Updates from: 03/13/2021 04:09:12
Category Microsoft Docs article Related commit history on GitHub Change details
admin Wipe Mobile Device https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/wipe-mobile-device.md
Wipe a device for these reasons:
The wipe is sent immediately to the mobile device and the device is marked as not compliant in Azure active directory. While all data is removed when a device is reset to factory defaults, the following table describes what content is removed for each device type when a device when you remove company data.
-|**Content impace**|**iOS 10 and later**|**Android 5 and later**|
+|**Content impact**|**iOS 10 and later**|**Android 5 and later**|
|:--|:--|:--| |Microsoft 365 app data is wiped if the device is protected by Intune App Protection policies. The apps aren't removed. For devices not protected by Mobile Application Management (MAM) policies, Outlook and OneDrive won't remove cached data.<br/>**Note** For applying Intune App protection policies you must have an Intune license.|Yes|Yes| |Policy settings applied by Basic Mobility and Security to devices are no longer enforced; users can change the settings.|Yes|Yes|
The wipe is sent immediately to the mobile device and the device is marked as no
## Related topics
-[Set up Basic Mobility and Security](set-up.md)
+[Set up Basic Mobility and Security](set-up.md)
admin Create Dns Records At 123 Reg Co Uk https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/dns/create-dns-records-at-123-reg-co-uk.md
When Microsoft finds the correct TXT record, your domain is verified.
6. Select **Add**.
- ![Select Add](../../media/a8ae6c0c-4365-4137-af8a-6e003996e3d0.png)
+ ![Screenshot of dialog box with Add button being selected](../../media/a8ae6c0c-4365-4137-af8a-6e003996e3d0.png)
7. If there are any other MX records, remove each one by choosing the **Delete (trash can)** icon for that record.
When Microsoft finds the correct TXT record, your domain is verified.
|enterpriseregistration <br/> |CNAME <br/> |enterpriseregistration.windows.net. <br/> **This value MUST end with a period (.)** <br/> | |enterpriseenrollment <br/> |CNAME <br/> |enterpriseenrollment-s.manage.microsoft.com. <br/> **This value MUST end with a period (.)** <br/> |
- ![Copy and paste the values from the table](../../media/24bf388c-5f7f-4fc0-b4ec-4b17226b6246.png)
+ ![Screenshot with Destination CNAME to copy and paste](../../media/24bf388c-5f7f-4fc0-b4ec-4b17226b6246.png)
6. Select **Add**.
- ![Select Add](../../media/825a9854-559d-4a22-90ac-5e7a0a54269a.png)
+ ![Screenshot to add Destination CNAME](../../media/825a9854-559d-4a22-90ac-5e7a0a54269a.png)
7. Add the other four CNAME records.
When Microsoft finds the correct TXT record, your domain is verified.
6. Select **Add**.
- ![Select Add](../../media/7906dd91-fd23-44c3-bb37-ef185655c6eb.png)
+ ![Screenshot with Destination TXT/SPF](../../media/7906dd91-fd23-44c3-bb37-ef185655c6eb.png)
## Add the two SRV records that are required for Microsoft <a name="BKMK_add_SRV"> </a>
When Microsoft finds the correct TXT record, your domain is verified.
|_sip._tls|SRV|100|3600|1 443 sipdir.online.lync.com. **This value MUST end with a period (.)**<br> **Note:** We recommend copying and pasting this entry, so that all of the spacing stays correct. | |_sipfederationtls._tcp|SRV|100|3600|1 5061 sipfed.online.lync.com. **This value MUST end with a period (.)** <br> **Note:** We recommend copying and pasting this entry, so that all of the spacing stays correct. |
- ![Copy and paste the values from the table](../../media/c1786b86-52ef-4dca-8b99-b479554fa531.png)
+ ![Screenshot with DNS values from the table](../../media/c1786b86-52ef-4dca-8b99-b479554fa531.png)
6. Select **Add**.
- ![Select Add](../../media/5fd9d3a2-a8bb-466b-829f-b3a6e54b5104.png)
+ ![Screenshot to add Destination SRV](../../media/5fd9d3a2-a8bb-466b-829f-b3a6e54b5104.png)
7. To add the other SRV record:
admin Customize The App Launcher https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/customize-the-app-launcher.md
You can add your own custom tiles to the app launcher that point to SharePoint s
Your custom tile now appears in the app launcher on the **All** tab for you and your users.
-## Promote the tile to App Launcher
-
-1. Select the app launcher icon and select the **All apps**.
