Updates from: 04/26/2023 01:23:05
Category Microsoft Docs article Related commit history on GitHub Change details
admin Microsoft Teams Apps Usage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/microsoft-teams-apps-usage.md
The Teams app usage report is available in the Microsoft 365 admin center and th
- How many users in your environment have installed at least one app? - How many users in your environment have used at least one app?-- How many users are using an app across platforms (Windows, Mac, Web, etc)?
+- How many users are using an app across platforms (Windows, Mac, Web, etc.)?
- How many apps has each user used? ## How to get to the Microsoft Teams apps usage report
You can view the **App usage** in the Teams app usage report by choosing the **A
:::image type="content" source="../../media/teams-apps-usage-tab.png" alt-text="Teams user activity." lightbox="../../media/teams-apps-usage-tab.png":::
-On the top of the report, you will see three charts describing cross-app trends across your organization.
+On the top of the report, you'll see three charts describing cross-app trends across your organization.
- Apps installed - Apps used
This table shows you per-app view with the following metrics for each app. A sub
|Metric|Definition|Included by default?| ||||
-|App ID|The external App identifier present in the app manifest.|Yes|
+|App ID|The external App identifiers present in the app manifest.|Yes|
|Last used date|The date when that app was last used by anyone in your organization.|Yes| |Teams using this app|The number of distinct Teams teams that have at least one user using this app.|Yes| |Users using this app|The number of distinct users in your organization that are using this app.|Yes|
This table shows you per-user view with the following metrics for each app. A su
## Managing apps in the Teams Admin Center
-For more information about how to manage your Teams apps, please refer to [About apps in Microsoft Teams](/microsoftteams/deploy-apps-microsoft-teams-landing-page.md).
+For more information about how to manage your Teams apps, please refer to [About apps in Microsoft Teams](/microsoftteams/deploy-apps-microsoft-teams-landing-page).
To link an app in this report to the Manage Apps experience in Teams Admin Center, you can use the following:
admin Release Options In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/release-options-in-office-365.md
description: "Learn how to set up the release option for new product and feature
# Set up the Standard or Targeted release options > [!IMPORTANT]
-> The Microsoft 365 updates described in this article apply to OneDrive for Business, SharePoint Online, Office for the web, Microsoft 365 admin center and some components of Exchange Online. These release options are targeted, best effort ways to release changes to Microsoft 365 but cannot be guaranteed at all times or for all updates. They do not currently apply to services other than those listed previously. For information about release options for Microsoft 365 Apps, see [Overview of update channels for Microsoft 365 Apps](/deployoffice/overview-update-channels).
+> The Microsoft 365 updates described in this article apply to OneDrive for Business, SharePoint Online, Office for the web, Microsoft 365 admin center, some components of Exchange Online and Microsoft Teams. These release options are targeted, best effort ways to release changes to Microsoft 365 but cannot be guaranteed at all times or for all updates. They do not currently apply to services other than those listed previously. For information about release options for Microsoft 365 Apps, see [Overview of update channels for Microsoft 365 Apps](/deployoffice/overview-update-channels).
With Microsoft 365, you receive new product updates and features as they become available instead of doing costly updates every few years. You can manage how your organization receives these updates. For example, you can sign up for an early release so that your organization receives updates first. You can designate that only certain individuals receive the updates. Or, you can remain on the default release schedule and receive the updates later. This article explains the different release options and how you can use them for your organization.
A good practice is to leave the majority of users in **Standard release** and IT
With this option, you and your users can be the first to see the latest updates and help shape the product by providing early feedback. You can choose to have individuals or the entire organization receive updates early. > [!IMPORTANT]
-> Large or complex updates may take longer than others so that no users are adversely affected. There is no guarantee on the exact timeline of a release. Targeted release is now available for customers with either the Office 365 GCC plan or the Office 365 GCC High plan and DoD plan (including the services listed above except for Office for the web).
+> Large or complex updates may take longer than others so that no users are adversely affected. There is no guarantee on the exact timeline of a release. Targeted release is now available for customers with either the Office 365 GCC plan or the Office 365 GCC High plan and DoD plan for the following
### Targeted release for entire organization
business-premium M365bp Intune Admin Roles In The Mac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-intune-admin-roles-in-the-mac.md
To create, edit, or assign roles, your account must have one of the following pe
- **Global Administrator** - **Intune Service Administrator** (also known as **Intune Administrator** but not to be confused with the built-in **Intune Role Administrator** role.)
-Find more information on [Azure Active Directory roles and RBAC](/azure/active-directory/roles/permissions-reference.md).
+Find more information on [Azure Active Directory roles and RBAC](/azure/active-directory/roles/permissions-reference).
## Microsoft Intune built-in roles
business-premium Secure Your Business Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/secure-your-business-data.md
audience: Admin
Previously updated : 03/29/2023 Last updated : 04/25/2023 ms.localizationpriority: medium - highpri - Adm_O365 - Adm_TOC - m365-security-- tier1--- VSBFY23-- MSStore_Link-- AdminSurgePortfolio-- okr_smb-- AdminTemplateSet-- admindeeplinkMAC-- admindeeplinkDEFENDER-- adminvideo-- admindeeplinkEXCHANGE-- business_assist
+- tier2
+- ContentEnagagementFY23
search.appverid: - BCS160 - MET150
compliance Device Onboarding Macos Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-macos-overview.md
description: Learn about onboarding macOS devices into Compliance solutions
# Onboard macOS devices into Microsoft 365 overview
-MacOS devices can be onboarded into Microsoft Purview solutions using either Intune or JAMF Pro. The onboarding procedures differ depending on which management solution you are using. If your macOS devices have already been onboarded into Microsoft Defender for Endpoint (MDE), there are fewer steps. See [Next steps](#next-steps) for links to the appropriate procedures for you.
+MacOS devices can be onboarded into Microsoft Purview solutions using either Intune or JAMF Pro. The onboarding procedures differ depending on which management solution you're using. If your macOS devices have already been onboarded into Microsoft Defender for Endpoint (MDE), there are fewer steps. See [Next steps](#next-steps) for links to the appropriate procedures for you.
**Applies to:**
Before you get started with Endpoint DLP on macOS devices (three latest released
- [Learn about Endpoint data loss prevention](endpoint-dlp-learn-about.md) - [Get started with Endpoint data loss prevention](endpoint-dlp-getting-started.md)
-If you are not familiar with DLP at all, you should familiarize yourself with these articles as well:
+If you aren't familiar with DLP at all, you should familiarize yourself with these articles as well:
- [Learn about data loss prevention](dlp-learn-about-dlp.md#learn-about-data-loss-prevention) - [Plan for data loss prevention (DLP)](dlp-overview-plan-for-dlp.md#plan-for-data-loss-prevention-dlp) - [Data loss prevention policy reference](dlp-policy-reference.md#data-loss-prevention-policy-reference)
-If you are not familiar with Insider Risk, you should familiarize yourself with these articles:
+If you aren't familiar with Insider Risk, you should familiarize yourself with these articles:
- [Insider risk management](insider-risk-management.md) - [Plan for insider risk management](insider-risk-management-plan.md#plan-for-insider-risk-management)
Endpoint DLP supports these browsers on macOS (three latest released versions):
See, [Microsoft 365 licensing guidance for information protection](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection-data-loss-prevention-for-exchange-online-sharepoint-online-and-onedrive-for-business).
-## Activities that can be audited and restricted on macOS
-
-Once a macOS device is onboarded into Microsoft Purview solutions, you can monitor and restrict these actions with data loss prevention (DLP) policies.
-
-**Copy to a USB removable media** ΓÇô when enforced, this action blocks, warns or audits the copying or moving of protected files from an endpoint device to USB removable media
-
-**Copy to network shares** ΓÇô when enforced, this action blocks, warns, or audits the copying or moving of protected files from an endpoint device to any network share
-
-**Print** ΓÇô when enforced, this action blocks, warns, or audits when protected files are printed from an endpoint device
-
-**Copy to clipboard** ΓÇô when enforced, this action blocks, warns, or audits data in protected file that is being copied to a clipboard on an endpoint device
-
-**Upload to cloud** ΓÇô this action blocks, warns, or audits when protected files are prevented from or allowed to be uploaded to cloud services based on the allow/unallowed domains list in global settings. When this action is set to warn or block, other browsers (defined on unallowed browsers list under Global settings) are blocked from accessing the file.
-
-**Accessed by unallowed apps** ΓÇô when enforced, this action prevents applications that are on the unallowed apps list (as defined in Global settings) from accessing protected files on an endpoint device. Sample scenarios
- ## Onboarding devices into device management You must enable device monitoring and onboard your endpoints before you can monitor and protect sensitive items on a device. Both of these actions are done in the Microsoft Purview compliance portal.
Topic | Description
## Device configuration and policy sync status (preview)
-You can check the **Configuration status** and the **Policy sync status** of all your onboarded devices in the **Devices** list. For macOS devices the minimum version is 101.95.07. For more information on the configuration and policy status, select an onboarded device to open the details pane.
+You can check the **Configuration status** and the **Policy sync status** of all your onboarded devices in the **Devices** list. For macOS devices, the minimum version is 101.95.07. For more information on the configuration and policy status, select an onboarded device to open the details pane.
**Configuration status** shows you if the device is configured correctly, meets DLP configuration requirements, and the last time the configuration was validated. For macOS devices configuration includes:-- Checking the UPN configuration by making sure your devices are [onboarded into Intune](/mem/intune/fundamentals/deployment-guide-platform-macos) if you are using Intune.-- Making sure that they are enrolled in the [Company Portal](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp)-- If you use [JAMF Pro make sure that they are onboarded](https://www.jamf.com/resources/product-documentation/jamf-pro-installation-guide-for-mac/) for checking the UPN configuration.
+- Checking the UPN configuration by making sure your devices are [onboarded into Intune](/mem/intune/fundamentals/deployment-guide-platform-macos) if you're using Intune.
