Updates from: 04/30/2021 03:30:36
Category Microsoft Docs article Related commit history on GitHub Change details
admin Add Another Email Alias For A User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/add-another-email-alias-for-a-user.md
You must have [admin permissions](../add-users/about-admin-roles.md) to do this.
1. In the admin center, go to the **Users** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=834822" target="_blank">Active users</a> page.
-2. On the **Active Users** page, select the user > **Manage email aliases**. You won't see this option if the person doesn't have a license assigned to them.
+2. On the **Active Users** page, select the user > **Manage username and email**. You won't see this option if the person doesn't have a license assigned to them.
3. Select **+ Add an alias** and enter a new alias for the user.
campaigns Index https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/campaigns/index.md
search.appverid:
- BCS160 - MET150 ms.assetid: 5abfef7b-5957-484a-b06b-a7c55e013e44
-description: "Microsoft 365 guidance for smaller businesses, including smaller firms, practices, and political campaigns."
+description: "Microsoft 365 security and collaboration recommendations for smaller businesses, including smaller firms, practices, and political campaigns."
Microsoft 365 for smaller businesses and campaigns
compliance Create A Custom Sensitive Information Type In Scc Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-a-custom-sensitive-information-type-in-scc-powershell.md
Here's the sample XML of the rule package that we'll create in this topic. Eleme
</RulePack> <Rules> <!-- Employee ID -->
- <Entity id="E1CC861E-3FE9-4A58-82DF-4BD259EAB378" patternsProximity="300" recommendedConfidence="70">
- <Pattern confidenceLevel="60">
+ <Entity id="E1CC861E-3FE9-4A58-82DF-4BD259EAB378" patternsProximity="300" recommendedConfidence="75">
+ <Pattern confidenceLevel="65">
<IdMatch idRef="Regex_employee_id"/> </Pattern>
- <Pattern confidenceLevel="70">
+ <Pattern confidenceLevel="75">
<IdMatch idRef="Regex_employee_id"/> <Match idRef="Func_us_date"/> </Pattern>
- <Pattern confidenceLevel="80">
+ <Pattern confidenceLevel="85">
<IdMatch idRef="Regex_employee_id"/> <Match idRef="Func_us_date"/> <Any minMatches="1">
You can copy this markup, save it as an XSD file, and use it to validate your ru
- [Sensitive information type entity definitions](sensitive-information-type-entity-definitions.md) -- [What the DLP functions look for](what-the-dlp-functions-look-for.md)
+- [What the DLP functions look for](what-the-dlp-functions-look-for.md)
compliance Create And Manage Inactive Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-and-manage-inactive-mailboxes.md
For step-by-step procedures for placing a mailbox on Litigation Hold or applying
- [Learn about retention policies and retention labels](retention.md) > [!NOTE]
-> For Litigation Holds and retention policies, you can create an indefinite hold or on a time-based hold. In an indefinite hold, the contents of the inactive mailbox will be retained forever, or until the hold is removed or until the hold duration is changed. After the hold or retention policy is removed (assuming that the mailbox was deleted more than 30 days ago), the inactive mailbox will be marked for permanent deletion and the contents of the mailbox will no longer be retained or discoverable. In a time-based hold or retention policy, you specify the duration of the hold. This duration is on a per-item basis and is calculated from the date a mailbox item was received or created. After the hold expires for a mailbox item, and that item moved to or is located in the Recoverable Items folder in the inactive mailbox, the item is permanently deleted (purged) from the inactive mailbox after the deleted item retention period expires.
+> For Litigation Holds and retention policies, you can create an indefinite hold or on a time-based hold. In an indefinite hold, the contents of the inactive mailbox will be retained forever, or until the hold is removed or until the hold duration is changed. After the hold or retention policy is removed (assuming that the mailbox was deleted more than 183 days ago), the inactive mailbox will be marked for permanent deletion and the contents of the mailbox will no longer be retained or discoverable. In a time-based hold or retention policy, you specify the duration of the hold. This duration is on a per-item basis and is calculated from the date a mailbox item was received or created. After the hold expires for a mailbox item, and that item moved to or is located in the Recoverable Items folder in the inactive mailbox, the item is permanently deleted (purged) from the inactive mailbox after the deleted item retention period expires.
### Step 2: Delete the mailbox
If another employee takes on the job responsibilities of a former employee, or i
## Delete an inactive mailbox
-If you no longer need to retain the contents of an inactive mailbox, you can permanently delete the inactive mailbox by removing the hold or removing the retention policy applied to the inactive mailbox. If the mailbox was deleted more than 30 days ago, the mailbox will be marked for permanent deletion after you remove the hold, and the mailbox will become non-recoverable. If the mailbox was deleted within the last 30 days, you can still recover the mailbox after removing the hold or retention policy. For step-by-step procedures for removing a hold or a retention policy to permanently delete an inactive mailbox, see [Delete an inactive mailbox](delete-an-inactive-mailbox.md).
+If you no longer need to retain the contents of an inactive mailbox, you can permanently delete the inactive mailbox by removing the hold or removing the retention policy applied to the inactive mailbox. The mailbox will be retained for 183 days after you remove the hold or retention policy. After 183 days, the mailbox will be marked for permanent deletion, and the mailbox will become non-recoverable. If the inactive mailbox was deleted within the last 183 days, you can still recover it. For step-by-step procedures for removing a hold or a retention policy to permanently delete an inactive mailbox, see [Delete an inactive mailbox](delete-an-inactive-mailbox.md).
compliance Create Custom Sensitive Information Types With Exact Data Match Based Classification https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-custom-sensitive-information-types-with-exact-data-match-based-classification.md
When you include the ***ignoredDelimiters*** field with supported characters, E
- \~ - \; -- The `ignoredDelimiters` flag doesn't support:
+The `ignoredDelimiters` flag doesn't support:
- characters 0-9 - A-Z - a-z
In this example, note that:
> [!NOTE] > It can take between 10-60 minutes to update the EDMSchema with additions. The update must complete before you execute steps that use the additions.
+
+After you have imported your rule package with your EDM sensitive info type and have imported your sensitive data table, you can test your newly created type by using the **Test** function in the EDM wizard in the compliance center. See [Use the Exact Data Match Schema and Sensitive Information Type Wizard](sit-edm-wizard.md) for instructions on using this functionality.
#### Editing the schema for EDM-based classification
EDM sensitive information types for following scenarios are currently in develop
- [Overview of DLP policies](data-loss-prevention-policies.md) - [Microsoft Cloud App Security](/cloud-app-security) - [New-DlpEdmSchema](/powershell/module/exchange/new-dlpedmschema)-- [Modify Exact Data Match schema to use configurable match](sit-modify-edm-schema-configurable-match.md)
+- [Modify Exact Data Match schema to use configurable match](sit-modify-edm-schema-configurable-match.md)
compliance Customer Key Tenant Level https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customer-key-tenant-level.md
Title: "Customer Key for Microsoft 365 at the tenant level (public preview)"
Previously updated : 3/26/2021 audience: ITPro
For information about the availability key, see [Learn about the availability ke
For information about rotating or rolling keys that you use with Customer Key, see [Roll or rotate a Customer Key or an availability key](customer-key-availability-key-roll.md). When you update the DEP to use the new version of the keys, you'll run the Set-M365DataAtRestEncryptionPolicy cmdlet as described earlier in this article.
-## Known issues
-
-When you enable Customer Key at the tenant level, you can't create a new team in Microsoft Teams.
