Updates from: 04/22/2022 01:11:53
Category Microsoft Docs article Related commit history on GitHub Change details
admin Message Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/message-center.md
When you open a message in a reading pane, you can use the **Up** and **Down** :
A lot of actionable information about changes to Microsoft 365 services arrives in the Microsoft 365 message center. It can be difficult to keep track of which changes require tasks to be done, when, and by whom, and to track each task to completion. You also might want to make a note of something and tag it to check on later. You can do all this and more when you sync your messages from the Microsoft 365 admin center to Microsoft Planner. For more information, see [Track your message center tasks in Planner](/office365/planner/track-message-center-tasks-planner).
-For an overview of Message center, see [Message center in Microsoft 365](message-center.md). Or, to learn how to set your language preferences to enable machine translation for Message center posts, see [Language translation for Message center posts](language-translation-for-message-center-posts.md). If you'd like to program an alternative way to get real-time service health information and Message center communications, please reference [Working with service communications API in Microsoft Graph](/graph/api/resources/service-communications-api-overview?view=graph-rest-beta).
+For an overview of Message center, see [Message center in Microsoft 365](message-center.md). Or, to learn how to set your language preferences to enable machine translation for Message center posts, see [Language translation for Message center posts](language-translation-for-message-center-posts.md). If you'd like to program an alternative way to get real-time service health information and Message center communications, see [Working with service communications API in Microsoft Graph](/graph/api/resources/service-communications-api-overview).
## Unsubscribe from Message center emails
admin Release Options In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/release-options-in-office-365.md
For significant updates, customers are initially notified by the [Microsoft 365
> [!NOTE] > You need a Microsoft 365 or Azure AD account to access your Message center through the [admin center](/office365/admin/admin-overview/about-the-admin-center). Microsoft 365 home plan users do not have an admin center. - ## Standard release This is the default option where you and your users receive the latest updates when they're released broadly to all customers.
If you [Set up the release option in the admin center](#set-up-the-release-optio
### Targeted release for selected users
-If you [Set up the release option in the admin center](#set-up-the-release-option-in-the-admin-center) for this option, you can define specific users, usually power users, to receive early access to features and functionality.
+If you [Set up the release option in the admin center](#set-up-the-release-option-in-the-admin-center) for this option, you can define specific users, usually power users, to receive early access to features and functionality.
+
+> [!IMPORTANT]
+> Some features only roll out on a per-organization basis. This means that the entire organization will receive access to the feature at the same time. For features like this, itΓÇÖs not possible for selected users in the targeted release program to get the feature early. This means that your organization will not be able to receive these features early if you have configured selected users in targeted release. To make sure that you see all features in targeted release, you will need to configure targeted release for the entire organization or set up a test organization.
## Benefits of Targeted release
admin Set Password Expiration Policy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/set-password-expiration-policy.md
Follow the steps below if you want to set user passwords to expire after a speci
1. In the Microsoft 365 admin center, go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2072756" target="_blank">**Security & privacy** tab</a> under **Org Settings**.
- If you aren't a global admin, you won't see the Security and privacy option.
+ If you aren't a global admin or security admin, you won't see the Security and privacy option.
1. Select **Password expiration policy**.
compliance Compliance Easy Trials https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials.md
Use our [trial playbook](compliance-easy-trials-compliance-playbook.md) to help
#### Finding support
-Organizations may use FastTrack for trial deployment support if the tenant has at least 150 licenses. Get more [details about FastTrack](https://docs.microsoft.com/fasttrack/introduction).
+Organizations may use FastTrack for trial deployment support if the tenant has at least 150 licenses. Get more [details about FastTrack](/fasttrack/introduction).
#### Extending the trial
Wondering what you can experience in your free trial? The Purview solutions tria
Microsoft Purview Compliance Manager can help you throughout your compliance journey, from taking inventory of your data protection risks to managing the complexities of implementing controls, staying current with regulations and certifications, and reporting to auditors. Learn more about [Compliance Manager](compliance-manager.md)
+- **Data Lifecycle Management**
+
+ Automate your retention coverage by using adaptive policy scopes. This feature allows you to dynamically target policies for retention to specific users, groups, or sites. These policies automatically update when changes occur in your organization. In addition, policies that use adaptive scopes are not subject to location limits. Learn more about [adaptive policy scopes](retention.md#adaptive-or-static-policy-scopes-for-retention).