+- Making sure that they're enrolled in the [Company Portal](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp)
+- If you use [JAMF Pro make sure that they're onboarded](https://www.jamf.com/resources/product-documentation/jamf-pro-installation-guide-for-mac/) for checking the UPN configuration.
**Policy sync status** shows you if the most current versions of the endpoint DLP policies have been synchronized to the device and the last time a policy sync occurred.
You can check the **Configuration status** and the **Policy sync status** of all
|Field value |Configuration status |Policy sync status | |||| |Updated |Device health parameters are enabled and correctly set. |Device has been updated with the current versions of policies. |
-|Not updated | You need to enable the configuration settings for this device. Follow the procedures for your environment: </br>- [Onboard and offboard macOS devices into Microsoft Purview solutions using Intune](device-onboarding-offboarding-macos-intune.md#onboard-and-offboard-macos-devices-into-microsoft-purview-solutions-using-intune) </br>- [Onboard and offboard macOS devices into Compliance solutions using Intune for Microsoft Defender for Endpoint customers](device-onboarding-offboarding-macos-intune-mde.md#onboard-and-offboard-macos-devices-into-compliance-solutions-using-intune-for-microsoft-defender-for-endpoint-customers)</br>- [Onboard and offboard macOS devices into Microsoft Purview solutions using JAMF Pro](device-onboarding-offboarding-macos-jamfpro.md#onboard-and-offboard-macos-devices-into-microsoft-purview-solutions-using-jamf-pro)</br>- [Onboard and offboard macOS devices into Compliance solutions using JAMF Pro for Microsoft Defender for Endpoint customers](device-onboarding-offboarding-macos-jamfpro-mde.md#onboard-and-offboard-macos-devices-into-compliance-solutions-using-jamf-pro-for-microsoft-defender-for-endpoint-customers) |This device has not synced the latest policy updates. If the policy update was made within the last 2 hours, wait for the policy to reach your device. |
-|Not available | Device properties are not available in the device list. This is could be because the device doesn't meet the minimum OS version, or configuration or if the device was just onboarded. |Device properties are not available in the device list. This is could be because the device doesn't meet the minimum OS version, or configuration or if the device was just onboarded.|
+|Not updated | You need to enable the configuration settings for this device. Follow the procedures for your environment: </br>- [Onboard and offboard macOS devices into Microsoft Purview solutions using Intune](device-onboarding-offboarding-macos-intune.md#onboard-and-offboard-macos-devices-into-microsoft-purview-solutions-using-intune) </br>- [Onboard and offboard macOS devices into Compliance solutions using Intune for Microsoft Defender for Endpoint customers](device-onboarding-offboarding-macos-intune-mde.md#onboard-and-offboard-macos-devices-into-compliance-solutions-using-intune-for-microsoft-defender-for-endpoint-customers)</br>- [Onboard and offboard macOS devices into Microsoft Purview solutions using JAMF Pro](device-onboarding-offboarding-macos-jamfpro.md#onboard-and-offboard-macos-devices-into-microsoft-purview-solutions-using-jamf-pro)</br>- [Onboard and offboard macOS devices into Compliance solutions using JAMF Pro for Microsoft Defender for Endpoint customers](device-onboarding-offboarding-macos-jamfpro-mde.md#onboard-and-offboard-macos-devices-into-compliance-solutions-using-jamf-pro-for-microsoft-defender-for-endpoint-customers) |This device hasn't synced the latest policy updates. If the policy update was made within the last 2 hours, wait for the policy to reach your device. |
+|Not available | Device properties aren't available in the device list. This could be because the device doesn't meet the minimum OS version, or configuration or if the device was just onboarded. |Device properties aren't available in the device list. This could be because the device doesn't meet the minimum OS version, or configuration or if the device was just onboarded.|
## Related topics
compliance Dlp Configure Endpoint Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-configure-endpoint-settings.md
Before you get started, you should set up your DLP settings.
|Setting |Windows 10, 1809 and later, Windows 11 |macOS (three latest released versions) |Notes | |||||
+|Advanced classification | Supported | Supported (preview)|Advanced classification enables these features for macOS (preview): - [Document Fingerprinting](document-fingerprinting.md) </br>- [Exact data match based sensitive information types](sit-learn-about-exact-data-match-based-sits.md#learn-about-exact-data-match-based-sensitive-information-types) </br>- [Trainable classifiers](classifier-learn-about.md) </br>- [Learn about named entities](named-entities-learn.md) |
|File path exclusions |Supported |Supported |macOS includes a recommended list of exclusions that is on by default |
+|Network share coverage and exclusions | Supported |Not Supported|
|Restricted apps |Supported |Supported | |
-|Restricted app groups |Supported |Not supported
-|Unallowed Bluetooth apps |Supported |Not supported | |
+|Restricted app groups |Supported |Supported (preview)|
+|Unallowed Bluetooth apps |Supported |Supported | |
|Browser and domain restrictions to sensitive items |Supported |Supported | | |Additional settings for Endpoint DLP |Supported |Supported |Only the default business justifications are supported for macOS devices | |Always audit file activity for devices |Supported |Supported | |
-|Auto-quarantine file from unallowed apps | Supported | Not supported| |
-|Advanced classification | Supported | Not supported| |
-|Business justification in policy tips | Supported | Supported| |
+|Printer groups| Supported |Not Supported| |
+|Removabled USB device groups| Supported | Not Supported | |
+|Auto-quarantine file from unallowed apps | Supported | Supported (preview)| |
+|Network share groups | Supported | Not Supported | |
+|VPN settings | Supported | Not Supported | |
+|Business justification in policy tips | Supported | Supported (preview)| |
+|Notification customization|Supported | Supported (preview)|
+|Archive file| Supported | Not supported| |
+|File type and File extension |Supported | Not supported| |
+ ### Advanced classification scanning and protection
When **Access by restricted apps** is selected in a policy and a user uses an ap
> [!IMPORTANT] > The action (`audit`, `block with override`, or `block`) defined for apps that are on the restricted apps list only applies when a user attempts to ***access*** a protected item.
-#### File activities for apps in restricted app groups
+#### File activities for apps in restricted app groups (preview)
Restricted app groups are collections of apps that you create in DLP settings and then add to a rule in a policy. When you add a restricted app group to a policy, you can take the actions defined in this table.
You define a printer by these parameters:
- USB vendor ID - Get the Device Instance path value from the printer device property details in device manager. Convert it to Product ID and Vendor ID format, see [Standard USB identifiers](/windows-hardware/drivers/install/standard-usb-identifiers). - IP range - Print to file - Microsoft Print to PDF or Microsoft XPS Document Writer. If you only want to enforce Microsoft Print to PDF, you should use Friendly printer name with 'Microsoft Print to PDF'.-- Universal print deployed on a printer - See, [Set up Universal Print](/universal-print/fundamentals/universal-print-getting-started.md) for more information on universal printers
+- Universal print deployed on a printer - See, [Set up Universal Print](/universal-print/fundamentals/universal-print-getting-started) for more information on universal printers
- Corporate printer - is a print queue shared through on-premises Windows print server in your domain. Its path might look like \\print-server\contoso.com\legal_printer_001 - Print to local: Any printer connecting through Microsoft print port but not any of above type, for example print through remote desktop or redirect printer.
compliance Dlp Configure View Alerts Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-configure-view-alerts-policies.md
f1.keywords:
Previously updated : 10/12/2020 Last updated : 04/06/2023 audience: ITPro f1_keywords:
To work with the DLP alert management dashboard:
- To see the history of workflow management, choose **Management log**. - After you take the required action for the alert, set the status of the alert to **Resolved**.
-### Other matched conditions (preview)
+### Other matched conditions
Microsoft Purview supports showing matched conditions in a DLP event to reveal the exact cause for a flagged DLP policy. This information will show up in:
compliance Dlp Policy Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md
f1.keywords: CSH
Previously updated : 03/06/2023 Last updated : 04/06/2023 audience: Admin
For example, you might have a DLP policy that helps you detect the presence of i
![Diagram shows that DLP policy contains locations and rules](../media/c006860c-2d00-42cb-aaa4-5b5638d139f7.png)
-#### For endpoints (preview)
+#### For endpoints
When an item matches multiple DLP rules, DLP goes uses through a complex algorithm to decide which actions to apply. Endpoint DLP will apply the aggregate or sum of most restrictive actions. DLP uses these factors when making the calculation.
compliance Dlp Powerbi Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-powerbi-get-started.md
search.appverid:
- MET150 description: "Prepare for and deploy DLP to Power BI locations, to help organizations detect and protect their sensitive data."
-# Get started with Data loss prevention policies for Power BI (preview)
+# Get started with Data loss prevention policies for Power BI
To help organizations detect and protect their sensitive data, [Microsoft Purview Data Loss Prevention (DLP) polices](/microsoft-365/compliance/dlp-learn-about-dlp) support Power BI. When a Power BI data set matches the criteria in a DLP policy, an alert that explains the nature of the sensitive content can be triggered. This alert is also registered in the data loss prevention **Alerts** tab in the Microsoft compliance portal for monitoring and management by administrators. In addition, email alerts can be sent to administrators and specified users.
To help organizations detect and protect their sensitive data, [Microsoft Purvie
## Considerations and limitations - DLP policies apply to workspaces. Only workspaces hosted in Premium Gen2 capacities are supported. For more information, see [What is Power BI Premium Gen2?](/power-bi/enterprise/service-premium-gen2-what-is).-- DLP dataset evaluation workloads impact capacity. Metering for DLP evaluation workloads isn't supported.
