Updates from: 04/13/2022 02:03:41
Category Microsoft Docs article Related commit history on GitHub Change details
bookings Bookings Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/bookings-overview.md
Microsoft Bookings is available in the following subscriptions:
## Watch: Introducing Microsoft Bookings
-> [!VIDEO https://youtu.be/G2HOsM767Sw]
+> [VIDEO](https://www.youtube.com/watch?v=G2HOsM767Sw)
Bookings makes it easier for small businesses to schedule and manage appointments with their customers. ## Next steps
-To get started, see [Get access to Microsoft Bookings](get-access.md). To turn Bookings on or off, see [Turn Bookings on or off for your organization](turn-bookings-on-or-off.md).
+To get started, see [Get access to Microsoft Bookings](get-access.md). To turn Bookings on or off, see [Turn Bookings on or off for your organization](turn-bookings-on-or-off.md).
bookings Turn Bookings On Or Off https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/turn-bookings-on-or-off.md
Bookings can be turned on or off for your entire organization or for specific us
1. Sign in to the Microsoft 365 admin center as a global admin.
-2. In the admin center, go toΓÇ»**Settings**ΓÇ»\> <a href="https://go.microsoft.com/fwlink/p/?linkid=2053743" target="_blank">**Org settings**</a>.
+2. In the admin center, go to **Settings** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=2053743" target="_blank">**Org settings**</a>.
3. Select the checkbox for **Allow your organization to use Bookings** to enable or disable Bookings for your organization.
business-premium M365bp Conditional Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-conditional-access.md
description: "Learn how security defaults can help protect your organization fro
Security defaults help protect your organization from identity-related attacks by providing preconfigured security settings that Microsoft manages on behalf of your organization. These settings include enabling multi-factor authentication (MFA) for all admins and user accounts. For most organizations, security defaults offer a good level of additional sign-in security.
-For more information about security defaults and the policies they enforce, see [What are security defaults?](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)
+For more information about security defaults and the policies they enforce, see [What are security defaults?](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)
If your subscription was created on or after October 22, 2019, security defaults might have been automatically enabled for you&mdash;you should check your settings to confirm. To enable security defaults in your Azure Active Directory (Azure AD) or to check to see if they're already enabled:
-1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a> with security administrator, Conditional Access administrator, or Global admin credentials.
+1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a> with security administrator, Conditional Access administrator, or Global admin credentials.
-2. In the left pane, select **Show All,** and then under **Admin centers**, select **Azure Active Directory**.
+2. In the left pane, select **Show All,** and then under **Admin centers**, select **Azure Active Directory**.
-3. In the left pane of the **Azure Active Directory admin center,** select **Azure Active Directory**.
+3. In the left pane of the **Azure Active Directory admin center,** select **Azure Active Directory**.
-4. From the left menu of the Dashboard, in the **Manage** section, select **Properties**.
+4. From the left menu of the Dashboard, in the **Manage** section, select **Properties**.
:::image type="content" source="../media/m365-campaigns-conditional-access/azure-ad-properties.png" alt-text="Screenshot of the Azure Active Directory admin center showing the location of the Properties menu item.":::
-5. At the bottom of the **Properties** page, select **Manage Security defaults**.
+5. At the bottom of the **Properties** page, select **Manage Security defaults**.
-6. In the right pane, you'll see the **Enable Security defaults** setting. If **Yes** is selected, then security defaults are already enabled and no further action is required. If security defaults are not currently enabled, then select **Yes** to enable them, and then select **Save**.
+6. In the right pane, you'll see the **Enable Security defaults** setting. If **Yes** is selected, then security defaults are already enabled and no further action is required. If security defaults are not currently enabled, then select **Yes** to enable them, and then select **Save**.
> [!NOTE]
-> If you've been using Conditional Access policies, you'll need to turn them off before using security defaults.
+> If you've been using Conditional Access policies, you'll need to turn them off before using security defaults.
> > You can use either security defaults or Conditional Access policies, but you can't use both at the same time.
If you want to use Conditional Access to configure policies equivalent to those
- [Require MFA for all users](/azure/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa) -- [Require Azure AD MFA registration](/azure/active-directory/identity-protection/howto-identity-protection-configure-mfa-policy) - Requires Azure AD Identity Protection, which is part of Azure Active Directory Premium P2
+- [Require Azure AD MFA registration](/azure/active-directory/identity-protection/howto-identity-protection-configure-mfa-policy) - Requires Azure AD Identity Protection, which is part of Azure Active Directory Premium P2
To learn more about Conditional Access, see [What is Conditional Access?](/azure/active-directory/conditional-access/overview) For more information about creating Conditional Access policies, see [Create a Conditional Access policy](/azure/active-directory/authentication/tutorial-enable-azure-mfa#create-a-conditional-access-policy).
business-premium Set Up Meetings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/set-up-meetings.md
description: "Set up online meetings with Microsoft Teams."
# Set up meetings
-Meetings in Microsoft Teams include audio, video, and sharing. And because they're online, you'll always have a meeting space (without needing a room or projector!), even if your staff is geographically distributed or working remotely. Microsoft Teams meetings are a great way to come together with your staff both inside and outside of your organization. You don’t need to be a member of your organization or even have an account to join a meeting. You can schedule and run online meetings using Microsoft Teams. During a meeting, you can share your screen, share files, assign tasks, and more. Political campaigns can include staff, volunteers, and guests outside your organization in the meeting. Small firms or practices can meet with their staff, or meet with clients or partners over Microsoft Teams.
+Meetings in Microsoft Teams include audio, video, and sharing. And because they're online, you'll always have a meeting space (without needing a room or projector!), even if your staff is geographically distributed or working remotely. Microsoft Teams meetings are a great way to come together with your staff both inside and outside of your organization. You donΓÇÖt need to be a member of your organization or even have an account to join a meeting. You can schedule and run online meetings using Microsoft Teams. During a meeting, you can share your screen, share files, assign tasks, and more. Political campaigns can include staff, volunteers, and guests outside your organization in the meeting. Small firms or practices can meet with their staff, or meet with clients or partners over Microsoft Teams.
[![An illustration of two users in a meeting.](../media/HostOnlineMeeting-thumb-358x201.png)](https://go.microsoft.com/fwlink/?linkid=2078712)
commerce Subscriptions And Licenses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/licenses/subscriptions-and-licenses.md
Last updated 07/01/2020
# Understand subscriptions and licenses in Microsoft 365 for business
-When you buy a subscription to Microsoft 365 for business, you sign up for a set of apps and services that you pay for on either a monthly or an annual basis. The applications and services that you receive as part of your subscription depend on which product you purchased, such as Microsoft 365 Apps for business or Microsoft 365 Business Standard. You can see what comes with each product on the [Microsoft 365 for small and medium-sized businesses](https://products.office.com/compare-all-microsoft-office-products?&activetab=tab:primaryr1) page.
+When you buy a subscription to Microsoft 365 for business, you sign up for a set of apps and services that you pay for on either a monthly or an annual basis. The applications and services that you receive as part of your subscription depend on which product you purchased, such as Microsoft 365 Apps for business or Microsoft 365 Business Standard. You can see what comes with each product on the [Microsoft 365 for small and medium-sized businesses](https://products.office.com/compare-all-microsoft-office-products?&activetab=tab:primaryr1) page.
When you buy a subscription, you specify the number of licenses that you need, based on how many people you have in your organization. After you buy a subscription, you create accounts for people in your organization, and then assign a license to each person. As your organizational needs change, you can buy more licenses to accommodate new people, or reassign licenses to other users when someone leaves your organization.
If your subscription includes any of the following products, each person can ins
The following table lists what automatically happens when you assign a license to someone:
-|**If the subscription has this service**|**This automatically happens**|
+|If the subscription has this service|This automatically happens|
|:--|:--|
-|Exchange Online <br/> |A mailbox is created for that person. <br/> To learn about the SLA for this task to be completed, see ["Setting up..." messages in the Microsoft 365 admin center](https://support.microsoft.com/help/2635238/setting-up-messages-in-the-office-365-admin-center). |
-|SharePoint Online <br/> |Edit permissions to the default SharePoint Online team site are assigned to that person. <br/> |
-|Skype for Business Online <br/> |The person has access to the features associated with the license. <br/> |
-|Microsoft 365 Apps for enterprise and Microsoft 365 Apps for business <br/> |The person can download Office apps on up to five Macs or PCs, five tablets, and five smartphones. <br/> |
+|Exchange Online|A mailbox is created for that person. <br/> To learn about the SLA for this task to be completed, see ["Setting up..." messages in the Microsoft 365 admin center](https://support.microsoft.com/help/2635238/setting-up-messages-in-the-office-365-admin-center). |
+|SharePoint Online|Edit permissions to the default SharePoint Online team site are assigned to that person.|
+|Skype for Business Online|The person has access to the features associated with the license.|
+|Microsoft 365 Apps for enterprise and Microsoft 365 Apps for business|The person can download Office apps on up to five Macs or PCs, five tablets, and five smartphones.|
## Understand licenses for non-user mailboxes
You don't need to assign licenses to resource mailboxes, room mailboxes, and sha
Different types of admins can work with licenses in different ways, depending on their roles. The following table lists the most common options. For a complete list of admin roles and privileges, see [About admin roles](../../admin/add-users/about-admin-roles.md).
-|**Admin role**|**Assign a license**|**Unassign a license**|**Buy more licenses**|**Delete an account**|
+|Admin role|Assign a license|Unassign a license|Buy more licenses|Delete an account|
|:--|:--|:--|:--|:--|
-|Billing admin <br/> |No <br/> |No <br/> |Yes <br/> |No <br/> |
-|Global admin <br/> |Yes <br/> |Yes <br/> |Yes <br/> |Yes <br/> |
-|License admin <br/> |Yes <br/>|Yes <br/> |No <br/> |No <br/> |
-|Service Support admin <br/> |No <br/> |No <br/> |No <br/> |No <br/> |
-|User admin <br/> |Yes <br/> |Yes <br/> |No <br/> |Yes <br/> |
+|Billing admin|No|No|Yes|No|
+|Global admin|Yes|Yes|Yes|Yes|
+|License admin|Yes|Yes|No|No|
+|Service Support admin|No|No|No|No|
+|User admin|Yes|Yes|No|Yes|
## Related content
commerce Upgrade From Teams Free https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/upgrade-from-teams-free.md
Last updated 07/08/2020
## Before you begin
-You must be a Microsoft Teams Free admin to upgrade a Microsoft Teams Free organization. You're automatically an admin if you created the Microsoft Teams Free organization.
+You must be a Microsoft Teams Free admin to upgrade a Microsoft Teams Free organization. You're automatically an admin if you created the Microsoft Teams Free organization.
## Step 1: Get your work or school account ID
commerce Try Or Buy Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/try-or-buy-microsoft-365.md
Microsoft 365 for business is a subscription service that lets you run your orga
## Before you begin
-You don't need an existing Microsoft account to sign up for a free trial. For all other procedures in this article, you must be a Global or Billing admin for your organization. For more information, see [About admin roles](../admin/add-users/about-admin-roles.md).
+You don't need an existing Microsoft account to sign up for a free trial. For all other procedures in this article, you must be a Global or Billing admin for your organization. For more information, see [About admin roles](../admin/add-users/about-admin-roles.md).
## Try a free trial subscription Are you a new customer, and you don't already have an account with Microsoft? Use these steps to create an account and sign up for a free trial subscription of Microsoft 365 Business Standard, Microsoft 365 Business Premium, or Microsoft 365 Apps for business.
-1. Go to the <a href="https://www.aka.ms/office365signup" target="_blank">Microsoft 365 Products site</a>.
-2. Select the plan that you want to sign up for, such as **Microsoft 365 Business Standard**, scroll down the page, and select **Try free for 1 month**.
+1. Go to the <a href="https://www.aka.ms/office365signup" target="_blank">Microsoft 365 Products site</a>.
+2. Select the plan that you want to sign up for, such as **Microsoft 365 Business Standard**, scroll down the page, and select **Try free for 1 month**.
3. On the next page, follow the steps to set up your account. 4. The sign up process may take several minutes to complete. After it\'s complete, you're ready to start the setup wizard for your subscription. For more information about setting up your subscription, see [Next steps](#next-steps).
At the end of your free trial period, your trial subscription automatically conv
If you want to buy your subscription before your trial is over, use these steps:
-1. In the Microsoft 365 admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page.
-2. On the **Your products** page, find the subscription that you want to buy.
-3. In the **Licenses** section, select **Purchase subscription**.
-4. Choose either a monthly or annual commitment for your subscription, then select **Checkout**.
-5. On the next page, verify the subscription, and select **Checkout**.
-6. On the next page, verify the **Sold to** address, the **Billed to** information, and **Items in this order**. If you need to make any changes, select **Change** next to the applicable section.
-7. When you\'re finished, select **Accept agreement & place order**.
+1. In the Microsoft 365 admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page.
+2. On the **Your products** page, find the subscription that you want to buy.
+3. In the **Licenses** section, select **Purchase subscription**.
+4. Choose either a monthly or annual commitment for your subscription, then select **Checkout**.
+5. On the next page, verify the subscription, and select **Checkout**.
+6. On the next page, verify the **Sold to** address, the **Billed to** information, and **Items in this order**. If you need to make any changes, select **Change** next to the applicable section.
+7. When you\'re finished, select **Accept agreement & place order**.
## Extend your trial
When you're ready to buy, see [Buy your trial version](#buy-a-subscription-from-
## Cancel your free trial subscription
-If you decide to cancel your trial subscription before the free trial period ends, go to the Microsoft 365 admin center and [turn off Recurring billing](subscriptions/renew-your-subscription.md#turn-recurring-billing-off-or-on). The trial will automatically expire when your month ends, and your credit card won't be charged.
+If you decide to cancel your trial subscription before the free trial period ends, go to the Microsoft 365 admin center and [turn off Recurring billing](subscriptions/renew-your-subscription.md#turn-recurring-billing-off-or-on). The trial will automatically expire when your month ends, and your credit card won't be charged.
## Try a different subscription
If you already have a Microsoft 365 for business subscription, you can use the M
When you add a subscription through the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>], the new subscription is associated with the same organization (domain namespace) as your existing subscription. This association makes it easier to move users in your organization between subscriptions, or to assign them a license for the additional products they need.
-1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=868433" target="_blank">Purchase services</a> page.
-2. On the **Purchase services** page, you see the plans that are available to your organization. Choose the Microsoft 365 plan that you want to try.
-3. On the next page, select **Get free trial**. The trial gives you 25 user licenses for a one-month term.
-4. Choose to receive a text or a call, enter your phone number, then choose **Text me** or **Call me**.
-5. Enter the verification code, then select **Start your free trial**.
-6. On the **Check out** page, select **Try now**.
-7. On the **order receipt** page, select **Continue**.
+1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=868433" target="_blank">Purchase services</a> page.
+2. On the **Purchase services** page, you see the plans that are available to your organization. Choose the Microsoft 365 plan that you want to try.
+3. On the next page, select **Get free trial**. The trial gives you 25 user licenses for a one-month term.
+4. Choose to receive a text or a call, enter your phone number, then choose **Text me** or **Call me**.
+5. Enter the verification code, then select **Start your free trial**.
+6. On the **Check out** page, select **Try now**.
+7. On the **order receipt** page, select **Continue**.
## Buy a different subscription
As your users change roles, they may need features that aren't available in thei
When you buy another subscription through the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>, the new subscription is associated with the same organization (domain name space) as your existing subscription. This makes it easier to move users in your organization between subscriptions or assign them a license for the additional subscription they need.
-1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=868433" target="_blank">Purchase services</a> page.
-2. On the **Purchase services** page, select the plan that you want to buy, select **Details**, then select **Buy**.
-3. Enter the number of licenses that you need and choose whether to pay each month or for the whole year. Choose whether you want to automatically assign licenses to everyone who does not currently have a license. Then select **Check out now**.
-4. Review the pricing information and select **Next**.
-5. Provide your payment information, and then select **Place order** \> **Go to Admin Home**.
+1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=868433" target="_blank">Purchase services</a> page.
+2. On the **Purchase services** page, select the plan that you want to buy, select **Details**, then select **Buy**.
+3. Enter the number of licenses that you need and choose whether to pay each month or for the whole year. Choose whether you want to automatically assign licenses to everyone who does not currently have a license. Then select **Check out now**.
+4. Review the pricing information and select **Next**.
+5. Provide your payment information, and then select **Place order** \> **Go to Admin Home**.
> [!NOTE] > You must move users from your free trial subscription to the new subscription before your 90-day grace period ends after your trial subscription expires. By doing this, you keep your data, accounts, and configuration. Otherwise, that information is deleted.
commerce Understand Proposal Workflow https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/understand-proposal-workflow.md
For more information about billing accounts, see [Manage billing accounts](manag
### Microsoft Customer Agreement
-The Microsoft Customer Agreement (MCA) lets an organization buy Microsoft products and services. For more information, see [Microsoft Customer Agreement](https://www.microsoft.com/en-us/Licensing/how-to-buy/microsoft-customer-agreement).
+The Microsoft Customer Agreement (MCA) lets an organization buy Microsoft products and services. For more information, see [Microsoft Customer Agreement](https://www.microsoft.com/Licensing/how-to-buy/microsoft-customer-agreement).
## Permissions needed to sign an agreement or pay for items
If this is a new billing account, and no one has accepted an agreement, you auto
The overall proposal workflow looks like this: -- Your Microsoft representative creates a proposal and sends a link to you in an email.
+- Your Microsoft representative creates a proposal and sends a link to you in an email.
- You use the link to go to the proposal sign-in page. - You review your organization's information. - You review the proposal, accept the MCA if needed, and finish the checkout process.
The overall proposal workflow looks like this:
The following table contains terms and definitions that appear in your proposal and on the proposal site.
-| **Term** | **Definition** |
-||-|
+| Term | Definition |
+|||
| Billing account | An account used to manage your account settings, invoices, payment methods, and products. | | Billing profile | Information about your organization that lets you customize what items are included on your invoice, and how you pay for your invoices. The billing profile includes the billing account name, the payment methods used for the specific billing profile, contact information, invoice settings, and permissions that let you change the billing profile, pay bills, and buy products and services. | | Existing agreements | Any agreement that your organization already has in place with Microsoft. This can include, but is not limited to, an Enterprise Agreement, Microsoft Product & Services Agreement, or Microsoft Customer Agreement. |
If you want to make any changes to the proposal after review, contact your Micro
The proposal contains the following information: | Section | Description |
-||--|
+|||
| Organization name | The name of the organization for whom the proposal was prepared. | | Valid until date | The date at which the proposal offer expires. If you miss this expiration date, contact your Microsoft representative to let them know that you're still interested in the proposal. | | Currency | The currency used to calculate the cost of items in the proposal. |
compliance Create Ediscovery Holds https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-ediscovery-holds.md
The following table lists the limits for eDiscovery cases and case holds.
| Description of limit | Limit | |:--|:--| |Maximum number of cases for an organization. <br/> |No limit <br/> |
- |Maximum number of eDiscovery hold policies for an organization. This limit includes the combined total of hold policies in Core eDiscovery and Advanced eDiscovery cases. <br/> |10,000<sup>1</sup> <br/> |
+ |Maximum number of eDiscovery hold policies for an organization. This limit includes the combined total of hold policies in Core eDiscovery and Advanced eDiscovery cases. <br/> |10,000 <br/> |
|Maximum number of mailboxes in a single eDiscovery hold. This limit includes the combined total of user mailboxes, and the mailboxes associated with Microsoft 365 Groups, Microsoft Teams, and Yammer Groups. <br/> |1,000 <br/> | |Maximum number of sites in a single eDiscovery hold. This limit includes the combined total of OneDrive for Business sites, SharePoint sites, and the sites associated with Microsoft 365 Groups, Microsoft Teams, and Yammer Groups. <br/> |100 <br/> |
- |Maximum number of cases displayed on the eDiscovery home page, and the maximum number of items displayed on the Holds, Searches, and Export tabs within a case. |1,000<sup>2</sup>|
- |||
+ |Maximum number of cases displayed on the eDiscovery home page, and the maximum number of items displayed on the Holds, Searches, and Export tabs within a case. |1,000<sup>1</sup>|
> [!NOTE]
- > <sup>1</sup> When you put more than 1,000 mailboxes or 100 sites on hold in a single hold policy, the system will automatically scale the hold as needed. This means the system will automatically add data locations to multiple hold policies, instead of adding them to a single hold policy. However, the limit of 10,000 case hold policies per organization still applies.
- >
- > <sup>2</sup> To view a list of more than 1,000 cases, holds, searches, or exports, you can use the corresponding Security & Compliance PowerShell cmdlet:
+ > <sup>1</sup> To view a list of more than 1,000 cases, holds, searches, or exports, you can use the corresponding Security & Compliance PowerShell cmdlet:
> > - [Get-ComplianceCase](/powershell/module/exchange/get-compliancecase) > - [Get-CaseHoldPolicy](/powershell/module/exchange/get-caseholdpolicy)
compliance Insider Risk Management Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-policies.md
You'll need to have Microsoft Defender for Endpoint configured in your organizat
Protecting healthcare record data and preventing the misuse of patient personal data is a significant concern for organizations in the healthcare industry. This misuse may include confidential data leaks to unauthorized persons, fraudulently modification of patient records, or the theft of patient healthcare records. Preventing this misuse of patient data, either by lack of awareness, negligence, or fraud by users is also key component in meeting the regulatory requirements of the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act. Both of these acts establish the requirements for safeguarding patient protected health information (PHI).
-This policy template enables risk scoring for internal users that detects suspicious activities associated with records hosted on existing electronic medical record (EMR) systems. Detection focuses on unauthorized access, viewing, modification, and export of patient data. You'll need to configure a connector (the [Microsoft Healthcare connector](import-healthcare-data.md) or [Epic connector](import-epic-data.md) to support detection of access, exfiltration, or obfuscation activities in your EMR system.
+This policy template enables risk scoring for internal users that detects suspicious activities associated with records hosted on existing electronic medical record (EMR) systems. Detection focuses on unauthorized access, viewing, modification, and export of patient data. You'll need to configure a connector the [Microsoft Healthcare connector](import-healthcare-data.md) or [Epic connector](import-epic-data.md) to support detection of access, exfiltration, or obfuscation activities in your EMR system.
-When using this template, you must also configure a Microsoft 365 HR connector to periodically import organization profile data for users in your organization. See the Import data with the HR connector article for step-by-step guidance to configure the Microsoft 365 HR connector for your organization.
+When using this template, you must also configure a Microsoft 365 HR connector to periodically import organization profile data for users in your organization. See the [Set up a connector to import HR data](/microsoft-365/compliance/import-hr-data) article for step-by-step guidance to configure the Microsoft 365 HR connector for your organization.
### Security policy violations by departing users (preview)
compliance Limits Core Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/limits-core-ediscovery.md
The following table lists the limits for core eDiscovery cases and holds associa
|Maximum number of mailboxes in a single case hold. This limit includes the combined total of user mailboxes, and the mailboxes associated with Microsoft 365 Groups, Microsoft Teams, and Yammer Groups. <br/> |1,000 <br/> | |Maximum number of sites in a single case hold. This limit includes the combined total of OneDrive for Business sites, SharePoint sites, and the sites associated with Microsoft 365 Groups, Microsoft Teams, and Yammer Groups. <br/> |100 <br/> | |Maximum number of cases displayed on the core eDiscovery home page, and the maximum number of items displayed on the Holds, Searches, and Export tabs within a case. <sup>1</sup> |1,000|
- |||
> [!NOTE] > <sup>1</sup> To view a list of more than 1,000 cases, holds, searches, or exports, you can use the corresponding Office 365 Security & Compliance PowerShell cmdlets:
compliance Use A Script To Add Users To A Hold In Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/use-a-script-to-add-users-to-a-hold-in-ediscovery.md
Here are the steps to make this happen:
- You have to be a member of the eDiscovery Manager role group in the Microsoft 365 compliance center and a SharePoint Online administrator to run the script in Step 3. For more information, see [Assign eDiscovery permissions in the Office 365 Security & Compliance Center](assign-ediscovery-permissions.md). -- A maximum of 1,000 mailboxes and 100 sites can be added to a hold that's associated with an eDiscovery case in the Microsoft 365 compliance center. Assuming that every user that you want to place on hold has a OneDrive for Business site, you can add a maximum of 100 users to a hold using the script in this article.
+- A maximum of 1,000 mailboxes and 100 sites can be added to a hold that's associated with a Core eDiscovery case in the Microsoft 365 compliance center. Assuming that every user that you want to place on hold has a OneDrive for Business site, you can add a maximum of 100 users to a hold using the script in this article.
- Be sure to save the list of users that you create in Step 2 and the script in Step 3 to the same folder. That will make it easier to run the script.
contentunderstanding Content Assembly https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/contentunderstanding/content-assembly.md
audience: admin
ms.prod: microsoft-365-enterprise-
+search.appverid:
+ - enabler-strategic - m365initiative-syntex ms.localizationpriority: medium
With content assembly, you can use an existing document to create a *modern temp
Follow these steps to create a modern template.
-1. From a Sharepoint document library, select **New** > **Create modern template**.
-
+1. From a Sharepoint document library, select **New** > **Create modern template**.
+ ![Screenshot of document library with the Create modern template option highlighted.](../media/content-understanding/content-assembly-create-template-1.png)
-2. Choose an existing Word document that you want to use as a basis for creating a modern template, and then select **Open**.
-
+2. Choose an existing Word document that you want to use as a basis for creating a modern template, and then select **Open**.
+ ![Screenshot of upload page where you select a document.](../media/content-understanding/content-assembly-create-template-2.png) > [!NOTE] > Currently, you can upload only Word documents (.docx extension) to create templates. Upload Word documents from your local storage or desktop. 3. After you upload the document, the document is displayed in the template studio where you can convert the document to a template.
-
+ ![Screenshot of the document in the template viewer.](../media/content-understanding/content-assembly-create-template-3.png) 4. At the upper-left corner of the template studio, select the name for the template. The default name is the name of the document used to create the template. If you want to rename the template, select the default name or the pencil icon next to the name, type the new name, and then select **Enter**.
-
+ ![Screenshot of the template viewer showing the name of the document to select to rename.](../media/content-understanding/content-assembly-create-template-3a.png) 5. Create placeholders for all dynamic text in the document that users might want to change from one document to another. For example, you might want to create a placeholder for input such as company name, client name, address, phone number, or date. To create a placeholder, select the text (such as the date). The **All placeholders** panel will open, where you'll give the placeholder a relevant name and choose the type of input you want to associate with the placeholder.
-
+ ![Screenshot of the template viewer showing a field highlighted and the All placeholders panel.](../media/content-understanding/content-assembly-create-template-4a.png) Currently, there are two ways for users to fill in a placeholder:
Follow these steps to create a modern template.
- [Select from choices in a column of a list or library](#associate-a-placeholder-by-selecting-from-choices-in-a-column-of-a-list-or-library) > [!NOTE]
- > You can create placeholders for text only. Currently, images, smart art, tables, and bullet lists are not supported.
+ > You can create placeholders for text only. Currently, images, smart art, tables, and bullet lists are not supported.
-### Associate a placeholder by entering text or selecting a date
+### Associate a placeholder by entering text or selecting a date
On the **All placeholders** panel:
On the **All placeholders** panel:
![Screenshot of the Select a list for adding a source column page showing lists.](../media/content-understanding/content-assembly-create-template-7.png)
-4. On the **Select a source column from the existing list** page, select the column name you want to associate with the placeholder, and then select **Save**.
+4. On the **Select a source column from the existing list** page, select the column name you want to associate with the placeholder, and then select **Save**.
![Screenshot of the Select a source column from the existing list page showing column names.](../media/content-understanding/content-assembly-create-template-8.png)
On the **All placeholders** panel:
![Screenshot of the All placeholders panel showing the list field associated with the placeholder.](../media/content-understanding/content-assembly-create-template-9.png) 6. If you want users to be able to add inputs manually, in addition to choosing from a list, select **Allow authors to add new choices**. In this case, the default for the manual input data type is *Single line of text*. Also the values input by the authors will only be used to generate the document. They won't be added to the SharePoint list.
-
-You can create as many placeholders as you think are necessary. When you're done, you can choose to save the template as a draft or publish the template.
- - **Save draft** ΓÇô Saves the template as a draft and you can access it later. You can view, edit, or publish saved drafts from the **Modern templates** section by selecting **New** > **Edit New menu** from the document library.
- - **Publish** ΓÇô Publishes the template to be used by other users in the organization to create documents. You can view, edit, or unpublish *published* templates from the **Modern templates** section by selecting **New** > **Edit New menu** from the document library.
+ You can create as many placeholders as you think are necessary. When you're done, you can choose to save the template as a draft or publish the template.
+
+ - **Save draft** ΓÇô Saves the template as a draft and you can access it later. You can view, edit, or publish saved drafts from the **Modern templates** section by selecting **New** > **Edit New menu** from the document library.
+ - **Publish** ΓÇô Publishes the template to be used by other users in the organization to create documents. You can view, edit, or unpublish *published* templates from the **Modern templates** section by selecting **New** > **Edit New menu** from the document library.
## Edit a modern template If you need to edit an existing template or to delete or unpublish a template, follow these steps.
-1. From a Sharepoint document library, select **New** > **Edit New menu**.
-
+1. From a Sharepoint document library, select **New** > **Edit New menu**.
+ ![Screenshot of document library with the Edit New menu option highlighted.](../media/content-understanding/content-assembly-edit-template-1.png) 2. On the **Edit New menu** panel, in the **Modern templates** section, select the published or draft template you want to edit.
-
+ ![Screenshot of the Edit New menu panel showing the Modern templates section.](../media/content-understanding/content-assembly-edit-template-2.png) 3. To edit a published template or a draft template:
- - For **Published templates**, select **Edit** to open the template studio where you can edit the published template. You can also choose to delete or unpublish the template.
-
+ - For **Published templates**, select **Edit** to open the template studio where you can edit the published template. You can also choose to delete or unpublish the template.
+ ![Screenshot of the Modern templates section showing the published templates.](../media/content-understanding/content-assembly-edit-published.png)
- - For **Draft templates**, select **Edit** to open the template studio where you can edit the draft template. You can also choose to delete or publish the template.
-
+ - For **Draft templates**, select **Edit** to open the template studio where you can edit the draft template. You can also choose to delete or publish the template.
+ ![Screenshot of the Modern templates section showing the draft templates.](../media/content-understanding/content-assembly-edit-draft.png) ## Create a document from a modern template
If you need to edit an existing template or to delete or unpublish a template, f
You can use a *published* modern template to quickly create similar documents without having to start from scratch. To create a document using a published template, follow these steps: 1. From a Sharepoint document library, select **New**, and then select the modern template you want to use.
-
+ ![Screenshot of document library showing the modern template choices on the New menu.](../media/content-understanding/content-assembly-create-document-1.png) 2. The template opens in the template studio.
You can use a *published* modern template to quickly create similar documents wi
- Autofill placeholder values if able to uniquely identify a record for placeholders associated with the same list. > [!NOTE]
+>
> - Currently, only Microsoft Word documents (.docx extension) are supported for creating a template. Before uploading the document, ensure that the Word document doesn't have **Track changes** enabled or comments. If your document contains text placeholders for images, ensure that they are not text-wrapped. We do not support **Content Controls** in Word at the moment. If you want to create a template from a Word document with content controls, please remove them before creating a modern template.
->- The template and the document are associated with one document library. To use the template in another document library, you will need to create the template again in that document library.
->- The uploaded document that is used to create the modern template will be saved as a separate copy and placed in the /forms directory of the document library. The original file on the disk will be unaffected.
->- You can create placeholders for text only. Currently, images, smart art, tables, and bullet lists are not supported.
->- Once a document is created from a template, it is not associated with the template.
---
-
+> - The template and the document are associated with one document library. To use the template in another document library, you will need to create the template again in that document library.
+> - The uploaded document that is used to create the modern template will be saved as a separate copy and placed in the /forms directory of the document library. The original file on the disk will be unaffected.
+> - You can create placeholders for text only. Currently, images, smart art, tables, and bullet lists are not supported.
+> - Once a document is created from a template, it is not associated with the template.
contentunderstanding Create An Extractor https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/contentunderstanding/create-an-extractor.md
audience: admin ms.prod: microsoft-365-enterprise-
+search.appverid:
+ - enabler-strategic - m365initiative-syntex ms.localizationpriority: medium
description: Learn how to create an extractor in Microsoft SharePoint Syntex.
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4CL2G]
-<br/>
+<br/>
Before or after you create a classifier model to automate identification and classification of specific document types, you can optionally choose to add extractors to your model to pull out specific information from these documents. For example, you might want your model not only to identify all *Contract Renewal* documents added to your document library, but also to display the *Service Start date* for each document as a column value in the document library.
-You need to create an extractor for each entity in the document that you want to extract. In our example, we want to extract the **Service Start Date** for each **Contract Renewal** document that is identified by the model. We want to be able to see a view in the document library of all **Contract Renewal** documents, with a column that shows the **Service Start** date value of each document.
+You need to create an extractor for each entity in the document that you want to extract. In our example, we want to extract the **Service Start Date** for each **Contract Renewal** document that is identified by the model. We want to be able to see a view in the document library of all **Contract Renewal** documents, with a column that shows the **Service Start** date value of each document.
> [!NOTE]
-> To create an extractor, you use the same files you previously uploaded to train the classifier.
+> To create an extractor, you use the same files you previously uploaded to train the classifier.
## Name your extractor
You need to create an extractor for each entity in the document that you want to
By default, the column type is **Single line of text**. If you want to change the column type, select **Advanced settings** > **Column type**, and then select the type you want to use.
- ![Screenshot of the Advanced settings portion of the New entity extractor panel showing the Column type option.](../media/content-understanding/advanced-settings-column-type.png)
+ ![Screenshot of the Advanced settings portion of the New entity extractor panel showing the Column type option.](../media/content-understanding/advanced-settings-column-type.png)
> [!NOTE] > For extractors with the column type **Single line of text**, the maximum character limit is 255. Any characters that you type exceeding the limit get truncated.
Creating the extractor opens the extractor page. Here you see a list of your sam
2. Select **Next file** to autosave and open the next file in the list in the viewer. Or select **Save** and then select another file from the **Labeled examples** list. 3. In the viewer, repeat steps 1 and 2, then repeat until you saved the label in all five files.
- ![Advanced settings.](../media/content-understanding/select-service-start-date.png)
+ ![Advanced settings.](../media/content-understanding/select-service-start-date.png)
-
-Once you labeled five files, a notification banner displays informing you to move to training. You can choose to more label more documents or advance to training.
+Once you labeled five files, a notification banner displays informing you to move to training. You can choose to more label more documents or advance to training.
### Use Find to search your file You can use the **Find** feature to search for an entity in your document that you want to label.
- ![Find in file.](../media/content-understanding/find-feature.png)
+ ![Find in file.](../media/content-understanding/find-feature.png)
The Find feature is useful if you're searching a large document or if there are multiple instances of the entity in the document. If you find multiple instances, you can select the one you need in the search results to go to that location in the viewer to label it. ## Add an explanation For our example, we're going to create an explanation that provides a hint about the entity format itself and variations it might have in the sample documents. For example, a date value can be in a number of different formats, such as:+ - 10/14/2019 - October 14, 2019 - Monday, October 14, 2019
To help identify the *Service Start Date* you can create a pattern explanation.
4. Select **Save**. > [!NOTE]
-> For more learn more about explanation types, see [Explanation types](./explanation-types-overview.md).
-
+> For more learn more about explanation types, see [Explanation types](./explanation-types-overview.md).
### Use the Explanation library
-For creating explanations for items such as dates, it's easier to [use the explanation library](./explanation-types-overview.md) than to manually enter all variations. The explanation library is a set of pre-built phrase and pattern explanations. The library tries to provide all formats for common phrase or pattern lists, such as dates, phone numbers, zip codes, and many others.