+ - **Data Loss Prevention** Microsoft Purview Data Loss Prevention (DLP) helps you control sharing and use of sensitive info on devices, apps, and services. With trials, you can extend coverage of DLP policies to Teams and devices, protect even more sensitive content using trainable classifiers and exact data match (EDM), and get started quickly with our recommended DLP policies. [Learn more about Data Loss Prevention](dlp-learn-about-dlp.md)
Wondering what you can experience in your free trial? The Purview solutions tria
- Your existing policies will stay turned on unless you turn them off. - If you edit DLP policies that include either the Teams or Devices locations after the trial ends, those locations will be removed from the policy. -- **Data Lifecycle Management**-
- Automate your retention coverage by using adaptive policy scopes. This feature allows you to dynamically target policies for retention to specific users, groups, or sites. These policies automatically update when changes occur in your organization. In addition, policies that use adaptive scopes are not subject to location limits. Learn more about [adaptive policy scopes](retention.md#adaptive-or-static-policy-scopes-for-retention).
- - **eDiscovery** Take advantage of an end-to-end workflow for preserving, collecting, analyzing, and exporting content that's responsive to your organization's internal and external investigations. Legal teams can also manage the entire legal hold notification process by communicating with custodians involved in a case. Learn more about [eDiscovery](ediscovery.md)
Wondering what you can experience in your free trial? The Purview solutions tria
- **Records Management** Use integrated Microsoft Purview Records Management features to:+ - Classify content as a record to prevent users from editing, as required by regulations, laws, or organizational policy - Apply retention labels to content automatically when it matches criteria you specify, using auto-apply label policies - Use adaptive scope policies to dynamically target your retention label policies to locations, with no limit on how many locations are included
compliance Use Network Upload To Import Pst Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/use-network-upload-to-import-pst-files.md
The first step is to download the AzCopy tool, which is the tool that you run in
1. Go to <https://compliance.microsoft.com> and sign in using the credentials for an administrator account in your organization.
-2. In the left pane of the compliance portal, click **Information governance** \> **Import**.
+2. In the left pane of the compliance portal, click **Data Lifecycle Management** \> **Import**.
> [!NOTE] > You have to be assigned the appropriate permissions to access the **Import** page in the compliance portal. See the **Before you begin** section for more information.
lighthouse M365 Lighthouse Block User Signin https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-block-user-signin.md
Title: "Block user sign-in"
+ Title: "Block user sign-in in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to block a user account if you think it's compromised so users can't sign in."
-# Block user sign-in
+# Block user sign-in in Microsoft 365 Lighthouse
You can block a user account if you think it's compromised. When you block a user account, it immediately blocks anyone from signing in to that account. If a user tries to sign in, they're automatically signed out of all Microsoft 365 services within 60 minutes. Blocking a user account won't delete any data, and it won't stop the account from receiving mail.
lighthouse M365 Lighthouse Compare Compliance Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-compare-compliance-policies.md
Title: "Compare device compliance policy settings"
+ Title: "Compare device compliance policy settings in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to compare device compliance policy settings."
-# Compare device compliance policy settings
+# Compare device compliance policy settings in Microsoft 365 Lighthouse
Microsoft 365 Lighthouse lets you view compliance policies across your tenants in a single view. You can drive security and standardization across your tenants by comparing policies. You can filter views to see settings that have been configured (versus settings that were left not configured), settings that differ in their configurations, or settings that match. You can also search for specific settings to see how they compare across policies.
As you make policy adjustments, make sure you assess your changes against your c
[What is device enrollment in Intune?](/mem/intune/enrollment/device-enrollment) (article) [Use compliance policies to set rules for devices you manage with Intune](/mem/intune/protect/device-compliance-get-started) (article)
-[Overview of using baselines to deploy standard tenant configurations](m365-lighthouse-deploy-standard-tenant-configurations-overview.md) (article)
+[Overview of using Microsoft 365 Lighthouse baselines to deploy standard tenant configurations](m365-lighthouse-deploy-standard-tenant-configurations-overview.md) (article)
lighthouse M365 Lighthouse Deploy Baselines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-deploy-baselines.md
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthous
# Deploy Microsoft 365 Lighthouse baselines
-Microsoft 365 Lighthouse lets you deploy standard managed-tenant configurations to secure users, devices, and data within customer tenants. There are seven [default baseline configurations](m365-lighthouse-deploy-standard-tenant-configurations-overview.md) that come standard with Lighthouse. Using the Lighthouse deployment plan feature, you can view, test, and deploy security configurations across all your tenants. A deployment plan is only available to active tenants. Once a tenant is onboarded, you can compare your customersΓÇÖ current configuration against the default baseline configuration and take the appropriate actions.
