Updates from: 04/04/2023 01:31:20
Category Microsoft Docs article Related commit history on GitHub Change details
admin Signup Apps Business https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/signup--apps-business.md
Use these three factors to determine which of the two options is best for your b
### Option 1: Sign in with your Outlook, Hotmail, Yahoo, Gmail or other email account
-This applies to Microsoft 365 Business Standard and Microsoft 365 Apps for Business. You'll sign in to Microsoft 365 with this email address. For example, alliebellew@hotmail.com.
+This applies to Microsoft 365 Business Standard and Microsoft 365 Apps for Business. You'll sign in to Microsoft 365 with this email address. For example, somebody@example.com.
:::image type="content" source="../../media/ssu-how-you-sign-in.png" alt-text="Screenshot: Sign in with your personal email.":::
commerce Pay For Subscription Billing Profile https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/pay-for-subscription-billing-profile.md
- commerce_billing - okr_SMB - AdminSurgePortfolio Previously updated : 12/08/2022 Last updated : 03/31/2023 # How to pay for your Microsoft business subscription with a billing profile
When you buy a subscription, you pay for it with a billing profile. The billing
If you're not sure if your account has a billing profile, see [Understand billing profiles](manage-billing-profiles.md). If you don't have a billing profile, see [How to pay for your subscription](pay-for-your-subscription.md). > [!IMPORTANT]
-> Starting on April 1, 2023, we will stop accepting checks as a payment method for subscriptions paid by invoice. Beginning on that date, pay by check will no longer be available as a payment option, and check payment instructions will be removed from invoices. You can still pay for your invoice by electronic funds transfer (EFT). See your invoice for EFT payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by EFT, and avoid possible service disruption.
+> As of April 1, 2023, we no longer accept checks as a payment method for subscriptions paid by invoice. Pay by check is no longer available as a payment option, and check payment instructions have been removed from invoices. You can still pay for your invoice by wire transfer. See your invoice for wire transfer payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by wire transfer, and avoid possible service disruption.
## Paying with recurring billing turned on or off By default, recurring billing is automatically turned on for all paid subscriptions. Every billing period, we automatically charge the payment method associated with the billing profile to pay for any subscriptions that use that billing profile. If your payment method is declined, you can use the **Pay now** button on the invoice summary in the Microsoft 365 admin center to make a one-time payment for your subscription.
-If recurring billing is turned off for a billing profile, you can use the **Pay now** button on the invoice summary in the admin center to pay for it every billing period, regardless of what payment method is linked with the billing profile. You can also pay by check or electronic funds transfer (EFT). Instructions for how to do that are included on the PDF copy of your invoice.
+If recurring billing is turned off for a billing profile, you can use the **Pay now** button on the invoice summary in the admin center to pay for it every billing period, regardless of what payment method is linked with the billing profile. You can also pay by wire transfer. Instructions for how to do that are included on the PDF copy of your invoice.
## Directives from the Reserve Bank of India
Refunds are treated as a regular charge and are refunded to your bank account.
## Paying by invoice
-If you have a billing profile that is set up to be paid by invoice, you can pay for your subscription with a check or EFT. You can also use a credit or debit card to make a one-time payment by using the **Pay now** button on your invoice.
+If you have a billing profile that is set up to be paid by invoice, you can pay for your subscription with a wire transfer. You can also use a credit or debit card to make a one-time payment by using the **Pay now** button on your invoice.
To be eligible to pay by invoice, you must:
If a credit check is required, you're notified when you buy your subscription. I
If your billing profile is backed by an invoice, you get an email when your billing statement is ready to view. This email doesn't contain a copy of your billing statement. However, you can choose to [receive your organization's invoices as email attachments](manage-billing-notifications.md#receive-your-organizations-invoices-as-email-attachments). Your billing statement includes details about your options for making a payment, and where to send it. If you enter a purchase order (PO) number in your billing profile, the number appears on your billing statement. For information about accessing billing statements, see [View your bill or invoice](view-your-bill-or-invoice.md).
-## Where do I send my check or EFT payment?
+## Where do I send my wire transfer payment?
[Check your invoice](view-your-bill-or-invoice.md) for payment instructions for your country or region. If you're not sure how much you owe, you can check your bill and billing history online on the **Invoices** tab of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2102895" target="_blank">Bills & payments</a> page.
-> [!NOTE]
-> Paying by check is only available in a few countries.
-
-## Check or wire transfer payment processing time
-
-Payments made by check are posted three to five business days after the check clears your bank. You can contact your bank to confirm the check status.
+## Wire transfer payment processing time
Payments made by wire transfer have processing times that vary, depending on the type of transfer: - ACH domestic transfers - Five business days. Two to three days to arrive, plus two days to post.-- Wire transfers (domestic) - Four business days. Two days to arrive, plus two days to post.-- Wire transfers (international) - Seven business days. Five days to arrive, plus two days to post.
+- Wire transfer (domestic) - Four business days. Two days to arrive, plus two days to post.
+- Wire transfer (international) - Seven business days. Five days to arrive, plus two days to post.
-If your account is approved for payment by check or wire transfer, the instructions for payment are on the invoice.
+If your account is approved for payment by wire transfer, the instructions for payment are on the invoice.
## Can I pay my invoice online?
commerce Pay For Your Subscription https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/pay-for-your-subscription.md
- business_assist - AdminTemplateSet description: "Learn what payment options are available to pay for your Microsoft business subscription." Previously updated : 12/08/2022 Last updated : 03/31/2023 # Payment options for your Microsoft business subscription Check out all of our small business content on [Small business help & learning](https://go.microsoft.com/fwlink/?linkid=2224585).
-You can use a credit or debit card, or bank account to pay for your Microsoft business subscription. For qualifying customers, you can pay by invoice, using check or electronic funds transfer (EFT). If you have a billing profile, your options are slightly different. For more information, see [How to pay for your subscription with a billing profile](pay-for-subscription-billing-profile.md). If you're not sure if your account has a billing profile, see [Understand billing profiles](manage-billing-profiles.md).
+You can use a credit or debit card, or bank account to pay for your Microsoft business subscription. For qualifying customers, you can pay by invoice via wire transfer. If you have a billing profile, your options are slightly different. For more information, see [How to pay for your subscription with a billing profile](pay-for-subscription-billing-profile.md). If you're not sure if your account has a billing profile, see [Understand billing profiles](manage-billing-profiles.md).
-**Just want to find out where to send your invoice payment?** If you currently pay your invoice by check or EFT, see [Where do I send my check or EFT payment?](#where-do-i-send-my-check-or-eft-payment)
+**Just want to find out where to send your invoice payment?** If you currently pay your invoice by wire transfer, see [Where do I send my wire transfer payment?](#where-do-i-send-my-wire-transfer-payment)
> [!IMPORTANT] >
-> - Starting on April 1, 2023, we will stop accepting checks as a payment method for subscriptions paid by invoice. Beginning on that date, pay by check will no longer be available as a payment option, and check payment instructions will be removed from invoices. You can still pay for your invoice by electronic funds transfer (EFT). See your invoice for EFT payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by EFT, and avoid possible service disruption.
+> - As of April 1, 2023, we no longer accept checks as a payment method for subscriptions paid by invoice. Pay by check is no longer available as a payment option, and check payment instructions have been removed from invoices. You can still pay for your invoice by wire transfer. See your invoice for wire transfer payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by wire transfer, and avoid possible service disruption.
> - As of January 26, 2021, new bank accounts are no longer supported for customers in Belgium, France, Italy, Luxembourg, Portugal, Spain, and the United States. If you're an existing customer in one of those countries, you can continue paying for your subscription with an existing bank account that is in good standing. However, you can't add new subscriptions to the bank account. > [!TIP]
If you personally added the payment method that has a past due amount, you can u
If you didn't add the payment method used to pay for the subscription, you must replace the payment method with one you previously added, or with a new one.
-## Where do I send my check or EFT payment?
+## Where do I send my wire transfer payment?
[Check your invoice](view-your-bill-or-invoice.md) for payment instructions for your country or region. If you're not sure how much you owe, you can check your bill and billing history online on the **Invoices** tab of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2102895" target="_blank">Bills & payments</a> page. > [!NOTE]
->
-> - Paying by check is only available in a few countries.
-> - If you must pay the membership fee for the Microsoft Partner Network (MPN) program (Action Pack subscription, Silver or Gold competencies), see [Pay competency fees](/partner-center/mpn-pay-fee-silver-gold-competency?tabs=workspaces-view) for information about how to make an MPN payment.
-
-## Check or wire transfer payment processing time
+> If you must pay the membership fee for the Microsoft Partner Network (MPN) program (Action Pack subscription, Silver or Gold competencies), see [Pay competency fees](/partner-center/mpn-pay-fee-silver-gold-competency?tabs=workspaces-view) for information about how to make an MPN payment.
-Payments made by check are posted three to five business days after the check clears your bank. You can contact your bank to confirm the check status.
+## Wire transfer payment processing time
Payments made by wire transfer have processing times that vary, depending on the type of transfer: - ACH domestic transfers - Five business days. Two to three days to arrive, plus two days to post.-- Wire transfers (domestic) - Four business days. Two days to arrive, plus two days to post.-- Wire transfers (international) - Seven business days. Five days to arrive, plus two days to post.
+- Wire transfer (domestic) - Four business days. Two days to arrive, plus two days to post.
+- Wire transfer (international) - Seven business days. Five days to arrive, plus two days to post.
-If your account is approved for payment by check or wire transfer, the instructions for payment are on the invoice.
+If your account is approved for payment by wire transfer, the instructions for payment are on the invoice.
## Can I pay my invoice online?
-You can't pay your invoice online. You must remit payment via either check or EFT.
+You can't pay your invoice online. You must remit payment via wire transfer.
## Can I change from my current payment method to paying by invoice?
commerce Understand Your Invoice https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/understand-your-invoice.md
- AdminTemplateSet search.appverid: MET150 description: "Learn how to read and understand your bill or invoice for Microsoft business products." Previously updated : 08/08/2022 Last updated : 03/31/2023 # Understand your bill or invoice
Check out all of our small business content on [Small business help & learning](
The invoice provides a summary of your charges and instructions for payment. You can [view your online invoice](#view-your-online-invoice) in the Microsoft 365 admin center. You can also download it in the Portable Document Format (.pdf) to send via email. > [!IMPORTANT]
-> Starting on April 1, 2023, we will stop accepting checks as a payment method for subscriptions paid by invoice. Beginning on that date, pay by check will no longer be available as a payment option, and check payment instructions will be removed from invoices. You can still pay for your invoice by electronic funds transfer (EFT). See your invoice for EFT payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by EFT, and avoid possible service disruption.
+> As of April 1, 2023, we no longer accept checks as a payment method for subscriptions paid by invoice. Pay by check is no longer available as a payment option, and check payment instructions have been removed from invoices. You can still pay for your invoice by wire transfer. See your invoice for wire transfer payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by wire transfer, and avoid possible service disruption.
To view and print your invoice:
If there are Azure charges on your invoice that you would like more details on,
### Payment instructions
-At the bottom of the invoice are instructions on how to pay your bill. You can pay by wire, check, or online.
+At the bottom of the invoice are instructions on how to pay your bill. You can pay online or by wire transfer.
### Publisher information
Some invoices are generated within 24 hours of the purchase. Other invoices are
### How do I pay the amount due on my Invoice?
-Payment instructions depend on your payment method and are provided at the bottom of the invoice PDF. If your payment method is a credit card, it's automatically charged within 10 days of the invoice date. If your payment method is by check or wire transfer, see the information under **Payment Instructions** in the PDF.
+Payment instructions depend on your payment method and are provided at the bottom of the invoice PDF. If your payment method is a credit card, it's automatically charged within 10 days of the invoice date. If your payment method is by wire transfer, see the information under **Payment Instructions** in the PDF.
### What's the difference between "Sold to" and "Bill to" addresses?
commerce Understand Your Invoice2 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/understand-your-invoice2.md
- AdminTemplateSet search.appverid: MET150 description: "Learn how to interpret charges, billing, and payment info on your Microsoft 365 for business bill or invoice." Previously updated : 05/24/2022 Last updated : 03/31/2023 # Understand your bill or invoice for Microsoft 365 for business
Check out all of our small business content on [Small business help & learning](
Your bill or invoice provides a summary of charges for your subscription and includes instructions for how to make a payment. > [!IMPORTANT]
-> Starting on April 1, 2023, we will stop accepting checks as a payment method for subscriptions paid by invoice. Beginning on that date, pay by check will no longer be available as a payment option, and check payment instructions will be removed from invoices. You can still pay for your invoice by electronic funds transfer (EFT). See your invoice for EFT payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by EFT, and avoid possible service disruption.
+> As of April 1, 2023, we no longer accept checks as a payment method for subscriptions paid by invoice. Pay by check is no longer available as a payment option, and check payment instructions have been removed from invoices. You can still pay for your invoice by wire transfer. See your invoice for wire transfer payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by wire transfer, and avoid possible service disruption.
> [!NOTE] > If you have other subscriptions instead of or in addition to Microsoft 365, see [Understand your bill or invoice](understand-your-invoice.md).
Your invoice is a .PDF that contains at least two pages. [Page one](#page-one) i
The header appears at the top of every invoice page, and includes the month of service, and the **Invoice Date**, which is the date Microsoft created the invoice. The invoice is created the day after the end of your billing period. For example, if your billing period is January 15ΓÇöFebruary 14, your invoice date is February 15.
-The header also includes an **Invoice Number**, the unique number assigned to your invoice. If you pay by Electronic Funds Transfer (EFT) or check, include the invoice number with your payment.
+The header also includes an **Invoice Number**, the unique number assigned to your invoice. If you pay by wire transfer, include the invoice number with your payment.
Finally, the header includes the **Due Date** for payment of the invoice, and shows the total amount due. If you pay for your subscription with a credit card or bank account, we charge your card or account the day after the invoice date.
Page one of your invoice shows the totals of the following items for the invoice
### Payment Instructions
-If you pay by credit card, you see "Please DO NOT PAY. You will be charged the amount due through your selected method of payment." If you pay by invoice, this section contains instructions for paying by EFT or check.
+If you pay by credit card, you see "Please DO NOT PAY. You will be charged the amount due through your selected method of payment." If you pay by invoice, this section contains instructions for paying by wire transfer.
-### Electronic Fund Transfer (EFT) and check
+### Wire transfer
-If you chose "invoice" as your subscription payment method, page one contains the **Electronic Funds Transfer** section that shows the Microsoft bank account information for electronic payments (wire, ACH, SEPA, and so on). Usually, your bank has a reference field you complete when you send a payment. Make sure you reference the invoice number in that field.
-
-If we accept payments by check for your country or region, you also see a **Check** section that contains the payee name and mailing address. Make sure you reference your invoice number on the check.
+If you chose "invoice" as your subscription payment method, page one contains the **Electronic Funds Transfer** section that shows the Microsoft bank account information for electronic payments (wire transfer, ACH, SEPA, and so on). Usually, your bank has a reference field you complete when you send a payment. Make sure you reference the invoice number in that field.
### Support
commerce Withholding Tax Credit Global https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/withholding-tax-credit-global.md
- commerce_billing - AdminSurgePortfolio monikerRange: 'o365-worldwide' Previously updated : 05/27/2021 Last updated : 03/31/2023 # Request a credit for Withholding Tax on your account (Global customers)
Last updated 05/27/2021
Some customers receive Web Direct (Azure and Microsoft 365) invoices billed by a Microsoft entity located in a foreign country. If your organization makes cross-border payments to that entity, the Tax Authority in your country might require you to withhold part of the cross-border payment as withholding tax (WHT). If you withheld taxes as required by your Tax Authority when remitting payments to Microsoft, this article explains the process for claiming a credit for the tax withheld. > [!IMPORTANT]
-> Starting on April 1, 2023, we will stop accepting checks as a payment method for subscriptions paid by invoice. Beginning on that date, pay by check will no longer be available as a payment option, and check payment instructions will be removed from invoices. You can still pay for your invoice by electronic funds transfer (EFT). See your invoice for EFT payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by EFT, and avoid possible service disruption.
+> As of April 1, 2023, we no longer accept checks as a payment method for subscriptions paid by invoice. Pay by check is no longer available as a payment option, and check payment instructions have been removed from invoices. You can still pay for your invoice by wire transfer. See your invoice for wire transfer payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by wire transfer, and avoid possible service disruption.
-## For invoice pay customers who pay by check or wire
+## For invoice pay customers who pay by wire transfer
If you withheld tax when remitting payment and deposited the withheld tax with the relevant Tax Authority, you must submit a WHT request to clear the outstanding balance in your account.
If there's a problem with your request, the review team might require correction
## Approved requests
-**For customers paying by check or wire:** Approved WHT requests are settled against the unpaid portion of the invoice amount reflected in Withholding Tax Credit Form.
+**For customers paying by wire transfer:** Approved WHT requests are settled against the unpaid portion of the invoice amount reflected in Withholding Tax Credit Form.
After your claim is approved, it's reflected in the next billing cycle. The WHT amount paid is included in the payment section of your next invoice. The amount is also displayed under the paid amount in the customer portal.
commerce Withholding Tax Credit India https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/withholding-tax-credit-india.md
- AdminSurgePortfolio monikerRange: 'o365-worldwide' Previously updated : 05/03/2021 Last updated : 03/31/2023 # Request a credit for Withholding Tax on your account (India customers)
Last updated 05/03/2021
Customers in India receive Web Direct (Azure and Microsoft 365) invoices billed by Microsoft Regional Sales Pte Ltd. Singapore (MRS) and make cross-border payments to Singapore to settle the invoice. If you withheld taxes when remitting the payment, this article explains the process for claiming a credit for the Withholding Tax (WHT) in your account with MRS. > [!IMPORTANT]
-> Starting on April 1, 2023, we will stop accepting checks as a payment method for subscriptions paid by invoice. Beginning on that date, pay by check will no longer be available as a payment option, and check payment instructions will be removed from invoices. You can still pay for your invoice by electronic funds transfer (EFT). See your invoice for EFT payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by EFT, and avoid possible service disruption.
+> As of April 1, 2023, we no longer accept checks as a payment method for subscriptions paid by invoice. Pay by check is no longer available as a payment option, and check payment instructions have been removed from invoices. You can still pay for your invoice by wire transfer. See your invoice for wire transfer payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by wire transfer, and avoid possible service disruption.
-## For invoice pay customers who pay by check or wire
+## For invoice pay customers who pay by wire transfer
If you withheld tax when remitting payment to MRS and deposited the withheld tax with the Income Tax Department, you must submit a WHT request to settle the tax amount withheld in your account.
If there's a problem with your request, the review team might require correction
## Approved requests
-**For customers paying by check and wire:** Approved WHT requests are settled against the unpaid portion of the invoice amount reflected in the Withholding Tax Credit Form.
+**For customers paying by wire transfer:** Approved WHT requests are settled against the unpaid portion of the invoice amount reflected in the Withholding Tax Credit Form.
After your claim is approved, it's reflected in the next billing cycle. The WHT amount paid is included in the payment section of your next invoice. The amount is also displayed under the paid amount in the customer portal.
commerce Volume Licensing Invoices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/licenses/volume-licensing-invoices.md
search.appverid: MET150 description: "Learn how to access and view non-Azure volume licensing invoices in the Microsoft 365 admin center." Previously updated : 11/18/2022 Last updated : 03/31/2023 # Non-Azure Microsoft volume licensing invoices
Total=Charges\-Commitment Usage (if applicable)+Sales Tax
### Payment Instructions
-The **PAYMENT INSTRUCTIONS** section contains the account information you need to send your wire transfer or ACH payment.
+The **PAYMENT INSTRUCTIONS** section contains the account information you need to send your wire transfer payment.
-> [!IMPORTANT]
-> Don't mail a physical check to the Microsoft address shown on your invoice.
- ### Billing Details By Product
commerce Manage Saas Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/manage-saas-apps.md
- admindeeplinkMAC search.appverid: MET150 description: Learn how to activate and manage third-party apps in Microsoft 365 admin center. Previously updated : 04/15/2021 Last updated : 03/31/2023 # Manage third-party app subscriptions for your organization
Last updated 04/15/2021
You can manage licenses and billing for third-party apps in the new <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>. Updated features include enhanced subscription management, improved access to billing information, and improved flexibility for managing bills. Subscription management is based on Microsoft's updated commerce platform. This applies to software-as-a-service apps that customers purchase directly, or from a third-party provider. > [!IMPORTANT]
-> Starting on April 1, 2023, we will stop accepting checks as a payment method for subscriptions paid by invoice. Beginning on that date, pay by check will no longer be available as a payment option, and check payment instructions will be removed from invoices. You can still pay for your invoice by electronic funds transfer (EFT). See your invoice for EFT payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by EFT, and avoid possible service disruption.
+> As of April 1, 2023, we no longer accept checks as a payment method for subscriptions paid by invoice. Pay by check is no longer available as a payment option, and check payment instructions have been removed from invoices. You can still pay for your invoice by wire transfer. See your invoice for wire transfer payment information. If you're an existing customer who currently pays by check, you have until September 30, 2023 to change to paying by wire transfer, and avoid possible service disruption.
## How to get software-as-a-service apps
Admins can change the number of licenses owned by their organization. This only
Software-as-a-service apps each have a billing profile assigned to them. Billing profiles let you customize what products are included on your invoice, and how you pay your invoices. They include: -- **Payment methods** ΓÇô Credit cards or check/wire transfer
+- **Payment methods** ΓÇô Credit cards or wire transfer
- **Contact information** ΓÇô Billing address and a contact name - **Roles** ΓÇô Roles that allow you to change the billing profile, pay bills, or use the payment method on the billing profile to make purchase.
compliance Compliance Manager Templates List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-templates-list.md
The templates listed below may be purchased by your organization. Certain licens
- Pakistan - Electronic Data Protection Act - DRAFT - Philippines BSP Information Security Management Guidelines - Philippines Data Privacy Act of 2012 -- Saudi Arabia - Saudi Arabia Monetary Authority (SAMA)-- Saudi Arabia - National Cybersecurity Authority (NCA) - Singapore - ABS Guidelines on Control Objectives and Procedures for Outsourced Service Providers - Singapore - Banking Act (Cap.19) - Singapore - Cybersecurity 2018
The templates listed below may be purchased by your organization. Certain licens
- Romania - Data Protection Law 190/2018 - Russia - Federal Law 149-FZ On Information, Information Technology and Information Security - [Russian Federation Federal Law Regarding Personal Data](/compliance/regulatory/offering-russia-data-localization)
+- Saudi Arabia - Saudi Arabia Monetary Authority (SAMA)
+- Saudi Arabia - National Cybersecurity Authority (NCA)
- South Africa Consumer Protection ACT 68 2008 - South Africa Electronic Communications and Transactions Act, 2002 - South Africa - Promotion of Access to Information Act
compliance Ediscovery Building Search Queries https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-building-search-queries.md
Title: Build search queries in eDiscovery (Premium)
-description: "Use keywords and conditions to narrow the scope of the search when searching for data using eDiscovery (Premium) in Microsoft 365."
+ Title: Build search queries using keywords and conditions for collections
+description: "Use keywords and conditions to narrow the scope of the search when searching for data using eDiscovery (Premium) in Microsoft Purview."
f1.keywords: - NOCSH Previously updated : 01/01/2023 Last updated : 04/03/2023 audience: Admin
search.appverid:
-# Build search queries for collections in eDiscovery (Premium)
+# Build search queries using keywords and conditions for collections
When configuring the search query when creating a [collection](ediscovery-collections.md) in an eDiscovery (Premium) case, you can use keywords to find specific content and conditions to narrow the scope of the search to return items that are most relevant to your legal investigation.
-![Use keywords and conditions to narrow the results of a search.](../media/SearchQueryBox.png)
+![Use keywords and conditions to narrow the results of a search.](../media/ediscovery-keyword-condition-selection.png)
+
+If you prefer to build a search query with the Keyword Query Language (KQL) editor or the query builder, see:
+
+- [Use the KQL editor to build search queries](/microsoft-365/compliance/ediscovery-kql-editor)
+- [Use the query builder to build search queries](/microsoft-365/compliance/ediscovery-query-builder)
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
Type a keyword query in the **Keywords** box in the search query. You can specif
Alternatively, you can select the **Show keyword list** check box and the type a keyword or keyword phrase in each row. The keywords in each row are connected by a logical operator (which is represented as *c:s* in the search query syntax) that is similar in functionality to the **OR** operator in the search query that's created. This means items that contain any keyword in any row are in the search results. You can add up to 180 rows in the keyword list in eDiscovery (Premium) search queries.
-![Use the keyword list to get statistics on each keyword in the query.](../media/KeywordListSearch.png)
+![Use the keyword list to get statistics on each keyword in the query.](../media/ediscovery-keyword-list-search.png)
Why use the keyword list? You can get statistics that show how many items match each keyword in the keyword list. This can help you quickly identify the keywords that are the most (and least) effective. You can also use a keyword phrase (surrounded by parentheses) in a row in the keywords list. For more information about search statistics, see [Collection statistics and reports](ediscovery-collection-statistics-reports.md) ## Conditions
-You can add search conditions to narrow the scope of a search and return a more refined set of results. Each condition adds a clause to the search query that is created and run when you start the search. A condition is logically connected to the keyword query specified in the keyword box by a logical operator (which is represented as *c:c* in the search query syntax) that is similar in functionality to the **AND** operator. That means items have to satisfy both the keyword query and one or more conditions to be included in the search results. This is how conditions help to narrow your results. For a list and description of conditions that you can use in a search query, see the "Search conditions" section in [Keyword queries and search conditions](ediscovery-keyword-queries-and-search-conditions.md#search-conditions).
+You can add search conditions to narrow the scope of a search and return a more refined set of results by selecting **Add condition**.
+
+Each condition adds a clause to the search query that is created and run when you start the search. A condition is logically connected to the keyword query specified in the keyword box by a logical operator (which is represented as *c:c* in the search query syntax) that is similar in functionality to the **AND** operator. That means items have to satisfy both the keyword query and one or more conditions to be included in the search results. This is how conditions help to narrow your results.
+
+For a list and description of conditions that you can use in a search query, see the "Search conditions" section in [Keyword queries and search conditions](ediscovery-keyword-queries-and-search-conditions.md#search-conditions).
+
+![Use the condition selector to add conditions to the query.](../media/ediscovery-multiple-condition-query.png)
compliance Ediscovery Create Draft Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-create-draft-collection.md
When you create a collection estimate, you can view information about the estima
- To search all content locations for a specific service (Exchange mailboxes, SharePoint and OneDrive sites, or Exchange public folders), select the corresponding **Select all** toggle in the **Status** column. This option will search all content locations in the selected service.
- - To search specific content location for a service, select the corresponding **Select all** toggle in the **Status** column, and then select **Users, groups or teams** (for Exchange mailboxes) or **Choose sites** for (SharePoint and OneDrive sites) to search specific content locations.
+8. On the **Search query** page, you can create the search query that is used to collect items from the data sources that you've identified in the previous wizard pages. You can search for keywords, property:value pairs, or use a keyword list. You can also add various search conditions to narrow the scope of the collection or user the query builder to define query operators, filters, and conditions. For more information, see:
+
+ - [Build search queries using keywords and conditions for collections](ediscovery-building-search-queries.md)
+ - [Use the KQL editor to build search queries](/microsoft-365/compliance/ediscovery-kql-editor)
+ - [Use the query builder to build search queries (preview)](/microsoft-365/compliance/ediscovery-query-builder)
Use the **Additional search options** options to include other search locations. The options available here are set by your admin in eDiscovery global settings. Search options that aren't defined by your eDiscovery admin aren't selectable or available. Search options enabled by your eDiscovery admin can be selected and included in the collection as applicable. You have two choices for additional search options:
compliance Ediscovery Kql Editor https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-kql-editor.md
f1.keywords:
Previously updated : 01/01/2023 Last updated : 04/03/2023 audience: Admin
search.appverid:
# Use the KQL editor to build search queries
-The new Keyword Query Language (KQL) query experience in Microsoft Purview eDiscovery tools search provides feedback and guidance when you build search queries in Content search, Microsoft Purview eDiscovery (Standard), and eDiscovery (Premium). When you enter queries in the editor, it provides autocompletion for supported searchable properties and conditions and provides lists of supported values for standard properties and conditions. For example, if you specify the `kind` email property in your query, the editor will present a list of supported values that you can select. The KQL editor also displays potential query errors in real time that you can fix before you run the search. Best of all, you can paste complex queries directly into the editor without having to manually build queries using the keywords and conditions cards in the standard condition builder.
+The Keyword Query Language (KQL) query option in Microsoft Purview eDiscovery tools search provides feedback and guidance when you build search queries in Content search, Microsoft Purview eDiscovery (Standard), and eDiscovery (Premium). When you enter queries in the editor, it provides autocompletion for supported searchable properties and conditions and provides lists of supported values for standard properties and conditions. For example, if you specify the `kind` email property in your query, the editor will present a list of supported values that you can select. The KQL editor also displays potential query errors in real time that you can fix before you run the search. Best of all, you can paste complex queries directly into the editor without having to manually build queries using the keywords and conditions cards in the standard condition builder.
Here are the key benefits to using the KQL editor:
When you create or edit an eDiscovery search, the option to display and use the
### KQL editor in eDiscovery (Premium)
-![KQL editor in eDiscovery (Premium)](../media/KQLEditorAdvanced.png)
+![KQL editor in eDiscovery (Premium)](../media/ediscovery-kql-premium.png)
## Using the KQL editor
compliance Ediscovery Query Builder https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-query-builder.md
+
+ Title: Use the query builder to create search queries (preview)
+description: "Use the query builder to narrow the scope of the search when searching for data using eDiscovery (Premium) in Microsoft Purview."