+For creating explanations for items such as dates, it's easier to [use the explanation library](./explanation-types-overview.md) than to manually enter all variations. The explanation library is a set of pre-built phrase and pattern explanations. The library tries to provide all formats for common phrase or pattern lists, such as dates, phone numbers, zip codes, and many others.
For the *Service Start Date* sample, it's more efficient to use the pre-built explanation for *Date* in the explanation library:
For the *Service Start Date* sample, it's more efficient to use the pre-built ex
2. From the explanation library, select **Date**. You can view all variations of date that are recognized. 3. Select **Add**.
- ![Explanation library.](../media/content-understanding/explanation-library.png)
+ ![Explanation library.](../media/content-understanding/explanation-library.png)
4. On the **Create an explanation** page, the *Date* information from the explanation library auto fills the fields. Select **Save**.
- ![Date.](../media/content-understanding/date-explanation-library.png)
+ ![Date.](../media/content-understanding/date-explanation-library.png)
-## Train the model
+## Train the model
-Saving your explanation starts the training. If your model has enough information to extract the data from your labeled example files, you'll see each file labeled with **Match**.
+Saving your explanation starts the training. If your model has enough information to extract the data from your labeled example files, you'll see each file labeled with **Match**.
-![Match.](../media/content-understanding/match2.png)
+![Match.](../media/content-understanding/match2.png)
If the explanation doesn't have enough information to find the data you want to extract, each file will be labeled with **Mismatch**. You can select **Mismatched** files to see more information about why there was a mismatch. - ## Add another explanation Often the mismatch is an indication that the explanation we provided didn't provide enough information to extract the service start date value to match our labeled files. You might need to edit it, or add another explanation.
For our example, notice that the text string *Start Service date of* always prec
3. Use *Service Start Date of* as the value. 4. Select **Save**.
- ![Prefix string.](../media/content-understanding/prefix-string.png)
+ ![Prefix string.](../media/content-understanding/prefix-string.png)
## Train the model again
-Saving the explanation starts the training again, this time using both explanations in the example. If your model has enough information to extract the data from the labeled example files, you see each file labeled with **Match**.
+Saving the explanation starts the training again, this time using both explanations in the example. If your model has enough information to extract the data from the labeled example files, you see each file labeled with **Match**.
If you again receive a **Mismatch** on your labeled files, you likely need to create another explanation to provide the model more information to identify the document type, or consider making changes to your existing ones. ## Test your model
-If you receive a match on your labeled sample files, you can now test your model on the remaining unlabeled example files. This is optional, but a useful step to evaluate the ΓÇ£fitnessΓÇ¥ or readiness of the model before using it, by testing it on files the model hasnΓÇÖt seen before.
+If you receive a match on your labeled sample files, you can now test your model on the remaining unlabeled example files. This is optional, but a useful step to evaluate the "fitness" or readiness of the model before using it, by testing it on files the model hasn't seen before.
1. From the model home page, select the **Test** tab. This runs the model on your unlabeled sample files. 2. In the **Test files** list, your example files display to show if the model is able to extract the information you need. Use this information to help determine the effectiveness of your classifier in identifying your documents.
- ![Test on your files.](../media/content-understanding/test-filies-extractor.png)
+ ![Test on your files.](../media/content-understanding/test-filies-extractor.png)
### Further refine an extractor
If you have duplicate entities and want to extract only one value or a certain n
1. From the model home page, in the **Entity extractors** section, select the extractor you want to refine, and then select **Refine extracted info**.
- ![Screenshot of the Entity extractors section showing the Refine extracted info option highlighted.](../media/content-understanding/refine-extracted-info.png)
+ ![Screenshot of the Entity extractors section showing the Refine extracted info option highlighted.](../media/content-understanding/refine-extracted-info.png)
2. On the **Refine extracted info** page, select one of the following rules:
If you have duplicate entities and want to extract only one value or a certain n
- Remove duplicate values - Keep one or more of the first lines - Keep one or more of the last lines
-
- ![Screenshot of the Refine extracted info page showing the rules options.](../media/content-understanding/refine-extracted-info-page.png)
+
+ ![Screenshot of the Refine extracted info page showing the rules options.](../media/content-understanding/refine-extracted-info-page.png)
3. Enter the number of lines or values you want to use, and then select **Refine**. 4. If you want to edit a rule by changing the number of lines or values, select the extractor you want to edit, select **Refine extracted info**, change the number, and then select **Save**.
-5. When you test the extractor, you'll be able to see the refinement in the **Refinement result** column of the **Test Files** list.
+5. When you test the extractor, you'll be able to see the refinement in the **Refinement result** column of the **Test Files** list.
- ![Test Files list showing the Refinement result column.](../media/content-understanding/test-filies-extractor-2.png)
+ ![Test Files list showing the Refinement result column.](../media/content-understanding/test-filies-extractor-2.png)
6. If you want to delete a refinement rule on an extractor, select the extractor from which you want to remove the rule, select **Refine extracted info**, and then select **Delete**. ## See Also+ [Create a classifier](create-a-classifier.md) [Explanation types](explanation-types-overview.md)
If you have duplicate entities and want to extract only one value or a certain n
[Document Understanding overview](document-understanding-overview.md)
-[Apply a model](apply-a-model.md)
+[Apply a model](apply-a-model.md)
[SharePoint Syntex Accessibility Mode](accessibility-mode.md)
contentunderstanding Document Understanding Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/contentunderstanding/document-understanding-overview.md
description: Learn about document understanding in Microsoft SharePoint Syntex.
</br>
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4CSu7]
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4CSu7]
</br>
Document understanding models are created and managed in a type of SharePoint si
> [!NOTE] > Read-only or sealed content types cannot be updated, so they can't be used in a model.
-Add *classifiers* and *extractors* to your document understanding models to do the following actions:
+Add *classifiers* and *extractors* to your document understanding models to do the following actions:
- Classifiers are used to identify and classify documents that are uploaded to the document library. For example, a classifier can be "trained" to identify all *contract renewal* documents that are uploaded to the library. The contract renewal content type is defined by you when you create your classifier.
OCR processing works best on documents that meet the following requirements:
- The combined file size of the documents used for training per collection must not exceed 50 MB, and PDF documents shouldn't have more than 500 pages. -- For images, dimensions must be between 50 × 50 and 10,000 × 10,000 pixels.
+- For images, dimensions must be between 50 x 50 and 10,000 x 10,000 pixels.
> [!NOTE] > Images that are very wide or have odd dimensions (for example, floor plans) might get truncated in the OCR process and lose accuracy.
-
+ - For PDF files, dimensions must be at most 17 x 17 inches, corresponding to Legal or A3 paper sizes and smaller. - If scanned from paper documents, scans should be high-quality images.
OCR processing works best on documents that meet the following requirements:
- Must use the Latin alphabet (English characters). > [!NOTE]
-> AI Builder doesn't currently support the following types of form processing input data:<br>- Check boxes or radio buttons<br>- Signatures<br>- Fillable PDFs
+> AI Builder doesn't currently support the following types of form processing input data:
+>
+> - Check boxes or radio buttons
+> - Signatures
+> - Fillable PDFs
### Supported file types
Document understanding models support *all* of the Latin-based languages, includ
- Italian - Spanish - ## See Also+ [Create a classifier](create-a-classifier.md) [Create an extractor](create-an-extractor.md)
Document understanding models support *all* of the Latin-based languages, includ
[Create a form processing model](create-a-form-processing-model.md)
-[Apply a model](apply-a-model.md)
+[Apply a model](apply-a-model.md)
[Difference between a document understanding and a form processing model](difference-between-document-understanding-and-form-processing-model.md)
contentunderstanding Explanation Types Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/contentunderstanding/explanation-types-overview.md
To add a regular expression explanation type:
The following table shows inline character options that currently are not available for use in regular expression patterns.
-|Option |State |Current functionality |
-||||
-|Case sensitivity | Currently not supported. | All matches performed are case-insensitive. |
-|Line anchors | Currently not supported. | Unable to specify a specific position in a string where a match must occur. |
+|Option|State|Current functionality|
+||||
+|Case sensitivity|Currently not supported.|All matches performed are case-insensitive.|
+|Line anchors|Currently not supported.| Unable to specify a specific position in a string where a match must occur.|
## Proximity
Use the proximity explanation to define how far away the phone number explanatio
![Proximity explanation.](../media/content-understanding/proximity.png) > [!NOTE]
-> Regular expressions currently canΓÇÖt be used with the proximity explanation type.
+> Regular expressions currently can't be used with the proximity explanation type.
#### What are tokens?
To use the proximity explanation type, you need to understand what a token is. T
The following table shows examples for how to determine the number of tokens in a phrase. |Phrase|Number of tokens|Explanation|
-|--|--|--|
+||||
|`Dog`|1|A single word with no punctuation or spaces.| |`RMT33W`|1|A record locator number. It might include numbers and letters, but doesn't have punctuation.|
-|`425-555-5555`|5|A phone number. Each punctuation mark is a single token, so `425-555-5555` is 5 tokens:<br>`425`<br>`-`<br>`555`<br>`-`<br>`5555` |
-|`https://luis.ai`|7|`https`<br>`:`<br>`/`<br>`/`<br>`luis`<br>`.`<br>`ai`<br>|
+|`425-555-5555`|5|A phone number. Each punctuation mark is a single token, so `425-555-5555` is 5 tokens:<br>`425`<br>`-`<br>`555`<br>`-`<br>`5555`|
+|`https://luis.ai`|7|`https`<br>`:`<br>`/`<br>`/`<br>`luis`<br>`.`<br>`ai`|
#### Configure the proximity explanation type
You can choose the following options for this setting:
![Custom range.](../media/content-understanding/custom-file.png) In the viewer, you can manually adjust the select box to include the location where the phase occurs. For this setting, you need to select a **Start** and an **End** position. These values represent the number of tokens from the beginning of the document. While you can manually enter in these values, it's easier to manually adjust the select box in the viewer.
-
+ ## Considerations when configuring explanations+ When training a classifier there a few things to keep in mind that will produce more predictable results: -- The more documents you train with, the more accurate the classifier will be. When possible, use more than 5 good documents and use more than 1 bad document. If the libraries youΓÇÖre working with have several different document types in it, several of each type lead to more predictable results.-- Labeling the document plays an important role in the training process. They are used together with explanations to train the model. You may see some anomalies when training a classifier with documents that donΓÇÖt have a lot of content in them. The explanation may not match anything in the document but since it was labeled as a ΓÇ£goodΓÇ¥ document you may see it be a match during training.
+- The more documents you train with, the more accurate the classifier will be. When possible, use more than 5 good documents and use more than 1 bad document. If the libraries you're working with have several different document types in it, several of each type lead to more predictable results.
+- Labeling the document plays an important role in the training process. They are used together with explanations to train the model. You may see some anomalies when training a classifier with documents that don't have a lot of content in them. The explanation may not match anything in the document but since it was labeled as a "good" document you may see it be a match during training.
- When creating explanations, it uses OR logic in combination with the label to determine if it is a match. Regular expression that uses AND logic may be more predictable. Here is a sample regular expression to use on real documents as your training them. Note the text highlighted in red is the phrase(s) you would be looking for. <pre>(?=.*network provider)(?=.*participating providers).*</pre>
-
-- Labels and explanations work together and are used in training the model. ItΓÇÖs not a series of rules that can be de-coupled and precise weights or prediction applied to each variable that has been configured. The greater the variation of documents used in the training will provide more accuracy in the model.+
+- Labels and explanations work together and are used in training the model. It's not a series of rules that can be de-coupled and precise weights or prediction applied to each variable that has been configured. The greater the variation of documents used in the training will provide more accuracy in the model.
### See also
enterprise EU Data Storage Locations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/EU-data-storage-locations.md
ms.localizationpriority: high search.appverid: - MET150-+ - Ent_O365 - Strat_O365_Enterprise
description: "Determine where your Microsoft 365 customer data is stored within
# Data locations for the European Union -- ## Your data is your business
-Microsoft recognizes the importance of maintaining the privacy and confidentiality of your business data. Your data belongs to you, and you can access, modify, or delete it at any time. Microsoft will not use your data without your consent and, when we have your consent, we use your data to provide only the services you have chosen. If you leave one of our services, we ensure your continued ownership of your data, following strict standards and processes to remove the data from our systems.
+Microsoft recognizes the importance of maintaining the privacy and confidentiality of your business data. Your data belongs to you, and you can access, modify, or delete it at any time. Microsoft will not use your data without your consent and, when we have your consent, we use your data to provide only the services you have chosen. If you leave one of our services, we ensure your continued ownership of your data, following strict standards and processes to remove the data from our systems.
->[!Note]
->Customer data (also referred to as ΓÇ£your dataΓÇ¥ or ΓÇ£your business dataΓÇ¥) means all data, including text, sound, video or image files, and software that you provide to Microsoft or thatΓÇÖs provided on your behalf through your use of Microsoft enterprise online services, excluding Microsoft Professional Services. It includes customer content, which is the data you upload for storage or processing and apps you upload for distribution through a Microsoft enterprise cloud service. For example, customer content includes Exchange Online email and attachments, SharePoint Online site content, or instant messaging conversations.
->
+> [!NOTE]
+> Customer data (also referred to as "your data" or "your business data") means all data, including text, sound, video or image files, and software that you provide to Microsoft or that's provided on your behalf through your use of Microsoft enterprise online services, excluding Microsoft Professional Services. It includes customer content, which is the data you upload for storage or processing and apps you upload for distribution through a Microsoft enterprise cloud service. For example, customer content includes Exchange Online email and attachments, SharePoint Online site content, or instant messaging conversations.
## Data storage and processing
-When you use Microsoft 365 services, we start with the assumption that our enterprise customers would like to have their business data stored and processed close to home. Wherever possible, we do just that. To keep your data in datacenters nearest to you, we store your data based on the business location you provide when you create your tenant. To choose storage locations that are meaningful to your organizationΓÇÖs businesses, you may create as many tenants for your organization as you would like.
+When you use Microsoft 365 services, we start with the assumption that our enterprise customers would like to have their business data stored and processed close to home. Wherever possible, we do just that. To keep your data in datacenters nearest to you, we store your data based on the business location you provide when you create your tenant. To choose storage locations that are meaningful to your organization's businesses, you may create as many tenants for your organization as you would like.
### Where EU data is stored
-We have datacenter geos in Germany and France that allow you to store data in your country if your business is located there. Our regional European Union data centers are located in Austria, Finland, France, Ireland, and the Netherlands. Your data for the following services will be hosted in the following locations based on which billing address you choose:
+We have datacenter geos in Germany and France that allow you to store data in your country if your business is located there. Our regional European Union data centers are located in Austria, Finland, France, Ireland, and the Netherlands. Your data for the following services will be hosted in the following locations based on which billing address you choose:
| Service name | Location for tenants created with a billing address in France | Location for tenants created with a billing address in Germany | Location for tenants created with a billing address in all other EU countries |
-|:-|:--|:-|:-|
+|||||
| Exchange Online | France | Germany | European Union | | OneDrive for Business | France | Germany | European Union | | SharePoint Online | France | Germany | European Union |
We have datacenter geos in Germany and France that allow you to store data in yo
| Stream | European Union | European Union | European Union | | Whiteboard | European Union | European Union | European Union | | Forms | European Union | European Union | European Union |
-|||||
-
->[!Note]
->If you have an Office 365 Education subscription with a billing address in France or Germany, your data may be stored in our regional European Union datacenters. For the locations of tenant data outside of the EU, see [Where your Microsoft 365 customer data is stored](o365-data-locations.md).
->
-
+> [!NOTE]
+> If you have an Office 365 Education subscription with a billing address in France or Germany, your data may be stored in our regional European Union datacenters. For the locations of tenant data outside of the EU, see [Where your Microsoft 365 customer data is stored](o365-data-locations.md).
### Where EU data is computed
-When you initiate the use of any of the above services, the computations needed to provide the service for your data stored in one of our regional European datacenters (or in your country) will take place within that same geographic boundary unless a temporary data transfer is needed to perform the computation in a Microsoft datacenter located further away.
+When you initiate the use of any of the above services, the computations needed to provide the service for your data stored in one of our regional European datacenters (or in your country) will take place within that same geographic boundary unless a temporary data transfer is needed to perform the computation in a Microsoft datacenter located further away.
-If a temporary transfer is required, we will always employ state of the art encryption in the transfer and we will always return your data to your chosen data storage location immediately thereafter. We rely on our compliance with European law through the Standard Contractual Clauses (SCCs) for these temporary transfers, along with our supplemental measures to ensure the data is protected.
+If a temporary transfer is required, we will always employ state of the art encryption in the transfer and we will always return your data to your chosen data storage location immediately thereafter. We rely on our compliance with European law through the Standard Contractual Clauses (SCCs) for these temporary transfers, along with our supplemental measures to ensure the data is protected.
To learn more, see [European Union Model Clauses](/compliance/regulatory/offering-EU-Model-Clauses).
->[!Note]
->Customer data for Sway and Workplace Analytics will be stored and computed in the United States if you elect to use these services.
->
-
->[!Note]
->Microsoft 365 services may query and store portions of tenant directory/identity data information in regions other than the EU where necessary to facilitate certain scenarios. For example, in scenarios of cross regional e-mail routing, call routing and authentication, Microsoft 365 systems may need some information about EU recipients to route these requests properly. Microsoft 365 systems also depend on Azure Active Directory for identity and authentication functions. To learn more, see [Identity data storage for European customers in Azure Active Directory](/azure/active-directory/fundamentals/active-directory-data-storage-eu).
+> [!NOTE]
+> Customer data for Sway and Workplace Analytics will be stored and computed in the United States if you elect to use these services.
>
+> Microsoft 365 services may query and store portions of tenant directory/identity data information in regions other than the EU where necessary to facilitate certain scenarios. For example, in scenarios of cross regional e-mail routing, call routing and authentication, Microsoft 365 systems may need some information about EU recipients to route these requests properly. Microsoft 365 systems also depend on Azure Active Directory for identity and authentication functions. To learn more, see [Identity data storage for European customers in Azure Active Directory](/azure/active-directory/fundamentals/active-directory-data-storage-eu).
## How Microsoft protects your data
Microsoft secures your data using multiple layers of security and encryption pro
By default, Microsoft Managed Keys protect your customer data. Data that persists on any physical media is always encrypted using FIPS 140-2 compliant encryption protocols. You can also employ customer-managed keys (CMK), [double encryption](../compliance/double-key-encryption.md), and/or hardware security modules (HSMs) for increased data protection.
-In addition, Microsoft by default uses the [Transport Layer Security (TLS)](https://wikipedia.org/wiki/Transport_Layer_Security) protocol to encrypt data when itΓÇÖs traveling between the cloud services and customers. Microsoft Services negotiate a TLS connection with client systems that connect to Microsoft 365 services.
+In addition, Microsoft by default uses the [Transport Layer Security (TLS)](https://wikipedia.org/wiki/Transport_Layer_Security) protocol to encrypt data when it's traveling between the cloud services and customers. Microsoft Services negotiate a TLS connection with client systems that connect to Microsoft 365 services.
-To prevent unauthorized physical access to datacenters, we employ rigorous operational controls and processes that include 24×7 video monitoring, trained security personnel and processes, and smart card or biometric multifactor access controls. Upon end of life, data disks are shredded and destroyed. If a disk drive used for storage suffers a hardware failure or reaches its end of life, it is securely erased or destroyed. The data on the drive is completely overwritten to ensure the data cannot be recovered by any means. When such devices are decommissioned, they are shredded and destroyed in line with NIST SP 800-88 R1, Guidelines for Media Sanitization. Records of the destruction are retained and reviewed as part of the Microsoft audit and compliance process. All Microsoft 365 services utilize approved media storage and disposal management services.
+To prevent unauthorized physical access to datacenters, we employ rigorous operational controls and processes that include 24x7 video monitoring, trained security personnel and processes, and smart card or biometric multifactor access controls. Upon end of life, data disks are shredded and destroyed. If a disk drive used for storage suffers a hardware failure or reaches its end of life, it is securely erased or destroyed. The data on the drive is completely overwritten to ensure the data cannot be recovered by any means. When such devices are decommissioned, they are shredded and destroyed in line with NIST SP 800-88 R1, Guidelines for Media Sanitization. Records of the destruction are retained and reviewed as part of the Microsoft audit and compliance process. All Microsoft 365 services utilize approved media storage and disposal management services.
### Technical controls
-In addition to the physical and technological protections, Microsoft takes strong measures to help protect your customer data from unauthorized access by Microsoft personnel and subcontractors. Access to customer data by Microsoft operations and support personnel is denied by default. Nearly all service operations performed by Microsoft are fully automated and human involvement is highly controlled and abstracted away from customer data.
+In addition to the physical and technological protections, Microsoft takes strong measures to help protect your customer data from unauthorized access by Microsoft personnel and subcontractors. Access to customer data by Microsoft operations and support personnel is denied by default. Nearly all service operations performed by Microsoft are fully automated and human involvement is highly controlled and abstracted away from customer data.
-Only in rare cases does a Microsoft engineer need access to customer data. Typically this is only necessary if you request MicrosoftΓÇÖs assistance to resolve a customer issue. Access to customer data is highly restricted by role-based access controls, multifactor authentication, data minimization and other controls. All access to customer data is strictly logged, and both Microsoft and third parties perform regular audits (as well as sample audits) to attest that any access is appropriate.
+Only in rare cases does a Microsoft engineer need access to customer data. Typically this is only necessary if you request Microsoft's assistance to resolve a customer issue. Access to customer data is highly restricted by role-based access controls, multifactor authentication, data minimization and other controls. All access to customer data is strictly logged, and both Microsoft and third parties perform regular audits (as well as sample audits) to attest that any access is appropriate.
-Customers can use customer-managed keys to further prevent their data from being readable in case of unauthorized access. Both server-side and client-side encryption can rely on customer-managed keys or customer-provided keys. In either case, Microsoft would not have access to encryption keys and cannot decrypt the data. A SOC audit by an AICPA-accredited auditor twice a year to verifies the effectiveness of our security controls in audit scope. The SOC 2 Type 2 attestation report published by the auditor explains under what circumstances access to customer data can occur and how.
+Customers can use customer-managed keys to further prevent their data from being readable in case of unauthorized access. Both server-side and client-side encryption can rely on customer-managed keys or customer-provided keys. In either case, Microsoft would not have access to encryption keys and cannot decrypt the data. A SOC audit by an AICPA-accredited auditor twice a year to verifies the effectiveness of our security controls in audit scope. The SOC 2 Type 2 attestation report published by the auditor explains under what circumstances access to customer data can occur and how.
In addition to storing and processing your data when you use the online services, Microsoft generates service data to monitor system health and to perform service operations such as troubleshooting. As a privacy protective measure, Microsoft generates and relies upon pseudonymous identifiers in this service generated data to be able to distinguish one user from another without identifying the actual users. Pseudonymous identifiers do not directly identify a person, and the information that enables mapping pseudonymous identifiers to actual users is protected as part of your data.
To learn more, see [Who can access your data](https://www.microsoft.com/trust-ce
## How Microsoft handles government requests
-If a government wants customer data, it must follow applicable legal processes. Microsoft must be served with a warrant or court order for content, or a subpoena for subscriber information or other non-content data.
+If a government wants customer data, it must follow applicable legal processes. Microsoft must be served with a warrant or court order for content, or a subpoena for subscriber information or other non-content data.
-- All requests must target specific accounts and identifiers. -- MicrosoftΓÇÖs legal compliance team reviews all requests to ensure they are valid, rejects those that are not valid, and only provides the data specified.
+- All requests must target specific accounts and identifiers.
+- Microsoft's legal compliance team reviews all requests to ensure they are valid, rejects those that are not valid, and only provides the data specified.
- If Microsoft is compelled by law to disclose customer data, you will be promptly notified and provided with a copy of the request, unless Microsoft is legally prohibited from doing so. - Microsoft conducts a local legal review of each request it receives against local laws and standards. Microsoft also periodically reviews its screening processes around the world to ensure local judicial procedures are being followed and its global human rights statement is being applied.
-For more information on MicrosoftΓÇÖs commitment to challenge orders in line with the EUΓÇÖs GDPR, see [New Steps to Defend Your Data](https://blogs.microsoft.com/on-the-issues/2020/11/19/defending-your-data-edpb-gdpr/).
+For more information on Microsoft's commitment to challenge orders in line with the EU's GDPR, see [New Steps to Defend Your Data](https://blogs.microsoft.com/on-the-issues/2020/11/19/defending-your-data-edpb-gdpr/).
-When governments or law enforcement agencies make a lawful request for customer data, Microsoft is committed to transparency and limits what it discloses. Twice a year, we publish the number of legal demands for customer data that we receive from law enforcement agencies around the world. See [Law Enforcement Requests Report](https://www.microsoft.com/corporate-responsibility/law-enforcement-requests-report). This report does not disclose the specifics of any particular demand, including the customer at issue. Twice a year, we also publish data about the legal demands we receive from the U.S. government. See [US National Security Orders Report](https://www.microsoft.com/corporate-responsibility/us-national-security-orders-report) for the latest report.
+When governments or law enforcement agencies make a lawful request for customer data, Microsoft is committed to transparency and limits what it discloses. Twice a year, we publish the number of legal demands for customer data that we receive from law enforcement agencies around the world. See [Law Enforcement Requests Report](https://www.microsoft.com/corporate-responsibility/law-enforcement-requests-report). This report does not disclose the specifics of any particular demand, including the customer at issue. Twice a year, we also publish data about the legal demands we receive from the U.S. government. See [US National Security Orders Report](https://www.microsoft.com/corporate-responsibility/us-national-security-orders-report) for the latest report.
To learn more, see [Frequently Asked Questions](https://blogs.microsoft.com/datalaw/our-practices/) regarding government and law enforcement requests, including questions about the CLOUD Act. ## Additional resources
-
-- [Trusted data protection](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4FhZn) provides an overview of how Microsoft protects your data when you use Microsoft Online Services and Professional Services. ItΓÇÖs also suggested that you consult the [Microsoft Online Services Terms (OST) and Data Protection Addendum (DPA)](https://www.microsoft.com/licensing/product-licensing/products) that govern your use of these services.-- [Office 365 Data Subject Requests for the GDPR](/compliance/regulatory/gdpr-dsr-Office365) helps you find and act on personal data or personal information to respond to DSRs using Microsoft 365 products, services, and administrative tools. -- [Data Protection Impact Assessments: Guidance for Data Controllers Using Microsoft Office 365](/compliance/regulatory/gdpr-dpia-office365) helps you determine whether your organization needs to draft a DPIA, provides ΓÇ£how toΓÇ¥ guidance, includes a customizable DPIA template document, and provides a DPIA Service Elements Matrix for many Microsoft 365 services.-- [Learn how modules](/learn/paths/audit-safeguard-customer-data/) are designed for people in audit, compliance, risk, and legal roles who seek an overall understanding provide an in-depth review of how Microsoft 365ΓÇÖs fundamental security and privacy practices to safeguard customer data.-- [Microsoft Compliance Offerings](/compliance/regulatory/offering-home) shows how Microsoft 365 services help your organization meet regulatory compliance standards.+
+- [Trusted data protection](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4FhZn) provides an overview of how Microsoft protects your data when you use Microsoft Online Services and Professional Services. It's also suggested that you consult the [Microsoft Online Services Terms (OST) and Data Protection Addendum (DPA)](https://www.microsoft.com/licensing/product-licensing/products) that govern your use of these services.
+- [Office 365 Data Subject Requests for the GDPR](/compliance/regulatory/gdpr-dsr-Office365) helps you find and act on personal data or personal information to respond to DSRs using Microsoft 365 products, services, and administrative tools.
+- [Data Protection Impact Assessments: Guidance for Data Controllers Using Microsoft Office 365](/compliance/regulatory/gdpr-dpia-office365) helps you determine whether your organization needs to draft a DPIA, provides "how to" guidance, includes a customizable DPIA template document, and provides a DPIA Service Elements Matrix for many Microsoft 365 services.
+- [Learn how modules](/learn/paths/audit-safeguard-customer-data/) are designed for people in audit, compliance, risk, and legal roles who seek an overall understanding provide an in-depth review of how Microsoft 365's fundamental security and privacy practices to safeguard customer data.
+- [Microsoft Compliance Offerings](/compliance/regulatory/offering-home) shows how Microsoft 365 services help your organization meet regulatory compliance standards.
enterprise Portallaunchscheduler https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/PortalLaunchScheduler.md
The Portal launch scheduler is designed to help you follow a phased roll-out app
- **Bidirectional**: launch a new modern SharePoint portal to replace an existing SharePoint classic or modern portal - **Redirect to a temporary page**: launch a new modern SharePoint portal with no existing SharePoint portal
-Site permissions must be set up separately from waves as part of the launch. For example, if you are releasing an organization-wide portal, you can set permissions to ΓÇ£Everyone except external users,ΓÇ¥ then separate your users into waves using security groups. Adding a security group to a wave does not give that security group access to the site.
+Site permissions must be set up separately from waves as part of the launch. For example, if you are releasing an organization-wide portal, you can set permissions to "Everyone except external users," then separate your users into waves using security groups. Adding a security group to a wave does not give that security group access to the site.
> [!NOTE] >
Formerly, portal launches could only be scheduled through SharePoint PowerShell.
1. Before using the Portal launch scheduler tool, [add all users who will need access to this site](https://support.microsoft.com/office/share-a-site-958771a8-d041-4eb8-b51c-afea2eae3658) through **Site permissions** as a Site owner, Site member, or Visitor.
-2. Then, start scheduling your portalΓÇÖs launch by accessing the Portal launch scheduler in one of two ways:
+2. Then, start scheduling your portal's launch by accessing the Portal launch scheduler in one of two ways:
**Option 1**: The first few times you edit and republish changes to your home page - or up until home page version 3.0 - you will be prompted to use the Portal launch scheduler tool. Select **Schedule launch** to move forward with scheduling. Or select **Republish** to republish your page edits without scheduling the launch. ![Image of the prompt to use the portal launch scheduler when republishing the home page.](../media/portal-launch-republish-2.png)
- **Option 2**: At any time, you can navigate to the SharePoint communication site home page, select **Settings** and then **Schedule site launch** to schedule your portalΓÇÖs launch.
+ **Option 2**: At any time, you can navigate to the SharePoint communication site home page, select **Settings** and then **Schedule site launch** to schedule your portal's launch.
![Image of the Settings pane with Schedule a site launch highlighted.](../media/portal-launch-settings-2.png)
-3. Next, confirm the portalΓÇÖs health score and make improvements to the portal if needed using the [Page Diagnostics for SharePoint](https://aka.ms/perftool) tool until your portal receives a **Healthy** score. Then, select **Next**.
+3. Next, confirm the portal's health score and make improvements to the portal if needed using the [Page Diagnostics for SharePoint](https://aka.ms/perftool) tool until your portal receives a **Healthy** score. Then, select **Next**.
![Image of the Portal launch scheduler tool.](../media/portal-launch-panel-2.png) > [!NOTE]
- > The site name and description canΓÇÖt be edited from the Portal launch scheduler and instead can be changed by selecting **Settings** and then **Site information** from the home page.
+ > The site name and description can't be edited from the Portal launch scheduler and instead can be changed by selecting **Settings** and then **Site information** from the home page.
4. Select the **Number of expected users** from the drop-down. This figure represents the number of users who will most likely need access to the site. The Portal launch scheduler will automatically determine the ideal number of waves depending on the expected users like this:
Formerly, portal launches could only be scheduled through SharePoint PowerShell.
**Option 2: Send users to an autogenerated temporary page (temporary page redirection)** ΓÇô Use a temporary page redirection should be used when no existing SharePoint portal exists. Users are directed to a new modern SharePoint portal and if a user is in a wave that has not been launched, they will be redirected to a temporary page.
- **Option 3: Send users to an external page** ΓÇô Provide an external URL to a temporary landing page experience until the userΓÇÖs wave is launched.
+ **Option 3: Send users to an external page** ΓÇô Provide an external URL to a temporary landing page experience until the user's wave is launched.
-6. Break up your audience into waves. Add up to 20 security groups per wave. Wave details can be edited up until the launch of each wave. Each wave can last at minimum one day (24 hours) and at most seven days. This allows SharePoint and your technical environment an opportunity to acclimate and scale to the large volume of site users. When scheduling a launch through the UI, the time zone is based on the siteΓÇÖs regional settings.
+6. Break up your audience into waves. Add up to 20 security groups per wave. Wave details can be edited up until the launch of each wave. Each wave can last at minimum one day (24 hours) and at most seven days. This allows SharePoint and your technical environment an opportunity to acclimate and scale to the large volume of site users. When scheduling a launch through the UI, the time zone is based on the site's regional settings.
> [!NOTE] >
Formerly, portal launches could only be scheduled through SharePoint PowerShell.
7. Determine who needs to view the site right away and enter their information into the **Users exempt from waves** field. These users are excluded from waves and will not be redirected before, during, or after the launch. - >[!NOTE]
- > Up to 50 distinct users or security groups max can be added. Use security groups when you need more than 50 individuals to get access to the portal before the waves start launching.
-
-8. Confirm portal launch details and select **Schedule**. Once the launch has been scheduled, any changes to the SharePoint portal home page will need to receive a healthy diagnostic result before the portal launch will resume.
+ > Up to 50 distinct users or security groups max can be added. Use security groups when you need more than 50 individuals to get access to the portal before the waves start launching.
+8. Confirm portal launch details and select **Schedule**. Once the launch has been scheduled, any changes to the SharePoint portal home page will need to receive a healthy diagnostic result before the portal launch will resume.
### Launch a portal with over 100k users
If you are planning to launch a portal with over 100,000 users, submit a support
**Follow these steps:**
-1. As an administrator , click the following link which will populate a help query in the admin center.
+1. As an administrator , click the following link which will populate a help query in the admin center.
[Launch SharePoint Portal with 100k users](https://admin.microsoft.com/AdminPortal/?searchSolutions=Launch%20SharePoint%20Portal%20with%20100k%20users)
-2. At the bottom of the pane, select **Contact Support**, and then select **New Service Request**.
+2. At the bottom of the pane, select **Contact Support**, and then select **New Service Request**.
-3. Under **Description**, enter "Launch SharePoint Portal with 100k users".
+3. Under **Description**, enter "Launch SharePoint Portal with 100k users".
4. Fill out the remaining info, and select **Contact me**.
If you are planning to launch a portal with over 100,000 users, submit a support
## Make changes to a scheduled portal launch
-Launch details can be edited for each wave up until the date of the waveΓÇÖs launch.
+Launch details can be edited for each wave up until the date of the wave's launch.
1. To edit portal launch details, navigate to **Settings** and select **Schedule site launch**. 2. Then, select **Edit**.
Launch details can be edited for each wave up until the date of the waveΓÇÖs lau
Launches scheduled using the Portal launch scheduler tool can be canceled, or deleted, at any time even if some waves have already been launched.
-1. To cancel your portalΓÇÖs launch, navigate to **Settings** and **Schedule site launch**.
+1. To cancel your portal's launch, navigate to **Settings** and **Schedule site launch**.
2. Then, select **Delete** and then when you see the message below select **Delete** again.
The SharePoint Portal launch scheduler tool was originally only available via [S
> [!NOTE] > If you installed a previous version of the SharePoint Online Management Shell, go to Add or remove programs and uninstall "SharePoint Online Management Shell."