+Microsoft 365 Lighthouse lets you deploy standard managed-tenant configurations to secure users, devices, and data within customer tenants. There are seven [default baseline configurations](m365-lighthouse-deploy-standard-tenant-configurations-overview.md) that come standard with Lighthouse. Using the Lighthouse deployment plan feature, you can view, test, and deploy security configurations across all your tenants. A deployment plan is only available to active tenants. Once a tenant is onboarded, you can compare your customers' current configuration against the default baseline configuration and take the appropriate actions.
## Before you begin
Make sure you and your customer tenants meet the requirements listed in [Require
3. Select the **Deployment Plan** tab.
- The Deployment Plan tab provides a searchable and exportable list of each deployment step that is included in the tenantΓÇÖs deployment plan that includes the following information for each deployment step:
+ The Deployment Plan tab provides a searchable and exportable list of each deployment step that is included in the tenant's deployment plan that includes the following information for each deployment step:
| Column | Description | |--|-|
Make sure you and your customer tenants meet the requirements listed in [Require
| Column | Description | |-|--|
- | Summary | A summary of the Deployment StepΓÇÖs purpose. |
+ | Summary | A summary of the Deployment Step's purpose. |
| Baseline | The baseline from which the deployment step is derived. | | Category | Whether the deployment step is associated with managing Devices, Identity, or Data. | | Required SKU | SKUs required to complete the deployment step. |
- | User impact | The impact of deploying the step to the tenantΓÇÖs users. |
- | For your users | Links to resources the tenantΓÇÖs users may find helpful. |
+ | User impact | The impact of deploying the step to the tenant's users. |
+ | For your users | Links to resources the tenant's users may find helpful. |
| Next steps | Links and guidance around any applicable next steps. |
- Deployment steps are comprised of one or more processes that need to be completed to fulfill the requirements of the deployment step. The Deployment Step page includes the process table that lists each process included in the deployment step and provides the following information:
+ Deployment steps include one or more processes that need to be completed. The Deployment Step page includes a table that lists each process included in the deployment step and provides the following information:
| Column | Description | |-|-|
For more information on policy conflict management, see [Azure AD Conditional Ac
## Related content
-[Overview of using baselines to deploy standard tenant configurations](m365-lighthouse-deploy-standard-tenant-configurations-overview.md) (article)\
-[Microsoft 365 lighthouse Tenants page overview](m365-lighthouse-tenants-page-overview.md) (article)\
+[Overview of using Microsoft 365 Lighthouse baselines to deploy standard tenant configurations](m365-lighthouse-deploy-standard-tenant-configurations-overview.md) (article)\
+[Overview of the Windows 365 (Cloud PCs) page in Microsoft 365 Lighthouse](m365-lighthouse-tenants-page-overview.md) (article)\
[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)\ [Configure Microsoft 365 Lighthouse portal security](m365-lighthouse-configure-portal-security.md) (article)
lighthouse M365 Lighthouse Deploy Standard Tenant Configurations Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-deploy-standard-tenant-configurations-overview.md
Title: "Overview of using baselines to deploy standard tenant configurations"
+ Title: "Overview of using Microsoft 365 Lighthouse baselines to deploy standard tenant configurations"
f1.keywords: CSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn about using baselines to deploy standard tenant configurations."
-# Overview of using baselines to deploy standard tenant configurations
+# Overview of using Microsoft 365 Lighthouse baselines to deploy standard tenant configurations
-Microsoft 365 Lighthouse baselines provide a repeatable and scalable way for you to manage Microsoft 365 security settings across multiple customer tenants. Baselines provide standard tenant configurations that deploy core security policies and compliance standards that keep your tenantsΓÇÖ users, devices, and data secure.
+Microsoft 365 Lighthouse baselines provide a repeatable and scalable way for you to manage Microsoft 365 security settings across multiple customer tenants. Baselines provide standard tenant configurations that deploy core security policies and compliance standards that keep your tenants' users, devices, and data secure.
You can view the default baseline and its deployment steps from within Lighthouse. To apply a baseline to a tenant, select **Tenants** in the left navigation pane, and then select a tenant. Next, go to the **Deployment plans** tab to begin the deployment.
Lighthouse baseline configurations are designed to make sure all managed tenants
## Deployment Plans
-Each active tenant has a deployment plan that includes the deployment steps from the Microsoft 365 Lighthouse baseline. To access a tenantΓÇÖs deployment plan, select an active tenant from the list on the **Tenants** page, and then select the **Deployment Plan** tab.
+Each active tenant has a deployment plan that includes the deployment steps from the Microsoft 365 Lighthouse baseline. To access a tenant's deployment plan, select an active tenant from the list on the **Tenants** page, and then select the **Deployment Plan** tab.
