Updates from: 04/06/2023 01:40:17
Category Microsoft Docs article Related commit history on GitHub Change details
admin Activity Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/activity-reports.md
Depending on your subscription, here are the available reports in all environmen
|[Viva Learning activity](viva-learning-activity.md)|Yes|N/A|N/A|N/A|N/A| |[Viva Insights activity](viva-insights-activity.md)|Yes|Yes|N/A|N/A|N/A| |[Project activity](project-activity.md)|Yes|Yes|N/A|N/A|N/A|
+|[Visio activity](visio-activity.md)|Yes|Yes|N/A|N/A|N/A|
N/A<sup>1</sup>: The report is in plan to be released in the future. The <a href="https://www.microsoft.com/en-us/microsoft-365/roadmap?filters=" target="_blank">Microsoft 365 Roadmap</a> will be updated before the release. N/A<sup>2</sup>: The service is not available in the environment so no plan to release the report.
admin Microsoft Teams Usage Activity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/microsoft-teams-usage-activity.md
audience: Admin
ms.localizationpriority: medium- - Tier2 - scotvorg
admin Microsoft Teams User Activity Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/microsoft-teams-user-activity-preview.md
audience: Admin
ms.localizationpriority: medium- - Tier2 - scotvorg
admin Project Activity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/project-activity.md
audience: Admin
ms.localizationpriority: medium- - Tier2 - scotvorg
The **Project activity** report can be viewed for trends over the last 7 days, 3
### Privacy settings impact on the dashboard
-If users or admins hae their privacy settings set to **Neither**, we do not have accurate metrics for the **Project activity** chart for the Project Online desktop client. The numbers shown will be undercounted. For more information on privacy settings, see [Use policy settings to manage privacy controls for for Microsoft 365 Apps for enterprise](/deployoffice/privacy/manage-privacy-controls.md).
+If users or admins have their privacy settings set to **Neither**, we do not have accurate metrics for the **Project activity** chart for the Project Online desktop client. The numbers shown will be undercounted. For more information on privacy settings, see [Use policy settings to manage privacy controls for for Microsoft 365 Apps for enterprise](/deployoffice/privacy/manage-privacy-controls).
## User activity table
admin Visio Activity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/visio-activity.md
search.appverid:
- MST160 - MET150 - MOE150- description: "Learn how to get the Visio activity report and gain insights into Visio activity in your organization."
admin Pilot Microsoft 365 From My Custom Domain https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/pilot-microsoft-365-from-my-custom-domain.md
Microsoft 365 uses Exchange Online Protection (EOP) for spam protection. EOP mig
> [!NOTE] > Unblocking your existing email server allows any spam that arrives through your original server to come to the Microsoft 365 mailboxes, and you can't evaluate how well Microsoft 365 prevents spam.
-1. In the Exchange admin center navigation pane, select **Protection**, and then select **Connection filter**.
+1. Sign in to Microsoft 365 Defender(https://security.microsoft.com/antispam), select **Policies & rules**, Click on **Threat policies** and then select **Anti-spam policies**.
-2. In the **IP Allow list**, select **+**, and add the mail server IP address for your current email provider.
+2. Select **Connection filter policy (Default)**, and click on Edit **Edit connection filter policy** and add the mail server IP address for your current email provider in the **Always allow messages from the following IP addresses or address range** Section.
### Step 5: Create user accounts and set the primary reply-to address
When you complete this step, all email sent to usera@yourcompany.com and userb@y
Because you are moving only two test users, and User A and User B are both using Outlook, you can move the email by opening the old .PST file in the new Outlook profile and copying the messages, calendar items, contacts, and so on. For more information, see [Import email, contacts, and calendar from an Outlook .pst file](https://support.microsoft.com/office/import-email-contacts-and-calendar-from-an-outlook-pst-file-431a8e9a-f99f-4d5f-ae48-ded54b3440ac). After they're imported to the appropriate locations in the Microsoft 365 mailbox, the items can be accessed from any device, anywhere.+
+## More resources
+
+[Enhanced Filtering for Connectors in Exchange Online](/Exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors)
commerce Cancel Your Subscription https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/cancel-your-subscription.md
- admindeeplinkMAC search.appverid: MET150 description: "Learn how to cancel your Dynamics 365, Intune, Power Platform, and Microsoft 365 for business trial or paid subscriptions in the Microsoft 365 admin center." Previously updated : 01/10/2023 Last updated : 04/04/2023 # Cancel your Microsoft business subscription Check out all of our small business content on [Small business help & learning](https://go.microsoft.com/fwlink/?linkid=2224585).
-This article only applies to canceling **Dynamics 365**, **Intune**, **Power Platform**, **Windows 365**, and **Microsoft 365 for business** subscriptions. If you have Microsoft 365 Family or Personal, see [Cancel a Microsoft 365 subscription](https://support.microsoft.com/office/cancel-a-microsoft-365-subscription-46e2634c-c64b-4c65-94b9-2cc9c960e91b?OCID=M365_DocsCancel_Link).
+This article only applies to canceling **Dynamics 365**, **Intune**, **Power Platform**, **Windows 365**, and **Microsoft 365 for business** subscriptions. If you have an Azure subscription, see [Cancel your Azure subscription](/azure/cost-management-billing/manage/cancel-azure-subscription). If you have Microsoft 365 Family or Personal, see [Cancel a Microsoft 365 subscription](https://support.microsoft.com/office/cancel-a-microsoft-365-subscription-46e2634c-c64b-4c65-94b9-2cc9c960e91b?OCID=M365_DocsCancel_Link).
> [!WARNING] > Before you cancel a subscription, make sure your users [save their data](#save-your-data).
This article only applies to canceling **Dynamics 365**, **Intune**, **Power Pla
## Before you begin - You must be a Global or Billing admin to do the tasks in this article. For more information, see [About admin roles](../../admin/add-users/about-admin-roles.md).
+- If you have a billing profile, you must also be a billing account owner or billing account contributor to do the tasks in this article. [Find out if you have a billing profile](../billing-and-payments/manage-billing-profiles.md#view-my-billing-profiles). For more information about billing account roles, see [Understand access to billing accounts](../manage-billing-accounts.md).
- If you added your own domain name to use with your subscription, you must [remove the domain](../../admin/get-help-with-domains/remove-a-domain.md) before you cancel your subscription. - If you have a domain subscription, to prevent any other charges for that subscription, [turn off recurring billing](renew-your-subscription.md).
The steps to cancel your trial or paid subscription depend on the number of lice
|If your subscription has |You can | |--|--|
-|25 or fewer licenses | [Use the steps below to cancel](#steps-to-cancel-your-subscription) your trial or paid subscription online in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>. |
-|More than 25 licenses | Reduce the number of licenses to 25 or fewer and then [use the steps below to cancel](#steps-to-cancel-your-subscription). |
+|25 or fewer licenses | [Use the steps later in this article to cancel your trial or paid subscription](#steps-to-cancel-your-subscription) online in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>. |
+|More than 25 licenses | Reduce the number of licenses to 25 or fewer and then [use the steps later in this article to cancel](#steps-to-cancel-your-subscription). |
If you can't reduce the number of licenses, [turn off recurring billing](renew-your-subscription.md). Turning off recurring billing prevents you from being charged again for your subscription, and lets you keep your access to your products and services for the remainder of your subscription.
If you're unable to cancel your subscription, [contact support](../../admin/get-
## Steps to cancel your subscription > [!NOTE]
-> If you have multiple subscriptions to the same product, such as Microsoft 365 Business Premium, canceling one subscription won't impact the licenses or services that you bought inside inside the other subscriptions.
+> If you have multiple subscriptions to the same product, such as Microsoft 365 Business Premium, canceling one subscription won't impact the licenses or services that you bought inside the other subscriptions.
::: moniker range="o365-worldwide"
If you're unable to cancel your subscription, [contact support](../../admin/get-
4. Select **Save**.
-Your subscription now appears in a **Disabled** state, and has reduced functionality until it's deleted. For information about what you can expect when you cancel a paid Microsoft 365 for business subscription, see [What happens to my data and access when my Microsoft 365 for business subscription ends?](what-if-my-subscription-expires.md)
+Your subscription now appears in a **Disabled** state, and has reduced functionality until it's deleted. For information about what to expect when you cancel a paid Microsoft 365 for business subscription, see [What happens to my data and access when my Microsoft 365 for business subscription ends?](what-if-my-subscription-expires.md)
> [!NOTE] > If you're a partner who's an admin on behalf of (AOBO) a customer, and you've canceled a subscription, it can take up to 90 days for the admin center to reflect the status change.
When the cancellation becomes effective, your users lose access to their data. B
### Uninstall Microsoft 365 (optional)
-If you canceled your subscription, and didn't [move users to a different subscription](move-users-different-subscription.md) that includes Microsoft 365, Microsoft 365 runs in reduced functionality mode. When this happens, users can only read and print documents, and Microsoft 365 apps display [Unlicensed Product notifications](https://support.microsoft.com/office/0d23d3c0-c19c-4b2f-9845-5344fedc4380). To avoid any confusion, have your users [uninstall Microsoft 365](https://support.microsoft.com/office/9dd49b83-264a-477a-8fcc-2fdf5dbf61d8) from their computers.
+If you canceled your subscription and didn't [move users to a different subscription](move-users-different-subscription.md) that includes Microsoft 365, Microsoft 365 runs in reduced functionality mode. When this happens, users can only read and print documents, and Microsoft 365 apps display [Unlicensed Product notifications](https://support.microsoft.com/office/0d23d3c0-c19c-4b2f-9845-5344fedc4380). To avoid any confusion, have your users [uninstall Microsoft 365](https://support.microsoft.com/office/9dd49b83-264a-477a-8fcc-2fdf5dbf61d8) from their computers.
### Close your account (optional)
compliance Apply Retention Labels Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-retention-labels-automatically.md
Other considerations for simulation mode for auto-apply retention policies:
- A maximum of 100 item samples can be collected per mailbox. - If you use [adaptive scopes](retention.md#adaptive-or-static-policy-scopes-for-retention) for your policy: - A maximum of 20,000 locations (any combination of sites and mailboxes) is supported.
- - Because these scopes use dynamic queries that run daily and can take a few days to fully populate, wait and confirm their membership before you start simulation.
+ - Because these scopes use dynamic queries that run daily and can take a few days to fully populate, wait and [confirm their membership](purview-adaptive-scopes.md#confirm-scope-membership) before you start simulation.
+ - For the **Microsoft 365 Group mailboxes & sites** location, items stored in [AuxPrimary mailboxes](/powershell/module/exchange/get-mailboxlocation#-mailboxlocationtype) aren't supported.
- You might need to be assigned additional permissions to see the simulation results. For information about the required roles, see the next section, [Before you begin](#before-you-begin). - Simulation counts all items matching the policy criteria at time of simulation. However, when the policy is turned on, only content that isn't already labeled will be eligible for auto-applying retention labels.-- Because simulation for Exchange locations always runs against emails stored in mailboxes, rather than emails sent and received, you won't see simulation results for emails when the policy condition is for sensitive information types.
+- Although auto-labeling for sensitive information types applies to emails sent and received rather than emails stored in mailboxes, simulation for Exchange locations runs against against emails stored in mailboxes. Using historical data lets you more quickly assess the effectiveness of your chosen sensitive information types and configuration.
+- For the **Microsoft 365 Group mailboxes & sites** and **OneDrive accounts** locations: Items that are stored in [arbitration mailboxes](/powershell/module/exchange/new-mailbox#-arbitration) aren't supported for simulation.
- Because simulation results are based on items available in the specified locations at the time the simulation job runs, remember to take the following considerations into account when you turn on the policy: - Items that are no longer within the specified location won't be labeled. - Items that no longer match the policy criteria won't be labeled.
compliance Audit Teams Audit Log Events https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-teams-audit-log-events.md
+
+ Title: Search the audit log for events in Microsoft Teams
+description: "Learn how to retrieve Microsoft Teams data from the audit log in the Microsoft Purview compliance portal."
++++
+audience: admin
++
+- tier1
+- purview-compliance
+- M365-collaboration
+- audit
+f1.keywords:
+- NOCSH
+ Last updated : 03/2/2023
+search.appverid: MET150
+appliesto:
+ - Microsoft Teams
++
+# Search the audit log for events in Microsoft Teams
+
+> [!IMPORTANT]
+> [!INCLUDE [new-teams-sfb-admin-center-notice](../includes/new-teams-sfb-admin-center-notice.md)]
+
+The audit log can help you investigate specific activities across Microsoft 365 services. For Microsoft Teams, here are some of the activities that are audited:
+
+- Team creation
+- Team deletion
+- Added channel
+- Deleted channel
+- Changed channel setting
+
+For a complete list of Teams activities that are audited, see [Teams activities](#teams-activities) and [Shifts in Teams activities](#shifts-in-teams-activities).
+
+> [!NOTE]
+> Audit events from private channels are also logged as they are for teams and standard channels.
+
+## Turn on auditing in Teams
+
+Before you can look at audit data, you have to first turn on auditing in the Microsoft Purview compliance portal. For more information, see [Turn auditing on or off](turn-audit-log-search-on-or-off.md).
+
+> [!IMPORTANT]
+> Audit data is only available from the point at which you turned on auditing.
+
+## Retrieve Teams data from the audit log
+
+1. To retrieve audit logs for Teams activities, go to <https://compliance.microsoft.com> and select **Audit**.
+
+2. On the **Search** page, filter the activities, dates, and users you want to audit.
+
+3. Export your results to Excel for further analysis.
+
+For step-by-step instructions, see [Search the audit log in the compliance portal](search-the-audit-log-in-security-and-compliance.md#search-the-audit-log).
+
+> [!IMPORTANT]
+> Audit data is only visible in the audit log if auditing is turned on.
+
+The length of time that an audit record is retained and searchable in the audit log depends on your Microsoft 365 or Office 365 subscription, and specifically the type of license that's assigned to users. To learn more, see the [Security & Compliance Center service description](/office365/servicedescriptions/office-365-platform-service-description/office-365-securitycompliance-center).
+
+## Tips for searching the audit log
+
+Here are tips for searching for Teams activities in the audit log.
+
+![Screenshot of the audit log search page in the compliance portal](../media/audit-log-search-page.png)
+
+- You can select specific activities to search for by clicking the checkbox next to one or more activities. If an activity is selected, you can select it to cancel the selection. You can also use the search box to display the activities that contain the keyword that you type.
+
+ ![Screenshot of activities dropdown list on the audit log search page](../media/audit-log-search.png)
+
+- To display events for activities run using cmdlets, select **Show results for all activities** in the **Activities** list. If you know the name of the operation for these activities, type it in the search box to display the activity, and then select it.
+
+- To clear the current search criteria, select **Clear all**. The date range returns to the default of the last seven days.
+
+- If 5,000 results are found, you can probably assume that there are more than 5,000 events that met the search criteria. You can refine the search criteria and rerun the search to return fewer results, or you can export all the search results by selecting **Export** > **Download all results**. For step-by-step instructions to export audit logs, see [Export the search results to a file](search-the-audit-log-in-security-and-compliance.md#step-3-export-the-search-results-to-a-file).
+
+Check out [this video](https://www.youtube.com/embed/UBxaRySAxyE) for using audio log search. Join Ansuman Acharya, a program manager for Teams, as he demonstrates how to do an audit log search for Teams.
+
+## Teams activities
+
+Here's a list of all events that are logged for user and admin activities in Teams in the Microsoft 365 audit log. The table includes the friendly name that's displayed in the **Activities** column and the name of the corresponding operation that appears in the detailed information of an audit record and in the CSV file when you export the search results.
+
+|**Friendly name**|**Operation**|**Description**|
+|:-|:|:--|
+|Added bot to team|BotAddedToTeam|A user adds a bot to a team.|
+|Added channel|ChannelAdded|A user adds a channel to a team.|
+|Added connector|ConnectorAdded|A user adds a connector to a channel.|
+|Added details about Teams meeting <sup>2</sup>|MeetingDetail|Teams added information about a meeting, including the start time, the end time, and the URL to join the meeting.|
+|Added information about meeting participants <sup>2</sup>|MeetingParticipantDetail|Teams added information about the participants of a meeting, including the user ID of each participant, the time a participant joined the meeting, and the time a participant left the meeting.|
+|Added members|MemberAdded|A team owner adds members to a team, channel, or group chat.|
+|Added tab|TabAdded|A user adds a tab to a channel.|
+| Applied sensitivity label | SensitivityLabelApplied | A user or meeting organizer applied a sensitivity label to a Teams meeting. |
+|Changed channel setting|ChannelSettingChanged|The ChannelSettingChanged operation is logged when the following activities are performed by a team member. For each of these activities, a description of the setting that was changed (shown in parentheses is displayed in the **Item** column in the audit log search results. <ul><li>Changes name of a team channel (**Channel name**)</li><li>Changes description of a team channel (**Channel description**)</li> </ul>|
+|Changed organization setting|TeamsTenantSettingChanged|The TeamsTenantSettingChanged operation is logged when the following activities are performed by a global admin in the Microsoft 365 admin center. These activities affect org-wide Teams settings. To learn more, see [Manage Teams settings for your organization](/microsoftteams/enable-features-office-365). <br>For each of these activities, a description of the setting that was changed (shown in parentheses) is displayed in the **Item** column in the audit log search results.<ul><li>Enables or disables Teams for the organization (**Microsoft Teams**).</li><li>Enables or disables interoperability between Microsoft Teams and Skype for Business for the organization (**Skype for Business interoperability**).</li><li>Enables or disables the organizational chart view in Microsoft Teams clients (**Org chart view**).</li><li>Enables or disables the ability for team members to schedule private meetings (**Private meeting scheduling**).</li><li>Enables or disables the ability for team members to schedule channel meetings (**Channel meeting scheduling**).</li><li>Enables or disables video calling in Teams meetings (**Video for Skype meetings**).</li><li>Enables or disables screen sharing in Microsoft Teams meetups for the organization (**Screen sharing for Skype meetings**).</li><li>Enables or disables that ability to add animated images (called Giphys) to Teams conversations (**Animated images**).</li><li>Changes the content rating setting for the organization (**Content rating**). The content rating restricts the type of animated image that can be displayed in conversations.</li><li>Enables or disables the ability for team members to add customizable images (called custom memes) from the internet to team conversations (**Customizable images from the Internet**).</li><li>Enables or disables the ability for team members to add editable images (called stickers) to team conversations (**Editable images**).</li><li>Enables or disables that ability for team members to use bots in Microsoft Teams chats and channels (**Org-wide bots)**.</li><li>Enables specific bots for Microsoft Teams. This doesn't include the T-Bot, which is Teams help bot that's available when bots are enabled for the organization (**Individual bots**).</li><li>Enables or disables the ability for team members to add extensions or tabs (**Extensions or tabs**).</li><li>Enables or disables the side-loading of proprietary bots for Microsoft Teams (**Side loading of Bots**).</li><li>Enables or disables the ability for users to send email messages to a Microsoft Teams channel (**Channel email**).</li></ul>|
+|Changed role of members in team|MemberRoleChanged|A team owner changes the role of members in a team. The following values indicate the role type assigned to the user. <br><br>**1** - Indicates the Member role.<br>**2** - Indicates the Owner role.<br>**3** - Indicates the Guest role.<br><br>The Members property also includes the name of your organization and the member's email address.|
+|Changed team setting|TeamSettingChanged|The TeamSettingChanged operation is logged when the following activities are performed by a team owner. For each of these activities, a description of the setting that was changed (shown in parentheses) is displayed in the **Item** column in the audit log search results.<ul><li>Changes the access type for a team. Teams can be set as private or public (**Team access type**). When a team is private (the default setting), users can access the team only by invitation. When a team is public, it's discoverable by anyone.</li><li>Changes the information classification of a team (**Team classification**). For example, team data can be classified as high business impact, medium business impact, or low business impact.</li><li>Changes the name of a team (**Team name**).</li><li>Changes the team description (**Team description**).</li><li>Changes made to team settings. To access these settings, a team owner can right-click a team, select **Manage team**, and then select the **Settings** tab. For these activities, the name of the setting that was changed is displayed in the **Item** column in the audit log search results.</li></ul>|
+| Changed sensitivity label | SensitivityLabelChanged | A user changed a sensitivity label on a Teams meeting. |
+|Created a chat <sup>1, </sup> <sup>2</sup>|ChatCreated|A Teams chat was created.|
+|Created team|TeamCreated|A user creates a team.|
+|Deleted a message|MessageDeleted|A message in a chat or channel was deleted.|
+|Deleted all organization apps|DeletedAllOrganizationApps|Deleted all organization apps from the catalog.|
+|Deleted app|AppDeletedFromCatalog|An app has been deleted from the catalog.|
+|Deleted channel|ChannelDeleted|A user deletes a channel from a team.|
+|Deleted team|TeamDeleted|A team owner deletes a team.|
+|Edited a message with a URL link in Teams|MessageEditedHasLink|A user edits a message and adds a URL link to it in Teams.|
+|Exported messages <sup>1, </sup> <sup>2</sup>|MessagesExported|Chat or channel messages were exported.|
+|Failed to validate invitation to shared channel <sup>3</sup>|FailedValidation|A user responds to an invitation to a shared channel but the invitation failed validation.|
+|Fetched chat <sup>1, </sup> <sup>2</sup>|ChatRetrieved|A Microsoft Teams chat was retrieved.|
+|Fetched all hosted content of a message<sup>1, </sup> <sup>2</sup>|MessageHostedContentsListed|All hosted content in a message, such as images or code snippets, was retrieved.|
+|Installed app|AppInstalled|An app was installed.|
+|Performed action on card|PerformedCardAction|A user took action on an adaptive card within a chat. Adaptive cards are typically used by bots to allow the rich display of information and interaction in chats. <br/><br/>**Note:** Only inline input actions on an adaptive card inside a chat will be available in the audit log. For example, when a user submits a poll response in a channel conversation on an adaptive card generated by a Poll bot. User actions such as "View result", which will open a dialog, or user actions inside dialogs won't be available in the audit log.|
+|Posted a new message <sup>1, </sup> <sup>2</sup>|MessageSent|A new message was posted to a chat or channel.|
+|Published app|AppPublishedToCatalog|An app was added to the catalog.|
+|Read a message <sup>1, </sup> <sup>2</sup>|MessageRead|A message of a chat or channel was retrieved.|
+|Read hosted content of a message <sup>1, </sup> <sup>2</sup>|MessageHostedContentRead|Hosted content in a message, such as an image or a code snippet, was retrieved.|
+|Removed bot from team|BotRemovedFromTeam|A user removes a bot from a team.|
+|Removed connector|ConnectorRemoved|A user removes a connector from a channel.|
+|Removed members|MemberRemoved|A team owner removes members from a team, channel, or group chat.|
+| Removed sensitivity label | SensitivityLabelRemoved | A user removed a sensitivity label from a Teams meeting. |
+|Removed sharing of team channel <sup>3</sup>|TerminatedSharing|A team or channel owner disabled sharing for a shared channel.|
+|Restored sharing of team channel <sup>3</sup>|SharingRestored|A team or channel owner re-enabled sharing for a shared channel.|
+|Removed tab|TabRemoved|A user removes a tab from a channel.|
+|Responded to invitation for shared channel <sup>3</sup>|InviteeResponded|A user responded to a shared channel invitation.|
+|Responded to invitee response to shared channel <sup>3</sup>|ChannelOwnerResponded|A channel owner responded to a response from a user who responded to a shared channel invitation.|
+|Retrieved messages <sup>1, </sup> <sup>2</sup>|MessagesListed|Messages from a chat or channel were retrieved.|
+|Sent a message with a URL link in Teams|MessageCreatedHasLink|A user sends a message containing a URL link in Teams.|
+|Sent change notification for message creation <sup>1, </sup> <sup>2</sup>|MessageCreatedNotification|A change notification was sent to notify a subscribed listener application of a new message.|
+|Sent change notification for message deletion <sup>1, </sup> <sup>2</sup>|MessageDeletedNotification|A change notification was sent to notify a subscribed listener application of a deleted message.|
+|Sent change notification for message update <sup>1, </sup> <sup>2</sup>|MessageUpdatedNotification|A change notification was sent to notify a subscribed listener application of an updated message.|
+|Sent invitation for shared channel <sup>3</sup>|InviteSent|A channel owner or member sends an invitation to a shared channel. Invitations to shared channels can be sent to people outside of your organization if the channel policy is configured to share the channel with external users.|
+|Subscribed to message change notifications <sup>1, </sup> <sup>2</sup>|SubscribedToMessages|A subscription was created by a listener application to receive change notifications for messages.|
+|Uninstalled app|AppUninstalled|An app was uninstalled.|
+|Updated app|AppUpdatedInCatalog|An app was updated in the catalog.|
+|Updated a chat <sup>1, </sup> <sup>2</sup>|ChatUpdated|A Teams chat was updated.|
+|Updated a message <sup>1, </sup> <sup>2</sup>|MessageUpdated|A message of a chat or channel was updated.|
+|Updated connector|ConnectorUpdated|A user modified a connector in a channel.|
+|Updated tab|TabUpdated|A user modified a tab in a channel.|
+|Upgraded app|AppUpgraded|An app was upgraded to its latest version in the catalog.|
+|User signed in to Teams|TeamsSessionStarted|A user signs in to a Microsoft Teams client. This event doesn't capture token refresh activities.|
+|Posted New Message <sup>3, </sup> <sup>4</sup>|MessageSent|A new message was posted to a chat or a channel. This event is a premium feature with licensing details to be defined.|
+
+> [!NOTE]
+> <sup>1</sup> An audit record for this event is only logged when the operation is performed by calling a Microsoft Graph API. If the operation is performed in the Teams client, an audit record will not be logged<br/><sup>2</sup> This event is only available in Audit (Premium). That means users must be assigned the appropriate license before these events are logged in the audit log. For more information about activities only available in Audit (Premium), see [Audit (Premium) in Microsoft Purview](advanced-audit.md#advanced-audit-events). For Audit (Premium) licensing requirements, see [Auditing solutions in Microsoft 365](auditing-solutions-overview.md#licensing-requirements). <br/> <sup>3</sup> This event is in public preview. <br/> <sup>4</sup>This event is generated for chat only if there are guests, federated and/or anonymous users.