+f1.keywords:
+- NOCSH
+++
+audience: Admin
++
+ms.localizationpriority: medium
+
+- tier1
+- purview-compliance
+- ediscovery
+search.appverid:
+- MOE150
+- MET150
+ Last updated : 04/03/2023++
+# Use the query builder to create search queries (preview)
+
+The query builder option in collection search tool provides a visual filtering experience when you build search queries in Microsoft Purview eDiscovery (Premium). Use the new query builder to construct complex queries with additional functionality, including AND, OR, and grouping of conditions. These features in the query builder help you build queries more effectively, provide a visual interface for grouping sub-queries, and provide additional space for complex keyword queries to be constructed and reviewed.
++
+## Displaying the query builder
+
+When you create or edit an eDiscovery search for a collection in eDiscovery (Premium), the option to display and use the query builder is located on the **Search query** page in the collections wizard. Select **Use new query builder** to display and use the query builder.
+
+![Use the query builder to build filters for your search query.](../media/ediscovery-query-builder-enable.png)
+
+## Using the query builder
+
+After you've selected **Use new query builder***, you're ready to get started. To create a query and custom filtering for your search, you'll use the following controls:
+
+- **AND/OR**: These conditional logical operators allow you to select the query condition that applies to specific filters and filter subgroups. These operators allow you to use multiple filters or subgroups connected to a single filter in your query.
+- **Select a filter**: Allows you to select filters for the specific data sources and location content selected for the collection.
+- **Add filter**: Allows you to add multiple filters to your query. Is available after you've defined at least one query filter.
+- **Select an operator**: Depending on the selected filter, the operators compatible for the filter are available to select. For example, if the *Date* filter is selected, the available operators are *Before*, *After*, and *Between*. If the *Size (in bytes)* filter is selected, the available operators are *Greater than*, *Greater or equal*, *Less than*, *Less or equal*, *Between*, and *Equal*.
+- **Value**: Depending on the selected filter, the values compatible for the filter are available. Additionally, some filters support multiple values and some filters support one specific value. For example, if the *Date* filter is selected, you'll select date values. If the *Size (in bytes)* filter is selected, you'll select a value for bytes.
+- **Add subgroup**: After you've defined a filter, you can add a subgroup to refine the results returned by the filter. You can also add a subgroup to a subgroup for multi-layered query refinement.
+- **Remove a filter condition**: To remove an individual filter or subgroup, select the remove icon to the right of each filter line or subgroup.
+- **Clear all**: To clear the entire query of all filters and subgroups, select **Clear all**.
+
+## Scenario example
+
+The eDiscovery administrator needs to create a query to find emails sent from Aimee Miller to Adam Eham, Adele Vance, or Aditya Dash that were sent between February 9, 2023 and March 9, 2023 that contains the keywords *compliance* and *audit*. For this example, the administrator creates the following query using the new query builder:
+
+1. For the first filter, the administrator selects *Sender*, then selects the *Equals any of* operator, then selects *Aimee Miller* from the list of users available in the **Value** control.
+2. Next, the administrator selects **Add subgroup** and the **OR** operator to define the other users that Aimee may have sent an email to about the compliance audit.
+3. In the subgroup, the administrator selects the *To* filter, the *Equals any of* operator, and the *Value (user)* for each of the other users that Aimee may have sent email to about the compliance audit. In this example, the administrator creates a filter in the subgroup for Adam Eham, Adele Vance, and Aditya Dash.
+4. To define the date range, the administrator selects **Add filter** and selects the *Date* filter, the *Between* operator, and start and ending dates for the *Value*.
+5. Finally, the administrator selects the *Keyword list* filter, the *Equal* operator, and *compliance, audit* as the keyword *Value*.
+
+![Query builder example.](../media/ediscovery-query-builder-example.png)
compliance Ediscovery Review Set Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-review-set-search.md
f1.keywords:
Previously updated : 01/01/2023 Last updated : 04/01/2023 audience: Admin
In a review set, there are five default filters that are pre-loaded in the revie
- Subject/Title - Tags
-![Default filter types.](../media/DefaultFilterTypes.png)
+![Default filter types.](../media/ediscovery-review-set-filters.png)
Select each filter to expand it and assign a value. Select outside the filter to automatically apply the filter to the review set. > [!NOTE]
-> A review set only displays a maximum of 10,000 items per page. Use default or custom filters to adjust the displayed items as needed.
-
-The following screenshot shows the Date filter configured to show documents within a date range.
-
-![Default filter expanded.](../media/ExpandedFilter.png)
+> A review set displays a maximum of 1,000 items per page. Use default or custom filters to adjust the displayed items as needed.
## Add or remove filters To add or remove filters that are displayed for the review set, select **Filters** to open the filter panel, which is displayed on a flyout page.
-![Filter panel.](../media/FilterPanel.png)
+![Filter panel.](../media/ediscovery-add-remove-filters.png)
The available filters are organized in four sections:
The available filters are organized in four sections:
- **IDs**: Filters for all ID properties of documents. - **Item properties**: Filters for document properties.
-Expand each section and select or deselect filters to add or remove them in the filter set. When you add a filter, it's displayed in the filter set.
-
-![List of filter sections and properties in the filter panel.](../media/FilterPanel2.png)
+Expand each section and select or deselect filters to add or remove them in the filter set. When you add a filter, it's displayed in the filter set.
> [!NOTE] > When you expand a section in the filter panel, you'll notice that the default filter types are selected. You can keep these selected or deselect them and removed them from the filter set.
There are multiple types of filters:
## Include and exclude filter relationships
-You can change the include and exclude relationship for a particular filter. For example, in the Tag filter, you can exclude items that are tagged with a particular tag by selecting **Equals none of** in the dropdown filter.
-
-![Exclude tag filter.](../media/TagFilterExclude.png)
+You can change the include and exclude relationship for a particular filter. For example, in the Tag filter, you can exclude items that are tagged with a particular tag by selecting **Equals none of** in the dropdown filter.
## Save filters as queries
-After you're satisfied with your filters, you can save the filter combination as a filter query. This lets you apply the filter in the future review sessions.
+After you're satisfied with your filters, you can save the filter combination as a filter query. This saved filter query lets you apply the filter in the future review sessions.
-To save a filter, select **Save the query** and name it. You or other reviewers can run previously saved filter queries by selecting the **Saved filter queries** dropdown and selecting a filter query to apply to review set documents.
+To save a filter, select **Save the query** and name it. You or other reviewers can run previously saved filter queries by selecting the **Saved filter queries** dropdown and selecting a filter query to apply to review set documents.
-![Save a filter query.](../media/SaveFilterQuery.png)
+![Save a filter query.](../media/ediscovery-save-filter-query.png)
To delete a filter query, open the filter panel and select the trashcan icon next to the query.
You can also build more advanced queries to search for documents in a review set
In this panel, you can create complex KQL queries by using the query builder. You can add conditions or add condition groups that are made up of multiple conditions that are logically connected by **AND** or **OR** relationships.
- ![Use query builder to configure complex filter queries.](../media/ComplexQuery.png)
+ ![Use query builder to configure complex filter queries.](../media/ediscovery-open-query-builder.png)
## Filter partially indexed items
If you selected the option to add partially indexed items from additional data s
At this time, there isn't a filter option in a review set to display partially indexed items. But we're working on it. Until then, here's a way you can filter and display the partially indexed items that you added to a review set. 1. Create a collection and commit it to a new review set *without* adding partially indexed items from the additional data sources.- 2. Create a new collection by copying the collection from step 1.- 3. Commit the new collection to the same review set. But this time, add the partially indexed items from the additional data sources. Because items from the collection you created in step 1 have already been added to the review set, only the partially indexed items from the second collection are added to the review set.- 4. After both collections are added to the review set, go to the review set, and select **Manage** > **Load sets**.- 5. Copy or make note of the **Load Id** for the second collection (the one you created in step 2). The collection name is identified in the **Source info** column.- 6. Back in the review set, select **Filter**, expand the **IDs** section, and then select the **Load Id** checkbox.- 7. Expand the **Load Id** filter, and then select the checkbox for the load ID that corresponds to the second collection to display the partially indexed items.
compliance Endpoint Dlp Getting Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-getting-started.md
f1.keywords:
Previously updated : 09/09/2019 Last updated : 04/03/2023 audience: ITPro f1_keywords:
Here are the virtual operating systems that are supported by virtualization envi
|||| |Azure virtual desktop (AVD)|<ul><li>Single session supported for 20H2, 21H1, 21H2</li><li>Multi session supported for 20H2, 21H1, 21H2</li></ul>|<ul><li>Single session supported for 22H2</li><li>Multi session supported for 22H2</li></ul>| |Citrix Virtual Apps and Desktops 7 (2209)|<ul><li>Single session supported for 20H2, 21H1, 21H2</li><li>Multi session supported for 20H2, 21H1, 21H2|<ul><li>Single session supported for 21H2 (Gen2)</li><li>Multi session supported for 21H2 (Gen 2)</li></ul>|
-|Amazon workspaces|<ul><li>Single session supported for 20H2, 21H1, 21H2|N/A|
|Hyper-V|<ul><li>Single session supported for 20H2, 21H1, 21H2</li><li>Multi session with Hybrid AD join supported for 20H2, 21H1, 21H2</li></ul>|<ul><li>Single session supported for 22H2</li><li>Multi session with Hybrid AD join supported for 22H2</li></ul>|
+<!--|Amazon workspaces|<ul><li>Single session supported for 20H2, 21H1, 21H2|N/A|-->
+ #### Known issues 1. You cannot monitor Copy to Clipboard and Enforcing Endpoint DLP on Azure Virtual Desktop environments via browsers. However the same egress operation will be monitored by Endpoint DLP for actions via Remote Desktop Session (RDP) today.
For specific guidance to onboarding macOS devices, see:
Once a device is onboarded, it should be visible in the devices list, and also start reporting audit activity to Activity explorer.
-<!--### Permissions
-
-To enable device management, the account you use must be a member of any one of these roles:
--- Global admin-- Security admin-- Compliance admin-
-If you want to use a custom account to view the device management settings, it must be in one of these roles:
--- Global admin-- Compliance admin-- Compliance data admin-- Global reader-
-If you want to use a custom account to access the onboarding/offboarding page, it must be in one of these roles:
--- Global admin-- Compliance admin-
-If you want to use a custom account to turn on/off device monitoring, it must be in one of these roles:
--- Global admin-- Compliance admin-
-Data from Endpoint DLP can be viewed in [Activity explorer](data-classification-activity-explorer.md). There are four roles that grant permission to activity explorer, the account you use for accessing the data must be a member of any one of them.
--- Global admin-- Compliance admin-- Security admin-- Compliance data admin -->-
-<!-- ### Prepare your Windows 10/11 endpoints
-
-Make sure that the Windows devices that you plan on deploying Endpoint DLP to meet these requirements.
-
-1. Must be running Windows 10 x64 build 1809, Windows 11, or later.
-
-1. Antimalware Client Version is 4.18.2009.7 or newer. Check your current version by opening Windows Security app, select the Settings icon, and then select About. The version number is listed under Antimalware Client Version. Update to the latest Antimalware Client Version by installing Windows Update KB4052623.
-
- > [!NOTE]
- > None of Windows Security components need to be active, you can run Endpoint DLP independent of Windows Security status, but the [Real-time protection and Behavior monitor](/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus)) must be enabled.
-
-1. The following Updates are installed on Windows 10 devices
-
- > [!NOTE]
- > These updates are not a pre-requisite to onboard a device to Endpoint DLP, but contain fixes for important issues thus must be installed before using the product.
-
- - For Windows 10 1809 - KB4559003, KB4577069, KB4580390
- - For Windows 10 1903 or 1909 - KB4559004, KB4577062, KB4580386
- - For Windows 10 2004 - KB4568831, KB4577063
- - For devices running Office 2016 (and not any other Office version) - KB4577063
-
-1. All devices must be one of these:
-
- - [Azure Active Directory (Azure AD) joined](/azure/active-directory/devices/concept-azure-ad-join)
- - [Hybrid Azure AD joined](/azure/active-directory/devices/concept-azure-ad-join-hybrid)
- - [AAD registered](/azure/active-directory/user-help/user-help-register-device-on-network)
-
-1. Install Microsoft Chromium Edge browser on the endpoint device to enforce policy actions for the upload to cloud activity. See, [Download the new Microsoft Edge based on Chromium](https://support.microsoft.com/help/4501095/download-the-new-microsoft-edge-based-on-chromium). If your devices use the Chrome browser, you can install the [Microsoft Compliance Extension](dlp-chrome-learn-about.md#learn-about-the-microsoft-compliance-extension) to enforce policy actions for the upload to cloud activity.
-
-1. If you are on Monthly Enterprise Channel of Microsoft 365 Apps versions 2004-2008, there is a known issue with Endpoint DLP classifying Office content and you need to update to version 2009 or later. See [Update history for Microsoft 365 Apps (listed by date)](/officeupdates/update-history-microsoft365-apps-by-date) for current versions. To learn more about this issue, see the Office Suite section of [Release notes for Current Channel releases in 2020](/officeupdates/current-channel#version-2010-october-27).
-
-1. If you have endpoints that use a device proxy to connect to the internet, follow the procedures in [Configure device proxy and internet connection settings for Information Protection](device-onboarding-configure-proxy.md#configure-device-proxy-and-internet-connection-settings-for-information-protection).
-
-## Prepare your macOS devices (preview)
-
-See, [Onboard macOS devices into Microsoft 365 overview (preview)](device-onboarding-macos-overview.md#onboard-macos-devices-into-microsoft-365-overview-preview)-->
-
-<!--## Onboarding Windows 10 and Windows 11 devices into device management
-
-You must enable device monitoring and onboard your endpoints before you can monitor and protect sensitive items on a device. Both of these actions are done in the Microsoft Purview compliance portal.
-
-When you want to onboard devices that haven't been onboarded yet, you'll download the appropriate script and deploy it to those devices. Follow the [Onboarding devices procedure](endpoint-dlp-getting-started.md#onboarding-devices).
-
-If you already have devices onboarded into [Microsoft Defender for Endpoint](/windows/security/threat-protection/), they will already appear in the managed devices list. Follow the [With devices onboarded into Microsoft Defender for Endpoint procedure](?source=docs&view=o365-worldwide#with-devices-onboarded-into-microsoft-defender-for-endpoint).
-
-### Onboarding devices
-
-In this deployment scenario, you'll onboard devices that have not been onboarded yet, and you just want to monitor and protect sensitive items from unintentional sharing on Windows 10 or Windows 11 devices.
-
-1. Open the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>.
-
-2. Choose **Settings** > **Device onboarding**.
-
- > [!NOTE]
- > While it usually takes about 60 seconds for device onboarding to be enabled, please allow up to 30 minutes before engaging with Microsoft support.
-
-3. Choose **Devices** to open the **Devices** list. The list will be empty until you onboard devices.
-
-4. Choose **Onboarding** to begin the onboarding process.
-
-5. Choose the way you want to deploy to these additional devices from the **Deployment method** list and then **download package**.
-
- > [!div class="mx-imgBorder"]
- > ![deployment method.](../media/endpoint-dlp-getting-started-3-deployment-method.png)
-
-6. Follow the appropriate procedures in [Onboarding tools and methods for Windows machines](/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints). This link takes you to a landing page where you can access Microsoft Defender for Endpoint procedures that match the deployment package you selected in step 5:
-
- - Onboard Windows machines using Group Policy
- - Onboard Windows machines using Microsoft Endpoint Configuration Manager
- - Onboard Windows machines using Mobile Device Management tools
- - Onboard Windows machines using a local script
- - Onboard non-persistent virtual desktop infrastructure (VDI) machines in single-session scenarios
-
-Once done and endpoint is onboarded, it should be visible in the devices list and also start reporting audit activity logs to Activity explorer.
-
-> [!NOTE]
-> This experience is under license enforcement. Without the required license, data will not be visible or accessible.
-
-### With devices onboarded into Microsoft Defender for Endpoint
-
-In this scenario, Microsoft Defender for Endpoint is already deployed and there are endpoints reporting in. All these endpoints will appear in the managed devices list. You can continue to onboard new devices into Endpoint DLP to expand coverage by using the [Onboarding devices procedure](endpoint-dlp-getting-started.md#onboarding-devices).
-
-1. Open the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>.
-
-2. Open the Compliance Center settings page and choose **Enable device monitoring**.
-
-3. Choose **Device management** to open the **Devices** list. You should see the list of devices that are already reporting in to Microsoft Defender for Endpoint.
-
- > [!div class="mx-imgBorder"]
- > ![device management.](../media/endpoint-dlp-getting-started-2-device-management.png)
-
-4. Choose **Onboarding** if you need to onboard additional devices.
-
-5. Choose the way you want to deploy to these additional devices from the **Deployment method** list and then **Download package**.
-
-6. Follow the appropriate procedures in [Onboarding tools and methods for Windows machines](/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints). This link takes you to a landing page where you can access Microsoft Defender for Endpoint procedures that match the deployment package you selected in step 5:
- - Onboard Windows machines using Group Policy
- - Onboard Windows machines using Microsoft Endpoint Configuration Manager
- - Onboard Windows machines using Mobile Device Management tools
- - Onboard Windows machines using a local script
- - Onboard non-persistent virtual desktop infrastructure (VDI) machines.
-
-Once done and endpoint is onboarded, it should be visible under the **Devices** table and also start reporting audit logs to the **Activity Explorer**.
-
-> [!NOTE]
-> This experience is under license enforcement. Without the required license, data will not be visible or accessible.
-
-### Viewing Endpoint DLP alerts in DLP Alerts Management dashboard
-
-1. Open the Data loss prevention page in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a> and choose Alerts.
-
-2. Refer to the procedures in [How to configure and view alerts for your DLP policies](dlp-configure-view-alerts-policies.md) to view alerts for your Endpoint DLP policies.
-
-### Viewing Endpoint DLP data in activity explorer
-
-1. Open the [Data classification page](https://compliance.microsoft.com/dataclassification?viewid=overview) for your domain in the Microsoft Purview compliance portal and choose Activity explorer.
-
-2. Refer to the procedures in [Get started with Activity explorer](data-classification-activity-explorer.md) to access and filter all the data for your Endpoint devices.
-
- > [!div class="mx-imgBorder"]
- > ![activity explorer filter for endpoint devices.](../media/endpoint-dlp-4-getting-started-activity-explorer.png)
-
-## Next steps
-
-Now that you have onboarded devices and can view the activity data in Activity explorer, you are ready to move on to your next step where you create DLP policies that protect your sensitive items.
--- [Using Endpoint data loss prevention](endpoint-dlp-using.md)- ## See also - [Learn about Endpoint data loss prevention](endpoint-dlp-learn-about.md)
Now that you have onboarded devices and can view the activity data in Activity e
- [Microsoft 365 subscription](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans?rtc=1) - [Azure AD joined devices](/azure/active-directory/devices/concept-azure-ad-join) - [Download the new Microsoft Edge based on Chromium](https://support.microsoft.com/help/4501095/download-the-new-microsoft-edge-based-on-chromium)>
compliance Information Barriers Onedrive https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-onedrive.md
+
+ Title: "Use information barriers with OneDrive"
+description: "Learn about associating segments with a OneDrive, and what happens when segments are associated with a OneDrive."
++++ Last updated : 03/21/2023
+audience: Admin
+f1.keywords:
+- NOCSH
++
+ms.localizationpriority: medium
+
+- tier2
+- purview-compliance
+- M365-collaboration
+
+search.appverid:
+- ODB160
+- ODB150
+- MET150
++
+# Use information barriers with OneDrive
+
+[Microsoft Purview Information Barriers](information-barriers.md) are policies in Microsoft 365 that a compliance admin can configure to prevent users from communicating and collaborating with each other. This solution is useful if, for example, one division is handling information that shouldn't be shared with specific other divisions, or a division needs to be prevented, or isolated, from collaborating with all users outside of the division. Information barriers are often used in highly regulated industries and those organizations with compliance requirements, such as finance, legal, and government.
+
+For OneDrive, information barriers can determine and prevent the following kinds of unauthorized collaborations:
+
+- User access to OneDrive or stored content
+- Sharing OneDrive or stored content with other users
+
+## Information barriers modes and OneDrive
+
+When information barriers are enabled on SharePoint and OneDrive, the OneDrive of segmented users are automatically protected with IB policies. [Information barriers modes](information-barriers-policies.md#step-6-information-barriers-modes-optional) help strengthen access, sharing, and membership of a OneDrive site based on its IB mode and segments associated with the OneDrive.
+
+When using information barriers with OneDrive, the following IB modes are supported:
+
+| **Mode** | **Description** |
+|:- |:-|
+| **Open** | When a non-segmented user provisions their OneDrive, the site's IB mode is set as Open, by default. There are no segments associated with the site. |
+| **Owner Moderated** | When a OneDrive is used for collaboration with incompatible users in the presence of the site owner/moderator, the OneDrive's IB mode can be set as Owner Moderated. See [this section](#manage-the-ib-mode-of-a-users-onedrive-preview) for details on Owner Moderated site. |
+| **Explicit** | When a segmented user provisions their OneDrive within 24 hours of enablement, the site's IB mode is set as *Explicit* by default. The user's segment and other segments that are compatible with the user's segment and with each other get associated with the user's OneDrive. |
+| **Mixed** | When a segmented user's OneDrive is allowed to be shared with unsegmented users, the site's IB mode can be set as *Mixed*. This is an opt-in mode that the SharePoint admin can set on OneDrive of a segmented user. |
+
+>[!NOTE]
+>Starting July 12, 2022, *Inferred* mode has changed to *Mixed* mode. The functionality for the mode remains the same.
+
+## Sharing files from OneDrive
+
+### Open
+
+When a OneDrive has no segments and IB mode as *Open*:
+
+- The user can share files and folders based on the information barrier policy applied to the user and the sharing setting for the OneDrive.
+
+### Owner Moderated
+
+When a site has information barriers mode is set to *Owner Moderated*:
+
+- The option to share with *Anyone with the link* is disabled.
+- The option to share with *Company-wide link* is disabled.
+- The site and its content can be shared with existing members.
+- The site and its content can be shared only by the OneDrive owner per their IB policy.
+
+### Explicit
+
+When a OneDrive has information barriers segments and the mode is set to *Explicit*:
+
+- The option to share with *Anyone with the link* is disabled.
+- The option to share with *Company-wide link* is disabled.
+- Files and folders can be shared only with users whose segment matches that of the OneDrive.
+
+### Mixed
+
+When a OneDrive has information barriers segments and the mode is set to *Mixed*:
+
+- The option to share with Anyone with the link is disabled.
+- The option to share with Company-wide link is disabled.
+- Files and folders can be shared with users whose segment matches that of the OneDrive and unsegmented users in the tenant.
+
+## Accessing shared files from OneDrive
+
+### Open mode
+
+For a user to access content in a OneDrive that has no segments associated and IB mode as *Open*:
+
+- The files must be shared with the user.
+
+### Owner Moderated mode
+
+For a user to access a SharePoint site with site's information barriers mode is set to *Owner Moderated*:
+
+- The user has site access permissions.
+
+### Explicit mode
+
+For a user to access content in a OneDrive that has segments and the IB mode set to *Explicit*:
+
+1. The user's segment must match a segment that is associated with the OneDrive.
+
+ AND
+
+2. The files must be shared with the user.
+
+>[!NOTE]
+>By default, non-segment users can access shared OneDrive files only from other non-segment users with IB modes as *Open*. They can't access shared files from OneDrive that have segment(s) applied and the IB mode is *Explicit*.
+
+### Mixed mode
+
+For a segmented user to access content in a OneDrive that has segments and the IB mode set as *Mixed*:
+
+1. The user's segment must match a segment that is associated with the OneDrive.
+
+ AND
+
+2. The files must be shared with the user.
+
+For an unsegmented user to access content in a OneDrive that has segments and the IB mode set as *Mixed*:
+
+- The user must have site access permissions.
+
+## Example scenario
+
+The following example illustrates three segments in an organization: HR, Sales, and Research. An information barrier policy has been defined that blocks communication and collaboration between the Sales and Research segments.
+
+![Example of segments in an organization](../media/info-barriers-segments-example.png)
+
+With information barriers in OneDrive, when a segment is applied to a user, within 24 hours that segment is automatically associated with the user's OneDrive. Other segments that are compatible with the user's segment and with each other will also get associated with the OneDrive. A OneDrive can have up to 100 segments associated with it. A global or SharePoint admin can manage these segments using PowerShell, as described later in the section [Associate or remove additional segments on a user's OneDrive](#manage-segments-on-a-users-onedrive).
+
+The following table shoes the effects of this example configuration:
+
+| Components | HR users | Sales users | Research users | Non-segment users |
+|:--|:|:|:|:|
+| Segments associated with OneDrive | HR | Sales, HR | Research, HR | None |
+| IB mode on OneDrive | Explicit | Explicit | Explicit | Open |
+| OneDrive content can be shared with | HR only | Sales and HR | Research and HR | Anyone based on the sharing settings selected |
+| OneDrive content can be accessed by | HR only | Sales and HR | Research and HR | Anyone with whom the content has been shared |
+
+## Enable SharePoint and OneDrive information barriers in your organization
+
+Enabling information barriers for SharePoint and OneDrive are configured in a single action. Information barriers for the services can't be enabled separately. To enable information barriers for OneDrive, see [Enable SharePoint and OneDrive information barriers in your organization](information-barriers-sharepoint.md#enable-sharepoint-and-onedrive-information-barriers-in-your-organization). After you've enabled information barriers for SharePoint and OneDrive, continue with the OneDrive guidance in this article.
+
+## Prerequisites
+
+1. Make sure you meet the [licensing requirements for information barriers](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-barriers).
+2. [Create information barrier policies](information-barriers-policies.md) that allow or block communication between the segments and activate the policies. Create segments and define the users in each.
+3. After you've configured and activated your information barrier policies, wait 24 hours for the changes to propagate through your organization.
+4. Enable information barriers for OneDrive. Enabling information barriers for SharePoint and OneDrive are configured in a single action and these services can't be enabled separately. To enable information barriers for OneDrive, see the guidance and steps in the [Use information barriers with SharePoint](information-barriers-sharepoint.md) article.
+5. Complete the steps in the following sections to customize and manage information barriers for OneDrive in your organization.
+
+## Use PowerShell to view the segments associated with a OneDrive
+
+A global or SharePoint admin can view and change the segments associated with a user's OneDrive. Your organization can have up to 5,000 segments and users can be assigned to multiple segments.
+
+> [!IMPORTANT]
+> Support for 5,000 segments and assigning users to multiple segments is only available when your organization isn't in *Legacy* mode. Assigning users to multiple segments requires additional actions to change the information barriers mode for your organization. For more information, see [Use multi-segment support in information barriers)](information-barriers-multi-segment.md) for details. <br><br> For organizations in *Legacy* mode, the maximum number of segments supported is 250 and users are restricted to being assigned to only one segment. Organizations in *Legacy* mode will be eligible to upgrade to the newest version of information barriers in the future. For more information, see the [information barriers roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=information%2Cbarriers).
+
+1. Connect to the [Security & Compliance Center PowerShell](/powershell/exchange/office-365-scc/connect-to-scc-powershell/connect-to-scc-powershell) as a global admin.
+
+2. Run the following command to get the list of segments and their GUIDs.
+
+ ```PowerShell
+ Get-OrganizationSegment | ft Name, EXOSegmentID
+ ```
+
+3. Save the list of segments.
+
+ |**Name**|**EXOSegmentId**|
+ |:-|:|
+ | Sales | a9592060-c856-4301-b60f-bf9a04990d4d |
+ | Research | 27d20a85-1c1b-4af2-bf45-a41093b5d111 |
+ | HR | a17efb47-e3c9-4d85-a188-1cd59c83de32 |
+
+4. If not previously completed, [download](https://go.microsoft.com/fwlink/p/?LinkId=255251) and install the latest SharePoint Online Management Shell. If you installed a previous version of the SharePoint Online Management Shell, follow the instructions in the [Enable SharePoint and OneDrive information barriers in your organization](information-barriers-sharepoint.md#enable-sharepoint-and-onedrive-information-barriers-in-your-organization) article.
+
+5. Connect to SharePoint as a [global admin or SharePoint admin](/sharepoint/sharepoint-admin-role) in Microsoft 365. To learn how, see [Getting started with SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
+
+6. Run the following command:
+
+ ```PowerShell
+ Get-SPOSite -Identity <site URL> | Select InformationSegment
+ ```
+
+ For example:
+
+ ```powershell
+ Get-SPOSite -Identity https://contoso-my.sharepoint.com/personal/John_contoso_onmicrosoft_com | Select InformationSegment
+ ```
+
+## Manage segments on a user's OneDrive
+
+> [!WARNING]
+> If the segments associated with a user's OneDrive don't match the segment applied to the user, the user won't be able to access their OneDrive. Be careful not to associate any segments with the OneDrive of a non-segment user.
+
+> [!NOTE]
+> Any changes you make will be overwritten if the user's segment changes.
+
+To associate a segment with a OneDrive, run the following command in the SharePoint Online Management Shell.
+
+> [!IMPORTANT]
+> Support for 5,000 segments and assigning users to multiple segments is only available when your organization isn't in *Legacy* mode. Assigning users to multiple segments requires additional actions to change the information barriers mode for your organization. For more information, see [Use multi-segment support in information barriers)](information-barriers-multi-segment.md) for details. <br><br> For organizations in *Legacy* mode, the maximum number of segments supported is 250 and users are restricted to being assigned to only one segment. Organizations in *Legacy* mode will be eligible to upgrade to the newest version of information barriers in the future. For more information, see the [information barriers roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=information%2Cbarriers).
+
+```PowerShell
+Set-SPOSite -Identity <site URL> -AddInformationSegment <segment GUID>
+ ```
+
+For example:
+
+```powershell
+Set-SPOSite -Identity https://contoso-my.sharepoint.com/personal/John_contoso_onmicrosoft_com -AddInformationSegment 27d20a85-1c1b-4af2-bf45-a41093b5d111
+```
+
+When you add segments to a OneDrive, the site's IB mode is automatically updated to *Explicit*. An error will appear if you attempt to associate a segment that isn't compatible with the existing segments on the OneDrive.
