Updates from: 04/28/2023 01:28:17
Category Microsoft Docs article Related commit history on GitHub Change details
admin Activity Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/activity-reports.md
Depending on your subscription, here are the available reports in all environmen
|Report|Public|GCC|GCC-High|DoD|Office 365 operated by 21Vianet| |:--|:--|:--|:--|:--|:--|
-|[Microsoft browser usage](browser-usage-report.md)|Yes|No<sup>1</sup>|No<sup>1</sup>|No<sup>1</sup>|No<sup>1</sup>|
+|[Microsoft browser usage](browser-usage-report.md)|Yes|N/A<sup>1</sup>|N/A<sup>1</sup>|N/A<sup>1</sup>|N/A<sup>1</sup>|
|[Email activity](email-activity-ww.md)|Yes|Yes|Yes|Yes|Yes| |[Email apps usage](email-apps-usage-ww.md)|Yes|Yes|Yes|Yes|Yes| |[Mailbox usage](mailbox-usage.md)|Yes|Yes|Yes|Yes|Yes| |[Office activations](microsoft-office-activations-ww.md)|Yes|Yes|Yes|Yes|Yes| |[Active Users](active-users-ww.md)|Yes|Yes|Yes|Yes|Yes| |[Microsoft 365 groups](office-365-groups-ww.md)|Yes|Yes|Yes|Yes|Yes|
-|[Microsoft 365 Apps usage](microsoft365-apps-usage-ww.md)|Yes|Yes|No<sup>1</sup>|No<sup>1</sup>|Yes
+|[Microsoft 365 Apps usage](microsoft365-apps-usage-ww.md)|Yes|Yes|N/A<sup>1</sup>|N/A<sup>1</sup>|Yes
|[OneDrive for Business user activity](onedrive-for-business-activity-ww.md)|Yes|Yes|Yes|Yes|Yes| |[OneDrive for Business usage](onedrive-for-business-usage-ww.md)|Yes|Yes|Yes|Yes|Yes| |[SharePoint site usage](sharepoint-site-usage-ww.md)|Yes|Yes|Yes|Yes|Yes| |[SharePoint activity](sharepoint-activity-ww.md)|Yes|Yes|Yes|Yes|Yes|
-|[Microsoft Teams user activity](microsoft-teams-user-activity-preview.md)|Yes|Yes|Yes|Yes|N/A<sup>2</sup>|
-|[Microsoft Teams device usage](microsoft-teams-device-usage-preview.md)|Yes|Yes|Yes|Yes|N/A<sup>2</sup>|
-|[Microsoft Teams usage activity](microsoft-teams-usage-activity.md)|Yes|Yes|Yes|Yes|N/A<sup>2</sup>|
+|[Microsoft Teams user activity](microsoft-teams-user-activity-preview.md)|Yes|Yes|Yes|Yes|N/A<sup>1</sup>|
+|[Microsoft Teams device usage](microsoft-teams-device-usage-preview.md)|Yes|Yes|Yes|Yes|N/A<sup>1</sup>|
+|[Microsoft Teams team activity](microsoft-teams-usage-activity.md)|Yes|Yes|Yes|Yes|N/A<sup>1</sup>|
|[Yammer activity](yammer-activity-report-ww.md)|Yes|Yes|N/A<sup>2</sup>|N/A<sup>2</sup>|N/A<sup>2</sup>| |[Yammer device usage](yammer-device-usage-report-ww.md)|Yes|Yes|N/A<sup>2</sup>|N/A<sup>2</sup>|N/A<sup>2</sup>| |[Yammer groups activity report](yammer-groups-activity-report-ww.md)|Yes|Yes|N/A<sup>2</sup>|N/A<sup>2</sup>|N/A<sup>2</sup>|
-|[Forms activity](forms-activity-ww.md)|Yes|Yes|No<sup>1</sup>|No<sup>1</sup>|No<sup>1</sup>|
+|[Forms activity](forms-activity-ww.md)|Yes|Yes|N/A<sup>1</sup>|N/A<sup>1</sup>|N/A<sup>1</sup>|
|[Dynamics 365 Customer Voice activity](forms-pro-activity-ww.md)|Yes|Yes|N/A<sup>2</sup>|N/A<sup>2</sup>|N/A<sup>2</sup>|
-|[Skype for Business Online activity](/SkypeForBusiness/skype-for-business-online-reporting/activity-report)|Yes|Yes|No<sup>1</sup>|No<sup>1</sup>|Yes|
-|[Skype for Business Online conference organized activity](/SkypeForBusiness/skype-for-business-online-reporting/conference-organizer-activity-report)|Yes|Yes|No<sup>1</sup>|No<sup>1</sup>|Yes|
-|[Skype for Business Online conference participant activity](/SkypeForBusiness/skype-for-business-online-reporting/conference-participant-activity-report)|Yes|Yes|No<sup>1</sup>|No<sup>1</sup>|Yes|
-|[Skype for Business Online peer-to-peer activity](/SkypeForBusiness/skype-for-business-online-reporting/peer-to-peer-activity-report)|Yes|Yes|No<sup>1</sup>|No<sup>1</sup>|Yes|
-|[Viva Learning activity](viva-learning-activity.md)|Yes|N/A|N/A|N/A|N/A|
-|[Viva Insights activity](viva-insights-activity.md)|Yes|Yes|N/A|N/A|N/A|
-|[Project activity](project-activity.md)|Yes|Yes|N/A|N/A|N/A|
-|[Visio activity](visio-activity.md)|Yes|Yes|N/A|N/A|N/A|
+|[Skype for Business Online activity](/SkypeForBusiness/skype-for-business-online-reporting/activity-report)|Yes|Yes|N/A<sup>1</sup>|N/A<sup>1</sup>|Yes|
+|[Skype for Business Online conference organized activity](/SkypeForBusiness/skype-for-business-online-reporting/conference-organizer-activity-report)|Yes|Yes|N/A<sup>1</sup>|N/A<sup>1</sup>|Yes|
+|[Skype for Business Online conference participant activity](/SkypeForBusiness/skype-for-business-online-reporting/conference-participant-activity-report)|Yes|Yes|N/A<sup>1</sup>|N/A<sup>1</sup>|Yes|
+|[Skype for Business Online peer-to-peer activity](/SkypeForBusiness/skype-for-business-online-reporting/peer-to-peer-activity-report)|Yes|Yes|N/A<sup>1</sup>|N/A<sup>1</sup>|Yes|
+|[Viva Learning activity](viva-learning-activity.md)|Yes|N/A|N/A|N/A|N/A<sup>2</sup>|
+|[Viva Insights activity](viva-insights-activity.md)|Yes|Yes|N/A|N/A|N/A<sup>2</sup>|
+|[Project activity](project-activity.md)|Yes|Yes|N/A|N/A|N/A<sup>2</sup>|
+|[Visio activity](visio-activity.md)|Yes|Yes|N/A|N/A|N/A<sup>2</sup>|
N/A<sup>1</sup>: The report is in plan to be released in the future. The <a href="https://www.microsoft.com/en-us/microsoft-365/roadmap?filters=" target="_blank">Microsoft 365 Roadmap</a> will be updated before the release.
-N/A<sup>2</sup>: The service is not available in the environment so no plan to release the report.
+
+N/A<sup>2</sup>: The service is not available in the environment, so there's no plan to release the report.
## How to view licensing information
admin Email Activity Ww https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/email-activity-ww.md
Title: "Microsoft 365 admin center email activity reports" -+ Last updated 02/18/2020 audience: Admin
admin Email Apps Usage Ww https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/email-apps-usage-ww.md
Title: "Microsoft 365 admin center email apps usage reports" -+ Last updated 02/18/2020 audience: Admin
admin Forms Activity Ww https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/forms-activity-ww.md
Title: "Microsoft 365 admin center forms activity reports"
f1.keywords: - NOCSH -+ Last updated 11/10/2020 audience: Admin
admin Forms Pro Activity Ww https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/forms-pro-activity-ww.md
Title: "Microsoft Dynamics 365 customer voice activity reports"
f1.keywords: - NOCSH -+ Last updated 11/10/2020 audience: Admin
admin Mailbox Usage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/mailbox-usage.md
Title: "Microsoft 365 admin center mailbox usage reports" -+ Last updated 02/18/2020 audience: Admin
admin Microsoft Office Activations Ww https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/microsoft-office-activations-ww.md
Title: "Microsoft 365 admin center Office activations reports" -+ Last updated 12/07/2020 audience: Admin
admin About Admin Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/about-admin-roles.md
Title: "About admin roles in the Microsoft 365 admin center"
f1.keywords: - CSH -+ Last updated 02/18/2020 audience: Admin
admin About Guest Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/about-guest-users.md
Title: "Guest users in the Microsoft 365 admin center"
f1.keywords: - NOCSH -+ Last updated 06/16/2020 audience: Admin
admin Admin Roles Page https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/admin-roles-page.md
Title: "About the admin roles page in Microsoft 365"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Assign Admin Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/assign-admin-roles.md
Title: "Assign admin roles the Microsoft 365 admin center"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Change A User Name And Email Address https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/change-a-user-name-and-email-address.md
Title: "Change a user name and email address"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Delete A User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/delete-a-user.md
Title: "Delete a user from your organization"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Give Mailbox Permissions To Another User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/give-mailbox-permissions-to-another-user.md
Title: "Give mailbox permissions to another user - Admin Help"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Let Users Reset Passwords https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/let-users-reset-passwords.md
Title: "Let users reset their own passwords"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Remove Former Employee Step 1 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/remove-former-employee-step-1.md
Title: "Step 1 - Prevent a former employee from logging in and block access to M
f1.keywords: - NOCSH -+ Last updated 03/17/2021 audience: Admin
admin Remove Former Employee Step 2 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/remove-former-employee-step-2.md
Title: "Step 2 - Save the contents of a former employee's mailbox"
f1.keywords: - NOCSH -+ Last updated 03/17/2021 audience: Admin
admin Remove Former Employee Step 3 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/remove-former-employee-step-3.md
Title: "Step 3 - Wipe and block a former employee's mobile device"
f1.keywords: - NOCSH -+ Last updated 03/17/2021 audience: Admin
admin Remove Former Employee Step 4 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/remove-former-employee-step-4.md
Title: "Step 4 - Forward a former employee's email to another employee or conver
f1.keywords: - NOCSH -+ Last updated 03/17/2021 audience: Admin
admin Remove Former Employee Step 5 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/remove-former-employee-step-5.md
Title: "Step 5 - Give another employee access to OneDrive and Outlook data"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Remove Former Employee Step 6 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/remove-former-employee-step-6.md
Title: "Step 6 - Remove and delete the Microsoft 365 license from a former emplo
f1.keywords: - NOCSH -+ Last updated 03/17/2021 audience: Admin
admin Remove Former Employee Step 7 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/remove-former-employee-step-7.md
Title: "Step 7 - Delete a former employee's user account"
f1.keywords: - NOCSH -+ Last updated 03/17/2021 audience: Admin
admin Remove Former Employee https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/remove-former-employee.md
Title: "Remove a former employee - Overview"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Reset Passwords https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/reset-passwords.md
Title: "Reset passwords"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Restore User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/restore-user.md
Title: "Restore a user"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Set Password To Never Expire https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/set-password-to-never-expire.md
Title: "Set an individual user's password to never expire"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Admin Mobile App https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/admin-mobile-app.md
Title: "About the Microsoft 365 admin mobile app"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin What Is Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/what-is-microsoft-365.md
Title: "What is Microsoft 365 Business Premium"
f1.keywords: - NOCSH -+ audience: Admin
admin Capabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/capabilities.md
Title: "Capabilities of Basic Mobility and Security"
f1.keywords: - NOCSH -+ Last updated 08/31/2020 audience: Admin
admin Choose Between Basic Mobility And Security And Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/choose-between-basic-mobility-and-security-and-intune.md
Title: "Choose between Basic Mobility and Security and Intune"
f1.keywords: - NOCSH -+ Last updated 08/31/2020 audience: Admin
admin Create An Apns Certificate For Ios Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/create-an-apns-certificate-for-ios-devices.md
Title: "Create an APNs certificate for iOS devices" f1.keywords: NOCSH -+ Last updated 08/27/2020 audience: Admin
admin Create Device Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/create-device-security-policies.md
Title: "Create device security policies in Basic Mobility and Security"
f1.keywords: - NOCSH -+ Last updated 09/01/2020 audience: Admin
admin Enroll Your Mobile Device https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/enroll-your-mobile-device.md
Title: "Enroll your mobile device using Basic Mobility and Security"
f1.keywords: - NOCSH -+ Last updated 08/26/2020 audience: Admin
admin Manage Device Access Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/manage-device-access-settings.md
Title: "Manage device access settings in Basic Mobility and Security"
f1.keywords: - NOCSH -+ Last updated 08/31/2020 audience: Admin
admin Manage Enrolled Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/manage-enrolled-devices.md
Title: "Manage devices enrolled in Mobile Device Management in Microsoft 365"
f1.keywords: - NOCSH -+ Last updated 09/01/2020 audience: Admin
admin Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/overview.md
Title: "Overview of Basic Mobility and Security for Microsoft 365"
f1.keywords: - NOCSH -+ Last updated 08/31/2020 audience: Admin
admin Privacy And Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/privacy-and-security.md
Title: "Privacy and security in Basic Mobility and Security" f1.keywords: NOCSH --++ Last updated 08/27/2020 audience: Admin
admin Set Up https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/set-up.md
Title: "Set up Basic Mobility and Security"
f1.keywords: - NOCSH -+ Last updated 09/01/2020 audience: Admin
admin Turn Off https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/turn-off.md
Title: "Turn off Basic Mobility and Security" f1.keywords: NOCSH -+ Last updated 08/27/2020 audience: Admin
admin Wipe Mobile Device https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/wipe-mobile-device.md
Title: "Wipe a mobile device in Basic Mobility and Security"
f1.keywords: - NOCSH -+ Last updated 08/10/2020 audience: Admin
admin Group Mailbox Size Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/create-groups/group-mailbox-size-management.md
ms.localizationpriority: medium
search.appverid: Last updated 08/03/2022-+
As mentioned earlier, the group mailbox is used for various applications to stor
The group mailbox is distributed in various `TargetQuota`, namely System, Recoverable and User. The folders matching `TargetQuota` ΓÇ£UserΓÇ¥ is the only one considered in the calculation of the group quota.
-2. Use the following command to verify the folder size thatΓÇÖs occupying User data:
+1. Use the following command to verify the folder size thatΓÇÖs occupying User data:
```PowerShell Get-MailboxFolderStatistics <groupname> | where { $_.TargetQuota -like 'User' } | ft Name,FolderPath,FolderType,FolderSize Get-MailboxFolderStatistics <groupname> -FolderScope NonIPMRoot | where { $_.TargetQuota -like 'User' } | ft Name,FolderType,*size* ```
-3. Check the folders quota or size.
+1. Check the folders quota or size.
-4. If the folder consuming the space is `SharePointWebPartsConnectorMessages`, as mentioned in [Use the Connector web part](https://support.microsoft.com/en-us/office/use-the-connector-web-part-db0756aa-f78f-4b74-8b19-be5dca0420e1?ns=spostandard&version=16&syslcid=1033&uilcid=1033&appver=spo160&helpid=wssenduser_useconnectorwebpart_fl862286&ui=en-us&rs=en-us&ad=us)then do the following:
+1. If the folder consuming the space is `SharePointWebPartsConnectorMessages`, as mentioned in [Use the Connector web part](https://support.microsoft.com/en-us/office/use-the-connector-web-part-db0756aa-f78f-4b74-8b19-be5dca0420e1?ns=spostandard&version=16&syslcid=1033&uilcid=1033&appver=spo160&helpid=wssenduser_useconnectorwebpart_fl862286&ui=en-us&rs=en-us&ad=us)then do the following:
1. Disable the connector if not used.
- 2. Wait for the messages to be cleared by default in 90 days.
+ 1. Wait for the messages to be cleared by default in 90 days.
+
+1. If there's no special folder occupying the group mailbox size, [apply the group mailbox retention policy,](/microsoft-365/compliance/create-retention-policies) and wait for retention policy to clean up the emails from group mailbox.
-5. If there's no special folder occupying the group mailbox size, [apply the group mailbox retention policy,](/microsoft-365/compliance/create-retention-policies) and wait for retention policy to clean up the emails from group mailbox.
-
admin Access Email From A Mobile Device https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/access-email-from-a-mobile-device.md
Title: "Options for accessing email from your mobile device"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: End User
admin Add Another Email Alias For A User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/add-another-email-alias-for-a-user.md
Title: "Add another email alias for a user"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Add User Or Contact To Distribution List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/add-user-or-contact-to-distribution-list.md
Title: "Add a user or contact to a distribution group"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Configure Clutter https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/configure-clutter.md
Title: "Configure Clutter for your organization"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Configure Email Forwarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/configure-email-forwarding.md
Title: "Configure email forwarding"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Create Edit Or Delete A Security Group https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/create-edit-or-delete-a-security-group.md
Title: "Create, edit, or delete a security group in the Microsoft 365 admin cent
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Manage Email App Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/manage-email-app-access.md
Title: "Manage email app access in Microsoft 365 admin center"
f1.keywords: - CSH -+ Last updated 02/18/2020 audience: Admin
admin Office 365 User Email Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/office-365-user-email-settings.md
Title: "User email settings"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Centralized Deployment Of Add Ins https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/centralized-deployment-of-add-ins.md
Title: "Determine if Centralized Deployment of add-ins works for your organizati
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Change Contact Preferences https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/change-contact-preferences.md
Title: "Change your contact preferences for communications from Microsoft"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Health Dashboard Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/health-dashboard-overview.md
Title: "Microsoft 365 Health Dashboard" -+ Last updated 06/15/2022 audience: Admin
As the admin of your organization, youΓÇÖre charged with keeping many apps and s
The Health dashboard is designed to give you a snapshot of the overall health of your environment. You can see how well your organization is keeping desktop software up to date, following best practices for security, and using the products and services youΓÇÖve paid for. > [!NOTE]
-> Microsoft 365 Health dashboard is in public preview and may not be available to all customers.
+> Microsoft 365 Health dashboard is in public preview and may not be available to all customers.
-## Health dashboard in the Microsoft 365 admin center
+## Watch
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RW12HEz?autoplay=false]
+
+## Steps: Health dashboard in the Microsoft 365 admin center
1. Sign in to the admin center, and then go to this url: https://admin.microsoft.com/AdminPortal/Home?#/healthoverview.
admin Idle Session Timeout Web Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/idle-session-timeout-web-apps.md
Title: "Idle session timeout for Microsoft 365"
f1.keywords: - NOCSH -+ Last updated 03/03/2022 audience: Admin
admin Language Translation For Message Center Posts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/language-translation-for-message-center-posts.md
Title: "Language translation for Message center posts"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Manage Addins In The Admin Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/manage-addins-in-the-admin-center.md
Title: "Manage add-ins in the admin center"
f1.keywords: - NOCSH -+ Last updated 07/06/2020 audience: Admin
admin Manage Deployment Of Add Ins https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/manage-deployment-of-add-ins.md
Title: "Deploy add-ins in the admin center"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Manage Feedback Ms Org https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/manage-feedback-ms-org.md
Title: "Manage Microsoft feedback for your organization" f1.keywords: - NOCSH--++ Last updated 03/26/2021 audience: Admin
admin Manage Feedback Product Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/manage-feedback-product-insights.md
Title: "Microsoft product NPS feedback and insights for your organization" f1.keywords: - NOCSH--++ Last updated 03/26/2021 audience: Admin
admin Message Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/message-center.md
Title: "Message center in the Microsoft 365 admin center"
f1.keywords: - CSH -+ Last updated 02/18/2020 audience: Admin
admin Minors And Acquiring Addins From The Store https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/minors-and-acquiring-addins-from-the-store.md
Title: "Minors and acquiring add-ins from the Store"
f1.keywords: - NOCSH -+ Last updated 07/06/2020 audience: Admin
admin Pin Apps To App Launcher https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/pin-apps-to-app-launcher.md
Title: "Pin apps to your users' app launcher"
f1.keywords: - NOCSH -+ Last updated 08/28/2020 audience: Admin
admin Release Options In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/release-options-in-office-365.md
Title: "Set up the Standard or Targeted release options"
f1.keywords: - CSH -+ Last updated 02/18/2020 audience: Admin
admin Search In The Mac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/search-in-the-mac.md
Title: "Search for tasks or documentation in the Microsoft 365 admin center"
f1.keywords: - NOCSH -+ Last updated 10/29/2020 audience: Admin
admin Send Email As Distribution List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/send-email-as-distribution-list.md
Title: "Send email as a distribution list"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Set Password Expiration Policy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/set-password-expiration-policy.md
Title: "Set the password expiration policy for your organization"
f1.keywords: - CSH -+ Last updated 02/18/2020 audience: Admin
admin Share Calendars With External Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/share-calendars-with-external-users.md
Title: "Share calendars with external users"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Stay On Top Of Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/stay-on-top-of-updates.md
Title: "Stay on top of changes"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Test And Deploy Microsoft 365 Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/test-and-deploy-microsoft-365-apps.md
Title: "Test and deploy Microsoft 365 Apps by partners in the Integrated apps po
f1.keywords: - NOCSH -+ Last updated 02/25/2020 audience: Admin
admin Update Phone Number And Email Address https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/update-phone-number-and-email-address.md
Title: "Update your admin phone number and email address"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Use Qr Code Download Outlook https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/use-qr-code-download-outlook.md
Title: "Use a QR code to sign-in to the Outlook mobile apps"
f1.keywords: - NOCSH -+ Last updated 10/26/2020 audience: Admin
admin Admin Controls Profile Videos https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/admin-controls-profile-videos.md
Title: "Turn the profile video feature on or off for all users in your Microsoft 365 organization" -+ Last updated 03/13/2023 audience: Admin
admin Azure Ad Setup Guides https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/azure-ad-setup-guides.md
Title: "Azure Active Directory setup guides"--++ Last updated 12/13/2021 audience: Admin
admin Cortana Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/cortana-integration.md
Title: "Cortana in Microsoft 365"
f1.keywords: - CSH -+ Last updated 02/18/2020 audience: Admin
Beginning with Windows 10, version 2004, Cortana is a Universal Windows Platform
### Cortana voice assistance in Teams mobile and Teams display > [!NOTE]
-> Cortana voice assistance is supported in Microsoft Teams mobile apps for iOS and Android and [Microsoft Teams displays](/microsoftteams/devices/teams-displays) in the English language for users in the United States, United Kingdom, Canada, India, and Australia. Microsoft Teams Rooms on Windows is only supported for users in the United States. Cortana voice assistance isn't currently available for GCC, GCC-High, DoD, EDU tenants. Expansion to additional languages and regions will happen as part of future releases and admin customers will be notified through Message Center and the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=65346).
+> Cortana voice assistance is supported in Microsoft Teams mobile apps for iOS and Android, [Microsoft Teams displays](/microsoftteams/devices/teams-displays), and [Microsoft Teams Rooms on Windows](/microsoftteams/rooms), in the English language for users in the United States, United Kingdom, Canada, India, and Australia. Cortana voice assistance isn't currently available for GCC, GCC-High, DoD, EDU tenants. Expansion to additional languages and regions will happen as part of future releases and admin customers will be notified through Message Center and the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=65346).
Cortana voice assistance in the Teams mobile app and on Microsoft Teams display devices enables Microsoft 365 Enterprise users to streamline communication, collaboration, and meeting-related tasks using spoken natural language. Users can speak to Cortana by selecting the microphone button located in the upper right of the Teams mobile app, or by saying "Cortana" in the Microsoft Teams display. To quickly connect with their team hands-free and while on the go, users can say queries such as "call Megan" or "send a message to my next meeting". Users can also join meetings by saying "join my next meeting" and use voice assistance to share files, check their calendar, and more. These voice assistance experiences are delivered using Cortana enterprise-grade services that fully comply with Microsoft 365's privacy, security, and compliance promises as reflected in the [Online Services Terms (OST)](https://www.microsoft.com/licensing/product-licensing/products).
For services governed by the [Microsoft Services Agreement](https://go.microsoft
[Cortana voice assistance in Teams](/microsoftteams/cortana-in-teams) (article)\ [Configure Cortana in Windows 10](/windows/configuration/cortana-at-work/cortana-at-work-overview) (article)\ [What can you do with Play My Emails from Cortana?](https://support.microsoft.com/help/4558256)+
admin Deleted User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/deleted-user.md
Title: "Quick help Deleted user"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Deleted Users Checklist https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/deleted-users-checklist.md
Title: "Quick help Deleted users checklist"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Device List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/device-list.md
Title: "Device list CSV-file"
f1.keywords: - NOCSH -+ Last updated 02/18/2020 audience: Admin
admin Experience Insights Dashboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/experience-insights-dashboard.md
Title: "Microsoft 365 Experience insights dashboard" -+ Last updated 08/10/2020 audience: Admin
admin Experience Insights Help Articles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/experience-insights-help-articles.md
Title: "Experience insights help article report" -+ Last updated 08/10/2020 audience: Admin
admin Feedback Code Conduct https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/feedback-code-conduct.md
Title: "Microsoft Feedback Code of Conduct"--++ Last updated 09/16/2021 audience: Admin
admin Feedback Provide Microsoft https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/feedback-provide-microsoft.md
Title: "Learn about how to provide feedback to Microsoft" f1.keywords: - NOCSH--++ Last updated 10/25/2021 audience: Admin
admin Feedback User Control https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/feedback-user-control.md
Title: "Learn about Microsoft feedback for your organization" f1.keywords: - NOCSH--++ Last updated 08/10/2020 audience: Admin
admin Message Center Conformance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/message-center-conformance.md
Title: "Conformance metadata for Message Center posts"
f1.keywords: - CSH -+ Last updated 02/18/2020 audience: Admin
admin Password Policy Recommendations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/password-policy-recommendations.md
Title: "Password policy recommendations"
f1.keywords: - CSH -+ Last updated 02/18/2020 audience: Admin
admin User Consent https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/user-consent.md
Title: "Managing user consent to apps in Microsoft 365"
f1.keywords: - CSH -+ Last updated 02/18/2020 audience: Admin
admin Welcome Business Assist https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/welcome-business-assist.md
+
+ Title: "Welcome to Business Assist"
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+description: "Welcome to Business Assist."
Last updated : 04/27/2023+++
+# Welcome to Business Assist
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE1FOfN?autoplay=false]
admin Manage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/multi-tenant/manage.md
Title: "Manage multiple tenants"
f1.keywords: - NOCSH -+ Last updated 10/15/2020 audience: Admin
admin Multi Factor Authentication Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/multi-factor-authentication-microsoft-365.md
Title: "Multifactor authentication for Microsoft 365"
f1.keywords: - NOCSH -+ Last updated 05/21/2020 audience: Admin
admin Set Up Multi Factor Authentication https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication.md
Title: "Set up multifactor authentication for users"
f1.keywords: - NOCSH -+ Last updated 03/27/2023 audience: Admin
admin Configure Focused Inbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/configure-focused-inbox.md
Title: "Configure Focused Inbox for everyone in your organization"
f1.keywords: - NOCSH -+ Last updated 02/19/2020 audience: Admin
admin Create Distribution Lists https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/create-distribution-lists.md
Title: Create distribution groups
f1.keywords: - NOCSH -+ Last updated 02/19/2020 audience: Admin
admin Customize Sign In Page https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/customize-sign-in-page.md
Title: "Add your company branding to the Microsoft 365 sign-in page"
f1.keywords: - NOCSH -+ Last updated 02/19/2020 audience: Admin
admin Customize Your Organization Theme https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/customize-your-organization-theme.md
Title: "Customize the theme for your organization"
f1.keywords: - CSH -+ Last updated 02/19/2020 audience: Admin
admin Download Software Licenses Csp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/download-software-licenses-csp.md
- AdminSurgePortfolio - admindeeplinkMAC description: Learn how to download the software and product license keys for perpetual software bought through the Cloud Solution Provider (CSP) program. Previously updated : 01/27/2021 Last updated : 04/26/2023 # Download perpetual software and product license keys in Microsoft 365
You must be a Global admin to do the steps in this article. For more information
4. To download the key, select **Copy key to clipboard**. 5. In the right pane, select **Copy**, then close the pane. 6. Paste the key in a file in a secure location and then enter it as instructed during the software installation. The key is needed to activate the downloaded software.+
+## Download Dual Use Rights keys
+
+Dual Use Rights keys are a benefit of some specific Dynamics 365 subscription licenses.
+
+1. In the Microsoft 365 admin center, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page.
+2. Choose the Dynamics 365 Service that has a Dual Use Right key.
+3. On the subscription details page, in the **Registration Keys** section, select the version to download.
+ > [!NOTE]
+ > If the product only has one version to download, you can't select other versions.
+4. To download the installation file, select **Download Software**. To download the activation file, select **Download License Key**.
admin Priority Accounts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/priority-accounts.md
Title: "Manage and monitor priority accounts"
f1.keywords: - CSH -+ Last updated 06/10/2020 audience: Admin
admin Setup Business Standard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/setup-business-standard.md
Title: "Set up Microsoft 365 Business Standard with a new or existing domain"
f1.keywords: - NOCSH -+ Last updated 05/27/2020 audience: Admin
admin Setup Outlook https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/setup-outlook.md
Title: "Set up Outlook for email"
f1.keywords: - NOCSH -+ Last updated 11/17/2020 audience: Admin
admin Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/setup.md
Title: "Set up Microsoft 365 for business"
f1.keywords: - NOCSH -+ Last updated 02/19/2020 audience: Admin
admin Signup Apps Business https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/signup--apps-business.md
Title: "Sign up for Microsoft 365 Apps for business"
f1.keywords: - NOCSH -+ Last updated 11/18/2021 audience: Admin
admin Signup Business Basic https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/signup-business-basic.md
Title: "Sign up for Microsoft 365 Business Basic"
f1.keywords: - NOCSH -+ Last updated 03/17/2022 audience: Admin
admin Upgrade Users To Latest Office Client https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/upgrade-users-to-latest-office-client.md
Title: Upgrade your Office 2010 to Microsoft 365 - Microsoft 365 admin
f1.keywords: - NOCSH -+ Last updated 02/19/2020 audience: Admin
admin Admin Invite Business Standard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/simplified-signup/admin-invite-business-standard.md
Title: "Invite users to a Microsoft 365 business subscription"
f1.keywords: - NOCSH -+ Last updated 04/22/2021 audience: Admin
admin Migrate Data Business Standard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/simplified-signup/migrate-data-business-standard.md
Title: "Migrate data to my Microsoft 365 Business Standard subscription"
f1.keywords: - NOCSH -+ Last updated 04/22/2021 audience: Admin
admin Signup Business Standard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/simplified-signup/signup-business-standard.md
Title: "Sign up for Microsoft 365 Business Standard"
f1.keywords: - NOCSH -+ Last updated 04/22/2021 audience: Admin
admin Signup Teams Business Subscription https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/simplified-signup/signup-teams-business-subscription.md
Title: "Sign up for a Microsoft Teams business subscription"
f1.keywords: - NOCSH -+ Last updated 11/17/2021 audience: Admin
admin User Invite Business Standard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/simplified-signup/user-invite-business-standard.md
Title: "Accept an email invitation to a Microsoft 365 for business subscription
f1.keywords: - NOCSH -+ Last updated 04/22/2021 audience: Admin
admin User Invite Msa Nodomain Join https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/simplified-signup/user-invite-msa-nodomain-join.md
Title: "Accept an email invitation to a Microsoft 365 for business subscription
f1.keywords: - NOCSH -+ Last updated 08/26/2021 audience: Admin
admin Whats New In Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/whats-new-in-preview.md
Title: "What's new in the Microsoft 365 admin center?"
f1.keywords: - CSH -+ Last updated 02/18/2020 audience: Admin
commerce Manage Auto Claim Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/licenses/manage-auto-claim-policies.md
- AdminSurgePortfolio description: "Learn how to create and manage auto-claim policies that automatically assign licenses to users for certain apps." search.appverid: MET150 Previously updated : 03/24/2023 Last updated : 04/06/2021
-# Manage auto-claim policies
+# Manage Microsoft Teams auto-claim policies
An auto-claim policy lets users automatically claim a license for a product the first time that they sign into an app. As an admin, you typically assign licenses to users either manually, or by using group-based licensing. By using auto-claim policies, you manage the products for which users can automatically claim licenses. You can also control which products those licenses come from. > [!IMPORTANT]
-> Auto-claim policies are currently only available for Microsoft Teams and Power Apps. More products will be available to use in the future.
+> Auto-claim policies are currently only available for Microsoft Teams. More products will be available to use in the future.
## Before you begin
The <a href="https://go.microsoft.com/fwlink/p/?linkid=2134398" target="_blank">
When you create an auto-claim policy, you can add a backup product to it. If the primary product is out of licenses, the backup product is used to assign licenses to users. You can add up to four backup products and [change the order in which they're used](#change-the-assigning-order-for-backup-products). To learn more, see [Add or remove backup products](#add-or-remove-backup-products).
+> [!NOTE]
+> Currently, you can only create one auto-claim policy. The number of policies you can create will increase as more products are able to use this feature.
+ 1. In the admin center, go to the **Billing** \> **Licenses** page, then select the <a href="https://go.microsoft.com/fwlink/p/?linkid=2134398" target="_blank">Auto-claim policy</a> tab. 2. Select **Add a policy**. 3. On the **Name this auto-claim policy** page, enter a name for the policy, then select **Next**.
You can periodically return to the **Auto-claim policy** tab to see a list of us
[Assign licenses to users](../../admin/manage/assign-licenses-to-users.md) (article)\ [Buy or remove subscription licenses](buy-licenses.md) (article)\ [Understand subscriptions and licenses](subscriptions-and-licenses.md) (article)-
commerce Change Plans Manually https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/change-plans-manually.md
- Title: "Change Microsoft 365 for business plans manually"-- NOCSH--------- Tier1-- scotvorg-- M365-subscription-management -- Adm_O365--- commerce_subscriptions-- AdminSurgePortfolio
-description: "Change subscriptions manually by buying a new subscription and ensuring that both the subscriptions are listed and active."
- Previously updated : 03/17/2021-
-# Manually change Microsoft plans
-
-## Step 1: Decide how to change plans
-
-The best way to change all your users from one plan to another is to [use the Upgrade tab](upgrade-to-different-plan.md). Sometimes this isn't possible. Change plans manually instead:
--- If the **Upgrade** tab indicates you can't upgrade the current plan.--- If, when you select the **Upgrade** tab, the plan you want isn't listed.--- If you don't want to upgrade all your users in the same way. Some businesses need different users subscribed to different plans. Use a manual change for this.-
-To continue with a manual change, read [Step 2: Buy a new subscription](#step-2-buy-a-new-subscription) in this topic.
-
-> [!IMPORTANT]
-> If you are changing to a plan with fewer data-related services than your current plan (downgrading), you need to manually back up any data you wish to keep. For more information, see [Back up data before changing plans](move-users-different-subscription.md).
-
-## Step 2: Buy a new subscription
-
-**Already purchased?** If you already have a subscription you want to move users to, skip this step and go to [Step 3: Check your new subscription and licenses](#step-3-check-your-new-subscription-and-licenses) in this topic.
-
-OR
-
-**Purchase a new subscription and licenses:** Follow the steps in [Buy another Microsoft 365 for business subscription](../try-or-buy-microsoft-365.md) to buy a new subscription.
-
-Make sure you purchase a subscription for the same organization that the users are in now. For example, check the email addresses for the users you want to move. If their email addresses include \@contoso.com, you must purchase a new subscription for contoso.com.
-Include a license for each user that you want to move.
-
-## Step 3: Check your new subscription and licenses
-
-1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page.
