Updates from: 04/28/2021 03:28:58
Category Microsoft Docs article Related commit history on GitHub Change details
admin Azure Ad Roles In The Mac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/azure-ad-roles-in-the-mac.md
- Title: "Azure Active Directory roles in the Microsoft 365 admin center"-- CSH-----
-localization_priority: Priority
--- M365-subscription-management-- Adm_O365-- Adm_TOC--- AdminSurgePortfolio
-description: "Manage these Azure admin roles in the Microsoft 365 admin center."
--
-# Azure Active Directory roles in the Microsoft 365 admin center
-
-The Microsoft 365 admin center lets you manage over 30 Azure AD roles. However, these roles are a subset of the roles available in the Azure portal. If you have a large business, there might be roles in the Azure portal that meet your organizational needs. Looking for the detailed role descriptions for Azure AD? Check out [Administrator role permissions in Azure Active Directory](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#available-roles).
-
-A user who is assigned an admin role will have the same level of access to cloud services that your organization has subscribed to, regardless of whether you assign the role in the Microsoft 365 admin center or the Azure portal, or by using the Azure AD module for Windows PowerShell.
-
-In the Microsoft 365 admin center, you can go to **Roles**, and then select any role to open its detail pane. Select the **Permissions** tab to view the detailed list of what admins assigned that role have permissions to do. Select the **Assigned** or **Assigned admins** tab to add users to roles. For more information on assigning roles in the Microsoft 365 admin center, see [Assign admin roles](assign-admin-roles.md).
-
-## All Azure AD roles
-
-Here's a list of all the admin roles available in the Microsoft 365 admin center. Looking for the detailed role descriptions of the Microsoft 365 admin roles? Check out [About admin roles](./about-admin-roles.md).
-
-|Admin role |Description |
-|||
-|Application admin | Full access to enterprise applications, application registrations, and application proxy settings. |
-|Application developer | Create application registrations and consent to app access on their own behalf. |
-|Authentication admin | Can require users to re-register authentication for non-password credentials, like MFA. |
-|Azure Information Protection admin | Manages labels for the Azure Information Protection policy, manages protection templates, and activates protection. |
-|Billing admin | Makes purchases, manages subscriptions, manages service requests, and monitors service health. |
-|Cloud application admin | Full access to enterprise applications and application registrations. No application proxy. |
-|Cloud device admin | Enables, disables, and deletes devices and can read Windows 10 BitLocker keys. |
-|Compliance admin | Manages regulatory requirements and eDiscovery cases, maintains data governance for locations, identities, and apps. |
-|Compliance data admin | Keeps track of data, makes sure it's protected, gets insights into issues, and helps mitigate risk. |
-|Conditional Access admin | Manages Azure Active Directory conditional access settings, but not Exchange ActiveSync conditional access policy. |
-|Customer Lockbox access approver | Manages Customer Lockbox requests, can turn Customer Lockbox on or off. |
-|Desktop Analytics admin | Can access and manage Desktop management tools and services. |
-|Dynamics 365 admin | Full access to Microsoft Dynamics 365 Online, manages service requests, monitors service health. |
-|Exchange admin | Full access to Exchange Online, creates and manages groups, manages service requests, and monitors service health. |
-|External identity provider admin | Configure identity providers for use in direct federation. |
-|Global admin | Has unlimited access to all management features and most data in all admin centers. |
-|Global reader | Has read-only access to all management features and most data in admin centers. For a detailed description of access rights and limitations of this role, please see [Administrator role permissions in Azure Active Directory](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#global-reader). |
-|Groups admin |Creates groups and manages all groups settings across admin centers.|
-|Guest inviter | Manages Azure Active Directory B2B guest user invitations. |
-|Helpdesk admin | Resets passwords and re-authenticates for all non-admins and some admin roles, manages service requests, and monitors service health. |
-|Insights admin | Manages all aspects of the Microsoft 365 Insights application, reads Azure Active Directory information, can monitor service health and create and manage service requests. |
-|Insights business admin | Read reports and insights in the Microsoft 365 Insights application. |
-|Intune admin | Full access to Intune, manages users and devices to associate policies, creates and manages groups. |
-|Kaizala admin | Full access to all Kaizala management features and data, manages service requests. |
-|License admin | Assigns and removes licenses from users and edits their usage location. |
-|Message center privacy reader | Access to data privacy messages in Message center, gets email notifications. |
-|Message center reader | Reads and shares regular messages in Message center, gets weekly email digests, has read-only access to users, groups, domains, and subscriptions. |
-|Office Apps admin | Manages cloud-based policies for Office and the What's New content that users see in their Office apps. |
-|Password admin | Reset passwords of users who are non-administrators or members of the following roles: Directory Readers, Guest Inviter, Password Administrator. This role can't grant the ability to manage service requests or monitor service health. |
-|Power BI admin | Full access to Power Bl management tasks, manages service requests, and monitors service health. |
-|Power platform admin | Full access to Microsoft Dynamics 365, PowerApps, data loss prevention policies, and Microsoft Flow. |
-|Privileged role admin | Manages role assignments and all access control features of Privileged Identity Management. |
-|Privileged authentication admin | Resets passwords, updates non-password credentials, forces uses to sign out and monitors service health and manages service requests. |
-|Reports reader | Reads usage reporting data from the reports dashboard, PowerBI adoption content pack, sign-in reports, and Microsoft Graph reporting API. |
-|Search admin | Full access to Microsoft Search, assigns the Search admin and Search editor roles, manages editorial content, monitors service health, and creates service requests. |
-|Search editor | Can only create, edit, and delete content for Microsoft Search, like bookmarks, Q&A, and locations. |
-|Security admin | Controls organization's security, manages security policies, reviews security analytics and reports, monitors the threat landscape. |
-|Security operator | Investigates and responds to security alerts, manages features in Identity Protection center, monitors service health. |
-|Security reader | Read-only access to security features, sign-in reports, and audit logs. |
-|Service support admin | Creates service requests for Azure, Microsoft 365, and Office 365 services, and monitors service health. |
-|SharePoint admin | Full access to SharePoint Online, manages Microsoft 365 groups, manages service requests, and monitors service health. |
-|Skype for Business admin | Full access to all Teams and Skype features, Skype user attributes, manages service requests, and monitors service health. |
-|Teams admin | Full access to Teams & Skype admin center, manages Microsoft 365 groups and service requests, and monitors service health. |
-|Teams communication manager | Assigns telephone numbers, creates and manages voice and meeting policies, and reads call analytics. |
-|Teams communication support engineer | Reads call record details for all call participants to troubleshoot communication issues. |
-|Teams communication support specialist | Reads user call details only for a specific user to troubleshoot communication issues.|
-|User admin | Resets user passwords, creates and manages users and groups, including filters, manages service requests, and monitors service health.|
-
-## Delegated administration for Microsoft Partners
-
-If you're working with a Microsoft partner, you can assign them admin roles. They, in turn, can assign users in your company - or their company - admin roles. You might want them to do this, for example, if they are setting up and managing your online organization for you.
-
-A partner can assign these roles:
--- Full administration, which has privileges equivalent to a global admin, with the exception of managing multi-factor authentication through the Partner Center.--- Limited administration, which has privileges equivalent to a helpdesk admin.-
-Before the partner can assign these roles to users, you must add the partner as a delegated admin to your account. This process is initiated by an authorized partner. The partner sends you an email to ask you if you want to give them permission to act as a delegated admin. For instructions, see [Authorize or remove partner relationships](../misc/add-partner.md).
-
-## Related articles
-
-[About Microsoft 365 admin roles](about-admin-roles.md)
-
-[Assign admin roles](assign-admin-roles.md)
-
-[Activity reports in the Microsoft 365 admin center](../activity-reports/activity-reports.md)
admin Contacts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/contacts.md
- Title: "Quick help Contacts"-- NOCSH-----
-localization_priority: Normal
--- M365-subscription-management -- Adm_O365-- Adm_NonTOC--- BCS160-- MET150-- MOE150-
-description: "Learn how to create contacts in the admin center and manage your global address list."
--
-# Quick help: Contacts
-
-If you need shared contacts that everyone in your organization can get to, create them in the Microsoft 365 admin center. The contacts you create here can be seen by you and your users as part of the global address list.
-
-## How do I add contacts in the admin center?
-
-1. In the admin center, go to the **Users** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=2053302" target="_blank">Contacts</a> page.
-
-2. On the **Contacts** page, select **Add a contact**.
-
-3. On the **New Contact** page, fill in details and select **Add** to create a contact.
-
-## How are these contacts different from My Contacts?
-
-My Contacts are contacts that you create for yourself and your users create for themselves but others can't see. The contacts you create in the admin center are contacts for the organization and everyone can see them in addition to their own. To learn more, see [People overview - Outlook Web App](https://support.microsoft.com/office/5fe173cf-e620-4f62-9bf6-da5041f651bf).
-
-## How does everyone get to the contacts I created in the admin center?
-
- They can go to **People** in Microsoft 365, expand **Directory** and select **All Contacts**. They can view each contact and their information from there.
-
-## Can anyone create and edit these organizational contacts?
-
-No. Only **Global** and **Exchange** administrators can create, edit, or delete these contacts. Everyone else can only view them.
-
-## Can I use this to manage my business clients?
-
-You can use Microsoft 365 contacts however you like, but there are limitations. Learn about [other ways to manage contacts](ways-to-manage-contacts.md)
-
-## How do I bulk import organizational contacts?
-
-Use Windows PowerShell and a CSV (Comma Separated Value) file to bulk import external contacts as described in [Bulk import external contacts to Exchange Online](../../compliance/bulk-import-external-contacts.md).
-
-## What if my question still hasn't been answered?
-
-Visit the rest of our [admin help](https://docs.microsoft.com/microsoft-365/admin/) or give us your feedback below.
admin Ways To Manage Contacts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/ways-to-manage-contacts.md
- Title: "Quick help Ways to manage contacts"-- NOCSH-----
-localization_priority: Normal
--- M365-subscription-management -- Adm_O365-- Adm_NonTOC--- BCS160-- MET150-- MOE150-
-description: "Learn how to manage your contacts in the admin center."
--
-# Quick help: Ways to manage contacts
-
-There are a number of ways you can work with contacts in Microsoft 365 and much of it depends on how you use contacts. Here's a comparison of the different ways to help you choose the right one for your organization.
-
-|||||
-|:--|:--|:--|:--|
-|**Feature** <br/> |**Description** <br/> |**Advantages** <br/> |**Disadvantages** <br/> |
-|**Microsoft 365 contacts** <br/> |Use Microsoft 365 contacts to store your customers or business contacts and they will appear under People in Microsoft 365. See [Contacts](contacts.md) <br/> |Everyone in the organization can view the contacts directly from Outlook, Outlook on the web, and mobile devices. <br/> |Only administrators can create and update the contacts. <br/> No custom fields are allowed (example: birthdate, college, referral agent). <br/> |
-|**SharePoint contacts** <br/> |Use a SharePoint Contacts app to store your customers or business contacts and they will appear on your SharePoint site and SharePoint mobile apps. See [SharePoint apps and lists](https://support.microsoft.com/office/0a1c3ace-def0-44af-b225-cfa8d92c52d7). <br/> |Everyone with access to the SharePoint team site and SharePoint mobile apps can see and update these contacts. <br/> Allows for custom fields, views, workflows and more. <br/> |These contacts don't appear in Outlook or People in Microsoft 365. <br/> Requires basic understanding of SharePoint infrastructure. <br/> |
-|**Access contacts** <br/> |Use an Access Contacts app to store your customers or business contacts and they will appear in Access or a SharePoint site if hosted there. See [Access apps](https://support.microsoft.com/office/25f3ab3e-510d-44b0-accf-b976c0813e71). <br/> |Everyone with access to Access or the SharePoint site that hosts the app can see and update contacts. <br/> Highly customizable and professional looking contact management built with Access. <br/> |You must purchase Microsoft Access or switch to a Microsoft 365 plan that includes Access. <br/> Requires basic understanding of Microsoft Access and how to create apps. <br/> |
-|**Dynamics CRM Online** <br/> |Use Microsoft Dynamics CRM Online to store and manage your customers and potential business opportunities. See [Dynamics CRM](https://dynamics.microsoft.com). <br/> |Powerful customer relationship management (CRM) capabilities. <br/> Integrates with Microsoft 365 so you can work from one place. <br/> |Includes complexity with onboarding and customization to meet your needs. <br/> Is significantly higher in cost than any of the other contact management options. <br/> |
-|**Third party app** <br/> |If none of the above options interest you, you might consider a third party app in the [Office Store](https://store.office.com) or external to Microsoft. <br/> |Many providers, features, and prices to choose for your business customers. <br/> |No guarantee that it's integrated with Microsoft 365, requiring you to work with two different services, logins, etc. <br/> |
-
-
admin Customize Your Organization Theme https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/customize-your-organization-theme.md
description: "Learn to change the default theme of Microsoft 365 and customize i
# Customize the Microsoft 365 theme for your organization
-As the admin of your Microsoft 365 for business subscription, you can change the default theme that appears in the top navigation bar for everyone in the organization:
+As the admin of your organization, you can create multiple themes for the people in your organization, and select which themes apply to different members of your organization. The organization theme is what appears in the top navigation bar for people in your organization.
