the team.
+Note that guests often don't have devices that are managed by your organization. If you allow guests in any of the tiers, consider what kinds of devices they'll be using to access teams and sites and set your unmanaged device policies accordingly.
-### Conditional access across Teams-related services
+### Control device access across Microsoft 365
-The conditional access settings in sensitivity labels only affect SharePoint access. If you want to expand conditional access beyond SharePoint, you can [Create an Azure Active Directory conditional access policy for all apps and services in your organization](/azure/active-directory/conditional-access/howto-conditional-access-policy-compliant-device) instead. To configure this policy specifically for [Microsoft 365 services](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#office-365), select the **Office 365** cloud app under **Cloud apps or actions**.
+The unmanaged devices setting in sensitivity labels only affect SharePoint access. If you want to expand control of unmanaged devices beyond SharePoint, you can [Create an Azure Active Directory conditional access policy for all apps and services in your organization](/azure/active-directory/conditional-access/howto-conditional-access-policy-compliant-device) instead. To configure this policy specifically for [Microsoft 365 services](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#office-365), select the **Office 365** cloud app under **Cloud apps or actions**.
-![Screenshot of the Office 365 cloud app in an Azure Active Directory conditional access policy.](../media/azure-ca-office365-policy.png)
+![Screenshot of the Office 365 cloud app in an Azure Active Directory conditional access policy.](/sharepoint/sharepointonline/media/azure-ca-office365-policy.png)
Using a policy that affects all Microsoft 365 services can lead to better security and a better experience for your users. For example, when you block access to unmanaged devices in SharePoint only, users can access the chat in a team with an unmanaged device, but will lose access when they try to access the **Files** tab. Using the Office 365 cloud app helps avoid issues with [service dependencies](/azure/active-directory/conditional-access/service-dependencies).
Using a policy that affects all Microsoft 365 services can lead to better securi
Start by [configuring the baseline level of protection](configure-teams-baseline-protection.md). If needed you can add [sensitive protection](configure-teams-sensitive-protection.md) and [highly sensitive protection](configure-teams-highly-sensitive-protection.md) on top of the baseline.
-## Related topics
+## See also
[Security and compliance in Microsoft Teams](/microsoftteams/security-compliance-overview)
solutions Productivity Illustrations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/productivity-illustrations.md
Depending on your environment, some tools are better suited for certain architec
| Item | Description | |:--|:--|
-|[![Thumb image for Microsoft Defender for Endpoint deployment strategy.](../medie-deployment-strategy.vsdx) <br>Updated September 2021| The architectural material helps you plan your deployment for the following architectures: <ul><li> Cloud-native </li><li> Co-management </li><li> On-premises</li><li>Evaluation and local onboarding</li> |
+|[![Thumb image for Microsoft Defender for Endpoint deployment strategy.](../medie-deployment-strategy.vsdx) <br>Updated September 2021| The architectural material helps you plan your deployment for the following architectures: <ul><li> Cloud-native </li><li> Co-management </li><li> On-premise</li><li>Evaluation and local onboarding</li> |
<!-- <a name="BKMK_O365IDP"></a>
Updated June 2021
For more information, see the article for this poster: [Set up your infrastructure for hybrid work with Microsoft 365](empower-people-to-work-remotely.md).
+## Microsoft Teams with security isolation
+
+With Microsoft 365, you can configure a private team in Microsoft Teams and use SharePoint site security settings and a unique sensitivity label to encrypt files so that only team members can decrypt them.
+
+[![Microsoft Teams with security isolation poster.](../media/secure-teams-security-isolation/team-security-isolation-poster.png)](../downloads/team-security-isolation-poster.pdf) <br/>
+[PDF](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/team-security-isolation-poster.pdf) | [PowerPoint](https://download.microsoft.com/download/8/0/5/8057fc16-c044-40b6-a652-7ed555ba2895/team-security-isolation-poster.pptx) <br>
+Updated August 2020
+
+For more information, see the article for this poster: [Configure a team with security isolation](secure-teams-security-isolation.md).