:::image type="content" source="../media/m365-lighthouse-deploy-baselines/deployment-plan-tab.png" alt-text="Screenshot of the Deployment Plan tab.":::
The Deployment Plan tab also includes the following options:
## Deployment steps and processes
-Each tenantΓÇÖs deployment plan includes the deployment steps from the Microsoft 365 Lighthouse baseline. Each deployment step is comprised of one or more processes that need to be completed to fulfill the requirements of the deployment step. When a new tenant becomes active, you must complete deployment activities associated with the deployment steps and processes.
+Each tenant's deployment plan includes the deployment steps from the Microsoft 365 Lighthouse baseline. Each deployment step includes one or more processes that need to be completed. When a new tenant becomes active, you must complete deployment activities associated with the deployment steps and processes.
For each deployment step, you can take the following actions:
lighthouse M365 Lighthouse Device Compliance Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-device-compliance-page-overview.md
Title: "Microsoft 365 Lighthouse Device compliance page overview"
+ Title: "Overview of the Device compliance page in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn about the Device compliance page."
-# Microsoft 365 Lighthouse Device compliance page overview
+# Overview of the Device compliance page in Microsoft 365 Lighthouse
Microsoft 365 Lighthouse lets you view insights and information related to Intune device compliance for all your customer tenants by selecting **Devices** in the left navigation pane to open the Device compliance page. From this page, you can get an overview of compliance status across tenants, view a list of devices for each tenant, and get status reports on compliance policies and settings.
The Settings tab also includes the following options:
## Related content
-[Windows 365 (Cloud PCs) page overview](m365-lighthouse-win365-page-overview.md) (article)\
+[Overview of the Windows 365 (Cloud PCs) page in Microsoft 365 Lighthouse](m365-lighthouse-win365-page-overview.md) (article)\
[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
lighthouse M365 Lighthouse Known Issues https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-known-issues.md
Currently, DAP is required to onboard customers to Lighthouse. We recommend also
## Related content [Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)\
-[Troubleshoot and resolve problems and error messages in Microsoft 365 Lighthouse](m365-lighthouse-troubleshoot.md) (article)\
+[Troubleshoot error messages and problems in Microsoft 365 Lighthouse](m365-lighthouse-troubleshoot.md) (article)\
[Get help and support for Microsoft 365 Lighthouse](m365-lighthouse-get-help-and-support.md) (article)
lighthouse M365 Lighthouse Manage Mfa https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-manage-mfa.md
Title: "Manage multifactor authentication"
+ Title: "Manage multifactor authentication in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to manage multifactor authentication."
-# Manage multifactor authentication
+# Manage multifactor authentication in Microsoft 365 Lighthouse
Azure Active Directory (Azure AD) Multi-Factor Authentication (MFA) helps safeguard access to data and applications, providing another layer of security by using a second form of authentication. The Multifactor Authentication tab provides detailed information on the status of MFA enablement across your tenants. Select any tenant in the list to see more details for that tenant, including which Conditional Access policies requiring MFA are already configured and which users have not yet registered for MFA.
If you want to use a different email account, you can export the list of users t
## Next steps
-Once MFA is enabled, you can enable Azure Active Directory (Azure AD) self-service password reset. This feature gives users the ability to change or reset their password with no administrator or help desk involvement. For more information, see [Manage self-service password reset](m365-lighthouse-manage-sspr.md).
+Once MFA is enabled, you can enable Azure Active Directory (Azure AD) self-service password reset. This feature gives users the ability to change or reset their password with no administrator or help desk involvement. For more information, see [Manage self-service password reset in Microsoft 365 Lighthouse](m365-lighthouse-manage-sspr.md).
## Related content
lighthouse M365 Lighthouse Manage Sspr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-manage-sspr.md
Title: "Manage self-service password reset"
+ Title: "Manage self-service password reset in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to manage self-service password reset."
-# Manage self-service password reset
+# Manage self-service password reset in Microsoft 365 Lighthouse
Microsoft 365 Lighthouse lets partners manage Azure Active Directory (Azure AD) self-service password reset (SSPR). SSPR gives users the ability to change or reset their password with no administrator or help desk involvement. If a user's account is locked or they forget their password, they can follow prompts to unblock themselves and get back to work. This ability reduces help desk calls and loss of productivity when a user can't sign in to their device or an application.
The following conditions must be met before a tenant will appear in the list:
- The customer tenant must have an Azure AD Premium license for each user. For more information on which licenses support SSPR, see [Licensing requirements for Azure Active Directory self-service password reset](/azure/active-directory/authentication/concept-sspr-licensing). -- The customer tenant must be active within Lighthouse. To learn how to determine if a tenant is active, see [Microsoft 365 Lighthouse Tenants page overview](m365-lighthouse-tenants-page-overview.md).