-- Add your company logo.-- Change the colors to match the rest of your brand.-- Add a destination link users go when they select your logo.
+You can add or update a default theme that applies to everyone within your org. You can also create up to four additional group themes that can be assigned to multiple Microsoft 365 groups.
-## Customize your theme in the admin center
+## Add or update your organization's theme
1. In the admin center, go to the **Settings** \> **Org Settings** page, and then choose the **Organization profile** tab.
-2. On the **Organization profile** tab, choose **Custom themes**.
+2. On the **Organization profile** tab, select **Organization theme**.
-3. On the **Customs themes** panel, change the theme elements that you want for your organization:
+All themes can be customized using the following tabs.
- - **Use a custom logo image**: Choose whether to use an image from a URL or to upload an image. If you use a URL, make sure that the URL uses HTTPS and that the image is 200 x 30 pixels of any format of any size. You can upload a logo under 10 KB that is 200 x 30 pixels in JPG, PNG, GIF, or SVG format.
+|**Tab**|**What can you do?**|
+|:--|:--|
+|[General](#general-modify-a-theme) <br/> |Modify a theme name and assign to up to five groups (if applicable). <br/> |
+|[Logos](#logos-specify-your-theme-logos) <br/> |Add your theme logo, including the Office dark theme and mobile options. <br/> |
+|[Colors](#colors-choose-theme-colors) <br/> |Customize a color scheme by specifying navigation bar, accent, text, and icon colors. <br/> |
- > [!NOTE]
- > For the logo to appear in the SharePoint mobile app, use only SVG images. Images uploaded in any other format don't display in the app. Logos are not clickable in the SharePoint Mobile app.
+## General: Modify a theme
- - **Make logo clickable**: You can use your logo in the navigation bar as a link to any company resource. You can enter the URL for the logo here, starting with http:// or https://. This is optional.
+Your experience on the General tab depends on whether you're adding or modifying the default theme or a group theme.
- - **Select background image**: Select the image and upload your own JPG, PNG, or GIF with a resolution of 1366 x 50 pixels, no larger than 15 KB. The background image appears in the top navigation bar on every page.
+### Update the default theme
- > [!NOTE]
- > Images that contain text might not display as expected. Built-in elements that appear on the right and left sides of the navigation bar can vary across services, and your text might be obscured by those elements.
+The default theme is the first theme displayed.
- - **Navigation bar color**: Select a color to use for the background of the navigation bar. The navigation bar appears at the top on every page.
+1. If you previously customized a theme for your organization, select **Default Theme** and use one of your saved customizations, or, select **Add theme**.
+2. On the **General** page, you can prevent users from overriding their theme and show the userΓÇÖs display name.
+3. Select **Save** to save your changes.
- - **Text and icons**: Select a color to use for the text and icons on the top navigation bar.
+> [!IMPORTANT]
+> The default theme is unique, it can't be renamed and applies to everyone within your organization. To delete the default theme, you have to delete all other themes first.
- - **Accent color**: Select a color to use for the navigation bar button hover color and page accents like buttons and text on certain applications.
- - **Prevent users from overriding theme**: Flip this toggle to prevent users from choosing their own theme from our theme selection. This doesn't prevent users from being able to set a high contrast theme.
+### Create a group theme
- - **Show the user name**: Choose whether to show a user's full name at the entry point to the account manager in the top right of the page when the user is signed in. By default, users see their photo or their initials, if no photo was uploaded.
+You can create up to four additional group themes.
-4. Select **Save changes**.
+1. On the **General** page, enter a name for your theme.
-You can see your new theme in the admin center right away. After a short delay, you can see it throughout Microsoft 365, including on pages in Outlook, SharePoint, [SharePoint mobile app for iOS](https://support.microsoft.com/office/339402ce-16bb-4c97-9475-0c5375ccef7a), and [SharePoint mobile app for Android](https://support.microsoft.com/office/d875654b-fb0a-4dbe-a17a-a676cf936284).
+2. Under **Groups**, you can select up to 5 Microsoft 365 Groups that can see your group theme, instead of using the default theme. You can also prevent users from overriding their theme and show the user's display name.
-You can remove your custom icon or custom colors at any time. Just return to the theme page and select **Remove custom theming**.
-
-## Best Practices
+3. Select **Save**.
-- **Logo image**: Use an SVG file type so that your logo appears at high resolution on all screens and at all zoom levels. -- **Custom colors**: Choose a **Nav bar background color** with a high contrast ratio with the **Logo image** that you picked. Choose a **Text and icons** color with a high contrast ratio to the **Nav bar background color** so that all text and icons are clearly visible.
+## Logos: Specify your theme logos
-- **Accent color**: Pick one that shows up well on a white or light background. The accent color is used to color some links and buttons that show up on a white or light background. For example, the accent color is used to color elements in a user's inbox and on their Office.com portal page.
+On the **Logos** page, you can you can add your logos, and specify the URL where users will navigate to, when they select the logo.
+
+- **Default logo**: Add a URL location that points to your logo. Make sure that the URL uses HTTPS and that the image is at least 200 x 30 pixels. Your default logo can be in the JPG, PNG, GIF, or SVG format.
+- **Alternate logo**: Add a URL location that points to your logo. Your alternate logo should be optimized for use in Office dark themes. Same requirements as the default logo.
+- **Small default logo**: Add a URL location that points to your logo. The image must be at least 48 x 48 pixels. You can scale this image so it fits on smaller or mobile devices.
+- **Small alternate logo**: Add a URL location that points to your logo. This image has the same requirements as the small default logo.
+- **On-click link**: Add a URL location that points to your logo. You can use your logo as a link to any company resource, for example, your company's website.
+
+Select **Save** to save your changes.
+
+You can remove your logos at any time. Just return to the **Logos** page and select **Remove**.
++
+> [!NOTE]
+> By default, we first show logo selections that most organizations use. To see all the logo selections, go to the bottom of the list and select **See advanced options**.
-- **Contrast ratio**: The recommended contrast ratio between text, icon, or button color and background color is 4.5:1.
+## Colors: Choose theme colors
+
+On the **Colors** page, you can set the default colors and choose which logo should be used.
+
+- **Navigation bar color**: Select a color to use for the background of the navigation bar. The navigation bar appears at the top on every page.
+- **Text and icon color**: Select a color to use for the text and icons on the top navigation bar.
+- **Accent color**: Pick one that shows up well on a white or light background. The accent color is used to color some links and buttons that show up on a white or light background. For example, the accent color is used to color elements in a user's inbox and on their Office.com portal page.
+- **Reset color**: Select this link to reset colors to the default colors.
+- **Which logo should be used?**: Select default logos or any other logos you've created yourself.
++
+## Frequently asked questions
+
+### My organization already has a theme for all employees. How will this change?
+
+The default theme will continue to be shown to all employees. Adding a new group theme will only be made available to the Microsoft 365 groups associated with that theme.
+
+### Why don’t I see group themes in the Admin Center?
+
+Only global admins can customize company themes. Global readers have read-only access.
+
+### How many different themes can I set up for my organization?
+
+Up to five themes can be created. A default theme and four group themes.
+
+### Can I use security groups or distribution groups instead of Microsoft 365 Groups?
+
+No, new group themes must be mapped to one or more Microsoft 365 groups and not security groups or distribution groups.
+
+> [!NOTE]
+> You can convert [distribution groups to Microsoft 365 groups](../manage/upgrade-distribution-lists.md) in Outlook.
+
+### Can I manually assign a theme independent of Microsoft 365 Groups? 
+
+No, new group themes must be mapped to one or more Microsoft 365 groups. Users who are members of the Microsoft 365 group will get the theme applied to their group. You can [create and add new members to a Microsoft 365 Group](../create-groups/create-groups.md) by going to the **Settings** > **Groups** in the admin center.
+
+### What happens if a user is assigned to multiple group themes?
+
+Users who are assigned to multiple group themes will be shown the default theme.
+
+### Why canΓÇÖt I delete the default theme?ΓÇ»
+
+The default theme can only be deleted once all group themes are deleted. Make sure you delete all group themes before you try to delete the group theme.
+
+### Why am I receiving an error message every time I upload a logo URL. 
+
+Make sure the logo you’re using is specified as a publicly addressable URL. Follow these steps for [uploading logos to Azure Blob Storage](/azure/storage/blobs/storage-upload-process-images?tabs=dotnet) or the [Office 365 Content Delivery Network with SharePoint Online](../../enterprise/use-microsoft-365-cdn-with-spo.md).
+
+### Why am I receiving the message “Doesn’t meet minimum color contrast ratio of 4.5:1”?
+
+The recommended contrast ratio between text, icon or button color and background color is 4.5:1. You can override this recommendation and still save your theme as this is not a requirement.
+
+### If I define a theme, which places in Microsoft 365 will this be used?
+
+Any theme will be appear in the top navigation bar for everyone in the organization as part of the Microsoft 365 suite header.
## Related articles
-[Add custom tiles to the My apps page and app launcher](../manage/customize-the-app-launcher.md)
+[Add custom tiles to the My apps page and app launcher](../manage/customize-the-app-launcher.md)
+
+[Overview of Microsoft 365 Groups for administrators](https://docs.microsoft.com/microsoft-365/admin/create-groups/office-365-groups)
business-video Set Up A New Business Email Address https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-video/set-up-a-new-business-email-address.md
+
+ Title: "Set up a new business email address"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+localization_priority: Normal
+
+- M365-subscription-management
+- Adm_O365
+
+- AdminSurgePortfolio
+- adminvideo
+monikerRange: 'o365-worldwide'
+search.appverid:
+- BCS160
+- MET150
+- MOE150
+description: "Learn how to set up a new business email address."
++
+# Set up a new business email address
+
+- [Set up business email with a new domain](#set-up-business-email-with-a-new-domain)
+
+- [Set up business email with an existing domain](#set-up-business-email-with-an-existing-domain)
+
+When you set up Microsoft 365 for your business, you can create a custom email address that includes your business name. This makes the address easier to remember, gives you and your employees the same company branded email, and provides more security in the Microsoft Cloud.
+
+## Set up business email with a new domain
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWyVVA?autoplay=false]
+
+Buy a new domain name for your email address and set up the email addresses with Microsoft 365.
+
+## Try it!
+
+1. Buy a new domain name for your email address by providing your contact information for the new domain name, choosing your payment method, and then placing your order.
+1. Change the first part of the address (before the @ sign) or leave it as is.
+1. Sign out of Microsoft 365, and then sign back in with your new email address. Your employee email addresses are updated with the new domain.
+1. Share the new email addresses with your employees by exporting the list.
+
+## Set up business email with an existing domain
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWxApu?autoplay=false]
+
+Use a domain name you already own whether you're using it for a website address or an email address at another provider.
+
+## Try it!
+
+1. Sign into the website that hosts your domain. Click a button to verify automatically or update the domain manually.
+1. Customize the email address or leave it as is.
+1. Sign out of Microsoft 365, and then sign back in with your new email address. Your employee email addresses are updated with the new domain.
+1. Share the new email addresses with your employees by exporting the list.
+1. Connect your domain to Microsoft 365 by repeating Step 1 above.
commerce View Your Bill Or Invoice https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/view-your-bill-or-invoice.md
You must be a Global or Billing admin to do the steps described in this article.
You can submit your Fapiao request to our [Fapiao management system](https://go.microsoft.com/fwlink/p/?linkid=837465) about three (3) days after you have paid.
-1. In the <a href=ΓÇ¥https://go.microsoft.com/fwlink/p/?linkid=850627ΓÇ¥ target=ΓÇ¥_blankΓÇ¥>admin center</a>, go to the **Billing** > **Bills & payments** page.
+1. In the <a href="https://go.microsoft.com/fwlink/p/?linkid=850627" target="_blank">admin center</a>, go to the **Billing** > **Bills & payments** page.