-
-2. Locate the new tile for your app, select the ellipsis, and choose **Pin to launcher**.
-
- > [!NOTE]
- > If you don't see the custom tile created in the previous steps, make sure you have an Exchange Online mailbox assigned to you and you've signed into your mailbox at least once. These steps are required for custom tiles in Microsoft 365.
-
-> [!IMPORTANT]
-> Both you and your users need to perform these steps to promote custom tiles from the My apps page to the app launcher.
-
## Edit or delete a custom tile 1. In the admin center, go to the **Settings** > **Org Settings** > **Organization profile**</a> tab.
admin Install Applications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/install-applications.md
audience: Admin-+ localization_priority: Normal
admin Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/setup.md
audience: Admin-+ localization_priority: Priority
commerce Manage Auto Claim Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/licenses/manage-auto-claim-policies.md
+
+ Title: "Manage auto-claim policies"
+f1.keywords:
+- CSH
+++
+audience: Admin
++
+localization_priority: Normal
+
+- M365-subscription-management
+- Adm_O365
+description: "Learn how to create and manage auto-claim policies that automatically assign licenses to users for certain apps."
+
+- AdminSurgePortfolio
+- commerce
+search.appverid:
+- MET150
++
+# Manage auto-claim policies
+
+An auto-claim policy lets users automatically claim a license for a
+product the first time that they sign into an app. As an admin, you
+typically assign licenses to users either manually, or by using
+group-based licensing. By using auto-claim policies, you manage the
+products for which users can automatically claim licenses. You can also
+control which products those licenses come from.
+
+After you create an auto-claim policy, you can do the following tasks to
+manage the policy:
+
+- [Turn the policy on or off](#turn-a-policy-on-or-off)
+- [Edit the policy friendly name](#edit-the-policy-friendly-name)
+- [Add or remove backup products](#add-or-remove-backup-products)
+- [Manage the assigning apps and services](#change-the-assigning-apps-and-services)
+- [Change the assigning order](#change-the-assigning-order-for-backup-products)
+- [View a policy report](#view-an-auto-claim-policy-report)
+
+> [!IMPORTANT]
+> Auto-claim policies are currently only available for Microsoft Teams. More products will be available to use in the future.
+
+## Before you begin
+
+You must be a Global, Billing, or User admin to create and manage auto-claim policies. For more information, see [About Microsoft 365 admin roles](../../admin/add-users/about-admin-roles.md).
+
+## Turn the auto-claim policy feature on or off
+
+By default, the auto-claim policy feature is turned off. Before you can use the feature, you must first turn it on. After you turn on the feature, you
+can create an auto-claim policy.
+
+### Turn on auto-claim policies
+
+1. In the admin center, go to the **Billing** \> **Licenses** page, then select the <a href="https://go.microsoft.com/fwlink/p/?linkid=2134398" target="_blank">Auto-claim policy</a> tab.
+2. In the center of the page, select the **Turn on setting** button.
+
+### Turn off auto-claim policies
+
+1. In the admin center, go to the **Settings** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=2053743" target="_blank">Org settings</a> page.
+2. Near the bottom of the table, select **User owned apps and services**.
+3. In the right pane, clear the box for **Let users auto-claim licenses the first time they sign in**.
+
+If you already have an active policy, but you don't want any more users to claim licenses, [turn off the policy](#turn-a-policy-on-or-off). When you turn off an auto-claim policy, no more users can claim a license from that point on. Users who already claimed a license don't lose their license.
+
+## Create an auto-claim policy
+
+The <a href="https://go.microsoft.com/fwlink/p/?linkid=2134398" target="_blank">Auto-claim policy</a> tab lists the policies that you create. On
+this tab, you can see: the name of the policy, the app that is
+associated with the policy, the product that's assigned to the policy,
+the number of available licenses, and the status of the policy.
+
+When you create an auto-claim policy, you can add a backup product to
+it. If the primary product is out of licenses, the backup
+product is used to assign licenses to users. You can add up to four backup
+products and [change the order in which they're used](#change-the-assigning-order-for-backup-products). To learn more,
+see [Add or remove backup products](#add-or-remove-backup-products).
+
+> [!NOTE]
+> Currently, you can only create one auto-claim policy. The number of policies you can create will increase as more products are able to use this feature.
+
+1. In the admin center, go to the **Billing** \> **Licenses** page, then select the <a href="https://go.microsoft.com/fwlink/p/?linkid=2134398" target="_blank">Auto-claim policy</a> tab.