+
+## Shifts in Teams activities
+
+**(in preview)**
+
+If your organization is using the Shifts app in Teams, you can search the audit log for activities related to the Shifts app. Here's a list of all events that are logged for Shifts activities in Teams in the Microsoft 365 audit log.
+
+|Friendly name|Operation|Description|
+||||
+|Added scheduling group|ScheduleGroupAdded|A user successfully adds a new scheduling group to the schedule.|
+|Edited scheduling group|ScheduleGroupEdited|A user successfully edits a scheduling group.|
+|Deleted scheduling group|ScheduleGroupDeleted|A user successfully deletes a scheduling group from the schedule.|
+|Withdrew schedule|ScheduleWithdrawn|A user successfully withdraws a published schedule.|
+|Added shift|ShiftAdded|A user successfully adds a shift.|
+|Edited shift|ShiftEdited|A user successfully edits a shift.|
+|Deleted shift|ShiftDeleted|A user successfully deletes a shift.|
+|Added time off|TimeOffAdded|A user successfully adds time off on the schedule.|
+|Edited time off|TimeOffEdited|A user successfully edits time off.|
+|Deleted time off|TimeOffDeleted|A user successfully deletes time off.|
+|Added open shift|OpenShiftAdded|A user successfully adds an open shift to a scheduling group.|
+|Edited open shift|OpenShiftEdited|A user successfully edits an open shift in a scheduling group.|
+|Deleted open shift|OpenShiftDeleted|A user successfully deletes an open shift from a scheduling group.|
+|Shared schedule|ScheduleShared|A user successfully shared a team schedule for a date range.|
+|Clocked in using Time clock|ClockedIn|A user successfully clocks in using Time clock.|
+|Clocked out using Time clock|ClockedOut|A user successfully clocks out using Time clock.|
+|Started break using Time clock|BreakStarted|A user successfully starts a break during an active Time clock session.|
+|Ended break using Time clock|BreakEnded|A user successfully ends a break during an active Time clock session.|
+|Added Time clock entry|TimeClockEntryAdded|A user successfully adds a new manual Time clock entry on Time Sheet.|
+|Edited Time clock entry|TimeClockEntryEdited|A user successfully edits a Time clock entry on Time Sheet.|
+|Deleted Time clock entry|TimeClockEntryDeleted|A user successfully deletes a Time clock entry on Time Sheet.|
+|Added shift request|RequestAdded|A user added a shift request.|
+|Responded to shift request|RequestRespondedTo|A user responded to a shift request.|
+|Canceled shift request|RequestCancelled|A user canceled a shift request.|
+|Changed schedule setting|ScheduleSettingChanged|A user changes a setting in Shifts settings.|
+|Added workforce integration|WorkforceIntegrationAdded|The Shifts app is integrated with a third-party system.|
+|Accepted off shift message|OffShiftDialogAccepted|A user acknowledges the off-shift message to access Teams after shift hours.|
+
+## Updates app in Teams activities
+
+If your organization is using the Updates app in Teams, you can search the audit log for activities related to the Updates app. Here's a list of all events that are logged for Updates app activities in Teams in the Microsoft 365 audit log.
+
+|Friendly name|Operation|Description|
+||||
+|Create an update request|CreateUpdateRequest|A user successfully creates an update request.|
+|Edit an update request|EditUpdateRequest|A user opens the request editing wizard and selects **Save** to confirm and save any changes, or enables or disables the update request directly.|
+|Submit an update|SubmitUpdate|A user successfully submits an update.|
+|View the details of one update|ViewUpdate|A user views the details of the update.|
+
+## Office 365 Management Activity API
+
+You can use the Office 365 Management Activity API to retrieve information about Teams events. To learn more about the Management Activity API schema for Teams, see [Teams schema](/office/office-365-management-api/office-365-management-activity-api-schema#microsoft-teams-schema).
+
+## Attribution in Teams audit logs
+
+Membership changes to Teams (such as users added or deleted) made through Azure Active Directory (Azure AD), Microsoft 365 admin portal, or Microsoft 365 Groups Graph API will appear in Teams audit messages and in the General channel with an attribution to an existing owner of the team, and not to the actual initiator of the action. In these scenarios, consult Azure AD or [Microsoft 365 Group audit logs](search-the-audit-log-in-security-and-compliance.md) to see the relevant information.
+
+## Use Defender for Cloud Apps to set activity policies
+
+Using [Microsoft Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security) integration, you can set [activity policies](/cloud-app-security/user-activity-policies) to enforce a wide range of automated processes using the app provider's APIs. These policies enable you to monitor specific activities carried out by various users, or follow unexpectedly high rates of one certain type of activity.
+
+After you set an activity detection policy, it starts to generate alerts. Alerts are only generated on activities that occur after you create the policy. Here's some example scenarios for how you can use activity policies in Defender for Cloud Apps to monitor Teams activities.
+
+### External user scenario
+
+One scenario you might want to keep an eye on, from a business perspective, is the addition of external users to your Teams environment. If external users are enabled, monitoring their presence is a good idea. You can use [Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security) to identify potential threats.
+
+![Policy to monitor adding external users](../media/TeamsExternalUserAddPolicy.png)
+
+The screenshot of this policy to monitor adding external users allows you to name the policy, set the severity according to your business needs, set it as (in this case) a single activity, and then establish the parameters that will specifically monitor only the addition of non-internal users, and limit this activity to Teams.
+
+The results from this policy can be viewed in the activity log:
+
+![Events triggered by external users policy](../media/TeamsExternalUserList.png)
+
+Here you can review matches to the policy you've set, and make any adjustments as needed, or export the results to use elsewhere.
+
+### Mass delete scenario
+
+As mentioned earlier, you can monitor deletion scenarios. It's possible to create a policy that would monitor mass deletion of Teams sites. In this example, an alert-based policy is set up to detect mass deletion of teams in a span of 30 minutes.
+
+![Policy showing the setting up of a policy for mass team deletion detection](../media/TeamsMassDeletePolicy.png)
+
+As the screenshot shows, you can set many different parameters for this policy to monitor Teams deletions, including severity, single or repeated action, and parameters limiting this to Teams and site deletion. This can be done independently of a template, or you may have a template created to base this policy on, depending on your organizational needs.
+
+After you establish a policy that works for your business, you can review the results in the activity log as events are triggered:
+
+![Screenshot of events triggered by mass deletions](../media/TeamsMassDeleteList.png)
+
+You can filter down to the policy you've set to see the results of that policy. If the results you're getting in the activity log aren't satisfactory (maybe you're seeing lots of results, or nothing at all), this may help you to fine-tune the query to make it more relevant to what you need it to do.
+
+### Alert and governance scenario
+
+You can set alerts and send emails to admins and other users when an activity policy is triggered. You can set automated governance actions such as suspending a user or making a user to sign in again in an automated way. This example shows how a user account can be suspended when an activity policy is triggered and determines a user deleted two or more teams in 30 minutes.
+
+![Screenshot of alerts and governance actions for an activity policy.](../media/audit-log-governance.png)
+
+## Use Defender for Cloud Apps to set anomaly detection policies
+
+[Anomaly detection policies](/cloud-app-security/anomaly-detection-policy) in Defender for Cloud Apps provide out-of-the-box user and entity behavioral analytics (UEBA) and machine learning (ML) so that you can immediately run advanced threat detection across your cloud environment. Because they're automatically enabled, the new anomaly detection policies provide immediate results by providing immediate detections, targeting numerous behavioral anomalies across your users and the machines and devices connected to your network. Additionally, the new policies expose more data from the Defender for Cloud Apps detection engine, to help you speed up the investigation process and contain ongoing threats.
+
+We're working to integrate Teams events into anomaly detection policies. For now, you can set up anomaly detection policies for other Office products and take action items on users who match those policies.
+
+## Related articles
+
+- [Search the audit log in the Microsoft Purview compliance portal](search-the-audit-log-in-security-and-compliance.md)
compliance Compliance Manager Templates List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-templates-list.md
f1.keywords:
Previously updated : 03/31/2023 Last updated : 04/04/2023 audience: Admin
The templates listed below may be purchased by your organization. Certain licens
- South African POPIA - Slovakia Act on the Protection of Personal Data - Spain - Nation Security Framework -- Switzerland - Federal Act on Data Protection (FADP)
+- Switzerland - Federal Act on Data Protection (FADP)
+- Turkey - Information and Communication Security Guide
- Turkey - KVKK Protection of Personal Data 6698 - UAE - Federal Decree Law on Combating Cyber Crimes - UAE - Federal Law Concerning Electronic Transactions and Commerce
compliance Document Fingerprinting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/document-fingerprinting.md
The following examples show what happens if you create a document fingerprint ba
1. On the **Classifiers** page, choose **Sensitive info types** > **Create Fingerprint based SIT**. 1. Enter a name and description for your new SIT. 1. Upload the file you wish to use as the fingerprint template.
-1. OPTIONAL: Adjust the requirements for each confidence level and then choose **Next**. For more information, see [[Partial matching](#partial-matching)](#partial-matching) and [Exact matching](#exact-matching).
+1. OPTIONAL: Adjust the requirements for each confidence level and then choose **Next**. For more information, see [Partial matching](#partial-matching) and [Exact matching](#exact-matching).
1. Review your settings > **Create**. 1. When the confirmation page displays, choose **Done**.
compliance Ediscovery Teams Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-teams-content-search.md
+
+ Title: Use Content Search in Microsoft Teams
+description: Learn about using Content search in the Microsoft Purview compliance portal to search for Microsoft Teams content that's stored in Exchange Online, SharePoint Online, OneDrive for Business, and OneNote.
++++
+audience: admin
++
+- tier1
+- purview-compliance
+- M365-collaboration
+- content-search
+ Last updated : 08/10/2017
+search.appverid: MET150
+f1.keywords:
+ - NOCSH
+
+appliesto:
+ - Microsoft Teams
++
+# Use Content search in Microsoft Teams
+
+> [!NOTE]
+> Content search of messages and files in [private channels](/microsoftteams/private-channels) work differently than in standard channels. To learn more, see [Content search of private channels](#content-search-of-private-channels).
+
+Content search provides a way to query Microsoft Teams information spanning Exchange, SharePoint Online, and OneDrive for Business.
+
+To learn more, see [Content search in Microsoft 365](ediscovery-content-search.md).
+
+For example, using **Content search** against your Manufacturing Specs mailbox and Manufacturing Specs SharePoint site, you can search against Teams standard channel conversations from Exchange, file uploads and modifications from SharePoint Online, and OneNote changes.
+
+You can also add query criteria to the **Content Search** to narrow the results returned. In the above example, you can look for content where the keywords "**New Factory Specs"** were used.
+
+> [!TIP]
+> After adding search conditions, you can export a report or the actual content to your computer for analysis.
+
+## Content search of private channels
+
+Records for messages sent in a private channel are delivered to the mailbox of all private channel members, rather than to a group mailbox. The titles of the records are formatted to indicate which private channel they were sent from.
+
+Because each private channel has its own SharePoint site collection that's separate from the parent team site, files in a private channel are managed independently of the parent team.
+
+Teams doesn't support content search of a single channel, so the whole team must be searched. To perform a content search of a private channel, search across the team, the site collection associated with the private channel (to include files), and mailboxes of private channel members (to include messages).
+
+Use the following steps to identify files and messages in a private channel to include in your content search.
+
+### Include private channel files in a content search
+
+Before you perform these steps, install the [SharePoint Online Management Shell and connect to SharePoint Online](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online?view=sharepoint-ps).
+
+1. Run the following to get a list of all SharePoint site collections associated with private channels in the team.
+
+ ```PowerShell
+ Get-SPOSite
+ ```
+2. Run the following PowerShell script to get a list of all SharePoint site collection URLs associated with private channels in the team and the parent team group ID.
+
+ ```PowerShell
+ $sites = get-sposite -template "teamchannel#0"
+ foreach ($site in $sites) {$x= get-sposite -identity $site.url -detail; $x.relatedgroupID; $x.url}
+ ```
+3. For each team or group ID, run the following PowerShell script to identify all relevant private channel sites.
+
+ ```PowerShell
+ $sites = get-sposite -template "teamchannel#0"
+ $groupID = "e8195240-4a70-4830-9106-80193cf717cb"
+ foreach ($site in $sites) {$x= Get-SpoSite -Identity $site.url -Detail; if ($x.RelatedGroupId -eq $groupID) {$x.RelatedGroupId;$x.url}}
+ ```
+
+### Include private channel messages in a content search
+
+Before you perform these steps, make sure you have the [latest version of the Teams PowerShell module](/microsoftteams/teams-powershell-overview) installed.
+
+1. Run the following to get a list of private channels in the team.
+
+ ```PowerShell
+ Get-TeamChannel -GroupId <GroupID> -MembershipType Private
+ ```
+2. Run the following to get a list of private channel members.
+
+ ```PowerShell
+ Get-TeamChannelUser -GroupId <GroupID> -DisplayName "Engineering" -Role Member
+ ```
+3. Include the mailboxes of all members from each private channel in the team as part of your content search query.
+
+## Related topics
+
+- [eDiscovery cases in the Microsoft Purview compliance portal](/Office365/SecurityCompliance/ediscovery-cases)
compliance Ediscovery Teams Investigation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-teams-investigation.md
- M365-collaboration - ediscovery Previously updated : 04/04/2023 Last updated : 04/06/2023 search.appverid: MET150 f1.keywords: - NOCSH
All Microsoft Teams 1:1 or group chats are journaled through to the respective u
eDiscovery of messages and files in [private channels](/microsoftteams/private-channels.md) works differently than in standard channels. To learn more, see [eDiscovery of private channels](#ediscovery-of-private-and-shared-channels).
-Not all Teams content is eDiscoverable. The following table shows the content types that you can search for using Microsoft eDiscovery tools:
+Recorded Teams meetings are stored in the OneDrive for Business account of the user recording the meeting. To learn more, see [eDiscovery (Premium) workflow for content in Microsoft Teams](/microsoft-365/compliance/ediscovery-teams-workflow).
+
+Not all Teams content is eDiscoverable. The following table shows the Teams content types that you can search for using Microsoft eDiscovery tools:
|**Content type**|**Notes**| |:|:--|
-|Audio recordings||
+|Audio recordings|Audio calls between Teams user and external contacts|
|Card content|See [Search for card content](#search-for-card-content) for more information.| |Chat links|| |Chat messages|This includes content in standard Teams channels, 1:1 chats, 1:N group chats, chats with yourself, and chats with guests.|
Not all Teams content is eDiscoverable. The following table shows the content ty
|Loop components|Content in a loop component is saved in a .fluid file that's stored in the OneDrive for Business account of the user who sends the loop component. That means you have to include OneDrive as a data source when searching for content in loop components.| |Meeting IM conversations|| |Meeting metadata<sup>1</sup>||
+|Meeting recordings and transcripts (preview)|Transcripts of the meeting audio are extracted and provided as a separate file. Maximum supported recorded meeting .mp4 file size is 350 MB. If the recorded meeting file size is above 350 MB, a processing error occurs and the file is available for download.|
|Name of channel|| |Quotes|Quoted content is searchable. However, search results don't indicate that the content was quoted.| |Reactions (such as likes, hearts, and other reactions)|Reactions are supported for all commercial customers after June 1, 2022. Reactions before this date aren't available for eDiscovery. Expanded reactions are now supported. To understand reaction history, the content must be on legal hold.|
Private chats in a user's mailbox are stored in the Team Chat folder under Conve
Compliance copies of messages in private and shared channels are sent to different mailboxes depending on the channel type. That means you have to search different mailbox locations based on the type of channel a user is a member of. - **Private channels**. Compliance copies are sent to the mailbox of all members of the private channel members. That means you have to search the user mailbox when searching for content in private channel messages.- - **Shared channels**. Compliance copies are sent to a system mailbox that's associated with the parent team. Because Teams doesn't support an eDiscovery search of a single system mailbox for a shared channel, you have to search the mailbox for the parent team (by selecting the name of the Team mailbox) when searching for message content in shared channels. Each private and shared channel has its own SharePoint site that's separate from the parent team site. That means files in private and shared channels are stored in its own site and managed independently of the parent team. This means you must identify and search the specific site associated with a channel when searching for content in files and channel message attachments.
To search for content for guests:
8. On the flyout page, you can do the following things: - Select **View results** to view the search results and preview the content.- - Next to the **Query** field, select **Edit** to edit and then rerun the search. For example, you can add a search query to narrow the results.- - Select **Export results** to export and download the search results. ## Search for card content
-Card content generated by apps in Teams channels, 1:1 chats, and 1xN chats is stored in mailboxes and can be searched. A *card* is a UI container for short pieces of content. Cards can have multiple properties and attachments, and can include buttons that can trigger card actions. For more information, see [Cards](/microsoftteams/platform/task-modules-and-cards/what-are-cards)
+Card content generated by apps in Teams channels, 1:1 chats, and 1xN chats are stored in mailboxes and can be searched. A *card* is a UI container for short pieces of content. Cards can have multiple properties and attachments, and can include buttons that can trigger card actions. For more information, see [Cards](/microsoftteams/platform/task-modules-and-cards/what-are-cards)
Like other Teams content, where card content is stored is based on where the card was used. Content for cards used in a Teams channel is stored in the Teams group mailbox. Card content for 1:1 and 1xN chats are stored in the mailboxes of the chat participants.
When viewing card content in Content search results, the content appears as an a
Admins can use eDiscovery to search for content in chats messages in a Teams meeting in external access and guest access environments based on the following restrictions: - **External access**: In a Teams meeting with users from your organization and users from an external organization where external attendees are using external access, admins in both organizations can search for content in chat messages from the meeting.- - **Guest**: In a Teams meeting with users from your organization and guests, only admins in the organization who hosts the Teams meeting can search for content in chat messages from the meeting. ## Related articles
compliance Ediscovery Teams Legal Hold https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-teams-legal-hold.md
+
+ Title: Place a Microsoft Teams user or team on legal hold
+description: "Learn to place a Microsoft Teams user or team on legal hold using the Microsoft Purview compliance portal and learn what needs a legal hold based on data requirements."