2. Find the invoice that you want, and then select **Get Fapiaos**.
If you have a balance and would like to pay it, you can do that online. To learn
[Pay by invoice, credit card, or bank account](pay-for-your-subscription.md) (article) \ [Manage payment methods](manage-payment-methods.md) (article) \
-[Minecraft: Education Edition payment options](/education/windows/school-get-minecraft) (article)
+[Minecraft: Education Edition payment options](/education/windows/school-get-minecraft) (article)
compliance Apply Retention Labels Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-retention-labels-automatically.md
Auto-applying retention labels are powerful because:
You can apply retention labels to content automatically when that content contains sensitive information, keywords or searchable properties, or a match for [trainable classifiers](classifier-get-started-with.md). > [!TIP]
-> Now in preview, use searchable properties to identify [Teams meeting recordings](#microsoft-teams-meeting-recordings).
+> Recently released, use searchable properties to identify [Teams meeting recordings](#microsoft-teams-meeting-recordings).
The processes to automatically apply a retention label based on these conditions:
Note that this final example uses the best practice of always including operato
##### Microsoft Teams meeting recordings > [!NOTE]
-> The ability to retain and delete Teams meeting recordings is in preview and won't work before recordings are saved to OneDrive or SharePoint. For more information, see [Use OneDrive for Business and SharePoint Online or Stream for meeting recordings](/MicrosoftTeams/tmr-meeting-recording-change).
+> The ability to retain and delete Teams meeting recordings won't work before recordings are saved to OneDrive or SharePoint. For more information, see [Use OneDrive for Business and SharePoint Online or Stream for meeting recordings](/MicrosoftTeams/tmr-meeting-recording-change).
To identify Microsoft Teams meeting recordings that are stored in users' OneDrive accounts or in SharePoint, specify the following for the **Keyword query editor**:
compliance Ediscovery Troubleshooting Common Issues https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-troubleshooting-common-issues.md
When running an eDiscovery search that includes SharePoint Online and One Drive
### Resolution
-1. Check location identified in the search to ensure the that the location of the file is correct and added in the search locations.
+1. Check location identified in the search to ensure that the location of the file is correct and added in the search locations.
2. Use the procedures at [Manually request crawling and re-indexing of a site, a library, or a list](/sharepoint/crawl-site-content) to reindex the site.
compliance Faqimporting Pst Files To Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/faqimporting-pst-files-to-office-365.md
- Title: "FAQ about importing PST files"-- NOCSH-----
-localization_priority: Normal
--- MOE150-- MED150-- MET150-
-description: "This article contains answers to some frequently asked questions for administrators about importing PST files to Microsoft 365 using the Office 365 Import Service."
--
-# FAQ about importing PST files
-
-**This article is for administrators. Do you want to import PST files to your own mailbox? See [Import email, contacts, and calendar from an Outlook .pst file](https://go.microsoft.com/fwlink/p/?LinkID=785075)**
-
-Here are some frequently asked questions about using the Office 365 Import Service to bulk-import PST files to Microsoft 365 mailboxes. For more information about how to import PST files, see [Overview of importing PST files to Office 365](./importing-pst-files-to-office-365.md).
-
-## Using network upload to import PST files
-
-For step-by-step instructions, see [Use network upload to import PST files to Office 365](use-network-upload-to-import-pst-files.md).
-
- **What permissions are required to create import jobs in the Office 365 Import Service?**
-
-You have to be assigned the Mailbox Import Export role in Exchange Online to import PST files to Microsoft 365 mailboxes. By default, this role isn't assigned to any role group in Exchange Online. You can add the Mailbox Import Export role to the Organization Management role group. Or you can create a new role group, assign the Mailbox Import Export role, and then add yourself or other users as a member. For more information, see the "Add a role to a role group" or the "Create a role group" sections in [Manage role groups in Exchange Online](/Exchange/permissions-exo/role-groups).
-
-Additionally, to create import jobs in the Security & Compliance Center, one of the following must be true:
-
-- You have to be assigned the Mail Recipients role in Exchange Online. By default, this role is assigned to the Organization Management and Recipient Management roles groups.
-
- Or
-
-- You have to be a global administrator in your organization.
-
-> [!TIP]
-> Consider creating a new role group in Exchange Online that's specifically intended for importing PST files to Office 365. For the minimum level of privileges required to import PST files, assign the Mailbox Import Export and Mail Recipients roles to the new role group, and then add members.
-
- **Where is network upload available?**
-
-Network upload is currently available in these regions: United States, Canada, Brazil, the United Kingdom, France, Germany, Switzerland, Norway, Europe, India, East Asia, Southeast Asia, Japan, Republic of Korea, Australia, and United Arab Emirates (UAE). Network upload will be available in more regions soon.
-
- **What is the pricing for importing PST files by using network upload?**
-
-Using network upload to import PST files is free.
-
-This also means that after PST files are deleted from the Azure Storage area, they're no longer displayed in the list of files for a completed import job in the Microsoft 365 admin center. Although an import job might still be listed on the **Import data to Office 365** page, the list of PST files might be empty when you view the details of older import jobs.
-
- **What version of the PST file format is supported for importing to Office 365?**
-
-There are two versions of the PST file format: ANSI and Unicode. We recommend importing files that use the Unicode PST file format. However, files that use the ANSI PST file format, such as those for languages that use a double-byte character set (DBCS), can also be imported to Office 365. For more information about importing ANSI PST files, see Step 4 in [Use network upload to import your organization's PST files to Office 365](use-network-upload-to-import-pst-files.md#step-4-create-the-pst-import-mapping-file).
-
-Additionally, PST files from Outlook 2007 and later versions can be imported to Office 365.
-
- **After I upload my PST files to the Azure Storage area, how long are they kept in Azure before they're deleted?**
-
-When you use the network upload method to import PST files, you upload them to an Azure blob container named `ingestiondata`. If there are no import jobs in progress on the **Import PST files** page in the Security & Compliance Center), then all PST files in the `ingestiondata` container in Azure are deleted 30 days after the most recent import job was created in the Security & Compliance Center. That also means you have to create a new import job in the Security & Compliance Center (described in Step 5 in the network upload instructions) within 30 days of uploading PST files to Azure.
-
-This also means that after PST files are deleted from the Azure Storage area, they're no longer displayed in the list of files for a completed import job in the Security & Compliance Center. Although an import job might still be listed on the **Import PST files** page in the Security & Compliance Center, the list of PST files might be empty when you view the details of older import jobs.
-
- **How long does it take to import a PST file to a mailbox?**
-
-It depends on the capacity of your network, but it typically takes several hours for each terabyte (TB) of data to be uploaded to the Azure Storage area for your organization. After the PST files are copied to the Azure Storage area, a PST file is imported to a Microsoft 365 mailbox at a rate of at least 24 GB per day. If this rate doesn't meet your needs, you might consider other methods for migrating email data to Office 365. For more information, see [Ways to migrate multiple email accounts to Office 365](/Exchange/mailbox-migration/mailbox-migration).
-
-If different PST files are imported to different target mailboxes, the import process occurs in parallel; in other words, each PST/mailbox pair is imported simultaneously. Likewise, if multiple PST files are imported to the same mailbox, they will be simultaneously imported.
-
- **How does the PST import process handle duplicate email items?**
-
-The PST import process checks for duplicate items and doesn't copy the items from a PST file to the mailbox or archive if a matching item exists in the target folder in the target mailbox or target archive. If you reimport the same PST file and specify a different target folder (using the TargetRootFolder property in the PST import mapping file) than the one you specified in a previous import job, all items in the PST file will be reimported.
-
- **Is there a message size limit when importing PST files?**
-
-Yes. If a PST file contains a mailbox item that is larger than 150 MB, the item will be skipped and not imported during the import process. Items larger than 150 MB aren't imported because 150 MB is the message size limit in Exchange Online. For more information, see [Message limits in Exchange Online](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#message-limits).
-
- **Are message properties, such as when the message was sent or received, the list of recipients and other properties, preserved when PST files are imported to a Microsoft 365 mailbox?**
-
-Yes. The original message metadata isn't changed during the import process.
-
- **Is there a limit to the number of levels in a folder hierarchy for a PST file that I want to import to a mailbox?**
-
-Yes. You can't import a PST file that has 300 or more levels of nested folders.
-
- **Can I use network upload to import PST files to an inactive mailbox in Office 365?**
-
-Yes, this capability is now available.
-
- **Can I use network upload to import PST files to an online archive mailbox in an Exchange hybrid deployment?**
-
-Yes, this capability is now available.
-
- **Can I use network upload to import PST files to public folders in Exchange Online?**
-
-No, you can't import PST files to public folders.
-
-## Using drive shipping to import PST files
-
-For step-by-step instructions, see [Use drive shipping to import PST files to Office 365](use-drive-shipping-to-import-pst-files-to-office-365.md).
-
- **What permissions are required to create import jobs in the Office 365 Import Service?**
-
-You have to be assigned the Mailbox Import Export role to import PST files to Microsoft 365 mailboxes. By default, this role isn't assigned to any role group in Exchange Online. You can add the Mailbox Import Export role to the Organization Management role group. Or you can create a new role group, assign the Mailbox Import Export role, and then add yourself or other users as a member. For more information, see the "Add a role to a role group" or the "Create a role group" sections in [Manage role groups in Exchange Online](/Exchange/permissions-exo/role-groups).
-
-Additionally, to create import jobs in the Security & Compliance Center, one of the following must be true:
-
-- You have to be assigned the Mail Recipients role in Exchange Online. By default, this role is assigned to the Organization Management and Recipient Management roles groups.
-
- Or
-
-- You have to be a global administrator in your organization.
-
-> [!TIP]
-> Consider creating a new role group in Exchange Online that's specifically intended for importing PST files to Office 365. For the minimum level of privileges required to import PST files, assign the Mailbox Import Export and Mail Recipients roles to the new role group, and then add members.
-
- **Where is drive shipping available?**
-
-Drive shipping is currently available in the United States, Canada, Brazil, the United Kingdom, Europe, India, East Asia, Southeast Asia, Japan, Republic of Korea, and Australia. Drive shipping will be available in more regions soon.
-
-> [!NOTE]
-> At this time, drive shipping to import PST files is not available in Germany and Switzerland. This FAQ will be updated when drive shipping is available in these countries.
-
- **What commercial licensing agreements support drive shipping?**
-
-Drive shipping to import PST files to Microsoft 365 is available through a Microsoft Enterprise Agreement (EA). Drive shipping isn't available through a Microsoft Products and Services Agreement (MPSA).
-
- **What is the pricing for using drive shipping to import PST files to Microsoft 365?**
-
-The cost to use drive shipping to import PST files to Microsoft 365 mailboxes is $2 USD per GB of data. For example, if you ship a hard drive that contains 1,000 GB (1 TB) of PST files, the cost is $2,000 USD. You can work with a partner to pay the import fee. For information about finding a partner, see [Find your Microsoft partner or reseller](../admin/manage/find-your-partner-or-reseller.md).
-
- **What kind of hard drives are supported for drive shipping?**
-
-Only 2.5-inch solid-state drives (SSDs) or 2.5-inch or 3.5-inch SATA II/III internal hard drives are supported for use with the Office 365 Import service. You can use hard drives up to 10 TB. For import jobs, only the first data volume on the hard drive will be processed. The data volume must be formatted with NTFS. When copying data to a hard drive, you can attach it directly using a 2.5-inch SSD or 2.5-inch or 3.5-inch SATA II/III connector or you can attach it externally using an external 2.5-inch SSD or 2.5-inch or 3.5-inch SATA II/III USB adaptor.
-
-> [!IMPORTANT]
-> External hard drives that come with an built-in USB adaptor aren't supported by the Office 365 Import service. Additionally, the disk inside the casing of an external hard drive can't be used. Please don't ship external hard drives.
-
- **How many hard drives can I ship for a single import job?**
-
-You can ship a maximum of 10 hard drives for a single import job.
-
- **After I ship my hard drive, how long does it take to get to the Microsoft data center?**
-
-That depends on a few things, such as your proximity to the Microsoft data center and what kind of shipping option you used to ship your hard drive (such as, next-day delivery, two-day delivery, or ground-delivery). With most shippers, you can use the tracking number to track the status of your delivery.
-
- **After my hard drive arrives at the Microsoft data center, how long does it take to upload my PST files to Azure?**
-
-After your hard drive is received at the Microsoft data center, it will take between 7 to 10 business days to upload the PST files to the Azure Storage area for your organization. The PST files will be uploaded to an Azure blob container named `ingestiondata`.