+- DLP dataset evaluation workloads impact capacity. For more information, see [CPU metering for DLP policy evaluation](/power-bi/enterprise/service-security-dlp-policies-for-power-bi-overview.md#cpu-metering-for-dlp-policy-evaluation)
- Both classic and new experience workspaces are supported, as long as they're hosted in Premium Gen2 capacities. - You must create a custom DLP custom policy for Power BI. DLP templates aren't supported. - DLP policies that are applied to the DLP location support sensitivity labels and sensitive information types as conditions. - DLP policies for Power BI aren't supported for sample datasets, [streaming datasets](/power-bi/connect-data/service-real-time-streaming), or datasets that connect to their data source via [DirectQuery](/power-bi/connect-data/desktop-use-directquery) or [live connection](/power-bi/connect-data/desktop-directquery-about#live-connections).-- DLP policies for Power BI aren't supported in sovereign clouds.+ ## Licensing and permissions
Data from DLP for Power BI can be viewed in [Activity explorer](/microsoft-365/c
## How DLP policies for Power BI work
-You define a DLP policy in the data loss prevention section of the compliance portal. See, [Design a data loss prevention policy](dlp-policy-design.md#design-a-data-loss-prevention-policy). In the policy, you specify sensitivity label(s) you want to detect. You also specify the action(s) that will happen when the policy detects a dataset that has a specified sensitivity label applied. DLP policies support two actions for Power BI:
+You define a DLP policy in the data loss prevention section of the compliance portal. See, [Design a data loss prevention policy](dlp-policy-design.md#design-a-data-loss-prevention-policy). In the policy, you specify the sensitivity label(s) and/or sensitive information types that you want to detect. You also specify the action(s) that will happen when the policy detects a dataset that has a specified sensitivity label applied. DLP policies support two actions for Power BI:
- User notification via policy tips. - Alerts. Alerts can be sent by email to administrators and users. Additionally, administrators can monitor and manage alerts on the **Alerts** tab in the compliance portal.
compliance Dlp Sensitivity Label As Condition https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-sensitivity-label-as-condition.md
You can use [sensitivity labels](sensitivity-labels.md) as a condition in DLP po
- Exchange Online email messages - SharePoint Online - OneDrive for Business sites-- Windows 10/11 devices
+- Devices
+ Sensitivity labels appear as an option in the **Content contains** list.
You can use sensitivity labels as conditions on these items and in these scenari
|OneDrive for Business |items |yes |yes | |Teams |Teams and channel messages |not applicable |not applicable | |Teams |attachments |yes ** |yes ** |
-|Windows 10/11 devices |items |yes |yes |
+|Devices|items |yes |yes |
|MCAS (preview) |items |yes |yes | \* DLP detection of sensitivity labeled email attachments is supported for Open XML-based Office file types only.
compliance Dlp Test Dlp Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-test-dlp-policies.md
The report is sent to the smtp address you passed the Test-DlpPolicies PowerShel
|Field name |Means | ||| |Classification ID |The sensitive information type (SIT) the item is categorized as |
-|Confidence |The [confidence level](/sensitive-information-type-learn-about.md#more-on-confidence-levels) of the SIT |
+|Confidence |The [confidence level](./sensitive-information-type-learn-about.md#more-on-confidence-levels) of the SIT |
|Count |The total number of times the SIT value was found in the item, this includes duplicates | |Unique Count |The number SIT values found in the item with duplicates eliminated | |Policy Details |The name and GUID of the policy that was evaluated |
compliance Endpoint Dlp Learn About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-learn-about.md
Endpoint DLP enables you to audit and manage the following types of activities u
|Activity |Description |Windows 10 1809 and later/ Windows 11| macOS three latest released versions | Auditable/restrictable| ||||||
-|upload to cloud service, or access by unallowed browsers | Detects when a user attempts to upload an item to a restricted service domain or access an item through a browser. If they are using a browser that is listed in DLP as an unallowed browser, the upload activity will be blocked and the user is redirected to use Microsoft Edge. Microsoft Edge will then either allow or block the upload or access based on the DLP policy configuration |supported | supported|auditable and restrictable|
-|copy to other app |Detects when a user attempts to copy information from a protected item and then paste it into another app, process or item. It also detects when a user copies and pastes content among files within the same app, process or item for Word, Excel, and PowerPoint.|supported|supported | auditable and restrictable|
-|copy to USB removable media |Detects when a user attempts to copy an item or information to removable media or USB device.|supported|supported | auditable and restrictable|
-|copy to a network share |Detects when a user attempts to copy an item to a network share or mapped network drive |supported|supported |auditable and restrictable|
-|print a document |Detects when a user attempts to print a protected item to a local or network printer.|supported|supported|auditable and restrictable |
-|copy to a remote session|Detects when a user attempts to copy an item to a remote desktop session |supported|not supported| auditable and restrictable|
-|copy to a Bluetooth device|Detects when a user attempts to copy an item to an unallowed Bluetooth app (as defined in the list of unallowed Bluetooth aps in Endpoint DLP settings).|supported|not supported| auditable and restrictable|
-|create an item|Detects when a user creates an item|supported |supported |auditable|
-|rename an item|Detects when a user renames an item|supported |supported |auditable|
+|Upload to cloud service, or access by unallowed browsers | Detects when a user attempts to upload an item to a restricted service domain or access an item through a browser. If they're using a browser that is listed in DLP as an unallowed browser, the upload activity will be blocked and the user is redirected to use Microsoft Edge. Microsoft Edge will then either allow or block the upload or access based on the DLP policy configuration. You can block, warn, or audit when protected files are prevented from or allowed to be uploaded to cloud services based on the allow/unallowed domains list in global settings. When the configured action is set to warn or block, other browsers (defined on unallowed browsers list under Global settings) are blocked from accessing the file. |Supported |Supported|Auditable and restrictable|
+|Copy to other app |Detects when a user attempts to copy information from a protected item and then paste it into another app, process or item. It also detects when a user copies and pastes content among files within the same app, process or item for Word, Excel, and PowerPoint.|Supported|Supported | Auditable and restrictable|
+|Copy to USB removable media |When this activity is detected, you can block, warn or audit the copying or moving of protected files from an endpoint device to USB removable media.|Supported|Supported |Auditable and restrictable|
+|Copy to a network share | When this activity is detected, you can block, warn, or audit the copying or moving of protected files from an endpoint device to any network share. |Supported|Supported |Auditable and restrictable|
+|Print a document |When this activity is detected, you can block, warn, or audit the printing of protected files from an endpoint device. |Supported|Supported|Auditable and restrictable |
+|Copy to a remote session|Detects when a user attempts to copy an item to a remote desktop session. |Supported|Not supported| Auditable and restrictable|
+|Copy to a Bluetooth device|Detects when a user attempts to copy an item to an unallowed Bluetooth app (as defined in the list of unallowed Bluetooth aps in Endpoint DLP settings).|Supported|Supported (preview)| Auditable and restrictable|
+|Create an item|Detects when a user creates an item.|Supported |Supported |Auditable|
+|Rename an item|Detects when a user renames an item.|Supported |Supported |Auditable|
+|Copy to clipboard| When this activity is detected, you can block, warn, or audit data the copying of protected files to a clipboard on an endpoint device. |Supported | Supported|Auditable and restrictable|
+|Access by unallowed apps| Detects when an application that is on the unallowed apps list (as defined in [restricted apps and app groups](dlp-configure-endpoint-settings.md)) attempts to access protected files on an endpoint device. |Supported |Supported|
+ ## Best practice for endpoint DLP policies
If the extension is changed only to supported file extensions:
### File types
-File Types are a grouping of file formats which are utilized to protect specific workflows or areas of business. You can use one or more File types as conditions in your DLP policies.
+File types are a grouping of file formats, which are utilized to protect specific workflows or areas of business. You can use one or more File types as conditions in your DLP policies. File types are supported for Windows 10/11 devices.
|File Type |App |monitored file extensions | ||||
compliance Named Entities Learn https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/named-entities-learn.md
description: "Learn how named entities help you detect sensitive items containin
- [Data Lifecycle Management](information-governance.md) - [Records management](records-management.md) - [Microsoft Purview eDiscovery](ediscovery.md)-- [Microsoft Priva](/privacy/priv)
+- [Microsoft Priva](/privacy/priva/priva-overview)
- [Exact data match sensitive information types](sit-learn-about-exact-data-match-based-sits.md) DLP makes special use of named entities in *enhanced policy templates*, which are pre-configured DLP policies that you can customize for your organizations needs. You can also [create your own DLP policies](dlp-create-deploy-policy.md) from a blank template and use a named entity SIT as a condition.
compliance Retention Policies Sharepoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-sharepoint.md
For retention policies and auto-apply label policies: SharePoint sites must be i
To store content that needs to be retained, SharePoint and OneDrive create a Preservation Hold library if one doesn't exist for the site. The Preservation Hold library isn't designed to be used interactively but instead, automatically stores files when this is needed for compliance reasons. It's not supported to edit, delete, or move these automatically retained files yourself. Instead, use compliance tools, such as those supported by [eDiscovery](ediscovery.md) to access these files.
-The Preservation Hold library works in the following way:
+The Preservation Hold library works in the following way to support retention policies and retention labels:
When a user changes an item that's subject to retention from a retention policy or a retention label that marks items as a record, or deletes any item subject to retention, the original content is copied to the Preservation Hold library. This behavior lets the user to change or delete the content in their app, while keeping a copy of the original for compliance reasons.
compliance Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/whats-new.md
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
- **General availability (GA)**: [Learn about the Microsoft Purview Firefox extension](dlp-firefox-extension-learn.md) and [Get started with the Microsoft Purview Firefox extension](dlp-firefox-extension-get-started.md) - **In preview**:
- - [Endpoint DLP Aggregated most restrictive actions applied to endpoints](dlp-policy-reference.md#for-endpoints-preview)
+ - [Endpoint DLP Aggregated most restrictive actions applied to endpoints](dlp-policy-reference.md#for-endpoints)
- [Just in time protection for endpoints and network shares](endpoint-dlp-learn-about.md#just-in-time-protection-preview)
- - [Display of conditions matched when an item matches a policy](dlp-configure-view-alerts-policies.md#other-matched-conditions-preview)
+ - [Display of conditions matched when an item matches a policy](dlp-configure-view-alerts-policies.md#other-matched-conditions)
- [Endpoint DLP policies can be applied to network shares](dlp-configure-endpoint-settings.md#network-share-coverage-and-exclusions-preview) - Support for [endpoint DLP policies in Azure virtual desktop, Citrix Virtual Apps and Desktops 7, Amazon virtual workspaces and Hyper-v environments](endpoint-dlp-getting-started.md#endpoint-dlp-support-for-virtualized-environments-preview) - [Show policy tips as an oversharing popup](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup-preview)
enterprise Cross Tenant Mailbox Migration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/cross-tenant-mailbox-migration.md
When a mailbox is migrated cross-tenant with this feature, only user visible con
## Licensing
-> [!IMPORTANT]
-> This cross-tenant functionality is only available to customers with Enterprise Agreements. Licensing is not available via other purchase options at this time.