+++++
+audience: admin
+
+- tier1
+- purview-compliance
+- M365-collaboration
+- ediscovery
+ Last updated : 03/7/2023
+search.appverid: MET150
+f1.keywords:
+- NOCSH
+appliesto:
+ - Microsoft Teams
++
+# Place a Microsoft Teams user or team on legal hold
+
+When a reasonable expectation of litigation exists, organizations are required to preserve electronically stored information (ESI), including Teams chat messages that are relevant to the case. Organizations may need to preserve all messages related to a specific investigation or for a specific person. This article will discuss using a legal hold to preserve content in Microsoft Teams. To preserve content in other services in Microsoft 365, see [Create an eDiscovery hold](ediscovery-create-holds.md).
+
+> [!NOTE]
+> Private channel chats are stored in user mailboxes, while standard channel chats are stored in the mailbox associated with the parent team. If there is already a legal hold in place for a user mailbox, the hold policy will now automatically apply to private channel messages stored in that mailbox. There is no further action needed for an admin to turn this on. Legal hold of files shared in private channels is also supported.
+
+Within Microsoft Teams, an entire team or select users can be put on legal hold. Doing that will make sure that all messages that were exchanged in those teams (including private and shared channels) or messages exchanged by those individuals are discoverable by the organization's compliance managers or Teams Admins.
+
+> [!NOTE]
+> Placing a user on hold does not automatically place a group on hold or vice-versa.
+> Notifications sent in activity feeds can't be placed on hold.
+
+To put a user or a team on legal hold in a eDiscovery (Standard) case:
+
+1. Go to the [Microsoft Purview compliance portal](https://compliance.microsoft.com). When you create a new case, you're presented with the option to place mailboxes or sites on hold.
+2. Go to **eDiscovery** > **Standard** and create a case by selecting **Create a case**. After the case is created, open it.
+
+ > [!NOTE]
+ > You can also place a user on a hold that's associated with an eDiscovery (Premium) case. For more information, see [Manage holds in eDiscovery (Premium)](ediscovery-managing-holds.md).
+
+3. Go to the **Hold** tab on the top menu and select **Create** to create a hold. Placing a user or a team on hold preserves all the messages exchanged by those users. When you create a new case, you're presented with the option to place mailboxes or sites on hold.
+
+4. **Name your hold**. Select a descriptive and unique name for the hold you're going to create.
+5. **Choose locations**. Choose whether you want the hold to be applied on a user or on an entire team (a hold can't be applied on individual channels for now). If a user is on hold, all their messages are preserved, including messages in 1:1 chats, group chats, and private channels. Messages in standard and shared channels are preserved when the parent team is placed on hold.
+6. **Query**. You can customize the hold if you want more granularity in the hold policy. For example, you can specify keywords to look for, or you can add more conditions that would need to be satisfied for the hold to take effect.
+7. **Review your settings** before creating the hold.
+
+After the hold is created, you can search the content retained by the hold policy. For more information, see [Conduct an eDiscovery investigation in Teams](ediscovery-teams-investigation.md).
+
+> [!IMPORTANT]
+> When a user or group is placed on hold, all compliance copies of messages are preserved. For example, if a user posts a message in a channel and then modifies the message, both copies of the message are preserved. Without the hold, only the latest message is preserved.
+
+## Content locations to place on hold to preserve Teams content
+
+As a helpful guide, use the following table to understand what content locations (such as a mailbox or a site) to place on hold to preserve different types of Teams content.
+
+|Scenario |Content location |
+|||
+|Chat messages for a user (for example, 1:1 chats, 1:N group chats, and private channel conversations) |User mailbox |
+|Chat messages in standard and shared channels |Mailbox associated with the parent team |
+|Files in standard channels (for example, Wiki content and files) |SharePoint site associated with the parent team |
+|Files in private and shared channels |Dedicated SharePoint site associated with the channel
+|User's private content |The user's OneDrive for Business account |
+|Card content in chats|User mailbox for 1:1 chats, 1:N group chats, and private channel conversations; the parent team mailbox for card content in standard and shared channel messages. For more information, see the "Preserve card content" section in [Create an eDiscovery hold](ediscovery-create-holds.md#preserve-card-content).|
+|||
+
+> [!NOTE]
+> To retain message content in private channels, you need to put the user mailboxes (of the members of a private channel) on hold. and when using eDiscovery tool to search private channel messages, you have to search the user's mailbox. As was stated earlier, private channel chats are stored in user mailboxes, not in the group mailbox associated with the parent team.
compliance Ediscovery Teams Workflow https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-teams-workflow.md
Title: "Teams workflow in eDiscovery (Premium)"
+ Title: "eDiscovery (Premium) workflow for content in Microsoft Teams"
description: "Learn how to preserve, collect, review, and export content from Microsoft Teams in eDiscovery (Premium)." f1.keywords: - NOCSH Previously updated : 01/01/2023 Last updated : 04/06/2023 audience: Admin
This article provides a comprehensive set of procedures, guidelines, and best practices for using Microsoft Purview eDiscovery (Premium) to preserve, collect, review, and export content from Microsoft Teams. The goal of this article is to help you optimize your eDiscovery workflow for Teams content.
-There are six categories of Teams content that you can collect and process using eDiscovery (Premium):
+There are seven categories of Teams content that you can collect and process using eDiscovery (Premium):
- **Teams 1:1 chats**. Chat messages, posts, and attachments shared in a Teams conversation between two people. Teams 1:1 chats are also called *conversations*.- - **Teams group chats**. Chat messages, posts, and attachments shared in a Teams conversation between three or more people. Also called *1:N* chats or *group conversations*.- - **Teams reactions**. Reactions applied to chat messages, posts, and attachments in a Teams conversation.- - **Teams channels**. Chat messages, posts, replies, and attachments shared in a standard Teams channel.-
+- **Teams meetings (preview)**. Audio and transcripts from recorded Teams meetings.
- **Private channels**. Message posts, replies, and attachments shared in a private Teams channel.- - **Shared channels**. Message posts, replies, and attachments shared in a shared Teams channel. [!INCLUDE [purview-preview](../includes/purview-preview.md)]
A prerequisite to managing Teams content in eDiscovery (Premium) is to understan
Teams data is stored in Azure Cosmos DB. Teams compliance records captured by the substrate are in Exchange Online and are available for ediscovery.
-The following table lists Teams content type and where each is stored for complaince purpose. The data stored in Exchange online is hidden from clients. eDiscovery never operates against the real Teams message data, which remains in Azure Cosmos DB.
+The following table lists Teams content type and where each is stored for compliance purposes. The data stored in Exchange online is hidden from clients. eDiscovery never operates against the real Teams message data, which remains in Azure Cosmos DB.
-|&nbsp;|Location of chat messages and posts|Location of files and attachments|
-||||
-|Teams 1:1 chats|Messages in 1:1 chats are stored in the Exchange Online mailbox of all chat participants.|Files shared in a 1:1 chat are stored in the OneDrive for Business account of the person who shared the file.|
-|Teams group chats|Messages in group chats are stored in the Exchange Online mailbox of all chat participants.|Files shared in group chats are stored in the OneDrive for Business account of the person who shared the file.|
-|Teams reactions|Messages in group chats are stored in the Exchange Online mailbox of all chat participants.|Files shared in group chats are stored in the OneDrive for Business account of the person who shared the file.|
-|Teams channels|All channel messages and posts are stored in the Exchange Online mailbox associated with the team.|Files shared in a channel are stored in the SharePoint Online site associated with the team.|
-|Private channels|Messages sent in a private channel are stored in the Exchange Online mailboxes of all members of the private channel.|Files shared in a private channel are stored in a dedicated SharePoint Online site associated with the private channel.|
-|Shared channels|Messages sent in a shared channel are stored in a system mailbox associated with the shared channel.<sup>1</sup>|Files shared in a shared channel are stored in a dedicated SharePoint Online site associated with the shared channel.|
+|**Teams category**|**Location of chat messages/posts**|**Location of files/attachments**|**Location of meeting recordings**|
+|:|:|:|:|
+|Teams 1:1 chats|Messages in 1:1 chats are stored in the Exchange Online mailbox of all chat participants.|Files shared in a 1:1 chat are stored in the OneDrive for Business account of the person who shared the file.| N/A |
+|Teams group chats|Messages in group chats are stored in the Exchange Online mailbox of all chat participants.|Files shared in group chats are stored in the OneDrive for Business account of the person who shared the file.| N/A |
+|Teams reactions|Messages in group chats are stored in the Exchange Online mailbox of all chat participants.|Files shared in group chats are stored in the OneDrive for Business account of the person who shared the file.| N/A |
+|Teams channels|All channel messages and posts are stored in the Exchange Online mailbox associated with the team.|Files shared in a channel are stored in the SharePoint Online site associated with the team.| N/A |
+|Teams meetings (preview)| Chats in recorded meetings are stored in the OneDrive for Business account for the user recording the Teams meeting. | Files and attachments shared in recorded meetings are stored in the OneDrive for Business account for the user recording the Teams meeting. | Meeting recordings are stored in the OneDrive for Business account for the user recording the Teams meeting. |
+|Private channels|Messages sent in a private channel are stored in the Exchange Online mailboxes of all members of the private channel.|Files shared in a private channel are stored in a dedicated SharePoint Online site associated with the private channel.| N/A |
+|Shared channels|Messages sent in a shared channel are stored in a system mailbox associated with the shared channel.<sup>1</sup>|Files shared in a shared channel are stored in a dedicated SharePoint Online site associated with the shared channel.| N/A |
> [!NOTE] > <sup>1</sup> To search for (and preserve) messages sent in a shared channel, you have to search or specify the Exchange Online mailbox for the parent Team. ## Create a case for Teams content
-The first step to managing Teams content in eDiscovery (Premium) is to create a case using the new case format that's optimized for managing Teams content. Here's the benefits of using the new case format for Teams content:
--- Support for conversation threading, in which additional messages in the same conversation that include responsive items are automatically collected and added to review sets.--- Teams chat conversations are automatically added to review sets as an HTML transcript file. Cloud attachments that are shared in conversations are also added to the review set. This helps provides context to the conversations with responsive items and reduce total number of items produced by chat-based content.--- Collections up to 1 TB can be added to review sets, which let you collect and amounts large amounts of Teams content in a case.
+The first step to managing Teams content in eDiscovery (Premium) is to create a case using the [new case format](/microsoft-365/compliance/ediscovery-new-case-format) that's optimized for managing Teams content. The new case format helps accommodate significant increases in case size, both for total data volume and the total number of items in cases.
-For more information about the increased case limits, see [Use the new case format in eDiscovery (Premium)](ediscovery-new-case-format.md).
-
-To create a case:
-
-1. Go to <https://compliance.microsoft.com> and sign in.
-
-2. In the left navigation pane of the Microsoft Purview compliance portal, click **eDiscovery > Premium**.
-
-3. On the **eDiscovery (Premium)** page, click the **Cases** tab, and then click **Create a case**.
-
- The **New eDiscovery case** flyout page is displayed. The **Case format** section provides the option to create a case using the new case format.
-
- ![Large case option on the New eDiscovery case page.](..\media\AeDNewCaseFormat1.png)
-
-4. After naming the case, select the **New** option, and then click **Save** to create the case.
+For step-by-step guidance on how to create a case, see [Create and manage an eDiscovery (Premium) case](/microsoft-365/compliance/ediscovery-create-and-manage-cases#create-a-case).
## Add Teams custodial data sources and preserve Teams content
The next step is to identify the users who are the data custodians in your inves
To add custodians to a case and preserve custodial data sources:
-1. Go to the eDiscovery (Premium) case that you created in the previous section, and then click **Data sources**.
-
-2. On the **Data sources** page, click **Add data source** > **Add new custodians**.
-
+1. Go to the eDiscovery (Premium) case that you created in the previous section, and then select **Data sources**.
+2. On the **Data sources** page, select **Add data source** > **Add new custodians**.
3. In the **New custodian** wizard, add one or more users as custodians to the case by typing the first part of the user's name or alias. After you find the correct person, select their name to add them to the list. - 4. Expand each custodian to view the primary data sources that have been automatically associated to the custodian, and to select other locations to associate to the custodian. ![Custodian data sources.](..\media\TeamsCustodialDataLocations1.png)
-5. Follow these guidelines to add custodial data sources for Teams content. Click **Edit** to add a data location.
+5. Follow these guidelines to add custodial data sources for Teams content. Select **Edit** to add a data location.
- **Mailboxes**. The custodian's mailbox is selected by default. Keep this selected to add (and preserve) 1:1 chats, group chats, and private channel chats as custodial data.-
- - **OneDrives**. The custodian's OneDrive account is selected by default. Keep this selected to add (and preserve) files shared in 1:1 chats and group chats as custodial data.
-
- - **SharePoint**. Add the SharePoint site associated with any private or shared channel the custodian is a member of to add (and preserve) as custodial data the files shared in a channel. Click **Edit** and then add the URL for the SharePoint site associated with a private or shared channel. To learn how to locate the private and shared channels a user is a member of, see [eDiscovery of private and shared channels](/microsoftteams/ediscovery-investigation#ediscovery-of-private-and-shared-channels).
-
- - **Teams**. Add the teams that the custodian is a member of to add (and preserve) as custodial data all channel messages and all files shared to a Teams channel. This includes adding the mailbox for the parent team of a shared channel the custodian is a member of. When you click **Edit**, the mailbox and site associated with each team the custodian is a member of are displayed in a list. Select the teams that you want to associate to the custodian. You have to select both the corresponding mailbox and site for each team.
+ - **OneDrives**. The custodian's OneDrive account is selected by default. Keep this selected to add (and preserve) files shared in 1:1 chats, group chats, and Teams meetings as custodial data.
+ - **SharePoint**. Add the SharePoint site associated with any private or shared channel the custodian is a member of to add (and preserve) as custodial data the files shared in a channel. Select **Edit** and then add the URL for the SharePoint site associated with a private or shared channel. To learn how to locate the private and shared channels a user is a member of, see [eDiscovery of private and shared channels](/microsoftteams/ediscovery-investigation#ediscovery-of-private-and-shared-channels).
+ - **Teams**. Add the teams that the custodian is a member of to add (and preserve) as custodial data all channel messages and all files shared to a Teams channel. This recommendation includes adding the mailbox for the parent team of a shared channel the custodian is a member of. When you select **Edit**, the mailbox and site associated with each team the custodian is a member of are displayed in a list. Select the teams that you want to associate to the custodian. You have to select both the corresponding mailbox and site for each team.
> [!NOTE] > You can also add the mailbox and site of Teams that custodians aren't members of as a custodian data location. You do this by clicking **Edit** next to **Exchange** and **SharePoint** and then adding the mailbox and site associated with the team.
-6. After you add custodians and configure the custodial data sources, click **Next** to display the **Hold settings** page.
-
- A list of the custodians is displayed and the checkbox in the **Hold** column is selected by default. This indicated that a hold will be placed on the data sources that you associated with each custodian. Leave these checkboxes selected to preserve this data.
+6. After you add custodians and configure the custodial data sources, select **Next** to display the **Hold settings** page. A list of the custodians is displayed and the checkbox in the **Hold** column is selected by default. This checkbox indicates that a hold will be placed on the data sources that you associated with each custodian. Leave these checkboxes selected to preserve this data.
+7. On the **Hold settings** page, select **Next** to review the custodians settings. Select **Submit** to add the custodians to the case.
-7. On the **Hold settings** page, click **Next** to review the custodians settings. Click **Submit** to add the custodians to the case.
-
-For more information about adding and preserving data sources in an eDiscovery (Premium) case, see:
+For more information about adding and preserving data sources in eDiscovery (Premium) cases, see:
- [Add custodians to an eDiscovery (Premium) case](ediscovery-add-custodians-to-case.md)- - [Add non-custodial data sources to an eDiscovery (Premium) case](ediscovery-non-custodial-data-sources.md) ## Collect Teams content and add to review set
After adding custodians to the case and preserving content in custodian data sou
When you collect Teams content for a case, there are two steps in the workflow:
-1. **Create a collection estimate**. The first step is to create a *collection estimate*, which is an estimate of the items that match your search criteria. You can view information about the results that matched the search query, such as the total number and size of items found, the different data sources where they were found, and statistics about the search query. You can also preview a sample of items that were returned by the collection. Using these statistics, you can change the search query and rerun the collection estimate as many times as is necessary to narrow the results until you're satisfied you're collecting the content relevant to your case.
-
+1. **Create a collection estimate**. The first step is to create a *collection estimate*, which is an estimate of the items that match your search criteria. You can view information about the results that matched the search query, such as the total number and size of items found, the different data sources where they were found, and statistics about the search query. You can also preview a sample of items returned by the collection. Using these statistics, you can change the search query and rerun the collection estimate as many times as is necessary to narrow the results until you're satisfied you're collecting the content relevant to your case.
2. **Commit a collection estimate to a review set**. Once you're satisfied with the results of a collection estimate, you can commit the collection to a review set. When you commit a collection estimate, the items returned by the collection are added to a review set for review, analysis, and export. You also have the option of not running a collection estimate and adding the collection results directly to a review set when you create and run the collection. To create a collection of Teams content:
-1. Go to the eDiscovery (Premium) case that you added the custodians to in the previous section, and then click **Collections**.
-
-2. On the **Collections** page, select **New collection** > **Standard collection**.
-
-3. Type a name (required) and description (optional) for the collection.
-
-4. On the **Custodial data sources** page, click **Select custodians** to select the custodians that you added to the case.
-
- The list of the case custodians is displayed on the **Select custodians** flyout page.
-
-5. Select one or more custodians and then click **Add**.
-
- After you add specific custodians to the collection, a list of specific data sources for each custodian is displayed. These are the data sources that you configured when you added the custodian to the case. All custodian data sources are selected by default. This includes any Teams or channels that you associated with a custodian.
+1. Go to the eDiscovery (Premium) case that you added the custodians to in the previous section, and then select **Collections**.
+2. On the **Collections** page, select **New collection**.
+3. On the **Name and description** page, enter a name (required) and description (optional) for the collection. Select **Next**.
+4. On the **Custodial data sources** page, select **Select custodians** to select the custodians that you added to the case. The list of the case custodians is displayed on the **Select custodians** flyout page.
+5. Select one or more custodians and then select **Add**. After you add specific custodians to the collection, a list of specific data sources for each custodian is displayed. These data sources are the ones that you configured when you added the custodian to the case. All custodian data sources are selected by default. This includes any Teams or channels that you associated with a custodian.
We recommend doing the following things when collecting Teams content: - Remove custodians' OneDrive accounts from the collection scope (by unselecting the checkbox in the **Custodian's OneDrive** column for each custodian). This prevents the collection of duplicate files that were attached to 1:1 chats and group chats. Cloud attachments are automatically collected from each conversation found in the collection when you commit the collection estimate to the review set. By using this method (instead of searching OneDrive accounts as part of the collection), files attached to 1:1 and group chats are grouped in the conversation they were shared in.- - Unselect the checkbox in the **Additional site** column to remove the SharePoint sites containing files shared in private or shared channels. Doing this eliminates collecting duplicate files that were attached to private or shared channel conversations because these cloud attachments are automatically added to the review set when you commit the collection estimate and grouped in the conversations they were shared in.
-6. If you previously followed the steps to add Teams content as custodian data sources, you can skip this step and select **Next**. Otherwise, on the **Non-custodial data sources** wizard page, you can choose non-custodial data sources that contain Teams content that you may have added to the case to search in the collection.
-
-7. If you previously followed the steps to add Teams content as custodian data sources, you can skip this step and select **Next**. Otherwise, on the **Additional locations** wizard page, you can add other data sources to search in the collection. For example, you could add the mailbox and site for a team that wasn't added as a custodial or non-custodial data source. Otherwise, select **Next** and skip this step.
-
-8. On the **Conditions** wizard page, configure the search query to collect Teams content from the data sources that you specified on the previous wizard pages. You can use various keywords and search conditions to narrow the scope of the collection. For more information, see [Build search queries for collections](ediscovery-building-search-queries.md).
-
- To help ensure the most comprehensive collection of Teams chat conversations (including 1:1, group, and channel chats) use the **Type** condition and select the **Instant messages** option. We also recommend including a date range or several keywords to narrow the scope of the collection to items relevant to your investigation. Here's a screenshot of a sample query using the **Type** and **Date** options:
+6. If you previously followed the steps to add Teams content as custodian data sources, you can skip this step and select **Next**. Otherwise, on the **Non-custodial data sources** page, you can choose non-custodial data sources that contain Teams content that you may have added to the case to search in the collection.
+7. If you previously followed the steps to add Teams content as custodian data sources, you can skip this step and select **Next**. Otherwise, on the **Additional locations** page, you can add other data sources to search in the collection. For example, you could add the mailbox and site for a team that wasn't added as a custodial or non-custodial data source. You can also select the **Shared Teams channels** option to include shared channels during tenant-wide searches. Otherwise, select **Next** and skip this step.
+8. On the **Conditions** page, configure the search query to collect Teams content from the data sources that you specified on the previous pages. You can use various keywords and search conditions to narrow the scope of the collection. For more information, see [Build search queries for collections](ediscovery-building-search-queries.md).
- ![Query to collect Teams content.](..\media\TeamsConditionsQueryType.png)
+ - To help ensure the most comprehensive collection of Teams chat conversations (including 1:1, group, and channel chats) use the **Type** filter condition and select the **Instant messages** option.
+ - To help ensure you add recorded Teams meeting information to the collection, use the **File type** filter condition and include *.mp4* as contained value.
+ - We also recommend including a date range or several keywords to narrow the scope of the collection to items relevant to your investigation.
-9. On the **Save draft or collect** wizard page, do one of the following depending on whether you want to create a collection estimate or commit the collection to a review set.
+9. On the **Review your collection** page, review the collection settings and select **Submit** to create a collection estimate or **Save and close** to save the collection settings to complete later.