-
- **How long does it take to import a PST file to a mailbox?**
-
-After the PST files are uploaded to the Azure Storage area, Microsoft 365 analyzes the data in the PST files (in a safe and secure manner) to identify the age of the items and the different message types included in the PST files. When this analysis is complete, you'll have the option to import all the data in the PST files or set filters to that control what data gets imported. After you start the import job, a PST file is imported to a Microsoft 365 mailbox at a rate of at least 24 GB per day. If this rate doesn't meet your needs, you might consider other methods for importing email data to Office 365. For more information, see [Ways to migrate multiple email accounts to Office 365](/Exchange/mailbox-migration/mailbox-migration).
-
-If different PST files are imported to different target mailboxes, the import process occurs in parallel; in other words, each PST/mailbox pair is imported simultaneously. Likewise, if multiple PST files are imported to the same mailbox, they will be simultaneously imported.
-
- **After Microsoft uploads my PST files to Azure, how long are they kept in Azure before they're deleted?**
-
-All PST files in the Azure Storage location for your organization (in blob container named `ingestiondata`), are deleted 30 days after the most recent import job was created on the **Import PST files** page in the Security & Compliance Center.
-
-This also means that after PST files are deleted from the Azure Storage area, they're no longer displayed in the list of files for a completed import job in the Security & Compliance Center. Although an import job might still be listed on the **Import PST files** page in the Security & Compliance Center, the list of PST files might be empty when you view the details of older import jobs.
-
- **What version of the PST file format is supported for importing to Microsoft 365?**
-
-There are two versions of the PST file format: ANSI and Unicode. We recommend importing files that use the Unicode PST file format. However, files that use the ANSI PST file format, such as those for languages that use a double-byte character set (DBCS), can also be imported to Microsoft 365. For more information about importing ANSI PST files, see Step 3 in [Use drive shipping to import PST files to Office 365](use-drive-shipping-to-import-pst-files-to-office-365.md#step-3-create-the-pst-import-mapping-file).
-
-Additionally, PST files from Outlook 2007 and later versions can be imported to Office 365.
-
- **Is there a message size limit when importing PST files?**
-
-Yes. If a PST file contains a mailbox item that is larger than 150 MB, the item will be skipped and not imported during the import process. Items larger than 150 MB aren't imported because 150 MB is the message size limit in Exchange Online. For more information, see [Message limits in Exchange Online](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#message-limits).
-
- **How does the PST import process handle duplicate email items?**
-
-The PST import process checks for duplicate items and doesn't copy the items from a PST file to the mailbox or archive if a matching item exists in the target folder in the target mailbox or target archive. If you reimport the same PST file and specify a different target folder (using the TargetRootFolder property in the PST import mapping file) than the one you specified in a previous import job, all items in the PST file will be reimported.
-
- **Are message properties, such as when the message was sent or received, the list of recipients and other properties, preserved when PST files are imported to a Microsoft 365 mailbox?**
-
-Yes. The original message metadata isn't changed during the import process
-
- **Is there a limit to the number of levels in a folder hierarchy for a PST file that I want to import to a mailbox?**
-
-Yes. You can't import a PST file that has 300 or more levels of nested folders.
-
- **Can I use drive shipping to import PST files to an inactive mailbox in Microsoft 365?**
-
-Yes, this capability is now available.
-
- **Can I use drive shipping to import PST files to an online archive mailbox in an Exchange hybrid deployment?**
-
-Yes, this capability is now available.
-
- **Can I use drive shipping to import PST files to public folders in Exchange Online?**
-
-No, you can't import PST files to public folders.
-
- **Can Microsoft wipe my hard drive before they ship it back to me?**
-
-No, Microsoft can't wipe hard drives before shipping them back to customers. Hard drives are returned to you in the same state they were in when they were received by Microsoft.
-
- **Can Microsoft shred my hard drive instead of shipping it back to me?**
-
-No, Microsoft can't destroy your hard drive. Hard drives are returned to you in the same state they were in when they were received by Microsoft.
-
- **What courier services are supported for return shipping?**
-
-If you're a customer in the United States or Europe, Microsoft uses FedEx to return your hard drive. For all other regions, Microsoft uses DHL.
-
- **What are the return shipping costs?**
-
-Return shipping costs vary, depending on your proximity to the Microsoft data center that you shipped your hard drive to. Microsoft will bill your FedEx or DHL account to return your hard drive. The cost of return shipping is your responsibility.
-
- **Can I use a custom courier shipping service, such as FedEx Custom Shipping, to ship my hard drive to Microsoft?**
-
-Yes.
-
- **If I have to ship my hard drive to another country, is there anything I need to do?**
-
-The hard drive that you ship to Microsoft might have to cross international borders. If so, you're responsible for ensuring that the hard drive and the data it contains are imported and/or exported in accordance with the applicable laws. Before shipping a hard drive, check with your advisors to verify that your drive and data can legally be shipped to the specified Microsoft data center. This will help to ensure that it reaches Microsoft in a timely manner.
compliance Sensitivity Labels Office Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-office-apps.md
The numbers listed are the minimum Office application version required for each
|[Assign permissions now](encryption-sensitivity-labels.md#assign-permissions-now) | 1910+ | 16.21+ | 2.21+ | 16.0.11231+ | [Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) | |[Let users assign permissions: <br /> - Prompt users](encryption-sensitivity-labels.md#let-users-assign-permissions) |2004+ | 16.35+ | Under review | Under review | Under review | |[Audit label-related user activity](data-classification-activity-explorer.md) | 2011+ | 16.43+ | 2.46+ | Rolling out: 16.0.13628+ | Yes <sup>\*</sup> |
-|[Require users to apply a label to their email and documents](#require-users-to-apply-a-label-to-their-email-and-documents) | 2101+ | Rolling out: 16.45+ | Preview: [Beta Channel](https://office.com/insider) | Rolling out: 16.0.13628+ | Under review
+|[Require users to apply a label to their email and documents](#require-users-to-apply-a-label-to-their-email-and-documents) | 2101+ | Rolling out: 16.45+ | Rolling out: 2.47+ | Rolling out: 16.0.13628+ | Rolling out
|[Apply a sensitivity label to content automatically](apply-sensitivity-label-automatically.md) | 2009+ | Rolling out: 16.44+ | Under review | Under review | [Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) | |[Support co-authoring and AutoSave](sensitivity-labels-coauthoring.md) for labeled and encrypted documents | Preview: [Current Channel (Preview)](https://office.com/insider) | Preview: [Beta Channel](https://office.com/insider) | Under review | Under review | [Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) | |
compliance Use Drive Shipping To Import Pst Files To Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/use-drive-shipping-to-import-pst-files-to-office-365.md
Here are the steps required to use drive shipping to import PST files to Microso
> [!IMPORTANT] > You have to perform Step 1 once to down load the secure storage key and the import tool. After you perform these steps, follow Step 2 through Step 6 each time you want to ship a hard drive to Microsoft.
-For frequently asked questions about using drive shipping to import PST files to Office 365, see [FAQs for using drive shipping to import PST files](faqimporting-pst-files-to-office-365.md#using-drive-shipping-to-import-pst-files).
+For frequently asked questions about using drive shipping to import PST files to Office 365, see [FAQs for using drive shipping to import PST files](./faqimporting-pst-files-to-office-365.yml#using-drive-shipping-to-import-pst-files).
## Before you import PST files
compliance Use Network Upload To Import Pst Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/use-network-upload-to-import-pst-files.md
> [!NOTE] > This article is for administrators. Are you trying to import PST files to your own mailbox? See [Import email, contacts, and calendar from an Outlook .pst file](https://go.microsoft.com/fwlink/p/?LinkID=785075)
-Here are the step-by-step instructions required to use network upload to bulk-import multiple PST files to Microsoft 365 mailboxes. For frequently asked questions about using network upload to bulk-import PST files to Microsoft 365 mailboxes, see [FAQs for using network upload to import PST files](faqimporting-pst-files-to-office-365.md#using-network-upload-to-import-pst-files).
+Here are the step-by-step instructions required to use network upload to bulk-import multiple PST files to Microsoft 365 mailboxes. For frequently asked questions about using network upload to bulk-import PST files to Microsoft 365 mailboxes, see [FAQs for using network upload to import PST files](./faqimporting-pst-files-to-office-365.yml#using-network-upload-to-import-pst-files).
[Step 1: Copy the SAS URL and install AzCopy](#step-1-copy-the-sas-url-and-install-azcopy)
enterprise Azure Expressroute https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/azure-expressroute.md
Learn how Azure ExpressRoute is used with Office 365 and how to plan the network
> Microsoft Defender for Endpoint is not supported in Azure Express Route. > [!NOTE]
-> Microsoft authorization is required to use ExpressRoute for Office 365. Microsoft reviews every customer request and authorizes ExpressRoute for Office 365 usage when a customer's regulatory requirement mandates direct connectivity. If you have such requirements, please contact your Microsoft account representative to begin a Microsoft review. Unauthorized subscriptions trying to create route filters for Office 365 will receive an [error message](https://support.microsoft.com/kb/3181709).
-
-You can now add a direct network connection to Office 365 for selected Office 365 network traffic. Azure ExpressRoute offers a direct connection, predictable performance, and comes with an uptime SLA of 99.95% for the Microsoft networking components. You'll still require an internet connection for services that aren't supported over Azure ExpressRoute.
+> We do not recommend ExpressRoute for Microsoft 365 because it does not provide the best connectivity model for the service in most circumstances. As such, Microsoft authorization is required to use this connectivity model for Microsoft 365. We review every customer request and authorize ExpressRoute for Microsoft 365 only in the rare scenarios where it is necessary. Please read the [ExpressRoute for Microsoft 365 guide](https://aka.ms/erguide) for more information and following a comprehensive review of the document with your productivity, network, and security teams, work with your Microsoft account team to submit an exception if needed. Unauthorized subscriptions trying to create route filters for Office 365 will receive an [error message](https://support.microsoft.com/kb/3181709).
## Planning Azure ExpressRoute for Office 365
enterprise Ms Cloud Germany Transition Phases https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/ms-cloud-germany-transition-phases.md
description: "Summary: Understand the migration phases actions and impacts of mo
Tenant migrations from Microsoft Cloud Deutschland (MCD) to the region "Germany" of Microsoft's Office 365 Global services are executed as a set of phases and their configured actions for each workload. This figure shows the ten phases of migration to the new German datacenters.
-![The ten phases of migration to the new Germany datacenters](../media/ms-cloud-germany-migration-opt-in/migration-organization.png)
+[ ![The ten phases of migration to the new Germany datacenters](../media/ms-cloud-germany-migration-opt-in/migration-organization.png) ](../media/ms-cloud-germany-migration-opt-in/migration-organization.png#lightbox)
The migration process will complete over many weeks depending on the overall size and complexity of the organization. While the migration is underway, users and administrators are able to continue utilizing the services with notable changes detailed in this documentation. The graphic and table define phases and steps during the migration.
In case you are still using SharePoint 2013 workflows, limit the use of SharePoi
|:-|:--|:-| | SharePoint and OneDrive are transitioned | SharePoint Online and OneDrive for Business are migrated from Microsoft Cloud Deutschland to Office 365 Global services in this phase.<br><ul><li>Existing Microsoft Cloud Deutschland URLs are preserved (for example, `contoso.sharepoint.de`).</li><li>Existing sites are preserved.</li><li>Client-side authentication tokens that were issued by the Security Token Service (STS) in the Microsoft Cloud Deutschland or Office 365 Global services instance are valid during the transition.</li></ul>|<ul><li>Content will be read-only for two brief periods during migration. During this time, expect a "you can't edit content" banner in SharePoint.</li><li>The search index won't be preserved, and may take up to 10 days to be rebuilt.</li><li>SharePoint Online and OneDrive for Business content will be read-only for two brief periods during migration. Users will see a "you can't edit content" banner briefly during this time.</li><li>Upon completion of the SharePoint Online migration, the search results for SharePoint Online and OneDrive for Business content may be unavailable while the index is rebuilt. During this period, search queries might not return complete results. Features that are dependent on search indexes, such as SharePoint Online News, may be affected while reindexing completes.</li><li>SharePoint 2013 workflows will be broken during migration and must be republished after migration.</li></ul> |**SPO Admin**: Republish SharePoint 2013 workflows| A SharePoint Online admin republishes the SharePoint 2013 workflows after the migration.|SharePoint 2013 workflows are available.
-|**PowerShell user**: Update to new module| All users of the SharePoint Online Powershell module need to update module/Microsoft.SharePointOnline.CSOM to version 16.0.20717.12000 or above after the SharePoint Online migration is completed. Completion is communicated in the message center.| SharePoint Online via PowerShell or the client-side object model will no longer fail.