- ## Related articles - [Service encryption with Customer Key](customer-key-overview.md)
compliance Data Classification Pub Preview Relnotes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-pub-preview-relnotes.md
Last updated audience: Admin-+
-localization_priority: Priority
+localization_priority: normal
+recommendations: false
- M365-security-compliance search.appverid:
compliance Delete An Inactive Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/delete-an-inactive-mailbox.md
If the In-Place Hold contains a large number of source mailboxes, it's possible
## More information -- **An inactive mailbox is a type of soft-deleted mailbox.** In Exchange Online, a soft-deleted mailbox is a mailbox that's been deleted but can be recovered within a specific retention period. The soft-deleted mailbox retention period in Exchange Online is 30 days. This means that the mailbox can be recovered within 30 days of being soft-deleted. After 30 days, a soft-deleted mailbox is marked for permanent deletion and can't be recovered.
+- **An inactive mailbox is a type of soft-deleted mailbox.** In Exchange Online, a soft-deleted mailbox is a mailbox that's been deleted but can be recovered within a specific retention period. A previously inactive mailbox will be available as a soft-deleted mailbox in Exchange Online for 183 days. This means that the mailbox can be recovered within 183 days of being soft-deleted. After 183 days, a soft-deleted mailbox is marked for permanent deletion and can't be recovered.
-- **What happens after you remove the hold on an inactive mailbox?** The mailbox is treated like other soft-deleted mailboxes and is marked for permanent deletion after the 30-day soft-deleted mailbox retention period expires. This retention period starts on the date when the mailbox was first made inactive. This date is known as the soft-deleted date, which is the date the corresponding user account was deleted or when the Exchange Online mailbox was deleted with the **Remove-Mailbox** cmdlet. The soft-deleted date isn't the date on which you remove the hold.
+- **What happens after you remove the hold on an inactive mailbox?** The mailbox is treated like other soft-deleted mailboxes and is marked for permanent deletion after the 183-day soft-deleted mailbox retention period expires. This retention period starts on the date when the mailbox was first made inactive. This date is known as the soft-deleted date, which is the date the corresponding user account was deleted or when the Exchange Online mailbox was deleted with the **Remove-Mailbox** cmdlet. The soft-deleted date isn't the date on which you remove the hold.
-- **Is an inactive mailbox permanently deleted immediately after the hold is removed?** If the soft-deleted date for an inactive mailbox is older than 30 days, the mailbox won't be permanently deleted as soon as you remove the hold. The mailbox will be marked for permanent deletion and is deleted the next time it's processed.--- **How does the soft-deleted mailbox retention period affect inactive mailboxes?** If the soft-deleted date for an inactive mailbox is more than 30 days before the date the hold was removed, the mailbox is marked for permanent deletion. But if an inactive mailbox has a soft-deleted date within the last 30 days and you remove the hold, you can recover the mailbox up until the soft-deleted mailbox retention period expires. For details, see [Delete or restore user mailboxes in Exchange Online](/exchange/recipients-in-exchange-online/delete-or-restore-mailboxes). After the soft-deleted mailbox retention period expires, you have to follow the procedures for recovering an inactive mailbox. For details, see [Recover an inactive mailbox in Office 365](recover-an-inactive-mailbox.md).
+- **Is an inactive mailbox permanently deleted immediately after the hold is removed?** A formerly inactive mailbox will be available in the soft-deleted state for 183 days. After 183 days the mailbox will be marked for permanent deletion.
- **How do you display information about an inactive mailbox after the hold is removed?** After a hold is removed and the inactive mailbox is reverted back to a soft-deleted mailbox, it won't be returned by using the *InactiveMailboxOnly* parameter with the **Get-Mailbox** cmdlet. But you can display information about the mailbox by using the **Get-Mailbox -SoftDeletedMailbox** command. For example: ```text Get-Mailbox -SoftDeletedMailbox -Identity pilarp | FL Name,Identity,LitigationHoldEnabled,In
- Placeholds,WhenSoftDeleted,IsInactiveMailbox
+ Placeholds,WhenSoftDeleted,IsInactiveMailbox,WasInactiveMailbox,InactiveMailboxRetireTime
Name : pilarp Identity : Soft Deleted Objects\pilarp LitigationHoldEnabled : False InPlaceHolds : {}
- WhenSoftDeleted : 10/30/2014 1:19:04 AM
+ WhenSoftDeleted : 6/16/2020 1:19:04 AM
IsInactiveMailbox : False
+ WasInactiveMailbox : True
+ InactiveMailboxRetireTime : 9/30/2020 11:16:23 PM
```
- In the above example, the *WhenSoftDeleted* property identifies the soft-deleted date, which in this example is October 30, 2014. If this soft-deleted mailbox was previously an inactive mailbox for which the hold was removed, it will be permanently deleted 30 days after the value of the *WhenSoftDeleted* property. In this case, the mailbox is permanently deleted after November 30, 2014.
+ In the above example, the *WhenSoftDeleted* property identifies the soft-deleted date, which in this example is June 16, 2020. The *WasInactiveMailbox* property is listed as `True` because it was previously an inactive mailbox. The mailbox will be permanently deleted 183 days after September 30, 2020.
+
compliance Dlp Conditions And Exceptions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-conditions-and-exceptions.md
audience: Admin-+ localization_priority: None search.appverid: - MOE150 - MET150
+recommendations: false
description: "learn about dlp policy conditions and exceptions"
compliance Dlp Microsoft Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-microsoft-teams.md
To perform this task, you must be assigned a role that has permissions to edit D
5. On the **Choose locations** tab, keep the default setting of all accounts, or select **Let me choose specific locations**. You can specify: 1. up to 1000 individual accounts to include or exclude
- 1. distribution lists and security groups to include or exclude. **This is a public preview feature.**
+ 1. distribution lists and security groups to include or exclude.
<!-- 1. the shared mailbox of a shared channel. **This is a public preview feature.**--> 6. Then choose **Next**.
compliance Dlp Policy Tips Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-tips-reference.md
Last updated audience: Admin-+ localization_priority: Normal search.appverid:
ms.assetid: 6501b5ef-6bf7-43df-b60d-f65781847d6c
- M365-security-compliance - SPO_Content
+recommendations: false
description: "Learn how to add a policy tip to a data loss prevention (DLP) policy notify a user that they are working with content that conflicts with a DLP policy."
compliance Document Fingerprinting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/document-fingerprinting.md
The following example shows what happens if you create a document fingerprint ba
### Example of a patent document matching a document fingerprint of a patent template
-![Document-Fingerprinting-diagram.png](../media/Document-Fingerprinting-diagram.png)
+![Diagram of document fingerprinting.](../media/Document-Fingerprinting-diagram.png)
The patent template contains the blank fields "Patent title," "Inventors," and "Description" and descriptions for each of those fieldsΓÇöthat's the word pattern. When you upload the original patent template, it's in one of the supported file types and in plain text. DLP converts this word pattern into a document fingerprint, which is a small Unicode XML file containing a unique hash value representing the original text, and the fingerprint is saved as a data classification in Active Directory. (As a security measure, the original document itself isn't stored on the service; only the hash value is stored, and the original document can't be reconstructed from the hash value.) The patent fingerprint then becomes a sensitive information type that you can associate with a DLP policy. After you associate the fingerprint with a DLP policy, DLP detects any outbound emails containing documents that match the patent fingerprint and deals with them according to your organization's policy.