-
-2. **Verify that both subscriptions are listed and active**
- The subscription that you're moving users from and the subscription that you're moving users to must be listed together. If the new subscription isn't there when you first check, try again later. Check that both subscriptions are active. [The new subscription isn't listed, or isn't active](#the-new-subscription-isnt-listed-or-isnt-active).
-
-3. **Check that you have enough licenses for each user**
- Each user needs a license that matches their subscription. So if you want to move ten users to Microsoft 365 Business Premium, you'll need
- to make sure ten licenses are available.
-
-4. **Need more licenses for the new subscription?**
- Go to the **Your products** page and [buy more licenses](../licenses/buy-licenses.md).
-
-> [What about the old licenses?](#what-about-the-old-licenses)
-
-### The new subscription isn't listed, or isn't active
--- **If you purchased two subscriptions and they are not both listed here**, they may have been purchased for different organizations
- (for different domains). Subscriptions can't cross organization boundaries.
--- **If you know you have an additional subscription**, and it's not listed here, or is not active, [call Microsoft support](../../admin/get-help-support.md).-
-### What about the old licenses?
-
-The licenses for the current subscription will be removed later; you'll only pay for the new user licenses from then on.
-
-## Step 4: Reassign licenses
-
-When you upgrade from an Office 365 plan to a Microsoft 365 plan, you must change the license assignments for all users. Licenses aren't automatically assigned when you change plans manually.
-
-### Reassign a license for one user
-
-1. In the admin center, go to the **Users** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=834822" target="_blank">Active users</a> page.
-
-2. On the **Active users** page, select the user to whom you want to assign a license.
-
-3. On the **Licenses and Apps** tab, expand **Licenses**, select the boxes for the licenses that you want to assign, then select **Save changes**.
-
-### Reassign licenses for multiple users at once
-
-1. In the admin center, go to the **Users** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=834822" target="_blank">Active users</a>
- page.
-
-2. Select the circles next to the names of the users for whom you want to replace existing licenses.
-
-3. At the top, select the three dots (more actions), and then choose **Manage product licenses**.
-
-4. Select **Replace existing product license assignments** \> **Next**.
-
-5. Switch the toggle to the **On** position for the products you want to assign to these users.
-
- > [!TIP]
- > - To limit which services are available to the user, switch to toggles to the **Off** position for the services that you want to remove for that user. For example, if you want the user to have access to all available services except Skype for Business Online, you can switch the toggle for the Skype for Business Online service to the **Off** position.
- > - Any previous license assignments for the selected users will be removed.
-
-6. At the bottom of the **Replace existing products** pane, select **Replace** \> **Close**.
-
-## Step 5: Cancel subscriptions or remove licenses that you no longer need (Optional)
-
-If you moved all users from one subscription to another, and you no longer need the original subscription, you can [cancel the subscription](cancel-your-subscription.md).
-
-If you moved only some users to a different subscription, [remove licenses](../licenses/buy-licenses.md) that you no longer need.
-
-## Call support to help you change plans
-
-[Call Microsoft support](../../admin/get-help-support.md).
commerce Move Users Different Subscription https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/move-users-different-subscription.md
You must be a Global, License, or User admin to assign licenses. For more inform
5. At the bottom, select **Save Changes** \> **Close**.
-## Back up data before switching Microsoft 365 for business plans
+## Back up data before changing Microsoft 365 for business plans
-If a user will be switched to another subscription that has fewer data-related services or a user leaves the organization, you can download a copy of their data stored in Microsoft 365 before they are switched to the new subscription.
+If you plant to move a user to another subscription that has fewer data-related services, or a user leaves the organization, you can download a copy of their data stored in Microsoft 365 before they are switched to the new subscription.
If you're moving a user to a subscription that has the same or more services, you don't need to back up user data.
If you're not going to [reassign the unused licenses to other users](../../manag
[Assign licenses to users](../../admin/manage/assign-licenses-to-users.md) (article)\ [Remove licenses from your subscription](../licenses/buy-licenses.md) (article)\
-[Change plans manually](change-plans-manually.md) (article)\
+[Change plans manually](upgrade-to-different-plan.md#change-plans-manually) (article)\
[Understand subscriptions and licenses in Microsoft 365 for business](../licenses/subscriptions-and-licenses.md) (article)\ [Buy another Microsoft 365 for business subscription](../try-or-buy-microsoft-365.md) (article)
commerce Upgrade To Different Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/upgrade-to-different-plan.md
Title: "Upgrade to a different business plan"
+ Title: "Upgrade or change to a different Microsoft 365 for business plan"
f1.keywords:-- NOCSH
+- CSH
- AdminSurgePortfolio - AdminTemplateSet search.appverid: MET150
-description: "The easiest way to upgrade plans is to use the Upgrade tab in the admin center. However, the Upgrade tab isn't always supported."
Previously updated : 04/21/2021
+description: "Learned how to upgrade or change to a different plan in the Microsoft 365 admin center."
Last updated : 04/27/2023
-# Upgrade to a different Microsoft plan
+# Upgrade or change to a different Microsoft 365 for business plan
-When your business changes, or you need more features, you can upgrade plans. The easiest way to do this is to use the **Upgrade** tab in the admin center. However, using the **Upgrade** tab isn't supported in all situations. In some cases, you might be able to change plans manually.
+When your business needs change, or you want more features, you can change to a different Microsoft 365 for business plan. Most of the time, you can change plans automatically. An automatic change walks you through the entire process from beginning to end. After you buy a new plan, all users are automatically assigned licenses in the new plan, and your old plan is canceled for you. In some cases, you can't automatically change to a new plan, and instead must [change plans manually](#change-plans-manually).
-## Use the Upgrade tab
+## Before you begin
-When you use the **Upgrade** tab, you're led through the process of buying a new plan. All users are automatically assigned licenses in the new plan, and your old plan is canceled for you.
+- You must be a Global or Billing admin to do the steps in this article. For more information, see [About admin roles in the Microsoft 365 admin center](../../admin/add-users/about-admin-roles.md)
+- If you have a billing profile, you must be a billing account owner or billing account contributor. [Find out if you have a billing profile](../billing-and-payments/manage-billing-profiles.md#view-my-billing-profiles). For more information about billing account roles, see [Understand access to billing accounts](../manage-billing-accounts.md#understand-access-to-billing-accounts).
-1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page.
-2. Select the subscription that you want to upgrade.
-3. On the subscription details page, under **Product details and upgrades**, select **View upgrades recommended for your org**.
-4. Find the plan to which you want to upgrade, then select the **Upgrade** button.
-5. Enter the number of licenses that you need, choose whether to pay each month or for the whole year, then select **Go to checkout**.
- > [!NOTE]
- > Make sure you buy enough licenses to cover all your users.
-6. On the next page, verify the **Sold to** address, the **Billed to** information, and **Items in this order**. You can change the default payment method at this step. If you need to make any changes, select **Change** next to the applicable section.
-7. When you're finished, select **Place order**.
-
-When you finish checkout, it might take a few minutes to finalize the upgrade. You can start using your new subscription right away. Select **Check upgrade status** to check the progress of the upgrade. You'll be notified when the upgrade is complete. The notification is displayed on the **Your products** page, next to your new subscription.
-
-## The Upgrade tab is empty
+## When should I change plans?
-If the **Upgrade** tab is empty, you'll see an explanation of why you can't upgrade at this time. You can try to [change plans manually](change-plans-manually.md). For more information, see [Why can't I upgrade plans?](#why-cant-i-upgrade-plans).
+Changing plans is the right choice when you want to move all users assigned to a single plan. When you change plans, all users in the current plan are assigned licenses for the new plan at the same time. If you only want to move some users to a new plan, buy a new plan with the number of licenses you need, and assign those licenses to the users that you want to move. For more information, see [Move users to a different subscription](move-users-different-subscription.md).
-## I don't see the plan I want
+## Automatically change your subscription to a new plan
-When you use the **Upgrade** tab, the plans that you can upgrade to are displayed based on the services in your current plan. You can only use the **Upgrade** tab to move to a plan that has the same data-related services, or to a higher version. This ensures that users don't lose data related to those services during the change.
+> [!IMPORTANT]
+> Before you continue, [determine if you have a billing profile](../billing-and-payments/manage-billing-profiles.md#view-my-billing-profiles).
-If you want to move to a plan with fewer services, you can [change plans manually](change-plans-manually.md), or [call support](../../admin/get-help-support.md) for help.
+### If you don't have a billing profile
-## I only want to upgrade some of my users. How do I do that?
+1. In the Microsoft 365 admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page.
-If you only want to upgrade some users to a different plan, but need to buy the new subscription first, see [Change plans manually](change-plans-manually.md). If you already have the subscription that you want to upgrade users to, see [Move users to a different subscription](move-users-different-subscription.md).
+1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=850626" target="_blank">Your products</a> page.
-## Why some changes take longer
-
-**Number of assigned users:** If you have a large number of assigned users, it will take longer to do the upgrade to move them to the new plan.
-
-**Credit checks when changing plans:** If you pay by invoice, or reach a certain level of cost, a credit check might be required. A credit check can take up to two business days. Users will have full access to their current plan until you move them to the new one. You'll receive a notification if a credit check is required.
+2. On the **Products** tab, select the subscription that you want to change.
+3. On the subscription details page, in the **Product details and upgrades** section, select **View upgrades recommended for your org**.
+ > [!NOTE]
+ > If the View upgrades recommended for your org link is grayed out, see [Why can't I change plans?](#why-cant-i-change-plans)
+4. On the **Available upgrades** page, find a new product, then select **Upgrade**.
+5. On the **Checkout** page, select or add a payment method, then select **Place order**.
-## Why can't I upgrade plans?
+After you place the order, it might take a few minutes to finalize the change. You can start using your new subscription right away.
-If you don't see any plans on the **Upgrade** tab, it means your plan can't be upgraded automatically. In some cases, you might be able to resolve the issue so that you can view plans available for upgrade, or you might be able to upgrade or change plans manually, instead.
+### If you have a billing profile
-### Why are there no plans listed to upgrade?
+1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page.
-#### You can't upgrade subscriptions now because you have more users than licenses
+1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=850626" target="_blank">Your products</a> page.
-To upgrade plans automatically, all of your users need to be assigned valid licenses. If you have assigned more licenses than you have purchased, you'll see an alert on the <a href="https://go.microsoft.com/fwlink/p/?linkid=842264" target="_blank">Licenses</a> page that says you have a licensing conflict that needs to be resolved. [Learn how to resolve license conflicts](../../commerce/licenses/buy-licenses.md). After you have resolved any licensing conflicts, you should see plans listed on the **Upgrade** tab. If not, you can [change plans manually](change-plans-manually.md), or [call support](../../admin/get-help-support.md).
+2. On the **Products** tab, select the subscription that you want to change.
+3. On the subscription details page, in the **Other subscription options** section, select **Change to a different subscription option**.
+4. In the right pane, select a different plan. Indicate the number of licenses you want, choose when to schedule the change, select a subscription length, and select a billing frequency.
+5. **Select Change plan**.
-#### You can't upgrade subscriptions right now because this subscription isn't fully set up or the service isn't available
+## Why can't I change plans?
-For example, if one of the services has an incident, you won't be able to upgrade until all services are healthy. To see if there are provisioning or service health issues, in the admin center, go to the **Health** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=842900" target="_blank">Service health</a> page.
+If you can't select the **View upgrades recommended for your org** link, it means that you can't automatically change your plan right now. In some cases, you can resolve the issue so that you can view available plans. In other cases, you can [change plans manually](#change-plans-manually), instead. The following table lists issues you might encounter when you try to change your plan, and information about how to resolve them.
-If you find that a service is not fully provisioned, or you have a service health issue, please wait a few hours for your service to become available, and try again. If you still have a problem, please [call support](../../admin/get-help-support.md).
+|Issue |Resolution |
+|||
+|You have more users than licenses. |To change plans automatically, all users must have valid licenses. [Unassign licenses from users](../../admin/manage/remove-licenses-from-users.md) until you have the same or fewer users as your number of licenses. |
+|The current subscription isn't fully set up or the service isn't available. |For example, if a service in your existing plan has an incident, you can't change plans until all services are healthy. To see if there are provisioning or service health issues, in the admin center, go to the **Health** > <a href="https://go.microsoft.com/fwlink/p/?linkid=842900" target="_blank">Service health</a> page. </br></br>If you find that a service isn't fully provisioned, or there's a service health issue, wait a few hours for the service to become available and try again. If you still have a problem, [contact support](../../admin/get-help-support.md). |
+|Another plan is in the process of being changed or a credit check is pending. |Wait until the credit check is complete before you change plans. Credit checks can take up to two working days. |
+|The subscription isn't currently eligible to change plans. |You can [change plans manually](#change-plans-manually). |
+|You have two or more plans for the same product. |You can only change plans automatically if all users have licenses to the same plan. For example, if you have two Microsoft 365 Business Standard plans, you can't automatically change one of them to a different plan. In this case, move all users into a single plan, cancel the unused plan, then try changing plans again. |
+|You have a government or non-profit plan. |If you have a government or non-profit plan, you can [change plans manually](#change-plans-manually). |
+|The plan that you want to change to isn't a supported option. |The plans that are available to change to are displayed based on the services in your current plan. You can only automatically change to a plan that has the same data-related services, or to a higher version. This ensures that users don't lose data related to those services during the change.</br></br>If you want to change to a plan with fewer services, you can [change plans manually](#change-plans-manually). |
+|Your subscription has an add-on. |If you start to change plans and your subscription has an add-on that prevents you from continuing, remove the add-on. You can add it back later if you still need it. You can also [change plans manually](#change-plans-manually). |
+|Your invoice has an unpaid balance. |This only applies if you pay for your subscription by invoice. To resolve this issue, find the subscription on the **Your products** page, and select the **Pay now** or **Settle balance** link in the **Billing** section. After the payment has been made, try changing plans again. |
+|I have a different problem than what's listed here. |You can [change plans manually](#change-plans-manually) or [contact support](../../admin/get-help-support.md). |
-#### You can't upgrade plans because another plan is in the process of being upgraded or is pending a credit check
+## What does automatically changing plans do to my service and billing?
-Wait until the credit check has been completed before upgrading plans. Credit checks can take up to two working days.
+When you change plans automatically, your services and billing are affected in the following ways.
-#### Currently, this subscription is not eligible to upgrade
+### Access to services
-You can [change plans manually](change-plans-manually.md) or [call support](../../admin/get-help-support.md).
+- **Admins:** Admins can't make changes to the subscription details page while the change is in process, but you can use the rest of the admin center. The change between plans can take up to an hour.
+- **Users:** Users experience no interruption of service during the plan change. They continue to have the existing service until the change is finished.
-#### I see a different message than what's listed here
+### Users and licenses
-You can [change plans manually](change-plans-manually.md) or [call support](../../admin/get-help-support.md).
+- **Users:** Users on the old subscription are automatically moved to the new subscription.
+- **
+- **License assignments:** If you have more than one subscription before you change plans, and users have licenses to more than one subscription, this assignment pattern is kept as much as possible in the new subscription.
+- **Data:** All user data is retained during the change, including Exchange mailboxes and SharePoint Online documents, lists, and other information.
-### Additional reasons you can't upgrade
+### Billing
-#### You have two or more plans for the same product
+The day your plan change is complete, the billing on your old subscription is turned off and the billing on your new subscription is turned on. Depending on the new plan you selected, you might receive a prorated credit. You receive a new invoice that includes the credit for your old subscription within 30 days of changing to the new subscription.
-You can only use the **Upgrade** tab if all users subscribe to the same plan. For example, if you have two Microsoft 365 Business Standard plans, you won't be able to automatically upgrade one of them to another plan.
+> [!NOTE]
+> The length of time it takes to receive your prorated credit depends on the payment method used for the old subscription.
-#### You have a prepaid plan
+## Change plans manually
-If you've paid for your subscription in advance, you might be able to [change plans manually](change-plans-manually.md). However, you won't receive a credit for unused time remaining on your current subscription if you upgrade plans before the current plan expires.
+Most of the time, you can change plans automatically. However, sometimes this isn't possible. You can change plans manually if:
-You can also [call support](../../admin/get-help-support.md) for help.
+- You can't select the **View upgrades recommended for your org** link.
+- When you select the **View upgrades recommended for your org** link, the plan you want isn't listed.
+- You don't want to move all your users to the same plan. Some businesses need different users licensed for different plans.
-#### You have a government or non-profit plan
+> [!IMPORTANT]
+> If you're changing to a plan with fewer data-related services than your current plan, you must manually back up any data that you want to keep. For more information, see [Back up data before changing Microsoft 365 for business plans](move-users-different-subscription.md#back-up-data-before-changing-microsoft-365-for-business-plans).
-If you have a government or non-profit plan, you can [change plans manually](change-plans-manually.md) or [call support](../../admin/get-help-support.md) for help.
+### Step 1: Buy a new subscription
-#### The subscription that you want to upgrade from has a temporary issue
+**Already bought a new subscription?** If you already have the subscription that you want to move users to, skip this step and go to [Step 2: Check your new subscription and licenses](#step-2-check-your-new-subscription-and-licenses).
-You might not see any plans on the **Upgrade** tab because the service is in the process of upgrading a high volume of plans. Try again in about an hour after your first attempt.
+**Need to buy a new subscription and licenses?** Follow the steps in [Buy a different subscription](../try-or-buy-microsoft-365.md#buy-a-different-subscription).
-#### The plan that you want to upgrade to isn't a supported option
+Make sure that you buy a subscription for the same organization that the users are in now. For example, check the email addresses for the users that you want to move. If their email addresses include @contoso.com, you must buy a new subscription for contoso.com. Buy a license for each user that you want to move.
-When you upgrade plans, the plans that are available for you to upgrade to are displayed based on the services in your current plan. You can only upgrade to a plan that has the same data-related services, such as Exchange Online or SharePoint Online, or to a higher version of them. This ensures that users don\'t lose data related to those services during the upgrade.
+### Step 2: Check your new subscription and licenses
-If your plan isn't eligible to upgrade plans automatically, you might be able to [change plans manually](change-plans-manually.md) instead. You can also [call support](../../admin/get-help-support.md) for help.
+In the admin center, go to the **Billing** > **Your products** page, then do the following:
-#### Your subscription has an add-on
+- **Verify that both the old and new subscriptions are listed and active.** The subscription that you're moving users from and the subscription that you're moving users to must be listed together. If the new subscription isn't there when you first check, try again later. Verify that both subscriptions are listed as **Active**.
+- **Check that you have enough licenses for each user.** Each user needs a license that matches their subscription. If you want to move 10 users to Microsoft 365 Business Premium, make sure 10 unassigned licenses are available in that subscription.
+- **Need more licenses for the new subscription?** Go to the **Your products** page, select the subscription, and [buy more licenses](../licenses/buy-licenses.md).
-If you have an Add-on with your subscription, you might be able to [change plans manually](change-plans-manually.md).
+#### The new subscription isn't listed, or isn't active
-#### Your subscription has an unpaid balance
+If you bought two subscriptions and they aren't both listed on the **Your products** page, they may have been bought for different organizations (for different domains). Subscriptions can't cross organization boundaries.
-To resolve this, find the subscription on the <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page, and select the **Pay now** link in the **Billing** section. After the payment has been made, check the **Upgrade** tab again.
+If you know you have another subscription, and it's not listed here, or isn't active, [contact support](../../admin/get-help-support.md).
-## What does upgrading a plan do to my service and billing?
+#### What about old licenses?
-When you upgrade plans automatically by using the **Switch plans** button (or the **Upgrade** tab in the new admin center), your services and billing are affected.
+The licenses for the current subscription are removed in [Step 4: Cancel subscriptions or remove licenses that you no longer need (Optional)](#step-4-cancel-subscriptions-or-remove-licenses-that-you-no-longer-need-optional). After that, you only pay for the new licenses.
-### Access to services
+### Step 3: Move users to the new subscription
-**Admins** won't be able to use the admin center while the plan is being upgraded. This can take up to an hour.
-
-**Users** will experience no interruption of service. They will continue to have the existing service until the upgrade is fully completed.
-
-### Users and licenses
+After you confirm the number of licenses in your new subscription, you can [move users from the old subscription to the new one](move-users-different-subscription.md).
-Users on the old subscription will automatically be moved to the new subscription.
+### Step 4: Cancel subscriptions or remove licenses that you no longer need (Optional)
-If your old subscription includes multiple services, and if you have changed which of these services your users are assigned to, you may want to make note of this before you upgrade plans so that you can recreate these changes afterwards. All users will be given access to all services in the new subscription. For example, if you previously purchased Microsoft 365 Business Premium for all 100 of your users, but unassigned the SharePoint Online service from 50 of them, this change would not be kept after you upgrade plans.
+If you moved all users from one subscription to another, and you don't need the original subscription anymore, just [cancel the subscription](cancel-your-subscription.md).
-If you have more than one subscription before you upgrade plans, and have users assigned licenses to more than one subscription, this assignment pattern will be kept as much as possible in the new subscription.
-All user data will be retained during the upgrade, including Exchange mailboxes and SharePoint Online documents, lists, and other information.
-
-### Billing
+If you moved only some users to a different subscription, [remove licenses that you no longer need](../licenses/buy-licenses.md#buy-or-remove-licenses-for-your-business-subscription).
-The day your plan upgrade is complete, the billing on your old subscription will be turned off and the billing on your new subscription will be turned on. You'll get a prorated credit for any unused service on the old subscription. You'll receive a new invoice that includes the credit for your old subscription within 30 days of upgrading to the new subscription.
-
-> [!NOTE]
-> The length of time it takes to actually credit your payment account depends on the payment method that was used for the subscription.
-
-**Upgrading from a prepaid subscription before it expires?** If the total cost of your new subscription is greater than or equal to the remaining value of your prepaid subscription, you won't lose any prepaid time. On the checkout page, you'll see a credit for your unused time. However, if the total cost of your new subscription is less than the remaining value of your current prepaid subscription, you'll forfeit some of your unused time. You'll be notified before you checkout, and you can wait to upgrade until closer to your prepaid subscription's expiration date.
+## Next steps
-## Call support to help you upgrade plans
+If you upgraded to Microsoft 365 Business Premium, use the steps in the Business Premium library to set up your new security capabilities.
-[Call Microsoft support](../../admin/get-help-support.md).
+>[!div class="nextstepaction"]
+>[Visit the Microsoft 365 Business Premium library](/microsoft-365/business-premium/index)
## Related content
-[Change plans manually](change-plans-manually.md) (article)\
-[Back up data before switching Microsoft 365 for business plans](move-users-different-subscription.md) (article)
+[Move users to a different subscription](move-users-different-subscription.md) (article)\
+[Try or buy a Microsoft 365 for business subscription](../try-or-buy-microsoft-365.md) (article)
compliance Apply Retention Labels Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-retention-labels-automatically.md
f1.keywords:
Previously updated : 04/24/2023 Last updated : 04/26/2023 audience: Admin
To consider when using trainable classifiers to auto-apply retention labels:
> [!NOTE] > This option is in preview and subject to change.
-You might need to use this option if you're required to capture and retain all copies of files in your tenant that are sent over communications by users. You use this option in conjunction with retention policies for the communication services themselves, Exchange and Teams.
+You might need to use this option if you're required to capture and retain all copies of files in your tenant that are sent over communications by users. You use this option in conjunction with retention policies for the communication services themselves; Exchange, Teams, and Yammer.
> [!IMPORTANT] > When you select a label to use for auto-applying retention labels for cloud attachments, ensure that the label retention setting **Start the retention period based on** is **When items were labeled**.
-Cloud attachments, sometimes also known as modern attachments, are a sharing mechanism that uses embedded links to files that are stored in the cloud. They support centralized storage for shared content with collaborative benefits, such as version control. Cloud attachments are not attached copies of a file or a URL text link to a file. However, support for URL text links are also now gradually rolling out. You might find it helpful to refer to the visual checklists for supported cloud attachments in [Outlook](/office365/troubleshoot/retention/cannot-retain-cloud-attachments#cloud-attachments-in-outlook) and [Teams](/office365/troubleshoot/retention/cannot-retain-cloud-attachments#cloud-attachments-in-teams).
+Cloud attachments, sometimes also known as modern attachments, are a sharing mechanism that uses embedded links to files that are stored in the cloud. They support centralized storage for shared content with collaborative benefits, such as version control. Cloud attachments are not attached copies of a file or a URL text link to a file. However, support for URL text links are also now gradually rolling out. You might find it helpful to refer to the visual checklists for supported cloud attachments in [Outlook](/microsoft-365/troubleshoot/retention/cannot-retain-cloud-attachments#cloud-attachments-in-outlook), [Teams](/microsoft-365/troubleshoot/retention/cannot-retain-cloud-attachments#cloud-attachments-in-teams), and [Yammer](/microsoft-365/troubleshoot/retention/cannot-retain-cloud-attachments#cloud-attachments-in-yammer).
When you choose the option to apply a retention label to cloud attachments, for compliance purposes, a copy of that file is created at the time of sharing. Your selected retention label is then applied to the copy that can then be [identified using eDiscovery](ediscovery-cloud-attachments.md). Users aren't aware of the copy that is stored in the Preservation Hold library. The retention label isn't applied to the message itself, or to the original file. If the file is modified and shared again, a new copy of the file as a new version is saved in the Preservation Hold library. For more information, including why you should use the **When items were labeled** label setting, see [How retention works with cloud attachments](retention-policies-sharepoint.md#how-retention-works-with-cloud-attachments).
-The cloud attachments supported for this option are files such as documents, videos, and images that are stored in SharePoint and OneDrive. For Teams, cloud attachments shared in chat messages, and standard and private channels are supported. Cloud attachments shared over meeting invites and apps other than Teams or Outlook aren't supported. The cloud attachments must be shared by users; cloud attachments sent via bots aren't supported.
+The cloud attachments supported for this option are files such as documents, videos, and images that are stored in SharePoint and OneDrive. For Teams, cloud attachments shared in chat messages, and standard and private channels are supported. For Yammer, cloud attachments shared with users in storylines, community posts, and Inbox messages are supported.
+
+Cloud attachments shared over meeting invites and apps other than Teams, Outlook, or Yammer aren't supported. The cloud attachments must be shared by users; cloud attachments sent via bots aren't supported.
Although not required for this option, we recommend that you ensure versioning is enabled for your SharePoint sites and OneDrive accounts so that the version shared can be accurately captured. If versioning isn't enabled, the last available version will be retained. Documents in draft or that have never been published aren't supported.
When you configure the locations for this option, you can select:
- **Microsoft 365 Groups** for shared files that are stored in team sites connected by Microsoft 365 groups. - **OneDrive accounts** for shared files stored in users' OneDrive.
-You will need to create separate retention policies if you want to retain or delete the original files, email messages, or Teams messages.
+You will need to create separate retention policies if you want to retain or delete the original files, email messages, or messages from Teams and Yammer.
> [!NOTE]
-> If you want retained cloud attachments to expire at the same time as the messages that contained them, configure the retention label to have the same retain and then delete actions and timings as your retention policies for Exchange and Teams.
+> If you want retained cloud attachments to expire at the same time as the messages that contained them, configure the retention label to have the same retain and then delete actions and timings as your retention policies for Exchange, Teams, and Yammer.
To consider when auto-applying retention labels to cloud attachments: -- If cloud attachments and links in a Teams message are changed after the message is sent by editing the message, those changed cloud attachments and links aren't supported for retention.
+- Yammer must be in [native mode](/yammer/configure-your-yammer-network/overview-native-mode) to support cloud attachments.
+
+- If cloud attachments and links in a Teams or Yammer message are changed after the message is sent by editing the message, those changed cloud attachments and links aren't supported for retention.
- When a user is added to a Teams conversation and given access to the full history of the conversation, that history can include cloud attachments and URL text links. If these attachments were shared within 48 hours of the user added to the conversation, current copies of the attachments are auto-labeled for retention. Attachments shared before this time period aren't supported for newly added users. -- Attachments and links shared outside Teams and Outlook aren't supported, and the attachments and links must be content stored in SharePoint or OneDrive.
+- Attachments and links shared outside Teams, Outlook, and Yammer aren't supported, and the attachments and links must be content stored in SharePoint or OneDrive.
+
+- Cloud attachments and links in encrypted emails or encrypted messages aren't supported.
-- Cloud attachments and links in encrypted emails or encrypted messages aren't supported.
+- Sharing an existing Yammer message with an attachment isn't supported.
- Specific to shared documents from URL text links: - Supported in the message body but not in the email subject or Teams channel subject, announcement, or subheadings.
- - Not supported for files that are uploaded to Yammer and from there, shared as URLs via email or Teams messages (typically have "https://web.yammer.com" at the beginning of the URL)
- Not supported for previous responses in the same thread, only the current message - Total limit of 25 attachments in a single message, where this maximum can be any combination of cloud attachments and shared documents from URL text links
- - Not supported beyond 5,000 characters in the initial email body or Teams message
+ - Not supported beyond 5,000 characters in the initial email body or in Teams and Yammer messages
- The following items aren't supported as attachments that can be retained: - SharePoint sites, pages, lists, forms, folders, document sets, and OneNote pages.
compliance Device Onboarding Offboarding Macos Intune Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-offboarding-macos-intune-mde.md
full disk access |[fulldisk.mobileconfig](https://github.com/microsoft/mdatp
``` Here's an [example mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/settings/data_loss_prevention/com.microsoft.wdav.mobileconfig)
+ 2. For *upload to cloud service* activity, if you only want to monitor browser and URL on the browser address bar, you can enable *DLP_browser_only_cloud_egress* and *DLP_ax_only_cloud_egress*, here is an example [com.microsoft.wdav.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/settings/data_loss_prevention/cloud_egress/com.microsoft.wdav.mobileconfig).
## Offboard macOS devices using Intune
compliance Device Onboarding Offboarding Macos Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-offboarding-macos-intune.md
Onboarding a macOS device into Compliance solutions is a multi-phase process.
|file needed for |source | ||| System mobile config file | [mdatp-nokext.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/combined/mdatp-nokext.mobileconfig) Copy and paste the contents into a text file. Save the file with the **mobileconfig** extension only, it will not be recognized if it has the .txt extension.|
-MDE preferences| [com.microsoft.wdav.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/settings/data_loss_prevention/com.microsoft.wdav.mobileconfig). Copy and paste the contents into a text file. Save the file with the **mobileconfig** extension only, it will not be recognized if it has the .txt extension.
+MDE preferences| [com.microsoft.wdav.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/settings/data_loss_prevention/com.microsoft.wdav.mobileconfig). Copy and paste the contents into a text file. Save the file with the **mobileconfig** extension only, it will not be recognized if it has the .txt extension. For *upload to cloud service* activity, if you only want to monitor browser and URL on the browser address bar, you can enable *DLP_browser_only_cloud_egress* and *DLP_ax_only_cloud_egress*, here is an example [com.microsoft.wdav.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/settings/data_loss_prevention/cloud_egress/com.microsoft.wdav.mobileconfig).
### Get the device onboarding package
compliance Device Onboarding Offboarding Macos Jamfpro https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-offboarding-macos-jamfpro.md
Onboarding a macOS device into Compliance solutions is a multiphase process.
- Features - Use System Extensions: `enabled` - required for network extensions on Catalina - Use Data Loss Prevention: `enabled`
+ - Use DLP_browser_only_cloud_egress: `enabled`if you want to only monitor browser
+ - Use DLP_ax_only_cloud_egress: `enabled`if you want to only monitor URL on the browser address bar
- Antivirus engine > Passive mode: `true|false`. Use `true`if deploying DLP only. Use `false` or do not assign a value if deploying DLP and Microsoft Defender for Endpoint (MDE). 1. Choose the **Scope** tab.
Onboarding a macOS device into Compliance solutions is a multiphase process.
1. Choose **Save**. ++ ### Create and deploy a configuration profile for Microsoft AutoUpdate (MAU) 1. Create a JAMF Pro configuration file using the **com.microsoft.autoupdate2.plist**. Refer to the [JAMF Pro administrators guide](https://www.jamf.com/resources/product-documentation/jamf-pro-administrators-guide/). Use these values:
compliance Device Onboarding Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-overview.md
Make sure that the Windows devices that you need to onboard meet these requireme
- [Hybrid Azure AD joined](/azure/active-directory/devices/concept-azure-ad-join-hybrid) - [AAD registered](/azure/active-directory/user-help/user-help-register-device-on-network)
-1. A supported version of Microsoft Office is installed and up to date. For the most robust protection and user experience, ensure Microsoft 365 Apps version 16.0.14701.0 or newer is installed.
+5. A supported version of Microsoft 365 Apps is installed and up to date. For the most robust protection and user experience, ensure Microsoft 365 Apps version 16.0.14701.0 or later is installed.
+ > [!NOTE] > - If you are running Office 365 - KB 4577063 is required. > - If you are on Monthly Enterprise Channel of Microsoft 365 Apps versions 2004-2008, you need to update to version 2009 or later. See [Update history for Microsoft 365 Apps (listed by date)](/officeupdates/update-history-microsoft365-apps-by-date) for current versions. To learn more about known issue, see the Office Suite section of [Release notes for Current Channel releases in 2020](/officeupdates/current-channel#version-2010-october-27).
compliance Dlp Configure Endpoint Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-configure-endpoint-settings.md
Before you get started, you should set up your DLP settings.
|Additional settings for Endpoint DLP |Supported |Supported |Only the default business justifications are supported for macOS devices | |Always audit file activity for devices |Supported |Supported | | |Printer groups| Supported |Not Supported| |
-|Removabled USB device groups| Supported | Not Supported | |
-|Auto-quarantine file from unallowed apps | Supported | Supported (preview)| |
+|Removable USB device groups| Supported | Not Supported | |
+|Autoquarantine file from unallowed apps | Supported | Supported (preview)| |
|Network share groups | Supported | Not Supported | | |VPN settings | Supported | Not Supported | | |Business justification in policy tips | Supported | Supported (preview)| |
Before you get started, you should set up your DLP settings.
Advanced classification scanning and protection allows the more advanced Microsoft Purview cloud based data classification service to scan items, classify them and return the results to the local machine. This means you can take advantage of classification techniques like [exact data match](create-custom-sensitive-information-types-with-exact-data-match-based-classification.md) classification, and [named entities](named-entities-learn.md) in your DLP policies.
-When advanced classification is turned on, content is sent from the local device to the cloud services for scanning and classification. If bandwidth utilization is a concern, you can set a limit on how much can be used in a rolling 24 hour period. The limit is configured in Endpoint DLP settings and is applied per device. If you set a bandwidth utilization limit and it's exceeded, DLP stops sending the user content to the cloud. At this point data classification continues locally on the device but classification using exact data match, named entities, and trainable classifiers aren't available. When the cumulative bandwidth utilization drops below the rolling 24 hour limit, communication with the cloud services will resume.
+When advanced classification is turned on, content is sent from the local device to the cloud services for scanning and classification. If bandwidth utilization is a concern, you can set a limit on how much can be used in a rolling 24 hour period. The limit is configured in Endpoint DLP settings and is applied per device. If you set a bandwidth utilization limit and it's exceeded, DLP stops sending the user content to the cloud. At this point data classification continues locally on the device but classification using exact data match, named entities, and trainable classifiers aren't available. When the cumulative bandwidth utilization drops below the rolling 24 hour limit, communication with the cloud services resumes.
If bandwidth utilization isn't a concern, you select **No limit** to allow unlimited bandwidth utilization.