+- The customer tenant must be active within Lighthouse. To learn how to determine if a tenant is active, see [Overview of the Windows 365 (Cloud PCs) page in Microsoft 365 Lighthouse](m365-lighthouse-tenants-page-overview.md).
## View SSPR tenant status
If you want to use a different email account, you can export the list of users t
[Plan an Azure Active Directory self-service password reset deployment](/azure/active-directory/authentication/howto-sspr-deployment) (article)\ [Tutorial: Enable users to unlock their account or reset passwords using Azure Active Directory self-service password reset](/azure/active-directory/authentication/tutorial-enable-sspr) (article)\ [How to enable and configure SSPR in Azure AD](https://www.youtube.com/watch?v=rA8TvhNcCvQ) (video)\
-[Manage multifactor authentication](m365-lighthouse-manage-mfa.md) (article)
+[Manage multifactor authentication in Microsoft 365 Lighthouse](m365-lighthouse-manage-mfa.md) (article)
lighthouse M365 Lighthouse Manage Tenant List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-manage-tenant-list.md
Title: "Manage your tenant list"
+ Title: "Manage your tenant list in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to manage your tenant list."
-# Manage your tenant list
+# Manage your tenant list in Microsoft 365 Lighthouse
To help you manage your tenant list in Microsoft 365 Lighthouse, you can apply custom tags to your tenants. These tags can be used to organize your tenants and can also help you filter the existing views and insights available to relevant sets of tenants. You can manage your tags from the Tenants page. Once created and assigned, you can filter the data within the Tenants, Users, Devices, Threat management, and Windows 365 pages based on a tag.
After you've created and assigned tags, you can use them to filter your tenants.
## Related content [Sign up for Microsoft 365 Lighthouse](m365-lighthouse-sign-up.md) (article)
-[Microsoft 365 Lighthouse Device compliance page overview](m365-lighthouse-device-compliance-page-overview.md) (article)
+[Overview of the Device compliance page in Microsoft 365 Lighthouse](m365-lighthouse-device-compliance-page-overview.md) (article)
[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
lighthouse M365 Lighthouse Mitigate Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-mitigate-threats.md
Title: "Mitigate threats with Microsoft Defender Antivirus"
+ Title: "Mitigate threats in Microsoft 365 Lighthouse with Microsoft Defender Antivirus"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn about the mitigate threats with Microsoft Defender Antivirus."
-# Mitigate threats with Microsoft Defender Antivirus
+# Mitigate threats in Microsoft 365 Lighthouse with Microsoft Defender Antivirus
Microsoft 365 Lighthouse lets partners investigate and mitigate threats across all your tenants. You can also initiate antivirus scans on devices, make sure devices are getting the latest updates for Microsoft Defender Antivirus, and review pending actions following antivirus scans. Lighthouse only supports devices running Windows 10 or later.
You can also restart multiple devices by selecting the checkbox next to each dev
## Related content [Requirements for Microsoft 365 Lighthouse](m365-lighthouse-requirements.md) (article)\
-[Threat management page overview](m365-lighthouse-threat-management-page-overview.md) (article)\
+[Overview of the Threat management page in Microsoft 365 Lighthouse](m365-lighthouse-threat-management-page-overview.md) (article)\
[Create a compliance policy in Microsoft Intune](/mem/intune/protect/create-compliance-policy) (article)\ [Turn on Microsoft Defender Antivirus](/mem/intune/user-help/turn-on-defender-windows) (article)\ [Microsoft Security Intelligence](https://www.microsoft.com/wdsi/threats) (web page)
lighthouse M365 Lighthouse Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-overview.md
Lighthouse helps MSPs secure and manage Microsoft 365 services and connected end
## Related content [Sign up for Microsoft 365 Lighthouse](m365-lighthouse-sign-up.md) (article)
-[Microsoft 365 Lighthouse Tenants page overview](m365-lighthouse-tenants-page-overview.md) (article)
-[Microsoft 365 Lighthouse Device compliance page overview](m365-lighthouse-device-compliance-page-overview.md) (article)
+[Overview of the Tenants page in Microsoft 365 Lighthouse](m365-lighthouse-tenants-page-overview.md) (article)
+[Overview of the Device compliance page in Microsoft 365 Lighthouse](m365-lighthouse-device-compliance-page-overview.md) (article)
[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article) [Microsoft Defender for Business](../security/defender-business/index.yml) (link page)
lighthouse M365 Lighthouse Requirements https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-requirements.md
Microsoft Defender Antivirus is part of the Windows operating system and is enab
## Related content [Configure Microsoft 365 Lighthouse portal security](m365-lighthouse-configure-portal-security.md) (article)\
-[Microsoft 365 Lighthouse Device compliance page overview](m365-lighthouse-device-compliance-page-overview.md) (article)\
-[Microsoft 365 Lighthouse Users page overview](m365-lighthouse-users-page-overview.md) (article)\
-[Microsoft 365 Lighthouse Threat management page overview](m365-lighthouse-threat-management-page-overview.md) (article)\
+[Overview of the Device compliance page in Microsoft 365 Lighthouse](m365-lighthouse-device-compliance-page-overview.md) (article)\
+[Overview of the Users page in Microsoft 365 Lighthouse](m365-lighthouse-users-page-overview.md) (article)\
+[Overview of the Threat management page in Microsoft 365 Lighthouse](m365-lighthouse-threat-management-page-overview.md) (article)\
[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
lighthouse M365 Lighthouse Reset User Password https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-reset-user-password.md
Title: "Reset a user password"
+ Title: "Reset a user password in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to reset a password for a single user or for multiple risky users across different tenants."