++ ## See Also [Architectural models for SharePoint, Exchange, Skype for Business, and Lync](../enterprise/architectural-models-for-sharepoint-exchange-skype-for-business-and-lync.md)
solutions Secure Teams Security Isolation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/secure-teams-security-isolation.md
+
+ Title: "Configure a team with security isolation by using a unique sensitivity label"
+f1.keywords: NOCSH
+++ Last updated : 05/01/2020++
+ms.localizationpriority: high
+
+- highpri
+- M365-subscription-management
+- Strat_O365_Enterprise
+- m365solution-3tiersprotection
+- m365solution-securecollab
+
+- Ent_Solutions
+- admindeeplinkCOMPLIANCE
+- admindeeplinkSPO
+recommendations: false
+description: "Learn how to create a team with a unique sensitivity label for security."
++
+# Configure a team with security isolation by using a unique sensitivity label
+
+This article provides you with recommendations and steps to configure a private team in Microsoft Teams and use a unique sensitivity label to encrypt files so that only team members can decrypt them.
+
+Beyond the private access, this article describes how to configure the associated SharePoint site, which you can access from the **Files** section of a team channel, for the additional security needed to store highly regulated data.
+
+The elements of configuration for a team with security isolation are:
+
+- A private team
+- Additional security on the associated SharePoint site for the team that:
+ - Prevents members of the site from sharing the site with others.
+ - Prevents non-members of the site from requesting access to the site.
+- A sensitivity label specifically for this team that:
+ - Prevents access to SharePoint content from unmanaged devices
+ - Allows or denies guest access to the team, depending on your requirements
+ - Encrypts documents to which the label is applied
+
+> [!IMPORTANT]
+> Be sure you have enabled [sensitivity labels to protect content in Microsoft Teams, Office 365 groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md) before you proceed with the steps in this article.
+
+Watch this video for an overview of the deployment process.
+<br>
+<br>
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4mGHf]
+
+<a name="poster"></a>
+For a 1-page summary of this scenario, see the [Microsoft Teams with security isolation poster](../downloads/team-security-isolation-poster.pdf).
+
+[![Microsoft Teams with security isolation poster.](../media/secure-teams-security-isolation/team-security-isolation-poster.png)](../downloads/team-security-isolation-poster.pdf)
+
+You can also download this poster in [PDF](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/team-security-isolation-poster.pdf) or [PowerPoint](https://download.microsoft.com/download/8/0/5/8057fc16-c044-40b6-a652-7ed555ba2895/team-security-isolation-poster.pptx) formats and print it on letter, legal, or tabloid (11 x 17) size paper.
+
+Try this configuration in your own test lab environment with [these instructions](team-security-isolation-dev-test.md).
+
+See how the Contoso Corporation used an isolated team for a top-secret project in [this case study](contoso-team-for-top-secret-project.md).
+
+## Initial protections
+
+To help protect access to the team and its underlying SharePoint site, review the following best practices:
+- [Identity and device access policies](../security/office-365-security/identity-access-policies.md)
+- [SharePoint Online access policies](../security/office-365-security/sharepoint-file-access-policies.md)
+- [Deploy teams with baseline protection](configure-teams-baseline-protection.md)
+
+## Guest sharing
+
+Depending on the nature of your business, you may or may not want to enable guest sharing for this team. If you do plan to collaborate with people outside your organization in the team, enable guest sharing.
+
+For details about sharing with guests securely, see the following resources:
+
+- [Limit accidental exposure to files when sharing with people outside your organization](./share-limit-accidental-exposure.md)
+- [Create a secure guest sharing environment](./create-secure-guest-sharing-environment.md)
+
+To allow or block guest sharing, we use a combination of a sensitivity label for the team and site-level sharing controls for the associated SharePoint site, both discussed later.