- ![Save collection estimate or commit collection.](..\media\TeamsDraftCommitCollection.png)
+When the process of adding the collection to the review set is completed, the **Status** value for the collection on the **Collections** tab is set to **Estimated**.
- 1. **Save collection as draft**. Choose this option to create a collection estimate. As previously explained, a collection estimate doesn't add the collection results to a review set. It returns an estimate of the search results that match the search query for the data sources in the collection scope. This gives you the opportunity to view [collection statistics and reports[(ediscovery-collection-statistics-reports.md)] and edit and rerun the collection estimate. When you satisfied with the result of a collection estimate, you can commit it to a review set. For more information, see [Create a collection estimate](ediscovery-create-draft-collection.md).
+## Commit a collection estimate to a review set
- 2. **Collect items and add to a review set**. Choose this option to run the collection and then add the results to a review set. You can add the collection to a new or existing review set. The options to collect contextual Teams conversation messages (also called *conversation threading*) and collect cloud attachments are selected by default and can't be unselected. These options are automatically applied because of the new case format that you used when you initially created the case for Teams content. For more information about committing collections to a review set, see [Commit a collection estimate to a review set](ediscovery-commit-draft-collection.md).
+When you're satisfied with the items you've collected in a collection estimate and are ready to analyze, tag, and review them, you can commit a collection to a review set in the case.
-10. After you're finished configuring the collection, submit the collection to create a collection estimate or collect items and add them to a review set.
-
- When the process of adding the collection to the review set is completed, the status value for the collection on the **Collections** tab is set to **Committed**.
+For step-by-step guidance on how to commit a collection, see [Commit a collection estimate to a review set in eDiscovery (Premium)](/microsoft-365/compliance/ediscovery-commit-draft-collection).
## Review Teams content in a review set
-After you add collections of Teams content to a review set, the next step is to review the content for its relevance to your investigation and cull it if necessary. An important prerequisite to reviewing Teams content is understanding how eDiscovery (Premium) processes Teams chat conversations and attachments when adding them to a review set. This processing of Teams content results in the following three things:
+After you add collections of Teams content to a review set, the next step is to review the content for its relevance to your investigation and cull it if necessary. An important prerequisite to reviewing Teams content is understanding how eDiscovery (Premium) processes Teams meeting, chat conversations, and attachments when adding them to a review set. This processing of Teams content results in the following three things:
- **[Grouping](#grouping)**. How messages, posts, and replies Teams conversations are grouped together and presented in the review set. This also includes attachments in chat conversations are extracted and group within the conversation.--- **[Transcript conversation threading](#transcript-conversation-threading)**. How eDiscovery (Premium) determines what additional content from a conversation to collect to provide context around items that matched the collection criteria.-
+- **[Conversation transcript threading](#conversation-transcript-threading)**. How eDiscovery (Premium) determines what additional content from a conversation to collect to provide context around items that matched the collection criteria.
- **[Deduplication](#deduplication-of-teams-content)**. How eDiscovery (Premium) handles duplicate Teams content.- - **[Metadata](#metadata-for-teams-content)**. Metadata properties that eDiscovery (Premium) adds to Teams content after it's collected and added to a review set. Understand grouping, conversation threading, deduplication, and Teams metadata will help you optimize the review and analysis of Teams content. This section also has [tips for viewing Teams content in a review set](#tips-for-viewing-teams-content-in-a-review-set).
Understand grouping, conversation threading, deduplication, and Teams metadata w
When content from Teams chat conversations is added to a review set, messages, posts, and replies from conversations are aggregated in HTML transcript files. A single chat conversation can have multiple transcript files. An important function of these transcript files is to present Teams content as continuous conversations and not as individual (or separate) messages. This helps provides context for items that matched the search criteria of your collections in the previous step and reduce the number of items collected into the review set. Transcripts and associated items can be grouped by either *family* or *conversation*. Items in the same family will have the same value for the **FamilyId** metadata property. Items in the same conversation will have the same value for the **ConversationId** metadata property.
-The following table describes how the different types of Teams chat content are grouped by family and conversation.
+The following table describes how the different types of Teams content are grouped by family and conversation.
-|Teams content type|Group by family|Group by conversation|
-||||
+|**Teams content type**|**Group by family**|**Group by conversation**|
+|:|:|:|
|Teams 1:1 and group chats|A transcript and all of its attachments and extracted items share the same **FamilyId**. Each transcript has a unique **FamilyId**.|All transcript files and their family items within the same conversation share the same **ConversationId**. This includes the following items: <ul><li>All extracted items and attachments of all transcripts that share the same **ConversationId**.</li><li>All transcripts for the same chat conversation</li><li>All custodian copies of each transcript</li><li>Transcripts from subsequent collections from the same chat conversation</li></ul> <br/> For Teams 1:1 and group chat conversations, you might have multiple transcript files, each one corresponding to a different time frame within the conversation. Because these transcript files are from the same conversation with the same participants, they share the same **ConversationId**.| |Standard, private, and shared channel chats|Each post and all replies and attachments are saved to its own transcript. This transcript and all of its attachments and extracted items share the same **FamilyId**.|Each post and its attachments and extracted items have a unique **ConversationId**. If there are subsequent collections or new replies from the same post, the delta transcripts resulting from those collections will also have the same **ConversationId**.|
+|Teams meetings (preview)| Each meeting |
Use the **Group** control in the command bar of a review set to view Teams content grouped by family or conversation. ![Group control in command bar.](..\media\TeamsGroupControl.png) - Select **Group family attachments** to view Teams content grouped by family. Each transcript file is displayed on a line in the list of review set items. Attachments are nested under the item.- - Select **Group Teams or Yammer conversations** to view Teams content grouped by conversation. Each conversation is displayed on a line in the list of review set items. Transcript files and attachments are nested under the top-level conversation. > [!NOTE] > Cloud attachments are grouped with the conversations they appear in. This grouping is accomplished by assigning the same **FamilyId** as the transcript file of the message the file was attached to and the same **ConversationId** as the conversation the message appeared in. This means multiple copies of cloud attachments may be added to the review set if they were attached to different conversations.
-#### Viewing transcript files for conversations
+### Viewing recorded meeting transcripts (preview)
+
+The transcript of audio of the recorded meeting is captured as a separate file and indexed automatically for search. Recorded meetings in a review set are stored as a .zip file that contains the following files:
+
+- The transcript of the meeting audio in .txt format
+- The video recording of the meeting in .mp4 format
+- The thumbnail image of the meeting in .jpg format
+- Meeting metadata and meeting chapters (as applicable) in .json format
+
+To view meeting audio transcript files in a review set, you'll select the meeting and the **Transcript** viewer on the meeting details pane. The following screenshots show an example of a meeting in the Teams client and the meeting transcript file of the same meeting in the review set.
+
+#### Meeting in Teams client
+
+![Team meeting shown in Teams client.](..\media\ediscovery-meeting-in-teams-client.png)
+
+#### Meeting transcript file in review set
+
+![Meeting shown in the meeting transcript file in the review set.](..\media\ediscovery-teams-meeting-transcript-view.png)
+
+#### Viewing conversation transcript files
When viewing transcript files in a review set, some of the messages are highlighted in purple. The messages that are highlighted depend on which custodian copy of the transcript you're viewing. For example, in a 1:1 chat between User4 and User2, the messages posted by User4 are highlighted in purple when you view the transcript collected from User4's mailbox. When you view User2's transcript of the same conversation, messages posted by User2 are highlighted in purple. This highlighting behavior is based on the same Teams client experience, where a user's posts are highlighted in purple in the Teams client.
The following screenshots show an example of conversation in the Teams client an
##### Conversation in Teams client
-![Conversation shown in the transcript file in the review set.](..\media\TeamsClient1.png)
+![Conversation shown in Teams client.](..\media\TeamsClient1.png)
##### Conversation in transcript file
-![Same conversation shown in Teams client.](..\media\TeamsTranscript1.png)
+![Conversation shown in the transcript file in the review set.](..\media\ediscovery-conversation-transcript-view.png)
-### Transcript conversation threading
+### Conversation transcript threading
Conversation threading functionality in the new case format in eDiscovery (Premium) helps you identify contextual content related to items that may be relevant to your investigation. This feature produces distinct conversation views that include chat messages that precede and follow the items match the search query during collection. This capability allows you to efficiently and rapidly review complete chat conversations (called *threaded conversations*) in Microsoft Teams. As previous explained, chat conversations are reconstructed in HTML transcript files when eDiscovery (Premium) adds Teams content to a review set. Here's the logic used by eDiscovery (Premium) to include additional messages and replies transcript files that provide context around the items match the collection query (called *responsive items*) you used when collecting Teams content. Different threading behaviors are based on the types of chats and the search query used to collect the responsive items. There are two common collection scenarios: - Queries that use search parameters, such as keywords and property:value pairs- - Queries that only use date ranges
-|Teams content type|Queries with search parameters|Queries with date ranges|
-||||
+|**Teams content type**|**Queries with search parameters**|**Queries with date ranges**|
+|:|:|:|
|Teams 1:1 and group chats|Messages that were posted 12 hours before and 12 hours after responsive items are grouped with the responsive item in a single transcript file.|Messages in a 24-hour window are grouped in a single transcript file.| |Standard, private, and shared Teams channel chats|Each post that contains responsive items and all corresponding replies are grouped in a single transcript file.|Each post that contains responsive items and all corresponding replies are grouped in a single transcript file.|
Here's the logic used by eDiscovery (Premium) to include additional messages and
The following list describes the deduplication (and duplication) behavior when collecting Teams content into a review set. - Each transcript file added to a review set should be a one-to-one mapping to content stored in data locations. That means eDiscovery (Premium) doesn't collect any Teams content that has already been added to the review set. If a chat message is already collected in a review set, eDiscovery (Premium) doesn't add the same message from the same data location to the review set in subsequent collections.- - For 1:1 and group chats, copies of messages are stored in the mailbox of each conversation participant. Copies of the same conversation that exist in different participants' mailboxes are collected with different metadata. As a result, each instance of the conversation is treated as unique and brought into the review set in separate transcript files. So if all participants of a 1:1 or group chat are added as custodians in a case and included in the scope of a collection, then copies of each transcript (for the same conservation) are added to the review set and will be grouped together with the same **ConversationId**. Each of these copies is associated with a corresponding custodian. **Tip**: The **Custodian** column in the review set list identifies the custodian for the corresponding transcript file.- - In subsequent collections of items from the same conversation, only the delta content that wasn't previously collected previously is added to the review set and grouped (by sharing the same **ConversationId**) with the previously collected transcripts from the same conversation. Here's an example of this behavior: 1. Collection A collects messages in a conversation between User1 and User2 and adds to review set.- 2. Collection B collects messages from the same conversation, but there are new messages between User1 and User2 since Collection A was run.- 3. Only the new messages in Collection B are added to the review set. These messages are added to a separate transcript file, but the new transcript is grouped with the transcripts from Collection A by the same **ConversationId**. This behavior applies to all the types of Teams chats.
In large review sets with thousands or millions of items, it can be difficult to
The following table describes metadata properties for Teams content.
-|Metadata property|Description|
-|||
+|**Metadata property**|**Description**|
+|:--|:--|
|ContainsEditedMessage|Indicates whether a transcript file contains an edited message. Edited messages are identified when viewing the transcript file.| |ConversationId|A GUID that identifies the conversation that the item is associated with. Transcript files and attachments from the same conversation have the same value for this property.| |Conversation name|The name of the conversation the transcript file or attachment is associated with. For Teams 1:1 and group chats, the value of this property is the UPN of all participants of the conversation are concatenated. For example, `User3 <User3@contoso.onmicrosoft.com>,User4 <User4@contoso.onmicrosoft.com>,User2 <User2@contoso.onmicrosoft.com>`. Teams channel (standard, private, and shared) chats use the following format for conversation name: `<Team name>,<Channel name>`. For example, `eDiscovery vNext, General`.|
Each transcript file is referenced in the load file and can be located using the
Here are some tips and best practices for viewing Teams content in a review set. -- Use the **Customize columns** control in the command bar to add and organize columns to optimize the review of Teams content.-
- ![Use the Edit column flyout page to add, remove, and organize columns.](..\media\EditReviewSetColumns.png)
-
- You can add and remove columns that are useful for Teams content. You can also sequence the order of columns by dragging and dropping them in the **Edit column** flyout page. You can also sort on columns to group Teams content with similar values for the column you sort on.
-
+- Use the **Customize columns** control in the command bar to add and organize columns to optimize the review of Teams content. You can add and remove columns that are useful for Teams content. You can also sequence the order of columns by dragging and dropping them in the **Edit column** flyout page. You can also sort on columns to group Teams content with similar values for the column you sort on.
- Useful columns that to help you review Teams content include **Custodian**, **Recipients**, and **File type** or **Message kind**.- - Use [filters](ediscovery-review-set-search.md) for Teams-related properties to quickly display Teams content. There are filters for most of the metadata properties described in the previous section. ## Deleting Teams chat messages
-You can use eDiscovery (Premium) and the Microsoft Graph Explorer to respond to data spillage incidents, when content containing confidential or malicious information is released through Teams chat messages. Admins in your organization can search for and delete chat messages in Microsoft Teams. This can help you remove sensitive information or inappropriate content in Teams chat messages. For more information, see [Search and purge chat messages in Teams](ediscovery-search-and-delete-teams-chat-messages.md).
-
-## Reference guide
-
-Here's a quick reference guide for using eDiscovery (Premium) for Microsoft Teams. This guide summarizes the keys points for using eDiscovery (Premium) to preserve, collect, review, and export content from Microsoft Teams.
-
-![Thumbnail for reference guide for using eDiscovery (Premium) for Microsoft Teams.](../media/AeDTeamsReferenceGuide-thumbnail.png)
-
-[Download as a PDF file](https://download.microsoft.com/download/9/e/4/9e4eec6f-c476-452f-b414-4bd4b5c39dca/AeDTeamsReferenceGuide.pdf)
+You can use eDiscovery (Premium) and the Microsoft Graph Explorer to respond to data spillage incidents, when content containing confidential or malicious information is released through Teams chat messages. Admins in your organization can search for and delete chat messages in Microsoft Teams. This feature can help you remove sensitive information or inappropriate content in Teams chat messages. For more information, see [Search and purge chat messages in Teams](ediscovery-search-and-delete-teams-chat-messages.md).
compliance Purview Adaptive Scopes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/purview-adaptive-scopes.md
When you choose to use adaptive scopes, you're prompted to select what type of a
| Adaptive scope type | Attributes or properties supported include | |:--|:-| |**Users** - applies to: <br/> - Exchange mailboxes <br/> - OneDrive accounts <br/> - Teams chats <br/> - Teams private channel messages <br/> - Yammer user messages| First Name <br/> Last name <br/>Display name <br/> Job title <br/> Department <br/> Office <br/>Street address <br/> City <br/>State or province <br/>Postal code <br/> Country or region <br/> Email addresses <br/> Alias <br/> Exchange custom attributes: CustomAttribute1 - CustomAttribute15|
-|**SharePoint sites** - applies to: <br/> - SharePoint sites <br/> - OneDrive accounts |Site URL <br/>Site name <br/> SharePoint custom properties: RefinableString00 - RefinableString99 |
+|**SharePoint sites** - applies to: <br/> - SharePoint sites <sup>\*</sup> <br/> - OneDrive accounts |Site URL <br/>Site name <br/> SharePoint custom properties: RefinableString00 - RefinableString99 |
|**Microsoft 365 Groups** - applies to: <br/> - Microsoft 365 Group mailboxes & sites <br/> - Teams channel messages (standard and shared) <br/> - Yammer community messages <br> |Name <br/> Display name <br/> Description <br/> Email addresses <br/> Alias <br/> Exchange custom attributes: CustomAttribute1 - CustomAttribute15 |
+<sup>\*</sup> Currently, [shared channel SharePoint sites](/microsoftteams/shared-channels#shared-channel-sharepoint-sites) aren't supported for adaptive scopes.
> [!NOTE]
-> For communication compliance policies, SharePoint sites and OneDrive accounts are not supported. Excluded users and Microsoft 365 groups are supported.
+> For communication compliance policies:
+> - SharePoint sites and OneDrive accounts aren't supported.
+> - Excluded users and Microsoft 365 groups are supported.
The property names for sites are based on SharePoint site managed properties. For information about the custom attributes, see [Using Custom SharePoint Site Properties to Apply Microsoft 365 Retention with Adaptive Policy Scopes](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/using-custom-sharepoint-site-properties-to-apply-microsoft-365/ba-p/3133970).
Specifically for SharePoint sites, there might be additional SharePoint configur
> [!NOTE] > It can take up to five days for the queries to fully populate and changes will not be immediate. Factor in this delay by waiting a few days before you add a newly created scope to a policy.
-To confirm the current membership and membership changes for an adaptive scope:
+<a name="confirm-scope-membership"></a>To confirm the current membership and membership changes for an adaptive scope:
1. Double-click (or select and press Enter) the scope on the **Adaptive scopes** page
compliance Sensitivity Labels Aip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-aip.md
f1.keywords:
Previously updated : 03/14/2023 Last updated : 04/05/2023 audience: Admin
To keep informed when new labeling capabilities become available for built-in la
## How to disable the AIP add-in to use built-in labeling for Office apps
-Starting with **version 2302** for all Office deployment channels, the AIP add-in is disabled by default. For these versions, there's nothing for you to configure for users to benefit from built-in labels. If you need to use the AIP add-in rather than built-in labeling, you must [configure a new setting to override the default](#how-to-configure-newer-versions-of-office-to-enable-the-aip-add-in).
+Starting with **version 2302** for Current Channel and Semi-Annual Enterprise Channel, but **version 2303** for Monthly Enterprise Channel, the AIP add-in is disabled by default. For these versions, there's nothing for you to configure for users to benefit from built-in labels. If you need to use the AIP add-in rather than built-in labeling, you must [configure a new setting to override the default](#how-to-configure-newer-versions-of-office-to-enable-the-aip-add-in).
> [!IMPORTANT]
-> If youΓÇÖve previously used the AIP add-in as the default labeling client in Office apps and use Office versions 2302 or later, by default, the AIP add-in is automatically disabled and replaced by built-in labeling.
+> If youΓÇÖve previously used the AIP add-in as the default labeling client in Office apps and use Office versions later than the ones listed, by default, the AIP add-in is automatically disabled and replaced by built-in labeling.
To disable the AIP add-in for older versions, see the next section.
Remember, when the AIP add-in is disabled, you can still use the AIP client to e
### How to configure older versions of Office to disable the AIP add-in
-For Office apps older than version 2302, to prevent the AIP add-in from loading in Office apps, use the Group Policy setting **List of managed add-ins** as documented in [No Add-ins loaded due to group policy settings for Office 2013 and Office 2016 programs](https://support.microsoft.com/help/2733070/no-add-ins-loaded-due-to-group-policy-settings-for-office-2013-and-off).
+For Office apps older than version 2302 (Current Channel and Semi-Annual Enterprise Channel) or version 2303 (Monthly Enterprise Channel), to prevent the AIP add-in from loading in Office apps, use the Group Policy setting **List of managed add-ins** as documented in [No Add-ins loaded due to group policy settings for Office 2013 and Office 2016 programs](https://support.microsoft.com/help/2733070/no-add-ins-loaded-due-to-group-policy-settings-for-office-2013-and-off).
For your Windows Office apps that support built-in labeling, use the configuration for Microsoft Word 2016, Excel 2016, PowerPoint 2016, and Outlook 2016, specify the following programmatic identifiers (ProgID) for the AIP client, and set the option to **0: The add-in is always disabled (blocked)**
If after making these changes the **Sensitivity** button doesn't display on the
> [!CAUTION] > If you've previously set the value of **Use the Sensitivity feature in Office to apply and view sensitivity labels** to **0** (or used the equivalent registry key of **UseOfficeForLabelling**) to disable built-in labeling because you wanted to use the AIP add-in: Going forward, if you don't configure the new setting that's described in this section, you won't be able to use sensitivity labeling with either the AIP add-in or built-in labeling.
-Starting with version 2302 of the Office apps, the AIP add-in is disabled by default. To enable it, you must configure a new Office setting under **User Configuration/Administrative Templates/Microsoft Office 2016/Security Settings**:
+Starting with version 2302 (Current Channel and Semi-Annual Enterprise Channel) and version 2303 (Monthly Enterprise Channel) of the Office apps, the AIP add-in is disabled by default. To enable it, you must configure a new Office setting under **User Configuration/Administrative Templates/Microsoft Office 2016/Security Settings**:
- **Use the Azure Information Protection add-in for sensitivity labeling**. Set the value to **1**.