-# Reset a user password
+# Reset a user password in Microsoft 365 Lighthouse
Microsoft 365 Lighthouse lets you change or reset user passwords. You can reset the password for a single user or for multiple risky users across different tenants.
Microsoft 365 Lighthouse lets you change or reset user passwords. You can reset
## Related content [Manage Microsoft 365 user accounts](../enterprise/manage-microsoft-365-accounts.md) (article)\
-[Block user sign-in](m365-lighthouse-block-user-signin.md) (article)
+[Block user sign-in in Microsoft 365 Lighthouse](m365-lighthouse-block-user-signin.md) (article)
lighthouse M365 Lighthouse Review Audit Logs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-review-audit-logs.md
Title: "Review audit logs"
+ Title: "Review audit logs in Microsoft 365 Lighthouse"
f1.keywords: CSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to review audit logs."
-# Review audit logs
+# Review audit logs in Microsoft 365 Lighthouse
Microsoft 365 Lighthouse audit logs record actions that generate a change in Lighthouse or other Microsoft 365 services. Create, edit, delete, assign, and remote actions all create audit events that you can review. By default, auditing is enabled for all customers. It can't be disabled.
lighthouse M365 Lighthouse Search For Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-search-for-users.md
Title: "Search for users"
+ Title: "Search for users in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to search for users."
-# Search for users
+# Search for users in Microsoft 365 Lighthouse
Microsoft 365 Lighthouse lets you search for a specific user across all active tenants. This allows you to find a user quickly without needing to navigate different tenants.
Microsoft 365 Lighthouse lets you search for a specific user across all active t
## Next steps
-Once the user is found, you can reset their password or block their account. For more information, see [Reset user password](m365-lighthouse-reset-user-password.md) or [Block user sign-in](m365-lighthouse-block-user-signin.md).
+Once the user is found, you can reset their password or block their account. For more information, see [Reset user password](m365-lighthouse-reset-user-password.md) or [Block user sign-in in Microsoft 365 Lighthouse](m365-lighthouse-block-user-signin.md).
## Related content [Manage Microsoft 365 user accounts](../enterprise/manage-microsoft-365-accounts.md) (article)\ [Reset user password](m365-lighthouse-reset-user-password.md) (article)\
-[Block user sign-in](m365-lighthouse-block-user-signin.md) (article)
+[Block user sign-in in Microsoft 365 Lighthouse](m365-lighthouse-block-user-signin.md) (article)
lighthouse M365 Lighthouse Tenants Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-tenants-page-overview.md
Title: "Microsoft 365 Lighthouse Tenants page overview"
+ Title: "Overview of the Tenants page in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn about the Tenants page."
-# Microsoft 365 Lighthouse Tenants page overview
+# Overview of the Tenants page in Microsoft 365 Lighthouse
Microsoft 365 Lighthouse lets you manage tenant accounts by selecting **Tenants** in the left navigation pane to open the Tenants page. The Tenants page contains a list of all your tenants. You can select a tenant to view detailed information including contact details and deployment status.
Once you inactivate a tenant, you can't take action on the tenant until the inac
## Tenant tags
-To help organize your tenants and easily filter the existing views, you can create and assign tags to your tenants. To learn more, see [Manage your tenant list](m365-lighthouse-manage-tenant-list.md).
+To help organize your tenants and easily filter the existing views, you can create and assign tags to your tenants. To learn more, see [Manage your tenant list in Microsoft 365 Lighthouse](m365-lighthouse-manage-tenant-list.md).
> [!NOTE] > You can create up to 30 tags across all tenant.