Document Fingerprinting won't detect sensitive information in the following case
- Password protected files - Files that contain only images - Documents that don't contain all the text from the original form used to create the document fingerprint
+- Files greater than 10 MB
## Use PowerShell to create a classification rule package based on document fingerprinting
For syntax and parameter information, see:
- [New-DlpSensitiveInformationType](/powershell/module/exchange/New-DlpSensitiveInformationType) - [Remove-DlpSensitiveInformationType](/powershell/module/exchange/Remove-DlpSensitiveInformationType) - [Set-DlpSensitiveInformationType](/powershell/module/exchange/Set-DlpSensitiveInformationType)-- [Get-DlpSensitiveInformationType](/powershell/module/exchange/Get-DlpSensitiveInformationType)
+- [Get-DlpSensitiveInformationType](/powershell/module/exchange/Get-DlpSensitiveInformationType)
compliance New Defender Alert Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/new-defender-alert-policies.md
The following table identifies when the new alert policies will begin triggering
|:|:--| | **Email messages containing malicious URL removed after delivery** (new) | Alerts will start triggering on April 11, 2021| | **Email messages containing malicious file removed after delivery** (new) | Alerts will start triggering on April 11, 2021 |
-| **Emails messages from a campaign were delivered and later removed** (new) | Alerts will start triggering on April 30, 2021|
-| **Malicious emails were delivered and later removed** (new) | Alerts will start triggering on April 30, 2021|
-| **Email messages containing phish URLs removed after delivery** (existing, will be removed)| The alert policy will be removed on April 30, 2021. See the [What you need to do to prepare for these changes](#what-you-need-to-do-to-prepare-for-these-changes) section.|
-| **Email messages containing malware removed after delivery** (existing, will be removed) | The alert policy will be removed on April 30, 2021. See the [What you need to do to prepare for these changes](#what-you-need-to-do-to-prepare-for-these-changes) section. |
+| **Emails messages from a campaign were delivered and later removed** (new) | Alerts will start triggering on May 14, 2021|
+| **Malicious emails were delivered and later removed** (new) | Alerts will start triggering on May 14, 2021|
+| **Email messages containing phish URLs removed after delivery** (existing, will be removed)| The alert policy will be removed on May 14, 2021. See the [What you need to do to prepare for these changes](#what-you-need-to-do-to-prepare-for-these-changes) section.|
+| **Email messages containing malware removed after delivery** (existing, will be removed) | The alert policy will be removed on May 14, 2021. See the [What you need to do to prepare for these changes](#what-you-need-to-do-to-prepare-for-these-changes) section. |
|||
-The alert severity changes will be rolled out to all organizations by April 30, 2021.
+The alert severity changes will be rolled out to all organizations by May 14, 2021.
## How this will affect your organization
-The new alerts will begin firing, and triggering the AIR investigations in your organization on the dates listed above. To reduce the impact on security organizations that have operationalized the two alerts that are to be removed, you will see alerts triggered by the existing alert policies *and* the alerts triggered by the new alert policies between April 5, 2021 and April 30, 2021. This is to provide security teams with time to handle the required changes. To help security teams with the increased alert volume during this short duration, both the existing alerts and the new alerts will be correlated into the same AIR investigation and correlated into a same Incident. More specifically, this includes the following behavior for alerts, AIR investigations, and Incidents:
+The new alerts will begin firing, and triggering the AIR investigations in your organization on the dates listed above. To reduce the impact on security organizations that have operationalized the two alerts that are to be removed, you will see alerts triggered by the existing alert policies *and* the alerts triggered by the new alert policies between April 5, 2021 and May 14, 2021. This is to provide security teams with time to handle the required changes. To help security teams with the increased alert volume during this short duration, both the existing alerts and the new alerts will be correlated into the same AIR investigation and correlated into a same Incident. More specifically, this includes the following behavior for alerts, AIR investigations, and Incidents:
- **Alerts**: By design, you will see the following alert pairs across the existing and new alerts:
How your organization utilizes these alerts will determine what you need to do t
- **Email messages containing malware removed after delivery** -- Do nothing. We'll disable the existing alert policies on April 30, 2021.
+- Do nothing. We'll disable the existing alert policies on May 14, 2021.
**If you have operationalized these alerts:** -- Start consuming the new alerts as a part of your workflows, in anticipation of the existing alert policy removal on April 30, 2021. If you have custom logic in your ticketing system, a security mailbox where you receive alert email notifications, or a SIEM solution that depends on the alert name or alert policy Id (CorrelationId), you will need to modify the logic to accommodate the change.
+- Start consuming the new alerts as a part of your workflows, in anticipation of the existing alert policy removal on May 14, 2021. If you have custom logic in your ticketing system, a security mailbox where you receive alert email notifications, or a SIEM solution that depends on the alert name or alert policy Id (CorrelationId), you will need to modify the logic to accommodate the change.
> [!NOTE] > The information in the alerts, investigations, and incidents has not changed. In fact, this information has been enhanced with additional detail about the threats associated with them.
How your organization utilizes these alerts will determine what you need to do t
- **Email messages containing malware removed after delivery**
- Alternatively, you can leave these alert policies enabled until we delete them on April 30, 2021.
+ Alternatively, you can leave these alert policies enabled until we delete them on May 14, 2021.
compliance Sensitive Information Type Entity Definitions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitive-information-type-entity-definitions.md
- M365-security-compliance hideEdit: true feedback_system: None
+recommendations: false
description: "Data loss prevention (DLP) in the Security &amp; Compliance Center includes over 200 sensitive information types that are ready for you to use in your DLP policies. This article lists all of these sensitive information types and shows what a DLP policy looks for when it detects each type."
compliance Sensitivity Labels Office Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-office-apps.md
Sensitivity labels that you configure to apply encryption remove the complexity
- For a document: **File** > **Info** > **Protect Document** > **Restrict Access** - for an email: From the **Options** tab > **Encrypt**
-When users initially label a document or email, they can always override your label configuration settings with their own encryption settings. For example:
+When users initially label a document or email, they can override your label configuration settings with their own encryption settings. For example:
- A user applies the **Confidential \ All Employees** label to a document and this label is configured to apply encryption settings for all users in the organization. This user then manually configures the IRM settings to restrict access to a user outside your organization. The end result is a document that's labeled **Confidential \ All Employees** and encrypted, but users in your organization can't open it as expected. -- A user applies the **Confidential \ Recipients Only** label to an email and this email is configured to apply the encryption setting of **Do Not Forward**. This user then manually configures the IRM settings so that the email is unrestricted. The end result is the email can be forwarded by recipients, despite having the **Confidential \ Recipients Only** label.
+- A user applies the **Confidential \ Recipients Only** label to an email and this email is configured to apply the encryption setting of **Do Not Forward**. In the Outlook app, this user then manually configures the IRM settings so that the email is unrestricted. The end result is the email can be forwarded by recipients, despite having the **Confidential \ Recipients Only** label.
+
+ As an exception, for Outlook on the web, the options from the **Encrypt** menu aren't available for a user to select when the currently selected label applies encryption.
- A user applies the **General** label to a document, and this label isn't configured to apply encryption. This user then manually configures the IRM settings to restrict access to the document. The end result is a document that's labeled **General** but that also applies encryption so that some users can't open it as expected.
Use the following syntax:
${If.App.<application type>}<your visual markings text> ${If.End} ```
-As with the other dynamic visual markings, the syntax is case-sensitive.
+As with the other dynamic visual markings, the syntax is case-sensitive, which includes the abbreviations for each application type (WEPO).