+
+## Create a private team
+
+Since we are creating a sensitivity label specifically for this team, the next step is to create the team. If you have an existing team, you can use that.
+
+To create a team for sensitive information
+1. In Teams, click **Teams** on the left side of the app, then click **Join or create a team** at the bottom of the teams list.
+2. Click **Create team** (first card, top left corner).
+3. Choose **Build a team from scratch**.
+4. In the **Sensitivity** list, keep the default.
+5. Under **Privacy**, click **Private**.
+6. Type a name for the team that is related to your sensitive project. For example, **Project Saturn**.
+7. Click **Create**.
+8. Add users to the team, and then click **Close**.
+
+## Private channel settings
+
+We recommend restricting creating private channels to team owners.
+
+To restrict private channel creation
+1. In the team, click **More options**, and then click **Manage team**.
+2. On the **Settings** tab, expand **Member permissions**.
+3. Clear the **Allow members to create private channels** check box.
+
+You can also use [teams policies](/MicrosoftTeams/teams-policies) to control who can create private channels.
+
+## Create a sensitivity label
+
+To configure a team for security isolation, we'll be using a sensitivity label created specifically for this team. This label is used at the team level to control guest sharing and to block access from unmanaged devices. It can also be used to classify and encrypt individual files in the team so that only team owners and members can open them.
+
+If you have an internal partner or stakeholder group who should be able to view encrypted documents but not edit them, you can add them to the label with view-only permissions. You can then add these people to the team's SharePoint site with Reader permissions, and they will have read-only access to the site where the documents are kept, but not the team itself.
+
+To create a sensitivity label
+
+1. Open the Microsoft Purview compliance portal, and under **Solutions**, select <a href="https://go.microsoft.com/fwlink/p/?linkid=2174015" target="_blank">**Information protection**</a>.
+1. Click **Create a label**.
+1. Give the label a name. We suggest naming it after the team that you'll be using it with.
+1. Add a display name and description, and then click **Next**.
+1. On the **Define the scope for this label page**, select **Files & emails** and **Groups & sites** and click **Next**.
+1. On the **Choose protection settings for files and emails** page, select **Encrypt files and emails**, and then click **Next**.
+1. On the **Encryption** page, choose **Configure encryption settings**.
+1. Click **Add users or groups**, select the team that you created, and then click **Add**
+1. Click **Choose permissions**.
+1. Choose **Co-Author** from the dropdown list, and then click **Save**.
+1. If you want to include users or groups with read-only access to files with the label:
+ 1. Click **Assign permissions**.
+ 1. Click **Add users or groups**, select the users or groups that you want to add, and then click **Add**.
+ 1. Click **Choose permissions**.
+ 1. Choose **Viewer** from the dropdown list, and then click **Save**.
+13. Click **Save**, and then click **Next**.
+14. On the *Auto-labeling for files and emails** page, click **Next**.
+15. On the **Define protection settings for groups and sites** page, select **Privacy and external user access settings** and **Device access and external sharing settings** and click **Next**.
+16. On the **Define privacy and external user access settings** page, under **Privacy**, select the **Private** option.
+17. If you want to allow guest access, under **External user access**, select **Let Microsoft 365 Group owners add people outside your organization to the group as guests**.
+18. Click **Next**.
+19. On the **Define external sharing and device access settings** page, select **Control external sharing from labeled SharePoint sites**.
+20. Under **Content can be shared with**, choose **New and existing guests** if you're allowing guest access or **Only people in your organization** if not.
+21. Under **Access from unmanaged devices**, choose **Block access**.
+22. Click **Next**.
+23. On the **Auto-labeling for database columns** page, click **Next**.
+24. Click **Create label**, and then click **Done**.
+
+Once you've created the label, you need to publish it to the users who will use it. In this case, we'll make the label available only to people in the team.
