Updates from: 04/02/2022 01:54:58
Category Microsoft Docs article Related commit history on GitHub Change details
admin Autopilot Profile Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/devices/autopilot-profile-settings.md
- Title: "About AutoPilot Profile settings"------ 'ZTDProfileSettings'-- 'O365E_ZTDProfileSettings'-- 'BCS365_ZTDProfileSettings'---- Adm_O365-- M365-subscription-management -- M365-identity-device-management-- Adm_TOC--- Adm_O365-- Core_O365Admin_Migration-- MiniMaven-- MSB365-- OKR_SMB_M365-- AdminSurgePortfolio-- BCS160-- MET150-- MOE150
-description: "AutoPilot profiles help you control how Windows gets installed on user devices. The profiles contain default and optional settings like skip Cortana installation."
--
-# About AutoPilot Profile settings
-
-## AutoPilot profile settings
-
-> [!NOTE]
-> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../../security/defender-business/mdb-overview.md).
-
-You can use AutoPilot profiles to control how Windows is installed on user devices. The profiles contain the following settings.
-
- **AutoPilot default features (required) that are set automatically:**
-
-|**Setting**|**Description**|
-|:--|:--|
-|Skip Cortana, OneDrive, and OEM registration <br/> |Skips the installation of consumer apps like Cortana and personal OneDrive. The device user can install these later as long as the user is a local admin on the device. The original manufacturer registration is skipped because the device will be managed by Microsoft 365 Business Premium. <br/> |
-|Sign in experience with your company brand <br/> |If your company has a [Add your company branding to Microsoft 365 Sign In page](../setup/customize-sign-in-page.md), the device user will get that experience when signing in. <br/> |
-|MDM auto-enrollment with configured AAD accounts. <br/> |The user identity will be managed by Azure Active Directory, and users will sign in to Windows and Microsoft 365 with their Microsoft 365 Business Premium credentials. <br/> |
-
- **Optional settings:**
-
-|**Setting**|**Description**|
-|:--|:--|
-|Skip privacy settings (Off by default) <br/> |If this option is set to **On**, the device user will not see the license agreement for the device and Windows when he or she first signs in. <br/> |
-|Don't allow the user to become the local admin <br/> |If this option is set to **On**, the device user will not be able to install any personal apps, such as Cortana.<br/> |
-
-## See also
-
-[Top 10 ways to secure Microsoft 365 for business plans](../security-and-compliance/secure-your-business-data.md)
admin Create And Edit Autopilot Profiles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/devices/create-and-edit-autopilot-profiles.md
A profile applies to a device, or a group of devices,
2. On the **AutoPilot** page, choose the **Profiles** tab \> **Create profile**.
-3. On the **Create profile** page, enter a name for the profile that helps you identify it, for example Marketing. Turn on the setting you want, and then choose **Save**. For more information about AutoPilot profile settings, see [About AutoPilot Profile settings](autopilot-profile-settings.md).
+3. On the **Create profile** page, enter a name for the profile that helps you identify it, for example Marketing. Turn on the setting you want, and then choose **Save**. For more information about AutoPilot profile settings, see [About AutoPilot Profile settings](../../business-premium/m365bp-autopilot-profile-settings.md).
![Enter name and turn on settings in the Create profile panel.](../../media/63b5a00d-6a5d-48d0-9557-e7531e80702a.png) ### Apply profile to a device
-After you create a profile, you can apply it to a device or a group of devices. You can pick an existing profile in the [step-by-step guide](add-autopilot-devices-and-profile.md) and apply it to new devices, or replace an existing profile for a device or group of devices.
+After you create a profile, you can apply it to a device or a group of devices. You can pick an existing profile in the [step-by-step guide](../../business-premium/m365bp-add-autopilot-devices-and-profile.md) and apply it to new devices, or replace an existing profile for a device or group of devices.
1. On the **Prepare Windows** page, choose the **Devices** tab.
admin Device States https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/devices/device-states.md
- Title: "Device states"-- NOCSH-------- Adm_O365-- M365-subscription-management -- M365-identity-device-management-- Adm_TOC--- Adm_O365-- Core_O365Admin_Migration-- MiniMaven-- MSB365-- seo-marvel-mar-- AdminSurgePortfolio-- BCS160-- MET150-- MOE150
-description: "Learn about the various device states in the Device actions list in Admin home in Microsoft 365 for business."
--
-# Device states
-
-This article applies to Microsoft 365 Business Premium.
-
-> [!NOTE]
-> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../../security/defender-business/mdb-overview.md).
-
-Devices in the **Device actions** list (Admin home \> **Device actions**) can have the following states.
-
-![In the Device actions list, you can see the Devices states.](../../media/a621c47e-45d9-4e1a-beb9-c03254d40c1d.png)
-
-|**Status**|**Description**|
-|:--|:--|
-|Managed by Intune <br/> |Managed by Microsoft 365 Business Premium. <br/> |
-|Retire pending <br/> |Microsoft 365 Business Premium is getting ready to remove company data from the device. <br/> |
-|Retire in progress <br/> |Microsoft 365 Business Premium is currently removing company data from the device. <br/> |
-|Retire failed <br/> | Remove company data action failed. <br/> |
-|Retire canceled <br/> |Retire action was canceled. <br/> |
-|Wipe pending <br/> |Waiting for factory reset to start. <br/> |
-|Wipe in progress <br/> |Factory reset has been issued. <br/> |
-|Wipe failed <br/> |Couldn't do factory reset. <br/> |
-|Wipe canceled <br/> |Factory wipe was canceled. <br/> |
-|Unhealthy <br/> |An action is pending (or in progress), but the device hasn't checked in for 30+ days. <br/> |
-|Delete pending <br/> |Delete action is pending. <br/> |
-|Discovered <br/> |Microsoft 365 Business Premium has detected the device. <br/> |
-
-
-## See also
-
-[Top 10 ways to secure Microsoft 365 for business plans](../security-and-compliance/secure-your-business-data.md)
admin Map Protection Features To Intune Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/devices/map-protection-features-to-intune-settings.md
- Title: "How do protection features in Microsoft 365 Business Premium map to Intune settings"-- NOCSH--- Previously updated : 02/27/2022----- Adm_O365-- M365-subscription-management -- M365-identity-device-management-- Adm_TOC--- Adm_O365-- Core_O365Admin_Migration-- MiniMaven-- MSB365-- OKR_SMB_M365-- AdminSurgePortfolio-- BCS160-- MET150
-description: "Learn how protection features in Microsoft 365 Business Premium map to Intune settings. The subscription provides you with a license to modify Intune settings."
--
-# How do protection features in Microsoft 365 Business Premium map to Intune settings
-
-> [!NOTE]
-> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../../security/defender-business/mdb-overview.md).
-
-## Android and iOS application protection settings
-
-The following table details how the Android and iOS application policy settings map to Intune settings.
-
-To find the Intune setting, sign in with your Microsoft 365 Business Premium admin credentials, and go to **Admin centers**, and then **Intune**.
-
- > [!IMPORTANT]
- >
- > A Microsoft 365 Business Premium subscription gives you a license to modify all the Intune settings. See [Introduction to Intune to get started.](/intune/introduction-intune)
-
-Select the Policy name you want &mdash; for example, Application policy for Android &mdash; and then choose **Policy settings**.
-
-Under **Protect work files when devices are lost or stolen**
-
-|**Android or iOS application policy setting**|**Intune setting(s)**|
-|:--|:--|
-|Delete work files from an inactive device after <br/> |Offline interval (days) before app data is wiped <br/> |
-|Force users to save work files to OneDrive for Business <br/> Note that only OneDrive for Business is allowed <br/> |Select which storage services corporate data can be saved to <br/> |
-|||
-
-Under **Manage how user access Office files in mobile devices**
-
-|**Android or iOS application policy setting**|**Intune setting(s)**|
-|:--|:--|
-|Delete work files from an inactive device after <br/> |Offline interval (days) before app data is wiped <br/> |
-|Force users to save work files to OneDrive for Business <br/> Note that only OneDrive for Business is allowed <br/> |Select which storage services corporate data can be saved to <br/> |
-|Encrypt work files <br/> |Encrypt app data <br/> |
-|Under **Manage how user access Office files in mobile devices** <br/> ||
-|Require a PIN or fingerprint to access Office apps <br/> | Require PIN to access <br/> This also sets: <br/> **Allow simple PIN** to **Yes** <br/> **Pin Length** to 4 <br/> **Allow fingerprint instead of PIN** to **Yes** <br/> **Disable app PIN when device PIN is managed** to **No** <br/> |
-|Reset PIN when login fails this many times (this is disabled if PIN isn't required) <br/> |Number of attempts before PIN reset <br/> |
-|Require users to sign in again after Office apps have been idle for (this is disabled if PIN isn't required) <br/> | Recheck the access requirements after (minutes) <br/> This also sets: <br/> **Timeout** is set to minutes <br/> This is same number of minutes you set in Microsoft 365 Business. <br/> **Offline grace period** is set to 720 minutes by default <br/> |
-|Deny access to work files on jailbroken or rooted devices <br/> |Block managed apps from running on jailbroken or rooted devices <br/> |
-|Allow users to copy content from Office apps into personal apps <br/> | Restrict cut, copy, and paste with other apps <br/> If the Microsoft 365 Business Premium option is set to **On**, then these three options are also set to **All Apps** in Intune: <br/> **Allow app to transfer data to other apps** <br/> **Allow app to receive data from other apps** <br/> **Restrict cut, copy, and paste with other apps** <br/> If the Microsoft 365 Business option is set to **On**, then all the Intune options are set to: <br/> **Allow app to transfer data to other apps** is set to **Policy managed apps** <br/> **Allow app to receive data from other apps** is set to **All Apps** <br/> **Restrict cut, copy, and paste with other apps** is set to **Policy Managed apps with Paste-In** <br/> |
-|||
-
-## Windows 10 app protection settings
-
-The following table details how the Windows 10 application policy settings map to Intune settings.
-
-To find the Intune setting, sign in with your Microsoft 365 Business Premium admin credentials, and go to [Azure portal](https://portal.azure.com). Select **More services**, and type Intune into the **Filter**. Select **Intune App Protection** \> **App Policy**.
-
- > [!IMPORTANT]
- >
- >A Microsoft 365 Business Premium subscription gives you a license to modify only the Intune settings that map to the settings available in Microsoft 365 Business Premium.
-
-To explore the available settings, select the policy name you want, and then choose **General, Assignments**, **Allowed apps**, **Exempt apps**, **Required settings**, or **Advanced settings** from the left navigation pane.
-
-|**Windows 10 application policy setting**|**Intune setting(s)**|
-|:--|:--|
-|Encrypt work files <br/> |**Advanced settings** \> **Data protection**: **Revoke encryption keys on unenroll** and **Revoke access to protected data device enrolls to MDM** are both set to **On**. <br/> |
-|Prevent users from copying company data to personal files. <br/> |**Required settings** \> **Windows Information Protection mode**. **On** in Microsoft 365 Business Premium maps to: **Hide Overrides**, **Off** in Microsoft 365 Business Premium maps to: **Off**. <br/> |
-|Office documents access control <br/> | If this is set to **On** in Microsoft 365 Business Premium, then <br/> **Advanced settings** \> **Access**, **Use Windows Hello for Business as a method for signing into Windows** is set to **On**, with the following additional settings: <br/> **Set the minimum number of characters required for the PIN** is set to **4**. <br/> **Configure the use of uppercase letters in the Windows Hello for Business PIN** is set to **Do not allow use of upper case letters for PIN**. <br/> **Configure the use of lowercase letters in the Windows Hello for Business PIN** is set to **Do not allow use of lower case letters for PIN**. <br/> **Configure the use of special characters in the Windows Hello for Business PIN** is set to **Do not allow the use of special characters in PIN**. <br/> **Specify the period of time (in days) that a PIN can be used before the system requires the user to change** is set to **0**. <br/> **Specify the number of past PINs that can be associated to a user account that can't be reused** is set to **0**. <br/> **Number of authentication failures allowed before the device will be wiped** is set to same as in Microsoft 365 Business (5 by default). <br/> **Maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked** is set to same as in Microsoft 365 Business. <br/> |
-|Enable recovery of protected data <br/> |**Advanced settings** \> **Data protection**: **Show the enterprise data protection icon** and **Use Azure RMS for WIP** are set to **On**. <br/> |
-|Protect additional company cloud locations <br/> |**Advanced settings** \> **Protected domains** and **Cloud resources** show domains and SharePoint sites. <br/> |
-|Files used by these apps are protected <br/> |The list of protected apps is listed in **Allowed apps**. <br/> |
-|||
-
-## Windows 10 device protection settings
-
-The following table details how the Windows 10 device configuration settings map to Intune settings.
-
-To find the Intune setting, sign in with your Microsoft 365 Business Premium admin credentials, and go to [Azure portal](https://portal.azure.com), then select **More services**, and type in Intune into the **Filter**, select **Intune** \> **Device configuration** \> **Profiles**. Then select **Device policy for Windows 10** \> **Properties** \> **Settings**.
-
-|**Windows 10 device policy setting**|**Intune setting(s)**|
-|:--|:--|
-|Help protect PCs from viruses and other threats using Windows Defender Antivirus <br/> |Allow Real-time Monitoring = ON <br/> Allow Cloud Protection = ON <br/> Prompt Users for Samples Submission = Send Safe samples automatically (Default Non PII auto submit) <br/> |
-|Help protect PCs from web-based threats in Microsoft Edge <br/> |**SmartScreen** in **Edge Browser settings** is set to **Required**. <br/> |
-|Turn off device screen when idle for (minutes) <br/> |Maximum minutes of inactivity until screen locks (minutes) <br/> |
-|Allow users to download apps from Microsoft Store <br/> |Custom URI policy <br/> |
-|Allow users to access Cortana <br/> |**General** \> **Cortana** is set to **block** in Intune when set to **off** in Microsoft 365 Business Premium. <br/> |
-|Allow users to receive Windows tips and advertisements from Microsoft <br/> |**Windows spotlight**, all blocked if this is set to **off** in Microsoft 365 Business Premium. <br/> |
-|Keep Windows 10 devices up to date automatically <br/> | This setting is in **Microsoft Intune** \> **Service updates - Windows 10 Update Rings**, choose **Update policy for Windows 10 devices**, and then **Properties** \> **Settings**. <br/> When the Microsoft 365 Business Premium setting is set to **On**, all the following settings are set: <br/> **Service branch** is set to **CB** (CBB when this is turned off in Microsoft 365 Business Premium). <br/> **Microsoft product updates** is set to **Allow**. <br/> **Windows drivers** is set to **Allow**. <br/> **Automatic update behavior** is set to **Auto install at maintenance time** with: <br/> **After hours start** is set to **6 AM**. <br/> **Active hours end** is set to **10 PM**. <br/> **Quality update deferral period (days)** is set to **0**. <br/> **Feature update deferral period (days)** is set to **0**. <br/> **Delivery optimization download mode** is set to **HTTP blended with peering behind same NAT**. <br/> |
-|||
-
-## See also
-
-[Top 10 ways to secure Microsoft 365 for business plans](../security-and-compliance/secure-your-business-data.md)
admin Protection Settings For Windows 10 Pcs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/devices/protection-settings-for-windows-10-pcs.md
- Title: "Edit or create device protection settings for Windows 10 PCs"-- NOCSH-------- M365-subscription-management-- M365-identity-device-management -- Adm_TOC--- Core_O365Admin_Migration-- MiniMaven-- MSB365-- OKR_SMB_M365-- AdminSurgePortfolio-- adminvideo-- BCS160-- MET150
-description: "Learn about settings available in Microsoft 365 for business to secure Windows 10 devices."
--
-# Edit or create device protection settings for Windows 10 PCs
-
-This article applies to Microsoft 365 Business Premium.
-
-> [!NOTE]
-> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../../security/defender-business/mdb-overview.md).
-
-After you have set set up default Windows protection settings on the Setup page, you can add new ones that apply to either all users, or a set of users. You can also edit any of the ones you have created.
-
-## Watch: Create protection settings for Windows 10 devices
-
-View a video on how to secure Windows 10 devices with Microsoft 365 Business Premium:
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/a5734146-620a-4cec-8618-536b3ca37972?autoplay=false]
-
-1. Go to the admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=837890" target="_blank">https://admin.microsoft.com</a>.
-2. On the left nav, choose **Devices** \> **Policies** \> **Add**.
-3. On the **Add policy** pane, enter a unique name for this policy.
-4. Under **Policy type**, choose **Windows 10 Device Configuration**.
-5. Expand **Secure Windows 10 Devices** \> configure the settings how you would like. For more information, see [Available settings](#available-settings).
-
- You can always use the **Reset default settings** link to return to the default setting.
-
- ![Add policy pane with Windows 10 Device configuration selected.](../../media/fa9e2dc2-7eae-4c96-af34-765a1f641ecf.png)
-
-6. Next decide **Who will get these settings?** If you don't want to use the default **All users** security group, Choose **Change**, search for the security group who will get these settings \> **Select**.
-7. Finally, choose **Done** to save the policy, and assign it to devices.
-
-## Edit Windows 10 protection settings
-
-1. Go to the admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=837890" target="_blank">https://admin.microsoft.com</a>.
-2. On the left nav, choose **Devices** \> **Policies** .
-1. Choose an existing Windows device policy and then **Edit**.
-1. Choose **Edit** next to a setting you want to change and then **Save**.
-
-## Available settings
-
-By default all settings are **On**. The following settings are available.
-
-For more information, see [How do protection features in Microsoft 365 Premium map to Intune settings](map-protection-features-to-intune-settings.md).
--
-|Setting <br/> |Description <br/> |
-|:--|:--|
-|Help protect PCs from viruses and other threats using Windows Defender Antivirus <br/> |Requires that Windows Defender Antivirus is turned on to protect PCs from the dangers of being connected to the internet. <br/> |
-|Help protect PCs from web-based threats in Microsoft Edge <br/> |Turns on settings in Edge that help protect users from malicious sites and downloads. <br/> |
-|Use rules that reduce the attack surface of devices <br/> |When turned On, attack surface reduction helps block actions and apps typically used by malware to infect devices. This setting is only available if Windows Defender Antivirus is set to On. See [Reduce attack surfaces](/windows/security/threat-protection/microsoft-defender-atp/exploit-protection) to learn more. <br/> |
-|Protect folders from threats such as ransomware <br/> |This setting uses controlled folder access to protect company data from modification by suspicious or malicious apps, such as ransomware. These types of apps are blocked from making changes in protected folders. This setting is only available if Windows Defender Antivirus is set to On. See [Protect folders with Controlled folder access](/mem/configmgr/protect/deploy-use/create-deploy-exploit-guard-policy#bkmk_CFA) to learn more. <br/> |
-|Prevent network access to potentially malicious content on the Internet <br/> |Use this setting to block outbound user connections to low-reputation Internet locations that may host phishing scams, exploits, or other malicious content. This setting is only available if Windows Defender Antivirus is set to **On**. For more information, see [Protect your network](/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus). <br/> |
-|Help protect files and folders on PCs from unauthorized access with BitLocker <br/> |BitLocker protects data by encrypting the computer hard drives and protect against data exposure if a computer is lost or stolen. For more information, see [BitLocker FAQ](/windows/security/information-protection/BitLocker/BitLocker-frequently-asked-questions). <br/> |
-|Allow users to download apps from Microsoft Store <br/> |Lets users download and install apps from the Microsoft Store. Apps include everything from games to productivity tools, so we leave this setting **On**, but you can turn it off for extra security. <br/> |
-|Allow users to access Cortana <br/> |Cortana can be very helpful! Cortana can turn settings on or off for you, give directions, and make sure you're on time for appointments, so we keep this setting **On** by default. <br/> |
-|Allow users to receive Windows tips and advertisements from Microsoft <br/> |Windows tips can be handy and help orient users when new features are released. <br/> |
-|Keep Windows 10 devices up to date automatically <br/> |Makes sure that Windows 10 devices automatically receive the latest updates. <br/> |
-|Turn off device screen when idle for this amount of time <br/> |Makes sure that company data is protected if a user is idle. A user may be working in a public location, like a coffee shop, and step away or be distracted for just a moment, leaving their device vulnerable to random glances. This setting lets you control how long the user can be idle before the screen shuts off. <br/> |
-
-## See also
-
-[Top 10 ways to secure Microsoft 365 for business plans](../security-and-compliance/secure-your-business-data.md)
admin Validate Settings On Android Or Ios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/devices/validate-settings-on-android-or-ios.md
Follow the instructions in the following sections to validate app protection set
### Check that the app protection settings are working on user devices
-After you [set app configurations for Android devices](app-protection-settings-for-android-and-ios.md) to protect the apps, you can follow these steps to validate that the settings you chose work.
+After you [set app protection settings for Android or iOS devices](../../business-premium/m365bp-app-protection-settings-for-android-and-ios.md) to protect the apps, you can follow these steps to validate that the settings you chose work.
First, make sure that the policy applies to the app in which you're going to validate it.
In the **Edit policy** pane, choose **Edit** next to **Protection against lost o
### Check that the App protection settings are working on user devices
-After you [set app configurations for iOS devices](app-protection-settings-for-android-and-ios.md) to protect apps, you can follow these steps to validate that the settings you chose work.
+After you [set app configurations for iOS devices](../../business-premium/m365bp-protection-settings-for-windows-10-devices.md) to protect apps, you can follow these steps to validate that the settings you chose work.
First, make sure that the policy applies to the app in which you're going to validate it.
admin Validate Settings On Windows 10 Pcs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/devices/validate-settings-on-windows-10-pcs.md
description: "Learn how to verify that Microsoft 365 for business app protection
## Verify that Windows 10 device policies are set
-After you [set up device policies](protection-settings-for-windows-10-pcs.md), it may take up to a few hours for the policy to take effect on users' devices. You can confirm that the policies took effect by looking at various Windows Settings screens on the users' devices. Because the users won't be able to modify the Windows Update and Microsoft Defender Antivirus settings on their Windows 10 devices, many options will be grayed out.
+After you [set up device policies](../../business-premium/m365bp-protection-settings-for-windows-10-pcs.md), it may take up to a few hours for the policy to take effect on users' devices. You can confirm that the policies took effect by looking at various Windows Settings screens on the users' devices. Because the users won't be able to modify the Windows Update and Microsoft Defender Antivirus settings on their Windows 10 devices, many options will be grayed out.
1. Go to **Settings** \> **Update &amp; security** \> **Windows Update** \> **Restart options** and confirm that all settings are grayed out.
After you [set up device policies](protection-settings-for-windows-10-pcs.md), i
## Related content
-[Microsoft 365 for business documentation and resources](/admin)\
-[Set device configurations for Windows 10 PCs](protection-settings-for-windows-10-pcs.md)
-[Top 10 ways to secure Microsoft 365 for business plans](../security-and-compliance/secure-your-business-data.md)
+[Microsoft 365 for business documentation and resources](/admin)
+
+[Set device configurations for Windows 10 PCs](../../business-premium/m365bp-protection-settings-for-windows-10-devices.md)
+[Top 10 ways to secure Microsoft 365 for business plans](../../admin/security-and-compliance/secure-your-business-data.md)
admin Gdpr Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/gdpr-compliance.md
If you choose to store personal data in the cloud, such as through Microsoft 365
#### Microsoft 365 features that can help
-You can use [Set up compliance features](set-up-compliance.md) to help to protect your business's sensitive information. Compliance Manager can help you get started right away! For example, you can [set up a DLP policy](/microsoft-365/compliance/create-a-dlp-policy-from-a-template) that uses the [GDPR template](/microsoft-365/compliance/what-the-dlp-policy-templates-include#general-data-protection-regulation-gdpr).
+You can use [Set up compliance features](../../business-premium/m365bp-set-up-compliance.md) to help to protect your business's sensitive information. Compliance Manager can help you get started right away! For example, you can [set up a DLP policy](/microsoft-365/compliance/create-a-dlp-policy-from-a-template) that uses the [GDPR template](/microsoft-365/compliance/what-the-dlp-policy-templates-include#general-data-protection-regulation-gdpr).
### Step 5: Keep documentation on your data processing activities
admin Pre Requisites For Data Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/pre-requisites-for-data-protection.md
- Title: "Prerequisites for protecting data on devices with Microsoft 365 for business"-- NOCSH-------- M365-subscription-management -- Adm_TOC--- Core_O365Admin_Migration-- MiniMaven-- MSB365-- OKR_SMB_M365-- seo-marvel-mar-- AdminSurgePortfolio-- BCS160-- MET150
-description: "Learn about the requirements for setting up your organization with Microsoft 365 for business and protecting work data on your users' devices."
--
-# Prerequisites for protecting data on devices with Microsoft 365 for business
-
-This article applies to Microsoft 365 Business Premium.
-
-> [!NOTE]
-> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../../security/defender-business/mdb-overview.md).
-
-The first step in setting up your organization with Microsoft 365 for business is to make sure you can meet the prerequisites.
-
-## Requirements for setting up your organization with Microsoft 365 for business
--- Windows devices must be running Windows 7 Professional, Windows 8 Pro, or Windows 8.1 Pro.
-
- If you're running Windows 10 Home, then you must **purchase** Windows 10 Pro. See [upgrade Windows 10 Home to Windows 10 Pro](../../business-video/upgrade.md) for instructions.
-
-- Remove devices from mobile management solutions (Mobile Iron, AirWatch, and so on). You'll enroll all the people in your organization in Microsoft 365 for business mobile management.
-
-- Apple iOS 8.0 and later.
-
- Google Android 4.0 and later (including Samsung KNOX Standard 4.0 and higher). For more information, see [Intune supported devices](/mem/intune/fundamentals/supported-devices-browsers).
-
-- If you have existing Office applications on user computers, read [prepare for Office client installation](../misc/prepare-for-office-client-deployment.md) to understand steps you might need to take before you can set up Microsoft 365 for business to install Office 2016 on user computers.-
-## See also
-
-[Top 10 ways to secure Microsoft 365 for business plans](secure-your-business-data.md)
admin Review Threats Take Action https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/review-threats-take-action.md
If you have a file that you think was missed or wrongly classified as malware, y
## See also
-[Top 10 ways to secure Microsoft 365 for business plans](secure-your-business-data.md)
+[Top 10 ways to secure Microsoft 365 for business plans](../../admin/security-and-compliance/secure-your-business-data.md)
[Overview of Microsoft Defender for Business](../../security/defender-business/mdb-overview.md) (Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022)
admin Manage Domain Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/manage-domain-users.md
As you configure your options for Azure AD Connect, we recommend that you enable
> [!NOTE] > There are some additional steps for password writeback beyond the check box in Azure AD Connect. For more information, see [How-to: configure password writeback](/azure/active-directory/authentication/howto-sspr-writeback).
-If you also want to manage domain-joined Windows 10 devices, see [Enable domain-joined Windows 10 devices to be managed by Microsoft 365 Business Premium](manage-windows-devices.md) to set up a hybrid Azure AD Join.
+If you also want to manage domain-joined Windows 10 devices, see [Enable domain-joined Windows 10 devices to be managed by Microsoft 365 Business Premium](../../business-premium/m365bp-manage-windows-devices.md) to set up a hybrid Azure AD Join.
admin Secure Win 10 Pcs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/secure-win-10-pcs.md
After you have [set up](business-set-up.md) Microsoft 365 Business Premium, it i
After you set up device protection in Microsoft 365 Business, follow these steps to protect your Windows 10 computers. 1. In the Microsoft 365 admin center, choose <a href="https://go.microsoft.com/fwlink/p/?linkid=2171997" target="_blank">**Setup**</a>.
-1. Under **Secure your Windows computers** , select **View**.
-1. Select **Get started**.
-1. Under **Who should the policy apply to?**, choose whether your selections will be applied to everyone in your organization or to specific security groups.
-1. Select **Save changes**.
+
+2. Under **Secure your Windows computers** , select **View**.
+
+3. Select **Get started**.
+
+4. Under **Who should the policy apply to?**, choose whether your selections will be applied to everyone in your organization or to specific security groups.
+
+5. Select **Save changes**.
## To secure your Windows 10 computers 1. Sign in to [Microsoft 365 admin center](https://admin.microsoft.com) by using your global admin credentials. + 2. On the left nav, select **Setup** and then, under **Sign-in and security**, choose **Secure your Windows 10 computers**. Choose **View** to get started.+ 3. On the **Secure your Windows 10 computers** page, read all the information to understand what you are turning on, and what the user impact is. On the top of the page, choose **Get started**.
After you set up device protection in Microsoft 365 Business, follow these steps
For most organizations, the options here offer a good level of security, however, if your organization has more complex security needs, you can also use pre-defined security baselines to secure your Windows 10 devices. For more information, see [security baselines for Windows 10 devices](/mem/intune/protect/security-baselines).
-1. Choose **Apply settings**.
+5. Choose **Apply settings**.
- These settings will apply to all users in your organization. To set up different policies for different security groups, see [Set device protection settings for Windows 10 PCs](../devices/protection-settings-for-windows-10-pcs.md).
+ These settings will apply to all users in your organization. To set up different policies for different security groups, see [Set device protection settings for Windows 10 PCs](../../business-premium/m365bp-protection-settings-for-windows-10-pcs.md).
admin Whats New In Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/whats-new-in-preview.md
And if you'd like to know what's new with other Microsoft cloud
- [Office updates](/OfficeUpdates/) - [How to check Windows release health](/windows/deployment/update/check-release-health)
+## March 2022
+
+### Microsoft 365 Lighthouse GA
+
+Small and medium businesses often rely on trusted IT partners to manage their IT environments. WeΓÇÖre making it easier for partners to secure customers at scale with the general availability of [Microsoft 365 Lighthouse](https://aka.ms/March1SMBPartnerBlog), a multi-tenant administration portal for Managed Service Providers (MSPs). Microsoft 365 Lighthouse provides a complete experience for customers by empowering their partners to quickly identify and act on threats, anomalous sign-ins, and device compliance alerts to keep them safe.
++
+Microsoft 365 Lighthouse is an IT partner service only, and itΓÇÖs available to partners who are enrolled in the Cloud Solution Provider (CSP) program and are managing customers who have up to 1000 licensed users with Microsoft 365 Business Premium, Microsoft 365 E3, or Microsoft Defender for Business (in preview) subscriptions. If youΓÇÖre a Microsoft CSP-enrolled IT Partner, Microsoft 365 Lighthouse is available at no cost to your organization and is designed to help your business scale and grow. Check out the [Microsoft 365 Lighthouse help library](../lighthouse/m365-lighthouse-overview.md) for more information.
+
+To get started using Microsoft 365 Lighthouse, see [Sign up for Microsoft 365 Lighthouse](../lighthouse/m365-lighthouse-sign-up.md). To learn more about Microsoft 365 Lighthouse, Defender for Business, and Microsoft 365 Business Premium, [join us for our Partner webinar series](https://aka.ms/M365MDBSeries).
+ ## February 2022 ### Net promoter score (NPS) survey insights
Just this month, we released a new site on docs.microsoft.com called the [Micros
- **What's new in Microsoft 365 video series**: This month, we cover the new support experience in the Teams admin and Security and Compliance Centers, Planner integration with the Message Center, and the new 3x3 video layout in Microsoft Teams. - The [Microsoft 365 admin center help](./index.yml) hub page was updated to help you find what you need more quickly. And if you go look at that page right now, we've added a card to inform you of important updates and changes.-
-## April 2020
-
-### Intune roles management
-
-[April 2020](#april-2020)
-
-Well, we did it! We've taken the second step towards a unified roles experience and you can now manage Intune roles in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>. You can also leverage features such as the ability to search for roles and view role permissions. This means you donΓÇÖt need two separate tools to manage roles for Microsoft 365 and Intune. When you sign into the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>, youΓÇÖll see that there are two pivots on the Roles page, one for Azure AD and one for Intune.
-
-![Roles page with the Intune pivot selected.](../media/MAC-WN-IntuneRoles.png)
-
-### Sync Message Center posts to Planner
-
-Starting in May, admins who are in Targeted release will start seeing the "Planner syncing" button in the message center. You can now track messages that need action, select the type of messages you'd like to track, assign messages to track as tasks, and tag messages for later attention.
-
-[Join Targeted Release](manage/release-options-in-office-365.md) to get started!
-
-### "Need help?" launched in Teams admin center & Security and Compliance centers
-
-The Teams admin center, Security center, and Compliance center are now using the same "Need help?" feature that the <a href="https://go.microsoft.com/fwlink/p/?linkid=2166757" target="_blank">Microsoft 365 admin center</a> uses for finding help and contacting support. We've received a lot of feedback from admins that you wanted the same level of help and support and we're happy to bring that to you. Try it out and give us your feedback!
-
-#### Need chat?
-
-Our support agents have been working from home while still taking customer cases and limitations on internet bandwidth while working from home can impact customer call quality. In order to continue supporting you, we have launched live chat support option for commercial customers in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2166757" target="_blank">Microsoft 365 admin center</a>.
-
-While creating a service request, you'll now see chat as an option, in addition to phone and email. Select chat as a preferred channel of communication and create the request. Once you've created the request, you can start the chat when you are ready to chat with Microsoft agents.
-
-### Teams updates
-
-With the increased usage of Teams, we've added a few features to help you manage them.
--- A new recommendation card on the admin center Home page shows which users have not actively used Teams for 30 days. You can send those users a training email to get them started using Teams.-- **Bring people together with teams**: Go to **Setup** to see a new page to help you turn on Teams for licensed users and allow guest access, so you can work with external customers in Teams.-- A Microsoft Teams card is now pinned by default to your Home page. It shows whether Teams is turned on, and if guest access is allowed. It also allows you to check the setup status for newly licensed Teams users, and check if network issues might be impacting Teams users.-- Finally, Teams is now a step in the initial set up flow if you purchased a license that includes Teams.-
-### Productivity score
-
-Productivity Score gives insights about how people use Microsoft cloud services and the technology experiences that support them. The score reflects your organizationΓÇÖs performance against employee and technology experience measures and compares your score with organizations like yours. This month, we are introducing the following new concepts to the preview experience:
--- Trend view of primary insights on home page and category detail pages--Endpoint Analytics and Network Connectivity categories added to Technology Experience-- Relevant Technology Experience insight shown in Employee Experience categories-- New Communications category as part of Employee Experience-- User details with organizational metadata in Employee Experience categories-
-If you'd like to learn more, check out the blog: [Measure and improve the Microsoft 365 experience with Microsoft Productivity Score](https://techcommunity.microsoft.com/t5/microsoft-365-blog/measure-and-improve-the-microsoft-365-experience-with-microsoft/ba-p/1348618). Productivity score is currently in private preview. [Join the Productivity score private preview](https://aka.ms/productivityscorepreview) to get started.