+|**PowerShell user**: Update to new module| All users of the SharePoint Online PowerShell module need to update module/Microsoft.SharePointOnline.CSOM to version 16.0.20717.12000 or above after the SharePoint Online migration is completed. Completion is communicated in the message center.| SharePoint Online via PowerShell or the client-side object model will no longer fail.
|||| Additional considerations:
includes Microsoft 365 Client Support Single Sign On Include https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/microsoft-365-client-support-single-sign-on-include.md
|STICKY NOTES|N/A|N/A|N/A|N/A|Γ£ö| |STREAM|Planned|Planned|N/A|N/A|N/A| |SWAY|N/A|N/A|N/A|N/A|Γ£ö|
-|TEAMS|Γ£ö|Γ£ö|Planned|Planned|N/A|
+|TEAMS|Γ£ö|Γ£ö|Planned|Γ£ö|N/A|
|TO-DO|Γ£ö|Γ£ö|N/A|N/A|Γ£ö| |VISIO|N/A|Γ£ö|N/A|Γ£ö|N/A| |WHITEBOARD|N/A|Γ£ö|N/A|N/A|Γ£ö|
security TOC https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/TOC.md
####### [List alerts](get-alerts.md) ####### [Create alert](create-alert-by-reference.md) ####### [Update Alert](update-alert.md)
-####### [Batch update alert](batch-update-alerts.md)
####### [Get alert information by ID](get-alert-info-by-id.md) ####### [Get alert related domains information](get-alert-related-domain-info.md) ####### [Get alert related file information](get-alert-related-files-info.md)
####### [Get alert related device information](get-alert-related-machine-info.md) ####### [Get alert related user information](get-alert-related-user-info.md)
+###### [Automated Investigation]()
+####### [Investigation methods and properties](investigation.md)
+####### [List Investigation](get-investigation-collection.md)
+####### [Get Investigation](get-investigation-object.md)
+####### [Start Investigation](initiate-autoir-investigation.md)
+
+###### [Domain]()
+####### [Get domain related alerts](get-domain-related-alerts.md)
+####### [Get domain related machines](get-domain-related-machines.md)
+####### [Get domain statistics](get-domain-statistics.md)
+
+###### [File]()
+####### [File methods and properties](files.md)
+####### [Get file information](get-file-information.md)
+####### [Get file related alerts](get-file-related-alerts.md)
+####### [Get file related machines](get-file-related-machines.md)
+####### [Get file statistics](get-file-statistics.md)
+
+###### [Indicators]()
+####### [Indicators methods and properties](ti-indicator.md)
+####### [Submit Indicator](post-ti-indicator.md)
+####### [List Indicators](get-ti-indicators-collection.md)
+####### [Delete Indicator](delete-ti-indicator-by-id.md)
+
+###### [IP]()
+####### [Get IP related alerts](get-ip-related-alerts.md)
+####### [Get IP statistics](get-ip-statistics.md)
+ ###### [Machine]() ####### [Machine methods and properties](machine.md) ####### [List machines](get-machines.md)
####### [Offboard machine](offboard-machine-api.md) ####### [Stop and quarantine file](stop-and-quarantine-file.md)
-###### [Automated Investigation]()
-####### [Investigation methods and properties](investigation.md)
-####### [List Investigation](get-investigation-collection.md)
-####### [Get Investigation](get-investigation-object.md)
-####### [Start Investigation](initiate-autoir-investigation.md)
-
-###### [Indicators]()
-####### [Indicators methods and properties](ti-indicator.md)
-####### [Import Indicators](import-ti-indicators.md)
-####### [Submit Indicator](post-ti-indicator.md)
-####### [List Indicators](get-ti-indicators-collection.md)
-####### [Delete Indicator](delete-ti-indicator-by-id.md)
-
-###### [Domain]()
-####### [Get domain related alerts](get-domain-related-alerts.md)
-####### [Get domain related machines](get-domain-related-machines.md)
-####### [Get domain statistics](get-domain-statistics.md)
-
-###### [File]()
-####### [File methods and properties](files.md)
-####### [Get file information](get-file-information.md)
-####### [Get file related alerts](get-file-related-alerts.md)
-####### [Get file related machines](get-file-related-machines.md)
-####### [Get file statistics](get-file-statistics.md)
-
-###### [IP]()
-####### [Get IP related alerts](get-ip-related-alerts.md)
-####### [Get IP statistics](get-ip-statistics.md)
+###### [Recommendation]()
+####### [Recommendation methods and properties](recommendation.md)
+####### [List all recommendations](get-all-recommendations.md)
+####### [Get recommendation by Id](get-recommendation-by-id.md)
+####### [Get recommendation by software](get-recommendation-software.md)
+####### [List machines by recommendation](get-recommendation-machines.md)
+####### [List vulnerabilities by recommendation](get-recommendation-vulnerabilities.md)
-###### [User]()
-####### [User methods](user.md)
-####### [Get user related alerts](get-user-related-alerts.md)
-####### [Get user related machines](get-user-related-machines.md)
+###### [Remediation Activity]()
+####### [Remediation activity methods and properties](get-remediation-methods-properties.md)
+####### [Get one remediation activity by Id](get-remediation-one-activity.md)
+####### [List all remediation activities](get-remediation-all-activities.md)
+####### [List exposed devices of one remediation activity](get-remediation-exposed-devices-activities.md)
###### [Score]() ####### [Score methods and properties](score.md)
####### [List vulnerabilities by software](get-vuln-by-software.md) ####### [Get missing KBs](get-missing-kbs-software.md)
+###### [User]()
+####### [User methods](user.md)
+####### [Get user related alerts](get-user-related-alerts.md)
+####### [Get user related machines](get-user-related-machines.md)
+ ###### [Vulnerability]() ####### [Vulnerability methods and properties](vulnerability.md) ####### [List vulnerabilities](get-all-vulnerabilities.md)
####### [Get vulnerability by Id](get-vulnerability-by-id.md) ####### [List machines by vulnerability](get-machines-by-vulnerability.md)
-###### [Recommendation]()
-####### [Recommendation methods and properties](recommendation.md)
-####### [List all recommendations](get-all-recommendations.md)
-####### [Get recommendation by Id](get-recommendation-by-id.md)
-####### [Get recommendation by software](get-recommendation-software.md)
-####### [List machines by recommendation](get-recommendation-machines.md)
-####### [List vulnerabilities by recommendation](get-recommendation-vulnerabilities.md)
- ##### [How to use APIs - Samples]() ###### [Microsoft Flow](api-microsoft-flow.md) ###### [Power BI](api-power-bi.md)
security Api Release Notes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api-release-notes.md
ms.technology: mde
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
+- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
The following information lists the updates made to the Microsoft Defender for Endpoint APIs and the dates they were made. - > [!TIP]
-> RSS feed: Get notified when this page is updated by copying and pasting the following URL into your feed reader:
->```
->https://docs.microsoft.com/api/search/rss?search=%22Release+notes+for+updates+made+to+the+Microsoft+Defender+for+Endpoint+set+of+APIs%22&locale=en-us&facet=&%24filter=scopes%2Fany%28t%3A+t+eq+%27Windows+10%27%29
->```
+> RSS feed: Get notified when this page is updated by copying and pasting the following URL into your feed reader:
+>
+> ```http
+> https://docs.microsoft.com/api/search/rss?search=%22Release+notes+for+updates+made+to+the+Microsoft+Defender+for+Endpoint+set+of+APIs%22&locale=en-us&facet=&%24filter=scopes%2Fany%28t%3A+t+eq+%27Windows+10%27%29
+> ```
-### 10.02.2021
-<hr>
+## Release notes - newest to oldest
-- Added new API: [Batch update alerts](batch-update-alerts.md).
+### 23.04.2021
-<br>
+- Added new API: [Remediation activity methods and properties](get-remediation-methods-properties.md).
-### 25.01.2021
-<hr>
+### 10.02.2021
-- Updated rate limitations for [Advanced Hunting API](run-advanced-query-api.md) from 15 to 45 requests per minute.
+- Added new API: [Batch update alerts](batch-update-alerts.md).
-<br>
+### 25.01.2021
-### 21.01.2021
-<hr>
+- Updated rate limitations for [Advanced Hunting API](run-advanced-query-api.md) from 15 to 45 requests per minute.
-- Added new API: [Find devices by tag](machine-tags.md). -- Added new API: [Import Indicators](import-ti-indicators.md).
+### 21.01.2021
-<br>
+- Added new API: [Find devices by tag](machine-tags.md).
+- Added new API: [Import Indicators](import-ti-indicators.md).
### 03.01.2021
-<hr>
- Updated Alert evidence: added ***detectionStatus***, ***parentProcessFilePath*** and ***parentProcessFileName*** properties. - Updated [Alert entity](alerts.md): added ***detectorId*** property.
-<br>
- ### 15.12.2020
-<hr>
- Updated [Device](machine.md) entity: added ***IpInterfaces*** list. See [List devices](get-machines.md).
-<br>
- ### 04.11.2020
-<hr>
- Added new API: [Set device value](set-device-value.md). - Updated [Device](machine.md) entity: added ***deviceValue*** property.
-<br>
- ### 01.09.2020
-<hr>
- Added option to expand the Alert entity with its related Evidence. See [List Alerts](get-alerts.md).-
-<br>
-<br>
security Exposed Apis List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/exposed-apis-list.md
ms.technology: mde
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
+- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
## Endpoint URI and versioning
-### Endpoint URI:
+### Endpoint URI
-> The service base URI is: https://api.securitycenter.microsoft.com
->
-> The queries based OData have the '/api' prefix. For example, to get Alerts you can send GET request to https://api.securitycenter.microsoft.com/api/alerts
+> The service base URI is: [https://api.securitycenter.microsoft.com](https://api.securitycenter.microsoft.com)
+>
+> The queries based OData have the '/api' prefix. For example, to get Alerts you can send GET request to [https://api.securitycenter.microsoft.com/api/alerts](https://api.securitycenter.microsoft.com/api/alerts)
-### Versioning:
+### Versioning
> The API supports versioning.
->
+>
> The current version is **V1.0**.
->
+>
> To use a specific version, use this format: `https://api.securitycenter.microsoft.com/api/{Version}`. For example: `https://api.securitycenter.microsoft.com/api/v1.0/alerts`
->
-> If you don't specify any version (e.g. https://api.securitycenter.microsoft.com/api/alerts ) you will get to the latest version.
-
+>
+> If you don't specify any version (e.g. `https://api.securitycenter.microsoft.com/api/alerts` ) you will get to the latest version.
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] [!include[Improve request performance](../../includes/improve-request-performance.md)] - Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses. ## In this section Topic | Description :|:
-Advanced Hunting | Run queries from API.
-Alerts | Run API calls such as get alerts, create alert, update alert and more.
-Domains | Run API calls such as get domain-related devices, domain statistics and more.
-Files | Run API calls such as get file information, file related alerts, file related devices, and file statistics.
-IPs | Run API calls such as get IP-related alerts and get IP statistics.
-Machines | Run API calls such as get devices, get devices by ID, information about logged on users, edit tags and more.
-Machine Actions | Run API call such as Isolation, Run anti-virus scan and more.
-Indicators | Run API call such as create Indicator, get Indicators and delete Indicators.
-Users | Run API calls such as get user-related alerts and user-related devices.
-Score | Run API calls such as get exposure score or get device secure score.
-Software | Run API calls such as list vulnerabilities by software.
-Vulnerability | Run API calls such as list devices by vulnerability.
-Recommendation | Run API calls such as Get recommendation by ID.
+[Advanced Hunting](run-advanced-query-api.md) | Run queries from API.
+[Alert methods and properties](alerts.md) | Run API calls such as \- get alerts, create alert, update alert and more.
+[Automated Investigation methods and properties](investigation.md) | Run API calls such as \- get collection of Investigation.
+[Get domain related alerts](get-domain-related-alerts.md) | Run API calls such as \- get domain-related devices, domain statistics and more.
+[File methods and properties](files.md) | Run API calls such as \- get file information, file related alerts, file related devices, and file statistics.
+[Indicators methods and properties](ti-indicator.md) | Run API call such as \- get Indicators, create Indicator, and delete Indicators.
+[Get IP related alerts](get-ip-related-alerts.md) | Run API calls such as \- get IP-related alerts and get IP statistics.
+[Machine methods and properties](machine.md) | Run API calls such as \- get devices, get devices by ID, information about logged on users, edit tags and more.
+[Machine Action methods and properties](machineaction.md) | Run API call such as \- Isolation, Run anti-virus scan and more.
+[Recommendation methods and properties](recommendation.md) | Run API calls such as \- get recommendation by ID.
+[Remediation activity methods and properties](get-remediation-methods-properties.md) | Run API call such as \- get all remediation tasks, get exposed devices remediation task and get one remediation task by id.