+
+> [!IMPORTANT]
+> Support for assigning users to multiple segments is only available when your organization isn't in *Legacy* mode. To determine if your organization is in *Legacy* mode, see [Check the IB mode for your organization)](information-barriers-multi-segment.md#check-the-ib-mode-for-your-organization). <br><br> Users are restricted to being assigned to only one segment for organizations in *Legacy* mode. Organizations in *Legacy* mode will be eligible to upgrade to the newest version of information barriers in the future. For more information, see the [information barriers roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=information%2Cbarriers).
+
+To remove segment from a OneDrive, run the following command.
+
+```PowerShell
+Set-SPOSite -Identity <site URL> -RemoveInformationSegment <segment GUID>
+ ```
+
+For example:
+
+```powershell
+Set-SPOSite -Identity https://contoso-my.sharepoint.com/personal/John_contoso_onmicrosoft_com -RemoveInformationSegment 27d20a85-1c1b-4af2-bf45-a41093b5d111
+```
+
+If all the segments of a OneDrive site are removed, the IB mode of the OneDrive is automatically updated to *Open*.
+
+## Manage the IB mode of a user's OneDrive (preview)
+
+To view the IB mode of a OneDrive site, run the following command in the SharePoint Online Management Shell as a SharePoint admin or global administrator:
+
+```powershell
+Get-SPOSite -Identity <site URL> | Select InformationBarriersMode
+```
+
+For example:
+
+```powershell
+Get-SPOSite -Identity https://contoso-my.sharepoint.com/personal/John_contoso_onmicrosoft_com | Select InformationBarriersMode
+```
+
+A SharePoint admin or global administrator also has the ability to manage the IB mode of a OneDrive site to meet the needs of your organization with new IB modes:
+
+### Owner Moderated mode example
+
+Allow an incompatible segment user access to a OneDrive. For example, you want to allow HR user's OneDrive to be accessed by both Sales and Research segment users in your tenant.
+
+*Owner Moderated* is a mode applicable to OneDrive site that allows incompatible segment users access to OneDrive in the presence of a moderator/owner. Only the site owner has the capability to invite incompatible segment users on the same site.
+
+To update a OneDrive site IB mode to *Owner Moderated*, run the following PowerShell command:
+
+```powershell
+Set-SPOSite -Identity <siteurl> InformationBarriersMode OwnerModerated
+```
+
+Owner Moderated IB mode canΓÇÖt be set on a site with segments. Remove the segments before setting the IB mode as Owner Moderated. Access to an Owner Moderated site is allowed for users who have site access permissions. Sharing of an Owner Moderated OneDrive and its contents is only allowed by the site owner per their IB policy.
+
+### Mixed mode example
+
+Allow unsegmented users to access OneDrive associated with segments. For example, you want to allow HR user's OneDrive to be accessed by HR segment and unsegmented users in your tenant. Mixed mode applicable to OneDrive site that allows segmented and unsegmented users access to OneDrive.
+
+To update a OneDrive site IB Mode to Mixed, run the following PowerShell command:
+
+```powershell
+Set-SPOSite -Identity <siteurl> InformationBarriersMode Mixed
+```
+
+Mixed IB mode can't be set on a site without segments. Add segments before setting the IB mode as Mixed.
+
+## Effects of changes to user segments
+
+If a user's segment changes, the OneDrive's segment and IB mode will be automatically updated within 24 hours as described in the section above OneDrive information barriers
+
+Example 1: User's segment updated from Research to Sales, the user's OneDrive will be as follows within 24 hours:
+
+- Segment: Sales, HR
+- IB mode: *Explicit*
+
+Example 2: User's segment updated from HR to None, the user's OneDrive will be as follows within 24 hours:
+
+- Segment: None
+- IB mode: *Open*
+
+## Effects of changes to information barrier policies
+
+If a compliance administrator changes an existing policy, the change may impact the compatibility of the segments associated with the OneDrive.
+
+For example, segments that were once compatible may no longer be compatible. A SharePoint admin must change the segments associated with an affected site accordingly. Learn how to create an [information barriers policy compliance report in PowerShell](information-barriers-sharepoint-report.md).
+
+If a policy changes after files are shared, the sharing links will work only if the user attempting to access the shared files has a segment applied that matches a segment associated with the OneDrive.
+
+## Auditing
+
+Audit events are available in the Microsoft Purview compliance portal to help you monitor information barrier activities. Audit events are logged for the following activities:
+
+- Enabled information barriers for SharePoint and OneDrive
+- Applied segment to site
+- Changed segment of site
+- Removed segment of site
+- Applied information barriers mode to site
+- Changed information barriers mode of site
+- Disabled information barriers for SharePoint and OneDrive
+
+For more information about OneDrive segment auditing in Office 365, see [Search the audit log in the compliance center](audit-log-search.md).
+
+## Resources
+
+- [Information barriers in Microsoft Teams](information-barriers-teams.md)
+- [Information barriers in SharePoint](information-barriers-sharepoint.md)
+
compliance Information Barriers Sharepoint Assistant https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-sharepoint-assistant.md
+
+ Title: "Information barriers compliance assistant (preview)"
+description: "Learn about the information barriers compliance assistant."
++++ Last updated : 03/31/2023
+audience: Admin
+f1.keywords:
+- CSH
++
+ms.localizationpriority: medium
+search.appverid:
+- SPO160
+- BSA160
+- GSP150
+- MET150
+
+- tier2
+- purview-compliance
+- M365-collaboration
++
+# Information barriers compliance assistant (preview)
+
+This article explains how you can enable the information barrier compliance assistant for group-connected SharePoint sites. These are sites that don't have an associated team in Microsoft Teams. When the information barrier compliance assistant is enabled, users who don't match the segments specified on this site are automatically removed to ensure group membership honors configured information barrier policies. This configuration may help ensure your organization remains compliant with standards, policies, and compliance regulations.
+
+## Prerequisites
+
+1. Make sure you [define policies for information barriers](/microsoft-365/compliance/information-barriers-policies).
+2. [Configure information barrier segments on a SharePoint Site.](/microsoft-365/compliance/information-barriers-sharepoint)
+3. [Install the Azure PowerShell module](/powershell/azure/install-az-ps)
+4. PowerShell account must have directory administrator access for the tenant.
+
+## Enable the background compliance assistant
+
+These steps create a new application in your organization's enterprise applications. For the compliance assistant to function properly, you must have explicitly added segments to a SharePoint site. Complete the following steps to enable the compliance assistant:
+
+1. Run the following PowerShell cmdlets.
+
+ ```PowerShell
+ Connect-AzureAD
+ Connect-AzAccount
+ $appId="f46c682f-628c-48e6-b963-03309e34639e"
+ $sp=Get-AzADServicePrincipal -ServicePrincipalName $appId
+ if ($sp -eq $null) {New-AzADServicePrincipal -ApplicationId $appId}
+ Start-Process "https://login.microsoftonline.com/common/adminconsent?client_id=$appId"
+ ```
+
+2. When prompted, sign in using your Office 365 work or school account.
+3. In the **Permissions requested** dialog box, review the information, and select **Accept**. This action configures admin consent for the compliance assistant.
+
+## Verify a new application was created
+
+To verify that a new application was properly created in your organization's enterprise applications, complete the following steps:
+
+1. Log into portal.azure.com with directory administrator's credentials.
+2. Select **Manage Azure Active Directory.**
+3. Select **Enterprise Applications** in left navigation listing.
+4. Search for the compliance assistant using 'M365' as the search term.
+
+ ![Search for IB compliance assistant app](../media/info-barriers-compliance-assistant-search.png)
+
+5. Select **M365-Group-Compliance-Assistant** from the list of search results.
+6. On the **M365-Group-Compliance-Assistant overview** page, you can review application properties.
+
+ ![Overview page for IB compliance assistant app](../media/info-barriers-compliance-assistant-overview.png)
+
+7. Select **Permissions** in the left-navigation pane to review the permissions that the application is authorized for.
+
+ ![Permissions page for IB compliance assistant app](../media/info-barriers-compliance-assistant-permissions.png)
+
+8. In this example, the **M365-Group-Compliance-Assistant** is authorized to add/remove non-compliant information barrier users from your Microsoft 365 groups.
+
+You can use [audit log search](audit-log-search.md) in the Microsoft Purview compliance portal to search, review, and track audit log events for the M365-Group-Compliance-Assistant application. The audit activities associated with the compliance assistant are:
+
+- **IB assistant removed group member**: The IB non-compliant group member was removed from the group by the compliance assistant.
+- **IB assistant removed group owner**: The IB non-compliant owner was removed from the group by the compliance assistant.
+- **Identified as IB non-compliant group**: The segments on the group are non-IB compliant with each other.
+
+To search the audit log for Microsoft 365 Groups activities, see [Search the audit log](audit-log-search.md#search-the-audit-log).
+
+>[!Note]
+>The compliance assistant runs periodically (every 24 hours). The assistant runs on group-connected SharePoint sites that do not have an associated team in Microsoft Teams. To enable the compliance assistant for SharePoint sites connected to Microsoft Teams, follow the instructions in the [Define information barrier policies](information-barriers-policies.md) article.
+
compliance Information Barriers Sharepoint Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-sharepoint-report.md
+ Last updated : 3/31/2023
+ Title: "Create an information barriers policy compliance report"
+description: "Learn how to find noncompliant sites after information barriers policies change."
+++
+recommendations: true
+
+audience: Admin
+f1.keywords:
+- NOCSH
++
+ms.localizationpriority: medium
+search.appverid:
+- SPO160
+- BSA160
+- GSP150
+- MET150
+
+- tier2
+- purview-compliance
+- M365-collaboration
++
+# Create an information barriers policy compliance report
+
+If a compliance administrator changes an existing information barriers policy, the change might affect the compatibility of segments already associated with a site.
+
+For example, a policy might allow communication and collaboration between the Sales and Research segments. Later, the policy might not allow communication and collaboration between these segments. The segments are incompatible and shouldn't be associated with the same site.
+
+The SharePoint information barriers policy compliance report lets SharePoint Administrators view the list of sites that are noncompliant with existing policies. The report covers these sites:
+
+- Microsoft 365 group-connected team sites that aren't connected to Microsoft Teams
+- Communication sites
+- Modern team sites that aren't connected to Microsoft 365 groups
+- OneDrive
+
+The report displays the list of sites that are noncompliant per the existing policies which were recently updated. For each noncompliant site, it shows compatible segments, incompatible segments, and invalid segments (those segments that no longer exist)
+
+If a OneDrive is noncompliant, this report lets you update the OneDrive to be compliant with the latest IB policies in your organization.
+
+> [!NOTE]
+> You only need to run this report if information barriers policies are changed. Depending on the number of sites in your organization, it can take a long time for this report to run.
+
+## Run the report
+
+1. [Download the latest SharePoint Online Management Shell](https://go.microsoft.com/fwlink/p/?LinkId=255251).
+
+ > [!NOTE]
+ > If you installed a previous version of the SharePoint Online Management Shell, go to Add or remove programs and uninstall "SharePoint Online Management Shell".
+
+2. Connect to SharePoint Online as a [Global Administrator or SharePoint Administrator](/sharepoint/sharepoint-admin-role) in Microsoft 365. To learn how, see [Getting started with SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
+
+3. Run the following command to build the report:
+
+ ```PowerShell
+ Start-SPOInformationBarriersPolicyComplianceReport
+ ```
+
+ Or, to automatically update any noncompliant OneDrive accounts when you build the report, run:
+
+ ```PowerShell
+ Start-SPOInformationBarriersPolicyComplianceReport -UpdateOneDriveSegments
+ ```
+
+4. Run the following command to view the status of the task:
+
+ ```PowerShell
+ Get-SPOInformationBarriersPolicyComplianceReport
+ ```
+
+ The command returns the following set of information:
+
+ `State: Completed`<br>
+ `Id: 9e2bd8d8-64a4-4e68-af63-81f0565c3c00`<br>
+ `StartTimeInUtc: 12/6/2020 10:56:12 PM`<br>
+ `CompleteTimeInUtc: 12/6/2020 10:56:17 PM`<br>
+ `QueuedTimeInUtc: 12/6/2020 10:51:06 PM`<br>
+ `UpdateOneDriveSegments: False`
+
+5. Run the following command to view the report:
+
+ ```PowerShell
+ Get-SPOInformationBarriersPolicyComplianceReport -reportid <ID>
+ ```
+
+ (Where *ID* is the report's ID from the previous step.)
+
+ The command returns the following set of information:
+
+ `Content: {3ef21e8a-69d9-4bf0-a70f-0328e5a18087, 76cd794c-b5f1-4f3d-ad48-075e805fca17, 93d93533-783a-4274-b9c9-b79a3b9beb99}`<br>
+ `HasNonCompliantSites: True`<br>
+ `State: Completed`<br>
+ `Id: 9e2bd8d8-64a4-4e68-af63-81f0565c3c00`<br>
+ `StartTimeInUtc: 9/22/2020 11:36:50 PM`<br>
+ `CompleteTimeInUtc: 9/22/2020 11:37:00 PM`<br>
+ `QueuedTimeInUtc: 9/22/2020 11:31:57 PM`<br>
+ `UpdateOneDriveSegments: False`
+
+ The Content row lists the sites that are noncompliant. If all sites are compliant, the Content row is empty and HasNonCompliantSites is "False."
+
+6. Run the following command to view details about the noncompliant segments associated with each site:
+
+ ```PowerShell
+ $report = Get-SPOInformationBarriersPolicyComplianceReport -reportid <ID> $report.Content
+ ```
+
+ (Where *ID* is the report's ID from the previous step.)
+
+ The command returns the following set of information for each site:
+
+ `SiteId: 3ef21e8a-69d9-4bf0-a70f-0328e5a18087`<br>
+ `SiteUrl: https://contoso.sharepoint.com/sites/Research`<br>
+ `SiteType: Group`<br>
+ `ComplianceState: NonCompliant`<br>
+ `CurrentSegments: Sales, Research`<br>
+ `OriginalSegments: Sales, Research`<br>
+ `InvalidIBSegments:` <br>
+ `IncompatibleSegmentsPairs: <Sales, Research>`<br>
+ `FailedToBeProcessed: False`<br>
+
+> [!NOTE]
+> For info about removing incompatible segments, see [Use information barriers with SharePoint](information-barriers-sharepoint.md#2-use-sharepoint-powershell-to-view-and-manage-information-segments-on-a-site). When you're done with a report, you can delete it by using `Remove-SPOInformationBarriersPolicyComplianceReport -reportid <>`.
+
compliance Information Barriers Sharepoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-sharepoint.md
+
+ Title: "Use information barriers with SharePoint"
+description: "Learn about associating segments with a site, and what happens when segments are associated with a site."
+++ Last updated : 03/31/2023+
+audience: Admin
+f1.keywords:
+- CSH
++
+ms.localizationpriority: medium
+
+search.appverid:
+- SPO160
+- BSA160
+- GSP150
+- MET150
+
+- tier2
+- purview-compliance
+- M365-collaboration
++
+# Use information barriers with SharePoint
+
+[Microsoft Purview Information Barriers](information-barriers.md) are policies in Microsoft 365 that a compliance admin can configure to prevent users from communicating and collaborating with each other. This solution is useful if, for example, one division is handling information that shouldn't be shared with specific other divisions, or a division needs to be prevented, or isolated, from collaborating with all users outside of the division. Information barriers are often used in highly regulated industries and those organizations with compliance requirements, such as finance, legal, and government.
+
+For SharePoint, information barriers can determine and prevent the following kinds of unauthorized collaborations:
+
+- Adding a user to a site
+- User access to a site or site content
+- Sharing a site or site content with other users
+
+## Information barriers modes and SharePoint sites
+
+[Information barriers modes](information-barriers-policies.md#step-6-information-barriers-modes-optional) help strengthen access, sharing, and membership of a site based on its IB mode and segments associated with the site.
+
+When using information barriers with SharePoint, the following IB modes are supported:
+
+| **Mode** | **Description** | **Examples** |
+|:- |:-|:-|
+| **Open** | When a SharePoint site doesn't have segments, the site's IB mode is automatically set as *Open*. See [this section](#view-and-manage-segments-as-an-administrator) for details on managing segments with the *Open* mode configuration. | A Team site created for picnic event for your organization. |
+| **Owner Moderated** | When a SharePoint site is created for collaboration between incompatible segments moderated by the site owner, the site's IB mode should be set as *Owner Moderated*. See [this section](#owner-moderated-mode-scenario) for details on managing *Owner Moderated* site. | A site is created for collaboration between VP of Sales and Research in the presence of VP of HR (site owner). |
+| **Implicit** | When a site is provisioned by Microsoft Teams, the site's IB mode is set as *Implicit* by default. A SharePoint Administrator or Global Administrator can't manage segments with the *Implicit* mode configuration. | A Team is created for all Sales segment users to collaborate with each other. |
+| **Explicit** | When segment is added to a SharePoint site either via end-user site creation experience or by a SharePoint Administrator adding segment to a site, the site's IB mode is set as *Explicit*. See [this section](#view-and-manage-segments-as-an-administrator) for details on managing segments with the *Explicit* mode configuration. | A research site is created for Research segment users. |
+
+## Sharing sites for IB modes
+
+Sharing of sites with users is based on the IB mode of the site.
+
+### Open
+
+When a site has no segments and site's information barriers mode is set to *Open*:
+
+- The site and its contents can be shared based on the information barrier policy applied to the user. For example, if a user in HR is allowed to communicate with users in Research, the user will be able to share the site with those users.
+
+>[!TIP]
+>If you want to allow sharing of *Open* mode sites with mail-enabled security groups, see the [Allow sharing of Open mode sites with mail-enabled security groups](#allow-sharing-of-open-mode-sites-with-mail-enabled-security-groups) section in this article.
+
+### Owner Moderated
+
+When a site has information barriers mode is set to *Owner Moderated*:
+
+- The option to share with *Anyone with the link* is disabled.
+- The option to share with *Company-wide link* is disabled.
+- (For group connected sites) The site and its content can be shared with existing members.
+- (For non-group connected sites) The site and its content can be shared only by the site owner per their IB policy.
+
+### Implicit
+
+When a site's information barriers mode is set to *Implicit*:
+
+- The option to share with *Anyone with the link* is disabled.
+- The option to share with *Company-wide link* is disabled.
+- The site and its content can be shared with existing members via a sharing link.
+- New users can't be added to the site directly. The Team owner should add users to the Team's group using Microsoft Teams.
+
+>[!NOTE]
+>If you've enabled information barriers for SharePoint in your organization before March 15, 2022, see the **Enable SharePoint and OneDrive information barriers** section in this article.
+
+### Explicit
+
+When a site is associated with segment(s) and site's information barriers mode is set to *Explicit*:
+
+- The option to share with *Anyone with the link* is disabled.
+- The option to share with *Company-wide link* is disabled.
+- The site and its content can be shared only with users whose segment matches that of the site. For example, if a site is associated with the HR segment, the site can be shared with just HR users (even though HR is compatible with both Sales and Research segments).
+- New users can be added as site members only if their segment matches the segment of the site.
+
+## Access control for IB modes
+
+Access to sites by users is based on the IB mode of the site.
+
+### Open mode
+
+For a user to access a SharePoint site that has no segment and site's information barriers mode is set to *Open*:
+
+- The user has site access permissions..
+
+### Owner Moderated mode
+
+For a user to access a SharePoint site with site's information barriers mode is set to *Owner Moderated*:
+
+- (For non-group connected sites) The user has site access permissions.
+- (For group connected sites) The user must be a member of the Microsoft 365 group connected to the site.
+
+### Implicit mode
+
+For a user to access SharePoint sites that have information barriers mode set to *Implicit*:
+
+- The user must be a member of the Microsoft 365 group connected to the site
+- User who isn't a member of the Microsoft 365 group connected to the site won't have access to the site
+- The information barriers compliance assistant ensures the group membership is IB compliant.
+
+>[!NOTE]
+>If you've enabled information barriers for SharePoint in your organization before March 15, 2022, see the **Enable SharePoint and OneDrive information barriers** section in this article.
+
+### Explicit mode
+
+For a user to access SharePoint sites that have segments and site's information barriers mode is *Explicit*:
+
+- The user's segment must match a segment that is associated with the site.
+
+ AND
+
+- The user must have access permission to the site.
+
+Non-segment users can't access a site associated with segments. They'll see an error message.
+
+## Example scenario
+
+The following example illustrates three segments in an organization: HR, Sales, and Research. An information barrier policy has been defined that blocks communication and collaboration between the Sales and Research segments. These segments are incompatible.
+
+![Example of segments in an organization.](../media/info-barriers-segments-example.png)
+
+With SharePoint information barriers, a SharePoint Administrator or Global Administrator can associate segments to a site to prevent the site from being shared with or accessed by users outside the segments. Up to 100 compatible segments can be associated with a site. The segments are associated at the site level (previously called site collection level). The Microsoft 365 group connected to the site is also associated with the site's segment.
+
+In the above example, the HR segment is compatible with both Sales and Research. However, because the Sales and Research segments are incompatible, they can't be associated with the same site.
+
+## Prerequisites
+
+1. Make sure you meet the [licensing requirements for information barriers](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-barriers).
+2. [Create information barrier policies](information-barriers-policies.md) that allow or block communication between the segments, and then set them to active. Create segments and define the users in each.
+3. After you've configured and activated your information barrier policies, wait 24 hours for the changes to propagate through your organization.
+4. Complete the steps in the following sections to enable and manage SharePoint and OneDrive information barriers in your organization.
+
+## Enable SharePoint and OneDrive information barriers in your organization
+
+SharePoint Administrators or Global Administrators can enable information barriers in SharePoint and OneDrive in your organization. Complete the following steps to enable information barriers for your organization:
+
+1. [Download](https://go.microsoft.com/fwlink/p/?LinkId=255251) and install the latest version of SharePoint Online Management Shell.
+2. Connect to SharePoint Online as a Global Administrator or [SharePoint Administrator](/sharepoint/sharepoint-admin-role) in Microsoft 365. To learn how, see [Getting started with SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
+3. To enable information barriers in SharePoint and OneDrive, run the following command:
+
+ ```PowerShell
+ Set-SPOTenant -InformationBarriersSuspension $false
+ ```
+
+4. After you've enabled information barriers for SharePoint and OneDrive in your organization, wait for approximately 1 hour for the changes to take effect.
+
+>[!NOTE]
+>If you have enabled information barriers for SharePoint in your organization before March 15, 2022, the default access and sharing control for Implicit mode for Microsoft Teams-connected sites are based on the segments associated with the site.
+
+To enable Microsoft 365 group-membership based access and sharing control for all Implicit mode Teams-connected sites in your tenant, run the following command:
+
+```powershell
+Set-SPOTenant -IBImplicitGroupBased $true
+```
+
+>[!NOTE]
+>If you have Microsoft 365 Multi-Geo, you must run this command for each of your geo-locations.
+
+If you installed a previous version of the SharePoint Online Management Shell, complete the following steps:
+
+1. Go to **Add or remove programs** and uninstall *SharePoint Online Management Shell*.
+2. Navigate to the Microsoft Download Center for the [SharePoint Online Management Shell](https://go.microsoft.com/fwlink/p/?LinkId=255251)), select your language, and then select **Download**.
+3. You may be asked to choose between downloading a x64 and x86 .msi file. Download the x64 file if you're running the 64-bit version of Windows or the x86 file if you're running the 32-bit version of Windows. If you don't know which version you're running on your computer, see [Which version of Windows operating system am I running?](https://support.microsoft.com/help/13443/windows-which-operating-system).
+4. After the download is complete, run the installer file and follow the configuration steps in the setup wizard.
+5. Connect to SharePoint Online as a Global Administrator or [SharePoint Administrator](/sharepoint/sharepoint-admin-role) in Microsoft 365. To learn how, see [Getting started with SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
+6. To enable information barriers in SharePoint and OneDrive, run the following command:
+
+ ```PowerShell
+ Set-SPOTenant -InformationBarriersSuspension $false
+ ```
+
+7. After you've configured information barriers in SharePoint and OneDrive in your organization, wait for approximately 1 hour for the changes to take effect.
+
+>[!NOTE]
+>If you have enabled information barriers for SharePoint in your organization before March 15, 2022, the default access and sharing control for Implicit mode for Microsoft Teams-connected sites are based on the segments associated with the site.
+
+To enable Microsoft 365 group-membership based access and sharing control for all Implicit mode sites in your organization, run the following command:
+
+```powershell
+Set-SPOTenant -IBImplicitGroupBased $true
+```
+
+>[!NOTE]
+>If you have Microsoft 365 Multi-Geo, you must run this command for each of your geo-locations.
+
+## View and manage segments as an administrator
+
+SharePoint Administrators or Global Administrators can view and manage segments on a SharePoint site. Your organization can have up to 5,000 segments and users can be assigned to multiple segments.
+
+> [!IMPORTANT]
+> Support for 5,000 segments and assigning users to multiple segments is only available when your organization isn't in *Legacy* mode. Assigning users to multiple segments requires additional actions to change the information barriers mode for your organization. For more information, see [Use multi-segment support in information barriers)](information-barriers-multi-segment.md) for details. <br><br> For organizations in *Legacy* mode, the maximum number of segments supported is 250 and users are restricted to being assigned to only one segment. Organizations in *Legacy* mode will be eligible to upgrade to the newest version of information barriers in the future. For more information, see the [information barriers roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=information%2Cbarriers).
+
+View and manage information barriers segments as follows:
+
+### 1. Use the SharePoint admin center to view and manage information segments
+
+To view, edit, or remove information segments for a site, use <a href="https://go.microsoft.com/fwlink/?linkid=2185220" target="_blank">**Active sites** in the SharePoint admin center</a>.
+
+The Segments column lists the first segment associated with the site and shows whether the site has other segments associated. [Learn how to show or move this column](/sharepoint/customize-admin-center-site-list#customize-columns)
+
+![Segments column on the Active sites page.](../media/info-barriers-segments-column.png)
+
+To view the complete list of segments associated with a site, select the site name to open the details panel, and then select the **Settings** tab.
+
+To edit the segments associated with the site, select **Edit**, add or remove segments, and then select **Save**.
+
+![Edit information segments panel.](../media/info-barriers-edit-info-segments.png)
+
+### 2. Use SharePoint PowerShell to view and manage information segments on a site
+
+1. Connect to the [Security & Compliance Center PowerShell](/powershell/exchange/office-365-scc/connect-to-scc-powershell/connect-to-scc-powershell) as a Global Administrator.
+
+2. Run the following command to get the list of segments and their GUIDs.
+
+ ```PowerShell
+ Get-OrganizationSegment | ft Name, EXOSegmentID
+ ```
+
+3. Save the list of segments.
+
+ |**Name**|**EXOSegmentId**|
+ |:-|:|
+ | Sales | a9592060-c856-4301-b60f-bf9a04990d4d |
+ | Research | 27d20a85-1c1b-4af2-bf45-a41093b5d111 |
+ | HR | a17efb47-e3c9-4d85-a188-1cd59c83de32 |
+
+4. If not previously completed, [download](https://go.microsoft.com/fwlink/p/?LinkId=255251) and install the latest SharePoint Online Management Shell. If you installed a previous version of the SharePoint Online Management Shell, follow the instructions in the **Enable SharePoint and OneDrive information barriers in your organization** section in this article.
+
+5. Connect to SharePoint Online as a [Global Administrator or SharePoint Administrator](/sharepoint/sharepoint-admin-role) in Microsoft 365. To learn how, see [Getting started with SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
+
+6. Run the following command:
+
+ ```PowerShell
+ Set-SPOSite -Identity <site URL> -AddInformationSegment <segment GUID>
+ ```
+
+ For example:
+
+ ```powershell
+ Set-SPOSite -Identity https://contoso.sharepoint.com/sites/ResearchTeamSite -AddInformationSegment 27d20a85-1c1b-4af2-bf45-a41093b5d111
+ ```
+
+You'll see an error message if you attempt to associate a segment that isn't compatible with the site's existing segments.
+
+>[!NOTE]
+>When you add a segment to a site, the site's IB mode is automatically updated as *Explicit*.
+
+To remove segment from a site, run the following command:
+
+```PowerShell
+Set-SPOSite -Identity <site URL> -RemoveInformationSegment <segment GUID>
+ ```
+
+For example:
+
+```powershell
+Set-SPOSite -Identity https://contoso.sharepoint.com/sites/ResearchTeamSite -RemoveInformationSegment 27d20a85-1c1b-4af2-bf45-a41093b5d111
+```
+
+>[!NOTE]
+>When all segments are removed from a site, the site's IB mode is automatically updated to *Open*.
+
+To view the segments of a site, run the following command to return the GUIDs of any segments associated with the site.
+
+```PowerShell
+Get-SPOSite -Identity <site URL> | Select InformationSegment
+```
+
+### 3. Use the SharePoint REST API to view and manage information segments on a site
+
+SharePoint includes a Representational State Transfer (REST) service that you can use to manage segments on a site. To access SharePoint resources and manage site segments using REST, you'll construct a RESTful HTTP request by using the OData standard, which corresponds to the desired client object model application programming interface (API).
+
+For more information about the SharePoint REST service, see [Get to know the SharePoint REST service](/sharepoint/dev/sp-add-ins/get-to-know-the-sharepoint-rest-service).
+
+## View and manage IB modes as an administrator with SharePoint PowerShell
+
+To view the IB mode of a site, run the following command:
+
+```powershell
+Get-SPOSite -Identity <site URL> | Select InformationBarriersMode
+```
+
+### Owner Moderated mode scenario
+
+You want to allow a Sales and Research user to collaborate on a SharePoint site in the presence of HR user.