Examples:
compliance What The Dlp Functions Look For https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/what-the-dlp-functions-look-for.md
search.appverid:
- MET150 - seo-marvel-apr2020
+recommendations: false
description: Learn what the data loss prevention (DLP) functions look for.
compliance What The Dlp Policy Templates Include https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/what-the-dlp-policy-templates-include.md
search.appverid:
- MET150 - seo-marvel-apr2020
+recommendations: false
description: Learn what the data loss prevention (DLP) policy templates in the Office 365 Security & Compliance Center include.
enterprise Multi Geo Add Group With Pdl https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/multi-geo-add-group-with-pdl.md
Title: "Create a Microsoft 365 Group with a specific PDL"
+ Title: "Create a Microsoft 365 Group with a specific preferred data location"
description: "Learn how to create a Microsoft 365 group with a specified preferr
-# Create a Microsoft 365 Group with a specific PDL
+# Create a Microsoft 365 Group with a specific preferred data location
-When users in a multi-geo environment create a Microsoft 365 Group, the group preferred data location is automatically set to that of the user. Global, SharePoint, and Exchange Administrators can create groups in any region they select.
+When users in a multi-geo environment create a Microsoft 365 Group, the group preferred data location (PDL) is automatically set to that of the user. Global, SharePoint, and Exchange Administrators can create groups in any region they select.
If you need to create a group with a specific PDL, you can do that using from the SharePoint admin center or through the Exchange Online New-UnifiedGroup Microsoft PowerShell cmdlet. When you do this, both the group mailbox and SharePoint site associated with the group will be provisioned in the specified PDL.
Note that SharePoint group site provisioning is on-demand. The site will be prov
## Related topics
-[Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell)
+[Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell)
learning Configure Sharepoint Content Source https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/learning/configure-sharepoint-content-source.md
+
+ Title: "Coming soon: Configure SharePoint as a learning content source for Microsoft Viva Learning (Preview)"
++++ Last updated : 04/30/2021
+audience: admin
++
+search.appverid:
+
+ - enabler-strategic
+ - m365initiative-viva-learning
+localization_priority: None
+description: "Learn how to configure SharePoint as a learning content source for Microsoft Viva Learning (Preview)."
+++
+# Coming soon: Configure SharePoint as a learning content source for Microsoft Viva Learning (Preview)
+
+> [!NOTE]
+> The information in this article relates to a preview product that may be substantially modified before it's commercially released.
+
+You can configure SharePoint as a learning content source to make your organization's own content available in Viva Learning (Preview).
+
+## Overview
+
+The knowledge admin (or global administrator) provides a site URL to where the Learning Service can create an empty centralized locationΓÇöthe Learning App Content RepositoryΓÇöin the form of a structured SharePoint list. This list can be used by your organization to house links to cross-company SharePoint folders that contain learning content. Admins are responsible for collecting and curating a list of URLs for folders. These folders should only include content that can be made available in Viva Learning (Preview).
+
+Viva Learning (Preview) supports the following document types:
+
+- Word, PowerPoint, Excel, PDF
+- Audio (.m4a)
+- Video (.mov, .mp4, .avi)
+
+For more information, see the [SharePoint Online documentation](/office365/servicedescriptions/sharepoint-online-service-description/sharepoint-online-limits?redirectSourcePath=%252farticle%252fSharePoint-Online-limits-8f34ff47-b749-408b-abc0-b605e1f6d498).
+
+## Permissions
+
+Document library folder URLs can be collected from any SharePoint site in the organization. Viva Learning (Preview) follows all existing content permissions. Therefore, only content for which a user has permission to access is searchable and visable within Viva Learning (Preview). Any content within these folders will be searchable, but only content to which the individual employee has permissions can be used.
+
+Content deletion from your organizationΓÇÖs repository is not currently supported.
+
+To remove unintentionally surfaced content, follow these steps:
+
+1. To restrict access to the document library, select the **Show actions** option, and then select **Manage access**.
+
+ ![Document library page in SharePoint showing Show actions option with Manage access highligted.](../media/learning/learning-sharepoint-permissions2.png)
+
+2. Delete the original document within the document library.
+
+For more information, see [Sharing and permissions in the SharePoint modern experience](/sharepoint/modern-experience-sharing-permissions).
+
+## Learning Service
+
+The Learning Service uses the provided folder URLs to get metadata from all content stored in those folders. Within 24 hours of supplying the folder URL in the centralized repository, employees can search for and use your organizationΓÇÖs content within Viva Learning (Preview). All changes to content, including updated metadata and permissions, will also be applied in the Learning Service within 24 hours.
+
+## Configure SharePoint as a source
+
+You must be a Microsoft 365 global administrator, SharePoint administrator, or knowledge admin to perform these tasks.
+
+To configure SharePoint as a learning content sources in for Viva Learning (Preview), follow these steps:
+
+1. In the left navigation of the Microsoft 365 admin center, go to **Settings** > **Org settings**.
+
+2. On the **Org settings** page, on the **Services** tab, select **Learning app (Preview)**.
+
+ ![Settings page in the Microsoft 365 admin center showing Viva Learning listed.](../media/learning/learning-sharepoint-configure1.png)
+
+3. On the **Learning app (Preview)** panel, under SharePoint, provides the site URL to the SharePoint site where you want Viva Learning to create a centralized repository.
+
+ ![Learning panel in the Microsoft 365 admin center showing SharePoint selected.](../media/learning/learning-sharepoint-configure2.png)
+
+4. A SharePoint list is created automatically within the provided SharePoint site.
+
+ ![Newly created SharePoint list within the SharePoint site.](../media/learning/learning-sharepoint-configure3.png)
+
+ In the left navigation of the SharePoint site, select **Site contents** > **Learning App Content Repository**.
+
+ ![SharePoint list showing the Site contents navigation and the Learning App Content Repository section.](../media/learning/learning-sharepoint-configure4.png)
+
+5. On the **Learning App Content Repository** page, populate the SharePoint list with URLs to the learning content folders.
+
+ 1. Select **New** to view the **New item** panel.
+
+ ![Learning Content Repository page in SharePoint showing the New option.](../media/learning/learning-sharepoint-configure5.png)
+
+ 2. On the **New item** panel, in the **Title** field, add a directory name of your choice. In the **Folder URL** field, add the URL to the learning content folder. Select **Save**.
+
+ ![New item panel in SharePoint showing the Title and Folder URL fields.](../media/learning/learning-sharepoint-configure6.png)
+
+ 3. The **Learning App Content Repository** page is updated with the new learning content.
+
+ ![Learning Content Repository page in SharePoint showing the updated information.](../media/learning/learning-sharepoint-configure7.png)
+
+> [!NOTE]
+> To allow for broader access to the Learning App Content Repository, a link to the list soon will be available in the Viva Learning (Preview) interface where users can request access and ultimately help populate the list. Site owners and global administrators will be required to grant access to the list. Access is specific to the list only and does not apply to the site where the list is stored. For more information, see [Provide your own organization's content](#provide-your-own-organizations-content) later in this article.
+
+### Folder URL document library curation
+
+Default metadata (such as modified date, created by, document name, content type, and organization name) is automatically pulled into Viva Learning (Preview) by the Microsoft Graph API.
+
+To improve overall discovery and search relevance of the content, we recommend adding a **Description** column.
+
+To add a **Description** column to the document library page, follow these steps:
+
+1. On the **Documents** page, select **Add column**.
+
+2. Select the **Show actions** option, and then select **Single line of text**.