-
-Cross Tenant User Data Migration is available as an add-on to the following Microsoft 365 subscription plans for Enterprise Agreement customers. User licenses are per migration (onetime fee). Please contact your Microsoft account team for details.
+Cross Tenant User Data Migration is available as an add-on to the following Microsoft 365 subscription plans for Enterprise Agreement customers. User licenses are per migration (one-time fee) and can be assigned either on the source or target user object. This license also covers [OneDrive for Business migration](/microsoft-365/enterprise/cross-tenant-onedrive-migration). Contact your Microsoft account team for details.
Microsoft 365 Business Basic/Business Standard/Business Premium/F1/F3/E3/E5/; Office 365 F3/E1/E3/E5; Exchange Online; SharePoint Online; OneDrive for Business.
Get-MailUser -Identity <Migrate Mail User> | Enable-RemoteMailbox
While Teams meetings are moved, the meeting URL isn't updated when items migrate cross-tenant. Since the URL will be invalid in the target tenant, you must remove and recreate Teams meetings.
+### What content is migrated cross-tenant?
+
+When a mailbox is migrated cross-tenant with this feature, only user-visible content in the mailbox, also known as Top of Information Store (email, contacts, calendar, tasks, and notes), and the Recoverable Items folders Deletions, Versions, and Purges are migrated.
+ ### Does the Teams chat folder content migrate cross-tenant?
-No, the Teams chat folder content doesn't migrate cross-tenant. When a mailbox is migrated cross-tenant with this feature, only user visible content in the mailbox (email, contacts, calendar, tasks, and notes) is migrated.
+No, the Teams chat folder content does not migrate cross-tenant. However, once the mailbox has been migrated cross-tenant, the Teams chat folder content will be available for source tenant admins to search and export using a content search.
### How can I see just moves that are cross-tenant moves, not my onboarding and off-boarding moves?
Yes. It's possible to have two instances of Azure AD Connect synchronize to diff
### Do auto-expanded archive mailboxes move?
-Yes, if the user in source has auto-expanding archives enabled and has additional auxiliary archives, cross-tenant mailbox migration will work. We support moving users that have no more than 12 auxiliary archive mailboxes. Additionally, users with large primary, large main archive, and large auxiliary archive mailboxes will require extra time to synchronize and should be submitted well in advance of the cutover date. Also note that if the source mailbox is expanded during the mailbox migration process, the migration will fail as a new auxiliary archive will be created in the source, but not in the target. In this case, you'll need to remove the user from the batch and resubmit them.
+- **Issue: Auto Expanded archives cannot be migrated.** Yes, if the user in source has auto-expanding archives enabled and has additional auxiliary archives, cross-tenant mailbox migration will work. We support moving users that have no more than 12 auxiliary archive mailboxes. Additionally, users with large primary, large main archive, and large auxiliary archive mailboxes will require extra time to synchronize and should be submitted well in advance of the cutover date. Also note that if the source mailbox is expanded during the mailbox migration process, the migration will fail as a new auxiliary archive will be created in the source, but not in the target. In this case, you'll need to remove the user from the batch and resubmit them.
## Known issues
enterprise M365 Dr Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/m365-dr-overview.md
To provide clarity to the descriptions below on data residency functionality and
| **Term** | **Definition** | |:--|:--| |Macro Region Geography <br/> |Macro Region Geography 1 ΓÇô EMEA, Macro Region Geography ΓÇô Asia Pacific, Macro Region Geography - Americas <br/> |
-|Macro Region Geography 1 - EMEA <br/> |Data centers in Austria, Finland, France, Ireland, Netherlands, Sweden <br/> |
+|Macro Region Geography 1 - EMEA <br/> |Data centers in Austria, Finland, France, Ireland, Netherlands, Poland, Sweden <br/> |
|Macro Region Geography 2 - Asia Pacific <br/> |Data centers in Hong Kong, Japan, Malaysia, Singapore, South Korea <br/> | |Macro Region Geography 3 - Americas <br/> |Data centers in Brazil, Chile, United States <br/> |
-|Local Region Geography <br/> |Australia, Brazil, Canada, France, Germany, India, Japan, Qatar, South Korea, Norway, South Africa, Sweden, Switzerland, United Arab Emirates, United Kingdom <br/> |
-|Expanded Local Region Geography <br/> |Poland, Italy, Indonesia, Israel, Spain, Mexico, Malaysia, Austria, Chile, New Zealand, Denmark, Greece, Taiwan <br/> |
+|Local Region Geography <br/> |Australia, Brazil, Canada, France, Germany, India, Japan, Poland, Qatar, South Korea, Norway, South Africa, Sweden, Switzerland, United Arab Emirates, United Kingdom <br/> |
+|Expanded Local Region Geography <br/> | Future planned data center regions: Italy, Indonesia, Israel, Spain, Mexico, Malaysia, Austria, Chile, New Zealand, Denmark, Greece, Taiwan <br/> |
|Geography <br/> |_Local Region Geography, Expanded Local Region Geography_, or _Macro Region Geography_ <br/> | |Satellite Geography <br/> |If a customer subscribes to the Multi Geo service, then they can cause defined user customer data to be stored in other Geographies outside of the _Tenant_ _Primary Provisioned Geography_ <br/> | |AAD <br/> |Azure Active Directory <br/> |
Once a Microsoft 365 service provisions a _Tenant_ into a particular _Geography_
There are three methods for ensuring that the _Tenant_ data location for a particular service does not change.
-1. Product Terms: Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams provisioned in any _Local Region Geography_, or the European Union or the United States have a commitment for customer data residency expressed in the [Product Terms](https://www.microsoft.com/licensing/terms/product/PrivacyandSecurityTerms/all). For more information see the [Product Terms Data Residency page](m365-dr-product-terms-dr.md).
+1. Product Terms: Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams provisioned in Australia, Brazil, Canada, France, Germany, India, Japan, Qatar, South Korea, Norway, South Africa, Sweden, Switzerland, United Arab Emirates, United Kingdom, European Union and the United States have a commitment for customer data residency expressed in the [Product Terms](https://www.microsoft.com/licensing/terms/product/PrivacyandSecurityTerms/all). For more information see the [Product Terms Data Residency page](m365-dr-product-terms-dr.md).
1. _Multi Geo_ subscription: allows customers to assign data location for Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams to any supported _Geography_. For more information see [Multi Geo Data Residency](microsoft-365-multi-geo.md).
-1. _Advanced Data Residency_ subscription guarantees data residency for an expanded set of Microsoft 365 services in any _Local Region Geography_ or _Expanded Local Region Geography_. For more information see the [Advanced Data Residency page](advanced-data-residency.md).
+1. _Advanced Data Residency_ subscription guarantees data residency for an expanded set of Microsoft 365 services in any _Local Region Geography_. For more information see the [Advanced Data Residency page](advanced-data-residency.md).
**Table 2: Available Data Residency by Workload**
There are three methods for ensuring that the _Tenant_ data location for a parti
| Viva Topics <br/> |- <br/> |- <br/> |X<sup>3</sup> <br/> | | Microsoft Purview <br/> |- <br/> |- <br/> |X<sup>3</sup> <br/> |
-1. Only available for _Local Region Geography_ countries, European Union and the United States.
-1. Available in _Local Region Geography_, _Expanded Local Region Geography_ and _Regional Geography countries/regions_
-1. Only available for _Local Region Geography_ and _Expanded Local Region Geography_ countries.
+1. Only available in the following countries/region: Australia, Brazil, Canada, France, Germany, India, Japan, Poland, Qatar, South Korea, Norway, South Africa, Sweden, Switzerland, United Arab Emirates, United Kingdom, European Union and the United States.
+1. Available in _Local Region Geography_, _Expanded Local Region Geography_ (when the future data center is launched) and _Regional Geography countries/regions_
+1. Only available for _Local Region Geography_ and _Expanded Local Region Geography_ (when the future data center is launced) countries.
>[!NOTE] >See the [Workload Data Residency Capabilities section](m365-dr-workload-exo.md) for more details on these topics.