+
+*Owner Moderated* is a mode applicable to site (Teams-connected site, non-group connected sites) which allows incompatible segment users access to site. Only the site owner has the capability to invite incompatible segment users on this same site.
+
+To update a site's mode to *Owner Moderated*, run the following PowerShell command:
+
+```powershell
+Set-SPOSite -Identity <siteurl> -InformationBarriersMode OwnerModerated
+```
+
+Owner Moderated IB mode can't be set on a site with segments. Remove the segments first before setting IB mode as Owner Moderated. Access to an Owner Moderated site is allowed to users who have site access permissions. Sharing of an Owner Moderated site and its contents is only allowed by the site owner per their IB policy.
+
+## Auditing
+
+Audit events are available in the Microsoft Purview compliance portal to help you monitor information barrier activities. Audit events are logged for the following activities:
+
+- Enabled information barriers for SharePoint and OneDrive
+- Applied segment to site
+- Changed segment of site
+- Removed segment of site
+- Applied information barriers mode to site
+- Changed information barriers mode of site
+- Disabled information barriers for SharePoint and OneDrive
+
+For more information about SharePoint segment auditing in Office 365, see [Search the audit log in the compliance portal](audit-log-search.md#microsoft-365-services-that-support-auditing).
+
+## Site creation and management by site owners
+
+When a segmented user creates a SharePoint site, the site is associated with the user's segment and site's information barriers mode is automatically set to *Explicit*.
+
+In addition, the site owners have the capability to add more segments to a SharePoint site that already has segments with site's mode set as *Explicit*. Site owners can't remove added segments from sites. SharePoint Administrators will have to remove added segments in your organization if needed.
+
+When a non-segmented user creates a SharePoint site, the site isn't associated with any segment and site's information barriers mode is automatically set to *Open*.
+
+When a SharePoint Administrator creates a SharePoint site from the <a href="https://go.microsoft.com/fwlink/?linkid=2185219" target="_blank">SharePoint admin center</a>, the site isn't associated with any segment and the site's IB mode is set to *Open*.
+
+To help site owners add a segment to a site, share the [Associate information segments with SharePoint sites](https://support.microsoft.com/office/associate-information-segments-with-sharepoint-sites-2b03db07-6d3f-4297-a388-b943317a26a7) article with your SharePoint site owners.
+
+## Microsoft Teams sites
+
+When a team is created in Microsoft Teams, a SharePoint site is automatically created for the team's files. To protect the Microsoft Team sites with information barriers control, you can enable information barriers in SharePoint for your tenant.
+
+Within 24 hours, the site's information barriers mode is automatically set as *Implicit* and segments associated with the team's members are associated with the site.
+
+Microsoft Teams sites with the information barrier mode as *Implicit* have site access and sharing based on Microsoft 365 group membership.
+
+For example, users have access to the Microsoft Teams site if they're members of the Microsoft 365 group connected to the site. The Microsoft 365 group connected to the Team is IB compliant.
+
+>[!NOTE]
+>If you have enabled information barriers for SharePoint in your organization before March 15, 2022, the Teams-connected site's access and sharing is based on the segments of the site. For example:
+
+- The site and its content can be shared with user whose segment matches that of the site.
+- The site and its content can be accessed by a user if they have same segment as that of the site and have site access permissions.
+
+To enable Microsoft 365 group membership-based access and sharing control for all *Implicit* mode sites in your organization, run the following command as a SharePoint Administrator:
+
+```powershell
+Set-SPOTenant -IBImplicitGroupBased $true
+```
+
+## Private channel and information barriers
+
+When SharePoint Information barriers are enabled in your organization, any new private channel site automatically inherits its parent Microsoft Team's IB mode within 24 hours. The mode for a private channel is assigned as follows:
+
+| **Parent Team's IB mode** | **Private channel site's IB mode** |
+|:--|:--|
+| Open | Open |
+| Implicit or Owner Moderated | Implicit |
+
+Private channel site access and sharing is governed by its IB mode:
+
+- Private channel site with *Open* information barriers mode
+ - Access is allowed to anyone who has site access permissions
+ - Sharing links are allowed per the site's existing sharing policy
+ - People picker allows discoverability of user per the sharer's IB policy
+
+- Private channel site with *Implicit* information barriers mode
+ - Access is allowed to user who is currently a member of the private channel
+ - Sharing is allowed using **People with existing access link**
+
+Private channel sites already configured in your organization will have their information barriers mode set as *Open*. To configure existing private channel sites to *Implicit* mode, run the following cmdlet in SharePoint PowerShell module:
+
+```powershell
+Set-Sposite -Identity <site URL> -InformationBarriersMode Implicit
+```
+
+Learn more about managing [Microsoft Teams connected teams sites](/sharepoint/teams-connected-sites).
+
+## Search
+
+Users will see search results from:
+
+- Sites that have an associated segment that matches the user's segment and the user has access permission to the site.
+- Sites that don't have associated segments if they have access to the site.
+
+## Effects of changes to user segments
+
+If a SharePoint site owner or site member's segment changes, they'll continue to have access to the site or content per the site's IB mode:
+
+- **Open mode**: User can access the site if they have existing site access permissions.
+- **Owner Moderated**: User can access the site if they have existing site access permissions.
+- **Implicit Mode**: If the user is a member of the Microsoft 365 group, they'll continue to have access to the site.
+- **Explicit Mode**: If the user's new segment matches the site's segment and user has site access permissions, they'll continue to have access to the site.
+
+## Effects of changes to existing information barrier policies
+
+If a compliance administrator changes an existing IB policy, the change may impact the compatibility of the segments associated with a site (in *Explicit* or *Implicit* mode).
+For example, segments that were once compatible may no longer be compatible.
+
+With Information barriers policy compliance report, the SharePoint Administrator will have the capability to view the list of sites where segments are no longer compatible. For more information, see [Learn how to create an information barriers policy compliance report in PowerShell](information-barriers-sharepoint-report.md).
+
+To manage out of compliance sites:
+
+- In *Explicit* mode, a SharePoint Administrator must change the associated segments to bring them in to IB compliance.
+- In *Implicit* mode, a SharePoint Administrator can't manage segments directly. We recommend the Teams admin to manage the Team's membership to bring the Teams membership roster and segments in to IB compliance.
+
+## How to suspend SharePoint and OneDrive information barriers in your organization
+
+If your organization would like to temporarily suspend information barriers on SharePoint, you must use SharePoint Online Management Shell and the [Set-Spotenant](/powershell/module/sharepoint-online/set-spotenant) cmdlet.
+
+To suspend information barriers, run the following command:
+
+```PowerShell
+Set-SPOTenant -InformationBarriersSuspension $true
+```
+
+>[!NOTE]
+>If you have Microsoft 365 Multi-Geo, you must run this command for each of your geo-locations.
+
+## Allow sharing of Open mode sites with mail-enabled security groups
+
+IB supports an opt-in capability available in the [SharePoint PowerShell module](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online) for sites in *Open* mode to be shared with [mail-enabled security groups](/microsoft-365/admin/email/create-edit-or-delete-a-security-group) for site permissions, sharing, and audience targeting. This is only supported in *Open* mode sites. SharePoint admins can enable this support in your organization and we recommend you ensure the security group membership is IB compliant.
+
+Before enabling group support, verify that you've met the following prerequisites:
+
+- Your organization has only IB [*Block* policies](information-barriers-policies.md#configuration-concepts)
+- Your organization is enabled for SharePoint IB (see [this section](#enable-sharepoint-and-onedrive-information-barriers-in-your-organization) in this article).
+
+To configure mail-enabled security group support in *Open* mode sites, run the following command:
+
+```powershell
+Set-SPOTenant -ShowPeoplePickerGroupSuggestionsForIB $true
+```
+
+## Resources
+
+- [Information barriers in Microsoft Teams](information-barriers-teams.md)
+- [Information barriers in OneDrive](information-barriers-onedrive.md)
+
compliance Information Barriers Teams Powershell Script https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-teams-powershell-script.md
+
+ Title: Change information barriers modes with a PowerShell script
+description: Use this PowerShell script after you deploy information barriers to update the mode from open to implicit for all groups in your tenant.
+++++ Last updated : 02/27/2023+
+audience: admin
+
+f1.keywords:
+- NOCSH
+ms.localizationpriority: medium
+search.appverid: MET150
+
+- tier2
+- purview-compliance
+- M365-collaboration
+appliesto:
+ - Microsoft Teams
++
+# Change information barriers modes with a PowerShell script
+
+Use this PowerShell script to update the information barriers (IB) mode for all Teams-connected groups in your tenant. You'll need to update the mode for these groups after you deploy information barriers. Groups provisioned before you enable IB are assigned the *Open* mode. In *Open* mode, there aren't any applicable IB policies. After you enable IB, *Implicit* becomes the default mode for any new groups you create. However, existing groups still keep *Open* mode configuration. Run this script to change these existing groups to *Implicit* mode.
+
+In this script, you'll use the [Get-UnifiedGroup](/powershell/module/exchange/Set-UnifiedGroup) cmdlet, which is in the Exchange Online PowerShell module to update the mode. To learn more about managing Teams using PowerShell, see [Teams PowerShell overview](/microsoftteams/teams-powershell-overview).
+
+## Sample script
+
+You'll need to use a work or school account that has been assigned the global administrator role for your tenant to run this script.
+
+```powershell
+<#
+.SYNOPSIS
+This script updates the information barrier mode for all Teams-connected groups in your tenant at the same time.
+.DESCRIPTION
+Use this script to update the info barrier mode from open to implicit across the groups in your tenant.
+#>
+
+$teams = Get-UnifiedGroup -Filter {ResourceProvisioningOptions -eq "Team"} -ResultSize Unlimited
+
+Write-Output ([string]::Format("Number of Teams = {0}", @($teams).Length))
+
+$teamsToUpdate = New-Object System.Collections.ArrayList
+
+foreach($team in $teams)
+{
+ if ($team.InformationBarrierMode -eq "Open")
+ {
+ $teamsToUpdate.Add($team.ExternalDirectoryObjectId) | out-null
+ }
+}
+
+Write-Output ([string]::Format("Number of Teams to be backfilled = {0}", @($teamsToUpdate).Length))
+
+$outfile = "BackfillFailedTeams.csv"
+
+if (!(Test-Path "$outfile"))
+{
+ $newcsv = {} | Select "ExternalDirectoryObjectId", "ExceptionDetails" | Export-Csv $outfile -NoTypeInformation
+}
+else
+{
+ $dateTime = Get-Date
+ $newEntry = "{0},{1}" -f "New session started", $dateTime
+ $newEntry | add-content $outfile
+}
+
+$SuccessfullyBackfilledGroup = 0
+
+for($i = 0; $i -lt @($teamsToUpdate).Length; $i++)
+{
+ Invoke-Command { Set-UnifiedGroup $teamsToUpdate[$i] -InformationBarrierMode "Implicit" } -ErrorVariable ErrorOutput
+
+ if ($ErrorOutput)
+ {
+ # saving the errors in a csv file
+ $errorBody = $ErrorOutput[0].ToString() -replace "`n"," " -replace "`r"," " -replace ",", " "
+ $newEntry = "{0},{1}" -f $teamsToUpdate[$i].ToString(), '"' + $errorBody + '"'
+ $newEntry | add-content $outfile
+ }
+ else
+ {
+ $SuccessfullyBackfilledGroup++
+ }
+
+ if (($i+1) % 100 -eq 0)
+ {
+ # print the number of teams backfilled after the batch of 100 updates
+ Write-Output ([string]::Format("Number of Teams processed= {0}", $i+1))
+ }
+}
+
+Write-Output ([string]::Format("Backfill completed. Groups backfilled: {0}, Groups failed to backfill: {1}", $SuccessfullyBackfilledGroup, @($teamsToUpdate).Length - $SuccessfullyBackfilledGroup))
+
+if (!($SuccessfullyBackfilledGroup -eq @($teamsToUpdate).Length))
+{
+ Write-Output ([string]::Format("Check the failed teams in BackfillFailedTeams.csv, retry to backfill the failed teams."))
+}
+
+```
compliance Information Barriers Teams Shared Channels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-teams-shared-channels.md
+
+ Title: Information barriers and shared channels
+description: This article explains how information barriers support in Microsoft Teams with Shared Channels.
++++ Last updated : 03/31/2023++
+audience: admin
+
+- tier2
+- purview-compliance
+- M365-collaboration
+search.appverid: MET150
+f1.keywords:
+- NOCSH
+appliesto:
+ - Microsoft Teams
+++
+# Information barriers and shared channels
+
+[Shared channels](information-barriers-teams-shared-channels.md) in Microsoft Teams create collaboration spaces where you can invite people who aren't in the team. [Microsoft Purview Information Barriers](information-barriers.md) are policies implemented to restrict and prevent users and groups from communicating with each other within and outside of your organization.
+
+Shared channels are enabled by default in Teams. You can choose if people can create shared channels, if they can share them with people outside your organization, and if they can participate in external shared channels by creating a channel policy. When you create information barriers policies in your organization, checks are performed when configuring shared channels to verify that none of the existing channel members and any new users added to the shared channel violate information barriers policy conditions.
+
+Use the following table to understand how information barriers policies may affect communications and result in specific behaviors when configuring shared channels:
+
+|**Scenario**|**Information barriers behavior**|
+|:--|:--|
+| **Share a channel with a user in your organization** | If the user isn't allowed to communicate with shared channel members per an information barriers policy, the user isn't displayed in the user search and channel isn't shared with the team. <br><br> If the user can't be added per an information barriers policy, you'll see the following message: *We didn't find any matches. Talk to your IT admin about expanding the scope of your search.* |
+| **Share a channel in your organization with another team that you own** | The channel isn't shared with the team if the other team has any users who aren't allowed to communicate with shared channel members per an information barriers policy. <br><br> If communications aren't allowed per an information barriers policy, you'll see the following message: *The channel can't be shared with this team. Pick another team or contact your admin for more info.* |
+| **Share a channel in your organization with another team that you don't own** | If the team owner or any users of the other team aren't allowed to communicate with shared channel members per an information barriers policy, the channel can't be shared with the team. <br><br> If communications aren't allowed per an information barriers policy, you'll see the following message: *The channel can't be shared with this team. Pick another team or contact your admin for more info.* |
+| **Add a new user to the team when the team has shared channels with other teams** | If the new user isn't allowed to communicate with members of the shared channel team per an information barriers policy, the user can't be added to the team. When you're adding a user to a team with six or more shared channels, the user is immediately added to the channel and sharing is supported. Sharing for the team and the previously shared channels may be stopped if the new user is found to be non-compliant with an information barriers policy.<br><br> If the user can't be added per an information barriers policy, you'll see the following message: *Unable to add user due to an information barriers policy.* |
+| **Share a channel with an external team** | Information barriers policies on internal and external organizations don't restrict communications between users from the different organizations. Shared channels are available to be shared with external guests. |
compliance Information Barriers Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-teams.md
+
+ Title: Information barriers in Microsoft Teams
+description: This article explains how information barriers are supported in Microsoft Teams.
++++ Last updated : 03/31/2023++
+audience: admin
+
+- tier2
+- purview-compliance
+- M365-collaboration
+search.appverid: MET150
+f1.keywords:
+- NOCSH
+appliesto:
+ - Microsoft Teams
+++
+# Information barriers in Microsoft Teams
+
+[Microsoft Purview Information Barriers](information-barriers.md) (IBs) are policies that an admin can configure to prevent individuals or groups from communicating with each other. IBs are useful if, for example, one department is handling information that shouldn't be shared with other departments. IBs are also useful when a group needs to be isolated or prevented from communicating with anyone outside of that group. Shared channels in Microsoft Teams is supported by information barriers. Depending on the type of sharing, information barriers policies may restrict sharing in certain ways. For more information about shared channels and information barriers behavior, see [Information barriers and shared channels](information-barriers-teams-shared-channels.md).
+
+For Microsoft Teams, information barriers can determine and prevent the following kinds of unauthorized collaborations:
+
+- Adding a user to a team or channel
+- User access to team or channel content
+- User access to 1:1 and group chats
+- User access to meetings
+- Prevents lookups and discovery, users won't be visible in the people picker.
+
+>[!NOTE]
+>- Information barrier groups cannot be created across tenants.
+>- Using bots, Azure Active Directory (Azure AD) apps, APIs to send activity feed notifications, and some APIs to add users is not supported in version 1.
+>- Private channels are compliant to information barriers policies that you configure.
+>- For information about support for barriers for SharePoint sites that are connected to Teams, see [Segments associated with Microsoft Teams sites](information-barriers-sharepoint.md#view-and-manage-segments-as-an-administrator).
+
+## Background
+
+The primary driver for IBs comes from the financial services industry. The Financial Industry Regulatory Authority ([FINRA]( https://www.finra.org)) reviews IBs and conflicts of interest within member firms and provides guidance about managing such conflicts (FINRA 2241, [Debt Research Regulatory Notice 15-31](https://www.finra.org/sites/default/files/Regulatory-Notice-15-31_0.pdf).
+
+However, since introducing IBs, many other areas have found them to be useful. Other common scenarios include:
+
+- **Education**: Students in one school aren't able to look up contact details for students of other schools.
+- **Legal**: Maintaining the confidentiality of data that is obtained by the lawyer of one client and preventing it from being accessed by a lawyer for the same firm who represents a different client.
+- **Government**: Information access and control are limited across departments and groups.
+- **Professional services**: A group of people in a company is only able to chat with a client or a specific customer via guest access during a customer engagement.
+
+For example, Enrico belongs to the Banking segment and Pradeep belongs to the Financial advisor segment. Enrico and Pradeep can't communicate with each other because the organization's IB policy blocks communication and collaboration between these two segments. However, Enrico and Pradeep can communicate with Lee in HR.
+
+![Example showing information barriers preventing communication between segments.](../media/information-barriers-example.png)
+
+## When to use information barriers
+
+You might want to use IBs in situations like these:
+
+- A team must be prevented from communicating or sharing data with a specific other team.
+- A team must not communicate or share data with anyone outside of the team.
+
+The Information Barrier Policy Evaluation Service determines whether a communication complies with IB policies.
+
+## Managing information barriers segments
+
+IB segments are managed in the Microsoft Purview compliance portal or by using PowerShell cmdlets. For more information, see [Step 2: Segment users in your organization](information-barriers-policies.md#step-2-segment-users-in-your-organization).
+
+> [!IMPORTANT]
+> Support for assigning users to multiple segments is only available when your organization isn't in *Legacy* mode. To determine if your organization is in *Legacy* mode, see [Check the IB mode for your organization)](information-barriers-multi-segment.md#check-the-ib-mode-for-your-organization). <br><br> Users are restricted to being assigned to only one segment for organizations in *Legacy* mode. Organizations in *Legacy* mode will be eligible to upgrade to the newest version of information barriers in the future. For more information, see the [information barriers roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=information%2Cbarriers).
+
+## Managing information barriers policies
+
+IB policies are managed in the Microsoft Purview compliance portal or by using PowerShell cmdlets. For more information, see [Step 3: Create IB policies](information-barriers-policies.md#step-3-create-ib-policies).
+
+>[!IMPORTANT]
+>Before you set up or define policies, you must enable scoped directory search in Microsoft Teams. Wait at least a few hours after enabling scoped directory search before you set up or define policies for information barriers. For more information, see [Define information barrier policies](information-barriers-policies.md#required-subscriptions-and-permissions).
+
+## Information barriers administrator role
+
+The IB Compliance Management role is responsible for managing IB policies. For more information about this role, see [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md).
+
+## Information barrier triggers
+
+IB policies are activated when the following Teams events take place:
+
+- **Members are added to a team**: Whenever you add a user to a team, the user's policy must be evaluated against the IB policies of other team members. After the user is successfully added, the user can perform all functions in the team without further checks. If the user's policy blocks them from being added to the team, the user won't show up in search.
+
+ ![Screenshot of searching for a new member to add to a team and finding no matches.](../media/information-barriers-add-members.png)
+
+- **A new chat is requested**: Each time that a user requests a new chat with one or more other users, the chat is evaluated to make sure that it isn't violating any IB policies. If the conversation violates an IB policy, then the conversation isn't started.
+
+ Here's an example of a 1:1 chat.
+
+ ![Screenshot showing blocked communication in 1:1 chat.](../media/information-barriers-one-one-chat.png)
+
+ Here's an example of a group chat.
+
+ ![Screenshot showing group chat.](../media/information-barriers-group-chat.png)
+
+- **A user is invited to join a meeting**: When a user is invited to join a meeting, the IB policy that applies to the user is evaluated against the IB policies that apply to the other team members. If there's a violation, the user won't be allowed to join the meeting.
+
+ ![Screenshot showing user blocked from meeting.](../media/information-barriers-meeting.png)
+
+- **A screen is shared between two or more users**: When a user shares a screen with other users, the sharing must be evaluated to make sure that it doesn't violate the IB policies of other users. If an IB policy is violated, the screen share won't be allowed.
+
+ Here's an example of screen share before the policy is applied.
+
+ ![Screenshot showing a user chat.](../media/ib-before-screen-share-policy.png)
+
+ Here's an example of screen share after the policy is applied. The screen share and call icons aren't visible.
+
+ ![Screenshot showing user char with blocked settings.](../media/ib-after-screen-share-policy.png)
+
+- **A user places a phone call in Teams**: Whenever a user initiates a voice call (via VOIP) to another user or group of users, the call is evaluated to make sure that it doesn't violate the IB policies of other team members. If there's any violation, the voice call is blocked.
+
+- **Guests in Teams**: IB policies apply to guests in Teams, too. If guests need to be discoverable in your organization's global address list, see [Manage guest access in Microsoft 365 Groups](/microsoft-365/admin/create-groups/manage-guest-access-in-groups). Once guests are discoverable, you can [define IB policies](information-barriers-policies.md).
+
+## How policy changes impact existing chats
+
+When the IB policy administrator makes changes to a policy, or when a policy change is activated because of a change to a user's profile (such as for a job change), the Information Barrier Policy Evaluation Service automatically searches the members to ensure that their membership in the team doesn't violate any policies.
+
+If there's an existing chat or other communication between users, and a new policy is set or an existing policy is changed, the service evaluates existing communications to make sure that the communications are still allowed to occur.
+
+- **1:1 chat**: If communication between two users is no longer allowed (because of application to one or both users of a policy that blocks communication), further communication is blocked. Their existing chat conversations become read-only.
+
+ Here's an example that shows the chat is visible.
+
+ ![Screenshot showing user chat is available.](../media/ib-before-1-1chat-policy.png)
+
+ Here's an example that shows the chat is disabled.
+
+ ![Screenshot showing user chat is disabled.](../media/ib-after-1-1chat-policy.png)
+
+- **Group chat**: If communication from one user to a group is no longer allowed (for example, because a user changed jobs), the userΓÇöalong with the other users whose participation violates the policyΓÇömay be removed from group chat, and further communication with the group won't be allowed. The user can still see old conversations, but won't be able to see or participate in any new conversations with the group. If the new or changed policy that prevents communication is applied to more than one user, the users who are affected by the policy may be removed from group chat. They can still see old conversations.
+
+ In this example, Enrico moved to a different department within the organization and is removed from the group chat.
+
+ ![Screenshot of a group chat from which a user has been removed.](../media/information-barriers-user-changes-job.png)
+
+ Enrico can no longer send messages to the group chat.
+
+ ![Screenshot of not being able to send messages to group chat because the user was removed from the group.](../media/information-barriers-user-changes-job-2.png)
+
+- **Team**: Any users who have been removed from the group are removed from the team and won't be able to see or participate in existing or new conversations.
+
+## Scenario: A user in an existing chat becomes blocked
+
+Currently, users experience the following scenarios if an IB policy blocks another user:
+
+- **People tab**: A user can't see blocked users on the **People** tab.
+- **People Picker**: Blocked users won't be visible in the people picker.
+
+ ![Screenshot of Teams alerting the user that policy prevents display of another user's information.](../media/information-barriers-people-picker.png)
+
+- **Activity tab**: If a user visits the **Activity** tab of a blocked user, no posts will appear. (The **Activity** tab displays channel posts only, and there would be no common channels between the two users.)
+
+ Here's an example of the activity tab view that is blocked.
+
+ ![Screenshot showing the activity tab that is blocked.](../media/ib-after-activity-tab-policy.png)
+
+- **Org charts**: If a user accesses an org chart on which a blocked user appears, the blocked user won't appear on the org chart. Instead, an error message will appear.
+- **People card**: If a user participates in a conversation and the user is later blocked, other users will see an error message instead of the people card when they hover over the blocked user's name. Actions listed on the card (such as calling and chat) will be unavailable.
+- **Suggested contacts**: Blocked users don't appear on the suggested contacts list (the initial contact list that appears for new users).
+- **Chat contacts**: A user can see blocked users on the chats contact list, but the blocked users will be identified. The only action that the user can perform on the blocked users is to delete them. The user can also select them to view their past conversation.
+- **Calls contacts**: A user can see blocked users on the calls contact list, but the blocked users will be identified. The only action that the user can perform on the blocked users is to delete them.
+
+ Here's an example of a blocked user in the calls contact list.
+
+ ![Screenshot showing user user chat.](../media/ib-before-chat-contacts-policy.png)
+
+ Here's an example of the chat being disabled for a user on the calls content list.
+
+ ![Screenshot showing user blocked from chat.](../media/ib-after-chat-contacts-policy.png)
+
+- **Skype to Teams migration**: During a migration from Skype for Business to Teams, all usersΓÇöeven those users who are blocked by IB policiesΓÇöwill be migrated to Teams. Those users are then handled as described above.
+
+## Teams policies and SharePoint sites
+
+When a team is created, a SharePoint site is provisioned and associated with Microsoft Teams for the files experience. Information barrier policies aren't honored on this SharePoint site and files by default. To enable information barriers in SharePoint and OneDrive, follow the guidance and steps in the [Use information barriers with SharePoint](information-barriers-sharepoint.md#enable-sharepoint-and-onedrive-information-barriers-in-your-organization) article.
+
+## Information barrier modes and Teams
+
+Information barriers modes help strengthen who can be added to or removed from a Team. When using information barriers with Teams, the following IB modes are supported:
+
+- **Open**: This configuration is the default IB mode for all existing groups that were provisioned before information barriers were enabled. In this mode, there are no IB policies applicable.
+- **Implicit**: This configuration is the default IB mode when a Team is provisioned after enabling information barriers. Implicit mode allows you to add all compatible users in the group.
+- **Owner Moderated**: This mode is set on a team when you want to allow collaboration between incompatible segment users that are moderated by the owner. The team owner can add new members per their IB policy.
+
+Teams created before activating an information barrier policy in your tenant are automatically set to *Open* mode by default. Once you activate IB policies on your tenant, you're required to update mode of your existing teams to *Implicit* to ensure that existing teams are IB-compliant. For more information about updating modes, see [Change information barriers modes with a PowerShell script](information-barriers-teams-powershell-script.md).
+
+Use the [Set-UnifiedGroup](/powershell/module/exchange/set-unifiedgroup) cmdlet with the *InformationBarrierMode* parameter that corresponds to the mode you want to use for your segments. Allowed list of values for the *InformationBarrierMode* parameter are *Open*, *Implicit*, and *Owner Moderated*.
+
+For example, to configure the *Implicit* mode for a Microsoft 365 Group, you'll use the following PowerShell command:
+
+```powershell
+Set-UnifiedGroup -InformationBarrierMode Implicit
+```
+
+To update the mode from *Open* to *Implicit* for all existing teams, use this [PowerShell script](information-barriers-teams-powershell-script.md).
+
+If you change the *Open* mode configuration on existing Teams-connected groups to meet compliance requirements for your organization, you'll need to [update the IB modes]/microsoft-365/compliance/information-barriers-sharepoint#view-and-manage-ib-modes-as-an-administrator-with-sharepoint-powershell) for associated SharePoint sites connected to the Teams team.
+
+## IB policy application in Teams
+
+IB policy application is a background IB processor for Teams that gets a notification when there are changes to either users (policy or segment changes) or groups (mode changes). The following steps outline the processing flow:
+
+- The policy application receives a group change notification when mode is updated and retrieves the message thread and Group IDs applicable to the update.
+- If the message thread exists, processing is scheduled and all members are fetched from the team, and underlying group and are sent to downstream Teams components for IB evaluation.
+- The mode on the group and the IB policies per user are evaluated and the results are sent to the policy application.
+- Policy application removes the non-compliant users from the group and team.
+
+## Required licenses and permissions
+
+For more information on licenses and permissions, plans, and pricing, see [Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).
+
+## Usage notes
+
+- **Users can't join ad-hoc meetings**: If IB policies are enabled, users aren't allowed to join meetings if the size of the meeting roster is greater than the [meeting attendance limits](/microsoftteams/limits-specifications-teams). The root cause is that IB checks rely on whether users can be added to a meeting chat roster, and only when they can be added to the roster are they allowed to join the meeting. A user joining a meeting once adds that user to the roster; hence for recurring meetings, the roster can fill up fast. Once the chat roster reaches the [meeting attendance limits](/microsoftteams/limits-specifications-teams), additional users can't be added to the meeting. If IB is enabled for the organization and the chat roster is full for a meeting, new users (those users who aren't already on the roster) aren't allowed to join the meeting. But if IB isn't enabled for the organization and the meeting chat roster is full, new users (those users who aren't already on the roster) are allowed to join the meeting, though they won't see the chat option in the meeting. A short-term solution is to remove inactive members from the meeting chat roster to make space for new users. We will, however, be increasing the size of meeting chat rosters at a later date.
+- **Users can't join channel meetings**: If IB policies are enabled, users aren't allowed to join channel meetings if they're not a member of the team. The root cause is that IB checks rely on whether users can be added to a meeting chat roster, and only when they can be added to the roster are they allowed to join the meeting. The chat thread in a channel meeting is available to Team/Channel members only, and non-members can't see or access the chat thread. If IB is enabled for the organization and a non-team member attempts to join a channel meeting, that user isn't allowed to join the meeting. However, if IB isn't* enabled for the organization and a non-team member attempts to join a channel meeting, the user is allowed to join the meetingΓÇöbut they won't see the chat option in the meeting.