+
+ ![Documents page in SharePoint showing the Show actions options with Single line of text highlighted.](../media/learning/learning-sharepoint-curation1.png)
+
+3. On the **Create a column** panel, in the **Name** field, add a descriptive name for the column. Select **Save**.
+
+ ![Create a column panel in SharePoint showing the Name and other fields.](../media/learning/learning-sharepoint-curation2.png)
+
+4. On the **Documents** page, in the **Description** column, add custom descriptions for each item. If no description is supplied, Viva Learning (Preview) will provide a default message that highlights the content as being from your own SharePoint library.
+
+ ![Documents page in SharePoint showing the descriptions in the Description column.](../media/learning/learning-sharepoint-curation3.png)
+
+### Provide your own organization's content
+
+Knowledge admins can access their organizationΓÇÖs Learning App Content Repository in SharePoint, where they can provide references to cross-organization document libraries. Content within these libraries will be then surfaced as learning content in Viva Learning (Preview).
+
+1. In Viva Learning (Preview), select **More options** (**...**), and then select **Settings**.
+
+ ![SharePoint library page showing the More options and Settings option.](../media/learning/learning-sharepoint-library-1.png)
+
+2. Under **Settings**, select **Permissions**.
+
+ ![Settings option page in SharePoint showing the Permissions and Check access options.](../media/learning/learning-sharepoint-library-2.png)
+
+3. Select **Check access** to connect to your organizationΓÇÖs centralized library.
+
learning Content Sources 365 Admin Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/learning/content-sources-365-admin-center.md
+
+ Title: "Configure learning content sources for Microsoft Viva Learning (Preview) in the Microsoft 365 admin center"
++++ Last updated : 04/30/2021
+audience: admin
++
+search.appverid:
+
+ - enabler-strategic
+ - m365initiative-viva-learning
+localization_priority: None
+description: "Learn how to configure learning content sources for Microsoft Viva Learning (Preview) in the Microsoft 365 admin center."
+++
+# Configure learning content sources for Microsoft Viva Learning (Preview) in the Microsoft 365 admin center
+
+> [!NOTE]
+> The information in this article relates to a preview product that may be substantially modified before it's commercially released.
+
+The administrators for the Microsoft 365 admin centerΓÇöeither by themselves or by assigning the knowledge admin role to selected individuals in your organizationΓÇöcan manage settings related to Viva Learning (Preview) and can configure the learning content sources.
+
+The administrator selects which other learning content sources (for example, SharePoint or supported third-party content provider sources) will be available to users of Viva Learning (Preview). The admin then configures those sources to make sure the content is available for search and discovery and can be browsed by the employees who use Viva Learning (Preview).
+
+> [!NOTE]
+> Users sign in to non-Microsoft and LinkedIn Learning Pro learnings in a browser or embedded viewer. This configured learning is subject to the separate license, privacy and service terms between your organization and the third party, and not the Viva Learning (Preview) terms. Before selecting this type of learning, verify you have an agreement in place for your organization and users.
+
+## Assign the knowledge admin role [Optional]
+
+You must be a Microsoft 365 global administrator to perform these tasks.
+
+> [!TIP]
+> The knowledge admin should be moderately technical and have existing SharePoint admin credentials, preferably someone who is well-versed in the education, learning, training, or employee experience part of the organization.
+
+### Add a knowledge admin
+
+To add a knowledge admin for Viva Learning (Preview), follow these steps:
+
+1. In the left navigation of the Microsoft 365 admin center, go to **Roles**.
+
+2. On the **Roles** page, on the **Azure AD** tab, select **Knowledge Administrator**.
+
+3. On the **Knowledge Administrator** panel, select **Assigned admins**, and then select **Add**.
+
+ ![Roles page in the Microsoft 365 admin center showing the Knowledge Administrator panel to add a user.](../media/learning/learning-add-knowledge-admin-1.png)
+
+3. On the **Add admins** panel, select the person you choose for the role, and then select **Add**.
+
+ ![Roles page in the Microsoft 365 admin center showing the Add admins panel to add a user.](../media/learning/learning-add-knowledge-admin-2.png)
+
+### Remove a knowledge admin
+
+To remove a knowledge admin for Viva Learning (Preview), follow these steps:
+
+1. In the left navigation of the Microsoft 365 admin center, go to **Roles**.
+
+2. On the **Roles** page, on the **Azure AD** tab, and then select **Knowledge Administrator**.
+
+3. On the **Knowledge Administrator** panel, on the **Assigned Admins** tab, select **Remove**, and then select the person you want to remove from the role. To confirm, select **Remove**.
+
+ ![Roles page in the Microsoft 365 admin center showing the Assigned admins panel to remove a user.](../media/learning/learning-remove-knowledge-admin-1.png)
+
+## Configure settings for the learning content sources
+
+You must be a Microsoft 365 global administrator or knowledge admin to perform these tasks.
+
+To configure settings for learning content sources in Viva Learning, follow these steps:
+
+1. In the left navigation of the Microsoft 365 admin center, go to **Settings** > **Org settings**.
+
+2. On the **Org settings** page, on the **Services** tab, select **Learning app (Preview)**.
+
+ ![Settings page in the Microsoft 365 admin center showing the Learning app listed.](../media/learning/learning-sharepoint-configure1.png)
+
+3. On the **Learning app (Preview)** panel, select the learning content sources you want to configure for the organization, and then select **Save**.
+
+ ![Learning panel in the Microsoft 365 admin center showing content sources options.](../media/learning/learning-sharepoint-configure2.png)
+
+Among all the learning sources that exist, some will be enabled by default. These learning sources include:
+
+- LinkedIn Learning (free content)
+- Microsoft Learn
+- Microsoft 365 Training
+
+> [!NOTE]
+> LinkedIn free content is provided to users under the LinkedIn privacy policies and user agreement. LinkedIn will receive the userΓÇÖs IP address, any cookies previously set by LinkedIn, and will set a new cookie to track use of free content. Users are not required to sign in with LinkedIn to receive free content.<br><br>
+For LinkedIn premium content, your organization needs a subscription for your team to access that content. Users will need to sign into LinkedIn to access that learning, which is provided under the terms of your organizationΓÇÖs and user terms with LinkedIn.<br><br>
+For non-Microsoft content (except free LinkedIn content), ensure your organization has a subscription for your users to access that content using a work account before connecting it to Viva Learning (Preview). UsersΓÇÖ personal subscriptions to non-Microsoft learning providers will not be integrated with Viva Learning (Preview). Users sign in to non-Microsoft and LinkedIn Learning Pro learnings in a browser or embedded viewer. If users navigate to content where they do not have an organizational subscription, they may see a provider page where they could sign up for an individual subscription. All non-Microsoft learning is provided under the non-Microsoft providerΓÇÖs terms and not as part of Viva Learning.
+
+To enable or disable a learning content source, select the check box next to the source. If a source is enabled, a check mark will be visible.
+
+## Third-party content providers
+
+The set of available connected learning providers might change at any time. More providers will join as the program grows. Available providers might also choose to discontinue their connection with Viva Learning (Preview).
+
+### Skillsoft as a content source
+
+For Viva Learning (Preview), users who have Skillsoft enabled and choose to view Skillsoft content will land on a Percipio page that asks them to input your organization's Percipio site name. After users input your organization's site name, they will be directed to page to sign in to your organization's Percipio site. Users will sign in by using their existing credentials and see the content they originally selected. Users will be asked to input the Percipio site name only once, until their browser cache is cleared. To streamline this experience for your users, we recommend including your Percipio site name in internal communications you send about Viva Learning (Preview).