-
-### Groups updates
-
-We've got two updates for Groups this month:
--- You can now edit email addresses for Office 365 groups (Also known as Groups in Outlook, and soon to be known as Microsoft 365 groups).-- We've heard your feedback and we've added clearer error messaging for why you can't convert a group to a Microsoft Team.-
-### Docs, videos, and training (April)
-
-**What's new in Microsoft 365 video series**: This month, we cover tips and resources to help small businesses transition to remote work including how to roll out Microsoft Teams, remote work training resources to stay connected with clients and partners, and the new Microsoft 365 Business Voice plan. [What's New in Microsoft 365](https://go.microsoft.com/fwlink/p/?linkid=2118096)
-
-#### For your users
--- [Schedule a meeting](https://support.microsoft.com/office/943507a9-8583-4c58-b5d2-8ec8265e04e5)-- [Join a Teams meeting](https://support.microsoft.com/office/078e9868-f1aa-4414-8bb9-ee88e9236ee4)-- [Create an org-wide team](/microsoftteams/create-an-org-wide-team)-- [Create a Team with guests](https://support.microsoft.com/office/fccb4fa6-f864-4508-bdde-256e7384a14f)-- [Join a Team as a guest](/microsoftteams/guest-experience)-- [Create a group email address](https://support.microsoft.com/office/3f73d218-52d6-4f88-a733-9ff37073ee4c)-
-#### For admins and business owners
--- [Empower your small business with remote work](https://support.microsoft.com/office/9b91a85a-39b4-40a6-a590-0f9bea0ba8e6)-- [Running a remote small business](admin-overview/sign-up-for-office-365.md)-- [Sign up for Microsoft Business Basic]()-- [Setting up two-factor sign-in](admin-overview/sign-up-for-office-365.md)-
-## March 2020
-
-### Featured Feedback Fix: Improve "add user" reliability for licensing
-
-We received a lot of feedback from admins about how hard it is to assign licenses when adding users. We've made the first update to this fix and we've migrated to a more reliable behind-the-scenes service to process those requests. And if something goes wrong, you'll now get an error message that lets you try again.
-
-![Add user confirmation page with the error.](../media/MAC-WN-ImprovedLicensing.png)
-
-### Microsoft Teams home page card
-
-With the uptick in Teams usage, some orgs will get a pinned dashboard card that makes turning Teams on more discoverable. The card also has links to training and docs to help your org transition to remote work. Just go to the **Home** page to see the new card.
-
-![Microsoft Teams home page card.](../media/MAC-WN-TeamsCard.PNG)
-
-### Customize your organization's SharePoint mobile app theme
-
-Using the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>, you can now customize your organization's theme in SharePoint mobile app for iOS and SharePoint mobile app for Android. This feature conveniently provides a mobile intranet app experience that can match your SharePoint Online for employees on the go. Theme customization includes your logo image, navigation bar color, text and icon colors, and accent colors, making for easy recognition.
-
-![Diagram mapping the admin center settings to the mobile app.](../media/MAC-WN-CustThemeSP.png)
-
-### Improvements to the "Add a group" wizard
-
-When admins created a new group - and made it a Team at they same time, they could assign owners who don't have a license that includes Teams. And that created some headaches. We've updated the wizard flow to verify that owners have a Teams license and if they don't the option to turn the group into a Team is disabled.
-
-### Microsoft 365 offerings for small and medium businesses
-
-We know that this is an announcement for next month, but we want to make sure you're prepared.
-
-Starting on April 21, we're making changes related to our Office 365 subscriptions for small and medium businesses ΓÇô and to Office 365 ProPlus. These products will now use the Microsoft 365 brand.
-
-The new product names go into effect on April 21, 2020. This is a change to the product name only, and there are no pricing or feature changes at this time.
-
-|Current name |New name |
-|||
-|Office 365 Business Essentials | Microsoft 365 Business Basic |
-|Office 365 Business Premium | Microsoft 365 Business Standard |
-|Microsoft 365 Business | Microsoft 365 Business Premium |
-|Office 365 Business | Microsoft 365 Apps for business |
-|Office 365 ProPlus | Microsoft 365 apps for enterprise |
-
-### Videos, training, and docs
-
-[What's New in Microsoft 365 web series](https://go.microsoft.com/fwlink/p/?linkid=2118096): In this month's episode, we highlight the 3-year anniversary of Microsoft Teams and cover new features including improved audio quality in online meetings, Targeted Communications for firstline managers with the Shifts app, Teams and Skype consumer interoperability, and more.
-
-## February 2020
-
-### Featured Feedback Fix: Multi-organization switcher
-
-We received a lot of feedback from partners and admins about the challenges of managing multiple Microsoft cloud orgs. One of our first multi-org management features is the **Organization switcher**, which lets you change between the orgs that you manage in just 2 clicks.
-> [!TIP]
-> You don't have to do anything to make the organization switcher appear as long as you are the Partner of record for at least one organization.
-
-1. In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>, select the org name.
-![Screen capture: top of the Home page showing organization profile name with the switcher icon.](../media/MAC-Organization-switcher.png)
-
-2. In the organization switcher, select the org you want to manage.
-![Screen capture: My organizations tenant switcher with Consolidated Messenger tenant highlighted.](../media/MAC-OrgSwitcherSelected.png)
-
-That's literally it!!!
-
-### Groups
-
-A couple of changes in the groups area this month:
--- **Sort by group name**: You can sort the groups list alphabetically, by selecting the **Group name** column.-- **Restore deleted Microsoft 365 groups**: You don't have to go to the Exchange admin center anymore to restore deleted Microsoft 365 groups. Go to **Microsoft 365 admin center** \> **Groups** \> **Deleted groups** \> (select a group from the list) \> **Restore group**. It'll restore the group back to the **Groups** list and restore the group's email, conversations, notebook, files, and calendar.-
-### Videos, training, and docs (February)
--- **What's new in Microsoft 365 video series**: This month, we're focused on custom search capabilities for SharePoint Online, the Office "What's New" management feature that lets you show or hide specific features from end-users via the in-app help pane, the latest security and compliance updates in Yammer, and more. Here's the latest episode: [What's New in Microsoft 365](https://go.microsoft.com/fwlink/p/?linkid=2118096)--- **Docs move**: We combined the Office 365 admin web articles with the Microsoft 365 content and you might've noticed the new URL. For example, this article used to be hosted at: **docs.microsoft.com/Office365/Admin/whats-new-in-preview**, but the URL is now: **docs.microsoft.com/microsoft-365/admin/whats-new-in-preview**. If you've bookmarked pages, you should update your links; however, content links will be redirected to the new content repo.
bookings Turn Bookings On Or Off https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/turn-bookings-on-or-off.md
Use the settings below to control who can use Bookings, decide on what Bookings
### Block bookings from outside your organization
-You can set up Bookings so only people in your organization can book appointments. Only users in your organization who've signed and are authenticated can book appointments.
+You can set up Bookings so only people in your organization can book appointments. Only users in your organization who've signed in and are authenticated can book appointments.
### Block social sharing options
business-premium Create Communications Site https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/create-communications-site.md
A great way to communicate priorities, share strategy documents, and highlight u
Include the following elements in your Communications site: 1. Add your logo and colors as a header image and theme.+ 2. Lead with your strategy, message, important documents, a directory, and FAQ in a **Hero web part**.+ 3. Include a CEO or candidate statement to the team in a **Text web part**.+ 4. Add events to an **Events web part** so everyone can see what's coming up.+ 5. Add photos that people can use or share to an **Image gallery web part**. ![Diagram of a SharePoint Communications page with space for common elements that a campaign would need.](../media/m365-democracy-comms-site.png)
The following links for PowerPoint and PDF can be downloaded and printed in tabl
## Set it up 1. Sign in to https://Office.com.+ 2. In the top-left corner of the page, select the app launcher icon and then select the **SharePoint** tile. If you don't see the **SharePoint** tile, click the **Sites** tile or **All** if SharePoint isn't visible.+ 3. At the top of the SharePoint home page, click **+ Create site** and choose the **Communication site** option. Learn all [about Communications sites](https://support.office.com/article/What-is-a-SharePoint-communication-site-94A33429-E580-45C3-A090-5512A8070732) and how to [create a communication site in SharePoint Online](https://support.microsoft.com/en-us/office/create-a-communication-site-in-sharepoint-online-7fb44b20-a72f-4d2c-9173-fc8f59ba50eb).
business-premium Create Teams For Collaboration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/create-teams-for-collaboration.md
Microsoft Teams is a collaboration app that helps your staff stay organized and
## Best practices 1. Create private teams for sensitive information.
-1. Create an org-wide team for communication with everyone across your organization.
-1. Create teams for specific projects and apply the right amount of protection based on who should be included.
-1. Create specific teams for communication with external partners to keep them separate from anything sensitive for your business.
+
+2. Create an org-wide team for communication with everyone across your organization.
+
+3. Create teams for specific projects and apply the right amount of protection based on who should be included.
+
+4. Create specific teams for communication with external partners to keep them separate from anything sensitive for your business.
For example, a business, legal firm, or healthcare practice could create the following teams: 1. **A business-, firm-, or practice-wide team:** This is for everyone to use for day to day communications and work across your business. You can use this team to post announcements or share information of interest for your whole firm or practice.
-1. **Individual teams:** Set up teams for smaller groups to collaborate about their day to day work.
-1. **An external communications team or teams:** Coordinate with your vendors, partners, or clients without allowing them into anything sensitive. Set up different channels for specific groups.
+
+2. **Individual teams:** Set up teams for smaller groups to collaborate about their day to day work.
+
+3. **An external communications team or teams:** Coordinate with your vendors, partners, or clients without allowing them into anything sensitive. Set up different channels for specific groups.
![Diagram of a Microsoft Teams window with three separate teams to allow for secure communication and collaboration within a business.](../media/m365-democracy-teams-business-collab.png) And campaigns could create the following teams to communicate and collaborate securely: 1. **A campaign Leads team:** Set this up as a private team so that only your key campaign members can access it and discuss potentially sensitive concerns.+ 2. **A general campaign team:** This is for everyone to use for day to day communications and work. Individuals, groups, or committees can set up channels in this team to do their work. For example, the event planning people can set up a channel to chat and coordinate logistics for campaign events.+ 3. **A partners team:** Coordinate with your vendors, partners, or volunteers without allowing them into anything sensitive. ![Diagram of a Microsoft Teams window with three separate teams to allow for secure communication and collaboration within a campaign.](../media/m365-democracy-teams-collab.png)
And campaigns could create the following teams to communicate and collaborate se
When you create a team, here's what else gets created: - A new [Microsoft 365 group](/MicrosoftTeams/office-365-groups)+ - A [SharePoint Online](/MicrosoftTeams/sharepoint-onedrive-interact) site and document library to store team files+ - An [Exchange Online](/MicrosoftTeams/exchange-teams-interact) shared mailbox and calendar+ - A OneNote notebook+ - Ties into other Office 365 apps such as Planner and Power BI Inside Microsoft Teams, you can find: 1. **Teams:** Find channels to belong to or create your own. Inside channels you can hold on-the-spot meetings, have conversations, and share files.+ 2. **Meetings:** See everything you've got lined up for the day or week. Or, schedule a meeting. This calendar syncs with your Outlook calendar.+ 3. **Calls:** In some cases, if your organization has it set up, you can call anyone from Microsoft Teams, even if they're not using Microsoft Teams.+ 4. **Activity:** Catch up on all your unread messages, @mentions, replies, and more. Use the command box at the top to search for specific items or people, take quick actions, and launch apps.
business-premium Get Microsoft 365 Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/get-microsoft-365-campaigns.md
description: "Get Microsoft 365 for Campaigns so you can protect your campaign f
Anybody with Microsoft 365 Business Premium can use this guidance to configure extra security for email and collaboration. However, campaigns and political parties in the USA are eligible for special pricing for Microsoft 365. Currently this special pricing is available to: - National-level political parties in the United States, Canada, and New Zealand+ - National or federal political campaigns in the United States and New Zealand+ - U.S. State-wide political campaigns (eg: campaigns seeking office for governor, state legislature, or attorney general)* *Due to local regulations, we are unable to offer Microsoft 365 for Campaigns in the following states at this time: CO, DE, IL, OK, WI & WY. We encourage campaigns in those states to explore additional offerings at [Microsoft 365 for business](https://www.office.com/business).
If you're not eligible for special pricing, Microsoft 365 Business Premium is st
This configuration of Microsoft 365 Business Premium includes simple controls that help you and your staff work together securely: - **Protect user identity**: Make sure that users are who they say they are when they sign in to send email or to access files (multifactor authentication).+ - **Protect sensitive information**: Protect sensitive information to monitor information that gets shared outside your organization (data loss prevention).+ - **Protect mobile devices**: Protect data on mobile devices (mobile app protection policy).+ - **Guard against malicious content**: Prevent access to malicious content by scanning email attachments (Defender for Office 365).+ - **Protect passwords**: Set passwords to never expire which is more secure and helps prevent work stoppages (password policy).+ - **AccountGuard Program Access**: Microsoft AccountGuard is a security service offered at no additional cost to customers in the political space. The service is designed to inform and help these highly targeted customers protect themselves from cybersecurity threats across their organizational and personal Microsoft email accounts. View more information at [Microsoft AccountGuard](https://www.microsoftaccountguard.com/). ## What does it cost, who needs it, and what is the commitment?
There's no minimum time commitment when you sign up for Microsoft 365 for Campai
## How do I qualify for special pricing? 1. Go to [aka.ms/m365forcampaigns](https://aka.ms/m365forcampaigns/) and provide a few details about your organization. The details you provide help us to verify that you represent a national-level political campaign or party in the United States. There's no commitment when you complete this form.+ 2. After you've completed the form, it takes us a few days to review your information.+ 3. After we've verified that you represent a national-level political campaign or party, you'll receive an email invitation from Microsoft. Your invite includes a sign-up link specific to your organization. When you receive your invitation, [Sign up for Microsoft 365 for Campaigns](m365-campaigns-sign-up.md).
business-premium M365 Campaigns Phishing And Attacks https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365-campaigns-phishing-and-attacks.md
description: "Protect against phishing and other attacks with Microsoft 365."
Microsoft 365 Business Premium includes many protections to guard against attacks, but there are things you can do yourself to limit and minimize the risk of online attacks. - **Spam or junk mail** There are many reasons you might receive junk e-mail and not all junk mail is the same. However, you can reduce what gets through to you, and thus reduce the risks of attacks, by filtering out junk mail.+ - **Phishing** A phishing scam is an email that seems legitimate but is an attempt to get your personal information or steal your money.+ - **Spoofing** Scammers can also use a technique called spoofing to make it appear as if you've received an email from yourself. + - **Malware** is malicious software that can be installed on your computer, usually installed after you've clicked a link or opened a document from an email. There are various types of malware (for example, ransomware, when your computer is taken over), but you don't want to have any of them. ## Best practices ### Reduce spam mail
-Follow these [10 tips on how to help reduce spam](https://support.microsoft.com/en-us/office/10-tips-on-how-to-help-reduce-spam-55f756e8-688b-41c3-a086-8f68ccc592f6).
+Follow these [10 tips on how to help reduce spam](https://support.microsoft.com/office/10-tips-on-how-to-help-reduce-spam-55f756e8-688b-41c3-a086-8f68ccc592f6).
### Report it!
Download this infographic with tips for you and the members of your campaign tea
Learn more about how to: - [Keep your files and communications safe with Office](https://support.microsoft.com/en-us/office/keep-your-files-and-communications-safe-with-office-c4ddc381-7395-42da-887c-8836a3bb975f).+ - [Stay secure and private at work](https://support.office.com/article/stay-secure-and-private-at-work-104c7d91-b25a-453d-beee-ba64b6c6fc2d).
business-premium M365 Campaigns Security Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365-campaigns-security-overview.md
Watch this video to see how you can protect your campaign or business:
Then follow the steps to: - [Protect against malware and other threats](m365bp-increase-protection.md)+ - [Protect access to your campaign data](m365bp-conditional-access.md) by protecting your accounts and apps+ - [Protect admin accounts](m365bp-protect-admin-accounts.md)+ - [Set up mobile devices](../business/set-up-mobile-devices.md)+ - [Train your users](m365-campaigns-users.md)
business-premium M365 Campaigns Sign In https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365-campaigns-sign-in.md
description: "Sign in to Microsoft 365. Protect your business, practice, or camp
If you signed up for Microsoft 365, you're the Microsoft 365 admin. Here's how to sign in: 1. Find the username and password that we sent to the email address that you gave us in step 2 of [Steps to sign up](m365-campaigns-sign-up.md#steps-to-sign-up).+ 2. In the browser, go to the Microsoft 365 admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=837890" target="_blank">https://admin.microsoft.com</a>.+ 3. Type in your username and password. Select **Sign in**.+ 4. In the top right of the page, find the **Preview on** control. Select **Preview on** so you can use all the controls described in [Bump up protection for your campaign](m365-campaigns-security-overview.md). ## For staff Set up staff as described in [Add users](../admin/add-users/add-users.md?toc=%2fmicrosoft-365%2fcampaigns%2ftoc.json)+ You can also reset and resend passwords on the **Add users** page.+ All staff can sign in at <a href="https://office.com" target="_blank">https://Office.com</a>.
business-premium M365 Campaigns Sign Up https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365-campaigns-sign-up.md
Here's how to complete your sign-up for Microsoft 365 for Campaigns.
## Before you start: - Get your invite to Microsoft 365 for Campaigns by completing the steps in [Get Microsoft 365 for Campaigns](get-microsoft-365-campaigns.md#get-microsoft-365-for-campaigns).+ - Open your email invitation from Microsoft. The invite has a unique sign-up link for your organization. You need this to get campaigns special pricing.+ - Have your business credit card and a phone ready. > [!TIP]
Here's how to complete your sign-up for Microsoft 365 for Campaigns.
1. In your invitation to Microsoft 365 for Campaigns email, select **ENROLL YOUR ORGANIZATION >**. This takes you to Microsoft 365 sign-up. > [!NOTE] > If you already have an existing Microsoft 365 for business subscription and you want to add the Microsoft 365 for Campaigns offer to it, go to [add Microsoft 365 for Campaigns to an existing subscription](#steps-to-add-microsoft-365-for-campaigns-to-an-existing-subscription).
-1. **On the Microsoft 365 Business page**, enter your business details. For **Business email address**, use a current email address. We only need this address to stay in touch with you during the setup process. Select **Next**.
-1. **On the Create your user ID page**:
+
+2. **On the Microsoft 365 Business page**, enter your business details. For **Business email address**, use a current email address. We only need this address to stay in touch with you during the setup process. Select **Next**.
+
+3. **On the Create your user ID page**:
+
1. In **Username**, enter the name or alias you want for your email address. For example, you might want to be known as just Alice, or Rob. In a larger campaign, AliceC or AliceChavez might make more sense.
+
2. In **Your company**, enter the name of the campaign you work for. For example, ContosoCampaign. If you already own a domain, use that name here.
+
3. In **Select a domain**, select **.onmicrosoft.com** for now. We can set you up with a domain later, or help you get Microsoft 365 connected to a domain that you already own.
- > [!IMPORTANT]
- > The name you enter for your .onmicrosoft.com domain will be used for all your SharePoint and OneDrive URLs and you might not be able to change it. Make sure youΓÇÖve considered the name from a branding perspective and spelled it correctly.
+ > [!IMPORTANT]
+ > The name you enter for your .onmicrosoft.com domain will be used for all your SharePoint and OneDrive URLs and you might not be able to change it. Make sure youΓÇÖve considered the name from a branding perspective and spelled it correctly.
4. Create a password and select **Create my account**.
+
> [!NOTE] > If your campaign or party doesn't own a domain, and you have decided what domain you want, you can buy one now by selecting it. 4. **Prove. You're. Not. A. Robot. page**:
+
1. Have your phone ready, and select **Text me** (or **Call me** if you prefer). Then enter your phone number.
+
2. When you select **Text me**, we'll send you a verification code. Or we'll call you with a code if you select **Call me**.
+
3. Enter the code from your text message (or call) and select **Next**. Expect a short wait. + 5. **Where will you be using this page**: Enter the campaign's primary work location details and phone number. Select **Next**.+ 6. **How does this look page**:+ 1. Verify the cost per user is $5.00. + 2. If you only want to set yourself up for now, select **Next**. + 3. Optional: Add some extra licenses now by changing the number in the **user** field. [The staff you work with can be assigned licenses to Microsoft 365](../admin/add-users/add-users.md?toc=%2fmicrosoft-365%2fcampaigns%2ftoc.json) at any time.+ 7. **How do you want to pay? page**: Select **New credit card**, enter your business credit card details, and select **Place order**. If you prefer, it's also possible to use a bank account.+ 8. **This may take a moment page**: You'll find details about where to sign in and your user ID. We'll also send this information to the email address that you entered during step 2 above. Your sign-up steps are complete!
These are called your admin or global admin credentials.
## Steps to add Microsoft 365 for Campaigns to an existing subscription If you already have and existing subscription to Microsoft 365 for business, for example, Microsoft 365 Business Standard, you can use the Microsoft 365 for Campaigns offer to add licenses to it.+ > [!IMPORTANT] > You cannot add the Microsoft 365 for Campaigns offer to an existing Microsoft 365 account. 1. In your invitation to Microsoft 365 for Campaigns email, select **ENROLL YOUR ORGANIZATION >**. This takes you to Microsoft 365 sign-up.+ 2. On the **Welcome, let's get to know you** page, click or tap **Want to add this to an existing subscription? Sign in**. ![Choose Sign in on the upper right corner.](../media/addtoexisting.png)+ 3. On the sign in page, enter the admin alias for your existing subscription, for example *Alice@VoteContoso<span></span>.org*, choose **Next**, enter your password, and then choose **Sign in**.+ 4. On the **How does this look?** enter the number of users you have and choose **Next**. You don't have to enter a promo code here because it is already included in the invitation URL.+ 5. On the **How do you want to pay?** page, enter your payment method and choose **Place order**. After you have completed these steps, you're ready to [assign the new licenses](../admin/manage/assign-licenses-to-users.md) to your campaign staff.
After you have completed these steps, you're ready to [assign the new licenses](
## What's next? - [Set up Microsoft 365](../business/set-up.md?toc=/microsoft-365/campaigns/toc.json) to complete your Microsoft 365 for Campaigns set up.+ - [Add users](../admin/add-users/add-users.md?toc=%2fmicrosoft-365%2fcampaigns%2ftoc.json) to your plan. Include the campaign candidate, all senior campaign staff, and anyone who will have access to sensitive campaign or party information.+ - [Bump up protection for your campaign](m365-campaigns-security-overview.md)
business-premium M365 Campaigns Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365-campaigns-users.md
The security recommendations for Microsoft 365 in this solution make it much har
All users should be aware of and use these email practices to help keep their email secure: - Set up email to use multi-factor authentication with the authenticator app.-- Verify legitimate emails and look for safety tips from Advanced Phishing in Defender for Office 365 Protection.+
+- Verify legitimate emails and look for safety tips from advanced phishing protection (Defender for Office 365).
+ - Open only safe links and attachments, as verified by Safe Links and Safe Attachments. Learn more about [multi-factor authentication](m365bp-multifactor-authentication.md) and [phishing and other attacks](m365-campaigns-phishing-and-attacks.md).
Download an [infographic](m365-campaigns-protect-campaign-infographic.md) with t
All users you add to your environment will need to take a few minutes to [setup iPhones and Android devices](../business/set-up-mobile-devices.md) to work securely: - Set up devices to use multi-factor authentication with the authenticator app.+ - Use Microsoft mobile apps, including Outlook Mobile, Word, OneDrive, and other Microsoft apps from the app store. The native mail apps that are included on iPhones and Android devices aren't supported. + - Require a PIN for users to unlock their device. After setting these up, your users will be prompted to use the authenticator app when accessing your organization data on these devices, including mail.
After setting these up, your users will be prompted to use the authenticator app
It's also important that users keep their primary work device up to date: - Install the latest versions of Office desktop apps and keep these fresh with updates, when prompted.+ - Stay on top of operating system updates, such as Windows updates. For [unmanaged Windows 10 and Mac devices](m365bp-protect-pcs-macs.md), users have the responsibility to ensure that basic security features are enabled.
business-premium M365 Customize Sign In https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365-customize-sign-in.md
The elements you can update are:
- **Sign-in page text** An easy place to add the privacy and consent statement.+ - Sign-in page background image+ - Banner logo+ - Username hint For examples of privacy and consent notices, see Appendix A in [Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations](https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ssmanual2009.pdf).
business-premium M365bp Add Autopilot Devices And Profile https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-add-autopilot-devices-and-profile.md
+
+ Title: "Use the step-by-step guide to add Autopilot devices and profile"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
+++
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+ms.localizationpriority: medium
+
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- seo-marvel-mar
+- AdminSurgePortfolio
+- AdminTemplateSet
+search.appverid:
+- BCS160
+- MET150
+- MOE150
+ms.assetid: be5b6d90-3344-4c5e-bf40-5733eb845beb
+description: "Learn how to use Windows AutoPilot to set up new Windows 10 devices for your business so they're ready for employee use."
++
+# Use the step-by-step guide to add Autopilot devices and profile
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Overview of Microsoft Defender for Business](../security/defender-business/mdb-overview.md).
+
+You can use Windows AutoPilot to set up **new** Windows 10 devices for your business so they're ready for use when you give them to your employees.
+
+## Device requirements
+
+Devices must meet these requirements:
+
+- Windows 10, version 1703 or later
+
+- New devices that haven't been through Windows out-of-box experience
+
+## Use the setup guide to create devices and profiles
+
+If you haven't created device groups or profiles yet, the best way to get started is by using the step-by-step guide. You can also [add AutoPilot devices](m365bp-create-and-edit-autopilot-devices.md) and [assign profiles](../admin/devices/create-and-edit-autopilot-profiles.md) to them without using the guide.
+
+1. Go to the admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=837890" target="_blank">https://admin.microsoft.com</a>.
+
+2. On the left navigation pane, choose **Devices** \> **AutoPilot**.
+
+ ![In the admin center, choose devices and then AutoPilot.](../media/AutoPilot.png)
+
+2. On the **AutoPilot** page, click or tap **Start guide**.
+
+ ![Click Start guide for step-by-step instructions for Autopilot.](../media/31662655-d1e6-437d-87ea-c0dec5da56f7.png)
+
+3. On the **Upload .csv file with list of devices** page, browse to a location where you have the prepared .CSV file, then **Open** \> **Next**. The file must have three headers:
+
+ - Column A: Device Serial Number
+
+ - Column B: Windows Product ID
+
+ - Column C: Hardware Hash
+
+ You can get this information from your hardware vendor, or you can use the [Get-WindowsAutoPilotInfo PowerShell script](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) to generate a CSV file.
+
+ For more information, see [Device list CSV-file](../admin/misc/device-list.md). You can also download a sample file on the **Upload .csv file with list of devices** page.
+
+> [!NOTE]
+> This script uses WMI to retrieve properties needed for a customer to register a device with Windows Autopilot. Note that it is normal for the resulting CSV file to not collect a Windows Product ID (PKID) value since this is not required to register a device and PKID being NULL in the output CSV is totally fine. Only the serial number and hardware hash will be populated.
+
+4. On the **Assign a profile** page, you can either pick an existing profile or create a new one. If you don't have one yet, you'll be prompted to create one.
+
+ A profile is a collection of settings that can be applied to a single device or to a group of devices.
+
+ The default features are required and are set automatically. The default features are:
+
+ - Skip Cortana, OneDrive, and OEM registration.
+
+ - Create sign-in experience with your company brand.
+
+ - Connect your devices to Azure Active Directory accounts, and automatically enroll them to be managed by Microsoft 365 Business Premium.
+
+ For more information, see [About AutoPilot Profile settings](m365bp-autopilot-profile-settings.md).
+
+5. The other settings are **Skip privacy settings** and **Don't allow user to become the local admin**. These are both set to **Off** by default.
+
+ Choose **Next**.
+
+6. **You're done** indicates that the profile you created (or chose) will be applied to the device group you created by uploading the list of devices. The settings will be in effect when the device users sign in next. Choose **Close**.
+
+## Related content
+
+- [About AutoPilot Profile settings](../business-premium/m365bp-autopilot-profile-settings.md) (article)\
+
+- [Options for protecting your devices and app data](../admin/devices/choose-device-security.md) (article)
+- [Top 10 ways to secure Microsoft 365 for business plans](../admin/security-and-compliance/secure-your-business-data.md)
business-premium M365bp App Protection Settings For Android And Ios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-app-protection-settings-for-android-and-ios.md
+
+ Title: "Set app protection settings for Android or iOS devices"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+
+- Adm_O365
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+
+- Adm_O365
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- AdminSurgePortfolio
+search.appverid:
+- BCS160
+- MET150
+ms.assetid: 6f2b80b4-81c3-4714-a7bc-ae69313e8a33
+description: "Learn how to create, edit, or delete an app management policy, and protect work files on Android or iOS devices."
++
+# Set app protection settings for Android or iOS devices
+
+This article applies to Microsoft 365 Business Premium.
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../business-premium/m365bp-app-protection-settings-for-android-and-ios.md).
+
+## Watch: Secure Office apps on iOS
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE1FLvZ?autoplay=false]
+
+You can set up a user access policy that requires mobile users to enter a PIN or fingerprint to sign in, and also encrypts work files stored on their devices.
+
+1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>.
+
+2. Under **Policies**, choose **Add policy**.
+
+3. In the **Add policy** pane, enter a name under **Policy name**, and choose the policy type that you want under **Policy type**.
+
+4. Turn on **Manage how users access Office files on mobile devices**, and then make sure the following three settings are turned on:
+
+ - **Require a PIN or fingerprint to access Office apps**
+
+ - **Protect work files when devices are lost or stolen**
+
+ - **Encrypt work files**
+
+5. Under **Files in these apps will be protected**, select the Office apps you want to protect on mobile devices.
+
+6. Under **Who will get these settings?**, all users are selected by default, but you can choose **Change** to select any security groups you've created.
+
+7. To finish creating the policy, choose **Add**.
+
+8. On the **Add policy** page, choose **Close**.
+
+9. On the admin center home page, confirm that your new policy was added by choosing **Policies** and reviewing your policy on the **Policies** page.
+
+## Create an app management policy
+
+1. Go to the admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=837890" target="_blank">https://admin.microsoft.com</a>.
+
+2. In the left nav, choose **Devices** \> **Policies** \> **Add**.
+
+3. On the **Add policy** pane, enter a unique name for this policy.
+
+4. Under **Policy type**, choose **Application Management for Android** or **Application Management for iOS**, depending on which set of policies you want to create.
+
+5. Expand **Protect work files when devices are lost or stolen** and **Manage how users access Office files on mobile devices**. Configure the settings how you would like. **Manage how users access Office files on mobile devices** is **Off** by default, but we recommend that you turn it **On** and accept the default values. For more information, see [Available settings](#available-settings).
+
+ You can always use the **Reset default settings** link to return to the default setting.
+
+ ![Screenshot of Create a policy with Application management for Android selected.](/media/eabbe06d-ac0a-4f3a-8630-68c808b1e662.png)
+
+6. Next decide **Who will get these settings?** If you don't want to use the default **All Users** security group, choose **Change**, choose the security groups that get these settings \> **Select**.
+
+7. Finally, choose **Done** to save the policy, and assign it to devices.
+
+## Edit an app management policy
+
+1. On the **Policies** card, choose **Edit policy**.
+
+2. On the **Edit policy** pane, choose the policy you want to change
+
+3. Choose **Edit** next to each setting to change the values in the policy. When you change a value, it's automatically saved in the policy.
+
+4. When you're finished, close the **Edit policy** pane.
+
+## Delete an app management policy
+
+1. On the **Policies** page, choose a policy and then **Delete**.
+
+2. On the **Delete policy** pane, choose **Confirm** to delete the policy or policies you chose.
+
+## Available settings
+
+The following tables give detailed information about settings available to protect work files on devices and the settings that control how users access Office files from their mobile devices.
+
+ For more information, see [How do protection features in Microsoft 365 Business Premium map to Intune settings](m365bp-map-protection-features-to-intune-settings.md).
+
+### Settings that protect work files
+
+The following settings are available to protect work files if a user's device is lost or stolen:
++
+|Setting |Description |
+|:--|:--|
+|Delete work files from an inactive device after this many days |If a device isn't used for the number of days that you specify here, any work files stored on the device will be deleted automatically. |
+|Force users to save all work files to OneDrive for Business |If this setting is **On**, the only available save location for work files is OneDrive for Business. |
+|Encrypt work files |Keep this setting **On** so that work files are protected by encryption. Even if the device is lost or stolen, no one can read your company data. |
+
+### Settings that control how users access Office files on mobile devices
+
+The following settings are available to manage how users access Office work files:
++
+|Setting |Description |
+|:--|:--|
+|Require a PIN or fingerprint to access Office apps |If this setting is **On** users must provide another form of authentication, in addition to their username and password, before they can use Office apps on their mobile devices.|
+|Reset PIN when login fails this many times |To prevent an unauthorized user from randomly guessing a PIN, the PIN will reset after the number of wrong entries that you specify. |
+|Require users to sign in again after Office apps have been idle for |This setting determines how long a user can be idle before they're prompted to sign in again. |
+|Deny access to work files on jailbroken or rooted devices |Clever users may have a device that is jailbroken or rooted. This means that the user can modify the operating system, which can make the device more subject to malware. These devices are blocked when this setting is **On**. |
+|Don't allow users to copy content from Office apps into personal apps |We do allow this by default, but if the setting is **On**, the user could copy information in a work file to a personal file. If the setting is **Off**, the user will be unable to copy information from a work account into a personal app or personal account. |
+
+## See also
+
+[Top 10 ways to secure Microsoft 365 for business plans](../admin/security-and-compliance/secure-your-business-data.md)
business-premium M365bp Autopilot Profile Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-autopilot-profile-settings.md
+
+ Title: "About AutoPilot Profile settings"
+++
+audience: Admin
+
+f1.keywords:
+- 'ZTDProfileSettings'
+- 'O365E_ZTDProfileSettings'
+- 'BCS365_ZTDProfileSettings'
+
+ms.localizationpriority: medium
+
+- Adm_O365
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+
+- Adm_O365
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- AdminSurgePortfolio
+search.appverid:
+- BCS160
+- MET150
+- MOE150
+ms.assetid: 99bfbf81-e719-4630-9b0f-c187edfa1f8a
+description: "AutoPilot profiles help you control how Windows gets installed on user devices. The profiles contain default and optional settings like skip Cortana installation."
++
+# About AutoPilot Profile settings
+
+## AutoPilot profile settings
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md).
+
+You can use AutoPilot profiles to control how Windows is installed on user devices. The profiles contain the following settings.