There are three methods for ensuring that the _Tenant_ data location for a parti
| Germany | P-M-A | P-M-A | P-M-A | A | A | A | A | A | | India | P-M-A | P-M-A | P-M-A | A | A | A | A | A | | Japan | P-M-A | P-M-A | P-M-A | A | A | A | A | A |
+| Poland | M-A | M-A | M-A | A | A | A | A | A |
| Qatar | P-M-A | P-M-A | P-M-A | A | A | A | A | A | | South Korea | P-M-A | P-M-A | P-M-A | A | A | A | A | A | | Norway | P-M-A | P-M-A | P-M-A | A | A | A | A | A |
The following Regional Geographies can store data at rest.
|**Regional Geographies** |**Locations where customer data may be stored** | |||
-|Macro Region Geography 1 - EMEA (Europe, Middle East and Africa) | Austria, Finland, France, Ireland, Netherlands, Sweden |
+|Macro Region Geography 1 - EMEA (Europe, Middle East and Africa) | Austria, Finland, France, Ireland, Netherlands, Poland, Sweden |
|Macro Region Geography 2 - Asia Pacific | Hong Kong, Japan, Malaysia, Singapore, South Korea | |Macro Region Geography 3 - Americas | Brazil, Chile, United States |
The following Regional Geographies can store data at rest.
|Australia |Sydney, Melbourne | |Brazil |Rio, Campinas | |Canada |Quebec City, Toronto |
-|European Union |Austria (Vienna), Finland (Helsinki), France (Paris, Marseille), Ireland (Dublin), Netherlands (Amsterdam), Sweden (Gävle, Sandviken, Staffanstorp) |
+|European Union |Austria (Vienna), Finland (Helsinki), France (Paris, Marseille), Ireland (Dublin), Netherlands (Amsterdam), Poland (Warsaw), (Sweden (Gävle, Sandviken, Staffanstorp) |
|France |Paris, Marseille | |Germany |Frankfurt, Berlin | |India |Chennai, Mumbai, Pune | |Japan |Osaka, Tokyo | |South Korea |Busan, Seoul | |Norway |Oslo, Stavanger |
+|Poland |Warsaw |
|Qatar |Doha | |South Africa |Cape Town, Johannesburg | |Sweden |Gävle, Sandviken, Staffanstorp |
enterprise Office 365 Network Mac Perf Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-insights.md
description: "Microsoft 365 Network Insights"
Insights are intended to help in designing network perimeters for your office locations. Each insight provides live details about the performance characteristics for a specific common issue for each geographic location where users are accessing your tenant.
-There are six specific network insights that may be shown for each office location:
+These are network insights that may be shown for each office location:
- [Backhauled network egress](#backhauled-network-egress) - [Network intermediary device](#network-intermediary-device)
There are six specific network insights that may be shown for each office locati
- [Low download speed from SharePoint front door](#low-download-speed-from-sharepoint-front-door) - [China user optimal network egress](#china-user-optimal-network-egress)
-There are two tenant-level network insights that may be shown for the tenant:
+These are tenant-level network insights that may be shown for the tenant:
- [Exchange sampled connections affected by connectivity issues](#exchange-sampled-connections-affected-by-connectivity-issues) - [SharePoint sampled connections affected by connectivity issues](#sharepoint-sampled-connections-affected-by-connectivity-issues) These insights also appear in the productivity score pages.
->[!IMPORTANT]
->Network insights, performance recommendations and assessments in the Microsoft 365 Admin Center is currently in preview status, and is only available for Microsoft 365 tenants that have been enrolled in the feature preview program.
## Backhauled network egress
frontline Teams In Hc https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/teams-in-hc.md
description: Learn about the telemedicine features in Microsoft 365 and Microsof
- seo-marvel-apr2020 - seo-marvel-jun2020 Previously updated : 03/03/2023 Last updated : 03/15/2023 # Get started with Microsoft 365 for healthcare organizations
To get the most benefit for your healthcare organization, you first choose which
## Scenarios for healthcare
-The following scenarios are available for healthcare organizations:
+Facilitate and centralize collaboration among care teams and across your entire healthcare organization.
+
+- [Provide seamless virtual visits](#provide-seamless-virtual-visits)
+- [Connect and engage the healthcare workforce](#connect-and-engage-the-healthcare-workforce)
+- [Efficiently manage and motivate care teams](#efficiently-manage-and-motivate-care-teams)
+
+The following scenarios support these goals:
| Scenario | Description | Requirements | | -- | -- | -- |
-| [Virtual Appointments with Teams and Electronic Healthcare Record (EHR) integration](#virtual-appointments-and-electronic-healthcare-record-ehr-integration) | Schedule, manage, and conduct virtual appointments with patients. This scenario connects Teams and the Oracle Health or Epic platform to support virtual appointments. | Active subscription to Microsoft Cloud for Healthcare or subscription to Microsoft Teams EHR connector standalone offer. <br> Users must have an appropriate Microsoft 365 or Office 365 license that includes Teams meetings*. <br> Organizations must have Oracle Health version November 2018 or later or Epic version November 2018 or later. <br>Details for [Oracle Health EHR](ehr-admin-oracle-health.md#before-you-begin) and [Epic EHR](ehr-admin-epic.md#before-you-begin) requirements |
-| [Virtual Appointments with Teams](#virtual-appointments-and-electronic-healthcare-record-ehr-integration) | Schedule, manage, and conduct virtual appointments with patients. This scenario relies on the Virtual Appointments app or the Bookings app to support virtual appointments. | The Virtual Appointments app or the Bookings app must be enabled for your organization. <br> All staff who conduct meetings must have a license that supports Teams Meeting scheduling*.|
-| [Care coordination and collaboration](#care-coordination-and-collaboration) | Clinicians and staff can collaborate internally on schedules, documents, tasks, and so on.| Users must have an appropriate license*. |
+| [Virtual Appointments](virtual-appointments.md) | Schedule, manage, and conduct virtual appointments with patients. This scenario connects Teams and the Oracle Health or Epic platform to support virtual appointments. | Active subscription to Microsoft Cloud for Healthcare or subscription to Microsoft Teams EHR connector standalone offer. <br> Users must have an appropriate Microsoft 365 or Office 365 license that includes Teams meetings*. <br> Organizations must have Oracle Health version November 2018 or later or Epic version November 2018 or later. <br>Details for [Oracle Health EHR](ehr-admin-oracle-health.md#before-you-begin) and [Epic EHR](ehr-admin-epic.md#before-you-begin) requirements |
+| [Team communication and collaboration](flw-team-collaboration.md) |Help your frontline workforce communicate within their store, shift, or team with Microsoft Teams. Viva Connections helps you create a dashboard that puts the information they need front and center on their devices, so they can reach out whenever they need to. |Users must have an appropriate license to use Microsoft Teams apps.* |
+| [Engage your employees and focus on employee wellbeing](flw-wellbeing-engagement.md) | Build deeper connections across your organization and create an inclusive workplace. |Users must have an appropriate license to use Microsoft Teams apps.* |
+| [Schedule your teams with Shifts](shifts-for-teams-landing-page.md) |Use Shifts and Shifts Connectors to schedule your team and connect with your workforce management tools. |Users must have an appropriate license to use Microsoft Teams apps.* |
+| [Simplify business processes](simplify-business-processes.md) | Use task publishing to create standard processes across sites, lists to manage information and track ongoing processes, and streamline requests with Approvals. Automated workflows can speed up and automate actions, like collecting data or routing notifications. |Users must have an appropriate license to use Microsoft Teams apps.* To use Power Apps and Power Automate, users will need an appropriate license.**|
*Office 365 A3, A5, E3, E5, F1, F3, Microsoft 365 A3, A5, E3, and E5, Business Standard are supported. For more information about general Teams licensing, see [Manage user access to Teams](/microsoftteams/user-access).
+**Office 365 E1, E3, E5, F3, Microsoft 365 E3, E5, F3.
+For a detailed comparison of what's included in Microsoft 365 with various licenses, see this [Comparison table](https://go.microsoft.com/fwlink/?linkid=2139145).
-Or choose from other [scenarios](flw-choose-scenarios.md) for Microsoft 365 for frontline workers, such as [Corporate communications](flw-corp-comms.md) or [Wellbeing and engagement](flw-wellbeing-engagement.md).
-
-And take advantage of these features that help Microsoft Teams work for your healthcare organization:
-
-| Feature | Description | Requirements |
-| -- | -- | -- |
-| [Teams policy packages](#teams-policy-packages)| Ensure that clinical workers, information workers, and patient room devices have the appropriate access to Teams functionality.| Users must have an appropriate license*. |
-| [Secure messaging](#secure-messaging) | Get quicker attention to urgent messages and have confidence that the message was received and read. | Users must have an appropriate license*. |
-| [Teams templates](#teams-templates-for-healthcare-organizations) | Create teams that include a predefined template of settings, channels, and pre-installed apps for communication and collaboration within a ward, pod, or department, or between multiple wards, pods, and departments within a hospital. | Users must have an appropriate license*. |
+Depending on your business needs, you can choose to incorporate more [scenarios](flw-choose-scenarios.md) for Microsoft 365 for frontline workers.
### Download a poster with scenario overviews
Use the following poster to start envisioning what your organization can do with
|:--|:--| |[![Microsoft 365 for frontline workers: Healthcare scenarios.](media/m365-frontline-healthcare-thumb.png)](https://go.microsoft.com/fwlink/?linkid=2206475) <br/> [PDF](https://go.microsoft.com/fwlink/?linkid=2206475) \| [Visio](https://go.microsoft.com/fwlink/?linkid=2206474) <br>Updated September 2022 |This poster provides an overview of the scenarios you can implement for your frontline workforce in a healthcare setting.|
-## Virtual Appointments and Electronic Healthcare Record (EHR) integration
+## Provide seamless virtual visits
Use the complete meetings platform in Teams to schedule, manage, and conduct virtual appointments with patients. - If your organization already uses an Electronic Health Record (EHR) system, you can integrate Teams for a more seamless experience. Teams Electronic Health Record (EHR) connector makes it easy for clinicians to launch a virtual patient appointment or consultation with another provider in Teams directly from the EHR system. To learn more, see [Virtual Appointments with Teams - Integration into Oracle Health EHR](ehr-admin-oracle-health.md) and [Virtual Appointments with Teams - Integration into Epic EHR](ehr-admin-epic.md).-- If you aren't using a supported EHR system, you can use the Virtual Appointments app the Bookings app in Teams. To learn more, see [Virtual Appointments with Teams](virtual-appointments.md).
+- If you aren't using a supported EHR system, you can use the Virtual Appointments app in Teams. To learn more, see [Virtual Appointments with Teams](virtual-appointments.md).
![Virtual Appointments with Microsoft Teams.](media/virtual-visits-teams.png)
-## Teams policy packages
+## Connect and engage the healthcare workforce
-Apply Teams policy packages to define what different roles can do in Teams. For example, specify policies for:
+Bring your health team together to coordinate care and collaborate with Teams.