+- **IB policies don't work for federated users**: If you allow federation with external organizations, the users of those organizations won't be restricted by IB policies. If users of your organization join a chat or meeting organized by external federated users, then IB policies also won't restrict communication between users of your organization.
+
+## More information
+
+- To learn more about IBs, see [Information barriers](/microsoft-365/compliance/information-barriers).
+- To set up IB policies, see [Get started with information barriers](/microsoft-365/compliance/information-barriers-policies).
+- To edit or remove IB policies, see [Manage information barrier policies](information-barriers-edit-segments-policies.md).
+- [Information barriers and shared channels](information-barriers-teams-shared-channels.md)
+
+## Availability
+
+Information barriers in Teams is available in our public, GCC, GCC - High, and DOD clouds.
compliance Sensitivity Labels Sharepoint Default Label https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-sharepoint-default-label.md
f1.keywords:
Previously updated : 03/24/2023 Last updated : 04/03/2023 audience: Admin
description: "Configure a default sensitivity label for a SharePoint document li
# Configure a default sensitivity label for a SharePoint document library
->*[Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).*
-
-> [!NOTE]
-> This feature is in preview and subject to change. It will be included with [Microsoft Syntex Advanced Management license](/sharepoint/advanced-management) when the feature becomes generally available (GA).
+>*[Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance)*
When SharePoint is [enabled for sensitivity labels](sensitivity-labels-sharepoint-onedrive-files.md), you can configure a default label for document libraries. Then, any new files uploaded to that library, or existing files edited in the library will have that label applied if they don't already have a sensitivity label, or they have a sensitivity label but with [lower priority](sensitivity-labels.md#label-priority-order-matters).
As with all tenant-level configuration changes for SharePoint, it takes about 15
## Next steps Default labeling ensures a minimum level of protection but doesn't take into account the file contents that might require a higher level of protection. Consider supplementing this labeling method with [automatic labeling](apply-sensitivity-label-automatically.md) that uses content inspection, and encourage [manual labeling](https://support.microsoft.com/office/apply-sensitivity-labels-to-your-files-and-email-in-office-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9) for users to replace the default label when needed.+
+## Related resources
+
+[Microsoft Syntex Advanced Management overview](/sharepoint/advanced-management)
compliance Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/whats-new.md
f1.keywords:
Previously updated : 03/31/2023 Last updated : 04/03/2023 audience: Admin
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
+## April 2023
+
+### Sensitivity labels
+
+- **General availability (GA)**: [Default sensitivity label for a SharePoint document library](sensitivity-labels-sharepoint-default-label.md)
+ ## March 2023 ### Audit
enterprise Urls And Ip Address Ranges https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/urls-and-ip-address-ranges.md
Title: "Office 365 URLs and IP address ranges"
Previously updated : 03/01/2023 Last updated : 03/29/2023 audience: Admin
Office 365 requires connectivity to the Internet. The endpoints below should be
|Notes|Download|Use| ||||
-|**Last updated:** 03/01/2023 - ![RSS.](../medi#pacfiles)|
+|**Last updated:** 03/29/2023 - ![RSS.](../medi#pacfiles)|
| Start with [Managing Office 365 endpoints](managing-office-365-endpoints.md) to understand our recommendations for managing network connectivity using this data. Endpoints data is updated as needed at the beginning of each month with new IP Addresses and URLs published 30 days in advance of being active. This cadence allows for customers who don't yet have automated updates to complete their processes before new connectivity is required. Endpoints may also be updated during the month if needed to address support escalations, security incidents, or other immediate operational requirements. The data shown on this page below is all generated from the REST-based web services. If you're using a script or a network device to access this data, you should go to the [Web service](microsoft-365-ip-web-service.md) directly.
frontline Pin Teams Apps Based On License https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/pin-teams-apps-based-on-license.md
Title: Tailor Teams apps for your frontline workers--++ -+ audience: admin
appliesto: - Microsoft Teams - Microsoft 365 for frontline workers Previously updated : 10/28/2022 Last updated : 03/28/2023 # Tailor Teams apps for your frontline workers
With the tailored frontline app experience, your frontline workers get the most
Apps are pinned to the app bar, which is the bar at the bottom of the Teams mobile clients (iOS and Android) and on the side of the Teams desktop client. The following apps are pinned for users who have an [F license](https://www.microsoft.com/microsoft-365/enterprise/frontline#office-SKUChooser-0dbn8nt): -- [Viva Connections](https://support.microsoft.com/office/your-intranet-is-now-in-microsoft-teams-8b4e7f76-f305-49a9-b6d2-09378476f95b) ([coming soon](#coming-soon))
+- [Viva Connections](https://support.microsoft.com/office/your-intranet-is-now-in-microsoft-teams-8b4e7f76-f305-49a9-b6d2-09378476f95b) ([rolling out](#viva-connections-rolling-out))
- [Activity](https://support.microsoft.com/office/explore-the-activity-feed-in-teams-91c635a1-644a-4c60-9c98-233db3e13a56) - [Chat](https://support.microsoft.com/office/get-started-with-chat-0b506ce2-eb6d-4fca-9668-e56980ba755e) - [Teams](https://support.microsoft.com/office/teams-and-channels-in-microsoft-teams-c6d0e61d-a61e-44a6-a972-04f2a8fa4155)
Apps are pinned to the app bar, which is the bar at the bottom of the Teams mobi
**Teams mobile** **Teams desktop** ## Admin controls
The feature is off. | The frontline worker gets the apps defined in the global
> [!NOTE] > You can't change the apps or order of apps in the tailored frontline app experience. For now, if you want to make changes, you can set up your own custom experience. To do this, first turn off the feature. Then, [create a custom app setup policy](/microsoftteams/teams-app-setup-policies), and [assign it to users or groups](/microsoftteams/assign-policies-users-and-groups).
-### Coming soon
+### Viva Connections (rolling out)
- Viva Connections will soon be part of the frontline tailored apps experience. Frontline users who see the tailored app experience will have Viva Connections pinned in the first position on both mobile and desktop.
-
-This experience includes a default dashboard with relevant frontline cards such as Tasks, Shifts, Approvals, and Top News that can be customized to fit the needs of your organization. If your organization has already set up a Viva Connections home site, it will take precedence over the default experience. To learn more, see the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=99706).
-
-**Teams mobile**
-
+> [!NOTE]
+>The Frontline Viva Connections experience is currently rolling out. For the details on the rollout refer to the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=99706).
-**Teams desktop**
+Viva Connections is part of the tailored apps experience. Frontline users who see the tailored app experience will have Viva Connections pinned in the first position on both mobile and desktop.
+This experience includes a default dashboard with relevant frontline cards such as Tasks, Shifts, Approvals, and Top News that can be customized to fit the needs of your organization. If your organization has already set up a Viva Connections home site, it will take precedence over the default experience.
## Related articles
includes Ai Authoring Note https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/ai-authoring-note.md
+ Last updated : 04/03/2023+++++
+> [!NOTE]
+> This article was partially created with the help of artificial intelligence. Before publishing, an author reviewed and revised the content as needed. For more information, see [Our principles for using AI-generated content in Microsoft Learn](/azure/principles-for-ai-generated-content).
includes Microsoft 365 Content Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/microsoft-365-content-updates.md
+## Week of March 27, 2023
++
+| Published On |Topic title | Change |
+|||--|
+| 3/29/2023 | [Customize a SharePoint team site for file storage and sharing](/microsoft-365/admin/setup/customize-team-site?view=o365-worldwide) | modified |
+| 3/29/2023 | [Install Microsoft 365 apps](/microsoft-365/admin/setup/install-applications?view=o365-worldwide) | modified |
+| 3/29/2023 | [Set up OneDrive file storage and sharing](/microsoft-365/admin/setup/set-up-file-storage-and-sharing?view=o365-worldwide) | modified |
+| 3/29/2023 | [Set up mobile devices for Microsoft 365 for business users](/microsoft-365/admin/setup/set-up-mobile-devices?view=o365-worldwide) | modified |
+| 3/29/2023 | [Set up Microsoft 365 Apps for business](/microsoft-365/admin/setup/setup-apps-for-business?view=o365-worldwide) | modified |
+| 3/29/2023 | [Set up Microsoft 365 Business Standard with a new or existing domain](/microsoft-365/admin/setup/setup-business-standard?view=o365-worldwide) | modified |
+| 3/29/2023 | [Invite users to a Microsoft 365 business subscription](/microsoft-365/admin/simplified-signup/admin-invite-business-standard?view=o365-worldwide) | modified |
+| 3/29/2023 | [Contracts FAQ](/microsoft-365/commerce/licenses/contracts-faq?view=o365-worldwide) | modified |
+| 3/29/2023 | [Manage auto-claim policies](/microsoft-365/commerce/licenses/manage-auto-claim-policies?view=o365-worldwide) | modified |
+| 3/29/2023 | [Microsoft 365 Multi-Tenant Organization People Search](/microsoft-365/enterprise/multi-tenant-people-search?view=o365-worldwide) | modified |
+| 3/27/2023 | [Upgrade (preview), close, reopen, or delete eDiscovery (Standard) cases](/microsoft-365/compliance/ediscovery-close-reopen-delete-cases?view=o365-worldwide) | modified |
+| 3/27/2023 | [Microsoft 365 admin center Visio activity ](/microsoft-365/admin/activity-reports/visio-activity?view=o365-worldwide) | added |
+| 3/27/2023 | [Set up multifactor authentication for users](/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide) | modified |
+| 3/27/2023 | [Customize what happens at the end of the retention period](/microsoft-365/compliance/retention-label-flow?view=o365-worldwide) | modified |
+| 3/27/2023 | [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/defender-endpoint-antivirus-exclusions?view=o365-worldwide) | modified |
+| 3/27/2023 | [Microsoft Defender Antivirus security intelligence and product updates](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates?view=o365-worldwide) | modified |
+| 3/28/2023 | [Setup overview for Microsoft 365 for Campaigns](/microsoft-365/business-premium/m365-campaigns-setup?view=o365-worldwide) | modified |
+| 3/28/2023 | [Protect your administrator accounts with Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-protect-admin-accounts?view=o365-worldwide) | modified |
+| 3/28/2023 | [Welcome to Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-setup-overview?view=o365-worldwide) | modified |
+| 3/28/2023 | [View or edit device protection policies](/microsoft-365/business-premium/m365bp-view-edit-create-mdb-policies?view=o365-worldwide) | modified |
+| 3/28/2023 | [Microsoft 365 Business Premium frequently asked questions](/microsoft-365/business-premium/microsoft-365-business-faqs?view=o365-worldwide) | modified |
+| 3/28/2023 | [What happens to my data and access when my subscription ends?](/microsoft-365/commerce/subscriptions/what-if-my-subscription-expires?view=o365-worldwide) | modified |
+| 3/28/2023 | [Take response actions on a device in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/respond-machine-alerts?view=o365-worldwide) | modified |
+| 3/28/2023 | [Microsoft Defender Threat Intelligence in Microsoft 365 Defender](/microsoft-365/security/defender/defender-threat-intelligence?view=o365-worldwide) | added |
+| 3/28/2023 | [Microsoft Defender for Office 365 support for Microsoft Teams (Preview)](/microsoft-365/security/office-365-security/mdo-support-teams-about?view=o365-worldwide) | added |
+| 3/28/2023 | [User reported message settings in Teams](/microsoft-365/security/office-365-security/submissions-teams?view=o365-worldwide) | added |
+| 3/28/2023 | [The Teams Message Entity Panel in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/teams-message-entity-panel?view=o365-worldwide) | added |
+| 3/28/2023 | [Manage quarantined messages and files as an admin](/microsoft-365/security/office-365-security/quarantine-admin-manage-messages-files?view=o365-worldwide) | modified |
+| 3/28/2023 | [Zero-hour auto purge in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/zero-hour-auto-purge?view=o365-worldwide) | modified |
+| 3/28/2023 | [Learn about Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-learn-about?view=o365-worldwide) | modified |
+| 3/28/2023 | [Configure and view alerts for DLP policies](/microsoft-365/compliance/dlp-configure-view-alerts-policies?view=o365-worldwide) | modified |
+| 3/28/2023 | [Configure endpoint DLP settings](/microsoft-365/compliance/dlp-configure-endpoint-settings?view=o365-worldwide) | modified |
+| 3/28/2023 | [Data Loss Prevention policy reference](/microsoft-365/compliance/dlp-policy-reference?view=o365-worldwide) | modified |
+| 3/28/2023 | [Anti-spam message headers](/microsoft-365/security/office-365-security/message-headers-eop-mdo?view=o365-worldwide) | modified |
+| 3/28/2023 | [Migrate to Microsoft Defender for Office 365 Phase 2: Setup](/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-setup?view=o365-worldwide) | modified |
+| 3/28/2023 | [Outbound delivery pools](/microsoft-365/security/office-365-security/outbound-spam-high-risk-delivery-pool-about?view=o365-worldwide) | modified |
+| 3/28/2023 | [Step-by-step threat protection stack in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/protection-stack-microsoft-defender-for-office365?view=o365-worldwide) | modified |
+| 3/28/2023 | [Threat Explorer and Real-time detections basics in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/real-time-detections?view=o365-worldwide) | modified |
+| 3/28/2023 | [Remediate malicious email that was delivered in Office 365](/microsoft-365/security/office-365-security/remediate-malicious-email-delivered-office-365?view=o365-worldwide) | modified |
+| 3/28/2023 | [Complete Safe Links overview for Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/safe-links-about?view=o365-worldwide) | modified |
+| 3/28/2023 | [Secure by default in Office 365](/microsoft-365/security/office-365-security/secure-by-default?view=o365-worldwide) | modified |
+| 3/28/2023 | [Steps to quickly set up the Standard or Strict preset security policies for Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/step-by-step-guides/ensuring-you-always-have-the-optimal-security-controls-with-preset-security-policies?view=o365-worldwide) | modified |
+| 3/28/2023 | [Reduce the attack surface for Microsoft Teams](/microsoft-365/security/office-365-security/step-by-step-guides/reducing-attack-surface-in-microsoft-teams?view=o365-worldwide) | modified |
+| 3/28/2023 | [Recommended Teams policies - Microsoft 365 for enterprise \| Microsoft Docs](/microsoft-365/security/office-365-security/teams-access-policies?view=o365-worldwide) | modified |
+| 3/28/2023 | [Top 12 tasks for security teams to support working from home](/microsoft-365/security/top-security-tasks-for-remote-work?view=o365-worldwide) | modified |
+| 3/28/2023 | [Get started with Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-getting-started?view=o365-worldwide) | modified |
+| 3/28/2023 | [Manage active content in Office documents for IT admins](/microsoft-365/security/active-content-in-trusted-docs?view=o365-worldwide) | modified |
+| 3/28/2023 | [Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)](/microsoft-365/security/defender-endpoint/android-configure-mam?view=o365-worldwide) | modified |
+| 3/28/2023 | [Troubleshoot issues on Microsoft Defender for Endpoint on Android](/microsoft-365/security/defender-endpoint/android-support-signin?view=o365-worldwide) | modified |
+| 3/28/2023 | [Attack surface reduction frequently asked questions (FAQ)](/microsoft-365/security/defender-endpoint/attack-surface-reduction-faq?view=o365-worldwide) | modified |
+| 3/28/2023 | [Enable attack surface reduction (ASR) rules](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-implement?view=o365-worldwide) | modified |
+| 3/28/2023 | [Batch Update alert entities API](/microsoft-365/security/defender-endpoint/batch-update-alerts?view=o365-worldwide) | modified |
+| 3/28/2023 | [Cloud protection and sample submission at Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/cloud-protection-microsoft-antivirus-sample-submission?view=o365-worldwide) | modified |
+| 3/28/2023 | [Alert grading for suspicious inbox forwarding rules](/microsoft-365/security/defender/alert-grading-playbook-inbox-forwarding-rules?view=o365-worldwide) | modified |
+| 3/28/2023 | [Device profile in Microsoft 365 security portal](/microsoft-365/security/defender/device-profile?view=o365-worldwide) | modified |
+| 3/28/2023 | [Enable the evaluation environment for Microsoft Defender for Office 365 in your production environment](/microsoft-365/security/defender/eval-defender-office-365-enable-eval?view=o365-worldwide) | modified |
+| 3/28/2023 | [Step 5. Develop and test use cases](/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-use-cases?view=o365-worldwide) | modified |
+| 3/28/2023 | [Responding to ransomware attacks](/microsoft-365/security/defender/playbook-responding-ransomware-m365-defender?view=o365-worldwide) | modified |
+| 3/28/2023 | [Onboard macOS devices into Microsoft 365 overview](/microsoft-365/compliance/device-onboarding-macos-overview?view=o365-worldwide) | modified |
+| 3/28/2023 | [Onboard Windows 10 or Windows 11 devices into Microsoft 365 overview](/microsoft-365/compliance/device-onboarding-overview?view=o365-worldwide) | modified |
+| 3/29/2023 | [Use retention labels to manage SharePoint document lifecycle](/microsoft-365/compliance/auto-apply-retention-labels-scenario?view=o365-worldwide) | modified |
+| 3/29/2023 | [Start retention when an event occurs](/microsoft-365/compliance/event-driven-retention?view=o365-worldwide) | modified |
+| 3/29/2023 | [Add apps overview for Microsoft Intune](/microsoft-365/solutions/apps-add-overview?view=o365-worldwide) | added |
+| 3/29/2023 | [Step 1. Assess app requirements](/microsoft-365/solutions/apps-add-step-1?view=o365-worldwide) | added |
+| 3/29/2023 | [Step 2. Create and edit categories for apps](/microsoft-365/solutions/apps-add-step-2?view=o365-worldwide) | added |
+| 3/29/2023 | [Step 3. Purchase apps](/microsoft-365/solutions/apps-add-step-3?view=o365-worldwide) | added |
+| 3/29/2023 | [Step 4. Add apps to Intune](/microsoft-365/solutions/apps-add-step-4?view=o365-worldwide) | added |
+| 3/29/2023 | [Step 5. Manage apps and licenses](/microsoft-365/solutions/apps-add-step-5?view=o365-worldwide) | added |
+| 3/29/2023 | [Purchase and add apps for Microsoft Intune](/microsoft-365/solutions/apps-guide-overview?view=o365-worldwide) | added |
+| 3/29/2023 | [Manage app licenses used in Intune](/microsoft-365/solutions/apps-license-manage?view=o365-worldwide) | added |
+| 3/29/2023 | [Understand app licenses used in Intune](/microsoft-365/solutions/apps-license-overview?view=o365-worldwide) | added |
+| 3/29/2023 | [Purchase apps for Intune](/microsoft-365/solutions/apps-purchase-overview?view=o365-worldwide) | added |
+| 3/29/2023 | [Purchase store apps in Intune](/microsoft-365/solutions/apps-purchase-store?view=o365-worldwide) | added |
+| 3/29/2023 | [Purchase apps in-volume for Intune](/microsoft-365/solutions/apps-purchase-volume?view=o365-worldwide) | added |
+| 3/29/2023 | [Understand built-in apps for Intune](/microsoft-365/solutions/apps-type-built-in?view=o365-worldwide) | added |
+| 3/29/2023 | [Understand line-of-business apps for your managed environment](/microsoft-365/solutions/apps-type-lob?view=o365-worldwide) | added |
+| 3/29/2023 | [Understand Microsoft apps for Intune](/microsoft-365/solutions/apps-type-microsoft?view=o365-worldwide) | added |
+| 3/29/2023 | [Overview of app types available for managed environments](/microsoft-365/solutions/apps-type-overview?view=o365-worldwide) | added |
+| 3/29/2023 | [Understand store apps for your managed environment](/microsoft-365/solutions/apps-type-store?view=o365-worldwide) | added |
+| 3/29/2023 | [Understand web apps for Intune](/microsoft-365/solutions/apps-type-web?view=o365-worldwide) | added |
+| 3/28/2023 | [Manage and monitor priority accounts](/microsoft-365/admin/setup/priority-accounts?view=o365-worldwide) | modified |
+| 3/28/2023 | [France national ID card (CNI) entity definition](/microsoft-365/compliance/sit-defn-france-national-id-card?view=o365-worldwide) | modified |
+| 3/28/2023 | [Indonesia identity card (KTP) number entity definition](/microsoft-365/compliance/sit-defn-indonesia-identity-card-number?view=o365-worldwide) | modified |
+| 3/28/2023 | [Portugal citizen card number entity definition](/microsoft-365/compliance/sit-defn-portugal-citizen-card-number?view=o365-worldwide) | modified |
+| 3/28/2023 | [Add several users at the same time to Microsoft 365 - Admin Help](/microsoft-365/enterprise/add-several-users-at-the-same-time?view=o365-worldwide) | modified |
+| 3/28/2023 | [Specify the cloud protection level for Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/specify-cloud-protection-level-microsoft-defender-antivirus?view=o365-worldwide) | modified |
+| 3/28/2023 | [Configure teams with protection for highly sensitive data](/microsoft-365/solutions/configure-teams-highly-sensitive-protection?view=o365-worldwide) | modified |
+| 3/29/2023 | [Zero Trust with Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/zero-trust-with-microsoft-defender-endpoint?view=o365-worldwide) | added |
+| 3/29/2023 | [BehaviorEntities table in the advanced hunting schema](/microsoft-365/security/defender/advanced-hunting-behaviorentities-table?view=o365-worldwide) | added |
+| 3/29/2023 | [BehaviorInfo table in the advanced hunting schema](/microsoft-365/security/defender/advanced-hunting-behaviorinfo-table?view=o365-worldwide) | added |
+| 3/29/2023 | [Zero Trust with Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/zero-trust-with-microsoft-365-defender-office-365?view=o365-worldwide) | added |
+| 3/29/2023 | [Manage device access settings in Basic Mobility and Security](/microsoft-365/admin/basic-mobility-security/manage-device-access-settings?view=o365-worldwide) | modified |
+| 3/29/2023 | [Cortana in Microsoft 365](/microsoft-365/admin/misc/cortana-integration?view=o365-worldwide) | modified |
+| 3/29/2023 | [Upgrade your Office 2010 to Microsoft 365 - Microsoft 365 admin](/microsoft-365/admin/setup/upgrade-users-to-latest-office-client?view=o365-worldwide) | modified |
+| 3/29/2023 | [Get started with Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-getting-started?view=o365-worldwide) | modified |
+| 3/29/2023 | [Common Microsoft Defender for Endpoint API errors](/microsoft-365/security/defender-endpoint/common-errors?view=o365-worldwide) | modified |
+| 3/29/2023 | [Advanced deployment guidance for Microsoft Defender for Endpoint on Linux](/microsoft-365/security/defender-endpoint/comprehensive-guidance-on-linux-deployment?view=o365-worldwide) | modified |
+| 3/29/2023 | [Enable Conditional Access to better protect users, devices, and data](/microsoft-365/security/defender-endpoint/conditional-access?view=o365-worldwide) | modified |
+| 3/29/2023 | [Configure device discovery](/microsoft-365/security/defender-endpoint/configure-device-discovery?view=o365-worldwide) | modified |
+| 3/29/2023 | [Configure exclusions for files opened by specific processes](/microsoft-365/security/defender-endpoint/configure-process-opened-file-exclusions-microsoft-defender-antivirus?view=o365-worldwide) | modified |
+| 3/29/2023 | [Configure Microsoft Defender Antivirus exclusions on Windows Server](/microsoft-365/security/defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus?view=o365-worldwide) | modified |
+| 3/29/2023 | [Configure vulnerability email notifications in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-vulnerability-email-notifications?view=o365-worldwide) | modified |
+| 3/29/2023 | [Deploy Microsoft Defender for Endpoint in rings](/microsoft-365/security/defender-endpoint/deployment-rings?view=o365-worldwide) | modified |
+| 3/29/2023 | [Device discovery frequently asked questions](/microsoft-365/security/defender-endpoint/device-discovery-faq?view=o365-worldwide) | modified |
+| 3/29/2023 | [Device discovery overview](/microsoft-365/security/defender-endpoint/device-discovery?view=o365-worldwide) | modified |
+| 3/29/2023 | [Enable attack surface reduction rules](/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction?view=o365-worldwide) | modified |
+| 3/29/2023 | [Turn on exploit protection to help mitigate against attacks](/microsoft-365/security/defender-endpoint/enable-exploit-protection?view=o365-worldwide) | modified |
+| 3/29/2023 | [Exploit protection reference](/microsoft-365/security/defender-endpoint/exploit-protection-reference?view=o365-worldwide) | modified |
+| 3/29/2023 | [Apply mitigations to help prevent attacks through vulnerabilities](/microsoft-365/security/defender-endpoint/exploit-protection?view=o365-worldwide) | modified |
+| 3/29/2023 | [Find devices by tag API](/microsoft-365/security/defender-endpoint/find-machines-by-tag?view=o365-worldwide) | modified |
+| 3/29/2023 | [List machines API](/microsoft-365/security/defender-endpoint/get-machines?view=o365-worldwide) | modified |
+| 3/29/2023 | [Become a Microsoft Defender for Endpoint partner](/microsoft-365/security/defender-endpoint/get-started-partner-integration?view=o365-worldwide) | modified |
+| 3/29/2023 | [Investigate connection events that occur behind forward proxies](/microsoft-365/security/defender-endpoint/investigate-behind-proxy?view=o365-worldwide) | modified |
+| 3/29/2023 | [Investigate a user account in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/investigate-user?view=o365-worldwide) | modified |
+| 3/29/2023 | [Set preferences for Microsoft Defender for Endpoint on Linux](/microsoft-365/security/defender-endpoint/linux-preferences?view=o365-worldwide) | modified |
+| 3/29/2023 | [Deployment with a different Mobile Device Management (MDM) system for Microsoft Defender for Endpoint on Mac](/microsoft-365/security/defender-endpoint/mac-install-with-other-mdm?view=o365-worldwide) | modified |
+| 3/29/2023 | [Set preferences for Microsoft Defender for Endpoint on Mac](/microsoft-365/security/defender-endpoint/mac-preferences?view=o365-worldwide) | modified |
+| 3/29/2023 | [Create indicators](/microsoft-365/security/defender-endpoint/manage-indicators?view=o365-worldwide) | modified |
+| 3/29/2023 | [Migrating servers from Microsoft Defender for Endpoint to Microsoft Defender for Cloud](/microsoft-365/security/defender-endpoint/migrating-mde-server-to-cloud?view=o365-worldwide) | modified |
+| 3/29/2023 | [Network device discovery and vulnerability management](/microsoft-365/security/defender-endpoint/network-devices?view=o365-worldwide) | modified |
+| 3/29/2023 | [Run live response commands on a device](/microsoft-365/security/defender-endpoint/run-live-response?view=o365-worldwide) | modified |
+| 3/29/2023 | [Troubleshoot Microsoft Defender for Endpoint service issues](/microsoft-365/security/defender-endpoint/troubleshoot-mdatp?view=o365-worldwide) | modified |
+| 3/29/2023 | [Microsoft Defender Antivirus event IDs and error codes](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus?view=o365-worldwide) | modified |
+| 3/29/2023 | [Troubleshoot Microsoft Defender for Endpoint onboarding issues](/microsoft-365/security/defender-endpoint/troubleshoot-onboarding?view=o365-worldwide) | modified |
+| 3/29/2023 | [Troubleshoot onboarding issues related to Security Management for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/troubleshoot-security-config-mgt?view=o365-worldwide) | modified |
+| 3/29/2023 | [Block vulnerable applications](/microsoft-365/security/defender-vulnerability-management/tvm-block-vuln-apps?view=o365-worldwide) | modified |
+| 3/29/2023 | [Create and view exceptions for security recommendations](/microsoft-365/security/defender-vulnerability-management/tvm-exception?view=o365-worldwide) | modified |
+| 3/29/2023 | [Remediate vulnerabilities](/microsoft-365/security/defender-vulnerability-management/tvm-remediation?view=o365-worldwide) | modified |
+| 3/29/2023 | [Zero Trust with Microsoft 365 Defender](/microsoft-365/security/defender/zero-trust-with-microsoft-365-defender?view=o365-worldwide) | modified |
+| 3/29/2023 | [Prevent malware infection](/microsoft-365/security/intelligence/prevent-malware-infection?view=o365-worldwide) | modified |
+| 3/29/2023 | [Tech Support Scams](/microsoft-365/security/intelligence/support-scams?view=o365-worldwide) | modified |
+| 3/29/2023 | [Zero Trust deployment plan with Microsoft 365](/microsoft-365/security/microsoft-365-zero-trust?view=o365-worldwide) | modified |
+| 3/29/2023 | [Remediation actions in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/air-remediation-actions?view=o365-worldwide) | modified |
+| 3/29/2023 | [How EOP validates the From address to prevent phishing](/microsoft-365/security/office-365-security/anti-phishing-from-email-address-validation?view=o365-worldwide) | modified |
+| 3/29/2023 | [Attack simulation training deployment considerations and FAQ](/microsoft-365/security/office-365-security/attack-simulation-training-faq?view=o365-worldwide) | modified |
+| 3/29/2023 | [Protection features in Azure Information Protection rolling out to existing tenants](/microsoft-365/security/office-365-security/azure-ip-protection-features?view=o365-worldwide) | modified |
+| 3/29/2023 | [Create safe sender lists](/microsoft-365/security/office-365-security/create-safe-sender-lists-in-office-365?view=o365-worldwide) | modified |
+| 3/29/2023 | [Detect and remediate the Outlook rules and custom forms injections attacks.](/microsoft-365/security/office-365-security/detect-and-remediate-outlook-rules-forms-attack?view=o365-worldwide) | modified |
+| 3/29/2023 | [Troubleshooting mail sent to Microsoft 365](/microsoft-365/security/office-365-security/mail-flow-troubleshooting?view=o365-worldwide) | modified |
+| 3/29/2023 | [Microsoft Defender for Office 365 email entity page](/microsoft-365/security/office-365-security/mdo-email-entity-page?view=o365-worldwide) | modified |
+| 3/29/2023 | [Landing pages in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-landing-pages?view=o365-worldwide) | added |
+| 3/29/2023 | [End-user notifications for Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-end-user-notifications?view=o365-worldwide) | modified |