+
+This is intended to be a temporary experience for preview, and we are working with Skillsoft to enable tenant-specific integration for general availability, which will bypass the step that requires users to provide your organization's Percipio site name.
+
+### Details on Microsoft substrate
+
+For data that you copy to Viva Learning (Preview) from a non-Microsoft service (learning provider or learning management system), you are not able to directly extract, correct, or delete that data in Viva Learning (Preview). We refresh the data you import from non-Microsoft providers promptly to reflect changes and deletions in the non-Microsoft source data.
+
+You need to work with the supplier of the non-Microsoft service to access, correct, delete or extract data under the license, service, or privacy terms of the non-Microsoft service. The changes made there will be reflected in the data processed for your use in Viva Learning (Preview) upon completion of the data update cycles of the non-Microsoft service and Viva Learning (Preview). If you turn off the connection between Viva Learning (Preview) and a non-Microsoft service, all data you had previously imported from that service will be deleted.
+
+## Next step
+
+[Configure SharePoint as a learning content source for Microsoft Viva Learning (Preview)](configure-sharepoint-content-source.md)
learning Index https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/learning/index.md
+
+ Title: "Introduction to Microsoft Viva Learning (Preview)"
++++ Last updated : 04/30/2021
+audience: enabler
+
+search.appverid:
+
+ - enabler-strategic
+ - m365initiative-viva-learning
+localization_priority: None
+description: "Learn how to find resources for Microsoft Viva Learning (Preview)."
+++
+# Introduction to Microsoft Viva Learning (Preview)
+
+> [!NOTE]
+> The information in this article relates to a preview product that may be substantially modified before it's commercially released.
+
+Microsoft Viva Learning (Preview) empowers teams and individuals in your organization to make learning a natural part of their day. The app creates a central hub in Microsoft Teams where employees can share, assign, and learn from content libraries across your organization.
+
+The resources on this page are designed to get you started with learning about and using Viva Learning (Preview) in your organization.
+
+## Get started
+
+The resources in this section help you learn more about what Viva Learning (Preview) is and how it can help your organization.
+
+| If you're looking for this information: | Go to this resource: |
+|:--|:--|
+|Learn more about Viva Learning (Preview)|[Microsoft Viva Learning (Preview) overview](overview-viva-learning.md)|
+|Find resources in the Microsoft Tech Community Resource Center|[Microsoft Viva Learning (Preview) Tech Community](https://resources.techcommunity.microsoft.com/viva-learning/)|
+|Find Viva Learning (Preview) guidance for end users|[Microsoft Viva Learning (Preview) help](https://support.microsoft.com/office/learning-preview-app-01bfed12-c327-41e0-a68f-7fa527dcc98a)|
+
+## Set up and administration
+
+The resources in this section help the admin in your organization to set up and configure Viva Learning (Preview) in your Microsoft 365 environment.
+
+| If you're looking for this information: | Go to this resource: |
+|:--|:--|
+|Learn how to set up and configure Viva Learning (Preview)|[Set up Microsoft Viva Learning (Preview)](set-up-teams-admin-center.md)|
+|Learn how to configure learning content sources|[Configure learning content sources](content-sources-365-admin-center.md)|
+|Learn how to add your own learning content|[Configure SharePoint as a content source](configure-sharepoint-content-source.md)|
+++++
learning Overview Viva Learning https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/learning/overview-viva-learning.md
+
+ Title: "Overview of Microsoft Viva Learning (Preview)"
++++ Last updated : 04/30/2021
+audience: admin
++
+search.appverid:
+
+ - enabler-strategic
+ - m365initiative-viva-learning
+localization_priority: None
+description: "Learn about Microsoft Viva Learning (Preview) in your Microsoft 365 environment."
+++
+# Overview of Microsoft Viva Learning (Preview)
+
+> [!NOTE]
+> The information in this article relates to a preview product that may be substantially modified before it's commercially released.
+
+Viva Learning (Preview) is a centralized learning hub in Microsoft Teams that lets you seamlessly integrate learning and building skills into your day. In Viva Learning (Preview), your team can discover, share, assign, and learn from content libraries provided by both your organization and partners. They can do all of this without leaving Microsoft Teams.
+
+ ![Screenshot of the Viva Learning (Preview) homepage in Teams.](../media/learning/learning-home-teams.png)
+
+Employees are more likely to report being satisfied and remain at an organization longer when given opportunities to learn and grow. Viva Learning (Preview) makes it easy to create these opportunities for your organization without the need to step away from the communication tools you already use.
+
+## Learn while working
+
+### Everyone
+
+Viva Learning (Preview) makes it easy to incorporate learning into your day. When you open Viva Learning (Preview) in Microsoft Teams, youΓÇÖll see a personalized view of learning content from both your organization and partners such as LinkedIn Learning. As you continue to search for and complete more training, your recommended content will update to reflect your interests.
+
+- Easily find learning opportunities provided by your organization.
+- Browse courses from LinkedIn Learning, Microsoft Learn, Microsoft 365 Training, Skillsoft, Coursera, edX, Pluralsight, and other third-party learning partners.
+- Search for specific learning content that appeals to you or supports your career goals.
+- Share relevant, interesting, and important learning content with your team members or groups in a Microsoft Teams chat or channel.
+- Organize your custom selections of learning content in Microsoft Teams channels and tabs.
+- Like and save courses youΓÇÖre interested in.
+- Play LinkedIn Learning courses in the embedded player without leaving Microsoft Teams.
+
+### Managers
+
+Keep your team engaged and up to date with necessary skills without the need to coordinate learning across platforms. You can assign learning content to individuals or groups, share content with your team, and track the completion status of learning youΓÇÖve assigned.
+
+## Admin roles
+
+Admins set permissions and allow learning content sources for Viva Learning (Preview). To set up Viva Learning (Preview), you'll need permissions as:
+
+- Microsoft Teams admin
+- Microsoft 365 global administrator or SharePoint administrator
+- Knowledge admin
+
+### Knowledge admin
+
+The knowledge admin is a new Azure Active Directory (Azure AD) role in the Microsoft 365 admin center that can be assigned to anyone in the organization. This role manages the organizationΓÇÖs learning content sources through the Microsoft 365 admin center. For more information, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference#knowledge-administrator).
+
+The knowledge admin should be moderately technical and have existing SharePoint administrator credentials. The knowledge admin should be well versed in the education, learning, training, or employee experience part of the organization.
+
+## Get started
+
+When youΓÇÖre ready to set up and configure Viva Learning (Preview) in your Microsoft 365 environment:
+
+- Use the Microsoft Teams admin center to [manage Viva Learning (Preview) across your organization](set-up-teams-admin-center.md).
+- Use the Microsoft 365 admin center to [configure learning sources available to specific groups](content-sources-365-admin-center.md).
+- Use the SharePoint admin center to [manage and store your own learning content](configure-sharepoint-content-source.md).
++++
learning Set Up Teams Admin Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/learning/set-up-teams-admin-center.md
+
+ Title: "Set up Microsoft Viva Learning (Preview) in the Teams admin center"
++++ Last updated : 04/30/2021
+audience: admin
++
+search.appverid:
+
+ - enabler-strategic
+ - m365initiative-viva-learning
+localization_priority: None
+description: "Learn how to configure Microsoft Viva Learning (Preview) in the Teams admin center."
+++
+# Set up Microsoft Viva Learning (Preview) in the Teams admin center
+
+> [!NOTE]
+> The information in this article relates to a preview product that may be substantially modified before it's commercially released.