+2. Select **Add a policy**.
+3. On the **Name this auto-claim policy** page, enter a name for the policy, then select **Next**.
+4. On the **Set an auto-claim app and product** page, select an app and the subscription to assign licenses from.
+5. If you want to add a backup product, select **Add a backup product to this policy**, then select the product from the list.
+6. Select **Next**.
+7. On the **Select apps** page, clear or select the boxes for the apps to exclude or include with the license, then select **Next**.
+8. If you added one or more backup products, repeat step 7 for each product. Otherwise, go to step 9.
+9. On the **Review and finish** page, verify the new policy information, make any necessary changes, then select **Create policy**.
+10. Select **Close**.
+
+## Turn a policy on or off
+
+When you turn off a policy, no more users can claim licenses under that
+policy. The change doesn't affect users who already claimed licenses
+under that policy.
+
+1. In the admin center, go to the **Billing** \> **Licenses** page, then select the <a href="https://go.microsoft.com/fwlink/p/?linkid=2134398" target="_blank">Auto-claim policy</a> tab.
+2. Select the policy that you want to edit.
+3. In the details pane, under **Turn this policy on or off**, select or clear the check box.
+4. Select **Save** to close the details pane.
+
+## Edit the policy friendly name
+
+1. In the admin center, go to the **Billing** \> **Licenses** page, then select the <a href="https://go.microsoft.com/fwlink/p/?linkid=2134398" target="_blank">Auto-claim policy</a> tab.
+2. Select the policy that you want to edit.
+3. In the details pane, in the **Policy name** section, select **Edit**.
+4. Enter a new policy name, then select **Save**.
+5. Select **Save** to close the details pane.
+
+## Add or remove backup products
+
+When you create a policy, you add a product to it. Licenses are then
+automatically assigned to users from that pool of licenses. You can add
+or remove products for an auto-claim policy at any time. If you already
+have one product associated with the policy, any products that you add
+are considered backup products. When the available number of licenses
+from the first product are used up, the policy uses the next backup
+product on the list to assign licenses from. You [can reorder the list of products](#change-the-assigning-apps-and-services) as you like.
+
+When you remove a backup product, it's no longer used to assign
+licenses. Users with an existing license still have that license, but no
+new users can receive licenses for that product.
+
+> [!NOTE]
+> An auto-claim policy must contain at least one product. You can't remove all products from a policy. If you don't want to assign licenses from a specific auto-claim policy anymore, [turn off the policy](#view-an-auto-claim-policy-report).
+
+### Add a backup product
+
+1. In the admin center, go to the **Billing** \> **Licenses** page, then select the <a href="https://go.microsoft.com/fwlink/p/?linkid=2134398" target="_blank">Auto-claim policy</a> tab.
+2. Select the policy that you want to edit.
+3. In the details pane, at the bottom, select **Add a backup product to this policy**.
+ > [!NOTE]
+ > If you don't see this link, it's because you only have one product associated with your account.
+4. In the **Add a product** pane, use the drop-down to choose a product to add to the policy, then select **Add**.
+5. Select **Save** to close the details pane.
+
+### Remove a backup product
+
+1. In the admin center, go to the **Billing** \> **Licenses** page, then select the <a href="https://go.microsoft.com/fwlink/p/?linkid=2134398" target="_blank">Auto-claim policy</a> tab.
+2. Select the policy that you want to edit.
+3. In the details pane, at the bottom, select **Remove a product**.
+4. In the **Remove a product from the policy** pane, select the box for the policy that you want to remove, then select **Save**.
+5. Close the details pane.
+
+## Change the assigning apps and services
+
+Each product has a collection of apps and services associated with it.
+For each product in your auto-claim policy, you can specify which apps
+and services to include when a user is automatically assigned a
+license to that product.
+
+1. In the admin center, go to the **Billing** \> **Licenses** page, then select the <a href="https://go.microsoft.com/fwlink/p/?linkid=2134398" target="_blank">Auto-claim policy</a> tab.
+2. Select the policy that you want to edit.
+3. In the details pane, under **Apps and services**, select **Edit**.
+4. In the **Apps and services** pane, from the **Product** drop-down, select a single product, or select **All products**.
+5. Check or clear the boxes for apps and services that you want users to have or not have access to.
+6. When you're finished, select **Save**, then close the details pane.
+
+## Change the assigning order for backup products
+
+If you have backup products assigned to the policy, you can change the
+order in which they're used to assign licenses when users sign in
+to the app.