For performance reasons, Endpoint DLP includes a list of recommended file path e
- /opt/* - /Users/*/Library/Application Support/Microsoft/Teams/*
+### Set up evidence collection for file activities on devices (preview)
+
+DLP can copy items that match policies on devices to an [Azure storage account](/azure/storage/common/storage-account-overview.md). This is useful for auditing policy activity and troubleshooting why a specific item matched a policy. Use this section to add name and url of storage account. Before you enable this feature, you must create an Azure storage account and a container in the storage account and configuring permissions. As you configure this, keep in mind that you'll probably want to use a storage account that's in the same Azure region/geopolitical boundary as your tenant. You should also consider configuring [Azure storage account access tiers](/azure/storage/blobs/storage-blob-storage-tiers.md) and [Azure storage account pricing](/azure/storage/common/storage-account-overview#pricing.md).
+
+- For more information on this feature, see [Learn about collecting files that match data loss prevention policies from devices](dlp-copy-matched-items-learn.md)
+- For more information on how to configure this feature, see [Get started with collecting files that match data loss prevention policies from devices](dlp-copy-matched-items-get-started.md)
+ ### Network share coverage and exclusions (preview) > [!IMPORTANT]
To find the full path of Mac apps:
To prevent sensitive items from being synced to the cloud by cloud sync apps, like *onedrive.exe*, add the cloud sync app to the **Unallowed apps** list. When an unallowed cloud-sync app tries to access an item that is protected by a blocking DLP policy, DLP may generate repeated notifications. You can avoid these repeated notifications by enabling the **Auto-quarantine** option under **Unallowed apps**.
-##### Auto-quarantine
+##### Autoquarantine
-When enabled, Auto-quarantine kicks in when an unallowed app attempts to access a DLP protected sensitive item. Auto-quarantine moves the sensitive item to an admin configured folder and can leave a placeholder **.txt** file in the place of the original. You can configure the text in the placeholder file to tell users where the item was moved to and other pertinent information.
+When enabled, Autoquarantine kicks in when an unallowed app attempts to access a DLP protected sensitive item. Autoquarantine moves the sensitive item to an admin configured folder and can leave a placeholder **.txt** file in the place of the original. You can configure the text in the placeholder file to tell users where the item was moved to and other pertinent information.
-You can use auto-quarantine to prevent an endless chain of DLP notifications for the user and adminsΓÇösee [Scenario 4: Avoid looping DLP notifications from cloud synchronization apps with auto-quarantine](endpoint-dlp-using.md#scenario-4-avoid-looping-dlp-notifications-from-cloud-synchronization-apps-with-auto-quarantine).
+You can use autoquarantine to prevent an endless chain of DLP notifications for the user and adminsΓÇösee [Scenario 4: Avoid looping DLP notifications from cloud synchronization apps with autoquarantine](endpoint-dlp-using.md#scenario-4-avoid-looping-dlp-notifications-from-cloud-synchronization-apps-with-auto-quarantine).
### Unallowed Bluetooth apps
User attempts to:
but if a user attempts to: -- Upload a sensitive file with credit card numbers to wingtiptoys.com (which is not on the list).
+- Upload a sensitive file with credit card numbers to wingtiptoys.com (which isn't on the list).
- The policy is applied and the user activity is blocked. An event is generated, and an alert is generated. ##### Block
-When the **Service domains** list is set to **Block**, DLP policies will be applied when a user attempts to upload a sensitive file to any of the domains on the list.
+When the **Service domains** list is set to **Block**, DLP policies are applied when a user attempts to upload a sensitive file to any of the domains on the list.
-If the list mode is set to **Block**, when a user attempts an activity involving a sensitive item and a domain that is on the list then DLP policies, and the actions defined in the polices, are applied. Any activity involving a sensitive item and a domain that is not on the list will be audited and the user activity is allowed.
+If the list mode is set to **Block**, when a user attempts an activity involving a sensitive item and a domain that is on the list then DLP policies, and the actions defined in the polices, are applied. Any activity involving a sensitive item and a domain that isn't on the list will be audited and the user activity is allowed.
For example, with this configuration:
User attempts to:
but if a user attempts to: -- Upload a sensitive file with credit card numbers to wingtiptoys.com (which is not on the list).
+- Upload a sensitive file with credit card numbers to wingtiptoys.com (which isn't on the list).
- The policy *isn't* applied and the user activity is audited. An event is generated, but it won't list the policy name or the triggering rule name in the event details, and no alert is generated. > [!IMPORTANT]
For example:
| ***.CONTOSO.COM** |**Matches the specified domain name, any subdomain, and any site**: <p>*://contoso.com <p>*://contoso.com/anysubsite <p>*://contoso.com/anysubsite1/anysubsite2 <p>*://anysubdomain.contoso.com/ <p>*://anysubdomain.contoso.com/anysubsite/ <p>*://anysubdomain1.anysubdomain2.contoso.com/anysubsite/ <p>*://anysubdomain1.anysubdomain2.contoso.com/anysubsite1/anysubsite2 (etc.) <p>**Does not match unspecified domains** <p>*://anysubdomain.contoso.com.AU/ | | **`www.contoso.com`** |**Matches the specified domain name**: <p>`www.contoso.com` <p>**Does not match unspecified domains or subdomains** <p>*://anysubdomain.contoso.com/, in this case, you have to put the FQDN domain name itself `www.contoso.com`|
+Up to 50 domains can be configured under Service domains.
+
#### Sensitive service domains When you list a website in Sensitive services domains you can audit, block with override, or block users when they attempt to:
When you list a website in Sensitive services domains you can audit, block with
- save a website as local files - upload or drag/drop a sensitive file to an excluded website (this is configured in the policy)
-For the print, copy data and save actions, each website must be listed in a website group and the user must be accessing the website through Microsoft Edge. For the upload action, the user can be using Microsoft Edge or Google Chrome with the Purview extension. Sensitive service domains is used in conjunction with a DLP policy for Devices. You can also define website groups that you want to assign policy actions to that are different from the global website group actions. See, [Scenario 6 Monitor or restrict user activities on sensitive service domains](endpoint-dlp-using.md#scenario-6-monitor-or-restrict-user-activities-on-sensitive-service-domains) for more information.
+For the print, copy data and save actions, each website must be listed in a website group and the user must be accessing the website through Microsoft Edge. For the upload action, the user can be using Microsoft Edge or Google Chrome with the Purview extension. Sensitive service domains is used with a DLP policy for Devices. You can also define website groups that you want to assign policy actions to that are different from the global website group actions. See, [Scenario 6 Monitor or restrict user activities on sensitive service domains](endpoint-dlp-using.md#scenario-6-monitor-or-restrict-user-activities-on-sensitive-service-domains) for more information.
You can add maximum 50 websites into one group and can create maximum 20 groups. ##### Supported syntax for designating websites in a website group
-Please do not add protocol, e.g. https://, file:// into the URL. You can use a flexible syntax to include and exclude domains, subdomains, websites, and subsites in your website groups.
+Do not add protocol, for example, https://, file:// into the URL. You can use a flexible syntax to include and exclude domains, subdomains, websites, and subsites in your website groups.
- use `*` as a wildcard to specify all domains or all subdomains - use `/` as a terminator at the end of a URL to scope to that specific site only.
This syntax applies to all http/https websites.
Here are some examples:
-|URL that you add to the website group |URL will match | URL will not match|
+|URL that you add to the website group |URL will match | URL won't match|
|||| |contoso.com | //<!--nourl-->contoso.com </br> //<!--nourl-->contoso.com/ </br> //<!--nourl-->contoso.com/allsubsites1 </br> //<!--nourl-->contoso.com/allsubsites1/allsubsites2| //<!--nourl-->allsubdomains.contoso.com </br> //<!--nourl-->allsubdomains.contoso.com.au | |contoso.com/ |//<!--nourl-->contoso.com </br> //<!--nourl-->contoso.com/ |//<!--nourl-->contoso.com/allsubsites1 </br> //<!--nourl-->contoso.com/allsubsites1/allsubsites2 </br> //<!--nourl-->allsubdomains.contoso.com </br> //<!--nourl-->allsubdomains.contoso.com/au |
Here are some examples:
|*.contoso.com/xyz |//<!--nourl-->contoso.com </br> //<!--nourl-->contoso.com/xyz </br> //<!--nourl-->contoso.con/xyz/allsubsites/ </br> //<!--nourl-->allsubdomains.contoso.com/xyz </br> //<!--nourl-->allsubdomains.contoso.com/xyz/allsubsites </br> //<!--nourl-->allsubdomains1.allsubdomains2.contoso.com/xyz/allsubsites </br> //<!--nourl-->allsubdomains1.allsubdomains2.contoso.com/xyz/allsubsites1/allsubsites2 | //<!--nourl-->contoso.com/xyz </br> //<!--nourl-->allsubdomains.contoso.com/xyz/| |*.contoso.com/xyz/ |//<!--nourl-->contoso.com/xyz </br> //<!--nourl-->allsubdomains.contoso.com/xyz |//<!--nourl-->contoso.com </br> //<!--nourl-->contoso.com/xyz/allsubsites/ </br> //<!--nourl-->allsubdomains.contoso.com/xyz/allsubsites/ </br> //<!--nourl-->allsubdomains1.allsubdomains2.contoso.com/xyz/allsubsites/ </br> //<!--nourl-->allsubdomains1.allsubdomains2.contoso.com/xyz/allsubsites1/allsubsites2|
+Up to 20 groups and 50 domains per group can be configured under Sensitive Service domains.
+ ### Additional settings for endpoint DLP #### Business justification in policy tips
You can control how users interact with the business justification option in DLP
- **Show default options and custom text box**: By default, users can select either a built-in justification, or enter their own text. - **Only show default options**: Users can only select a built-in justification.-- **Only show custom text box**: Users can only enter their own justification. Only the text box will appear in the end-user policy tip notification.
+- **Only show custom text box**: Users can only enter their own justification. Only the text box appears in the end-user policy tip notification.
##### Customizing the options in the drop-down menu
-You can create up to five customized options that will appear when users interact with the policy notification tip by selecting the **Customize the options drop-down menu**.
+You can create up to five customized options that appear when users interact with the policy notification tip by selecting the **Customize the options drop-down menu**.
|Option |Default text |
You can define removeable storage devices by these parameters:
You assign each removable storage device in the group an **Alias**. The alias is a name that only appears in the Purview console. So, continuing with the example, you would create a removable storage device group named **Backup** and add individual devices (with an alias) by their friendly name, like `backup_drive_001`, and `backup_drive_002`.
-You can multi-select the parameters and the printer group will include all devices that satisfy those parameters.
+You can multi-select the parameters and then the printer group will include all devices that satisfy those parameters.
You can assign these policy actions to the group in a DLP policy:
compliance Dlp Copy Matched Items Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-copy-matched-items-get-started.md
+
+ Title: "Get started with collecting files that match data loss prevention policies from devices (preview)"
+f1.keywords:
+- NOCSH
+++ Last updated : 04/27/2023
+audience: ITPro
++
+ms.localizationpriority: medium
+
+- tier1
+- purview-compliance
+search.appverid:
+- MET150
+description: "Learn how to configure data loss prevention to collect items that match policies from devices to an Azure storage account."
+
+# Get started with collecting files that match data loss prevention policies from devices (preview)
+
+This article walks you through the prerequisites and configuration steps for evidence collection for file activities on devices and introduces how to view the items that are copied out and saved.
++
+Here are the high level steps for configuring and using evidence collection for file activities on devices.
+
+1. [Onboard devices](#onboard-devices)
+1. [Setup Azure Storage](#setup-azure-storage)
+1. [Set permissions on the Azure blob storage](#set-permissions-on-the-azure-blob-storage)
+1. [Endpoint DLP settings configuration](#endpoint-dlp-settings-configuration)
+1. [Policy configuration](#policy-configuration)
+1. [View saved files](#view-saved-files)
++
+## Before you begin
+
+Before you start these procedures, you should review [Learn about evidence collection for file activities on devices (preview)](dlp-copy-matched-items-learn.md).
+
+## Licensing and Subscriptions
+
+See the [licensing requirements for Information Protection](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection) for details on the subscriptions that support DLP. You don't need any additional licenses over what is needed for endpoint DLP.
+
+## Permissions
+
+Standard Microsoft Purview Data Loss Prevention (DLP) permissions are required. For more information, see [Permissions](dlp-create-deploy-policy.md#permissions).
+
+### Onboard devices
+
+Before you can use copy matched items you have to onboard Windows 10/11 devices into Purview, see [Onboard Windows 10 and Windows 11 devices into Microsoft 365 overview](device-onboarding-overview.md#onboard-windows-10-and-windows-11-devices-into-microsoft-365-overview)
+
+### Setup Azure storage
+
+> [!IMPORTANT]
+> Containers inherit the permissions of the storage account that they are in. You can't set different permissions per container. If you need to configure different permission for different regions, you must create multiple storage accounts, not multiple containers.
+
+You should have answers to these question before setting up your Azure storage and scoping the feature to users.
+
+#### Do you need to compartmentalize items and access along role or departmental lines?
+
+For example, if your organization wants to have one set of administrators or DLP event investigators who can view saved items from your senior leadership and another set of administrators or DLP event investigators for saved items from human resources, you should create one Azure storage account for senior leadership and another for human resources. This ensures that the Azure storage admins or DLP event investigators can only see the items that matched DLP policies from their respective groups.
+
+#### Do you want to use containers to organize saved items?
+
+You can create multiple different evidence containers within same storage account to sort saved items into. For example, one for items saved off from the HR department and one for IT department.
+
+#### What is your strategy for protecting against saved item deletion or modification?
+
+In the Azure Storage, data protection refers to strategies for protecting the storage account and data within it from being deleted or modified, or for restoring data after it has been deleted or modified. Azure Storage also offers options for disaster recovery, including multiple levels of redundancy to protect your data from service outages due to hardware problems or natural disasters, and customer-managed failover if the data center in the primary region becomes unavailable. For more information, see [Data protection overview](/azure/storage/blobs/data-protection-overview.md).
+
+You can also configure immutability policies for your blob data that protects against the saved items being overwritten or deleted. For more information, see [Store business-critical blob data with immutable storage](/azure/storage/blobs/immutable-storage-overview.md)
+
+#### Create an Azure storage account
+
+The procedures for setting up your Azure storage account, container and blobs are documented in the Azure document set. Here are links to relevant articles you can refer to help you get started:
+1. [Introduction to Azure Blob Storage](/azure/storage/blobs/storage-blobs-introduction)
+1. [Create a storage account](/azure/storage/common/storage-account-create)
+1. [Manage blob containers using the Azure portal](/azure/storage/blobs/blob-containers-portal)
+1. [Manage block blobs with PowerShell](/azure/storage/blobs/blob-powershell)
+
+Be sure to save the name and URL of the Azure blob container. To view the URL, open the Azure storage portal \> **Home \> **Storage Accounts** \> **Container** \> **Properties**
+
+### Set permissions on the Azure blob storage
+
+You have to configure two sets of permissions on the blobs, one for the administrators and investigators so they can view and manage evidence and another for users whose devices need to upload items to Azure. You should [create custom role groups in Microsoft Purview compliance](../security/office-365-security/scc-permissions.md) to enforce least privileges and assign accounts to them.
+
+#### Permissions on Azure blob for administrators and investigators
+
+Once you've created the role group that DLP incident investigators will use, it must have these permissions on the Azure blob. For more information on configuring blob access, see [how to authorize access to blob data in the Azure portal](/azure/storage/blobs/authorize-data-operations-portal) and [Assign share-level permissions](/azure/storage/files/storage-files-identity-ad-ds-assign-permissions?tabs=azure-portal.md).
+
+##### Investigator actions
+
+Configure these permissions for these actions for investigators:
++
+|Object |Permissions |
+|||
+|Microsoft.Storage/storageAccounts/blobServices |Read: List Blob Services |
+|Microsoft.Storage/storageAcccounts/blobServices |Read: Get blob service properties or statistics |
+|Microsoft.Storage/storageAccounts/blobServices/containers |Read: Get blob container |
+|Microsoft.Storage/storageAccounts/blobServices/containers |Read: List of blob containers |
+|Microsoft.Storage/storageAccounts/blobServices/containers/blobs |Read: Read blob |
++
+##### Investigator data actions
+
+|Object |Permissions|
+|||
+|Microsoft.Storage/storageAccounts/blobServices/containers/blobs|Read: Read Blob|
+
+The JSON for the investigator role group should look like this:
+
+```json
+"permissions": [
+ {
+ "actions": [
+ "Microsoft.Storage/storageAccounts/blobServices/containers/read",
+ "Microsoft.Storage/storageAccounts/blobServices/read"
+ ],
+ "notActions": [],
+ "dataActions": [
+ "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read"
+ ],
+ "notDataActions": []
+ }
+ ]
+```
+
+#### Permissions on Azure blob for users
+
+Assign these permissions to the Azure blob for the users role:
+
+##### User actions
+
+|Object |Permissions|
+|||
+|Microsoft.Storage/storageAccounts/blobServices |Read: List Blob Services|
+|Microsoft.Storage/storageAccounts/blobServices/containers|Read: Get blob container|
+|Microsoft.Storage/storageAccounts/blobServices/containers|Write: Put blob container|
+
+##### User data actions
+
+|Object|Permissions|
+|||
+|Microsoft.Storage/storageAccounts/blobServices/containers/blobs|Write: Write Blob|
+|Microsoft.Storage/storageAccounts/blobServices/containers/blobs|Other: Add blob content|
+
+The JSON for user role group should look like this:
+
+```json
+"permissions": [
+ {
+ "actions": [
+ "Microsoft.Storage/storageAccounts/blobServices/containers/read",
+ "Microsoft.Storage/storageAccounts/blobServices/containers/write",
+ "Microsoft.Storage/storageAccounts/blobServices/read"
+ ],
+ "notActions": [],
+ "dataActions": [
+ "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read",
+ "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action",
+ "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write"
+ ],
+ "notDataActions": []
+ }
+ ]
+
+```
+
+### Endpoint DLP settings configuration
+
+1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>.
+1. In the Microsoft Purview compliance portal \> left navigation \> **Solutions** \> **Data loss prevention** \> **Endpoint DLP settings** \> **Setup evidence collection for file activities on devices**.
+
+1. Set the toggle to **On**.
+
+1. Set how long you want items to be cached on devices if they can't access the Azure storage account. You can choose, **7**, **30**, or **60** days.
+
+1. Select **+ Add storage** and provide the Name and URL of the Azure storage account.
+
+### Policy configuration
+
+Create a DLP policy as you normally would. Refer to [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) for policy configuration examples.
+
+Configure your policy using these settings:
+
+- Make sure that **Devices** is the only location selected.
+- In **Incident reports**, toggle **Send an alert to admins when a rule match occurs** to **On**.
+- In **Incident reports**, select **Collect original file as evidence for all selected file activities on Endpoint**.
+- Select the storage account you want.
+- Select the activities (**Copy to a removable USB device**, **Copy to a network share**, **Print**, **Copy or move using unallowed Bluetooth app**, **Copy or move using RDP**) you want to copy matched items to Azure storage for.
+
+### View saved files
+
+1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>.
+1. In the Microsoft Purview compliance portal \> left navigation \> **Data classification** \> **Activity explorer**.
+
+1. Select a **DLP rule matched** event that was generated by an activity that you're monitoring for.
+
+1. In the flyout pane, select the file name link under **Evidence file**. Note the file type.
+
+1. During this preview, the link returns this error:
+ 1. `This XML file does not appear to have any style information associated with it. The document tree is shown below`
+
+1. During this preview, you have to copy the full hash value from the URL in the browser address bar.
++
+1. Sign in to the **Microsoft Azure** portal.
+
+1. In the Azure portal \> **Home** \> **Storage accounts** \> *\<container\>* \> **Storage browser** \> *\<blobname\>*.
+
+1. Open the blob and find the hashed value that you copied from step 6 above.
+
+1. Download the file and open it with the appropriate app for the file type.
compliance Dlp Copy Matched Items Learn https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-copy-matched-items-learn.md
+
+ Title: "Learn about collecting files that match DLP policies from devices (preview)"
+f1.keywords:
+- NOCSH
+++ Last updated : 04/27/2023
+audience: ITPro
++
+ms.localizationpriority: medium
+
+- tier1
+- purview-compliance
+search.appverid:
+- MET150
+description: "Learn about copying items that match policies to an Azure storage account."
++
+# Learn about evidence collection for file activities on devices (preview)
+
+When you're investigating a Microsoft Purview Data Loss Prevention (DLP) incident or troubleshooting a DLP policy, it can be helpful to have a complete copy of the item that matched the policy to refer to. DLP can copy the item that matches a DLP policy from onboarded Windows devices to an Azure storage account. DLP incident investigators and administrators that have been granted the appropriate permissions on the Azure storage blob can then access the files.
+
+To get started configuring and using the feature, see [Get started with collecting files that match data loss prevention policies from devices (preview)](dlp-copy-matched-items-get-started.md).
++
+If you're new to Microsoft Purview DLP, here's a list of the core articles you'll need as you implement DLP:
+
+1. [Administrative units (preview)](microsoft-365-compliance-center-permissions.md#administrative-units-preview)
+1. [Learn about Microsoft Purview Data Loss Prevention](dlp-learn-about-dlp.md) - This article introduces you to the data loss prevention discipline and Microsoft's implementation of DLP.
+1. [Plan for data loss prevention (DLP)](dlp-overview-plan-for-dlp.md#plan-for-data-loss-prevention-dlp) - by working through this article you will:
+ 1. [Identify stakeholders](dlp-overview-plan-for-dlp.md#identify-stakeholders)
+ 1. [Describe the categories of sensitive information to protect](dlp-overview-plan-for-dlp.md#describe-the-categories-of-sensitive-information-to-protect)
+ 1. [Set goals and strategy](dlp-overview-plan-for-dlp.md#set-goals-and-strategy)
+1. [Data Loss Prevention policy reference](dlp-policy-reference.md#data-loss-prevention-policy-reference) - This article introduces all the components of a DLP policy and how each one influences the behavior of a policy.
+1. [Design a DLP policy](dlp-policy-design.md) - This article walks you through creating a policy intent statement and mapping it to a specific policy configuration.
+1. [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) - This article presents some common policy intent scenarios that you'll map to configuration options, then it walks you through configuring those options.
+
+## Where evidence collection for file activities on devices fits in Purview
+
+Endpoint DLP is part of the [larger DLP offering](dlp-learn-about-dlp.md) and part of the larger range of services offered in [Microsoft Purview](/microsoft-365/compliance.md). You should understand how evidence collection for file activities on devices fits into the larger set of service offerings.
+### Evidence collection for file activities on devices and eDiscovery
+
+This feature makes copies of items that match DLP policies on onboarded Windows devices and places those copies in an Azure storage account. These copies aren't held in a changless state and aren't evidence in the legal sense of the term. If you need to find and hold items for legal purposes, you should use the [Microsoft Purview eDiscovery solutions](ediscovery.md). Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in legal cases.
+### Evidence collection for file activities on devices and contextual summary
+
+ When an item and the activity that a user is taking on that item match the conditions defined in a DLP policy, a **DLPRuleMatch** event shows up in [Activity explorer](data-classification-activity-explorer.md). This is true for every location that DLP supports. The **DLPRuleMatch** event contains a limited amount of the text that surrounds the matched content. This limited amount of text is called [contextual summary](dlp-learn-about-dlp.md#contextual-summary).
+It's important to understand the difference between evidence collection for file activities on devices and contextual summary. Evidence collection for file activities on devices is only available for onboarded Windows devices and saves a copy of the entire item that matched a policy to the Azure storage account. Contextual summary is captured for every DLP policy rule match and only contains a limited amount of the text that surrounds the target text that triggered the match.
+
+## Covered user activities
+
+You can configure evidence collection for file activities on devices to save a copy of a matched item to the Azure storage account when a user attempts to do one of these activities on a matched item:
+ - Copy to a removable USB
+ - Copy to Network share
+ - Print
+ - Copy or move using unallowed Bluetooth app
+ - Copy or move through RDP
+
+The detection of these activities is configured in the DLP policy. For more information on how to create a DLP policy, see, [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) and [Using Endpoint data loss prevention](endpoint-dlp-using.md).
+
+## Covered actions
+
+When you enable evidence collection for file activities on devices in Endpoint DLP settings and configure a DLP policy to use this feature, it saves a copy of a matched item for these actions:
+- Audit only
+- Block with override
+<!--Block-->
+
+These actions are configured in the DLP policy. For more information on how to create a DLP policy, see [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) and [Using Endpoint data loss prevention](endpoint-dlp-using.md).
+
+## Design consideration
+
+### Regions for your Azure Storage accounts
+
+To comply with regulatory requirements, make sure that the Azure storage accounts that you use are in the same geo-political or regulatory boundaries as the devices that they're being copied from. Also, be aware of the geo-political location of the DLP investigators who will be accessing the sensitive items once they're saved. Consider using [Administrative units (preview)](microsoft-365-compliance-center-permissions.md#administrative-units-preview) to scope the administration of the users and devices that the DLP policy will be scoped to. To learn how to use data loss prevention to comply with data privacy regulations, see [Deploy information protection for data privacy regulations with Microsoft Purview](../solutions/information-protection-deploy.md) (aka.ms/m365dataprivacy).
+Evidence collection for file activities on devices supports up to 10 Azure storage accounts.
+
+To learn how to use data loss prevention to comply with data privacy regulations, see [Deploy information protection for data privacy regulations with Microsoft Purview](../solutions/information-protection-deploy.md) (aka.ms/m365dataprivacy).
+
+### Local storage and bandwidth
+
+By default, copies of matched items are saved asynchronously to the configured Azure storage account over the existing network connection. If the device doesn't have connectivity, matched items are save locally, up to the 500-MB limit. You can save items locally up to 60 days.
+While the device has connectivity to the Azure storage account URL, there's no limit on bandwidth usage. The bandwidth that evidence collection for file activities on devices uses doesn't impact the default or configured bandwidth limits for [Advanced classification scanning and protection](dlp-configure-endpoint-settings.md#advanced-classification-scanning-and-protection).
+
+### Azure storage accounts
+
+Customers are responsible for creating and managing their own Azure storage accounts. If you're new to Azure storage, see:
+- [What is Azure Blob storage](/azure/storage/blobs/storage-blobs-overview.md)
+- [Introduction to Azure Storage](/azure/storage/common/storage-introduction.md)
+- [Create a storage account](/azure/storage/common/storage-account-create)
+
+Items that match a policy are copied from the users' device to the Azure storage account blob in the security context of the logged in user. So, all users who are in-scope for the policy must have read and write permission to the blob storage. For more information, see [Get started with collecting files that match data loss prevention policies from devices (preview)](dlp-copy-matched-items-get-started.md)
+
+Similarly, all administrators who are reviewing the saved items must have read permission to the Azure storage account blob. For more information, see [Get started with collecting files that match data loss prevention policies from devices (preview)](dlp-copy-matched-items-get-started.md).
+
+## Next step
+
+Your next step is to configure evidence collection for file activities on devices
+
+- [Get started with collecting files that match data loss prevention policies from devices (preview)](dlp-copy-matched-items-get-started.md#get-started-with-collecting-files-that-match-data-loss-prevention-policies-from-devices-preview)
compliance Dlp Learn About Dlp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-learn-about-dlp.md
f1.keywords:
Previously updated : 02/14/2023 Last updated : 04/27/2023 audience: ITPro
Organizations have sensitive information under their control such as financial d
In Microsoft Purview, you implement data loss prevention by defining and applying DLP policies. With a DLP policy, you can identify, monitor, and automatically protect sensitive items across: -- Microsoft 365 services such as Teams, Exchange, SharePoint, and OneDrive
+- Microsoft 365 services such as Teams, Exchange, SharePoint, and OneDrive accounts
- Office applications such as Word, Excel, and PowerPoint - Windows 10, Windows 11 and macOS (three latest released versions) endpoints - non-Microsoft cloud apps-- on-premises file shares and on-premises SharePoint.
+- on-premises file shares and on-premises SharePoint
+- Power BI
DLP detects sensitive items by using deep content analysis, not by just a simple text scan. Content is analyzed for primary data matches to keywords, by the evaluation of regular expressions, by internal function validation, and by secondary data matches that are in proximity to the primary data match. Beyond that DLP also uses machine learning algorithms and other methods to detect content that matches your DLP policies.
You can apply DLP policies to data at rest, data in use, and data in motion in l
- On-premises repositories - Power BI sites
-Each one has different pre-requisites. Sensitive items in some locations, like Exchange online, can be brought under the DLP umbrella by just configuring a policy that applies to them. Others, such as on-premises file repositories require a deployment of Azure Information Protection (AIP) scanner. You'll need to prepare your environment, code draft policies, and test them thoroughly before activating any blocking actions.
+Each one has different prerequisites. Sensitive items in some locations, like Exchange online, can be brought under the DLP umbrella by just configuring a policy that applies to them. Others, such as on-premises file repositories require a deployment of Azure Information Protection (AIP) scanner. You'll need to prepare your environment, code draft policies, and test them thoroughly before activating any blocking actions.
### Deploy your policies in production
location | include/exclude by|
|On-premises repositories| repository file path| |Power BI (preview)| workspaces|
-4. **Choose the conditions that must be matched for a policy to be applied to an item** - You can accept pre-configured conditions or define custom conditions. Some examples are:
+4. **Choose the conditions that must be matched for a policy to be applied to an item** - You can accept preconfigured conditions or define custom conditions. Some examples are:
- item contains a specified kind of sensitive information that is being used in a certain context. For example, 95 social security numbers being emailed to recipient outside your org. - item has a specified sensitivity label
location | include/exclude by|
5. **Choose the action to take when the policy conditions are met** - The actions depend on the location where the activity is happening. Some examples are: -- SharePoint/Exchange/OneDrive: Block people who are outside your organization form accessing the content. Show the user a tip and send them an email notification that they're taking an action that is prohibited by the DLP policy.
+- SharePoint/Exchange/OneDrive: Block people who are outside your organization from accessing the content. Show the user a tip and send them an email notification that they're taking an action that is prohibited by the DLP policy.
- Teams Chat and Channel: Block sensitive information from being shared in the chat or channel - Windows 10, Windows 11, and macOS (three latest released versions) Devices: Audit or restrict copying a sensitive item to a removeable USB device - Office Apps: Show a popup notifying the user that they're engaging in a risky behavior and block or block but allow override.
compliance Dlp Policy Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md
DLP supports using trainable classifiers as a condition to detect sensitive docu
> DLP supports detecting sensitivity labels on emails and attachments. For more information, see [Use sensitivity labels as conditions in DLP policies](dlp-sensitivity-label-as-condition.md#use-sensitivity-labels-as-conditions-in-dlp-policies). ## Rules-
-<!--This section introduces the classifications of content that, when detected, can be protected. Link out to [Learn about sensitive information types]() and [Sensitive information type entity definitions](sensitive-information-type-entity-definitions.md#sensitive-information-type-entity-definitions) as well as labels (cross referenced by supporting workload). It will touch on the purpose of multiple conditions, confidence levels (link out to [more on confidence levels](sensitive-information-type-learn-about.md#more-on-confidence-levels)) and confidence levels video. How to use the confidence level to change the behavior of a policy in conjunction with the instance count. eg. if you want your policy to trigger when it encounters situation DEF, set your conditions like HIJ.-->
-<!--
-- What is a rule in the context of a Policy?-- when and why should I have more than one rule?-- The purpose of rule groups-- How do I tune the behavior of a Policy through the tuning of rules-- what's in a rule-->- Rules are the business logic of DLP policies. They consist of: - [**Conditions**](#conditions) that when matched, trigger the policy - [**Actions**](#actions) to take when the policy is triggered - [**User notifications**](#user-notifications-and-policy-tips) to inform your users when they're doing something that triggers a policy and help educate them on how your organization wants sensitive information treated - [**User Overrides**](#user-overrides) when configured by an admin, allow users to selectively override a blocking action-- [**Incident Reports**](#incident-reports) that notify admins and other key stakeholders when a rule match occurs-- [**Additional Options**](#additional-options) which define the priority for rule evaluation and can stop further rule and policy processing.
+- [**Incident reports**](#incident-reports) that notify admins and other key stakeholders when a rule match occurs
+- [**Additional options**](#additional-options) which define the priority for rule evaluation and can stop further rule and policy processing.
A policy contains one or more rules. Rules are executed sequentially, starting with the highest-priority rule in each policy.
-<! [**Exceptions**](#exceptions) to the conditions
-> [!IMPORTANT]
-> The **Exceptions** UI is only available in **Classic rule builder** mode. If you have switched to the **New DLP rule builder** [mode](dlp-policy-design.md#complex-rule-design), exceptions are displayed as nested groups and joined to the other conditions by a boolean NOT function.-->
- ### The priority by which rules are evaluated and applied #### Hosted service workloads
To learn more about user overrides, see:
/microsoft-365/compliance/view-the-dlp-reports?view=o365-worldwide /microsoft-365/compliance/dlp-configure-view-alerts-policies?view=o365-worldwide-->
-When a rule is matched, you can send an incident report to your compliance officer (or any people you choose) with details of the event. The report includes information about the item that was matched, the actual content that matched the rule, and the name of the person who last modified the content. For email messages, the report also includes as an attachment the original message that matches a DLP policy.
+When a rule is matched, you can send an incident report to your compliance officer (or any people you choose) with details of the event. The report includes information about the item that was matched, the actual content that matched the rule, and the name of the person who last modified the content. For email messages, the report also includes the original message as an attachment that matches a DLP policy.
DLP feeds incident information to other Microsoft Purview Information Protection services, like [insider risk management](insider-risk-management.md). In order to get incident information to insider risk management, you must set the **Incident reports** severity level to **High**.
-<!--![Page for configuring incident reports](../media/31c6da0e-981c-415e-91bf-d94ca391a893.png)-->
- Alerts can be sent every time an activity matches a rule, which can be noisy or they can be aggregated into fewer alerts based on number of matches or volume of items over a set period of time. ![send an alert every time a rule matches or aggregate over time into fewer reports](../media/dlp-incident-reports-aggregation.png) DLP scans email differently than it does SharePoint Online or OneDrive for Business items. In SharePoint Online and OneDrive for Business, DLP scans existing items as well as new ones and generates an incident report whenever a match is found. In Exchange Online, DLP only scans new email messages and generates a report if there is a policy match. DLP ***does not*** scan or match previously existing email items that are stored in a mailbox or archive.
+#### Evidence collection for file activities on devices (preview)
+
+If you've enabled **Setup evidence collection for file activities on devices (preview)** and added Azure storage accounts, you can select **Collect original file as evidence for all selected file activities on Endpoint** and the Azure storage account you want to copy the items to. You must also choose the activities you want to copy items for. For example, if you select **Print** but not **Copy to a network share**, then only items that are printed from monitored devices will be copied to the Azure storage account.
+ ### Additional options If you have multiple rules in a policy, you can use the **Additional options** to control further rule processing if there's a match to the rule you're editing as well as setting the priority for evaluation of the rule.
compliance Ediscovery Assign Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-assign-permissions.md
This role lets users perform bulk removal of data matching the criteria of a con
You can add role groups as members of eDiscovery (Standard) and eDiscovery (Premium) cases so that members of the role groups can access and perform tasks in the assigned cases. The roles assigned to the role group define what members of the role group can do. Then adding a role group as a member of the case lets members access and perform those tasks in a specific case. For more information about adding role groups as members of cases, see: -- [Get started with eDiscovery (Standard)](ediscovery-standard-get-started.md#step-4-optional-add-members-to-a-ediscovery-standard-case)
+- [Get started with eDiscovery (Standard)](ediscovery-standard-get-started.md#step-5-optional-add-members-to-a-ediscovery-standard-case)
- [Add or remove members from an eDiscovery (Premium) case](ediscovery-add-or-remove-members-from-a-case.md) With this requirement in mind, it's important to know that if a role is added or removed from a role group, then that role group will be automatically removed as a member of any case the role group is a member of. The reason for this is to protect your organization from inadvertently providing additional permissions to members of a case. Similarly, if a role group is deleted, it will be removed from all cases it was a member of.
compliance Ediscovery Data Spillage Search And Purge https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-data-spillage-search-and-purge.md
You can also create a new role group that aligns with your organizational needs.