+[Score methods and properties](score.md) | Run API calls such as \- get exposure score or get device secure score.
+[Software methods and properties](software.md) | Run API calls such as \- list vulnerabilities by software.
+[User methods](user.md) | Run API calls such as \- get user-related alerts and user-related devices.
+[Vulnerability methods and properties](vulnerability.md) | Run API calls such as \- list devices by vulnerability.
## See also+ - [Microsoft Defender for Endpoint APIs](apis-intro.md)+
+- [Microsoft Defender for Endpoint API release notes](api-release-notes.md)
security Get Remediation All Activities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-remediation-all-activities.md
+
+ Title: List all remediation activities
+description: Returns information about all remediation activities.
+keywords: apis, remediation, remediation api, get, remediation tasks,
+search.product: eADQiWindows 10XVcnh
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
++
+localization_priority: Normal
+
+audience: ITPro
++
+ms.technology: mde
++
+# List all remediation activities
++
+**Applies to:**
+
+- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
+
+> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
++++
+## API description
+
+Returns information about all remediation activities.
+
+[Learn more about remediation activities](tvm-remediation.md).
+
+**URL:** GET: /api/remediationTasks
+
+**Properties** details
+
+Property (id) | Data type | Description | Example of a returned value
+:|:|:|:
+category | String | Category of the remediation activity (Software/Security configuration) | Software
+completerEmail | String | If the remediation activity was manually completed by someone, this column contains their email | null
+completerId | String | If the remediation activity was manually completed by someone, this column contains their object id | null
+completionMethod | String | A remediation activity can be completed ΓÇ£automaticallyΓÇ¥ (if all the devices are patched) or ΓÇ£manuallyΓÇ¥ by a person who selects ΓÇ£mark as completedΓÇ¥ | Automatic
+createdOn | DateTime | Time this remediation activity was created | 2021-01-12T18:54:11.5499478Z
+description | String | Description of this remediation activity | Update Chrome to a later version to mitigate 1248 known vulnerabilities affecting your devices.
+dueOn | DateTime | Due date the creator set for this remediation activity | 2021-01-13T00:00:00Z
+fixedDevices | . | The number of devices that have been fixed | 2
+id | String | ID of this remediation activity | 097d9735-5479-4899-b1b7-77398899df92
+nameId | String | Related product name | chrome
+priority | String | Priority the creator set for this remediation activity (High\Medium\Low) | High
+productId | String | Related product ID | google-_-chrome
+productivityImpactRemediationType | String | A few configuration changes could be requested only for devices with no user impact. This value indicate the selection between ΓÇ£all exposed devicesΓÇ¥ or ΓÇ£only devices with no user impact.ΓÇ¥ | AllExposedAssets
+rbacGroupNames | String | Related device group names | [ "Windows Servers", "Windows 10" ]
+recommendedProgram | String | Recommended program to upgrade to | null
+recommendedVendor | String | Recommended vendor to upgrade to | null
+recommendedVersion | String | Recommended version to update/upgrade to | null
+relatedComponent | String | Related component of this remediation activity (similar to the related component for a security recommendation) | Google Chrome
+requesterEmail | String | Creator email address | globaladmin@UserName.contoso.com
+requesterId | String | Creator object id | r647211f-2e16-43f2-a480-16ar3a2a796r
+requesterNotes | String | The notes (free text) the creator added for this remediation activity | null
+scid | String | SCID of the related security recommendation | null
+status | String | Remediation activity status (Active/Completed) | Active
+statusLastModifiedOn | DateTime | Date when the status field was updated | 2021-01-12T18:54:11.5499487Z
+targetDevices | Long | Number of exposed devices that this remediation is applicable to | 43
+title | String | Title of this remediation activity | Update Google Chrome
+type | String | Remediation type | Update
+vendorId | String | Related vendor name | google
+
+## Example
+
+**Request** example
+
+```http
+GET https://api-luna.securitycenter.windows.com/api/remediationtasks/
+```
+
+**Response** example
+
+```json
+{
+ "@odata.context": "https://wpatdadi-luna-stg.cloudapp.net/api/$metadata#RemediationTasks",
+ "value": [
+ {
+ "id": "03942ef5-aewb-4w6e-b555-d6a97013844w",
+ "title": "Update Microsoft Silverlight",
+ "createdOn": "2021-02-10T13:20:36.4718166Z",
+ "requesterId": "65548a1d-ef00-4a7a-8d19-1b967b5c36f4",
+ "requesterEmail": "user1@contoso.com",
+ "status": "Active",
+ "statusLastModifiedOn": "2021-02-10T13:20:36.4719698Z",
+ "description": "Update Silverlight to a later version to mitigate 55 known vulnerabilities affecting your devices. Doing so can help lessen the security risk to your organization due to versions which have reached their end-of-support. ",
+ "relatedComponent": "Microsoft Silverlight",
+ "targetDevices": 18511,
+ "rbacGroupNames": [
+ "UnassignedGroup",
+ "hhh"
+ ],
+ "fixedDevices": 2866,
+ "requesterNotes": "test",
+ "dueOn": "2021-02-11T00:00:00Z",
+ "category": "Software",
+ "productivityImpactRemediationType": null,
+ "priority": "Medium",
+ "completionMethod": null,
+ "completerId": null,
+ "completerEmail": null,
+ "scid": null,
+ "type": "Update",
+ "productId": "microsoft-_-silverlight",
+ "vendorId": "microsoft",
+ "nameId": "silverlight",
+ "recommendedVersion": null,
+ "recommendedVendor": null,
+ "recommendedProgram": null
+ }
+ ]
+}
+```
+
+## See also
+
+- [Remediation methods and properties](get-remediation-methods-properties.md)
+
+- [Get one remediation activity by Id](get-remediation-one-activity.md)
+
+- [List exposed devices of one remediation activity](get-remediation-exposed-devices-activities.md)
+
+- [Risk-based threat & vulnerability management](next-gen-threat-and-vuln-mgt.md)
+
+- [Vulnerabilities in your organization](tvm-weaknesses.md)
security Get Remediation Exposed Devices Activities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-remediation-exposed-devices-activities.md
+
+ Title: List exposed devices of one remediation activity
+description: Returns information about exposed devices for the specified remediation task.
+keywords: apis, remediation, remediation api, get, remediation tasks,
+search.product: eADQiWindows 10XVcnh
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
++
+localization_priority: Normal
+
+audience: ITPro
++
+ms.technology: mde
++
+# List exposed devices of one remediation activity
++
+**Applies to:**
+
+- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
+
+> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
++++
+## API Description
+
+Returns information about exposed devices for the specified remediation task.
+
+[Learn more about remediation activities](tvm-remediation.md).
+
+## List exposed devices associated with a remediation task (id)
+
+**URL:** GET: /api/remediationTasks/\{id\}/machineReferences
+
+**Properties** details
+
+Property (id) | Data type | Description | Example
+:|:|:|:
+id | String | Device ID | w2957837fwda8w9ae7f023dba081059dw8d94503
+computerDnsName | String | Device name | PC-SRV2012R2Foo.UserNameVldNet.local
+osPlatform | String | Device operating system | WindowsServer2012R2
+rbacGroupName | String | Name of the device group this device is associated with | Servers
+
+## Example
+
+**Request** example
+
+```http
+GET https://api-luna.securitycenter.windows.com/api/remediationtasks/03942ef5-aecb-4c6e-b555-d6a97013844c/machinereferences
+```
+
+**Response** example
+
+```json
+{
+ "@odata.context": "https://wpatdadi-luna-stg.cloudapp.net/api/$metadata#MachineReferences",
+ "value": [
+ {
+ "id": "3cb5df6bb3640a2d37ad09fcd357b182d684fafc",
+ "computerDnsName": "ComputerPII_2ea21b2d97c9df23c143ad9e3e454cb674232529.DomainPII_21eed80b086e79bdfa178eabfa25e8be9acfa346.corp.contoso.com",
+ "osPlatform": "WindowsServer2016",
+ "rbacGroupName": "UnassignedGroup",
+
+ },
+ {
+ "id": "3d9b1ca53e8f077199c7dcbfc9dbfa78f9bf1918",
+ "computerDnsName": "ComputerPII_001d606fc149567c192747f48fae304b43c0ddba.DomainxPII_21eed80b086e79bdfa178eabfa25e8be9acfa346.corp.contoso.com",
+ "osPlatform": "WindowsServer2012R2",
+ "rbacGroupName": "UnassignedGroup",
+
+ },
+ {
+ "id": "3db8b27e6172951d7ea2e2d75945abec56feaf82",
+ "computerDnsName": "ComputerPII_ce60cfbjj4b82a091deb5eae560332bba99a9bd7.DomainPII_0bc1aee0fa396d175e514bd61a9e7a5b2b07ee8e.corp.contoso.com",
+ "osPlatform": "WindowsServer2016",
+ "rbacGroupName": "UnassignedGroup",
+
+ },
+ {
+ "id": "3bad326dcda5b53fab47408cd4a7080f3f3cc8ab",
+ "computerDnsName": "ComputerPII_b6b35960dd6539d1d1cef5ada02e235e7b357408.DomainPII_21eed80b089e76bdfa178eadfa25e8de9acfa346.corp.contoso.com",
+ "osPlatform": "WindowsServer2012R2",
+ "rbacGroupName": "UnassignedGroup",
+
+ }
+]
+}
+```
+
+## See also
+
+- [Remediation methods and properties](get-remediation-methods-properties.md)
+
+- [Get one remediation activity by Id](get-remediation-one-activity.md)
+
+- [List all remediation activities](get-remediation-all-activities.md)
+
+- [Risk-based threat & vulnerability management](next-gen-threat-and-vuln-mgt.md)
+
+- [Vulnerabilities in your organization](tvm-weaknesses.md)
security Get Remediation Methods Properties https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-remediation-methods-properties.md
+
+ Title: Remediation activity methods and properties
+description: The API response contains threat & vulnerability management remediation activities created in your tenant. You can request all the remediation activities, only one remediation activity, or information about exposed devices for a selected remediation task.
+keywords: apis, remediation, remediation api, get, remediation tasks,
+search.product: eADQiWindows 10XVcnh
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
++
+localization_priority: Normal
+
+audience: ITPro
++
+ms.technology: mde
++
+# Remediation activity methods and properties
++
+**Applies to:**
+
+- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
+
+> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
++++
+The API response contains [Threat & vulnerability management](next-gen-threat-and-vuln-mgt.md) remediation activities that have been created in your tenant.
+
+## Methods
+
+Method | Data type | Description
+:|:|:
+[List all remediation activities](get-remediation-all-activities.md) | Investigation collection | Returns information about all remediation activities.
+[List exposed devices of one remediation activity](get-remediation-exposed-devices-activities.md) | Investigation entity | Returns information about exposed devices for the specified remediation activity.
+[Get one remediation activity by Id](get-remediation-one-activity.md) | Investigation entity | Returns information for the specified remediation activity.
+
+Learn more about [remediation activities](tvm-remediation.md).
+
+## Properties
+
+Property id | Data type | Description
+:|:|:
+category | String | Category of the remediation activity (Software/Security configuration)
+completerEmail | String | If the remediation activity was manually completed by someone, this column contains their email
+completerId | String | If the remediation activity was manually completed by someone, this column contains their object id
+completionMethod | String | A remediation activity can be completed ΓÇ£automaticallyΓÇ¥ (if all the devices are patched) or ΓÇ£manuallyΓÇ¥ by a person who selects ΓÇ£mark as completed.ΓÇ¥
+createdOn | DateTime | Time this remediation activity was created
+description | String | Description of this remediation activity
+dueOn | DateTime | Due date the creator set for this remediation activity
+fixedDevices | | The number of devices that have been fixed
+id | String | ID of this remediation activity
+nameId | String | Related product name
+priority | String | Priority the creator set for this remediation activity (High\Medium\Low)
+productId | String | Related product ID
+productivityImpactRemediationType | String | A few configuration changes could be requested only for devices with no user impact. This value indicate the selection between ΓÇ£all exposed devicesΓÇ¥ or ΓÇ£only devices with no user impact.ΓÇ¥
+rbacGroupNames | String | Related device group names
+recommendedProgram | String | Recommended program to upgrade to
+recommendedVendor | String | Recommended vendor to upgrade to
+recommendedVersion | String | Recommended version to update/upgrade to
+relatedComponent | String | Related component of this remediation activity (similar to the related component for a security recommendation)
+requesterEmail | String | Creator email address
+requesterId | String | Creator object id
+requesterNotes | String | The notes (free text) the creator added for this remediation activity
+scid | String | SCID of the related security recommendation
+status | String | Remediation activity status (Active/Completed)
+statusLastModifiedOn | DateTime | Date when the status field was updated
+targetDevices | Long | Number of exposed devices that this remediation is applicable to
+title | String | Title of this remediation activity
+type | String | Remediation type
+vendorId | String | Related vendor name
+
+## See also
+
+- [Get one remediation activity by Id](get-remediation-one-activity.md)
+
+- [List all remediation activities](get-remediation-all-activities.md)
+
+- [List exposed devices of one remediation activity](get-remediation-exposed-devices-activities.md)
+
+- [Risk-based threat & vulnerability management](next-gen-threat-and-vuln-mgt.md)
+
+- [Vulnerabilities in your organization](tvm-weaknesses.md)
security Get Remediation One Activity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-remediation-one-activity.md
+
+ Title: Get one remediation activity by Id
+description: Returns information for the specified remediation activity.