+
+1. In the admin center, go to the **Billing** \> **Licenses** page, then select the <a href="https://go.microsoft.com/fwlink/p/?linkid=2134398" target="_blank">Auto-claim policy</a> tab.
+2. Select the policy that you want to edit.
+3. In the details pane, in the **Product licenses** section, select the box next to the product that you want to move, then select **Move up** or **Move down**.
+4. Repeat step 3 for each product that you want to reorder.
+5. When you're finished reordering the products, select **Save** to close the details pane.
+
+## View an auto-claim policy report
+
+1. In the admin center, go to the **Billing** \> **Licenses** page, then select the <a href="https://go.microsoft.com/fwlink/p/?linkid=2134398" target="_blank">Auto-claim policy</a> tab.
+2. Select **View report**. The **Auto-claim policy report** page lists all licenses assigned from each policy in the last 90 days. By default, the page shows the past 90 days.
+3. To change the time period shown, select the **Past 30 days** drop-down list. You can view reports for the past 1, 7, 30, and 90 days.
+
+## Next steps
+
+You can periodically return to the **Auto-claim policy** tab to see a list of users who have claimed licenses under the policies you created.
+
+## Related content
+
+[Assign licenses to users](../../admin/manage/assign-licenses-to-users.md) (article)\
+[Buy or remove subscription licenses](buy-licenses.md) (article)\
+[Understand subscriptions and licenses](subscriptions-and-licenses.md) (article)
commerce Reactivate Your Subscription https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/reactivate-your-subscription.md
Title: "Reactivate your subscription" f1.keywords:-- NOCSH
+- CSH
compliance Create A Custom Sensitive Information Type https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-a-custom-sensitive-information-type.md
audience: Admin Previously updated : 04/17/2019 Last updated : localization_priority: Priority - M365-security-compliance
Use this procedure to create a new sensitive information type that you fully def
5. Choose and define **Primary element**. The primary element can be a **Regular expression** with an optional validator, a **Keyword list**, a **Keyword dictionary**, or one of the pre-configured **Functions**. For more information on DLP functions, see [What the DLP functions look for](what-the-dlp-functions-look-for.md). 6. Fill in a value for **Character proximity**. 7. (Optional) Add supporting elements if you have any. Supporting elements can be a regular expression with an optional validator, a keyword list, a keyword dictionary or one of the pre-defined functions.
-8. (Optional) Add additional checks from the list of available checks
+8. (Optional) Add any [**additional checks**](#more-information-on-additional-checks) from the list of available checks.
9. Choose **Create**. 10. Choose **Next**. 11. Choose the **recommended confidence level** for this sensitive information type.
Use this procedure to create a new sensitive information type that you fully def
> [!IMPORTANT] > Microsoft 365 uses the search crawler to identify and classify sensitive information in SharePoint Online and OneDrive for Business sites. To identify your new custom sensitive information type in existing content, the content must be re-crawled. Content is crawled based on a schedule, but you can manually re-crawl content for a site collection, list, or library. For more information, see [Manually request crawling and re-indexing of a site, a library or a list](https://docs.microsoft.com/sharepoint/crawl-site-content).
-13. On the **Data classification** page, you'll see all the sensitive information types listed. Choose **Refresh** and then browse for or use the search tool to find the sensitive information type you just created.
+13. On the **Data classification** page, you'll see all the sensitive information types listed. Choose **Refresh** and then browse for or use the search tool to find the sensitive information type you created.
## Test a sensitive information type
You can test any sensitive information type in the list. We suggest that you tes
## Modify custom sensitive information types in the Compliance Center 1. In the Compliance Center, go to **Data classification** \> **Sensitive info types** and choose the sensitive information type from the list that you want to modify choose **Edit**.
-2. You can add other patterns, with unique primary and supporting elements, confidence levels, character proximity, and additional checks or edit/remove the existing ones. For more information, see [Create a custom sensitive information type](#create-a-custom-sensitive-information-type).
+2. You can add other patterns, with unique primary and supporting elements, confidence levels, character proximity, and [**additional checks**](#more-information-on-additional-checks) or edit/remove the existing ones.
## Remove custom sensitive information types in the Compliance Center
Use this procedure to create a new sensitive information type that is based on a
7. You can choose to edit or remove the existing patterns and add new ones. Choose the default confidence level for the new pattern. The values are **Low confidence**, **Medium confidence**, and **High confidence**. 8. Choose and define **Primary element**. The primary element can be a **Regular expression**, a **Keyword list**, a **Keyword dictionary**, or one of the pre-configured **Functions**. See, [What the DLP functions look for](what-the-dlp-functions-look-for.md). 9. Fill in a value for **Character proximity**.