The Deployment Plans tab also includes the following options:
[Requirements for Microsoft 365 Lighthouse](m365-lighthouse-requirements.md) (article)\ [Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)\
-[Manage your tenant list](m365-lighthouse-manage-tenant-list.md) (article)\
-[Overview of using baselines to deploy standard tenant configurations](m365-lighthouse-deploy-standard-tenant-configurations-overview.md) (article)\
+[Manage your tenant list in Microsoft 365 Lighthouse](m365-lighthouse-manage-tenant-list.md) (article)\
+[Overview of using Microsoft 365 Lighthouse baselines to deploy standard tenant configurations](m365-lighthouse-deploy-standard-tenant-configurations-overview.md) (article)\
[Deploy Microsoft 365 Lighthouse baselines](m365-lighthouse-deploy-baselines.md) (article)
lighthouse M365 Lighthouse Threat Management Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-threat-management-page-overview.md
Title: "Microsoft 365 Lighthouse Threat management page overview"
+ Title: "Overview of the Threat management page in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn about the Threat management page."
-# Microsoft 365 Lighthouse Threat management page overview
+# Overview of the Threat management page in Microsoft 365 Lighthouse
**Applies to:**
lighthouse M365 Lighthouse Troubleshoot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-troubleshoot.md
Title: "Troubleshoot and resolve problems and error messages in Microsoft 365 Lighthouse"
+ Title: "Troubleshoot error messages and problems in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
- AdminSurgePortfolio - M365-Lighthouse search.appverid: MET150
-description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, get help troubleshooting and resolving error messages and problems."
+description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, get help troubleshooting error messages and problems."
-# Troubleshoot and resolve problems and error messages in Microsoft 365 Lighthouse
+# Troubleshoot error messages and problems in Microsoft 365 Lighthouse
This article describes error messages and problems that you might encounter while using Microsoft 365 Lighthouse and provides troubleshooting steps you can take to resolve them.
lighthouse M365 Lighthouse Users Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-users-page-overview.md
Title: "Microsoft 365 Lighthouse Users page overview"
+ Title: "Overview of the Users page in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn about the Users page."
-# Microsoft 365 Lighthouse Users page overview
+# Overview of the Users page in Microsoft 365 Lighthouse
Microsoft 365 Lighthouse lets you manage users across customer tenant accounts by selecting **Users** in the left navigation pane to open the Users page. From this page, you can search for users and assess and act on the security state of your user accounts. You can also view insights into risky users and the status of multifactor authentication and self-service password reset.
lighthouse M365 Lighthouse View Manage Risky Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-view-manage-risky-users.md
Title: "View and manage risky users"
+ Title: "View and manage risky users in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to view and manage risky users."
-# View and manage risky users
+# View and manage risky users in Microsoft 365 Lighthouse
Microsoft collects and analyzes trillions of user sign-in signals each day. These signals are used to help build good user sign-in behavior patterns and identify potential risky sign-in attempts. Azure Active Directory (Azure AD) Identity Protection uses these signals to review user sign-in attempts and take action if there's suspicious activity.
The following conditions must be met before users can appear in the risky users
- The customer tenant must have an Azure AD Premium license for each user. For more information on which licenses support Azure AD Identity Protection, see [What is Identity Protection?](/azure/active-directory/identity-protection/overview-identity-protection) -- The customer tenant must be active within Microsoft 365 Lighthouse. To determine if a tenant is active, see [Microsoft 365 Lighthouse Tenants page overview](m365-lighthouse-tenant-list-overview.md).
+- The customer tenant must be active within Microsoft 365 Lighthouse. To determine if a tenant is active, see [Overview of the Windows 365 (Cloud PCs) page in Microsoft 365 Lighthouse](m365-lighthouse-tenant-list-overview.md).
## Review detected risks and take action
lighthouse M365 Lighthouse View Service Health https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-view-service-health.md
Title: "View tenant service health"
+ Title: "View tenant service health in Microsoft 365 Lighthouse"
f1.keywords: NOCSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how view tenant service health."
-# View tenant service health
+# View tenant service health in Microsoft 365 Lighthouse
You can view service health for the tenants you manage in Microsoft 365 Lighthouse. Service health includes incidents and advisories for several services, including Microsoft Intune, Azure Active Directory (Azure AD) identity services, and mobile device management (MDM) cloud services. You can also see how many of your managed tenants are affected by incidents. For example, if one of your tenants is experiencing problems, you can check the Service health page to determine whether it's a known issue with a resolution in progress or whether a recent change may be impacting them. This could save you time troubleshooting and reduce support calls.
lighthouse M365 Lighthouse Win365 Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-win365-page-overview.md
Title: "Microsoft 365 Lighthouse Windows 365 (Cloud PCs) page overview"
+ Title: "Overview of the Windows 365 (Cloud PCs) page in Microsoft 365 Lighthouse"
f1.keywords: CSH
search.appverid: MET150
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn about the Windows 365 (Cloud PCs) page."