An eDiscovery case provides an effective way to manage your data spillage investigation. You can add members to the role group that you created in Step 1, add the role group as a member of new a eDiscovery case, perform iterative searches to find the spilled data, export a report to share, track the status of the case, and then refer back to the details of the case if needed. Consider establishing a naming convention for eDiscovery cases used for data spillage incidents, and provide as much information as you can in the case name and description so you can locate and refer to in the future if necessary.
-To create a new case, you can use eDiscovery in the Microsoft Purview compliance portal. See "Create a new case" in [Get started with eDiscovery (Standard)](ediscovery-standard-get-started.md#step-3-create-a-ediscovery-standard-case).
+To create a new case, you can use eDiscovery in the Microsoft Purview compliance portal. See "Create a new case" in [Get started with eDiscovery (Standard)](ediscovery-standard-get-started.md#step-4-create-a-ediscovery-standard-case).
## Step 3: Search for the spilled data
compliance Ediscovery Error Remediation When Processing Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-error-remediation-when-processing-data.md
f1.keywords:
Previously updated : 01/01/2023 Last updated : 04/26/2023 audience: Admin
Use the following workflow to remediate files with errors in eDiscovery (Premium
![Error remediation.](../media/ediscovery-new-error-remediation.png) 2. Select the errors you want to remediate by selecting the radio button next to either the error type or file type. In the following example, we're remediating a password protected file.- 3. Select **New error remediation**. The error remediation workflow starts with a preparation stage where the files with errors are copied to a Microsoft-provided Azure Storage location so that you can download them to your local computer to remediate.
Use the following workflow to remediate files with errors in eDiscovery (Premium
`<Parent folder>\Subfolder 1\Subfolder 2\<file>` - *Subfolder 1* is named with the ID for the case or the review set, depending on the scope that you selected in step 1.- - *Subfolder 2* is named with the file ID of the downloaded file- - The downloaded file is located in *Subfolder 2* and is also named with the file ID. Here's an example of the folder path and error file name that's created when items are downloaded to the **C:\Remediation** parent folder:
Use the following workflow to remediate files with errors in eDiscovery (Premium
> When you upload files in step 9 and step 10, the remediated files must have that same filename and be located in the same subfolder structure. The subfolder and file names are used to associated the remediated file with the original error file. If the folder structure or file names are changed, you'll receive the following error: `Cannot apply Error Remediation to the current Workingset`. To prevent any issues, we recommend that keep the remediated files in the same parent folder and subfolder structure. 7. After downloading the files, you can remediate them with an appropriate tool. For password-protected files, there are several password cracking tools you can use. If you know the passwords for the files, you can open them and remove the password protection.- 8. Return to eDiscovery (Premium) and the error remediation wizard and then select **Next: Upload files**. This moves to the next page where you can now upload the files. ![Upload Files.](../media/ediscovery-new-error-remediation-step-3.png)
In situations when the contents of a container file (such as a .zip file) can't
## Remediating errors by uploading the extracted text
-Sometimes it's not possible to remediate a file to native format that eDiscovery (Premium) can interpret. But you can replace the original file with a text file that contains the original text of the native file (in a process called *text overlay*). To do this, follow the steps described in this article but instead of remediating the original file in the native format, you would create a text file that contains the extracted text from the original file, and then upload the text file using the original filename appended with a .txt suffix. For example, you download a file during error remediation with the filename 335850cc-6602-4af0-acfa-1d14d9128ca2.abc. You open the file in the native application, copy the text, and then paste it into a new file named 335850cc-6602-4af0-acfa-1d14d9128ca2.abc.txt. When you do this, be sure to remove the original file in the native format from the remediated file location on your local computer before uploading the remediated text file to eDiscovery (Premium).
+Sometimes it's not possible to remediate a file to native format that eDiscovery (Premium) can interpret. But you can replace the original file with a text file that contains the original text of the native file (in a process called *text overlay*). To do this, follow the steps described in this article but instead of remediating the original file in the native format, you would create a text file that contains the extracted text from the original file, and then upload the text file using the original filename appended with a .txt suffix.
+
+For example, you download a file during error remediation with the filename 335850cc-6602-4af0-acfa-1d14d9128ca2.abc. You open the file in the native application, copy the text, and then paste it into a new file named 335850cc-6602-4af0-acfa-1d14d9128ca2.abc.txt. When you do this, be sure to remove the original file in the native format from the remediated file location on your local computer before uploading the remediated text file to eDiscovery (Premium).
+
+> [!NOTE]
+> The number of of files used in error remediation upload must match the number of files downloaded from the review set. If the number of uploaded files doesn't match the number of downloaded files, the matching process will fail (even if AzCopy reports that the upload was successful).
## What happens when files are remediated
compliance Ediscovery Premium Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-premium-get-started.md
For more information about setting up and using the attorney-client privilege de
> [!NOTE] > This is an optional step that you can perform anytime. Not implementing the attorney-client privilege detection model doesn't prevent you from creating and using eDiscovery (Premium) cases.
+## Step 4: Verify that required eDiscovery apps are enabled
+
+eDiscovery (Premium) requires the following Enterprise apps to be enabled in your Microsoft 365 or Office 365 organization. If these apps are not enabled, you won't be able to access eDiscovery (Premium) view, filter, and search features.
+
+|**App**|**App ID**|
+|:|:|
+| ComplianceWorkbenchApp | 92876b03-76a3-4da8-ad6a-0511ffdf8647 |
+| MicrosoftPurviewEDiscovery | b26e684c-5068-4120-a679-64a5d2c909d9 |
+| Microsoft Exchange Online Protection | 00000007-0000-0ff1-ce00-000000000000 |
+| Office365Zoom | 0d38933a-0bbd-41ca-9ebd-28c4b5ba7cb7 |
+
+For more information about how to view and enable apps, see:
+
+- [Quickstart: View enterprise applications](/azure/active-directory/manage-apps/view-applications-portal)
+- [Quickstart: Add an enterprise application](/azure/active-directory/manage-apps/add-application-portal)
+ ## Next steps After you set up eDiscovery (Premium), you're ready to [create a case](ediscovery-create-and-manage-cases.md).
compliance Ediscovery Set Up Compliance Boundaries https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-set-up-compliance-boundaries.md
To create a case and assign members:
2. In the list of cases, select the name of the case you created. 3. Add role groups as members to the case. For instructions, see the one of the following articles:
- - [Add members to a eDiscovery (Standard) case](ediscovery-standard-get-started.md#step-4-optional-add-members-to-a-ediscovery-standard-case)
+ - [Add members to a eDiscovery (Standard) case](ediscovery-standard-get-started.md#step-5-optional-add-members-to-a-ediscovery-standard-case)
- [Add members to an eDiscovery (Premium) case](ediscovery-add-or-remove-members-from-a-case.md) > [!NOTE]
compliance Ediscovery Standard Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-standard-get-started.md
Licensing for eDiscovery (Standard) requires the appropriate organization subscr
For information about how to assign licenses, see [Assign licenses to users](../admin/manage/assign-licenses-to-users.md).
-For information and guidance on security and compliance:
+ For information and guidance on security and compliance licensing and subscriptions, see the [Microsoft 365 guidance for security & compliance service descriptions](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).
-- Download and see the eDiscovery and auditing section in the [Microsoft 365 Comparison table](https://aka.ms/M365EnterprisePlans).
+## Step 2: Verify that required eDiscovery apps are enabled
-- See the [Microsoft 365 guidance for security & compliance - Service Descriptions | Microsoft Docs](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).
+eDiscovery (Standard) requires the following Enterprise apps to be enabled in your Microsoft 365 or Office 365 organization. If these apps are not enabled, you won't be able to access eDiscovery (Standard) view, filter, and search features.
-## Step 2: Assign eDiscovery permissions
+|**App**|**App ID**|
+|:|:|
+| ComplianceWorkbenchApp | 92876b03-76a3-4da8-ad6a-0511ffdf8647 |
+| MicrosoftPurviewEDiscovery | b26e684c-5068-4120-a679-64a5d2c909d9 |
+| Microsoft Exchange Online Protection | 00000007-0000-0ff1-ce00-000000000000 |
+| Office365Zoom | 0d38933a-0bbd-41ca-9ebd-28c4b5ba7cb7 |
+
+For more information about how to view and enable apps, see:
+
+- [Quickstart: View enterprise applications](/azure/active-directory/manage-apps/view-applications-portal)
+- [Quickstart: Add an enterprise application](/azure/active-directory/manage-apps/add-application-portal)
+
+## Step 3: Assign eDiscovery permissions
To access eDiscovery (Standard) or be added as a member of a eDiscovery (Standard) case, a user must be assigned the appropriate permissions. Specifically, a user must be added as a member of the eDiscovery Manager role group in the compliance portal. Members of this role group can create and manage eDiscovery (Standard) cases. They can add and remove members, place an eDiscovery hold on users, create and edit searches, and export content from a eDiscovery (Standard) case. Complete the following steps to add users to the eDiscovery Manager role group: 1. Go to the compliance portal and sign in using the credentials for an admin account in your Microsoft 365 or Office 365 organization.- 2. On the <a href="https://go.microsoft.com/fwlink/p/?linkid=2173597" target="_blank">**Permissions**</a> page, select the **eDiscovery Manager** role group.- 3. On the eDiscovery Manager flyout page, select **Edit** next to the **eDiscovery Manager** section.- 4. On the **Choose eDiscovery Manager** page in the edit role group wizard, select **Choose Discovery Manager**.- 5. Select **Add** then select the checkbox for all users you want to add to the role group.- 6. Select **Add** to add the selected users, and then select **Done**.- 7. Select **Save** to add the users to the role group, and then select **Close** to complete the step. ### More information about the eDiscovery Manager role group
There are two subgroups in the eDiscovery Manager role group. The difference bet
For more information about eDiscovery permissions and a description of each role that's assigned to the eDiscovery Manager role group, see [Assign eDiscovery permissions](ediscovery-assign-permissions.md).
-## Step 3: Create a eDiscovery (Standard) case
+## Step 4: Create a eDiscovery (Standard) case
The next step is to create a case and start using eDiscovery (Standard). Complete the following steps to create a case and add members. The user who creates the case is automatically added as a member. 1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">compliance portal</a> and sign in using the credentials for a user account that has been assigned the appropriate eDiscovery permissions. Members of the Organization Management role group can also create eDiscovery (Standard) cases.- 2. In the left navigation pane of the compliance portal, select **Show all**, and then select **eDiscovery** > <a href="https://go.microsoft.com/fwlink/p/?linkid=2174007" target="_blank">**Core**</a>.- 3. On the **eDiscovery (Standard)** page, select **Create a case**.- 4. On the **New case** flyout page, give the case a name (required) and then type an optional description. The case name must be unique in your organization.- 5. Select **Save** to create the case.
- The new case is created and displayed on the eDiscovery (Standard) page. You may have to select **Refresh** to display the new case.
+The new case is created and displayed on the eDiscovery (Standard) page. You may have to select **Refresh** to display the new case.
-## Step 4 (optional): Add members to a eDiscovery (Standard) case
+## Step 5 (optional): Add members to a eDiscovery (Standard) case
If you create a case in Step 3 and you're the only person who will use the case, then you don't have to perform this step. You can start using the case to create eDiscovery holds, search for content, and export search results. Perform this step if you want to give other users (or roles group) access to the case.
If you create a case in Step 3 and you're the only person who will use the case,
> >- If a role is added or removed from a role group that you've added as a member of a case, then the role group will be automatically removed as a member of the case (or any case the role group is a member of). The reason for this is to protect your organization from inadvertently providing additional permissions to members of a case. Similarly, if a role group is deleted, it will be removed from all cases it was a member of. For more information, see [Assign eDiscovery permissions](ediscovery-assign-permissions.md#adding-role-groups-as-members-of-ediscovery-cases). >
->- As previously explained, only an eDiscovery Administrator can remove members from a case. Users who are members of the eDiscovery Manager subgroup can't remove members from a case, even if the user created the case.
+>- Only an eDiscovery Administrator can remove members from a case. Users who are members of the eDiscovery Manager subgroup can't remove members from a case, even if the user created the case.
> ## Explore the eDiscovery (Standard) workflow
compliance Information Protection Solution https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-protection-solution.md
Knowing where your sensitive data resides is often the biggest challenge for man
![Protect your data for Microsoft Purview Information Protection solution overview](../media/protect-mipsolution.png)
-Use the information from knowing where your sensitive data resides to help you more efficiently protect it. But there's no need to waitΓÇöyou can start to protect your data immediately with a combination of manual, default, and automatic labeling. Then use [content explorer](data-classification-content-explorer.md) and [activity explorer](data-classification-activity-explorer.md) from the previous section to confirm what items are labeled and how your labels are being used.
+Use the information from knowing where your sensitive data resides to help you more efficiently protect it. However, there's no need to waitΓÇöyou can start to protect your data immediately with a combination of manual, default, and automatic labeling. Then, use [content explorer](data-classification-content-explorer.md) and [activity explorer](data-classification-activity-explorer.md) from the previous section to confirm what items are labeled and how your labels are being used.
|Step|Description|More information| |:|--|:|
If you're a developer who wants to extend sensitivity labels to line-of-business
Microsoft Purview includes additional capabilities to help protect data. Not every customer needs these capabilities, and some might be superseded by more recent releases.
-Use the [Protect your data with Microsoft Purview](information-protection.md) page for the full list of protection capabilities.
+Refer to the [Protect your data with Microsoft Purview](information-protection.md) page for the full list of protection capabilities.
## Prevent data loss
Deploy Microsoft Purview Data Loss Prevention (DLP) policies to govern and preve
|Step|Description|More information| |:|:-|:|
-|1|Learn about DLP. <br /><br /> Organizations have sensitive information under their control, such as financial data, proprietary data, credit card numbers, health records, or social security numbers. To help protect this sensitive data and reduce risk, they need a way to prevent their users from inappropriately sharing it with people who shouldn't have it. This practice is called data loss prevention (DLP).| [Learn about data loss prevention](dlp-learn-about-dlp.md)|
+|1|Learn about DLP. <br /><br /> Organizations have sensitive information under their control, such as financial data, proprietary data, credit card numbers, health records, and social security numbers. To help protect this sensitive data and reduce risk, they need a way to prevent their users from inappropriately sharing it with people who shouldn't have it. This practice is called data loss prevention (DLP).| [Learn about data loss prevention](dlp-learn-about-dlp.md)|
|2|Plan your DLP implementation. <br /><br /> Every organization will plan for and implement data loss prevention (DLP) differently, because every organization's business needs, goals, resources, and situation are unique to them. However, there are elements that are common to all successful DLP implementations. | [Plan for data loss prevention](dlp-overview-plan-for-dlp.md)| |3|Design and create a DLP policy. <br /><br /> Creating a data loss prevention (DLP) policy is quick and easy, but getting a policy to yield the intended results can be time consuming if you have to do a lot of tuning. Taking the time to design a policy before you implement it will get you to the desired results faster, and with fewer unintended issues, than tuning by trial and error alone.| [Design a DLP policy](dlp-policy-design.md) <p> [DLP policy reference](dlp-policy-reference.md) <p>[Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md)| |4|Tune your DLP policies. <br /><br /> After you deploy a DLP policy, you'll see how well it meets the intended purpose. Use that information to adjust your policy settings for better performance. | [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md)|
Learning modules for consultants and admins:
To help train your users to apply and use the sensitivity labels that you configure for them, see [End-user documentation for sensitivity labels](get-started-with-sensitivity-labels.md#end-user-documentation-for-sensitivity-labels).
-When you deploy data loss prevention policies for Teams, you might find useful the following end-user guidance as an introduction to this technology with some potential messages that they might see: [Teams messages about data loss prevention (DLP) and communication compliance policies](https://support.microsoft.com/office/teams-messages-about-data-loss-prevention-dlp-and-communication-compliance-policies-c5631c3f-f61b-4306-a6ac-6603d9fc5ff0).
+When you deploy data loss prevention policies for Teams, you might find the following end-user guidance useful as an introduction to this technology. It includes some potential messages that users might see: [Teams messages about data loss prevention (DLP) and communication compliance policies](https://support.microsoft.com/office/teams-messages-about-data-loss-prevention-dlp-and-communication-compliance-policies-c5631c3f-f61b-4306-a6ac-6603d9fc5ff0).
compliance Insider Risk Management Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-users.md
f1.keywords:
Previously updated : 02/21/2023 Last updated : 04/19/2023 audience: itpro - tier1
To view more details about risk activity for a user, open the user details pane
## Remove users from in-scope assignment to policies
-There may be scenarios where you need to stop assigning risk scores to users in insider risk management policies. Use **Remove users** on the **Users dashboard** page to stop assigning risk scores for one or more users from all insider risk management policies that they are currently in-scope for. This action does not remove users from the overall policy assignment (when you add users or groups to a policy configuration), but simply removes the users from active processing by policies after current triggering events. If the users have another triggering event in the future, risk scores from policies will automatically begin to be assigned to the users again. Any existing alerts or cases for this user will not be removed.
+There may be scenarios where you need to stop assigning risk scores to a user in insider risk management policies. Use **Stop scoring activity for users** on the **Users dashboard** to stop assigning risk scores for a user from all insider risk management policies that they are currently in scope for. This action does not remove the user from the overall policy assignment (when you add users or groups to a policy configuration), but simply removes the user from active processing by policies after current triggering events. If the user has another triggering event in the future, risk scores from policies will automatically begin to be assigned to the user again. Any existing alerts or cases for this user will not be removed.
-> [!NOTE]
-> Removing a user from a policy may take several minutes to complete. Once complete, the user no longer is listed on the Users page. If the removed user has active alerts or cases, then the user will remain on the Users page and the details for the user will show that they are no longer in-scope for a policy.
+To remove a user from in-scope status in all insider risk management policies:
-To manually remove users from in-scope status in all insider risk management policies, complete the following steps:
+1. In the [Microsoft Purview compliance portal](https://compliance.microsoft.com), go to **Insider risk management**, and then select the **Users** tab.
+2. On the **Users dashboard**, select the user(s) you want to stop scoring activity for.
+3. Select **Stop scoring activity for users**.
-1. In the [Microsoft Purview compliance portal](https://compliance.microsoft.com), go to **Insider risk management** and select the **Users** tab.
-2. On the **Users dashboard**, select the user or users you want to remove from being in-scope in insider risk management policies.
-3. Select **Remove users**.
-4. On the **Remove user** pane, Select **Remove** or **Cancel** to discard the changes and close the dialog.
-5. Select **Remove** on the confirmation pane to remove the user.
+> [!NOTE]
+> Removing a user from in-scope status may take several minutes. Once complete, the user will not be listed on the **Users dashboard**. If the removed user has active alerts or cases, the user will remain on the **Users dashboard** and the user details will show that they are no longer in-scope for a policy.
## Run automated tasks with Power Automate flows for a user
compliance Mip Easy Trials https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/mip-easy-trials.md
Eligible customers can activate default labels and policies for Microsoft Purvie
These default configurations help you get up and running quickly with Microsoft Purview Information Protection for Microsoft 365. You can use them as-is, make just a few changes, or fully customize them to better suit your business requirements.
-Eligibility includes customers who have a [free trial for Microsoft Purview](compliance-easy-trials.md) and some customers who already have a Microsoft 365 E5 plan:
+Eligible customers include those who have a [free trial for Microsoft Purview](compliance-easy-trials.md) and some customers who already have a Microsoft 365 E5 plan:
- **New customers**: If you've had Microsoft Purview for less than 30 days, your tenant can activate all the listed default configurations. You can always disable, remove, or edit them.
To get these preconfigured labels and policies:
:::image type="content" alt-text="Microsoft Purview Information Protection activation for preconfigured labels and policies." source="../media/mip-preconfigured.png" lightbox="../media/mip-preconfigured.png":::
- If you don't see this information displayed with the activation option, you're not currently eligible for the automatic creation of sensitivity labels and policies. You can try checking back later to see if this status has changed, or you can use the settings information that follows to manually create the same labels and policies.
+ If you don't see this information displayed with the activation option, you're not currently eligible for the automatic creation of sensitivity labels and policies. You can try checking back later to see if this status has changed. You can also use the settings information that follows to manually create the same labels and policies.
-3. Now enable sensitivity labels for SharePoint and OneDrive. This step is a prerequisite to use sensitivity labels in Office for the web, and auto-labeling policies for SharePoint and OneDrive.
+3. Next, enable sensitivity labels for SharePoint and OneDrive. This step is a prerequisite to use sensitivity labels in Office for the web, and auto-labeling policies for SharePoint and OneDrive.
Use the following banner at the top of the **Information Protection** \> **Overview** page, and select **Turn on now**. If you don't see this banner, sensitivity labels for SharePoint and OneDrive have already been enabled for your tenant.
If you want to edit the client-side auto-labeling configuration, see [How to con
## Service-side auto-labeling
-Service-side auto-labeling helps label sensitive documents at rest, and emails in transit. The default service-side auto-labeling policy creates policies that run in simulation mode for documents stored in all SharePoint or OneDrive sites, and all emails that are sent via Exchange Online.
+Service-side auto-labeling helps label sensitive documents at rest, and emails in transit. The default service-side auto-labeling policy creates policies that run in simulation mode for documents stored in all SharePoint or OneDrive sites, and all emails that are sent via Exchange Online.
-In simulation mode, items aren't actually labeled until the policy is turned on. You can manually turn on the policy, or unless you change the default setting, the policy will be automatically turned on for you if there aren't any changes to the policy within a set number of days from when the simulation completes.
+In simulation mode, items aren't actually labeled until the policy is turned on. You can manually turn on the policy. Alternatively, if you don't change the default setting, the policy will be automatically turned on for you if there aren't any changes to the policy within a set number of days from when the simulation completes.
> [!NOTE] > Automatically turning on auto-labeling policies is new and gradually rolling out for new auto-labeling policies. You might not see this configuration immediately, or for all policies. In most cases, the number of days before an unedited policy is automatically turned on is 7. However, specific to new customers from June 23, 2022, the initial number of days is 25, and then 7 after the policy is edited.
-Simulation mode allows you to preview what items would get labeled when the policy is turned on, so you have confidence in the labeling feature before you deploy the policy to your tenant for actual labeling.
+Simulation mode allows you to preview what items would get labeled when the policy is turned on, so you can have confidence in the labeling feature before you deploy the policy to your tenant for actual labeling.
The default service-side auto-labeling policies have the following configuration:
For all customers:
> [!NOTE] > If we detected you have your own sensitivity labels published, we'll prompt you to select one of your own labels for your auto-labeling policy.
-For new customers from June 23, 2022, and the Microsoft 365 tenant is in the US region:
+For new customers from June 23, 2022, where the Microsoft 365 tenant is in the US region:
- If there are 1-9 instances of US personal data and full names found in a document or email, apply the sensitivity label **Confidential** \ **Anyone (unrestricted)**
For new customers from June 23, 2022, and the Microsoft 365 tenant is in the US
New customers from June 23, 2022 have two auto-labeling policies for each setting. One policy is for the Exchange location, and the other for the SharePoint and OneDrive locations. Although the policies are created at the same time, simulation isn't immediately turned on for SharePoint and OneDrive: - Exchange location: The auto-labeling policy is created and immediately starts simulation.-- SharePoint and OneDrive locations: The auto-labeling policy is created but waits 25 days before it automatically starts simulation. This delay gives you time for files to be created and saved to these locations.
+- SharePoint and OneDrive locations: The auto-labeling policy is created but waits 25 days before it automatically starts simulation. This delay ensures that there is time for files to be created and saved to these locations.
-When the simulation is complete, review the results and if you are happy with them, turn on the policies. Slowly rolling out starting June 23, 2022, by default, the policies will be automatically turned on if they're not edited within the set time period (25 days initially for new customers, otherwise 7 days).
+When the simulation is complete, review the results. If you are happy with them, turn on the policies. By default, the policies will be automatically turned on if they're not edited within the set time period (25 days initially for new customers, otherwise 7 days).
For more information about simulation mode, see [Learn about simulation mode](apply-sensitivity-label-automatically.md#learn-about-simulation-mode).
If you want to edit the DLP policy, see [Create and Deploy data loss prevention
## DLP for devices
-The default DLP policy for devices detects the presence of credit card numbers on Windows 10 devices that have been onboarded into Microsoft Purview. It then audits (does not block) the following actions:
+The default DLP policy for devices detects the presence of credit card numbers on Windows 10 devices that have been onboarded into Microsoft Purview. It then audits (but does not block) the following actions:
- Upload to cloud service domains or access by unallowed browsers -- Copy to clipboard, USB, or network share
+- Copy to clipboard, USB, or network share
-- Access by unallowed apps
+- Access by unallowed apps
-- Print
+- Print
-- Copy or move using unallowed Bluetooth app
+- Copy or move using an unallowed Bluetooth app
-- Remote desktop services
+- Remote desktop services
If content contains 10 or more instances of credit cards and one or more of the listed activities is detected, a medium severity alert notification is sent to admins.
compliance Named Entities Learn https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/named-entities-learn.md
f1.keywords:
Previously updated : 07/21/2020 Last updated : 04/25/2023 audience: Admin search.appverid: MET150
Here are some examples of named entity SITs. You can find all of them in [Sensit
## Examples of enhanced DLP policies
-Here are some examples of enhanced DLP policies that use named entity SITs. You can find all 10 of them in the **Microsoft Purview compliance portal > Data loss prevention > Create policy**. Enhanced templates can be used in DLP and auto-labeling.
+Here are some examples of enhanced DLP policies that use named entity SITs. You can find all 10 of them in the **Microsoft Purview compliance portal** Navigate to **Data loss prevention** > **Create policy**. Enhanced templates can be used in DLP and auto-labeling.
|Policy category |Template |Description | ||||
compliance Named Entities Use https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/named-entities-use.md
f1.keywords:
Previously updated : 07/21/2020 Last updated : 04/25/2023 audience: Admin search.appverid: MET150
compliance Ocr Learn About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ocr-learn-about.md
Optical character recognition (OCR) scanning enables Microsoft Purview to scan c
| Phase | What's needed| |-|--| |**Phase 1:** Create Azure subscription if needed | If your organization doesn't already have an Azure pay-as-you-go subscription for your tenant, your Global admin needs to start by creating an [Azure account](/azure/cloud-adoption-framework/ready/azure-best-practices/initial-subscriptions). |
-|**Phase 2:** Set up pay-as-you-go billing to enable OCR. | Your Global or SharePoint admin must follow the instructions in [Configure Microsoft Syntex for pay-as-you-go billing in Azure](/syntex/syntex-azure-billing.md) to add a subscription for OCR. |
+|**Phase 2:** Set up pay-as-you-go billing to enable OCR. | Your Global or SharePoint admin must follow the instructions in [Set up Microsoft Syntex billing in Azure](../syntex/syntex-azure-billing.md#set-up-microsoft-syntex-billing-in-azure) to add a subscription for OCR. |
|**Phase 3:** Configure OCR scanning settings | The Compliance admin for your organization configures the OCR settings for your tenant.|
To use OCR scanning, your organization's Global admin needs to verify that an Az
When you enable OCR, all sensitive information types and trainable classifiers can detect characters that are in images.
-Because it's an optional feature, your Global admin must set up pay-as-you-go billing to enable OCR. Refer to the instructions in [Configure Microsoft Syntex for pay-as-you-go billing in Azure](/syntex/syntex-azure-billing.md) to add a subscription for OCR.
+Because it's an optional feature, your Global admin must set up pay-as-you-go billing to enable OCR. Refer to the instructions in [Set up Microsoft Syntex billing in Azure](../syntex/syntex-azure-billing.md#set-up-microsoft-syntex-billing-in-azure) to add a subscription for OCR.
> [!NOTE] > When you go to the Microsoft Syntex billing page to sign up for your OCR subscription, you do **not** need to also sign up for Microsoft Syntex. >
-> You can find OCR pay-as-you-go pricing information on the [Configure Microsoft Syntex for pay-as-you-go billing in Azure](/microsoft-365/syntex/syntex-azure-billing) page.
+> You can find OCR pay-as-you-go pricing information on the [Set up Microsoft Syntex billing in Azure](../syntex/syntex-azure-billing.md#set-up-microsoft-syntex-billing-in-azure) page.
-#### Charges ####
+#### Charges
The charge for using OCR is $1.00 for every 1,000 items scanned. Each image scanned counts as one transaction. This means that stand-alone images (JPEG, JPG, PNG, BMP, or TIFF) each count as a single transaction. It also means that *each page* in a PDF file is charged separately. For example, if there are 10 pages in a PDF file, an OCR scan of the PDF file counts as 10 separate scans.
compliance Retention Policies Sharepoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-sharepoint.md
f1.keywords:
Previously updated : 04/13/2023 Last updated : 04/26/2023 audience: Admin
To store content that needs to be retained, SharePoint and OneDrive create a Pre
The Preservation Hold library works in the following way to support retention policies and retention labels:
-When a user changes an item that's subject to retention from a retention policy or a retention label that marks items as a record, or deletes any item subject to retention, the original content is copied to the Preservation Hold library. This behavior lets the user to change or delete the content in their app, while keeping a copy of the original for compliance reasons.
+When a user changes an item that's subject to retention from a retention policy or a retention label that marks items as a record, or deletes any item subject to retention, the original content is copied to the Preservation Hold library. This behavior lets the user change or delete the content in their app, while keeping a copy of the original for compliance reasons.
A timer job periodically runs on the Preservation Hold library. For content that has been in the Preservation Hold library for more than 30 days, this job compares the content to all queries used by the retention settings for that content. Content that is older than their configured retention period and isn't awaiting [disposition review](disposition.md) is then deleted from the Preservation Hold library, and from the original location if it is still there. This timer job runs every seven days, which means that together with the minimal 30 days, it can take up to 37 days for content to be deleted from the Preservation Hold library.
When the retention settings are retain-only, or delete-only, the contents paths
## How retention works with cloud attachments
-Cloud attachments are embedded links to files that users share, and these can be retained and deleted when your users share them in Outlook emails and Teams messages. When you [automatically apply a retention label to cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments), the retention label is applied to a copy of the shared file, which is stored in the Preservation Hold library.
+Cloud attachments are embedded links to files that users share, and these can be retained and deleted when your users share them in Outlook emails and Teams or Yammer messages. When you [automatically apply a retention label to cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments), the retention label is applied to a copy of the shared file, which is stored in the Preservation Hold library.
For this scenario, we recommend you configure the label setting to start the retention period based on when the item is labeled. If you do configure the retention period based on when the item is created or last modified, this date is taken from the original file at the time of sharing. If you configure the start of retention to be when last modified, this setting has no effect for this copy in the Preservation Hold library.
compliance Sensitive Information Type Learn About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitive-information-type-learn-about.md
f1.keywords:
Previously updated : 07/21/2020 Last updated : 04/25/2023 audience: Admin search.appverid: MET150
Identifying and classifying sensitive items that are under your organization's c
- automated pattern recognition, like sensitive information types - [machine learning](classifier-learn-about.md)
-Sensitive information types (SIT) are pattern-based classifiers. They detect sensitive information like social security, credit card, or bank account numbers to identify sensitive items, see [Sensitive information types entity definitions](sensitive-information-type-entity-definitions.md) for a complete list of all SITs.
+Sensitive information types (SIT) are pattern-based classifiers. They detect sensitive information like social security, credit card, or bank account numbers to identify sensitive items, see [Sensitive information type entity definitions](sensitive-information-type-entity-definitions.md) for a complete list of all SITs.
Microsoft provides a large number of pre-configured SITs or you can create your own.
Microsoft provides a large number of pre-configured SITs or you can create your
### Built in sensitive information types
-These SITs are created by Microsoft show up in the compliance console by default. These SITs cannot be edited, but they can be used as templates and copied to create custom sensitive information types. See, [Sensitive information type entity definitions](sensitive-information-type-entity-definitions.md) for a full listing of all SITs.
+These SITs are created by Microsoft and show up in the compliance console by default. These SITs can't be edited, but you can use them as templates by copying them to create custom sensitive information types. See, [Sensitive information type entity definitions](sensitive-information-type-entity-definitions.md) for a full list of all SITs.
### Named entity sensitive information types
Named entity SITs also show up in the compliance console by default. They detect
**un-bundled**
-These named entity SITs have a narrower focus, like a single country, or a single class of terms. Use them when you need a DLP policy with a narrower detection scope. See, [Examples of named entity SITs](named-entities-learn.md#examples-of-named-entity-sits).
+These named entity SITs have a narrower focus, such as a single country, or a single class of terms. Use them when you need a DLP policy with a narrower detection scope. See, [Examples of named entity SITs](named-entities-learn.md#examples-of-named-entity-sits).
**bundled**
-Bundled named entity SITs detect all possible matches in a class, like All physical addresses. Use them as broad criteria in your DLP policies for detecting sensitive items. See, [Examples of named entity SITs](named-entities-learn.md#examples-of-named-entity-sits).
+Bundled named entity SITs detect all possible matches in a class, such as *All physical addresses*. Use them as broad criteria in your DLP policies for detecting sensitive items. See, [Examples of named entity SITs](named-entities-learn.md#examples-of-named-entity-sits).
### Custom sensitive information types
If the pre-configured sensitive information types don't meet your needs, you can
### Exact data match sensitive information types
-All EDM-based SITs are created from scratch. You use them to detect items that have exact values which you define in a database of sensitive information. See, [Learn about exact data match based sensitive information types](sit-learn-about-exact-data-match-based-sits.md#learn-about-exact-data-match-based-sensitive-information-types) for more information.
+All exact data match (EDM)-based SITs are created from scratch. You use them to detect items that have exact values which you define in a database of sensitive information. See, [Learn about exact data match based sensitive information types](sit-learn-about-exact-data-match-based-sits.md#learn-about-exact-data-match-based-sensitive-information-types) for more information.
## Fundamental parts of a sensitive information type Every sensitive information type entity is defined by these fields: -- name: how the sensitive information type is referred to-- description: describes what the sensitive information type is looking for-- pattern: A pattern defines what a sensitive information type detects. It consists of the following components.
- - Primary element ΓÇô The main element that the sensitive information type is looking for. It can be a **regular expression** with or without a checksum validation, a **keyword list**, a **keyword dictionary**, or a **function**.
- - Supporting element ΓÇô Elements that act as supporting evidence that help in increasing the confidence of the match. For example, keyword "SSN" in proximity to an SSN number. It can be a regular expression with or without a checksum validation, keyword list, keyword dictionary.
- - Confidence Level - Confidence levels (high, medium, low) reflect how much supporting evidence was detected along with the primary element. The more supporting evidence an item contains, the higher the confidence that a matched item contains the sensitive info you're looking for.
- - Proximity ΓÇô Number of characters between primary and supporting element.
+- Name: indicates how the sensitive information type is referred to
+- Description: describes what the sensitive information type is looking for
+- Pattern: A pattern defines what a sensitive information type detects. It consists of the following components.
+ - Primary element ΓÇô the main element that the sensitive information type is looking for. It can be a **regular expression** with or without a checksum validation, a **keyword list**, a **keyword dictionary**, or a **function**.
+ - Supporting element ΓÇô an element that acts as supporting evidence that help in increasing the confidence of the match. For example, keyword "SSN" in proximity to a Social Security Number (SSN). It can be a regular expression with or without a checksum validation, keyword list, keyword dictionary.