- >
+ >
> On the Download Center page, select your language and then click the Download button. You'll be asked to choose between downloading a x64 and x86 .msi file. Download the x64 file if you're running the 64-bit version of Windows or the x86 file if you're running the 32-bit version. If you don't know, see [Which version of Windows operating system am I running?](https://support.microsoft.com/help/13443/windows-which-operating-system). After the file downloads, run it and follow the steps in the Setup Wizard. 2. Connect to SharePoint as a [global admin or SharePoint admin](/sharepoint/sharepoint-admin-role) in Microsoft 365. To learn how, see [Getting started with SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
To see if there are existing portal launch configurations:
The number of waves required depends on your expected launch size. - Less than 10k users: One wave-- 10k to 30k users: Three waves 
+- 10k to 30k users: Three waves
- 30k+ to 100k users: Five waves-- More than 100k users: Five waves and contact your Microsoft account team
+- More than 100k users: Five waves and contact your Microsoft account team
#### Steps for bidirectional redirection
To migrate users from an existing SharePoint site to a new SharePoint site in a
1. Run the following command to designate portal launch waves. ```PowerShell
- New-SPOPortalLaunchWaves -LaunchSiteUrl <object> -RedirectionType Bidirectional -RedirectUrl <string> -ExpectedNumberOfUsers <object> -WaveOverrideUsers <object> -Waves <object>
+ New-SPOPortalLaunchWaves -LaunchSiteUrl <object> -RedirectionType Bidirectional -RedirectUrl <string> -ExpectedNumberOfUsers <object> -WaveOverrideUsers <object> -Waves <object>
``` Example: ```PowerShell
- New-SPOPortalLaunchWaves -LaunchSiteUrl "https://contoso.sharepoint.com/teams/newsite" -RedirectionType Bidirectional -RedirectUrl "https://contoso.sharepoint.com/teams/oldsite" -ExpectedNumberOfUsers 10kTo30kUsers -WaveOverrideUsers "admin@contoso.com" -Waves ' 
- [{Name:"Wave 1", Groups:["Viewers 1"], LaunchDateUtc:"2020/10/14"}, 
- {Name:"Wave 2", Groups:["Viewers 2"], LaunchDateUtc:"2020/10/15"},
- {Name:"Wave 3", Groups:["Viewers 3"], LaunchDateUtc:"2020/10/16"}]'
+ New-SPOPortalLaunchWaves -LaunchSiteUrl "https://contoso.sharepoint.com/teams/newsite" -RedirectionType Bidirectional -RedirectUrl "https://contoso.sharepoint.com/teams/oldsite" -ExpectedNumberOfUsers 10kTo30kUsers -WaveOverrideUsers "admin@contoso.com" -Waves '
+ [{Name:"Wave 1", Groups:["Viewers 1"], LaunchDateUtc:"2020/10/14"},
+ {Name:"Wave 2", Groups:["Viewers 2"], LaunchDateUtc:"2020/10/15"},
+ {Name:"Wave 3", Groups:["Viewers 3"], LaunchDateUtc:"2020/10/16"}]'
``` 2. Complete validation. It can take 5-10 minutes for the redirection to complete its configuration across the service.
Temporary page redirection should be used when no existing SharePoint portal exi
1. Run the following command to designate portal launch waves. ```PowerShell
- New-SPOPortalLaunchWaves -LaunchSiteUrl <object> -RedirectionType ToTemporaryPage -RedirectUrl <string> -ExpectedNumberOfUsers <object> -WaveOverrideUsers <object> -Waves <object>
+ New-SPOPortalLaunchWaves -LaunchSiteUrl <object> -RedirectionType ToTemporaryPage -RedirectUrl <string> -ExpectedNumberOfUsers <object> -WaveOverrideUsers <object> -Waves <object>
``` Example: ```PowerShell
- New-SPOPortalLaunchWaves -LaunchSiteUrl "https://contoso.sharepoint.com/teams/newsite" -RedirectionType ToTemporaryPage -RedirectUrl "https://portal.contoso.com/UnderConstruction.aspx" -ExpectedNumberOfUsers 10kTo30kUsers -WaveOverrideUsers "admin@contoso.com" -Waves ' 
- [{Name:"Wave 1", Groups:["Viewers 1"], LaunchDateUtc:"2020/10/14"}, 
- {Name:"Wave 2", Groups:["Viewers 2"], LaunchDateUtc:"2020/10/15"},
- {Name:"Wave 3", Groups:["Viewers 3"], LaunchDateUtc:"2020/10/16"}]'
+ New-SPOPortalLaunchWaves -LaunchSiteUrl "https://contoso.sharepoint.com/teams/newsite" -RedirectionType ToTemporaryPage -RedirectUrl "https://portal.contoso.com/UnderConstruction.aspx" -ExpectedNumberOfUsers 10kTo30kUsers -WaveOverrideUsers "admin@contoso.com" -Waves '
+ [{Name:"Wave 1", Groups:["Viewers 1"], LaunchDateUtc:"2020/10/14"},
+ {Name:"Wave 2", Groups:["Viewers 2"], LaunchDateUtc:"2020/10/15"},
+ {Name:"Wave 3", Groups:["Viewers 3"], LaunchDateUtc:"2020/10/16"}]'
``` 2. Complete validation. It can take 5-10 minutes for the redirection to complete its configuration across the service.
enterprise Assign Licenses To User Accounts With Microsoft 365 Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/assign-licenses-to-user-accounts-with-microsoft-365-powershell.md
User accounts must first be assigned a location. Specifying a location is a requ
Accounts synchronized from your on-premises Active Directory Domain Services do not by default have a location specified. You can configure a location for these accounts from: - The Microsoft 365 admin center
+- [PowerShell](configure-user-account-properties-with-microsoft-365-powershell.md)
+- The [Azure portal](/azure/active-directory/fundamentals/active-directory-users-profile-azure-portal) (**Active Directory** > **Users** > user account > **Profile** > **Contact info** > **Country or region**).
>[!Note] >[Learn how to assign licenses to user accounts](../admin/manage/assign-licenses-to-users.md) with the Microsoft 365 admin center. For a list of additional resources, see [Manage users and groups](/admin). >
+## Use the Microsoft Graph PowerShell SDK
+
+First, [connect to your Microsoft 365 tenant](/graph/powershell/get-started#authentication).
+
+Assigning and removing licenses for a user requires the User.ReadWrite.All permission scope or one of the other permissions listed in the ['Assign license' Graph API reference page](/graph/api/user-assignlicense).
+
+The Organization.Read.All permission scope is required to read the licenses available in the tenant.
+
+```powershell
+Connect-Graph -Scopes User.ReadWrite.All, Organization.Read.All
+```
+
+Run the `Get-MgSubscribedSku` command to view the available licensing plans and the number of available licenses in each plan in your organization. The number of available licenses in each plan is **ActiveUnits** - **WarningUnits** - **ConsumedUnits**. For more information about licensing plans, licenses, and services, see [View licenses and services with PowerShell](view-licenses-and-services-with-microsoft-365-powershell.md).
+
+To find the unlicensed accounts in your organization, run this command.
+
+```powershell
+Get-MgUser -Filter 'assignedLicenses/$count eq 0' -ConsistencyLevel eventual -CountVariable unlicensedUserCount -All
+```
+
+You can only assign licenses to user accounts that have the **UsageLocation** property set to a valid ISO 3166-1 alpha-2 country code. For example, US for the United States, and FR for France. Some Microsoft 365 services aren't available in certain countries. For more information, see [About license restrictions](https://go.microsoft.com/fwlink/p/?LinkId=691730).
+
+To find accounts that don't have a **UsageLocation** value, run this command.
+
+```powershell
+Get-MgUser -Select Id,DisplayName,Mail,UserPrincipalName,UsageLocation,UserType | where { $_.UsageLocation -eq $null -and $_.UserType -eq 'Member' }
+```
+
+To set the **UsageLocation** value on an account, run this command.
+
+```powershell
+$userUPN="<user sign-in name (UPN)>"
+$userLoc="<ISO 3166-1 alpha-2 country code>"
+
+Update-MgUser -UserId $userUPN -UsageLocation $userLoc
+```
+
+For example:
+
+```powershell
+Update-MgUser -UserId "belindan@litwareinc.com" -UsageLocation US
+```
+
+If you use the **Get-MgUser** cmdlet without using the **-All** parameter, only the first 100 accounts are returned.
+
+### Assigning licenses to user accounts
+
+To assign a license to a user, use the following command in PowerShell.
+
+```powershell
+Set-MgUserLicense -UserId $userUPN -AddLicenses @{SkuId = "<SkuId>"} -RemoveLicenses @()
+```
+
+This example assigns a license from the **SPE_E5** (Microsoft 365 E5) licensing plan to the unlicensed user **belindan\@litwareinc.com**:
+
+```powershell
+$e5Sku = Get-MgSubscribedSku -All | Where SkuPartNumber -eq 'SPE_E5'
+Set-MgUserLicense -UserId "belindan@litwareinc.com" -AddLicenses @{SkuId = $e5Sku.SkuId} -RemoveLicenses @()
+```
+
+This example assigns **SPE_E5** (Microsoft 365 E5) and **EMSPREMIUM** (ENTERPRISE MOBILITY + SECURITY E5) to the user **belindan\@litwareinc.com**:
+
+```powershell
+$e5Sku = Get-MgSubscribedSku -All | Where SkuPartNumber -eq 'SPE_E5'
+$e5EmsSku = Get-MgSubscribedSku -All | Where SkuPartNumber -eq 'EMSPREMIUM'
+$addLicenses = @(
+ @{SkuId = $e5Sku.SkuId},
+ @{SkuId = $e5EmsSku.SkuId}
+)
+
+Set-MgUserLicense -UserId "belinda@litwareinc.com" -AddLicenses $addLicenses -RemoveLicenses @()
+```
+
+This example assigns **SPE_E5** (Microsoft 365 E5) with the **MICROSOFTBOOKINGS** (Microsoft Bookings) and **LOCKBOX_ENTERPRISE** (Customer LockBox) services turned off:
+
+```powershell
+$e5Sku = Get-MgSubscribedSku -All | Where SkuPartNumber -eq 'SPE_E5'
+$disabledPlans = $e5Sku.ServicePlans | `
+ Where ServicePlanName -in ("LOCKBOX_ENTERPRISE", "MICROSOFTBOOKINGS") | `
+ Select -ExpandProperty ServicePlanId
+
+$addLicenses = @(
+ @{
+ SkuId = $e5Sku.SkuId
+ DisabledPlans = $disabledPlans
+ }
+)
+
+Set-MgUserLicense -UserId "belinda@litwareinc.com" -AddLicenses $addLicenses -RemoveLicenses @()
+```
+
+This example updates a user with **SPE_E5** (Microsoft 365 E5) and turns off the Sway and Forms service plans while leaving the user's existing disabled plans in their current state:
+
+```powershell
+$userLicense = Get-MgUserLicenseDetail -UserId "belinda@fdoau.onmicrosoft.com"
+$userDisabledPlans = $userLicense.ServicePlans | `
+ Where ProvisioningStatus -eq "Disabled" | `
+ Select -ExpandProperty ServicePlanId
+
+$e5Sku = Get-MgSubscribedSku -All | Where SkuPartNumber -eq 'SPE_E5'
+$newDisabledPlans = $e5Sku.ServicePlans | `
+ Where ServicePlanName -in ("SWAY", "FORMS_PLAN_E5") | `
+ Select -ExpandProperty ServicePlanId
+
+$disabledPlans = ($userDisabledPlans + $newDisabledPlans) | Select -Unique
+
+$addLicenses = @(
+ @{
+ SkuId = $e5Sku.SkuId
+ DisabledPlans = $disabledPlans
+ }
+)
+
+Set-MgUserLicense -UserId "belinda@litwareinc.onmicrosoft.com" -AddLicenses $addLicenses -RemoveLicenses @()
+```
+
+### Assign licenses to a user by copying the license assignment from another user
+
+This example assigns **jamesp\@litwareinc.com** with the same licensing plan that has been applied to **belindan\@litwareinc.com**:
+
+```powershell
+$mgUser = Get-MgUser -UserId "belindan@litwareinc.com"
+Set-MgUserLicense -UserId "jamesp@litwareinc.com" -AddLicenses $mgUser.AssignedLicenses -RemoveLicenses @()
+```
+
+### Move a user to a different subscription (license plan)
+
+This example upgrades a user from the **SPE_E3** (Microsoft 365 E3) licensing plan to the **SPE_E5** (Microsoft 365 E5) licensing plan:
+
+```powershell
+$e3Sku = Get-MgSubscribedSku -All | Where SkuPartNumber -eq 'SPE_E3'
+$e5Sku = Get-MgSubscribedSku -All | Where SkuPartNumber -eq 'SPE_E5'
+
+# Unassign E3
+Set-MgUserLicense -UserId "belindan@litwareinc.com" -AddLicenses @{} -RemoveLicenses @($e3Sku.SkuId)
+# Assign E5
+Set-MgUserLicense -UserId "belindan@litwareinc.com" -AddLicenses @{SkuId = $e5Sku.SkuId} -RemoveLicenses @()
+```
+
+You can verify the change in subscription for the user account with this command.
+
+```powershell
+Get-MgUserLicenseDetail -UserId "belindan@litwareinc.com"
+```
+ ## Use the Azure Active Directory PowerShell for Graph module
+>[!Note]
+>The Set-AzureADUserLicense cmdlet is scheduled to be retired. Please migrate your scripts to the Microsoft Graph SDK's Set-MgUserLicense cmdlet as described above. For more information, see [Migrate your apps to access the license managements APIs from Microsoft Graph](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/migrate-your-apps-to-access-the-license-managements-apis-from/ba-p/2464366).
+>
+ First, [connect to your Microsoft 365 tenant](connect-to-microsoft-365-powershell.md#connect-with-the-azure-active-directory-powershell-for-graph-module).
Set-AzureADUserLicense -ObjectId $userUPN -AssignedLicenses $LicensesToAssign
## Use the Microsoft Azure Active Directory Module for Windows PowerShell
-Please note that we will begin to deprecate this module when the functionality of this module is available in the newer [Azure Active Directory PowerShell for Graph](/powershell/azuread/v2/azureactivedirectory) module. We advise customers who are creating new PowerShell scripts to use the newer module instead of this module.
+>[!Note]
+>The Set-MsolUserLicense and New-MsolUser (-LicenseAssignment) cmdlets are scheduled to be retired. Please migrate your scripts to the Microsoft Graph SDK's Set-MgUserLicense cmdlet as described above. For more information, see [Migrate your apps to access the license managements APIs from Microsoft Graph](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/migrate-your-apps-to-access-the-license-managements-apis-from/ba-p/2464366).
+>
First, [connect to your Microsoft 365 tenant](connect-to-microsoft-365-powershell.md#connect-with-the-microsoft-azure-active-directory-module-for-windows-powershell).
enterprise Configure Search For Multi Geo https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/configure-search-for-multi-geo.md
Some search features you might be familiar with, work differently in a multi-geo
</tr> <tr class="even"> <td align="left">Search refiners</td>
-<td align="left">Search returns refiners from all the geo locations of a tenant and then aggregates them. The aggregation is a best effort, meaning that the refiner counts might not be 100% accurate. For most search-driven scenarios, this accuracy is sufficient.
+<td align="left">Search returns refiners from all the geo locations of a tenant and then aggregates them. The aggregation is a best effort, meaning that the refiner counts might not be 100% accurate. For most search-driven scenarios, this accuracy is sufficient.
</td> <td align="left">For search-driven applications that depend on refiner completeness, query each geo location independently.</td> </tr>
Each Search Center has several verticals and you have to set up each vertical in
<span id="_Get_custom_search" class="anchor"><span id="_Ref501388387" class="anchor"></span></span> ## Get custom search applications to show results from all or some geo locations
-Custom search applications get results from all, or some, geo locations by specifying query parameters with the request to the SharePoint Search REST API. Depending on the query parameters, the query is fanned out to all geo locations, or to some geo locations. For example, if you only need to query a subset of geo locations to find relevant information, you can control the fan out to only these. If the request succeeds, the SharePoint Search REST API returns response data.
+Custom search applications get results from all, or some, geo locations by specifying query parameters with the request to the SharePoint Search REST API. Depending on the query parameters, the query is fanned out to all geo locations, or to some geo locations. For example, if you only need to query a subset of geo locations to find relevant information, you can control the fan out to only these. If the request succeeds, the SharePoint Search REST API returns response data.
### Requirement
enterprise Deploy Update Channels Examples https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/deploy-update-channels-examples.md
Choosing which update channels to use for Windows 10 and Microsoft 365 Apps can
## Pre-release channels
-<br>
-
-****
- |Customer/Channel Offering|Windows 10|Microsoft 365 Apps for Enterprise (Windows 10)|
-|:-|:-|:--|
-|Right for highly technical users and developers. <p> Be the first to access the latest builds earliest in the development cycle with the newest code. <p> There will be rough edges and some instability.|Dev|N/A|
-|Right for early adopters and IT Pros who want more reliable builds that are still in development. <p> See whatΓÇÖs coming up next and help validate new features.|Beta Channel|Beta Channel|
-|Right for those who want early access to upcoming releases. <p> Where companies preview and validate upcoming releases before broad deployment. <p> These are supported.|Release Preview|Current Channel (Preview) <p> Semi-Annual Enterprise Channel (Preview)|
-|
+||||
+|Right for highly technical users and developers. <br/><br/> Be the first to access the latest builds earliest in the development cycle with the newest code. <br/><br/> There will be rough edges and some instability.|Dev|N/A|
+|Right for early adopters and IT Pros who want more reliable builds that are still in development. <br/><br/> See what"s coming up next and help validate new features.|Beta Channel|Beta Channel|
+|Right for those who want early access to upcoming releases. <br/><br/> Where companies preview and validate upcoming releases before broad deployment. <br/><br/> These are supported.|Release Preview|Current Channel (Preview) <br/><br/> Semi-Annual Enterprise Channel (Preview)|
## Production channels for broad deployment Click the link in the **Example** column to step through deployment stages and groups for an example organization.
-<br>
-
-****
- |Customer/Channel Offering|Windows 10|Microsoft 365 Apps for Enterprise (Windows 10)|Example|
-|:-|:-|:--|:-|
-|Right for customers who want the latest releases as soon as theyΓÇÖre ready.|Semi-Annual Channel|[Current Channel](/deployoffice/overview-update-channels#current-channel-overview)|[Latest releases](deploy-update-channels-examples-rapid-deploy.md)|
-|Right for enterprises who want the latest release with more predictability.|Semi-Annual Channel|[Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview)||
+|||||
+|Right for customers who want the latest releases as soon as they're ready.|Semi-Annual Channel|[Current Channel](/deployoffice/overview-update-channels#current-channel-overview)|[Latest releases](deploy-update-channels-examples-rapid-deploy.md)|
+|Right for enterprises who want the latest release with more predictability.|Semi-Annual Channel|[Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview)||
|Right for enterprises with need for extensive IT testing before each update.|Semi-Annual Channel|[Semi-Annual Enterprise Channel](/deployoffice/overview-update-channels#semi-annual-enterprise-channel-overview)||
-|
## See also
enterprise Disable Access To Services With Microsoft 365 Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/disable-access-to-services-with-microsoft-365-powershell.md
When a Microsoft 365 account is assigned a license from a licensing plan, Micros
>There are Microsoft 365 service dependencies that can prevent you from disabling a specified service when other services depend on it. >
+## Use the Microsoft Graph PowerShell SDK
+
+First, [connect to your Microsoft 365 tenant](/graph/powershell/get-started#authentication).
+
+Assigning and removing licenses for a user requires the User.ReadWrite.All permission scope or one of the other permissions listed in the ['Assign license' Graph API reference page](/graph/api/user-assignlicense).
+
+The Organization.Read.All permission scope is required to read the licenses available in the tenant.
+
+```powershell
+Connect-Graph -Scopes User.ReadWrite.All, Organization.Read.All
+```
+
+Next, use this command to view your available licensing plans, also known as SkuPartNumber:
+
+```powershell
+Get-MgSubscribedSku | Select SkuId, SkuPartNumber, ServicePlans | Sort SkuPartNumber
+```
+
+For more information, see [View licenses and services with PowerShell](view-licenses-and-services-with-microsoft-365-powershell.md).
+
+To see the before and after results of the procedures in this topic, see [View account license and service details with PowerShell](view-account-license-and-service-details-with-microsoft-365-powershell.md).
+
+### Disable specific Microsoft 365 services for specific users for a specific licensing plan
+
+To disable a specific set of Microsoft 365 services for users for a specific licensing plan, perform the following steps:
+
+#### Step 1: Identify the undesired services in the licensing plan by using the following syntax:
+
+First list the licensing plans available in your tenant using the following command.
+
+```powershell
+Get-MgSubscribedSku | Select SkuPartNumber
+
+SkuPartNumber
+-
+EMSPREMIUM
+SPE_E5
+RIGHTSMANAGEMENT_ADHOC
+
+$LO = New-MsolLicenseOptions -AccountSkuId <AccountSkuId> -DisabledPlans "<UndesiredService1>", "<UndesiredService2>"...
+```
+
+Next, use the SkuPartNumber from the command above, list the service plans available for a given license plan (Sku).
+
+The following example lists all the service plans available for **SPE_E5** (Microsoft 365 E5).
+
+```powershell
+Get-MgSubscribedSku -All | Where SkuPartNumber -eq 'SPE_E5' | select -ExpandProperty ServicePlans
+```
+
+```text
+AppliesTo ProvisioningStatus ServicePlanId ServicePlanName
+ -
+User Success b21a6b06-1988-436e-a07b-51ec6d9f52ad PROJECT_O365_P3
+User Success 64bfac92-2b17-4482-b5e5-a0304429de3e MICROSOFTENDPOINTDLP
+User Success 199a5c09-e0ca-4e37-8f7c-b05d533e1ea2 MICROSOFTBOOKINGS
+User Success 6db1f1db-2b46-403f-be40-e39395f08dbb CUSTOMER_KEY
+User Success 4a51bca5-1eff-43f5-878c-177680f191af WHITEBOARD_PLAN3
+User Success 07699545-9485-468e-95b6-2fca3738be01 FLOW_O365_P3
+User Success 9c0dab89-a30c-4117-86e7-97bda240acd2 POWERAPPS_O365_P3
+User Success e212cbc7-0961-4c40-9825-01117710dcb1 FORMS_PLAN_E5
+User Success 57ff2da0-773e-42df-b2af-ffb7a2317929 TEAMS1
+User Success 21b439ba-a0ca-424f-a6cc-52f954a5b111 WIN10_PRO_ENT_SUB
+User Success eec0eb4f-6444-4f95-aba0-50c24d67f998 AAD_PREMIUM_P2
+User Success c1ec4a95-1f05-45b3-a911-aa3fa01094f5 INTUNE_A
+User Success 7547a3fe-08ee-4ccb-b430-5077c5041653 YAMMER_ENTERPRISE
+User Success a23b959c-7ce8-4e57-9140-b90eb88a9e97 SWAY
+User Success e95bec33-7c88-4a70-8e19-b10bd9d0c014 SHAREPOINTWAC
+User Success 5dbe027f-2339-4123-9542-606e4d348a72 SHAREPOINTENTERPRISE
+User Success b737dad2-2f6c-4c65-90e3-ca563267e8b9 PROJECTWORKMANAGEMENT
+User Success 43de0ff5-c92c-492b-9116-175376d08c38 OFFICESUBSCRIPTION
+User Success 0feaeb32-d00e-4d66-bd5a-43b5b83db82c MCOSTANDARD
+User Success 9f431833-0334-42de-a7dc-70aa40db46db LOCKBOX_ENTERPRISE
+User Success efb87545-963c-4e0d-99df-69c6916d9eb0 EXCHANGE_S_ENTERPRISE
+```
+
+For a complete list of license plans (also known as product names), their included service plans, and their corresponding friendly names, see [Product names and service plan identifiers for licensing](/azure/active-directory/users-groups-roles/licensing-service-plan-reference). (Search using the ServicePlanId to lookup service plan's corresponding friendly name).
+
+The following example assigns **SPE_E5** (Microsoft 365 E5) with the **MICROSOFTBOOKINGS** (Microsoft Bookings) and **LOCKBOX_ENTERPRISE** (Customer LockBox) services turned off:
+
+```powershell
+$e5Sku = Get-MgSubscribedSku -All | Where SkuPartNumber -eq 'SPE_E5'
+$disabledPlans = $e5Sku.ServicePlans | `
+ Where ServicePlanName -in ("LOCKBOX_ENTERPRISE", "MICROSOFTBOOKINGS") | `
+ Select -ExpandProperty ServicePlanId
+
+$addLicenses = @(
+ @{
+ SkuId = $e5Sku.SkuId
+ DisabledPlans = $disabledPlans
+ }
+)
+
+Set-MgUserLicense -UserId "belinda@litwareinc.com" -AddLicenses $addLicenses -RemoveLicenses @()
+```
+
+The DisabledPlans property of the AddLicenses parameter in Set-MgUserLicense will overwrite the user's existing DisabledPlans value. To preserve the state of existing service plans, the user's current state of service plans must be merged with the new plans that are going to be disabled.
+
+Failing to include the existing DisabledPlans will result in the user's previously disabled plan being enabled.
+
+The following example updates a user with **SPE_E5** (Microsoft 365 E5) and turns off the Sway and Forms service plans while leaving the user's existing disabled plans in their current state:
+
+```powershell
+## Get the services that have already been disabled for the user.
+$userLicense = Get-MgUserLicenseDetail -UserId "belinda@fdoau.onmicrosoft.com"
+$userDisabledPlans = $userLicense.ServicePlans | `
+ Where ProvisioningStatus -eq "Disabled" | `
+ Select -ExpandProperty ServicePlanId
+
+## Get the new service plans that are going to be disabled
+$e5Sku = Get-MgSubscribedSku -All | Where SkuPartNumber -eq 'SPE_E5'
+$newDisabledPlans = $e5Sku.ServicePlans | `
+ Where ServicePlanName -in ("SWAY", "FORMS_PLAN_E5") | `
+ Select -ExpandProperty ServicePlanId
+
+## Merge the new plans that are to be disabled with the user's current state of disabled plans
+$disabledPlans = ($userDisabledPlans + $newDisabledPlans) | Select -Unique
+
+$addLicenses = @(
+ @{
+ SkuId = $e5Sku.SkuId
+ DisabledPlans = $disabledPlans
+ }
+)
+## Update user's license
+Set-MgUserLicense -UserId "belinda@litwareinc.onmicrosoft.com" -AddLicenses $addLicenses -RemoveLicenses @()
+```
+ ## Use the Microsoft Azure Active Directory Module for Windows PowerShell First, [connect to your Microsoft 365 tenant](connect-to-microsoft-365-powershell.md#connect-with-the-microsoft-azure-active-directory-module-for-windows-powershell).
enterprise Exchange 2007 End Of Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/exchange-2007-end-of-support.md
description: "Learn about your options after Exchange Server 2007 end of support
*This article applies to both Microsoft 365 Enterprise and Office 365 Enterprise.* Exchange Server 2007 reached end of support in April 2017. If you haven't started your migration from Exchange 2007 to Microsoft 365, Office 365, or Exchange 2016, now's the time to start planning.
-
+ ## What does *end of support* mean? Exchange Server, like almost all Microsoft products, has a support lifecycle during which we provide new features, bug fixes, security fixes, and so on. This lifecycle typically lasts for 10 years from the product's initial release. The end of this lifecycle is known as the product's end of support. Since Exchange 2007 reached its end of support on April 11, 2017, Microsoft no longer provides:
-
+ - Technical support for problems that may occur.
-
+ - Bug fixes for issues that may impact the stability and usability of the server.
-
+ - Security fixes for vulnerabilities that may make the server vulnerable to security breaches.
-
+ - Time zone updates.
-
+ Your installation of Exchange 2007 will continue to run after the end-of-support date. But because there are no new updates or support, we strongly recommend that you migrate from Exchange 2007 as soon as possible.
-
+ For more information about Office 2007 servers nearing the end of support, see [Plan your upgrade from Office 2007 servers and products](upgrade-from-office-2007-servers-and-products.md).
-
+ ## What are my options? You can:
-
+ - Migrate to Microsoft 365 by using cutover, staged, or hybrid migration.
-
+ - Migrate your Exchange 2007 servers to a newer version of Exchange on your on-premises servers.
-
+ The following sections explore each option in more detail.
-
+ ### Migrate to Microsoft 365 Migrating your email to Microsoft 365 is the best and simplest option to help retire your Exchange 2007 deployment. With a migration to Microsoft 365, you can make a single hop from 10-year-old technology to state-of-the-art features, including:
-
+ - Compliance capabilities such as Retention Policies, In-Place and Litigation Hold, in-place eDiscovery, and more
-
+ - Microsoft 365 Groups
-
+ - Focused Inbox
-
+ - MyAnalytics
-
+ - REST APIs for programmatic access to email, calendars, contacts, and so on
-
+ Microsoft 365 also gets new features and experiences first, so you and your users can usually start using them right away. And you won't have to worry about:
-
+ - Purchasing and maintaining hardware.
-
+ - Paying to heat and cool your servers.
-
+ - Keeping up to date on security, product, and time-zone fixes.
-
+ - Maintaining storage and software to support compliance requirements.
-
+ - Upgrading to a new version of Exchange. With Microsoft 365, you're always on the latest version of Exchange.
-
+ #### How should I migrate to Microsoft 365? You have a few migration options. You need to consider a few things, including:
You have a few migration options. You need to consider a few things, including:
- Whether you need seamless integration between your on-premises installation and Microsoft 365 during the migration. This table shows your migration options and the most important factors that determine which method to use:
-
-
-|**Migration option**|**Organization size**|**Duration**|
-|:--|:--|:--|
-|Cutover migration <br/> |Fewer than 150 seats <br/> |A week or less <br/> |
-|Staged migration <br/> |More than 150 seats <br/> |A few weeks <br/> |
-|Full hybrid migration <br/> |Several hundred to thousands of seats <br/> |A few months or more <br/> |
-
-The following sections provide an overview of these methods. For more detail, see [Decide on a migration path](https://support.office.com/article/Decide-on-a-migration-path-0d4f2396-9cef-43b8-9bd6-306d01df1e27).
-
+
+|Migration option|Organization size|Duration|
+||||
+|Cutover migration|Fewer than 150 seats|A week or less|
+|Staged migration|More than 150 seats|A few weeks|
+|Full hybrid migration|Several hundred to thousands of seats|A few months or more|
+
+The following sections provide an overview of these methods. For more detail, see [Decide on a migration path](https://support.office.com/article/Decide-on-a-migration-path-0d4f2396-9cef-43b8-9bd6-306d01df1e27).
+ #### Cutover migration In a cutover migration, you migrate all your mailboxes, distribution groups, contacts, and so on, to Microsoft 365 at a preselected date and time. After the migration is complete, you shut down your on-premises Exchange servers and start using Microsoft 365 exclusively.
-
-Cutover migration is great for small organizations that don't have many mailboxes, want to get to Microsoft 365 quickly, and don't want to deal with some of the complexities of the other methods. But it should be completed in a week or less, and it requires users to reconfigure their Outlook profiles. Cutover migration can handle up to 2,000 mailboxes, but we strongly recommend you use it to migrate a maximum of 150 mailboxes. If you try to migrate more, you could run out of time to transfer all the mailboxes before your deadline, and your IT support staff may get overwhelmed with requests to help users reconfigure Outlook.
-
+
+Cutover migration is great for small organizations that don't have many mailboxes, want to get to Microsoft 365 quickly, and don't want to deal with some of the complexities of the other methods. But it should be completed in a week or less, and it requires users to reconfigure their Outlook profiles. Cutover migration can handle up to 2,000 mailboxes, but we strongly recommend you use it to migrate a maximum of 150 mailboxes. If you try to migrate more, you could run out of time to transfer all the mailboxes before your deadline, and your IT support staff may get overwhelmed with requests to help users reconfigure Outlook.
+ If you're thinking about doing a cutover migration, here are things to consider:
-
+ - Microsoft 365 will need to connect to your Exchange 2007 servers using Outlook Anywhere over TCP port 443.
-
+ - All on-premises mailboxes will be moved to Microsoft 365.
-
+ - You'll need an on-premises administrator account that has read access to your users' mailboxes.
-
+ - The Exchange 2007 accepted domains that you want to use in Microsoft 365 need to be added as verified domains in the service.
-
+ - Between the time you start the migration and when you begin the completion phase, Microsoft 365 will periodically synchronize the Microsoft 365 and on-premises mailboxes. This lets you complete the migration without worrying about email being left behind in your on-premises mailboxes.
-
+ - Users will receive new temporary passwords for their Microsoft 365 accounts. They'll need to change their password when they sign in to their mailbox for the first time.
-
+ - You'll need a Microsoft 365 license that includes Exchange Online for each user mailbox you migrate.
-
+ - Users will need to set up a new Outlook profile on each of their devices and download their email again. The amount of email that Outlook will download can vary. For more information, see [Change how much mail to keep offline](https://support.office.com/article/Change-how-much-mail-to-keep-offline-f3a1251c-6dd5-4208-aef9-7c8c9522d633?ui=en-US&amp;rs=en-US&amp;ad=US&amp;fromAR=1).
-
+ For more information about cutover migration, see:
-
+ - [What you need to know about a cutover email migration](https://support.office.com/article/What-you-need-to-know-about-a-cutover-email-migration-to-Office-365-961978ef-f434-472d-a811-1801733869da)
-
+ - [Perform a cutover migration of email](https://support.office.com/article/Perform-a-cutover-migration-of-email-to-Office-365-9496e93c-1e59-41a8-9bb3-6e8df0cd81b4)
-
+ #### Staged migration In a staged migration, you have a few hundred or a few thousand mailboxes that you want to migrate to Microsoft 365, need to take a week or more to complete the migration, and don't need any of advanced hybrid migration features like shared Free/Busy calendar information.
-
+ Staged migration is great for organizations that need to take more time to migrate their mailboxes to Microsoft 365 but still plan to complete the migration within a few weeks. You can migrate mailboxes in batches. You control how many and which mailboxes are migrated at a given time. You might batch mailboxes of users in the same department, for example, to make sure they're all moved at the same time. Or, you might leave executive mailboxes until the last batch. As with cutover migrations, your users will need to recreate their Outlook profiles.
-
+ If you're thinking about doing a staged migration, here are things to consider:
-
+ - Microsoft 365 will need to connect to your Exchange 2007 servers by using Outlook Anywhere over TCP port 443.
-
+ - You'll need an on-premises administrator account that has read access to your users' mailboxes.
-
+ - The Exchange 2007 accepted domains that you plan to use in Microsoft 365 need to be added as verified domains in the service.
-
+ - You'll need to create a CSV file with the full name and email address of each mailbox that you plan to migrate in a batch. You'll also need to include a new password for each mailbox that you're migrating, and send that password to each user. The user will be prompted to change the password the first time that they sign in to their new Microsoft 365 mailbox.
-
+ - Between the time you start the migration batch and when you begin the completion phase, Microsoft 365 will periodically synchronize the Microsoft 365 and on-premises mailboxes included in the batch. This lets you complete the migration without worrying about email being left behind in your on-premises mailboxes.
-
+ - You'll need a Microsoft 365 license that includes Exchange Online for each user mailbox you migrate.
-
+ - Users will need to set up a new Outlook profile on each of their devices and download their email again. The amount of email that Outlook will download can vary. For more information, see [Change how much mail to keep offline](https://support.office.com/article/Change-how-much-mail-to-keep-offline-f3a1251c-6dd5-4208-aef9-7c8c9522d633?ui=en-US&amp;rs=en-US&amp;ad=US&amp;fromAR=1).
-
+ For more information about staged migration, see:
-
+ - [What you need to know about a staged email migration](https://support.office.com/article/What-you-need-to-know-about-a-staged-email-migration-to-Office-365-7e2c82be-5f3d-4e36-bc6b-e5b4d411e207)
-
+ - [Perform a staged migration of email](https://support.office.com/article/Perform-a-staged-migration-of-email-to-Office-365-83bc0b69-de47-4cc4-a57d-47e478e4894e)
-
+ #### Full hybrid In a full hybrid migration, your organization has many hundreds, up to tens of thousands, of mailboxes, and you want to move some or all of them to Microsoft 365. Because these migrations are typically longer-term, hybrid migrations make it possible to:
-
+ - Show on-premises users the free/busy calendar information for users in Microsoft 365, and vice versa.