-10. (Optional) If you have **Supporting elements** or any **Additional checks** add them. If needed you can group your **Supporting elements**.
+10. (Optional) If you have **Supporting elements** or any [**Additional checks**](#more-information-on-additional-checks) add them. If needed you can group your **Supporting elements**.
11. Choose **Create**. 12. Choose **Next**. 13. Choose the **recommended confidence level** for this sensitive information type.
Use this procedure to create a new sensitive information type that is based on a
You can also create custom sensitive information types by using PowerShell and Exact Data Match capabilities. To learn more about those methods, see: - [Create a custom sensitive information type in Security & Compliance Center PowerShell](create-a-custom-sensitive-information-type-in-scc-powershell.md) - [Create a custom sensitive information type for DLP with Exact Data Match (EDM)](create-custom-sensitive-information-types-with-exact-data-match-based-classification.md)
-
+
+## More information on additional checks
+
+Here are the definitions and some examples for the available additional checks.
+
+**Exclude specific matches**: This check lets you define keywords to exclude when detecting matches for the pattern you are editing. For example, you might exclude test credit card numbers like '4111111111111111' so that they're not matched as a valid number.
+
+**Starts or doesn't start with characters**: This check lets you define the characters that the matched items must or must not start with. For example, if you want the pattern to detect only credit card numbers that start with 41, 42, or 43, select **Starts with** and add 41, 42, and 43 to the list, separated by commas.
+
+**Ends or doesn't end with characters**: This check lets you define the characters that the matched items must or must not end with. For example, if your Employee ID number cannot end with 0 or 1, select **Doesn't end with** and add 0 and 1 to the list, separated by commas.
+
+**Exclude duplicate characters**: This check lets you ignore matches in which all the digits are the same. For example, if the six digit employee ID number cannot have all the digits be the same, you can select **Exclude duplicate characters** to exclude 111111, 222222, 333333, 444444, 555555, 666666, 777777, 888888, 999999, and 000000 from the list of valid matches for the employee ID.
+
+**Include or exclude prefixes**: This check lets you define the keywords that must or must not be found immediately before the matching entity. Depending on your selection, entities will be matched or not matched if they're preceded by the prefixes you include here. For example, if you **Exclude** the prefix **GUID:**, any entity that's preceded by **GUID:** won't be considered a match.
+
+**Include or exclude suffixes** This check lets you define the keywords that must or must not be found immediately after the matching entity. Depending on your selection, entities will be matched or not matched if they're followed by the suffixes you include here. For example, if you **Exclude** the suffix **:GUID**, any text that's followed by **:GUID** won't be matched.
++ > [!NOTE] > Microsoft 365 Information Protection supports, in preview, double byte character set languages for: > - Chinese (simplified)
compliance Create Custom Sensitive Information Types With Exact Data Match Based Classification https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-custom-sensitive-information-types-with-exact-data-match-based-classification.md
But what if you wanted a custom sensitive information type that uses exact data
EDM-based classification enables you to create custom sensitive information types that refer to exact values in a database of sensitive information. The database can be refreshed daily, and contain up to 100 million rows of data. So as employees, patients, or clients come and go, and records change, your custom sensitive information types remain current and applicable. And, you can use EDM-based classification with policies, such as [data loss prevention policies](data-loss-prevention-policies.md) (DLP) or [Microsoft Cloud App Security file policies](https://docs.microsoft.com/cloud-app-security/data-protection-policies). > [!NOTE]
-> Microsoft 365 Information Protection now supports in preview double byte character set languages for:
+> Microsoft 365 Information Protection supports in preview double byte character set languages for:
> - Chinese (simplified) > - Chinese (traditional) > - Korean
Setting up and configuring EDM-based classification involves:
#### Define the schema for your database of sensitive information
-If for business or technical reasons, you prefer not to use PowerShell or command line to create your schema and EDM sensitive info type patter (rule package), you can use the [Exact Data Match Schema and Sensitive Information Type Wizard](sit-edm-wizard.md) to create them. When you are done creating the schema and EDM sensitive info type pattern, return to complete all the steps necessary to make your EDM based sensitive information type available for use.
+If for business or technical reasons, you prefer not to use PowerShell or command line to create your schema and EDM sensitive info type pattern (rule package), you can use the [Exact Data Match Schema and Sensitive Information Type Wizard](sit-edm-wizard.md) to create them. When you are done creating the schema and EDM sensitive info type pattern, return to complete all the steps necessary to make your EDM based sensitive information type available for use.