-- Clinical workers, such as registered nurses, charge nurses, physicians, and social workers, so that they can have full access to chat, calling, shift management, and meetings.-- Information workers in your healthcare organization, such as IT personnel, informatics staff, finance personnel, and compliance officers, can have full access to chat, calling, and meetings.-- Patient rooms, to control settings for patient room devices.
+![Screenshot of Healthcare: Collaborate with your health team in Teams.](media/teams-healthcare-collaborate-in-teams.png)
-To learn more, see [Teams policy packages for healthcare](/microsoftteams/policy-packages-healthcare?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
+Teams enables physicians, clinicians, nurses, and other staff to collaborate efficiently with included collaboration features in Teams, such as:
-## Secure messaging
+- Set up teams and channels for your health teams and information workers. Use channels with tabs as a way to structure their work, with additional help from tabs to which they can pin information sources.
+- Chat, post messages, and communicate. Your team can have persistent conversations about different patients needing attention.
+- Call and meet with members of the health team. Set up individual meetings, or use channel meetings to manage daily meetings, both with the power of Teams audio, video, screen sharing, recording, and transcription features.
+- Store and share files and documents. Your health team is part of a single virtualized team that works and collaborates on Office documents.
+
+### Secure messaging
Secure messaging supports collaboration within health teams, including several new features:
Together, these features allow quicker attention to urgent messages and confiden
To learn more, see [Get started with Secure Messaging policies for Healthcare organizations](messaging-policies-hc.md).
-Also related to secure messaging is the ability to have other tenants federated by Healthcare organizations, allowing richer inter-tenant communication. (See [Manage external meetings and chat in Microsoft Teams](/microsoftteams/manage-external-access)).
+Also related to secure messaging is the ability to have other tenants federated by Healthcare organizations, allowing richer inter-tenant communication. To learn more, see [Manage external meetings and chat in Microsoft Teams](/microsoftteams/manage-external-access).
-## Teams templates for healthcare organizations
-
-Teams includes templates designed specifically for healthcare organizations, making it easier to create teams for staff to communicate and collaborate on patient care or operational needs. To learn more, see [Use healthcare team templates](/microsoftteams/expand-teams-across-your-org/healthcare/healthcare-templates-admin-console?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
+### Coordinate over email with Exchange Online
-## Care coordination and collaboration
+Email is a core communication tool for most workplaces. [Set up email with Exchange Online](flw-setup-microsoft-365.md#set-up-email-with-exchange-online) to help your frontline managers and workers coordinate with care team members in other locations or schedule meetings to discuss care plans. Users must have an F3 license to have an email mailbox.
-Bring your health team together to coordinate care and collaborate with Teams.
+You can also set up shared mailboxes to allow for incoming mail from customers (such as for customer service or scheduling requests) and have a group of workers who monitor and send email from a public email alias like info@contoso.com. For more information about shared mailboxes, see [About shared mailboxes](../admin/email/about-shared-mailboxes.md) and [Open and use a shared mailbox in Outlook](https://support.microsoft.com/office/open-and-use-a-shared-mailbox-in-outlook-d94a8e9e-21f1-4240-808b-de9c9c088afd).
-![Healthcare: Collaborate with your health team in Teams.](media/teams-healthcare-collaborate-in-teams.png)
+## Efficiently manage and motivate care teams
-Teams enables physicians, clinicians, nurses, and other staff to collaborate efficiently with included collaboration features in Teams, such as:
+Unburden and empower your teams with seamless shift scheduling, task management, and workflow automation so they can focus on what matters.
-- Set up teams and channels for your health teams and information workers. Use channels with tabs as a way to structure their work, with additional help from tabs to which they can pin information sources.-- Chat, post messages, and communicate. Your team can have persistent conversations about different patients needing attention.-- Call and meet with members of the health team. Set up individual meetings, or use channel meetings to manage daily meetings, both with the power of Teams audio, video, screen sharing, recording, and transcription features.-- Store and share files and documents. Your health team is part of a single virtualized team that works and collaborates on Office documents.
+### Teams policy packages
-In addition, your team can use apps in Teams to:
+Apply Teams policy packages to define what different roles can do in Teams. For example, specify policies for:
-- Share lists and track information with the Lists app-- Track and monitor tasks with the Tasks app-- Streamline approvals with the Approvals app-- Create, manage, and share schedules with the Shifts app
+- Clinical workers, such as registered nurses, charge nurses, physicians, and social workers, so that they can have full access to chat, calling, shift management, and meetings.
+- Information workers in your healthcare organization, such as IT personnel, informatics staff, finance personnel, and compliance officers, can have full access to chat, calling, and meetings.
+- Patient rooms, to control settings for patient room devices.
-### Coordinate over email with Exchange Online
+To learn more, see [Teams policy packages for healthcare](/microsoftteams/policy-packages-healthcare?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
-Email is a core communication tool for most workplaces. [Set up email with Exchange Online](flw-setup-microsoft-365.md#set-up-email-with-exchange-online) to help your frontline managers and workers coordinate with care team members in other locations or schedule meetings to discuss care plans. Users must have an F3 license to have an email mailbox.
+### Teams templates for healthcare organizations
-You can also set up shared mailboxes to allow for incoming mail from customers (such as for customer service or scheduling requests) and have a group of workers who monitor and send email from a public email alias like info@contoso.com. For more information about shared mailboxes, see [About shared mailboxes](../admin/email/about-shared-mailboxes.md) and [Open and use a shared mailbox in Outlook](https://support.microsoft.com/office/open-and-use-a-shared-mailbox-in-outlook-d94a8e9e-21f1-4240-808b-de9c9c088afd).
+Teams includes templates designed specifically for healthcare organizations, making it easier to create teams for staff to communicate and collaborate on patient care or operational needs. To learn more, see [Use healthcare team templates](/microsoftteams/expand-teams-across-your-org/healthcare/healthcare-templates-admin-console?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
### Share lists and track information with the Lists app
frontline Virtual Appointments Usage Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/virtual-appointments-usage-report.md
Last updated 02/01/2023
![Information icon](media/info.png) **This feature requires a [Teams Premium](/microsoftteams/teams-add-on-licensing/licensing-enhance-teams) or a Teams EHR connector license.**
-The Virtual Appointments usage report in the Microsoft Teams admin center gives you an overview of Teams Virtual Appointments activity in your organization. You can view detailed activity for virtual appointments scheduled through the [Bookings app](https://support.microsoft.com/office/what-is-bookings-42d4e852-8e99-4d8f-9b70-d7fc93973cb5) and the [Microsoft Teams Electronic Health Record (EHR) connector](teams-in-hc.md#virtual-appointments-and-electronic-healthcare-record-ehr-integration).
+The Virtual Appointments usage report in the Microsoft Teams admin center gives you an overview of Teams Virtual Appointments activity in your organization. You can view detailed activity for virtual appointments scheduled through the [Bookings app](https://support.microsoft.com/office/what-is-bookings-42d4e852-8e99-4d8f-9b70-d7fc93973cb5) and the [Microsoft Teams Electronic Health Record (EHR) connector](teams-in-hc.md#provide-seamless-virtual-visits).
To view the report, you must be a Global admin, Teams admin, Global reader, or Report reader.
security Comprehensive Guidance On Linux Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/comprehensive-guidance-on-linux-deployment.md
The following table lists the supported proxy settings:
- [Network connections](microsoft-defender-endpoint-linux.md#network-connections) - [Full configuration profile](../defender-endpoint/linux-preferences.md#full-configuration-profile-example)-- [Static proxy configuration](/defender-endpoint/linux-static-proxy-configuration.md)
+- [Static proxy configuration](../defender-endpoint/linux-static-proxy-configuration.md)
- [Troubleshooting connectivity issues in static proxy scenario](linux-support-connectivity.md#troubleshooting-steps-for-environments-with-static-proxy) #### Step 3. Verify SSL inspection isn't being performed on the network traffic
security Defender Endpoint Demonstration App Reputation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-app-reputation.md
This download is known malware; SmartScreen should block this program from runni
## Learn more
-[Microsoft Defender SmartScreen Documentation](/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md)
+[Microsoft Defender SmartScreen Documentation](/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview)
## See also
security Device Control Removable Storage Access Control https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-removable-storage-access-control.md
Title: Microsoft Defender for Endpoint Device Control Removable Storage Access Control, removable storage media description: A walk-through about Microsoft Defender for Endpoint
-ms.sitesec: library
-ms.pagetype: security
ms.localizationpriority: medium
Previously updated : 03/22/2022- Last updated : 04/25/2023+ search.appverid: met150
The following table lists the properties you can use in **PolicyRule**:
|||| | **PolicyRule Id** | GUID, a unique ID, represents the policy and will be used in the reporting and troubleshooting. | You can generate the ID through [PowerShell](/powershell/module/microsoft.powershell.utility/new-guid).| | **Name** | String, the name of the policy and will display on the toast based on the policy setting. | |
-| **IncludedIdList** | The group(s) that the policy will be applied to. If multiple groups are added, the policy will be applied to any media in all those groups.|The Group ID/GUID must be used at this instance. <p> The following example shows the usage of GroupID: <p> `<IncludedIdList> <GroupId> {EAA4CCE5-F6C9-4760-8BAD-FDCC76A2ACA1}</GroupId> </IncludedIdList>` |
-| **ExcludedIDList** | The group(s) that the policy won't be applied to. | The Group ID/GUID must be used at this instance. |
+| **IncludedIdList** | The group(s) that the policy will be applied to. If multiple groups are added, **the media must be a member of each group in the list** to be included.|The Group ID/GUID must be used at this instance. <p> The following example shows the usage of GroupID: <p> `<IncludedIdList> <GroupId> {EAA4CCE5-F6C9-4760-8BAD-FDCC76A2ACA1}</GroupId> </IncludedIdList>` |
+| **ExcludedIDList** | The group(s) that the policy won't be applied to. If multiple groups are added, **the media must be a member of a group in the list** to be excluded. | The Group ID/GUID must be used at this instance. |
| **Entry** | One PolicyRule can have multiple entries; each entry with a unique GUID tells Device Control one restriction.| See Entry properties table below to get details.|
security Enable Troubleshooting Mode https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode.md
During troubleshooting mode, you can use the PowerShell command `Set-MPPreferenc
## Advanced hunting queries
-Here are some pre-built advanced hunting queries to give you visibility into the troubleshooting events that are occurring in your environment. You can also use these queries to [create detection rules](/defender/custom-detection-rules.md#create-a-custom-detection-rule) that'd alert you when the devices are in troubleshooting mode.