-
+ - See a unified global address list that contains recipients in both on-premises and Microsoft 365.
-
+ - View full Outlook recipient properties for all users, regardless of whether they're on-premises or in Microsoft 365.
-
+ - Secure email communication between on-premises Exchange servers and Microsoft 365 using TLS and certificates.
-
+ - Treat messages sent between on-premises Exchange servers and Microsoft 365 as internal, enabling them to:
-
+ - Be properly evaluated and processed by transport and compliance agents targeting internal messages.
-
+ - Bypass anti-spam filters.
-
+ Full hybrid migration is best for organizations that expect to stay in a hybrid configuration for many months or more. You'll get the features listed earlier in this section, plus directory synchronization, better integrated compliance features, and the ability to move mailboxes to and from Microsoft 365 by using online mailbox moves. Microsoft 365 becomes an extension of your on-premises organization.
-
+ If you're thinking about doing a full hybrid migration, here are things to consider:
-
+ - Full hybrid migration isn't suited to all types of organizations. Due to the complexity of full hybrid migrations, organizations with less than a few hundred mailboxes don't typically see benefits that justify the effort and cost needed to set one up. If this sounds like your organization, we recommend that you consider a cutover or staged migration instead.
-
+ - You'll need to deploy at least one Exchange 2013 server in your Exchange 2007 organization to act as a "hybrid server." This server will communicate with Microsoft 365 on behalf of your Exchange 2007 servers.
-
+ - Microsoft 365 will need to connect to the "hybrid server" using Outlook Anywhere over TCP port 443.
-
+ - You'll need to set up directory synchronization using Azure Active Directory (Azure AD) Connect between your on-premises Active Directory servers and Microsoft 365.
-
+ - Users will be able to sign in to their Microsoft 365 mailbox using the same user name and password as when they sign in to the local network. (This functionality requires Azure AD Connect with password synchronization and/or Active Directory Federation Services.)
-
+ - You'll need a Microsoft 365 license that includes Exchange Online for each user mailbox you migrate.
-
-- Users don't need to set up a new Outlook profile on most of their devices, although some older Android phones might need a new profile. Users won't have to redownload their email.
-
+
+- Users don't need to set up a new Outlook profile on most of their devices, although some older Android phones might need a new profile. Users won't have to redownload their email.
+ If full hybrid migration sounds right for you, see the following resources to help with your migration:
-
+ - [Exchange Deployment Assistant](/exchange/exchange-deployment-assistant)
-
+ - [Exchange Server Hybrid Deployments](/exchange/exchange-hybrid)
-
+ - [Hybrid Configuration wizard](/exchange/hybrid-configuration-wizard)
-
+ - [Hybrid Configuration wizard FAQs](/exchange/hybrid-configuration-wizard-faqs)
-
+ - [Hybrid deployment prerequisites](/exchange/hybrid-deployment-prerequisites)
-
+ ### Migrate to a newer version of Exchange Server We strongly believe that you can achieve the best value and user experience by migrating to Microsoft 365. But we also understand that some organizations need to keep their email on-premises. This could be because of regulatory requirements, to guarantee data isn't stored in a datacenter located in another country, or similar. If you choose to keep your email on-premises, you can migrate your Exchange 2007 environment to Exchange 2010, Exchange 2013, or Exchange 2016.
-
+ If you can't migrate to Microsoft 365, we recommend that you migrate to Exchange 2016. Exchange 2016 includes all the features of previous releases of Exchange. It also most closely matches the experience available with Microsoft 365, although some features are available only in Microsoft 365. Check out just a few of the things you've been missing:
-
-|**Exchange release**|**Features**|
-|:--|:--|
-|Exchange 2010 <br/> | Role-Based Access Control (permissions without ACLs) <br/> Outlook Web App mailbox policies <br/> Ability to share free/busy and delegate calendars between organizations <br/> |
-|Exchange 2013 <br/> | *Features from Exchange 2010 and …* <br/> Simplified architecture that reduced the number of server roles to three (Mailbox, Client Access, Edge Transport) <br/> Data loss prevention policies (DLP) that help keep sensitive information from leaking <br/> Improved Outlook Web App experience <br/> |
-|Exchange 2016 <br/> | *Features from Exchange 2013 and …* <br/> Further simplified server roles to just Mailbox and Edge Transport <br/> Improved DLP along with integration with SharePoint <br/> Improved database resilience <br/> Online document collaboration |
-
+
+|Exchange release|Features|
+|||
+|Exchange 2010| Role-Based Access Control (permissions without ACLs) <br/> Outlook Web App mailbox policies <br/> Ability to share free/busy and delegate calendars between organizations|
+|Exchange 2013| *Features from Exchange 2010 and ...* <br/> Simplified architecture that reduced the number of server roles to three (Mailbox, Client Access, Edge Transport) <br/> Data loss prevention policies (DLP) that help keep sensitive information from leaking <br/> Improved Outlook Web App experience|
+|Exchange 2016| *Features from Exchange 2013 and ...* <br/> Further simplified server roles to just Mailbox and Edge Transport <br/> Improved DLP along with integration with SharePoint <br/> Improved database resilience <br/> Online document collaboration|
+ #### Which version should I migrate to? We recommend that you initially assume that you'll migrate to Exchange 2016. Then, use the following information to confirm your assumption or to rule out Exchange 2016. If you can't migrate to Exchange 2016 for some reason, do the same process with Exchange 2013, and so on.
-
-|**Consideration**|**More Info**|
-|:--|:--|
-|End of support dates <br/> | Like Exchange 2007, each version of Exchange has its own end-of-support date: <br/> *Exchange 2010* - January 2020 <br/> *Exchange 2013* - April 2023 <br/> *Exchange 2016* - October 2025 <br/> The earlier the end of support, the sooner you'll need to perform another migration.<br/> |
-|Migration path to Exchange 2010 and 2013. <br/> |Here are the general phases for migrating to Exchange 2010 or Exchange 2013: <br/> - Install Exchange 2010 or 2013 into your existing Exchange 2007 organization. <br/>- Move services and other infrastructure to Exchange 2010 or 2013.<br/>- Move mailboxes and public folders to Exchange 2010 or 2013.<br/>- Decommission remaining Exchange 2007 servers. |
-|Migration path to Exchange 2016 <br/> |Here are the general phases for migrating to Exchange 2016: <br/> - Install Exchange 2013 into your existing Exchange 2007 organization.<br/>- Move services and other infrastructure to Exchange 2013.<br/>- Move mailboxes and public folders to Exchange 2013.<br/>- Decommission remaining Exchange 2007 servers.<br/>- Install Exchange 2016 into your existing Exchange 2013 organization.<br/>- Move mailboxes, public folders, services, and other infrastructure to Exchange 2016 (order doesn't matter). Decommission remaining Exchange 2013 servers.<br/><br/> **Note:** Migrating from Exchange 2013 to Exchange 2016 is simple. The two versions have almost the same hardware requirements, and these versions are very compatible. So you can rebuild a server you bought for Exchange 2013 and install Exchange 2016 on it. For online mailbox moves, most users won't even notice that their mailbox was moved off the server and then back after you've rebuilt it with Exchange 2016. |
-|Version coexistence <br/> | When migrating to ... <br/> **Exchange 2016:** Exchange 2016 can't be installed in an organization that includes an Exchange 2007 server. You'll first need to migrate to Exchange 2010 or 2013 (we strongly recommend Exchange 2013), remove all Exchange 2007 servers, and then migrate to Exchange 2016. <br/> **Exchange 2010 or Exchange 2013:** You can install Exchange 2010 or Exchange 2013 into an existing Exchange 2007 organization. This enables you to install one or more Exchange 2010 or 2013 servers and perform your migration. <br/> |
-|Server hardware <br/> | Server hardware requirements have changed from Exchange 2007. Make sure your hardware is compatible. For details, see: <br/> [Exchange 2016 System Requirements](/Exchange/plan-and-deploy/system-requirements) <br/> [Exchange 2013 System Requirements](/exchange/exchange-2013-system-requirements-exchange-2013-help) <br/> [Exchange 2010 System Requirements](/previous-versions/office/exchange-server-2010/aa996719(v=exchg.141)) <br/> You'll find that the significant improvements in Exchange performance and the increased computing power and storage capacity in newer servers mean you'll likely need fewer servers to support the same number of mailboxes. <br/> |
-|Operating system version <br/> | The minimum supported operating system versions for each version are: <br/> **Exchange 2016** - Windows Server 2012 <br/> **Exchange 2013** - Windows Server 2008 R2 SP1 <br/> **Exchange 2010** - Windows Server 2008 SP2 <br/> Find more information about operating system support at [Exchange Supportability Matrix](/Exchange/plan-and-deploy/supportability-matrix). <br/> |
-|Active Directory forest functional level <br/> | The minimum supported Active Directory forest functional levels for each version are: <br/> **Exchange 2016** Windows Server 2008 R2 SP1 <br/> **Exchange 2013** Windows Server 2003 <br/> **Exchange 2010** Windows Server 2003 <br/> Find more information about forest functional level support at [Exchange Supportability Matrix](/Exchange/plan-and-deploy/supportability-matrix). <br/> |
-|Office client versions <br/> | The minimum supported Office client versions for each version are: <br/> **Exchange 2016** - Office 2010 (with the latest updates) <br/> **Exchange 2013** - Office 2007 SP3 <br/> **Exchange 2010** - Office 2003 <br/> Find more information about Office client support at [Exchange Supportability Matrix](/Exchange/plan-and-deploy/supportability-matrix). <br/> |
-
+
+|Consideration|More Info|
+|||
+|End of support dates| Like Exchange 2007, each version of Exchange has its own end-of-support date: <br/> *Exchange 2010* - January 2020 <br/> *Exchange 2013* - April 2023 <br/> *Exchange 2016* - October 2025 <br/> The earlier the end of support, the sooner you'll need to perform another migration.|
+|Migration path to Exchange 2010 and 2013.|Here are the general phases for migrating to Exchange 2010 or Exchange 2013: <br/> - Install Exchange 2010 or 2013 into your existing Exchange 2007 organization. <br/>- Move services and other infrastructure to Exchange 2010 or 2013.<br/>- Move mailboxes and public folders to Exchange 2010 or 2013.<br/>- Decommission remaining Exchange 2007 servers.|
+|Migration path to Exchange 2016|Here are the general phases for migrating to Exchange 2016: <br/> - Install Exchange 2013 into your existing Exchange 2007 organization.<br/>- Move services and other infrastructure to Exchange 2013.<br/>- Move mailboxes and public folders to Exchange 2013.<br/>- Decommission remaining Exchange 2007 servers.<br/>- Install Exchange 2016 into your existing Exchange 2013 organization.<br/>- Move mailboxes, public folders, services, and other infrastructure to Exchange 2016 (order doesn't matter). Decommission remaining Exchange 2013 servers.<br/><br/> **Note:** Migrating from Exchange 2013 to Exchange 2016 is simple. The two versions have almost the same hardware requirements, and these versions are very compatible. So you can rebuild a server you bought for Exchange 2013 and install Exchange 2016 on it. For online mailbox moves, most users won't even notice that their mailbox was moved off the server and then back after you've rebuilt it with Exchange 2016.|
+|Version coexistence| When migrating to ... <br/> **Exchange 2016:** Exchange 2016 can't be installed in an organization that includes an Exchange 2007 server. You'll first need to migrate to Exchange 2010 or 2013 (we strongly recommend Exchange 2013), remove all Exchange 2007 servers, and then migrate to Exchange 2016. <br/> **Exchange 2010 or Exchange 2013:** You can install Exchange 2010 or Exchange 2013 into an existing Exchange 2007 organization. This enables you to install one or more Exchange 2010 or 2013 servers and perform your migration.|
+|Server hardware| Server hardware requirements have changed from Exchange 2007. Make sure your hardware is compatible. For details, see: <br/> [Exchange 2016 System Requirements](/Exchange/plan-and-deploy/system-requirements) <br/> [Exchange 2013 System Requirements](/exchange/exchange-2013-system-requirements-exchange-2013-help) <br/> [Exchange 2010 System Requirements](/previous-versions/office/exchange-server-2010/aa996719(v=exchg.141)) <br/> You'll find that the significant improvements in Exchange performance and the increased computing power and storage capacity in newer servers mean you'll likely need fewer servers to support the same number of mailboxes.|
+|Operating system version| The minimum supported operating system versions for each version are: <br/> **Exchange 2016** - Windows Server 2012 <br/> **Exchange 2013** - Windows Server 2008 R2 SP1 <br/> **Exchange 2010** - Windows Server 2008 SP2 <br/> Find more information about operating system support at [Exchange Supportability Matrix](/Exchange/plan-and-deploy/supportability-matrix).|
+|Active Directory forest functional level| The minimum supported Active Directory forest functional levels for each version are: <br/> **Exchange 2016** Windows Server 2008 R2 SP1 <br/> **Exchange 2013** Windows Server 2003 <br/> **Exchange 2010** Windows Server 2003 <br/> Find more information about forest functional level support at [Exchange Supportability Matrix](/Exchange/plan-and-deploy/supportability-matrix).|
+|Office client versions| The minimum supported Office client versions for each version are: <br/> **Exchange 2016** - Office 2010 (with the latest updates) <br/> **Exchange 2013** - Office 2007 SP3 <br/> **Exchange 2010** - Office 2003 <br/> Find more information about Office client support at [Exchange Supportability Matrix](/Exchange/plan-and-deploy/supportability-matrix).|
+ #### How do I migrate? If you decided to keep your email on-premises, use the following resources to help with your migration:
-
+ - [Exchange Deployment Assistant](/exchange/exchange-deployment-assistant)
-
+ - Active Directory schema changes for Exchange [2016](/Exchange/plan-and-deploy/active-directory/ad-schema-changes), [2013](/exchange/exchange-2013-active-directory-schema-changes-exchange-2013-help), [2010](https://www.microsoft.com/download/en/details.aspx?displaylang=en&amp;id=5401)
-
+ - System requirements for Exchange [2016](/Exchange/plan-and-deploy/system-requirements), [2013](/exchange/exchange-2013-system-requirements-exchange-2013-help), [2010](/previous-versions/office/exchange-server-2010/aa996719(v=exchg.141))
-
+ - Prerequisites for Exchange [2016](/Exchange/plan-and-deploy/prerequisites), [2013](/exchange/exchange-2013-prerequisites-exchange-2013-help), [2010](/previous-versions/office/exchange-server-2010/bb691354(v=exchg.141))
-
+ ## Get help If you're migrating to Microsoft 365, you might be eligible to use our Microsoft FastTrack service. FastTrack provides best practices, tools, and resources to make your migration to Microsoft 365 as seamless as possible. Best of all, a support engineer will walk you through your migration, from planning and design all the way to migrating your last mailbox. For more about FastTrack, see [Microsoft FastTrack](https://fasttrack.microsoft.com/).
-
+ If you run into problems during your migration to Microsoft 365 and you aren't using FastTrack, or your migration to a newer version of Exchange Server, we're here to help. Here are some resources you can use:
-
+ - [Technical community](https://social.technet.microsoft.com/Forums/office/home?category=exchangeserver)
-
+ - [Customer support](https://support.microsoft.com/gp/support-options-for-business)
-
+ ## Related topics
-[Resources to help you upgrade your Office 2007 servers and clients](upgrade-from-office-2007-servers-and-products.md)
+[Resources to help you upgrade your Office 2007 servers and clients](upgrade-from-office-2007-servers-and-products.md)
enterprise Exchange 2010 End Of Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/exchange-2010-end-of-support.md
It's a great time to explore your options and prepare a migration plan. You can:
> [!IMPORTANT] > If your organization chooses to migrate mailboxes to Microsoft 365 but plans to keep DirSync or Azure AD Connect in place to continue managing user accounts from on-premises Active Directory, you need to keep at least one Microsoft Exchange server on-premises. If you remove all Exchange servers, you won't be able to make changes to Exchange recipients in Exchange Online because the source of authority remains in your on-premises Active Directory. Changes need to be made there. In this scenario, you have the following options: >
->- *Recommended:* If you migrated your mailboxes to Microsoft 365 and upgraded your servers by October 13, 2020, use Exchange 2010 to connect to Microsoft 365 and migrate mailboxes. Next, migrate Exchange 2010 to Exchange 2016, and decommission any remaining Exchange 2010 servers.
->- If you didn't complete the mailbox migration and on-premises server upgrade by October 13, 2020, upgrade your on-premises Exchange 2010 servers to Exchange 2016 first. Then use Exchange 2016 to connect to Microsoft 365 and migrate mailboxes.
+> - *Recommended:* If you migrated your mailboxes to Microsoft 365 and upgraded your servers by October 13, 2020, use Exchange 2010 to connect to Microsoft 365 and migrate mailboxes. Next, migrate Exchange 2010 to Exchange 2016, and decommission any remaining Exchange 2010 servers.
+> - If you didn't complete the mailbox migration and on-premises server upgrade by October 13, 2020, upgrade your on-premises Exchange 2010 servers to Exchange 2016 first. Then use Exchange 2016 to connect to Microsoft 365 and migrate mailboxes.
> [!NOTE] > It's little more complicated, but you can also migrate mailboxes to Microsoft 365 while migrating your on-premises Exchange 2010 servers to Exchange 2016.
Depending on your organization, you have a few options to get to Microsoft 365.
This table shows your migration options and the most important factors that determine which method to use.
-<br>
-
-****
- |Migration option|Organization size|Duration| |||| |Cutover migration|Fewer than 150 seats|A week or less| |Minimal hybrid migration|Fewer than 150 seats|A few weeks or less| |Full hybrid migration|More than 150 seats|A few weeks or more|
-|
The following sections give you an overview of these methods. For more information, see [Decide on a migration path](https://support.office.com/article/Decide-on-a-migration-path-0d4f2396-9cef-43b8-9bd6-306d01df1e27).
For the best experience, we recommend that you upgrade your remaining on-premise
Exchange 2016 includes all the features of previous releases of Exchange. It most closely matches the experience available with Microsoft 365, although some features are available only in Microsoft 365. Check out just a few of the things you've been missing:
-<br>
-
-****
- |Exchange release|Features| ||| |**Exchange 2013**|Simplified architecture reduces the number of server roles to three (Mailbox, Client Access, Edge Transport)| ||Data loss prevention policies (DLP) that help keep sensitive information from leaking| ||Improved Outlook Web App experience|
-|**Exchange 2016**|*Features from Exchange 2013 and …*|
+|**Exchange 2016**|*Features from Exchange 2013 and ...*|
||Further simplified server roles to just Mailbox and Edge Transport| ||Improved DLP along with integration with SharePoint| ||Improved database resilience| ||Online document collaboration|
-|
-
-<br>
-****
|Consideration|More information| |||
-|End of support dates|Like Exchange 2010, each version of Exchange has its own end-of-support date: <p> Exchange 2013 - April 2023 <p> Exchange 2016 - October 2025 <p> The earlier the end-of-support date, the sooner you'll need to perform another migration. April 2023 is a lot closer than you think!|
-|Migration path to Exchange 2013 or 2016|The migration path from Exchange 2010 to a newer version is the same whether you choose Exchange 2013 or Exchange 2016: <p> Install Exchange 2013 or 2016 into your existing Exchange 2010 organization. <p> Move services and other infrastructure to Exchange 2013 or 2016. <p> Move mailboxes and public folders to Exchange 2013 or 2016 Decommission remaining Exchange 2010 servers.|
+|End of support dates|Like Exchange 2010, each version of Exchange has its own end-of-support date: <br/><br/> Exchange 2013 - April 2023 <br/><br/> Exchange 2016 - October 2025 <br/><br/> The earlier the end-of-support date, the sooner you'll need to perform another migration. April 2023 is a lot closer than you think!|
+|Migration path to Exchange 2013 or 2016|The migration path from Exchange 2010 to a newer version is the same whether you choose Exchange 2013 or Exchange 2016: <br/><br/> Install Exchange 2013 or 2016 into your existing Exchange 2010 organization. <br/><br/> Move services and other infrastructure to Exchange 2013 or 2016. <br/><br/> Move mailboxes and public folders to Exchange 2013 or 2016 Decommission remaining Exchange 2010 servers.|
|Version coexistence|When migrating to Exchange 2013 or Exchange 2016, you can install either version into an existing Exchange 2010 organization. This enables you to install one or more Exchange 2013 or Exchange 2016 servers and do your migration.|
-|Server hardware|Server hardware requirements have changed from Exchange 2010. Make sure your hardware is compatible. Find out more about hardware requirements for each version here: <p> [Exchange 2016 system requirements](/Exchange/plan-and-deploy/system-requirements?view=exchserver-2016&preserve-view=true) <p> [Exchange 2013 system requirements](/Exchange/exchange-2013-system-requirements-exchange-2013-help) <p> With the significant improvements in Exchange performance and the increased computing power and storage capacity in newer servers, you'll likely need fewer servers to support the same number of mailboxes.|
-|Operating system version|The minimum supported operating system versions for each version are: <p> Exchange 2016 - Windows Server 2012 <p> Exchange 2013 - Windows Server 2008 R2 SP1 <p> You can find more information about operating system support at [Exchange Supportability Matrix](/exchange/plan-and-deploy/supportability-matrix).|
-|Active Directory forest functional level|The minimum supported Active Directory forest functional levels for each version are: <p> Exchange 2016 - Windows Server 2008 R2 SP1 <p> Exchange 2013 - Windows Server 2003 <p> You can find more information about forest functional level support at [Exchange Supportability Matrix](/exchange/plan-and-deploy/supportability-matrix).|
-|Office client versions|The minimum supported Office client versions for each version are: <p> Exchange 2016 - Office 2010 (with the latest updates) <p> Exchange 2013 - Office 2007 SP3 <p> Find more information about Office client support at [Exchange Supportability Matrix](/exchange/plan-and-deploy/supportability-matrix).|
-|
+|Server hardware|Server hardware requirements have changed from Exchange 2010. Make sure your hardware is compatible. Find out more about hardware requirements for each version here: <br/><br/> [Exchange 2016 system requirements](/Exchange/plan-and-deploy/system-requirements?view=exchserver-2016&preserve-view=true) <br/><br/> [Exchange 2013 system requirements](/Exchange/exchange-2013-system-requirements-exchange-2013-help) <br/><br/> With the significant improvements in Exchange performance and the increased computing power and storage capacity in newer servers, you'll likely need fewer servers to support the same number of mailboxes.|
+|Operating system version|The minimum supported operating system versions for each version are: <br/><br/> Exchange 2016 - Windows Server 2012 <br/><br/> Exchange 2013 - Windows Server 2008 R2 SP1 <br/><br/> You can find more information about operating system support at [Exchange Supportability Matrix](/exchange/plan-and-deploy/supportability-matrix).|
+|Active Directory forest functional level|The minimum supported Active Directory forest functional levels for each version are: <br/><br/> Exchange 2016 - Windows Server 2008 R2 SP1 <br/><br/> Exchange 2013 - Windows Server 2003 <br/><br/> You can find more information about forest functional level support at [Exchange Supportability Matrix](/exchange/plan-and-deploy/supportability-matrix).|
+|Office client versions|The minimum supported Office client versions for each version are: <br/><br/> Exchange 2016 - Office 2010 (with the latest updates) <br/><br/> Exchange 2013 - Office 2007 SP3 <br/><br/> Find more information about Office client support at [Exchange Supportability Matrix](/exchange/plan-and-deploy/supportability-matrix).|
Use the following resources to help with your migration:
enterprise External Domain Name System Records https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/external-domain-name-system-records.md
- Strat_O365_Enterprise f1.keywords: - CSH-+ - Adm_O365 - seo-marvel-apr2020 search.appverid:
description: A reference list of external Domain Name System records to use when
**Go back to** [Network planning and performance tuning for Office 365](./network-planning-and-performance.md). Often the SPF and MX records are the hardest to figure out. We've updated our SPF records guidance at the end of this article. The important thing to remember is that _you can only have a single SPF record for your domain_. You can have multiple MX records; however, that can cause problems for mail delivery. Having a single MX record that directs email to one mail system removes many potential problems.
-
+ The sections below are organized by service in Office 365. To see a customized list of the Office 365 DNS records for your domain, sign in to Office 365 and [Gather the information you need to create Office 365 DNS records](https://support.office.com/article/77f90d4a-dc7f-4f09-8972-c1b03ea85a67).
-
+ ## External DNS records required for Office 365 (core services) <a name="BKMK_ReqdCore"> </a> The TXT record is needed to prove that you own the domain and is required for all customers.
-The CNAME record is only required for customers using [Office 365 operated by 21Vianet](/microsoft-365/admin/services-in-china/services-in-china). It ensures that Office 365 can direct workstations to authenticate with the appropriate identity platform.
--
-
-|**DNS record** <br/> |**Purpose** <br/> |**Value to use** <br/> |**Applies to**|
-|-|--|||
-|**TXT** <br/> **(Domain verification)** <br/> |Used by Office 365 to verify only that you own your domain. It doesn't affect anything else. <br/> |**Host:** @ (or, for some DNS hosting providers, your domain name) <br/> **TXT Value:** _A text string provided by_ Office 365 <br/> The Office 365 **domain setup wizard** provides the values that you use to create this record. <br/> |All customers|
-|**CNAME** <br/> **(Suite)** <br/> |Used by Office 365 to direct authentication to the correct identity platform. [More information](../admin/services-in-chin?viewFallbackFrom=o365-worldwide) <br/> **Note** that this CNAME only applies to Office 365 operated by 21Vianet. If present and your Office 365 is not operated by 21Vianet, users on your custom domain will get a "*custom domain* isn't in our system" error and won't be able to activate their Office 365 license. [More information](/office365/servicedescriptions/office-365-platform-service-description/office-365-operated-by-21vianet) |**Alias:** msoid <br/> **Target:** clientconfig.partner.microsoftonline-p.net.cn <br/> | 21Vianet customers only|
-
+The CNAME record is only required for customers using [Office 365 operated by 21Vianet](/microsoft-365/admin/services-in-china/services-in-china). It ensures that Office 365 can direct workstations to authenticate with the appropriate identity platform.
+|DNS record|Purpose|Value to use|Applies to|
+|||||
+|**TXT** <br/> **(Domain verification)**|Used by Office 365 to verify only that you own your domain. It doesn't affect anything else.|**Host:** @ (or, for some DNS hosting providers, your domain name) <br/> **TXT Value:** _A text string provided by_ Office 365 <br/> The Office 365 **domain setup wizard** provides the values that you use to create this record.|All customers|
+|**CNAME** <br/> **(Suite)**|Used by Office 365 to direct authentication to the correct identity platform. [More information](../admin/services-in-chin?viewFallbackFrom=o365-worldwide) <br/> **Note** that this CNAME only applies to Office 365 operated by 21Vianet. If present and your Office 365 is not operated by 21Vianet, users on your custom domain will get a "*custom domain* isn't in our system" error and won't be able to activate their Office 365 license. [More information](/office365/servicedescriptions/office-365-platform-service-description/office-365-operated-by-21vianet) |**Alias:** msoid <br/> **Target:** clientconfig.partner.microsoftonline-p.net.cn| 21Vianet customers only|
## External DNS records required for email in Office 365 (Exchange Online) <a name="BKMK_ReqdCore"> </a> Email in Office 365 requires several different records. The three primary records that all customers should use are the Autodiscover, MX, and SPF records.
-
+ - **The Autodiscover record** allows client computers to automatically find Exchange and configure the client properly. -- **The MX record** tells other mail systems where to send email for your domain. **Note:** When you change your email to Office 365, by updating your domain's MX record, ALL email sent to that domain will start coming to Office 365.
+- **The MX record** tells other mail systems where to send email for your domain. **Note:** When you change your email to Office 365, by updating your domain's MX record, ALL email sent to that domain will start coming to Office 365.
Do you just want to switch a few email addresses to Office 365? You can [Pilot Office 365 with a few email addresses on your custom domain](https://support.office.com/article/39cee536-6a03-40cf-b9c1-f301bb6001d7). - **The TXT record for SPF** is used by recipient email systems to validate that the server sending your email is one that you approve. This helps prevent problems like email spoofing and phishing. See the [External DNS records required for SPF](external-domain-name-system-records.md#BKMK_SPFrecords) in this article to help you understand what to include in your record. Email customers who are using Exchange Federation will also need the additional CNAME and TXT record listed at the bottom of the table.
-
-|**DNS record** <br/> |**Purpose** <br/> |**Value to use** <br/> |
-|-|--||
-|**CNAME** <br/> **(Exchange Online)** <br/> |Helps Outlook clients to easily connect to the Exchange Online service by using the Autodiscover service. Autodiscover automatically finds the correct Exchange Server host and configures Outlook for users. <br/> |**Alias:** Autodiscover <br/> **Target:** autodiscover.outlook.com <br/> |
-|**MX** <br/> **(Exchange Online)** <br/> |Sends incoming mail for your domain to the Exchange Online service in Office 365. <br/> **Note:** Once email is flowing to Exchange Online, you should remove the MX records that are pointing to your old system. |**Domain:** For example, contoso.com <br/> **Target email server:**\<MX token\>.mail.protection.outlook.com <br/> **Time To Live (TTL) Value:** 3600 <br/> **Preference/Priority:** Lower than any other MX records (this ensures mail is delivered to Exchange Online) - for example 1 or 'low' <br/> Find your \<MX token\> by following these steps: <br/> Sign in to Office 365, go to Office 365 admin \> Domains. <br/> In the Action column for your domain, choose Fix issues. <br/> In the MX records section, choose What do I fix? <br/> Follow the directions on this page to update your MX record. <br/> [What is MX priority?](../admin/setup/domains-faq.yml) <br/> |
-|**SPF (TXT)** <br/> **(Exchange Online)** <br/> |Helps to prevent other people from using your domain to send spam or other malicious email. Sender policy framework (SPF) records work by identifying the servers that are authorized to send email from your domain. <br/> |[External DNS records required for SPF](external-domain-name-system-records.md#BKMK_SPFrecords) <br/> |
-|**TXT** <br/> **(Exchange federation)** <br/> |Used for Exchange federation for hybrid deployment. <br/> |**TXT record 1:** For example, contoso.com and associated custom-generated, domain-proof hash text (for example, Y96nu89138789315669824) <br/> **TXT record 2:** For example, exchangedelegation.contoso.com and associated custom-generated, domain-proof hash text (for example, Y3259071352452626169) <br/> |
-|**CNAME** <br/> **(Exchange federation)** <br/> |Helps Outlook clients to easily connect to the Exchange Online service by using the Autodiscover service when your company is using Exchange federation. Autodiscover automatically finds the correct Exchange Server host and configures Outlook for your users. <br/> |**Alias:** For example, Autodiscover.service.contoso.com <br/> **Target:** autodiscover.outlook.com <br/> |
+|DNS record|Purpose|Value to use|
+||||
+|**CNAME** <br/> **(Exchange Online)**|Helps Outlook clients to easily connect to the Exchange Online service by using the Autodiscover service. Autodiscover automatically finds the correct Exchange Server host and configures Outlook for users.|**Alias:** Autodiscover <br/> **Target:** autodiscover.outlook.com|
+|**MX** <br/> **(Exchange Online)**|Sends incoming mail for your domain to the Exchange Online service in Office 365. <br/> **Note:** Once email is flowing to Exchange Online, you should remove the MX records that are pointing to your old system. |**Domain:** For example, contoso.com <br/> **Target email server:**\<MX token\>.mail.protection.outlook.com <br/> **Time To Live (TTL) Value:** 3600 <br/> **Preference/Priority:** Lower than any other MX records (this ensures mail is delivered to Exchange Online) - for example 1 or 'low' <br/> Find your \<MX token\> by following these steps: <br/> Sign in to Office 365, go to Office 365 admin \> Domains. <br/> In the Action column for your domain, choose Fix issues. <br/> In the MX records section, choose What do I fix? <br/> Follow the directions on this page to update your MX record. <br/> [What is MX priority?](../admin/setup/domains-faq.yml)|
+|**SPF (TXT)** <br/> **(Exchange Online)**|Helps to prevent other people from using your domain to send spam or other malicious email. Sender policy framework (SPF) records work by identifying the servers that are authorized to send email from your domain.|[External DNS records required for SPF](external-domain-name-system-records.md#BKMK_SPFrecords)|
+|**TXT** <br/> **(Exchange federation)**|Used for Exchange federation for hybrid deployment.|**TXT record 1:** For example, contoso.com and associated custom-generated, domain-proof hash text (for example, Y96nu89138789315669824) <br/> **TXT record 2:** For example, exchangedelegation.contoso.com and associated custom-generated, domain-proof hash text (for example, Y3259071352452626169)|
+|**CNAME** <br/> **(Exchange federation)**|Helps Outlook clients to easily connect to the Exchange Online service by using the Autodiscover service when your company is using Exchange federation. Autodiscover automatically finds the correct Exchange Server host and configures Outlook for your users.|**Alias:** For example, Autodiscover.service.contoso.com <br/> **Target:** autodiscover.outlook.com|
## External DNS records required for Skype for Business Online <a name="BKMK_ReqdCore"> </a>
-There are specific steps to take when you use [Office 365 URLs and IP address ranges](https://support.office.com/article/8548a211-3fe7-47cb-abb1-355ea5aa88a2#BKMK_LYO) to make sure your network is configured correctly.
+There are specific steps to take when you use [Office 365 URLs and IP address ranges](https://support.office.com/article/8548a211-3fe7-47cb-abb1-355ea5aa88a2#BKMK_LYO) to make sure your network is configured correctly.
> [!NOTE] > These DNS records also apply to Teams, especially in a hybrid Teams and Skype for Business scenario, where certain federation issues could arise.