+ - Confidence Level - confidence levels (high, medium, low) reflect how much supporting evidence is detected along with the primary element. The more supporting evidence an item contains, the higher the confidence that a matched item contains the sensitive info you're looking for.
+ - Proximity ΓÇô the number of characters between the primary and supporting elements.
![Diagram of corroborative evidence and proximity window.](../media/dc68e38e-dfa1-45b8-b204-89c8ba121f96.png)
You can choose from several options to create custom sensitive information types
> > - For example, to detect a keyword like "机密的document", use two variants of the keyword; one with a space between the Japanese and English text and another without a space between the Japanese and English text. So, the keywords to be added in the SIT should be "机密的 document" and "机密的document". Similarly, to detect a phrase "東京オリンピック2020", two variants should be used; "東京オリンピック 2020" and "東京オリンピック2020". >
-> Along with Chinese/Japanese/double byte characters, if the list of keywords/phrases also contain non Chinese/Japanese words also (like English only), you should create two dictionaries/keyword lists. One for keywords containing Chinese/Japanese/double byte characters and another one for English only.
+> Along with Chinese/Japanese/double byte characters, if the list of keywords/phrases also contains non-Chinese/Japanese words also (for instance, English only), you should create two dictionaries/keyword lists. One for keywords containing Chinese/Japanese/double byte characters and another one for English-only keywords.
> > - For example, if you want to create a keyword dictionary/list with three phrases "Highly confidential", "機密性が高い" and "机密的document", the you should create two keyword lists. > 1. Highly confidential > 2. 機密性が高い, 机密的document and 机密的 document >
-> While creating a regex using a double byte hyphen or a double byte period, make sure to escape both the characters like one would escape a hyphen or period in a regex. Here is a sample regex for reference:
+> While creating a regex using a double byte hyphen or a double byte period, make sure to escape both the characters like you would escape a hyphen or period in a regex. Here is a sample regex for reference:
> > `(?<!\d)([4][0-9]{3}[\-?\-\t]*[0-9]{4}` >
compliance Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/whats-new.md
f1.keywords:
Previously updated : 04/20/2023 Last updated : 04/26/2023 audience: Admin
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
### Data lifecycle management and records management - **In preview**: Scan for sensitive information in images with support for [optical character recognition](ocr-learn-about.md) when you use auto-apply retention label policies.
+- **In preview**: Auto-labeling retention policies for [cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments) that were already in preview now include attachments and links shared in Yammer.
### Data loss prevention -- **In preview**: Scan for sensitive information in images with support for [optical character recognition](ocr-learn-about.md)
+- **In preview**: Scan for sensitive information in images with support for [optical character recognition](ocr-learn-about.md).
+- **In preview**: Save a copy of items that match DLP policies to Azure storage [Learn about evidence collection for file activities on devices (preview)](dlp-copy-matched-items-learn.md) and [Get started with collecting files that match data loss prevention policies from devices (preview)](dlp-copy-matched-items-get-started.md).
### Insider risk management
enterprise Portallaunchscheduler https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/PortalLaunchScheduler.md
Title: Launch your portal using the Portal launch scheduler -+ Last updated 11/11/2020 audience: Admin
Formerly, portal launches could only be scheduled through SharePoint PowerShell.
1. Before using the Portal launch scheduler tool, [add all users who will need access to this site](https://support.microsoft.com/office/share-a-site-958771a8-d041-4eb8-b51c-afea2eae3658) through **Site permissions** as a Site owner, Site member, or Visitor.
-2. Then, start scheduling your portal's launch by accessing the Portal launch scheduler in one of two ways:
+1. Then, start scheduling your portal's launch by accessing the Portal launch scheduler in one of two ways:
**Option 1**: The first few times you edit and republish changes to your home page - or up until home page version 3.0 - you will be prompted to use the Portal launch scheduler tool. Select **Schedule launch** to move forward with scheduling. Or select **Republish** to republish your page edits without scheduling the launch.
Formerly, portal launches could only be scheduled through SharePoint PowerShell.
![Image of the Settings pane with Schedule a site launch highlighted.](../media/portal-launch-settings-2.png)
-3. Next, confirm the portal's health score and make improvements to the portal if needed using the [Page Diagnostics for SharePoint](https://aka.ms/perftool) tool until your portal receives a **Healthy** score. Then, select **Next**.
+1. Next, confirm the portal's health score and make improvements to the portal if needed using the [Page Diagnostics for SharePoint](https://aka.ms/perftool) tool until your portal receives a **Healthy** score. Then, select **Next**.
![Image of the Portal launch scheduler tool.](../media/portal-launch-panel-2.png) > [!NOTE] > The site name and description can't be edited from the Portal launch scheduler and instead can be changed by selecting **Settings** and then **Site information** from the home page.
-4. Select the **Number of expected users** from the drop-down. This figure represents the number of users who will most likely need access to the site. The Portal launch scheduler will automatically determine the ideal number of waves depending on the expected users like this:
+1. Select the **Number of expected users** from the drop-down. This figure represents the number of users who will most likely need access to the site. The Portal launch scheduler will automatically determine the ideal number of waves depending on the expected users like this:
- Less than 10k users: Two waves - 10k to 30k users: Three waves - 30k+ to 100k users: Five waves - More than 100k users: Five waves and contact Microsoft support via the steps listed in Launch portal with over 100k users section.
-5. Then, determine the **Type of redirect** needed:
+1. Then, determine the **Type of redirect** needed:
**Option 1: Send users to an existing SharePoint page (bidirectional)** ΓÇô Use this option when launching a new modern SharePoint portal to replace an existing SharePoint portal. Users in active waves will be redirected to the new site regardless of whether they navigate to the old or new site. Users in a non-launched wave that try to access the new site will be redirected back to the old site until their wave is launched.
Formerly, portal launches could only be scheduled through SharePoint PowerShell.
**Option 3: Send users to an external page** ΓÇô Provide an external URL to a temporary landing page experience until the user's wave is launched.
-6. Break up your audience into waves. Add up to 20 security groups per wave. Wave details can be edited up until the launch of each wave. Each wave can last at minimum one day (24 hours) and at most seven days. This allows SharePoint and your technical environment an opportunity to acclimate and scale to the large volume of site users. When scheduling a launch through the UI, the time zone is based on the site's regional settings.
+1. Break up your audience into waves. Add up to 20 security groups per wave. Wave details can be edited up until the launch of each wave. Each wave can last at minimum one day (24 hours) and at most seven days. This allows SharePoint and your technical environment an opportunity to acclimate and scale to the large volume of site users. When scheduling a launch through the UI, the time zone is based on the site's regional settings.
> [!NOTE] > > - The Portal launch scheduler will automatically default to a minimum of 2 waves. However, the PowerShell version of this tool will allow for 1 wave. > - Microsoft 365 groups are not supported by this version of the Portal launch scheduler.
-7. Determine who needs to view the site right away and enter their information into the **Users exempt from waves** field. These users are excluded from waves and will not be redirected before, during, or after the launch.
+1. Determine who needs to view the site right away and enter their information into the **Users exempt from waves** field. These users are excluded from waves and will not be redirected before, during, or after the launch.
>[!NOTE] > Up to 50 distinct users or security groups max can be added. Use security groups when you need more than 50 individuals to get access to the portal before the waves start launching.
-8. Confirm portal launch details and select **Schedule**. Once the launch has been scheduled, any changes to the SharePoint portal home page will need to receive a healthy diagnostic result before the portal launch will resume.
+1. Confirm portal launch details and select **Schedule**. Once the launch has been scheduled, any changes to the SharePoint portal home page will need to receive a healthy diagnostic result before the portal launch will resume.
### Launch a portal with over 100k users
If you are planning to launch a portal with over 100,000 users, submit a support
[Launch SharePoint Portal with 100k users](https://admin.microsoft.com/AdminPortal/?searchSolutions=Launch%20SharePoint%20Portal%20with%20100k%20users)
-2. At the bottom of the pane, select **Contact Support**, and then select **New Service Request**.
+1. At the bottom of the pane, select **Contact Support**, and then select **New Service Request**.
-3. Under **Description**, enter "Launch SharePoint Portal with 100k users".
+1. Under **Description**, enter "Launch SharePoint Portal with 100k users".
-4. Fill out the remaining info, and select **Contact me**.
+1. Fill out the remaining info, and select **Contact me**.
-5. After the ticket has been created, ensure you provide the support agent with the following information:
+1. After the ticket has been created, ensure you provide the support agent with the following information:
- Portal URL - Number of users expected - Estimated launch schedule (detailing the wave sizes)
If you are planning to launch a portal with over 100,000 users, submit a support
Launch details can be edited for each wave up until the date of the wave's launch. 1. To edit portal launch details, navigate to **Settings** and select **Schedule site launch**.
-2. Then, select **Edit**.
-3. When you are finished making your edits, select **Update**.
+1. Then, select **Edit**.
+1. When you are finished making your edits, select **Update**.
## Delete a scheduled portal launch
Launches scheduled using the Portal launch scheduler tool can be canceled, or de
1. To cancel your portal's launch, navigate to **Settings** and **Schedule site launch**.
-2. Then, select **Delete** and then when you see the message below select **Delete** again.
+1. Then, select **Delete** and then when you see the message below select **Delete** again.
![Image of the prompt that asks if you want to delete or keep a scheduled launch.](../media/portal-launch-delete-2.png)
The SharePoint Portal launch scheduler tool was originally only available via [S
> > On the Download Center page, select your language and then click the Download button. You'll be asked to choose between downloading a x64 and x86 .msi file. Download the x64 file if you're running the 64-bit version of Windows or the x86 file if you're running the 32-bit version. If you don't know, see [Which version of Windows operating system am I running?](https://support.microsoft.com/help/13443/windows-which-operating-system). After the file downloads, run it and follow the steps in the Setup Wizard.
-2. Connect to SharePoint as a [global admin or SharePoint admin](/sharepoint/sharepoint-admin-role) in Microsoft 365. To learn how, see [Getting started with SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
+1. Connect to SharePoint as a [global admin or SharePoint admin](/sharepoint/sharepoint-admin-role) in Microsoft 365. To learn how, see [Getting started with SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
### View any existing portal launch setups To see if there are existing portal launch configurations:
- ```PowerShell
- Get-SPOPortalLaunchWaves -LaunchSiteUrl <object> -DisplayFormat <object>
- ```
+```PowerShell
+Get-SPOPortalLaunchWaves -LaunchSiteUrl <object> -DisplayFormat <object>
+```
### Schedule a portal launch on the site
Temporary page redirection should be used when no existing SharePoint portal exi
[Planning your portal launch roll-out plan in SharePoint Online](./planportallaunchroll-out.md) [Plan your communication site](https://support.microsoft.com/office/plan-your-sharepoint-communication-site-35d9adfe-d5cc-462f-a63a-bae7f2529182)+
enterprise Add Several Users At The Same Time https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/add-several-users-at-the-same-time.md
Title: "Add several users at the same time to Microsoft 365 - Admin Help" -+ Last updated 08/10/2020 audience: Admin
enterprise Additional Network Security Requirements For Office 365 Gcchigh And Dod https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/additional-network-security-requirements-for-office-365-gcchigh-and-dod.md
Title: "Additional network security requirements for Office 365 GCC High and DoD" -+ Last updated 05/19/2020 audience: ITPro
For security and compliance reasons, keep in mind the following restrictions on
* We **cannot** accommodate requests to allow access to commercial cloud services (commercial Office 365, Google G-Suite, Amazon Web Services, etc.) Once your request has been received and approved by Microsoft, there's a three-week SLA for implementation and canΓÇÖt be expedited. You'll receive an initial acknowledgment when weΓÇÖve received your request and a final acknowledgment once it has been completed.+
enterprise Dns Records For Office 365 Dod https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/dns-records-for-office-365-dod.md
Title: "DNS records for Office 365 DoD" -+ Last updated 05/19/2020 audience: ITPro
For example, if your tenant name is contoso.onmicrosoft.us, youΓÇÖd use **contos
> [!IMPORTANT] > If you have an existing *msoid* CNAME record in your DNS zone, you must **remove** the record from DNS at this time. The msoid record is incompatible with Microsoft 365 Enterprise Apps *(formerly Office 365 ProPlus)* and will prevent activation from succeeding.+
enterprise Dns Records For Office 365 Gcc High https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/dns-records-for-office-365-gcc-high.md
Title: "DNS records for Office 365 GCC High" -+ Last updated 05/19/2020 audience: ITPro
For example, if your tenant name is contoso.onmicrosoft.us, youΓÇÖd use **contos
> [!IMPORTANT] > If you have an existing *msoid* CNAME record in your DNS zone, you must **remove** the record from DNS at this time. The msoid record is incompatible with Microsoft 365 Enterprise Apps *(formerly Office 365 ProPlus)* and will prevent activation from succeeding.+
enterprise Move Sharepoint Between Geo Locations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/move-sharepoint-between-geo-locations.md
- Title: Move a SharePoint site to a different geo location- Previously updated : 08/10/2020-------- Strat_SP_gtc-- SPO_Content-- NOCSH
-description: Learn how to move a SharePoint site to a different geo location within your multi-geo environment and communicate expectations of the changes to your users.
---
-# Move a SharePoint site to a different geo location
-
-With SharePoint site geo move, you can move SharePoint sites to other geo locations within your multi-geo environment.
-
-The following types of site can be moved between geo locations:
--- Microsoft 365 group-connected sites, including those sites associated with Microsoft Teams-- Modern sites without a Microsoft 365 group association-- Classic SharePoint sites-- Communication sites-
-You must be a Global Administrator or SharePoint Administrator to move a site between geo locations.
-
-There is a read-only window during the SharePoint site geo move of approximately 4-6 hours, depending on site-contents.
-
-## Best practices
--- Try a SharePoint site move on a test site to get familiar with the procedure.-- Validate whether the site can be moved prior to scheduling or performing the move.-- When possible schedule cross-geo sites moves for outside business hours to reduce user impact.-- Communicate with impacted users prior to the sites move.-
-## Communicating to your users
-
-When moving SharePoint sites between geo locations, it's important to communicate to the sites' users (generally anyone with the ability to edit the site) what to expect. This can help reduce user confusion and calls to your help desk. Email your sites' users before the move and let them know the following information:
--- When the move is expected to start and how long it is expected to take-- What geo location their site is moving to, and the URL to access the new location-- They should close their files and not make edits during the move.-- File permissions and sharing will not change because of the move.-- What to expect from the user experience in a multi-geo environment-
-Be sure to send your sites' users an email when the move has successfully completed informing them that they can resume working on their sites.
-
-## Scheduling SharePoint site moves
-
-You can schedule SharePoint site moves in advance (described later in this article). You can schedule moves as follows:
--- You can schedule up to 4,000 moves at a time.-- As the moves begin, you can schedule more, with a maximum of 4,000 pending moves in the queue and any given time.-- The maximum size of a SharePoint site that can be moved is 2 terabytes (2 TB).-
-To schedule a SharePoint site geo move for a later time, include one of the following parameters when you start the move:
--- `PreferredMoveBeginDate` ΓÇô The move will likely begin at this specified time.-- `PreferredMoveEndDate` ΓÇô The move will likely be completed by this specified time, on a best effort basis.-
-Time must be specified in Coordinated Universal Time (UTC) for both parameters.
-
-## Moving the site
-
-SharePoint site geo move requires that you connect and perform the move from the SharePoint Admin URL in the geo location where the site is.
-
-For example, if the site URL is `https://contosohealthcare.sharepoint.com/sites/Turbines`, connect to the SharePoint Admin URL at `https://contosohealthcare-admin.sharepoint.com`:
-
-```powershell
-Connect-SPOService -Url https://contosohealthcare-admin.sharepoint.com
-```
-
-![SharePoint Online Management Shell window showing the Connect-SPOService command.](../media/move-onedrive-between-geo-locations-image1.png)
-
-### Validating the environment
-
-We recommend that before scheduling any site move, you perform a validation to ensure that the site can be moved.
-
-We do not support moving sites with:
--- Business Connectivity Services-- InfoPath forms-- Information Rights Management (IRM) templates applied-
-To ensure all geo locations are compatible, run `Get-SPOGeoMoveCrossCompatibilityStatus`. This will display all your geo locations and whether the environment is compatible with the destination geo location. If a geo location is incompatible, that means an update is in progress in that location. Try again in a few days.
-
-To perform a validation-only check on your site, use `Start-SPOSiteContentMove` with the `-ValidationOnly` parameter to validate if the site is able to be moved. For example:
-
-```PowerShell
-Start-SPOSiteContentMove -SourceSiteUrl <SourceSiteUrl> -ValidationOnly -DestinationDataLocation <DestinationLocation>
-```
-
-This will return *Success* if the site is ready to be moved or *Fail* if any of blocked conditions are present.
-
-### Start a SharePoint site geo move for a site with no associated Microsoft 365 group
-
-By default, initial URL for the site will change to the URL of the destination geo location. For example:
-
-`https://Contoso.sharepoint.com/sites/projectx` to `https://ContosoEUR.sharepoint.com/sites/projectx`
-
-For sites with no Microsoft 365 group association, you can also rename the site by using the `-DestinationUrl` parameter. For example:
-
-<https://Contoso.sharepoint.com/sites/projectx> to `https://ContosoEUR.sharepoint.com/sites/projecty`
-
-To start the site move, run:
-
-```powershell
-Start-SPOSiteContentMove -SourceSiteUrl <siteURL> -DestinationDataLocation <DestinationDataLocation> -DestinationUrl <DestinationSiteURL>
-```
-
-![Screenshot of PowerShell window showing Start-SPOSiteContentMove cmdlet.](../media/multi-geo-sharepoint-site-move-powershell.png)
-
-### Start a SharePoint site geo move for a Microsoft 365 group-connected site
-
-To move a Microsoft 365 group-connected site, the Global Administrator or SharePoint Administrator must first change the Preferred Data Location (PDL) attribute for the Microsoft 365 group.
-
-To set the PDL for a Microsoft 365 group:
-
-```PowerShell
-Set-SPOUnifiedGroup -PreferredDataLocation <PDL> -GroupAlias <GroupAlias>
-Get-SPOUnifiedGroup -GroupAlias <GroupAlias>
-```
-
-Once you have updated the PDL, you can start the site move:
-
-```PowerShell
-Start-SPOUnifiedGroupMove -GroupAlias <GroupAlias> -DestinationDataLocation <DestinationDataLocation>
-```
-
-## Cancel a SharePoint site geo move
-
-You can stop a SharePoint site geo move, provided the move is not in progress or completed by using the `Stop-SPOSiteContentMove` cmdlet.
-
-## Determining the status of a SharePoint site geo move
-
-You can determine the status of a site move in our out of the geo that you are connected to by using the following cmdlets:
--- [Get-SPOSiteContentMoveState](/powershell/module/sharepoint-online/get-spositecontentmovestate) (non-Group-connected sites)-- [Get-SPOUnifiedGroupMoveState](/powershell/module/sharepoint-online/get-spounifiedgroupmovestate) (Group-connected sites)-
-Use the `-SourceSiteUrl` parameter to specify the site for which you want to see move status.
-
-The move statuses are described in the following table.
-
-****
-
-|Status|Description|
-|||
-|Ready to Trigger|The move has not started.|
-|Scheduled|The move is in queue but has not yet started.|
-|InProgress (n/4)|The move is in progress in one of the following states: Validation (1/4), Back up (2/4), Restore (3/4), Cleanup (4/4).|
-|Success|The move has completed successfully.|
-|Failed|The move failed.|
-|
-
-You can also apply the `-Verbose` option to see additional information about the move.
-
-## User experience
-
-Site users should notice minimal disruption when their site is moved to a different geo location. Aside from a brief read-only state during the move, existing links and permissions will continue to work as expected once the move is completed.
-
-### Site
-
-While the move is in progress, the site is set to read-only. Once the move is completed, the user is directed to the new site in the new geo location when they click on bookmarks or other links to the site.
-
-### Permissions
-
-Users with permissions to site will continue to have access to the site during the move and after it's complete.
-
-### Sync app
-
-The sync app will automatically detect and seamlessly transfer syncing to the new site location once the site move is complete. The user does not need to sign in again or take any other action. (Version 17.3.6943.0625 or later of the sync app required.)
-
-If a user updates a file while the move is in progress, the sync app will notify them that file uploads are pending while the move is underway.
-
-### Sharing links
-
-When the SharePoint site geo move completes, the existing shared links for the files that were moved will automatically redirect to the new geo location.
-
-### Most Recently Used files in Office (MRU)
-
-The MRU service is updated with the site url and its content URLs once the move completes. This applies to Word, Excel, and PowerPoint.
-
-### OneNote experience
-
-OneNote win32 client and UWP (Universal) App will automatically detect and seamlessly sync notebooks to the new site location once site move is complete. The user does not need to sign in again or take any other action. The only visible indicator to the user is notebook sync would fail when site move is in progress. This experience is available on the following OneNote client versions:
--- OneNote win32 ΓÇô Version 16.0.8326.2096 (and later)-- OneNote UWP ΓÇô Version 16.0.8431.1006 (and later)-- OneNote Mobile App ΓÇô Version 16.0.8431.1011 (and later)-
-### Teams (applicable to Microsoft 365 group connected sites)
-
-When the SharePoint site geo move completes, users will have access to their Microsoft 365 group site files on the Teams app. Additionally, files shared via Teams chat from their site prior to geo move will continue to work after move is complete.
-
-SharePoint site geo move does not support moving Private Channels from one geo to another. Private channels remain in the original geo.
-
-
-### SharePoint Mobile App (iOS/Android)
-
-The SharePoint Mobile App is cross geo compatible and able to detect the site's new geo location.
-
-### SharePoint workflows
-
-SharePoint 2013 workflows have to be republished after the site move. SharePoint 2010 workflows should continue to function normally.
-
-### Apps
-
-If you are moving a site with apps, you must reinstantiate the app in the site's new geo location as the app and its connections may not be available in the destination geo location.
-
-### Power Automate
-
-In most cases, Power Automate Flows will continue to work after a SharePoint site geo move. We recommend that you test them once the move has completed.
-
-### Power Apps
-
-Power Apps needs to be recreated in the destination location.
-
-### Data movement between geo locations
-
-SharePoint uses Azure Blob Storage for its content, while the metadata associated with sites and its files is stored within SharePoint. After the site is moved from its source geo location to its destination geo location, the service will also move its associated Blob Storage. Blob Storage moves complete in approximately 40 days. This will not have any impact to users interaction with the data.
-
-You can check the Blob Storage move status using the [Get-SPOCrossGeoMoveReport](/powershell/module/sharepoint-online/get-spocrossgeomovereport) cmdlet.
enterprise Office 365 Network Mac Perf Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-insights.md
These are tenant-level network insights that may be shown for the tenant:
These insights also appear in the productivity score pages. - ## Backhauled network egress
-This insight will be displayed if the network insights service detects that the distance from a given user location to the network egress is greater than 500 miles (800 kilometers). This may indicate that Microsoft 365 traffic is being backhauled to a common Internet edge device or proxy.
+This insight displays if the network insights service detects that the distance from a given user location to the network egress is greater than 500 miles (800 kilometers). This may indicate that Microsoft 365 traffic is being backhauled to a common Internet edge device or proxy.
This insight is abbreviated as "Egress" in some summary views.
-> [!div class="mx-imgBorder"]
-> ![Backhauled network egress.](../media/m365-mac-perf/m365-mac-perf-insights-detail-backhauled.png)
### What does this mean?
Details for this insight include:
### What should I do?
-We recommend network egress as close as possible to the office location. Microsoft 365 traffic should route optimally to Microsoft's global network and to the nearest Microsoft 365 service front door. Having close network egress to users office locations also allows for improved performance as Microsoft expands both network points of presence and Microsoft 365 service front doors in the future.
+We recommend network egress as close as possible to the office location. Microsoft 365 traffic should route optimally to Microsoft's global network and to the nearest Microsoft 365 service front door. Having close network egress to users office locations also allows for improved performance as Microsoft expands both network points of presence and Microsoft 365 service front doors in the future.
For more information about how to resolve this issue, see [Egress network connections locally](microsoft-365-network-connectivity-principles.md#egress-network-connections-locally) in [Microsoft 365 Network Connectivity Principles](microsoft-365-network-connectivity-principles.md). ## Network intermediary device
-This insight will be displayed if we detected devices between your users and Microsoft's network. We recommend that latency-sensitive Microsoft 365 network traffic bypass such devices. This recommendation is additionally described in [Microsoft 365 Network Connectivity Principles](microsoft-365-network-connectivity-principles.md).
+This insight displays if we detected devices between your users and Microsoft's network. We recommend that latency-sensitive Microsoft 365 network traffic bypass such devices. This recommendation is additionally described in [Microsoft 365 Network Connectivity Principles](microsoft-365-network-connectivity-principles.md).
-One network intermediary insight we show is SSL break and inspection when critical Microsoft 365 network endpoints for Exchange, SharePoint, and Teams are intercepted and decrypted by network intermediary devices.
+One network intermediary insight we show is SSL break and inspection when network intermediary devices intercept and decrypt critical Microsoft 365 network endpoints for Exchange, SharePoint, and Teams.
### What does this mean?
Configure the network intermediary device that was detected to bypass processing
## Better performance detected for customers near you
-This insight will be displayed if the network insights service detects that a significant number of customers in your metro area have better performance than users at this office location.
+This insight displays if the network insights service detects that a significant number of customers in your metro area have better performance than users at this office location.
This insight is abbreviated as "Peers" in some summary views.
This insight is abbreviated as "Peers" in some summary views.
### What does this mean?
-This insight examines the aggregate performance of Microsoft 365 customers in the same city as this office location. This insight is displayed if the average latency of your users is 10% greater than the average latency of neighboring tenants.
+This insight examines the aggregate performance of Microsoft 365 customers in the same city as this office location. This insight displays if the average latency of your users is 10% greater than the average latency of neighboring tenants.
### What should I do?
There could be many reasons for this condition, including latency in your corpor
## Use of a non-optimal Exchange Online service front door
-This insight will be displayed if the network insights service detects that users in a specific location are not connecting to an optimal Exchange Online service front door.
+This insight displays if the network insights service detects that users in a specific location aren't connecting to an optimal Exchange Online service front door.
This insight is abbreviated as "Routing" in some summary views.
This insight is abbreviated as "Routing" in some summary views.
### What does this mean?
-We list Exchange Online service front doors that are suitable for use from the office location city. If the current test shows use of an Exchange Online service front door not on this list, then we call out this recommendation.
+We list Exchange Online service front doors that are suitable for use from the office location city. If the current test shows use of an Exchange Online service front door not on this list, then we make this recommendation.
### What should I do?
-Use of a non-optimal Exchange Online service front door could be caused by network backhaul, in which case we recommend local and direct network egress. If you have implemented a remote DNS Recursive Resolver server, we recommend aligning the server configuration with the network egress.
+Network backhaul might cause use of a non-optimal Exchange Online service front door, in which case we recommend local and direct network egress. If you have implemented a remote DNS Recursive Resolver server, we recommend aligning the server configuration with the network egress.
## Use of a non-optimal SharePoint Online service front door
-This insight will be displayed if the network insights service detects that users in a specific location are not connecting to the closest SharePoint Online service front door.
+This insight displays if the network insights service detects that users in a specific location aren't connecting to the closest SharePoint Online service front door.
This insight is abbreviated as "Afd" in some summary views.
-> [!div class="mx-imgBorder"]
-> ![Non-optimal SPO front door.](../media/m365-mac-perf/m365-mac-perf-insights-detail-front-door-spo.png)
### What does this mean?
-We identify the SharePoint Online service front door that the test client is connecting to. Then for the office location city we compare that to the expected SharePoint Online service front door for that city. If it doesn't match, then we make this recommendation.
+We identify the SharePoint Online service front door that the test client is connecting to, and then we compare the office location city to the expected SharePoint Online service front door for that city. If the test client service front door and the expected service front door match, we recommend connecting to a SharePoint service front door closer to the office location.
### What should I do?
-Use of a non-optimal SharePoint Online service front door could be caused by network backhaul before the corporate network egress in which case we recommend local and direct network egress. It could also be caused by use of a remote DNS Recursive Resolver server in which case we recommend aligning the DNS Recursive Resolver server with the network egress.
+Network backhaul before the corporate network egress could cause non-optimal SharePoint Online service front door use. If so, try local and direct network egress. Non-optimal SharePoint Online service front door use could also be caused by a remote DNS Recursive Resolver server, in which case we recommend aligning the DNS Recursive Resolver server with the network egress.
## Low download speed from SharePoint front door
-This insight will be displayed if the network insights service detects that bandwidth between the specific office location and SharePoint Online is less than 1 MBps.
+This insight displays if the network insights service detects that bandwidth between the specific office location and SharePoint Online is less than 1 MBps.
This insight is abbreviated as "Throughput" in some summary views.
The download speed that a user can get from SharePoint Online and OneDrive for B
### What should I do?
-To improve download speeds, bandwidth may need to be increased. Alternatively, there may be network congestion between computers at the office location and the SharePoint Online service front door. This condition restricts the download speed available to users even if sufficient bandwidth is available.
+To improve download speeds, your organization might need to increase bandwidth. Alternatively, network congestion might exist between computers at the office location and the SharePoint Online service front door. This condition restricts the download speed available to users even if sufficient bandwidth is available.
## China user optimal network egress
-This insight will be displayed if your organization has users in China connecting to your Microsoft 365 tenant in other geographic locations.
+This insight displays if your organization has users in China connecting to your Microsoft 365 tenant in other geographic locations.
### What does this mean?
-If your organization has private WAN connectivity, we recommend configuring a network WAN circuit from your office locations in China that has network egress to the Internet in any of the following locations:
+If your organization has private WAN connectivity, we recommend configuring a network WAN circuit from your office locations in China that have network egress to the Internet in any of the following locations:
- Hong Kong - Japan
If your organization has private WAN connectivity, we recommend configuring a ne
- Singapore - Malaysia
-Internet egress further away from users than these locations will reduce performance, and egress in China may cause high latency and connectivity issues due to cross-border congestion.
+Internet egress farther away from users than these locations reduces performance, and egress in China may cause high latency and connectivity issues due to cross-border congestion.
### What should I do?
For more information about how to mitigate performance issues related to this in
## Exchange sampled connections affected by connectivity issues
-This insight will show when 50% or more of the sampled connections are affected. The impact is defined by the Exchange assessment being below 60% for each sample.
+This insight shows when 50% or more of the sampled connections are affected. The impact is defined by the Exchange assessment being below 60% for each sample.
### What does this mean?
-This indicates that most of your users are likely experiencing issues with Outlook connecting to Exchange Online. The percentage of samples represents the percentage of users who show below 60 points.
+This insight indicates that most of your users likely experience issues with Outlook connecting to Exchange Online. The percentage of samples represents the percentage of users below 60 points.
### What should I do?
-Enable office location network connectivity visibility if you have not already done so. Identify which offices are affected by poor network connectivity and find ways to improve the network perimeter at each that connects the users to Microsoft's network.
+Enable office location network connectivity visibility if you haven't already done so. Identify which offices are affected by poor network connectivity and find ways to improve the network perimeter at each that connects the users to Microsoft's network.
## SharePoint sampled connections affected by connectivity issues
-This insight will show when 50% or more of the sampled connections are affected. The impact is defined by the SharePoint assessment being below 40% for each sample.
+This insight shows when 50% or more of the sampled connections are affected. The impact is defined by the SharePoint assessment being below 40% for each sample.
### What does this mean?
-This indicates that most of your users are likely experiencing issues with SharePoint and OneDrive. The percentage of samples represents the percentage of users who show below 40 points.
+This insight indicates that most of your users are likely experiencing issues with SharePoint and OneDrive. The percentage of samples represents the percentage of users who show below 40 points.
### What should I do?
-Enable office location network connectivity visibility if you have not already done so. Identify which offices are affected by poor network connectivity and find ways to improve the network perimeter at each that connects the users to Microsoft's network.
+Enable office location network connectivity visibility if you haven't already done so. Identify which offices are affected by poor network connectivity and find ways to improve the network perimeter at each that connects the users to Microsoft's network.
## Related topics
enterprise Tune Exchange Online Performance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/tune-exchange-online-performance.md
Title: "Tune Exchange Online performance" -+ Last updated 12/14/2017 audience: Admin
To improve the speed of migration and reduce your organization's bandwidth const
## General advice - Make certain that DNS lookup for outlook.office.com enters the MS-datacenter at a logical entry location for your location.- - Research mailbox caching and choose the appropriate options (re. caching period, shared mailbox caching, et cetera).- - Keep your Outlook data from passing over VPN connections (to a central office) before it goes over the Internet.- - Be sure your mailbox data adheres to the limitations on folder, and item, amounts. For more information about Exchange migration performance, see [Office 365 migration performance and best practices](https://support.office.com/article/d9acb371-fd6c-4c14-aa8e-db5cbe39aa57).+
enterprise Urls And Ip Address Ranges https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/urls-and-ip-address-ranges.md
Data columns shown are:
- **Ports**: Lists the TCP or UDP ports that are combined with listed IP addresses to form the network endpoint. You may notice some duplication in IP address ranges where there are different ports listed.
+> [!NOTE]
+> Microsoft has begun a long-term transition to providing services from the **cloud.microsoft** namespace to simplify the endpoints managed by our customers. If you are following existing guidance for allowing access to required endpoints as listed below, thereΓÇÖs no further action required from you.
+ [!INCLUDE [Office 365 worldwide endpoints](../includes/office-365-worldwide-endpoints.md)] > [!NOTE]
frontline Ehr Connector Troubleshoot Setup Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/ehr-connector-troubleshoot-setup-configuration.md
This issue can happen in the following scenarios:
Contact your Epic technical specialist to provide the full FHIR base URL.
-### I'm an Epic analyst and I get an "OAUTH2" error from Epic when I try to approve the FHIR URL.
+### I'm an Epic analyst and I get an "OAUTH2" error from Epic when I try to approve the FHIR URL
This issue can occur if the keys aren't set up in the Epic instance or if OAuth configuration isn't completed by Epic. Contact your Epic technical specialist.
-### I'm an Epic analyst and when I try to approve the FHIR URL in the EHR connector configuration portal, I can't sign in to Epic using my Epic credentials.
+### I'm an Epic analyst and when I try to approve the FHIR URL in the EHR connector configuration portal, I can't sign in to Epic using my Epic credentials
Your permissions need to be changed in Epic. Contact your Epic technical specialist to check and update your permissions. ## Can't launch virtual appointments
-### I've set up the EHR connector for the first time and patients are unable to launch a virtual appointment from the patient portal.
+### I've set up the EHR connector for the first time and patients are unable to launch a virtual appointment from the patient portal
Here are some common reasons why you may be experiencing this issue and how to resolve it.
The FHIR base URLs for the test and production environments in Epic are differen
Your organization must have at least one active license for either Microsoft Cloud for Healthcare, Microsoft Teams EHR Connector add-on, or Microsoft Teams EMR connector add-on. For Oracle Health customers, a license is also required for testing.
-### Users get a "Tenant config not found" error when launching a virtual appointment even though all our FHIR base URLs are configured correctly.
+### Users get a "Tenant config not found" error when launching a virtual appointment even though all our FHIR base URLs are configured correctly
This issue can happen if a user accidentally launches the virtual appointment in the EHR production environment by using the test FHIR base URL or vice versa.
To resolve this issue:
## Group visits
-### Group visits aren't working in my organization.
+### Group visits aren't working in my organization
Currently, group visits are only supported in Epic.
Here are some common reasons why you may be experiencing this issue when integra
## Provider experience
-### Providers donΓÇÖt get a Teams notification when patients join a virtual appointment.