> [!NOTE] > The Exact Data Match Schema and Sensitive Information Type Wizard is only available for the World Wide and GCC clouds only.
compliance Dlp Configure View Alerts Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-configure-view-alerts-policies.md
f1.keywords:
Previously updated : 10/15/2020 Last updated : audience: ITPro f1_keywords:
compliance Endpoint Dlp Using https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-using.md
If the list mode is set to **Block**, then user will not be able to upload sensi
If the list mode is set to **Allow**, then users will be able to upload sensitive items ***only*** to those domains, and upload access to all other domains is not allowed.
+> [!IMPORTANT]
+> When the service restriction mode is set to "Allow", you must have at least one service domain configured before restrictions are enforced.
+ #### Unallowed browsers You add browsers, identified by their executable names, that will be blocked from accessing files that match the conditions of an enforced a DLP policy where the upload to cloud services restriction is set to block or block override. When these browsers are blocked from accessing a file, the end users will see a toast notification asking them to open the file through Edge Chromium.
compliance Sensitive Information Type Learn About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitive-information-type-learn-about.md
You should use high confidence level patterns with low counts, say five to ten,
> - All policies with minimum accuracy or custom SIT patterns with confidence levels of between 76 and 100 will be mapped to high confidence. > - All policies with minimum accuracy or custom SIT patterns with confidence levels of between 66 and 75 will be mapped to medium confidence. > - All policies with minimum accuracy or custom SIT patterns with confidence levels less than or equal to 65 will be mapped to low confidence. + ## Creating custom sensitive information types To create custom sensitive information types in the Security & Compliance Center, you can choose from several options:
compliance Sit Edm Notifications Activities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-edm-notifications-activities.md
+
+ Title: "Create notifications for exact data match activities (preview)"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++ Last updated :
+localization_priority: Priority
+
+- M365-security-compliance
+search.appverid:
+- MOE150
+- MET150
+description: Learn how to create notifications for exact data match activities.
+++
+# Create notifications for exact data match activities (preview)
+
+When you [create custom sensitive information types with exact data match (EDM)](create-custom-sensitive-information-types-with-exact-data-match-based-classification.md) there are a number of activities that are created in the [audit log](search-the-audit-log-in-security-and-compliance.md#requirements-to-search-the-audit-log). You can use the [New-ProtectionAlert](https://docs.microsoft.com/powershell/module/exchange/new-protectionalert?view=exchange-ps) PowerShell cmdlet to create notifications that let you know when these activities occur:
+
+- CreateSchema
+- EditSchema
+- RemoveSchema
+- UploadDataFailed
+- UploadDataCompleted
+
+> [!NOTE]
+> The ability to create notifications for EDM activities is only available for the World Wide and GCC clouds only.
+
+## Pre-requisites
+
+The account you use must be one of the following:
+
+- a global admin
+- compliance administrator
+- Exchange Online administrator
+
+To learn more about DLP permissions, see [Permissions](data-loss-prevention-policies.md#permissions).
+
+EDM-based classification is included in these subscriptions
+
+- Office 365 E5
+- Microsoft 365 E5
+- Microsoft 365 E5 Compliance
+- Microsoft E5/A5 Information Protection and Governance
+
+To learn more about DLP licensing, see [Microsoft 365 licensing guidance for security & compliance](https://docs.microsoft.com/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection)
+
+## Configure notifications for EDM activities
+
+1. Connect to the [Security & Compliance Center PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-scc-powershell?view=exchange-ps)
+
+2. Run the `New-ProtectionAlert` cmdlet using the activity that you want to create the notification for. For example, if you want to be notified when the **UploadDataCompleted** action occured, run
+
+```powershell
+New-ProtectionAlert -Name "EdmUploadCompleteAlertPolicy" -Category Others -NotifyUser <***address to send notification to***> -ThreatType Activity -Operation UploadDataCompleted -Description "Custom alert policy to track when EDM upload Completed" -AggregationType None
+```
+
+for the **UploadDataFailed** you can run
+
+```powershell
+New-ProtectionAlert -Name "EdmUploadFailAlertPolicy" -Category Others -NotifyUser <***SMTP address to send notification to***> -ThreatType Activity -Operation UploadDataFailed -Description "Custom alert policy to track when EDM upload Failed" -AggregationType None -Severity High
+```
+
+## Related articles
+
+- [Create custom sensitive information types with exact data match (EDM)](create-custom-sensitive-information-types-with-exact-data-match-based-classification.md)
+- [New-ProtectionAlert](https://docs.microsoft.com/powershell/module/exchange/new-protectionalert?view=exchange-ps)
enterprise Page Diagnostics For Spo https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/page-diagnostics-for-spo.md
Red or yellow results may also indicate web parts that refresh data too frequent
>[!IMPORTANT] >Test rules are added and updated regularly so please refer to the latest version of the tool for details about current rules and specific information included in test results. You can verify the version by managing your extensions and the extension will advise whether an update is available.