+
+To publish a sensitivity label:
+
+1. In the Microsoft Purview compliance portal, on the <a href="https://go.microsoft.com/fwlink/p/?linkid=2174015" target="_blank">**Information protection** page</a>, choose the **Label policies** tab.
+2. Click **Publish labels**.
+3. On the **Choose sensitivity labels to publish** page, click **Choose sensitivity labels to publish**.
+4. Select the label that you created, and then click **Add**.
+5. Click **Next**.
+6. On the Publish to users and groups page, click **Choose users and groups**.
+7. Click **Add**, and then select the team that you created.
+8. Click **Add**, and then click **Done**.
+9. Click **Next**.
+10. On the Policy settings page, select the **Users must provide justification to remove a label or lower classification label** check box, and then click **Next**.
+11. Type a name for the policy, and then click **Next**.
+12. Click **Submit** and then click **Done**.
+
+## Apply the label to the team
+
+Once the label has been published, you must apply it to the team in order for the guest sharing and managed devices settings to take effect. This is done in the SharePoint admin center. Note, it may take some time for the label to become available after it's been published.
+
+To apply the sensitivity label
+
+1. Open the SharePoint admin center, and under **Sites**, select <a href="https://go.microsoft.com/fwlink/?linkid=2185220" target="_blank">**Active sites**</a>.
+1. Select the site that is associated with team.
+1. On the **Policies** tab, under **Sensitivity**, select **Edit**.
+1. Select the label that you created, and then select **Save**.
+
+## SharePoint settings
+
+There are three steps to do in SharePoint:
+
+- Update the guest sharing settings for the site in the SharePoint admin center to match what you chose when you created the label, and update the default sharing link to *People with existing access*.
+- Update the site sharing settings in the site itself to prevent members from sharing files, folders, or the site, and turn off access requests.
+- If you added people or groups to the label with Viewer permissions, you can add them to the SharePoint site with Read permissions.
+
+### SharePoint guest settings
+
+The guest sharing setting that you chose when you created the label (which only affects team membership) should match the guest sharing settings for the associated SharePoint site as follows:
+
+|Label setting|SharePoint site setting|
+|:|:-|
+|**Let Office 365 group owners add people outside the organization to the group** selected|**New and existing guests** (default for new teams)|
+|**Let Office 365 group owners add people outside the organization to the group** not selected|**Only people in your organization**|
+
+We'll also update the default sharing link type to reduce the risk of accidentally sharing files and folders to a wider audience than intended.
+
+To update site settings
+
+1. Open the SharePoint admin center, and under **Sites**, select <a href="https://go.microsoft.com/fwlink/?linkid=2185220" target="_blank">**Active sites**</a>
+1. Select the site that is associated with team.
+1. On the **Policies** tab, under **External sharing**, select **Edit**.
+1. If you allowed guest sharing when you created the sensitive label, ensure that **New and existing guests** is selected. If you didn't allow sharing when you created the label, choose **Only people in your organization**.
+1. Under Default sharing link type, clear the **Same as organization-level setting** check box, and select **People with existing access**.
+1. Select **Save**.
+
+#### Private channels
+
+If you add private channels to the team, each private channel creates a new SharePoint site with the default sharing settings. These sites are not visible in the SharePoint admin center, so you must use the [Set-SPOSite](/powershell/module/sharepoint-online/set-sposite) PowerShell cmdlet with the following parameters to update the guest sharing settings:
+
+- `-SharingCapability Disabled` to turn off guest sharing (it's on by default)
+- `-DefaultSharingLinkType Internal` to change the default sharing link to *Specific people*
+
+If you don't plan to use private channels with your team, consider turning off the ability for team members to create them under **Member permissions** in [team settings](https://support.microsoft.com/office/ce053b04-1b8e-4796-baa8-90dc427b3acc).