+### Providers donΓÇÖt get a Teams notification when patients join a virtual appointment
Often this can be solved by training. When a provider starts the virtual appointment, a temporary notification is displayed to the provider to admit the patient. This notification appears only briefly.
Providers can also select **People** in the meeting controls at the top of the s
## Patient experience
-### Patients are prompted to download the Teams app instead of joining from a web browser. We want patients to join from a web browser without having to install Teams.
+### Patients are prompted to download the Teams app instead of joining from a web browser. We want patients to join from a web browser without having to install Teams
Contact Microsoft Support and open a support ticket for the Teams EHR connector. Indicate in the ticket that the web browser join setting needs to be turned on. This change needs to be done by the Teams EHR connector team.
To avoid this scenario, you can do one of the following actions:
## Admin experience
-### I'm unable to access the EHR connector configuration portal or I can only see existing configurations and can't add new ones.
+### I'm unable to access the EHR connector configuration portal or I can only see existing configurations and can't add new ones
You don't have admin access to the [EHR connector configuration portal](https://ehrconnector.teams.microsoft.com/). As a quick check, see whether you can access the [Teams admin center](https://admin.teams.microsoft.com/). If you can't access the Teams admin center, you don't have admin permissions. Contact an admin in your organization to either grant you admin access or set up the integration in the portal.
-### My organization wants to share the FHIR base URL with other organizations in my network
+### My organization wants to share the EHR Connector integration with other organizations in my network
-If you want to share your FHIR base URL, email us with the FHIR base URL you would like to share at [TeamsForHealthcare](mailto:teamsforhealthcare@service.microsoft.com).
+If you want to share your FHIR base URL, email us with the FHIR base URL you would like to share at [TeamsForHealthcare](mailto:teamsforhealthcare@service.microsoft.com) with the following information:
+
+1. FHIR base URL to be shared
+1. Tenant ID of the parent/initial Microsoft tenant hosting the EHR Connector (such as the main hospital hosting the EHR)
+1. Tenant ID(s) of the new tenant(s) that will share the EHR Connector (such as regional branches, related medical offices or clinics)
## Virtual Desktop Infrastructure (VDI) support
frontline Flw Corp Comms https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/flw-corp-comms.md
Title: Corporate communications with frontline workers description: Learn how you can use Viva Connections and Viva Engage to connect your frontline team to your broader organization. -+ audience: admin
More information about Viva Engage:
## Connect over email with Exchange Online and Outlook Email is a core communication tool for most workplaces. [Set up email with Exchange Online](flw-setup-microsoft-365.md#set-up-email-with-exchange-online) and create mailboxes for your frontline workers and managers so you can send broadcast communications over email. Users must have an F3 license to have an email mailbox.+
frontline Switch From Enterprise To Frontline https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/switch-from-enterprise-to-frontline.md
Title: Changing from a Microsoft 365 E plan to a Microsoft 365 F plan--++
If you're considering switching some of your users from a Microsoft 365 E plan t
E plans are meant for information workers (employees who typically work at a desk) and F plans are meant for frontline workers (employees who are on the go, often on mobile devices, and work directly with customers or the general public). Each plan may continue to evolve over time to become more tailored for information workers and frontline workers respectively. To learn more, see [Understand frontline worker user types and licensing](flw-licensing-options.md).
-YouΓÇÖll get an overview of what to expect when users are switched to an F plan, how to prepare for the change, and what to do after switching plans to transition the frontline workers in your organization.
+You'll get an overview of what to expect when users are switched to an F plan, how to prepare for the change, and what to do after switching plans to transition the frontline workers in your organization.
## Understand the key differences between E and F plans
Start by getting familiar with the service and feature differences between the p
Some key differences include: -- F plans donΓÇÖt include Office desktop apps or the Outlook desktop app.
+- F plans don't include Office desktop apps or the Outlook desktop app.
- F plans are limited to devices with integrated screens smaller than 10.9 inches on Office mobile apps. - F plans [pin frontline worker apps](pin-teams-apps-based-on-license.md) like Walkie Talkie, Tasks, Shifts, and Approvals by default in Microsoft Teams.
-In this section, we've included more information about these key differences and highlighted some additional differences to pay attention to. Keep in mind that this isnΓÇÖt a comprehensive list. To learn more:
+In this section, we've included more information about these key differences and highlighted some additional differences to pay attention to. Keep in mind that this isn't a comprehensive list. To learn more:
-- See [Modern work plan comparison](https://go.microsoft.com/fwlink/p/?linkid=2139145) for a detailed comparison of whatΓÇÖs included in E and F plans.
+- See [Modern work plan comparison](https://go.microsoft.com/fwlink/p/?linkid=2139145) for a detailed comparison of what's included in E and F plans.
- See [service availability](/office365/servicedescriptions/office-365-platform-service-description/office-365-plan-options#service-availability-within-each-microsoft-365-and-office-365-plan) and [feature availability across plans](/office365/servicedescriptions/office-365-platform-service-description/office-365-platform-service-description#feature-availability-across-some-plans) for a list of service and feature availability across E and F plans. ### Office apps
Here's some differences to be aware when using Office for the web. For a detaile
|Service or feature|Some differences |Learn more| ||||
-|**Word for the web**|<ul><li> Can open and edit macro-enabled documents (.docm) and templates (.dotm) but macros donΓÇÖt run.</li><li>Can open but not edit User Defined Permission (UDP) Information Rights Management (IRM)-protected documents.</li></ul>|<ul><li>[Word for the web service description](/office365/servicedescriptions/office-online-service-description/word-online)</li><li>[Differences between using a document in the browser and in Word](https://support.microsoft.com//office/differences-between-using-a-document-in-the-browser-and-in-word-3e863ce3-e82c-4211-8f97-5b33c36c55f8)</li></ul>|
-|**Excel for the web**|<ul><li>Can open and edit macro-enabled workbooks (.xlsm) but macros donΓÇÖt run.</li><li>[File size limitations](https://support.microsoft.com/office/file-size-limits-for-workbooks-in-sharepoint-9e5bc6f8-018f-415a-b890-5452687b325e)<ul><li>To view or interact with a workbook stored in SharePoint Online, the workbook must be less than 100 MB. </li><li>To open a workbook thatΓÇÖs attached to an email message in Outlook on the web, the workbook must be less than 10 MB.</li></ul></ul>|<ul><li>[Excel for the web service description](/office365/servicedescriptions/office-online-service-description/excel-online)</li><li>[Differences between using a workbook in the browser and in Excel](https://support.microsoft.com/office/differences-between-using-a-workbook-in-the-browser-and-in-excel-f0dc28ed-b85d-4e1d-be6d-5878005db3b6)</li><li>Most Excel functions work in a browser as they do in Excel. For a list of exceptions, see [Functions in Excel and in Excel for the web](https://support.microsoft.com/office/differences-between-using-a-workbook-in-the-browser-and-in-excel-f0dc28ed-b85d-4e1d-be6d-5878005db3b6#__functions).</li></ul>|
-|**OneNote for the web**|<ul><li>Search is limited to the current section.</li><li>Zoom in and out isnΓÇÖt available. Instead, users can use their browserΓÇÖs zoom feature.</li></ul>|<ul><li>[OneNote for the web service description](/office365/servicedescriptions/office-online-service-description/onenote-online)</li><li>[Differences between using a notebook in the browser and in OneNote](https://support.microsoft.com/office/differences-between-using-a-notebook-in-the-browser-and-in-onenote-a3d1fc13-ac74-456b-b391-b633a62aa83f)</li></ul>|
-|**PowerPoint for the web**|<ul><li>Can open files up to 2 GB.</li><li>Can open and edit macro-enabled presentations (.pptm, .potm, .ppsm) but macros donΓÇÖt run.</li></ul>|<ul><li>[PowerPoint for the web service description](/office365/servicedescriptions/office-online-service-description/powerpoint-online)</li><li>[How certain features behave in web-based PowerPoint](https://support.microsoft.com/office/how-certain-features-behave-in-web-based-powerpoint-a931f0c8-1305-4428-8f7c-9cfa00ef28c5)</li></ul>|
+|**Word for the web**|<ul><li> Can open and edit macro-enabled documents (.docm) and templates (.dotm) but macros don't run.</li><li>Can open but not edit User Defined Permission (UDP) Information Rights Management (IRM)-protected documents.</li></ul>|<ul><li>[Word for the web service description](/office365/servicedescriptions/office-online-service-description/word-online)</li><li>[Differences between using a document in the browser and in Word](https://support.microsoft.com//office/differences-between-using-a-document-in-the-browser-and-in-word-3e863ce3-e82c-4211-8f97-5b33c36c55f8)</li></ul>|
+|**Excel for the web**|<ul><li>Can open and edit macro-enabled workbooks (.xlsm) but macros don't run.</li><li>[File size limitations](https://support.microsoft.com/office/file-size-limits-for-workbooks-in-sharepoint-9e5bc6f8-018f-415a-b890-5452687b325e)<ul><li>To view or interact with a workbook stored in SharePoint Online, the workbook must be less than 100 MB. </li><li>To open a workbook that's attached to an email message in Outlook on the web, the workbook must be less than 10 MB.</li></ul></ul>|<ul><li>[Excel for the web service description](/office365/servicedescriptions/office-online-service-description/excel-online)</li><li>[Differences between using a workbook in the browser and in Excel](https://support.microsoft.com/office/differences-between-using-a-workbook-in-the-browser-and-in-excel-f0dc28ed-b85d-4e1d-be6d-5878005db3b6)</li><li>Most Excel functions work in a browser as they do in Excel. For a list of exceptions, see [Functions in Excel and in Excel for the web](https://support.microsoft.com/office/differences-between-using-a-workbook-in-the-browser-and-in-excel-f0dc28ed-b85d-4e1d-be6d-5878005db3b6#__functions).</li></ul>|
+|**OneNote for the web**|<ul><li>Search is limited to the current section.</li><li>Zoom in and out isn't available. Instead, users can use their browser's zoom feature.</li></ul>|<ul><li>[OneNote for the web service description](/office365/servicedescriptions/office-online-service-description/onenote-online)</li><li>[Differences between using a notebook in the browser and in OneNote](https://support.microsoft.com/office/differences-between-using-a-notebook-in-the-browser-and-in-onenote-a3d1fc13-ac74-456b-b391-b633a62aa83f)</li></ul>|
+|**PowerPoint for the web**|<ul><li>Can open files up to 2 GB.</li><li>Can open and edit macro-enabled presentations (.pptm, .potm, .ppsm) but macros don't run.</li></ul>|<ul><li>[PowerPoint for the web service description](/office365/servicedescriptions/office-online-service-description/powerpoint-online)</li><li>[How certain features behave in web-based PowerPoint](https://support.microsoft.com/office/how-certain-features-behave-in-web-based-powerpoint-a931f0c8-1305-4428-8f7c-9cfa00ef28c5)</li></ul>|
#### Office mobile
For more information about the features that are available in Office mobile, see
F3 users have a 2 GB mailbox that they can access through Outlook on the web. For a feature comparison between Outlook on the web and the Outlook desktop app, see [Compare Outlook for PC, Outlook on the web, and Outlook for iOS & Android](https://support.microsoft.com/office/compare-outlook-for-pc-outlook-on-the-web-and-outlook-for-ios-android-b26a7bf5-0ac7-48ba-97af-984e0645dde5).
-F1 users donΓÇÖt have mailbox rights. Although a mailbox is provisioned for users through the Exchange Kiosk plan, they arenΓÇÖt entitled to use it. We recommend that you [disable Outlook on the web](/exchange/recipients-in-exchange-online/manage-user-mailboxes/enable-or-disable-outlook-web-app) for F1 users.
+F1 users don't have mailbox rights. Although a mailbox is provisioned for users through the Exchange Kiosk plan, they aren't entitled to use it. We recommend that you [disable Outlook on the web](/exchange/recipients-in-exchange-online/manage-user-mailboxes/enable-or-disable-outlook-web-app) for F1 users.
|Service or feature|Microsoft 365 E3/E5|Microsoft 365 F3|Microsoft 365 F1| |||||
F1 users donΓÇÖt have mailbox rights. Although a mailbox is provisioned for user
|Archive mailbox|Yes|No|No| |Delegate access|Yes|No|No|
-&sup1;F1 includes the Exchange Kiosk plan to enable Teams calendar only and doesnΓÇÖt include mailbox rights.
+&sup1;F1 includes the Exchange Kiosk plan to enable Teams calendar only and doesn't include mailbox rights.
To learn more, see [Exchange Online service description](/office365/servicedescriptions/exchange-online-service-description/exchange-online-service-description). #### Teams
-F3 and F1 plans include the Teams desktop app, mobile app, and web app for frontline worker communication and collaboration. Your frontline workers have access to Teams features including meetings, chat, channels, content, and apps. However, they wonΓÇÖt be able to create live events and webinars or use Teams Phone capabilities.
+F3 and F1 plans include the Teams desktop app, mobile app, and web app for frontline worker communication and collaboration. Your frontline workers have access to Teams features including meetings, chat, channels, content, and apps. However, they won't be able to create live events and webinars or use Teams Phone capabilities.
|Service or feature|Microsoft 365 E3/E5|Microsoft 365 F3|Microsoft 365 F1| |||||
F3 and F1 users have 2 GB of OneDrive storage to store and share files. To learn
|Delve|Yes|No|No| &sup1;Up to 5 TB of initial OneDrive storage per user based on the [default quota](/onedrive/set-default-storage-space) of the tenant for subscriptions with more than five users. More storage can be requested.</br>
-&sup2;Users can record meetings and consume Stream content but canΓÇÖt publish to or share in Stream.
+&sup2;Users can record meetings and consume Stream content but can't publish to or share in Stream.
#### Insights and analytics
F3 and F1 users have 2 GB of OneDrive storage to store and share files. To learn
|Microsoft Forms|Yes&sup1;|Yes&sup1;|No| |Microsoft To Do|Yes|Yes|No|
-&sup1;Licensed users can create, share, and manage forms. A license isnΓÇÖt needed to complete or respond to a form.
+&sup1;Licensed users can create, share, and manage forms. A license isn't needed to complete or respond to a form.
#### Windows
We'll be referring to this table in later sections of this article.
|Service or feature |Before the switch|After the switch| |||| |Office apps| <ul><li>Identify files that are stored on users' local computers and help users move them to their OneDrive.</li><li>Keep in mind that Office desktop apps will go into reduced functionality mode after changing to an F plan. Be prepared to uninstall Office desktop apps after the switch.</li></ul>| Users:</br> <ul><li>Sign in to [office.com](https://www.office.com) to access Office for the web.</li><li>[Install and use Office mobile apps](https://support.microsoft.com/office/set-up-office-apps-and-email-on-a-mobile-device-7dabb6cb-0046-40b6-81fe-767e0b1f014f) (if not already).</li><li>Users can also directly collaborate on documents from SharePoint document libraries, OneDrive, Teams, and Yammer.</li></ul>Admins:<ul><li>Uninstall Office desktop apps from users' computers.</li></ul> |
-|Email, Exchange, Outlook|<ul><li>Identify user mailboxes over 2 GB by using the [Get-MailboxStatistics](/powershell/module/exchange/get-mailboxstatistics?view=exchange-ps) Exchange PowerShell cmdlet, and then reduce mailbox size, as needed. To learn more, see [Mailbox storage limits in Outlook on the web](https://support.microsoft.com/office/mailbox-storage-limits-in-outlook-on-the-web-f170fe90-b859-4034-bcda-e186fc6a26f5).</li><li>If users have an archive mailbox:</li><ul><li>Move archive mailbox content back to the user's mailbox.</li><li>Check for any archive policies that may automatically move email based on the age of messages by using the [Get-EXOMailbox](/powershell/module/exchange/get-exomailbox?view=exchange-ps) Exchange Online PowerShell cmdlet.</li></ul> <li>Identify site mailbox access and usage.</li><li>Outlook desktop app, data, and configuration:</li><ul><li>Identify users and computers that are using Outlook data (.pst) files.</li><li>Identify and document existing Outlook client-only rules.</li><li>Export email signatures.</li></ul></ul>|Users:</br><ul><li>Sign in to [office.com](https://www.office.com) to access Outlook on the web.</li><li>[Set up email on mobile devices](https://support.microsoft.com/office/set-up-office-apps-and-email-on-a-mobile-device-7dabb6cb-0046-40b6-81fe-767e0b1f014f) (if not already).</li><li>Check and update mail signatures.</li><li>Check and update mailbox rules.</li></ul>Admins:<ul><li> [Disable Outlook on the web](/exchange/recipients-in-exchange-online/manage-user-mailboxes/enable-or-disable-outlook-web-app) for F1 users and ask them not to access the mailbox through any other methods.</li></ul>|
+|Email, Exchange, Outlook|<ul><li>Identify user mailboxes over 2 GB by using the [Get-MailboxStatistics](/powershell/module/exchange/get-mailboxstatistics?view=exchange-ps&preserve-view=true) Exchange PowerShell cmdlet, and then reduce mailbox size, as needed. To learn more, see [Mailbox storage limits in Outlook on the web](https://support.microsoft.com/office/mailbox-storage-limits-in-outlook-on-the-web-f170fe90-b859-4034-bcda-e186fc6a26f5).</li><li>If users have an archive mailbox:</li><ul><li>Move archive mailbox content back to the user's mailbox.</li><li>Check for any archive policies that may automatically move email based on the age of messages by using the [Get-EXOMailbox](/powershell/module/exchange/get-exomailbox?view=exchange-ps&preserve-view=true) Exchange Online PowerShell cmdlet.</li></ul> <li>Identify site mailbox access and usage.</li><li>Outlook desktop app, data, and configuration:</li><ul><li>Identify users and computers that are using Outlook data (.pst) files.</li><li>Identify and document existing Outlook client-only rules.</li><li>Export email signatures.</li></ul></ul>|Users:</br><ul><li>Sign in to [office.com](https://www.office.com) to access Outlook on the web.</li><li>[Set up email on mobile devices](https://support.microsoft.com/office/set-up-office-apps-and-email-on-a-mobile-device-7dabb6cb-0046-40b6-81fe-767e0b1f014f) (if not already).</li><li>Check and update mail signatures.</li><li>Check and update mailbox rules.</li></ul>Admins:<ul><li> [Disable Outlook on the web](/exchange/recipients-in-exchange-online/manage-user-mailboxes/enable-or-disable-outlook-web-app) for F1 users and ask them not to access the mailbox through any other methods.</li></ul>|
|Teams | <ul><li>Identify usage of live events and webinars.</li><li>Identify users who have Teams Phone enabled. If users are using this feature, they may not be the appropriate set of users to transition to an F plan.</li></ul> || |OneDrive | <ul><li>Identify users who are using more than or close to 2 GB of storage. (OneDrive will become read-only for users who are over the 2 GB limit after the switch to an F plan.)</li><li>Help users reduce the number of files stored in OneDrive and the overall amount of storage used.</li><li>Make sure all files are fully synchronized from users' computers to OneDrive.</li></ul>| |
We'll be referring to this table in later sections of this article.
### Create a change management strategy
-An optimal change management strategy includes how youΓÇÖll communicate with, train, and support your users before and after you switch them to an F plan. For example, here are a few things to consider:
+An optimal change management strategy includes how you'll communicate with, train, and support your users before and after you switch them to an F plan. For example, here are a few things to consider:
- How will users be aware of the switch? - How will users learn to navigate the differences in services and features? The switch to an F plan might need an increased effort in training as it requires a change in behavior.
You can use the Microsoft 365 admin center to manually change plans or a scripte
Avoid removing an existing license for a user and then reassigning a new one at a later point in time. Doing this can impact a user's data. To learn more, see [What happens to a user's data when you remove their license?](/microsoft-365/admin/manage/remove-licenses-from-users#what-happens-to-a-users-data-when-you-remove-their-license).
-For step-by-step guidance on how to change plans in the Microsoft admin center, see [Manually change Microsoft plans](/microsoft-365/commerce/subscriptions/change-plans-manually).
+For step-by-step guidance on how to change plans in the Microsoft admin center, see [Manually change Microsoft plans](/microsoft-365/commerce/subscriptions/upgrade-to-different-plan#change-plans-manually)
## What to do after switching plans
security Compare Mdb M365 Plans https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/compare-mdb-m365-plans.md
ms.localizationpriority: medium Previously updated : 01/26/2023 Last updated : 04/26/2023 - SMB
Microsoft offers a wide variety of cloud solutions and services, including plans
- [Compare Defender for Business (standalone) to Defender for Endpoint Plan 1 and Plan 2](#compare-defender-for-business-to-defender-for-endpoint-plan-1-and-plan-2). > [!TIP]
-> Defender for Business is available as a standalone security solution for small and medium-sized businesses. Defender for Business is now included in Microsoft 365 Business Premium. If you already have Microsoft 365 Business Basic or Standard, consider either upgrading to Microsoft 365 Business Premium or adding Defender for Business to your current subscription to get more threat protection capabilities for your devices.
+> Defender for Business is available as a standalone security solution for small and medium-sized businesses. Defender for Business is also included in Microsoft 365 Business Premium, along with additional security capabilities.
+> If you already have Microsoft 365 Business Basic or Standard, consider either upgrading to Microsoft 365 Business Premium or adding Defender for Business to your current subscription to get more threat protection capabilities for your organization.
## Compare Defender for Business to Microsoft 365 Business Premium
Defender for Business provides advanced security protection for your devices, wi
:::image type="content" source="media/mdb-m365bp-comparison.png" alt-text="Diagram comparing Defender for Business to Microsoft 365 Business Premium.":::
-The following table provides more information about what's included in each plan:
+The following table summarizes what's included in each plan:
+
+| Feature/capability | [Defender for Business](mdb-overview.md)<br/>(standalone) | [Microsoft 365 Business Premium](../../business-premium/index.md) |
+||||
+| **Identity management** | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
+| [Azure Active Directory Free](/azure/active-directory/fundamentals/active-directory-whatis) (Azure AD) (includes security defaults) | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | |
+ [Azure AD Premium Plan 1](/azure/active-directory/fundamentals/active-directory-whatis) (includes security defaults and Conditional Access) | | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| **Antivirus, antimalware, and ransomware protection for devices** | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
+| [Next-generation protection](../defender-endpoint/microsoft-defender-antivirus-in-windows-10.md) (antivirus/antimalware protection on devices together with cloud protection) |:::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Attack surface reduction](../defender-endpoint/overview-attack-surface-reduction.md) (network protection, firewall, and attack surface reduction rules) (*see note 1 below*) | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Endpoint detection and response](../defender-endpoint/overview-endpoint-detection-response.md) (behavior-based detection and manual response actions) | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Automated investigation and response](../defender/m365d-autoir.md) (with self-healing for detected threats) | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Microsoft Defender Vulnerability Management](mdb-view-tvm-dashboard.md) (view exposed devices and recommendations) | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Cross-platform support for devices](mdb-onboard-devices.md) (Windows, Mac, iOS, and Android) (*see note 2 below*) | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Centralized management and reporting](mdb-get-started.md) (Microsoft 365 Defender portal) | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [APIs for integration](../defender-endpoint/management-apis.md) (for Microsoft partners or your custom tools and apps) | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| **Productivity and additional security for email and collaboration** | | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
+| [Microsoft 365 Business Standard](../../admin/admin-overview/what-is-microsoft-365-for-business.md) (Office apps and services, and Microsoft Teams) | | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) (for device onboarding and management) | | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Shared computer activation](/deployoffice/overview-shared-computer-activation) (for deploying Microsoft 365 Apps) | | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Windows 10/11 Business](../../business-premium/m365bp-upgrade-windows-10-pro.md) (upgrade from previous versions of Windows Pro) | | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Windows Autopilot](/mem/autopilot/windows-autopilot) (for setting up and configuring Windows devices for first use) | | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Exchange Online Protection](../office-365-security/eop-about.md) (antiphishing, antispam, antimalware, and spoof intelligence for email) | | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Microsoft Defender for Office 365 Plan 1](/microsoft-365/security/office-365-security/defender-for-office-365) (advanced antiphishing, real-time detections, Safe Attachments, and Safe Links) | | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Auto-expanding archiving](../../compliance/autoexpanding-archiving.md) (for email) | | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Azure Information Protection Premium Plan 1](/azure/information-protection/what-is-information-protection) (protection for sensitive information) | | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
+| [Azure Virtual Desktop](/azure/virtual-desktop/overview) (centrally managed, secure virtual machines in the cloud) | | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
-| Plan | Description |
-|:|:|
-| **[Defender for Business](mdb-overview.md)** (standalone) | **Antivirus, antimalware, and ransomware protection for devices**<br/>- [Next-generation protection](../defender-endpoint/microsoft-defender-antivirus-in-windows-10.md) (antivirus/antimalware protection on devices together with cloud protection)<br/>- [Attack surface reduction](../defender-endpoint/overview-attack-surface-reduction.md) (network protection, firewall, and attack surface reduction rules) (see note 1 below)<br/>- [Endpoint detection and response](../defender-endpoint/overview-endpoint-detection-response.md) (behavior-based detection and manual response actions)<br/>- [Automated investigation and response](../defender/m365d-autoir.md) (with self-healing for detected threats)<br/>- [Microsoft Defender Vulnerability Management](mdb-view-tvm-dashboard.md) (view exposed devices and recommendations)<br/>- [Cross-platform support for devices](mdb-onboard-devices.md) (Windows, Mac, iOS, and Android) (see note 2 below)<br/>- [Centralized management and reporting](mdb-get-started.md) (Microsoft 365 Defender portal)<br/>- [APIs for integration](../defender-endpoint/management-apis.md) (for Microsoft partners or your custom tools and apps) |
-| **[Microsoft 365 Business Premium](../../business-premium/index.md)** | **Defender for Business plus productivity and additional security capabilities**<br/>- [Microsoft 365 Business Standard](../../admin/admin-overview/what-is-microsoft-365-for-business.md) (Office apps and services, and Microsoft Teams)<br/>- [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) (device onboarding and management)<br/>- [Shared computer activation](/deployoffice/overview-shared-computer-activation) (for deploying Microsoft 365 Apps)<br/>- [Windows 10/11 Business](../../business-premium/m365bp-upgrade-windows-10-pro.md) (upgrade from previous versions of Windows Pro)<br/>- [Windows Autopilot](/mem/autopilot/windows-autopilot) (for setting up and configuring Windows devices)<br/>- [Exchange Online Protection](../office-365-security/eop-about.md) (antiphishing, antispam, antimalware, and spoof intelligence for email)<br/>- [Microsoft Defender for Office 365 Plan 1](/microsoft-365/security/office-365-security/defender-for-office-365) (advanced antiphishing, real-time detections, Safe Attachments, and Safe Links)<br/>- [Auto-expanding archiving](../../compliance/autoexpanding-archiving.md) (for email)<br/>- [Azure Active Directory Premium Plan 1](/azure/active-directory/fundamentals/active-directory-whatis) (identity management)<br/>- [Azure Information Protection Premium Plan 1](/azure/information-protection/what-is-information-protection) (protection for sensitive information)<br/>- [Azure Virtual Desktop](/azure/virtual-desktop/overview) (centrally managed, secure virtual machines in the cloud) |
> [!NOTE]
-> 1. Microsoft Intune is required to modify or customize attack surface reduction rules. Intune can be added on to the standalone version of Defender for Business. Intune is included in Microsoft 365 Business Premium.
+> 1. [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) is required to modify or customize attack surface reduction rules. Intune is included in Microsoft 365 Business Premium, and can be added on to the standalone version of Defender for Business.
>
-> 2. You can use *either* mobile threat defense (preview) *or* Microsoft Intune to onboard iOS and Android devices. See [Onboard devices to Microsoft Defender for Business](mdb-onboard-devices.md).
+> 2. You can use *either* [mobile threat defense (preview)](mdb-mtd.md) *or* Microsoft Intune to onboard iOS and Android devices. See [Onboard devices to Microsoft Defender for Business](mdb-onboard-devices.md).
## Compare Defender for Business to Defender for Endpoint Plan 1 and Plan 2
-Defender for Business brings the enterprise-grade capabilities of Defender for Endpoint to small and medium-sized businesses. The following table compares security features and capabilities in Defender for Business to the enterprise offerings, Microsoft Defender for Endpoint Plans 1 and 2.
+Defender for Business brings the enterprise-grade capabilities of Defender for Endpoint to small and medium-sized businesses. If you're wondering how Defender for Business compares to Defender for Endpoint Plan 1 and 2, you can use the following table:
|Feature/capability|[Defender for Business](mdb-overview.md)<br/>(standalone)|[Defender for Endpoint Plan 1](../defender-endpoint/defender-endpoint-plan-1.md)<br/>(for enterprise customers) |[Defender for Endpoint Plan 2](../defender-endpoint/microsoft-defender-endpoint.md)<br/>(for enterprise customers) | |||||
-|[Centralized management](../defender-endpoint/manage-atp-post-migration.md)<br/>(see note 1 below) | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
+|[Centralized management](../defender-endpoint/manage-atp-post-migration.md)<br/>(*see note 1 below*) | :::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
|[Simplified client configuration](mdb-setup-configuration.md)|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::| | | |[Microsoft Defender Vulnerability Management](../defender-endpoint/next-gen-threat-and-vuln-mgt.md)|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::| |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
-|[Attack surface reduction capabilities](../defender-endpoint/overview-attack-surface-reduction.md) <br/>(see note 2 below)|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
+|[Attack surface reduction capabilities](../defender-endpoint/overview-attack-surface-reduction.md) <br/>(*see note 2 below*)|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
|[Next-generation protection](../defender-endpoint/next-generation-protection.md)|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
-|[Endpoint detection and response](../defender-endpoint/overview-endpoint-detection-response.md) <br/>(see note 3 below) |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
-|[Automated investigation and response](../defender-endpoint/automated-investigations.md) <br/>(see note 4 below) |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: ||:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
+|[Endpoint detection and response](../defender-endpoint/overview-endpoint-detection-response.md) <br/>(*see note 3 below*) |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
+|[Automated investigation and response](../defender-endpoint/automated-investigations.md) <br/>(*see note 4 below*) |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: ||:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
|[Threat hunting](../defender-endpoint/advanced-hunting-overview.md) and six months of data retention | | |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
-|[Threat analytics](../defender-endpoint/threat-analytics.md) <br/>(see note 5 below) |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
-|[Cross-platform support](../defender-endpoint/minimum-requirements.md) <br/>Windows, Mac, iOS, and Android OS<br/>(For Windows Server and Linux, see note 6 below) |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
+|[Threat analytics](../defender-endpoint/threat-analytics.md) <br/>(*see note 5 below*) |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: | |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
+|[Cross-platform support](../defender-endpoint/minimum-requirements.md) <br/>Windows, Mac, iOS, and Android OS (*For Windows Server and Linux, see note 6 below*) |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|
|[Microsoft Threat Experts](../defender-endpoint/microsoft-threat-experts.md)| | |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::| |Partner APIs|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::|:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false":::| |[Microsoft 365 Lighthouse integration](../../lighthouse/m365-lighthouse-overview.md) <br/>(For viewing security incidents across customer tenants) |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |:::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included" border="false"::: |
Defender for Business brings the enterprise-grade capabilities of Defender for E
> > 2. Intune is required to configure and manage [ASR rules](../defender-endpoint/attack-surface-reduction.md). >
-> 3. Endpoint detection and response (EDR) capabilities in Defender for Business include behavior-based detection and the following manual response actions:
->
-> - Run antivirus scan
-> - Isolate device
-> - Add an indicator to block or allow a file
+> 3. Endpoint detection and response (EDR) capabilities in Defender for Business include behavior-based detection and the following manual response actions: Run antivirus scan; Isolate device; and Add an indicator to block or allow a file.
> > 4. In Defender for Business, automated investigation and response is turned on by default, tenant wide. Turning off automated investigation and response affects real-time protection. See [Review settings for advanced features](mdb-configure-security-settings.md#review-settings-for-advanced-features). > > 5. In Defender for Business, threat analytics are optimized for small and medium-sized businesses. >
-> 6. To onboard servers, another license is required. See the following articles:
->
-> - [Onboard devices to Defender for Business](mdb-onboard-devices.md)
-> - [Onboard devices and configure Microsoft Defender for Endpoint capabilities](../defender-endpoint/onboard-configure.md)
+> 6. To onboard servers, another license is required. See [Onboard devices to Defender for Business](mdb-onboard-devices.md) or [Onboard devices and configure Microsoft Defender for Endpoint capabilities](../defender-endpoint/onboard-configure.md).
## Next steps
security Mdb Setup Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-setup-configuration.md
ms.localizationpriority: medium Previously updated : 04/20/2023 Last updated : 04/26/2023 f1.keywords: NOCSH
When you're ready to set up and configure Defender for Business, you can choose
## [**Setup wizard**](#tab/Wizard) > [!IMPORTANT]
-> You must be a global administrator to run the setup wizard. See [Security roles and permissions in Defender for Business](mdb-roles-permissions.md).
->
-> Make sure to [add users](mdb-add-users.md) (especially members of your security team) before you run the setup wizard.
+> You must be a global administrator to complete setup tasks, including running the setup wizard. See [Security roles and permissions in Defender for Business](mdb-roles-permissions.md).
-## How to start the setup wizard
+1. **Get Defender for Business**. Start a trial or paid subscription today. You can choose from the standalone version of Defender for Business, or get it as part of Microsoft 365 Business Premium. See [Get Microsoft Defender for Business](get-defender-business.md). And, if you're planning to onboard servers, see [How to get Microsoft Defender for Business servers](get-defender-business-servers.md).
+
+2. **Add users and assign Defender for Business licenses**. You'll want to do this task before you run the setup wizard. See [Add users and assign licenses in Microsoft Defender for Business](mdb-add-users.md).
-In the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the navigation pane, select **Assets** > **Devices**. The setup wizard is designed to run one time, and it resembles the following image:
+3. **Create a list of your security team's email addresses**. Set up a list of your security team's names and email addresses. This list will come in handy while you are using the setup wizard. To view a list of users, in the Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com)), go to **Users** > **Active users**.
+4. In the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the navigation pane, select **Assets** > **Devices**.
-## The setup wizard flow
+ If Defender for Business isn't provisioned yet, that process begins now. When Defender for Business has finished provisioning, you're prompted to use the setup wizard, as shown in the following image:
-The setup wizard is designed to help you set up and configure Defender for Business quickly and efficiently. It walks you through the following steps:
+ :::image type="content" source="medib-wizard-start.png":::
-1. **Assign user permissions**. In this step, you grant your security team access to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). This portal is where you and your security team will manage your security capabilities, view alerts, and take any needed actions on detected threats. Portal access is granted through roles that imply certain permissions. [Learn more about roles and permissions](mdb-roles-permissions.md).
+5. **Assign user permissions**. In this first step of the setup wizard, you grant your security team access to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). This portal is where you and your security team will manage your security capabilities, view alerts, and take any needed actions on detected threats. Portal access is granted through roles that imply certain permissions. [Learn more about roles and permissions](mdb-roles-permissions.md).
In Defender for Business, members of your security team can be assigned one of the following three roles:<br/>
The setup wizard is designed to help you set up and configure Defender for Busin
- **Security Administrator**: A security administrator can view and edit security settings, and take action when threats are detected. - **Security Reader**: A security reader can view information in reports, but can't change any security settings.
-2. **Set up email notifications**. In this step, you can set up email notifications for your security team. Then, when an alert is generated or a new vulnerability is discovered, your security team won't miss it even if they're away from their desk. [Learn more about email notifications](mdb-email-notifications.md).
-
-3. **Onboard and configure Windows devices**. In this step, you can onboard your company's Windows devices to Defender for Business quickly. Onboarding devices right away helps to protect those devices from day one. [Learn more about onboarding devices to Defender for Business](mdb-onboard-devices.md).