+| 3/29/2023 | [Get started using Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-get-started?view=o365-worldwide) | modified |
+| 3/29/2023 | [Insights and reports Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-insights?view=o365-worldwide) | modified |
+| 3/29/2023 | [Login pages in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-login-pages?view=o365-worldwide) | modified |
+| 3/29/2023 | [Payload automations for Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-payload-automations?view=o365-worldwide) | modified |
+| 3/29/2023 | [Payloads in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-payloads?view=o365-worldwide) | modified |
+| 3/29/2023 | [Simulation automations for Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations?view=o365-worldwide) | modified |
+| 3/29/2023 | [Simulate a phishing attack with Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-simulations?view=o365-worldwide) | modified |
+| 3/29/2023 | [Training campaigns in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-training-campaigns?view=o365-worldwide) | modified |
+| 3/29/2023 | [Microsoft Defender for Office 365 support for Microsoft Teams (Preview)](/microsoft-365/security/office-365-security/mdo-support-teams-about?view=o365-worldwide) | modified |
+| 3/29/2023 | [Configure teams with protection for highly sensitive data](/microsoft-365/solutions/configure-teams-highly-sensitive-protection?view=o365-worldwide) | modified |
+| 3/29/2023 | [Configure teams with protection for sensitive data](/microsoft-365/solutions/configure-teams-sensitive-protection?view=o365-worldwide) | modified |
+| 3/29/2023 | [Determine if Centralized Deployment of add-ins works for your organization](/microsoft-365/admin/manage/centralized-deployment-of-add-ins?view=o365-worldwide) | modified |
+| 3/29/2023 | [How to secure your business data with Microsoft 365](/microsoft-365/business-premium/secure-your-business-data?view=o365-worldwide) | modified |
+| 3/29/2023 | [Resources for Microsoft partners working with small and medium-sized businesses](/microsoft-365/security/defender-business/mdb-partners?view=o365-worldwide) | modified |
+| 3/30/2023 | [Data Loss Prevention policy tips reference](/microsoft-365/compliance/dlp-policy-tips-reference?view=o365-worldwide) | modified |
+| 3/30/2023 | [Virtual Appointments with Teams - Integration into Oracle Health EHR](/microsoft-365/frontline/ehr-admin-oracle-health?view=o365-worldwide) | modified |
+| 3/30/2023 | [Simulation automations for Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations?view=o365-worldwide) | modified |
+| 3/30/2023 | [Microsoft Teams in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-teams?view=o365-worldwide) | added |
+| 3/30/2023 | [Allow or block URLs using the Tenant Allow/Block List](/microsoft-365/security/office-365-security/tenant-allow-block-list-urls-configure?view=o365-worldwide) | modified |
+| 3/31/2023 | [macOS Device control policies frequently asked questions (FAQ)](/microsoft-365/security/defender-endpoint/mac-device-control-faq?view=o365-worldwide) | added |
+| 3/31/2023 | [Endpoint detection and response in block mode](/microsoft-365/security/defender-endpoint/edr-in-block-mode?view=o365-worldwide) | modified |
+| 3/31/2023 | [Deploy and manage Device Control using Intune](/microsoft-365/security/defender-endpoint/mac-device-control-intune?view=o365-worldwide) | modified |
+| 3/31/2023 | [Deploy and manage device control using JAMF](/microsoft-365/security/defender-endpoint/mac-device-control-jamf?view=o365-worldwide) | modified |
+| 3/31/2023 | [Device control for macOS](/microsoft-365/security/defender-endpoint/mac-device-control-overview?view=o365-worldwide) | modified |
+| 3/31/2023 | [Errors during admin submissions](/microsoft-365/security/office-365-security/submissions-error-messages?view=o365-worldwide) | modified |
+| 3/31/2023 | [Allow or block URLs using the Tenant Allow/Block List](/microsoft-365/security/office-365-security/tenant-allow-block-list-urls-configure?view=o365-worldwide) | modified |
+| 3/31/2023 | [Overview of Copilot for Microsoft Syntex](/microsoft-365/syntex/syntex-copilot) | modified |
+| 3/31/2023 | [Turn pronouns on or off for your organization in the Microsoft 365 admin center](/microsoft-365/admin/add-users/turn-pronouns-on-or-off?view=o365-worldwide) | modified |
+| 3/31/2023 | [Use communication compliance reports and audits](/microsoft-365/compliance/communication-compliance-reports-audits?view=o365-worldwide) | modified |
+| 3/31/2023 | [What's new in Microsoft Purview risk and compliance solutions](/microsoft-365/compliance/whats-new?view=o365-worldwide) | modified |
+| 3/31/2023 | [Service advisories for auto-expanding archive utilization in Exchange Online monitoring](/microsoft-365/enterprise/microsoft-365-exo-archive-advisory?view=o365-worldwide) | modified |
+| 3/31/2023 | [Printer Protection frequently asked questions](/microsoft-365/security/defender-endpoint/printer-protection-frequently-asked-questions?view=o365-worldwide) | modified |
+| 3/31/2023 | [Schedule regular quick and full scans with Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/schedule-antivirus-scans?view=o365-worldwide) | modified |
++ ## Week of March 20, 2023
| 3/3/2023 | [Microsoft Teams Advanced Virtual Appointments activity report](/microsoft-365/frontline/advanced-virtual-appointments-activity-report?view=o365-worldwide) | modified | | 3/3/2023 | [Quarantine notifications (end-user spam notifications) in Microsoft 365](/microsoft-365/security/office-365-security/quarantine-quarantine-notifications?view=o365-worldwide) | modified | | 3/3/2023 | [Microsoft recommendations for EOP and Defender for Office 365 security settings](/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365?view=o365-worldwide) | modified |--
-## Week of February 20, 2023
--
-| Published On |Topic title | Change |
-|||--|
-| 2/21/2023 | [Learn about data loss prevention](/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide) | modified |
-| 2/21/2023 | [Configure the delivery of third-party phishing simulations to users and unfiltered messages to SecOps mailboxes](/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide) | modified |
-| 2/22/2023 | [Automatically apply a retention label to Microsoft 365 items](/microsoft-365/compliance/apply-retention-labels-automatically?view=o365-worldwide) | modified |
-| 2/22/2023 | [Turn auditing on or off](/microsoft-365/compliance/audit-log-enable-disable?view=o365-worldwide) | modified |
-| 2/22/2023 | [Search the audit log in the Microsoft Purview compliance portal](/microsoft-365/compliance/audit-log-search?view=o365-worldwide) | modified |
-| 2/22/2023 | [Detect channel signals with communication compliance](/microsoft-365/compliance/communication-compliance-channels?view=o365-worldwide) | modified |
-| 2/22/2023 | [Automatically retain or delete content by using retention policies](/microsoft-365/compliance/create-retention-policies?view=o365-worldwide) | modified |
-| 2/22/2023 | [Information barriers](/microsoft-365/compliance/information-barriers-solution-overview?view=o365-worldwide) | modified |
-| 2/22/2023 | [New alert policies in Microsoft Defender for Office 365](/microsoft-365/compliance/new-defender-alert-policies?view=o365-worldwide) | modified |
-| 2/22/2023 | [Details and results of an automatic attack disruption action](/microsoft-365/security/defender/autoad-results?view=o365-worldwide) | added |
-| 2/22/2023 | [Automatic attack disruption in Microsoft 365 Defender](/microsoft-365/security/defender/automatic-attack-disruption?view=o365-worldwide) | added |
-| 2/22/2023 | [Configure automatic attack disruption capabilities in Microsoft 365 Defender](/microsoft-365/security/defender/configure-attack-disruption?view=o365-worldwide) | added |
-| 2/21/2023 | [Adaptive scopes](/microsoft-365/compliance/purview-adaptive-scopes?view=o365-worldwide) | added |
-| 2/21/2023 | [Get started with communication compliance](/microsoft-365/compliance/communication-compliance-configure?view=o365-worldwide) | modified |
-| 2/21/2023 | [Microsoft Purview solutions trial user guide](/microsoft-365/compliance/compliance-easy-trials-compliance-playbook?view=o365-worldwide) | modified |
-| 2/21/2023 | [Limits for Microsoft 365 retention policies and retention label policies](/microsoft-365/compliance/retention-limits?view=o365-worldwide) | modified |
-| 2/21/2023 | [Configure Microsoft 365 retention settings to automatically retain or delete content](/microsoft-365/compliance/retention-settings?view=o365-worldwide) | modified |
-| 2/21/2023 | [Learn about retention policies & labels to retain or delete](/microsoft-365/compliance/retention?view=o365-worldwide) | modified |
-| 2/21/2023 | [Commit a collection estimate to a review set](/microsoft-365/compliance/ediscovery-commit-draft-collection?view=o365-worldwide) | modified |
-| 2/21/2023 | [Create a collection estimate](/microsoft-365/compliance/ediscovery-create-draft-collection?view=o365-worldwide) | modified |
-| 2/22/2023 | [Document metadata fields in eDiscovery (Premium)](/microsoft-365/compliance/ediscovery-document-metadata-fields?view=o365-worldwide) | modified |
-| 2/22/2023 | [Keyword queries and search conditions for eDiscovery](/microsoft-365/compliance/ediscovery-keyword-queries-and-search-conditions?view=o365-worldwide) | modified |
-| 2/22/2023 | [Manage sensitivity labels in Office apps](/microsoft-365/compliance/sensitivity-labels-office-apps?view=o365-worldwide) | modified |
-| 2/22/2023 | [Microsoft Defender for Business frequently asked questions](/microsoft-365/security/defender-business/mdb-faq?view=o365-worldwide) | modified |
-| 2/22/2023 | [Onboard devices to Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-onboard-devices?view=o365-worldwide) | modified |
-| 2/22/2023 | [Onboard previous versions of Windows on Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/onboard-downlevel?view=o365-worldwide) | modified |
-| 2/22/2023 | [Automatic attack disruption in Microsoft 365 Defender](/microsoft-365/security/defender/automatic-attack-disruption?view=o365-worldwide) | modified |
-| 2/22/2023 | [Assess and tune your filtering for bulk mail in Defender for Office 365](/microsoft-365/security/office-365-security/step-by-step-guides/tune-bulk-mail-filtering-walkthrough?view=o365-worldwide) | added |
-| 2/22/2023 | [Cortana in Microsoft 365](/microsoft-365/admin/misc/cortana-integration?view=o365-worldwide) | modified |
-| 2/22/2023 | [Admin roles for Intune in the Microsoft 365 admin center](/microsoft-365/business-premium/m365bp-intune-admin-roles-in-the-mac?view=o365-worldwide) | modified |
-| 2/22/2023 | [Review detected threats on devices and take action](/microsoft-365/business-premium/m365bp-review-threats-take-action?view=o365-worldwide) | modified |
-| 2/22/2023 | [View or edit device protection policies](/microsoft-365/business-premium/m365bp-view-edit-create-mdb-policies?view=o365-worldwide) | modified |
-| 2/22/2023 | [Get started with the Microsoft Purview Chrome Extension](/microsoft-365/compliance/dlp-chrome-get-started?view=o365-worldwide) | modified |
-| 2/22/2023 | [Get started with the Microsoft Purview Firefox Extension](/microsoft-365/compliance/dlp-firefox-extension-get-started?view=o365-worldwide) | modified |
-| 2/22/2023 | [Create eDiscovery holds in a eDiscovery (Standard) case](/microsoft-365/compliance/ediscovery-create-holds?view=o365-worldwide) | modified |
-| 2/22/2023 | [Decryption in Microsoft Purview eDiscovery tools](/microsoft-365/compliance/ediscovery-decryption?view=o365-worldwide) | modified |
-| 2/22/2023 | [Load non-Microsoft 365 data into a review set](/microsoft-365/compliance/ediscovery-load-non-office-365-data-into-a-review-set?view=o365-worldwide) | modified |
-| 2/22/2023 | [Manage hold notifications](/microsoft-365/compliance/ediscovery-manage-hold-notifications?view=o365-worldwide) | modified |
-| 2/22/2023 | [Manage Relevance setup in eDiscovery (Premium)](/microsoft-365/compliance/ediscovery-manage-relevance-setup?view=o365-worldwide) | modified |
-| 2/22/2023 | [Manage holds in eDiscovery (Premium)](/microsoft-365/compliance/ediscovery-managing-holds?view=o365-worldwide) | modified |
-| 2/22/2023 | [Predictive coding reference](/microsoft-365/compliance/ediscovery-predictive-coding-reference?view=o365-worldwide) | modified |
-| 2/22/2023 | [Preview the results of an eDiscovery search](/microsoft-365/compliance/ediscovery-preview-search-results?view=o365-worldwide) | modified |
-| 2/22/2023 | [Review audit logs in Microsoft 365 Lighthouse](/microsoft-365/lighthouse/m365-lighthouse-review-audit-logs?view=o365-worldwide) | modified |
-| 2/22/2023 | [Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)](/microsoft-365/security/defender-endpoint/android-configure-mam?view=o365-worldwide) | modified |
-| 2/22/2023 | [Configure Microsoft Defender for Endpoint on Android features](/microsoft-365/security/defender-endpoint/android-configure?view=o365-worldwide) | modified |
-| 2/22/2023 | [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](/microsoft-365/security/defender-endpoint/android-intune?view=o365-worldwide) | modified |
-| 2/22/2023 | [Test attack surface reduction (ASR) rules](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-test?view=o365-worldwide) | modified |
-| 2/22/2023 | [Microsoft Defender for Endpoint (MDE) attack surface reduction (ASR) rules deployment overview](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment?view=o365-worldwide) | modified |
-| 2/22/2023 | [Attack surface reduction rules reference](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide) | modified |
-| 2/22/2023 | [Enable block at first sight to detect malware in seconds](/microsoft-365/security/defender-endpoint/configure-block-at-first-sight-microsoft-defender-antivirus?view=o365-worldwide) | modified |
-| 2/22/2023 | [Onboard Windows devices using Configuration Manager](/microsoft-365/security/defender-endpoint/configure-endpoints-sccm?view=o365-worldwide) | modified |
-| 2/22/2023 | [Deploy, manage, and report on Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/deploy-manage-report-microsoft-defender-antivirus?view=o365-worldwide) | modified |
-| 2/22/2023 | [Plan your Microsoft Defender for Endpoint deployment](/microsoft-365/security/defender-endpoint/deployment-strategy?view=o365-worldwide) | modified |
-| 2/22/2023 | [Block potentially unwanted applications with Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus?view=o365-worldwide) | modified |
-| 2/22/2023 | [Enable attack surface reduction rules](/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction?view=o365-worldwide) | modified |
-| 2/22/2023 | [Enable controlled folder access](/microsoft-365/security/defender-endpoint/enable-controlled-folders?view=o365-worldwide) | modified |
-| 2/22/2023 | [Turn on exploit protection to help mitigate against attacks](/microsoft-365/security/defender-endpoint/enable-exploit-protection?view=o365-worldwide) | modified |
-| 2/22/2023 | [Turn on network protection](/microsoft-365/security/defender-endpoint/enable-network-protection?view=o365-worldwide) | modified |
-| 2/22/2023 | [Configure Microsoft Defender for Endpoint on iOS features](/microsoft-365/security/defender-endpoint/ios-configure-features?view=o365-worldwide) | modified |
-| 2/22/2023 | [Deploy Microsoft Defender for Endpoint on iOS with Microsoft Intune](/microsoft-365/security/defender-endpoint/ios-install?view=o365-worldwide) | modified |
-| 2/22/2023 | [What's new in Microsoft Defender for Endpoint on iOS](/microsoft-365/security/defender-endpoint/ios-whatsnew?view=o365-worldwide) | modified |
-| 2/22/2023 | [Intune-based deployment for Microsoft Defender for Endpoint on Mac](/microsoft-365/security/defender-endpoint/mac-install-with-intune?view=o365-worldwide) | modified |
-| 2/22/2023 | [Onboard devices and configure Microsoft Defender for Endpoint capabilities](/microsoft-365/security/defender-endpoint/onboard-configure?view=o365-worldwide) | modified |
-| 2/22/2023 | [Onboarding using Microsoft Configuration Manager](/microsoft-365/security/defender-endpoint/onboarding-endpoint-configuration-manager?view=o365-worldwide) | modified |
-| 2/22/2023 | [Onboarding using Microsoft Intune](/microsoft-365/security/defender-endpoint/onboarding-endpoint-manager?view=o365-worldwide) | modified |
-| 2/22/2023 | [Onboard to the Microsoft Defender for Endpoint service](/microsoft-365/security/defender-endpoint/onboarding?view=o365-worldwide) | modified |
-| 2/22/2023 | [Run and customize on-demand scans in Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/run-scan-microsoft-defender-antivirus?view=o365-worldwide) | modified |
-| 2/22/2023 | [Troubleshoot onboarding issues related to Security Management for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/troubleshoot-security-config-mgt?view=o365-worldwide) | modified |
-| 2/22/2023 | [Configure Microsoft Defender Antivirus using Microsoft Intune](/microsoft-365/security/defender-endpoint/use-intune-config-manager-microsoft-defender-antivirus?view=o365-worldwide) | modified |
-| 2/22/2023 | [Manage devices with Intune](/microsoft-365/solutions/manage-devices-with-intune-overview?view=o365-worldwide) | modified |
-| 2/24/2023 | [What's new in Microsoft 365 Lighthouse](/microsoft-365/lighthouse/m365-lighthouse-whats-new?view=o365-worldwide) | modified |
-| 2/24/2023 | [Microsoft Defender Antivirus security intelligence and product updates](/microsoft-365/security/defender-endpoint/manage-updates-baselines-microsoft-defender-antivirus?view=o365-worldwide) | modified |
-| 2/24/2023 | [Microsoft Defender Antivirus updates - Previous versions for technical upgrade support](/microsoft-365/security/defender-endpoint/msda-updates-previous-versions-technical-upgrade-support?view=o365-worldwide) | added |
-| 2/24/2023 | [Configure anti-malware policies](/microsoft-365/security/office-365-security/anti-malware-policies-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [Impersonation insight](/microsoft-365/security/office-365-security/anti-phishing-mdo-impersonation-insight?view=o365-worldwide) | modified |
-| 2/24/2023 | [Configure anti-phishing policies in EOP](/microsoft-365/security/office-365-security/anti-phishing-policies-eop-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [Configure anti-phishing policies in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/anti-phishing-policies-mdo-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [Configure spam filter policies](/microsoft-365/security/office-365-security/anti-spam-policies-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [Spoof intelligence insight](/microsoft-365/security/office-365-security/anti-spoofing-spoof-intelligence?view=o365-worldwide) | modified |
-| 2/24/2023 | [Get started using Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-get-started?view=o365-worldwide) | modified |
-| 2/24/2023 | [Configuration analyzer for security policies](/microsoft-365/security/office-365-security/configuration-analyzer-for-security-policies?view=o365-worldwide) | modified |
-| 2/24/2023 | [Configure the default connection filter policy](/microsoft-365/security/office-365-security/connection-filter-policies-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [Remove blocked connectors from the Restricted entities portal in Microsoft 365](/microsoft-365/security/office-365-security/connectors-remove-blocked?view=o365-worldwide) | modified |
-| 2/24/2023 | [Configure outbound spam filtering](/microsoft-365/security/office-365-security/outbound-spam-policies-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [Preset security policies](/microsoft-365/security/office-365-security/preset-security-policies?view=o365-worldwide) | modified |
-| 2/24/2023 | [Manage quarantined messages and files as an admin](/microsoft-365/security/office-365-security/quarantine-admin-manage-messages-files?view=o365-worldwide) | modified |
-| 2/24/2023 | [Remove blocked users from the Restricted users portal](/microsoft-365/security/office-365-security/removing-user-from-restricted-users-portal-after-spam?view=o365-worldwide) | modified |
-| 2/24/2023 | [View Defender for Office 365 reports](/microsoft-365/security/office-365-security/reports-defender-for-office-365?view=o365-worldwide) | modified |
-| 2/24/2023 | [View email security reports](/microsoft-365/security/office-365-security/reports-email-security?view=o365-worldwide) | modified |
-| 2/24/2023 | [Set up Safe Attachments policies in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/safe-attachments-policies-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [Safe Documents in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/safe-documents-in-e5-plus-security-about?view=o365-worldwide) | modified |
-| 2/24/2023 | [Set up Safe Links policies in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/safe-links-policies-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [Configure global settings for Safe Links settings in Defender for Office 365](/microsoft-365/security/office-365-security/safe-links-policies-global-settings-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [Configure the delivery of third-party phishing simulations to users and unfiltered messages to SecOps mailboxes](/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide) | modified |
-| 2/24/2023 | [Manage submissions](/microsoft-365/security/office-365-security/submissions-admin?view=o365-worldwide) | modified |
-| 2/24/2023 | [Allow or block email using the Tenant Allow/Block List](/microsoft-365/security/office-365-security/tenant-allow-block-list-email-spoof-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [Allow or block files using the Tenant Allow/Block List](/microsoft-365/security/office-365-security/tenant-allow-block-list-files-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [Allow or block URLs using the Tenant Allow/Block List](/microsoft-365/security/office-365-security/tenant-allow-block-list-urls-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [User tags in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/user-tags-about?view=o365-worldwide) | modified |
-| 2/24/2023 | [Manage spoofed senders using the spoof intelligence policy and spoof intelligence insight](/microsoft-365/security/office-365-security/walkthrough-spoof-intelligence-insight?view=o365-worldwide) | modified |
-| 2/23/2023 | [Block vulnerable applications](/microsoft-365/security/defender-vulnerability-management/tvm-block-vuln-apps?view=o365-worldwide) | modified |
-| 2/23/2023 | [Manage submissions](/microsoft-365/security/office-365-security/submissions-admin?view=o365-worldwide) | modified |
-| 2/24/2023 | Create and apply information management policies | removed |
-| 2/24/2023 | Introduction to information management policies | removed |
-| 2/24/2023 | [Strengthen your security posture](/microsoft-365/security/security-posture-solution-overview?view=o365-worldwide) | added |
-| 2/24/2023 | [Strengthen your security posture - Assess and protect](/microsoft-365/security/strengthen-security-posture-assess-protect?view=o365-worldwide) | added |
-| 2/24/2023 | [Strengthen your security posture - Configure capabilities](/microsoft-365/security/strengthen-security-posture-configure-capabilities?view=o365-worldwide) | added |
-| 2/24/2023 | [Strengthen your security posture - Investigate and improve](/microsoft-365/security/strengthen-security-posture-investigate-improve?view=o365-worldwide) | added |
-| 2/24/2023 | [Strengthen your security posture - Track and maintain](/microsoft-365/security/strengthen-security-posture-track-maintain?view=o365-worldwide) | added |
-| 2/24/2023 | [Sensitive information type limits](/microsoft-365/compliance/sit-limits?view=o365-worldwide) | modified |
-| 2/24/2023 | [Admin review for user reported messages](/microsoft-365/security/office-365-security/submissions-admin-review-user-reported-messages?view=o365-worldwide) | renamed |
-| 2/24/2023 | [User reported settings](/microsoft-365/security/office-365-security/submissions-user-reported-messages-custom-mailbox?view=o365-worldwide) | renamed |
-| 2/24/2023 | [Microsoft 365 alert policies](/microsoft-365/compliance/alert-policies?view=o365-worldwide) | modified |
-| 2/24/2023 | [Adaptive scopes](/microsoft-365/compliance/purview-adaptive-scopes?view=o365-worldwide) | modified |
-| 2/24/2023 | [What's new in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365-whats-new?view=o365-worldwide) | modified |
-| 2/24/2023 | [Security Operations Guide for Defender for Office 365](/microsoft-365/security/office-365-security/mdo-sec-ops-guide?view=o365-worldwide) | modified |
-| 2/24/2023 | [Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview compliance](/microsoft-365/security/office-365-security/scc-permissions?view=o365-worldwide) | modified |
-| 2/24/2023 | [How-to deploy and configure the report message add-in](/microsoft-365/security/office-365-security/step-by-step-guides/deploy-and-configure-the-report-message-add-in?view=o365-worldwide) | modified |
-| 2/24/2023 | [Report false positives and false negatives in Outlook](/microsoft-365/security/office-365-security/submissions-outlook-report-messages?view=o365-worldwide) | modified |
-| 2/24/2023 | [Report spam, non-spam, phishing, suspicious emails and files to Microsoft](/microsoft-365/security/office-365-security/submissions-report-messages-files-to-microsoft?view=o365-worldwide) | modified |
-| 2/24/2023 | [Enable the Report Message or the Report Phishing add-ins](/microsoft-365/security/office-365-security/submissions-users-report-message-add-in-configure?view=o365-worldwide) | modified |
-| 2/24/2023 | [Manage allows and blocks in the Tenant Allow/Block List](/microsoft-365/security/office-365-security/tenant-allow-block-list-about?view=o365-worldwide) | modified |
lighthouse M365 Lighthouse Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-whats-new.md
Previously updated : 03/31/2023 Last updated : 04/03/2023 audience: Admin
We're continuously adding new features to [Microsoft 365 Lighthouse](m365-lighth
> [!NOTE] > Some features get rolled out at different speeds to our customers. If you aren't seeing a feature yet, you should see it soon.
+## March 2023
+
+### Microsoft Defender for Endpoint multi-tenant threat and vulnerability management
+
+Microsoft Defender Vulnerability Management helps proactively identify and build a secure foundation for devices through the remediation of software vulnerabilities and misconfigurations in customer environments. Microsoft 365 Lighthouse now includes Vulnerability Management capabilities. Go to **Devices** > [Vulnerability management](https://lighthouse.microsoft.com/#view/Microsoft_Intune_MTM/VulnerabilityManagement.ReactView) to see the exposure score across all your managed tenants that have been onboarded to Microsoft Defender for Endpoint. To see security recommendations for how to reduce tenants' exposure to vulnerabilities, select the **Recommendations** tab.
+
+### Device security insights from Microsoft Defender for Business and Microsoft Defender for Endpoint
+
+Microsoft 365 Lighthouse now surfaces summarized insights into the various security alerts from Microsoft Defender for Business and Microsoft Defender for Endpoint across your managed tenants. To access these insights, go to **Devices** > **Device security** > [Overview](https://lighthouse.microsoft.com/#view/Microsoft_Intune_MTM/MDE.ReactView). These insights can help you assess the overall status, severity, and category of the various security alerts in your tenants before drilling into the full list of alerts.
+
+### Tenants page improvements
+
+We've updated the [Tenants page](https://lighthouse.microsoft.com/#view/Microsoft_Intune_MTM/Tenants.ReactView) to help you more easily manage your customer tenants in Microsoft 365 Lighthouse. Using the new List options feature, which you access by selecting the icon next to the search box, you can now view your customer tenants by domain name or tenant ID. We've also updated the Tenants page to reflect the new Granular Delegated Admin Privileges (GDAP) setup and Lighthouse management capabilities.
+
+You'll notice that customer tenants that don't meet the criteria to be fully managed in Microsoft 365 Lighthouse (for example, they don't have GDAP set up or they're missing a required subscription) show a Lighthouse management status of **Limited**. These tenants are eligible for only a limited set of experiences in Microsoft 365 Lighthouse, including GDAP setup and management, user search, user details, tenant tagging, and service health.
+
+Lastly, we've added a new pane that details the customer criteria for each of your customer tenants. For customers with a **Limited** Lighthouse management status, for example, you can select the tenant name to open this pane and see a detailed status and recommended next steps.
+
+### Deployment status reporting
+
+Microsoft 365 Lighthouse now provides a deployment plan status for each active tenant to help you optimize and prioritize your deployment efforts. The deployment plan status is found on the Tenants page and on the new Deployment insights page.
+ ## February 2023 ### App insights from Endpoint analyticsΓÇ»
security Configure Automated Investigations Remediation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-automated-investigations-remediation.md
description: Set up your automated investigation and remediation capabilities in
keywords: configure, setup, automated, investigation, detection, alerts, remediation, response
-ms.sitesec: library
-ms.pagetype: security
ms.localizationpriority: medium
search.appverid: met150 Previously updated : 12/18/2020 Last updated : 04/03/2023 # Configure automated investigation and remediation capabilities in Microsoft Defender for Endpoint
Last updated 12/18/2020
**Applies to:** - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
If your organization is using [Defender for Endpoint](/windows/security/threat-protection/) (or [Defender for Business](../defender-business/mdb-overview.md)), [automated investigation and remediation capabilities](/microsoft-365/security/defender-endpoint/automated-investigations) can save your security operations team time and effort. As outlined in [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/enhance-your-soc-with-microsoft-defender-atp-automatic/ba-p/848946), these capabilities mimic the ideal steps that a security analyst takes to investigate and remediate threats. [Learn more about automated investigation and remediation](/microsoft-365/security/defender-endpoint/automated-investigations).
-To configure automated investigation and remediation:
-
-1. [Turn on the features](#turn-on-automated-investigation-and-remediation); and
-2. [Set up device groups](#set-up-device-groups).
+If you're using Defender for Endpoint, you can specify an automation level so that when a thread is detected on a device, the entity can be remediated automatically or only upon approval by your security team. You can configure automated investigation and remediation with device groups.
> [!NOTE]
-> - Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## Turn on automated investigation and remediation
-
-1. As a global administrator or security administrator, go to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. In the navigation pane, choose **Settings**.
-
-3. Select **Endpoints**, then select **Advanced features**.
-
-4. Turn on both **Automated Investigation** and **Automatically resolve alerts**.