+
+## AutoPilot default features (required) that are set automatically
+
+| Setting | Description |
+|:--|:--|
+|Skip Cortana, OneDrive, and OEM registration |Skips the installation of consumer apps like Cortana and personal OneDrive. The device user can install these later as long as the user is a local admin on the device. The original manufacturer registration is skipped because the device will be managed by Microsoft 365 Business Premium. |
+|Sign in experience with your company brand |If your company has a [Add your company branding to Microsoft 365 Sign In page](../admin/setup/customize-sign-in-page.md), the device user will get that experience when signing in. |
+|MDM auto-enrollment with configured AAD accounts. |The user identity will be managed by Azure Active Directory, and users will sign in to Windows and Microsoft 365 with their Microsoft 365 Business Premium credentials. |
+
+## Optional settings
+
+| Setting | Description |
+|:--|:--|
+|Skip privacy settings (Off by default) |If this option is set to **On**, the device user will not see the license agreement for the device and Windows when he or she first signs in. |
+|Don't allow the user to become the local admin |If this option is set to **On**, the device user will not be able to install any personal apps, such as Cortana.|
+
+## See also
+
+[Top 10 ways to secure Microsoft 365 for business plans](../admin/security-and-compliance/secure-your-business-data.md)
business-premium M365bp Conditional Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-conditional-access.md
Security defaults are available to all customers, while Conditional Access requi
If you want to use Conditional Access to configure policies equivalent to those enabled by security defaults, check out the following step-by-step guides: - [Require MFA for administrators](/azure/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa)+ - [Require MFA for Azure management](/azure/active-directory/conditional-access/howto-conditional-access-policy-azure-management)+ - [Block legacy authentication](/azure/active-directory/conditional-access/howto-conditional-access-policy-block-legacy)+ - [Require MFA for all users](/azure/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa)+ - [Require Azure AD MFA registration](/azure/active-directory/identity-protection/howto-identity-protection-configure-mfa-policy) - Requires Azure AD Identity Protection, which is part of Azure Active Directory Premium P2 To learn more about Conditional Access, see [What is Conditional Access?](/azure/active-directory/conditional-access/overview) For more information about creating Conditional Access policies, see [Create a Conditional Access policy](/azure/active-directory/authentication/tutorial-enable-azure-mfa#create-a-conditional-access-policy).
business-premium M365bp Create And Edit Autopilot Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-create-and-edit-autopilot-devices.md
+
+ Title: "Create and edit AutoPilot devices"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+
+- Adm_O365
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+
+- Adm_O365
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- AdminSurgePortfolio
+search.appverid:
+- BCS160
+- MET150
+- MOE150
+ms.assetid: 0f7b1d7c-4086-4331-8534-45d7886f9f34
+description: "Learn how to upload devices using AutoPilot in Microsoft 365 Business Premium. You can assign a profile to a device or a group of devices."
++
+# Create and edit AutoPilot devices
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md).
+
+## Upload a list of devices
+
+You can use the [Step-by-step guide](m365bp-add-autopilot-devices-and-profile.md) to upload devices, but you can also upload devices in the **Devices** tab.
+
+Devices must meet these requirements:
+
+- Windows 10, version 1703 or later
+
+- New devices that haven't been through Windows out-of-box experience
+
+1. In the Microsoft 365 admin center, choose **Devices** \> **AutoPilot**.
+
+2. On the **AutoPilot** page, choose the **Devices** tab \> **Add devices**.
+
+ ![In the Devices tab, choose Add devices.](./../media/6ba81e22-c873-40ad-8a72-ce64d15ea6ba.png)
+
+3. On the **Add devices** panel, browse to a [Device list CSV-file](../admin/misc/device-list.md) that you prepared \> **Save** \> **Close**.
+
+ You can get this information from your hardware vendor, or you can use the [Get-WindowsAutoPilotInfo PowerShell script](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) to generate a CSV file.
+
+## Assign a profile to a device or a group of devices
+
+1. On the **Prepare Windows** page, choose the **Devices** tab, and select the check box next to one or more devices.
+
+2. On the **Device** panel, select a profile from the **Assigned profile** drop-down.
+
+ If you don't have any profiles yet, see [Create and edit AutoPilot profiles](../admin/devices/create-and-edit-autopilot-profiles.md) for instructions.
+
+## See also
+
+[Top 10 ways to secure Microsoft 365 for business plans](../admin/security-and-compliance/secure-your-business-data.md)
business-premium M365bp Device Groups Mdb https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-device-groups-mdb.md
You can create a new device group while you are in the process of creating or ed
3. Take one of the following actions: 1. Select an existing policy, and then choose **Edit**.
+
2. Choose **+ Add** to create a new policy. > [!TIP]
business-premium M365bp Device States https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-device-states.md
+
+ Title: "Device states"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+
+- Adm_O365
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+
+- Adm_O365
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- seo-marvel-mar
+- AdminSurgePortfolio
+search.appverid:
+- BCS160
+- MET150
+- MOE150
+ms.assetid: c3ac23c5-d4b4-4b1b-b7ce-ea759521bf8c
+description: "Learn about the various device states in the Device actions list in Admin home in Microsoft 365 for business."
++
+# Device states
+
+This article applies to Microsoft 365 Business Premium.
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md).
+
+Devices in the **Device actions** list (Admin home \> **Device actions**) can have the following states.
+
+![In the Device actions list, you can see the Devices states.](./../media/a621c47e-45d9-4e1a-beb9-c03254d40c1d.png)
+
+|**Status**|**Description**|
+|:--|:--|
+|Managed by Intune |Managed by Microsoft 365 Business Premium. |
+|Retire pending |Microsoft 365 Business Premium is getting ready to remove company data from the device. |
+|Retire in progress |Microsoft 365 Business Premium is currently removing company data from the device. |
+|Retire failed | Remove company data action failed. |
+|Retire canceled |Retire action was canceled. |
+|Wipe pending |Waiting for factory reset to start. |
+|Wipe in progress |Factory reset has been issued. |
+|Wipe failed |Couldn't do factory reset. |
+|Wipe canceled |Factory wipe was canceled. |
+|Unhealthy |An action is pending (or in progress), but the device hasn't checked in for 30+ days. |
+|Delete pending |Delete action is pending. |
+|Discovered |Microsoft 365 Business Premium has detected the device. |
+
+
+## See also
+
+[Top 10 ways to secure Microsoft 365 for business plans](../admin/security-and-compliance/secure-your-business-data.md)
business-premium M365bp Manage Windows Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-manage-windows-devices.md
+
+ Title: "Enable domain-joined Windows 10 devices to be managed by Microsoft 365 for business"
+f1.keywords:
+- CSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+
+- Adm_O365
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- seo-marvel-mar
+- AdminSurgePortfolio
+- AdminTemplateSet
+search.appverid:
+- BCS160
+- MET150
+description: "Learn how to enable Microsoft 365 to protect local Active-Directory-joined Windows 10 devices in just a few steps."
++
+# Enable domain-joined Windows 10 devices to be managed by Microsoft 365 Business Premium
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md).
+
+If your organization uses Windows Server Active Directory on-premises, you can set up Microsoft 365 Business Premium to protect your Windows 10 devices, while still maintaining access to on-premises resources that require local authentication.
+To set up this protection, you can implement **Hybrid Azure AD joined devices**. These devices are joined to both your on-premises Active Directory and your Azure Active Directory.
+
+## Watch: Configure Hybrid Azure Active Directory join
+
+This video describes the steps for how to set this up for the most common scenario, which is also detailed in the steps that follow.
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE3C9hO]
+
+## Before you begin
+
+- Synchronize users to Azure AD with Azure AD Connect.
+- Complete Azure AD Connect Organizational Unit (OU) sync.
+- Make sure all the domain users you sync have licenses to Microsoft 365 Business Premium.
+
+See [Synchronize domain users to Microsoft 365](../admin/setup/manage-domain-users.md) for the steps.
+
+## 1. Verify MDM Authority in Intune
+
+Go to the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com/#blade/Microsoft_Intune_Enrollment/EnrollmentMenu/overview)) and select **Device enrollment**, then on the **Overview** page, make sure **MDM authority** is **Intune**.
+
+- If **MDM authority** is **None**, click the **MDM authority** to set it to **Intune**.
+- If **MDM authority** is **Microsoft Office 365**,go to **Devices** > **Enroll devices** and use the **Add MDM authority** dialog on the right to add **Intune MDM** authority (the **Add MDM Authority** dialog is only available if the **MDM Authority** is set to Microsoft Office 365).
+
+## 2. Verify Azure AD is enabled for joining computers
+
+1. Go to the Microsoft 365 admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">https://admin.microsoft.com</a> and select **Azure Active Directory** (select Show all if Azure Active Directory is not visible) in the **Admin centers** list.
+
+2. In the **Azure Active Directory admin center**, go to **Azure Active Directory** , choose **Devices** and then **Device settings**.
+
+3. Verify**Users may join devices to Azure AD** is enabled
+
+ 1. To enable all users, set to **All**.
+
+ 2. To enable specific users, set to **Selected** to enable a specific group of users.
+
+ - Add the desired domain users synced in Azure AD to a [security group](../admin/create-groups/create-groups.md).
+
+ - Choose **Select groups** to enable MDM user scope for that security group.
+
+## 3. Verify Azure AD is enabled for MDM
+
+1. Go to the Microsoft 365 admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">https://admin.microsoft.com</a> and select **Endpoint Management** (select **Show all** if **Endpoint Manager** is not visible)
+
+2. In the **Microsoft Endpoint Manager admin center**, go to **Devices** > **Windows** > **Windows Enrollment** > **Automatic Enrollment**.
+
+3. Verify MDM user scope is enabled.
+
+ 1. To enroll all computers, set to **All** to automatically enroll all user computers that are joined to Azure AD and new computers when the users add a work account to Windows.
+
+ 2. Set to **Some** to enroll the computers of a specific group of users.
+
+ - Add the desired domain users synced in Azure AD to a [security group](/admin/create-groups/create-groups.md).
+
+ - Choose **Select groups** to enable MDM user scope for that security group.
+
+## 4. Create the required resources
+
+Performing the required tasks to [configure hybrid Azure AD join](/azure/active-directory/devices/hybrid-azuread-join-managed-domains#configure-hybrid-azure-ad-join) has been simplified through the use of the [Initialize-SecMgmtHybirdDeviceEnrollment](https://github.com/microsoft/secmgmt-open-powershell/blob/master/docs/help/Initialize-SecMgmtHybirdDeviceEnrollment.md) cmdlet found in the [SecMgmt](https://www.powershellgallery.com/packages/SecMgmt) PowerShell module. When you invoke this cmdlet it will create and configure the required service connection point and group policy.
+
+You can install this module by invoking the following from an instance of PowerShell:
+
+```powershell
+Install-Module SecMgmt
+```
+
+> [!IMPORTANT]
+> Install this module on the Windows Server running Azure AD Connect.
+
+To create the required service connection point and group policy, you will invoke the [Initialize-SecMgmtHybirdDeviceEnrollment](https://github.com/microsoft/secmgmt-open-powershell/blob/master/docs/help/Initialize-SecMgmtHybirdDeviceEnrollment.md) cmdlet. You will need your Microsoft 365 Business Premium global admin credentials when performing this task. When you are ready to create the resources, invoke the following:
+
+```powershell
+PS C:\> Connect-SecMgmtAccount
+PS C:\> Initialize-SecMgmtHybirdDeviceEnrollment -GroupPolicyDisplayName 'Device Management'
+```
+
+The first command will establish a connection with the Microsoft cloud, and when you are prompted, specify your Microsoft 365 Business Premium global admin credentials.
+
+## 5. Link the Group Policy
+
+1. In the Group Policy Management Console (GPMC), right-click on the location where you want to link the policy and select *Link an existing GPO...* from the context menu.
+
+2. Select the policy created in the above step, then click **OK**.
+
+## Get the latest Administrative Templates
+
+If you do not see the policy **Enable automatic MDM enrollment using default Azure AD credentials**, it may be because you donΓÇÖt have the ADMX installed for Windows 10, version 1803, or later. To fix the issue, follow these steps (Note: the latest MDM.admx is backwards compatible):
+
+1. Download: [Administrative Templates (.admx) for Windows 10 October 2020 Update (20H2)](https://www.microsoft.com/download/102157).
+
+2. Install the package on a Domain Controller.
+
+3. Navigate, depending on the Administrative Templates version to the folder: **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 October 2020 Update (20H2)**.
+
+4. Rename the **Policy Definitions** folder in the above path to **PolicyDefinitions**.
+
+5. Copy the **PolicyDefinitions** folder to your SYSVOL share, by default located at `C:\Windows\SYSVOL\domain\Policies`.
+
+ If you plan to use a central policy store for your entire domain, add the contents of PolicyDefinitions there.
+
+6. In case you have several Domain Controllers, wait for SYSVOL to replicate for the policies to be available. This procedure will work for any future version of the Administrative Templates as well.
+
+At this point you should be able to see the policy **Enable automatic MDM enrollment using default Azure AD credentials** available.
+
+## Related content
+
+- [Synchronize domain users to Microsoft 365](../admin/setup/manage-domain-users.md)(article)\
+
+- [Create a group in the admin center](../admin/create-groups/create-groups.md) (article)\
+
+- [Tutorial: Configure hybrid Azure Active Directory join for managed domains](/azure/active-directory/devices/hybrid-azuread-join-managed-domains) (article)
+
+- [Top 10 ways to secure Microsoft 365 for business plans](../admin/security-and-compliance/secure-your-business-data.md)
business-premium M365bp Map Protection Features To Intune Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-map-protection-features-to-intune-settings.md
+
+ Title: "How do protection features in Microsoft 365 Business Premium map to Intune settings"
+f1.keywords:
+- NOCSH
+++ Last updated : 04/01/2022
+audience: Admin
++
+ms.localizationpriority: medium
+
+- Adm_O365
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+
+- Adm_O365
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- AdminSurgePortfolio
+search.appverid:
+- BCS160
+- MET150
+ms.assetid: aad21b1a-c775-469a-b89c-c5d1d59d27db
+description: "Learn how protection features in Microsoft 365 Business Premium map to Intune settings. The subscription provides you with a license to modify Intune settings."
++
+# How do protection features in Microsoft 365 Business Premium map to Intune settings
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md).
+
+## Android and iOS application protection settings
+
+The following table details how the Android and iOS application policy settings map to Intune settings.
+
+To find the Intune setting, sign in with your Microsoft 365 Business Premium admin credentials, and go to **Admin centers**, and then **Intune**.
+
+ > [!IMPORTANT]
+ >
+ > A Microsoft 365 Business Premium subscription gives you a license to modify all the Intune settings. See [Introduction to Intune to get started.](/intune/introduction-intune)
+
+Select the Policy name you want &mdash; for example, Application policy for Android &mdash; and then choose **Policy settings**.
+
+Under **Protect work files when devices are lost or stolen**
+
+|**Android or iOS application policy setting**|**Intune setting(s)**|
+|:--|:--|
+|Delete work files from an inactive device after |Offline interval (days) before app data is wiped |
+|Force users to save work files to OneDrive for Business <br/> Note that only OneDrive for Business is allowed |Select which storage services corporate data can be saved to |
+
+Under **Manage how user access Office files in mobile devices**
+
+|**Android or iOS application policy setting**|**Intune setting(s)**|
+|:--|:--|
+|Delete work files from an inactive device after |Offline interval (days) before app data is wiped |
+|Force users to save work files to OneDrive for Business <br/> Note that only OneDrive for Business is allowed |Select which storage services corporate data can be saved to |
+|Encrypt work files |Encrypt app data |
+|Under **Manage how user access Office files in mobile devices** ||
+|Require a PIN or fingerprint to access Office apps | Require PIN to access <br/> This also sets: <br/> **Allow simple PIN** to **Yes** <br/> **Pin Length** to 4 <br/> **Allow fingerprint instead of PIN** to **Yes** <br/> **Disable app PIN when device PIN is managed** to **No** |
+|Reset PIN when login fails this many times (this is disabled if PIN isn't required) |Number of attempts before PIN reset |
+|Require users to sign in again after Office apps have been idle for (this is disabled if PIN isn't required) | Recheck the access requirements after (minutes) <br/> This also sets: <br/> **Timeout** is set to minutes <br/> This is same number of minutes you set in Microsoft 365 Business. <br/> **Offline grace period** is set to 720 minutes by default |
+|Deny access to work files on jailbroken or rooted devices |Block managed apps from running on jailbroken or rooted devices |
+|Allow users to copy content from Office apps into personal apps | Restrict cut, copy, and paste with other apps <br/> If the Microsoft 365 Business Premium option is set to **On**, then these three options are also set to **All Apps** in Intune: <br/> **Allow app to transfer data to other apps** <br/> **Allow app to receive data from other apps** <br/> **Restrict cut, copy, and paste with other apps** <br/> If the Microsoft 365 Business option is set to **On**, then all the Intune options are set to: <br/> **Allow app to transfer data to other apps** is set to **Policy managed apps** <br/> **Allow app to receive data from other apps** is set to **All Apps** <br/> **Restrict cut, copy, and paste with other apps** is set to **Policy Managed apps with Paste-In** |
+
+## Windows 10 app protection settings
+
+The following table details how the Windows 10 application policy settings map to Intune settings.
+
+To find the Intune setting, sign in with your Microsoft 365 Business Premium admin credentials, and go to [Azure portal](https://portal.azure.com). Select **More services**, and type Intune into the **Filter**. Select **Intune App Protection** \> **App Policy**.
+
+ > [!IMPORTANT]
+ >
+ >A Microsoft 365 Business Premium subscription gives you a license to modify only the Intune settings that map to the settings available in Microsoft 365 Business Premium.
+
+To explore the available settings, select the policy name you want, and then choose **General, Assignments**, **Allowed apps**, **Exempt apps**, **Required settings**, or **Advanced settings** from the left navigation pane.
+
+|**Windows 10 application policy setting**|**Intune setting(s)**|
+|:--|:--|
+|Encrypt work files |**Advanced settings** \> **Data protection**: **Revoke encryption keys on unenroll** and **Revoke access to protected data device enrolls to MDM** are both set to **On**. |
+|Prevent users from copying company data to personal files. |**Required settings** \> **Windows Information Protection mode**. **On** in Microsoft 365 Business Premium maps to: **Hide Overrides**, **Off** in Microsoft 365 Business Premium maps to: **Off**. |
+|Office documents access control | If this is set to **On** in Microsoft 365 Business Premium, then <br/> **Advanced settings** \> **Access**, **Use Windows Hello for Business as a method for signing into Windows** is set to **On**, with the following additional settings: <br/> **Set the minimum number of characters required for the PIN** is set to **4**. <br/> **Configure the use of uppercase letters in the Windows Hello for Business PIN** is set to **Do not allow use of upper case letters for PIN**. <br/> **Configure the use of lowercase letters in the Windows Hello for Business PIN** is set to **Do not allow use of lower case letters for PIN**. <br/> **Configure the use of special characters in the Windows Hello for Business PIN** is set to **Do not allow the use of special characters in PIN**. <br/> **Specify the period of time (in days) that a PIN can be used before the system requires the user to change** is set to **0**. <br/> **Specify the number of past PINs that can be associated to a user account that can't be reused** is set to **0**. <br/> **Number of authentication failures allowed before the device will be wiped** is set to same as in Microsoft 365 Business (5 by default). <br/> **Maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked** is set to same as in Microsoft 365 Business. |
+|Enable recovery of protected data |**Advanced settings** \> **Data protection**: **Show the enterprise data protection icon** and **Use Azure RMS for WIP** are set to **On**. |
+|Protect additional company cloud locations |**Advanced settings** \> **Protected domains** and **Cloud resources** show domains and SharePoint sites. |
+|Files used by these apps are protected |The list of protected apps is listed in **Allowed apps**. |
+
+## Windows 10 device protection settings
+
+The following table details how the Windows 10 device configuration settings map to Intune settings.
+
+To find the Intune setting, sign in with your Microsoft 365 Business Premium admin credentials, and go to [Azure portal](https://portal.azure.com), then select **More services**, and type in Intune into the **Filter**, select **Intune** \> **Device configuration** \> **Profiles**. Then select **Device policy for Windows 10** \> **Properties** \> **Settings**.
+
+|**Windows 10 device policy setting**|**Intune setting(s)**|
+|:--|:--|
+|Help protect PCs from viruses and other threats using Windows Defender Antivirus |Allow Real-time Monitoring = ON <br/> Allow Cloud Protection = ON <br/> Prompt Users for Samples Submission = Send Safe samples automatically (Default Non PII auto submit) |
+|Help protect PCs from web-based threats in Microsoft Edge |**SmartScreen** in **Edge Browser settings** is set to **Required**. |
+|Turn off device screen when idle for (minutes) |Maximum minutes of inactivity until screen locks (minutes) |
+|Allow users to download apps from Microsoft Store |Custom URI policy |
+|Allow users to access Cortana |**General** \> **Cortana** is set to **block** in Intune when set to **off** in Microsoft 365 Business Premium. |
+|Allow users to receive Windows tips and advertisements from Microsoft |**Windows spotlight**, all blocked if this is set to **off** in Microsoft 365 Business Premium. |
+|Keep Windows 10 devices up to date automatically | This setting is in **Microsoft Intune** \> **Service updates - Windows 10 Update Rings**, choose **Update policy for Windows 10 devices**, and then **Properties** \> **Settings**. <br/> When the Microsoft 365 Business Premium setting is set to **On**, all the following settings are set: <br/> **Service branch** is set to **CB** (CBB when this is turned off in Microsoft 365 Business Premium). <br/> **Microsoft product updates** is set to **Allow**. <br/> **Windows drivers** is set to **Allow**. <br/> **Automatic update behavior** is set to **Auto install at maintenance time** with: <br/> **After hours start** is set to **6 AM**. <br/> **Active hours end** is set to **10 PM**. <br/> **Quality update deferral period (days)** is set to **0**. <br/> **Feature update deferral period (days)** is set to **0**. <br/> **Delivery optimization download mode** is set to **HTTP blended with peering behind same NAT**. |
+
+## See also
+
+[Top 10 ways to secure Microsoft 365 for business plans](../admin/security-and-compliance/secure-your-business-data.md)
business-premium M365bp Onboard Devices Mdb https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-onboard-devices-mdb.md
audience: Admin Previously updated : 03/14/2022 Last updated : 04/01/2022 ms.prod: m365-security ms.technology: mdb ms.localizationpriority: medium
Onboard devices to Microsoft Defender for Business to protect them with next-gen
To onboard devices, you can choose from several options: - [Use automatic onboarding for Windows devices that are already enrolled in Microsoft Endpoint Manager](#use-automatic-onboarding-for-windows-devices-that-are-already-enrolled-in-microsoft-endpoint-manager)+ - [Use a local script to onboard Windows and macOS devices](#use-a-local-script-to-onboard-windows-and-macos-devices)+ - [Use Endpoint Manager to enroll devices](#use-microsoft-endpoint-manager-to-enroll-devices) (Windows, macOS, iOS, and Android) and then apply Defender for Business policies to those devices This article also includes: - [How to run a detection test on a Windows device](#run-a-detection-test-on-a-windows-device)+ - [How to onboard devices gradually](#onboard-devices-gradually)+ - [How to offboard a device](#offboard-a-device) if a device is replaced or someone leaves the organization > [!IMPORTANT]
You can onboard up to 10 devices at a time with this method.
5. Follow the guidance in the following articles: - Windows devices: [Onboard Windows devices using a local script](../security/defender-endpoint/configure-endpoints-script.md#onboard-windows-devices-using-a-local-script)+ - macOS devices: [Manual deployment for Microsoft Defender for Endpoint on macOS](../security/defender-endpoint/mac-install-manually.md#download-installation-and-onboarding-packages) ## Use Microsoft Endpoint Manager to enroll devices
If you want to offboard a device, follow these steps:
7. Run the script on each device that you want to offboard. Need help with this task? See the following resources: - Windows devices: [Offboard Windows devices using a local script](../security/defender-endpoint/configure-endpoints-script.md#offboard-devices-using-a-local-script)
+
- macOS devices: [Uninstalling on macOS](../security/defender-endpoint/mac-resources.md#uninstalling) > [!IMPORTANT]
business-premium M365bp Prepare For Office Client Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-prepare-for-office-client-deployment.md
+
+ Title: "Prepare for Office client deployment by Microsoft 365 Business Premium"
+f1.keywords:
+- CSH
+++ Last updated : 04/01/2022
+audience: Admin
++
+ms.localizationpriority: medium
++
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- AdminSurgePortfolio
+search.appverid:
+- BCS160
+- MET150
+ROBOTS: NO INDEX, NO FOLLOW
+ms.assetid: ed34fff3-2881-4ed4-9906-1ba6bb8dd804
+description: "Learn how to automatically install the 32-bit Office apps on Windows 10 computers and keep them updated."
++
+# Prepare for Office client deployment by Microsoft 365 Business Premium
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md).
+
+## Prepare to automatically install Office apps to client computers
+
+You can use Microsoft 365 Business Premium to automatically install the 32-bit Office apps on Windows 10 computers and keep them current with updates.
+
+Automatic installation works best if the end user's computer is on Windows 10 Business and:
+
+- Doesn't have existing Office desktop apps (Word, Excel, PowerPoint, Outlook, OneNote, Publisher, Access, and OneDrive).
+
+ or
+
+- Has an existing version of Click-to-Run Office installed.
+
+To determine if you have the Click-to-Run version of Office, in any Office app go to **File** \> **Account** ( **Office Account** in Outlook). If you see **Office Updates** as shown in the following figure, then the installation was done by using Click-to-Run.
+
+![Screenshot of Office updates in Office app Account.](./../media/e3439380-fa43-4ed6-ae5d-64851c297df5.png)
+
+ **Who benefits from having this feature**
+
+The end user whose PC:
+
+- **Has** a Windows 10 Business user license, an active Microsoft 365 for business license, Windows 10 Creators Update, and is joined to Azure Active Directory.
+
+- **Doesn't have** 64-bit Office apps (example: Word, Excel, PowerPoint). If 64-bit Office apps are required, then this feature isn't a good fit because there's no support for triggering a 64-bit 2016 Click-to-Run version of Office from the Microsoft 365 for business admin console.
+
+- **Doesn't have** any 2016 Windows Installer (MSI) standalone apps (for example, Visio or Project). Microsoft 365 for business upgrades Office to the Click-to-Run version of Office 2016 and that doesn't work with Office 2016 MSI standalone apps.
+
+The following table shows what action the end users/admins may need to take, depending on their beginning state, to have a successful 32-bit Click-to-Run version of Office deployment from the Microsoft 365 for business admin console.<br/>
++
+|Starting Office install status|Action to take before Microsoft 365 for business Office install|End state|
+|:--|:--|:--|
+|No Office suite installed |None |Office 2016 32-bit is installed by using Click-to-Run |
+|Existing Click-to-Run 32-bit version of Office (2016 or earlier) and no standalone apps |None |Upgraded to the latest 32-bit Click-to-Run version of Office 2016, as needed **\*** |
+|Existing Click-to-Run 32-bit version of Office and Click-to-Run 32-bit or 64-bit standalone Office apps (for example, Visio, Project) |None |Standalone apps aren't affected. Suite is upgraded to Click-to-Run 32-bit version of Office 2016 |
+|Existing Click-to-Run 32-bit version of Office and any 32-bit or 64-bit (except 2016) MSI standalone Office apps |None |Standalone apps aren't affected. Suite is upgraded to Click-to-Run 32-bit version of Office 2016 |
+|Any existing Click-to-Run 64-bit version of Office |Uninstall the 64-bit Office apps, if it's OK to replace them with 32-bit Office apps |If Office 64-bit apps are removed, the Click-to-Run 32-bit version of Office 2016 is installed |
+|An existing MSI install of Office 2016 with or without standalone apps |Uninstall MSI Office 2016. |Click-to-Run 32-bit version of Office 2016 is installed. No change to standalone apps |
+|Existing MSI install of Office 2013 (or earlier) and/or standalone Office apps |None |Click-to-Run 32-bit version of Office 2016 with the pre-existing MSI Office install (and standalone apps) exist side-by-side |
+
+ **(\*) Note:** Does not upgrade to Click-to-Run 32-bit version of Office 2016 due to a known bug. A fix is in progress.
+
business-premium M365bp Protection Settings For Windows 10 Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protection-settings-for-windows-10-devices.md
+
+ Title: "Edit or set application protection settings for Windows 10 devices"
+++
+audience: Admin
+
+f1.keywords:
+- 'Win10AppPolicy'
+- 'O365E_Win10AppPolicy'
+- 'BCS365_Win10AppPolicy'
+
+ms.localizationpriority: medium
+
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- seo-marvel-mar
+- AdminSurgePortfolio
+search.appverid:
+- BCS160
+- MET150
+- MOE150
+ms.assetid: 02e74022-44af-414b-9d74-0ebf5c2197f0
+description: "Learn how to create or edit app management policies and protect work files on your users' personal Windows 10 devices."
++
+# Set or edit application protection settings for Windows 10 devices
+
+This article applies to Microsoft 365 Business Premium.
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md).
+
+## Edit an app management policy for Windows 10
+
+1. Go to the admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=837890" target="_blank">https://admin.microsoft.com</a>.
+
+2. On the left nav, choose **Devices** \> **Policies** .
+
+3. Choose an existing Windows app policy and then **Edit**.
+
+4. Choose **Edit** next to a setting you want to change and then **Save**.
+
+## Create an app management policy for Windows 10
+
+If your users have personal Windows 10 devices on which they perform work tasks, you can protect your data on those devices as well.
+
+1. Go to the admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=837890" target="_blank">https://admin.microsoft.com</a>.
+
+2. On the left nav, choose **Devices** \> **Policies** \> **Add**.
+
+3. On the **Add policy** pane, enter a unique name for this policy.
+
+4. Under **Policy type**, choose **Application Management for Windows 10**.
+
+5. Under **Device type**, choose either **Personal** or **Company Owned**.
+
+6. The **Encrypt work files** is turned on automatically.
+
+7. Set **Prevent users from copying company data to personal files and force them to save work files to OneDrive for Business** to **On** if you don't want the users to save work files on their PC.
+
+8. Expand **Recover data on Windows devices**. We recommend that you turn it **On**.
+ Before you can browse to the location of the Data Recovery Agent certificate, you have to first create one. For instructions, see [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate).
+
+ By default, work files are encrypted using a secret key that is stored on the device and associated with the user's profile. Only the user can open and decrypt the file. However, if a device is lost or a user is removed, a file can be stuck in an encrypted state. An admin can use the Data Recovery Agent (DRA) certificate to decrypt the file.
+
+ ![Browse to Data Recovery Agent certificate.](./../media/7d7d664f-b72f-4293-a3e7-d0fa7371366c.png)
+
+9. Expand **Protect additional network and cloud locations** if you want to add additional domains or SharePoint Online locations to make sure that files in all the listed apps are protected. If you need to enter more than one item for either field, use a semicolon (;) between the items.
+
+ ![Expand Protect additional network and cloud locations, and enter domains or SharePoint Online sites you own.](./../media/7afaa0c7-ba53-456d-8c61-312c45e09625.png)
+
+11. Next decide **Who will get these settings?** If you don't want to use the default **All Users** security group, choose **Change**, choose the security groups who will get these settings \> **Select**.
+12. Finally, choose **Add** to save the policy, and assign it to devices.
+
+## See also
+
+[Top 10 ways to secure Microsoft 365 for business plans](../admin/security-and-compliance/secure-your-business-data.md)
business-premium M365bp Protection Settings For Windows 10 Pcs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protection-settings-for-windows-10-pcs.md
+
+ Title: "Edit or create device protection settings for Windows 10 PCs"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- AdminSurgePortfolio
+- adminvideo
+search.appverid:
+- BCS160
+- MET150
+ms.assetid: bd66c26c-73a4-45a8-8642-3ea4ee7cd89d
+description: "Learn about settings available in Microsoft 365 for business to secure Windows 10 devices."
++
+# Edit or create device protection settings for Windows 10 PCs
+
+This article applies to Microsoft 365 Business Premium.
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md).
+
+After you have set set up default Windows protection settings on the Setup page, you can add new ones that apply to either all users, or a set of users. You can also edit any of the ones you have created.
+
+## Watch: Create protection settings for Windows 10 devices
+
+View a video on how to secure Windows 10 devices with Microsoft 365 Business Premium:
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/a5734146-620a-4cec-8618-536b3ca37972?autoplay=false]
+
+1. Go to the admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=837890" target="_blank">https://admin.microsoft.com</a>.
+
+2. On the left nav, choose **Devices** \> **Policies** \> **Add**.
+
+3. On the **Add policy** pane, enter a unique name for this policy.
+
+4. Under **Policy type**, choose **Windows 10 Device Configuration**.
+
+5. Expand **Secure Windows 10 Devices** \> configure the settings how you would like. For more information, see [Available settings](#available-settings).
+
+ You can always use the **Reset default settings** link to return to the default setting.
+
+ ![Add policy pane with Windows 10 Device configuration selected.](./../media/fa9e2dc2-7eae-4c96-af34-765a1f641ecf.png)
+
+6. Next decide **Who will get these settings?** If you don't want to use the default **All users** security group, Choose **Change**, search for the security group who will get these settings \> **Select**.
+
+7. Finally, choose **Done** to save the policy, and assign it to devices.
+
+## Edit Windows 10 protection settings
+
+1. Go to the admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=837890" target="_blank">https://admin.microsoft.com</a>.
+
+2. On the left nav, choose **Devices** \> **Policies** .
+
+3. Choose an existing Windows device policy and then **Edit**.
+
+4. Choose **Edit** next to a setting you want to change and then **Save**.
+
+## Available settings
+
+By default all settings are **On**. The following settings are available.
+
+For more information, see [How do protection features in Microsoft 365 Premium map to Intune settings](m365bp-map-protection-features-to-intune-settings.md).
++
+|Setting |Description |
+|:--|:--|
+|Help protect PCs from viruses and other threats using Windows Defender Antivirus |Requires that Windows Defender Antivirus is turned on to protect PCs from the dangers of being connected to the internet. |
+|Help protect PCs from web-based threats in Microsoft Edge |Turns on settings in Edge that help protect users from malicious sites and downloads. |
+|Use rules that reduce the attack surface of devices |When turned On, attack surface reduction helps block actions and apps typically used by malware to infect devices. This setting is only available if Windows Defender Antivirus is set to On. See [Reduce attack surfaces](/windows/security/threat-protection/microsoft-defender-atp/exploit-protection) to learn more. |
+|Protect folders from threats such as ransomware |This setting uses controlled folder access to protect company data from modification by suspicious or malicious apps, such as ransomware. These types of apps are blocked from making changes in protected folders. This setting is only available if Windows Defender Antivirus is set to On. See [Protect folders with Controlled folder access](/mem/configmgr/protect/deploy-use/create-deploy-exploit-guard-policy#bkmk_CFA) to learn more. |
+|Prevent network access to potentially malicious content on the Internet |Use this setting to block outbound user connections to low-reputation Internet locations that may host phishing scams, exploits, or other malicious content. This setting is only available if Windows Defender Antivirus is set to **On**. For more information, see [Protect your network](/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus). |
+|Help protect files and folders on PCs from unauthorized access with BitLocker |BitLocker protects data by encrypting the computer hard drives and protect against data exposure if a computer is lost or stolen. For more information, see [BitLocker FAQ](/windows/security/information-protection/BitLocker/BitLocker-frequently-asked-questions). |
+|Allow users to download apps from Microsoft Store |Lets users download and install apps from the Microsoft Store. Apps include everything from games to productivity tools, so we leave this setting **On**, but you can turn it off for extra security. |
+|Allow users to access Cortana |Cortana can be very helpful! Cortana can turn settings on or off for you, give directions, and make sure you're on time for appointments, so we keep this setting **On** by default. |
+|Allow users to receive Windows tips and advertisements from Microsoft |Windows tips can be handy and help orient users when new features are released. |
+|Keep Windows 10 devices up to date automatically |Makes sure that Windows 10 devices automatically receive the latest updates. |
+|Turn off device screen when idle for this amount of time |Makes sure that company data is protected if a user is idle. A user may be working in a public location, like a coffee shop, and step away or be distracted for just a moment, leaving their device vulnerable to random glances. This setting lets you control how long the user can be idle before the screen shuts off. |
+
+## See also
+
+[Top 10 ways to secure Microsoft 365 for business plans](../admin/security-and-compliance/secure-your-business-data.md)
business-premium M365bp Remove Company Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-remove-company-data.md
+
+ Title: "Remove company data from devices"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- seo-marvel-mar
+- AdminSurgePortfolio
+search.appverid:
+- BCS160
+- MET150
+ms.assetid: 80bdae57-f8bc-4e40-a58c-956007117ecb
+description: "Discover how to use Microsoft 365 for business to remove company data that your users have on their devices or Windows PCs."