+6. **Set up email notifications**. In this step of the setup wizard, you can set up email notifications for your security team using the list you created in step 3. Then, when an alert is generated or a new vulnerability is discovered, your security team won't miss it even if they're away from their desk. [Learn more about email notifications](mdb-email-notifications.md).
- - **If you're not using Intune**, you can onboard devices in the Microsoft 365 Defender portal.
- - **If you're already using Microsoft Intune**, and your company has devices enrolled in Intune, you can continue using Intune. See [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).
-
-4. **Configure your security policies**. Defender for Business includes default security policies for next-generation protection and firewall protection that can be applied to your company's devices. These default policies use recommended settings and are designed to provide strong protection for your devices. You can also create your own security policies. See [View and edit your security policies and settings](mdb-configure-security-settings.md).
+7. **Onboard and configure Windows devices**. In this step of the setup wizard, you can onboard Windows devices to Defender for Business. Onboarding devices right away helps to protect those devices from day one. Note that this step of the wizard applies to Windows devices only. You can onboard other devices later. See [Onboard devices to Microsoft Defender for Business](mdb-onboard-devices.md).
> [!NOTE]
- > If you're already using Intune to manage your devices and security policies, you can continue using it. See [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).
-
-## What is automatic onboarding?
-
-Automatic onboarding is a simplified way to onboard Windows devices to Defender for Business. Automatic onboarding is only available for Windows devices that are already enrolled in Microsoft Intune.
-
-While you're using the setup wizard, the system will detect whether Windows devices are already enrolled in Intune. You'll be asked if you want to use automatic onboarding for all or some of those devices. You can onboard all Windows devices at once, or select specific devices to start with, and then add more devices later.
-
-To onboard other devices, see [Onboard devices to Defender for Business](mdb-onboard-devices.md).
+ > If your organization is using Microsoft Intune, and devices are already enrolled in Intune, Defender for Business prompts you to either continue using Intune, or switch to using the simplified configuration process in the Microsoft 365 Defender portal. See [Choose where to manage security policies and devices](mdb-configure-security-settings.md#choose-where-to-manage-security-policies-and-devices).
+ >
+ > Defender for Business also offers automatic onboarding for Windows devices enrolled in Intune. Automatic onboarding is a simplified way to onboard Windows devices to Defender for Business. We recommend selecting the "all devices enrolled" option so that as Windows devices are enrolled in Intune, they're onboarded to Defender for Business automatically.
+
+8. **Configure your security policies**. Defender for Business includes default security policies for next-generation protection and firewall protection that can be applied to your company's devices. These default policies use recommended settings and are designed to provide strong protection for your devices. You can start with your default policies, and add more later. See [View and edit your security policies and settings](mdb-configure-security-settings.md).
-> [!TIP]
-> - We recommend selecting the "all devices enrolled" option. That way, when Windows devices are enrolled in Intune later on, they'll be onboarded to Defender for Business automatically.
-> - If you've been managing security policies and settings in the Intune admin center, we recommend switching to the Microsoft 365 Defender portal to manage your devices, policies, and settings. To learn more, see [Choose where to manage security policies and devices](mdb-configure-security-settings.md#choose-where-to-manage-security-policies-and-devices).
+9. **Select your next step**. Afer the setup wizard has completed, you're prompted to choose a next step. For example, you can onboard devices, view your security dashboard, or view your security policies.
## [**Manual setup**](#tab/Manual)
-## The setup and configuration process
-
-If you're setting up Defender for Business manually, here's the overall process you'll follow:
+> [!IMPORTANT]
+> You must be a global administrator to complete setup tasks. See [Security roles and permissions in Defender for Business](mdb-roles-permissions.md).
1. **Get Defender for Business**. Start a trial or paid subscription today. You can choose from the standalone version of Defender for Business, or get it as part of Microsoft 365 Business Premium. See [Get Microsoft Defender for Business](get-defender-business.md). And, if you're planning to onboard servers, see [How to get Microsoft Defender for Business servers](get-defender-business-servers.md).
-2. **Add users and assign licenses**. Assign a license for Defender for Business (or Microsoft 365 Business Premium) to each member of your organization to protect their devices. You'll also want to make sure multifactor authentication is enabled for all users. See [Add users and assign licenses in Microsoft Defender for Business](mdb-add-users.md).
+2. **Add users and assign licenses**. Assign a license for Defender for Business (or Microsoft 365 Business Premium, if that's your subscription) to each member of your organization to protect their devices. You'll also want to make sure multifactor authentication is enabled for all users. See [Add users and assign licenses in Microsoft Defender for Business](mdb-add-users.md).
3. **Assign roles and permissions to your security team**. People on your security team need certain permissions to perform tasks, such as reviewing detected threats & remediation actions, viewing & editing policies, onboarding devices, and using reports. You can grant these permissions through roles. See [Assign roles and permissions](mdb-roles-permissions.md).
-4. **Set up email notifications for your security team**. As alerts are generated, or new vulnerabilities are discovered, people on your security team will be notified automatically. See [Set up email notifications](mdb-email-notifications.md).
+4. **Set up email notifications for your security team**. As alerts are generated, or new vulnerabilities are discovered, people on your security team can be notified automatically, via email messages. See [Set up email notifications](mdb-email-notifications.md).
-5. **Onboard devices to Defender for Business**. The sooner you get your devices onboarded, the sooner they're protected by Defender for Business. You can onboard devices by downloading a script from the Microsoft 365 Defender portal, and then running that script on devices to onboard. Or, if your subscription includes Microsoft Intune, you can use it to enroll devices. See [Onboard devices to Defender for Business](mdb-onboard-devices.md).
+5. **Onboard devices to Defender for Business**. The sooner you get your devices onboarded to Defender for Business, the sooner they're protected. You can onboard devices in the Microsoft 365 Defender portal. Or, if your organization is already using Microsoft Intune, you can use it to enroll devices. See [Onboard devices to Defender for Business](mdb-onboard-devices.md).
6. **Set up and review your security policies and settings**. Some security policies and settings are preconfigured with default settings in Defender for Business. Other policies, such as web content filtering and attack surface reduction rules, must be set up. See [Configure your security settings and policies](mdb-configure-security-settings.md).
security Trial Playbook Defender Business https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/trial-playbook-defender-business.md
Defender for Business was designed to save small and medium-sized businesses tim
### Step 4: Set up and configure Defender for Business
-If you choose not to use the setup wizard, see the following diagram that depicts the [overall setup and configuration process](mdb-setup-configuration.md#the-setup-and-configuration-process) for Defender for Business.
+If you choose not to use the setup wizard, see the following diagram that depicts the [overall setup and configuration process](mdb-setup-configuration.md) for Defender for Business.
[:::image type="content" source="medi)
security Admin Submissions Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/admin-submissions-mde.md
audience: ITPro
- m365-security-- tier2
+- tier3
security Android Configure Mam https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure-mam.md
ms.mktglfcycl: deploy
ms.sitesec: library ms.pagetype: security -+ ms.localizationpriority: medium audience: ITPro
Users can install and open the app to start the onboarding process.
- [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md) - [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)++
security Auto Investigation Action Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/auto-investigation-action-center.md
audience: ITPro - m365-security-- tier2
+- tier3
security Autoir Investigation Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/autoir-investigation-results.md
audience: ITPro - m365-security-- tier2
+- tier3
- autoir
security Automated Investigations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/automated-investigations.md
audience: ITPro - m365-security-- tier2
+- tier3
security Automation Levels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/automation-levels.md
audience: ITPro - m365-security-- tier2
+- tier3
security Configure Automated Investigations Remediation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-automated-investigations-remediation.md
audience: ITPro - m365-security-- tier2
+- tier3
search.appverid: met150
security Device Health Export Antivirus Health Report Api https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-health-export-antivirus-health-report-api.md
audience: ITPro - m365-security-- tier2
+- tier3
security Export Certificate Inventory Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/export-certificate-inventory-assessment.md
audience: ITPro - m365-security-- tier2
+- tier3
security Export Firmware Hardware Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/export-firmware-hardware-assessment.md
audience: ITPro - m365-security-- tier2
+- tier3
security Export Security Baseline Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/export-security-baseline-assessment.md
audience: ITPro - m365-security-- tier2
+- tier3
security Find Defender Malware Name https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/find-defender-malware-name.md
audience: ITPro - m365-security-- tier2
+- tier3
search.appverid: met150
security Import Ti Indicators https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/import-ti-indicators.md
audience: ITPro - m365-security-- tier2
+- tier3
security Investigation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigation.md
audience: ITPro - m365-security-- tier2
+- tier3
security Linux Support Perf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-perf.md
In certain server workloads, two issues might be observed:
These issues may occur on servers with many events flooding AuditD.
+> [!NOTE]
+> As a best practice, we recommend setting AuditD configuration **max_log_file_action** to **rotate**.
+>
+> This helps prevent situations where AuditD logs accumulate and consume all available disk space.
+
This can happen if there are multiple consumers for AuditD, or too many rules with the combination of Microsoft Defender for Endpoint and third party consumers, or high workload that generates a lot of events. To troubleshoot such issues, begin by [collecting MDEClientAnalyzer logs](run-analyzer-macos-linux.md) on the sample affected server.
Contains important aggregated information that is useful when investigating Audi
- What file system paths are the noisiest.
-**To mitigate most AuditD performance issues, you can implement AuditD exclusion.**
+**To mitigate most AuditD performance issues, you can implement AuditD exclusion. If the given exclusions do not improve the performance then we can use the rate limiter option. This will reduce the number of events being generated by AuditD altogether.**
> [!NOTE] > Exclusions should be made only for low threat and high noise initiators or paths. For example, do not exclude /bin/bash which risks creating a large blind spot.
The -x flag is used to exclude access to subdirectories by specific initiators f
The above will exclude monitoring of /tmp subfolder, when accessed by mv process.
+### Rate Limiter
+
+The XMDEClientAnalyzer support tool contains syntax that can be used to limit the number of events being reported by the auditD plugin. This option will set the rate limit globally for AuditD causing a drop in all the audit events.
+
+> [!NOTE]
+> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This could reduces the number of events for other subscribers as well.
+
+The ratelimit option can be used to enable/disable this rate limit.
+
+Enable: `./mde_support_tool.sh ratelimit -e true`
+
+Disable: `./mde_support_tool.sh ratelimit -e false`
+
+When the ratelimit is enabled a rule will be added in AuditD to handle 2500 events/sec.
+ > [!NOTE] > Please contact Microsoft support if you need assistance with analyzing and mitigating AuditD related performance issues, or with deploying AuditD exclusions at scale.
security Live Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/live-response.md
The following commands are available for user roles that are granted the ability
| connections | Shows all the active connections. | Y | N | N | | dir | Shows a list of files and subdirectories in a directory. | Y | Y | Y | | drivers | Shows all drivers installed on the device. | Y | N | N |
-| fg `<command ID>` | Place the specified job in the foreground, making it the current job. NOTE: fg takes a 'command ID` available from jobs, not a PID | Y | Y | Y |
+| fg `<command ID>` | Place the specified job in the foreground, making it the current job. NOTE: fg takes a 'command ID` available from jobs, not a PID. | Y | Y | Y |
| fileinfo | Get information about a file. | Y | Y | Y | | findfile | Locates files by a given name on the device. | Y | Y | Y |
-| getfile <file_path> | Downloads a file. | Y | Y | Y |
| help | Provides help information for live response commands. | Y | Y | Y | | jobs | Shows currently running jobs, their ID and status. | Y | Y | Y | | persistence | Shows all known persistence methods on the device. | Y | N | N |
The following commands are available for user roles that are granted the ability
| Command | Description | Windows and Windows Server | macOS | Linux | |||||| | analyze | Analyses the entity with various incrimination engines to reach a verdict. | Y | N | N |
-| collect | Collects forensics package from machine | N | Y | Y |
-| isolate | Disconnects the device from the network while retaining connectivity to the Defender for Endpoint service | N | Y | N |
-| release | Releases a device from network isolation | N | Y | N |
+| collect | Collects forensics package from device. | N | Y | Y |
+| getfile <file_path> | Downloads a file. | Y | Y | Y |
+| isolate | Disconnects the device from the network while retaining connectivity to the Defender for Endpoint service. | N | Y | N |
+| release | Releases a device from network isolation. | N | Y | N |
| run | Runs a PowerShell script from the library on the device. | Y | Y | Y | | library | Lists files that were uploaded to the live response library. | Y | Y | Y | | putfile | Puts a file from the library to the device. Files are saved in a working folder and are deleted when the device restarts by default. | Y | Y | Y |
security Machines View Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machines-view-overview.md
At a glance you'll see information such as domain, risk level, OS platform, and
> [!NOTE] > The device inventory is available in different Microsoft 365 Defender services. The information available to you will differ depending on your license. You'll get the most complete set of capabilities when using [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037).
+> [!NOTE]
+> Risk Level which can influence enforcement of conditional access and other security policies on Microsoft Intune, is available in Windows today.
+ There are several options you can choose from to customize the devices list view. On the top navigation you can: - Add or remove columns
security Microsoft Defender Endpoint Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-linux.md
After you've enabled the service, you may need to configure your network or fire
> [!NOTE] > System events captured by rules added to `/etc/audit/rules.d/` will add to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux will be tagged with `mdatp` key.
+### External package dependancy
+The following external package dependencies exist for the mdatp package:
+- The mdatp RPM package requires "glibc >= 2.17", "audit", "policycoreutils", "semanage" "selinux-policy-targeted", "mde-netfilter"
+- For RHEL6 the mdatp RPM package requires "audit", "policycoreutils", "libselinux", "mde-netfilter"
+- For DEBIAN the mdatp package requires "libc6 >= 2.23", "uuid-runtime", "auditd", "mde-netfilter"
+
+The mde-netfilter package also has the following package dependencies:
+- For DEBIAN the mde-netfilter package requires "libnetfilter-queue1", "libglib2.0-0"
+- For RPM the mde-netfilter package requires "libmnl", "libnfnetlink", "libnetfilter_queue", "glib2"
+
+If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the pre-requisite dependencies.
+ ### Configuring Exclusions When adding exclusions to Microsoft Defender Antivirus, you should be mindful of [Common Exclusion Mistakes for Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus)
security Post Ti Indicator https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/post-ti-indicator.md
audience: ITPro - m365-security-- tier2
+- tier3
security Respond Machine Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/respond-machine-alerts.md
Response actions run along the top of a specific device page and include:
> [!IMPORTANT] >
-> - These response actions are only available for devices on Windows 10, version 1703 or later, Windows 11, Windows Server 2019, and Windows Server 2022.
+> - These response actions are only available for devices on Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, and Windows Server 2022.
> - For non-Windows platforms, response capabilities (such as isolate device) are dependent on the third-party capabilities. > - For Microsoft first party agents, please refer to the "more information" link under each feature for minimum OS requirements.
Depending on the severity of the attack and the sensitivity of the device, you m
> [!IMPORTANT] > > - Isolating devices from the network is not currently supported for devices running macOS. For macOS, use live response to run the action. For more information on live response, see [Investigate entities on devices using live response](live-response.md).
-> - Full isolation is available for devices running Windows 11, Windows 10, version 1703 or later, Windows Server 2022, Windows Server 2019, and Windows Server 2016.
+> - Full isolation is available for devices running Windows 11, Windows 10, version 1703 or later, Windows Server 2022, Windows Server 2019, Windows Server 2016 and Windows Server 2012 R2.
> - You can use the device isolation capability **in public preview** on all supported Microsoft Defender for Endpoint on Linux listed in [System requirements](microsoft-defender-endpoint-linux.md#system-requirements). > - Selective isolation is available for devices running Windows 10, version 1709 or later, and Windows 11. > - When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
security Run Analyzer Macos Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-analyzer-macos-linux.md
If using a terminal download using the command:
2. Verify the download > [!NOTE]
- > The current SHA256 hash of 'XMDEClientAnalyzerBinary.zip' that is downloaded from the above link is: '550EAE6FAA26972D49D3013520644E551AFA846E92CD59F5C6A6A72A6B77E9E9'
+ > The current SHA256 hash of 'XMDEClientAnalyzerBinary.zip' that is downloaded from the above link is: 'E812F96A7735C746129ACD66468E2C524CB016359780AFB8CF972D281C2A2B81'
```console
- echo '550EAE6FAA26972D49D3013520644E551AFA846E92CD59F5C6A6A72A6B77E9E9 XMDEClientAnalyzerBinary.zip' | sha256sum -c
+ echo 'E812F96A7735C746129ACD66468E2C524CB016359780AFB8CF972D281C2A2B81 XMDEClientAnalyzerBinary.zip' | sha256sum -c
``` 3. Extract the contents of <i>XMDEClientAnalyzerBinary.zip</i> on the machine.
When using a terminal, unzip the file using one of the following commands based
2. Verify the download ```console
- echo 'E3119C47975A3E50A5144B0751F59BFC42327A151BDA5D8334D1ED64F7898A7F XMDEClientAnalyzer.zip' | sha256sum -c
+ echo '01AC21ED1963E5BFA9926300029B7BC57826ED3904DE774458CD8CF7C872E896 XMDEClientAnalyzer.zip' | sha256sum -c
``` 3. Extract the contents of XMDEClientAnalyzer.zip on the machine.\
Add exclusions for audit-d monitoring.
Usage example `sudo ./MDESupportTool exclude -d /var/foo/bar`
+### AuditD Rate Limiter
+
+Syntax that can be used to limit the number of events being reported by the auditD plugin. This option will set the rate limit globally for AuditD causing a drop in all the audit events. When the limiter is enabled the number of auditd events will be limited to 2500 events/sec. This option can be used in cases where we see high CPU usage from AuditD side.
+
+> [!NOTE]
+> This functionality exists for Linux only.
+
+```console
+-h, --help show this help message and exit
+-e <true/false>, --enable <true/false> enable/disable the rate limit with default values
+```
+
+Usage example `sudo ./mde_support_tool.sh ratelimit -e true`
+
+> [!NOTE]
+> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This could reduces the number of events for other subscribers as well.
+ ## Result package contents on macOS and Linux - report.html
security Run Live Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-live-response.md
audience: ITPro - m365-security-- tier2
+- tier3
security Ti Indicator https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ti-indicator.md
audience: ITPro - m365-security-- tier2
+- tier3
security User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/user.md
audience: ITPro - m365-security-- tier2
+- tier3
security Advanced Hunting Example https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-example.md
audience: ITPro - m365-security-- tier2
+- tier3
Last updated 06/10/2021
security Custom Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-roles.md
audience: ITPro - m365-security-- tier2
+- tier3
search.appverid: - MOE150
security Deploy Configure M365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/deploy-configure-m365-defender.md
audience: ITPro - m365-security
- - tier2
+ - tier3
search.appverid: - MOE150
security Device Profile https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/device-profile.md
audience: ITPro - m365-security-- tier2
+- tier3
search.appverid: met150 Last updated 02/16/2021
security Integrate Microsoft 365 Defender Secops Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-plan.md
audience: ITPro
- zerotrust-solution - msftsolution-secops
+ - tier2
search.appverid: - MOE150
security Integrate Microsoft 365 Defender Secops Readiness https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-readiness.md
audience: ITPro
- zerotrust-solution - msftsolution-secops
+ - tier2
search.appverid: - MOE150
security Integrate Microsoft 365 Defender Secops Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-roles.md
audience: ITPro
- zerotrust-solution - msftsolution-secops
+ - tier2
search.appverid: - MOE150
security Integrate Microsoft 365 Defender Secops Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-services.md
audience: ITPro
- zerotrust-solution - msftsolution-secops
+ - tier3
search.appverid: - MOE150
security Integrate Microsoft 365 Defender Secops Tasks https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-tasks.md
audience: ITPro
- zerotrust-solution - msftsolution-secops
+ - tier2
search.appverid: - MOE150
security Integrate Microsoft 365 Defender Secops Use Cases https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-use-cases.md
audience: ITPro
- zerotrust-solution - msftsolution-secops
+ - tier2
search.appverid: - MOE150
security Integrate Microsoft 365 Defender Secops https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops.md
audience: ITPro
- zerotrust-solution - msftsolution-secops
+ - tier2
search.appverid: - MOE150
security M365d Enable Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable-faq.md
audience: ITPro - m365-security-- tier2
+- tier3
search.appverid:
security M365d Enable https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable.md
- m365-security - m365solution-getstarted - highpri
- - tier1
+ - tier3
search.appverid: - MOE150
security M365d Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-permissions.md
audience: ITPro - m365-security-- tier2
+- tier3
search.appverid: - MOE150
security M365d Remediation Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-remediation-actions.md
audience: ITPro - m365-security
- - tier1
+ - tier3
security Microsoft 365 Defender Integration With Azure Sentinel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-integration-with-azure-sentinel.md
audience: ITPro - m365-security
- - tier1
+ - tier3
search.appverid: - MOE150
security Microsoft 365 Defender Train Security Staff https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-train-security-staff.md
audience: ITPro - m365-security
- - tier1
+ - tier3
search.appverid: - MOE150
security Microsoft 365 Security Mde Redirection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-mde-redirection.md
audience: ITPro - m365-security
- - tier2
+ - tier3
Last updated 02/16/2021
security Microsoft 365 Security Mdi Redirection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-mdi-redirection.md
audience: ITPro - m365-security
- - tier2
+ - tier3
Last updated 04/28/2022
security Portals https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/portals.md
audience: ITPro - m365-security-- tier2
+- tier3
search.appverid: met150 Last updated 02/16/2021
security Session Cookie Theft Alert https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/session-cookie-theft-alert.md
audience: ITPro - m365-security-- tier2
+- tier3
- autoir
security Top Scoring Industry Tests https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/top-scoring-industry-tests.md
audience: ITPro -m365-security-compliance
- - tier2
+ - tier3
search.appverid: met150 Last updated 02/16/2021
security Attack Simulation Training Simulation Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations.md
If there's only one Wednesday between the start date and end date, the automatio
### How does randomize send times currently work?
-Randomize send time works in batches of 1000 users and is meant to be used with a large number of targeted users. If less than 1000 users are involved in simulations created by automations, a randomize send time will not trigger.
+Randomize send time works in batches of 1000 users and is meant to be used with a large number of targeted users. If less than 1000 users are involved in simulations created by automations, batches of 100 users are created for randomized send times.
security Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-policies.md
description: Admins can learn how to use quarantine policies to control what users are able to do to quarantined messages. Previously updated : 4/12/2023 Last updated : 4/26/2023 # Quarantine policies
Even if you don't customize quarantine notifications for different languages, se
:::image type="content" source="../../media/quarantine-tags-esn-customization-logo.png" alt-text="A custom logo in a quarantine notification" lightbox="../../media/quarantine-tags-esn-customization-logo.png":::
+ - **Send end-user spam notification every (days)**: Select the frequency for quarantine notifications. You can select **Within 4 hours**, **Daily**, or **Weekly**.
When you're finished in the **Quarantine notifications flyout**, select **Save**.
When you're finished in the **Quarantine notifications flyout**, select **Save**
If you'd rather use PowerShell to configure global quarantine notification settings, connect to Exchange Online PowerShell or Exchange Online Protection PowerShell and use the following syntax: ```powershell
-Get-QuarantinePolicy -QuarantinePolicyType GlobalQuarantinePolicy | Set-QuarantinePolicy -MultiLanguageSetting ('Language1','Language2','Language3') -MultiLanguageCustomDisclaimer ('Language1 Disclaimer','Language2 Disclaimer','Language3 Disclaimer') -ESNCustomSubject ('Language1 Subject','Language2 Subject','Language3 Subject') -MultiLanguageSenderName ('Language1 Sender Display Name','Language2 Sender Display Name','Language3 Sender Display Name') [-EndUserSpamNotificationCustomFromAddress <InternalUserEmailAddress>] [-OrganizationBrandingEnabled <$true | $false>] [-EndUserSpamNotificationFrequencyInDays <1 to 30>]
+Get-QuarantinePolicy -QuarantinePolicyType GlobalQuarantinePolicy | Set-QuarantinePolicy -MultiLanguageSetting ('Language1','Language2','Language3') -MultiLanguageCustomDisclaimer ('Language1 Disclaimer','Language2 Disclaimer','Language3 Disclaimer') -ESNCustomSubject ('Language1 Subject','Language2 Subject','Language3 Subject') -MultiLanguageSenderName ('Language1 Sender Display Name','Language2 Sender Display Name','Language3 Sender Display Name') [-EndUserSpamNotificationCustomFromAddress <InternalUserEmailAddress>] [-OrganizationBrandingEnabled <$true | $false>] [-EndUserSpamNotificationFrequency <04:00:00 | 1.00:00:00 | 7.00:00:00>]
``` **Notes**:
security Reports Email Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/reports-email-security.md
ms.assetid: 3a137e28-1174-42d5-99af-f18868b43e86
- m365-security - tier2
-description: Admins can learn how to find and use the email security reports that are available in the Microsoft 365 Defender portal.
+description: Admins can learn how to find and use the email security reports that are available in the Microsoft 365 Defender portal. This article helps answer the question What is the The Threat protection status report in Microsoft Defender for Office 365?
- seo-marvel-apr2020 Previously updated : 12/02/2022 Last updated : 04/27/2023 # View email security reports in the Microsoft 365 Defender portal
On the **Submissions** page, the **[Export](#export-report)** button is availabl
:::image type="content" source="../../media/submissions-report-page.png" alt-text="The Submissions report page in the Microsoft 365 Defender portal." lightbox="../../media/submissions-report-page.png":::
-## Threat protection status report
+## What is the The Threat protection status report in Microsoft Defender for Office 365?
-The **Threat protection status** report is available in both EOP and Defender for Office 365; however, the reports contain different data. For example, EOP customers can view information about malware detected in email, but not information about malicious files detected by [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).
+The **Threat protection status** report is available in both EOP and Defender for Office 365. However, the reports contain different data. For example, EOP customers can view information about malware detected in email, but not information about malicious files detected by [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).
The report provides the count of email messages with malicious content, such as files or website addresses (URLs) that were blocked by the anti-malware engine, [zero-hour auto purge (ZAP)](zero-hour-auto-purge.md), and Defender for Office 365 features like [Safe Links](safe-links-about.md), [Safe Attachments](safe-attachments-about.md), and [impersonation protection features in anti-phishing policies](anti-phishing-policies-about.md#exclusive-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365). You can use this information to identify trends or determine whether organization policies need adjustment.
security Safe Links About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-about.md
For more information about the order of precedence and how multiple policies are
> [!NOTE] > Entries in the "Do not rewrite the following URLs" list are not scanned or wrapped by Safe Links during mail flow but might still be blocked at time of click. Use [allow URL entries in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-urls-on-the-submissions-page) to override the Safe Links URL verdict.
-Each Safe Links policy contains a **Do not rewrite the following URLs** list that you can use to specify URLs that aren't rewritten by Safe Links scanning. In other words, the list allows users who are included in the policy to access the specified URLs that would otherwise be blocked by Safe Links. You can configure different lists in different Safe Links policies. Policy processing stops after the first (likely, the highest priority) policy is applied to the user. So, only one **Do not rewrite the following URLs** list is applied to a user who is included in multiple active Safe Links policies.
+Each Safe Links policy contains a **Do not rewrite the following URLs** list that you can use to specify URLs that aren't rewritten by Safe Links scanning. You can configure different lists in different Safe Links policies. Policy processing stops after the first (likely, the highest priority) policy is applied to the user. So, only one **Do not rewrite the following URLs** list is applied to a user who is included in multiple active Safe Links policies.
To add entries to the list in new or existing Safe Links policies, see [Create Safe Links policies](safe-links-policies-configure.md#use-the-microsoft-365-defender-portal-to-create-safe-links-policies) or [Modify Safe Links policies](safe-links-policies-configure.md#use-the-microsoft-365-defender-portal-to-modify-custom-safe-links-policies).
Examples of the values that you can enter and their results are described in the
|`contoso.com` <p> or <p> `*contoso.com*`|Blocks the domain, subdomains, and paths. For example, `https://www.contoso.com`, `https://sub.contoso.com`, and `https://contoso.com/abc` are blocked.| |`https://contoso.com/a`|Blocks `https://contoso.com/a` but not additional subpaths like `https://contoso.com/a/b`.| |`https://contoso.com/a*`|Blocks `https://contoso.com/a` and additional subpaths like `https://contoso.com/a/b`.|
-|`https://toys.contoso.com*`|Blocks a subdomain (`toys` in this example) but allow clicks to other domain URLs (like `https://contoso.com` or `https://home.contoso.com`).|
+|`https://toys.contoso.com*`|Blocks a subdomain (`toys` in this example) but allow clicks to other domain URLs (like `https://contoso.com` or `https://home.contoso.com`).|
security Tenant Allow Block List About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-about.md
audience: ITPro ms.localizationpriority: medium Previously updated : 1/31/2023 Last updated : 4/26/2023 search.appverid: - MET150
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, you might disagree with the EOP or Microsoft Defender for Office 365 filtering verdict. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative).
-The Tenant Allow/Block List in the Microsoft 365 Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The Tenant Allow/Block List is used during mail flow for incoming messages from external senders. The Tenant Allow/Block List doesn't apply to internal messages within the organization.
+The Tenant Allow/Block List in the Microsoft 365 Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow for incoming messages from external senders.
+
+The Tenant Allow/Block List doesn't apply to internal messages within the organization. However, block entries for **Domains and email addresses** prevent users in the organization from sending email to those blocked domains and addresses.
The Tenant Allow/Block list is available in the Microsoft 365 Defender portal at <https://security.microsoft.com> \> **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. To go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
security Why Do I Need Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/why-do-i-need-microsoft-defender-for-office-365.md
+
+ Title: Why do I need Microsoft Defender for Office 365?
+++
+audience: Admin
+
+ms.localizationpriority: high
+search.appverid:
+ - MET150
+ - MOE150
+ms.assetid: e100fe7c-f2a1-4b7d-9e08-622330b83653
+
+ - m365-security
+ - tier1
+ - highpri
+
+ - seo-marvel-apr2020
+ - intro-overview
+ - curated-apr-2023
+description: Is Microsoft Defender for Office 365 worth it? Let's find out. This article had info on the fastest and most recommended setup of Microsoft Defender for Office 365 including Safe Attachments, Safe Links, advanced anti-phishing tools, reporting tools, and threat intelligence capabilities.
++ Last updated : 04/27/2023++
+# Why do I need Microsoft Defender for Office 365?
+
+> [!IMPORTANT]
+> **If you are being blocked by Safe Links pages**, go here for info: [Advanced Outlook.com security for Microsoft 365 subscribers](https://support.microsoft.com/office/advanced-outlook-com-security-for-microsoft-365-subscribers-882d2243-eab9-4545-a58a-b36fee4a46e2?storagetype=live).
+
+**Applies to**
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+
+**Microsoft Defender for Office 365 is a seamless integration into your Office 365 subscription** that provides protection against threats that arrive in email, links (URLS), attachments, or collaboration tools like SharePoint, Teams, and Outlook. With real-time views of threats and tools like Threat Explorer, you can threat hunt and stay ahead of potential threats.
+
+For email threats that you may discover after the fact, Zero-hour autopurge (ZAP) can remove those mails. Automated Investigation and Response (AIR) allows you to automate monitoring and remediation, making it more efficient for security operations (sec ops) teams. The deep integration with Office 365 and robust reporting ensures that you are always on top of security operations.
+
+## Let's focus on the features of Microsoft Defender for Office 365
+
+Microsoft Defender for Office 365 safeguards organizations against malicious threats by providing admins and sec ops teams a wide range of capabilities. These features *start* benefitting users, admins, and sec ops at the time of installation. For example:
+
+- **[Installation by Preset can set up everything for you](preset-security-policies.md)**: This is the fastest, easiest, and the *recommended* set up, because it automates the roll-out of a secure environment (if automated policies are allowed and possible in your organization). And abbreviated steps are available too (because when *isn't* admin/sec ops in a hurry): [Just the steps for preset policy setup, please!](step-by-step-guides/ensuring-you-always-have-the-optimal-security-controls-with-preset-security-policies.md)
+
+- **[Threat protection policies](#defender-for-office-365-policies)**: Define threat-protection policies so admins can set the right level of protection for the organization.
+
+- **[Reports](#how-to-view-microsoft-defender-for-office-365-reports)**: Sec ops can view real-time reports to monitor Defender for Office 365 performance in the organization.
+
+- **[Threat investigation and response capabilities](#best-of-class-threat-investigation-and-response-capabilities)**: These are leading-edge tools to investigate, understand, simulate, and prevent threats.
+
+- **[Automated investigation and response capabilities](air-about.md)**: Save time and effort investigating and mitigating threats by automating what you can.
+
+## Interactive guide to Microsoft Defender for Office 365
+
+If you need more information, this interactive guide will show you why Microsoft Defender for Office 365 is worth it, and give examples on how to safeguard your organization.
+
+You'll also see how Defender for Office 365 can help you define protection policies, analyze threats to your organization, and respond to attacks.
+
+[Check out the interactive guide](https://aka.ms/MSDO-IG)
+
+## What is the difference between Plan 1 and Plan 2 Defender for Office 365?
+
+For more on what's included in Microsoft 365 Plans 1 & 2, browse over to [this document](microsoft-defender-for-office-365-product-overview.md), because that article quickly spells out what makes up the two products, and the ***emphasis*** of each part of *Microsoft Defender for Office 365* using a familiar structure: *Protect*, *Detect*, *Investigate*, and *Respond*.
+
+Graphics and short, scannable paragraphs answer questions like:
+
+- What is *Plan 1* optimized to do for you?
+- What's the biggest benefit to your company in *Plan 2*?
+- Who has *Exchange Online Protection* and what's it optimized to do?
+
+So, don't miss it!
+
+## How do you get started?
+
+There are two methods to set up Microsoft Defender for Office 365 for your subscription.
+
+### Preset security policy configuration is *recommended*
+
+It is **recommended** that -- as much as your organization can, given its specific needs -- you configure via **preset security policies**. You can learn more about presets here: [Preset setup information and steps](preset-security-policies.md); or if you just want steps, here are just [the steps for preset policy setup](step-by-step-guides/ensuring-you-always-have-the-optimal-security-controls-with-preset-security-policies.md).
+
+### Manual configuration for Microsoft Defender for Office 365
+
+Though it's no longer the recommended practice, here are the initial logical configuration chunks for manual set up:
+
+- Configure everything with '*anti*' in the name.
+ - anti-malware
+ - anti-phishing
+ - anti-spam
+- Set up everything with '*safe*' in the name.
+ - Safe Links
+ - Safe Attachments
+- Defend the workloads (ex. SharePoint Online, OneDrive, and Teams)
+- Protect with zero-hour auto purge (ZAP).
+
+To learn by doing things manually, [click this link](protect-against-threats.md).
+
+> [!NOTE]
+> Microsoft Defender for Office 365 comes in two different Plan types. You can tell if you have **Plan 1** if you have *Real-time Detections*, and **Plan 2**, if you have *Threat Explorer* (also called Explorer). The Plan you have influences the tools you see, so be sure that you're aware of your Plan as you learn.
+
+## Manual steps to Configure Microsoft Defender for Office 365 policies
+
+*It's recommended that you configure with preset security policies* (if I haven't said this enough), but some organizations must configure manually.
+
+With Microsoft Defender for Office 365, your organization's security team can configure protection by defining policies in the Microsoft 365 Defender portal at <https://security.microsoft.com> > **Email & collaboration** \> **Policies & rules** \> **Threat policies**. Or, you can go directly to the **Threat policies** page by using <https://security.microsoft.com/threatpolicy>.
+
+> [!TIP]
+> For a quick list of policies to define manually, see [Protect against threats](protect-against-threats.md).
+
+## Defender for Office 365 Policies
+
+The policies that are defined for your organization determine the behavior and protection level for predefined threats.