To smoothly transition to using built-in labeling for Office apps, use the infor
- Update any internal documentation and training, and prepare your help desk and users for change. To help you with your migration journey, we recommend the [migration guidance and playbook from Microsoft Purview Customer Experience Engineering (CxE)](https://microsoft.github.io/ComplianceCxE/playbooks/AIP2MIPPlaybook).+
+For additional information, see the Tech Community blog post, [Microsoft Purview Information Protection in M365 Apps - January 2023](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-purview-information-protection-in-m365-apps-january/ba-p/3721547).
compliance Sensitivity Labels Versions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-versions.md
The numbers listed are the minimum Office application versions required for each
|Capability |Windows |Mac |iOS |Android |Web | |--|-:|-|-|--|-|
-|[AIP add-in disabled by default](sensitivity-labels-aip.md#how-to-configure-newer-versions-of-office-to-enable-the-aip-add-in)|Current Channel: Rolling Out to 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Not relevant |Not relevant |Not relevant|Not relevant |
+|[AIP add-in disabled by default](sensitivity-labels-aip.md#how-to-configure-newer-versions-of-office-to-enable-the-aip-add-in)|Current Channel: Rolling Out to 2302+ <br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Not relevant |Not relevant |Not relevant|Not relevant |
|[Manually apply, change, or remove label](https://support.microsoft.com/office/apply-sensitivity-labels-to-your-files-and-email-in-office-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9)|Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ |16.21+ | 2.21+ | 16.0.11231+ |[Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) | |[Multi-language support](create-sensitivity-labels.md#additional-label-settings-with-security--compliance-powershell)|Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ |16.21+|2.21+ |16.0.11231+ |Under review | |[Apply a default label](sensitivity-labels.md#what-label-policies-can-do) to new documents |Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ |16.21+ |2.21+ |16.0.11231+ |[Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md)|
The numbers listed are the minimum Office application versions required for each
|[Apply a sensitivity label to files automatically](apply-sensitivity-label-automatically.md) <br /> - Using trainable classifiers |Current Channel: 2105+ <br /><br> Monthly Enterprise Channel: 2105+ <br /><br> Semi-Annual Enterprise Channel: 2108+ |16.49+ |Under review |Under review |Under review | |[Support co-authoring and AutoSave](sensitivity-labels-coauthoring.md) for labeled and encrypted documents |Current Channel: 2107+ <br /><br> Monthly Enterprise Channel: 2107+ <br /><br> Semi-Annual Enterprise Channel: 2202+ |16.51+ |2.58+ |16.0.14931+ |[Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) | |[PDF support](sensitivity-labels-office-apps.md#pdf-support)|Current Channel: 2208+ <br /><br> Monthly Enterprise Channel: 2209+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review |
-|[Sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) and [display label color](sensitivity-labels-office-apps.md#label-colors) |Current Channel: Rolling Out to 2302+<br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review |
+|[Sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) and [display label color](sensitivity-labels-office-apps.md#label-colors) |Current Channel: Rolling Out to 2302+<br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review |
|[Default sublabel for parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label)|Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review | |[Scope labels to files or emails](sensitivity-labels-office-apps.md#scope-labels-to-just-files-or-emails) |Current Channel: 2301+ <br /><br> Monthly Enterprise Channel: Under review <br /><br> Semi-Annual Enterprise Channel: Under review |16.69+ |Preview: Rolling out to [Beta Channel](https://insider.office.com/join/ios) |Preview: Rolling out to [Beta Channel](https://insider.office.com/join/android)| [Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) |
The numbers listed are the minimum Office application versions required for each
|Capability |Outlook for Windows |Outlook for Mac |Outlook on iOS |Outlook on Android |Outlook on the web | |--|-:|-||-|-|
-|[AIP add-in disabled by default](sensitivity-labels-aip.md#how-to-configure-newer-versions-of-office-to-enable-the-aip-add-in)|Current Channel: Rolling Out to 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Not relevant |Not relevant |Not relevant|Not relevant |
+|[AIP add-in disabled by default](sensitivity-labels-aip.md#how-to-configure-newer-versions-of-office-to-enable-the-aip-add-in)|Current Channel: Rolling Out to 2302+ <br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Not relevant |Not relevant |Not relevant|Not relevant |
|Manually apply, change, or remove label <br /> - [Files and emails](https://support.microsoft.com/office/apply-sensitivity-labels-to-your-files-and-email-in-office-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9)|Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ |16.21+ | 4.7.1+ | 4.0.39+ | Yes | |Manually apply, change, or remove label <br /> - [Calendar items](sensitivity-labels-meetings.md)| Current Channel: Rolling out to 2302+ |16.70+ <sup>\*</sup> |Under review |Under review |Yes | |[Multi-language support](create-sensitivity-labels.md#additional-label-settings-with-security--compliance-powershell)|Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ |16.21+ |4.7.1+ |4.0.39+ |Yes |
The numbers listed are the minimum Office application versions required for each
|[Different settings for default label and mandatory labeling](sensitivity-labels-office-apps.md#outlook-specific-options-for-default-label-and-mandatory-labeling) |Current Channel: 2105+ <br /><br> Monthly Enterprise Channel: 2105+ <br /><br> Semi-Annual Enterprise Channel: 2108+ |16.43+ <sup>\*</sup> |4.2111+ |4.2111+ |Yes | |[PDF support](sensitivity-labels-office-apps.md#pdf-support) |Current Channel: 2205+ <br /><br> Monthly Enterprise Channel: 2205+ <br /><br> Semi-Annual Enterprise Channel: Under review| Under review |Under review |Under review |Under review | |[Apply S/MIME protection](sensitivity-labels-office-apps.md#configure-a-label-to-apply-smime-protection-in-outlook) |Current Channel: 2211+ <br /><br> Monthly Enterprise Channel: 2211+ <br /><br> Semi-Annual Enterprise Channel: 2302+ | 16.61+ <sup>\*</sup> |4.2226+ |4.2203+ |Under review |
-|[Sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) |Current Channel: Rolling Out to 2302+<br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |In preview (4.2313+) |Under review |
-|[Display label color](sensitivity-labels-office-apps.md#label-colors) |Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Preview: [Current Channel (Preview)](https://office.com/insider) <sup>\*</sup> |Under review |In preview (4.2313+) |Under review |
+|[Sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) |Current Channel: Rolling Out to 2302+<br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |In preview (4.2313+) |Under review |
+|[Display label color](sensitivity-labels-office-apps.md#label-colors) |Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Preview: [Current Channel (Preview)](https://office.com/insider) <sup>\*</sup> |Under review |In preview (4.2313+) |Under review |
|[Default sublabel for parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label)|Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review | |[Scope labels to files or emails](sensitivity-labels-office-apps.md#scope-labels-to-just-files-or-emails) |Current Channel: 2301+ <br /><br> Monthly Enterprise Channel: Under review <br /><br> Semi-Annual Enterprise Channel: Under review |Rolling out: 16.70+ <sup>\*</sup> | Rolling out 4.2309+ |Rolling out 4.2309+ |Yes | |[Preventing oversharing as DLP policy tip](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup-preview)|Preview: Rolling out to [Beta Channel](https://office.com/insider) |Under review |Under review |Under review |Under review |
compliance Sit Limits https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-limits.md
# Sensitive information type limits
-These limits apply to all sensitive information types (SIT) except exact data match (EDM) sensitive information types that support up to 100 SITs.
-
-> [!NOTE]
-> We support up to 100 exact data match evaluations. Policies that use EDM SITs should not be written with a **min** or **max** instance count value greater than 100.
- These limits apply to all Microsoft Purview policies that use SITs. To ensure high performance and lower latency, there are limitations in custom SIT configurations, as described in the following table.
compliance Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/whats-new.md
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
- **General availability (GA)**: [Default sensitivity label for a SharePoint document library](sensitivity-labels-sharepoint-default-label.md) - **General availability (GA)**: Outlook for Mac [displays label colors](sensitivity-labels-office-apps.md#label-colors)
+- **Change of version for AIP add-in disabled by default**: For the Monthly Enterprise Channel only, the AIP add-in for Office apps is disabled by default in version 2303. For the Current Channel and Semi-Annual Enterprise Channel, the AIP add-in is still disabled by default in version 2302.
## March 2023
enterprise Setup Guides For Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/setup-guides-for-microsoft-365.md
description: "Microsoft 365 and Office 365 advanced deployment guides help admin
Microsoft 365 and Office 365 advanced deployment guides give you tailored guidance and resources for planning and deploying your tenant, apps, and services. These guides are created using the same best practices that [Microsoft 365 FastTrack](https://www.microsoft.com/fasttrack/microsoft-365) onboarding specialists share in individual interactions. They provide information on product setup, enabling security features, deploying collaboration tools, and provide scripts to speed up advanced deployments.
-All advanced deployment guides are available in the Microsoft 365 admin center as described in the section below, and most guides can also be found in the [Microsoft 365 Setup portal](https://aka.ms/setupguides).
+All advanced deployment guides are available in the Microsoft 365 admin center as described in the section below, and most guides can also be found in the [Microsoft 365 Setup portal](https://go.microsoft.com/fwlink/?linkid=2220880).
Access to advanced deployment guides in the admin center requires authentication to a Microsoft 365 tenant as an administrator or other role with access to the admin center. Advanced deployment guides in the Microsoft 365 Setup portal can be accessed by anyone. We have provided links to both locations for each guide, where available, in the tables below.
In this article:
## How to access advanced deployment guides in the Microsoft 365 admin center
-Advanced deployment guides are accessible from the [Advanced deployment guides & assistance](https://go.microsoft.com/fwlink/?linkid=2224913) page in the Microsoft 365 admin center. When you access advanced deployment guides from the admin center, you can keep track of the status of your progress and return at any time to complete a guide. This functionality is not available when you access guides from the [Microsoft 365 Setup portal](https://aka.ms/setupguides).
+Advanced deployment guides are accessible from the [Advanced deployment guides & assistance](https://go.microsoft.com/fwlink/?linkid=2224913) page in the Microsoft 365 admin center. When you access advanced deployment guides from the admin center, you can keep track of the status of your progress and return at any time to complete a guide. This functionality is not available when you access guides from the [Microsoft 365 Setup portal](https://go.microsoft.com/fwlink/?linkid=2220880).
> [!NOTE] > You must be assigned an admin role such as _Global Reader_ to access advanced deployment guides in the Microsoft 365 admin center. Only admins with the _Global Administrator_ role can use the guides to change settings in the tenant.
To reach the **Advanced deployment guides & assistance** page:
Advanced deployment guides in the admin center require authentication to a Microsoft 365 tenant as an administrator or other role with access to the admin center, but guides in the Microsoft 365 Setup portal can be accessed by anyone.
-|**Guide - [Setup Portal](https://aka.ms/setupguides)** |**Guide - [Admin Center](https://go.microsoft.com/fwlink/?linkid=2224913)** |**Description** |
+|**Guide - [Setup Portal](https://go.microsoft.com/fwlink/?linkid=2220880)** |**Guide - [Admin Center](https://go.microsoft.com/fwlink/?linkid=2224913)** |**Description** |
|||| |[Prepare your environment guide](https://go.microsoft.com/fwlink/?linkid=2223234)|[Prepare your environment guide](https://go.microsoft.com/fwlink/?linkid=2224195)|The **Prepare your environment guide** helps you prepare your organization's environment for Microsoft 365 and Office 365 services. Whatever your goals are, there are tasks you'll need to complete to ensure a successful deployment. To avoid any errors while preparing your environment, you're provided with step-by-step instructions to connect your domain, add users, assign licenses, set up email with Exchange Online, and install or deploy Office apps.| |[Email setup guide](https://go.microsoft.com/fwlink/?linkid=2223145)|[Email setup guide](https://go.microsoft.com/fwlink/?linkid=2224461)|The **Email setup guide** provides you with the step-by-step guidance needed for configuring Exchange Online for your organization. This guidance includes setting up new email accounts, migrating email, and configuring email protection. For a successful email setup, use this advisor and you'll receive the recommended migration method based on your organization's current mail system, the number of mailboxes being migrated, and how you want to manage users and their access.|
Advanced deployment guides in the admin center require authentication to a Micro
## Guides for authentication and access
-|**Guide - [Setup Portal](https://aka.ms/setupguides)** |**Guide - [Admin Center](https://go.microsoft.com/fwlink/?linkid=2224913)** |**Description** |
+|Guide - [Setup Portal](https://go.microsoft.com/fwlink/?linkid=2220880) |Guide - [Admin Center](https://go.microsoft.com/fwlink/?linkid=2224913) |Description |
||||
-||[Configure multi-factor authentication (MFA) guide](https://go.microsoft.com/fwlink/?linkid=2224780)|The **Configure multi-factor authentication (MFA) guide** provides customers with Azure AD Premium P1 or Azure AD Premium P2 customizable Conditional Access templates that include the most common and least intrusive security standards. When Azure AD Premium licensing isnΓÇÖt available, we provide a one-click solution to enable Security Defaults, a baseline protection policy for all users, or we provide steps to enable legacy (per-user) MFA.
+| | [Configure multi-factor authentication (MFA) guide](https://go.microsoft.com/fwlink/?linkid=2224780) | The **Configure multi-factor authentication (MFA) guide** provides customers with Azure AD Premium P1 or Azure AD Premium P2 customizable Conditional Access templates that include the most common and least intrusive security standards. When Azure AD Premium licensing isnΓÇÖt available, we provide a one-click solution to enable Security Defaults, a baseline protection policy for all users, or we provide steps to enable legacy (per-user) MFA. |
||[Identity security for Teams guide](https://go.microsoft.com/fwlink/?linkid=2224786)|The **Identity security for Teams guide** helps you with some basic security steps you can take to ensure your users are safe and have the most productive time using Teams.| |[Azure AD setup guide](https://go.microsoft.com/fwlink/?linkid=2223229)|[Azure AD setup guide](https://go.microsoft.com/fwlink/?linkid=2224193)|The **Azure AD setup guide** provides information to ensure your organization has a strong security foundation. In this guide you'll set up initial features, like Azure Role-based access control (Azure RBAC) for admins, Azure AD Connect for your on-premises directory, and Azure AD Connect Health, so you can monitor your hybrid identity's health during automated syncs.<br>It also includes essential information on enabling self-service password resets, conditional access, and integrated third party sign-on including optional advanced identity protection and user provisioning automation.| |[Add or sync users to Azure AD guide](https://go.microsoft.com/fwlink/?linkid=2223230)|[Add or sync users to Azure AD guide](https://go.microsoft.com/fwlink/?linkid=2224811)|The **Add or sync users to Azure AD guide** will help streamline the process of getting your user accounts set up in Microsoft 365. Based on your environment and needs, you can choose to add users individually, migrate your on-premises directory with Azure AD cloud sync or Azure AD Connect, or troubleshoot existing sync problems when necessary.|
-||[Plan your passwordless deployment guide](https://go.microsoft.com/fwlink/?linkid=2224194)|Use the **Plan your passwordless deployment guide** to discover the best passwordless authentication methods to use and receive guidance on how to upgrade to an alternative sign-in approach that allows users to access their devices securely with one of the following passwordless authentication methods:<ul><li>Windows Hello for Business</li><li>The Microsoft Authenticator app</li><li>Security keys</li><li>Temporary Access Pass</li></ul>||
-||[Secure your cloud apps with Single Sign on (SSO) guide](https://go.microsoft.com/fwlink/?linkid=2224689)|This guide is designed to help you add cloud apps to Microsoft 365. In our guide, you can add an application to your tenant, add users to the app, assign roles, and more. If the app supports single sign-on (SSO), weΓÇÖll walk you through that configuration.
+| | [Plan your passwordless deployment guide](https://go.microsoft.com/fwlink/?linkid=2224194) | Use the **Plan your passwordless deployment guide** to discover the best passwordless authentication methods to use and receive guidance on how to upgrade to an alternative sign-in approach that allows users to access their devices securely with one of the following passwordless authentication methods:<ul><li>Windows Hello for Business</li><li>The Microsoft Authenticator app</li><li>Security keys</li><li>Temporary Access Pass</li></ul>|
+||[Secure your cloud apps with Single Sign on (SSO) guide](https://go.microsoft.com/fwlink/?linkid=2224689)|This guide is designed to help you add cloud apps to Microsoft 365. In our guide, you can add an application to your tenant, add users to the app, assign roles, and more. If the app supports single sign-on (SSO), weΓÇÖll walk you through that configuration. |
|[Plan your self-service password reset (SSPR) deployment guide](https://go.microsoft.com/fwlink/?linkid=2223231)|[Plan your self-service password reset (SSPR) deployment guide](https://go.microsoft.com/fwlink/?linkid=2224781)|Give users the ability to change or reset their password independently, if their account is locked, or they forget their password without the need to contact a helpdesk engineer.<br>Use the **Plan your self-service password reset (SSPR) deployment guide** to receive relevant articles and instructions for configuring the appropriate Azure portal options to help you deploy SSPR in your environment.| |[Migrate from AD FS to Microsoft Azure AD](https://go.microsoft.com/fwlink/?linkid=2229256)|[Migrate from AD FS to Microsoft Azure AD](https://go.microsoft.com/fwlink/?linkid=2225005)|In **Migrate from AD FS to Microsoft Azure AD** we offer custom guidance for migrating from Active Directory Federation Services (AD FS) to Azure AD. You'll first answer a few questions about your AD FS infrastructure. Then implement either pass-through authentication (PTA) or password hash sync (PHS) to give users a streamlined experience while accessing your organization's apps.| ## Guides for security and compliance
-|**Guide - [Setup Portal](https://aka.ms/setupguides)** |**Guide - [Admin Center](https://go.microsoft.com/fwlink/?linkid=2224913)** |**Description** |
+|**Guide - [Setup Portal](https://go.microsoft.com/fwlink/?linkid=2220880)** |**Guide - [Admin Center](https://go.microsoft.com/fwlink/?linkid=2224913)** |**Description** |
|||| |[Security analyzer](https://go.microsoft.com/fwlink/?linkid=2223325)|[Security analyzer](https://go.microsoft.com/fwlink/?linkid=2224900)|The **Security analyzer** will analyze your security approach and introduce you to Microsoft integrated security and compliance solutions that can improve your security posture. You'll learn about advanced features, such as managing identities and helping to protect against modern attacks. You can then sign up for a trial subscription and be pointed to the corresponding setup guidance for each solution.| |[Set up your Microsoft Zero Trust security model](https://go.microsoft.com/fwlink/?linkid=2222968)|[Set up your Microsoft Zero Trust security model](https://go.microsoft.com/fwlink/?linkid=2224820)|Use the **Set up your Zero Trust security model guide** to configure security that effectively adapts to the complexity of the modern environment, embraces the hybrid workplace, and helps protect people, devices, apps, and data wherever they're located. Key recommendations include: always authenticate, limit user access, minimize the blast radius, segment access, verify end-to-end encryption, and use analytics to get visibility, drive threat detection, and improve defenses.|
Advanced deployment guides in the admin center require authentication to a Micro
## Guides for collaboration
-|**Guide - [Setup Portal](https://aka.ms/setupguides)** |**Guide - [Admin Center](https://go.microsoft.com/fwlink/?linkid=2224913)** |**Description** |
+|**Guide - [Setup Portal](https://go.microsoft.com/fwlink/?linkid=2220880)** |**Guide - [Admin Center](https://go.microsoft.com/fwlink/?linkid=2224913)** |**Description** |
|||| |[Build your employee experience with Microsoft 365 and Microsoft Viva dashboard](https://go.microsoft.com/fwlink/?linkid=2223653)|[Build your employee experience with Microsoft 365 and Microsoft Viva dashboard](https://go.microsoft.com/fwlink/?linkid=2224787)|Transform how your employees work together with the **Build your employee experience with Microsoft 365 and Microsoft Viva dashboard**. For seamless teamwork, use Microsoft 365 to create productive, aligned teams, and keep employees engaged with leadership and the rest of the organization. Help your employees be effective in all work activities. These guides will provide instructions on how to use SharePoint, Teams, and Yammer to build collaboration across your org to help drive productivity.| |[Microsoft 365 Apps setup guide](https://go.microsoft.com/fwlink/?linkid=2223409)|[Microsoft 365 Apps setup guide](https://go.microsoft.com/fwlink/?linkid=2224187)|The **Microsoft 365 Apps setup guide** helps you get your users' devices running the latest version of Office products like Word, Excel, PowerPoint, and OneNote. You'll get guidance on the various deployment methods that include easy self-install options to enterprise deployments with management tools. The instructions will help you assess your environment, figure out your specific deployment requirements, and implement the necessary support tools to ensure a successful installation.|
Advanced deployment guides in the admin center require authentication to a Micro
## Advanced guides
-|**Guide - [Setup Portal](https://aka.ms/setupguides)** |**Guide - [Admin Center](https://go.microsoft.com/fwlink/?linkid=2224913)** |**Description** |
+|**Guide - [Setup Portal](https://go.microsoft.com/fwlink/?linkid=2220880)** |**Guide - [Admin Center](https://go.microsoft.com/fwlink/?linkid=2224913)** |**Description** |
|||| ||[In-place upgrade with Configuration Manager guide](https://go.microsoft.com/fwlink/?linkid=2224789)|Use the **In-place upgrade with Configuration Manager guide** when upgrading Windows 7 and Windows 8.1 devices to the latest version of Windows 10. You'll use the script provided to check the prerequisites and automatically configure an in-place upgrade.| ||[Deploy Office to your users guide](https://go.microsoft.com/fwlink/?linkid=2224458)|Deploy Office apps from the cloud with the ability to customize your installation by using the Office Deployment Tool. The **Deploy Office to your users guide** helps you create a customized Office configuration with advanced settings, or you can use a pre-built recommended configuration. Whether your users are conducting a self-install or you're deploying to your users individually or in bulk, this advanced guide provides you with step-by-step instructions to give users an Office installation tailored to your organization.|
frontline Flw Setup Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/flw-setup-microsoft-365.md
appliesto: - Microsoft Teams - Microsoft 365 for frontline workers Previously updated : 02/01/2023 Last updated : 04/04/2023 # Set up Microsoft 365 for frontline workers
The Microsoft 365 admin center has a set of [Setup guides](/microsoft-365/enterp
## Step 3: Provision users, configure groups, and assign licenses
-Now that you have Microsoft 365 set up, you can start to add users, organize them into groups, and assign licenses.
+Now that you have Microsoft 365 set up, you can start to add users, organize them into groups, and assign licenses. Much of this information is also in the [downloadable technical planning guide](https://go.microsoft.com/fwlink/?linkid=2211637).
### Provision users
frontline Flw Technical Planning Guide Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/flw-technical-planning-guide-deployment.md
- Title: Technical planning guide for deploying frontline solutions------
-description: Use this guide to help your technical teams plan and deploy MicrosoftΓÇÖs frontline solution in the context of your organizationΓÇÖs existing deployment infrastructure and core business apps.
-
- - M365-collaboration
- - m365-frontline
- - highpri
- - tier2
-appliesto:
- - Microsoft 365 for frontline workers
Previously updated : 10/28/2022---
-# Technical planning guide for deploying frontline solutions (white paper)
-
-Technical teams who are involved in planning and implementing a frontline solution must understand frontline workers' day-to-day experiences, needs and challenges, and adopt new practices for managing user access and application service delivery for a mobile-only workforce.