++
+# Remove company data from devices
+
+This article applies to Microsoft 365 Business Premium.
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md).
+
+## Remove company data
+
+You can use Microsoft 365 for business to remove company data that your users have on their [devices](m365bp-app-protection-settings-for-android-and-ios.md) or [Windows PCs](m365bp-protection-settings-for-windows-10-devices.md) that are protected by Microsoft 365. **If you remove company data from a device, you cannot restore it later**.
+
+1. Go to the admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=837890" target="_blank">https://admin.microsoft.com</a>.
+
+2. On the left nav, choose **Devices** \> **Manage**.
+
+3. On the **Manage** page, choose or search for a user who's data you want to remove, and choose the name.
+
+4. On the next pane, select the device or devices from the **Devices** list. On the device pane that opens, you can choose to reset the device to factory settings or remove company data, depending on the device type.
+
+ ![On the remove company data pane, select the device from which you want to remove the data.](./../media/resetorremove.png)
+
+5. On the confirmation pane, choose **Confirm** \> **Close**.
+
+
+## See also
+
+[Top 10 ways to secure Microsoft 365 for business plans](../admin/security-and-compliance/secure-your-business-data.md)
business-premium M365bp Reset Devices To Factory Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-reset-devices-to-factory-settings.md
+
+ Title: "Reset Windows 10 devices to their factory settings"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- seo-marvel-mar
+- AdminSurgePortfolio
+search.appverid:
+- BCS160
+- MET150
+ms.assetid: c4db6caf-74df-4734-b1dd-53e371c7a3c3
+description: "Learn how to use Microsoft 365 for business to factory reset Windows 10 devices you manage, reverting them to their original settings at purchase."
++
+# Reset Windows 10 devices to their factory settings
+
+This article applies to Microsoft 365 Business Premium.
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Microsoft Defender for Business](../security/defender-business/mdb-overview.md).
+
+A factory reset reverts a device to the original settings it had when the device was purchased. All apps and data on the device that were installed after purchase are removed. You can use Microsoft 365 for business to factory reset Windows 10 devices you manage.
+
+1. Go to the admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=837890" target="_blank">https://admin.microsoft.com</a>.
+
+2. In the left nav, choose **Devices** \> **Manage**.
+
+3. On the **Manage** page, check the checkbox next to the device you want to remove data from and then, in the **Manage** drop-down choose **Factory reset**.
+
+4. On the **Are you sure you want to factory reset the devices below** pane, choose **Confirm** \> **Close**.
+
+
+## See also
+
+[Top 10 ways to secure Microsoft 365 for business plans](../admin/security-and-compliance/secure-your-business-data.md)
business-premium M365bp Secure Windows 10 Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-secure-windows-10-devices.md
+
+ Title: "Secure Windows 10 devices"
+++
+audience: Admin
+
+f1.keywords:
+- 'O365E_BCSSetup4WindowsConfig'
+
+ms.localizationpriority: medium
+
+- M365-subscription-management
+- M365-identity-device-management
+
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- seo-marvel-mar
+- AdminSurgePortfolio
+search.appverid:
+- BCS160
+- MET150
+- MOE150
+ROBOTS: NO INDEX, NO FOLLOW
+ms.assetid: 21e5551f-fa35-4f13-9418-f80d668b6a2b
+description: "Learn about configuring the settings of the default device policy that any Windows 10 device will receive upon signing in to their work or school account."
++
+# Secure Windows 10 devices
+
+This article applies to Microsoft 365 Business Premium.
+
+The settings that you configure here are part of the default device policy for Windows 10. All users who connect a Windows 10 device, including mobile devices and PCs, by signing in with their work account will automatically receive these settings. We recommend that you accept the default policy during setup and add policies later that target specific groups of users.
+
+## Settings to secure Windows 10 devices
+
+By default all settings are **On**. The following settings are available:
+
++
+|Setting <br/> |Description <br/> |
+|:--|:--|
+|Help protect PCs from viruses and other threats using Windows Defender Antivirus <br/> |Requires that Windows Defender Antivirus is turned on to protect PCs from the dangers of being connected to the internet. <br/> |
+|Help protect PCs from web-based threats in Microsoft Edge <br/> |Turns on settings in Edge that help protect users from malicious sites and downloads. <br/> |
+|Help protect files and folders on PCs from unauthorized access with BitLocker <br/> |Bitlocker protects data by encrypting the computer hard drives and protect against data exposure if a computer is lost or stolen. For more information, see [Bitlocker FAQ](/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions). <br/> |
+|Turn off device screen when idle for this amount of time <br/> |Makes sure that company data is protected if a user is idle. A user may be working in a public location, like a coffee shop, and step away or be distracted for just a moment, leaving their device vulnerable to random glances. This setting lets you control how long the user can be idle before the screen shuts off. <br/> |
+|
business-premium M365bp Set Up Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-set-up-compliance.md
+
+ Title: "Increase threat protection for Microsoft 365 Business Premium"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- seo-marvel-mar
+- AdminSurgePortfolio
+search.appverid:
+- BCS160
+- MET150
+description: "Set up compliance features to prevent data loss and help keep your and your customers' sensitive information secure."
+
+# Set up compliance features
+
+Your Microsoft 365 Business Premium subscription includes compliance and privacy features. These capabilities help protect your company's data, and to help you keep your and your customers' sensitive information secure. This article is designed to help you get started with your compliance features.
+
+## Before you begin
+
+Make sure you have one of the following roles assigned in Azure Active Directory:
+
+- Global Administrator
+- Compliance Administrator
+
+To learn more, see [Get started with the roles page](../admin/add-users/admin-roles-page.md).
+
+## Use Compliance Manager to get started
++
+Microsoft 365 Business Premium includes Compliance Manager, which can help you get started setting up your compliance features. Such features include data loss prevention, information governance, and insider risk management, to name a few. Compliance Manager can save you time by highlighting recommendations, a compliance score, and ways to improve your score.
+
+Here's how to get started:
+
+1. Go to [https://compliance.microsoft.com](https://compliance.microsoft.com) and sign in.
+
+2. In the navigation pane, choose **Compliance Manager**.
+
+3. On the **Overview** tab, review the information. Select an item or link to view more information, or to take actions, such as configuring a data loss prevention (DLP) policy. For example, in the **Solutions that affect your score** section, you might select the link in the **Remaining actions** column.
+
+ :::image type="content" source="./media/m365bp-compliancesolutions.png" alt-text="Screenshot of Solutions That Affect Your Score pane.":::
+
+ That action takes you to the **Improvement actions** tab, which is filtered for the item you selected. In this example we're looking at DLP policies to configure.
+
+ :::image type="content" source="./media/m365bp-dlppoliciestoconfigure.png" alt-text="Screenshot of DLP policies to configure.":::
+
+4. On the **Improvement actions** tab, select an item. In our example, we've selected **Create customized DLP policies or personally identifiable information**. A page loads that provides more information about the policy to configure.
+
+ :::image type="content" source="./media/m365bp-dlppolicyinfo.png" alt-text="Screenshot of information about DLP policy for customer content.":::
+
+ Follow the information on the screen to set up your DLP policy.
+
+For more information about compliance features in Microsoft 365 for business, see [Microsoft 365 compliance documentation](../compliance/index.yml).
+
+## Use sensitivity labels
+
+Sensitivity labels are available in Office apps (such as Outlook, Word, Excel, and PowerPoint). Examples of labels include:
+
+- Normal
+- Personal
+- Private
+- Confidential
+
+However, you can define other labels for your company as well.
+
+Use the following articles to get started with sensitivity labels:
+
+1. [Learn about sensitivity labels](../compliance/sensitivity-labels.md).
+
+2. [Get started with sensitivity labels](../compliance/get-started-with-sensitivity-labels.md).
+
+3. [Create and configure sensitivity labels and their policies](../compliance/create-sensitivity-labels.md).
+
+4. [Show people in your company how to use sensitivity labels](https://support.microsoft.com/office/apply-sensitivity-labels-to-your-files-and-email-in-office-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9)
business-premium M365bp View Policies And Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-view-policies-and-devices.md
+
+ Title: "View policies and devices"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+
+- M365-subscription-management
+- M365-identity-device-management
+- Adm_TOC
+
+- Core_O365Admin_Migration
+- MiniMaven
+- MSB365
+- OKR_SMB_M365
+- AdminSurgePortfolio
+search.appverid:
+- BCS160
+- MET150
+ms.assetid: 6b70fa27-d171-4593-8ecf-f78bb4ed2e99
+description: "View device policies and actions by signing in to Microsoft 365 for business."
++
+# View and manage policies and devices
+
+This article applies to Microsoft 365 Business Premium.
+
+> [!NOTE]
+> Microsoft Defender for Business is rolling out to Microsoft 365 Business Premium customers, beginning March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md).
+
+## View and edit device policies
+
+1. Go to the admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=837890" target="_blank">https://admin.microsoft.com</a>.
+2. On the left nav, choose **Devices** \> **Policies**.
+
+ On this page, you can create, edit, change target group, or delete a policy.
+
+ ![Screenshot of the Policies page.](../media/devicepolicies.png)
+
+## View and manage devices
+
+1. On the left nav, choose **Devices** \> **Manage**.
+
+ On this page, you can select one or more devices and remove company data. For Windows 10 devices that you have set device protections settings for, you can also choose to reset the device to factory settings.
+
+ ![Manage devices page.](../media/devicesmanage.png)
+
+## See also
+
+[Top 10 ways to secure Microsoft 365 for business plans](../admin/security-and-compliance/secure-your-business-data.md)
business Manage Protected Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business/manage-protected-devices.md
After a user connects their device to your organization by signing in with their
## Related content
-[Remove company data from devices](remove-company-data.md) (article)\
+[Remove company data from devices](/business-premium/m365bp-remove-company-data.md) (article)\
[Reset Windows 10 devices to their factory settings](reset-devices-to-factory-settings.md) (article)\
-[Add a managed device](./app-protection-settings-for-android-and-ios.md) (article)
+[Add a managed device](/business-premium/m365bp-app-protection-settings-for-android-and-ios.md) (article)
business Mam And Mdm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business/ui/mam-and-mdm.md
description: "Learn the differences between mobile device management and mobile
# Difference between MDM and MAM Microsoft 365 Business Premium offers a number of ways for you to protect your business data. See [Overview of Microsoft 365 Business Premium](../../admin/admin-overview/what-is-microsoft-365.md) for more about the various protections that are automatically set up, and what you can set up yourself to further protect your business. You can also set up policies that protect your Windows 10 devices and the data in your mobile devices.
-[Set application protection settings for Windows 10 devices](../protection-settings-for-windows-10-devices.md).
+[Set application protection settings for Windows 10 devices](../../business-premium/m365bp-protection-settings-for-windows-10-devices.md).
## Mobile device management or MDM
-Microsoft 365 Business Premium lets you set up policies that protect data on your Windows 10 devices. When a device is under mobile device management, you control the entire device, and can wipe data from it, and also reset it to factory settings. For more information, see [Set device protection settings for Windows 10 PCs](../protection-settings-for-windows-10-pcs.md).
+Microsoft 365 Business Premium lets you set up policies that protect data on your Windows 10 devices. When a device is under mobile device management, you control the entire device, and can wipe data from it, and also reset it to factory settings. For more information, see [Set device protection settings for Windows 10 PCs](../../business-premium/m365bp-protection-settings-for-windows-10-pcs.md).
## Mobile application management or MAM
-Mobile application management lets you control your business data in your users' personal devices, such as iPhones and Androids, and their personal Win 10 computers. You can use application management policies to prevent your users from copying business data from Office apps to their personal apps. You can also remove all data from the Office apps on their personal devices. For more information, see [Set app protection settings for Android or iOS devices](../app-protection-settings-for-android-and-ios.md) and [Set application protection settings for Windows 10 devices](../protection-settings-for-windows-10-devices.md).
+Mobile application management lets you control your business data in your users' personal devices, such as iPhones and Androids, and their personal Win 10 computers. You can use application management policies to prevent your users from copying business data from Office apps to their personal apps. You can also remove all data from the Office apps on their personal devices. For more information, see [Set app protection settings for Android or iOS devices](../../business-premium/m365bp-app-protection-settings-for-android-and-ios.md) and [Set application protection settings for Windows 10 devices](../../business-premium/m365bp-app-protection-settings-for-android-and-ios.md).
compliance Apply Sensitivity Label Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-sensitivity-label-automatically.md
Simulation mode also lets you gradually increase the scope of your auto-labeling
Finally, you can use simulation mode to provide an approximation of the time needed to run your auto-labeling policy, to help you plan and schedule when to run it without simulation mode.
-#### Deleted OneDrive accounts and simulation results
-
-Expect possible display discrepancies in the simulation results when deleted OneDrive accounts are still in the [retention stage of the deletion process](/onedrive/retention-and-deletion#the-onedrive-deletion-process). For example, an employee has left the organization and their manager has temporary access to that user's OneDrive files.
-
-In this scenario, if the OneDrive account was specified by URL in the auto-labeling policy, matched files from the deleted OneDrive account are included in the simulation results.
-
-However, if the OneDrive account wasn't specified by URL, but was included with the **All** default setting:
-- When the SharePoint location is included in the policy, matched files from the deleted OneDrive account display as SharePoint items in the simulation results.-- When the SharePoint location isn't included in the policy, matched files from the deleted OneDrive account aren't included in the simulation results.-
-In all cases, matched files are labeled until the OneDrive account is permanently deleted. The display discrepancies listed apply only to the simulation results.
- ### Creating an auto-labeling policy 1. In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft 365 compliance center</a>, navigate to sensitivity labels:
compliance Communication Compliance Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-policies.md
During the review process, communication compliance reviewers can perform all th
![Communication compliance user-reported messages policy.](../media/communication-compliance-user-reported-messages-policy.png)
-User reported messages from Teams chats are the only messages processed by the User-reported message policy and only the assigned reviewers for the policy can be modified. All other policy properties are not editable. When the policy is created, the initial reviewers assigned to the policy are all members of the *Communication Compliance Admins* role group (if populated with at least one user) or all members of your organization's *Global Admin* role group . The policy creator is a randomly selected user from the *Communication Compliance Admins* role group (if populated with at least one user) or a randomly selected user from your organization's *Global Admin* role group.
+User reported messages from Teams chats are the only messages processed by the User-reported message policy and only the assigned reviewers for the policy can be modified. All other policy properties aren't editable. When the policy is created, the initial reviewers assigned to the policy are all members of the *Communication Compliance Admins* role group (if populated with at least one user) or all members of your organization's *Global Admin* role group . The policy creator is a randomly selected user from the *Communication Compliance Admins* role group (if populated with at least one user) or a randomly selected user from your organization's *Global Admin* role group.
Admins should immediately assign custom reviewers to this policy as appropriate for your organization. This may include reviewers such as your Compliance Officer, Risk Officer, or members of your Human Resources department. To customize the reviewers for chat messages submitted as user-reported messages, complete the following steps:
The following table explains more about each condition.
| **Message is classified with any of these labels** <br><br> **Message is not classified with any of these labels** | To apply the policy when certain retention labels are included or excluded in a message. Retention labels must be configured separately and configured labels are chosen as part of this condition. Each label you choose is applied separately (only one of these labels must apply for the policy to apply to the message). For more information about retention labels, see [Learn about retention policies and retention labels](retention.md).| | **Message contains any of these words** <br><br> **Message contains none of these words** | To apply the policy when certain words or phrases are included or excluded in a message, enter each word separated with a comma. For phrases of two words or more, use quotation marks around the phrase. Each word or phrase you enter is applied separately (only one word must apply for the policy to apply to the message). For more information about entering words or phrases, see the next section [Matching words and phrases to emails or attachments](communication-compliance-policies.md#Matchwords).| | **Attachment contains any of these words** <br><br> **Attachment contains none of these words** | To apply the policy when certain words or phrases are included or excluded in a message attachment (such as a Word document), enter each word separated with a comma. For phrases of two words or more, use quotation marks around the phrase. Each word or phrase you enter is applied separately (only one word must apply for the policy to apply to the attachment). For more information about entering words or phrases, see the next section [Matching words and phrases to emails or attachments](communication-compliance-policies.md#Matchwords).|
-| **Attachment is any of these file types** <br><br> **Attachment is none of these file types** | To supervise communications that include or exclude specific types of attachments, enter the file extensions (such as .exe or .pdf). If you want to include or exclude multiple file extensions, enter these on separate lines. Only one attachment extension must match for the policy to apply.|
+| **Attachment is any of these file types** <br><br> **Attachment is none of these file types** | To supervise communications that include or exclude specific types of attachments, enter the file extensions (such as .exe or .pdf). If you want to include or exclude multiple file extensions, enter file types separated by a comma (example *.exe,.pdf,.zip*). Only one attachment extension must match for the policy to apply.|
| **Message size is larger than** <br><br> **Message size is not larger than** | To review messages based on a certain size, use these conditions to specify the maximum or minimum size a message can be before it's subject to review. For example, if you specify **Message size is larger than** \> **1.0 MB**, all messages that are 1.01 MB and larger are subject to review. You can choose bytes, kilobytes, megabytes, or gigabytes for this condition.| | **Attachment is larger than** <br><br> **Attachment is not larger than** | To review messages based on the size of their attachments, specify the maximum or minimum size an attachment can be before the message and its attachments are subject to review. For example, if you specify **Attachment is larger than** \> **2.0 MB**, all messages with attachments 2.01 MB and over are subject to review. You can choose bytes, kilobytes, megabytes, or gigabytes for this condition.|
compliance Compliance Manager Templates List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-templates-list.md
description: "Microsoft Compliance Manager provides templates for building asses
**In this article:** View the comprehensive list of **templates** available for creating assessments in Compliance Manager. > [!IMPORTANT]
-> The assessment templates that are available to your organization depend on your licensing agreement. [Review the details](compliance-manager-templates.md#template-availability-and-licensing).
+> The assessment templates that are available to your organization depend on your licensing agreement. [Review details](compliance-manager-templates.md#template-availability-and-licensing).
## Overview
Templates are added to Compliance Manager as new laws and regulations are enacte
Below is the complete list of templates in Compliance Manager. Template names match the associated regulation or certification. Where available, links in the template names below take you to related documentation about that standard, regulation, or law.
-Each template (apart from the baseline) is available in at least one version designed for use with a specific product, such as Microsoft 365, along with a universal version that you can use to assess other products of your choice. To learn more about template options, see [Learn about assessment templates](compliance-manager-templates.md).
+Each template (except for the [Microsoft Data Protection Baseline](compliance-manager-assessments.md#data-protection-baseline-default-assessment) default template) is available in at least one version designed for use with a specific product, such as Microsoft 365, along with a universal version that you can use to assess other products of your choice. To learn more about template options, see [Learn about assessment templates](compliance-manager-templates.md).
You can also select individual templates in Compliance Manager to view more information about them, including a description of the regulation and properties of the template. Read the **About** section for a summary.
-### Where to find your templates
+Jump to a section below to view templates by area or industry:
+- [Global](#global)
+- [Industry](#industry)
+- [US Government](#us-government)
+- [US States and Territories](#us-states-and-territories)
+- [Asia-Pacific Countries](#asia-pacific-countries)
+- [Europe, Middle East, and Africa (EMEA)](#europe-middle-east-and-africa-emea)
+- [Latin America](#latin-america)
+- [North America](#north-america)
+- [South America](#south-america)
+
+### Where to find your templates in Compliance Manager
To review the templates available to your organization, go to your **Assessment templates** page. Learn more about [how to view and manage your templates](compliance-manager-templates.md#view-and-manage-templates). ## Included templates
-One or more of these templates will be available based on your licensing agreement. The Data Protection Baseline template is included for all users.
+One or more of the templates listed below are included as part of your licensing agreement. The Microsoft Data Protection Baseline template is included for all organizations.
- [Microsoft Data Protection Baseline](compliance-manager-assessments.md#data-protection-baseline-default-assessment) - [European Union GDPR](/compliance/regulatory/gdpr)
One or more of these templates will be available based on your licensing agreeme
## Preview templates
-These templates are currently available for preview. Creating assessments using these templates will not count toward your total of licensed templates used.
+The templates listed below are currently available for preview. Creating assessments using these templates will not count toward your total of licensed templates used.
- ISO 27001:2013 for Azure (Preview) - ISO 27001:2013 for Dynamics 365 (Preview)
These templates are currently available for preview. Creating assessments using
## Premium templates
-These templates may be purchased by your organization.
+The templates listed below may be purchased by your organization.
### Global -- Guidelines and Functional Requirements for Electronic Records Management Systems (ICA Module 2) (Microsoft 365)-- ISO 15489-1:2016 (Microsoft 365)-- ISO 16175-1:2020 (Microsoft 365)-- ISO 19791 - Information technology ΓÇö Security techniques ΓÇö Security assessment of operational systems (Microsoft 365)-- [ISO 22301:2019](/compliance/regulatory/offering-iso-22301) (Microsoft 365)-- ISO 23081-1:2017 (Microsoft 365)-- ISO 27005:2018 (Microsoft 365)-- [ISO 27017:2015](/compliance/regulatory/offering-iso-27017) (Microsoft 365)-- ISO 27034-1 Information technology ΓÇö Security techniques ΓÇö Application security (Microsoft 365)-- ISO 27799: 2016, Health informatics ΓÇö Information security management in health (Microsoft 365)-- ISO 28000 ΓÇô Specifications for Security Management Systems for the Supply Chain (Microsoft 365)-- ISO 31000:2018 (Microsoft 365)-- ISO 55001 ΓÇô Asset management -- Management systems--Requirements (Microsoft 365)-- ISO IEC 80001-1:2010 (Microsoft 365)
+- Guidelines and Functional Requirements for Electronic Records Management Systems (ICA Module 2)
+- ISO 15489-1:2016
+- ISO 16175-1:2020
+- ISO 19791 - Information technology ΓÇö Security techniques ΓÇö Security assessment of operational systems
+- [ISO 22301:2019](/compliance/regulatory/offering-iso-22301)
+- ISO 23081-1:2017
+- ISO 27005:2018
+- [ISO 27017:2015](/compliance/regulatory/offering-iso-27017)
+- ISO 27034-1 Information technology ΓÇö Security techniques ΓÇö Application security
+- ISO 27799: 2016, Health informatics ΓÇö Information security management in health
+- ISO 28000 ΓÇô Specifications for Security Management Systems for the Supply Chain
+- ISO 31000:2018
+- ISO 37301
+- ISO 55001 ΓÇô Asset management -- Management systems--Requirements
+- ISO IEC 80001-1:2010
- ISO/IEC 27001:2013-- [ISO/IEC 27018:2019](/compliance/regulatory/offering-iso-27018) (Microsoft 365)-- ISO/IEC 27033-1:2015 (Microsoft 365)-- [ISO/IEC 27701:2019](/compliance/regulatory/offering-iso-27701) (Microsoft 365)
+- [ISO/IEC 27018:2019](/compliance/regulatory/offering-iso-27018)
+- ISO/IEC 27033-1:2015
+- [ISO/IEC 27701:2019](/compliance/regulatory/offering-iso-27701)
+- NIST 800-207 - Zero Trust Architecture
+- SIG 2022
- [System and Organization Controls (SOC) 1](/compliance/regulatory/offering-soc) - [System and Organization Controls (SOC) 2](/compliance/regulatory/offering-soc) ### Industry -- AICPA/CICA Generally Accepted Privacy Principles (GAPP) (Microsoft 365)-- ARMA - Implementing the Generally Accepted Record Keeping Principles (GARP) (Microsoft 365)-- [CDSA Content Protection & Security Standard](/compliance/regulatory/offering-cdsa) (Microsoft 365)
+- AICPA/CICA Generally Accepted Privacy Principles (GAPP)
+- ARMA - Implementing the Generally Accepted Record Keeping Principles (GARP)
+- [CDSA Content Protection & Security Standard](/compliance/regulatory/offering-cdsa)
- [CIS Implementation Group 1, Group 2, Group 3](/compliance/regulatory/offering-cis-benchmark) - CIS Microsoft 365 Foundation Level 1 and 2 - [Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)](/compliance/regulatory/offering-csa-star-attestation)-- COBIT 5 (Microsoft 365)-- FINRA Cybersecurity Checklist (Microsoft 365)-- ITU X.1052 Information Security Management Framework (Microsoft 365)-- Joint Commission Information Management Standard (Microsoft 365)-- [Motion Picture Association (MPA) Content Security Best Practices](/compliance/regulatory/offering-mpaa) (Microsoft 365)-- [NERC CIP](/compliance/regulatory/offering-nerc-cip) (Microsoft 365)-- SWIFT Customer Security Controls (Microsoft 365)-- OWASP ProActive Controls for Developers 2018 v3.0 (Microsoft 365)
+- COBIT 5
+- FINRA Cybersecurity Checklist
+- ITU X.1052 Information Security Management Framework
+- Joint Commission Information Management Standard
+- [Motion Picture Association (MPA) Content Security Best Practices](/compliance/regulatory/offering-mpaa)
+- [NERC CIP](/compliance/regulatory/offering-nerc-cip)
+- SWIFT Customer Security Controls
+- OWASP ProActive Controls for Developers 2018 v3.0
- (NAIC) Standards for Safeguarding Customer Information Model Regulation MDL-673-- [PCI DSS v3.2.1](/compliance/regulatory/offering-pci-dss) (Microsoft 365)-- Privacy of Consumer Financial and Health Information Regulation, NAIC MDL-672, Q2 2017 (Microsoft 365)-- Revisions to the principles for the sound management of operational risk (Basel III Ops Risks) (Microsoft 365)-- Standardized Information Gathering (SIG) Questionnaire (Microsoft 365)
+- [PCI DSS v3.2.1](/compliance/regulatory/offering-pci-dss)
+- Privacy of Consumer Financial and Health Information Regulation, NAIC MDL-672, Q2 2017
+- Revisions to the principles for the sound management of operational risk (Basel III Ops Risks)
+- Standardized Information Gathering (SIG) Questionnaire
- [Trusted Information Security Assessment Exchange](/compliance/regulatory/offering-tisax-germany) ### US Government - Appendix III to OMB Circular No. A-130 - Security of Federal Automated Information Resources-- [CFR - Code of Federal Regulations Title 21, Part 11, Electronic Records, Electronic Signatures](/compliance/regulatory/offering-fda-cfr-title-21-part-11) (Microsoft 365)-- Children's Online Privacy Protection Rule (COPPA) (Microsoft 365)-- CMMC Level 1, Level 2, Level 3, Level 4, Level 5 (Microsoft 365)-- CMS Information Systems Security and Privacy Policy (IS2P2) (Microsoft 365)-- Computer Fraud and Abuse Act (CFAA) (Microsoft 365)-- Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (Microsoft 365)-- [Criminal Justice Information Services (CJIS) Security Policy](/compliance/regulatory/offering-cjis) (Microsoft 365)-- Cybersecurity for Networked Medical Devices Containing Off-the-Shelf (OTS) Software - FDA (Microsoft 365)-- Cybersecurity Maturity Model Certification (CMMC) Levels 1 through 5 (Microsoft 365)-- [DFARS](/compliance/regulatory/offering-dfars) (Microsoft 365)-- e-CFR - Identity Theft Rules (Microsoft 365)-- Electronic Code of Federal Regulations - Part 748.0 and Appendix A (Microsoft 365)-- FDIC Privacy Rules (Microsoft 365)-- [Federal Financial Institutions Examination Council (FFIEC) Information Security Booklet](/compliance/regulatory/offering-ffiec-us) (Microsoft 365)-- [FedRAMP Moderate](/compliance/regulatory/offering-fedramp) (Microsoft 365)-- FedRAMP SSP High Baseline (Microsoft 365)-- Freedom of Information Act (FOIA) (Microsoft 365)-- FTC Privacy of Consumer Financial Information (Microsoft 365)-- [Gramm-Leach-Bliley Act, Title V, Subtitle A, Financial Privacy](/compliance/regulatory/offering-GLBA) (Microsoft 365)-- [HIPAA/HITECH](/compliance/regulatory/offering-hipaa-hitech) (Microsoft 365)-- [HITRUST](/compliance/regulatory/offering-hitrust) (Microsoft 365)-- Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection (Microsoft 365)-- IRS - Revenue Procedure 98-25 Automated Records (Microsoft 365)-- IRS-P1075 (Microsoft 365)-- Minimum Acceptable Risk Standards for Exchanges (MARS-E) 2.0 (Microsoft 365)-- National Archives Universal Electronic Records Management (ERM) Requirements (Microsoft 365)-- NIST 800-37 (Microsoft 365)-- NIST 800-53 rev.5 (Microsoft 365)-- NIST 800-63 Digital Identity Guidelines (Microsoft 365)-- NIST 800-78-4: Cryptographic Algorithms and Key Sizes for Personal Identity Verification (Microsoft 365)-- NIST 800-137A -- Assessing Information Security Continuous Monitoring (ISCM) Programs (Microsoft 365)-- [NIST 800-171](/compliance/regulatory/offering-nist-sp-800-171) (Microsoft 365)-- NIST 800-184: Guide for Cybersecurity Event Recovery (Microsoft 365)-- [NIST CSF](/compliance/regulatory/offering-nist-csf) (Microsoft 365)
+- [CFR - Code of Federal Regulations Title 21, Part 11, Electronic Records, Electronic Signatures](/compliance/regulatory/offering-fda-cfr-title-21-part-11)
+- Children's Online Privacy Protection Rule (COPPA)
+- CMMC Level 1, Level 2, Level 3, Level 4, Level 5
+- CMMC v2 Level 1
+- CMMC v2 Level 2
+- CMS Information Systems Security and Privacy Policy (IS2P2)
+- Computer Fraud and Abuse Act (CFAA)
+- Content of Premarket Submissions for Management of Cybersecurity in Medical Devices
+- [Criminal Justice Information Services (CJIS) Security Policy](/compliance/regulatory/offering-cjis)
+- Cybersecurity for Networked Medical Devices Containing Off-the-Shelf (OTS) Software - FDA
+- Cybersecurity Maturity Model Certification (CMMC) Levels 1 through 5
+- [DFARS](/compliance/regulatory/offering-dfars)
+- e-CFR - Identity Theft Rules
+- Electronic Code of Federal Regulations - Part 748.0 and Appendix A
+- FDIC Privacy Rules
+- [Federal Financial Institutions Examination Council (FFIEC) Information Security Booklet](/compliance/regulatory/offering-ffiec-us)
+- [FedRAMP Moderate](/compliance/regulatory/offering-fedramp)
+- FedRAMP SSP High Baseline
+- Freedom of Information Act (FOIA)
+- FTC Privacy of Consumer Financial Information
+- [Gramm-Leach-Bliley Act, Title V, Subtitle A, Financial Privacy](/compliance/regulatory/offering-GLBA)
+- [HIPAA/HITECH](/compliance/regulatory/offering-hipaa-hitech)
+- [HITRUST](/compliance/regulatory/offering-hitrust)
+- Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection
+- IRS - Revenue Procedure 98-25 Automated Records
+- IRS-P1075
+- Minimum Acceptable Risk Standards for Exchanges (MARS-E) 2.0
+- National Archives Universal Electronic Records Management (ERM) Requirements
+- NIST 800-37
+- NIST 800-53 rev.5
+- NIST 800-63 Digital Identity Guidelines
+- NIST 800-78-4: Cryptographic Algorithms and Key Sizes for Personal Identity Verification
+- NIST 800-137A -- Assessing Information Security Continuous Monitoring (ISCM) Programs
+- [NIST 800-171](/compliance/regulatory/offering-nist-sp-800-171)
+- NIST 800-184: Guide for Cybersecurity Event Recovery
+- [NIST CSF](/compliance/regulatory/offering-nist-csf)
- NIST Privacy Framework-- NIST SP 1800-5 IT Asset Management (Microsoft 365)-- NIST Special Publication 1800-1 Securing Electronic Health Records on Mobile Devices (Microsoft 365)-- NIST Special Publication 800-128 (Microsoft 365)-- NIST Special Publication 800-210: General Access Control Guidance for Cloud Systems (Microsoft 365)
+- NIST SP 1800-5 IT Asset Management
+- NIST Special Publication 1800-1 Securing Electronic Health Records on Mobile Devices
+- NIST Special Publication 800-128
+- NIST Special Publication 800-210: General Access Control Guidance for Cloud Systems