+keywords: apis, remediation, remediation api, get, remediation tasks, list
+search.product: eADQiWindows 10XVcnh
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
++
+localization_priority: Normal
+
+audience: ITPro
++
+ms.technology: mde
++
+# Get one remediation activity by Id
++
+**Applies to:**
+
+- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
+
+> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
++++
+## API description
+
+Returns information for the specified remediation activity. Presents the same columns as [Get all remediation activity](get-remediation-all-activities.md)", but returns results _only for the one specified remediation activity_.
+
+[Learn more about remediation activities](tvm-remediation.md).
+
+## List a specified remediation activity for (id)
+
+**URL:** GET: /api/remediationTasks/\{id\}
+
+**Properties** details
+
+Property (id) | Data type | Description | Example of a returned value
+:|:|:|:
+category | String | Category of the remediation activity (Software/Security configuration) | Software
+completerEmail | String | If the remediation activity was manually completed by someone, this column contains their email | null
+completerId | String | If the remediation activity was manually completed by someone, this column contains their object id | null
+completionMethod | String | A remediation activity can be completed ΓÇ£automaticallyΓÇ¥ (if all the devices are patched) or ΓÇ£manuallyΓÇ¥ by a person who selects ΓÇ£mark as completedΓÇ¥ | Automatic
+createdOn | DateTime | Time this remediation activity was created | 2021-01-12T18:54:11.5499478Z
+description | String | Description of this remediation activity | Update Chrome to a later version to mitigate 1248 known vulnerabilities affecting your devices.
+dueOn | DateTime | Due date the creator set for this remediation activity | 2021-01-13T00:00:00Z
+fixedDevices | | The number of devices that have been fixed | 2
+id | String | ID of this remediation activity | 097d9735-5479-4899-b1b7-77398899df92
+nameId | String | Related product name | chrome
+priority | String | Priority the creator set for this remediation activity (High\Medium\Low) | High
+productId | String | Related product ID | google-_-chrome
+productivityImpactRemediationType | String | A few configuration changes could be requested only for devices with no user impact. This value indicate the selection between ΓÇ£all exposed devicesΓÇ¥ or ΓÇ£only devices with no user impact.ΓÇ¥ | AllExposedAssets
+rbacGroupNames | String | Related device group names | [ "Windows Servers", "Windows 10" ]
+recommendedProgram | String | Recommended program to upgrade to | null
+recommendedVendor | String | Recommended vendor to upgrade to | null
+recommendedVersion | String | Recommended version to update/upgrade to | null
+relatedComponent | String | Related component of this remediation activity (similar to the related component for a security recommendation) | Google Chrome
+requesterEmail | String | Creator email address | globaladmin@UserName.contoso.com
+requesterId | String | Creator object id | r647211f-2e16-43f2-a480-16ar3a2a796r
+requesterNotes | String | The notes (free text) the creator added for this remediation activity | null
+scid | String | SCID of the related security recommendation | null
+status | String | Remediation activity status (Active/Completed) | Active
+statusLastModifiedOn | DateTime | Date when the status field was updated | 2021-01-12T18:54:11.5499487Z
+targetDevices | Long | Number of exposed devices that this remediation is applicable to | 43
+title | String | Title of this remediation activity | Update Google Chrome
+type | String | Remediation type | Update
+vendorId | String | Related vendor name | google
+
+## Example
+
+**Request** example
+
+```http
+GET https://api-luna.securitycenter.windows.com/api/remediationtasks/03942ef5-aecb-4c6e-b555-d6a97013844c
+```
+
+**Response** example
+
+```json
+{
+ "@odata.context": "https://wpatdadi-luna-stg.cloudapp.net/api/$metadata#RemediationTasks/$entity",
+ "id": "03942ef5-aecb-4c6e-b555-d6a97013844c",
+ "title": "Update Microsoft Silverlight",
+ "createdOn": "2021-02-10T13:20:36.4718166Z",
+ "requesterId": "65548a1d-efo0-4a7a-8d19-1b967b5c36f4",
+ "requesterEmail": "user1@contoso.com",
+ "status": "Active",
+ "statusLastModifiedOn": "2021-02-10T13:20:36.4719698Z",
+ "description": "Update Silverlight to a later version to mitigate 55 known vulnerabilities affecting your devices. Doing so can help lessen the security risk to your organization due to versions which have reached their end-of-support. ",
+ "relatedComponent": "Microsoft Silverlight",
+ "targetDevices": 18511,
+ "rbacGroupNames": [
+ "UnassignedGroup",
+ "hhh"
+ ],
+ "fixedDevices": 2866,
+ "requesterNotes": "test",
+ "dueOn": "2021-02-11T00:00:00Z",
+ "category": "Software",
+ "productivityImpactRemediationType": null,
+ "priority": "Medium",
+ "completionMethod": null,
+ "completerId": null,
+ "completerEmail": null,
+ "scid": null,
+ "type": "Update",
+ "productId": "microsoft-_-silverlight",
+ "vendorId": "microsoft",
+ "nameId": "silverlight",
+ "recommendedVersion": null,
+ "recommendedVendor": null,
+ "recommendedProgram": null
+}
+```
+
+## See also
+
+- [Remediation methods and properties](get-remediation-methods-properties.md)
+
+- [List all remediation activities](get-remediation-all-activities.md)
+
+- [List exposed devices of one remediation activity](get-remediation-exposed-devices-activities.md)
+
+- [Risk-based threat & vulnerability management](next-gen-threat-and-vuln-mgt.md)
+
+- [Vulnerabilities in your organization](tvm-weaknesses.md)
security Prevent Changes To Security Settings With Tamper Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md
Tamper protection essentially locks Microsoft Defender Antivirus and prevents yo
Tamper protection doesn't prevent you from viewing your security settings. And, tamper protection doesn't affect how third-party antivirus apps register with the Windows Security app. If your organization is using Windows 10 Enterprise E5, individual users can't change the tamper protection setting; in those cases, tamper protection is managed by your security team. ++ ### What do you want to do? | To perform this task... | See this section... |
Tamper protection doesn't prevent you from viewing your security settings. And,
| Review your security recommendations | [Review security recommendations](#review-your-security-recommendations) | | Review the list of frequently asked questions (FAQs) | [Browse the FAQs](#view-information-about-tampering-attempts) |
+Depending on the method or management tool you use to enable Tamper protection, there may be a dependency on MAPS (cloud-delivered protection).
+
+The following table provides details on the methods, tools, and dependencies.
+++
+| How Tamper protection is enabled | Dependency on MAPS (cloud-delivered protection) |
+||--|
+| Microsoft Intune | No |
+| Microsoft Endpoint Configuration Manager + Tenant Attach | No |
+| Microsoft Defender for Endpoint portal (securitycenter.microsoft.com) | Yes |
+| Microsoft 365 Defender portal (security.microsoft.com) | Yes |
+ ## Manage tamper protection for your organization using the Microsoft Defender Security Center Tamper protection can be turned on or off for your tenant using the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)). Here are a few points to keep in mind:
Tamper protection can be turned on or off for your tenant using the Microsoft De
- If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft Defender Security Center. +++ ### Requirements for managing tamper protection in the Microsoft Defender Security Center - You must have appropriate [permissions](/microsoft-365/security/defender-endpoint/assign-portal-access), such as global admin, security admin, or security operations.
security Report False Positives And False Negatives https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/report-false-positives-and-false-negatives.md
+
+ Title: Report false positives and false negatives in Outlook
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+localization_priority: Normal
+
+ - M365-security-compliance
+description: Learn how to report false positives and false negatives in Outlook and enable the Report Message and Report Phishing add-ins.
+ms.technology: mdo
++
+# Report false positives and false negatives in Outlook
++
+**Applies to**
+- [Exchange Online Protection](exchange-online-protection-overview.md)
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+
+> [!NOTE]
+> If you're an admin in a Microsoft 365 organization with Exchange Online mailboxes, we recommend that you use the Submissions portal in the Security & Compliance Center. For more information, see [Use Admin Submission to submit suspected spam, phish, URLs, and files to Microsoft](admin-submission.md).
+
+In Microsoft 365 organizations with mailboxes in Exchange Online or on-premises mailboxes using hybrid modern authentication, you can submit false positives (good email marked as spam) and false negatives (bad email and phish allowed) to Exchange Online Protection (EOP).
+
+## Things to remember before you use the Report Message feature
+
+- For the best user submission experience, use the Report Message add-in or the Report Phishing add-in.
+
+- Note that this add-in works for Outlook in all platformsΓÇöon the web, iOS, Android, and Desktop.
+
+- If you're an admin in an organization with Exchange Online mailboxes, use the Submissions portal in the Security & Compliance Center. For more information, see [Use Admin Submission to submit suspected spam, phish, URLs, and files to Microsoft](admin-submission.md).
+
+- You can configure to send messages directly to Microsoft, a mailbox you specify, or both. For more information, see [User submissions policies](user-submission.md).
+
+- For more information about reporting messages to Microsoft, see [Report messages and files to Microsoft](report-junk-email-messages-to-microsoft.md).
+
+## Use the Report Message feature
+
+### Report junk and phishing messages
+
+For messages in the Inbox or any other email folder except Junk Email, use the following method to report spam and phishing messages:
+
+1. Click the **More actions** ellipses on the top-right corner of the selected message, click **Report message** from the dropdown menu, and then select **Junk** or **Phishing**.
+
+ > [!div class="mx-imgBorder"]
+ > ![Report Message - More actions](../../media/report-message-more-actions.png)
+
+ > [!div class="mx-imgBorder"]
+ > ![Report Message - Junk and Phishing](../../media/report-message-junk-phishing.png)
+
+2. The selected messages will be sent to Microsoft for analysis and:
+
+ - Moved to the Junk Email folder if it was reported as spam.
+
+ - Deleted if it was reported as phishing.
+
+### Report messages that are not junk
+
+1. Click the **More actions** ellipses on the top-right corner of the selected message, click **Report message** from the dropdown menu, and then click **Not Junk**.
+
+ > [!div class="mx-imgBorder"]
+ > ![Report Message - More actions](../../media/report-message-more-actions.png)
+
+ > [!div class="mx-imgBorder"]
+ > ![Report Message - Not junk](../../media/report-message-not-junk.png)
+
+2. The selected message will be sent to Microsoft for analysis and moved to Inbox or any other specified folder.
+
+## Enable the Report Message and Report Phishing add-ins
+
+The Report Message and Report Phishing add-ins for Outlook and Outlook on the web (formerly known as Outlook Web App) enable people to easily report false positives (good email marked as bad) or false negatives (bad email allowed) to Microsoft and its affiliates for analysis.
+
+Microsoft uses these submissions to improve the effectiveness of email protection technologies. For example, suppose that people are reporting many messages using the Report Phishing add-in. This information surfaces in the Security Dashboard and other reports. Your organization's security team can use this information as an indication that anti-phishing policies might need to be updated.
+
+You can install either the Report Message or Report Phishing add-in. If you want your users to report both spam and phishing messages, deploy the Report Message add-in in your organization. For more information, see Enable the Report Message add-in.
+
+The Report Message add-in provides the option to report both spam and phishing messages. Admins can enable the Report Message add-in for the organization, and individual users can install it for themselves.
+
+The Report Phishing add-in provides the option to report only phishing messages. Admins can enable the Report Phishing add-in for the organization, and individual users can install it for themselves.
+
+If you're an individual user, you can enable both the add-ins for yourself.
+
+f you're a global administrator or an Exchange Online administrator, and Exchange is configured to use OAuth authentication, you can enable the Report Message add-in and the Report Phishing add-in for your organization. Both add-ins are now available through [Centralized Deployment](../../admin/manage/centralized-deployment-of-add-ins.md).
+
+## What do you need to know before you begin?