+> In Defender for Business, automated investigation is configured automatically. See [advanced features](/microsoft-365/security/defender-business/mdb-configure-security-settings#review-settings-for-advanced-features).
## Set up device groups
-> [!NOTE]
-> This procedure does not apply to Defender for Business.
- 1. In the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), on the **Settings** page, under **Permissions**, select **Device groups**. 2. Select **+ Add device group**.
To configure automated investigation and remediation:
- Specify a name and description for the device group. - In the **Automation level list**, select a level, such as **Full - remediate threats automatically**. The automation level determines whether remediation actions are taken automatically, or only upon approval. To learn more, see [Automation levels in automated investigation and remediation](automation-levels.md). - In the **Members** section, use one or more conditions to identify and include devices.
- - On the **User access** tab, select the [Azure Active Directory groups](/azure/active-directory/fundamentals/active-directory-manage-groups?context=azure/active-directory/users-groups-roles/context/ugr-context) who should have access to the device group you're creating.
4. Select **Done** when you're finished setting up your device group.
+> [!NOTE]
+> The **Automated Investigation** option has been removed from the advanced features setting in Defender for Endpoint. Automated investigation is now enabled by default.
+ ## Next steps - [Visit the Action Center to view pending and completed remediation actions](/microsoft-365/security/defender-endpoint/auto-investigation-action-center#the-action-center)
To configure automated investigation and remediation:
## See also - [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)
+- [Automation levels in automated investigation and remediation](automation-levels.md)
security Configure Server Endpoints https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-server-endpoints.md
For other Windows server versions, you have two options to offboard Windows serv
- [Configure proxy and Internet connectivity settings](configure-proxy-internet.md) - [Run a detection test on a newly onboarded Defender for Endpoint device](run-detection-test.md) - [Troubleshooting Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)
+- [Azure Active Directory Seamless single sign-on](/azure/active-directory/hybrid/how-to-connect-sso-quick-start)
+- [Troubleshoot onboarding issues related to Security Management for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/troubleshoot-security-config-mgt#instructions-for-applying-computer-join-rule-in-aad-connect)
security Get Security Baselines Assessment Configurations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-security-baselines-assessment-configurations.md
If successful, this method returns 200 OK with the list of baseline configuratio
|name | String | The configuration name at it appears in the benchmark. |description | String | The configuration description as it appears in the benchmark. |category | String | The configuration category as it appears in the benchmark.
-|complianceLevel|String|The compliance level of the benchmark where this configuration appears.
+|complianceLevels|String|The compliance level of the benchmark where this configuration appears.
|`cce`|Int|The CCE for this configuration as it appears in the benchmark. |rationale |String|The rationale for this configuration as it appears in the benchmark. For STIG benchmark this isn't supplied for this configuration. |source|String| The registry path or other location used to determine the current device setting.
security Mac Device Control Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-overview.md
search.appverid: met150 Previously updated : 03/31/2023 Last updated : 04/03/2023 # Device Control for macOS
Device Control for macOS has the following prerequisites:
## Overveiw
-Microsoft Defender for Endpoint Device Control feature enables you to audit, allow, or prevent the read, write, or execute access to removable storage, and allows you to manage iOS and Portable device and Bluetooth media with or without exclusions.
+Microsoft Defender for Endpoint Device Control feature enables you to audit, allow, or prevent the read, write, or execute access to removable storage, and allows you to manage iOS and Portable device and Apple APFS encrypted device and Bluetooth media with or without exclusions.
## Prepare your endpoints
Query type 2 is as follows:
| vendorId | 4 digit hexadecimal string | Matches a deviceΓÇÖs vendor ID | | productId | 4 digit hexadecimal string | Matches a deviceΓÇÖs product ID | | serialNumber | string | Matches a deviceΓÇÖs serial number. Will not match if device does not have a serial number. |
+| encryption | apfs | Match if a device is apfs-encrypted. |
| groupId | UUID string | Match if a device is a member of another group. ΓÇÿvalueΓÇÖ represents the UUID of the group to match against. <br> Note: The group must be defined within the policy prior to the clause. | ### Access policy rule
security Mac Install With Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-install-with-intune.md
The following table summarizes the steps you would need to take to deploy and ma
|[Network Extension policy](#network-filter)|MDATP_NetExt.xml|N/A| |[Configure Microsoft AutoUpdate (MAU)](mac-updates.md#intune)|MDATP_Microsoft_AutoUpdate.xml|com.microsoft.autoupdate2| |[Microsoft Defender for Endpoint configuration settings](mac-preferences.md#intune-full-profile) <p> **Note:** If you're planning to run a third-party AV for macOS, set `passiveMode` to `true`.|MDATP_WDAV_and_exclusion_settings_Preferences.xml|com.microsoft.wdav|
-|[Configure Microsoft Defender for Endpoint and MS AutoUpdate (MAU) notifications](mac-updates.md)|MDATP_MDAV_Tray_and_AutoUpdate2.mobileconfig|com.microsoft.autoupdate2 or com.microsoft.wdav.tray|
+|[Configure Microsoft Defender for Endpoint and MS AutoUpdate (MAU) notifications](/microsoft-365/security/defender-endpoint/mac-install-with-intune#notifications)|MDATP_MDAV_Tray_and_AutoUpdate2.mobileconfig|com.microsoft.autoupdate2 or com.microsoft.wdav.tray|
## Download the onboarding package
security Tvm Security Baselines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-security-baselines.md
At the top of the device side panel, select **Open device page** to go to the de
By selecting a configuration in the list, you'll see a flyout with compliance details for the policy setting on this device.
+## Create and manage exceptions
+
+You may have cases where you don't want to assess specific configurations on certain devices. For example, a device could be under third party control or it could have an alternate mitigation already in place. In these situations, you can add exceptions to exclude the assessment of specific configurations on a devices.
+
+Devices included in exceptions won't be assessed for the specified configurations in the baseline profiles. This means it won't affect an organizationΓÇÖs metrics and score, and it can help provide organizations with a clearer view of their compliance.
+
+To view exceptions:
+
+1. Go to **Vulnerability management** > **Baselines assessment** in the [Microsoft 365 Defender portal](https://security.microsoft.com).
+2. Select the **Exceptions** tab at the top
++
+To add a new exception:
+
+1. On the **Exceptions** tab select the **Create** button.
+2. Fill in the requested details, including the justification reason, and duration.
+
+3. Select **Next**.
+
+4. On the **Configuration scope** page choose the software, base benchmark, and the compliance level and select **Next**.
+5. Select the configurations you want to add to the exception.
+
+ :::image type="content" source="../../media/defender-vulnerability-management/security-baselines-exceptions-configurations.png" alt-text="Screenshot of the configuration exceptions page" lightbox="../../media/defender-vulnerability-management/security-baselines-exceptions-configurations.png":::
+
+6. Select **Next** to choose the devices you want to include in the exception. The exception will be automatically applied to devices.
+7. Select **Next** to review the exception.
+8. Select **Submit** to create your exception.
+9. On the final page, select **View all exceptions** to return to the exceptions page.
+
+In the **Exceptions** page, select any of your exceptions to open a flyout pane where you can see the status, edit or delete your exception:
+
+ :::image type="content" source="../../media/defender-vulnerability-management/security-baselines-exceptions-details.png" alt-text="Screenshot of the exceptions side details page" lightbox="../../media/defender-vulnerability-management/security-baselines-exceptions-details.png":::
+ ## Use advanced hunting You can run advanced hunting queries on the following tables to gain visibility on security baselines in your organization:
security Attack Simulation Training End User Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-end-user-notifications.md
description: Admins can learn how to create end-user notification email messages for Attack simulation training in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Previously updated : 3/29/2023 Last updated : 4/3/2023 # End-user notifications for Attack simulation training
To see the available end-user notifications, open the Microsoft 365 Defender por
The following information is shown for each notification<sup>\*</sup>: - **Notifications**: The name of the notification.
+- **Γï«** (**Actions** control): Take action on the notification. The available actions depend on the **Status** value of the notification as described in the procedure sections.
- **Language**: If the notification contains multiple translations, the first two languages are shown directly. To see the remaining languages, hover over the numeric icon (for example, **+10**). - **Type**: The value is **Positive reinforcement notification**, **Simulation notification**, **Training assignment notification**, or **Training reminder notification**. - **Source**: For built-in notifications, the value is **Global**. For custom notifications, the value is **Tenant**.
The following information is shown for each notification<sup>\*</sup>:
- **Modified by** - **Last modified time**
-<sup>\*</sup> To see all of the columns, you might need to narrow some columns or zoom out in your browser.
- Click a column header to sort by that column. To add or remove columns, click ![Customize columns icon.](../../media/m365-cc-sc-customize-icon.png) **Customize columns**. By default, all available columns are selected.
+> [!TIP]
+> The **Γï«** (**Actions** control) is associated with the **Notifications** column. If you remove that column from view, the **Γï«** control goes away.
+
+<sup>\*</sup> To see all columns, you'll likely need to do one or more of the following steps:
+
+- Horizontally scroll in your web browser.
+- Narrow the width of appropriate columns.
+- Remove columns from the view.
+- Zoom out in your web browser.
+ To find a notification in the list, type part of the notification name in the ![Search icon.](../../media/m365-cc-sc-search-icon.png) **Search** box and then press the ENTER key. To group the notifications by type, click ![Group icon.](../../media/m365-cc-sc-group-icon.png) **Group** and then select **Notification type**. To ungroup the notifications, select **None**.
You can't modify built-in notifications on the **Global notifications** tab. You
To modify an existing custom notification on the **Tenant notifications** tab, do one of the following steps: - Select the notification from the list by clicking the check box next to the name. Click the ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit** icon that appears.-- Click **Γï«** (**Actions**) between the **Notifications** and **Language** values of the notification in the list, and then select ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit**.
+- Click **Γï«** (**Actions**) next to the **Notifications** value, and then select ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit**.
- Select the notification from the list by clicking anywhere in the row other than the check box. In the details flyout that opens, click **Edit notification** at the bottom of the flyout. The end-user notification wizard opens with the settings and values of the selected notification. The steps are the same as described in the [Create end-user notifications](#create-end-user-notifications) section.
The end-user notification wizard opens with the settings and values of the selec
To copy an existing notification on the **Tenant notifications** or **Global notifications** tabs, do one of the following steps: - Select the notification from the list by clicking the check box, and then click the ![Create a copy icon.](../../media/m365-cc-sc-edit-icon.png) **Create a copy** icon that appears.-- Click **Γï«** (**Actions**) between the **Notifications** and **Language** values of the notification in the list, and then select ![Create a copy icon.](../../media/m365-cc-sc-edit-icon.png) **Create a copy**.
+- Click **Γï«** (**Actions**) next to the **Notifications** value, and then select ![Create a copy icon.](../../media/m365-cc-sc-edit-icon.png) **Create a copy**.
When you copy a custom notification on the **Tenant notifications** tab, a copy of the notification named "\<OriginalName\> - Copy" is added to the list.
-When you copy a built-in notification on the **Global notifications** tab, a **Create copy** dialog appears. The dialog confirms that a copy of the notification has been created, and is available on the **Tenant notifications** tab. If you click **Go to Tenant notification** you're taken to the **Tenant notifications** tab, where the copied built-in notification is named "\<OriginalName\> - Copy" is available in the list. If you click **Stay here** in the dialog, you return to the **Global notifications** tab.
+When you copy a built-in notification on the **Global notifications** tab, a **Create copy** dialog appears. The dialog confirms that a copy of the notification has been created, and is available on the **Tenant notifications** tab. If you click **Go to Tenant notification** you're taken to the **Tenant notifications** tab, where the copied built-in notification is named "\<OriginalName\> - Copy" is available. If you click **Stay here** in the dialog, you return to the **Global notifications** tab.
After the copy is created, you can modify it as [previously described](#modify-end-user-notifications).
You can't remove built-in notifications from the **Global notifications** tab. Y
To remove an existing custom notification from the **Tenant notifications** tab, do one of the following steps: - Select the notification from the list by clicking the check box next to the name, and then click the ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete** icon that appears.-- Click **Γï«** (**Actions**) between the **Notifications** and **Language** values of the notification in the list, and then select ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete**.
+- Click **Γï«** (**Actions**) next to the **Notifications** value, and then select ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete**.
In the confirmation dialog tht opens, click **Delete**.
security Attack Simulation Training Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-get-started.md
Last updated 1/31/2023
-# Get started using Attack simulation training in Defender for Office 365
+# Get started using Attack simulation training
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
security Attack Simulation Training Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-insights.md
description: Admins can learn how Attack simulation training in the Microsoft 365 Defender portal affects users and can gain insights from simulation and training outcomes. search.appverid: met150 Previously updated : 3/7/2023 Last updated : 4/3/2023
-# Insights and reports for Attack simulation training in Defender for Office 365
+# Insights and reports for Attack simulation training
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
In Attack simulation training in Microsoft Defender for Office Plan 2 or Microso
Insights and reports are available in the following locations on the **Attack simulation training** page in the Microsoft 365 Defender portal: - The **Overview** tab.-- Simulation details flyout after you select an existing simulation on the **Simulations** tab.
+- The simulation report for in-progress or completed simulations that you select from the **Recent simulations** card on the **Overview** tab or on the **Simulations** tab.
The rest of this article describes the available information.
Selecting **View training completion report** takes you to the [Training complet
### Repeat offenders card
-The **Repeat offenders** card on the **Overview** tab shows the information about repeat offenders. A _repeat offender_ is a user who was compromised by consecutive simulations. The default number of consecutive simulations is two, but you can change the value on the **Settings** tab of Attack simulation training at <https://security.microsoft.com/attacksimulator?viewid=setting>.
+The **Repeat offenders** card on the **Overview** tab shows the information about repeat offenders. A _repeat offender_ is a user who was compromised by consecutive simulations. The default number of consecutive simulations is two, but you can change the value on the **Settings** tab of Attack simulation training at <https://security.microsoft.com/attacksimulator?viewid=setting>. For more information, see [Configure the repeat offender threshold](attack-simulation-training-settings.md#configure-the-repeat-offender-threshold).
The chart organizes repeat offender data by [simulation type](attack-simulation-training-simulations.md#select-a-social-engineering-technique):
If you click the ![Export icon.](../../media/m365-cc-sc-download-icon.png) **Exp
:::image type="content" source="../../media/attack-sim-report-repeat-offenders-view.png" alt-text="The Repeat offenders tab in the Attack simulation report in the Microsoft 365 Defender portal" lightbox="../../media/attack-sim-report-repeat-offenders-view.png":::
-A _repeat offender_ is a user who was compromised by consecutive simulations. The default number of consecutive simulations is two, but you can change the value on the **Settings** tab of Attack simulation training at <https://security.microsoft.com/attacksimulator?viewid=setting>.
+A _repeat offender_ is a user who was compromised by consecutive simulations. The default number of consecutive simulations is two, but you can change the value on the **Settings** tab of Attack simulation training at <https://security.microsoft.com/attacksimulator?viewid=setting>. For more information, see [Configure the repeat offender threshold](attack-simulation-training-settings.md#configure-the-repeat-offender-threshold).
On the **Repeat offenders** tab, the chart organizes repeat offender data by [simulation type](attack-simulation-training-simulations.md#select-a-social-engineering-technique):
Use ![Search icon](../../media/m365-cc-sc-search-icon.png) **Search** box to fil
If you click the ![Export icon.](../../media/m365-cc-sc-download-icon.png) **Export report** button, report generation progress is shown as a percentage of complete. In the dialog that opens, you can choose to open the .csv file, save the .csv file, and remember the selection.
-## Insights and reports in the simulation details of Attack simulation training
+## Simulation report in Attack simulation training
-To go to the **Simulations** tab, open the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training**, and then select the **Simulations** tab. To go directly to the **Simulations** tab on the **Attack simulation training** page, use <https://security.microsoft.com/attacksimulator?viewid=simulations>.
+To view the details of in-progress or completed simulations, use either of the following methods:
-When you select a simulation from the list, a details page opens. This page contains the configuration settings of the simulation that you would expect to see (status, launch date, payload used, etc.).
+- On the **Overview** tab at <https://security.microsoft.com/attacksimulator?viewid=overview>, select a simulation from the [Recent simulations card](#recent-simulations-card).
+- On the **Simulations** tab at <https://security.microsoft.com/attacksimulator?viewid=simulations>, select a simulation by clicking anywhere other than the check box next to the name.
-The rest of this section describe the insights and reports that are available on the simulation details page.
+The page that opens contains **Report**, **Users** and **Details** tabs that contain information about the simulation. The rest of this section describe the insights and reports that are available on the **Report** tab.
+
+For details about the **Users** and **Details** tabs, see [View simulation details](attack-simulation-training-simulations.md#view-simulation-reports).
### Simulation impact section
security Attack Simulation Training Landing Pages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-landing-pages.md
description: Admins can learn how to create and manage landing pages for simulated phishing attacks in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Previously updated : 3/29/2023 Last updated : 4/3/2023 # Landing pages in Attack simulation training
Last updated 3/29/2023
In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, landing pages are the web pages that users are taken to if they open the payload in the simulation.
+For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
+ To see the available landing pages, open the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Phish landing pages**. To go directly to the **Content library** tab where you can select **Landing pages**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>. **Landing pages** in the **Content library** tab has two tabs:
To see the available landing pages, open the Microsoft 365 Defender portal at <h
The following information is shown for each landing page<sup>\*</sup>: - **Name**
+- **Γï«** (**Actions** control): Take action on the landing page. The available actions depend on the **Status** value of the landing page as described in the procedure sections.
- **Language** - **Default language** - **Status**: **Ready** or **Draft**.
The following information is shown for each landing page<sup>\*</sup>:
- **Created time** - **Modified by**
-<sup>\*</sup> To see all of the columns, you might need to narrow some columns or zoom out in your browser.
+Click a column header to sort by that column. To add or remove columns, click ![Customize columns icon.](../../media/m365-cc-sc-customize-icon.png) **Customize columns**. By default, all available columns are selected.
+
+> [!TIP]
+> The **Γï«** (**Actions** control) is associated with the **Name** column. If you remove that column from view, the **Γï«** control goes away.
+
+<sup>\*</sup> To see all columns, you'll likely need to do one or more of the following steps:
-Click a column header to sort by that column. To remove columns, click ![Customize columns icon.](../../media/m365-cc-sc-customize-icon.png) **Customize columns**.
+- Horizontally scroll in your web browser.
+- Narrow the width of appropriate columns.
+- Remove columns from the view.
+- Zoom out in your web browser.
To find a landing page in the list, type part of the landing page name in the ![Search icon.](../../media/m365-cc-sc-search-icon.png) **Search** box and then press the ENTER key.
You can't modify built-in landing pages on the **Global landing pages** tab. You
To modify an existing custom landing page on the **Tenant landing pages** tab, do one of the following steps: - Select the landing page from the list by clicking the check box next to the name. Click the ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit** icon that appears.-- Click **Γï«** (**Actions**) between the **Notifications** and **Language** values of the landing page in the list, and then select ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit**.
+- Click **Γï«** (**Actions**) next to the **Name** value of the landing page, and then select ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit**.
- Select the landing page from the list by clicking anywhere in the row other than the check box. In the details flyout that opens, click **Edit landing page** at the bottom of the flyout. The landing page wizard opens with the settings and values of the selected landing page. The steps are the same as described in the [Create landing pages](#create-landing-pages) section.
The landing page wizard opens with the settings and values of the selected landi
To copy an existing landing page on the **Tenant landing pages** or **Global landing pages** tabs, do one of the following steps: - Select the landing page from the list by clicking the check box, and then click the ![Create a copy icon.](../../media/m365-cc-sc-edit-icon.png) **Create a copy** icon that appears.-- Click **Γï«** (**Actions**) between the **Notifications** and **Language** values of the landing page in the list, and then select ![Create a copy icon.](../../media/m365-cc-sc-edit-icon.png) **Create a copy**.
+- Click **Γï«** (**Actions**) next to the **Name** value of the landing page, and then select ![Create a copy icon.](../../media/m365-cc-sc-edit-icon.png) **Create a copy**.
When you copy a custom landing page on the **Tenant landing pages** tab, a copy of the landing page named "\<OriginalName\> - Copy" is added to the list.
-When you copy a built-in landing page on the **Global landing pages** tab, a **Create copy** dialog appears. The dialog confirms that a copy of the landing page has been created, and is available on the **Tenant landing pages** tab. If you click **Go to Tenant landing page** you're taken to the **Tenant landing pages** tab, where the copied built-in landing page is named "\<OriginalName\> - Copy" is available in the list. If you click **Stay here** in the dialog, you return to the **Global landing pages** tab.
+When you copy a built-in landing page on the **Global landing pages** tab, a **Create copy** dialog appears. The dialog confirms that a copy of the landing page has been created, and is available on the **Tenant landing pages** tab. If you click **Go to Tenant landing page** you're taken to the **Tenant landing pages** tab, where the copied built-in landing page is named "\<OriginalName\> - Copy" is available. If you click **Stay here** in the dialog, you return to the **Global landing pages** tab.
After the copy is created, you can modify it as [previously described](#modify-landing-pages).
You can't remove built-in landing pages from the **Global landing pages** tab. Y
To remove an existing custom landing page from the **Tenant landing pages** tab, do one of the following steps: - Select the landing page from the list by clicking the check box next to the name, and then click the ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete** icon that appears.-- Click **Γï«** (**Actions**) between the **Notifications** and **Language** values of the landing page in the list, and then select ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete**.
+- Click **Γï«** (**Actions**) next to the **Name** value of the landing page, and then select ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete**.
In the confirmation dialog tht opens, click **Delete**.
security Attack Simulation Training Login Pages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-login-pages.md
description: Admins can learn how to create and manage login pages for simulated phishing attacks in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Previously updated : 3/29/2023 Last updated : 4/3/2023 # Login pages in Attack simulation training
Last updated 3/29/2023
In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, login pages are shown to users in simulations that use **Credential Harvest** and **Link in Attachment** [social engineering techniques](attack-simulation-training-simulations.md#select-a-social-engineering-technique).
+For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
+ To see the available login pages, open the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Login pages**. To go directly to the **Content library** tab where you can select **Login pages**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>. **Login pages** in the **Content library** tab has two tabs:
To see the available login pages, open the Microsoft 365 Defender portal at <htt
The following information is shown for each login page: - **Name**
+- **Γï«** (**Actions** control): Take action on the login page. The available actions depend on the **Status** value of the login page as described in the procedure sections.
- **Language** - **Source**: For built-in login pages, the value is **Global**. For custom login pages, the value is **Tenant**. - **Status**: **Ready** or **Draft**.
You can't modify built-in login pages on the **Global login pages** tab. You can
To modify an existing custom login page on the **Tenant login pages** tab, do one of the following steps: - Select the login page from the list by clicking the check box next to the name. Click the ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit** icon that appears.-- Click **Γï«** (**Actions**) between the **Name** and **Language** values of the login page in the list, and then select ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit**.
+- Click **Γï«** (**Actions**) next to the **Name** value of the login page, and then select ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit**.
- Select the login page from the list by clicking anywhere in the row other than the check box next to the name. In the details flyout that opens, click ![Edit icon.](../../media/m365-cc-sc-edit-icon.png) **Edit**. The login page wizard opens with the settings and values of the selected login page. The steps are the same as described in the [Create login pages](#create-login-pages) section.
The login page wizard opens with the settings and values of the selected login p
To copy an existing login page on the **Tenant login pages** or **Global login pages** tabs, do one of the following steps: - Select the login page from the list by clicking the check box next to the name, and then click the ![Create a copy icon.](../../media/m365-cc-sc-edit-icon.png) **Create a copy** icon that appears.-- Click **Γï«** (**Actions**) between the **Name** and **Language** values of the login page in the list, and then select ![Create a copy icon.](../../media/m365-cc-sc-edit-icon.png) **Create a copy**.
+- Click **Γï«** (**Actions**) next to the **Name** value of the login page, and then select ![Create a copy icon.](../../media/m365-cc-sc-edit-icon.png) **Create a copy**.
The login page wizard opens with the settings and values of the selected login page. The steps are the same as described in the [Create login pages](#create-login-pages) section.
You can't remove built-in login pages from the **Global login pages** tab. You c
To remove an existing custom login page from the **Tenant login pages** tab, do one of the following steps: - Select the login page from the list by clicking the check box next to the name, and then click the ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete** icon that appears.-- Click **Γï«** (**Actions**) between the **Name** and **Language** values of the login page in the list, and then select ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete**.
+- Click **Γï«** (**Actions**) next to the **Name** value of the login page, and then select ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete**.
## Make a login page the default
The default login page is the default selection that's used in **Credential Harv
To make a login page the default on the **Tenant login pages** or **Global login pages** tabs, do one of the following steps: -- Click **Γï«** (**Actions**) between the **Name** and **Language** values of the login page in the list, and then select ![Mark as default icon.](../../media/m365-cc-sc-set-as-default-icon.png) **Mark as default**.
+- Click **Γï«** (**Actions**) next to the **Name** value of the login page, and then select ![Mark as default icon.](../../media/m365-cc-sc-set-as-default-icon.png) **Mark as default**.
- Select the login page from the list by clicking anywhere in the row other than the check box next to the name. In the details flyout that opens, click ![Mark as default icon.](../../media/m365-cc-sc-set-as-default-icon.png) **Mark as default**. - Select **Make this the default login page** on the **Configure login page** page in the wizard when you [create or modify a login page](#create-login-pages).
security Attack Simulation Training Payload Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-payload-automations.md
The following information is shown for each payload automation<sup>\*</sup>:
- **Last modified** - **Status**: The value is **Ready** or **Draft**.
-<sup>\*</sup> To see all of the columns, you might need to narrow some columns or zoom out in your browser.
+<sup>\*</sup> To see all columns, you'll likely need to do one or more of the following steps:
+
+- Horizontally scroll in your web browser.
+- Narrow the width of appropriate columns.
+- Remove columns from the view.
+- Zoom out in your web browser.
When you select a payload automation from the list, a details flyout appears with the following information:
security Attack Simulation Training Payloads https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-payloads.md
description: Admins can learn how to create and manage payloads for Attack simulation training in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Previously updated : 3/29/2023 Last updated : 4/3/2023
-# Payloads in Attack simulation training in Defender for Office 365
+# Payloads in Attack simulation training
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
Last updated 3/29/2023
In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, a _payload_ is the phishing email message and links or attachment content that's presented to users in simulations. Attack simulation training offers a robust built-in payload catalog for the available social engineering techniques. However, you might want to create custom payloads that will work better for your organization.
+For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
+ To see the available payloads, open the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Payloads**. To go directly to the **Content library** tab where you can select **Payloads**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>. **Payloads** in the **Content library** tab has three tabs:
The following information is shown for each payload on the **Global payloads** a
- **Link to Malware** - **Drive-by URL** - **OAuth Consent Grant**-- **Status**: The value is **Ready** or **Draft**. On the **Global payloads** tab, the value is always **Ready**.-
-<sup>\*</sup> To see all of the columns, you might need to narrow some columns or zoom out in your browser.
+- **Status**: Values are:
+ - **Ready**
+ - **Draft**: Available only on the **Tenant payloads** tab.
+ - **Archive**: Archived payloads are visible only when **Show archived payloads** is toggled on ![Toggle on icon.](../../media/scc-toggle-on.png).
+- **Γï«** (**Actions** control): Take action on the payload. The available actions depend on the **Status** value of the payload as described in the procedure sections. This control always appears at the end of the payload row.
Click a column header to sort by that column. To add or remove columns, click ![Customize columns icon.](../../media/m365-cc-sc-customize-icon.png) **Customize columns**. By default, the only available column that's not selected is **Platform**.
+<sup>\*</sup> To see all columns, you'll likely need to do one or more of the following steps:
+
+- Horizontally scroll in your web browser.
+- Narrow the width of appropriate columns.
+- Remove columns from the view.
+- Zoom out in your web browser.
+ To find a payload in the list, type part of the payload name in the ![Search icon.](../../media/m365-cc-sc-search-icon.png) **Search** box and then press the ENTER key. Click ![Filter icon.](../../media/m365-cc-sc-filter-icon.png) to filter the payloads by one or of the following values:
Click ![Filter icon.](../../media/m365-cc-sc-filter-icon.png) to filter the payl
When you're finished configuring filters, click **Apply**, **Cancel**, or ![Clear filters icon.](../../media/m365-cc-sc-clear-filters-icon.png) **Clear filters**.
-When you select a payload from the list by clicking anywhere in the row other than the check box next to the name, a details flyout appears with the following information:
+When you select a payload by clicking anywhere in the row other than the check box next to the name, a details flyout appears with the following information:
- **Overview** tab: View the payload as users will see it. Payload properties are also visible: - **Payload description**
When you select a payload from the list by clicking anywhere in the row other th
- **Compromised rate** - **Action**: Clicking the **View details** link takes you to the details of the simulation.
+To see payloads that have been archived (the **Status** value is **Archive**), use the **Show archived payloads** toggle on the **Tenant payloads** tab.
+ ## Create payloads > [!NOTE]
When you select a payload from the list by clicking anywhere in the row other th
:::image type="content" source="../../media/attack-sim-training-payload-create.png" alt-text="Create a payload on the Tenant payloads tab in Payloads in Attack simulation training in the Microsoft 365 Defender portal." lightbox="../../media/attack-sim-training-payload-create.png"::: > [!NOTE]
- > At any point after you name the payload during the new payload wizard, you can click **Save and close** to save your progress and continue later. The incomplete payload has the **Status** value **Draft**. You can pick up where you left off by selecting the payload from the list and then clicking the ![Edit payload icon.](../../media/m365-cc-sc-edit-icon.png) **Edit payload** icon that appears.
+ > At any point after you name the payload during the new payload wizard, you can click **Save and close** to save your progress and continue later. The incomplete payload has the **Status** value **Draft**. You can pick up where you left off by selecting the payload and then clicking the ![Edit payload icon.](../../media/m365-cc-sc-edit-icon.png) **Edit payload** icon that appears.