-## How to use the Network Trace tab
+## How to use the Network Trace tab and how to export a HAR file
The **Network Trace** tab provides detailed information about both requests to build the page and the responses received from SharePoint.
The **Network Trace** tab provides detailed information about both requests to b
2. **Test item load times**. In some cases there will be no time or color indicator because the items have already been cached by the browser. To test this correctly, open the page, clear browser cache, and then click **Start** as that will force a "cold" page load and be a true reflection of the initial page load. This should then be compared to the "warm" page load as that will also help determine what items are being cached on the page.
-3. **Share relevant details with others who can help investigate issues**. To share the details or information provided in the tool with your developers or a technical support person, click **Export to JSON** (as shown in the image above). That will enable you to download the results, viewable with a JSON file viewer.
+3. **Share relevant details with others who can help investigate issues**. To share the details or information provided in the tool with your developers or a technical support person, using the **Enable exporting to HTTP Archive (HAR)** is the recommended approach.
- If you have opted to use the preview feature *enable Export to HAR* then the export type will show as **Export to HAR**.
+![Enable exporting to HAR](../media/page-diagnostics-for-spo/pagediag-submithar.png)
+
+That should be enabled prior to clicking Start, which will then enable debug mode in your browser. It will generate an HTTP Archive file (HAR) which can then be accessed through the "Network Trace" tab. Click the "Export to HAR" and it will download the file to your computer and you can then share it accordingly. The file can be opened in a variety of debug tools, like F12 Developer Tools and Fiddler.
![Network trace](../media/page-diagnostics-for-spo/pagediag-NetworkTraceHAR.PNG)
security Anti Malware Protection Faq Eop https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-protection-faq-eop.md
Each server checks for new malware definitions from our anti-malware partners ev
## How many anti-malware partners do you have? Can I choose which malware engines we use?
-We have partnerships with multiple anti-malware technology providers. Our partners are subject to change, but EOP always uses anti-malware protection from multiple partners. You can't choose one anti-malware engine over another.
+We have partnerships with multiple anti-malware technology providers, so messages are scanned with the Microsoft anti-malware engines, two added signature based engines, plus URL and file reputation scans from multiple sources. Our partners are subject to change, but EOP always uses anti-malware protection from multiple partners. You can't choose one anti-malware engine over another.
## Where does malware scanning occur?
security Attack Simulation Training Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-get-started.md
For step by step instructions on how to create a payload for use within a simula
### Gaining insights For step by step instructions on how to gain insights with reporting, see [Gain insights through Attack simulation training](attack-simulation-training-insights.md).+
+> [!NOTE]
+> Attack Simulator uses Safe Links in Defender for Office 365 to securely track click data for the URL in the payload message that's sent to targeted recipients of a phishing campaign, even if the **Do not track user clicks** setting in Safe Links policies is turned on.
security User Tags https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/user-tags.md
After you apply system tags or custom tags to users, you can use those tags as f
This article explains how to configure user tags in the Security & Compliance Center. There are no cmdlets in Security & Compliance Center to manage user tags.
+To see how user tags are part of the strategy to help protect high-impact user accounts, see [Security recommendations for priority accounts in Microsoft 365](security-recommendations-for-priority-accounts.md).
+ ## What do you need to know before you begin? - You open the Security & Compliance Center at <https://protection.office.com/>. To go directly to the **User tags** page, open <https://protection.office.com/userTags>.
This article explains how to configure user tags in the Security & Compliance Ce
- You can also manage and monitor priority accounts in the Microsoft 365 admin center. For instructions, see [Manage and monitor priority accounts](../../admin/setup/priority-accounts.md).
-## Use the Security Center to create user tags
+## Use the Security & Compliance Center to create user tags
-1. In the Security Center, go to **Threat management** \> **User tags**.
+1. In the Security & Compliance Center, go to **Threat management** \> **User tags**.