+
+Policy options are extremely flexible. For example, your organization's security team can set fine-grained threat protection at the user, organization, recipient, and domain level. It is important to *review your policies regularly*, because new threats and challenges emerge daily.
+
+### Safe Attachments
+
+- **[Safe Attachments](safe-attachments-about.md)**: Provides zero-day protection to safeguard your messaging system, by checking email attachments for malicious content. It routes all messages and attachments that do not have a virus/malware signature to a special environment, and then uses machine learning and analysis techniques to detect malicious intent. If no suspicious activity is found, the message is forwarded to the mailbox. To learn more, see [Set up Safe Attachments policies](safe-attachments-policies-configure.md).
+
+### Safe Links
+
+- **[Safe Links](safe-links-about.md)**: Provides time-of-click verification of URLs, for example, in emails messages and Office files. Protection is ongoing and applies across your messaging and Office environment. Links are scanned for each click: safe links remain accessible and malicious links are dynamically blocked. To learn more, see [Set up Safe Links policies](safe-links-policies-configure.md).
+
+### Safe Attachments for SharePoint, OneDrive, and Microsoft Teams
+
+- **[Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)**: Protects your organization when users collaborate and share files, by identifying and blocking malicious files in team sites and document libraries. To learn more, see [Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-configure.md).
+
+### Anti-phishing protection in Defender for Office 365
+
+- **[Anti-phishing protection in Defender for Office 365](anti-phishing-policies-about.md#exclusive-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)**: Detects attempts to impersonate your users and internal or custom domains. It applies machine learning models and advanced impersonation-detection algorithms to avert phishing attacks. To learn more, see [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md).
+
+## How to view Microsoft Defender for Office 365 reports
+
+Microsoft Defender for Office 365 includes [reports](reports-defender-for-office-365.md) to monitor Defender for Office 365. You can access the reports in the Microsoft 365 Defender portal at <https://security.microsoft.com> at **Reports** \> **Email & collaboration** \> **Email & collaboration reports**. You can also go directly to the **Email and collaboration reports** page using <https://security.microsoft.com/securityreports>.
+
+Reports update in real-time, providing you with the latest insights. These reports also provide recommendations and alert you to imminent threats. Predefined reports include the following:
+
+- [Threat Explorer (or real-time detections)](threat-explorer-about.md)
+- [Threat protection status report](reports-defender-for-office-365.md#threat-protection-status-report)
+- ... and several more.
+
+## Best of class threat investigation and response capabilities
+
+Microsoft Defender for Office 365 Plan 2 includes best-of-class [threat investigation and response tools](office-365-ti.md) that enable your organization's security team to anticipate, understand, and prevent malicious attacks.
+
+### Threat Trackers on the latest threats
+
+- **[Threat trackers](threat-trackers.md)** provide the latest intelligence on prevailing cybersecurity issues. For example, you can view information about the latest malware, and take countermeasures before it becomes an actual threat to your organization. Available trackers include [Noteworthy trackers](threat-trackers.md#noteworthy-trackers), [Trending trackers](threat-trackers.md#trending-trackers), [Tracked queries](threat-trackers.md#tracked-queries), and [Saved queries](threat-trackers.md#saved-queries).
+
+### Threat Explorer or Real-Time Detections
+
+- **[Threat Explorer in Plan 2 (or real-time detections in Plan 1)](threat-explorer-about.md)** (also referred to as Explorer) is a real-time report that allows you to identify and analyze recent threats. You can configure Explorer to show data for custom periods.
+
+### Attack simulation training for user readiness
+
+- **[Attack simulation training](attack-simulation-training-simulations.md)** allows you to run realistic attack scenarios in your organization to identify vulnerabilities. Simulations of current types of attacks are available, including spear phishing credential harvest and attachment attacks, and password spray and brute force password attacks.
+
+## Save time with automated investigation and response
+
+When sec ops is investigating a potential cyberattack, time is of the essence. The sooner you can identify and mitigate threats, the better off your organization will be.
+
+[Automated investigation and response](air-about.md) (AIR) capabilities include a set of security playbooks that can be launched automatically, such as when an alert is triggered, or manually, such as from a view in Explorer.
+
+AIR can save your security operations team time and effort in mitigating threats effectively and efficiently. To learn more, see [AIR in Office 365](air-about.md).
+
+## These are the permissions needed to use Defender for Office 365 features
+
+To access Microsoft Defender for Office 365 features, you *must* be assigned an appropriate role. The following table includes some examples:
+
+|Role or role group|Resources to learn more|
+|||
+|global administrator (or Organization Management)|You can assign this role in Azure Active Directory or in the Microsoft 365 Defender portal. For more information, see [Permissions in the Microsoft 365 Defender portal](mdo-portal-permissions.md).|
+|Security Administrator|You can assign this role in Azure Active Directory or in the Microsoft 365 Defender portal. For more information, see [Permissions in the Microsoft 365 Defender portal](mdo-portal-permissions.md).|
+|Organization Management in Exchange Online|[Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo) <p> [Exchange Online PowerShell](/powershell/exchange/exchange-online-powershell)|
+|Search and Purge|This role is available only in the Microsoft 365 Defender portal or the Microsoft Purview compliance portal. For more information, see [Permissions in the Microsoft 365 Defender portal](mdo-portal-permissions.md) and [Permissions in the Microsoft Purview compliance portal](../../compliance/microsoft-365-compliance-center-permissions.md).|
+|||
+
+## Where can you get Microsoft Defender for Office 365?
+
+Microsoft Defender for Office 365 is included in certain subscriptions, such as Microsoft 365 E5, Office 365 E5, Office 365 A5, and Microsoft 365 Business Premium.
+
+### What to do if your subscription doesn't have Defender for Office 365 but you need it
+
+If your subscription doesn't include Defender for Office 365, you can get Defender for Office 365 Plan 1 or Plan 2 as an add-on to certain subscriptions. To learn more, take a look at the following resources:
+
+- [Microsoft Defender for Office 365 availability](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#office-365-advanced-threat-protection-atp-availability) for a list of subscriptions that include Defender for Office 365 plans.
+
+- [Feature availability across Microsoft Defender for Office 365 plans](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#feature-availability-across-advanced-threat-protection-atp-plans) for a list of features included in Plan 1 and 2.
+
+- [Get the right Microsoft Defender for Office 365](https://products.office.com/exchange/advance-threat-protection#pmg-allup-content) to compare plans and purchase Defender for Office 365.
+
+- [Start a free trial](https://go.microsoft.com/fwlink/p/?LinkID=698279)
+
+## What new features are coming for Microsoft Defender for Office 365?
+
+New features are added to Microsoft Defender for Office 365 continually. To learn more, see the following resources:
+
+- [Microsoft 365 Roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=Microsoft%2CDefender%2Cfor%2COffice%2C365) provides a list of new features in development and rolling out.
+
+- [Microsoft Defender for Office 365 Service Description](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#whats-new-in-office-365-advanced-threat-protection-atp) describes features and availability across Defender for Office 365 plans.
+
+## See also
+
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+- [Automated investigation and response (AIR) in Microsoft 365 Defender](../defender/m365d-autoir.md)
syntex Apply A Retention Label To A Model https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/apply-a-retention-label-to-a-model.md
You can apply a pre-existing retention label to your model through your model se
2. In **Model settings**, in the **Security and compliance** section, select the **Retention label** menu to see a list of retention labels that are available for you to apply to the model.
- ![Retention label menu.](../media/content-understanding/retention-labels-menu.png)
+ ![Retention label menu.](../media/content-understanding/retention-labels-menu.png)
3. Select the retention label you want to apply to the model, and then select **Save**.
syntex Create Syntex Model https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/create-syntex-model.md
On the **Options for model creation** page, there are two sections:
- [**Set up a prebuilt model**](#set-up-a-prebuilt-model)
-![Screenshot of the Options for model creation page showing the custom models and prebuilt models.](../media/content-understanding/options-for-model-creation.png)
+![Screenshot of the Options for model creation page showing the custom models and prebuilt models.](../media/content-understanding/options-for-model-creation-2.png)
> [!NOTE] > All model options might not be available. These options are configured by your Microsoft 365 admin.
Use the **Layout method** to create a [structured document processing model](for
The **Set up a prebuilt model** section shows the types of prebuilt models you can use.
-![Screenshot of the Use a prebuilt model section on the Set up a prebuilt model page.](../media/content-understanding/use-a-trained-model-section.png)
+![Screenshot of the Use a prebuilt model section on the Set up a prebuilt model page.](../media/content-understanding/use-a-trained-model-section-2.png)
+- **Contract processing**
- **Invoice processing**- - **Receipt processing**-
+
Select one of the following tabs to continue with the prebuilt model you want to use.
-# [Invoice processing](#tab/invoice-processing)
+# [Contract processing](#tab/contract-processing)
-1. Select **Invoice processing**.
+1. Select **Contract processing**.
-2. On the **Invoice processing: Details** page, you'll find more information about the model. If you want to proceed with using the model, select **Next**.
+2. On the **Contract processing: Details** page, you'll find more information about the model. If you want to proceed with using the model, select **Next**.
-3. On the right panel of the **Create an invoice processing model** page, enter the following information.
+3. On the right panel of the **Create a contract processing model** page, enter the following information.
- - **Model name** ΓÇô Enter the name of the model, for example *Office expenses*.
+ - **Model name** ΓÇô Enter the name of the model, for example *Service agreement*.
- **Description** ΓÇô Enter information about how this model will be used.
- ![Screenshot of the right panel of the Create an invoice processing model page.](../media/content-understanding/create-a-model-panel.png)
+ ![Screenshot of the right panel of the Create a contract processing model page.](../media/content-understanding/create-a-model-panel.png)
4. Under **Advanced settings**:
Select one of the following tabs to continue with the prebuilt model you want to
5. When you're ready to create the model, select **Create**.
-6. You're now ready to [complete setting up the model](prebuilt-model-invoice.md).
-
-# [Receipt processing](#tab/receipt-processing)
--
-1. Select **Receipt processing**.
-
-2. On the **Receipt processing: Details** page, you'll find more information about the model. If you want to proceed with using the model, select **Next**.
-
-2. On the right panel of the **Create a receipt processing model** page, enter the following information.
-
- - **Model name** ΓÇô Enter the name of the model, for example *Office expenses*.
-
- - **Description** ΓÇô Enter information about how this model will be used.
-
- ![Screenshot of the right panel of the Create a model to process receipts page.](../media/content-understanding/create-a-model-panel.png)
-
-3. Under **Advanced settings**:
-
- - In the **Content type** section, choose whether to create a new content type or to use an existing one.
-
- - In the **Compliance** section, under **Retention labels**, select the retention label you want to add. If a retention label has been already applied to the library where the file is stored, it will be selected.
-
- > [!NOTE]
- > Sensitivity labels are not available for prebuilt models at this time.
-
-4. When you're ready to create the model, select **Create**.
-
-5. You're now ready to [complete setting up the model](prebuilt-model-receipt.md).
-----
-<!
-### Teaching method
-
-Use the **Teaching method** to create an [unstructured document processing model](document-understanding-overview.md).
-
-1. Select **Teaching method**.
-
-2. On the **Teaching method: Details** page, you'll find more information about the model. If you want to proceed with creating the model, select **Next**.
-
-3. On the right panel of the **Create a model with the teaching method** page, enter the following information.
-
- - **Model name** ΓÇô Enter the name of the model, for example *Service agreements*.
-
- - **Description** ΓÇô Enter information about how this model will be used.
-
- ![Screenshot of the right panel of the Create a model with the teaching method page.](../media/content-understanding/create-a-model-panel.png)
-
-4. Under **Advanced settings**:
-
- - In the **Content type** section, choose whether to create a new content type or to use an existing one.
-
- - In the **Compliance** section, under **Retention labels**, select the retention label you want to add. Under **Sensitivity labels**, select the sensitivity label you want to add. If a compliance label has been already applied to the library where the file is stored, it will be shown.
-
-5. When you are ready to create the model, select **Create**.
-
-6. You are now ready to [train the model](create-a-classifier).
-
-### Freeform selection method
-
-Use the **Freeform selection method** to create a [freeform document processing model](freeform-document-processing-overview.md).
-
-1. Select **Freeform selection method**.
-
-2. On the **Freeform selection method: Details** page, you'll find more information about the model. If you want to proceed with creating the model, select **Next**.
-
-3. On the right panel of the **Create a model with the freeform selection method** page, enter the following information.
-
- - **Model name** ΓÇô Enter the name of the model, for example *Service agreements*.
-
- - **Description** ΓÇô Enter information about how this model will be used.
-
- ![Screenshot of the right panel of the Create a model with the Freeform selection method page.](../media/content-understanding/create-a-model-panel.png)
-
-4. Under **Advanced settings**:
-
- - In the **Content type** section, choose whether to create a new content type or to use an existing one.
-
- - In the **Compliance** section, under **Retention labels**, select the retention label you want to add. If a compliance label has been already applied to the library where the file is stored, it will be shown.
-
- > [!NOTE]
- > Sensitivity labels are not available for **Freeform selection method** (freeform document processing models) at this time.
-
-5. When you are ready to create the model, select **Create**.
-
-6. You are now ready to [train the model](train-freeform-document-processing-model.md).
-
- > [!NOTE]
- > When published, this model type is available for reuse by others who do not own the model. Currently, this model can be edited and shared for editing only by the model owner.
+6. You're now ready to [complete setting up the model](prebuilt-model-contract.md).
-### Layout method
-
-Use the **Layout method** to create a [structured document processing model](form-processing-overview.md).
-
-1. Select **Layout method**.
-
-2. On the **Layout method: Details** page, you'll find more information about the model. If you want to proceed with creating the model, select **Next**.
-
-3. On the right panel of the **Create a model with the layout method** page, enter the following information.
-
- - **Model name** ΓÇô Enter the name of the model, for example *Service agreements*.
-
- - **Description** ΓÇô Enter information about how this model will be used.
-
- ![Screenshot of the right panel of the Create a model with the layout method page.](../media/content-understanding/create-a-model-panel.png)
-
-4. Under **Advanced settings**:
-
- - In the **Content type** section, choose whether to create a new content type or to use an existing one.
-
- - In the **Compliance** section, under **Retention labels**, select the retention label you want to add. If a compliance label has been already applied to the library where the file is stored, it will be shown.
-
- > [!NOTE]
- > Sensitivity labels are not available for **Layout method** (structured document processing models) at this time.
-
-5. When you are ready to create the model, select **Create**.
-
-6. You are now ready to [train the model](create-a-form-processing-model.md).
-
- > [!NOTE]
- > When published, this model type is available for reuse by others who do not own the model. Currently, this model can be edited and shared for editing only by the model owner.
-
-## Set up a prebuilt model
-
-1. In the **Set up a prebuilt model** section, view the types of prebuilt models you can use. Select the type of prebuilt model you want to learn more about or to start using.
-
- ![Screenshot of the Use a prebuilt model section on the Set up a prebuilt model page.](../media/content-understanding/use-a-trained-model-section.png)
-
- - [**Invoice processing**](#invoice-processing)
-
- - [**Receipt processing**](#receipt-processing)
-
-2. When you select a prebuilt model, the next page will show you more information about the model. If you want to continue to create the model, select **Next**.
-
-### Invoice processing
+# [Invoice processing](#tab/invoice-processing)
1. Select **Invoice processing**.
Use the **Layout method** to create a [structured document processing model](for
> [!NOTE] > Sensitivity labels are not available for prebuilt models at this time.
-5. When you are ready to create the model, select **Create**.
+5. When you're ready to create the model, select **Create**.
-6. You are now ready to [complete setting up the model](prebuilt-model-invoice.md).
+6. You're now ready to [complete setting up the model](prebuilt-model-invoice.md).
-### Receipt processing
+# [Receipt processing](#tab/receipt-processing)
1. Select **Receipt processing**. 2. On the **Receipt processing: Details** page, you'll find more information about the model. If you want to proceed with using the model, select **Next**.
-2. On the right panel of the **Create a receipt processing model** page, enter the following information.
+3. On the right panel of the **Create a receipt processing model** page, enter the following information.
- **Model name** ΓÇô Enter the name of the model, for example *Office expenses*.
Use the **Layout method** to create a [structured document processing model](for
![Screenshot of the right panel of the Create a model to process receipts page.](../media/content-understanding/create-a-model-panel.png)
-3. Under **Advanced settings**:
+4. Under **Advanced settings**:
- In the **Content type** section, choose whether to create a new content type or to use an existing one.
Use the **Layout method** to create a [structured document processing model](for
> [!NOTE] > Sensitivity labels are not available for prebuilt models at this time.
-4. When you are ready to create the model, select **Create**.
+5. When you're ready to create the model, select **Create**.
+
+6. You're now ready to [complete setting up the model](prebuilt-model-receipt.md).
++
-5. You are now ready to [complete setting up the model](prebuilt-model-receipt.md).
->
syntex Difference Between Document Understanding And Form Processing Model https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/difference-between-document-understanding-and-form-processing-model.md
Use the following table to see differences in custom models to help identify the
| Model creation | Model created in SharePoint in a new site, the content center. | Model created in [AI Builder](/ai-builder/overview) with seamless access from SharePoint document library.| Model created in [AI Builder](/ai-builder/overview) with seamless access from SharePoint document library. | | Classification type | Trainable classifier with optional extractors using machine teaching to assign document location on what data to extract. | Not applicable | Not applicable | | Locations | Can be applied to multiple libraries. | Can be applied to multiple libraries. | Can be applied to multiple libraries. |
-| Supported file types | Train on 5-10 .pdf, Office, or email files, including negative examples.<br>Office files are truncated at 64,000 characters. OCR-scanned files are limited to 20 pages. Supports more than 20 file types. See [supported file types](requirements-and-limitations.md#unstructured-document-processing). | Train on .pdf, .jpg, or .png format, total 50 MB and 500 pages. | Train on .pdf, .jpg, or .png format, total 50 MB and 500 pages. |
+| Supported file types | Train on 5-10 .pdf, Office, or email files, including negative examples.<br>Files are truncated at 64,000 characters. OCR-scanned files are limited to 20 pages. Supports more than 20 file types. See [supported file types](requirements-and-limitations.md#unstructured-document-processing). | Train on .pdf, .jpg, or .png format, total 50 MB and 500 pages. | Train on .pdf, .jpg, or .png format, total 50 MB and 500 pages. |
| Integrate with managed metadata | Yes, by training entity extractor referencing a configured managed metadata field. | No | No | | Compliance feature integration with Microsoft Purview Information Protection | Set published retention labels.<br>Set published sensitivity labels. | Set retention labels is coming. <br>Set sensitivity labels is coming. | Set published retention labels. <br>Set sensitivity labels is coming. | | Supported regions| Available in all regions. | Relies on Power Platform. For information about global availability for Power Platform and AI Builder, see [Power Platform availability](https://dynamics.microsoft.com/geographic-availability/). | Relies on Power Platform. For information about global availability for Power Platform and AI Builder, see [Power Platform availability](https://dynamics.microsoft.com/geographic-availability/). |
syntex Model Types Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/model-types-overview.md
description: Learn about custom models and prebuilt models in Microsoft Syntex.
<sup>**Applies to:** &ensp; &#10003; All custom models &ensp; | &ensp; &#10003; All prebuilt models</sup>
-Content understanding in Microsoft Syntex starts with AI models. Models let you identify and classify documents that are uploaded to SharePoint document libraries, and then to extract the information you need from each file.
-
-When applied to a SharePoint document library, the model is associated with a content type and has columns to store the information being extracted. The content type you create is stored in the SharePoint content type gallery. You can also choose to use existing content types to use their schema.
- </br> > [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4GJXS] </br>
+Content understanding in Microsoft Syntex starts with AI models. Models let you identify and classify documents that are uploaded to SharePoint document libraries, and then to extract the information you need from each file.
+
+When applied to a SharePoint document library, the model is associated with a content type and has columns to store the information being extracted. The content type you create is stored in the SharePoint content type gallery. You can also choose to use existing content types to use their schema.
+ Syntex uses [custom models](#custom-models) and [prebuilt models](#prebuilt-models).
-![Diagram showing the types of Syntex custom and prebuilt models.](../media/content-understanding/syntex-model-types-diagram.png)
+![Diagram showing the types of Syntex custom and prebuilt models.](../media/content-understanding/syntex-model-types-diagram-2.png)
Models can be either *enterprise models*, which are created in a [content center](create-a-content-center.md), or *local models*, which are created on your [local SharePoint site](create-local-model.md).
If you don't need to build a custom model, you can use a [prebuilt model](prebui
Prebuilt models include:
+- [Contract processing](#contract-processing)
- [Invoice processing](#invoice-processing) - [Receipt processing](#receipt-processing)
+![Screenshot of the Options for model creation page showing the prebuilt model options.](../media/content-understanding/model-options-prebuilt.png)
+ Prebuilt models are pretrained to recognize documents and the structured information in the documents. Instead of having to create a new custom model from scratch, you can iterate on an existing pretrained model to add specific fields that fit the needs of your organization.
+### Contract processing
+
+The contract processing model analyzes and extracts key information from contract documents. The API analyzes contracts in various formats and extracts key contract information such as client or party name, billing address, jurisdiction, and expiration date.
+
+For more information about prebuilt contract processing models, see [Use a prebuilt model to extract information from contracts](prebuilt-model-contract.md).
+ ### Invoice processing The invoice processing model analyzes and extracts key information from sales invoices. The API analyzes invoices in various formats and extracts key invoice information such as customer name, billing address, due date, and amount due.
syntex Prebuilt Model Contract https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-model-contract.md
+
+ Title: Use a prebuilt model to extract information from contracts in Microsoft Syntex
++++
+audience: admin
++
+search.appverid:
+
+ - enabler-strategic
+ - m365initiative-syntex
+ms.localizationpriority: medium
+description: Learn how to use a prebuilt contracts model in Microsoft Syntex.
+++
+# Use a prebuilt model to extract information from contracts in Microsoft Syntex
+
+The prebuilt *contracts model* analyzes and extracts key information from contract documents. The API recognizes contracts in various formats and extracts key contract information, such as client name and address, contract duration, and renewal date.
+
+> [!NOTE]
+> Currently, this model is available only for .pdf and image file types. More file types will be added in future releases.
+
+To use a contracts model, follow these steps:
+
+- Step 1: [Create a contracts model](#step-1-create-a-contracts-model)
+- Step 2: [Upload an example file to analyze](#step-2-upload-an-example-file-to-analyze)
+- Step 3: [Select extractors for your model](#step-3-select-extractors-for-your-model)
+- Step 4: [Apply the model](#step-4-apply-the-model)
+
+## Step 1: Create a contracts model
+
+Follow the instructions in [Create a model in Syntex](create-syntex-model.md#set-up-a-prebuilt-model) to create a prebuilt contracts model. Then continue with the following steps to complete your model.
+
+## Step 2: Upload an example file to analyze
+
+1. On the **Models** page, in the **Add a file to analyze** section, select **Add a file**.
+
+ ![Screenshot of the new models page showing the Add a file to analyze section.](../media/content-understanding/prebuilt-add-file-to-analyze-contract.png)
+
+2. On the **Files to analyze the model** page, select **Add** to find the file you want to use.
+
+ ![Screenshot of the Files to analyze the model page showing the Add button.](../media/content-understanding/prebuilt-add-file-button.png)
+
+3. On the **Add a file from the training files library** page, select the file, and then select **Add**.
+
+ ![Screenshot of the Add a file from the training files library page.](../media/content-understanding/prebuilt-add-file-from-training-library.png)
+
+4. On the **Files to analyze the model** page, select **Next**.
+
+## Step 3: Select extractors for your model
+
+On the extractor details page, you'll see the document area on the right and the **Extractors** panel on the left. The **Extractors** panel shows the list of extractors that have been identified in the document.
+
+ ![Screenshot of the extractor details page and Extractors panel.](../media/content-understanding/prebuilt-extractor-details-page-contracts.png)
+
+The entity fields that are highlighted in green in the document area are the items that were detected by the model when it analyzed the file. When you select an entity to extract, the highlighted field will change to blue. If you later decide not to include the entity, the highlighted field will change to gray. The highlights make it easier to see the current state of the extractors you've selected.
+
+The prebuilt contracts model lets you have multiple values for a given field. For example, if a contract involves two or more parties, it could apply to multiple jurisdictions. In addition, the parties and jurisdictions are themselves objects with multiple properties.
+
+> [!TIP]
+> You can use the scroll wheel on your mouse or the controls at the bottom of the document area to zoom in or out as needed to read the entity fields.
+
+### Select an extractor entity
+
+You can select an extractor either from the document area or from the **Extractors** panel, depending on your preference.
+
+- To select an extractor from the document area, select the entity field.
+
+ ![Screenshot of the document area showing how to select an entity field.](../media/content-understanding/prebuilt-document-area-select-field-contracts.png)
+
+- To select an extractor from the **Extractors** panel, select the checkbox to the right of the entity name.
+
+ ![Screenshot of the Extractors panel showing how to select an entity field.](../media/content-understanding/prebuilt-extractors-panel-select-field-contracts.png)
+
+When you select an extractor, a **Select extractor?** box is displayed in the document area. The box shows the extractor name, the original value, and the option to select it as an extractor. For certain data types such as numbers or dates, it will also show an extracted value.
+
+ ![Screenshot of the Select extractor box on the extractor details page.](../media/content-understanding/prebuilt-select-distractor-box-contracts.png)
+
+The original value is what is actually in the document. The extracted value is what will be written into the column in SharePoint. When the model is applied to a library, you can use column formatting to specify how you want it to look in the document.
+
+Continue to select additional extractors you want to you use. You can also add other files to analyze for this model configuration.
+
+### Rename an extractor
+
+You can rename an extractor either from the model home page or from the **Extractors** panel. You might consider renaming selected extractors because these names will be used as the column names when the model is applied to the library.
+
+To rename an extractor from the model home page:
+
+1. In the **Extractors** section, select the extractor you want to rename, and then select **Rename**.
+
+ ![Screenshot of the Extractors section with the Rename option highlighted.](../media/content-understanding/prebuilt-model-page-rename-extractor.png)
+
+2. On the **Rename entity extractor** panel, enter the new name of the extractor, and then select **Rename**.
+
+To rename an extractor from the **Extractors** panel:
+
+1. Select the extractor you want to rename, and then select **Rename**.
+
+ ![Screenshot of the Extractors panel showing how to rename an extractor.](../media/content-understanding/prebuilt-extractors-panel-rename-field.png)
+
+2. In the **Rename extractor** box, enter the new name of the extractor, and then select **Rename**.
+
+## Step 4: Apply the model
+
+- To save changes and return to the model home page, on the **Extractors** panel, select **Save and exit**.
+
+- If you're ready to apply the model to a library, in the document area, select **Next**. On the **Add to library** panel, choose the library to which you want to add the model, and then select **Add**.
+
+## Change the view in a document library
+
+For information about how to set the default view and how to change the view of a document library, see [Choose the view in a document library](choose-library-view.md).
+
syntex Prebuilt Model Invoice https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-model-invoice.md
To use an invoices model, follow these steps:
## Step 1: Create an invoices model
-Follow the instructions in [Create a model in Syntex](create-syntex-model.md) to create a prebuilt invoices model. Then continue with the following steps to complete your model.
+Follow the instructions in [Create a model in Syntex](create-syntex-model.md#set-up-a-prebuilt-model) to create a prebuilt invoices model. Then continue with the following steps to complete your model.
## Step 2: Upload an example file to analyze
syntex Prebuilt Model Receipt https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-model-receipt.md
To use a receipts model, follow these steps:
## Step 1: Create a receipts model
-Follow the instructions in [Create a model in Syntex](create-syntex-model.md) to create a prebuilt receipts model. Then continue with the following steps to complete your model.
+Follow the instructions in [Create a model in Syntex](create-syntex-model.md#set-up-a-prebuilt-model) to create a prebuilt receipts model. Then continue with the following steps to complete your model.
## Step 2: Upload an example file to analyze
syntex Prebuilt Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-overview.md
After publishing your model, use the content center to apply it to any SharePoin
## Available prebuilt models
-Currently, there are two prebuilt models available: [invoices](prebuilt-model-invoice.md) and [receipts](prebuilt-model-receipt.md).
+Currently, there are three prebuilt models available: [invoices](prebuilt-model-invoice.md), [receipts](prebuilt-model-receipt.md), and [contracts](prebuilt-model-contract.md).
-- The *invoices model* analyzes and extracts key information from sales invoices. The API analyzes invoices in various formats and [extracts key invoice information](/azure/applied-ai-services/form-recognizer/concept-invoice#field-extraction) such as customer name, billing address, due date, and amount due.
+- The prebuilt *contracts model* analyzes and extracts key information from contract documents. The API recognizes contracts in various formats and extracts key contract information, such as client name and address, contract duration, and renewal date.
-- The *receipts model* analyzes and extracts key information from sales receipts. The API analyzes printed and handwritten receipts and [extracts key receipt information](/azure/applied-ai-services/form-recognizer/concept-receipt#field-extraction) such as merchant name, merchant phone number, transaction date, tax, and transaction total.
+- The prebuilt *invoices model* analyzes and extracts key information from sales invoices. The API analyzes invoices in various formats and [extracts key invoice information](/azure/applied-ai-services/form-recognizer/concept-invoice#field-extraction) such as customer name, billing address, due date, and amount due.
+- The prebuilt *receipts model* analyzes and extracts key information from sales receipts. The API analyzes printed and handwritten receipts and [extracts key receipt information](/azure/applied-ai-services/form-recognizer/concept-receipt#field-extraction) such as merchant name, merchant phone number, transaction date, tax, and transaction total.
+
Additional prebuilt models will be available in future releases. ## Requirements
For information about requirements to consider when choosing this model, see [Re
## See also
+[Use a prebuilt model to extract information from contracts](prebuilt-model-contract.md)
+ [Use a prebuilt model to extract information from invoices](prebuilt-model-invoice.md) [Use a prebuilt model to extract information from receipts](prebuilt-model-receipt.md)
syntex Requirements And Limitations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/requirements-and-limitations.md
Custom models:
Prebuilt models:
+- [Contract processing](#contract-processing)
- [Invoice processing](#invoice-processing) - [Receipt processing](#receipt-processing)
Prebuilt models:
## Prebuilt models
+### Contract processing
+
+| Icon | Description |
+| - | - |
+| ![Files symbol.](/office/media/icons/files-blue.png) | **Supported file types** <br>This model supports the following file types: .bmp, .jpeg, .pdf, .png, and .tiff. |
+| ![Conversation symbol.](/office/media/icons/chat-room-conversation-blue.png) | **Supported languages** <br>This model supports only English language contracts from the United States. |
+| ![Paragraph symbol.](/office/media/icons/paragraph-writing-blue.png) | **OCR considerations** <br>This model uses optical character recognition (OCR) technology to scan .pdf files, image files, and .tiff files. OCR processing works best on documents that meet the following requirements: <br> - File format of .jpg, .png, or .pdf (text or scanned). Text-embedded .pdf files are better, because there won't be any errors in character extraction and location. <br> - For .pdf and .tiff files, up to 2,000 pages can be processed. <br> - The file size must be less than 50 MB. <br> - For images, dimensions must be between 50 x 50 and 10,000 x 10,000 pixels. <br> - For .pdf files, dimensions must be at most 11 x 17 inches, corresponding to Legal or A3 paper sizes and smaller. <br> - The total size of the training data is 500 pages or less. <br> Note the following differences about Microsoft Office text-based files and OCR-scanned files (.pdf, image, or .tiff): <br> - Office files: Truncated at 64,000 characters (in training and when run against files in a document library). <br> - OCR-scanned files: There's a 20-page limit.|
+| ![Globe symbol.](/office/media/icons/globe-internet.png) | **Multi-Geo environments** <br>When setting up Syntex in a [Microsoft 365 Multi-Geo](/microsoft-365/enterprise/microsoft-365-multi-geo) environment, you can only configure it to use the model type in the central location. If you want to use this model type in a satellite location, contact Microsoft support. |
+| ![Objects symbol.](/office/media/icons/objects-blue.png) | **Multi-model libraries** <br>If two or more trained models are applied to the same library, the file is classified using the model that has the highest average confidence score. The extracted entities will be from the applied model only. |
+ ### Invoice processing | Icon | Description |
syntex Syntex Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/syntex-overview.md
You build custom models to understand the layout of your files from example docu
If you don't need to build a custom model, you can use a [prebuilt model](prebuilt-overview.md). This type of model is pretrained to extract predefined entities from common business files. Prebuilt models include:
+- [Contract processing](prebuilt-model-contract.md)
- [Invoice processing](prebuilt-model-invoice.md) - [Receipt processing](prebuilt-model-receipt.md)
-| Invoice processing | Receipt processing |
-| - | - |
-| ![Icon for Invoices model.](../media/content-understanding/trained-invoices-model.png) | ![Icon for Receipts model.](../media/content-understanding/trained-receipts-model.png) |
-| Use this prebuilt model to save time processing invoices. Automatically extract key information specific to invoices. <br>[Learn more about invoice models.](prebuilt-model-invoice.md) | Use this prebuilt model to save time processing receipts. Automatically extract key information specific to expenses. <br>[Learn more about receipt models.](prebuilt-model-receipt.md) |
+| Contract processing | Invoice processing | Receipt processing |
+| - | - | - |
+| ![Icon for Contracts model.](../media/content-understanding/trained-contracts-model.png)| ![Icon for Invoices model.](../media/content-understanding/trained-invoices-model.png) | ![Icon for Receipts model.](../media/content-understanding/trained-receipts-model.png) |
+| Use this prebuilt model to save time processing contracts. Automatically extract key information specific to contract documents. <br>[Learn more about contract models.](prebuilt-model-contract.md) | Use this prebuilt model to save time processing invoices. Automatically extract key information specific to invoices. <br>[Learn more about invoice models.](prebuilt-model-invoice.md) | Use this prebuilt model to save time processing receipts. Automatically extract key information specific to expenses. <br>[Learn more about receipt models.](prebuilt-model-receipt.md) |
[Learn more about custom and prebuilt models in Microsoft Syntex.](model-types-overview.md)
syntex Trial Syntex https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/trial-syntex.md
Based on the outcome of the trial, you can decide whether to proceed to producti
To ensure continuity of service, you need to purchase the required number of [licenses](syntex-licensing.md) and assign those licenses to users. Trial users who don't have a full license at the end of the trial period won't be able to fully use Syntex.
-You might have to estimate your projected use of Sstructured document processing or freeform document processing models, and plan for the expected number of AI Builder credits. For help, see [Estimate the AI Builder capacity that's right for you](https://powerapps.microsoft.com/ai-builder-calculator/).
+You might have to estimate your projected use of structured document processing or freeform document processing models, and plan for the expected number of AI Builder credits. For help, see [Estimate the AI Builder capacity that's right for you](https://powerapps.microsoft.com/ai-builder-calculator/).
### Don't proceed to production use
whiteboard Manage Data Organizations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-data-organizations.md
Title: Manage data for Microsoft Whiteboard -+ Last updated 03/08/2023
Once the .whiteboard file appears in the OneDrive for Business of the new owner,
[Manage sharing for Whiteboard](manage-sharing-organizations.md) [Deploy Whiteboard on Windows](deploy-on-windows-organizations.md)+
whiteboard Manage Whiteboard Access Organizations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-whiteboard-access-organizations.md
Title: Manage access to Microsoft Whiteboard for your organization -+ Last updated 11/03/2021
To prevent access to Whiteboard for specific users, see [Building a Conditional
[Manage sharing for Whiteboard](manage-sharing-organizations.md) [Deploy Whiteboard on Windows](deploy-on-windows-organizations.md)+