> > You can also create payloads during the creation of simulations. For more information, see [Create a simulation: Select a payload and login page](attack-simulation-training-simulations.md#select-a-payload-and-login-page).
When you select a payload from the list by clicking anywhere in the row other th
Back on the **Add indicators** page, you can review the indicators you selected:
- - To edit an existing indicator, select it from the list and then click ![Edit indicator icon.](../../media/m365-cc-sc-edit-icon.png) **Edit indicator**.
+ - To edit an existing indicator, select it and then click ![Edit indicator icon.](../../media/m365-cc-sc-edit-icon.png) **Edit indicator**.
- - To delete an existing indicator, select it from the list and then click ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete**.
+ - To delete an existing indicator, select it and then click ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Delete**.
- - To move indicators up or down in the list, select the indicator from the list, and then click ![Move up icon.](../../media/m365-cc-sc-increase-icon.png) **Move up** or ![Move down icon.](../../media/m365-cc-sc-decrease-icon.png) **Move down**.
+ - To move indicators up or down in the list, select the indicator, and then click ![Move up icon.](../../media/m365-cc-sc-increase-icon.png) **Move up** or ![Move down icon.](../../media/m365-cc-sc-decrease-icon.png) **Move down**.
When you're finished on the **Add indicators** page, click **Next**.
When you select a payload from the list by clicking anywhere in the row other th
9. Back on the **Tenant payloads** tab, the payload that you created is now listed with the **Status** value **Ready**.
+## Take action on payloads
+
+> [!TIP]
+> To see the **Γï«** (**Actions**) control on the **Global payloads** or **Tenant payloads** tabs, you'll likely need to do one or more of the following steps:
+>
+> - Horizontally scroll in your web browser.
+> - Narrow the width of appropriate columns.
+> - Remove columns from the view.
+> - Zoom out in your web browser.
+ ## Modify payloads You can't modify built-in payloads on the **Global payloads** tab. You can only modify custom payloads on the **Tenant payloads** tab. To modify an existing payload on the **Tenant payloads** tab, do one of the following steps: -- Select the payload from the list by clicking the check box next to the name. Click the ![Edit payload icon.](../../media/m365-cc-sc-edit-icon.png) **Edit payload** icon that appears.-- Select the payload from the list by clicking anywhere in the row other than the check box. In the details flyout that opens, click **Edit payload** at the bottom of the flyout.
+- Select the payload by clicking the check box next to the name. Click the ![Edit payload icon.](../../media/m365-cc-sc-edit-icon.png) **Edit payload** icon that appears.
+- Select the payload by clicking anywhere in the row other than the check box. In the details flyout that opens, click **Edit payload** at the bottom of the flyout.
+- Select the payload by clicking **Γï«** (**Actions**) at the end of the row, and then select ![Edit payload icon.](../../media/m365-cc-sc-edit-icon.png) **Edit**.
The payload wizard opens with the settings and values of the selected payload. The steps are the same as described in the [Create payloads](#create-payloads) section. ## Copy payloads
-To copy an existing payload on the **Tenant payloads** or **Global payloads** tabs, select the payload from the list by clicking the check box next to the name, and then click the ![Copy payload icon.](../../media/m365-cc-sc-edit-icon.png) **Copy payload** icon that appears.
+To copy an existing payload on the **Tenant payloads** or **Global payloads** tabs, do one of the following steps:
+
+- Select the payload by clicking the check box next to the name, and then click the ![Copy payload icon.](../../media/m365-cc-sc-edit-icon.png) **Copy payload** icon that appears.
+- Select the payload by clicking **Γï«** (**Actions**) at the end of the row, and then select ![Copy payload icon.](../../media/m365-cc-sc-edit-icon.png) **Copy payload**.
The create payload wizard opens with the settings and values of the selected payload. The steps are the same as described in the [Create payloads](#create-payloads) section. > [!NOTE] > When you copy a built-in payload on the **Global payloads** tab, be sure to change the **Name** value. If you don't, the payload will appear on the **Tenant payloads** page with the same name as the built-in payload.
+## Archive payloads
+
+You can't delete custom payloads from the **Tenant payloads** tab, but you can archive them.
+
+To archive an existing payload on the **Tenant payloads** tab, select the payload by clicking **Γï«** (**Actions**) at the end of the row, and then select ![Archive icon.](../../media/m365-cc-sc-archive-icon.png) **Archive**.
+
+The **Status** value of the payload changes to **Archive**, and the payload is no longer visible on the **Tenant payloads** table when **Show archived payloads** is toggled off ![Toggle off icon.](../../media/scc-toggle-off.png).
+
+To see archived payloads on the **Tenant payloads** tab, toggle **Show archived payloads** to on ![Toggle on icon.](../../media/scc-toggle-on.png).
+
+## Restore archived payloads
+
+To restore an archive payload on the **Tenant payloads** tab, do the following steps:
+
+1. Set the **Show archived payloads** toggle to on ![Toggle on icon.](../../media/scc-toggle-on.png).
+2. Select the payload by clicking **Γï«** (**Actions**) at the end of the row, and then select ![Restore icon.](../../media/m365-cc-sc-archive-icon.png) **Restore**.
+
+After you've restored the archived payload, the **Status** value changes to **Draft**. Toggle **Show archived payloads** to off ![Toggle off icon.](../../media/scc-toggle-off.png) to see the restored payload. To return the payload to the **Status** value **Ready**, [edit the payload](#modify-payloads), review or change the settings, and then click **Submit**.
+ ## Send a test On the **Tenant payloads** or **Global payloads** tabs, you can send a copy of the payload email to yourself (the currently logged in user) for inspection.
-Select the payload from the list by clicking the check box next to the name, and then click the ![Send a test icon.](../../media/m365-cc-sc-send-icon.png) **Send a test** button that appears.
+Select the payload by clicking the check box next to the name, and then click the ![Send a test icon.](../../media/m365-cc-sc-send-icon.png) **Send a test** button that appears.
## Related links
security Attack Simulation Training Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-settings.md
+
+ Title: Global settings in Attack simulation training
+++
+audience: ITPro
++
+ms.localizationpriority: medium
+
+ - m365-security
+ - tier2
+description: Admins can learn how to configure the repeat offender threshold and exclude simulations from reporting in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
+
+search.appverid: met150
Last updated : 4/3/2023++
+# Global settings in Attack simulation training
++
+**Applies to**
+ [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md)
+
+In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, the **Settings** tab contains settings that affect all simulations:
+
+- **Repeat offender threshold**: A _repeat offender_ is someone who gives up their credentials in multiple consecutive simulations. How many simulations in a row constitutes a repeat offender is determined by the repeat offender threshold. Information about repeat offenders appears in the following locations:
+ - The [Repeat offenders card on the Overview tab](attack-simulation-training-insights.md#repeat-offenders-card) and the [Repeat offenders tab in the Attack simulation report](attack-simulation-training-insights.md#repeat-offenders-tab-for-the-attack-simulation-report).
+ - When you select users in [simulations](attack-simulation-training-simulation-automations.md#target-users), [simulation automations](attack-simulation-training-simulation-automations.md#target-users), and [training simulations](attack-simulation-training-training-campaigns.md#target-users), you can find and filter repeat offenders.
+
+- **View exclude simulations from reporting**: After a simulation has completed, you can exclude the results of the simulation from reporting. For instructions, see [Exclude completed simulations from reporting](attack-simulation-training-simulations.md#exclude-completed-simulations-from-reporting). You can use the the **View all** link in this section to see excluded simulations on the **Simulations** tab.
+
+To get to the **Settings** tab, open the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Login pages**. To go directly to the **Settings** tab, use <https://security.microsoft.com/attacksimulator?viewid=setting>.
+
+For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
+
+## Configure the repeat offender threshold
+
+To configure the repeat offender threshold, use the box in the **Repeat offender threshold** section on the **Settings** tab. The default value is 2.
+
+## View simulations excluded from reporting
+
+To view completed simulations that have been excluded from reporting on the **Settings** tab, click the **View all** link in the **Simulations excluded from reporting** section. This link takes you to the **Simulations** tab at <https://security.microsoft.com/attacksimulator?viewid=simulations> where **Show excluded simulations** is automatically toggled on ![Toggle on icon.](../../media/scc-toggle-on.png).
+
+On the **Simulations** tab, both excluded _and_ included completed simulations are shown on the **Simulations** tab together. You can tell the difference by the **Status** values (**Excluded** vs. **Completed**)
+
+If you go directly to the **Simulations** tab and manually toggle **Show excluded simulations** on ![Toggle on icon.](../../media/scc-toggle-on.png), _only_ excluded simulations are shown.
+
+To exclude completed simulations from reporting, see [Exclude completed simulations from reporting](attack-simulation-training-simulations.md#exclude-completed-simulations-from-reporting).
security Attack Simulation Training Simulation Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations.md
On the **Target users** page, select who will receive the simulation. Use the fo
- **Suggested user groups**: Select from the following values: - **All suggested user groups** - **Users not targeted by a simulation in the last three months**
- - **Repeat offenders**
+ - **Repeat offenders**: For more information, see [Configure the repeat offender threshold](attack-simulation-training-settings.md#configure-the-repeat-offender-threshold).
- **User tags**: User tags are identifiers for specific groups of users (for example, Priority accounts). For more information, see [User tags in Microsoft Defender for Office 365](user-tags-about.md). Use the following options: - **Search**: In ![Search by user tags icon.](../../media/m365-cc-sc-search-icon.png) **Search by user tags**, you can type part of the user tag and then press Enter. You can select some or all of the results.
security Attack Simulation Training Simulations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-simulations.md
description: Admins can learn how to simulate phishing attacks and train their users on phishing prevention using Attack simulation training in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Previously updated : 3/29/2023 Last updated : 4/3/2023
-# Simulate a phishing attack with Attack simulation training in Defender for Office 365
+# Simulate a phishing attack with Attack simulation training
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
To launch a simulated phishing attack, do the following steps:
The following sections describe the steps and configuration options to create a simulation. > [!NOTE]
- > At any point after you name the simulation during the new simulation wizard, you can click **Save and close** to save your progress and continue later. The incomplete simulation has the **Status** value **Draft**. You can pick up where you left off by selecting the simulation from the list and then clicking the ![Edit simulation icon.](../../media/m365-cc-sc-edit-icon.png) **Edit simulation** icon that appears.
+ > At any point after you name the simulation during the new simulation wizard, you can click **Save and close** to save your progress and continue later. The incomplete simulation has the **Status** value **Draft**. You can pick up where you left off by selecting the simulation and then clicking the ![Edit simulation icon.](../../media/m365-cc-sc-edit-icon.png) **Edit simulation** icon that appears.
## Select a social engineering technique
When you're finished on the **Name simulation** page, click **Next**.
## Select a payload and login page
-On the **Select payload and login page** page, you need to select an existing payload from the list or create a new payload.
+On the **Select payload and login page** page, you need to select an existing payload or create a new payload.
For the **Credential Harvest** or **Link in Attachment** social engineering techniques, you can also view the login page that's used in the payload, select a different login page to use, or create a new login page to use.
If you click ![Filter payload icon.](../../media/m365-cc-sc-filter-icon.png), th
When you're finished configuring filters, click **Apply**, **Cancel**, or ![Clear filters icon.](../../media/m365-cc-sc-clear-filters-icon.png) **Clear filters**.
-If you select a payload from the list by selecting the check box next to the name, a ![Send a test payload icon.](../../media/m365-cc-sc-create-icon.png) **Send a test** button appears above the list of payloads. You can use this button to send a copy of the payload email to yourself (the currently logged in user) for inspection.
+If you select a payload by selecting the check box next to the name, a ![Send a test payload icon.](../../media/m365-cc-sc-create-icon.png) **Send a test** button appears above the list of payloads. You can use this button to send a copy of the payload email to yourself (the currently logged in user) for inspection.
If no payloads are available or if you want to create your own payload, click ![Create a payload icon.](../../medi#create-payloads). :::image type="content" source="../../media/attack-sim-training-simulations-select-payload.png" alt-text="The Select payload page in Attack simulation training in the Microsoft 365 Defender portal" lightbox="../../media/attack-sim-training-simulations-select-payload.png":::
-If you select a payload from the list by clicking anywhere in the row other than the check box next to the name, details about the payload are shown in a flyout:
+If you select a payload by clicking anywhere in the row other than the check box next to the name, details about the payload are shown in a flyout:
- The **Overview** tab (named **Payload** in **Credential Harvest** and **Link in Attachment** payloads) contains details about the payload, include a preview. - The **Login page** tab is available only for **Credential Harvest** or **Link in Attachment** payloads and is described in the [Select a login page](#select-a-login-page) subsection.
To select the login page that's used in **Credential Harvest** or **Link in Atta
> [!NOTE] > The **Login page** tab is available only in the details flyout of **Credential Harvest** or **Link in Attachment** payloads.
-On the **Select payload and login page** page, select the payload from the list by clicking anywhere in the row other than the check box to open the details flyout for the payload.
+On the **Select payload and login page** page, select the payload by clicking anywhere in the row other than the check box to open the details flyout for the payload.
In the details flyout of the payload, the **Login page** tab shows the login page that's currently selected for the payload.
On the **Target users** page, select who will receive the simulation. Use the fo
- **Suggested user groups**: Select from the following values: - **All suggested user groups** - **Users not targeted by a simulation in the last three months**
- - **Repeat offenders**
+ - **Repeat offenders**: For more information, see [Configure the repeat offender threshold](attack-simulation-training-settings.md#configure-the-repeat-offender-threshold).
- **User tags**: User tags are identifiers for specific groups of users (for example, Priority accounts). For more information, see [User tags in Microsoft Defender for Office 365](user-tags-about.md). Use the following options: - **Search**: In ![Search by user tags icon.](../../media/m365-cc-sc-search-icon.png) **Search by user tags**, you can type part of the user tag and then press Enter. You can select some or all of the results.
Back on the **Training assignment** page, the selected trainings are now listed.
- **Training name** - **Source** - **Duration (mins)**-- **Assign to**: For each training in the list, you need to select who gets the training by selecting from the following values:
+- **Assign to**: For each training, you need to select who gets the training by selecting from the following values:
- **All users** - One or both of the values **Clicked payload** or **Compromised**. - **Delete**: Click ![Delete training icon.](../../media/m365-cc-sc-delete-icon.png) **Delete** to remove the training from the simulation.
By default, the following information is shown for each simulation<sup>\*</sup>:
- **Completed** - **Failed** - **Cancelled**
+ - **Excluded**
+- **Γï«** (**Actions** control): Take action on the simulation. The available actions depend on the **Status** value of the simulation as described in the procedure sections. This control always appears at the end of the row.
-<sup>\*</sup> To see all of the columns, you might need to narrow some columns or zoom out in your browser.
+Click a column header to sort by that column. To add or remove columns, click ![Customize columns icon.](../../media/m365-cc-sc-customize-icon.png) **Customize columns**. By default, all available columns are selected.
-Click a column header to sort by that column. To remove columns, click ![Customize columns icon.](../../media/m365-cc-sc-customize-icon.png) **Customize columns**.
+<sup>\*</sup> To see all columns, you'll likely need to do one or more of the following steps:
+
+- Horizontally scroll in your web browser.
+- Narrow the width of appropriate columns.
+- Remove columns from the view.
+- Zoom out in your web browser.
Use the ![Search icon.](../../media/m365-cc-sc-search-icon.png) **Search** box to search for the name of an existing simulation.
-Click ![Filter simulation icon.](../../media/m365-cc-sc-filter-icon.png) **Filter** to filter the simulations by **Technique** or **Status**.
+Click ![Filter simulation icon.](../../media/m365-cc-sc-filter-icon.png) **Filter** to filter the simulations by **Technique** or **Status** (all **Status** values except for **Excluded**).
When you're finished configuring filters, click **Apply**, **Cancel**, or ![Clear filters icon.](../../media/m365-cc-sc-clear-filters-icon.png) **Clear filters**.+
+To see simulations that have been excluded from reporting (the **Status** value is **Excluded**), use the **Show excluded simulations** toggle on the **Simulations** tab.
+
+### View simulation details
+
+To view details about a simulation, use either of the following methods on the **Simulations** tab:
+
+- Select the simulation by clicking anywhere other than the check box next to the name.
+- Select the simulation by clicking **Γï«** (**Actions**) at the end of the row, and then select ![View report icon.](../../media/m365-cc-sc-eye-icon.png) **View report**.
+
+The title of the details page that opens shows the name of the simulation and other information (for example, the status, social engineering technique, and delivery status).
+
+You can click ![View activity timeline.](../../media/m365-cc-sc-view-activity-timeline-icon.png) **View activity timeline** to see date/time information about the simulation (simulation scheduled, simulation launched, simulation ended, and training due dates).
+
+The rest of the details page contains the following tabs:
+
+- **Report** tab: For a description of what's on this tab, see [Attack simulation report](attack-simulation-training-insights.md#attack-simulation-report).
+
+- **Users** tab: Shows the following information for all targeted users in the simulation:
+ - **Name**
+ - **Compromised**
+ - **Reported**
+ - **Training status**
+ - **Other actions**
+ - **Compromised on**
+ - **Reported on**
+ - **Failed deliveries**
+ - **Username**
+
+ Click a column header to sort by that column. To add or remove columns, click ![Customize columns icon.](../../media/m365-cc-sc-customize-icon.png) **Customize columns**. The following additional columns are available:
+
+ - **Days out of office**
+ - **Message read on**
+ - **Message forwarded on**
+ - **Message deleted on**
+ - **Replied to message**
+ - **Department**
+ - **Company**
+ - **Job title**
+ - **Office**
+ - **City**
+ - **Country**
+ - **Manager**
+
+ To change the list of users from normal to compact spacing, click ![Change list spacing to compact or normal icon.](../../media/m365-cc-sc-standard-icon.png) **Change list spacing to compact or normal**, and then select ![Compact list icon.](../../media/m365-cc-sc-compact-icon.png).
+
+ If you click ![Filter icon.](../../media/m365-cc-sc-filter-icon.png) **Filter**, the following filters are available:
+
+ - **Compromised**: Select **Yes** or **No**.
+ - **Reported message**: Select **Yes** or **No**.
+ - **Simulation message delivery**: Select **Delivered** or **Failed to deliver**.
+ - **Other actions**: *Select one or more of the following values: **Replied to message**, **Forwarded message**, and **Deleted messages**.
+ - **Training status**: Select **Completed**, **In progress**, **Not started**, or **Not assigned**.
+ - **Assigned trainings**: Select one or more of the following values: **Mass Market Phishing**, **Report Message**, **Web Phishing**, **Anatomy of a Spear Phishing Attack**.
+
+ To find a user in the list, type part of the name in the ![Search icon.](../../media/m365-cc-sc-search-icon.png) **Search** box and then press the ENTER key.
+
+- **Details** tab: Contains details about the simulation in the following sections:
+ - **Description** section:
+ - **Delivery platform**
+ - **Type**
+ - **Landing page**
+ - **Technique**
+ - **Launch details**
+ - **Payload & login page**
+ - **Target users**: Include excluded users or groups.
+ - **Training information** section:
+ - **Training name**
+ - **Assign to**
+ - **Actions**: Click ![View icon.](../../media/m365-cc-sc-view-icon.png) **View** to see the training.
+ - **Notifications** section:
+ - **Notification name**
+ - **Notification type**
+ - **Delivery frequency**
+ - **Actions**: Click ![View icon.](../../media/m365-cc-sc-view-icon.png) **View** to see the notification.
+
+## Take action on simulations
+
+> [!TIP]
+> To see the **Γï«** (**Actions**) control that's required to act on simulations on the **Simulations** tab, you'll likely need to do one or more of the following steps:
+>
+> - Horizontally scroll in your web browser.
+> - Narrow the width of appropriate columns.
+> - Remove columns from the view.
+> - Zoom out in your web browser.
+
+### Cancel simulations
+
+You can cancel simulations with the **Status** value **In progress** or **Scheduled**.
+
+To cancel a simulation on the **Simulations** tab, select the simulation by clicking **Γï«** (**Actions**) at the end of the row, select ![Cancel simulation icon.](../../media/m365-cc-sc-close-icon.png) **Cancel simulation**, and then click **Confirm** in the confirmation dialog.
+
+After you cancel the simulation, the **Status** value changes to **Cancelled**.
+
+### Remove simulations
+
+You can't remove simulations with the **Status** value **In progress**.
+
+To remove a simulation from the **Simulations** tab, select the simulation by clicking **Γï«** (**Actions**) at the end of the row, and then select ![Delete icon.](../../media/m365-cc-sc-delete-icon.png) **Cancel simulation**, and then click **Confirm** in the confirmation dialog.
+
+After you remove the simulation, it no longer appears on the **Simulations** tab.
+
+### Exclude completed simulations from reporting
+
+The **Exclude** action is available only for simulations with the **Status** value **Competed**.
+
+To remove a simulation from the **Simulations** tab, select the simulation by clicking **Γï«** (**Actions**) at the end of the row, select ![Exclude icon.](../../media/m365-cc-sc-exclude-icon.png) **Exclude**, and then click **Confirm** in the confirmation dialog.
+
+After you exclude the completed simulation from reporting, the **Status** value changes to **Excluded**, and the simulation is no longer visible on the **Simulations** tab when the **Show excluded simulations** toggle is off ![Toggle off icon.](../../media/scc-toggle-off.png).
+
+To see completed simulations that have been excluded from reporting, use either of the following methods:
+
+- On the **Simulations** tab, toggle **Show excluded simulations** to on ![Toggle on icon.](../../media/scc-toggle-on.png). Only excluded simulations are shown.
+- On the **Settings** tab at <https://security.microsoft.com/attacksimulator?viewid=setting>, click the **View all** link in the **Simulations excluded from reporting** section. This action takes you to the **Simulations** tab where **Show excluded simulations** is toggled on ![Toggle on icon.](../../medi#view-simulations-excluded-from-reporting).
+
+### Include completed simulations in reporting
+
+By default, all completed simulations are included in reporting. A simulation is excluded from reporting only if you exclude it as described in the previous section.
+
+The **Include** action is available only for simulations with the **Status** value **Excluded**, which are visible on the **Simulations** tab only when **Show excluded simulations** is toggled on ![Toggle on icon.](../../media/scc-toggle-on.png).
+
+To include a completed session in reporting after it has been excluded, do the following steps:
+
+1. On the **Simulations** tab, set the **Show excluded simulations** toggle to on ![Toggle on icon.](../../media/scc-toggle-on.png).
+2. Select the simulation by clicking **Γï«** (**Actions**) at the end of the row, and then select ![Include icon.](../../media/m365-cc-sc-include-icon.png) **Exclude**.
+
+After you've included the excluded simulation, the **Status** value changes to **Completed**. Toggle **Show excluded simulations** to off ![Toggle off icon.](../../media/scc-toggle-off.png) to see the simulation.
+
+### View simulation reports
+
+For simulations with the **Status** value **In progress** or **Completed**, you can view the report for the simulation by using either of the following methods on the **Simulations** tab:
+
+- Select the simulation by clicking anywhere other than the check box next to the name.
+- Select the simulation by clicking **Γï«** (**Actions**) at the end of the row, and then select ![View report icon.](../../media/m365-cc-sc-eye-icon.png) **View report**.
+
+The report page for the simulation opens and contains the following information:
+
+- **Report** tab: Show the following information
+ **Simulation impact**
security Attack Simulation Training Training Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-training-campaigns.md
description: Admins can learn how to create training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Previously updated : 01/13/2023 Last updated : 4/3/2023 # Training campaigns in Attack simulation training
The **Training campaigns** tab lists the Training campaigns that you've created.
- **Deleted** - **Failed**<sup>\*</sup> - **Scheduled**<sup>\*</sup>-- **Γï« Actions**:
- - :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png"::: **Delete**
- - :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png"::: **View report**
+- **Γï«** (**Actions** control): Take action on the Training campaign. The available actions depend on the **Status** value of the Training campaign as described in the procedure sections. This control always appears at the end of the payload row.
To find a Training campaign in the list, type part of the campaign name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png"::: **Search** box and then press the ENTER key.
On the **Target users** page, select one of the following values:
- **Suggested user groups**: Select one or both of the following values: - **Users not targeted by a simulation in the last three months**
- - **Repeat offenders**
+ - **Repeat offenders**: For more information, see [Configure the repeat offender threshold](attack-simulation-training-settings.md#configure-the-repeat-offender-threshold).
- **User tags**: Select one or more of the following values. You'll need to click **See all user tags** to see all values, and custom [user tags](user-tags-about.md) aren't available: - **Priority accounts**: For more information, see [Priority accounts](../../admin/setup/priority-accounts.md).
On the **Select end user notification** page, select from the following notifica
- **Language**: If the notification contains multiple translations, the first two languages are shown directly. To see the remaining languages, hover over the numeric icon (for example, **+10**). - **Type**: **Training assignment notification** or **Training reminder notification**. - **Delivery preferences**: For **Training reminder notification** types, the values **Twice a week** and **Weekly** are available.
- - **Γï« Actions**: If you click the :::image type="icon" source="../../media/m365-cc-sc-view-icon.png"::: **View** icon, the **Review notification** page appears with the following information:
+ - **Γï«** (**Actions** control): If you click the :::image type="icon" source="../../media/m365-cc-sc-view-icon.png"::: **View** icon, the **Review notification** page appears with the following information:
- **Preview** tab: View the notification message as users will see it. To view the message in different languages, use the **Select notification language** box. - **Details** tab: View details about the notification: - **Notification description**
To view the details and reports for a Training campaign, do the following steps:
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Training** tab. Or, to go directly to the **Training** tab, use <https://security.microsoft.com/attacksimulator?viewid=trainingcampaign>. 2. On the **Training** tab, do one of the following steps:
- - Select the Training campaign by selecting the check box next to it, and then click **Γï« (Actions)** \> :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png"::: **View report**. You might need to scroll to the right to see **Γï« (Actions)**.
+ - Select the Training campaign by selecting the check box next to it, and then click **Γï«** (**Actions**) \> :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png"::: **View report**. You might need to scroll to the right to see **Γï«** (**Actions**).
- In the list of Training campaigns, click anywhere in the row without selecting the check box (for example, on the **Name** value). 3. A details page for the Training campaign opens with the following tabs:
To delete an existing Training campaign, do the following steps:
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Training** tab. Or, to go directly to the **Training** tab, use <https://security.microsoft.com/attacksimulator?viewid=trainingcampaign>.
-2. On the **Training** tab, select the Training campaign by selecting the check box next to it, and then click **Γï« (Actions)** \> :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png"::: **Delete**. You might need to scroll to the right to see **Γï« (Actions)**.
+2. On the **Training** tab, click **Γï«** (**Actions**) in the Training \> :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png"::: **Delete**. You might need to scroll to the right to see **Γï«** (**Actions**).
3. Click **Confirm** in the warning dialog that opens.
security Create Safe Sender Lists In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/create-safe-sender-lists-in-office-365.md
The following example assumes you need email from contoso.com to skip spam filte
1. **Modify the message properties** \> **set the spam confidence level (SCL)** \> **Bypass spam filtering**. 2. **Modify the message properties** \> **set a message header**: - **Header name**: For example, `X-ETR`.
- - **Heaver value**: For example, `Bypass spam filtering for authenticated sender 'contoso.com'`.
+ - **Header value**: For example, `Bypass spam filtering for authenticated sender 'contoso.com'`.
If you've more than one domain in the rule, you can customize the header text as appropriate.
syntex Site Templates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/site-templates.md
+
+ Title: Site templates for Microsoft Syntex
+++
+audience: admin
+ Last updated : 04/03/2023++
+search.appverid:
+
+ - enabler-strategic
+ - m365initiative-syntex
+ms.localizationpriority: medium
+description: Learn how to use and customize the ready-to-use site templates for Microsoft Syntex.
++
+# Site templates for Microsoft Syntex
+
+SharePoint site templates for Microsoft Syntex are prebuilt, ready-to-deploy, and customizable. Use these templates to create a professional site to manage, process, and track the status of business documents in your organization.
+
+|Site template |Description |
+|||
+|[**Accounts payable**](https://support.microsoft.com/office/c7ff13e7-66d9-4040-b8c6-78924272ec4d)<br>[:::image type="content" source="../media/content-understanding/site-template-accounts-payable-thumbnail.png" alt-text="Thumbnail image for the accounts payable site template.":::](https://support.microsoft.com/office/c7ff13e7-66d9-4040-b8c6-78924272ec4d) |<br>Manage, process, and track purchase orders, invoices, and related files. <br> - Use Microsoft Syntex to organize and classify files.<br> - Extract key information using a prebuilt invoice model.<br> - Share important information, such as new or policies.<br> - Store files in preconfigured document libraries.<br> - Generate files efficiently using modern templates. <br>[Learn more about the accounts payable site template](https://support.microsoft.com/office/c7ff13e7-66d9-4040-b8c6-78924272ec4d) |
+|[**Contracts management**](https://support.microsoft.com/office/80820115-c700-4a62-bb59-69b33c8e3b4f)<br>[:::image type="content" source="../media/content-understanding/site-template-contracts-management-thumbnail.png" alt-text="Thumbnail image for the contracts management site template.":::](https://support.microsoft.com/office/80820115-c700-4a62-bb59-69b33c8e3b4f) |<br>Create, manage, process, store, and track contract documents. <br> - Use Microsoft Syntex to organize and classify files.<br> - Store files in preconfigured document libraries.<br> - Generate files efficiently using modern templates.<br> - Provide templates for each contract type.<br> - Add other workflows to streamline your processes.<br>[Learn more about the contracts management site template](https://support.microsoft.com/en-us/office/80820115-c700-4a62-bb59-69b33c8e3b4f) |
+|[**Content center**](use-content-center-site.md)<br>[:::image type="content" source="../medi) |
+++