2. On the **User tags** page that opens, click **Create tag**.
This article explains how to configure user tags in the Security & Compliance Ce
When you're finished, click **Submit**.
-## Use the Security Center to view user tags
+## Use the Security & Compliance Center to view user tags
-1. In the Security Center, go to **Threat management** \> **User tags**.
+1. In the Security & Compliance Center, go to **Threat management** \> **User tags**.
2. On the **User tags** page that opens, select the user tag that you want to view (don't click on the checkbox).
This article explains how to configure user tags in the Security & Compliance Ce
When you're finished, click **Close**.
-## Use the Security Center to modify user tags
+## Use the Security & Compliance Center to modify user tags
-1. In the Security Center, go to **Threat management** \> **User tags**.
+1. In the Security & Compliance Center, go to **Threat management** \> **User tags**.
2. On the **User tags** page that opens, select the user tag that you want to view, and then click **Edit tag**.
This article explains how to configure user tags in the Security & Compliance Ce
When you're finished, click **Submit**.
-## Use the Security Center to remove user tags
+## Use the Security & Compliance Center to remove user tags
**Note**: You can't remove the built-in **Priority account** tag.
-1. In the Security Center, go to **Threat management** \> **User tags**.
+1. In the Security & Compliance Center, go to **Threat management** \> **User tags**.
2. On the **User tags** page that opens, select the user tag that you want to remove, click **Delete tag**, and then select **Yes, remove** in the warning that appears.
security Zero Hour Auto Purge https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-hour-auto-purge.md
Malware ZAP is enabled by default in anti-malware policies. For more information
For **read or unread messages** that are identified as phishing after delivery, the ZAP outcome depends on the action that's configured for a **Phishing email** filtering verdict in the applicable anti-spam policy. The available filtering verdict actions for phishing and their possible ZAP outcomes are described in the following list: -- **Add X-Header**, **Prepend subject line with text**: ZAP takes no action on the message.
+- **Add X-Header**, **Prepend subject line with text**, **Redirect message to email address**, **Delete message**: ZAP takes no action on the message.
- **Move message to Junk Email**: ZAP moves the message to the Junk Email folder, as long as the junk email rule is enabled on the mailbox (it's enabled by default). For more information, see [Configure junk email settings on Exchange Online mailboxes in Microsoft 365](configure-junk-email-settings-on-exo-mailboxes.md). -- **Redirect message to email address**, **Delete message**, **Quarantine message**: ZAP quarantines the message.
+- **Quarantine message**: ZAP quarantines the message.
By default, phish ZAP is enabled in anti-spam policies, and the default action for the **Phishing email** filtering verdict is **Quarantine message**, which means phish ZAP quarantines the message by default.
For more information about configuring spam filtering verdicts, see [Configure a
For **unread messages** that are identified as spam after delivery, the ZAP outcome depends on the action that's configured for the **Spam** filtering verdict in the applicable anti-spam policy. The available filtering verdict actions for spam and their possible ZAP outcomes are described in the following list: -- **Add X-Header**, **Prepend subject line with text**: ZAP takes no action on the message.
+- **Add X-Header**, **Prepend subject line with text**, **Redirect message to email address**, **Delete message**: ZAP takes no action on the message.
- **Move message to Junk Email**: ZAP moves the message to the Junk Email folder, as long as the junk email rule is enabled on the mailbox (it's enabled by default). For more information, see [Configure junk email settings on Exchange Online mailboxes in Microsoft 365](configure-junk-email-settings-on-exo-mailboxes.md). -- **Redirect message to email address**, **Delete message**, **Quarantine message**: ZAP quarantines the message. End-users can view and manage their own spam quarantined messages.
+- **Quarantine message**: ZAP quarantines the message. End-users can view and manage their own spam quarantined messages.
By default, spam ZAP is enabled in anti-spam policies, and the default action for the **Spam** filtering verdict is **Move message to Junk Email folder**, which means spam ZAP moves **unread** messages to the Junk Email folder by default.
solutions Manage Creation Of Groups https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/manage-creation-of-groups.md
The steps in this article won't prevent members of certain roles from creating G
- Directory Writers: Azure AD - SharePoint Administrator: SharePoint Admin center, Azure AD - Teams Service Administrator: Teams Admin center, Azure AD-- User Management Administrator: Microsoft 365 Admin center, Yammer, Azure AD
+- User Administrator: Microsoft 365 Admin center, Azure AD
If you're a member of one of these roles, you can create Microsoft 365 Groups for restricted users, and then assign the user as the owner of the group.