-
-Use this guide to help you plan and deploy Microsoft's frontline solution in the context of your organization's existing infrastructure and core business apps. This guide covers the following areas:
--- Overview of Microsoft's frontline solution-- Frontline deployment architecture-- Frontline deployment process-
-[Download the guide](https://go.microsoft.com/fwlink/?linkid=2211637).
includes New Teams Sfb Admin Center Notice https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/new-teams-sfb-admin-center-notice.md
+The Microsoft Teams admin center is gradually replacing the Skype for Business admin center, and we're migrating Teams settings to it from the Microsoft 365 admin center. If a setting has been migrated, you'll see a notification and then be directed to the setting's location in the Teams admin center. For more information, see [Manage Teams during the transition to the Teams admin center](/microsoftteams/manage-teams-skypeforbusiness-admin-center).
security Attack Simulations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-simulations.md
Last updated 12/18/2020
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:**-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037) - [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
security Configure Endpoints Gp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-gp.md
Browse to **Computer Configuration** \> **Policies** \> **Administrative Templat
2. Browse to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Windows Defender SmartScreen** > **Microsoft Edge**.
- :::image type="content" source="images/config-windows-def-smartscr-edge.png" alt-text="Screenshot that shows configure windows defender smart screen Edge." lightbox="images/config-windows-def-smartscr-edge.png":::
+ :::image type="content" source="![windows-def-smartscr-edge](https://user-images.githubusercontent.com/13512492/216648828-038320e8-d028-4a2a-b80e-423a316d22ab.png)" alt-text="Configure windows defender smart screen Edge" lightbox="images/![windows-def-smartscr-edge](https://user-images.githubusercontent.com/13512492/216648874-90d71551-81e5-4a75-8dbc-2cc743e2ec7f.png)":::
### Configure Potentially Unwanted Applications
security Gov https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/gov.md
These are the known gaps:
||::|::|::| |Microsoft Secure Score|![Yes](images/svg/check-yes.svg)|![No](images/svg/check-no.svg)|![No](images/svg/check-no.svg)| |Microsoft Threat Experts|![No](images/svg/check-no.svg)|![No](images/svg/check-no.svg)|![No](images/svg/check-no.svg)|-
+| Microsoft Defender for Endpoint Security Configuration Management|![No](images/svg/check-no.svg)|![No](images/svg/check-no.svg)|![No](images/svg/check-no.svg)|
+
**Footnote** <sup>1</sup> While Microsoft Secure Score is available for GCC customers, there are some security recommendations that aren't available.
security Linux Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-whatsnew.md
Title: What's new in Microsoft Defender for Endpoint on Linux
description: List of major changes for Microsoft Defender for Endpoint on Linux. keywords: microsoft, defender, Microsoft Defender for Endpoint, linux, whatsnew, release
-ms.sitesec: library
-ms.pagetype: security
+ ms.localizationpriority: medium Previously updated : 11/03/2022 Last updated : 04/05/2023 audience: ITPro
This article is updated frequently to let you know what's new in the latest rele
&ensp;Signature version: **1.379.1299.0**<br/> **What's new** - This new release is build over March 2023 release (101.98.05) with fix for Live response commands failing for one of our customers. There is no change for other customers and upgrade is optional.
+
+**Known issues**
+
+- With mdatp version 101.98.30 you might see a health false issue in some of the cases, because SELinux rules are not defined for certain scenarios. The health warning could look something like this:
+
+*found SELinux denials within last one day. If the MDATP is recently installed, please clear the existing audit logs or wait for a day for this issue to auto-resolve. Please use command: \"sudo ausearch -i -c 'mdatp_audisp_pl' | grep \"type=AVC\" | grep \" denied\" to find details*
+
+The issue could be mitigated by running the following commands.
+
+```
+sudo ausearch -c 'mdatp_audisp_pl' --raw | sudo audit2allow -M my-mdatpaudisppl_v1
+sudo semodule -i my-mdatpaudisppl_v1.pp
+```
+
+Here my-mdatpaudisppl_v1 represents the policy module name. After running the commands, either wait for 24 hours or clear/archive the audit logs. The audit logs could be archived by running the following command
+
+```
+sudo service auditd stop
+sudo systemctl stop mdatp
+cd /var/log/audit
+sudo gzip audit.*
+sudo service auditd start
+sudo systemctl start mdatp
+mdatp health
+```
+
+In case the issue reappears with some different denials. We need to run the mitigation again with a different module name(eg my-mdatpaudisppl_v2).
+ </details> <details>
security Machines View Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machines-view-overview.md
Last updated 12/18/2020
- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037) - [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../defender-vulnerability-management/index.yml)
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-machinesview-abovefoldlink)
Filter | Description
**Exclusion state** </br> | Filter the list based on whether the device has been excluded or not. For more information, see [Exclude devices](exclude-devices.md). **OS Platform** </br>| Filter by the OS platforms you're interested in investigating </br></br>(_Computers and mobile and IoT devices only_) **First seen** </br> | Filter your view based on when the device was first seen in the network or when it was first reported by the Microsoft Defender for Endpoint sensor.</br></br>(_Computers and mobile and IoT devices only_)
-**Windows version** </br> | Filter by the Windows versions you're interested in investigating.</br></br> (_Computers and mobile only_)
+**Windows version** </br> | Filter by the Windows versions you're interested in investigating. If ΓÇÿfuture versionΓÇÖ appears in the Windows version field, it can mean:</br></br> - This is a pre-release build for a future Windows release</br> - The build has no version name</br> - The build version name is not yet supported </br></br> In all these scenarios, where available, the full OS version can be seen in the device details page.</br></br> (_Computers and mobile only_)
**Sensor health state** </br> | Filter by the following sensor health states, for devices onboard to Microsoft Defender for Endpoint:</br> - **Active**: Devices that are actively reporting sensor data to the service.</br> - **Inactive**: Devices that have stopped sending signals for more than 7 days. </br> - **Misconfigured**: Devices that have impaired communications with service or are unable to send sensor data. </br> Misconfigured devices can further be classified to: </br> - No sensor data </br> - Impaired communications </br> For more information on how to address issues on misconfigured devices see, [Fix unhealthy sensors](/microsoft-365/security/defender-endpoint/fix-unhealthy-sensors).</br></br> (_Computers and mobile only_) **Onboarding status** </br> | Onboarding status indicates whether the device is currently onboarded to Microsoft Defender for Endpoint or not. You can filter by the following states: </br> - **Onboarded**: The endpoint is onboarded to Microsoft Defender for Endpoint. </br> - **Can be onboarded**: The endpoint was discovered in the network as a supported device, but it's not currently onboarded. Microsoft highly recommends onboarding these devices. </br> - **Unsupported**: The endpoint was discovered in the network, but is not supported by Microsoft Defender for Endpoint. </br> - **Insufficient info**: The system couldn't determine the supportability of the device.</br></br> (_Computers and mobile only_) **Antivirus status** </br> | Filter the view based on whether the antivirus status is disabled, not updated or unknown.</br></br> (_Computers and mobile only_)
security Mde Device Control Device Installation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-device-control-device-installation.md
If the **Apply layered order of evaluation for Allow and Prevent device installa
### Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria
-This policy setting will change the evaluation order in which Allow and Prevent policy settings are applied when more than one install policy setting is applicable for a given device. Enable this policy setting to ensure that overlapping device match criteria is applied based on an established hierarchy where more specific match criteria supersedes less specific match criteria. The hierarchical order of evaluation for policy settings that specify device match criteria is as follows:
+This policy setting will change the evaluation order in which Allow and Prevent policy settings are applied when more than one install policy setting is applicable for a given device. Enable this policy setting to ensure that overlapping device match criteria are applied based on an established hierarchy where more specific match criteria supersedes less specific match criteria. The hierarchical order of evaluation for policy settings that specify device match criteria is as follows:
**Device instance IDs** \> **Device IDs** \> **Device setup class** \> **Removable devices**
Prevent installation of removable devices
This policy setting allows you to specify a list of Plug and Play hardware IDs and compatible IDs for devices that Windows is prevented from installing. By default, this policy setting takes precedence over any other policy setting that allows Windows to install a device. > [!NOTE]
-> To enable the **Allow installation of devices that match any of these device instance IDs** policy setting to supersede this policy setting for applicable devices, enable the **Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria** policy setting. Also, the allow policy won't take precedence if the **Block Removable Storage** option is selected in Device Control.
+> To enable the **Allow installation of devices that match any of these device instance IDs** policy setting to supersede this policy setting for applicable devices, enable the **Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria** policy setting.
If you enable this policy setting, Windows is prevented from installing a device whose hardware ID or compatible ID appears in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
If you disable or don't configure this policy setting, Windows can install and u
This policy setting allows you to prevent Windows from installing removable devices. A device is considered removable when the driver for the device to which it's connected indicates that the device is removable. For example, a Universal Serial Bus (USB) device is reported to be removable by the drivers for the USB hub to which the device is connected. By default, this policy setting takes precedence over any other policy setting that allows Windows to install a device. > [!NOTE]
-> To enable the **Allow installation of devices using drivers that match these device setup classes**, **Allow installation of devices that match any of these device IDs**, and **Allow installation of devices that match any of these device instance IDs** policy settings to supersede this policy setting for applicable devices, enable the **Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria** policy setting.
+> To enable the **Allow installation of devices using drivers that match these device setup classes**, **Allow installation of devices that match any of these device IDs**, and **Allow installation of devices that match any of these device instance IDs** policy settings to supersede this policy setting for applicable devices, enable the **Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria** policy setting. Also, the allow policy wonΓÇÖt take precedence if the **Block Removable Storage** option is selected in Device Control.
If you enable this policy setting, Windows is prevented from installing removable devices and existing removable devices cannot have their drivers updated. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of removable devices from a remote desktop client to the remote desktop server.
security Microsoft Defender Antivirus Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates.md
description: Manage how Microsoft Defender Antivirus receives protection and pro
keywords: updates, security baselines, protection, schedule updates, force updates, mobile updates, wsus ms.localizationpriority: high Previously updated : 04/04/2023 Last updated : 04/05/2023 audience: ITPro
All our updates contain
- Serviceability improvements - Integration improvements (Cloud, [Microsoft 365 Defender](/microsoft-365/security/defender/microsoft-365-defender))
+### March-2023 (Platform: 4.18.2302.x | Engine: 1.1.20200.4)
+
+- Security intelligence update version: **1.381.61.0**
+- Release date: **April 4, 2023 (Engine) / April 11, 2023 (Platform)**
+- Platform: **4.18.2302.x**
+- Engine: **1.1.20200.4**
+- Support phase: **Security and Critical Updates**
+
+#### What's new
+
+- Beginning in April 2023, monthly platform and engine version release information now includes two dates: Engine and Platform
+- Increased file hash support
+
+#### Known issues
+
+- None
+ ### February-2023 (Platform: 4.18.2302.7 | Engine: 1.1.20100.6) - Security intelligence update version: **1.385.68.0**
All our updates contain
- None
-### November-2022 (Platform: 4.18.2211.5 | Engine: 1.1.19900.2)
--- Security intelligence update version: **1.381.144.0** -- Release date: **December 8, 2022**-- Platform: **4.18.2211.5** -- Engine: **1.1.19900.2**-
-#### What's new
--- Enhanced threat protection capabilities-- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) capabilities-- Enhanced enabling of tamper protection for newly onboarded devices-- Improved reporting for [cloud protection](cloud-protection-microsoft-defender-antivirus.md)-- Improved [controlled folder access](controlled-folders.md) notifications-- Improved scanning of network shares-- Enhanced processing of host files containing a wild card-- Improved performance for [scan events](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)-
-#### Known Issues
--- None - ### Previous version updates: Technical upgrade support only After a new package version is released, support for the previous two versions is reduced to technical support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).
The below table provides the Microsoft Defender Antivirus platform and engine ve
|1607 (RS1) |`4.10.14393.3683` |`1.1.12805.0` | Technical upgrade support (only) | For Windows 10 release information, see the [Windows lifecycle fact sheet](https://support.microsoft.com/help/13853/windows-lifecycle-fact-sheet).
+
+> [!NOTE]
+> Windows Server 2016 ships with the same Platform version as RS1 and falls under the same support phase: Technical upgrade support (only)
+> Windows Server 2019 ships with the same Platform version as RS5 and falls under the same support phase: Technical upgrade support (only)
## Updates for Deployment Image Servicing and Management (DISM)
security Msda Updates Previous Versions Technical Upgrade Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md
ms.localizationpriority: medium Previously updated : 02/23/2023 Last updated : 04/04/2023 audience: ITPro
search.appverid: met150
Microsoft regularly releases [security intelligence updates and product updates for Microsoft Defender Antivirus](microsoft-defender-antivirus-updates.md). It's important to keep Microsoft Defender Antivirus up to date. When a new package version is released, support for the previous two versions is reduced to technical support only. Versions that are older than the previous two versions are listed in this article and are provided for technical upgrade support only.
+## November-2022 (Platform: 4.18.2211.5 | Engine: 1.1.19900.2)
+
+- Security intelligence update version: **1.381.144.0**
+- Release date: **December 8, 2022**
+- Platform: **4.18.2211.5**
+- Engine: **1.1.19900.2**
+- Support phase: **Technical upgrade support (only)**
++
+### What's new
+
+- Enhanced threat protection capabilities
+- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) capabilities
+- Enhanced enabling of tamper protection for newly onboarded devices
+- Improved reporting for [cloud protection](cloud-protection-microsoft-defender-antivirus.md)
+- Improved [controlled folder access](controlled-folders.md) notifications
+- Improved scanning of network shares
+- Enhanced processing of host files containing a wild card
+- Improved performance for [scan events](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)
+
+### Known Issues
+
+- None
+ ## October-2022 (Platform: 4.18.2210.6 | Engine: 1.1.19800.4) - Security intelligence update version: **1.379.4.0**
security Network Protection Macos https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection-macos.md
To prepare for the macOS network protection rollout, we recommend the following:
- You can run your corporate VPN in tandem or "side by side" with network protection. Currently, no VPN conflicts are identified. If you do experience conflicts, you can provide feedback through the feedback channel listed at the bottom of this page. - Web content filtering is supported with network protection for macOS.
- - If network protection is configured and active on the device, web content filtering (WCF) policies created in the MDEP Portal are respected in browsers, including Chromium Microsoft Edge for macOS. Web content filtering in Microsoft Edge on Mac currently requires network protection; other E5 feature, such as Microsoft Defender for Cloud Apps or Custom Indicators currently also require network protection.
+ - If network protection is configured and active on the device, web content filtering (WCF) policies created in the MDEP Portal are respected in browsers, including Chromium Microsoft Edge for macOS. Web content filtering in Microsoft Edge on Mac currently requires network protection; other E5 features, such as Microsoft Defender for Cloud Apps or Custom Indicators, currently also require network protection.
### Known issues
To prepare for the macOS network protection rollout, we recommend the following:
## Prerequisites -- Licensing: Microsoft 365 Defender for Endpoint tenant (can be trial)
+- Licensing: Microsoft 365 Defender for Endpoint Plan 1 or Microsoft 365 Defender for Endpoint Plan 2 (can be trial)
- Onboarded Machines: - Minimum macOS version: 11 - Product version 101.94.13 or later
security Onboard Windows Multi Session Device https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-windows-multi-session-device.md
Also, if you're using FSlogix user profiles, we recommend you exclude the follow
#### Licensing requirements
-Note on licensing: When using Windows Enterprise multi-session, depending on your requirements, you can choose to either have all users licensed through Microsoft Defender for Endpoint (per user), Windows Enterprise E5, Microsoft 365 Security, or Microsoft 365 E5, or have the VM licensed through Microsoft Defender for Cloud.
+Note on licensing: When using Windows Enterprise multi-session, depending on your requirements, you can choose to either have all users licensed through Microsoft Defender for Endpoint (per user), Windows Enterprise E5, Microsoft 365 E5 Security, or Microsoft 365 E5, or have the VM licensed through Microsoft Defender for Cloud.
Licensing requirements for Microsoft Defender for Endpoint can be found at: [Licensing requirements](minimum-requirements.md#licensing-requirements). ### Known issues and limitations
security Tune Performance Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/tune-performance-defender-antivirus.md
New-MpPerformanceRecording -RecordTo C:\LocalPathOnServer02\trace.etl -Session $
The above command collects a performance recording on Server02 (as specified by argument $s of parameter Session) and saves it to the specified path: **C:\LocalPathOnServer02\trace.etl** on Server02.
-##### Example 3: Collect a performance recording in non-interactive mode
-
-```powershell
-New-MpPerformanceRecording -RecordTo .\Defender-scans.etl -Seconds 60
-```
-
-The above command collects a performance recording for the duration in seconds specified by parameter -Seconds. This is recommended for users conducting batch collections that require no interaction or prompt.
#### Parameters: New-MpPerformanceRecording
Accept pipeline input: False
Accept wildcard characters: False ```
-##### -Seconds
-
-Specifies the duration of the performance recording in seconds. This is recommended for users conducting batch collections that require no interaction or prompt.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: 0
-Accept pipeline input: False
-Accept wildcard characters: False
-```
- ### Get-MpPerformanceReport The following section describes the Get-MpPerformanceReport PowerShell cmdlet. Analyzes and reports on Microsoft Defender Antivirus performance recording.
security Defender Vulnerability Management Capabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities.md
This article helps clarify the Defender Vulnerability Management capabilities included in: - [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management add-on](../defender-vulnerability-management/index.yml)-- [Microsoft Defender Vulnerability Management Standalone](../defender-vulnerability-management/index.yml)
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Servers](/azure/defender-for-cloud/plan-defender-for-servers-select-plan) ## Start a trial
security Defender Vulnerability Management Trial https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-trial.md
Title: About the Microsoft Defender Vulnerability Management public preview trial
+ Title: About the Microsoft Defender Vulnerability Management trial
description: Learn about the Microsoft Defender Vulnerability Management trial keywords: defender vulnerability management
Your trial will be effective immediately:
It can take up to 6 hours for all vulnerability management features to appear in your left navigation. Sign out and sign back in to see the updates.
+To make the most of your trial, see [Trial user guide: Microsoft Defender Vulnerability Management](/trial-user-guide-defender-vulnerability-management.md)
+ > [!NOTE] > Defender Vulnerability Management Standalone trial is in public preview. Details on your purchase options for this new offering will be made available once the offering is generally available.
security Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management.md
Last updated 05/09/2022
> [!IMPORTANT] > Some information in this article relates to prereleased products/services that might be substantially modified before they are commercially released. Microsoft makes no warranties, express or implied, for the information provided here. - Reducing cyber risk requires comprehensive risk-based vulnerability management to identify, assess, remediate, and track all your biggest vulnerabilities across your most critical assets, all in a single solution. Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Leveraging Microsoft threat intelligence, breach likelihood predictions, business contexts, and devices assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk.
Watch the following video to learn more about Defender Vulnerability Management.
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Y1FX]
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
- > [!TIP]
-> For more information on the features and capabilities that are included in each offering, see [Compare Microsoft Defender Vulnerability Management offerings.](defender-vulnerability-management-capabilities.md)
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+
+For more information on the features and capabilities that are included in each offering, see [Compare Microsoft Defender Vulnerability Management offerings](defender-vulnerability-management-capabilities.md).
With Defender Vulnerability Management, you can empower your security and IT teams to bridge workflow gaps and prioritize and address critical vulnerabilities and misconfigurations across your organization. Reduce cyber security risk with:
security Threat And Vuln Mgt Event Timeline https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/threat-and-vuln-mgt-event-timeline.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
- [!include[Prerelease information](../../includes/prerelease.md)] Event timeline is a risk news feed that helps you interpret how risk is introduced into the organization through new vulnerabilities or exploits. You can view events that may impact your organization's risk. For example, you can find new vulnerabilities that were introduced, vulnerabilities that became exploitable, exploit that was added to an exploit kit, and more.
Event timeline is a risk news feed that helps you interpret how risk is introduc
Event timeline also tells the story of your [exposure score](tvm-exposure-score.md) and [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md) so you can determine the cause of large changes. Events can impact your devices or your score for devices. Reduce you exposure by addressing what needs to be remediated based on the prioritized [security recommendations](tvm-security-recommendation.md). > [!TIP]
-> To get emails about new vulnerability events, see [Configure vulnerability email notifications in Microsoft Defender for Endpoint](../defender-endpoint/configure-email-notifications.md)
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
## Navigate to the Event timeline page
-There are also three entry points from the [Microsoft Defender Vulnerability Management dashboard](tvm-dashboard-insights.md):
+There are three entry points from the [Microsoft Defender Vulnerability Management dashboard](tvm-dashboard-insights.md):
- **Organization exposure score card**: Hover over the event dots in the "Exposure Score over time" graph and select "See all events from this day." The events represent software vulnerabilities. - **Microsoft Secure Score for Devices**: Hover over the event dots in the "Your score for devices over time" graph and select "See all events from this day." The events represent new configuration assessments.
security Tvm Assign Device Value https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-assign-device-value.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
- [!include[Prerelease information](../../includes/prerelease.md)] Defining a device's value helps you differentiate between asset priorities. The device value is used to incorporate the risk appetite of an individual asset into the Defender Vulnerability Management exposure score calculation. Devices assigned as "high value" will receive more weight.
Examples of devices that should be assigned a high value:
- VIP devices - Devices hosting internal/external production services
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## Choose device value 1. Navigate to any device page, the easiest place is from the device inventory.
security Tvm Block Vuln Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-block-vuln-apps.md
Last updated 04/12/2022
**Applies to:** -- [Microsoft Defender Vulnerability Management](index.yml)
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan) + > [!NOTE] > To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
-- Remediating vulnerabilities takes time and can be dependent on the responsibilities and resources of the IT team. Security admins can temporarily reduce the risk of a vulnerability by taking immediate action to block all currently known vulnerable versions of an application, until the remediation request is completed. The block option gives IT teams time to patch the application without security admins worrying that the vulnerabilities will be exploited in the meantime. While taking the remediation steps suggested by a security recommendation, security admins with the proper permissions can perform a mitigation action and block vulnerable versions of an application. File indicators of compromise (IOC)s are created for each of the executable files that belong to vulnerable versions of that application. Microsoft Defender Antivirus then enforces blocks on the devices that are in the specified scope.