+
+The Teams admin installs Viva Learning (Preview) and applies permission policies through the Teams admin center.
+
+## Manage settings for Viva Learning (Preview)
+
+You must be an administrator in the Teams admin center to perform these tasks.
+
+To make Viva Learning (Preview) available for users in your organization, follow these steps:
+
+1. In the left navigation of the Teams admin center, go to **Teams apps** > **Manage apps**.
+
+ ![Left navigation in the Teams admin center showing Teams apps and Manage apps section.](../media/learning/learning-app-teams-manage-apps-nav.png)
+
+2. On the **Manage apps** page, in the search box, type *Viva learning*, and then select **Viva Learning (Preview)**.
+
+ ![Manage apps page in the Teams admin center showing the search box.](../media/learning/learning-app-teams-manage-apps-page.png)
+
+3. On the **Viva Learning (Preview)** page:
+
+ 1. Under **Status**, select **Allowed** to turn on Viva Learning (Preview).
+
+ 2. On the **Settings** tab, under **App settings**, go to the Microsoft 365 admin center to [configure learning content sources](content-sources-365-admin-center.md).
+
+ ![Learning page in the Teams admin center showing Status and App settings section.](../media/learning/learning-app-teams-learning-page.png)
+
+4. After **Manage app** settings, go to **Permission policies** and **Setup policies** to grant permission to employees who should have access to Viva Learning (Preview) as part of your organization's participation in the preview.
+
+> [!NOTE]
+> If your organization is in Ring 4.0 as part of Teams TAP100 program, you might need to enable approved users in Ring 3.0 to access Viva Learning (Preview). <br><br>As part of the preview, Viva Learning (Preview) is released in Ring 3.0. If your organization is in Ring 4.0, you wonΓÇÖt see Viva Learning (Preview) on the **Manage apps** page. To test the app, you need to create a custom apps permission policy, set it to **Allow all apps**, and assign it to Ring 3.0 approved users. <br><br> ![TAP-AppsPermission-Plcy page showing Allow all apps selected.](../media/learning/learning-app-tap-appspermission-plcy.png)
+
+## Next step
+
+[Configure learning content sources for Viva Learning (Preview) in the Microsoft 365 admin center](content-sources-365-admin-center.md)
security TOC https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/TOC.md
##### [Attack surface reduction rules](troubleshoot-asr.md) ##### [Migrate to Attack surface reduction rules](migrating-asr-rules.md)
-# [Microsoft 365 Defender](../index.yml)
+# [Microsoft 365 Defender](../defender/index.yml)
# [Defender for Office 365](../office-365-security/index.yml) # [Defender for Identity](https://docs.microsoft.com/defender-for-identity/)
security Gov https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/gov.md
iOS | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/c
> Trying to onboard Windows devices older than Windows 10 or Windows Server 2019 using [Microsoft Monitoring Agent](configure-server-endpoints.md#option-1-onboard-by-installing-and-configuring-microsoft-monitoring-agent-mma)? You'll need to choose "Azure US Government" under "Azure Cloud" if using the [setup wizard](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-agent-using-setup-wizard), or if using a [command line](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-agent-using-command-line) or a [script](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-agent-using-dsc-in-azure-automation) - set the "OPINSIGHTS_WORKSPACE_AZURE_CLOUD_TYPE" parameter to 1. > [!NOTE]
-> You'll need version 101.25.72 and above for Linux, and version 101.25.69 and above for macOS. During preview those versions are availble only in the "Insider Fast" channel. See [Configure the Linux software repository](linux-install-manually.md#configure-the-linux-software-repository) or [Set the channel name (macOS)](mac-updates.md#set-the-channel-name) for instructions.
+> You'll need version 101.25.72 and above for Linux, and version 101.25.69 and above for macOS.
### OS versions when using Azure Defender for Servers The following OS versions are supported when using [Azure Defender for Servers](https://docs.microsoft.com/azure/security-center/security-center-wdatp): OS version | GCC | GCC High | DoD :|:|:|:
+Windows Server 2019 | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development
Windows Server 2016 | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) Windows Server 2012 R2 | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) Windows Server 2008 R2 SP1 | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg)
SIEM | `https://wdatp-alertexporter-us.gcc.securitycenter.windows.us` | `https:/
## Feature parity with commercial Defender for Endpoint for US Government customers doesn't have complete parity with the commercial offering. While our goal is to deliver all commercial features and functionality to our US Government customers, there are some capabilities not yet available we want to highlight.
-These are the known gaps as of March 2021:
+These are the known gaps as of April 2021:
Feature name | GCC | GCC High | DoD :|:|:|:
-Automated investigation and remediation: Live response | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg)
-Automated investigation and remediation: Response to Office 365 alerts | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog
-Email notifications | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg)
-Evaluation lab | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg)
-Management and APIs: Device health and compliance report | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg)
-Management and APIs: Integration with third-party products | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg)
Management and APIs: Streaming API | ![Yes](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development
-Management and APIs: Threat protection report | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg)
-Threat & vulnerability management | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg)
-Threat analytics | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg)
Web content filtering | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development
-Integrations: Azure Sentinel | ![Yes](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development
-Integrations: Microsoft Cloud App Security | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog
-Integrations: Microsoft Compliance Manager | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog
-Integrations: Microsoft Defender for Identity | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog
-Integrations: Microsoft Defender for Office 365 | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog
-Integrations: Microsoft Endpoint DLP | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog
+Integrations: Azure Sentinel | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) Alerts <br /> ![No](images/svg/check-no.svg) Incidents & Raw data: In development | ![Yes](images/svg/check-yes.svg) Alerts <br /> ![No](images/svg/check-no.svg) Incidents & Raw data: In development
+Integrations: Microsoft Cloud App Security | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development
+Integrations: Microsoft Compliance Manager | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development
+Integrations: Microsoft Defender for Identity | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development
+Integrations: Microsoft Endpoint DLP | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog
Integrations: Microsoft Intune | ![Yes](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development Integrations: Microsoft Power Automate & Azure Logic Apps | ![Yes](images/svg/check-yes.svg) | ![No](images/svg/check-no.svg) In development | ![No](images/svg/check-no.svg) In development
-Integrations: Skype for Business / Teams | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg) | ![Yes](images/svg/check-yes.svg)
Microsoft Threat Experts | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog | ![No](images/svg/check-no.svg) On engineering backlog
solutions Information Protection Deploy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/information-protection-deploy.md
- m365solution-infoprotection - m365solution-overview
-description: Configure the security and service infrastructure to protect your information and adhere to data privacy regulations.
+description: Configure information protection in Microsoft 365 for data privacy regulations like GDPR and the California Consumer Privacy Act (CCPA), including Microsoft Teams, SharePoint, and email.
+ # Deploy information protection for data privacy regulations with Microsoft 365 Your organization may be subject to regional data privacy regulations that require you to protect, manage, and provide rights and control over personal information stored in your IT infrastructure, including both on-premises and in the cloud. The best example of a data privacy regulation is the European Union's General Data Protection Regulation (GDPR). Failure to comply with data privacy regulations can result in substantial fines.
-Examples of the types of data in Microsoft 365 include chat sessions in Microsoft Teams, emails in Exchange, and files in SharePoint and OneDrive. This solution provides guidance on how to assess risks and identify information, protect, govern, and respond to data privacy incidents for personal data stored in Microsoft 365 services that is subject to data privacy regulations.