-
-|**DNS record** <br/> |**Purpose** <br/> |**Value to use** <br/> |
-|-|--||
-|**SRV** <br/> **(Skype for Business Online)** <br/> |Allows your Office 365 domain to share instant messaging (IM) features with external clients by enabling SIP federation. Read more about [Office 365 URLs and IP address ranges](https://support.office.com/article/8548a211-3fe7-47cb-abb1-355ea5aa88a2#BKMK_LYO). <br/> |**Service:** sipfederationtls <br/> **Protocol:** TCP <br/> **Priority:** 100 <br/> **Weight:** 1 <br/> **Port:** 5061 <br/> **Target:** sipfed.online.lync.com <br/> **Note:** If the firewall or proxy server blocks SRV lookups on an external DNS, you should add this record to the internal DNS record. |
-|**SRV** <br/> **(Skype for Business Online)** <br/> |Used by Skype for Business to coordinate the flow of information between Lync clients. <br/> |**Service:** sip <br/> **Protocol:** TLS <br/> **Priority:** 100 <br/> **Weight:** 1 <br/> **Port:** 443 <br/> **Target:** sipdir.online.lync.com <br/> |
-|**CNAME** <br/> **(Skype for Business Online)** <br/> |Used by the Lync client to help find the Skype for Business Online service and sign in. <br/> |**Alias:** sip <br/> **Target:** sipdir.online.lync.com <br/> For more information, see [Office 365 URLs and IP address ranges](https://support.office.com/article/8548a211-3fe7-47cb-abb1-355ea5aa88a2#BKMK_LYO). <br/> |
-|**CNAME** <br/> **(Skype for Business Online)** <br/> |Used by the Lync mobile client to help find the Skype for Business Online service and sign in. <br/> |**Alias:** lyncdiscover <br/> **Target:** webdir.online.lync.com <br/> |
+
+|DNS record|Purpose|Value to use|
+||||
+|**SRV** <br/> **(Skype for Business Online)**|Allows your Office 365 domain to share instant messaging (IM) features with external clients by enabling SIP federation. Read more about [Office 365 URLs and IP address ranges](https://support.office.com/article/8548a211-3fe7-47cb-abb1-355ea5aa88a2#BKMK_LYO).|**Service:** sipfederationtls <br/> **Protocol:** TCP <br/> **Priority:** 100 <br/> **Weight:** 1 <br/> **Port:** 5061 <br/> **Target:** sipfed.online.lync.com <br/> **Note:** If the firewall or proxy server blocks SRV lookups on an external DNS, you should add this record to the internal DNS record. |
+|**SRV** <br/> **(Skype for Business Online)**|Used by Skype for Business to coordinate the flow of information between Lync clients.|**Service:** sip <br/> **Protocol:** TLS <br/> **Priority:** 100 <br/> **Weight:** 1 <br/> **Port:** 443 <br/> **Target:** sipdir.online.lync.com|
+|**CNAME** <br/> **(Skype for Business Online)**|Used by the Lync client to help find the Skype for Business Online service and sign in.|**Alias:** sip <br/> **Target:** sipdir.online.lync.com <br/> For more information, see [Office 365 URLs and IP address ranges](https://support.office.com/article/8548a211-3fe7-47cb-abb1-355ea5aa88a2#BKMK_LYO).|
+|**CNAME** <br/> **(Skype for Business Online)**|Used by the Lync mobile client to help find the Skype for Business Online service and sign in.|**Alias:** lyncdiscover <br/> **Target:** webdir.online.lync.com|
## External DNS records required for Office 365 Single Sign-On <a name="BKMK_ReqdCore"> </a>
-|**DNS record** <br/> |**Purpose** <br/> |**Value to use** <br/> |
-|-|--||
-|**Host (A)** <br/> |Used for single sign-on (SSO). It provides the endpoint for your off-premises users (and on-premises users, if you like) to connect to your Active Directory Federation Services (AD FS) federation server proxies or load-balanced virtual IP (VIP). <br/> |**Target:** For example, sts.contoso.com <br/> |
+|DNS record|Purpose|Value to use|
+||||
+|**Host (A)**|Used for single sign-on (SSO). It provides the endpoint for your off-premises users (and on-premises users, if you like) to connect to your Active Directory Federation Services (AD FS) federation server proxies or load-balanced virtual IP (VIP).|**Target:** For example, sts.contoso.com|
## External DNS records required for SPF <a name="BKMK_SPFrecords"> </a> > [!IMPORTANT] > SPF is designed to help prevent spoofing, but there are spoofing techniques that SPF cannot protect against. In order to protect against these, once you have set up SPF, you should also configure DKIM and DMARC for Office 365. To get started, see [Use DKIM to validate outbound email sent from your domain in Office 365](../security/office-365-security/use-dkim-to-validate-outbound-email.md). Next, see [Use DMARC to validate email in Office 365](../security/office-365-security/use-dmarc-to-validate-email.md).
-
+ SPF records are TXT records that help to prevent other people from using your domain to send spam or other malicious email. Sender policy framework (SPF) records work by identifying the servers that are authorized to send email from your domain.
-
+ You can only have one SPF record (that is, a TXT record that defines SPF) for your domain. That single record can have a few different inclusions but the total DNS lookups that result can't be more than 10 (this helps prevent denial of service attacks). See the table and other examples below to help you create or update the right SPF record values for your environment.
-
+ ### Structure of an SPF record All SPF records contain three parts: the declaration that it is an SPF record, the domains, and IP addresses that should be sending email, and an enforcement rule. You need all three in a valid SPF record. Here's an example of a common SPF record for Office 365 when you use only Exchange Online email:
-
+ ``` dns TXT Name @ Values: v=spf1 include:spf.protection.outlook.com -all ``` An email system that receives an email from your domain looks at the SPF record, and if the email server that sent the message was an Office 365 server, the message is accepted. If the server that sent the message was your old mail system or a malicious system on the Internet, for example, the SPF check might fail and the message wouldn't be delivered. Checks like this help to prevent spoofing and phishing messages.
-
+ ### Choose the SPF record structure you need For scenarios where you're not just using Exchange Online email for Office 365 (for example, when you use email originating from SharePoint Online as well), use the following table to determine what to include in the value of the record.
-
+ > [!NOTE] > If you have a complicated scenario that includes, for example, edge email servers for managing email traffic across your firewall, you'll have a more detailed SPF record to set up. Learn how: [Set up SPF records in Office 365 to help prevent spoofing](../security/office-365-security/set-up-spf-in-office-365-to-help-prevent-spoofing.md). You can also learn much more about how SPF works with Office 365 by reading [How Office 365 uses Sender Policy Framework (SPF) to help prevent spoofing](../security/office-365-security/how-office-365-uses-spf-to-prevent-spoofing.md).
-
-| Number|If you're using… <br/> |Purpose <br/> |Add these includes <br/> |
-|:--|:--|:--|:--|
-|1 <br/> |All email systems (required) <br/> |All SPF records start with this value <br/> |v=spf1 <br/> |
-|2 <br/> |Exchange Online (common) <br/> |Use with just Exchange Online <br/> |include:spf.protection.outlook.com <br/> |
-|3 <br/> |Third-party email system (less common) <br/> ||include:\<email system like mail.contoso.com\> <br/> |
-|4 <br/> |On-premises mail system (less common) <br/> |Use if you're using Exchange Online Protection or Exchange Online plus another mail system <br/> |ip4:\<0.0.0.0\> <br/> ip6:\< : : \> <br/> include:\<mail.contoso.com\> <br/> The value in brackets (\<\>) should be other mail systems that will send email for your domain. <br/> |
-|5 <br/> |All email systems (required) <br/> ||-all <br/> |
+
+|Number|If you're using...|Purpose|Add these includes|
+|||||
+|1|All email systems (required)|All SPF records start with this value|v=spf1|
+|2|Exchange Online (common)|Use with just Exchange Online|include:spf.protection.outlook.com|
+|3|Third-party email system (less common)||include:\<email system like mail.contoso.com\>|
+|4|On-premises mail system (less common)|Use if you're using Exchange Online Protection or Exchange Online plus another mail system|ip4:\<0.0.0.0\> <br/> ip6:\< : : \> <br/> include:\<mail.contoso.com\> <br/> The value in brackets (\<\>) should be other mail systems that will send email for your domain.|
+|5|All email systems (required)||-all|
### Example: Adding to an existing SPF record <a name="bkmk_addtospf"> </a> If you already have an SPF record, you'll need to add or update values for Office 365. For example, say your existing SPF record for contoso.com is this:
-
+ ``` dns TXT Name @ Values: v=spf1 ip4:60.200.100.30 include:smtp.adatum.com -all ``` Now you're updating your SPF record for Office 365. You'll edit your current record so you have an SPF record that includes the values that you need. For Office 365, "spf.protection.outlook.com".
-
+ Correct:
-
+ ``` dns TXT Name @ Values: v=spf1 ip4:60.200.100.30 include:spf.protection.outlook.com include:smtp.adatum.com -all ``` Incorrect:
-
+ ``` dns Record 1: TXT Name @
Values: v=spf1 include:spf.protection.outlook.com -all
<a name="bkmk_addtospf"> </a> If you are using the full Office 365 suite and are using MailChimp to send marketing emails on your behalf, your SPF record at contoso.com might look like the following, which uses rows 1, 3, and 5 from the table above. Remember, rows 1 and 5 are required.
-
+ ``` dns TXT Name @ Values: v=spf1 include:spf.protection.outlook.com include:servers.mcsv.net -all ``` Alternatively, if you have an Exchange Hybrid configuration where email will be sent from both Office 365 and your on-premises mail system, your SPF record at contoso.com might look like this:
-
+ ``` dns TXT Name @ Values: v=spf1 include:spf.protection.outlook.com include:mail.contoso.com -all ``` These are some common examples that can help you adapt your existing SPF record when you add your domain to Office 365 for email. If you have a complicated scenario that includes, for example, edge email servers for managing email traffic across your firewall, you'll have a more detailed SPF record to set up. Learn how: [Set up SPF records in Office 365 to help prevent spoofing](../security/office-365-security/set-up-spf-in-office-365-to-help-prevent-spoofing.md).
-
-Here's a short link you can use to come back: [https://aka.ms/o365edns]()
+
+Here's a short link you can use to come back: <https://aka.ms/o365edns>
enterprise Microsoft 365 Monitoring https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/microsoft-365-monitoring.md
description: "Use Microsoft 365 monitoring for information about incidents or ad
# Learn about Microsoft 365 monitoring
-You can use dashboards in the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?linkid=2024339) to monitor the health of various Microsoft services for your organization's Microsoft 365 subscription. This capability was initially started with Exchange Online and now getting expanded to other Microsoft services like Microsoft Teams, Microsoft 365 Apps and more service in future. Monitoring provides you with information about incidents and advisories that are collected in these categories:
+You can use dashboards in the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?linkid=2024339) to monitor the health of various Microsoft services for your organization's Microsoft 365 subscription. This capability was initially started with Exchange Online and now getting expanded to other Microsoft services like Microsoft Teams, Microsoft 365 Apps and more service in future. Monitoring provides you with information about incidents and advisories that are collected in these categories:
- **Infrastructure**. Issue is detected in the Microsoft 365 infrastructure that Microsoft owns for providing regular updates and resolving the issue. For example, users can't access Exchange Online because of issues with Exchange or other Microsoft 365 cloud infrastructure.
You can use dashboards in the [Microsoft 365 admin center](https://go.microsoft
- **Customer infrastructure**. Issue is detected in your organization's infrastructure and requires action from your organization for resolution. For example, users can't access Exchange Online because they are unable to obtain an authentication token from STS provider hosted by your organization because of an expired certificate.
-Here's an example of the **Service health** page in the Microsoft 365 admin center, which is available at **Health** > **Service health** for organization scenarios and [priority account](../admin/setup/priority-accounts.md) scenarios.
+Here's an example of the **Service health** page in the Microsoft 365 admin center, which is available at **Health** > **Service health** for organization scenarios and [priority account](../admin/setup/priority-accounts.md) scenarios.
![The Service health page in the Microsoft 365 admin center.](../media/microsoft-365-exchange-monitoring/service-health-dashboard-example.png)
-**Issues in your organization** will be identified and used by organizational-level monitoring and priority account monitoring.
+**Issues in your organization** will be identified and used by organizational-level monitoring and priority account monitoring.
-The value of the **Health** column under **Issues in your organization** indicates whether your organization's infrastructure or third-party software affects the service health experience of your organization's users and/or priority accounts in Exchange Online. Advisories or incidents require your actions to resolve.
+The value of the **Health** column under **Issues in your organization** indicates whether your organization's infrastructure or third-party software affects the service health experience of your organization's users and/or priority accounts in Exchange Online. Advisories or incidents require your actions to resolve.
-The value of the **Health** column under **Microsoft service health** indicates that the service is healthy or has advisories or incidents based on the cloud services that Microsoft maintains.
+The value of the **Health** column under **Microsoft service health** indicates that the service is healthy or has advisories or incidents based on the cloud services that Microsoft maintains.
-Here's an example of the Exchange Online monitoring page in the Microsoft 365 admin center that shows the health of organization-level and priority account scenarios available from **Health** > **Service health** > **Exchange Online**.
+Here's an example of the Exchange Online monitoring page in the Microsoft 365 admin center that shows the health of organization-level and priority account scenarios available from **Health** > **Service health** > **Exchange Online**.
![Organization-level scenarios for Exchange Online Monitoring.](../media/microsoft-365-exchange-monitoring/exchange-monitoring-org-scenarios.png)
-With the scenario list page, you can see whether the Microsoft service is healthy or not and whether there are any associated incidents or advisories. For example, with Exchange Online monitoring, you can look at the service health for specific email scenarios and view near real-time signals to determine the impact by organization-level scenario. You can also see health of priority account scenarios, if available.
+With the scenario list page, you can see whether the Microsoft service is healthy or not and whether there are any associated incidents or advisories. For example, with Exchange Online monitoring, you can look at the service health for specific email scenarios and view near real-time signals to determine the impact by organization-level scenario. You can also see health of priority account scenarios, if available.
## Requirements for monitoring
There are two ways you can provide feedback:
### 1. Why don't I see "view" link under Organizational monitoring column in the Microsoft 365 admin center inside Service Health?
-First, make sure you've enabled the new admin center on the **Home** page of the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?linkid=2024339).
+First, make sure you've enabled the new admin center on the **Home** page of the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?linkid=2024339).
Then make sure you meet both of the following requirements:
This is a free feature that is in preview and only available for customers that
### 5. How do I provide feedback?
-For general feedback, use the **Give feedback** icon on the bottom-right corner of the monitoring page.
+For general feedback, use the **Give feedback** icon on the bottom-right corner of the monitoring page.
-For feedback on incidents or advisories, use the **Is this post helpful? link.
+For feedback on incidents or advisories, use the **Is this post helpful? link.
### 6. Are there any privacy concerns?
enterprise Plan For Multi Geo https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/plan-for-multi-geo.md
description: "Learn about Microsoft 365 Multi-Geo, how multi-geo works, and what
# Plan for Microsoft 365 Multi-Geo
-This guidance is designed for administrators of multi-national companies (MNCs) who are preparing their Microsoft 365 tenant to be expanded to additional geographies in accordance with the companyΓÇÖs presence to meet data residency requirements.
+This guidance is designed for administrators of multi-national companies (MNCs) who are preparing their Microsoft 365 tenant to be expanded to additional geographies in accordance with the company's presence to meet data residency requirements.
In a multi-geo configuration, your Microsoft 365 tenant consists of a central location and one or more satellite locations. This is a single tenant that spans across multiple geo locations. Your tenant information, including geo locations, is mastered in Azure Active Directory (Azure AD). Here are some key multi-geo terms to help you understand the basic concepts of the configuration: -- **Tenant** – An organization's representation in Microsoft 365 which typically has one or more domains associated with it (for example, https://contoso.sharepoint.com). 
+- **Tenant** ΓÇô An organization's representation in Microsoft 365 which typically has one or more domains associated with it (for example, https://contoso.sharepoint.com).
-- **Geo locations** ΓÇô The geographic locations available to host data in a Microsoft 365 tenant.
+- **Geo locations** ΓÇô The geographic locations available to host data in a Microsoft 365 tenant.
-- **Satellite locations** ΓÇô The additional geo locations that you have configured to host data in your Microsoft 365 tenant. Multi-geo tenants span more than one geo location, for example, North America and Europe.
+- **Satellite locations** ΓÇô The additional geo locations that you have configured to host data in your Microsoft 365 tenant. Multi-geo tenants span more than one geo location, for example, North America and Europe.
-- **Preferred Data Location (PDL)** ΓÇô The geo location where an individual user's Exchange and OneDrive data is stored. This can be set by the administrator to any of the geo locations that have been configured for the tenant. Note that if you change the PDL for a user who already has a OneDrive site, their OneDrive data is not moved to the new geo location automatically. See [Move a OneDrive library to a different geo-location](move-onedrive-between-geo-locations.md) for more information. If they have an Exchange mailbox, the mailbox is moved to the new preferred data location automatically.
+- **Preferred Data Location (PDL)** ΓÇô The geo location where an individual user's Exchange and OneDrive data is stored. This can be set by the administrator to any of the geo locations that have been configured for the tenant. Note that if you change the PDL for a user who already has a OneDrive site, their OneDrive data is not moved to the new geo location automatically. See [Move a OneDrive library to a different geo-location](move-onedrive-between-geo-locations.md) for more information. If they have an Exchange mailbox, the mailbox is moved to the new preferred data location automatically.
Enabling Multi-Geo requires four key steps:
-1. Work with your account team to add the _Multi-Geo Capabilities in Microsoft 365_ service plan.
+1. Work with your account team to add the _Multi-Geo Capabilities in Microsoft 365_ service plan.
-2. Choose your desired satellite location(s) and add them to your tenant.
+2. Choose your desired satellite location(s) and add them to your tenant.
-3. Set your users' preferred data location to the desired satellite location. When a new OneDrive site or Exchange mailbox is provisioned for a user, it is provisioned to their PDL.
+3. Set your users' preferred data location to the desired satellite location. When a new OneDrive site or Exchange mailbox is provisioned for a user, it is provisioned to their PDL.
-4. Migrate your users' existing OneDrive sites from the central location to their preferred data location as needed. (Exchange mailboxes are migrated automatically when you set a user's PDL.)
+4. Migrate your users' existing OneDrive sites from the central location to their preferred data location as needed. (Exchange mailboxes are migrated automatically when you set a user's PDL.)
See [Configure Microsoft 365 Multi-Geo](multi-geo-tenant-configuration.md) for details on each of these steps.
When you configure multi-geo, consider taking the opportunity to consolidate you
## Best practices
-We recommend that you create a test user in Microsoft 365 to do some initial testing. WeΓÇÖll walk through some testing and verification steps with this user before you proceed to onboard production users into Microsoft 365 Multi-Geo.
+We recommend that you create a test user in Microsoft 365 to do some initial testing. We'll walk through some testing and verification steps with this user before you proceed to onboard production users into Microsoft 365 Multi-Geo.
-Once youΓÇÖve completed testing with the test user, select a pilot group ΓÇô perhaps from your IT department ΓÇô to be the first to use OneDrive and Exchange in a new geo location. For this first group, select users who do not yet have a OneDrive. We recommend no more than five people in this initial group and gradually expand following a batched rollout approach.
+Once you've completed testing with the test user, select a pilot group ΓÇô perhaps from your IT department ΓÇô to be the first to use OneDrive and Exchange in a new geo location. For this first group, select users who do not yet have a OneDrive. We recommend no more than five people in this initial group and gradually expand following a batched rollout approach.
Each user should have a *preferred data location* (PDL) set so that Microsoft 365 can determine in which geo location to provision their OneDrive. The user's preferred data location must match one of your chosen satellite locations or your central location. While the PDL field is not mandatory, we recommend that a PDL be set for all users. Workloads of a user without a PDL will be provisioned in the central location.
Once you've completed the configuration, remember to [migrate your users' OneDri
## Related topics
-[Microsoft 365 Multi-Geo eDiscovery configuration](./multi-geo-ediscovery-configuration.md)
+[Microsoft 365 Multi-Geo eDiscovery configuration](./multi-geo-ediscovery-configuration.md)
enterprise Remove Licenses From User Accounts With Microsoft 365 Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/remove-licenses-from-user-accounts-with-microsoft-365-powershell.md
description: "Explains how to use PowerShell to remove Microsoft 365 licenses th
>[Learn how to remove licenses from user accounts](../admin/manage/remove-licenses-from-users.md) with the Microsoft 365 admin center. For a list of additional resources, see [Manage users and groups](/admin). >
+## Use the Microsoft Graph PowerShell SDK
+
+First, [connect to your Microsoft 365 tenant](/graph/powershell/get-started#authentication).
+
+Assigning and removing licenses for a user requires the User.ReadWrite.All permission scope or one of the other permissions listed in the ['Assign license' Graph API reference page](/graph/api/user-assignlicense).
+
+The Organization.Read.All permission scope is required to read the licenses available in the tenant.
+
+```powershell
+Connect-Graph -Scopes User.ReadWrite.All, Organization.Read.All
+```
+
+To view the licensing plan information in your organization, see the following topics:
+
+- [View licenses and services with PowerShell](view-licenses-and-services-with-microsoft-365-powershell.md)
+
+- [View account license and service details with PowerShell](view-account-license-and-service-details-with-microsoft-365-powershell.md)
+
+### Removing licenses from user accounts
+
+To remove licenses from an existing user account, use the following syntax:
+
+```powershell
+Set-MgUserLicense -UserId "<Account>" -RemoveLicenses @("<AccountSkuId1>") -AddLicenses @{}
+```
+
+This example removes the **SPE_E5** (Microsoft 365 E5) licensing plan from the user **BelindaN@litwareinc.com**:
+
+```powershell
+$e5Sku = Get-MgSubscribedSku -All | Where SkuPartNumber -eq 'SPE_E5'
+Set-MgUserLicense -UserId "belindan@litwareinc.com" -RemoveLicenses @($e5Sku.SkuId) -AddLicenses @{}
+```
+
+To remove all licenses from a group of existing licensed users, use the following syntax:
+
+```powershell
+$licensedUsers = Get-MgUser -Filter 'assignedLicenses/$count ne 0' `
+ -ConsistencyLevel eventual -CountVariable licensedUserCount -All `
+ -Select UserPrincipalName,DisplayName,AssignedLicenses
+
+foreach($user in $licensedUsers)
+{
+ $licencesToRemove = $user.AssignedLicenses | Select -ExpandProperty SkuId
+ $user = Set-MgUserLicense -UserId $user.UserPrincipalName -RemoveLicenses $licencesToRemove -AddLicenses @{}
+}
+```
+
+Another way to free up a license is by deleting the user account. For more information, see [Delete and restore user accounts with PowerShell](delete-and-restore-user-accounts-with-microsoft-365-powershell.md).
+ ## Use the Azure Active Directory PowerShell for Graph module
+>The Set-AzureADUserLicense cmdlet is scheduled to be retired. Please migrate your scripts to the Microsoft Graph SDK's Set-MgUserLicense cmdlet as described above. For more information, see [Migrate your apps to access the license managements APIs from Microsoft Graph](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/migrate-your-apps-to-access-the-license-managements-apis-from/ba-p/2464366).
+>
+ First, [connect to your Microsoft 365 tenant](connect-to-microsoft-365-powershell.md#connect-with-the-azure-active-directory-powershell-for-graph-module). Next, list the license plans for your tenant with this command.
Next, list the license plans for your tenant with this command.
Get-AzureADSubscribedSku | Select SkuPartNumber ```
-Next, get the sign-in name of the account for which you want remove a license, also known as the user principal name (UPN).
+Next, get the sign-in name of the account for which you want to remove a license, also known as the user principal name (UPN).
Finally, specify the user sign-in and license plan names, remove the "<" and ">" characters, and run these commands.
if($userList.Count -ne 0) {
## Use the Microsoft Azure Active Directory Module for Windows PowerShell
+>[!Note]
+>The Set-MsolUserLicense and New-MsolUser (-LicenseAssignment) cmdlets are scheduled to be retired. Please migrate your scripts to the Microsoft Graph SDK's Set-MgUserLicense cmdlet as described above. For more information, see [Migrate your apps to access the license managements APIs from Microsoft Graph](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/migrate-your-apps-to-access-the-license-managements-apis-from/ba-p/2464366).
+>
+ First, [connect to your Microsoft 365 tenant](connect-to-microsoft-365-powershell.md#connect-with-the-microsoft-azure-active-directory-module-for-windows-powershell). To view the licensing plan (**AccountSkuID**) information in your organization, see the following topics:
Another way to free up a license is by deleting the user account. For more infor
[Manage Microsoft 365 with PowerShell](manage-microsoft-365-with-microsoft-365-powershell.md)
-[Getting started with PowerShell for Microsoft 365](getting-started-with-microsoft-365-powershell.md)
+[Getting started with PowerShell for Microsoft 365](getting-started-with-microsoft-365-powershell.md)
enterprise Use The Centralized Deployment Powershell Cmdlets To Manage Add Ins https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/use-the-centralized-deployment-powershell-cmdlets-to-manage-add-ins.md
description: "Use the Centralized Deployment PowerShell cmdlets to help you depl
# Use the Centralized Deployment PowerShell cmdlets to manage add-ins
-As a Microsoft 365 global admin, you can deploy Office add-ins to users via the Centralized Deployment feature (see [Deploy Office Add-ins in the admin center](../admin/manage/manage-deployment-of-add-ins.md). In addition to deploying Office add-ins via the Microsoft 365 admin center, you can also use Microsoft PowerShell. Install the [O365 Centralized Add-In Deployment Module for Windows PowerShell](https://www.powershellgallery.com/packages/O365CentralizedAddInDeployment).
+As a Microsoft 365 global admin, you can deploy Office add-ins to users via the Centralized Deployment feature (see [Deploy Office Add-ins in the admin center](../admin/manage/manage-deployment-of-add-ins.md). In addition to deploying Office add-ins via the Microsoft 365 admin center, you can also use Microsoft PowerShell. Install the [O365 Centralized Add-In Deployment Module for Windows PowerShell](https://www.powershellgallery.com/packages/O365CentralizedAddInDeployment).
After you download the module, open a regular Windows PowerShell window and run the following cmdlet: ```powershell Import-Module -Name O365CentralizedAddInDeployment ```
-
+ ## Connect using your admin credentials Before you can use the Centralized Deployment cmdlets, you need to sign in.
-
+ 1. Start PowerShell.
-
+ 2. Connect to PowerShell by using your company admin credentials. Run the following cmdlet.
-
+ ```powershell Connect-OrganizationAddInService ```
-3. In the **Enter Credentials** page, enter your Microsoft 365 **User Admin**, or **Global admin** credentials. Alternately, you can enter your credentials directly into the cmdlet.
-
+3. In the **Enter Credentials** page, enter your Microsoft 365 **User Admin**, or **Global admin** credentials. Alternately, you can enter your credentials directly into the cmdlet.
+ Run the following cmdlet specifying your company admin credentials as a PSCredential object.
-
+ ```powershell $secpasswd = ConvertTo-SecureString "MyPassword" -AsPlainText -Force $mycredentials = New-Object System.Management.Automation.PSCredential ("serviceaccount@contoso.com", $secpasswd)
Before you can use the Centralized Deployment cmdlets, you need to sign in.
``` > [!NOTE]
-> For more information about using PowerShell, see [Connect to Microsoft 365 with PowerShell](./connect-to-microsoft-365-powershell.md).
-
+> For more information about using PowerShell, see [Connect to Microsoft 365 with PowerShell](./connect-to-microsoft-365-powershell.md).
+ ## Upload an add-in manifest
-Run the **New-OrganizationAdd-In** cmdlet to upload an add-in manifest from a path, which can be either a file location or URL. The following example shows a file location for the value of the _ManifestPath_ parameter.
-
+Run the **New-OrganizationAdd-In** cmdlet to upload an add-in manifest from a path, which can be either a file location or URL. The following example shows a file location for the value of the _ManifestPath_ parameter.
+ ```powershell New-OrganizationAddIn -ManifestPath 'C:\Users\Me\Desktop\taskpane.xml' -Locale 'en-US' ```
-You can also run the **New-OrganizationAdd-In** cmdlet to upload an add-in and assign it to users or groups directly by using the _Members_ parameter, as shown in the following example. Separate the email addresses of members with a comma.
-
+You can also run the **New-OrganizationAdd-In** cmdlet to upload an add-in and assign it to users or groups directly by using the _Members_ parameter, as shown in the following example. Separate the email addresses of members with a comma.
+ ```powershell New-OrganizationAddIn -ManifestPath 'C:\Users\Me\Desktop\taskpane.xml' -Locale 'en-US' -Members 'KathyBonner@contoso.com', 'MaxHargrave@contoso.com' ```
New-OrganizationAddIn -ManifestPath 'C:\Users\Me\Desktop\taskpane.xml' -Locale '
## Upload an add-in from the Office Store Run the **New-OrganizationAddIn** cmdlet to upload a manifest from the Office Store.
-
+ In the following example, the **New-OrganizationAddIn** cmdlet specifies the AssetId for an add-in for a United States location and content market.
-
+ ```powershell New-OrganizationAddIn -AssetId 'WA104099688' -Locale 'en-US' -ContentMarket 'en-US' ``` To determine the value for the _AssetId_ parameter, you can copy it from the URL of the Office Store webpage for the add-in. AssetIds always begin with "WA" followed by a number. For example, in the previous example, the source for the AssetId value of WA104099688 is the Office Store webpage URL for the add-in: [https://store.office.com/en-001/app.aspx?assetid=WA104099688](https://store.office.com/en-001/app.aspx?assetid=WA104099688).
-
-The values for the _Locale_ parameter and the _ContentMarket_ parameter are identical and indicate the country/region you're trying to install the add-in from. The format is en-US, fr-FR. and so forth.
-
+
+The values for the _Locale_ parameter and the _ContentMarket_ parameter are identical and indicate the country/region you're trying to install the add-in from. The format is en-US, fr-FR. and so forth.
+ > [!NOTE]
-> Add-ins uploaded from the Office Store will update automatically within a few days of the latest update being available on the Office Store.
-
+> Add-ins uploaded from the Office Store will update automatically within a few days of the latest update being available on the Office Store.
+ ## Get details of an add-in Run the **Get-OrganizationAddIn** cmdlet as shown below to get details of all add-ins uploaded to the tenant, included an add-in's product ID.
-
+ ```powershell Get-OrganizationAddIn ```
-Run the **Get-OrganizationAddIn** cmdlet with a value for the _ProductId_ parameter to specify which add-in you want to retrieve details for.
-
+Run the **Get-OrganizationAddIn** cmdlet with a value for the _ProductId_ parameter to specify which add-in you want to retrieve details for.
+ ```powershell Get-OrganizationAddIn -ProductId 6a75788e-1c6b-4e9b-b5db-5975a2072122 ``` To get full details of all the add-ins plus the assigned users and groups, pipe the output of the **Get-OrganizationAddIn** cmdlet to the Format-List cmdlet, as shown in the following example.
-
+ ```powershell foreach($G in (Get-organizationAddIn)){Get-OrganizationAddIn -ProductId $G.ProductId | Format-List} ```
foreach($G in (Get-organizationAddIn)){Get-OrganizationAddIn -ProductId $G.Produ
## Turn on or turn off an add-in To turn off an add-in so users and groups that are assigned to it will no longer have access, run the **Set-OrganizationAddIn** cmdlet with the _ProductId_ parameter and the _Enabled_ parameter set to `$false`, as shown in the following example.
-
+ ```powershell Set-OrganizationAddIn -ProductId 6a75788e-1c6b-4e9b-b5db-5975a2072122 -Enabled $false ``` To turn an add-in back on, run the same cmdlet with the _Enabled_ parameter set to `$true`.
-
+ ```powershell Set-OrganizationAddIn -ProductId 6a75788e-1c6b-4e9b-b5db-5975a2072122 -Enabled $true ``` ## Add or remove users from an add-in
-To add users and groups to a specific add-in, run the **Set-OrganizationAddInAssignments** cmdlet with the _ProductId_, _Add_, and _Members_ parameters. Separate the email addresses of members with a comma.
-
+To add users and groups to a specific add-in, run the **Set-OrganizationAddInAssignments** cmdlet with the _ProductId_, _Add_, and _Members_ parameters. Separate the email addresses of members with a comma.
+ ```powershell Set-OrganizationAddInAssignments -ProductId 6a75788e-1c6b-4e9b-b5db-5975a2072122 -Add -Members 'KathyBonner@contoso.com','sales@contoso.com' ```
-To remove users and groups, run the same cmdlet using the _Remove_ parameter.
-
+To remove users and groups, run the same cmdlet using the _Remove_ parameter.
+ ```powershell Set-OrganizationAddInAssignments -ProductId 6a75788e-1c6b-4e9b-b5db-5975a2072122 -Remove -Members 'KathyBonner@contoso.com','sales@contoso.com' ``` To assign an add-in to all users on the tenant, run the same cmdlet using the _AssignToEveryone_ parameter with the value set to `$true`.
-
+ ```powershell Set-OrganizationAddInAssignments -ProductId 6a75788e-1c6b-4e9b-b5db-5975a2072122 -AssignToEveryone $true ``` To not assign an add-in to everyone and revert to the previously assigned users and groups, you can run the same cmdlet and turn off the _AssignToEveryone_ parameter by setting its value to `$false`.
-
+ ```powershell Set-OrganizationAddInAssignments -ProductId 6a75788e-1c6b-4e9b-b5db-5975a2072122 -AssignToEveryone $false ``` ## Update an add-in
-To update an add-in from a manifest, run the **Set-OrganizationAddIn** cmdlet with the _ProductId_, _ManifestPath_, and _Locale_ parameters, as shown in the following example.
-
+To update an add-in from a manifest, run the **Set-OrganizationAddIn** cmdlet with the _ProductId_, _ManifestPath_, and _Locale_ parameters, as shown in the following example.
+ ```powershell Set-OrganizationAddIn -ProductId 6a75788e-1c6b-4e9b-b5db-5975a2072122 -ManifestPath 'C:\Users\Me\Desktop\taskpane.xml' -Locale 'en-US' ``` > [!NOTE]
-> Add-ins uploaded from the Office Store will update automatically within a few days of the latest update being available on the Office Store.
-
+> Add-ins uploaded from the Office Store will update automatically within a few days of the latest update being available on the Office Store.
+ ## Delete an add-in
-To delete an add-in, run the **Remove-OrganizationAddIn** cmdlet with the _ProductId_ parameter, as shown in the following example.
-
+To delete an add-in, run the **Remove-OrganizationAddIn** cmdlet with the _ProductId_ parameter, as shown in the following example.
+ ```powershell Remove-OrganizationAddIn -ProductId 6a75788e-1c6b-4e9b-b5db-5975a2072122 ```
Remove-OrganizationAddIn -ProductId 6a75788e-1c6b-4e9b-b5db-5975a2072122
<!-- ## Customize Microsoft Store add-ins for your organization
-You must customize the add-in before you deploy it to your organization. Add-ins older than version 1.1 are not supported by this feature.
+You must customize the add-in before you deploy it to your organization. Add-ins older than version 1.1 are not supported by this feature.
We recommend that you deploy a customized add-in to yourself first to make sure it works as expected before you deploy it to your entire organization. Note also the following restrictions: - All URLs must be absolute (include http or https) and valid.-- *DisplayName* must not exceed 125 characters -- *DisplayName*, *Resources* and *AppDomains* must not include the following characters:
-
+- *DisplayName* must not exceed 125 characters
+- *DisplayName*, *Resources* and *AppDomains* must not include the following characters:
+ - \< - \> - ;
- - =
+ - =
If you want to customize an add-in that has been deployed, you have to uninstall it in the admin center, and see [remove an add-in from local cache](#remove-an-add-in-from-local-cache) for steps to remove it from each computer it has been deployed to.
-To customize an add-in, run the **Set ΓÇôOrganizationAddInOverrides** cmdlet with the *ProductId* as a parameter, followed by the tag you want to overwrite and the new value. To find out how to get the *ProductId* see [get details of an add-in](#get-details-of-an-add-in) in this article. For example:
+To customize an add-in, run the **Set -OrganizationAddInOverrides** cmdlet with the *ProductId* as a parameter, followed by the tag you want to overwrite and the new value. To find out how to get the *ProductId* see [get details of an add-in](#get-details-of-an-add-in) in this article. For example:
```powershell
- Set-OrganizationAddInOverrides -ProductId 5b31b349-2c41-4f94-b720-6ee40349d391 -IconUrl "https://site.com/img.jpg"
+ Set-OrganizationAddInOverrides -ProductId 5b31b349-2c41-4f94-b720-6ee40349d391 -IconUrl "https://site.com/img.jpg"
``` To customize multiple tags for an add-in, add those tags to the commandline: ```powershell
-Set-OrganizationAddInOverrides -ProductId 5b31b349-2c41-4f94-b720-6ee40349d391 -Hosts h1, 2 -DisplayName "New DocuSign W" -IconUrl "https://site.com/img.jpg"
+Set-OrganizationAddInOverrides -ProductId 5b31b349-2c41-4f94-b720-6ee40349d391 -Hosts h1, 2 -DisplayName "New DocuSign W" -IconUrl "https://site.com/img.jpg"
``` > [!IMPORTANT]
Set-OrganizationAddInOverrides -ProductId 5b31b349-2c41-4f94-b720-6ee40349d391 -
| Tag | Description | | :- | :- |
-| \<IconURL> </br>| The URL of the image used as the add-inΓÇÖs icon (in admin center). </br> |
+| \<IconURL> </br>| The URL of the image used as the add-in's icon (in admin center). |
| \<DisplayName>| The title of the add-in (in admin center).| | \<Hosts>| List of apps that will support the add-in.|
-| \<SourceLocation> | The source URL that the add-in will connect to.|
-| \<AppDomains> | A list of domains that the add-in can connect with. |
-| \<SupportURL>| The URL users can use to access help and support. |
-| \<Resources> | This tag contains a number of elements including titles, tooltips, and icons of different sizes.|
+| \<SourceLocation> | The source URL that the add-in will connect to.|
+| \<AppDomains> | A list of domains that the add-in can connect with. |
+| \<SupportURL>| The URL users can use to access help and support. |
+| \<Resources> | This tag contains a number of elements including titles, tooltips, and icons of different sizes.|
| ### Customize Resources tag Any element in the <Resources> tag of the manifest can be customized dynamically. You first need to check the manifest to find the element id to which you want to assign a new value. The <Resources> tag looks like this: ```
-<Resources>
- <bt:Images>
- <bt:Image id=ΓÇ¥img16iconΓÇ¥ DefaultValue=ΓÇ¥https://site.com/img.jpgΓÇ¥
- </bt:Images>
-</Resources>
-```
-In this case, the element id for the image is ΓÇ£img16iconΓÇ¥ and the value associated with it is ΓÇ£http:<i></i>//site.<i></i>com/img.jpg.ΓÇ¥
+<Resources>
+ <bt:Images>
+ <bt:Image id="img16icon" DefaultValue="https://site.com/img.jpg"
+ </bt:Images>
+</Resources>
+```
+In this case, the element id for the image is "img16icon" and the value associated with it is "http:<i></i>//site.<i></i>com/img.jpg."