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## Block or warn mitigation action The **block action** is intended to block all installed vulnerable versions of the application in your organization from running. For example, if there's an active zero-day vulnerability you can block your users from running the affected software while you determine work-around options.
security Tvm Browser Extensions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-browser-extensions.md
Last updated 04/11/2022
**Applies to:** -- [Microsoft Defender Vulnerability Management](index.yml)
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan) + > [!NOTE] > To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
-- A browser extension is a small software application that adds functionality to a web browser. Visibility into the browser extensions installed can help you ensure the safe usage of extensions in your organization. The **Browser extensions** page displays a list of the browser extensions installed across different browsers in your organization. For each installed extension, you can see the devices it's installed on and if it's turned on or off on these devices. The information available will not only help you learn about the installed extensions, but it can help you make decisions on how you would like to manage the extensions.
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## View your browser extensions 1. Go to **Vulnerability management** \> **Software inventory** in the [Microsoft 365 Defender portal](https://security.microsoft.com).
security Tvm Certificate Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-certificate-inventory.md
Last updated 04/11/2022
**Applies to:** -- [Microsoft Defender Vulnerability Management](index.yml)
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
+- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
+ > [!NOTE] > To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
-- Certificates can be used in multiple ways, this includes: - being part of the TLS\SSL protocol
The **Certificate inventory** lets you view a list of the certificates installed
- Detect potential vulnerabilities due to the use of weak signature algorithm (e.g. SHA-1-RSA), short key size (e.g. RSA 512bit), or weak signature hash algorithm (e.g. MD5) - Ensure compliance with regulatory guidelines and organizational policy
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## View your certificates 1. Go to **Vulnerability management** > **Software inventory** in the [Microsoft 365 Defender portal](https://security.microsoft.com).
security Tvm Dashboard Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-dashboard-insights.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
+- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
[!include[Prerelease information](../../includes/prerelease.md)]
Watch this video for a quick overview of what is in the Defender Vulnerability M
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4r1nv]
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## Vulnerability management dashboard :::image type="content" source="../../mediashboard.png" alt-text="Defender Vulnerability Management dashboard ":::
security Tvm End Of Support Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-end-of-support-software.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
- [!include[Prerelease information](../../includes/prerelease.md)] End-of-support (EOS), otherwise known as end-of-life (EOL), for software or software versions means that they will no longer be supported or serviced, and will not receive security updates. When you use software or software versions with ended support, you're exposing your organization to security vulnerabilities, legal, and financial risks.
It's crucial for Security and IT Administrators to work together and ensure that
> [!NOTE] > End-of-support capability is currently available only for Windows products.
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## Find software or software versions that are no longer supported 1. From the vulnerability management menu, navigate to [**Recommendations**](tvm-security-recommendation.md).
security Tvm Exception https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-exception.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
- [!include[Prerelease information](../../includes/prerelease.md)] As an alternative to a remediation request when a recommendation isn't relevant at the moment, you can create exceptions for recommendations. If your organization has device groups, you'll be able to scope the exception to specific device groups. Exceptions can either be created for selected device groups, or for all device groups past and present. When an exception is created for a recommendation, the recommendation won't be active until the end of the exception duration. The recommendation state changes to **Full exception** or **Partial exception** (by device group).
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## Permissions Only users with "exceptions handling" permissions can manage exceptions (including creating or canceling). [Learn more about RBAC roles](../defender-endpoint/user-roles.md).
security Tvm Exposure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-exposure-score.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
+- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
[!include[Prerelease information](../../includes/prerelease.md)]
Exposure score is broken down into the following levels:
- 30-69: medium exposure score - 70-100: high exposure score
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## How to use exposure score to reduce your vulnerability exposure When software weaknesses are identified, they are transformed into recommendations and prioritized based on risk to the organization. By remediating vulnerabilities with [security recommendations](tvm-security-recommendation.md) prioritized to reduce your exposure score, you can reduce your overall vulnerability exposure.
security Tvm Hardware And Firmware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-hardware-and-firmware.md
Last updated 11/23/2022
**Applies to:** -- [Microsoft Defender Vulnerability Management](index.yml)
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan) + > [!NOTE] > To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
-- Firmware and hardware attacks are on the rise. Attackers are increasingly targeting firmware and device drivers of hardware components to gain high privilege and persistence. Visibility into the threat posture of your firmware and hardware, and timely remediation of identified vulnerabilities is a vital part of keeping your organization secure. Microsoft Defender Vulnerability Management hardware and firmware assessment provides a list of known hardware and firmware in your organization. It provides individual inventories for system models, processors, and BIOS. Each view includes details such as the name of the vendor, number of weaknesses, threats insights, and the number of exposed devices.
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## View your hardware and firmware To access the hardware and firmware assessment page:
security Tvm Hunt Exposed Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-hunt-exposed-devices.md
Last updated 03/04/2022
# Hunt for exposed devices
-**Applies to:**
-
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
+- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
[!include[Prerelease information](../../includes/prerelease.md)] ## Use advanced hunting to find devices with vulnerabilities
-Advanced hunting is a query-based threat-hunting tool that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate threat indicators and entities. The flexible access to data enables unconstrained hunting for both known and potential threats. [Learn more about advanced hunting](../defender-endpoint/advanced-hunting-overview.md)
+Advanced hunting is a query-based threat-hunting tool that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate threat indicators and entities. The flexible access to data enables unconstrained hunting for both known and potential threats. to Learn more about advanced hunting, see [Advanced hunting overview](../defender-endpoint/advanced-hunting-overview.md).
+
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
### Schema tables
security Tvm Microsoft Secure Score Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-microsoft-secure-score-devices.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
- [!include[Prerelease information](../../includes/prerelease.md)] > [!NOTE]
Your score for devices is visible in the [Defender Vulnerability Management dash
Select a category to go to the [**Security recommendations**](tvm-security-recommendation.md) page and view the relevant recommendations.
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## How it works > [!NOTE]
security Tvm Network Share Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-network-share-assessment.md
Last updated 04/27/2022
**Applies to:** -- [Microsoft Defender Vulnerability Management](index.yml)
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan) + > [!NOTE] > To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
-- The ability to share files and folders over a network allows users to provide access to resources like files, documents, and media to other people on the network. As network shares can be easily accessed by network users, some common weaknesses exist that can cause network shares to be vulnerable. When vulnerable network share configurations are identified, they're mapped to actionable security recommendations in the Security recommendations page. The following recommendations can help protect against vulnerabilities in network shares that could be exploited by attackers:
When vulnerable network share configurations are identified, they're mapped to a
- Remove share write permission set to 'Everyone' - Set folder enumeration for shares
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## Find information about exposed network shares To see security recommendations addressing network share configurations:
security Tvm Remediation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-remediation.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
- [!include[Prerelease information](../../includes/prerelease.md)] Watch this short video to learn how Microsoft Defender Vulnerability Management discovers vulnerabilities and misconfigurations on your endpoints and provides actionable insights that help you quickly remediate threats and vulnerabilities in your environment. > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4qLVs]
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## Request remediation Vulnerability management capabilities bridges the gap between Security and IT administrators through the remediation request workflow. Security admins like you can request for the IT Administrator to remediate a vulnerability from the **Recommendation** pages to Intune.
security Tvm Security Baselines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-security-baselines.md
Last updated 04/12/2022
**Applies to:** -- [Microsoft Defender Vulnerability Management](index.yml)
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan) + > [!NOTE] > To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
-- Instead of running never-ending compliance scans, security baselines assessment helps you to continuously and effortlessly monitor your organization's security baselines compliance and identify changes in real time. A security baseline profile is a customized profile that you can create to assess and monitor endpoints in your organization against industry security benchmarks. When you create a security baseline profile, you're creating a template that consists of multiple device configuration settings and a base benchmark to compare against. Security baselines provide support for Center for Internet Security (**CIS)** benchmarks for Windows 10, Windows 11, and Windows Server 2008 R2 and above, as well as Security Technical Implementation Guides (**STIG)** benchmarks for Windows 10 and Windows Server 2019.
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## Get started with security baselines assessment 1. Go to **Vulnerability management** > **Baselines assessment** in the [Microsoft 365 Defender portal](https://security.microsoft.com).
security Tvm Security Recommendation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-security-recommendation.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
- [!include[Prerelease information](../../includes/prerelease.md)]
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ Cybersecurity weaknesses identified in your organization are mapped to actionable security recommendations and prioritized by their impact. Prioritized recommendations help shorten the time to mitigate or remediate vulnerabilities and drive compliance. Each security recommendation includes actionable remediation steps. To help with task management, the recommendation can also be sent using Microsoft Intune and Microsoft Endpoint Configuration Manager. When the threat landscape changes, the recommendation also changes as it continuously collects information from your environment.
security Tvm Software Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-software-inventory.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
+- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
[!include[Prerelease information](../../includes/prerelease.md)] The software inventory in Defender Vulnerability Management is a list of known software in your organization. The default filter on the software inventory page displays all software with official [Common Platform Enumerations (CPE)](https://nvd.nist.gov/products/cpe). The view includes details such as the name of the vendor, number of weaknesses, threats, and number of exposed devices.
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ You can remove the **CPE Available** filter, to gain further visibility and increase your search scope across all installed software in your organization. This means all software, including software without a CPE, will now display in the software inventory list. > [!NOTE]
security Tvm Usage Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-usage-insights.md
Last updated 10/06/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
- [!include[Prerelease information](../../includes/prerelease.md)] Defender Vulnerability Management software usage information gives you insights into the total number of devices using an application in your organization and the median usage (in days) for that application over the past 30 days. Software usage information is critical when it comes to evaluating software vulnerabilities in your organization. When vulnerable applications are widely and frequently used, it poses a security risk. These insights can help organizations understand the potential affect of blocking vulnerable applications.
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## Minimum requirements **Microsoft Defender Antivirus (active or passive mode)**:
security Tvm Vulnerable Devices Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-vulnerable-devices-report.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
- [!include[Prerelease information](../../includes/prerelease.md)]
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure. Access the report in the Microsoft 365 Defender portal by going to **Reports > Vulnerable devices**
security Tvm Weaknesses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-weaknesses.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
- [!include[Prerelease information](../../includes/prerelease.md)] > [!IMPORTANT]
The **Weaknesses** page lists the software vulnerabilities your devices are expo
> If there is no official CVE-ID assigned to a vulnerability, the vulnerability name is assigned by Microsoft Defender Vulnerability Management, formerly known as threat and vulnerability management. > [!TIP]
-> To get emails about new vulnerability events, see [Configure vulnerability email notifications in Microsoft Defender for Endpoint](../defender-endpoint/configure-vulnerability-email-notifications.md)
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
## Navigate to the Weaknesses page
security Tvm Zero Day Vulnerabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-zero-day-vulnerabilities.md
Last updated 03/04/2022
**Applies to:**
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
- [!include[Prerelease information](../../includes/prerelease.md)] A zero-day vulnerability is a flaw in software for which no official patch or security update has been released. A software vendor may or may not be aware of the vulnerability, and no public information about this risk is available. Zero-day vulnerabilities often have high severity levels and are actively exploited. Vulnerability management will only display zero-day vulnerabilities it has information about.
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## Find information about zero-day vulnerabilities Once a zero-day vulnerability has been found, information about it will be conveyed through the following experiences in the Microsoft 365 Defender portal.
security Whats New In Microsoft Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management.md
Last updated 07/25/2022
This article provides information about new features and important product updates for the latest release of Microsoft Defender Vulnerability Management public preview.
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
## March 2023
security Windows Authenticated Scan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/windows-authenticated-scan.md
**Applies to:** -- [Microsoft Defender Vulnerability Management](index.yml)
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
+- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
+ > [!NOTE] > To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
-- Authenticated scan for Windows provides the ability to run scans on unmanaged Windows devices. You can remotely target by IP ranges or hostnames and scan Windows services by providing Microsoft Defender Vulnerability Management with credentials to remotely access the devices. Once configured the targeted unmanaged devices will be scanned regularly for software vulnerabilities. This is applicable for devices that don't have the Defender Vulnerability Management or Defender for Endpoint agent deployed.
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+ ## Scanner Installation Similar to [network device](../defender-endpoint/network-devices.md) authenticated scan, you'll need a scanning device with the scanner installed. If you don't already have the scanner installed, see [Install the scanner](../defender-endpoint/network-devices.md#install-the-scanner) for steps on how to download and install it.
security Alert Grading For Malicious Exchange Connectors https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-for-malicious-exchange-connectors.md
ms.sitesec: library
ms.pagetype: security f1.keywords: - NOCSH-+ ms.localizationpriority: medium
search.appverid: - MOE150 - MET150 Previously updated : 08/05/2022 Last updated : 04/05/2022
-# Alert grading for malicious exchange connectors
+# Alert classification for malicious exchange connectors
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
Last updated 08/05/2022
Threat actors use compromised exchange connectors for sending out spam and phishing emails in bulk to unsuspecting recipients by masquerading legitimate emails. Since the connector is compromised, the emails would usually be trusted by the recipients. These kinds of phishing emails are common vectors for phishing campaigns, and business email compromise (BEC) scenario. Hence, such emails need to be monitored heavily due to the likelihood of successful recipients' compromises being high.
-The playbook helps in investigating instances, where malicious connectors are setup/deployed by malicious actors. Accordingly, they take necessary steps to remediate the attack and mitigate the security risks arising from it. Playbook is available for security teams like security operations center (SOC) and IT administrators, who review, handle/manage, and grade the alerts. Playbook will help in grading the alerts as either True Positive (TP) or False Positive (FP). If there is TP, playbook will take necessary recommended actions for remediating the attack.
+The playbook helps in investigating instances, where malicious connectors are setup/deployed by malicious actors. Accordingly, they take necessary steps to remediate the attack and mitigate the security risks arising from it. Playbook is available for security teams like security operations center (SOC) and IT administrators, who review, handle/manage, and grade the alerts. Playbook will help in classifying the alerts as either true positive (TP) or false positive (FP). If there is TP, playbook will take necessary recommended actions for remediating the attack.
Following are the results of using a playbook:
Once it's determined that the observed alert activities are part of TP, classify
- If the admin account was compromised, reset the admin's account credentials. Also, disable/revoke tokens for the compromised admin account and enable multi-factor authentication for all admin accounts. - Look for suspicious activities performed by the admin. - Check for other suspicious activities across other connectors in the environment.+
+## See also
+
+- [Overview of alert classification](alert-grading-playbooks.md)
+- [Investigate alerts](investigate-alerts.md)
security Alert Grading Password Spray Attack https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-password-spray-attack.md
+
+ Title: Alert classification for password spray attacks
+description: Alert classification guide for password spray attacks coming to review the alerts and take recommended actions to remediate the attack and protect your network.
+keywords: incidents, alerts, investigate, analyze, response, correlation, attack, devices, users, 365, microsoft, m365, password, spray, alert classification, alert grading, cloud apps, password spray, password spray attack
++
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+f1.keywords:
+ - NOCSH
++
+ms.localizationpriority: medium
+
+audience: ITPro
+
+ - m365-security
+ - tier2
++
+search.appverid:
+ - MOE150
+ - met150
Last updated : 04/05/2023++
+# Alert classification for password spray attacks
++
+**Applies to:**
+- Microsoft 365 Defender
+
+Threat actors use innovative ways to compromise their target environments. One type of attack gaining traction is the password spray attack, where attackers aim to access many accounts within a network with minimal effort. Unlike traditional brute force attacks, where threat actors try many passwords on a single account, password spray attacks focus on guessing the correct password for many accounts with a limited set of commonly used passwords. It makes the attack particularly effective against organizations with weak or easily guessable passwords, leading to severe data breaches and financial losses for organizations.
+
+Attackers use automated tools to repeatedly attempt to gain access to a specific account or system using a list of commonly used passwords. Attackers sometimes abuse legitimate cloud services by creating many virtual machines (VMs) or containers to launch a password spray attack.
+
+This playbook helps investigate cases where suspicious behavior is observed as indicative of a password spray attack. This guide is for security teams like the security operations center (SOC) and IT administrators who review, handle/manage, and classify the alerts. This guide helps in quickly classifying the alerts as either [true positive (TP) or false positive (FP)](investigate-alerts.md) and, in the case of TP, take recommended actions to remediate the attack and mitigate the security risks.
+
+The intended results of using this guide are:
+
+- YouΓÇÖve identified the alerts associated with password spray attempts as malicious (TP) or false positive (FP) activities.
+
+- You've taken the necessary actions to remediate the attack.
+
+## Investigation steps
+
+This section contains step-by-step guidance to respond to the alert and take the recommended actions to protect your organization from further attacks.
+
+### 1. Investigate the security alerts
+
+ - **Are the alerted sign-in attempts coming from a suspicious location?** Check sign-in attempts from locations other than those typical for impacted user accounts. Multiple sign-in attempts from one or many users are helpful indicators.
+
+### 2. Investigate suspicious user activity
+
+ - **Are there unusual events with uncommon properties?** Unique properties for an impacted user, like unusual ISP, country, or city, might indicate suspicious sign-in patterns.
+
+ - **Is there a marked increase in email or file-related activities?** Suspicious events like increased attempts in mail access or send activity or an increase in uploading of files to SharePoint or OneDrive for an impacted user are some signs to look for.
+
+ - **Are there multiple failed sign-in attempts?** A high number of failed sign-in attempts from various IPs and geographic locations by an impacted user might indicate a password spray attack.
+
+ - **Identify the ISP from the sign-in activity of an impacted user.** Check for sign-in activities by other user accounts from the same ISP.
+
+ - **Inspect any recent modifications in your environment:**
+ - Changes in Office 365 applications like Exchange Online permission, mail auto-forwarding, mail redirection
+ - Modifications in PowerApps, like automated data transmission configuration through PowerAutomate
+ - Modifications in Azure environments, like Azure portal subscription changes
+ - Changes to SharePoint Online, like the impacted user account gaining access to multiple sites or files with sensitive/confidential/company-only content
+
+ - **Inspect the impacted account's activities that occur within a short time span on multiple platforms and apps.** Audit events to check the timeline of activities, like contrasting the userΓÇÖs time spent reading or sending email followed by allocating resources to the userΓÇÖs account or other accounts.
+
+### 3. Investigate possible follow-on attacks
+
+**Inspect your environment for other attacks involving impacted user accounts** as attackers often perform malicious activities after a successful password spray attack. Consider investigating the following possibly suspicious activities:
+
+- [Multi-factor authentication (MFA)](/microsoft-365/admin/security-and-compliance/multi-factor-authentication-microsoft-365)-related attacks
+
+ - Attackers use **MFA fatigue** to bypass this security measure that organizations adopt to protect their systems. **Check for multiple MFA requests raised by an impacted user account.**
+ - Attackers might perform **MFA tampering** using an impacted user account with elevated privileges by disabling MFA protection for other accounts within the tenant. **Check for suspicious admin activities performed by an impacted user.**
+
+- Internal phishing attacks
+
+ - Attackers might use an impacted user account to send internal phishing mails. **Check suspicious activities like email forwarding or creation of inbox manipulation or inbox forwarding rules.** The following playbooks can guide you to further investigate email events:
+ - [Classifying alerts for suspicious email forwarding activity](alert-grading-playbook-email-forwarding.md)
+ - [Classifying alerts for suspicious inbox forwarding rules](alert-grading-playbook-inbox-forwarding-rules.md)
+ - [Classifying alerts for suspicious inbox manipulation rules](alert-grading-playbook-inbox-manipulation-rules.md)
+ - **Check whether the user received other alerts before the password spray activity.** Having these alerts indicate that the user account might be compromised. Examples include impossible travel alert, activity from infrequent country, and suspicious email deletion activity, among others.
+
+## Advanced hunting queries
+
+[Advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview) is a query-based threat hunting tool that lets you inspect events in your network and locate threat indicators.
+
+Use these queries to gather more information related to the alert and determine whether the activity is suspicious.
+
+Ensure you have access to the following tables:
+- [AadSignInEventsBeta](advanced-hunting-aadsignineventsbeta-table.md)
+- [CloudAppEvents](advanced-hunting-cloudappevents-table.md)
+- [DeviceEvents](advanced-hunting-deviceevents-table.md)
+- [EmailEvents](advanced-hunting-emailevents-table.md)
+- [EmailUrlInfo](advanced-hunting-emailurlinfo-table.md)
+- [IdentityLogonEvents](advanced-hunting-identitylogonevents-table.md)
+- [UrlClickEvents](advanced-hunting-urlclickevents-table.md)
++
+Use this query to identify password spray activity.
+
+```kusto
+IdentityLogonEvents
+| where Timestamp > ago(7d)
+| where ActionType == "LogonFailed"
+| where isnotempty(RiskLevelDuringSignIn)
+| where AccountObjectId == <Impacted User Account Object ID>
+| summarize TargetCount = dcount(AccountObjectId), TargetCountry = dcount(Location), TargetIPAddress = dcount(IPAddress) by ISP
+| where TargetCount >= 100
+| where TargetCountry >= 5
+| where TargetIPAddress >= 25
+```
+
+Use this query to identify other activities from the alerted ISP.
+
+```kusto
+CloudAppEvents
+| where Timestamp > ago(7d)
+| where AccountObjectId == <Impacted User Account Object ID>
+| where ISP == <Alerted ISP>
+| summarize count() by Application, ActionType, bin(Timestamp, 1h)
+```
+
+Use this query to identify sign-in patterns for the impacted user.
+
+```kusto
+IdentityLogonEvents
+| where Timestamp > ago(7d)
+| where AccountObjectId == <Impacted User Account Object ID>
+| where ISP == <Alerted ISP>
+| where Application != "Active Directory"
+| summarize SuccessCount = countif(ActionType == "LogonSuccess"), FailureCount = countif(ActionType == "LogonFailed") by ISP
+```
+
+Use this query to identify MFA fatigue attacks.
+
+```kusto
+AADSignInEventsBeta
+| where Timestamp > ago(1h)
+//Error Code : 50088 : Limit on telecom MFA calls reached
+//Error Code : 50074 : Strong Authentication is required.