+
+### Site sharing settings
+
+To help ensure that the SharePoint site does not get shared with people who are not members of the team, we limit such sharing to owners. We also limit sharing of files and folders to team owners. This helps ensure that owners are aware whenever a file is shared with someone outside the team.
+
+To configure owners-only site sharing
+1. In Teams, navigate to the **General** tab of the team you want to update.
+2. In the tool bar for the team, click **Files**.
+3. Click the ellipsis, and then click **Open in SharePoint**.
+4. In the tool bar of the underlying SharePoint site, click the settings icon, and then click **Site permissions**.
+5. In the Site permissions pane, under **Sharing Settings**, click **Change sharing settings**.
+6. Under **Sharing permissions**, choose **Only site owners can share files, folders, and the site**, and then click **Save**.
+
+### Custom site permissions
+
+If you added people with Viewer permissions to the sensitivity label, you can add them to the SharePoint site with Read access so they have easy access to the files.
+
+To add users to the site
+1. In the site, click the settings icon, and then click **Site permissions**.
+2. Click **Invite people**, and then click **Share site only**.
+3. Type the names of the users and groups that you want to invite.
+4. For each person or group that you add, change their permissions from **Edit** to **Read**.
+5. Choose if you want to send them an email with a link to the site.
+6. Click **Add**.
+
+## Additional protections
+
+Microsoft 365 offers additional methods for securing your content. Consider if the following options would help improve security for your organization.
+
+- Have your guests agree to a [terms of use](/azure/active-directory/conditional-access/terms-of-use).
+- Configure a [session timeout policy](/azure/active-directory/conditional-access/howto-conditional-access-session-lifetime) for guests.
+- Create [sensitive information types](../compliance/sensitive-information-type-learn-about.md) and use [data loss protection](../compliance/dlp-learn-about-dlp.md) to set policies around accessing sensitive information.
+- Use [Azure Active Directory access](/azure/active-directory/governance/access-reviews-overview) reviews to periodically review team access and membership.
+
+## Drive user adoption for team members
+
+With the team in place, it's time to drive the adoption of this team and its additional security to team members.
+
+### Train your users
+
+Members of the team can access the team and all of its resources, including chats, meetings, and other apps. When working with files from the **Files** section of a channel, members of the team should assign the sensitivity label to the files they create.
+
+When the label gets applied to the file, it is encrypted. Members of the team can open it and collaborate in real time. If the file leaves the site and gets forwarded to a malicious user, they will have to supply credentials of a user account that is member of the team to open the file and view its contents.
+
+Train your team members:
+
+- On the importance of using the new team for chats, meetings, files, and the other resources of the SharePoint site and the consequences of a highly regulated data leak, such as legal ramifications, regulatory fines, ransomware, or loss of competitive advantage.
+- How to access the team.
+- How to create new files on the site and upload new files stored locally.
+- How to label files with the correct sensitivity label for the team.
+- How the label protects files even when they are leaked off the site.
+
+This training should include hands-on exercises so that your team members can experience these capabilities and their results.
+
+### Conduct periodic reviews of usage and address team member feedback
+
+In the weeks after training:
+
+- Quickly address team member feedback and fine tune policies and configurations.
+- Analyze usage for the team and compare it with usage expectations.
+- Verify that highly regulated files have been properly labeled with the sensitivity label. (You can see which files have a label assigned by viewing a folder in SharePoint and adding the **Sensitivity** column through the **Show/hide columns** option of **Add column**.
+
+Retrain your users as needed.