-# Windows 365 (Cloud PCs) page overview
+# Overview of the Windows 365 (Cloud PCs) page in Microsoft 365 Lighthouse
Windows 365 is a cloud-based service that lets Microsoft Endpoint Manager (MEM) admins provision and manage Cloud PCs for their users who have a Windows 365 license. Windows 365 is fully integrated with MEM for device management, and with Microsoft 365 Lighthouse for partner management of Cloud PCs across all their customer tenants.
security Configure Extension File Exclusions Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-extension-file-exclusions-microsoft-defender-antivirus.md
Previously updated : 02/27/2022
See [How to create and deploy antimalware policies: Exclusion settings](/configm
2. In the **Group Policy Management Editor** go to **Computer configuration** and select **Administrative templates**.
-3. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Exclusions**.
+3. Expand the tree to **Windows components** \> **Windows Defender Antivirus** \> **Exclusions**.
4. Open the **Path Exclusions** setting for editing, and add your exclusions. 1. Set the option to **Enabled**.
security Learn About Spoof Intelligence https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/learn-about-spoof-intelligence.md
The rest of this article explains how to use the spoof intelligence insight in t
- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell). - You need to be assigned permissions in **Exchange Online** before you can do the procedures in this article:
- - To modify the spoof intelligence policy or enable or disable spoof intelligence, you need to be a member of the **Organization Management** or **Security Administrator** role groups.
+ - To modify the spoof intelligence policy or enable or disable spoof intelligence, you need to be a member of
+ - **Organization Management**
+ - **Security Administrator** <u>and</u> **View-Only Configuration** or **View-Only Organization Management**.
- For read-only access to the spoof intelligence policy, you need to be a member of the **Global Reader** or **Security Reader** role groups. For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
security Migrate To Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365.md
ms.prod: m365-security
**Applies to** - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
-If you already have an existing third-party protection service or device that sits in front of Microsoft 365, you can use this guide to migrate your protection to Microsoft Defender for Office 365 to get the benefits of a consolidated management experience, potentially reduced cost (using products that you already pay for), and a mature product with integrated security protection. For more information, see [Microsoft Defender for Office](https://www.microsoft.com/security/business/threat-protection/office-365-defender).
+If you already have an existing third-party protection service or device that sits in front of Microsoft 365, you can use this guide to migrate your protection to Microsoft Defender for Office 365 to get the benefits of a consolidated management experience, potentially reduced cost (using products that you already pay for), and a mature product with integrated security protection. For more information, see [Microsoft Defender for Office 365](https://www.microsoft.com/security/business/threat-protection/office-365-defender).
This guide provides specific and actionable steps for your migration, and assumes the following facts:
security Tenant Allow Block List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list.md
This article describes how to configure entries in the Tenant Allow/Block List i
- You need to be assigned permissions in the Microsoft 365 Defender portal before you can do the procedures in this article: - **Senders, URLs and files**:
- - To add and remove values from the Tenant Allow/Block List, you need to be a member of the **Organization Management**, **Security Administrator**, or **Security Operator** role groups or you are assigned the **Tenant AllowBlockList Manager** role.
- - For read-only access to the Tenant Allow/Block List, you need to be a member of the **Global Reader** or **Security Reader** role groups.
+ - To add and remove values from the Tenant Allow/Block List, you need to be a member of
+ - **Organization Management** or **Security Administrator** role group (**Security admin role**)
+ - **Security Operator** role group (**Tenant AllowBlockList Manager**).
+ - For read-only access to the Tenant Allow/Block List, you need to be a member of
+ - **Global Reader** role group
+ - **Security Reader** role group
- **Spoofing**: One of the following combinations: - **Organization Management** - **Security Administrator** <u>and</u> **View-Only Configuration** or **View-Only Organization Management**.
security Walkthrough Spoof Intelligence Insight https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/walkthrough-spoof-intelligence-insight.md
You can manage spoof intelligence in the Microsoft 365 Defender portal, or in Po
- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell). - You need to be assigned permissions in **Exchange Online** before you can do the procedures in this article:
- - To modify the spoof intelligence policy or enable or disable spoof intelligence, you need to be a member of the **Organization Management** or **Security Administrator** role groups.
+ - To modify the spoof intelligence policy or enable or disable spoof intelligence, you need to be a member of
+ - **Organization Management**
+ - **Security Administrator** <u>and</u> **View-Only Configuration** or **View-Only Organization Management**.
- For read-only access to the spoof intelligence policy, you need to be a member of the **Global Reader** or **Security Reader** role groups. For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).