- [Sarbanes-Oxley Act](/compliance/regulatory/offering-sox)-- [SEC 17-4(a)](/compliance/regulatory/offering-sec-17a-4) (Microsoft 365)-- United States of America Privacy Act (Microsoft 365)-- US - Clarifying Lawful Overseas Use of Data (CLOUD) Act (Microsoft 365)-- US - Commission Statement and Guidance on Public Company Cybersecurity Disclosures (Microsoft 365)-- US - Department of Energy (DOE) Assistance to Foreign Atomic Energy Activities (Microsoft 365)
+- [SEC 17-4(a)](/compliance/regulatory/offering-sec-17a-4)
+- United States of America Privacy Act
+- US - Clarifying Lawful Overseas Use of Data (CLOUD) Act
+- US - Commission Statement and Guidance on Public Company Cybersecurity Disclosures
+- US - Department of Energy (DOE) Assistance to Foreign Atomic Energy Activities
- [US - Family Educational Rights and Privacy Act (FERPA)](/compliance/regulatory/offering-ferpa)-- US - Federal Information Security Modernization Act of 2014 (FISMA) (Microsoft 365)-- US - Protecting and Securing Chemical Facilities From Terrorist Attacks Act (Microsoft 365)
+- US - Federal Information Security Modernization Act of 2014 (FISMA)
+- US - Protecting and Securing Chemical Facilities From Terrorist Attacks Act
### US States and Territories -- Alabama - Policy 621: Data Breach Notification - DRAFT (Microsoft 365)-- Alaska - Chapter 48 - Personal Information Protection Act (Microsoft 365)-- Arizona - Notification of Breaches in Security Systems (Microsoft 365)-- Arkansas Code Title 4, Subtitle 7, Chapter 110, Personal Information Protection Act (Microsoft 365)
+- Alabama - Policy 621: Data Breach Notification - DRAFT
+- Alaska - Chapter 48 - Personal Information Protection Act
+- Arizona - Notification of Breaches in Security Systems
+- Arkansas Code Title 4, Subtitle 7, Chapter 110, Personal Information Protection Act
- California - Civil Code Section 1798 - California - Database Breach Act (California SB 1386) - California - Education Code-EDC, Title 3, Division 14, Part 65, Chapter 2.5- Social Media Privacy-- California - Privacy Rights Act (CPRA) (Microsoft 365)-- California - SB-327 Information Privacy: Connected Devices (Microsoft 365)-- California Consumer Credit Reporting Agencies Act (Microsoft 365)-- Colorado Privacy Act (CPA) (Microsoft 365)-- [California Consumer Privacy Act (CCPA)](/compliance/regulatory/offering-ccpa) (Microsoft 365)-- Colorado Protections for Consumer Data Privacy (Microsoft 365)-- Colorado Revised Statutes, Section 6-1-716, Notice of Security Breach (Microsoft 365)-- Connecticut - Display and Use of Social Security Numbers and Personal Information (Microsoft 365)-- Connecticut General Statutes - General Provisions for state contractors who receive confidential information (Microsoft 365)-- Connecticut Information Security Program to Safeguard Personal Information (Microsoft 365)-- Connecticut State Law - Breach of security re computerized data containing personal information (Microsoft 365)-- D.C. Law 16-237 - Consumer Personal Information Security Breach Notification Act (Microsoft 365)-- Delaware - Student Data Privacy Protection Act (Microsoft 365)
+- California - Privacy Rights Act (CPRA)
+- California - SB-327 Information Privacy: Connected Devices
+- California Consumer Credit Reporting Agencies Act
+- Colorado Privacy Act (CPA)
+- [California Consumer Privacy Act (CCPA)](/compliance/regulatory/offering-ccpa)
+- Colorado Protections for Consumer Data Privacy
+- Colorado Revised Statutes, Section 6-1-716, Notice of Security Breach
+- Connecticut - Display and Use of Social Security Numbers and Personal Information
+- Connecticut General Statutes - General Provisions for state contractors who receive confidential information
+- Connecticut Information Security Program to Safeguard Personal Information
+- Connecticut State Law - Breach of security re computerized data containing personal information
+- D.C. Law 16-237 - Consumer Personal Information Security Breach Notification Act
+- Delaware - Student Data Privacy Protection Act
- Delaware Computer Security Breaches- Commerce and Trade Subtitle II - 12B-100 to 12B-104-- Florida Title XXXII, Chapter 501, Section 501.171, Security of confidential personal information (Microsoft 365)-- Georgia (US) Personal Identity Protection Act (Microsoft 365)-- Guam's Notification of Breaches of Personal Information (Microsoft 365)
+- Florida Title XXXII, Chapter 501, Section 501.171, Security of confidential personal information
+- Georgia (US) Personal Identity Protection Act
+- Guam's Notification of Breaches of Personal Information
- Hawaii - Security Breach of Personal Information Chapter 487N-- Idaho Identity Theft (Microsoft 365)-- Illinois (740 ILCS 14/1) Biometric Information Privacy Act (Microsoft 365)-- Illinois Personal Information Protection Act (Microsoft 365)-- Indiana Disclosure of Security Breach (Microsoft 365)-- Iowa - Student Personal Information Protection Act (Microsoft 365)-- Iowa Code. Title XVI. Chapter 715C. Personal Information Security Breach Protection (Microsoft 365)-- Kansas Consumer Information, Security Breach Statute (Microsoft 365)-- Kentucky Data Breach Notification (Microsoft 365)-- Louisiana Database Security Breach Notification Law (Act No. 382) (Microsoft 365)
+- Idaho Identity Theft
+- Illinois (740 ILCS 14/1) Biometric Information Privacy Act
+- Illinois Personal Information Protection Act
+- Indiana Disclosure of Security Breach
+- Iowa - Student Personal Information Protection Act
+- Iowa Code. Title XVI. Chapter 715C. Personal Information Security Breach Protection
+- Kansas Consumer Information, Security Breach Statute
+- Kentucky Data Breach Notification
+- Louisiana Database Security Breach Notification Law (Act No. 382)
- Maine - Act to Protect the Privacy of Online Consumer Information-- Maine - Notice of Risk to Personal Data (Microsoft 365)-- Code of Maryland State Government - Protection of Information by Government Agencies (Microsoft 365)-- Maryland Personal Information Protection Act - Security Breach Notification Requirements, HB 1154 (Microsoft 365)-- Maryland's Student Data Privacy Act (Microsoft 365)
+- Maine - Notice of Risk to Personal Data
+- Code of Maryland State Government - Protection of Information by Government Agencies
+- Maryland Personal Information Protection Act - Security Breach Notification Requirements, HB 1154
+- Maryland's Student Data Privacy Act
- Massachusetts - 201 CMR 17.00: Standards For The Protection Of Personal Information Of Residents Of The Commonwealth-- Massachusetts Data Breach Notification Law 93H section 1-6 (Microsoft 365)-- Michigan Identity Theft Protection Act (Microsoft 365)-- Mississippi Security Breach Notification (Microsoft 365)-- Montana - Impediment of Identity Theft (Microsoft 365)-- Nebraska's Data Protection and Consumer Notification of Data Security Breach Act (Microsoft 365)-- Nevada Chapter 603A - Security and Privacy of Personal Information (Microsoft 365)-- Nevada Senate Bill 220 Online Privacy Law (Microsoft 365)-- New Hampshire Right to Privacy Act (Microsoft 365)-- New Jersey Security Breach Disclosure (Microsoft 365)-- New Mexico Chapter 57 - Privacy Protection (Article 57-12B-1 through 4) (Microsoft 365)-- New Mexico Consumer Information Privacy Act (Microsoft 365)-- New Mexico's Data Breach Notification Act (Microsoft 365)-- New York - 23 NYCRR Part 500 (Microsoft 365)-- New York City Administrative Code - Security Breach Notification (Microsoft 365)-- New York General Business Law - Data Security Breach Notification and Data Security Protections (Microsoft 365)-- New York Privacy Act - DRAFT (Microsoft 365)-- North Carolina - Identity Theft Protection Act (Microsoft 365)-- North Dakota Chapter 51-30 Notice of Security Breach for Personal Information (Microsoft 365)-- Ohio - Security Breach Notification (Microsoft 365)-- Ohio Data Protection Act 2018 (Microsoft 365)-- Oklahoma Security Breach Notification Act (Microsoft 365)-- Oregon Consumer Identity Theft Information Protection Act (Microsoft 365)-- Pennsylvania Breach of Personal Information Notification Act (Microsoft 365)-- Puerto Rico - Citizen Information on Data Banks Security Act (Microsoft 365)-- Rhode Island - Identity Theft Protection Act (Microsoft 365)-- South Carolina - Breach Notification (Microsoft 365)-- South Dakota - Notice of Breach (Microsoft 365)-- Tennessee 47-18-2107 Release of Personal Consumer Information (Microsoft 365)-- Texas - Identity Theft Enforcement and Protection Act (Microsoft 365)-- Texas Privacy Policy to Protect Social Security Numbers (Microsoft 365)-- Utah Consumer Credit Protection Act (Microsoft 365)-- Utah Electronic Information or Data Privacy (Microsoft 365)-- Vermont - Act on Data Privacy and Consumer Protection (Microsoft 365)-- Virginia Breach of Personal Information Act (Microsoft 365)-- Virginia Consumer Data Privacy Act (CDPA) (Microsoft 365)-- Washington DC - Consumer Security Breach Notification Standard (Microsoft 365)-- West Virginia - Breach of Security of Consumer Information (Microsoft 365)-- Wisconsin Security Breach Notification (Microsoft 365)
+- Massachusetts Data Breach Notification Law 93H section 1-6
+- Michigan Identity Theft Protection Act
+- Mississippi Security Breach Notification
+- Montana - Impediment of Identity Theft
+- Nebraska's Data Protection and Consumer Notification of Data Security Breach Act
+- Nevada Chapter 603A - Security and Privacy of Personal Information
+- Nevada Senate Bill 220 Online Privacy Law
+- New Hampshire Right to Privacy Act
+- New Jersey Security Breach Disclosure
+- New Mexico Chapter 57 - Privacy Protection (Article 57-12B-1 through 4)
+- New Mexico Consumer Information Privacy Act
+- New Mexico's Data Breach Notification Act
+- New York - 23 NYCRR Part 500
+- New York City Administrative Code - Security Breach Notification
+- New York General Business Law - Data Security Breach Notification and Data Security Protections
+- New York Privacy Act - DRAFT
+- North Carolina - Identity Theft Protection Act
+- North Dakota Chapter 51-30 Notice of Security Breach for Personal Information
+- Ohio - Security Breach Notification
+- Ohio Data Protection Act 2018
+- Oklahoma Security Breach Notification Act
+- Oregon Consumer Identity Theft Information Protection Act
+- Pennsylvania Breach of Personal Information Notification Act
+- Puerto Rico - Citizen Information on Data Banks Security Act
+- Rhode Island - Identity Theft Protection Act
+- South Carolina - Breach Notification
+- South Dakota - Notice of Breach
+- Tennessee 47-18-2107 Release of Personal Consumer Information
+- Texas - Identity Theft Enforcement and Protection Act
+- Texas Privacy Policy to Protect Social Security Numbers
+- Utah Consumer Credit Protection Act
+- Utah Electronic Information or Data Privacy
+- Vermont - Act on Data Privacy and Consumer Protection
+- Virginia Breach of Personal Information Act
+- Virginia Consumer Data Privacy Act (CDPA)
+- Washington DC - Consumer Security Breach Notification Standard
+- West Virginia - Breach of Security of Consumer Information
+- Wisconsin Security Breach Notification
### Regional #### Asia-Pacific Countries - Asia Pacific Economic Cooperation (APEC) Privacy Framework-- Australia - ASD Essential 8 (Microsoft 365)
+- Australia - ASD Essential 8
- Australia - ASD Essential 8 Maturity Level 1 - Australia - ASD Essential 8 Maturity Level 2 - Australia - ASD Essential 8 Maturity Level 3 - Australia - National Archives Act-- Australia - Public Records Office Victoria Recordkeeping Standards (Microsoft 365)-- Australia - Spam Act 2003 (Microsoft 365)-- Australia Privacy (Credit Reporting) Code (Microsoft 365)-- Australia Privacy Act (Microsoft 365)-- Australian Energy Sector Cyber Security Framework (AESCSF) (Microsoft 365)-- [Australian Information Security Registered Assessor Program (IRAP) Version 3](/compliance/regulatory/offering-ccsl-irap-australia) (Microsoft 365)-- [Australian Prudential Regulation Authority CPS](/compliance/regulatory/offering-apra-australia) (Microsoft 365)-- Victorian Protective Data Security Standards V2.0 (VPDSS 2.0) (Microsoft 365)-- Information Management Standard for Australian Government - National Archives of Australia (NAA) (Microsoft 365)-- China - Personal Information Security Specification (Microsoft 365)-- Cybersecurity Law of the People's Republic of China (Microsoft 365)-- Hong Kong - Personal Data (Privacy) Ordinance (Microsoft 365)
+- Australia - Public Records Office Victoria Recordkeeping Standards
+- Australia - Spam Act 2003
+- Australia Privacy (Credit Reporting) Code
+- Australia Privacy Act
+- Australian Energy Sector Cyber Security Framework (AESCSF)
+- [Australian Information Security Registered Assessor Program (IRAP) Version 3](/compliance/regulatory/offering-ccsl-irap-australia)
+- [Australian Prudential Regulation Authority CPS](/compliance/regulatory/offering-apra-australia)
+- Victorian Protective Data Security Standards V2.0 (VPDSS 2.0)
+- Information Management Standard for Australian Government - National Archives of Australia (NAA)
+- China - Personal Information Security Specification
+- Cybersecurity Law of the People's Republic of China
+- Hong Kong - Personal Data (Privacy) Ordinance
- India Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules-- India - Information Technology Act (Microsoft 365)-- [Reserve Bank of India Cyber Security Framework](/compliance/regulatory/offering-rbi-irdai-india) (Microsoft 365)-- Indonesia - Law 11/2008 (Microsoft 365)-- Japan - Act on Prohibition of Unauthorized Computer Access (Microsoft 365)-- Japan - Common Model of Information Security Measures for Government Agencies and Related Agencies (Microsoft 365)-- Japan - Common Standards for Information Security Measures for Government Agencies and Related Agencies (Microsoft 365)-- Japan Privacy Mark - JIS Q 15001 : 2017 (Microsoft 365)-- Japanese Act on the Protection of Personal Information (Law No. 57 of 2003) (Microsoft 365)-- Korea - Credit Information Use And Protection Act (Microsoft 365)-- Korea - The Act on Promotion of Information and Communications Network Utilization and Data Protection (Microsoft 365)-- Korea Personal Information Protection Act (Microsoft 365)-- Malaysia - Personal Data Protection Act (PDPA) (Microsoft 365)-- Malaysia Risk Management in Technology (RMiT) (Microsoft 365)
+- India - Information Technology Act
+- [Reserve Bank of India Cyber Security Framework](/compliance/regulatory/offering-rbi-irdai-india)
+- Indonesia - Law 11/2008
+- Japan - Act on Prohibition of Unauthorized Computer Access
+- Japan - Common Model of Information Security Measures for Government Agencies and Related Agencies
+- Japan - Common Standards for Information Security Measures for Government Agencies and Related Agencies
+- Japan Privacy Mark - JIS Q 15001 : 2017
+- Japanese Act on the Protection of Personal Information (Law No. 57 of 2003)
+- Korea - Credit Information Use And Protection Act
+- Korea - The Act on Promotion of Information and Communications Network Utilization and Data Protection
+- Korea Personal Information Protection Act
+- Malaysia - Personal Data Protection Act (PDPA)
+- Malaysia Risk Management in Technology (RMiT)
- Myanmar - Law Protecting the Privacy and Security of Citizens - Nepal - Right to Information Act-- New Zealand - Privacy Act / 2020 (Microsoft 365)-- New Zealand - Public Records Act (Microsoft 365)-- New Zealand - Reserve Bank BS11 Outsourcing Policy (Microsoft 365)-- New Zealand - Telecommunications Information Privacy Code (Microsoft 365)-- New Zealand Health Data Retention Policy (Microsoft 365)-- New Zealand Health Information Privacy Code (Microsoft 365)-- New Zealand Health Information Security Framework (HISF) (Microsoft 365)
+- New Zealand - Privacy Act / 2020
+- New Zealand - Public Records Act
+- New Zealand - Reserve Bank BS11 Outsourcing Policy
+- New Zealand - Telecommunications Information Privacy Code
+- New Zealand Health Data Retention Policy
+- New Zealand Health Information Privacy Code
+- New Zealand Health Information Security Framework (HISF)
- New Zealand Information Security Manual (NZISM)-- Pakistan - Electronic Data Protection Act - DRAFT (Microsoft 365)-- Philippines BSP Information Security Management Guidelines (Microsoft 365)-- Philippines Data Privacy Act of 2012 (Microsoft 365)-- Singapore - ABS Guidelines on Control Objectives and Procedures for Outsourced Service Providers (Microsoft 365)
+- Pakistan - Electronic Data Protection Act - DRAFT
+- Philippines BSP Information Security Management Guidelines
+- Philippines Data Privacy Act of 2012
+- Singapore - ABS Guidelines on Control Objectives and Procedures for Outsourced Service Providers
- Singapore - Banking Act (Cap.19)-- Singapore - Cybersecurity 2018 (Microsoft 365)-- Singapore - IMDA IoT Cyber Security Guide (Microsoft 365)-- Singapore - Monetary Authority of Singapore Technology Risk Management Framework (Microsoft 365)-- [Singapore - Multi-Tier Cloud Security (MTCS) Standard](/compliance/regulatory/offering-mtcs-singapore) (Microsoft 365)-- Singapore - Personal Data Protection Act / 2012 (Microsoft 365)-- Singapore Spam Control Act (Microsoft 365)-- Taiwan - Implementation Rules for the Internal Audit and Internal Control System of Electronic Payment Institutions - 2015 (Microsoft 365)
+- Singapore - Cybersecurity 2018
+- Singapore - IMDA IoT Cyber Security Guide
+- Singapore - Monetary Authority of Singapore Technology Risk Management Framework
+- [Singapore - Multi-Tier Cloud Security (MTCS) Standard](/compliance/regulatory/offering-mtcs-singapore)
+- Singapore - Personal Data Protection Act / 2012
+- Singapore Spam Control Act
+- Taiwan - Implementation Rules for the Internal Audit and Internal Control System of Electronic Payment Institutions - 2015
- Taiwan - Implementation Rules of Internal Audit and Internal Control System of Financial Holding Companies and Banking-- Taiwan - Regulations Governing Approval and Administration of Financial Information Service Enterprises Engaging in Interbank Funds Transfer and Settlement (Microsoft 365)-- Taiwan - Regulations Governing the Standards for Information System and Security Management of Electronic Payment Institutions (Microsoft 365)-- Taiwan Personal Data Protection Act (PDPA) (Microsoft 365)-- Thailand PDPA (Microsoft 365)-- Trade Secrets Act of The Republic of China (Microsoft 365)-- Law of The Republic of Uzbekistan on Personal Data (Microsoft 365)-- Vietnam - Consumer Rights Protection Law (Microsoft 365)-- Vietnam - Law of Cybersecurity (Microsoft 365)
+- Taiwan - Regulations Governing Approval and Administration of Financial Information Service Enterprises Engaging in Interbank Funds Transfer and Settlement
+- Taiwan - Regulations Governing the Standards for Information System and Security Management of Electronic Payment Institutions
+- Taiwan Personal Data Protection Act (PDPA)
+- Thailand PDPA
+- Trade Secrets Act of The Republic of China
+- Law of The Republic of Uzbekistan on Personal Data
+- Vietnam - Consumer Rights Protection Law
+- Vietnam - Law of Cybersecurity
- Vietnam - Law of Network Information Security-- Vietnam - Law on Information Technology (Microsoft 365)
+- Vietnam - Law on Information Technology
#### Europe, Middle East, and Africa (EMEA) - Albania - The Law on the Protection of Personal Data No. 9887-- Austrian Telecommunications Act 2003 (Microsoft 365)-- Armenia - Law of the Republic of Armenia on the Protection of Personal Data (Microsoft 365)-- Belarus Law On Information, Informatization and Protection of information (Microsoft 365)-- Belgium - Act on the Protection of Natural Persons with Regard to the Processing of Personal Data (Microsoft 365)-- [Belgium NBB Dec 2015](/compliance/regulatory/offering-nbb-fsma-belgium) (Microsoft 365)
+- Austrian Telecommunications Act 2003
+- Armenia - Law of the Republic of Armenia on the Protection of Personal Data
+- Belarus Law On Information, Informatization and Protection of information
+- Belgium - Act on the Protection of Natural Persons with Regard to the Processing of Personal Data
+- [Belgium NBB Dec 2015](/compliance/regulatory/offering-nbb-fsma-belgium)
- Bosnia and Herzegovina Law on the Protection of Personal Data-- Botswana - Data Protection Act (Microsoft 365)-- Bulgaria Law for Protection of Personal Data 2002 (Microsoft 365)-- Central Bank of Kuwait Cybersecurity Framework (Microsoft 365)-- Cyprus The Processing of Personal Data Law (Microsoft 365)-- Czech - Act No. 110/2019 Coll. on Personal Data Processing - 2019 (Microsoft 365)-- Czech - On Cyber Security and Change of Related Acts (Act on Cyber Security) - Act No. 181 (Microsoft 365)-- Denmark - The Data Protection Act (Microsoft 365)
+- Botswana - Data Protection Act
+- Bulgaria Law for Protection of Personal Data 2002
+- Central Bank of Kuwait Cybersecurity Framework
+- Cyprus The Processing of Personal Data Law
+- Czech - Act No. 110/2019 Coll. on Personal Data Processing - 2019
+- Czech - On Cyber Security and Change of Related Acts (Act on Cyber Security) - Act No. 181
+- Denmark - The Data Protection Act
- Denmark - Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment-- Directive 2013/40/EU Of The European Parliament And Of The Council (Microsoft 365)-- Dubai - Health Data Protection Regulation (Microsoft 365)-- Dubai Consumer Protection Regulations (Telecommunications Regulatory Authority)(Microsoft 365)-- Dubai ISR (Microsoft 365)-- Egypt - Data Protection Law (Microsoft 365)-- Estonia - Personal Data Protection Act (Microsoft 365)-- Estonia - The system of security measures for information systems (Microsoft 365)-- EU - Directive 2006/24/EC (Microsoft 365)-- EU - ePrivacy Directive 2002 58 EC (Microsoft 365)-- EudraLex - The Rules Governing Medicinal Products in the European Union (Microsoft 365)-- European Network and Information Security Agency (ENISA) - Cloud Computing Information Assurance Framework (Microsoft 365)-- Finland - Data Protection Act (Microsoft 365)
+- Directive 2013/40/EU Of The European Parliament And Of The Council
+- Dubai - Health Data Protection Regulation
+- Dubai Consumer Protection Regulations (Telecommunications Regulatory Authority)
+- Dubai ISR
+- Egypt - Data Protection Law
+- Estonia - Personal Data Protection Act
+- Estonia - The system of security measures for information systems
+- EU - Directive 2006/24/EC
+- EU - ePrivacy Directive 2002 58 EC
+- EudraLex - The Rules Governing Medicinal Products in the European Union
+- European Network and Information Security Agency (ENISA) - Cloud Computing Information Assurance Framework
+- Finland - Data Protection Act
- Finnish Criteria for Assessment of Information Security of Cloud Services-- France - The Data Protection Act (Microsoft 365)-- Georgia Law on Personal Data Protection (Microsoft 365)-- Germany - Annotated text of the Minimum Requirements for Risk Management (Microsoft 365)-- [Germany - Cloud Computing Compliance Controls Catalog (C5)](/compliance/regulatory/offering-c5-germany) (Microsoft 365)-- Germany - Federal Data Protection Act (Microsoft 365)-- Germany - Supervisory Requirements for IT in Financial Institutions (BAIT) (Microsoft 365)-- Ghana - Data Protection Act (Microsoft 365)-- Ireland Data Protection Act (Microsoft 365)-- Israel - Privacy Protection (Transfer of Data to Databases Abroad) Regulations (Microsoft 365)-- Israel Privacy Law (Microsoft 365)-- Jordan Cloud Platforms & Services Policy (Microsoft 365)-- Kenya Data Protection Act (Microsoft 365)-- Luxembourg Act (Microsoft 365)-- Malta - Data Protection Act (Microsoft 365)-- Mauritius Data Protection Act 2004 (Microsoft 365)-- Republic of Moldova Law on Personal Data Protection (Microsoft 365)-- Montenegro - Law on Personal Data Protection (Microsoft 365)-- Nigeria Data Protection Regulation (Microsoft 365)-- Oman - Electronic Transactions Law (Microsoft 365)
+- France - The Data Protection Act
+- Georgia Law on Personal Data Protection
+- Germany - Annotated text of the Minimum Requirements for Risk Management
+- [Germany - Cloud Computing Compliance Controls Catalog (C5)](/compliance/regulatory/offering-c5-germany)
+- Germany - Federal Data Protection Act
+- Germany - Supervisory Requirements for IT in Financial Institutions (BAIT)
+- Ghana - Data Protection Act
+- Ireland Data Protection Act
+- Israel - Privacy Protection (Transfer of Data to Databases Abroad) Regulations
+- Israel Privacy Law
+- Jordan Cloud Platforms & Services Policy
+- Kenya Data Protection Act
+- Luxembourg Act
+- Malta - Data Protection Act
+- Mauritius Data Protection Act 2004
+- Republic of Moldova Law on Personal Data Protection
+- Montenegro - Law on Personal Data Protection
+- Nigeria Data Protection Regulation
+- Oman - Electronic Transactions Law
- Qatar Cloud Security Policy-- Romania - Data Protection Law 190/2018 (Microsoft 365)
+- Romania - Data Protection Law 190/2018
- Russia - Federal Law 149-FZ On Information, Information Technology and Information Security-- [Russian Federation Federal Law Regarding Personal Data](/compliance/regulatory/offering-russia-data-localization) (Microsoft 365)-- South Africa Consumer Protection ACT 68 2008 (Microsoft 365)-- South Africa Electronic Communications and Transactions Act, 2002 (Microsoft 365)-- South Africa - Promotion of Access to Information Act (Microsoft 365)-- South African POPIA (Microsoft 365)-- Slovakia Act on the Protection of Personal Data (Microsoft 365)-- Spain - Nation Security Framework (Microsoft 365)-- Switzerland - Federal Act on Data Protection (FADP) (Microsoft 365)-- Turkey - KVKK Protection of Personal Data 6698 (Microsoft 365)-- UAE - Federal Decree Law on Combating Cyber Crimes (Microsoft 365)
+- [Russian Federation Federal Law Regarding Personal Data](/compliance/regulatory/offering-russia-data-localization)
+- South Africa Consumer Protection ACT 68 2008
+- South Africa Electronic Communications and Transactions Act, 2002
+- South Africa - Promotion of Access to Information Act
+- South African POPIA
+- Slovakia Act on the Protection of Personal Data
+- Spain - Nation Security Framework
+- Switzerland - Federal Act on Data Protection (FADP)
+- Turkey - KVKK Protection of Personal Data 6698
+- UAE - Federal Decree Law on Combating Cyber Crimes
- UAE - Federal Law Concerning Electronic Transactions and Commerce-- UAE - Federal Law No 2 of 2019 On the Use of the Information and Communication Technology (ICT) in Health Fields (Microsoft 365)-- UAE - NESA Information Assurance Standards (Microsoft 365)-- UAE Regulatory Policy TRA - Internet of Things (Microsoft 365)-- UAE's Federal Decree Law Regulating the Telecommunications Sector (Microsoft 365)-- Uganda - The Data Protection and Privacy Act (Microsoft 365)-- UK - Cyber Security for Defence Suppliers Standard 05-138 (Microsoft 365)-- UK - The Offshore Petroleum Activities Regulations / 2011 (Microsoft 365)-- [UK Cyber Essentials](/compliance/regulatory/offering-cyber-essentials-plus-uk) (Microsoft 365)-- UK Data Protection Act (Microsoft 365)-- UK Data Retention Act (Microsoft 365)-- UK Privacy and Electronic Communications (Microsoft 365)-- Ukraine - Protection of Personal Data Law (Microsoft 365)-- Yemen - Yemen Law of the Right of Access to Information (Microsoft 365)
+- UAE - Federal Law No 2 of 2019 On the Use of the Information and Communication Technology (ICT) in Health Fields
+- UAE - NESA Information Assurance Standards
+- UAE Regulatory Policy TRA - Internet of Things
+- UAE's Federal Decree Law Regulating the Telecommunications Sector
+- Uganda - The Data Protection and Privacy Act
+- UK - Cyber Security for Defence Suppliers Standard 05-138
+- UK - The Offshore Petroleum Activities Regulations / 2011
+- [UK Cyber Essentials](/compliance/regulatory/offering-cyber-essentials-plus-uk)
+- UK Data Protection Act
+- UK Data Retention Act
+- UK Privacy and Electronic Communications
+- Ukraine - Protection of Personal Data Law
+- Yemen - Yemen Law of the Right of Access to Information
#### Latin America -- Antigua and Barbuda - Data Protection Act /2013 (Microsoft 365)-- Bahamas - Data Protection Act (Microsoft 365)-- Barbados - Data Protection Bill 2019 (Microsoft 365)-- Barbados - Electronic Transactions Act (Microsoft 365)-- Bermuda - Electronic Transaction Act (Microsoft 365)-- Saint Lucia Data Protection Act (Microsoft 365)-- Trinidad and Tobago Data Protection (Act 13 of 2011) (Microsoft 365)
+- Antigua and Barbuda - Data Protection Act /2013
+- Bahamas - Data Protection Act
+- Barbados - Data Protection Bill 2019
+- Barbados - Electronic Transactions Act
+- Bermuda - Electronic Transaction Act
+- Saint Lucia Data Protection Act
+- Trinidad and Tobago Data Protection (Act 13 of 2011)
#### North America -- Canada - Breach of Security Safeguards Regulations (Microsoft 365)-- Canada - British Columbia - Information Privacy & Security - FOIPPA (Microsoft 365)-- [Canada - Office of the Superintendent of Financial Institutions Cyber Security Self-Assessment Guide](/compliance/regulatory/offering-osfi-canada) (Microsoft 365)-- Canada - Personal Health Information Protection Act (PHIPA) 2020 (Microsoft 365)-- Canada - Personal Information Protection and Electronic Documents Act (PIPEDA) (Microsoft 365)
+- Canada - Breach of Security Safeguards Regulations
+- Canada - British Columbia - Information Privacy & Security - FOIPPA
+- [Canada - Office of the Superintendent of Financial Institutions Cyber Security Self-Assessment Guide](/compliance/regulatory/offering-osfi-canada)
+- Canada - Personal Health Information Protection Act (PHIPA) 2020
+- Canada - Personal Information Protection and Electronic Documents Act (PIPEDA)
- Canada - Protected B-- Canada Cybersecure - Baseline Cyber Security Controls for Small and Medium Organizations (Microsoft 365)-- CAN-SPAM Act (Microsoft 365)-- Mexico - Federal Consumer Protection Law (Microsoft 365)-- Mexico - Federal Law on Protection of Personal Data Held by Private Parties (Microsoft 365)
+- Canada Cybersecure - Baseline Cyber Security Controls for Small and Medium Organizations
+- CAN-SPAM Act
+- Information Security Management Act - Province of British Columbia, CA
+- Mexico - Federal Consumer Protection Law
+- Mexico - Federal Law on Protection of Personal Data Held by Private Parties
#### South America -- [Argentina - Personal Data Protection Act 25.326](/compliance/regulatory/offering-pdpa-argentina) (Microsoft 365)
+- [Argentina - Personal Data Protection Act 25.326](/compliance/regulatory/offering-pdpa-argentina)
- Brazil - Consumer Protection Code Law No. 8078 (Office 365)-- Brazil - General Data Protection Law (LGPD) (Microsoft 365)-- Colombia - Decree No. 1377/2013 (Microsoft 365)-- Colombia - External Circular Letter 007 of 2018 (Microsoft 365)-- Colombia - Law 1266/2008- Habeas Data Act (Microsoft 365)
+- Brazil - General Data Protection Law (LGPD)
+- Colombia - Decree No. 1377/2013
+- Colombia - External Circular Letter 007 of 2018
+- Colombia - Law 1266/2008- Habeas Data Act
- Peruvian Legislation Law 29733 Law of Data Privacy Protection
compliance Compliance Manager Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-whats-new.md
description: "Find out whatΓÇÖs new in Compliance Manger and whatΓÇÖs to come. R
**In this article:** Learn about recent updates in Compliance Manager.
-## February 2022
+## March 2022
+
+### New templates available
+
+Compliance Manager has published the following new assessment templates:
+
+**Global**
+- ISO 37301
+- NIST 800-207 - Zero Trust Architecture
+- SIG 2022
+
+**US Government**
+- CMMC v2 Level 1
+- CMMC v2 Level 2
+
+**North America**
+- Information Security Management Act - Province of British Columbia, CA
+
+View our [full list of assessment templates](compliance-manager-templates-list.md).
### Continuous compliance assessment of improvement actions We're adding automated testing and evidence generation for over 35 improvement actions in Compliance Manager that were not previously covered by Secure Score. With continuous compliance assessment, you can receive updates about which of these improvement actions you've completed if they're relevant for your compliance assessments and you're licensed to access the relevant solutions. Continuous compliance assessment also gives users visibility into the scoring logic of your improvement actions and provides insight and evidence about why you received a certain score. This feature works alongside existing integrations with Microsoft 365 Secure Score, and any automated actions you've previously configured will continue to work as-is. Learn more about [automated testing settings](compliance-manager-setup.md#set-up-automated-testing).+
+## February 2022
+ ### Alerts and alert policies Users can now set alerts for changes in Compliance Manager that an organization wants to track. Using an easy setup wizard, you can build alert policies to create notifications when the following types of events happen: an improvement action score change, an improvement action assignment change, a testing or implementation status change in an improvement action, and a file upload or deletion in an improvement action's Documents tab. Learn more by visiting [Compliance Manager alerts and alert policies](compliance-manager-alert-policies.md).
compliance Customer Key Set Up https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customer-key-set-up.md
Before contacting the Microsoft 365 team, you must do the following steps for ea
- For enabling Customer Key for assigning DEPs to encrypt SharePoint Online and OneDrive for Business content (including Teams files) for all tenant users, contact [spock@microsoft.com](mailto:spock@microsoft.com).
- - For enabling Customer Key for assigning DEPs to encrypt content across multiple Microsoft 365 workloads (Exchange Online, Teams, MIP EDM) for all tenant users, contact [m365-ck@service.microsoft.com](mailto:m365-ck@service.microsoft.com).
+ - For enabling Customer Key for assigning DEPs to encrypt content across multiple Microsoft 365 workloads (Exchange Online, Teams, Microsoft Information Protection) for all tenant users, contact [m365-ck@service.microsoft.com](mailto:m365-ck@service.microsoft.com).
- Include the following information in your email:
You'll need to define three separate sets of permissions for each key vault, dep
- *vault name* is the name of the key vault you created. - For Exchange Online and Skype for Business, replace *Office 365 appID* with `00000002-0000-0ff1-ce00-000000000000` - For SharePoint Online, OneDrive for Business, and Teams files, replace *Office 365 appID* with `00000003-0000-0ff1-ce00-000000000000`
- - For multi-workload policy (Exchange, Teams, MIP EDM) that applies to all tenant users, replace *Office 365 appID* with `c066d759-24ae-40e7-a56f-027002b5d3e4`
+ - For multi-workload policy (Exchange, Teams, Microsoft Information Protection) that applies to all tenant users, replace *Office 365 appID* with `c066d759-24ae-40e7-a56f-027002b5d3e4`
Example: Setting permissions for Exchange Online and Skype for Business:
compliance Device Onboarding Mdm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-mdm.md
For more information on enabling MDM with Microsoft Intune, see [Device enrollme
## Onboard devices using Microsoft Intune
-Follow the instructions from [Intune](/intune/advanced-threat-protection).
-
+Follow the instructions from [Intune](/mem/intune/protect/advanced-threat-protection-configure).
+
> [!NOTE] > - The **Health Status for onboarded devices** policy uses read-only properties and can't be remediated.
compliance Information Barriers Edit Segments Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-edit-segments-policies.md
Title: "Manage information barrier policies"
-description: "Learn how to edit or remove policies for information barriers."
+ Title: "Manage information barriers policies"
+description: "Learn how to edit or remove policies and segments for information barriers."
f1.keywords:
- NOCSH
-# Manage information barrier policies
+# Manage information barriers policies
-After you have [defined information barrier policies](information-barriers-policies.md), you might need to make changes to those policies or to your user segments, as part of [troubleshooting](/office365/troubleshoot/information-barriers/information-barriers-troubleshooting) or as regular maintenance.
+After you have [defined information barriers policies](information-barriers-policies.md), you might need to make changes to policies or user segments as part of [troubleshooting](/office365/troubleshoot/information-barriers/information-barriers-troubleshooting) or for regular maintenance.