+
+## See also
+
+[Azure AD Privileged Identity Management](/azure/active-directory/privileged-identity-management/pim-configure)
solutions Setup Secure Collaboration With Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/setup-secure-collaboration-with-teams.md
ms.localizationpriority: medium - highpri
+- Tier1
- M365-collaboration - m365solution-securecollab - m365solution-overview
These training modules from Microsoft Learn can help you learn the collaboration
> [!div class="nextstepaction"] > [Start >](/training/modules/m365-teams-collab-prepare-deployment/introduction/)
-### SharePoint
-
-|Training:|Collaborate with SharePoint in Microsoft 365|
-|||
-|![SharePoint training icon.](../media/collaborate-with-sharepoint-in-microsoft-365.svg)|Manage shared content with Microsoft SharePoint introduces you to the features and capabilities of SharePoint, and how it works with Microsoft 365. You'll learn about the different types of SharePoint sites, including hub sites, as well as information protection, reporting, and monitoring. You'll also learn how to use SharePoint file and folder sharing to optimize collaboration, how to share files externally, and how to manage SharePoint sites in the SharePoint admin center. This learning path can help you prepare for the Microsoft 365 Certified: Teamwork Administrator Associate certification.<p>1 hr 14 min - Learning Path - 4 Modules|
-
-> [!div class="nextstepaction"]
-> [Start >](/training/modules/m365-teams-sharepoint-plan-sharepoint/introduction/)
-
-### Information protection
-
-|Training:|Protect enterprise information with Microsoft 365|
-|||
-|![Teams info protection training icon.](../media/protect-enterprise-information-microsoft-365.svg)|Protecting and securing your organization's information is more challenging than ever. The Protect enterprise information with Microsoft 365 learning path discusses how to protect your sensitive information from accidental oversharing or misuse, how to discover and classify data, how to protect it with sensitivity labels, and how to both monitor and analyze your sensitive information to protect against its loss. This learning path can help you prepare for the Microsoft 365 Certified: Security Administrator Associate and Microsoft 365 Certified: Enterprise Administration Expert certifications.<p>1 hr - Learning Path - 5 Modules|
-
-> [!div class="nextstepaction"]
-> [Start >](/training/modules/m365-security-info-overview/introduction/)
- ### Identity and access |Training:|Protect identity and access with Azure Active Directory|
syntex Content Processing Create Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/content-processing-create-rules.md
description: Learn how to create a rule to move or copy a file to another ShareP
# Create a rule to move or copy a file from one document library to another in Microsoft Syntex
+Document libraries can have multiple move and copy rules to support moving and copying files to different destination libraries based on metadata criteria.
+
+## Move or copy a file
+ To move or copy a file from one document library to another, follow these steps. 1. In the document library, select **Automate** > **Rules** > **Create a rule**.
To move or copy a file from one document library to another, follow these steps.
![Screenshot of the document library showing the Automate > Rules > Manage rules option.](../media/content-understanding/content-processing-manage-rule.png)
-2. On the **Manage rules** page, you can see the rules that have been applied. You can turn on or off a rule or [create a new rule](#create-a-rule-to-move-or-copy-a-file-from-one-document-library-to-another-in-microsoft-syntex) to automate actions on a specific document library.
+2. On the **Manage rules** page, you can see the rules that have been applied. You can turn on or off a rule or [create a new rule](#move-or-copy-a-file) to automate actions on a specific document library.
![Screenshot of the Manage rules page showing the rule and actions.](../media/content-understanding/content-processing-manage-rules-page.png)
In the document library, in the upper-right corner of the page, select the detai
> [!NOTE] > Currently, the activity feed shows only move activity. Copy activity will be available in a future release.
-## See also
-
-[Overview of content processing](content-processing-overview.md)
syntex Content Processing Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/content-processing-overview.md
Microsoft Syntex lets you build simple rules-driven actions in document librarie
You'll choose a condition that triggers the rule and the action that the rule will take. For example, you can create a rule to move files tagged with a specific customer to a specific library or folder. These rules help you structure your content architecture with the power of AI-driven processing.
-Document libraries can have multiple move and copy rules to support moving and copying files to different destination libraries based on metadata criteria.
- > [!NOTE] > This feature is available only for users who are licensed for Syntex.-
-## See also
-
-[Create a rule to move or copy a file from one document library to another](content-processing-create-rules.md)