+Here are some pre-built advanced hunting queries to give you visibility into the troubleshooting events that are occurring in your environment. You can also use these queries to [create detection rules](../defender/custom-detection-rules.md#create-a-custom-detection-rule) that'd alert you when the devices are in troubleshooting mode.
### Get troubleshooting events for a particular device
security Defender Vulnerability Management Trial https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-trial.md
Your trial will be effective immediately:
It can take up to 6 hours for all vulnerability management features to appear in your left navigation. Sign out and sign back in to see the updates.
-To make the most of your trial, see [Trial user guide: Microsoft Defender Vulnerability Management](/trial-user-guide-defender-vulnerability-management.md)
+To make the most of your trial, see [Trial user guide: Microsoft Defender Vulnerability Management](./trial-user-guide-defender-vulnerability-management.md)
> [!NOTE] > Defender Vulnerability Management Standalone trial is in public preview. Details on your purchase options for this new offering will be made available once the offering is generally available.
security Playbook Responding Ransomware M365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/playbook-responding-ransomware-m365-defender.md
Run through this list of tasks and questions to protect existing systems from at
* If you have online backups, consider disconnecting the backup system from the network until you're confident that the attack is contained, see [Backup and restore plan to protect against ransomware | Microsoft Docs](/security/compass/backup-plan-to-protect-against-ransomware). * If you're experiencing or expect an imminent and active ransomware deployment:
- * [Suspend privileged and local accounts](/investigate-users.md) that you suspect are part of the attack. You can do this from the **Users** tab in the properties of the incident in the Microsoft 365 Defender portal.
+ * [Suspend privileged and local accounts](./investigate-users.md) that you suspect are part of the attack. You can do this from the **Users** tab in the properties of the incident in the Microsoft 365 Defender portal.
* Stop all [remote logon sessions](/defender-for-identity/playbook-domain-dominance). * Reset the compromised user account passwords and require the users of compromised user accounts to sign in again. * Do the same for user accounts that might be compromised.
security Phishing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/phishing.md
If in doubt, contact the business by known channels to verify if any suspicious
## Software solutions for organizations -- [Microsoft Edge](/microsoft-edge/deploy/index) and [Windows Defender Application Guard](/windows/security/microsoft-defender-application-guard/md-app-guard-overview.md) offer protection from the increasing threat of targeted attacks using Microsoft's industry-leading Hyper-V virtualization technology. If a browsed website is deemed untrusted, the Hyper-V container will isolate that device from the rest of your network thereby preventing access to your enterprise data.
+- [Microsoft Edge](/microsoft-edge/deploy/index) and [Windows Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview) offer protection from the increasing threat of targeted attacks using Microsoft's industry-leading Hyper-V virtualization technology. If a browsed website is deemed untrusted, the Hyper-V container will isolate that device from the rest of your network thereby preventing access to your enterprise data.
- [Microsoft Exchange Online Protection (EOP)](https://products.office.com/exchange/exchange-email-security-spam-protection) offers enterprise-class reliability and protection against spam and malware, while maintaining access to email during and after emergencies. Using various layers of filtering, EOP can provide different controls for spam filtering, such as bulk mail controls and international spam, that will further enhance your protection services.
security Microsoft 365 Zero Trust https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/microsoft-365-zero-trust.md
In this illustration:
This article assumes you have already configured cloud identity. If you need guidance for this objective, see [**Deploy your identity infrastructure for Microsoft 365**](/microsoft-365/enterprise/deploy-identity-solution-overview). +
+> [!TIP]
+> When you understand the steps and the end-to-end deployment process, you can use the [Set up your Microsoft Zero Trust security model](https://go.microsoft.com/fwlink/?linkid=2224820) advanced deployment guide when signed in to the Microsoft 365 admin center. This guide steps you through applying Zero Trust principles for standard and advanced technology pillars. To step through the guide without signing in, go to the [Microsoft 365 Setup portal](https://go.microsoft.com/fwlink/?linkid=2222968).
+ ## Step 1. Configure Zero Trust identity and device access protection ΓÇö starting-point policies The first step is to build your Zero Trust foundation by configuring identity and device access protection.
security Anti Malware Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-policies-configure.md
Anti-malware policies are processed in the order that they're displayed on the *
- No two policies can have the same priority value. - The default anti-malware policy always has the priority value **Lowest**, and you can't change it.
-Anti-malware protection stops for a recipient after the first policy is applied. For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
+Anti-malware protection stops for a recipient after the first policy is applied (the highest priority policy for that recipient). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
After you select the custom anti-malware policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
security Anti Malware Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-protection-about.md
Anti-malware policies control the settings and notification options for malware
> > The quarantine policy that's assigned to the anti-malware policy determines whether recipients receive email notifications for messages that were quarantined as malware. -- **Priority**: If you create multiple custom anti-malware policies, you can specify the order that they're applied. No two policies can have the same priority, and policy processing stops after the first policy is applied.
+- **Priority**: If you create multiple custom anti-malware policies, you can specify the order that they're applied. No two policies can have the same priority, and policy processing stops after the first policy is applied (the highest priority policy for that recipient).
For more information about the order of precedence and how multiple policies are evaluated and applied, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
security Anti Phishing Policies Eop Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-eop-configure.md
Anti-phishing policies are processed in the order that they're displayed on the
- No two policies can have the same priority value. - The default anti-phishing policy always has the priority value **Lowest**, and you can't change it.
-Anti-phishing protection stops for a recipient after the first policy is applied. For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
+Anti-phishing protection stops for a recipient after the first policy is applied (the highest priority policy for that recipient). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
After you select the custom anti-phishing policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
security Anti Phishing Policies Mdo Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-mdo-configure.md
Anti-phishing policies are processed in the order that they're displayed on the
- No two policies can have the same priority value. - The default anti-phishing policy always has the priority value **Lowest**, and you can't change it.
-Anti-phishing protection stops for a recipient after the first policy is applied. For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
+Anti-phishing protection stops for a recipient after the first policy is applied (the highest priority policy for that recipient). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
After you select the custom anti-phishing policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
security Anti Spam Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-policies-configure.md
Anti-spam policies are processed in the order that they're displayed on the **An
- No two anti-spam policies can have the same priority value. - The default anti-spam policy always has the priority value **Lowest**, and you can't change it.
-Anti-spam protection stops for a recipient after the first policy is applied. For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
+Anti-spam protection stops for a recipient after the first policy is applied (the highest priority policy for that recipient). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
After you select the custom anti-spam policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
security Defender For Office 365 Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/defender-for-office-365-whats-new.md
For more information on what's new with other Microsoft Defender security produc
## April 2023 - [Using machine learning to drive more effective simulations in Attack Simulation and Training](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/attack-simulation-training-using-machine-learning-to-drive-more/ba-p/3791023): Make use of intelligent predicted compromise rate (PCR) and Microsoft Defender for Office 365 payload recommendations for utilizing high-quality payloads in your simulation.
+- [Training only campaigns available with an expanded library](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/training-only-campaign-is-now-available-with-an-expanded/ba-p/3795237): You can now directly assign training content to your organization without needing to tie training to a phishing simulation campaign. We have also expanded our training module library to more than 70 different modules.
## March 2023
security Outbound Spam Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-policies-configure.md
Outbound spam policies are processed in the order that they're displayed on the
- No two outbound spam policies can have the same priority value. - The default outbound spam policy always has the priority value **Lowest**, and you can't change it.
-Outbound spam protection stops for a sender after the first policy is applied. For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
+Outbound spam protection stops for a sender after the first policy is applied (the highest priority policy for that sender). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
After you select the custom outbound spam policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
security Quarantine Shared Mailbox Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-shared-mailbox-messages.md
description: Users can learn how to view and act on quarantined messages that were sent to shared mailboxes that they have permissions to. Previously updated : 3/3/2023 Last updated : 4/25/2023 # View and release quarantined messages from shared mailboxes
Now, automapping is no longer required for users to manage quarantined messages
- Regarding quarantine operations for shared mailboxes, if you use nested security groups to grant access to a shared mailbox, we recommend no more than two levels of nested groups. For example, Group A is a member of Group B, which is a member of Group C. To assign permissions to a shared mailbox, don't add the user to Group A and then assign Group C to the shared mailbox. -- Access of Quarantined items for on-premises shared mailboxes through security groups is not currently supported.
+- Access to quarantined items for shared mailboxes in on-premises environments is currently not supported (directly or by using security groups).
- As of July 2022, users with primary SMTP addresses that are different from their user principal names (UPNs) should be able to access quarantined messages for the shared mailbox.
security Safe Attachments About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-about.md
This section describes the settings in Safe Attachments policies:
- **Apply the Safe Attachments detection response if scanning can't complete (timeout or errors)**: The action specified by **Safe Attachments unknown malware response** is taken on messages even when Safe Attachments scanning can't complete. Always select this option if you select **Enable redirect**. Otherwise, messages might be lost. -- **Priority**: If you create multiple policies, you can specify the order that they're applied. No two policies can have the same priority, and policy processing stops after the first policy is applied.
+- **Priority**: If you create multiple policies, you can specify the order that they're applied. No two policies can have the same priority, and policy processing stops after the first policy is applied (the highest priority policy for that recipient).