## What do you want to do? |**Action**|**Description**| |:|:--|
-| [Edit user account attributes](#edit-user-account-attributes) | Fill in attributes in Azure Active Directory that can be used to define segments.<br/>Edit user account attributes when users are not included in segments they should be, to change which segments users are in, or to define segments using different attributes. |
-| [Edit a segment](#edit-a-segment) | Edit segments when you want to change how a segment is defined. <br/>For example, you might have originally defined segments using *Department* and now want to use another attribute, such as *MemberOf*. |
-| [Edit a policy](#edit-a-policy) | Edit an information barrier policy when you want to change how a policy works.<br/>For example, instead of blocking communications between two segments, you might decide you want to allow communications to occur only between certain segments. |
+| [Edit user account attributes](#edit-user-account-attributes) | Fill in attributes in Azure Active Directory that can be used to define segments. <br> Edit user account attributes when users aren't included in segments they should be, to change which segments users are in, or to define segments using different attributes. |
+| [Edit a segment](#edit-a-segment) | Edit segments when you want to change how a segment is defined. <br> For example, you might have originally defined segments using *Department* and now want to use another attribute, such as *MemberOf*. |
+| [Edit a policy](#edit-a-policy) | Edit an information barriers policy when you want to change how a policy works.<br> For example, instead of blocking communications between two segments, you might decide you want to allow communications to occur only between certain segments. |
| [Set a policy to inactive status](#set-a-policy-to-inactive-status) |Set a policy to inactive status when you want to make changes to a policy, or when you don't want a policy to be in effect. |
-| [Remove a policy](#remove-a-policy) | Remove an information barrier policy when you no longer need a particular policy in place. |
-| [Stop a policy application](#stop-a-policy-application) | Take this action when you want to stop the process of applying information barrier policies.<br/> Stopping a policy application is not instant, and it does not undo policies that are already applied to users. |
-| [Define policies for information barriers](information-barriers-policies.md) | Define an information barrier policy when you do not already have such policies in place, and you must restrict or limit communications between specific groups of users. |
+| [Remove a policy](#remove-a-policy) | Remove an information barriers policy when you no longer need a particular policy in place. |
+| [Remove a segment](#remove-a-segment) | Remove an information barriers segment when you no longer need a particular segment. |
+| [Remove a policy and a segment](#remove-a-policy-and-segment) | Remove an information barriers policy and a segment at the same time. |
+| [Stop a policy application](#stop-a-policy-application) | Take this action when you want to stop the process of applying information barriers policies. <br> Stopping a policy application isn't instant, and it doesn't undo policies that are already applied to users. |
+| [Define policies for information barriers](information-barriers-policies.md) | Define an information barriers policy when you don't already have such policies in place, and you must restrict or limit communications between specific groups of users. |
| [Troubleshooting information barriers](/office365/troubleshoot/information-barriers/information-barriers-troubleshooting) | Refer to this article when you run into unexpected issues with information barriers. |
-> [!IMPORTANT]
-> To perform the tasks described in this article, you must be assigned an appropriate role, such as one of the following:<br/>- Microsoft 365 Enterprise Global Administrator<br/>- Global Administrator<br/>- Compliance Administrator<br/>- IB Compliance Management (this is a new role!)<br><br>To learn more about prerequisites for information barriers, see [Prerequisites (for information barrier policies)](information-barriers-policies.md#step-1-make-sure-prerequisites-are-met).<br><br> Make sure to [connect to the Security & Compliance Center PowerShell](/powershell/exchange/connect-to-scc-powershell).
+>[!IMPORTANT]
+>To perform the tasks described in this article, you must be assigned an appropriate role, such as one of the following:<br>- Microsoft 365 Enterprise Global Administrator<br>- Global Administrator<br>- Compliance Administrator<br>- IB Compliance Management (this is a new role!)<br><br>To learn more about prerequisites for information barriers, see [Prerequisites (for information barriers policies)](information-barriers-policies.md#step-1-make-sure-prerequisites-are-met).<br><br> Make sure to [connect to the Security & Compliance Center PowerShell](/powershell/exchange/connect-to-scc-powershell).
## Edit user account attributes
-Use this procedure to edit attributes that are used for segmenting users. For example, if you are using a Department attribute, and one or more user accounts do not currently have any values listed for Department, you must edit those user accounts to include Department information. User account attributes are used for defining segments so that information barrier policies can be assigned.
+Use this procedure to edit attributes that are used for segmenting users. For example, if you're using a Department attribute, and one or more user accounts don't currently have any values listed for Department, you must edit those user accounts to include Department information. User account attributes are used for defining segments so that information barriers policies can be assigned.
1. To view details for a specific user account, such as attribute values and assigned segment(s), use the **Get-InformationBarrierRecipientStatus** cmdlet with Identity parameters. |**Syntax**|**Example**| |:|:-|
- | `Get-InformationBarrierRecipientStatus -Identity <value> -Identity2 <value>` <p> You can use any value that uniquely identifies each user, such as name, alias, distinguished name, canonical domain name, email address, or GUID. <p> (You can also use this cmdlet for a single user: `Get-InformationBarrierRecipientStatus -Identity <value>`) |`Get-InformationBarrierRecipientStatus -Identity meganb -Identity2 alexw` <p> In this example, we refer to two user accounts in Office 365: *meganb* for *Megan*, and *alexw* for *Alex*. |
+ | `Get-InformationBarrierRecipientStatus -Identity <value> -Identity2 <value>` <br> You can use any value that uniquely identifies each user, such as name, alias, distinguished name, canonical domain name, email address, or GUID. <br> (You can also use this cmdlet for a single user: `Get-InformationBarrierRecipientStatus -Identity <value>`) |`Get-InformationBarrierRecipientStatus -Identity meganb -Identity2 alexw` <br> In this example, we refer to two user accounts in Office 365: *meganb* for *Megan*, and *alexw* for *Alex*. |
-2. Determine which attribute you want to edit for your user account profile(s). For more information, see [Attributes for information barrier policies](information-barriers-attributes.md).
+2. Determine which attribute you want to edit for your user account profile(s). For more information, see [Attributes for information barriers policies](information-barriers-attributes.md).
3. Edit one or more user accounts to include values for the attribute you selected in the previous step. To take this action, use one of the following procedures:
Use this procedure edit the definition of a user segment. For example, you might
Syntax: `Get-OrganizationSegment`
- You will see a list of segments and details for each, such as segment type, its UserGroupFilter value, who created or last modified it, GUID, and so on.
+ You'll see a list of segments and details for each, such as segment type, its UserGroupFilter value, who created or last modified it, GUID, and so on.
> [!TIP] > Print or save your list of segments for reference later. For example, if you want to edit a segment, you will need to know its name or identify value (this is used with the Identity parameter).
Use this procedure edit the definition of a user segment. For example, you might
|**Syntax**|**Example**| |:|:-|
- | `Set-OrganizationSegment -Identity GUID -UserGroupFilter "attribute -eq 'attributevalue'"` |`Set-OrganizationSegment -Identity c96e0837-c232-4a8a-841e-ef45787d8fcd -UserGroupFilter "Department -eq 'HRDept'"` <p> In this example, for the segment that has the GUID *c96e0837-c232-4a8a-841e-ef45787d8fcd*, we updated the department name to "HRDept". |
+ | `Set-OrganizationSegment -Identity GUID -UserGroupFilter "attribute -eq 'attributevalue'"` |`Set-OrganizationSegment -Identity c96e0837-c232-4a8a-841e-ef45787d8fcd -UserGroupFilter "Department -eq 'HRDept'"` <br> In this example, we updated the department name to *HRDept* for the segment with GUID *c96e0837-c232-4a8a-841e-ef45787d8fcd*. |
-When you have finished editing segments for your organization, you can either [define](information-barriers-policies.md#step-3-define-information-barrier-policies) or [edit](#edit-a-policy) information barrier policies.
+3. When you have finished editing segments for your organization, you can either [define](information-barriers-policies.md#step-3-define-information-barrier-policies) or [edit](#edit-a-policy) information barriers policies.
## Edit a policy
-1. To view a list of current information barrier policies, use the **Get-InformationBarrierPolicy** cmdlet.
+1. To view a list of current information barriers policies, use the **Get-InformationBarrierPolicy** cmdlet.
Syntax: `Get-InformationBarrierPolicy`
When you have finished editing segments for your organization, you can either [d
Suppose we want to change it so that people in the *Research* segment can only communicate with people in the *HR* segment. To make this change, we use this cmdlet: `Set-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c93772471 -SegmentsAllowed "HR"`
- In this example, we changed "SegmentsBlocked" to "SegmentsAllowed" and specified the *HR* segment.
+ In this example, we changed *SegmentsBlocked* to *SegmentsAllowed* and specified the *HR* segment.
-3. When you are finished editing a policy, make sure to apply your changes. (See [Apply information barrier policies](information-barriers-policies.md#step-4-apply-information-barrier-policies).)
+3. When you have finished editing a policy, make sure to apply your changes. (See [Apply information barriers policies](information-barriers-policies.md#step-4-apply-information-barrier-policies).)
## Set a policy to inactive status
-1. To view a list of current information barrier policies, use the **Get-InformationBarrierPolicy** cmdlet.
+1. To view a list of current information barriers policies, use the **Get-InformationBarrierPolicy** cmdlet.
Syntax: `Get-InformationBarrierPolicy` In the list of results, identify the policy that you want to change (or remove). Note the policy's GUID and name.
-2. To set the policy's status to inactive, use the **Set-InformationBarrierPolicy** cmdlet with an Identity parameter and the State parameter set to Inactive.
+2. To set the policy's status to inactive, use the **Set-InformationBarrierPolicy** cmdlet with an *Identity* parameter and the *State* parameter set to *Inactive*.
|**Syntax**|**Example**| |:|:-|
- | `Set-InformationBarrierPolicy -Identity GUID -State Inactive` | `Set-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c9377247 -State Inactive` <p> In this example, we set an information barrier policy that has GUID *43c37853-ea10-4b90-a23d-ab8c9377247* to an inactive status. |
+ | `Set-InformationBarrierPolicy -Identity GUID -State Inactive` | `Set-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c9377247 -State Inactive` <br> In this example, the information barriers policy that has GUID *43c37853-ea10-4b90-a23d-ab8c9377247* is set to an inactive status. |
3. To apply your changes, use the **Start-InformationBarrierPoliciesApplication** cmdlet. Syntax: `Start-InformationBarrierPoliciesApplication`
- Changes are applied, user by user, for your organization. If your organization is large, it can take 24 hours (or more) for this process to complete. (As a general guideline, it takes about an hour to process 5,000 user accounts.)
+ Changes are applied user-by-user for your organization. If your organization is large, it can take 24 hours (or more) for this process to complete. As a general guideline, it takes about an hour to process 5,000 user accounts.
-At this point, one or more information barrier policies are set to inactive status. From here, you can do any of the following actions:
+4. At this point, one or more information barriers policies are set to inactive status. From here, you can do any of the following actions:
-- Keep it as is (a policy set to inactive status has no effect on users)-- [Edit a policy](#edit-a-policy) -- [Remove a policy](#remove-a-policy)
+ - Keep it as is (a policy set to inactive status has no effect on users)
+ - [Edit a policy](#edit-a-policy)
+ - [Remove a policy](#remove-a-policy)
## Remove a policy
-1. To view a list of current information barrier policies, use the **Get-InformationBarrierPolicy** cmdlet.
+1. To view a list of current information barriers policies, use the **Get-InformationBarrierPolicy** cmdlet.
Syntax: `Get-InformationBarrierPolicy`
- In the list of results, identify the policy that you want to remove. Note the policy's GUID and name. Make sure the policy is set to inactive status.
+ In the list of results, identify the policy that you want to remove. Note the policy's GUID and name.
-2. Use the **Remove-InformationBarrierPolicy** cmdlet with an Identity parameter.
+2. Make sure the policy is set to inactive status. To set the policy's status to inactive, use the Set-InformationBarrierPolicy cmdlet with an Identity parameter and the State parameter set to Inactive.
|**Syntax**|**Example**| |:|:-|
- | `Remove-InformationBarrierPolicy -Identity GUID` | `Remove-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c93772471` <p> In this example, we are removing the policy that has GUID *43c37853-ea10-4b90-a23d-ab8c93772471*. |
+ | `Set-InformationBarrierPolicy -Identity GUID -State Inactive` | `Set-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c9377247 -State Inactive` <br> In this example, we set an information barriers policy that has GUID *43c37853-ea10-4b90-a23d-ab8c9377247* to an inactive status. |
+
+3. To apply your changes on the policy, use the **Start-InformationBarrierPoliciesApplication** cmdlet.
+
+ Syntax: `Start-InformationBarrierPoliciesApplication`
+
+ Changes are applied user-by-user for your organization. If your organization is large, it can take 24 hours (or more) for this process to complete. As a general guideline, it takes about an hour to process 5,000 user accounts.
+
+4. Use the **Remove-InformationBarrierPolicy** cmdlet with an Identity parameter.
+
+ |**Syntax**|**Example**|
+ |:|:-|
+ | `Remove-InformationBarrierPolicy -Identity GUID` | `Remove-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c93772471` <br> In this example, we're removing the policy that has GUID *43c37853-ea10-4b90-a23d-ab8c93772471*. |
When prompted, confirm the change.
-3. Repeat steps 1-2 for each policy you want to remove.
+## Remove a segment
-4. When you are finished removing policies, apply your changes. To take this action, use the **Start-InformationBarrierPoliciesApplication** cmdlet.
+1. To view all existing segments, use the **Get-OrganizationSegment** cmdlet.
- Syntax: `Start-InformationBarrierPoliciesApplication`
+ Syntax: `Get-OrganizationSegment`
+
+ You'll see a list of segments and details for each, such as segment type, its UserGroupFilter value, who created or last modified it, GUID, and so on.
+
+ >[!TIP]
+ >Print or save your list of segments for reference later. For example, if you want to edit a segment, you will need to know its name or identify value (this is used with the Identity parameter).
+
+2. Identify the segment to be removed and make sure the IB policy associated with the segment has been removed. See the [Remove a policy](#remove-a-policy) procedure for details.
+
+3. Edit the segment that will be removed to remove the relationship of users to that segment. This action updates the segment definition and removes all users from the segment. You'll use the UserGroupFilter parameter to disassociate users from the segment prior to removal.
- Changes are applied, user by user, for your organization. If your organization is large, it can take 24 hours (or more) for this process to complete.
+ To edit a segment, use the **Set-OrganizationSegment** cmdlet with the *Identity* parameter and relevant details.
+
+ |**Syntax**|**Example**|
+ |:|:-|
+ | `Set-OrganizationSegment -Identity GUID -UserGroupFilter "attribute -eq 'attributevalue'"` | `Set-OrganizationSegment -Identity c96e0837-c232-4a8a-841e-ef45787d8fcd -UserGroupFilter "Department -eq 'FakeDept'"` <br> In this example, for the segment that has the GUID c96e0837-c232-4a8a-841e-ef45787d8fcd, we defined the department name as *FakeDept* to remove users from the segment. This example uses the *Department* attribute, but you can use other attributes as appropriate. The example uses *FakeDept* because this doesn't exist and is certain to not contain any users. |
+
+4. To apply your changes, use the **Start-InformationBarrierPoliciesApplication** cmdlet.
+
+ Syntax: `Start-InformationBarrierPoliciesApplication -CleanupGroupSegmentLink`
+
+ >[!NOTE]
+ >The *CleanupGroupSegmentLink* attribute removes group associations with the segment with no user associations.
+
+ Changes are applied user-by-user for your organization. If your organization is large, it can take 24 hours (or more) for this process to complete. As a general guideline, it takes about an hour to process 5,000 user accounts.
+
+5. To remove a segment, use the **Remove-OrganizationSegment** cmdlet with the *Identity* parameter and relevant details.
+
+ |**Syntax**|**Example**|
+ |:|:-|
+ | `Remove-OrganizationSegment -Identity GUID` | `Remove-OrganizationSegment -Identity c96e0837-c232-4a8a-841e-ef45787d8fcd` <br> In this example, the segment that has the GUID c96e0837-c232-4a8a-841e-ef45787d8fcd, was removed. |
+
+## Remove a policy and segment
+
+1. To view a list of current information barriers policies, use the **Get-InformationBarrierPolicy** cmdlet.
+
+ Syntax: `Get-InformationBarrierPolicy`
+
+ In the list of results, identify the policy that you want to remove. Note the policy's GUID and name.
+
+2. To view all existing segments, use the **Get-OrganizationSegment** cmdlet.
+
+ Syntax: `Get-OrganizationSegment`
+
+ You'll see a list of segments and details for each, such as segment type, its *UserGroupFilter* parameter value, who created or last modified it, GUID, and so on.
+
+ >[!TIP]
+ >Print or save your list of segments for reference later. For example, if you want to edit a segment, you will need to know its name or identify value (this is used with the Identity parameter).
+
+3. To set the status of the policy to be removed to inactive, use the **Set-InformationBarrierPolicy** cmdlet with an *Identity* parameter and the *State* parameter set to *Inactive*.
+
+ |**Syntax**|**Example**|
+ |:|:-|
+ | `Set-InformationBarrierPolicy -Identity GUID -State Inactive` | `Set-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c93772471 -State Inactive` <br> In this example, we set an information barriers policy that has GUID 43c37853-ea10-4b90-a23d-ab8c93772471 to an inactive status. |
+
+4. Edit the segment that will be removed to remove the relationship of users to that segment. This action updates the segment definition and removes all users from the segment. You'll use the *UserGroupFilter* parameter to disassociate users from the segment prior to removal.
+
+ To edit a segment, use the **Set-OrganizationSegment** cmdlet with the *Identity* parameter and relevant details.
+
+ |**Syntax**|**Example**|
+ |:|:-|
+ | `Set-OrganizationSegment -Identity GUID -UserGroupFilter "attribute -eq 'attributevalue'"` | `Set-OrganizationSegment -Identity c96e0837-c232-4a8a-841e-ef45787d8fcd -UserGroupFilter "Department -eq 'FakeDept'"` <br> In this example, for the segment that has the GUID c96e0837-c232-4a8a-841e-ef45787d8fcd, we updated the department name to *FakeDept* to remove users from the segment. This example uses the *Department* attribute, but you can use other attributes as appropriate. The example uses *FakeDept* because this doesn't exist and is certain to contain no users. |
+
+5. To apply your changes, use the **Start-InformationBarrierPoliciesApplication** cmdlet.
+
+ Syntax: `Start-InformationBarrierPoliciesApplication -CleanupGroupSegmentLink`
+
+ >[!NOTE]
+ >The *CleanupGroupSegmentLink* attribute removes group associations with the segment with no user associations.
+
+ Changes are applied user-by-user for your organization. If your organization is large, it can take 24 hours (or more) for this process to complete. As a general guideline, it takes about an hour to process 5,000 user accounts.
+
+6. Use the **Remove-InformationBarrierPolicy** cmdlet with an *Identity* parameter.
+
+ |**Syntax**|**Example**|
+ |:|:-|
+ | `Remove-InformationBarrierPolicy -Identity GUID` | `Remove-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c93772471` <br> In this example, the policy that has GUID *43c37853-ea10-4b90-a23d-ab8c93772471* is removed. |
+
+ When prompted, confirm the change.
+
+7. To remove a segment, use the **Remove-OrganizationSegment** cmdlet with the *Identity* parameter and relevant details.
+
+ |**Syntax**|**Example**|
+ |:|:-|
+ | `Remove-OrganizationSegment -Identity GUID` | `Remove-OrganizationSegment -Identity c96e0837-c232-4a8a-841e-ef45787d8fcd` <br> In this example, the segment with GUID c96e0837-c232-4a8a-841e-ef45787d8fcd was removed. |
## Stop a policy application
-After you have started applying information barrier policies, if you want to stop those policies from being applied, use the following procedure. It will take approximately 30-35 minutes for the process to begin.
+After you have started applying information barriers policies, if you want to stop those policies from being applied, use the following procedure. It will take approximately 30-35 minutes for the process to begin.
-1. To view the status of the most recent information barrier policy application, use the **Get-InformationBarrierPoliciesApplicationStatus** cmdlet.
+1. To view the status of the most recent information barriers policy application, use the **Get-InformationBarrierPoliciesApplicationStatus** cmdlet.
Syntax: `Get-InformationBarrierPoliciesApplicationStatus`
After you have started applying information barrier policies, if you want to sto
|**Syntax**|**Example**| |:|:-|
- | `Stop-InformationBarrierPoliciesApplication -Identity GUID` | `Stop-InformationBarrierPoliciesApplication -Identity 46237888-12ca-42e3-a541-3fcb7b5231d1` <p> In this example, we are stopping information barrier policies from being applied. |
+ | `Stop-InformationBarrierPoliciesApplication -Identity GUID` | `Stop-InformationBarrierPoliciesApplication -Identity 46237888-12ca-42e3-a541-3fcb7b5231d1` <p> In this example, we're stopping information barriers policies from being applied. |
## Resources
After you have started applying information barrier policies, if you want to sto
- [Learn more about information barriers in Microsoft Teams](/MicrosoftTeams/information-barriers-in-teams) - [Learn more about information barriers in SharePoint Online](/sharepoint/information-barriers) - [Learn more about information barriers in OneDrive](/onedrive/information-barriers)-- [Attributes for information barrier policies](information-barriers-attributes.md)
+- [Attributes for information barriers policies](information-barriers-attributes.md)
- [Troubleshooting information barriers](/office365/troubleshoot/information-barriers/information-barriers-troubleshooting)
compliance Ome Advanced Message Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ome-advanced-message-encryption.md
audience: Admin
ms.localizationpriority: medium Previously updated : 03/04/2022 Last updated : 04/01/2022 - Strat_O365_IP - M365-security-compliance
description: "Advanced Message Encryption helps organizations meet their complia
# Advanced Message Encryption
-Office 365 Advanced Message Encryption is included in [Microsoft 365 Enterprise E5](https://www.microsoft.com/microsoft-365/enterprise/home), Office 365 E5, Microsoft 365 E5 (Nonprofit Staff Pricing), Office 365 Enterprise E5 (Nonprofit Staff Pricing), and Office 365 Education A5. If your organization has a subscription that does not include Office 365 Advanced Message Encryption, you can purchase it with the Microsoft 365 E5 Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), or the Office 365 Advanced Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), Office 365 SKUs, or the Microsoft 365 E5/A5 Information Protection and Governance SKU add-on for Microsoft 365 A3/E3.
+Office 365 Advanced Message Encryption is included in [Microsoft 365 Enterprise E5](https://www.microsoft.com/microsoft-365/enterprise/home), Office 365 E5, Microsoft 365 E5 (Nonprofit Staff Pricing), Office 365 Enterprise E5 (Nonprofit Staff Pricing), and Office 365 Education A5. To use the Advanced Message Encryption revocation and expiration functions, enable the **Premium Encryption in Office 365** option in your E5 license.
+
+If your organization has a subscription that does not include Office 365 Advanced Message Encryption, you can purchase it with the Microsoft 365 E5 Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), or the Office 365 Advanced Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), Office 365 SKUs, or the Microsoft 365 E5/A5 Information Protection and Governance SKU add-on for Microsoft 365 A3/E3.
Advanced Message Encryption helps customers meet compliance obligations that require more flexible controls over external recipients and their access to encrypted emails. With Advanced Message Encryption in Office 365, you can control sensitive emails shared outside the organization with automatic policies. You configure these policies to identify sensitive information types such as PII, Financial, or Health IDs, or you can use keywords to enhance protection. Once you've configured the policies, you pair policies with custom branded email templates and then add an expiration date for extra control of emails that fit the policy. Also, admins can further control encrypted emails accessed externally through a secure web portal by revoking access to the mail at any time.
contentunderstanding Apply A Sensitivity Label To A Model https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/contentunderstanding/apply-a-sensitivity-label-to-a-model.md
Sensitivity labels let you apply encryption to the documents that your models id
You can apply a pre-existing sensitivity label to your model through your model settings on your model's home page. The label must already be published to be available for selection from model settings. Labels apply to Office files for Word (.docx), PowerPoint (.pptx), and Excel (.xlsx). > [!Important]
-> For sensitivity labels to be available to apply to your document understanding models, they need to be [created and published in the Microsoft 365 Compliance Center](../admin/security-and-compliance/set-up-compliance.md).
+> For sensitivity labels to be available to apply to your document understanding models, they need to be created and published in the [Microsoft 365 Compliance Center](../compliance/microsoft-365-compliance-center.md).
## Add a sensitivity label to a document understanding model
For example, all financial documents that your model identifies also will have t
## Add a sensitivity label to a form processing model > [!Important]
-> For sensitivity labels to be available to apply to your form processing model, they need to be [created and published in the Microsoft 365 Compliance Center](../admin/security-and-compliance/set-up-compliance.md).
+> For sensitivity labels to be available to apply to your form processing model, they need to be [created and published in the Microsoft 365 Compliance Center](../business-premium/m365bp-set-up-compliance.md).
You can either apply a sensitivity label to a form processing model when you are creating a model, or apply it to an existing model.
enterprise Cloud Services Roadmap Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/cloud-services-roadmap-microsoft-365.md
description: The roadmap to set up your cloud services for Microsoft 365.
To get the creativity, teamwork, and productivity benefits of Microsoft 365 for enterprise, deploy the cloud services that best fit your organization's needs.
-If you have existing server-based deployments for Exchange, SharePoint, or Skype for Business and want to migrate your entire organization to Microsoft 365 for enterprise, see the [client and server software roadmap](client-server-software-roadmap-microsoft-365.md). This roadmap includes Microsoft Office client products, on-premises Office Server products, and Microsoft Windows&ndash;based devices.
+If you have existing server-based deployments for Exchange, SharePoint, or Skype for Business and want to migrate your entire organization to Microsoft 365 for enterprise, see the [client and server software roadmap](client-server-software-roadmap-microsoft-365.md). This roadmap includes Microsoft Office client products, on-premises Office Server products, and Microsoft Windows-based devices.
## Deploy
To deploy your cloud
- [Migrate your on-premises data to Microsoft 365](migrate-data-to-office-365.md) - Get your cloud services set up for your users - [Exchange Online](/Exchange/exchange-online)
- - [SharePoint Online](/sharepoint/sharepoint-online)
- - [Skype for Business](/SkypeForBusiness/skype-for-business-online)
+ - [SharePoint](/sharepoint/sharepoint-online)
- [Microsoft Teams](/MicrosoftTeams/Teams-overview) - [Yammer](https://support.office.com/article/e1464355-1f97-49ac-b2aa-dd320b179dbe) - [Train your users](/office365/admin/admin-overview/get-started-with-office-365#training-resources-for-your-users)
To manage your cloud
- [Understand your support options](../admin/get-help-support.md) - Administer your cloud services - [Exchange Online](/Exchange/exchange-online)
- - [SharePoint Online](https://support.office.com/article/79eb0420-8cbd-4bcb-a90b-ddc7d3ab4b3a)
+ - [SharePoint](https://support.office.com/article/79eb0420-8cbd-4bcb-a90b-ddc7d3ab4b3a)
- [Skype for Business](/SkypeForBusiness/skype-for-business-online)
- - [Microsoft Teams](//MicrosoftTeams/quality-of-experience-review-guide)
+ - [Teams](/MicrosoftTeams/quality-of-experience-review-guide)
- [Yammer](https://support.office.com/article/e1464355-1f97-49ac-b2aa-dd320b179dbe) - [Perform performance tuning for your cloud services](tune-microsoft-365-performance.md)
For information about how Microsoft IT has deployed or is managing Microsoft 365
## Next step
-Start your cloud services implementation. For guidance, see [Configure Microsoft 365 Enterprise services and applications](configure-services-and-applications.md).
+Start your cloud services implementation. For guidance, see [Configure Microsoft 365 Enterprise services and applications](configure-services-and-applications.md).
enterprise Configure Services And Applications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/configure-services-and-applications.md
search.appverid:
ms.assetid: 7cec08a5-97fd-4761-b23b-ef3d66519e30 f1.keywords: - NOCSH
-description: Configure Microsoft 365 Enterprise services and applications, such as SharePoint, Exchange, and Skype for Business.
+description: Configure Microsoft 365 Enterprise services and applications, such as SharePoint, Exchange, and Microsoft Teams.
# Configure Microsoft 365 Enterprise services and applications
-Our [basic set up instructions](../admin/setup/setup.md) help you get everyone using your Microsoft 365 services and applications in the shortest time possible. Sometimes getting things configured before everyone starts using them is preferred. For example if you want to configure mail routing , file storage, or sharing policies.
+Our [basic set up instructions](../admin/setup/setup.md) help you get everyone using your Microsoft 365 services and applications in the shortest time possible. Sometimes getting things configured before everyone starts using them is preferred. For example if you want to configure mail routing, file storage, or sharing policies.
If you want help getting Microsoft 365 set up, use **[FastTrack](https://www.microsoft.com/fasttrack/microsoft-365)** or the [Setup guides for Microsoft 365 and Office 365 services](setup-guides-for-microsoft-365.md). |**Services & applications**|**Resources**| |:--|:--|
-|**Microsoft 365 Suite** |- [Add your company branding to Microsoft 365 Sign In Page](https://support.office.com/article/Add-your-company-branding-to-Office-365-Sign-In-Page-a1229cdb-ce19-4da5-90c7-2b9b146aef0a) <br> - [Add customized help desk info to the Microsoft 365 help pane](https://support.office.com/article/Add-customized-help-desk-info-to-the-Office-365-help-pane-9dd9b104-68f7-4d49-9a30-82561c7d79a3) <br> - [Add integration with Azure AD and other applications](https://support.office.com/article/Integrated-Apps-and-Azure-AD-for-Office-365-administrators-cb2250e3-451e-416f-bf4e-363549652c2a). <br> - [Learn more about using groups](https://support.office.com/Article/Learn-more-about-groups-b565caa1-5c40-40ef-9915-60fdb2d97fa2) to collaborate with email, calendar, documents, and chat <br> - [Activate and use mobile device management in Microsoft 365](https://support.office.microsoft.com/article/Manage-mobile-devices-in-Office-365-dd892318-bc44-4eb1-af00-9db5430be3cd) <br> - [Monitor Microsoft 365 connectivity](monitor-connectivity.md) |
-|**Email** <br> (Exchange Online) | - Get ready to migrate with [Exchange Hybrid using the Exchange Deployment Assistant](https://technet.microsoft.com/exdeploy2013) <br> - Use the [Exchange migration advisor](https://aka.ms/office365setup) to get customized set up guidance <br> - [Set up Exchange Online Protection](/exchange/standalone-eop/set-up-your-eop-service) |
-|**Sites** <br> (SharePoint Online) | -Configure hybrid functionality for [SharePoint Server 2013](/SharePoint/hybrid/hybrid)<br> - [Create and use site templates](https://support.office.com/article/Create-and-use-site-templates-60371B0F-00E0-4C49-A844-34759EBDD989) to customize the look and feel of SharePoint Online <br> - Use the [SharePoint Online Planning Guide](https://support.office.com/article/SharePoint-Online-Planning-Guide-for-Office-365-for-business-d5089cdf-3fd2-4230-acbd-20ecda2f9bb8) or the [SharePoint Online deployment advisor](https://aka.ms/spoguidance) to plan and configure additional features <br> - Manage your [Video portal](https://support.office.com/article/Manage-your-Office-365-Video-portal-c059465b-eba9-44e1-b8c7-8ff7793ff5da) |
-|**IM and online meetings** <br> (Skype for Business Online) | - Configure hybrid functionality for [Lync Server 2013](/previous-versions/office/lync-server-2013/lync-server-2013-lync-server-2013-hybrid) or [Skype for Business 2015](/skypeforbusiness/hybrid/plan-hybrid-connectivity?bc=%2fSkypeForBusiness%2fbreadcrumb%2ftoc.json&toc=%2fSkypeForBusiness%2ftoc.json)<br> - [Set up Skype for Business Online](https://support.office.com/article/Set-up-Skype-for-Business-Online-40296968-e779-4259-980b-c2de1c044c6e) and configure common features such as call routing, conference calling, and sharing <br> - Use the [Skype for Business deployment advisor](/MicrosoftTeams/faq-journey) to get customized set up guidance |
-| **File storage & sharing** <br> (OneDrive for Business and SharePoint Online) | - [Set up Microsoft 365 file storage and sharing](https://support.office.com/article/7aa9cdc8-2245-4218-81ee-86fa7c35f1de#BKMK_WhatDif): Learn when you should use OneDrive for Business to store files and when you should use SharePoint Online team sites <br> - [Set up file storage and sharing](https://support.office.com/article/7aa9cdc8-2245-4218-81ee-86fa7c35f1de#BKMK_MoveDocsVideo): See how easy it is to upload files in OneDrive for Business and your SharePoint team site <br> - [Set up file storage and sharing](https://support.office.com/article/7aa9cdc8-2245-4218-81ee-86fa7c35f1de#BKMK_Store): Get all the steps for uploading files to OneDrive for Business and your team site. Learn tips for file sharing <br> - Use the [OneDrive for Business setup guide](https://aka.ms/OD4Bguidance) to get customized set up guidance |
+|**Microsoft 365 Suite** |- [Add your company branding to Microsoft 365 Sign In Page](https://support.office.com/article/Add-your-company-branding-to-Office-365-Sign-In-Page-a1229cdb-ce19-4da5-90c7-2b9b146aef0a) <br> - [Add customized help desk info to the Microsoft 365 help pane](https://support.office.com/article/Add-customized-help-desk-info-to-the-Office-365-help-pane-9dd9b104-68f7-4d49-9a30-82561c7d79a3) <br> - [Add integration with Azure AD and other applications](https://support.office.com/article/Integrated-Apps-and-Azure-AD-for-Office-365-administrators-cb2250e3-451e-416f-bf4e-363549652c2a). <br> - [Activate and use mobile device management in Microsoft 365](https://support.office.microsoft.com/article/Manage-mobile-devices-in-Office-365-dd892318-bc44-4eb1-af00-9db5430be3cd) <br> - [Monitor Microsoft 365 connectivity](monitor-connectivity.md) |
+|**Email** <br> (Exchange Online) | - Get ready to migrate with [Exchange Hybrid using the Exchange Deployment Assistant](https://technet.microsoft.com/exdeploy2013) <br> - Use the [Exchange migration advisor](https://aka.ms/office365setup) to get customized setup guidance <br> - [Set up Exchange Online Protection](/exchange/standalone-eop/set-up-your-eop-service) |
+|**Sites** <br> (SharePoint) | - Configure hybrid functionality for [SharePoint Server](/SharePoint/hybrid/hybrid) <br> - Use the [SharePoint Planning Guide](https://support.office.com/article/SharePoint-Online-Planning-Guide-for-Office-365-for-business-d5089cdf-3fd2-4230-acbd-20ecda2f9bb8) or the [SharePoint deployment advisor](https://aka.ms/spoguidance) to plan and configure additional features|
+|**IM and online meetings** <br> (Teams) | - [Microsoft Teams deployment overview](/microsoftteams/deploy-overview)<br> - [Meetings and conferencing in Microsoft Teams](/microsoftteams/deploy-meetings-microsoft-teams-landing-page) <br> - [Plan your Teams voice solution](/microsoftteams/cloud-voice-landing-page) |
+| **File storage & sharing** <br> (OneDrive and SharePoint) | - [Set up Microsoft 365 file storage and sharing](https://support.office.com/article/7aa9cdc8-2245-4218-81ee-86fa7c35f1de#BKMK_WhatDif): Learn when you should use OneDrive to store files and when you should use SharePoint team sites <br> - Use the [OneDrive setup guide](https://aka.ms/OD4Bguidance) to get customized setup guidance |
|**Microsoft 365 applications** | - Microsoft 365 administrators should use the [Office Deployment Guide](/deployoffice) to get help planning a Microsoft 365 Apps for enterprise deployment or upgrade. <br> - [Power BI for Microsoft 365 admin center](https://support.office.com/article/Power-BI-for-Office-365-Admin-Center-Help-5e391ecb-500c-47a3-bd0f-a6173b541044) <br> - [Office Delve for Microsoft 365 admins](https://support.office.com/article/Office-Delve-for-Office-365-admins-54f87a42-15a4-44b4-9df0-d36287d9531b) <br> - [Frequently asked questions about Sway](https://support.office.com/article/446380fa-25bf-47b2-996c-e12cb2f9d075) <br> - [Get started with Project Online](https://support.office.com/article/Get-started-with-Project-Online-e3e5f64f-ada5-4f9d-a578-130b2d4e5f11). <br> - [Microsoft Intune deployment advisor](/mem/intune/) |
-|**Enterprise Social** <br> (Yammer) | - [Use Yammer with Microsoft 365](https://support.office.com/article/Plan-for-Yammer-integration-with-Office-365-4086681f-6de1-4d39-aa72-752b2af1cbd7) <br> - Use the [Yammer Enterprise setup guide](https://aka.ms/yammerdeploy) to get customized set up guidance |
+|**Enterprise Social** <br> (Yammer) | - [Use Yammer with Microsoft 365](https://support.office.com/article/Plan-for-Yammer-integration-with-Office-365-4086681f-6de1-4d39-aa72-752b2af1cbd7) <br> - Use the [Yammer Enterprise setup guide](https://aka.ms/yammerdeploy) to get customized setup guidance |
enterprise Urls And Ip Address Ranges https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/urls-and-ip-address-ranges.md
Title: "Office 365 URLs and IP address ranges"
Previously updated : 02/28/2022 Last updated : 03/28/2022 audience: Admin
Office 365 requires connectivity to the Internet. The endpoints below should be
|Notes|Download|Use| ||||
-|**Last updated:** 02/28/2022 - ![RSS.](../medi#pacfiles)|
+|**Last updated:** 03/28/2022 - ![RSS.](../medi#pacfiles)|
| Start with [Managing Office 365 endpoints](managing-office-365-endpoints.md) to understand our recommendations for managing network connectivity using this data. Endpoints data is updated as needed at the beginning of each month with new IP Addresses and URLs published 30 days in advance of being active. This allows for customers who do not yet have automated updates to complete their processes before new connectivity is required. Endpoints may also be updated during the month if needed to address support escalations, security incidents, or other immediate operational requirements. The data shown on this page below is all generated from the REST-based web services. If you are using a script or a network device to access this data, you should go to the [Web service](microsoft-365-ip-web-service.md) directly.
lighthouse M365 Lighthouse Configure Portal Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-configure-portal-security.md
When users access Lighthouse for the first time, they'll be prompted to set up M
Role-based access control (RBAC) grants access to resources or information based on user roles. Access to customer tenant data and settings in Lighthouse is restricted to specific roles from the Cloud Solution Provider (CSP) program. To set up RBAC roles in Lighthouse, we recommend using Granular Delegated Admin Privileges (GDAP) to implement granular assignments for users. Delegated Admin Privileges (DAP) is still required for the tenant to onboard successfully, but GDAP-only customers will soon be able to onboard without a dependency on DAP. GDAP permissions take precedence when DAP and GDAP coexist for a customer.