Once you have identified the elements you want to customize, use the following command in Powershell to assign new values to the elements: ```powershell
-Set-OrganizationAddInOverrides -Resources @{ΓÇ£ElementIDΓÇ¥ = ΓÇ£New ValueΓÇ¥; ΓÇ£NextElementIDΓÇ¥ = ΓÇ£Next New ValueΓÇ¥}
+Set-OrganizationAddInOverrides -Resources @{"ElementID" = "New Value"; "NextElementID" = "Next New Value"}
``` You can customize as many elements with the command as you need to.
You can customize as many elements with the command as you need to.
The only option currently available for deleting customizations is to delete all of them at once: ```powershell
-Remove-OrganizationAddInOverrides -ProductId 5b31b349-2c41-4f94-b720-6ee40349d391
+Remove-OrganizationAddInOverrides -ProductId 5b31b349-2c41-4f94-b720-6ee40349d391
``` ### View add-in customizations
-To view a list of applied customizations, run the **Get-OrganizationAddInOverrides** cmdlet. If **Get-OrganizationAddInOverrides** is run without a *ProductId* then a list of all add-ins with applied overrides are returned.
+To view a list of applied customizations, run the **Get-OrganizationAddInOverrides** cmdlet. If **Get-OrganizationAddInOverrides** is run without a *ProductId* then a list of all add-ins with applied overrides are returned.
```powershell
-Get-OrganizationAddInOverrides
+Get-OrganizationAddInOverrides
```
-If ProductId is specified, then a list of overrides applied to that add-in is returned.
+If ProductId is specified, then a list of overrides applied to that add-in is returned.
```powershell
-Get-OrganizationAddInOverrides -ProductId 5b31b349-2c41-4f94-b720-6ee40349d391
+Get-OrganizationAddInOverrides -ProductId 5b31b349-2c41-4f94-b720-6ee40349d391
``` ### Remove an add-in from local cache
-If an add-in has been deployed, it has to be removed from the cache in each computer before it can be customized. To remive an add-in from cache:
+If an add-in has been deployed, it has to be removed from the cache in each computer before it can be customized. To remove an add-in from cache:
-1. Navigate to the ΓÇ£UsersΓÇ¥ folder in C:\
+1. Navigate to the "Users" folder in C:\
1. Go to your user folder 1. Navigate to AppData\Local\Microsoft\Office and select the folder associated with your version of Office 1. In the *Wef* folder delete the *Manifests* folder.
If an add-in has been deployed, it has to be removed from the cache in each comp
## Get detailed help for each cmdlet You can look at detailed help for each cmdlet by using the Get-help cmdlet. For example, the following cmdlet provides detailed information about the Remove-OrganizationAddIn cmdlet.
-
+ ```powershell Get-help Remove-OrganizationAddIn -Full ```
enterprise View Account License And Service Details With Microsoft 365 Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/view-account-license-and-service-details-with-microsoft-365-powershell.md
description: "Explains how to use PowerShell to determine the Microsoft 365 serv
*This article applies to both Microsoft 365 Enterprise and Office 365 Enterprise.*
-In Microsoft 365, licenses from licensing plans (also called SKUs or Microsoft 365 plans) give users access to the Microsoft 365 services that are defined for those plans. However, a user might not have access to all the services that are available in a license that's currently assigned to them. You can use PowerShell for Microsoft 365 to view the status of services on user accounts.
+In Microsoft 365, licenses from licensing plans (also called SKUs or Microsoft 365 plans) give users access to the Microsoft 365 services that are defined for those plans. However, a user might not have access to all the services that are available in a license that's currently assigned to them. You can use PowerShell for Microsoft 365 to view the status of services on user accounts.
For more information about licensing plans, license, and services, see [View licenses and services with PowerShell](view-licenses-and-services-with-microsoft-365-powershell.md).
+## Use the Microsoft Graph PowerShell SDK
+
+First, [connect to your Microsoft 365 tenant](/graph/powershell/get-started#authentication).
+
+Reading user properties including license details requires the User.Read.All permission scope or one of the other permissions listed in the ['Get a user' Graph API reference page](/graph/api/user-get).
+
+```powershell
+Connect-Graph -Scopes User.Read.All
+```
+
+Next, list the license plans for your tenant with this command.
+
+```powershell
+Get-MgSubscribedSku
+```
+
+Use these commands to list the services that are available in each licensing plan.
+
+```powershell
+
+$allSKUs = Get-MgSubscribedSku -Property SkuPartNumber, ServicePlans
+$allSKUs | ForEach-Object {
+ Write-Host "Service Plan:" $_.SkuPartNumber
+ $_.ServicePlans | ForEach-Object {$_}
+}
+
+```
+
+Use these commands to list the licenses that are assigned to a user account.
+
+```powershell
+Get-MgUserLicenseDetail -UserId "<user sign-in name (UPN)>"
+```
+
+For example:
+
+```powershell
+Get-MgUserLicenseDetail -UserId "belindan@litwareinc.com"
+```
+
+### To view services for a user account
+
+To view all the Microsoft 365 services that a user has access to, use the following syntax:
+
+```powershell
+(Get-MgUserLicenseDetail -UserId <user account UPN> -Property ServicePlans)[<LicenseIndexNumber>].ServicePlans
+```
+
+This example shows the services to which the user BelindaN@litwareinc.com has access. This shows the services that are associated with all licenses that are assigned to her account.
+
+```powershell
+(Get-MgUserLicenseDetail -UserId belindan@litwareinc.com -Property ServicePlans).ServicePlans
+```
+
+This example shows the services that user BelindaN@litwareinc.com has access to from the first license that's assigned to her account (the index number is 0).
+
+```powershell
+(Get-MgUserLicenseDetail -UserId belindan@litwareinc.com -Property ServicePlans)[0].ServicePlans
+```
+
+To view all the services for a user who has been assigned *multiple licenses*, use the following syntax:
+
+```powershell
+$userUPN="<user account UPN>"
+$allLicenses = Get-MgUserLicenseDetail -UserId $userUPN -Property SkuPartNumber, ServicePlans
+$allLicenses | ForEach-Object {
+ Write-Host "License:" $_.SkuPartNumber
+ $_.ServicePlans | ForEach-Object {$_}
+}
+
+```
+ ## Use the Azure Active Directory PowerShell for Graph module First, [connect to your Microsoft 365 tenant](connect-to-microsoft-365-powershell.md#connect-with-the-azure-active-directory-powershell-for-graph-module).
$licArray += ""
} $licArray ```
-
+ ## See also [Manage Microsoft 365 user accounts, licenses, and groups with PowerShell](manage-user-accounts-and-licenses-with-microsoft-365-powershell.md)
enterprise View Licensed And Unlicensed Users With Microsoft 365 Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/view-licensed-and-unlicensed-users-with-microsoft-365-powershell.md
description: This article explains how to use PowerShell to view licensed and un
User accounts in your Microsoft 365 organization may have some, all, or none of the available licenses assigned to them from the licensing plans that are available in your organization. You can use PowerShell for Microsoft 365 to quickly find the licensed and unlicensed users in your organization.
+## Use the Microsoft Graph PowerShell SDK
+
+First, [connect to your Microsoft 365 tenant](/graph/powershell/get-started#authentication).
+
+Reading user properties including license details requires the User.Read.All permission scope or one of the other permissions listed in the ['Get a user' Graph API reference page](/graph/api/user-get).
+
+The Organization.Read.All permission scope is required to read the licenses available in the tenant.
+
+```powershell
+Connect-Graph -Scopes User.Read.All, Organization.Read.All
+```
+
+To view the license details of a specific user account, run the following command:
+
+```powershell
+Get-MgUserLicenseDetail -UserId "<user sign-in name (UPN)>"
+```
+
+For example:
+
+```powershell
+Get-MgUserLicenseDetail -UserId "belindan@litwareinc.com"
+```
+
+To view the list of all user accounts in your organization that have NOT been assigned any of your licensing plans (unlicensed users), run the following command:
+
+```powershell
+Get-MgUser -Filter 'assignedLicenses/$count eq 0' -ConsistencyLevel eventual -CountVariable unlicensedUserCount -All
+
+Write-Host "Found $unlicensedUserCount unlicensed users."
+```
+
+To view the list of all member user accounts (excluding guests) in your organization that have NOT been assigned any of your licensing plans (unlicensed users), run the following command:
+
+```powershell
+Get-MgUser -Filter "assignedLicenses/`$count eq 0 and userType eq 'Member'" -ConsistencyLevel eventual -CountVariable unlicensedUserCount -All
+
+Write-Host "Found $unlicensedUserCount unlicensed users (excluding guests)."
+```
+
+To view the list of all user accounts in your organization that have been assigned any of your licensing plans (licensed users), run the following command:
+
+```powershell
+Get-MgUser -Filter 'assignedLicenses/$count ne 0' -ConsistencyLevel eventual -CountVariable licensedUserCount -All -Select UserPrincipalName,DisplayName,AssignedLicenses | Format-Table -Property UserPrincipalName,DisplayName,AssignedLicenses
+
+Write-Host "Found $licensedUserCount licensed users."
+```
+
+To view the list of all user accounts in your organization that have an E5 license assigned, run the following command:
+
+```powershell
+$e5Sku = Get-MgSubscribedSku -All | Where SkuPartNumber -eq 'SPE_E5'
+
+Get-MgUser -Filter "assignedLicenses/any(x:x/skuId eq $($e5sku.SkuId) )" -ConsistencyLevel eventual -CountVariable e5licensedUserCount -All
+
+Write-Host "Found $e5licensedUserCount E5 licensed users."
+```
+ ## Use the Azure Active Directory PowerShell for Graph module First, [connect to your Microsoft 365 tenant](connect-to-microsoft-365-powershell.md#connect-with-the-azure-active-directory-powershell-for-graph-module).
enterprise View Licenses And Services With Microsoft 365 Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/view-licenses-and-services-with-microsoft-365-powershell.md
Every Microsoft 365 subscription consists of the following elements:
You can use PowerShell for Microsoft 365 to view details about the available licensing plans, licenses, and services in your Microsoft 365 organization. For more information about the products, features, and services that are available in different Office 365 subscriptions, see [Office 365 Plan Options](/office365/servicedescriptions/office-365-platform-service-description/office-365-plan-options).
+## Use the Microsoft Graph PowerShell SDK
+
+First, [connect to your Microsoft 365 tenant](/graph/powershell/get-started#authentication).
+
+Reading subscription license plans requires the Organization.Read.All permission scope or one of the other permissions listed in the ['List subscribedSkus' Graph API reference page](/graph/api/subscribedsku-list).
+
+```powershell
+Connect-Graph -Scopes Organization.Read.All
+```
+
+To view summary information about your current licensing plans and the available licenses for each plan, run this command:
+
+```powershell
+Get-MgSubscribedSku | Select -Property Sku*, ConsumedUnits -ExpandProperty PrepaidUnits | Format-List
+```
+
+The results contain:
+
+- **SkuPartNumber:** Shows the available licensing plans for your organization. For example, `ENTERPRISEPACK` is the license plan name for Office 365 Enterprise E3.
+
+- **Enabled:** Number of licenses that you've purchased for a specific licensing plan.
+
+- **ConsumedUnits:** Number of licenses that you've assigned to users from a specific licensing plan.
+
+To view details about the Microsoft 365 services that are available in all of your license plans, first display a list of your license plans.
+
+```powershell
+Get-MgSubscribedSku
+```
+
+Next, store the license plans information in a variable.
+
+```powershell
+$licenses = Get-MgSubscribedSku
+```
+
+Next, display the services in a specific license plan.
+
+```powershell
+$licenses[<index>].ServicePlans
+```
+
+\<index> is an integer that specifies the row number of the license plan from the display of the `Get-MgSubscribedSku | Select SkuPartNumber` command, minus 1.
+
+For example, if the display of the `Get-MgSubscribedSku | Select SkuPartNumber` command is this:
+
+```powershell
+SkuPartNumber
+-
+WIN10_VDA_E5
+EMSPREMIUM
+ENTERPRISEPREMIUM
+FLOW_FREE
+```
+
+Then the command to display the services for the ENTERPRISEPREMIUM license plan is this:
+
+```powershell
+$licenses[2].ServicePlans
+```
+
+ENTERPRISEPREMIUM is the third row. Therefore, the index value is (3 - 1), or 2.
+
+For a complete list of license plans (also known as product names), their included service plans, and their corresponding friendly names, see [Product names and service plan identifiers for licensing](/azure/active-directory/users-groups-roles/licensing-service-plan-reference).
+ ## Use the Azure Active Directory PowerShell for Graph module First, [connect to your Microsoft 365 tenant](connect-to-microsoft-365-powershell.md#connect-with-the-azure-active-directory-powershell-for-graph-module).
lighthouse M365 Lighthouse Configure Portal Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-configure-portal-security.md
- Adm_O365 - AdminSurgePortfolio-- M365-Lighthouse
+- M365-Lighthouse
search.appverid: MET150 description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to configure portal security."
Protecting access to customer data when a Managed Service Provider (MSP) has del
## Set up multifactor authentication (MFA)
-As mentioned in the blog post [Your Pa$$word doesn't matter](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/your-pa-word-doesn-t-matter/ba-p/731984):
+As mentioned in the blog post [Your Pa$$word doesn't matter](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/your-pa-word-doesn-t-matter/ba-p/731984):
> "Your password doesn't matter, but MFA does. Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA."
When users access Lighthouse for the first time, they'll be prompted to set up M
## Set up role-based access control
-Role-based access control (RBAC) grants access to resources or information based on user roles. Access to customer tenant data and settings in Lighthouse is restricted to specific roles from the Cloud Solution Provider (CSP) program. To set up RBAC roles in Lighthouse, we recommend using Granular Delegated Admin Privileges (GDAP) to implement granular assignments for users. Delegated Admin Privileges (DAP) is still required for the tenant to onboard successfully, but GDAP-only customers will soon be able to onboard without a dependency on DAP. GDAP permissions take precedence when DAP and GDAP coexist for a customer.
+Role-based access control (RBAC) grants access to resources or information based on user roles. Access to customer tenant data and settings in Lighthouse is restricted to specific roles from the Cloud Solution Provider (CSP) program. To set up RBAC roles in Lighthouse, we recommend using Granular Delegated Admin Privileges (GDAP) to implement granular assignments for users. Delegated Admin Privileges (DAP) is still required for the tenant to onboard successfully, but GDAP-only customers will soon be able to onboard without a dependency on DAP. GDAP permissions take precedence when DAP and GDAP coexist for a customer.
To set up a GDAP relationship, see [Obtain granular admin permissions to manage a customer's service](/partner-center/gdap-obtain-admin-permissions-to-manage-customer). For more information on which roles we recommend use Lighthouse, see [Overview of permissions in Microsoft 365 Lighthouse](m365-lighthouse-overview-of-permissions.md).
For non-customer tenant-related actions in Lighthouse (for example, onboarding,
## Set up Azure AD Privileged Identity Management (PIM)
-MSPs can minimize the number of people who have high-privilege role access to secure information or resources by using PIM. PIM reduces the chance of a malicious person gaining access to resources or authorized users inadvertently impacting a sensitive resource. MSPs can also grant users just-in-time high privilege roles to access resources, make broad changes, and monitor what the designated users are doing with their privileged access.
+MSPs can minimize the number of people who have high-privilege role access to secure information or resources by using PIM. PIM reduces the chance of a malicious person gaining access to resources or authorized users inadvertently impacting a sensitive resource. MSPs can also grant users just-in-time high privilege roles to access resources, make broad changes, and monitor what the designated users are doing with their privileged access.
> [!NOTE] > Using Azure AD PIM requires an Azure AD Premium P2 license in the partner tenant. The following steps elevate partner tenant users to time-scoped higher privilege roles by using PIM:
-1. Create a role-assignable group as described in the article [Create a group for assigning roles in Azure Active Directory](/azure/active-directory/roles/groups-create-eligible).
+1. Create a role-assignable group as described in the article [Create a group for assigning roles in Azure Active Directory](/azure/active-directory/roles/groups-create-eligible).
-2. Go to [Azure AD – All Groups](https://portal.azure.com/#blade/Microsoft_AAD_IAM/GroupsManagementMenuBlade/AllGroups) and add the new group as a member of a security group for high-privilege roles (for example, Admin Agents security group for DAP or a similarly respective security group for GDAP roles).
+2. Go to [Azure AD ΓÇô All Groups](https://portal.azure.com/#blade/Microsoft_AAD_IAM/GroupsManagementMenuBlade/AllGroups) and add the new group as a member of a security group for high-privilege roles (for example, Admin Agents security group for DAP or a similarly respective security group for GDAP roles).
-3. Set up privileged access to the new group as described in the article [Assign eligible owners and members for privileged access groups](/azure/active-directory/privileged-identity-management/groups-assign-member-owner).
+3. Set up privileged access to the new group as described in the article [Assign eligible owners and members for privileged access groups](/azure/active-directory/privileged-identity-management/groups-assign-member-owner).
-To learn more about PIM, see [What is Privileged Identity Management?](/azure/active-directory/privileged-identity-management/pim-configure)
+To learn more about PIM, see [What is Privileged Identity Management?](/azure/active-directory/privileged-identity-management/pim-configure)
## Set up risk-based Azure AD Conditional Access
-MSPs may use risk-based Conditional Access to make sure their staff members prove their identity by using MFA and by changing their password when detected as a risky user (with leaked credentials or per Azure AD threat intelligence). Users must also sign in from a familiar location or registered device when detected as a risky sign-in. Other risky behaviors include signing in from a malicious or anonymous IP address or from an atypical or impossible travel location, using an anomalous token, using a password from a password spray, or exhibiting other unusual sign-in behavior. Depending on a user's risk level, MSPs may also choose to block access upon sign-in. To learn more about risks, see [What is risk?](/azure/active-directory/identity-protection/concept-identity-protection-risks)
+MSPs may use risk-based Conditional Access to make sure their staff members prove their identity by using MFA and by changing their password when detected as a risky user (with leaked credentials or per Azure AD threat intelligence). Users must also sign in from a familiar location or registered device when detected as a risky sign-in. Other risky behaviors include signing in from a malicious or anonymous IP address or from an atypical or impossible travel location, using an anomalous token, using a password from a password spray, or exhibiting other unusual sign-in behavior. Depending on a user's risk level, MSPs may also choose to block access upon sign-in. To learn more about risks, see [What is risk?](/azure/active-directory/identity-protection/concept-identity-protection-risks)
> [!NOTE] > Conditional Access requires an Azure AD Premium P2 license in the partner tenant. To set up Conditional Access, see [Configuring Azure Active Directory Conditional Access](/appcenter/general/configuring-aad-conditional-access). ## Related content
-[Password reset permissions](/azure/active-directory/roles/permissions-reference#password-reset-permissions) (article)\
+[Password reset permissions](/azure/active-directory/roles/permissions-reference#password-reset-permissions) (article)\
[Requirements for Microsoft 365 Lighthouse](m365-lighthouse-requirements.md) (article)\ [Overview of Microsoft 365 Lighthouse](m365-lighthouse-overview.md) (article)\ [Sign up for Microsoft 365 Lighthouse](m365-lighthouse-sign-up.md) (article)\
lighthouse M365 Lighthouse Known Issues https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-known-issues.md
- Adm_O365 - AdminSurgePortfolib-- M365-Lighthouse
+- M365-Lighthous
search.appverid: MET150 description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, see a list of known issues for Lighthouse by feature area."
This article lists the known issues for Microsoft 365 Lighthouse by feature area
| **Deactivate and Reactivate actions are not listed in audit logs** | The following activities are currently not reported on the Audit logs page in Lighthouse: <ul><li>Name: offboardTenant \| Action: Inactivate a customer</li> <li>Name: resetTenantOnboardingStatus \| Action: Reactive customer</li></ul> | There's no workaround, but we're working on a fix. These activities will appear in audit logs once the fix is deployed in the service. | | **Filter is not showing all users** | When MSP technicians try to filter by using **Initiated By**, the list of all User Principal Names (UPNs) ΓÇô corresponding to email IDs of the technicians who initiated actions generating audit logs ΓÇô isn't fully displayed under the filter.<br><br>Note that the audit logs themselves will be fully displayed; only the ability to filter them by using **Initiated By** is impacted. | There's no workaround, but we're working on a fix. The filter will revert to its expected behavior ΓÇô displaying the full list of UPNs to filter by ΓÇô once the fix is deployed in the service. |
-## Delegated Admin PrivilegesΓÇ»(DAP)
+## Delegated Admin Privileges (DAP)
| Issue | Description | Solution | | - | - | - | | **Permissions delay when changing DAP roles** | If an MSP technician is added to or removed from the Admin Agent or Helpdesk Agent group, there may be a delay in reflecting the appropriate permissions within Lighthouse. | The issue will resolve within 30 minutes. No additional steps are required. |
-## Granular Delegated Admin PrivilegesΓÇ»(GDAP)
+## Granular Delegated Admin Privileges (GDAP)
> [!NOTE] > GDAP is currently in [technical preview](/partner-center/announcements/2022-february#6) (public preview) to allow partners to assign granular permissions before GDAP is generally available.
Currently, DAP is required to onboard customers to Lighthouse. We recommend also
[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)\ [Troubleshoot and resolve problems and error messages in Microsoft 365 Lighthouse](m365-lighthouse-troubleshoot.md) (article)\
-[Get help and support for Microsoft 365 Lighthouse](m365-lighthouse-get-help-and-support.md) (article)
+[Get help and support for Microsoft 365 Lighthouse](m365-lighthouse-get-help-and-support.md) (article)
lighthouse M365 Lighthouse Manage Tenant List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-manage-tenant-list.md
- Adm_O365 - AdminSurgePortfolio-- M365-Lighthouse
+- M365-Lighthouse
search.appverid: MET150 description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to manage your tenant list."
After you've created and assigned tags, you can use them to filter your tenants.
## Related content
-[Sign up for Microsoft 365 Lighthouse](m365-lighthouse-sign-up.md) (article)
-[Microsoft 365 Lighthouse Device compliance page overview](m365-lighthouse-device-compliance-page-overview.md) (article)
-[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
+[Sign up for Microsoft 365 Lighthouse](m365-lighthouse-sign-up.md) (article)
+[Microsoft 365 Lighthouse Device compliance page overview](m365-lighthouse-device-compliance-page-overview.md) (article)
+[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
lighthouse M365 Lighthouse Mitigate Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-mitigate-threats.md
- Adm_O365 - AdminSurgePortfolio-- M365-Lighthouse
+- M365-Lighthouse
search.appverid: MET150 description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn about the mitigate threats with Microsoft Defender Antivirus."
Microsoft 365 Lighthouse lets partners investigate and mitigate threats across a
## Before you begin -- Microsoft 365 Lighthouse is deployed in the partner tenant only—not in the customer tenants, but make sure you and your customer tenants meet the requirements listed in [Microsoft 365 Lighthouse requirements](m365-lighthouse-requirements.md).
+- Microsoft 365 Lighthouse is deployed in the partner tenant onlyΓÇönot in the customer tenants, but make sure you and your customer tenants meet the requirements listed in [Microsoft 365 Lighthouse requirements](m365-lighthouse-requirements.md).
- Users must be running Microsoft Defender Antivirus (included with Windows). Lighthouse does not support non-Microsoft antivirus software. For more information, see [Turn on Microsoft Defender Antivirus](/mem/intune/user-help/turn-on-defender-windows).
You can also restart multiple devices by selecting the checkbox next to each dev
## Related content [Requirements for Microsoft 365 Lighthouse](m365-lighthouse-requirements.md) (article)\
-[Threat management page overview ](m365-lighthouse-threat-management-page-overview.md) (article)\
+[Threat management page overview](m365-lighthouse-threat-management-page-overview.md) (article)\
[Create a compliance policy in Microsoft Intune](/mem/intune/protect/create-compliance-policy) (article)\ [Turn on Microsoft Defender Antivirus](/mem/intune/user-help/turn-on-defender-windows) (article)\
-[Microsoft Security Intelligence](https://www.microsoft.com/wdsi/threats) (web page)
+[Microsoft Security Intelligence](https://www.microsoft.com/wdsi/threats) (web page)
lighthouse M365 Lighthouse Overview Of Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-overview-of-permissions.md
Delegated access to customer tenants is required for Managed Service Providers (
We recommend assigning roles to groups of MSP technicians based on the tasks each group needs to perform on behalf of the customer. For example, Service Desk Technicians may just need to read customer tenant data or reset user passwords. In contrast, Escalation Engineers may need to take more corrective actions to update customer tenant security settings. It's a best practice to assign the least permissive role required to complete a task so that customer and partner data is kept secure. We recommend using Privileged Identity Management (PIM) to enable time-scoped access to the Global Administrator role, if needed. Giving too many users global access is a security risk, and we recommend limiting it as much as possible. For more information on how to enable PIM, see [Set up Azure AD PIM.](m365-lighthouse-configure-portal-security.md#set-up-azure-ad-privileged-identity-management-pim)
-The table in the next section describes which GDAP roles grant permission to read customer data and take action on customer tenants in Lighthouse. See [Permissions in the partner tenant](#permissions-in-the-partner-tenant) in this article for additional roles required to manage Lighthouse entities (for example, tags and Lighthouse service requests).
+The tables in the next section describe which GDAP roles grant permission to read customer data and take action on customer tenants in Lighthouse. See [Permissions in the partner tenant](#permissions-in-the-partner-tenant) in this article for additional roles required to manage Lighthouse entities (for example, tags and Lighthouse service requests).
> [!NOTE] >GDAP is currently in [technical preview](/partner-center/announcements/2022-february#6) (public preview) to allow partners to assign granular permissions before GDAP is generally available. Check [Known Issues](m365-lighthouse-known-issues.md) if you're having a problem accessing or performing an action in Lighthouse.
-## Example MSP service tiers and recommended GDAP roles
+## Example MSP service tiers, recommended GDAP roles, and permissions
-The following table lists the recommended GDAP roles for some example MSP service tiers and the actions those roles can perform on the different Lighthouse pages.
+The following table lists the recommended GDAP roles for some example MSP service tiers.
-|| Account&nbsp;Managers| Service&nbsp;Desk&nbsp;Technician |System&nbsp;Administrators | Escalation&nbsp;Engineers|
+|| Account Managers| Service Desk Technicians | System Administrators | Escalation Engineers|
|||||| | **Recommended GDAP roles** |<ul><li>Helpdesk Administrator</li></ul> |<ul><li>Security Reader<br>+</li><li>Helpdesk Administrator</li></ul> |<ul><li>Global Reader<br>+</li><li>User Administrator<br>+</li><li>Authentication Administrator</li></ul> |<ul><li>Global Reader<br>+</li><li>User Administrator<br>+</li><li>Intune Administrator<br>+</li><li>Security Administrator</li></ul>|
-|**Lighthouse&nbsp;page&nbsp;+&nbsp;allowed&nbsp;actions** |
-| **Home** | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> |
-| **Tenants** | <ul><li>View tenants list</li><li>Update customer contacts and website</li><li>View deployment plans</li></ul> | <ul><li>View tenants list</li><li>Update customer contacts and website</li><li>View deployment plans</li></ul> | <ul><li>View tenants list</li><li>Update customer contacts and website</li><li>View deployment plans</li><li>View Microsoft 365 services usage</li></ul> | <ul><li>View tenants list</li><li>Update customer contacts and website</li><li>View deployment plans</li><li>View Microsoft 365 services usage</li></ul> |
-| **Users** | <ul><li>View tenant level (non-user specific) data</li><li>Search user accounts across tenants</li><li>Reset password for non-administrators*</li></ul> | <ul><li>View all user-specific data</li><li>Search user accounts across tenants</li><li>Reset password for non-administrators*</li></ul>| <ul><li>View all user-specific data</li><li>Search user accounts across tenants</li><li>Reset password for non-administrators*</i><li>Block sign-in</li></ul> | <ul><li>View all user-specific data</li><li>Search user accounts across tenants</li><li>Reset password for non-administrators*</li><li>Block sign-in</li><li>Confirm compromised users</li><li>Dismiss risk for users</li></ul> |
-| **Devices** | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li><li>Sync device</li><li>Restart device</li><li>Collect diagnostics</li></ul>|
-| **Threat management** | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li><li>Run full scan</li><li>Run quick scan</li><li>Update antivirus protection</li><li>Reboot device</li></ul>|
-| **Baselines** | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> |
-| **Windows 365** | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> |
-| **Service health****|
-|**Audit logs****|
+
+The following table lists the actions that the example MSP service tiers can perform on the different Lighthouse pages as determined by their assigned GDAP roles (which are indicated in the previous table).
+
+| Lighthouse page | Account Managers allowed actions| Service Desk Technicians allowed actions |System Administrators allowed actions | Escalation Engineers allowed actions|
+||||||
+| Home | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> |
+| Tenants | <ul><li>View tenants list</li><li>Update customer contacts and website</li><li>View deployment plans</li></ul> | <ul><li>View tenants list</li><li>Update customer contacts and website</li><li>View deployment plans</li></ul> | <ul><li>View tenants list</li><li>Update customer contacts and website</li><li>View deployment plans</li><li>View Microsoft 365 services usage</li></ul> | <ul><li>View tenants list</li><li>Update customer contacts and website</li><li>View deployment plans</li><li>View Microsoft 365 services usage</li></ul> |
+| Users | <ul><li>View tenant level (non-user specific) data</li><li>Search user accounts across tenants</li><li>Reset password for non-administrators*</li></ul> | <ul><li>View all user-specific data</li><li>Search user accounts across tenants</li><li>Reset password for non-administrators*</li></ul>| <ul><li>View all user-specific data</li><li>Search user accounts across tenants</li><li>Reset password for non-administrators*</i><li>Block sign-in</li></ul> | <ul><li>View all user-specific data</li><li>Search user accounts across tenants</li><li>Reset password for non-administrators*</li><li>Block sign-in</li><li>Confirm compromised users</li><li>Dismiss risk for users</li></ul> |
+| Devices | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li><li>Sync device</li><li>Restart device</li><li>Collect diagnostics</li></ul>|
+| Threat management | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li><li>Run full scan</li><li>Run quick scan</li><li>Update antivirus protection</li><li>Reboot device</li></ul>|
+| Baselines | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> |
+| Windows 365 | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> | <ul><li>View all data</li></ul> |
+| Service health**| &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;N/A | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;N/A | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;N/A | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;N/A |
+| Audit logs**| &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;N/A | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;N/A | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;N/A | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;N/A |
*See [Password reset permissions](/azure/active-directory/roles/permissions-reference#password-reset-permissions) for a table that lists which roles are required to reset passwords for customer tenant administrators.
-**Other roles and permissions are required to view service health and audit logs. For more information, see [Permissions in the partner tenant](#permissions-in-the-partner-tenant).
+**Different roles and permissions are required to view Service health and Audit logs. For more information, see [Permissions in the partner tenant](#permissions-in-the-partner-tenant).
> [!NOTE] > If you get a message in Lighthouse saying that you don't have permission to view or edit information, you're assigned a role that doesn't have the appropriate permissions to perform the action. You'll need to reach out to an admin in your partner tenant who can assign you the appropriate role for the action you're trying to perform.
lighthouse M365 Lighthouse Requirements https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-requirements.md
- Adm_O365 - AdminSurgePortfolio-- M365-Lighthouse
+- M365-Lighthouse
search.appverid: MET150 description: "For Managed Service Providers (MSPs), get a list of requirements to use Microsoft 365 Lighthouse." # Requirements for Microsoft 365 Lighthouse
-Microsoft 365 Lighthouse is an admin portal that helps Managed Service Providers (MSPs) secure and manage devices, data, and users at scale for small- and medium-sized business (SMB) customers.
+Microsoft 365 Lighthouse is an admin portal that helps Managed Service Providers (MSPs) secure and manage devices, data, and users at scale for small- and medium-sized business (SMB) customers.
-MSPs must be enrolled in the Cloud Solution Provider (CSP) program as an Indirect Reseller or Direct Bill partner to use Lighthouse.
+MSPs must be enrolled in the Cloud Solution Provider (CSP) program as an Indirect Reseller or Direct Bill partner to use Lighthouse.
In addition, each MSP customer tenant must qualify for Lighthouse by meeting the following requirements:
-
+ - Must have delegated access set up for the Managed Service Provider (MSP) to be able to manage the customer tenant* - Must have at least one Microsoft 365 Business Premium, Microsoft 365 E3, or Windows 365 Business license-- Must have no more than 1000 licensed users
+- Must have no more than 1000 licensed users
*Delegated Admin Privileges (DAP) is required to onboard customers to Lighthouse. We recommend also establishing Granular Delegated Admin Privileges (GDAP) with your customers to enable more secure delegated access. While DAP and GDAP coexist, GDAP will take precedence for customers where both models are in place. Soon, customers with just GDAP (and no DAP) will be able to onboard to Lighthouse.
-## Requirements for enabling device management
+## Requirements for enabling device management
To view customer tenant devices on the device management pages, an MSP must: -- Enroll all customer devices in Microsoft Endpoint Manager (MEM). For more information, see [Enroll devices in Microsoft Intune](/mem/intune/enrollment/).-- Assign compliance policies to all customer devices. For more information, see [Create a compliance policy in Microsoft Intune](/mem/intune/protect/create-compliance-policy).
+- Enroll all customer devices in Microsoft Endpoint Manager (MEM). For more information, see [Enroll devices in Microsoft Intune](/mem/intune/enrollment/).
+- Assign compliance policies to all customer devices. For more information, see [Create a compliance policy in Microsoft Intune](/mem/intune/protect/create-compliance-policy).
-## Requirements for enabling user management
+## Requirements for enabling user management
-For customer data to show up in reports on user management pages, including Risky users, Multifactor authentication, and Password reset, customer tenants must have licenses for Azure Active Directory Premium P1 or later. Azure AD Premium P1 is included with Microsoft 365 Business Premium and Microsoft 365 E3.
+For customer data to show up in reports on user management pages, including Risky users, Multifactor authentication, and Password reset, customer tenants must have licenses for Azure Active Directory Premium P1 or later. Azure AD Premium P1 is included with Microsoft 365 Business Premium and Microsoft 365 E3.
-## Requirements for enabling threat management
+## Requirements for enabling threat management
-To view customer tenant devices and threats on the threat management pages, you must enroll all customer tenant devices in Microsoft Endpoint Manager (MEM) and protect them by running Microsoft Defender Antivirus. 
+To view customer tenant devices and threats on the threat management pages, you must enroll all customer tenant devices in Microsoft Endpoint Manager (MEM) and protect them by running Microsoft Defender Antivirus.
-For more information, see [Enroll devices in Microsoft Intune](/mem/intune/enrollment/).
+For more information, see [Enroll devices in Microsoft Intune](/mem/intune/enrollment/).