+
+- Both the Report Message add-in and the Report Phishing add-in works with most Microsoft 365 subscriptions and the following products:
+
+ - Outlook on the web
+ - Outlook 2013 SP1 or later
+ - Outlook 2016 for Mac
+ - Outlook included with Microsoft 365 apps for Enterprise
+ - Outlook app for iOS and Android
+
+- Both add-ins are not available for shared mailboxes or mailboxes in on-premises Exchange organizations.
+
+- Your existing web browser should work with both the Report Message and Report Phishing add-ins. But, if you notice the add-in is not available or not working as expected, try a different browser.
+
+- For organizational installs, the organization needs to be configured to use OAuth authentication. For more information, see [Determine if Centralized Deployment of add-ins works for your organization](../../admin/manage/centralized-deployment-of-add-ins.md).
+
+- Admins need to be a member of the Global admins role group. For more information, see [Permissions in the Security & Compliance Center](permissions-in-the-security-and-compliance-center.md).
+
+## Get the Report Message add-in
+
+### Get the add-in for yourself
+
+1. Go to the Microsoft AppSource at <https://appsource.microsoft.com/marketplace/apps> and search for the Report Message add-in. To go directly to the Report Message add-in, go to <https://appsource.microsoft.com/product/office/wa104381180>.
+
+2. Click **GET IT NOW**.
+
+ ![Report Message - Get It Now](../../media/ReportMessageGETITNOW.png)
+
+3. In the dialog that appears, review the terms of use and privacy policy, and then click **Continue**.
+
+4. Sign in using your work or school account (for business use) or your Microsoft account (for personal use).
+
+After the add-in is installed and enabled, you'll see the following icons:
+
+- In Outlook, the icon looks like this:
+
+ > [!div class="mx-imgBorder"]
+ > ![Report Message add-in icon for Outlook](../../media/OutlookReportMessageIcon.png)
+
+- In Outlook on the web, the icon looks like this:
+
+ > [!div class="mx-imgBorder"]
+ > ![Outlook on the web Report Message add-in icon](../../media/owa-report-message-icon.png)
+
+### Get the add-in for your organization
+
+> [!NOTE]
+> It could take up to 12 hours for the add-in to appear in your organization.
+
+1. In the Microsoft 365 admin center, go to the go to the **Settings** \> **Add-ins** page at <https://admin.microsoft.com/AdminPortal/Home#/Settings/AddIns>. If you don't see the **Add-in** Page, go to the **Settings** \> **Integrated apps** \> **Add-ins** link on the top of the **Integrated apps** page.
+
+2. Select **Deploy Add-in** at the top of the page, and then select **Next**.
+
+ ![Services and add-ins page in the Microsoft 365 admin center](../../media/ServicesAddInsPageNewM365AdminCenter.png)
+
+3. In the **Deploy a new add-in** flyout that appears, review the information, and then click **Next**.
+
+4. On the next page, click **Choose from the Store**.
+
+ ![Deploy a new add-in page](../../media/NewAddInScreen2.png)
+
+5. In the **Select add-in** page that appears, click in the **Search** box, enter **Report Message**, and then click **Search** ![Search icon](../../media/search-icon.png). In the list of results, find **Report Message** and then click **Add**.
+
+ ![Select add-in search results](../../media/NewAddInScreen3.png)
+
+6. In the dialog that appears, review the licensing and privacy information, and then click **Continue**.
+
+7. In the **Configure add-in** page that appears, configure the following settings:
+
+ - **Assigned users**: Select one of the following values:
+
+ - **Everyone** (default)
+ - **Specific users / groups**
+ - **Just me**
+
+ - **Deployment method**: Select one of the following values:
+
+ - **Fixed (Default)**: The add-in is automatically deployed to the specified users and they can't remove it.
+ - **Available**: Users can install the add-in at **Home** \> **Get add-ins** \> **Admin-managed**.
+ - **Optional**: The add-in is automatically deployed to the specified users, but they can choose to remove it.
+
+ ![Configure add-in page](../../media/configure-add-in.png)
+
+ When you're finished, click **Deploy**.
+
+8. In the **Deploy Report Message** page that appears, you'll see a progress report followed by a confirmation that the add-in was deployed. After you read the information, click **Next**.
+
+ ![Deploy Report Message page](../../media/deploy-report-message-page.png)
+
+9. On the **Announce add-in** page that appears, review the information, and then click **Close**.
+
+ ![Announce add-in page](../../media/announce-add-in-page.png)
+
+## Review or edit settings for the Report Message add-in
+
+1. In the Microsoft 365 admin center, go to the go to the **Settings** \> **Add-ins** page at <https://admin.microsoft.com/AdminPortal/Home#/Settings/AddIns>. If you don't see the **Add-in** Page, go to the **Settings** \> **Integrated apps** \> **Add-ins** link on the top of the **Integrated apps** page.
+
+ ![Services and Add-Ins page in the new Microsoft 365 Admin Center](../../media/ServicesAddInsPageNewM365AdminCenter.png)
+
+2. Find and select the **Report Message** add-in.
+
+3. In the **Edit Report Message** flyout that appears, review and edit settings as appropriate for your organization. When you're finished, click **Save**.
+
+ ![Settings for the Report Message add-in](../../media/EditReportMessageAddIn.png)
+
+## Get the Report Phishing add-in
+
+### Get the add-in for yourself
+
+1. Go to the Microsoft AppSource at <https://appsource.microsoft.com/marketplace/apps> and search for the Report Phishing add-in.
+
+2. Click **GET IT NOW**.
+
+3. In the dialog that appears, review the terms of use and privacy policy, and then click **Continue**.
+
+4. Sign in using your work or school account (for business use) or your Microsoft account (for personal use).
+
+After the add-in is installed and enabled, you'll see the following icons:
+
+- In Outlook, the icon looks like this:
+
+ ![Report Phishing add-in icon for Outlook](../../media/Outlook-ReportPhishing.png)
+
+- In Outlook on the web, the icon looks like this:
+
+ > [!div class="mx-imgBorder"]
+ > ![Outlook on the web Report Phishing add-in icon](../../media/OWA-ReportPhishing.png)
+
+### Get the add-in for your organization
+
+> [!NOTE]
+> It could take up to 12 hours for the add-in to appear in your organization.
+
+1. In the Microsoft 365 admin center, go to the go to the **Settings** \> **Add-ins** page at <https://admin.microsoft.com/AdminPortal/Home#/Settings/AddIns>. If you don't see the **Add-in** Page, go to the **Settings** \> **Integrated apps** \> **Add-ins** link on the top of the **Integrated apps** page.
+
+2. Select **Deploy Add-in** at the top of the page, and then select **Next**.
+
+ ![Services and add-ins page in the Microsoft 365 admin center](../../media/ServicesAddInsPageNewM365AdminCenter.png)
+
+3. In the **Deploy a new add-in** flyout that appears, review the information, and then click **Next**.
+
+4. On the next page, click **Choose from the Store**.
+
+ ![Deploy a new add-in page](../../media/NewAddInScreen2.png)
+
+5. In the **Select add-in** page that appears, click in the **Search** box, enter **Report Phishing**, and then click **Search** ![Search icon](../../media/search-icon.png). In the list of results, find **Report Phishing** and then click **Add**.
+
+6. In the dialog that appears, review the licensing and privacy information, and then click **Continue**.
+
+7. In the **Configure add-in** page that appears, configure the following settings:
+
+ - **Assigned users**: Select one of the following values:
+
+ - **Everyone** (default)
+ - **Specific users / groups**
+ - **Just me**
+
+ - **Deployment method**: Select one of the following values:
+
+ - **Fixed (Default)**: The add-in is automatically deployed to the specified users and they can't remove it.
+ - **Available**: Users can install the add-in at **Home** \> **Get add-ins** \> **Admin-managed**.
+ - **Optional**: The add-in is automatically deployed to the specified users, but they can choose to remove it.
+
+ When you're finished, click **Deploy**.
+
+8. In the **Deploy Report Phishing** page that appears, you'll see a progress report followed by a confirmation that the add-in was deployed. After you read the information, click **Next**.
+
+9. On the **Announce add-in** page that appears, review the information, and then click **Close**.
+
+## Review or edit settings for the Report Phishing add-in
+
+1. In the Microsoft 365 admin center, go to the go to the **Settings** \> **Add-ins** page at <https://admin.microsoft.com/AdminPortal/Home#/Settings/AddIns>. If you don't see the **Add-in** Page, go to the **Settings** \> **Integrated apps** \> **Add-ins** link on the top of the **Integrated apps** page.
+
+2. Find and select the **Report Phishing** add-in.
+
+3. In the **Edit Report Phishing** flyout that appears, review, and edit settings as appropriate for your organization. When you're finished, click **Save**.
+
+## View and review reported messages
+
+To review messages that users report to Microsoft, you have these options:
+
+- Use the Admin Submissions portal. For more information, see [View user submissions to Microsoft](admin-submission.md#view-user-submissions-to-microsoft).
+
+- Create a mail flow rule (also known as a transport rule) to send copies of reported messages. For instructions, see [Use mail flow rules to see what your users are reporting to Microsoft](use-mail-flow-rules-to-see-what-your-users-are-reporting-to-microsoft.md).
solutions Deploy Threat Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/deploy-threat-protection.md
Title: Deploy threat protection capabilities across Microsoft 365 description: Get an overview of threat protection services and security capabilities in Microsoft 365 E5. Protect your user accounts, devices, email content, and more with Microsoft 365 E5.
-keywords: advanced threat protection, security, microsoft 365 E5, solution, protect devices, defender
+keywords: solution, setup, advanced threat protection, atp, security, microsoft 365 E5, protect devices, defender, m365
f1.keywords: NOCSH
# Deploy threat protection capabilities across Microsoft 365 E5
-This solution describes powerful threat protection capabilities across Microsoft 365 E5. Read this solution to get an overview of what's included, how it works, and how to get started deploying these capabilities in your organization.
+This solution describes powerful threat protection capabilities across Microsoft 365 E5 and explains why threat protection is important. Read this article to get an overview of threat protection in Microsoft 365 E5 and how to approach setup and configuration for your organization.
## Why threat protection is important
The following illustration depicts a recommended path for deploying these indivi
|Solution/capabilities |Description | ||| |Multi-factor authentication and Conditional Access |Protect against compromised identities and devices. Begin with this protection because it's foundational. The configuration recommended in this guidance includes Azure AD Identity Protection as a prerequisite. |
-|Microsoft Defender for Identity | A cloud-based security solution that leverages your on-premises Active Directory Domain Services (AD DS) signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Focus on Microsoft Defender for Identity next because it protects your on-premises and cloud infrastructure, has no dependencies or prerequisites, and can provide immediate security benefits. |
+|Microsoft Defender for Identity | A cloud-based security solution that uses your on-premises Active Directory Domain Services (AD DS) signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Focus on Microsoft Defender for Identity next because it protects your on-premises and cloud infrastructure, has no dependencies or prerequisites, and can provide immediate security benefits. |
|Microsoft Defender for Office 365 | Safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools. Protections for malware, phishing, spoofing, and other attack types. Configuring Microsoft Defender for Office 365 is recommended next because change control, migrating settings from incumbent system, and other considerations can take longer to deploy. <p>**NOTE**: Make sure to configure the threat protection capabilities that are included in all Office 365 subscriptions (Exchange Online Protection). | |Microsoft Defender for Endpoint | An endpoint protection platform that helps prevent, detect, investigate, and respond to advanced threats. Defender for Endpoint can take some time to deploy, but configuration can be done in parallel with other capabilities. | |Microsoft Cloud App Security | A cloud access security broker for discovery, investigation, and governance. You can enable Microsoft Cloud App Security early to begin collecting data and insights. Implementing information and other targeted protection across your SaaS apps involves planning and can take more time. |
The following diagram illustrates the high-level process for deploying threat pr
![Process for deploying threat protection capabilities](../media/deploy-threat-protection/deploy-threat-protection-across-m365-grid.png)
-To make sure your organization has the best protection possible, set up and deploy your security solution by using a process that includes the following steps:
+To make sure your organization has the best protection possible, set up and deploy your security solution with a process that includes the following steps:
1. [Set up multi-factor authentication and Conditional Access policies](deploy-threat-protection-configure.md#step-1-set-up-multi-factor-authentication-and-conditional-access-policies). 2. [Configure Microsoft Defender for Identity](deploy-threat-protection-configure.md#step-2-configure-microsoft-defender-for-identity).
Your threat protection features can be configured in parallel, so if you have mu
## Next step
-Proceed to [Configure threat protection capabilities across Microsoft 365](deploy-threat-protection-configure.md).
+Continue to [Configure threat protection capabilities across Microsoft 365](deploy-threat-protection-configure.md).