+Examples of the types of data in Microsoft 365 include chat sessions in Microsoft Teams, emails in Exchange, and files in SharePoint and OneDrive. This solution provides guidance on how to assess risks and take appropriate action to protect personal data in Microsoft 365. This includes identifying personal information so you can protect, govern, and respond to data privacy incidents.
-![What is information protection for data privacy regulations](../media/information-protection-deploy/information-protection-data-privacy-regulations-overview.png)
+![What is information protection for data privacy regulations](../media/information-protection-deploy/information-protection-data-privacy-regulations-overview.png#lightbox)
Additional information is also provided on the use of Microsoft 365 identity, device, and threat protection controls for your data privacy needs.
-To meet the criteria for protecting information for compliance with data privacy regulations, use these Microsoft 365 capabilities and features.
+These Microsoft 365 capabilities and features help you meet the criteria for protecting information.
| Capability or feature | Description | Licensing | |:-|:--|:-|
-| Compliance Manager | Manage regulatory compliance activities, get an overall score of your current compliance configuration, and find recommendations for improvement in this workflow-based risk assessment tool in the Microsoft 365 compliance center. | Microsoft 365 E3 and E5 |
+| Compliance Manager | Manage regulatory compliance activities, get an overall score of your current compliance configuration, and find recommendations for improvement. This is a workflow-based risk assessment tool in the Microsoft 365 compliance center. | Microsoft 365 E3 and E5 |
| Microsoft Defender for Office 365 | Protect your Microsoft 365 apps and dataΓÇösuch as email messages, Office documents, and collaboration toolsΓÇöfrom attack. | Microsoft 365 E3 and E5 |
-| Sensitivity labels | Classify and protect your organization's data without hindering the productivity of users and their ability to collaborate by placing labels with various levels of protection on email, files, or sites. | Microsoft 365 E3 and E5 |
-| Data Loss Protection (DLP) | Detect, warn, and block risky, inadvertent, or inappropriate sharing, such as sharing of data containing personal information, both internally and externally. | Microsoft 365 E3 and E5 |
-| Data retention labels and policies | Implement information governance controls, such as how long to keep data and requirements on the storage of personal data on customers, to comply with your organization's policies or data regulations. | Microsoft 365 E3 and E5 |
-| Email encryption | Send and receive encrypted email messages between people inside and outside your organization that contains regulated data, such as personal data on customers. | Microsoft 365 E3 and E5 |
+| Sensitivity labels | Classify and protect your organization's data without hindering the productivity of users and their ability to collaborate. Place labels with various levels of protection on email, files, or sites. | Microsoft 365 E3 and E5 |
+| Data Loss Protection (DLP) | Detect, warn, and block risky, inadvertent, or inappropriate sharing of data containing personal information, both internally and externally. | Microsoft 365 E3 and E5 |
+| Data retention labels and policies | Implement information governance controls. These can include determining how long to keep data (such as personal data related to customers) to comply with your organization's policies or data regulations. | Microsoft 365 E3 and E5 |
+| Email encryption | Protect personal data by sending and receiving encrypted email messages between people inside and outside your organization. | Microsoft 365 E3 and E5 |
|||| ## Organization of the guidance in this solution
-To help you understand the Microsoft 365 tools available to identify, manage, control, and monitor personal data subject to one or more privacy-related regulations, this guidance is organized into sections.
+To help you understand the Microsoft 365 tools available to help you meet one or more privacy-related regulations, this guidance is organized into sections.
![Steps to implement information protection for data privacy regulations](../media/information-protection-deploy/information-protection-data-privacy-regulations-steps.png)
-Each of these sections correspond to a separate article in this solution.
+Each of these sections corresponds to a separate article in this solution.
>[!Note] >If you are already familiar with your data privacy obligations and are executing against an existing plan, you may want to focus on the Prevent, Protect, Retain, and Investigate guidance.
Each of these sections correspond to a separate article in this solution.
## Plan: Assess data privacy risks and identify sensitive items
-Assessing data privacy regulations and risks that your organization is subject to is a key first step to take before starting to implement improvements, including those achievable through Microsoft 365 configuration. This may include an overall readiness assessment or identification of particular sensitive information types that are subject to regulatory controls your organization needs to comply with, as well as the occurrence of them in your Microsoft 365 environment.
+Assessing data privacy regulations and risks that your organization is subject to is a key first step to take before starting to implement improvements, including configuring capabilities in Microsoft 365. This work can include an overall readiness assessment or identification of particular sensitive information types that are subject to regulatory controls your organization needs to comply with.
For more information, see [Assess data privacy risks and identify sensitive items](information-protection-deploy-assess.md).
For more information, see [Assess data privacy risks and identify sensitive item
Compliance Manager, available in the Microsoft 365 compliance center, provides you with a built-in ability to track and manage improvement actions overall as well as those related to multiple data privacy regulations that apply to you.
-Leverage built in assessment templates specific to each regulation, where you can track action items for each assessment template selected, as well as view specific regulatory controls, and relate them to specific actions.
+You can use built in assessment templates specific to each regulation, where you can track action items for each assessment template selected, as well as view specific regulatory controls, and relate them to specific actions.
For more information, see [Use Compliance Manager to manage improvement actions](information-protection-deploy-compliance.md). ## Prevent: Protect personal data
-Microsoft 365 provides a number of identity, device, and threat protection capabilities that you can use to help comply with data privacy regulatory compliance.
+Microsoft 365 provides identity, device, and threat protection capabilities that you can use to help comply with data privacy regulatory compliance.
For more information, see [Use identity, device, and threat protection for data privacy regulation](information-protection-deploy-identity-device-threat.md).
This article briefly describes what the data privacy regulations generally call
## Protect information subject to data privacy regulation
-Data privacy regulations dictate a number of personal information protection controls that can be employed in your environment, including more than forty Protect Information controls across just the four data privacy regulations in our sample set of GDPR, California Consumer Protection Act (CCPA), HIPAA-HITECH (United States health care privacy act), and the Brazil Data Protection Act (LGPD).
+Data privacy regulations dictate a number of personal information protection controls that can be employed in your environment, including more than 40 controls for protecting information across just the four data privacy regulations in our sample set of GDPR, California Consumer Protection Act (CCPA), HIPAA-HITECH (United States health care privacy act), and the Brazil Data Protection Act (LGPD).
For more information, see [Protect information subject to data privacy regulation in your organization](information-protection-deploy-protect-information.md).
This article lays out the main control schemes that can be used for addressing i
## Retain: Govern information subject to data privacy regulation
-Data privacy regulations call for personal information governance controls that can be employed in your environment, including more than twenty-four controls across the four data privacy regulations in our sample set of GDPR, CCPA, HIPAA-HITECH, and LGPD.
+Data privacy regulations call for personal information governance controls that can be employed in your environment, including more than 24 controls across the four data privacy regulations in our sample set of GDPR, CCPA, HIPAA-HITECH, and LGPD.
For more information, see [Govern information subject to data privacy regulation in your organization](information-protection-deploy-govern.md).
While the data privacy regulations can be vague regarding information governance
There are Microsoft 365 features available to help you monitor, investigate, and respond to data privacy incidents in your organization as you operationalize related capabilities.
-Having processes, procedures, and other documentation for each of these can be important to demonstrate compliance to regulatory bodies.
+Having processes, procedures, and other documentation for using these features can be important to demonstrate compliance to regulatory bodies.
For more information, see [Monitor and respond to data privacy incidents in your organization](information-protection-deploy-monitor-respond.md).