-Microsoft Defender Antivirus is part of the Windows operating system and is enabled by default on devices running Windows 10.
+Microsoft Defender Antivirus is part of the Windows operating system and is enabled by default on devices running Windows 10.
> [!NOTE]
-> If you're using a non-Microsoft antivirus solution and not Microsoft Defender Antivirus, Microsoft Defender Antivirus is disabled automatically. When you uninstall the non-Microsoft antivirus solution, Microsoft Defender Antivirus is activated automatically to protect your Windows devices from threats.
+> If you're using a non-Microsoft antivirus solution and not Microsoft Defender Antivirus, Microsoft Defender Antivirus is disabled automatically. When you uninstall the non-Microsoft antivirus solution, Microsoft Defender Antivirus is activated automatically to protect your Windows devices from threats.
## Related content
Microsoft Defender Antivirus is part of the Windows operating system and is enab
[Microsoft 365 Lighthouse Device compliance page overview](m365-lighthouse-device-compliance-page-overview.md) (article)\ [Microsoft 365 Lighthouse Users page overview](m365-lighthouse-users-page-overview.md) (article)\ [Microsoft 365 Lighthouse Threat management page overview](m365-lighthouse-threat-management-page-overview.md) (article)\
-[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml)ΓÇ»(article)
-
+[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
lighthouse M365 Lighthouse Search For Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-search-for-users.md
- Adm_O365 - AdminSurgePortfolio-- M365-Lighthouse
+- M365-Lighthouse
search.appverid: MET150 description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to search for users."
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthous
Microsoft 365 Lighthouse lets you search for a specific user across all active tenants. This allows you to find a user quickly without needing to navigate different tenants.
-1. In the left navigation pane in Lighthouse, select **Users**.
+1. In the left navigation pane in Lighthouse, select **Users**.
-2. Select the **Search users** tab.
+2. Select the **Search users** tab.
-3. In the search box, enter a display name or user principal name (UPN).
+3. In the search box, enter a display name or user principal name (UPN).
-4. From the search results list, select the user you want to research.
+4. From the search results list, select the user you want to research.
## Next steps
Once the user is found, you can reset their password or block their account. For
## Related content
-[Manage Microsoft 365 user accounts ](../enterprise/manage-microsoft-365-accounts.md) (article)\
+[Manage Microsoft 365 user accounts](../enterprise/manage-microsoft-365-accounts.md) (article)\
[Reset user password](m365-lighthouse-reset-user-password.md) (article)\ [Block user sign-in](m365-lighthouse-block-user-signin.md) (article)
lighthouse M365 Lighthouse Tenants Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-tenants-page-overview.md
- Adm_O365 - AdminSurgePortfolio-- M365-Lighthouse
+- M365-Lighthouse
search.appverid: MET150 description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn about the Tenants page."
Microsoft 365 Lighthouse lets you manage tenant accounts by selecting **Tenants*
The Tenants page also includes the following options: -- **Export:** Select to export tenant data to an Excel comma-separated values (.csv) file.-- **Manage Tags:** Select to add, edit, or delete a tag.-- **Assign Tags:** Select to assign a tag to a tenant.-- **Search:** Enter keywords to quickly locate a specific tenant in the list.
+- **Export:** Select to export tenant data to an Excel comma-separated values (.csv) file.
+- **Manage Tags:** Select to add, edit, or delete a tag.
+- **Assign Tags:** Select to assign a tag to a tenant.
+- **Search:** Enter keywords to quickly locate a specific tenant in the list.
:::image type="content" source="../media/m365-lighthouse-tenants-page-overview/tenant-page-overview.png" alt-text="Screenshot of the Tenant page.":::
The Tenants page also includes the following options:
The tenant list provides insights into the different tenants you have a contract with, including their tenant Lighthouse onboarding status. The tenant list also lets you tag tenants to provide different filters throughout Lighthouse, and drill down to learn more about a given tenant and the status of its deployment plan.
-After your tenants meet the [Lighthouse onboarding requirements](m365-lighthouse-requirements.md), its status will show as **Active** in the tenant list.
+After your tenants meet the [Lighthouse onboarding requirements](m365-lighthouse-requirements.md), its status will show as **Active** in the tenant list.
The tenant list lets you:
The Deployment Plans tab provides status on a tenant's deployment plan. The depl
The Deployment Plans tab also includes the following options: -- **Export:** Select to export deployment step data to an Excel comma-separated values (.csv) file.-- **Refresh:** Select to retrieve the most current deployment step data.-- **Search:** Enter keywords to quickly locate a specific deployment step in the list.
+- **Export:** Select to export deployment step data to an Excel comma-separated values (.csv) file.
+- **Refresh:** Select to retrieve the most current deployment step data.
+- **Search:** Enter keywords to quickly locate a specific deployment step in the list.
## Related content
lighthouse M365 Lighthouse Threat Management Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-threat-management-page-overview.md
- Adm_O365 - AdminSurgePortfolio-- M365-Lighthouse
+- M365-Lighthouse
search.appverid: MET150 description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn about the Threat management page."
You can filter threats by:
The following table lists the different threat statuses and their definition:<br><br> | Threat status | Definition |
-|--|--|
+|||
| Active | Threat is active on the device. | | No status | Threat status is unavailable. Run a full scan on the device to have Microsoft Defender Antivirus redetect the threat. | | Action failed | The device is not at risk. An action has failed but a potential threat has been stopped and isn't active on the device. Run a full scan on the device. |
The Antivirus protection tab on the Threats management page shows the devices ac
## Related content
-[Deploy Microsoft 365 Lighthouse baselines](m365-lighthouse-deploy-baselines.md) (article)\
+[Deploy Microsoft 365 Lighthouse baselines](m365-lighthouse-deploy-baselines.md) (article)\
[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
lighthouse M365 Lighthouse Troubleshoot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-troubleshoot.md
This article describes error messages and problems that you might encounter whil
**Cause:** Your customer tenants don't meet the following criteria:
- - Must have delegated access set up for the Managed Service Provider (MSP) to be able to manage the customer tenant*
- - Must have at least one Microsoft 365 Business Premium, Microsoft 365 E3, or Windows 365 Business license
- - Must have no more than 1000 licensed users 
+- Must have delegated access set up for the Managed Service Provider (MSP) to be able to manage the customer tenant*
+- Must have at least one Microsoft 365 Business Premium, Microsoft 365 E3, or Windows 365 Business license
+- Must have no more than 1000 licensed users
**Resolution:** The following table describes the different tenant statuses that require action and explains how to resolve them. *Delegated Admin Privileges (DAP) is required to onboard customers to Lighthouse. We recommend also establishing Granular Delegated Admin Privileges (GDAP) with your customers to enable more secure delegated access. While DAP and GDAP coexist, GDAP will take precedence for customers where both models are in place. Soon, customers with just GDAP (and no DAP) will be able to onboard to Lighthouse. - | Status | Description | Resolution | |--|--|--| | Inactive | The tenant was offboarded at the request of the MSP and is no longer being managed in Lighthouse. | You need to reactivate the tenant. On the **Tenants** page, select the three dots (more actions) next to the tenant that you want to reactivate, and then select **Activate tenant**. It can take 24ΓÇô48 hours for initial customer data to appear in Lighthouse. |
If data is still not appearing on the Device compliance and Threat management pa
[Known issues with Microsoft 365 Lighthouse](m365-lighthouse-known-issues.md) (article)\ [Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)\
-[Get help and support for Microsoft 365 Lighthouse](m365-lighthouse-get-help-and-support.md) (article)
+[Get help and support for Microsoft 365 Lighthouse](m365-lighthouse-get-help-and-support.md) (article)
lighthouse M365 Lighthouse View Manage Risky Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-view-manage-risky-users.md
- Adm_O365 - AdminSurgePortfolio-- M365-Lighthouse
+- M365-Lighthouse
search.appverid: MET150 description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to view and manage risky users."
The following conditions must be met before users can appear in the risky users
- The customer tenant must have an Azure AD Premium license for each user. For more information on which licenses support Azure AD Identity Protection, see [What is Identity Protection?](/azure/active-directory/identity-protection/overview-identity-protection) -- The customer tenant must be active within Microsoft 365 Lighthouse. To determine if a tenant is active, see [Microsoft 365 Lighthouse Tenants page overview](m365-lighthouse-tenant-list-overview.md).
+- The customer tenant must be active within Microsoft 365 Lighthouse. To determine if a tenant is active, see [Microsoft 365 Lighthouse Tenants page overview](m365-lighthouse-tenant-list-overview.md).
## Review detected risks and take action In Azure AD Identity Protection, risk detections include any identified suspicious actions related to user accounts in Azure AD.
-1. In the left navigation pane in Lighthouse, select **Users**.
+1. In the left navigation pane in Lighthouse, select **Users**.
-2. Select the **Risky Users** tab.
+2. Select the **Risky Users** tab.
3. Review the users in the list with a risk state of **At risk**.
In Azure AD Identity Protection, risk detections include any identified suspicio
To take action on multiple affected users at once:
-1. From the **Risky Users** tab, select the set of users you want to take action on.
+1. From the **Risky Users** tab, select the set of users you want to take action on.
2. Choose one of the following actions to perform:
lighthouse M365 Lighthouse View Service Health https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-view-service-health.md
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthous
You can view service health for the tenants you manage in Microsoft 365 Lighthouse. Service health includes incidents and advisories for several services, including Microsoft Intune, Azure Active Directory (Azure AD) identity services, and mobile device management (MDM) cloud services. You can also see how many of your managed tenants are affected by incidents. For example, if one of your tenants is experiencing problems, you can check the Service health page to determine whether it's a known issue with a resolution in progress or whether a recent change may be impacting them. This could save you time troubleshooting and reduce support calls.
-If you can't sign in to Lighthouse, you can use the [Microsoft 365 service health status page](https://status.office365.com/) to check for known issues preventing you from logging in to your partner tenant. Also, sign up to follow [@MSFT365status](https://twitter.com/MSFT365Status) on Twitter to see information on specific service incidents.
+If you can't sign in to Lighthouse, you can use the [Microsoft 365 service health status page](https://status.office365.com/) to check for known issues preventing you from logging in to your partner tenant. Also, sign up to follow [@MSFT365status](https://twitter.com/MSFT365Status) on Twitter to see information on specific service incidents.
## Before you begin
-To view service health, you'll need an Azure AD role in the partner tenant with the following property set: **microsoft.office365.serviceHealth/allEntities/allTasks**. For a list of Azure AD roles, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference).
+To view service health, you'll need an Azure AD role in the partner tenant with the following property set: **microsoft.office365.serviceHealth/allEntities/allTasks**. For a list of Azure AD roles, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference).
## View service health status for all tenants
-1. In the left navigation pane in Lighthouse, select **Service health**.
+1. In the left navigation pane in Lighthouse, select **Service health**.
-2. On the **Service health** page, review the current service health status, including:
+2. On the **Service health** page, review the current service health status, including:
- - Total number of incidents
- - Total number of advisories affecting any of the managed tenants
- - Number of services with active incidents.
+ - Total number of incidents
+ - Total number of advisories affecting any of the managed tenants
+ - Number of services with active incidents.
3. On the **All services** tab, review issues by service.
To view service health, you'll need an Azure AD role in the partner tenant with
## Review issue details
-1. In the left navigation pane in Lighthouse, select **Service health**.
+1. In the left navigation pane in Lighthouse, select **Service health**.
-2. On the **Service health** page, select the **All services** or **All issues** tab.
+2. On the **Service health** page, select the **All services** or **All issues** tab.
3. Select an issue from the list.
To view service health, you'll need an Azure AD role in the partner tenant with
On the **Tenants affected** tab, you can export a list of affected tenants to a comma-separated values (.csv) file so you can share it with your support teams. ## Related content+ [How to check Microsoft 365 service health](/microsoft-365/enterprise/view-service-health) (article)\
-[Known issues with Microsoft 365 Lighthouse](m365-lighthouse-known-issues.md) (article)
+[Known issues with Microsoft 365 Lighthouse](m365-lighthouse-known-issues.md) (article)
lti Manage Microsoft One Lti https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lti/manage-microsoft-one-lti.md
f1.keywords:
- CSH ms.localizationpriority: medium
-description: Learn how to conduct key Microsoft OneLTI management tasks including deleting, viewing, editing, and troubleshooting.
+description: Learn how to conduct key Microsoft OneLTI management tasks including viewing, deleting, editing, and troubleshooting.
# Manage Microsoft OneLTI for any LMS
Microsoft OneLTI integrates with several LMSs including Canvas, Blackboard, and
In this article, IT admins will find instructions on key OneLTI management tasks. -- [Delete an LTI registration](#delete-an-lti-registration). - [View an LTI registration](#view-an-lti-registration).
+- [Delete an LTI registration](#delete-an-lti-registration).
- [Edit an LTI registration](#edit-an-lti-registration). - [Troubleshoot issues with OneLTI](#troubleshoot-issues-with-onelti). - [Report problems with OneLTI](#report-problems-with-onelti).
+## View an LTI registration
+
+If you would like to view the details of an LTI registration, follow the steps below.
+
+1. Visit [Microsoft LTI Portal](https://lti.microsoft.com/).
+2. Sign in with a Microsoft 365 administrator account.
+3. In the registration list, find the LTI registration you wish to view.
+4. Select the **eye icon** next to the listing.
+5. The registration details panel will open.
+ ## Delete an LTI registration If you would like to delete a Microsoft OneLTI registration, follow the steps below.
If you would like to delete a Microsoft OneLTI registration, follow the steps be
5. In the confirmation dialog box, select **Delete** to confirm deletion. 6. You'll see a success message once it's deleted.
-## View an LTI registration
-
-If you would like to view the details of an LTI registration, follow the steps below.
-
-1. Visit [Microsoft LTI Portal](https://lti.microsoft.com/).
-2. Sign in with a Microsoft 365 administrator account.
-3. In the registration list, find the LTI registration you wish to view.
-4. Select the **eye icon** next to the listing.
-5. The registration details panel will open.
- ## Edit an LTI registration Currently, we don't support editing an existing LTI registration after itΓÇÖs added. To change an LTI registration, you'll need to:
-1. Delete the existing registration.
+1. [Delete the existing registration](#delete-an-lti-registration).
2. Add a new registration. ## Troubleshoot issues with OneLTI
lti Onedrive Lti Blackboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lti/onedrive-lti-blackboard.md
Integrating Microsoft OneDrive LTI with Blackboard is a two-step process. The fi
> [!NOTE] > > - Cookies aren't allowed by default in the Chrome browser incognito mode and will need to be allowed.
-> - Microsoft OneDrive LTI works in the private mode in Microsoft Edge browser. Ensure that you havenΓÇÖt blocked cookies (which are allowed by default).
+> - Microsoft OneDrive LTI works in the private mode in Microsoft Edge browser. Ensure that you haven't blocked cookies (which are allowed by default).
## Register the OneDrive LTI 1.3 tool in Blackboard
-1. From BlackboardΓÇÖs Administrator Panel, selectΓÇ»**LTI Tool Providers**.
-2. SelectΓÇ»**Register LTI 1.3 Tool**.
-3. In the Client ID field, type or copy and paste this ID: ``78cd1b1c-ccbd-4318-9f90-22241f63b1f5``
+1. From Blackboard's Administrator Panel, select **LTI Tool Providers**.
+2. Select **Register LTI 1.3 Tool**.
+3. In the Client ID field, type or copy and paste this ID: ``78cd1b1c-ccbd-4318-9f90-22241f63b1f5``
- > [!NOTE]
- > Adding this client ID will configure two different placements in Blackboard: one that allows access to the tool from the Content Market, Books and Tools, and the Rich text editor, and another which allows access to the tool from the Add Content menu in the course online for Ultra courses.
+ > [!NOTE]
+ > Adding this client ID will configure two different placements in Blackboard: one that allows access to the tool from the Content Market, Books and Tools, and the Rich text editor, and another which allows access to the tool from the Add Content menu in the course online for Ultra courses.
4. Select **Submit**.
-5. Review all pre-populated settings in the **Tool Status** view, and make sure the **Tool Status** round button selected is **Approved**.
-6. InΓÇ»**Institution Policies**, select the **Role in course** and the **Name** checkboxes in the user fields to send. All other user fields are optional, but itΓÇÖs recommended to leave them on to future proof your OneDrive installation.
-7. **Allow grade service access** and **Allow membership service access** are also optional at this time but might be required for future updates to the LTI tool.
+5. Review all pre-populated settings in the **Tool Status** view, and make sure the **Tool Status** round button selected is **Approved**.
+6. In **Institution Policies**, select the **Role in course** and the **Name** checkboxes in the user fields to send. All other user fields are optional, but it's recommended to leave them on to future proof your OneDrive installation.
+7. **Allow grade service access** and **Allow membership service access** are also optional at this time but might be required for future updates to the LTI tool.
8. Copy the **Deployment ID**. You will need it to configure the Microsoft LTI Tool. 9. Select the **Submit** button to finish.
Integrating Microsoft OneDrive LTI with Blackboard is a two-step process. The fi
6. Review and save your changes. A message will be displayed upon successful registration. 7. Your registration details can also be reviewed by selecting the **View LTI Tenants** button on the home page.
-After you complete these steps, your instructors will be able to open documents from OneDrive when they use the ΓÇÿplusΓÇÖ menu in the Course Content page.
+After you complete these steps, your instructors will be able to open documents from OneDrive when they use the ΓÇÿplus' menu in the Course Content page.
## Recommended content
lti Onedrive Lti https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lti/onedrive-lti.md
Integrating Microsoft OneDrive LTI with Canvas is a two step process. The first
- Popups should not be blocked for Microsoft OneDrive. > [!NOTE]
-> - Cookies are not enabled by default in the Chrome browser incognito mode, and will need to be enabled.
-> - Microsoft OneDrive LTI works in the private mode in Microsoft Edge browser. Ensure that you have not blocked cookies (which are enabled by default).
+>
+> - Cookies are not enabled by default in the Chrome browser incognito mode, and will need to be enabled.
+> - Microsoft OneDrive LTI works in the private mode in Microsoft Edge browser. Ensure that you have not blocked cookies (which are enabled by default).
## Enable Microsoft OneDrive LTI in Canvas
Integrating Microsoft OneDrive LTI with Canvas is a two step process. The first
> The person who performs this integration should be an administrator of Canvas and an administrator of the Microsoft 365 tenant. 1. Sign into the <a href="https://onedrivelti.microsoft.com/admin" target="_blank">Microsoft OneDrive LTI Registration Portal</a>
-1. Select the **Admin Consent** button and accept the permissions.
+2. Select the **Admin Consent** button and accept the permissions.
-> [!CAUTION]
-> If this step isn't performed, the following step will give you an error, and you won't be able to take this step for an hour once you've gotten the error.
+ > [!CAUTION]
+ > If this step isn't performed, the following step will give you an error, and you won't be able to take this step for an hour once you've gotten the error.
3. Select the **Create new LTI Tenant** button. On the LTI Registration page select **Canvas** in the dropdown and enter the base URL of your Canvas instance.
-> [!NOTE]
-> If your Canvas instance is, for example, https://contoso.test.instructure.com](https://contoso.test.instructure.com), then the complete URL should be entered.
+ > [!NOTE]
+ > If your Canvas instance is, for example, `https://contoso.test.instructure.com`, then the complete URL should be entered.
+ :::image type="content" source="media/OneDrive-LTI-07.png" alt-text="The LTI tenant administration page, with a dropdown field for choosing the LTI consumer platform and a URL text field.":::
4. Copy the JSON by selecting the **Copy** button (an icon on the right that shows two pages on top of one another). This will be used to generate the key in Canvas.
+ :::image type="content" source="media/OneDrive-LTI-08.png" alt-text="An image showing the copy button that will copy the displayed JSON text and make it available for key generation in Canvas.":::
5. Sign into your Canvas instance as the administrator and select **Developer Keys** from the menu on the left side of the page. From the dropdown, create a developer key by choosing **LTI Key** from the dropdown on the upper right of the page.
+ :::image type="content" source="media/OneDrive-LTI-14.png" alt-text="A screenshot showing the left-hand navigation bar with Developer Keys selected, and the LTI key entry selected from a dropdown on the right of the page.":::
6. On the Configure page, in the **Method** dropdown, select **Paste JSON** as the method and paste the JSON text you copied in Step 4 in the text field that appears.
Integrating Microsoft OneDrive LTI with Canvas is a two step process. The first
7. Save the key, and it becomes available in Canvas in an **Off** state. Turn the key **On** and copy the key given in the **Details** column to be used in the next step.
+ :::image type="content" source="media/OneDrive-LTI-19.png" alt-text="The Canvas page with the key set in an off state. It will need to be turned on and the key will need to be copied from the details column on this page.":::
8. Return to the Microsoft OneDrive LTI Registration portal and paste the key in the **Canvas Client ID** field. Select **Next** when you're ready.
+ :::image type="content" source="media/OneDrive-LTI-20.png" alt-text="The LTI tenant registration page, which shows the JSON text and the text box the key should be copied into.":::
9. Review and save your changes. A message will be displayed on successful registration. 10. Your registration details can also be reviewed by selecting the **View LTI Tenants** button on the home page.
security Android Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-intune.md
Follow the steps below to add Microsoft Defender for Endpoint app into your mana
:::image type="content" source="images/fa4ac18a6333335db3775630b8e6b353.png" alt-text="The page displaying the synced application" lightbox="images/fa4ac18a6333335db3775630b8e6b353.png":::
-9. Defender for Endpoint supports App configuration policies for managed devices via Intune. This capability can be leveraged to autogrant applicable Android permission(s), so the end user does not need to accept these permission(s).
+9. Defender for Endpoint supports App configuration policies for managed devices via Intune. This capability can be leveraged to select different configurations for Defender.
1. In the **Apps** page, go to **Policy > App configuration policies > Add > Managed devices**.
Follow the steps below to add Microsoft Defender for Endpoint app into your mana
:::image type="content" source="images/android-create-app.png" alt-text=" The Associated app details pane" lightbox="images/android-create-app.png":::
- 1. In the **Settings** page, go to the Permissions section click on Add to view the list of supported permissions. In the Add Permissions section, select the following permissions:
+ 1. In the **Settings** page, go to the **Configuration settings** section and choose **ΓÇÿUse configuration designerΓÇÖ** in Configuration settings format.
- - External storage (read)
- - External storage (write)
+ :::image type="content" alt-text="Image of android create app configuration policy." source="images/configurationformat.png" lightbox="images/configurationformat.png":::
- Then select **OK**.
+ 1. Click on **Add** to view a list of supported configurations. Select the required configuration and click on **Ok**.
- :::image type="content" source="images/android-create-app-config.png" alt-text="The Add permissions pane" lightbox="images/android-create-app-config.png":::
+ :::image type="content" alt-text="Image of selecting configuration policies for android." source="images/selectconfigurations.png" lightbox="images/selectconfigurations.png":::
- 1. You should now see both the permissions listed and now you can autogrant both by choosing autogrant in the **Permission state** drop-down and then select **Next**.
- :::image type="content" source="images/android-auto-grant.png" alt-text="The Permission state pane" lightbox="images/android-auto-grant.png":::
+ 1. You should see all the selected configurations listed. You can change the configuration value as required and then select **Next**.
+
+ :::image type="content" alt-text="Image of selected configuration policies." source="images/listedconfigurations.png" lightbox="images/listedconfigurations.png":::
+
1. In the **Assignments** page, select the user group to which this app config policy would be assigned to. Click **Select groups to include** and selecting the applicable group and then selecting **Next**. The group selected here is usually the same group to which you would assign Microsoft Defender for Endpoint Android app.
security Android Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-whatsnew.md
ms.technology: mde
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
+>[!NOTE]
+>Microsoft Defender is no longer supported for versions below 1.0.3011.0302. Users are requested to upgrade to latest versions to keep their devices secure.
+To update, users can use the following steps:
+>1. On your work profile, go to Managed Play Store.
+>2. Tap on the profile icon on the top right corner and select "Manage apps and device".
+>3. Locate MDE under updates available and select update.
+>
+>If you encounter any issues, [submit in-app feedback](/security/defender-endpoint/android-support-signin#send-in-app-feedback).
+ ## Microsoft Defender for Endpoint is now Microsoft Defender in the Play store
-Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the play store. With this update, the app will be available as preview for **Consumers in the US region** - based on how you log into the app with your work or personal account, you will have access to features for Microsoft Defender for Endpoint or to features for Microsoft Defender for individuals. Please see [this blog](https://www.microsoft.com/en-us/microsoft-365/microsoft-defender-for-individuals) for more details.
+Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the play store. With this update, the app will be available as preview for **Consumers in the US region** - based on how you log into the app with your work or personal account, you will have access to features for Microsoft Defender for Endpoint or to features for Microsoft Defender for individuals. Please see [this blog](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals) for more details.
## Threat and Vulnerability Management
security Configure Endpoints Vdi https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-vdi.md
The following steps will guide you through onboarding VDI devices and will highl
## Updating non-persistent virtual desktop infrastructure (VDI) images
-As a best practice, we recommend using offline servicing tools to patch golden/master images.
+With the ability to easily deploy updates to VMs running in VDIs, we've shortened this guide to focus on how you can get updates on your machines quickly and easily. You no longer need to create and seal golden images on a periodic basis, as updates are expanded into their component bits on the host server and then downloaded directly to the VM when it's turned on.
-For example, you can use the below commands to install an update while the image remains offline:
+For more information, follow the guidance in [Deployment guide for Microsoft Defender Antivirus in a virtual desktop infrastructure (VDI) environment](/security/defender-endpoint/deployment-vdi-microsoft-defender-antivirus).
-```console
-DISM /Mount-image /ImageFile:"D:\Win10-1909.vhdx" /index:1 /MountDir:"C:\Temp\OfflineServicing"
-DISM /Image:"C:\Temp\OfflineServicing" /Add-Package /Packagepath:"C:\temp\patch\windows10.0-kb4541338-x64.msu"
-DISM /Unmount-Image /MountDir:"C:\Temp\OfflineServicing" /commit
-```
-
-For more information on DISM commands and offline servicing, refer to the articles below:
--- [Modify a Windows image using DISM](/windows-hardware/manufacture/desktop/mount-and-modify-a-windows-image-using-dism)-- [DISM Image Management Command-Line Options](/windows-hardware/manufacture/desktop/dism-image-management-command-line-options-s14)-- [Reduce the Size of the Component Store in an Offline Windows Image](/windows-hardware/manufacture/desktop/reduce-the-size-of-the-component-store-in-an-offline-windows-image)-
-If offline servicing isn't a viable option for your non-persistent VDI environment, the following steps should be taken to ensure consistency and sensor health:
-
-1. After booting the master image for online servicing or patching, run an offboarding script to turn off the Defender for Endpoint sensor. For more information, see [Offboard devices using a local script](configure-endpoints-script.md#offboard-devices-using-a-local-script).
-
-2. Ensure the sensor is stopped by running the command below in a CMD window:
-
- ```console
- sc query sense
- ```
-
-3. Service the image as needed.
-
-4. Run the below commands using PsExec.exe (which can be downloaded from https://download.sysinternals.com/files/PSTools.zip) to cleanup the cyber folder contents that the sensor may have accumulated since boot:
-
- ```console
- PsExec.exe -s cmd.exe
- cd "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Cyber"
- del *.* /f /s /q
- REG DELETE "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection" /v senseGuid /f
- exit
- ```
-
-5. Reseal the golden/master image as you normally would.
## Related topics - [Onboard Windows devices using Group Policy](configure-endpoints-gp.md)
security Configure Proxy Internet https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-proxy-internet.md
The information in the list of proxy and firewall configuration information is r
3. Run the TestCloudConnection.exe tool from "C:\Program Files\Microsoft Monitoring Agent\Agent" to validate the connectivity, and to get the required URLs for your specific workspace.
-4. Check the Microsoft Defender for Endpoint URLs list for the complete list of requirements for your region (refer to the Service URLs [Spreadsheet](https://download.microsoft.com/download/8/e-urls.xlsx)).
+4. Check the Microsoft Defender for Endpoint URLs list for the complete list of requirements for your region (refer to the Service URLs [Spreadsheet](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx)).
:::image type="content" source="images/admin-powershell.png" alt-text="The administrator in Windows PowerShell" lightbox="images/admin-powershell.png":::
security Configure Server Endpoints https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-server-endpoints.md
You will need to download both the **installation** and **onboarding** packages
> [!NOTE] > On Windows Server 2012R2, Microsoft Defender Antivirus will get installed by the installation package and will be active unless you set it to passive mode. On Windows Server 2016, Microsoft Defender Antivirus must be installed as a feature (see [Switch to MDE](/microsoft-365/security/defender-endpoint/switch-to-mde-phase-2#re-enable-microsoft-defender-antivirus-on-windows-server-2016)) first and fully updated before proceeding with the installation. >
- > If you are running a non-Microsoft antimalware solution ensure you add exclusions for Microsoft Defender Antivirus ([from this list of Microsoft Defender Processes on the Defender Processes tab](https://download.microsoft.com/download/8/e-urls.xlsx)) to the non-Microsoft solution before installation. It is also recommended to add non-Microsoft security solutions to the Defender Antivirus exclusion list.
+ > If you are running a non-Microsoft antimalware solution ensure you add exclusions for Microsoft Defender Antivirus ([from this list of Microsoft Defender Processes on the Defender Processes tab](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx)) to the non-Microsoft solution before installation. It is also recommended to add non-Microsoft security solutions to the Defender Antivirus exclusion list.
The **installation package** contains an MSI file that installs the Microsoft Defender for Endpoint agent.
security Get Machinegroups Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-machinegroups-collection.md
User needs read permissions.
## HTTP request ```http
-GET /testwdatppreview/machinegroups
+GET https://graph.microsoft.com/testwdatppreview/machinegroups
``` ## Request headers
security Mac Jamfpro Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-jamfpro-policies.md
These steps are applicable of macOS 10.15 (Catalina) or newer.
:::image type="content" source="images/7f9138053dbcbf928e5182ee7b295ebe.png" alt-text="The configuration settings mdatpmdav notifications tray" lightbox="images/7f9138053dbcbf928e5182ee7b295ebe.png"::: - Tab **Notifications**, click **Add** one more time, scroll down to **New Notifications Settings**
- - **Bundle ID**: `com.microsoft.autoupdate2`
+ - **Bundle ID**: `com.microsoft.autoupdate.fba`
- Configure the rest of the settings to the same values as above :::image type="content" source="images/4bac6ce277aedfb4a674f2d9fcb2599a.png" alt-text="The configuration settings mdatpmdav notifications mau" lightbox="images/4bac6ce277aedfb4a674f2d9fcb2599a.png":::
- Note that now you have two 'tables' with notification configurations, one for **Bundle ID: com.microsoft.wdav.tray**, and another for **Bundle ID: com.microsoft.autoupdate2**. While you can configure alert settings per your requirements, Bundle IDs must be exactly the same as described before, and **Include** switch must be **On** for **Notifications**.
+ Note that now you have two 'tables' with notification configurations, one for **Bundle ID: com.microsoft.wdav.tray**, and another for **Bundle ID: com.microsoft.autoupdate.fba**. While you can configure alert settings per your requirements, Bundle IDs must be exactly the same as described before, and **Include** switch must be **On** for **Notifications**.
3. Select the **Scope** tab, then select **Add**.
security Manage Updates Baselines Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-updates-baselines-microsoft-defender-antivirus.md
For more information, see [Manage the sources for Microsoft Defender Antivirus p
> - This article lists changes that are included in the broad release channel. [See the latest broad channel release here](https://www.microsoft.com/security/encyclopedia/adlpackages.aspx?action=info). > - To learn more about the gradual rollout process, and to see more information about the next release, see [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md). > - To learn more about security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
-> - If you're looking for a list of Microsoft Defender processes, **[download the mde-urls workbook](https://download.microsoft.com/download/8/).
+> - If you're looking for a list of Microsoft Defender processes, **[download the mde-urls workbook](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaef).
## Monthly platform and engine versions
security Onboard Downlevel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-downlevel.md
Review the following details to verify minimum system requirements:
1. Download the agent setup file: [Windows 64-bit agent](https://go.microsoft.com/fwlink/?LinkId=828603) or [Windows 32-bit agent](https://go.microsoft.com/fwlink/?LinkId=828604).
+ >[!NOTE]
+ >Due to the [deprecation of SHA-1 support by the MMA agent](/azure/azure-monitor/agents/agent-windows#sha-2-code-signing-support-requirement), the MMA agent needs to be version 10.20.18029 or newer.
+
+ 2. Obtain the workspace ID: - In the Defender for Endpoint navigation pane, select **Settings > Device management > Onboarding** - Select the operating system
security Api Advanced Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-advanced-hunting.md
One of the following permissions is required to call the advanced hunting API. T
Permission type | Permission | Permission display name -|-|-
-Application | AdvancedQuery.Read.All| Run advanced queries
-Delegated (work or school account) | AdvancedQuery.Read | Run advanced queries
+Application | AdvancedHunting.Read.All| Run advanced queries
+Delegated (work or school account) | AdvancedHunting.Read | Run advanced queries
>[!Note] > When obtaining a token using user credentials:
security Microsoft Secure Score Whats Coming https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-whats-coming.md
- Title: What's coming to Microsoft Secure Score
-description: Describes what new changes are coming to Microsoft Secure Score in the Microsoft 365 Defender portal.
-keywords: microsoft secure score, secure score, office 365 secure score, microsoft security score, Microsoft 365 Defender portal, improvement actions
- - NOCSH
----
- - M365-security-compliance
-
- - MOE150
- - MET150
--
-# What's coming to Microsoft Secure Score
--
-Microsoft Secure Score can be found at https://security.microsoft.com/securescore in the [Microsoft 365 Defender portal](microsoft-365-defender.md#the-microsoft-365-defender-portal).
-
-This article lets you know about upcoming improvements to Microsoft Secure Score.
-
-## Proposed changes
-
-### Upcoming improvement action additions (December 2021)
--- Turn on Safe Attachments in block mode-- Prevent sharing Exchange Online calendar details with external users-- Turn on Safe Documents for Office clients-- Turn on the common attachments filter setting for anti-malware policies-- Ensure that there are no sender domains allowed for anti-spam policies-- Create Safe Links policies for email messages-- Create zero-hour auto purge policies for malware-- Turn on Microsoft Defender for Office 365 in SharePoint, OneDrive, and Microsoft Teams-- Create zero-hour auto purge policies for phishing messages-- Create zero-hour auto purge policies for spam messages-- Block abuse of exploited vulnerable signed drivers-- Turn on scanning of removable drives during a full scan--
-## Related resources
--- [Microsoft Secure Score overview](microsoft-secure-score.md)-- [Assess your security posture](microsoft-secure-score-improvement-actions.md)-- [Track your Microsoft Secure Score history and meet goals](microsoft-secure-score-history-metrics-trends.md)-- [What's new](microsoft-secure-score-whats-new.md)
security Microsoft Secure Score Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-whats-new.md
To make Microsoft Secure Score a better representative of your security posture,
Microsoft Secure Score can be found at https://security.microsoft.com/securescore in the [Microsoft 365 Defender portal](microsoft-365-defender.md#the-microsoft-365-defender-portal).