-To get started with GDAP, see [Overview of permissions in Microsoft 365 Lighthouse](m365-lighthouse-overview-of-permissions.md).
+To set up a GDAP relationship, see [Obtain granular admin permissions to manage a customer's service](/partner-center/gdap-obtain-admin-permissions-to-manage-customer). For more information on which roles we recommend use Lighthouse, see [Overview of permissions in Microsoft 365 Lighthouse](m365-lighthouse-overview-of-permissions.md).
MSP technicians may also access Lighthouse by using Admin Agent or Helpdesk Agent roles via Delegated Admin Privileges (DAP).
-For non-customer tenant-related actions in Lighthouse (for example, onboarding, customer deactivating/reactivating, managing tags, reviewing logs), MSP technicians must have an assigned role in the partner tenant. The previous article link details such roles and their permissions in Lighthouse.
+For non-customer tenant-related actions in Lighthouse (for example, onboarding, customer deactivating/reactivating, managing tags, reviewing logs), MSP technicians must have an assigned role in the partner tenant. See [Overview of permissions in Microsoft 365 Lighthouse](m365-lighthouse-overview-of-permissions.md) for more details on partner tenant roles.
## Set up Azure AD Privileged Identity Management (PIM)
lighthouse M365 Lighthouse Troubleshoot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-troubleshoot.md
This article describes error messages and problems that you might encounter whil
**Cause:** Your customer tenants don't meet the following criteria:
- - Must have delegated (DAP) set up for the Managed Service Provider (MSP) to be able to manage the customer tenant*
+ - Must have delegated access set up for the Managed Service Provider (MSP) to be able to manage the customer tenant*
- Must have at least one Microsoft 365 Business Premium, Microsoft 365 E3 license, or Windows 365 Business license - Must have no more than 1000 licensed users  **Resolution:** The following table describes the different tenant statuses that require action and explains how to resolve them.
-*Delegated Admin Privileges (DAP) is required to onboard customers to Lighthouse. We recommend also establishing Granular Delegated Admin Privileges (GDAP) with your customers to enable more secure delegated access. While DAP and GDAP coexist, GDAP will take precedence for customers where both models are in place. Soon, customers with just GDAP (and no DAP) will be able to onboard to Lighthouse.<br><br>
+*Delegated Admin Privileges (DAP) is required to onboard customers to Lighthouse. We recommend also establishing Granular Delegated Admin Privileges (GDAP) with your customers to enable more secure delegated access. While DAP and GDAP coexist, GDAP will take precedence for customers where both models are in place. Soon, customers with just GDAP (and no DAP) will be able to onboard to Lighthouse.
| Status | Description | Resolution | |--|--|--| | Inactive | The tenant was offboarded at the request of the MSP and is no longer being managed in Lighthouse. | You need to reactivate the tenant. On the **Tenants** page, select the three dots (more actions) next to the tenant that you want to reactivate, and then select **Activate tenant**. It can take 24ΓÇô48 hours for initial customer data to appear in Lighthouse. | | Ineligible - DAP or GDAP is not set up | You don't have DAP or GDAP admin privileges set up with the tenant, which is required by Lighthouse. | Set up DAP or GDAP admin privileges in the Microsoft Partner Center. |
-| Ineligible - Required license is missing | The tenant is missing a required license. They need at least one Microsoft 365 Business Premium or Microsoft 365 E3 license. | Make sure the tenant has at least one Microsoft 365 Business Premium or Microsoft 365 E3 license assigned. |
+| Ineligible - Required license is missing | The tenant is missing a required license. They need at least one Microsoft 365 Business Premium, Microsoft 365 E3, or Windows 365 Business license. | Make sure the tenant has at least one Microsoft 365 Business Premium, Microsoft 365 E3, or Windows 365 Business license assigned. |
| Ineligible - User count exceeded | The tenant has more than the maximum of 1000 licensed users allowed by Lighthouse. | Verify that the tenant doesn't have more than 1000 licensed users. | | Ineligible - Geo check failed | You and your customer don't reside in the same geographic region, which is required by Lighthouse. | Verify that the customer resides in your geographic region. If not, then you can't manage the tenant in Lighthouse. | | In process | Lighthouse discovered the tenant but is still in the process of onboarding them. | Allow Lighthouse 48 hours to complete onboarding of the tenant. |
If you confirmed that your customer tenant meets the onboarding criteria and the
**Cause:** You don't belong to the correct security group in Azure AD, or you haven't been assigned the correct role in Partner Center to be able to access Lighthouse.
-**Resolution:** Make sure that an admin from your partner tenant with the appropriate permissions has assigned you to the correct GDAP security group in Azure AD and assigned you the correct role in Partner Center. Also, keep in mind that some actions in Lighthouse require you to be a Global admin. To learn more about the GDAP roles and what each role can do, see [Configure Microsoft 365 Lighthouse portal security](m365-lighthouse-configure-portal-security.md). For a detailed description of all Azure AD built-in roles and permissions for GDAP, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference).
+**Resolution:** Make sure that an admin from your partner tenant with the appropriate permissions has assigned you to the correct GDAP security group in Azure AD and assigned you the correct role in Partner Center. Also, keep in mind that some actions in Lighthouse require you to be a Global admin. To learn more about the GDAP roles and what each role can do, see [Overview of permissions in Microsoft 365 Lighthouse](m365-lighthouse-overview-of-permissions.md). For a detailed description of all Azure AD built-in roles and permissions for GDAP, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference).
For customers with DAP relationships, the partner admin will need to assign you to either the Admin agent or Helpdesk agent role in Partner Center. For a detailed description of all Partner Center roles and permissions, see [Assign roles and permissions to users](/partner-center/permissions-overview).
For customers with DAP relationships, the partner admin will need to assign you
**Cause:** You have limited GDAP access based on the roles assigned to the Azure AD security group that you're in.
-**Resolution:** Make sure that an admin from your partner tenant with the appropriate permissions has assigned you to the correct GDAP security group in Azure AD. Also, keep in mind that some actions in Lighthouse require you to be a Global admin. To learn more about the GDAP roles and what each role can do, see [Configure Microsoft 365 Lighthouse portal security](m365-lighthouse-configure-portal-security.md). For a detailed description of all Azure AD built-in roles and permissions for GDAP, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference).
+**Resolution:** Make sure that an admin from your partner tenant with the appropriate permissions has assigned you to the correct GDAP security group in Azure AD. Also, keep in mind that some actions in Lighthouse require you to be a Global admin. To learn more about the GDAP roles and what each role can do, see [Overview of permissions in Microsoft 365 Lighthouse](m365-lighthouse-overview-of-permissions.md). For a detailed description of all Azure AD built-in roles and permissions for GDAP, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference).
## Customer tenant management
managed-desktop Change History Managed Desktop https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/managed-desktop/change-history-managed-desktop.md
ms.localizationpriority: medium
This article lists new and updated articles in the [Microsoft Managed Desktop documentation](index.yml). "Updated" articles have had material additions or corrections--minor fixes such as correction of typos, style, or formatting issues aren't listed. You can always view the history of specific commits (including details of any changes) by visiting the [repo on GitHub](https://github.com/MicrosoftDocs/microsoft-365-docs/tree/public/microsoft-365/managed-desktop).
+## April 2022
+
+New or changed article | Description
+ |
+| [Teams](get-started/teams.md) | Updated Microsoft Intune changes section |
+ ## March 2022 New or changed article | Description
managed-desktop Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/managed-desktop/get-started/teams.md
Most hardware vendors don't yet include Teams as a part of their images. Microso
### Microsoft Intune changes
-Microsoft Managed Desktop adds two applications to your Azure AD organization for Microsoft Teams. They're deployed to either 64-bit or 32-bit clients as appropriate for the device:
--- Modern Workplace - Teams Machine Wide Installer x64 -- Modern Workplace - Teams Machine Wide Installer x32
+Microsoft Managed Desktop adds Microsoft Teams to your tenant: Modern Workplace - Teams Machine Wide Installer x64
## Updates
managed-desktop Device Images https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/managed-desktop/service-description/device-images.md
When you order a new device from an [approved manufacturer](device-requirements.
Anytime you plan to enroll a particular device model in the service for the first time, you should test an example to ensure it will deliver the user experience you expect. For more information, see [Validate new devices](/microsoft-365/managed-desktop/get-started/validate-device). ### Windows 10 Pro
-If you're ordering devices with Windows 10, work directly with your OEM sales preresentative. As of November 1, 2022, OEMs can only sell Windows 10 Pro under the Windows 11 Pro with Windows 10 Pro Downgrade license. For more information, see [Windows 10 support dates](https://docs.microsoft.com/lifecycle/products/windows-10-enterprise-and-education?msclkid=4a74c7b9b04111eca478c6fdafbc51a5) for the retirement dates of Windows 10 versions.
+If you're ordering devices with Windows 10, work directly with your OEM sales representative. As of November 1, 2022, OEMs can only sell Windows 10 Pro under the Windows 11 Pro with Windows 10 Pro Downgrade license. For more information, see [Windows 10 support dates](/lifecycle/products/windows-10-enterprise-and-education?msclkid=4a74c7b9b04111eca478c6fdafbc51a5) for the retirement dates of Windows 10 versions.
-For customers interested in moving to Windows 11, you can find more information on the recommended process [here](https://docs.microsoft.com/microsoft-365/managed-desktop/intro/win11-overview?view=o365-worldwide).
+For customers interested in moving to Windows 11, you can find more information on the recommended process [here](/microsoft-365/managed-desktop/intro/win11-overview).
### Dell
security Mdb Lighthouse Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-lighthouse-integration.md
To access the list of incidents, in Microsoft 365 Lighthouse, on the home page,
Microsoft 365 Lighthouse enables Microsoft Cloud Service Providers to secure and manage devices, data, and users at scale for small- and medium-sized business customers who are using one of the following subscriptions: -- [Microsoft Defender for Business](mdb-overview.md)
+- [Microsoft Defender for Business](/security/defender-business/mdb-overview.md)
- [Microsoft 365 Business Premium](../../admin/admin-overview/what-is-microsoft-365.md)
security Mdb Onboard Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-onboard-devices.md
audience: Admin Previously updated : 03/15/2022 Last updated : 04/01/2022 ms.prod: m365-security ms.technology: mdb ms.localizationpriority: medium
With Microsoft Defender for Business, you have several options to choose from fo
> Please take our <a href="https://microsoft.qualtrics.com/jfe/form/SV_0JPjTPHGEWTQr4y" target="_blank">short survey about Microsoft Defender for Business</a>. We'd love to hear from you! >
-## Get the device onboarding guide
-
-Use the following guide and information to choose the best option for your company.
-
-[:::image type="content" source="mediB-DeviceOnboardingFlow-March2022.pdf) <br/>
-[PDF](https://download.microsoft.com/download/4/d/2/4d2d8a86-2130-45b4-ba42-2997c854383B-DeviceOnboardingFlow-March2022.vsdx)
- ## What to do 1. [See your options for onboarding devices](#device-onboarding-methods), and select a method.
Use the following guide and information to choose the best option for your compa
- [Use automatic onboarding for Windows devices already enrolled in Microsoft Endpoint Manager](#automatic-onboarding-for-windows-devices-enrolled-in-microsoft-endpoint-manager) - [Use a local script to onboard Windows or macOS devices](#local-script-in-defender-for-business) - [Use Microsoft Endpoint Manager to onboard Windows, macOS, or mobile devices](#microsoft-endpoint-manager)
- - [Learn about device onboarding with Microsoft Defender for Business security configuration](#microsoft-defender-for-business-security-configuration)
2. [Run a detection test](#run-a-detection-test) on newly onboarded Windows devices.
Defender for Business offers you several different methods for onboarding device
- **Microsoft Intune** or **Microsoft Endpoint Manager** to onboard Windows, macOS, and mobile devices. You can enroll devices in Endpoint Manager, and then onboard your devices to Defender for Business. [Microsoft 365 Business Premium](../../business-premium/index.md) customers already have [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), and both Microsoft Intune and [Mobile Device Management](/mem/intune/enrollment/device-enrollment) are now part of Endpoint Manager. To use this method, see [Microsoft Endpoint Manager](#microsoft-endpoint-manager). -- **Microsoft Defender for Business security configuration** to onboard devices directly in the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). To use this option, you configure certain settings to facilitate communication between Defender for Business and Endpoint Manager. Then, you onboard devices in the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) by using a package that you select, download, and run on each device. A trust is established between devices and Azure Active Directory (Azure AD), and Defender for Business security policies are pushed to devices. To learn more, see [Microsoft Defender for Business security configuration](#microsoft-defender-for-business-security-configuration). - > [!IMPORTANT] > If something goes wrong and your onboarding process fails, see [Microsoft Defender for Business troubleshooting](mdb-troubleshooting.yml).
If you were already using Endpoint Manager (which includes Microsoft Intune and
See [Device enrollment in Microsoft Intune](/mem/intune/enrollment/device-enrollment).
-## Microsoft Defender for Business security configuration
-
-> [!NOTE]
-> If you're already using Endpoint Manager to manage your devices and security policies, skip this method, and see [Microsoft Endpoint Manager](#microsoft-endpoint-manager) instead.
-
-Microsoft Defender for Business security configuration was built on a capability known as [Security Management for Microsoft Defender for Endpoint (preview)](/mem/intune/protect/mde-security-integration). It enables you to onboard devices to Defender for Business in the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) without requiring those devices to be fully enrolled in Microsoft Endpoint Manager beforehand.
-
-This method enables you to onboard devices and manage your antivirus and firewall policies in the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Here's how it all works:
-
-1. You download an onboarding package from the Microsoft 365 Defender portal, and then run the package on your devices to onboard those devices to Defender for Business.
-
-2. Running the package establishes a trust between each device (if the trust doesn't already exist) and Azure Active Directory (Azure AD).
-
-3. Devices communicate with Endpoint Manager using their Azure AD Identity, and security policies in Defender for Business are pushed to devices.
-
-4. You can view your devices and policies in both the Microsoft 365 Defender portal and the Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)).
-
-To use this option, certain settings must be configured beforehand. To learn more, including prerequisites and supported operating systems, see [Manage Microsoft Defender for Endpoint on devices with Microsoft Endpoint Manager](/mem/intune/protect/mde-security-integration).
- ## Run a detection test After you've onboarded Windows devices to Defender for Business, you can run a detection test on a Windows device to make sure that everything is working correctly.
security Mdb Requirements https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-requirements.md
audience: Admin Previously updated : 03/15/2022 Last updated : 04/01/2022 ms.prod: m365-security ms.technology: mdb ms.localizationpriority: medium
The following table lists the basic requirements to configure and use Microsoft
| Permissions | To sign up for Microsoft Defender for Business, you must be a Global Admin.<br/><br/>To access the Microsoft 365 Defender portal, users must have one of the following [roles in Azure AD](mdb-roles-permissions.md) assigned: <br/>- Security Reader<br/>- Security Admin<br/>- Global Admin<br/><br/>To learn more, see [Roles and permissions in Microsoft Defender for Business](mdb-roles-permissions.md). | | Browser requirements | Microsoft Edge or Google Chrome | | Operating system | To manage devices in Microsoft Defender for Business, your devices must be running one of the following operating systems: <br/>- Windows 10 Business or later <br/>- Windows 10 Professional or later <br/>- Windows 10 Enterprise or later <br/><br/>Make sure that [KB5006738](https://support.microsoft.com/topic/october-26-2021-kb5006738-os-builds-19041-1320-19042-1320-and-19043-1320-preview-ccbce6bf-ae00-4e66-9789-ce8e7ea35541) is installed. <br/><br/>If you're already managing devices in Microsoft Intune (or Microsoft Endpoint Manager), you can onboard those devices to Defender for Business. |
-| Integration with Microsoft Endpoint Manager | If you plan to onboard devices using [Microsoft Defender for Business security configuration](mdb-onboard-devices.md#microsoft-defender-for-business-security-configuration), then the following requirements must be met:<br/><br/>Prerequisites must be met for [Security Management for Microsoft Defender for Endpoint](/mem/intune/protect/mde-security-integration).<br/>- Azure AD must be configured such that trust is created between your company's devices and Azure AD. <br/>- Defender for Business must have security management enabled in Microsoft Endpoint Manager.<br/><br/>Devices must be able to connect to the following URLs:<br/>- `enterpriseregistration.windows.net` (for registration in Azure AD)<br/>- `login.microsoftonline.com` (for registration in Azure AD)<br/>- `*.dm.microsoft.com` (The wildcard (*) supports the cloud-service endpoints that are used for enrollment, check-in, and reporting, and can change as the service scales.) |
> [!NOTE] > [Azure Active Directory (Azure AD)](/azure/active-directory/fundamentals/active-directory-whatis) is used to manage user permissions and device groups. Azure AD is included in your Defender for Business subscription.
security Mdb Roles Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-roles-permissions.md
audience: Admin Previously updated : 03/15/2022 Last updated : 04/01/2022 ms.prod: m365-security ms.technology: mdb ms.localizationpriority: medium
To perform tasks in the Microsoft 365 Defender portal, such as configuring Micro
> Please take our <a href="https://microsoft.qualtrics.com/jfe/form/SV_0JPjTPHGEWTQr4y" target="_blank">short survey about Microsoft Defender for Business</a>. We'd love to hear from you! > - ## Roles in Defender for Business The following table describes the three roles that can be assigned in Defender for Business. [Learn more about admin roles](../../admin/add-users/about-admin-roles.md). <br/><br/>
The following table describes the three roles that can be assigned in Defender f
- To add a role, choose **+ Add assignments**. - To remove a role, choose **X Remove assignments**.
+## Need to add users?
+
+If you haven't already added users to your subscription, see [Add users and assign licenses at the same time](../../admin/add-users/add-users.md).
+ ## Next steps Proceed to:
security Configure Endpoints Mdm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-mdm.md
For more information on enabling MDM with Microsoft Intune, see [Device enrollme
Check out the [PDF](https://download.microsoft.com/download/5/6/0/5609001f-b8ae-412f-89eb-643976f6b79c/mde-deployment-strategy.pdf) or [Visio](https://download.microsoft.com/download/5/6/0/5609001f-b8ae-412f-89eb-643976f6b79c/mde-deployment-strategy.vsdx) to see the various paths in deploying Defender for Endpoint.
-Follow the instructions from [Intune](/intune/advanced-threat-protection).
+Follow the instructions from [Intune](/mem/intune/protect/advanced-threat-protection-configure).
For more information on using Defender for Endpoint CSP see, [WindowsAdvancedThreatProtection CSP](https://msdn.microsoft.com/library/windows/hardware/mt723296(v=vs.85).aspx) and [WindowsAdvancedThreatProtection DDF file](https://msdn.microsoft.com/library/windows/hardware/mt723297(v=vs.85).aspx).
security Configure Endpoints Vdi https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-vdi.md
ms.technology: mde
# Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft 365 Defender
+Virtual desktop infrastructure (VDI) is an IT infrastructure concept that lets end users access enterprise virtual desktops instances from almost any device (such as your personal computer, smartphone, or tablet), eliminating the need for organization to provide users with physical machines. Using VDI devices reduce cost as IT departments are no longer responsible for managing, repairing, and replacing physical endpoints. Authorized users can access the same company servers, files, apps, and services from any approved device through a secure desktop client or browser.
+
+Like any other system in an IT environment, these too should have an Endpoint Detection and Response (EDR) and Antivirus solution to protect against advanced threats and attacks.
++ [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:**
ms.technology: mde
Defender for Endpoint supports non-persistent VDI session onboarding.
-There might be associated challenges when onboarding VDIs. The following are typical challenges for this scenario:
+There might be associated challenges when onboarding VDI instances. The following are typical challenges for this scenario:
- Instant early onboarding of a short-lived session, which must be onboarded to Defender for Endpoint prior to the actual provisioning. - The device name is typically reused for new sessions.
-VDI devices can appear in Defender for Endpoint portal as either:
+In a VDI environment, VDI instances can have short lifespans. VDI devices can appear in Defender for Endpoint portal as either:
++
+- Single portal entry for each VDI instance. If the VDI instance was already onboarded to Microsoft Defender for Endpoint and at some point deleted then recreated with the same host name, a new object representing this VDI instance will NOT be created in the portal.
-- Single entry for each device. > [!NOTE] > In this case, the *same* device name must be configured when the session is created, for example using an unattended answer file. -- Multiple entries for each device - one for each session.
+- Multiple entries for each device - one for each VDI instance.
The following steps will guide you through onboarding VDI devices and will highlight steps for single and multiple entries.
security Configure Siem https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-siem.md
For more information on the Microsoft 365 Defender Add-on for Splunk, see [splun
The new SmartConnector for Microsoft 365 Defender ingests incidents that contain alerts from all Microsoft 365 Defender products - including from Microsoft Defender for Endpoint - into ArcSight and maps these onto its Common Event Framework (CEF).
-For more information on the new ArcSight SmartConnector for Microsoft 365 Defender, see [ArcSight Product documentation](https://community.microfocus.com/cyberres/productdocs/w/connector-documentation/39246/smartconnector-for-microsoft-365-defender).
+For more information on the new ArcSight SmartConnector for Microsoft 365 Defender, see [ArcSight Product documentation](https://www.microfocus.com/documentation/arcsight/arcsight-smartconnectors/microsoft-365-defender/https://docsupdatetracker.net/index.html).
The SmartConnector replaces the previous FlexConnector for Microsoft 365 Defender.
security Edr In Block Mode https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/edr-in-block-mode.md
- next-gen - edr - admindeeplinkDEFENDER Previously updated : 03/18/2022 Last updated : 04/01/2022 ms.technology: mde
You can also define an exclusion for Microsoft Defender Antivirus. See [Configur
### Do I need to turn EDR in block mode on if I have Microsoft Defender Antivirus running on devices?
-The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product. However, we recommend keeping EDR in block mode turned on, whether Microsoft Defender Antivirus is running in passive mode or in active mode.
+The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product. There is minimal benefit in enabling EDR in block mode when Microsoft Defender Antivirus is in active mode, because real-time protection is expected to catch and remediate detections first. We recommend enabling EDR in block mode on endpoints where Microsoft Defender for Antivirus is running in passive mode. EDR detections can be automatically remediated by [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) or by [automated investigation & remediation capabilities](automated-investigations.md) in block mode.
- When Microsoft Defender Antivirus is in passive mode, EDR in block mode provides another layer of defense together with Microsoft Defender for Endpoint.
security Linux Preferences https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-preferences.md
Determines whether behavior monitoring and blocking capability is enabled on the
||| |**Key**|behaviorMonitoring| |**Data type**|String|
-|**Possible values**|disabled <p> enabled (default)|
+|**Possible values**|disabled (default) <p> enabled (default)|
|**Comments**|Available in Defender for Endpoint version 101.45.00 or higher.| #### Run a scan after definitions are updated
security Machines View Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machines-view-overview.md
The counts on the top of each tab will be updated based on the current view.
Filter | Description :|: **Risk level** </br> | The risk level reflects the overall risk assessment of the device based on a combination of factors, including the types and severity of active alerts on the device. Resolving active alerts, approving remediation activities, and suppressing subsequent alerts can lower the risk level.
-**Exposure level** </br> | The exposure level reflects the current exposure of the device based on the cumulative impact of its pending security recommendations. The possible levels are low, medium, and high. Low exposure means your devices are less vulnerable from exploitation. </br> </br> If the exposure level says ΓÇ£No data available,ΓÇ¥ there are a few reasons why this may be the case:</br>- Device stopped reporting for more than 30 days. In that case itΓÇÖs considered inactive, and the exposure isnΓÇÖt computed.</br>- Device OS not supported - see [minimum requirements for Microsoft Defender for Endpoint](https://microsoft-my.sharepoint.com/personal/siosulli_microsoft_com/Documents/Security%20Posture/TVM/minimum-requirements.md).</br>- Device with stale agent (unlikely).
+**Exposure level** </br> | The exposure level reflects the current exposure of the device based on the cumulative impact of its pending security recommendations. The possible levels are low, medium, and high. Low exposure means your devices are less vulnerable from exploitation. </br> </br> If the exposure level says ΓÇ£No data available,ΓÇ¥ there are a few reasons why this may be the case:</br>- Device stopped reporting for more than 30 days. In that case itΓÇÖs considered inactive, and the exposure isnΓÇÖt computed.</br>- Device OS not supported - see [minimum requirements for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/minimum-requirements).</br>- Device with stale agent (unlikely).
**Tags** </br> | Filter the list based on the grouping and tagging that youΓÇÖve added to individual devices. See [Create and manage device tags](machine-tags.md). **Device value**</br> | Filter the list based on whether the device has been marked as high value or low value. **Exclusion state** </br> | Filter the list based on whether the device has been excluded or not. For more information, see [Exclude devices](exclude-devices.md). **OS Platform** </br>| Filter by the OS platforms youΓÇÖre interested in investigating </br></br>(_Computers and mobile and IoT devices only_) **First seen** </br> | Filter your view based on when the device was first seen in the network or when it was first reported by the Microsoft Defender for Endpoint sensor.</br></br>(_Computers and mobile and IoT devices only_) **Windows version** </br> | Filter by the Windows versions youΓÇÖre interested in investigating.</br></br> (_Computers and mobile only_)
-**Sensor health state** </br> | Filter by the following sensor health states, for devices onboard to Microsoft Defender for Endpoint:</br> - **Active**: Devices that are actively reporting sensor data to the service.</br> - **Inactive**: Devices that have stopped sending signals for more than 7 days. </br> - **Misconfigured**: Devices that have impaired communications with service or are unable to send sensor data. </br> Misconfigured devices can further be classified to: </br> - No sensor data </br> - Impaired communications </br> For more information on how to address issues on misconfigured devices see, [Fix unhealthy sensors](https://microsoft-my.sharepoint.com/personal/siosulli_microsoft_com/Documents/Security%20Posture/TVM/fix-unhealthy-sensors.md).</br></br> (_Computers and mobile only_)
+**Sensor health state** </br> | Filter by the following sensor health states, for devices onboard to Microsoft Defender for Endpoint:</br> - **Active**: Devices that are actively reporting sensor data to the service.</br> - **Inactive**: Devices that have stopped sending signals for more than 7 days. </br> - **Misconfigured**: Devices that have impaired communications with service or are unable to send sensor data. </br> Misconfigured devices can further be classified to: </br> - No sensor data </br> - Impaired communications </br> For more information on how to address issues on misconfigured devices see, [Fix unhealthy sensors](/microsoft-365/security/defender-endpoint/fix-unhealthy-sensors).</br></br> (_Computers and mobile only_)
**Onboarding status** </br> | Onboarding status indicates whether the device is currently onboarded to Microsoft Defender for Endpoint or not. You can filter by the following states: </br> - **Onboarded**: The endpoint is onboarded to Microsoft Defender for Endpoint. </br> - **Can be onboarded**: The endpoint was discovered in the network as a supported device, but itΓÇÖs not currently onboarded. Microsoft highly recommends onboarding these devices. </br> - **Unsupported**: The endpoint was discovered in the network, but is not supported by Microsoft Defender for Endpoint. </br> - **Insufficient info**: The system couldnΓÇÖt determine the supportability of the device.</br></br> (_Computers and mobile only_) **Antivirus status** </br> | Filter the view based on whether the antivirus status is disabled, not updated or unknown.</br></br> (_Computers and mobile only_) **Group** </br> | Filter the list based on the group youΓÇÖre interested in investigating. </br></br> (_Computers and mobile only_)
security Microsoft Defender Antivirus On Windows Server https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-on-windows-server.md
ms.sitesec: library
ms.localizationpriority: medium -+ ms.technology: mde Previously updated : 01/26/2022 Last updated : 04/01/2022 - M365-security-compliance - m365initiative-defender-endpoint
Microsoft Defender Antivirus is available in the following editions/versions of
- Windows Server 2016 - Windows Server 2012 R2 (Requires Microsoft Defender for Endpoint)
-In some instances, Microsoft Defender Antivirus is referred to as *Endpoint Protection*; however, the protection engine is the same. Although the functionality, configuration, and management are largely the same for [Microsoft Defender Antivirus on Windows 10](microsoft-defender-antivirus-windows.md) and Windows 11, there are a few key differences on Windows Server:
--- On Windows Server, [automatic exclusions](configure-server-exclusions-microsoft-defender-antivirus.md) are applied based on your defined Server Role.--- On Windows Server, if youΓÇÖre running a non-Microsoft antivirus/antimalware solution, Microsoft Defender Antivirus doesnΓÇÖt go into either passive mode or disabled mode automatically. However, you can set Microsoft Defender Antivirus to passive or disabled mode manually.- ## Setting up Microsoft Defender Antivirus on Windows Server
-The process of setting up and running Microsoft Defender Antivirus on a server platform includes several steps:
+The process of setting up and running Microsoft Defender Antivirus on Windows Server includes the following steps:
1. [Enable the interface](#enable-the-user-interface-on-windows-server). 2. [Install Microsoft Defender Antivirus](#install-microsoft-defender-antivirus-on-windows-server).
The process of setting up and running Microsoft Defender Antivirus on a server p
## Enable the user interface on Windows Server
-By default, Microsoft Defender Antivirus is installed and functional on Windows Server. Sometimes, the user interface (GUI) is installed by default, but the GUI isnΓÇÖt required. You can use PowerShell, Group Policy, or other methods to manage Microsoft Defender Antivirus.
-
-If the GUI isnΓÇÖt installed on your server, and you want to install it, either the **Add Roles and Features** wizard or PowerShell cmdlets.
-
-> [!NOTE]
-> This option is not available for Windows Server 2012 R2. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
-
-### Turn on the GUI using the Add Roles and Features Wizard
+> [!IMPORTANT]
+> If you're using Windows Server 2012 R2, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
-1. See [Install roles, role services, and features by using the add Roles and Features Wizard](/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#install-roles-role-services-and-features-by-using-the-add-roles-and-features-wizard), and use the **Add Roles and Features Wizard**.
+By default, Microsoft Defender Antivirus is installed and functional on Windows Server. Sometimes, the user interface (GUI) is installed by default. The GUI isnΓÇÖt required; you can use PowerShell, Group Policy, or other methods to manage Microsoft Defender Antivirus. However, many organizations prefer to use the GUI for Microsoft Defender Antivirus. To install the GUI, use one of the procedures in the following table:
-2. When you get to the **Features** step of the wizard, under **Windows Defender Features**, select the **GUI for Windows Defender** option.
-
- In Windows Server 2016, the **Add Roles and Features Wizard** looks like this:
-
- :::image type="content" source="images/server-add-gui.png" alt-text="The Add roles and feature wizard showing the GUI for Windows Defender option." lightbox="images/server-add-gui.png":::
-
- In Windows Server 2019 and Windows Server 2022, the **Add Roles and Feature Wizard** is similar.
-
-### Turn on the GUI using PowerShell
-
-The following PowerShell cmdlet will enable the interface:
-
-```powershell
-Install-WindowsFeature -Name Windows-Defender-GUI
-```
+| Procedure | What to do |
+|:|:|
+| Turn on the GUI using the Add Roles and Features Wizard | 1. See [Install roles, role services, and features by using the add Roles and Features Wizard](/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#install-roles-role-services-and-features-by-using-the-add-roles-and-features-wizard), and use the **Add Roles and Features Wizard**. <br/><br/>2. When you get to the **Features** step of the wizard, under **Windows Defender Features**, select the **GUI for Windows Defender** option. |
+| Turn on the GUI using PowerShell | 1. On your Windows Server, open Windows PowerShell as an administrator. <br/><br/>2. Run the following PowerShell cmdlet: `Install-WindowsFeature -Name Windows-Defender-GUI` |
## Install Microsoft Defender Antivirus on Windows Server
-If you need to install or reinstall Microsoft Defender Antivirus on Windows Server, you can do that using either the **Add Roles and Features Wizard** or PowerShell.