For more information about the order of precedence and how multiple policies are evaluated and applied, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
security Safe Attachments Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-policies-configure.md
Safe Attachments policies are processed in the order that they're displayed on t
- No two policies can have the same priority value. - The Safe Attachments policy named **Built-in protection (Microsoft)** that's associated with Built-in protection always has the priority value **Lowest**, and you can't change it.
-Safe Attachments protection stops for a recipient after the first policy is applied. For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
+Safe Attachments protection stops for a recipient after the first policy is applied (the highest priority policy for that recipient). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
After you select the custom Safe Attachments policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
security Safe Links About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-about.md
These settings apply to Safe Links in email, Teams, and Office apps:
## Priority of Safe Links policies
-After you create multiple policies, you can specify the order that they're applied. No two policies can have the same priority, and policy processing stops after the first policy is applied. The **Built-in protection** policy is always applied last. The Safe Links policies associated **Standard** and **Strict** preset security policies are always applied before custom Safe Links policies.
+After you create multiple policies, you can specify the order that they're applied. No two policies can have the same priority, and policy processing stops after the first policy is applied (the highest priority policy for that recipient). The **Built-in protection** policy is always applied last. The Safe Links policies associated **Standard** and **Strict** preset security policies are always applied before custom Safe Links policies.
For more information about the order of precedence and how multiple policies are evaluated and applied, see [Order of precedence for preset security policies and other policies](preset-security-policies.md#order-of-precedence-for-preset-security-policies-and-other-policies) and [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
security Safe Links Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-policies-configure.md
Safe Links policies are processed in the order that they're displayed on the **S
- No two policies can have the same priority value. - The Safe Links policy named **Built-in protection (Microsoft)** that's associated with Built-in protection always has the priority value **Lowest**, and you can't change it.
-Safe Links protection stops for a recipient after the first policy is applied. For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
+Safe Links protection stops for a recipient after the first policy is applied (the highest priority policy for that recipient). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
After you select the custom Safe Links policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
security Safe Links Policies Global Settings Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-policies-global-settings-configure.md
description: Admins can learn how to view and configure the 'Block the following URLs' list for Safe Links in Microsoft Defender for Office 365. Previously updated : 4/20/2023 Last updated : 4/25/2023 # Configure the "Block the following URLs" list for Safe Links in Microsoft Defender for Office 365
You configure the "Block the following URLs" list for Safe Links in the Microsof
- Use the **Filter** drop down list to filter the list of URL entries by the following values: - **All**
- - **Migrated**: Entries that were automatically migrated as [URL block entries in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) from June 2022 to December 2022.
+ - **Migrated**: Entries that were automatically migrated to [URL block entries in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) from June 2022 to December 2022.
- **Manually migrate**: Entries that couldn't be automatically migrated to the Tenant Allow/Block List. Automatic migration of URL entries to the Tenant Allow/Block List ended in December 2022. - Use **Delete all URLs in the current list** to remove entries (affected by the **Filter** value).
- When you're finished on the **Safe Links settings for your organization** flyout that opens, select **Save**.
+ When you're finished on the **Safe Links settings for your organization** flyout, select **Save**.
### Configure the "Block the following URLs" list in PowerShell
-You can use the [Get-AtpPolicyForO365](/powershell/module/exchange/get-atppolicyforo365) cmdlet in Exchange Online PowerShell to view existing entries in the _BlockURLs_ property.
+Use the [Get-AtpPolicyForO365](/powershell/module/exchange/get-atppolicyforo365) and [Set-AtpPolicyForO365](/powershell/module/exchange/set-atppolicyforo365) cmdlets in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) to view and remove existing entries in the "Block the following URLs" list.
-For example:
+This example returns any existing entries in the "Block the following URLs" list:
- ```powershell
- Get-AtpPolicyForO365 | Format-List BlockUrls
- ```
+```powershell
+Get-AtpPolicyForO365 | Format-List BlockUrls
+```
-For details about the entry syntax, see [Entry syntax for the "Block the following URLs" list](safe-links-about.md#entry-syntax-for-the-block-the-following-urls-list).
+This example removes the existing entry for fabrikam.com from the "Block the following URLs" list:
+
+```powershell
+Set-AtpPolicyForO365 -BlockUrls @{Remove="fabrikam"}
+```
+
+This example removes all entries from the "Block the following URLs" list:
+
+```powershell
+Set-AtpPolicyForO365 -BlockUrls $null
+```
+
+To add, remove, and manage block URL entries for URLs in the Tenant Allow/Block List, see the PowerShell sections for block entries in [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).
security Scc Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/scc-permissions.md
Managing permissions in Defender for Office 365 or Purview compliance gives user
|Role group|Description|Default roles assigned| ||||
-|**Attack Simulator Administrators**|Don't use this role group in these portals. Use the corresponding role in Azure AD.|Attack Simulator Admin|
-|**Attack Simulator Payload Authors**|Don't use this role group in these portals. Use the corresponding role in Azure AD.|Attack Simulator Payload Author|
+|**Attack Simulation Administrator**|Don't use this role group in these portals. Use the corresponding role in Azure AD.|Attack Simulator Admin|
+|**Attack Payload Author**|Don't use this role group in these portals. Use the corresponding role in Azure AD.|Attack Simulator Payload Author|
|**Communication Compliance**|Provides permission to all the communication compliance roles: administrator, analyst, investigator, and viewer.|Case Management <br/><br/> Communication Compliance Admin <br/><br/> Communication Compliance Analysis <br/><br/> Communication Compliance Case Management <br/><br/> Communication Compliance Investigation <br/><br/> Communication Compliance Viewer <br/><br/> Data Classification Feedback Provider <br/><br/> Data Connector Admin <br/><br/> Scope Manager <br/><br/> View-Only Case| |**Communication Compliance Administrators**|Administrators of communication compliance that can create/edit policies and define global settings.|Communication Compliance Admin <br/><br/> Communication Compliance Case Management <br/><br/> Data Connector Admin <br/><br/> Scope Manager| |**Communication Compliance Analysts**|Analysts of communication compliance that can investigate policy matches, view message meta data, and take remediation actions.|Communication Compliance Analysis <br/><br/> Communication Compliance Case Management|
The following roles aren't assigned to the Organization Management role group by
|Role|Description|Default role group assignments| ||||
-|**Attack Simulator Admin**|Don't use this role in the portals. Use the corresponding role in Azure AD.|Attack Simulator Administrators|
-|**Attack Simulator Payload Author**|Don't use this role in the portals. Use the corresponding role in Azure AD.|Attack Simulator Payload Authors|
+|**Attack Simulator Admin**|Don't use this role in the portals. Use the corresponding role in Azure AD.|Attack Simulation Administrator|
+|**Attack Simulator Payload Author**|Don't use this role in the portals. Use the corresponding role in Azure AD.|Attack Payload Author|
|**Audit Logs**|Turn on and configure auditing for the organization, view the organization's audit reports, and then export these reports to a file.|Organization Management <br/><br/> Security Administrator| |**Case Management**|Create, edit, delete, and control access to eDiscovery cases.|Communication Compliance <br/><br/> Communication Compliance Investigators <br/><br/> Compliance Administrator <br/><br/> eDiscovery Manager <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Admins <br/><br/> Insider Risk Management Analysts <br/><br/> Insider Risk Management Investigators <br/><br/> Organization Management <br/><br/> Privacy Management <br/><br/> Privacy Management Administrators <br/><br/> Privacy Management Analysts <br/><br/> Privacy Management Investigators <br/><br/> Subject Rights Request Administrators| |**Communication**|Manage all communications with the custodians identified in an eDiscovery (Premium) case. Create hold notifications, hold reminders, and escalations to management. Track custodian acknowledgment of hold notifications and manage access to the custodian portal that is used by each custodian in a case to track communications for the cases where they were identified as a custodian.|Data Investigator <br/><br/> eDiscovery Manager|
solutions Apps Purchase Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/apps-purchase-overview.md
For more information about volume purchased apps, see [Purchase apps in volume f
### Partner productivity apps
-There are several [Intune partner productivity apps](/mem/intune/apps/apps-supported-intune-apps.md#partner-productivity-apps) that support Intune configuration and protection. These apps are available from various sources and often provide support for both iOS/iPadOS and Android devices. For apps that require you to purchase a license, subscription, or account for each user to use the app, you'll need to work directly with the app vendor.
+There are several [Intune partner productivity apps](/mem/intune/apps/apps-supported-intune-apps#partner-productivity-apps) that support Intune configuration and protection. These apps are available from various sources and often provide support for both iOS/iPadOS and Android devices. For apps that require you to purchase a license, subscription, or account for each user to use the app, you'll need to work directly with the app vendor.
Areas of support include the following settings:-- [Core Intune app protection policy settings](/mem/intune/apps/apps-supported-intune-apps.md#core-app-settings)-- [Advanced Intune app protection policy and app configuration policy settings](/mem/intune/apps/apps-supported-intune-apps.md#advanced-app-settings)
+- [Core Intune app protection policy settings](/mem/intune/apps/apps-supported-intune-apps#core-app-settings)
+- [Advanced Intune app protection policy and app configuration policy settings](/mem/intune/apps/apps-supported-intune-apps#advanced-app-settings)
### Partner UEM apps
-In addition to standard store apps that can be managed, you can add specific [partner UEM apps](/mem/intune/apps/apps-supported-intune-apps.md#partner-uem-apps) to Intune. These apps are also available in either the Google Play Store or the Apple App Store. However, these apps are capable of supporting advanced app protection policy and app configuration policy settings. You may need to work directly with the app vendor to purchase a license, subscription, or account for each user to use the related app.
+In addition to standard store apps that can be managed, you can add specific [partner UEM apps](/mem/intune/apps/apps-supported-intune-apps#partner-uem-apps) to Intune. These apps are also available in either the Google Play Store or the Apple App Store. However, these apps are capable of supporting advanced app protection policy and app configuration policy settings. You may need to work directly with the app vendor to purchase a license, subscription, or account for each user to use the related app.
### In-app purchases