+| where ErrorCode in ("50074","50088")
+| where isnotempty(AccountObjectId)
+| where isnotempty(IPAddress)
+| where isnotempty(Country)
+| summarize (Timestamp, ReportId) = arg_max(Timestamp, ReportId), FailureCount = count() by AccountObjectId, Country, IPAddress
+| where FailureCount >= 10
+```
+
+Use this query to identify MFA reset activities.
+
+```kusto
+let relevantActionTypes = pack_array("Disable Strong Authentication.","system.mfa.factor.deactivate", "user.mfa.factor.update", "user.mfa.factor.reset_all", "core.user_auth.mfa_bypass_attempted");
+CloudAppEvents
+AlertInfo
+| where Timestamp > ago(1d)
+| where isnotempty(AccountObjectId)
+| where Application in ("Office 365","Okta")
+| where ActionType in (relevantActionTypes)
+| where RawEventData contains "success"
+| project Timestamp, ReportId, AccountObjectId, IPAddress, ActionType
+++
+CloudAppEvents
+| where Timestamp > ago(1d)
+| where ApplicationId == 11161
+| where ActionType == "Update user."
+| where isnotempty(AccountObjectId)
+| where RawEventData has_all("StrongAuthenticationRequirement","[]")
+| mv-expand ModifiedProperties = RawEventData.ModifiedProperties
+| where ModifiedProperties.Name == "StrongAuthenticationRequirement" and ModifiedProperties.OldValue != "[]" and ModifiedProperties.NewValue == "[]"
+| mv-expand ActivityObject = ActivityObjects
+| where ActivityObject.Role == "Target objectΓÇ¥
+| extend TargetObjectId = tostring(ActivityObject.Id)
+| project Timestamp, ReportId, AccountObjectId, ActivityObjects, TargetObjectId
+```
+
+Use this query to find new email inbox rules created by the impacted user.
+
+```kusto
+CloudAppEvents
+| where AccountObjectId == <ImpactedUser>
+| where Timestamp > ago(21d)
+| where ActionType == "New-InboxRule"
+| where RawEventData.SessionId in (suspiciousSessionIds)
+```
+
+## Recommended actions
+
+Once you determine that the activities associated with this alert are malicious, classify those alerts as TP and take these actions for remediation:
+
+1. Reset the user's account credentials.
+2. Revoke access tokens of the compromised account.
+3. Use number matching in Microsoft Authenticator to mitigate MFA fatigue attacks.
+4. Apply the principle of least privilege. Create accounts with minimum privilege required to complete tasks.
+5. Configure blocking based on the senderΓÇÖs IP address and domains if the artifacts are related to email.
+6. Block URLs or IP addresses (on the network protection platforms) that were identified as malicious during the investigation.
+
+## See also
+
+- [Overview of alert classification](alert-grading-playbooks.md)
+- [Investigate alerts](investigate-alerts.md)
security Alert Grading Password Spray https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-password-spray.md
Title: Suspicious password-spray-related IP address activity alert
-description: Alert grading for suspicious password-spray-related IP address activity to review the alerts and take recommended actions to remediate the attack and protect your network.
-keywords: incidents, alerts, investigate, analyze, response, correlation, attack, devices, users, 365, microsoft, m365, password, spray, alert classification, alert grading, cloud apps, suspicious IP
+ Title: Alert classification for suspicious IP address related to password spraying activity
+description: Alert classification for suspicious IP address related to password spraying activity to review the alerts and take recommended actions to remediate the attack and protect your network.
+keywords: incidents, alerts, investigate, analyze, response, correlation, attack, devices, users, 365, microsoft, m365, password, spray, alert classification, alert grading, cloud apps, suspicious IP, classify alert
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security f1.keywords: - NOCSH-+ ms.localizationpriority: medium
search.appverid: - MOE150 - met150 Previously updated : 08/09/2022 Last updated : 04/05/2022
-# Suspicious password spray-related IP activity
+# Alert classification for suspicious IP addresses related to password spray attacks
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
Last updated 08/09/2022
Threat actors use password guessing techniques to gain access to user accounts. In a password spray attack, the threat actor might resort to a few of the most used passwords against many different accounts. Attackers successfully compromise accounts using password spraying since many users still utilize default and weak passwords.
-This guide helps you investigate instances where IP addresses have been labeled risky or associated with a password spray attack, or suspicious unexplained activities were detected, such as a user signing in from an unfamiliar location or a user getting unexpected multi-factor authentication (MFA) prompts. This guide is for security teams like the security operations center (SOC) and IT administrators who review, handle/manage, and classify the alerts. This guide helps in quickly classifying the alerts as either [true positive (TP) or false positive (FP)](investigate-alerts.md) and, in the case of TP, take recommended actions to remediate the attack and mitigate the security risks.
+This playbook helps you investigate instances where IP addresses have been labeled risky or associated with a password spray attack, or suspicious unexplained activities were detected, such as a user signing in from an unfamiliar location or a user getting unexpected multi-factor authentication (MFA) prompts. This guide is for security teams like the security operations center (SOC) and IT administrators who review, handle/manage, and classify the alerts. This guide helps in quickly classifying the alerts as either [true positive (TP) or false positive (FP)](investigate-alerts.md) and, in the case of TP, take recommended actions to remediate the attack and mitigate the security risks.
The intended results of using this guide are:
AlertInfo
## See also -- [Overview of alert grading](alert-grading-playbooks.md)
+- [Overview of alert classification](alert-grading-playbooks.md)
+- [Classifying password spray attacks](alert-grading-password-spray-attack.md)
- [Investigate alerts](investigate-alerts.md)
security Alert Grading Playbook Email Forwarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-email-forwarding.md
Title: Alert grading for suspicious email forwarding activity
-description: Alert grading for suspicious email forwarding activity to review the alerts and take recommended actions to remediate the attack and protect your network.
-keywords: incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365
+ Title: Alert classification for suspicious email forwarding activity
+description: Alert classification for suspicious email forwarding activity to review the alerts and take recommended actions to remediate the attack and protect your network.
+keywords: incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, alert classification, alert grading, classify alert
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security f1.keywords: - NOCSH-+ ms.localizationpriority: medium
search.appverid: - MOE150 - met150 Previously updated : 01/18/2022 Last updated : 04/05/2023
-# Alert grading for suspicious email forwarding activity
+# Alert classification for suspicious email forwarding activity
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
Threat actors can use compromised user accounts for several malicious purposes,
Emails can be forwarded either manually or automatically using forwarding rules. Automatic forwarding can be implemented in multiple ways like Inbox Rules, Exchange Transport Rule (ETR), and SMTP Forwarding. While manual forwarding requires direct action from users, they might not be aware of all the auto-forwarded emails. In Microsoft 365, an alert is raised when a user auto-forwards an email to a potentially malicious email address.
-This playbook helps you investigate Suspicious Email Forwarding Activity alerts and quickly grade them as either a True Positive (TP) or a False Positive (FP). You can then take recommended actions for the TP alerts to remediate the attack.
+This playbook helps you investigate Suspicious Email Forwarding Activity alerts and quickly grade them as either a true positive (TP) or a false positive (FP). You can then take recommended actions for the TP alerts to remediate the attack.
-For an overview of alert grading for Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps, see the [introduction article](alert-grading-playbooks.md).
+For an overview of alert classifications for Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps, see the [introduction article](alert-grading-playbooks.md).
The results of using this playbook are:
Once you determine that the activities associated make this alert a True Positiv
## See also -- [Overview of alert grading](alert-grading-playbooks.md)
+- [Overview of alert classification](alert-grading-playbooks.md)
- [Suspicious inbox forwarding rules](alert-grading-playbook-inbox-forwarding-rules.md) - [Suspicious inbox manipulation rules](alert-grading-playbook-inbox-manipulation-rules.md) - [Investigate alerts](investigate-alerts.md)
security Alert Grading Playbook Inbox Forwarding Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-inbox-forwarding-rules.md
Title: Alert grading for suspicious inbox forwarding rules
-description: Alert grading for suspicious inbox forwarding rules to review the alerts and take recommended actions to remediate the attack and protect your network.
-keywords: incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365
+ Title: Alert classification for suspicious inbox forwarding rules
+description: Alert classification for suspicious inbox forwarding rules to review the alerts and take recommended actions to remediate the attack and protect your network.
+keywords: incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, alert classification, alert grading, classify alert
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security f1.keywords: - NOCSH-+ ms.localizationpriority: medium
search.appverid: - MOE150 - met150 Previously updated : 01/21/2022 Last updated : 04/05/2023
-# Alert grading for suspicious inbox forwarding rules
+# Alert classification for suspicious inbox forwarding rules
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
Last updated 01/21/2022
Threat actors can use compromised user accounts for several malicious purposes including reading emails in a user's inbox, creating inbox rules to forward emails to external accounts, sending phishing mails, among others. Malicious inbox rules are widely common during business email compromise (BEC) and phishing campaigns, and it important to monitor them consistently.
-This playbook helps you investigate alerts for suspicious inbox forwarding rules and quickly grade them as either a True Positive (TP) or a False Positive (TP). You can then take recommended actions for the TP alerts to remediate the attack.
+This playbook helps you investigate alerts for suspicious inbox forwarding rules and quickly grade them as either a true positive (TP) or a false positive (TP). You can then take recommended actions for the TP alerts to remediate the attack.
-For an overview of alert grading for Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps, see the [introduction article](alert-grading-playbooks.md).
+For an overview of alert classification for Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps, see the [introduction article](alert-grading-playbooks.md).
The results of using this playbook are:
CloudAppEvents
## See also -- [Overview of alert grading](alert-grading-playbooks.md)
+- [Overview of alert classification](alert-grading-playbooks.md)
- [Suspicious email forwarding activity](alert-grading-playbook-email-forwarding.md) - [Suspicious inbox manipulation rules](alert-grading-playbook-inbox-manipulation-rules.md) - [Investigate alerts](investigate-alerts.md)
security Alert Grading Playbook Inbox Manipulation Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-inbox-manipulation-rules.md
Title: Alert grading for suspicious inbox manipulation rules
-description: Alert grading for suspicious inbox manipulation rules to review the alerts and take recommended actions to remediate the attack and protect your network.
-keywords: incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365
+ Title: Alert classification for suspicious inbox manipulation rules
+description: Alert classification for suspicious inbox manipulation rules to review the alerts and take recommended actions to remediate the attack and protect your network.
+keywords: incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, alert classification, alert grading, classify alert
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security f1.keywords: - NOCSH-+ ms.localizationpriority: medium
search.appverid: - MOE150 - met150 Previously updated : 01/21/2022 Last updated : 04/05/2023
-# Alert grading for suspicious inbox manipulation rules
+# Alert classification for suspicious inbox manipulation rules
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
Last updated 01/21/2022
Threat actors can use compromised user accounts for many malicious purposes including reading emails in a user's inbox, creating inbox rules to forward emails to external accounts, deleting traces, and sending phishing mails. Malicious inbox rules are common during business email compromise (BEC) and phishing campaigns and it is important to monitor for them consistently.
-This playbook helps you investigate any incident related to suspicious inbox manipulation rules configured by attackers and take recommended actions to remediate the attack and protect your network. This playbook is for security teams, including security operations center (SOC) analysts and IT administrators who review, investigate, and grade the alerts. You can quickly grade alerts as either a True Positive (TP) or a False Positive (TP) and take recommended actions for the TP alerts to remediate the attack.
+This playbook helps you investigate any incident related to suspicious inbox manipulation rules configured by attackers and take recommended actions to remediate the attack and protect your network. This playbook is for security teams, including security operations center (SOC) analysts and IT administrators who review, investigate, and grade the alerts. You can quickly grade alerts as either a true positive (TP) or a false positive (TP) and take recommended actions for the TP alerts to remediate the attack.
The results of using this playbook are:
CloudAppEvents
## See also -- [Overview of alert grading](alert-grading-playbooks.md)
+- [Overview of alert classification](alert-grading-playbooks.md)
- [Suspicious email forwarding activity](alert-grading-playbook-email-forwarding.md) - [Suspicious inbox forwarding rules](alert-grading-playbook-inbox-forwarding-rules.md) - [Investigate alerts](investigate-alerts.md)
security Alert Grading Playbooks https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbooks.md
Title: Alert grading playbooks
+ Title: Alert classification playbooks
description: Review the alerts for well-known attacks and take recommended actions to remediate the attack and protect your network.
-keywords: incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365
+keywords: incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, alert classification, alert grading, classify alert
search.appverid: met150
ms.sitesec: library
ms.pagetype: security f1.keywords: - NOCSH-+ ms.localizationpriority: medium
- autoir - admindeeplinkDEFENDER Previously updated : 01/14/2022 Last updated : 04/03/2023
-# Alert grading playbooks
+# Alert classification playbooks
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)] **Applies to:** - Microsoft 365 Defender
-Alert grading playbooks allow you to methodically review and quickly classify the alerts for well-known attacks and take recommended actions to remediate the attack and protect your network. Alert grading will also help in properly classifying the overall incident.
+Alert classification playbooks allow you to methodically review and quickly classify the alerts for well-known attacks and take recommended actions to remediate the attack and protect your network. Alert classification will also help in properly classifying the overall incident.
As a security researcher or security operations center (SOC) analyst, you must have access to the Microsoft 365 Defender portal so that you can:
Defender for Cloud Apps alerts can be classified as:
- Benign true positive (B-TP) for suspicious but not malicious activity, such as a penetration test or other authorized suspicious action. - FP for confirmed non-malicious activity.
-## Alert grading playbooks
+## Alert classification playbooks
-See these playbooks for steps to more quickly grade alerts for the following threats:
+See these playbooks for steps to more quickly classify alerts for the following threats:
- [Suspicious email forwarding activity](alert-grading-playbook-email-forwarding.md) - [Suspicious inbox manipulation rules](alert-grading-playbook-inbox-manipulation-rules.md) - [Suspicious inbox forwarding rules](alert-grading-playbook-inbox-forwarding-rules.md)
+- [Suspicious IP addresses related to password spray activity](alert-grading-password-spray.md)
+- [Password spray attacks](alert-grading-password-spray-attack.md)
See [Investigate alerts](investigate-alerts.md) for information on how to examine alerts with the Microsoft 365 Defender portal.
security Deploy Configure M365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/deploy-configure-m365-defender.md
+
+ Title: Setup guides for Microsoft 365 Defender
+description: Learn how to deploy and configure Microsoft 365 Defender by using online setup guides
+keywords: deploy, licenses, supported services, provisioning, configuration Microsoft 365 Defender, M365, license eligibility, Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps
+search.product: eADQiWindows 10XVcnh
++
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+f1.keywords:
+ - NOCSH
++
+ms.localizationpriority: medium
+
+audience: ITPro
+
+ - m365-security
+ - tier2
+
+search.appverid:
+ - MOE150
+ - MET150
Last updated : 03/31/2023++
+# Setup guides for Microsoft 365 Defender
++
+**Applies to:**
+- Microsoft 365 Defender
+
+Setup guides for Microsoft 365 Defender deployment give you tailored guidance and resources for planning and deploying security controls for your tenant, apps, and services.
+
+All deployment guides are available in the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/?linkid=2224913) and in the [Microsoft 365 Setup portal](https://go.microsoft.com/fwlink/?linkid=2230646).
+
+## Deployment Guides
+
+Deployment guides in the admin center require authentication to a Microsoft 365 tenant as an administrator or other role with access to the admin center, but guides in the Microsoft 365 Setup portal can be accessed by anyone. We have provided links to both locations for each guide, where available, in the tables below.
+
+|**Guide - [Setup Portal](https://go.microsoft.com/fwlink/?linkid=2220880)** |**Guide - [Admin Center](https://go.microsoft.com/fwlink/?linkid=2224913)** |**Description** |
+||||
+| [Microsoft Defender for Endpoint setup guide](https://go.microsoft.com/fwlink/?linkid=2223155) | [Microsoft Defender for Endpoint setup guide](https://go.microsoft.com/fwlink/?linkid=2224785) |The **Microsoft Defender for Endpoint setup guide** provides instructions that will help your enterprise network prevent, detect, investigate, and respond to advanced threats. Make an informed assessment of your organization's vulnerability and decide which deployment package and configuration methods are best. <br> **Note**: A Microsoft Volume License is required for Microsoft Defender for Endpoint. |
+|[Microsoft Defender for Office 365 setup guide ](https://go.microsoft.com/fwlink/?linkid=2222971) | [Microsoft Defender for Office 365 setup guide ](https://go.microsoft.com/fwlink/?linkid=2224784) | The **Microsoft Defender for Office 365 setup guide** safeguards your organization against malicious threats that your environment might come across through email messages, links, and third party collaboration tools. This guide provides you with the resources and information to help you prepare and identify the Defender for Office 365 plan to fit your organization's needs. |
+|[Microsoft Defender for Cloud Apps setup guide](https://go.microsoft.com/fwlink/?linkid=2222969) | [Microsoft Defender for Cloud Apps setup guide](https://go.microsoft.com/fwlink/?linkid=2224814) | The **Microsoft Defender for Cloud Apps setup guide** provides easy to follow deployment and management guidance to set up your Cloud Discovery solution. With Cloud Discovery, you'll integrate your supported security apps, and then you'll use traffic logs to dynamically discover and analyze the cloud apps that your organization uses. You'll also set up features available through the Defender for Cloud Apps solution, including threat detection policies to identify high-risk use, information protection policies to define access, and real-time session controls to monitor activity. With these features, your environment gets enhanced visibility, control over data movement, and analytics to identify and combat cyberthreats across all your Microsoft and third party cloud services. |
+|[Microsoft Defender for Identity setup guide](https://go.microsoft.com/fwlink/?linkid=2222970)|[Microsoft Defender for Identity setup guide](https://go.microsoft.com/fwlink/?linkid=2224783)|The **Microsoft Defender for Identity setup guide** provides security solution set-up guidance to identify, detect, and investigate advanced threats that might compromise user identities. These include detecting suspicious user activities and malicious insider actions directed at your organization. You'll create a Defender for Identity instance, connect to your organization's Active Directory, and then set up sensors, alerts, notifications, and configure your unique portal preferences.|
+
+## Related topics
+
+- [Microsoft 365 Defender overview](microsoft-365-defender.md)
+- [Turn on Microsoft 365 Defender](m365d-enable.md)
+- [Deploy supported services](deploy-supported-services.md)
+- [Microsoft Defender for Endpoint overview](../defender-endpoint/microsoft-defender-endpoint.md)
+- [Microsoft Defender for Office 365 overview](../office-365-security/defender-for-office-365.md)
+- [Microsoft Defender for Cloud Apps overview](/cloud-app-security/what-is-cloud-app-security)
security Deploy Supported Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/deploy-supported-services.md
Once you've deployed the supported services, [turn on Microsoft 365 Defender](m3
- [Microsoft 365 Defender overview](microsoft-365-defender.md) - [Turn on Microsoft 365 Defender](m365d-enable.md)
+- [Setup guides for Microsoft 365 Defender](deploy-configure-m365-defender.md)
- [Microsoft Defender for Endpoint overview](../defender-endpoint/microsoft-defender-endpoint.md) - [Microsoft Defender for Office 365 overview](../office-365-security/defender-for-office-365.md) - [Microsoft Defender for Cloud Apps overview](/cloud-app-security/what-is-cloud-app-security)
security M365d Enable Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable-faq.md
Get the latest publicly available experiences by turning on [preview features](p
- [Turn on Microsoft 365 Defender](m365d-enable.md). - [Licensing requirements and other prerequisites](prerequisites.md) - [Deploy supported services](deploy-supported-services.md)
+- [Setup guides for Microsoft 365 Defender](deploy-configure-m365-defender.md)
- [Turn on preview features](preview.md)
security M365d Enable https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable.md
Microsoft support staff can help provision or deprovision the service and relate
- [Frequently asked questions](m365d-enable-faq.md) - [Licensing requirements and other prerequisites](prerequisites.md) - [Deploy supported services](deploy-supported-services.md)
+- [Setup guides for Microsoft 365 Defender](deploy-configure-m365-defender.md)
- [Microsoft 365 Defender overview](microsoft-365-defender.md) - [Microsoft Defender for Endpoint overview](../defender-endpoint/microsoft-defender-endpoint.md) - [Defender for Office 365 overview](../office-365-security/defender-for-office-365.md)
security Microsoft 365 Policies Configurations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/microsoft-365-policies-configurations.md
To address this new world of computing, Microsoft highly recommends the Zero Tru
Here is the overall architecture of Zero Trust. Zero Trust identity and device access policies address the **Verify explicitly** guiding principle for:
security Responding To A Compromised Email Account https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account.md
If a user reports any of the above symptoms, you should perform further investig
- sign-in times - sign-in success or failure
+> [!IMPORTANT]
+> The button below will let you test and identify suspicious activities against an account and return information that can be used to recover in the case an account is compromised.
+>
+<div class="nextstepaction">
+<p><a href="https://aka.ms/diagca" data-linktype="external">Run Tests: Compromised Accounts</a></p>
+</div>
+ ## How to secure and restore email function to a suspected compromised Microsoft 365 account and mailbox <! [!VIDEO https://videoplayercdn.osi.office.net/hub/?csid=ux-cms-en-us-msoffice&uuid=RE2jvOb&AutoPlayVideo=false] >
syntex Syntex Copilot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/syntex-copilot.md
Copilot for Syntex analyzes the text of a selected file in a SharePoint document
4. On the **Copilot** panel, you can:
- - Select one of the questions Copilot has generated for you.
+ - Select one of the questions Copilot has generated for you tailored for the specific file.
![Screenshot of the generated questions on the Copilot panel.](../media/content-understanding/copilot-generated-questions.png)
Copilot for Syntex analyzes the text of a selected file in a SharePoint document
![Screenshot of the text box on the Copilot panel.](../media/content-understanding/copilot-text-box.png)
- - In the text box, select the starter prompt to see suggested actions tailored to the specific file.
+ - In the text box, select **More from Syntex** to find more information about the file.
![Screenshot of the text box on the Copilot panel with the starter prompt highlighted.](../media/content-understanding/copilot-starter-prompt.png)