-## July 2021
-
-### Added improvement action related to Microsoft Teams
--- Restrict dial-in users from bypassing a meeting lobby-- Limit external participants from having control in a Teams meeting-- Restrict anonymous users from starting Teams meetings-- Require lobbies to be set up for Teams meetings-- Configure which users are allowed to be present in Teams meetings-
-### Added improvement action related to Microsoft Defender for Endpoint
--- Fix Microsoft Defender for Endpoint sensor data collection for macOS-- Fix Microsoft Defender for Endpoint impaired communications for macOS-- Set minimum password length to 15 or more characters in macOS-- Set 'Enforce password history' to '24 or more password(s)' in macOS-- Set 'Maximum password age' to '90 or fewer days, but not 0' in macOS-- Set account lockout threshold to 5 or lower in macOS-- Turn on Firewall on macOS-- Enable Gatekeeper-- Enable System Integrity Protection (SIP)-- Enable FileVault Disk Encryption-- Set screen to lock when screensaver starts in macOS-- Ensure screensaver is set to start in 20 minutes or less in macOS-- Secure Home Folders-- Turn on Microsoft Defender Antivirus real-time protection for macOS-- Turn on Microsoft Defender Antivirus PUA protection in block mode for macOS-- Enable Microsoft Defender Antivirus cloud-delivered protection for macOS-- Update Microsoft Defender Antivirus definitions for macOS-- Fix Microsoft Defender for Endpoint sensor data collection for Linux-- Fix Microsoft Defender for Endpoint impaired communications for Linux-- Unrestricted Access Accounts-- Turn on Microsoft Defender Antivirus real-time protection for Linux-- Turn on Microsoft Defender Antivirus PUA protection in block mode for Linux-- Enable Microsoft Defender Antivirus cloud-delivered protection for Linux-- Update Microsoft Defender Antivirus definitions for Linux-
-## June 2021
-
-### Removed improvement action related to Microsoft Cloud App Security
--- Use Cloud App Security to detect anomalous behavior.-
-## February 2021
-
-### Compatibility with Graph API
-
-Microsoft Secure Score recommendations delivered via Graph API will look and be weighted the same as the recommendations you currently see in the Microsoft 365 Defender portal.
-
-## January 2021
-
-### Added our first security recommendation for Microsoft Teams
-
-Microsoft Teams customers will see "Restrict anonymous users from joining meetings" as a new improvement action in Secure Score.
-
-## December 2020
-
-### Added six accounts-related improvement actions for Microsoft Defender for Endpoint:
--- Set 'Minimum password length' to '14 or more characters'-- Set 'Enforce password history' to '24 or more password(s)'-- Set 'Maximum password age' to '60 or fewer days, but not 0'-- Set 'Minimum password age' to '1 or more day(s)'-- Disable the built-in Administrator account-- Disable the built-in Guest account-
-## November 2020
-
-### Removed the ability to create ServiceNow tickets through Secure Score
-
-The ability to create ServiceNow tickets through Secure Score by going to **Share > ServiceNow** is no longer available. Thank you for your feedback and continued support while we determine next steps.
-
-### Added three services-related improvement actions for Microsoft Defender for Endpoint:
--- Fix unquoted service path for Windows services-- Change service executable path to a common protected location-- Change service account to avoid cached password in windows registry-
-## October 2020
-
-### Removed improvement action related to Microsoft Defender for Endpoint
--- Set Microsoft Defender SmartScreen Windows Store app web content checking to warn-
-## August 2020
-
-### Updated improvement action for Azure Active Directory
--- Enable policy to block legacy authentication-
-## Incompatibility with Identity Secure Score
-
-In the recent release of Microsoft Secure Score, an improved scoring model has been released. These changes allow for a more flexible and accurate view of your security posture. However, these updates have made Microsoft Secure Score temporarily incompatible with Identity Secure Score.
-
-In time, Identity Secure Score will adopt the new scoring model. Until then, customers will see differences in the scores reported by Microsoft Secure Score and the Identity Secure Score. We apologize for any inconvenience this causes, and are working to ensure these experiences are more compatible in the future.
-
-## Updated improvement actions
--- Added Azure Active Directory improvement actions-- Added Microsoft Defender for Identity improvement actions-- Support for Microsoft Defender for Endpoint [Threat & Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) security recommendations
- - All released security recommendations supplied by TVM are now available
-
-## Updated interface and functionality
-
-* All new metrics and trends views for CISO and lead level discussions
-* New ways to track and benchmark your score
-* Better tracking and understanding for score regressions
-* Filter, tag, search, and group your improvement actions
-* Manage towards your future goals using score projections and planned actions
-* And more!
+## April 2022
+
+- Turn on user authentication for remote connections
+
+## December 2021
+
+- Turn on Safe Attachments in block mode
+- Prevent sharing Exchange Online calendar details with external users
+- Turn on Safe Documents for Office clients
+- Turn on the common attachments filter setting for anti-malware policies
+- Ensure that there are no sender domains allowed for anti-spam policies
+- Create Safe Links policies for email messages
+- Create zero-hour auto purge policies for malware
+- Turn on Microsoft Defender for Office 365 in SharePoint, OneDrive, and Microsoft Teams
+- Create zero-hour auto purge policies for phishing messages
+- Create zero-hour auto purge policies for spam messages
+- Block abuse of exploited vulnerable signed drivers
+- Turn on scanning of removable drives during a full scan
## We want to hear from you
solutions Information Protection Deploy Assess https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/information-protection-deploy-assess.md
For later reference in the articles of this overall solution, this table provide
||||| |GDPR|Article 5(1)(f)|Personal data shall be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organizational measures ('integrity and confidentiality'.|(All) <br> Identity <br> Device <br> Threat Protection <br> Protect information <br> Govern information <br> Discover and respond| ||Article (32)(1)(a)|Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: (a) the pseudonymization and encryption of personal data.|Protect information|
-||Article (13)(2)(a)|"…the controller shall, at the time when personal data are obtained, provide the data subject with the following further information necessary to ensure fair and transparent processing: (a) the period for which the personal data will be stored, or if that is not possible, the criteria used to determine that period.|Govern information|
+||Article (13)(2)(a)|"...the controller shall, at the time when personal data are obtained, provide the data subject with the following further information necessary to ensure fair and transparent processing: (a) the period for which the personal data will be stored, or if that is not possible, the criteria used to determine that period.|Govern information|
||Article (15)(1)(e)|The data subject shall have the right to obtain from the controller confirmation as to whether or not personal data concerning him or her are being processed, and where that is the case, access to the personal data and the following information: (e) the existence of the right to request from the controller rectification or erasure of personal data or restriction of processing of personal data concerning the data subject or to object to such processing|Discover and respond| |LGPD|Article 46|Processing agents shall adopt security, technical and administrative measures able to protect personal data from unauthorized accesses and accidental or unlawful situations of destruction, loss, alteration, communication, or any type of improper or unlawful processing.|Protect information <br> Govern information <br> Discover and respond| ||Article 48|The controller must communicate to the national authority and to the data subject the occurrence of a security incident that may create risk or relevant damage to the data subjects.|Discover and respond|
solutions Networking Design Principles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/networking-design-principles.md
Title: Networking up (to the cloud)ΓÇöOne architectΓÇÖs viewpoint
+ Title: Networking up (to the cloud)ΓÇöOne architect's viewpoint
description: Learn how to optimize your network for cloud connectivity by avoiding the most common pitfalls.
ms.audience: ITPro
ms.prod: microsoft-365-enterprise ms.localizationpriority: medium-+ - M365-identity-device-management - M365-security-compliance-+ f1.keywords: NOCSH
-# Networking up (to the cloud)ΓÇöOne architectΓÇÖs viewpoint
+# Networking up (to the cloud)ΓÇöOne architect's viewpoint
-In this article, [Ed Fisher](https://www.linkedin.com/in/edfisher/), Security & Compliance Architect at Microsoft, describes how to optimize your network for cloud connectivity by avoiding the most common pitfalls.
+In this article, [Ed Fisher](https://www.linkedin.com/in/edfisher/), Security & Compliance Architect at Microsoft, describes how to optimize your network for cloud connectivity by avoiding the most common pitfalls.
## About the author
-![Ed Fisher photo.](../media/solutions-architecture-center/ed-fisher-networking.jpg)
+![Ed Fisher photo.](../media/solutions-architecture-center/ed-fisher-networking.jpg)
-I am currently a Principal Technical Specialist in our Retail and Consumer Goods team, focusing on Security & Compliance. I have worked with customers moving to Office 365 for the past ten years. IΓÇÖve worked with smaller shops with a handful of locations to government agencies and enterprises with millions of users distributed around the world, and many other customers in between, with the majority having tens of thousands of users, multiple locations in various parts of the world, the need for a higher degree of security, and a multitude of compliance requirements. I have helped hundreds of enterprises and millions of users move to the cloud safely and securely.
+I am currently a Principal Technical Specialist in our Retail and Consumer Goods team, focusing on Security & Compliance. I have worked with customers moving to Office 365 for the past ten years. I've worked with smaller shops with a handful of locations to government agencies and enterprises with millions of users distributed around the world, and many other customers in between, with the majority having tens of thousands of users, multiple locations in various parts of the world, the need for a higher degree of security, and a multitude of compliance requirements. I have helped hundreds of enterprises and millions of users move to the cloud safely and securely.
-With a background over the past 25 years that includes security, infrastructure, and network engineering, and having moved two of my previous employers to Office 365 before joining Microsoft, IΓÇÖve been on your side of the table plenty of times, and do remember what thatΓÇÖs like. While no two customers are ever the same, most have similar needs, and when consuming a standardized service such as any SaaS or PaaS platform, the best approaches tend to be the same.
+With a background over the past 25 years that includes security, infrastructure, and network engineering, and having moved two of my previous employers to Office 365 before joining Microsoft, I've been on your side of the table plenty of times, and do remember what that's like. While no two customers are ever the same, most have similar needs, and when consuming a standardized service such as any SaaS or PaaS platform, the best approaches tend to be the same.
-## ItΓÇÖs not the network ΓÇö itΓÇÖs how youΓÇÖre (mis)using it!
+## It's not the network ΓÇö it's how you're (mis)using it!
-No matter how many times it happens, it never fails to amaze me how *creative* security teams and networking teams try to get with how they think they should connect to Microsoft cloud services. ThereΓÇÖs always some security policy, compliance standard, or better way they insist on using, without being willing to engage in a conversation about what it is they are trying to accomplish, or *how* there are better, easier, more cost-effective, and more performant ways of doing so.
+No matter how many times it happens, it never fails to amaze me how *creative* security teams and networking teams try to get with how they think they should connect to Microsoft cloud services. There's always some security policy, compliance standard, or better way they insist on using, without being willing to engage in a conversation about what it is they are trying to accomplish, or *how* there are better, easier, more cost-effective, and more performant ways of doing so.
-When this sort of thing is escalated to me, IΓÇÖm usually willing to take the challenge and walk them through the hows and the whys and get them to where they need to be. But if I am being completely frank, I have to share that sometimes I want to just let them do what they will, and come back to say I told you so when they finally concede it doesnΓÇÖt work. I may want to do that sometimes, but I *donΓÇÖt*. What I do is try to explain all of what I am going to include in this post. Regardless of your role, if your organization wants to use Microsoft cloud services, thereΓÇÖs probably some wisdom in what follows that can help you out.
+When this sort of thing is escalated to me, I'm usually willing to take the challenge and walk them through the hows and the whys and get them to where they need to be. But if I am being completely frank, I have to share that sometimes I want to just let them do what they will, and come back to say I told you so when they finally concede it doesn't work. I may want to do that sometimes, but I *don't*. What I do is try to explain all of what I am going to include in this post. Regardless of your role, if your organization wants to use Microsoft cloud services, there's probably some wisdom in what follows that can help you out.
## Guiding principles
-LetΓÇÖs start with some ground rules around what weΓÇÖre doing here. We are discussing how to securely connect to cloud services to ensure the minimum complexity, and the maximum performance, while maintaining real security. None of what follows is counter to any of that, even if you, or your customer, wonΓÇÖt get to use your favorite proxy server for everything.
+Let's start with some ground rules around what we're doing here. We are discussing how to securely connect to cloud services to ensure the minimum complexity, and the maximum performance, while maintaining real security. None of what follows is counter to any of that, even if you, or your customer, won't get to use your favorite proxy server for everything.
-- **Just because you can, doesnΓÇÖt mean you should**: Or to paraphrase Dr. Ian Malcolm from the Jurassic Park movie ΓÇ£...Yeah, yeah, but your security team was so preoccupied with whether or not they could that they didn't stop to think if they should.ΓÇ¥
+- **Just because you can, doesn't mean you should**: Or to paraphrase Dr. Ian Malcolm from the Jurassic Park movie "...Yeah, yeah, but your security team was so preoccupied with whether or not they could that they didn't stop to think if they should."
- **Security does not mean complexity**: You are not more secure just because you spend more money, route through more devices, or click more buttons.-- **Office 365 is accessed over the Internet**: But that’s not the same thing as Office 365 is the Internet. It’s a SaaS service managed by Microsoft and administered by you. Unlike websites you visit on the Internet, you actually do get to peek behind the curtain, and can apply the controls you need to meet your policies and your compliance standards, as long as you understand that while you can meet your objectives, you may just have to do them in a different way.-- **Chokepoints are bad, localized breakouts are good**: Everybody always wants to backhaul all their Internet traffic for all their users to some central point, usually so they can monitor it and enforce policy, but often because it’s either cheaper than provisioning Internet access in all their locations, or it’s just how they do it. But those chokepoints are exactly that…points where traffic chokes. There’s nothing wrong with preventing your users from browsing to Instagram or streaming cat videos, but don’t treat your mission-critical business application traffic the same way.-- **If DNS ain’t happy, ain’t nothing happy**: The best designed network can be hamstrung by poor DNS, whether that is by recursing requests to servers in other areas of the world or using your ISP’s DNS servers or other public DNS servers that cache DNS resolution information.-- **Just because that’s how you used to do it, doesn’t mean that’s how you should do it now**: Technology changes constantly and Office 365 is no exception. Applying security measures that were developed and deployed for on-premises services or to control web surfing aren’t going to provide the same level of security assurance, and can have a significant negative impact on performance.-- **Office 365 was built to be accessed over the Internet**: That’s it in a nutshell. No matter what you want to do between your users and your edge, the traffic still goes over the Internet once it leaves your network and before it gets onto ours. Even if you are using Azure ExpressRoute to route some latency sensitive traffic from your network directly to ours, Internet connectivity is absolutely required. Accept it. Don’t overthink it.
+- **Office 365 is accessed over the Internet**: But that's not the same thing as Office 365 is the Internet. It's a SaaS service managed by Microsoft and administered by you. Unlike websites you visit on the Internet, you actually do get to peek behind the curtain, and can apply the controls you need to meet your policies and your compliance standards, as long as you understand that while you can meet your objectives, you may just have to do them in a different way.
+- **Chokepoints are bad, localized breakouts are good**: Everybody always wants to backhaul all their Internet traffic for all their users to some central point, usually so they can monitor it and enforce policy, but often because it's either cheaper than provisioning Internet access in all their locations, or it's just how they do it. But those chokepoints are exactly that...points where traffic chokes. There's nothing wrong with preventing your users from browsing to Instagram or streaming cat videos, but don't treat your mission-critical business application traffic the same way.
+- **If DNS ain't happy, ain't nothing happy**: The best designed network can be hamstrung by poor DNS, whether that is by recursing requests to servers in other areas of the world or using your ISP's DNS servers or other public DNS servers that cache DNS resolution information.
+- **Just because that's how you used to do it, doesn't mean that's how you should do it now**: Technology changes constantly and Office 365 is no exception. Applying security measures that were developed and deployed for on-premises services or to control web surfing aren't going to provide the same level of security assurance, and can have a significant negative impact on performance.
+- **Office 365 was built to be accessed over the Internet**: That's it in a nutshell. No matter what you want to do between your users and your edge, the traffic still goes over the Internet once it leaves your network and before it gets onto ours. Even if you are using Azure ExpressRoute to route some latency sensitive traffic from your network directly to ours, Internet connectivity is absolutely required. Accept it. Don't overthink it.
## Where bad choices are often made
While there are plenty of places where bad decisions are made in the name of sec
### Insufficient resources at the edge
-Very few customers are deploying greenfield environments, and they have years of experience with how their users work and what their Internet egress is like. Whether customers have proxy servers or allow direct access and simply NAT outbound traffic, theyΓÇÖve been doing it for years and donΓÇÖt consider just how much more they are going to start pumping through their edge as they move traditionally internal applications out to the cloud.
+Very few customers are deploying greenfield environments, and they have years of experience with how their users work and what their Internet egress is like. Whether customers have proxy servers or allow direct access and simply NAT outbound traffic, they've been doing it for years and don't consider just how much more they are going to start pumping through their edge as they move traditionally internal applications out to the cloud.
Bandwidth is always a concern, but NAT devices may not have enough horsepower to handle the increased load and may start prematurely closing connections to free up resources. Most of the client software that connects to Office 365 expects persistent connections and a user fully utilizing Office 365 may have 32 or more concurrent connections. If the NAT device is dropping them prematurely, those apps may become unresponsive as they try to use the connections that are no longer there. When they give up and try to establish new connections, they put even more load on your network gear. ### Localized breakout
-Everything else in this list comes down to one thingΓÇögetting off your network and onto ours as quickly as possible. Backhauling your usersΓÇÖ traffic to a central egress point, especially when that egress point is in another region than your users are in, introduces unnecessary latency and impacts both the client experience and download speeds. Microsoft has points of presence throughout the world with front ends for all our services and peering established with practically every major ISP, so routing your usersΓÇÖ traffic out *locally* ensures it gets into our network quickly with minimum latency.
+Everything else in this list comes down to one thingΓÇögetting off your network and onto ours as quickly as possible. Backhauling your users' traffic to a central egress point, especially when that egress point is in another region than your users are in, introduces unnecessary latency and impacts both the client experience and download speeds. Microsoft has points of presence throughout the world with front ends for all our services and peering established with practically every major ISP, so routing your users' traffic out *locally* ensures it gets into our network quickly with minimum latency.
### DNS resolution traffic should follow the Internet egress path
-Of course, for a client to find any endpoint, it needs to use DNS. MicrosoftΓÇÖs DNS servers evaluate the source of DNS requests to ensure we return the response that is, in Internet terms, closest to the source of the request. Make sure your DNS is configured so that name resolution requests go out the same path as your usersΓÇÖ traffic, lest you give them local egress but to an endpoint in another region. That means letting local DNS servers ΓÇ£go to rootΓÇ¥ rather than forwarding to DNS servers in remote data centers. And watch out for public and private DNS services, which may cache results from one part of the world and serve them to requests from other parts of the world.
+Of course, for a client to find any endpoint, it needs to use DNS. Microsoft's DNS servers evaluate the source of DNS requests to ensure we return the response that is, in Internet terms, closest to the source of the request. Make sure your DNS is configured so that name resolution requests go out the same path as your users' traffic, lest you give them local egress but to an endpoint in another region. That means letting local DNS servers "go to root" rather than forwarding to DNS servers in remote data centers. And watch out for public and private DNS services, which may cache results from one part of the world and serve them to requests from other parts of the world.
### To proxy or not to proxy, that is the question
-One of the first things to consider is whether to proxy usersΓÇÖ connections to Office 365. That oneΓÇÖs easy; do not proxy. Office 365 is accessed over the Internet, but it is not THE Internet. ItΓÇÖs an extension of your core services and should be treated as such. Anything you might want a proxy to do, such as DLP or antimalware or content inspection, is already available to you in the service, and can be used at scale and without needing to crack TLS-encrypted connections. But if you really want to proxy traffic that you cannot otherwise control, pay attention to our guidance at [https://aka.ms/pnc](../enterprise/microsoft-365-network-connectivity-principles.md) and the categories of traffic at [https://aka.ms/ipaddrs](../enterprise/urls-and-ip-address-ranges.md). We have three categories of traffic for Office 365. Optimize and Allow really should go direct and bypass your proxy. Default can be proxied. The details are in those docs...read them.
+One of the first things to consider is whether to proxy users' connections to Office 365. That one's easy; do not proxy. Office 365 is accessed over the Internet, but it is not THE Internet. It's an extension of your core services and should be treated as such. Anything you might want a proxy to do, such as DLP or antimalware or content inspection, is already available to you in the service, and can be used at scale and without needing to crack TLS-encrypted connections. But if you really want to proxy traffic that you cannot otherwise control, pay attention to our guidance at [https://aka.ms/pnc](../enterprise/microsoft-365-network-connectivity-principles.md) and the categories of traffic at [https://aka.ms/ipaddrs](../enterprise/urls-and-ip-address-ranges.md). We have three categories of traffic for Office 365. Optimize and Allow really should go direct and bypass your proxy. Default can be proxied. The details are in those docs...read them.
-Most customers who insist on using a proxy, when they actually look at what they are doing, come to realize that when the client makes an HTTP CONNECT request to the proxy, the proxy is now just an expensive extra router. The protocols in use such as MAPI and RTC are not even protocols that web proxies understand, so even with TLS cracking youΓÇÖre not really getting any extra security. You *are* getting extra latency. See [https://aka.ms/pnc](../enterprise/microsoft-365-network-connectivity-principles.md) for more on this, including the Optimize, Allow, and Default categories for Microsoft 365 traffic.
+Most customers who insist on using a proxy, when they actually look at what they are doing, come to realize that when the client makes an HTTP CONNECT request to the proxy, the proxy is now just an expensive extra router. The protocols in use such as MAPI and RTC are not even protocols that web proxies understand, so even with TLS cracking you're not really getting any extra security. You *are* getting extra latency. See [https://aka.ms/pnc](../enterprise/microsoft-365-network-connectivity-principles.md) for more on this, including the Optimize, Allow, and Default categories for Microsoft 365 traffic.
-Finally, consider the overall impact to the proxy and its corresponding response to deal with that impact. As more and more connections are being made through the proxy, it may decrease the TCP Scale Factor so that it doesnΓÇÖt have to buffer so much traffic. IΓÇÖve seen customers where their proxies were so overloaded that they were using a Scale Factor of 0. Since Scale Factor is an exponential value and we like to use 8, each reduction in the Scale Factor value is a huge negative impact to throughput.
+Finally, consider the overall impact to the proxy and its corresponding response to deal with that impact. As more and more connections are being made through the proxy, it may decrease the TCP Scale Factor so that it doesn't have to buffer so much traffic. I've seen customers where their proxies were so overloaded that they were using a Scale Factor of 0. Since Scale Factor is an exponential value and we like to use 8, each reduction in the Scale Factor value is a huge negative impact to throughput.
-TLS Inspection means SECURITY! But not really! Many customers with proxies want to use them to inspect all traffic, and that means TLS ΓÇ£break and inspect.ΓÇ¥ When you do that for a website accessed over HTTPS (privacy concerns notwithstanding) your proxy may have to do that for 10 or even 20 concurrent streams for a few hundred milliseconds. If thereΓÇÖs a large download or maybe a video involved, one or more of those connections may last much longer, but on the whole, most of those connections establish, transfer, and close very quickly. Doing break and inspect means the proxy must do double the work. For each connection from the client to the proxy, the proxy must also make a separate connection back to the endpoint. So, 1 becomes 2, 2 becomes 4, 32 becomes 64...see where I am going? You probably sized your proxy solution just fine for typical web surfing, but when you try to do the same thing for client connections to Office 365, the number of concurrent, long-lived connections may be orders of magnitude greater than what you sized for.
+TLS Inspection means SECURITY! But not really! Many customers with proxies want to use them to inspect all traffic, and that means TLS "break and inspect." When you do that for a website accessed over HTTPS (privacy concerns notwithstanding) your proxy may have to do that for 10 or even 20 concurrent streams for a few hundred milliseconds. If there's a large download or maybe a video involved, one or more of those connections may last much longer, but on the whole, most of those connections establish, transfer, and close very quickly. Doing break and inspect means the proxy must do double the work. For each connection from the client to the proxy, the proxy must also make a separate connection back to the endpoint. So, 1 becomes 2, 2 becomes 4, 32 becomes 64...see where I am going? You probably sized your proxy solution just fine for typical web surfing, but when you try to do the same thing for client connections to Office 365, the number of concurrent, long-lived connections may be orders of magnitude greater than what you sized for.
-### Streaming isnΓÇÖt important, except that it *is*
+### Streaming isn't important, except that it *is*
-The only services in Office 365 that use UDP are Skype (soon to be retired) and Microsoft Teams. Teams uses UDP for streaming traffic including audio, video, and presentation sharing. Streaming traffic is live, such as when you're having an online meeting with voice, video, and presenting decks or performing demos. These use UDP because if packets are dropped, or arrive out of order, itΓÇÖs practically unnoticeable by the user and the stream can just keep going.
+The only services in Office 365 that use UDP are Skype (soon to be retired) and Microsoft Teams. Teams uses UDP for streaming traffic including audio, video, and presentation sharing. Streaming traffic is live, such as when you're having an online meeting with voice, video, and presenting decks or performing demos. These use UDP because if packets are dropped, or arrive out of order, it's practically unnoticeable by the user and the stream can just keep going.
-When you donΓÇÖt permit outbound UDP traffic from clients to the service, they can fall back to using TCP. But if a TCP packet is dropped, *everything stops* until the Retransmission Timeout (RTO) expires and the missing packet can be retransmitted. If a packet arrives out of order, everything stops until the other packets arrive and can be reassembled in order. Both lead to perceptible glitches in the audio (remember Max Headroom?) and video (did you click something...oh, there it is) and lead to poor performance and a bad user experience. And remember what I put up above about proxies? When you force a Teams client to use a proxy, you force it to use TCP. So now youΓÇÖre causing negative performance impacts twice.
+When you don't permit outbound UDP traffic from clients to the service, they can fall back to using TCP. But if a TCP packet is dropped, *everything stops* until the Retransmission Timeout (RTO) expires and the missing packet can be retransmitted. If a packet arrives out of order, everything stops until the other packets arrive and can be reassembled in order. Both lead to perceptible glitches in the audio (remember Max Headroom?) and video (did you click something...oh, there it is) and lead to poor performance and a bad user experience. And remember what I put up above about proxies? When you force a Teams client to use a proxy, you force it to use TCP. So now you're causing negative performance impacts twice.
### Split tunneling may seem scary
-But it isnΓÇÖt. All connections to Office 365 are over TLS. We have been offering TLS 1.2 for quite a while now and will be disabling older versions soon because legacy clients still use them and thatΓÇÖs a risk.
+But it isn't. All connections to Office 365 are over TLS. We have been offering TLS 1.2 for quite a while now and will be disabling older versions soon because legacy clients still use them and that's a risk.
Forcing a TLS connection, or 32 of them, to go over a VPN before they then go to the service doesn't add security. It does add latency and reduces overall throughput. In some VPN solutions, it even forces UDP to tunnel through TCP, which again will have a very negative impact on streaming traffic. And, unless you are doing TLS inspection, there's no upside, all downside. A very common theme among customers, now that most of their workforce is remote, is that they're seeing significant bandwidth and performance impacts from making all their users connect using a VPN, instead of configuring split tunneling for access to [Optimize category Office 365 endpoints](../enterprise/microsoft-365-network-connectivity-principles.md#new-office-365-endpoint-categories).
-ItΓÇÖs an easy fix to do split tunneling and itΓÇÖs one you should do. For more, make sure you review [Optimize Office 365 connectivity for remote users using VPN split tunneling](../enterprise/microsoft-365-vpn-split-tunnel.md).
+It's an easy fix to do split tunneling and it's one you should do. For more, make sure you review [Optimize Office 365 connectivity for remote users using VPN split tunneling](../enterprise/microsoft-365-vpn-split-tunnel.md).
## The sins of the past
-Many times, the reason bad choices are made comes from a combination of (1) not knowing how the service works, (2) trying to adhere to company policies that were written before adopting the cloud, and (3) security teams who may not be easily convinced that thereΓÇÖs more than one way to accomplish their goals. Hopefully the above, and the links below, will help with the first. Executive sponsorship may be required to get past the second. Addressing the security policiesΓÇÖ goals, rather than their methods, helps with the third. From conditional access to content moderation, DLP to information protection, endpoint validation to zero-day threatsΓÇöany end goal a reasonable security policy may have can be accomplished with what is available in Office 365, and without any dependency upon on-premises network gear, forced VPN tunnels, and TLS break and inspect.
+Many times, the reason bad choices are made comes from a combination of (1) not knowing how the service works, (2) trying to adhere to company policies that were written before adopting the cloud, and (3) security teams who may not be easily convinced that there's more than one way to accomplish their goals. Hopefully the above, and the links below, will help with the first. Executive sponsorship may be required to get past the second. Addressing the security policies' goals, rather than their methods, helps with the third. From conditional access to content moderation, DLP to information protection, endpoint validation to zero-day threatsΓÇöany end goal a reasonable security policy may have can be accomplished with what is available in Office 365, and without any dependency upon on-premises network gear, forced VPN tunnels, and TLS break and inspect.
-Other times, hardware that was sized and purchased before the organization started to move to the cloud simply cannot be scaled up to handle the new traffic patterns and loads. If you truly must route all traffic through a single egress point, and/or proxy it, be prepared to upgrade network equipment and bandwidth accordingly. Carefully monitor utilization on both, as the experience wonΓÇÖt diminish slowly as more users onboard. Everything will be fine until the tipping point is reached, then everyone suffers.
+Other times, hardware that was sized and purchased before the organization started to move to the cloud simply cannot be scaled up to handle the new traffic patterns and loads. If you truly must route all traffic through a single egress point, and/or proxy it, be prepared to upgrade network equipment and bandwidth accordingly. Carefully monitor utilization on both, as the experience won't diminish slowly as more users onboard. Everything will be fine until the tipping point is reached, then everyone suffers.
## Exceptions to the rules
-If your organization requires [tenant restrictions](/azure/active-directory/manage-apps/tenant-restrictions), youΓÇÖll need to use a proxy with TLS break and inspect to force some traffic through the proxy, but you donΓÇÖt have to force all traffic through it. ItΓÇÖs not an all or nothing proposition, so pay attention to what does need to be modified by the proxy.
+If your organization requires [tenant restrictions](/azure/active-directory/manage-apps/tenant-restrictions), you'll need to use a proxy with TLS break and inspect to force some traffic through the proxy, but you don't have to force all traffic through it. It's not an all or nothing proposition, so pay attention to what does need to be modified by the proxy.
If you're going to permit split tunneling but also use a proxy for general web traffic, make sure your PAC file defines what must go direct as well as how you define interesting traffic for what goes through the VPN tunnel. We offer sample PAC files at [https://aka.ms/ipaddrs](../enterprise/urls-and-ip-address-ranges.md) that will make this easier to manage.
If you're going to permit split tunneling but also use a proxy for general web t
Tens of thousands of organizations, including almost all the Fortune 500, use Office 365 everyday for their mission critical functions. They do so securely, and they do so over the Internet.
-No matter what security goals you have in play, there are ways to accomplish them that donΓÇÖt require VPN connections, proxy servers, TLS break and inspect, or centralized Internet egress to get your usersΓÇÖ traffic off your network and on to ours as quickly as you can, which provides the best performance, whether your network is the company headquarters, a remote office, or that user working at home. Our guidance is based on how the Office 365 services are built and to ensure a secure and performant user experience.
+No matter what security goals you have in play, there are ways to accomplish them that don't require VPN connections, proxy servers, TLS break and inspect, or centralized Internet egress to get your users' traffic off your network and on to ours as quickly as you can, which provides the best performance, whether your network is the company headquarters, a remote office, or that user working at home. Our guidance is based on how the Office 365 services are built and to ensure a secure and performant user experience.
## Further reading
solutions Productivity Illustrations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/productivity-illustrations.md
Security and information protection for multi-region organizations with a single
|:--|:--| |[![Multi-region infographic.](../media/solutions-architecture-center/multi-region-single-tenant-security-thumb.png)](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/msft-security-info-protect-multi-region.pdf) <br/> [PDF](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/msft-security-info-protect-multi-region.pdf) \| [Visio](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/msft-security-info-protect-multi-region.vsdx)<br>Updated March 2020 |Using a single Microsoft 365 tenant for your global organization is the best choice and experience for many reasons. However, many architects wrestle with how to meet security and information protection objectives across different regions. This set of topics provides recommendations. |
+<!--
## Security Guidance for Political Campaigns, Nonprofits, and Other Agile Organizations If your organization is agile, you have a small IT team, and your threat profile is higher than average, this guidance is designed for you. This solution demonstrates how to quickly build an environment with essential cloud services that include secure controls from the start. This guidance includes prescriptive security recommendations for protecting data, identities, email, and access from mobile devices.
If your organization is agile, you have a small IT team, and your threat profile
|:|:| |**Microsoft Security Guidance for Political Campaigns** <br> [:::image type="content" source="../media/d370ce28-ca40-4930-9a2c-907312aa06c8.png" alt-text="Thumbnail for mini poster about security guidance.":::](https://download.microsoft.com/download/B/4/D/B4D520C3-4D0C-4B4D-BFB9-09F0651C2775/MSFT_Cloud_architecture_security%20for%20political%20campaigns.pdf) <br> [PDF](https://download.microsoft.com/download/B/4/D/B4D520C3-4D0C-4B4D-BFB9-09F0651C2775/MSFT_Cloud_architecture_security%20for%20political%20campaigns.pdf) \| [Visio](https://download.microsoft.com/download/B/4/D/B4D520C3-4D0C-4B4D-BFB9-09F0651C2775/MSFT_Cloud_architecture_security%20for%20political%20campaigns.vsdx)|This guidance uses a political campaign organization as an example. Use this guidance as a starting point for any environment.| |**Microsoft Security Guidance for Nonprofits** <br> [:::image type="content" source="../media/e4784889-1c69-4067-9a8f-31d31d1eceea.png" alt-text="Thumbnail for security guidance download.":::](https://download.microsoft.com/download/9/4/3/94389612-C679-4061-8DF2-D9A15D72B65F/Microsoft_Cloud%20Architecture_Security%20for%20Nonprofits.pdf) <br> [PDF](https://download.microsoft.com/download/9/4/3/94389612-C679-4061-8DF2-D9A15D72B65F/Microsoft_Cloud%20Architecture_Security%20for%20Nonprofits.pdf) \| [Visio](https://download.microsoft.com/download/9/4/3/94389612-C679-4061-8DF2-D9A15D72B65F/Microsoft_Cloud%20Architecture_Security%20for%20Nonprofits.vsdx)|This guide is slightly revised for nonprofit organizations. For example, it references Office 365 Nonprofit plans. The technical guidance is the same as the political campaign solution guide.|
+-->
## Microsoft Defender for Endpoint deployment strategy
solutions Ransomware Protection Microsoft 365 Security Baselines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/ransomware-protection-microsoft-365-security-baselines.md
Next, use [attack surface reduction rules](/microsoft-365/security/defender-endp
- Credential stealing from the Windows local security authority subsystem (lsass.exe) - Process creations originating from PSExec and WMI commands
-## Exchange email management baseline
+## Exchange email management baseline
Help prevent initial access to your tenant from an email-based attack with these Exchange email baseline settings: - Enable [Microsoft Defender Antivirus email scanning](/microsoft-365/security/defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus). - Use Microsoft Defender for Office 365 for [enhanced phishing protection](/microsoft-365/security/office-365-security/anti-phishing-protection) and coverage against new threats and polymorphic variants. - Check your Office 365 email filtering settings to ensure you block spoofed emails, spam, and emails with malware. Use Defender for Office 365 for enhanced phishing protection and coverage against new threats and polymorphic variants. Configure Defender for Office 365 to [recheck links on click](/microsoft-365/security/office-365-security/atp-safe-links) and [delete delivered mails](/microsoft-365/security/office-365-security/zero-hour-auto-purge) in response to newly acquired threat intelligence.-- Review and update to the latestΓÇ»[recommended settings for EOP and Defender for Office 365 security](/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365-atp).
+- Review and update to the latest [recommended settings for EOP and Defender for Office 365 security](/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365-atp).
- Configure Defender for Office 365 to [recheck links on click](/microsoft-365/security/office-365-security/set-up-safe-links-policies) and delete delivered mails in response to newly acquired threat intelligence. ## Additional baselines
Here's the ransomware protection for your tenant after this step.
![Ransomware protection for your Microsoft 365 tenant after Step 1](../media/ransomware-protection-microsoft-365/ransomware-protection-microsoft-365-architecture-step1.png) - ## Next step [![Step 2 for ransomware protection with Microsoft 365](../medi)