+If you need to install or reinstall Microsoft Defender Antivirus on Windows Server, use one of the procedures in the following table:
-### Use the Add Roles and Features Wizard to install Microsoft Defender Antivirus
+| Procedure | What to do |
+|:|:|
+| Use the Add Roles and Features Wizard to install Microsoft Defender Antivirus | 1. See [Install or Uninstall Roles, Role Services, or Features](/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#install-roles-role-services-and-features-by-using-the-add-roles-and-features-wizard), and use the **Add Roles and Features Wizard**. <br/><br/>2. When you get to the **Features** step of the wizard, select the Microsoft Defender Antivirus option. Also select the **GUI for Windows Defender** option. |
+| Use PowerShell to install Microsoft Defender Antivirus | 1. On your Windows Server, open Windows PowerShell as an administrator. <br/><br/>2. Run the following PowerShell cmdlet: `Install-WindowsFeature -Name Windows-Defender` |
-1. Refer to [this article](/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#install-roles-role-services-and-features-by-using-the-add-roles-and-features-wizard), and use the **Add Roles and Features Wizard**.
-
-2. When you get to the **Features** step of the wizard, select the Microsoft Defender Antivirus option. Also select the **GUI for Windows Defender** option.
-
-### Use PowerShell to install Microsoft Defender Antivirus
-
-To use PowerShell to install Microsoft Defender Antivirus, run the following cmdlet:
-
-```powershell
-Install-WindowsFeature -Name Windows-Defender
-```
-
-Event messages for the antimalware engine included with Microsoft Defender Antivirus can be found in [Microsoft Defender Antivirus Events](troubleshoot-microsoft-defender-antivirus.md).
+> [!NOTE]
+> Event messages for the antimalware engine included with Microsoft Defender Antivirus can be found in [Microsoft Defender Antivirus Events](troubleshoot-microsoft-defender-antivirus.md).
## Verify Microsoft Defender Antivirus is running
-Once Microsoft Defender Antivirus is installed, your next step is to verify that it's running. On your Windows Server endpoint, run the following PowerShell cmdlet:
+After you've installed (or reinstalled) Microsoft Defender Antivirus, your next step is to verify that it's running. Use the PowerShell cmdlets in the following table:
-```powershell
-Get-Service -Name windefend
-```
-
-To verify that firewall protection is turned on, run the following PowerShell cmdlet:
-
-```powershell
-Get-Service -Name mpssvc
-```
+| Procedure | PowerShell cmdlet |
+|:|:|
+| Verify that Microsoft Defender Antivirus is running | `Get-Service -Name windefend` |
+| Verify that firewall protection is turned on | `Get-Service -Name mpssvc` |
As an alternative to PowerShell, you can use Command Prompt to verify that Microsoft Defender Antivirus is running. To do that, run the following command from a command prompt:
-```console
+```cmd
sc query Windefend ```
The `sc query` command returns information about the Microsoft Defender Antiviru
To view all the services that arenΓÇÖt running, run the following PowerShell cmdlet:
-```console
+```cmd
sc query state= all ``` ## Update antimalware Security intelligence
-To get updated antimalware security intelligence, you must have the Windows Update service running. If you use an update management service, like Windows Server Update Services (WSUS), make sure that updates for Microsoft Defender Antivirus Security intelligence are approved for the computers you manage.
+To get your regular security intelligence updates, the Windows Update service must be running. If you use an update management service, like Windows Server Update Services (WSUS), make sure that updates for Microsoft Defender Antivirus Security intelligence are approved for the computers you manage.
By default, Windows Update doesnΓÇÖt download and install updates automatically on Windows Server 2019 or Windows Server 2022, or Windows Server 2016. You can change this configuration by using one of the following methods:
-<br/><br/>
- | Method | Description | ||| | **Windows Update** in Control Panel | **Install updates automatically** results in all updates being automatically installed, including Windows Defender Security intelligence updates. <br/><br/> **Download updates but let me choose whether to install them** allows Windows Defender to download and install Security intelligence updates automatically, but other updates arenΓÇÖt automatically installed. | | **Group Policy** | You can set up and manage Windows Update by using the settings available in Group Policy, in the following path: **Administrative Templates\Windows Components\Windows Update\Configure Automatic Updates** | | The **AUOptions** registry key | The following two values allow Windows Update to automatically download and install Security intelligence updates: <br/><br/> **4** - **Install updates automatically**. This value results in all updates being automatically installed, including Windows Defender Security intelligence updates. <br/><br/> **3** - **Download updates but let me choose whether to install them**. This value allows Windows Defender to download and install Security intelligence updates automatically, but other updates arenΓÇÖt automatically installed. |
-To ensure that protection from malware is maintained, we recommend that you enable the following
+To ensure that protection from malware is maintained, enable the following
- Windows Error Reporting service - Windows Update service The following table lists the services for Microsoft Defender Antivirus and the dependent services.
-<br/><br/>
-- | Service Name | File Location | Description | ||||
-| Windows Defender Service (WinDefend) | `C:\Program Files\Windows Defender\MsMpEng.exe` | This is the main Microsoft Defender Antivirus service that needs to be running at all times.|
+| Windows Defender Service (WinDefend) | `C:\Program Files\Windows Defender\MsMpEng.exe` | This is the main Microsoft Defender Antivirus service that needs to be running always.|
| Windows Error Reporting Service (Wersvc) | `C:\WINDOWS\System32\svchost.exe -k WerSvcGroup` | This service sends error reports back to Microsoft. |
-| Windows Defender Firewall (MpsSvc) | `C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork` | We recommend leaving the Windows Defender Firewall service enabled. |
+| Windows Defender Firewall (MpsSvc) | `C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork` | We recommend keeping the Windows Defender Firewall service enabled. |
| Windows Update (Wuauserv) | `C:\WINDOWS\system32\svchost.exe -k netsvcs`| Windows Update is needed to get Security intelligence updates and antimalware engine updates | ## Submit samples
Sample submission allows Microsoft to collect samples of potentially malicious s
### Submit a file 1. Review the [submission guide](/windows/security/threat-protection/intelligence/submission-guide).+ 2. Visit the [sample submission portal](https://www.microsoft.com/wdsi/filesubmission), and submit your file. ### Enable automatic sample submission To enable automatic sample submission, start a Windows PowerShell console as an administrator, and set the **SubmitSamplesConsent** value data according to one of the following settings:
-<br/><br/>
- |Setting|Description| ||| | **0** - **Always prompt** | The Microsoft Defender Antivirus service prompts you to confirm submission of all required files. This is the default setting for Microsoft Defender Antivirus, but isnΓÇÖt recommended for installations on Windows Server 2016 or 2019, or Windows Server 2022 without a GUI. |
To enable automatic sample submission, start a Windows PowerShell console as an
> [!NOTE] > This option is not available for Windows Server 2012 R2. - ## Configure automatic exclusions To help ensure security and performance, certain exclusions are automatically added based on the roles and features you install when using Microsoft Defender Antivirus on Windows Server 2016 or 2019, or Windows Server 2022.
See [Configure exclusions in Microsoft Defender Antivirus on Windows Server](con
## Passive mode and Windows Server
-If youΓÇÖre using a non-Microsoft antivirus product as your primary antivirus solution on Windows Server, you must set Microsoft Defender Antivirus to passive mode or disabled mode.
-
-For more information, see [Install Microsoft Defender Antivirus on Windows Server](microsoft-defender-antivirus-on-windows-server.md#install-microsoft-defender-antivirus-on-windows-server).
--
-### Set Microsoft Defender Antivirus to passive mode using a registry key
-
-You can set Microsoft Defender Antivirus to passive mode by setting the following registry key:
-- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`-- Name: `ForceDefenderPassiveMode`-- Type: `REG_DWORD`-- Value: `1`-
-### Disable Microsoft Defender Antivirus using the Remove Roles and Features wizard
-
-1. See [Install or Uninstall Roles, Role Services, or Features](/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#remove-roles-role-services-and-features-by-using-the-remove-roles-and-features-wizard), and use the **Remove Roles and Features Wizard**.
-
-2. When you get to the **Features** step of the wizard, clear the **Windows Defender Features** option.
-
- If you clear **Windows Defender** by itself under the **Windows Defender Features** section, youΓÇÖll be prompted to remove the interface option **GUI for Windows Defender**.
-
- Microsoft Defender Antivirus will still run normally without the user interface, but the user interface canΓÇÖt be enabled if you disable the core **Windows Defender** feature.
+If youΓÇÖre using a non-Microsoft antivirus product as your primary antivirus solution on Windows Server, you must set Microsoft Defender Antivirus to passive mode or disabled mode. If your Windows Server endpoint is onboarded to Microsoft Defender for Endpoint, you can set Microsoft Defender Antivirus to passive mode. If you're not using Microsoft Defender for Endpoint, set Microsoft Defender Antivirus to disabled mode.
-### Turn off the Microsoft Defender Antivirus user interface using PowerShell
+> [!TIP]
+> See [Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md).
-To turn off the Microsoft Defender Antivirus GUI, use the following PowerShell cmdlet:
-
-```powershell
-Uninstall-WindowsFeature -Name Windows-Defender-GUI
-```
-
-### Are you using Windows Server 2012 R2 or Windows Server 2016?
-
-You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and Windows Server 2016. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
-
-<br/><br/>
+The following table describes methods to set Microsoft Defender Antivirus to passive mode, disable Microsoft Defender Antivirus, and uninstall Microsoft Defender Antivirus:
| Procedure | Description | |||
-| Disable Microsoft Defender Antivirus using Group Policy | In your Local Group Policy Editor, navigate to **Administrative Template** > **Windows Component** > **Endpoint Protection** > **Disable Endpoint Protection**, and then select **Enabled** > **OK**. |
-| Disable Microsoft Defender Antivirus using a registry key | To use the [DisableAntiSpyware](/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware) registry key, navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`, and set or create a DWORD entry called `DisableAntiSpyware`. Set its value to `1` (which sets the registry key's value to *true*). |
+| Set Microsoft Defender Antivirus to passive mode by using a registry key | Set the ForceDefenderPassiveMode registry key as follows: <br/>- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection` <br/>- Name: `ForceDefenderPassiveMode` <br/>- Type: `REG_DWORD` <br/>- Value: `1` |
+| Turn off the Microsoft Defender Antivirus user interface using PowerShell | Open Windows PowerShell as an administrator, and run the following PowerShell cmdlet: `Uninstall-WindowsFeature -Name Windows-Defender-GUI`
| Disable Microsoft Defender Antivirus using PowerShell | Use the following PowerShell cmdlet: `Set-MpPreference -DisableRealtimeMonitoring $true` |
+| Disable Microsoft Defender Antivirus using the Remove Roles and Features wizard | See [Install or Uninstall Roles, Role Services, or Features](/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#remove-roles-role-services-and-features-by-using-the-remove-roles-and-features-wizard), and use the **Remove Roles and Features Wizard**. <br/><br/>When you get to the **Features** step of the wizard, clear the **Windows Defender Features** option. <br/><br/> If you clear **Windows Defender** by itself under the **Windows Defender Features** section, youΓÇÖll be prompted to remove the interface option **GUI for Windows Defender**.<br/><br/>Microsoft Defender Antivirus will still run normally without the user interface, but the user interface canΓÇÖt be enabled if you disable the core **Windows Defender** feature. |
| Uninstall Microsoft Defender Antivirus using PowerShell | Use the following PowerShell cmdlet: `Uninstall-WindowsFeature -Name Windows-Defender` |
+| Disable Microsoft Defender Antivirus using Group Policy | In your Local Group Policy Editor, navigate to **Administrative Template** > **Windows Component** > **Endpoint Protection** > **Disable Endpoint Protection**, and then select **Enabled** > **OK**. |
+
+### Are you using Windows Server 2012 R2 or Windows Server 2016?
+If your Windows Server is onboarded to Microsoft Defender for Endpoint, you can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and Windows Server 2016. See the following articles:
+
+- [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages)
+
+- [Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md)
## See also - [Microsoft Defender Antivirus in Windows](microsoft-defender-antivirus-windows.md)-- [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md)+
security Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection.md
For Windows 10 Enterprise Multi-Session 1909 and up, used in Windows Virtual Des
1. Use [Turn on network protection](enable-network-protection.md) and follow the instructions to apply your policy.
-2. Execute the following PowerShell command: `Set-MpPreference -AllowNetworkProtectionOnWinServer 1`
+2. Execute the following PowerShell commands:
+ - `Set-MpPreference -EnableNetworkProtection Enabled`
+ - `Set-MpPreference -AllowNetworkProtectionOnWinServer 1`
+ - `Set-MpPreference -AllowNetworkProtectionDownLevel 1`
+ - `Set-MpPreference -AllowDatagramProcessingOnWinServer 1`
## Network protection troubleshooting
security Non Windows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/non-windows.md
For more details on how to get started, visit the Defender for Endpoint on macOS
> The following capabilities are not currently supported on macOS endpoints: > > - Data loss prevention
-> - Live response
> - Security Management for Microsoft Defender for Endpoint ## Microsoft Defender for Endpoint on Linux
For more details on how to get started, visit the Microsoft Defender for Endpoin
> The following capabilities are not currently supported on Linux endpoints: > > - Data loss prevention
-> - Live response
> - Security Management for Microsoft Defender for Endpoint ## Microsoft Defender for Endpoint on Android
security Switch To Mde Phase 1 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/switch-to-mde-phase-1.md
- migrationguides - admindeeplinkDEFENDER Previously updated : 11/30/2021 Last updated : 04/01/2022
Need help? See your solution provider's documentation.
Need help updating your organization's devices? See the following resources:
-<br/><br/>
- |OS|Resource| ||| |Windows|[Microsoft Update](https://www.update.microsoft.com)|
Permissions to the Microsoft 365 Defender portal can be granted by using either
If your organization requires a method other than Intune, choose one of the following options: - [Configuration Manager](/mem/configmgr/core/servers/deploy/configure/configure-role-based-administration)+ - [Advanced Group Policy Management](/microsoft-desktop-optimization-pack/agpm)
+
- [Windows Admin Center](/windows-server/manage/windows-admin-center/overview) 3. Grant access to the Microsoft 365 Defender portal. (Need help? See [Manage portal access using RBAC](rbac.md).
Permissions to the Microsoft 365 Defender portal can be granted by using either
To enable communication between your devices and Defender for Endpoint, configure proxy and internet settings. The following table includes links to resources you can use to configure your proxy and internet settings for various operating systems and capabilities:
-<br/><br/>
- |Capabilities|Operating System|Resources| |||| |[Endpoint detection and response](overview-endpoint-detection-response.md) (EDR)|[Windows 10](/windows/release-health/release-information) or later<br/><br/>Windows Server 2022 <br/><br/>[Windows Server 2019](/windows/release-health/status-windows-10-1809-and-windows-server-2019)<br/><br/>[Windows Server 1803, or later](/windows-server/get-started/whats-new-in-windows-server-1803)|[Configure machine proxy and internet connectivity settings](configure-proxy-internet.md)| |EDR|[Windows Server 2016](/windows/release-health/status-windows-10-1607-and-windows-server-2016)<br/><br/>[Windows Server 2012 R2](/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/><br/>[Windows Server 2008 R2 SP1](/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)<br/><br/>[Windows 8.1](/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/><br/>[Windows 7 SP1](/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)|[Configure proxy and internet connectivity settings](onboard-downlevel.md#configure-proxy-and-internet-connectivity-settings)| |EDR|macOS (see [System requirements](microsoft-defender-endpoint-mac.md)|[Defender for Endpoint on macOS: Network connections](microsoft-defender-endpoint-mac.md#network-connections)|
-|[Microsoft Defender Antivirus](microsoft-defender-antivirus-in-windows-10.md)|[Windows 10](/windows/release-health/release-information) <br/><br/> [Windows Server 2019](/windows/release-health/status-windows-10-1809-and-windows-server-2019)<br/><br/> Windows Server 2022 <br/><br/> [Windows Server 1803, or later](/windows-server/get-started/whats-new-in-windows-server-1803) <br/><br/> [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016)|[Configure and validate Microsoft Defender Antivirus network connections](configure-network-connections-microsoft-defender-antivirus.md)|
+|[Microsoft Defender Antivirus](microsoft-defender-antivirus-in-windows-10.md)|[Windows 10](/windows/release-health/release-information) or later <br/><br/>Windows Server 2022 <br/><br/> [Windows Server 2019](/windows/release-health/status-windows-10-1809-and-windows-server-2019)<br/><br/> [Windows Server 1803, or later](/windows-server/get-started/whats-new-in-windows-server-1803) <br/><br/> [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016)|[Configure and validate Microsoft Defender Antivirus network connections](configure-network-connections-microsoft-defender-antivirus.md)|
|Antivirus|macOS (see [System requirements](microsoft-defender-endpoint-mac.md)|[Defender for Endpoint on macOS: Network connections](microsoft-defender-endpoint-mac.md#network-connections)| |Antivirus|Linux (see [System requirements](microsoft-defender-endpoint-linux.md#system-requirements))|[Defender for Endpoint on Linux: Network connections](microsoft-defender-endpoint-linux.md#network-connections)| - ## Next step **Congratulations**! You have completed the **Prepare** phase of [switching to Defender for Endpoint](switch-to-mde-overview.md#the-migration-process)!
security Switch To Mde Phase 2 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/switch-to-mde-phase-2.md
- m365solution-symantecmigrate Previously updated : 11/30/2021 Last updated : 04/01/2022
On certain versions of Windows, Microsoft Defender Antivirus was likely uninstalled or disabled when your non-Microsoft antivirus/antimalware solution was installed. When endpoints running Windows are onboarded to Defender for Endpoint, Microsoft Defender Antivirus can run in passive mode alongside a non-Microsoft antivirus solution. To learn more, see [Antivirus protection with Defender for Endpoint](microsoft-defender-antivirus-compatibility.md#antivirus-protection-without-defender-for-endpoint). As you're making the switch to Defender for Endpoint, you might need to take certain steps to reinstall or enable Microsoft Defender Antivirus. The following table describes what to do on your Windows clients and servers.
-<br/> <br/>
|Endpoint type|What to do| |||
-|Windows clients (such as endpoints running Windows 10 and Windows 11)|In general, you do not need to take any action for Windows clients (unless Microsoft Defender Antivirus has been uninstalled). Here's why: <br/><br/> Microsoft Defender Antivirus should still be installed, but is most likely disabled at this point of the migration process. <br/><br/> When a non-Microsoft antivirus/antimalware solution is installed and the clients are not yet onboarded to Defender for Endpoint, Microsoft Defender Antivirus is disabled automatically. <br/><br/> Later, when the client endpoints are onboarded to Defender for Endpoint, if those endpoints are running a non-Microsoft antivirus solution, Microsoft Defender Antivirus goes into passive mode. <br/><br/> If the non-Microsoft antivirus solution is uninstalled, Microsoft Defender Antivirus goes into active mode automatically.|
-|Windows servers|On Windows Server, you'll need to reinstall Microsoft Defender Antivirus, and set it to passive mode manually. On Windows servers, when a non-Microsoft antivirus/antimalware is installed, Microsoft Defender Antivirus cannot run alongside the non-Microsoft antivirus solution. In those cases, Microsoft Defender Antivirus is disabled or uninstalled manually. <br/><br/> To reinstall or enable Microsoft Defender Antivirus on Windows Server, perform the following tasks: <br/>- [Set DisableAntiSpyware to false on Windows Server](#set-disableantispyware-to-false-on-windows-server) (only if necessary)<br/>- [Reinstall Microsoft Defender Antivirus on Windows Server 2016](#re-enable-microsoft-defender-antivirus-on-windows-server-2016)<br/>- [Reinstall Microsoft Defender Antivirus on Windows Server, version 1803 or later](#re-enable-microsoft-defender-antivirus-on-windows-server-version-1803-or-later)<br/>- [Set Microsoft Defender Antivirus to passive mode on Windows Server](#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) <br/><br/>If you run into issues reinstalling or re-enabling Microsoft Defender Antivirus on Windows Server, see [Troubleshooting: Microsoft Defender Antivirus is getting uninstalled on Windows Server](switch-to-mde-troubleshooting.md#microsoft-defender-antivirus-is-getting-uninstalled-on-windows-server).|
+|Windows clients (such as endpoints running Windows 10 and Windows 11)|In general, you do not need to take any action for Windows clients (unless Microsoft Defender Antivirus has been uninstalled). In general, Microsoft Defender Antivirus should still be installed, but is most likely disabled at this point of the migration process. <br/><br/> When a non-Microsoft antivirus/antimalware solution is installed and the clients are not yet onboarded to Defender for Endpoint, Microsoft Defender Antivirus is disabled automatically. Later, when the client endpoints are onboarded to Defender for Endpoint, if those endpoints are running a non-Microsoft antivirus solution, Microsoft Defender Antivirus goes into passive mode. <br/><br/> If the non-Microsoft antivirus solution is uninstalled, Microsoft Defender Antivirus goes into active mode automatically.|
+|Windows servers|On Windows Server, you'll need to reinstall Microsoft Defender Antivirus, and set it to passive mode manually. On Windows servers, when a non-Microsoft antivirus/antimalware is installed, Microsoft Defender Antivirus cannot run alongside the non-Microsoft antivirus solution. In those cases, Microsoft Defender Antivirus is disabled or uninstalled manually. <br/><br/> To reinstall or enable Microsoft Defender Antivirus on Windows Server, perform the following tasks: <br/>- [Reinstall Microsoft Defender Antivirus on Windows Server 2016](#re-enable-microsoft-defender-antivirus-on-windows-server-2016)<br/>- [Reinstall Microsoft Defender Antivirus on Windows Server, version 1803 or later](#re-enable-microsoft-defender-antivirus-on-windows-server-version-1803-or-later)<br/>- [Set Microsoft Defender Antivirus to passive mode on Windows Server](#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) <br/><br/>If you run into issues reinstalling or re-enabling Microsoft Defender Antivirus on Windows Server, see [Troubleshooting: Microsoft Defender Antivirus is getting uninstalled on Windows Server](switch-to-mde-troubleshooting.md#microsoft-defender-antivirus-is-getting-uninstalled-on-windows-server).|
> [!TIP] > To learn more about Microsoft Defender Antivirus states with non-Microsoft antivirus protection, see [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md).
-### Set DisableAntiSpyware to false on Windows Server
-
-The [DisableAntiSpyware](/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware) registry key was used in the past to disable Microsoft Defender Antivirus, and deploy another antivirus product, such as McAfee, Symantec, or others. **In general, you should not have this registry key on your Windows devices and endpoints**; however, if you *do* have `DisableAntiSpyware` configured, here's how to set its value to false:
-
-1. On your Windows Server device, open Registry Editor.
-
-2. Navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`.
-
-3. In that folder, look for a DWORD entry called **DisableAntiSpyware**.
- - If you do not see that entry, you're all set.
- - If you do see **DisableAntiSpyware**, proceed to step 4.
-
-4. Right-click the DisableAntiSpyware DWORD, and then choose **Modify**.
-
-5. Set the value to `0`. (This action sets the registry key's value to *false*.)
-
-> [!TIP]
-> To learn more about this registry key, see [DisableAntiSpyware](/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware).
- ### Re-enable Microsoft Defender Antivirus on Windows Server 2016 You can use the [Malware Protection Command-Line Utility](command-line-arguments-microsoft-defender-antivirus.md) to re-enable Microsoft Defender Antivirus on Windows Server 2016.
You can use the [Malware Protection Command-Line Utility](command-line-arguments
3. Restart the device. - ### Re-enable Microsoft Defender Antivirus on Windows Server, version 1803 or later > [!IMPORTANT] > The following procedure applies only to endpoints or devices that are running the following versions of Windows:
-> - Windows Server 2019
> - Windows Server 2022
+> - Windows Server 2019
> - Windows Server, version 1803 (core-only mode) 1. As a local administrator on the server, open Windows PowerShell.
You can use the [Malware Protection Command-Line Utility](command-line-arguments
> [!TIP] > You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
-1. Open Registry Editor, and then navigate to
-
- ```text
- Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection
- ```
+1. Open Registry Editor, and then navigate to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings: - Set the DWORD's value to **1**.+ - Under **Base**, select **Hexadecimal**. > [!NOTE]
You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2
## Configure Defender for Endpoint This step of the migration process involves configuring Microsoft Defender Antivirus for your endpoints. We recommend using Intune; however, you can any of the methods that are listed in the following table:
-<br/><br/>
|Method|What to do| |||
The specific exclusions to configure will depend on which version of Windows you
## Add your existing solution to the exclusion list for Microsoft Defender Antivirus
-During this step of the setup process, you add your existing solution to the Microsoft Defender Antivirus exclusion list. You can choose from several methods to add your exclusions to Microsoft Defender Antivirus, as listed in the following table:
-<br/><br/>
+During this step of the setup process, you add your existing solution to the Microsoft Defender Antivirus exclusion list. You can choose from several methods to add your exclusions to Microsoft Defender Antivirus, as listed in the following table:
|Method|What to do| |||
When you add [exclusions to Microsoft Defender Antivirus scans](/windows/securit
Keep the following points in mind: - *Path exclusions* exclude specific files and whatever those files access.+ - *Process exclusions* exclude whatever a process touches, but does not exclude the process itself.+ - List your process exclusions using their full path and not by their name only. (The name-only method is less secure.)+ - If you list each executable (.exe) as both a path exclusion and a process exclusion, the process and whatever it touches are excluded. ## Set up your device groups, device collections, and organizational units Device groups, device collections, and organizational units enable your security team to manage and assign security policies efficiently and effectively. The following table describes each of these groups and how to configure them. Your organization might not use all three collection types.
-<br/><br/>
|Collection type|What to do| |||
security Switch To Mde Phase 3 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/switch-to-mde-phase-3.md
- migrationguides - admindeeplinkDEFENDER Previously updated : 03/28/2022 Last updated : 04/01/2022
Deployment methods vary, depending on operating system and preferred methods. Th
| iOS | [Microsoft Endpoint Manager](ios-install.md) | |Android | [Microsoft Endpoint Manager](android-intune.md) | - (<a id="fn1">1</a>) Windows Server 2016 and Windows Server 2012 R2 will need to be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016). - ## Run a detection test To verify that your onboarded devices are properly connected to Defender for Endpoint, you can run a detection test.
-<br/><br/>
- |Operating system|Guidance| ||| |Windows 10 or later<br/><br/>Windows Server 2022<br/><br/>Windows Server 2019<br/><br/>Windows Server, version 1803, or later<br/><br/>Windows Server 2016<br/><br/>Windows Server 2012 R2|See [Run a detection test](run-detection-test.md).<br/><br/>Visit the Defender for Endpoint demo scenarios site (<https://demo.wd.microsoft.com>) and try one or more of the scenarios. For example, try the **Cloud-delivered protection** demo scenario.|
To verify that your onboarded devices are properly connected to Defender for End
Now that your endpoints have been onboarded to Defender for Endpoint, your next step is to make sure Microsoft Defender Antivirus is running in passive mode. You can use one of several methods, as described in the following table:
-<br/><br/>
- |Method|What to do| ||| |Command Prompt|1. On a Windows device, open Command Prompt.<br/><br/>2. Type `sc query windefend`, and then press Enter.<br/><br/>3. Review the results to confirm that Microsoft Defender Antivirus is running in passive mode.|
Now that your endpoints have been onboarded to Defender for Endpoint, your next
To set Microsoft Defender Antivirus to passive mode on Windows Server, version 1803 or newer, or Windows Server 2019, or Windows Server 2022, follow these steps:
-1. Open Registry Editor, and then navigate to:
-
- `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
+1. Open Registry Editor, and then navigate to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings:+ - Set the DWORD's value to **1**.+ - Under **Base**, select **Hexadecimal**. > [!NOTE]
Keeping Microsoft Defender Antivirus up to date is critical to assure your devic
There are two types of updates related to keeping Microsoft Defender Antivirus up to date: - Security intelligence updates+ - Product updates To get your updates, follow the guidance in [Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).
To get your updates, follow the guidance in [Manage Microsoft Defender Antivirus
If at this point you have: - Onboarded your organization's devices to Defender for Endpoint, and+ - Microsoft Defender Antivirus is installed and enabled, Then your next step is to uninstall your non-Microsoft antivirus, antimalware, and endpoint protection solution. When you uninstall your non-Microsoft solution, Microsoft Defender Antivirus switches from passive mode to active mode. In most cases, this happens automatically.
To get help with uninstalling your non-Microsoft solution, contact their technic
Now that you have onboarded to Defender for Endpoint, and you have uninstalled your former non-Microsoft solution, your next step is to make sure that Defender for Endpoint working correctly. One good way to perform this task is by visiting the Defender for Endpoint demo scenarios site ([https://demo.wd.microsoft.com](https://demo.wd.microsoft.com)). Try one or more of the demo scenarios on that page, including at least the following: - Cloud-delivered protection+ - Potentially Unwanted Applications (PUA)+ - Network Protection (NP) > [!NOTE]
Now that you have onboarded to Defender for Endpoint, and you have uninstalled y
**Congratulations**! You have completed your [migration to Defender for Endpoint](switch-to-mde-overview.md#the-migration-process)! - [Visit your security operations dashboard](security-operations-dashboard.md) in the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)).+ - [Manage Defender for Endpoint, post migration](manage-mde-post-migration.md).
security Switch To Mde Troubleshooting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/switch-to-mde-troubleshooting.md
- M365-security-compliance Previously updated : 03/28/2022 Last updated : 04/01/2022 ms.technology: mde
When you make the switch to Defender for Endpoint, you begin with your non-Micro
To resolve this issue, take the following steps:
-1. [Set the DisableAntiSpyware registry key to false](#set-the-disableantispyware-registry-key-to-false).
-2. [Add Microsoft Defender for Endpoint to the exclusion list](#add-microsoft-defender-for-endpoint-to-the-exclusion-list).
-3. [Set Microsoft Defender Antivirus to passive mode manually](#set-microsoft-defender-antivirus-to-passive-mode-manually).
-
-### Set the DisableAntiSpyware registry key to false
-
-The [DisableAntiSpyware](/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware) registry key was used in the past to disable Microsoft Defender Antivirus, and deploy another antivirus product, such as McAfee, Symantec, or others. **In general, you should not have this registry key on your Windows devices and endpoints**; however, if you *do* have `DisableAntiSpyware` configured, here's how to set its value to false:
-
-1. On your Windows Server device, open Registry Editor.
-
-2. Navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`.
-
-3. In that folder, look for a DWORD entry called **DisableAntiSpyware**.
- - If you do not see that entry, you're all set.
- - If you do see **DisableAntiSpyware**, proceed to step 4.
-
-4. Right-click the DisableAntiSpyware DWORD, and then choose **Modify**.
-
-5. Set the value to `0`. (This action sets the registry key's value to *false*.)
-
-> [!TIP]
-> To learn more about this registry key, see [DisableAntiSpyware](/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware).
+1. [Add Microsoft Defender for Endpoint to the exclusion list](#add-microsoft-defender-for-endpoint-to-the-exclusion-list).
+2. [Set Microsoft Defender Antivirus to passive mode manually](#set-microsoft-defender-antivirus-to-passive-mode-manually).
### Add Microsoft Defender for Endpoint to the exclusion list
security Web Content Filtering https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-content-filtering.md
Web content filtering is available on the major web browsers, with blocks perfor
Before trying out this feature, make sure you meet the following requirements: -- Your subscription includes one of the following: Windows 10 Enterprise E5, Microsoft 365 E5, Microsoft 365 E5 Security, Microsoft 365 E3 + Microsoft 365 E5 Security add-on, or the Microsoft Defender for Endpoint standalone license.
+- Your subscription includes one of the following: Windows 10 Enterprise E5, Microsoft 365 E5, Microsoft 365 E5 Security, Microsoft 365 E3, or the Microsoft Defender for Endpoint standalone license.
- You have access to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>.
security Mdo Email Entity Page https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-email-entity-page.md
f1.keywords:
Previously updated : 01/21/2021 Last updated : 04/01/2022 audience: ITPro ms.prod: m365-security
Admins can preview emails in Cloud mailboxes, ***if*** the mails are still prese
These details are specific to email attachments and URLs. Users can see these details by going to Explorer and applying the *detection technology* filter set to file detonation or URL detonation. Emails filtered for file detonation will contain a malicious file with detonation details, and those filtered for URLs contain a malicious URL and its detonation details.
-Users will see enriched detonation details for known malicious attachments or URLs found in their emails, which got detonated for their specific tenant. It will comprise of Detonation chain, Detonation summary, Screenshot, and Observed behavior details to help customers understand why the attachment or URL was deemed malicious and detonated.
+Users will see enriched detonation details for known malicious attachments or URLs found in their emails, which got detonated for their specific tenant. It will include the Detonation chain, Detonation summary, Screenshot, and Observed behavior details to help customers understand why the attachment or URL was deemed malicious and detonated.
1. *Detonation chain*. A single file or URL detonation can trigger multiple detonations. The Detonation chain tracks the path of detonations, including the original malicious file or URL that caused the verdict, and all other files or URLs affected by the detonation. These URLs or attached files may not be directly present in the email, but including that analysis is important to determining why the file or URL was found to be malicious.
security Threat Trackers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-trackers.md
Most tracker pages include trending numbers that are updated periodically, widge
:::image type="content" source="../../media/e426f220-fdcb-4dd9-99a2-db97dbcf71d5.png" alt-text="The example of campaign information in Explorer" lightbox="../../media/e426f220-fdcb-4dd9-99a2-db97dbcf71d5.png":::
-Trackers are just a few of the many great features you get with [Microsoft Defender for Office 365 Plan 2](office-365-ti.md). Threat Trackers include [Noteworth trackers](#noteworthy-trackers), [Trending trackers](#trending-trackers), [Tracked queries](#tracked-queries), and [Saved queries](#saved-queries).
+Trackers are just a few of the many great features you get with [Microsoft Defender for Office 365 Plan 2](office-365-ti.md). Threat Trackers include [Noteworthy trackers](#noteworthy-trackers), [Trending trackers](#trending-trackers), [Tracked queries](#tracked-queries), and [Saved queries](#saved-queries).
To view and use your Threat Trackers for your organization, open the Microsoft 365 Defender portal at <https://security.microsoft.com>, and go to **Email & collaboration** \> **Threat tracker**. To go directly to the **Threat tracker** page, use <https://security.microsoft.com/threattrackerv2>.
security User Submission https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/user-submission.md
After you've verified that your mailbox meets all applicable prerequisites, you
- **Organization Management** or **Security Administrator** in the [Permissions in the Microsoft 365 Defender portal](permissions-microsoft-365-security-center.md). -- You need access to Exchange Online PowerShell. If the account that you're trying to use doesn't have access to Exchange Online PowerShell, you'll receive an error that looks like this when specify the submissions mailbox:
+- You need access to Exchange Online PowerShell. If the account that you're trying to use doesn't have access to Exchange Online PowerShell, you'll receive an error that looks like this when specifying the submissions mailbox:
> Specify an email address in your domain