Updates from: 04/06/2024 01:20:52
Category Microsoft Docs article Related commit history on GitHub Change details
threat-intelligence Using Copilot Threat Intelligence Defender Xdr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/using-copilot-threat-intelligence-defender-xdr.md
audience: ITPro
- Tier1 Previously updated : 03/15/2024 Last updated : 04/01/2024 # Using Microsoft Copilot for Security for threat intelligence
archive Archive Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/archive/archive-compliance.md
+
+ Title: Compliance features in Microsoft 365 Archive (Preview)
+++
+audience: admin
+ Last updated : 11/15/2023+++
+search.appverid:
+
+ - m365initiative-syntex
+ms.localizationpriority: medium
+description: Learn about compliance features for archived sites in Microsoft 365 Archive.
++
+# Compliance features in Microsoft 365 Archive (Preview)
+
+> [!NOTE]
+> Microsoft Purview features work seamlessly with archived content. For example, you can apply retention hold on archived content without needing to unarchive it. Likewise, you can also archive content in retention hold without needing to move or delete it from retention scope.
+
+Archived SharePoint sites, just like active SharePoint sites, maintain a baseline level of data promises. These promises include the following considerations:
+
+- **Durability** ΓÇô All archived data is equally as durable as active SharePoint data.
+
+- **Security** ΓÇô Archived sites or data have the same level of security as active sites or data.
+
+- **Geo residence** ΓÇô All archived data stays within your geo compliance boundary.
+
+- **Microsoft EU data boundary** ΓÇô All archived data complies with the EU data boundary promise.
+
+The affect of Microsoft 365 Archive on compliance offerings includes the following elements:
+
+- **Data lifecycle management and records management** ΓÇô Archived sites still honor the retention and deletion periods from any retention policies or retention labels. For more information, see [How retention works with Microsoft 365 Archive](/purview/retention-policies-sharepoint#how-retention-works-with-microsoft-365-archive).
+
+- **eDiscovery** ΓÇô eDiscovery still finds all content even if archived. However, eDiscovery won't be able to directly reactivate located files. Before exporting or viewing content of an eDiscovery case, the SharePoint admin has to reactivate the relevant sites.
+
+- **Bring your own key (BYOK)** ΓÇô All archived content will comply with the BYOK promises, for any tenant who already uses the BYOK feature or enables it after archiving sites.
+
+- **Permissions and access policies** ΓÇô These settings and policies are retained on the site throughout the archive and reactivation lifecycle (that is, archiving the site and then reactivating doesn't change the application of permissions or related access policies).
archive Archive End User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/archive/archive-end-user.md
+
+ Title: End user experience in Microsoft 365 Archive (Preview)
+++
+audience: admin
+ Last updated : 11/15/2023+++
+search.appverid:
+
+ - m365initiative-syntex
+ms.localizationpriority: medium
+description: Learn about end-user features for archived sites in Microsoft 365 Archive.
++
+# End user experience in Microsoft 365 Archive (Preview)
+
+> [!NOTE]
+> This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations.
+
+End users aren't able to access or search for any content that has been archived. Whenever users try to access archived content, they see a message stating that the site has been archived.
+
+![Screenshot of the Site is archived message end users receive when they try to access content that has been archived.](../media/m365-archive/site-is-archived-message.png)
+
+In Microsoft 365 Archive, admins have an option to set a custom URL where the users will be taken if they select **Request to reactivate** when they encounter archived content. As an admin, you can choose to send the end users to a form, ticketing system etc. This can take users to any place you choose, such as a form, a ticketing system, or other location. This custom URL can be set via a flag (``-ArchiveRedirectUrl``) in the Set-SPOTenant PowerShell cmdlet starting in version 16.0.23408.12000.
+
+For a multi-geo tenant, the URL needs to be set for each geo location.
+
+The **Request to reactivate** button won't be visible if a redirect URL hasn't been set.
archive Archive Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/archive/archive-faq.md
+
+ Title: Frequently asked questions about Microsoft 365 Archive (Preview)
+++
+audience: admin
+ Last updated : 12/15/2023+++
+search.appverid:
+
+ - m365initiative-syntex
+ms.localizationpriority: medium
+description: Read frequently asked questions about Microsoft 365 Archive.
++
+# Frequently asked questions about Microsoft 365 Archive (Preview)
+
+> [!NOTE]
+> This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations. Before you begin, read the [Microsoft 365 Archive preview terms and conditions](archive-preview-terms.md).
+
+#### What is the difference between Microsoft 365 Archive and SharePoint Advanced Management?
+
+- Microsoft 365 Archive gives the ability to archive a site in SharePoint.
+
+- Storage for archived sites is metered and charged at a $0.05/GB/month rate vs. the normal standard storage rate of $0.20/GB/month. For more information, see [Pricing model for Microsoft 365 Archive (Preview)](archive-pricing.md).
+
+- The site lifecycle management feature in SharePoint Advanced Management is a separate licensed offering that helps automate and orchestrate the movement of sites into the archive tier via admin-defined policies to remove manual operations. In other words, the site lifecycle management in SharePoint Advanced Management operates in conjunction with Microsoft 365 Archive.
+
+#### How does Azure Blob compare to Microsoft 365 Archive?
+
+Microsoft 365 Archive allows you to keep your data in place in SharePoint, providing the following benefits not possible when the data is migrated elsewhere:
+
+- Archiving happens very quickly, usually withing minutes, regardless of the amount or size of content being archived.
+
+- No need to manage data in a separate security and compliance domain, thereby allowing your security and compliance tooling to operate seamlesslyΓÇöincluding eDiscovery, retention policies, and more.
+
+- Admin search indexes remain intact.
+
+- Sites are archived and rehydrated without loss of metadata, security versioning, and more.
+
+#### Can content in legal hold be archived?
+
+Yes, nearly all Microsoft Purview features will continue to operate as normal.
+
+#### Is content in archived sites searchable?
+
+Admin-level search and Purview-based search will operate like normal. End-user search is not currently supported, but end-user search is on our roadmap.
+
+#### Can I archive at the site-level and file-level?
+
+Currently, only full-site archiving and reactivating is possible in this offering. File-level granular archiving support will be released later in 2024.
+
+#### WhatΓÇÖs the availability timing of Microsoft 365 Archive for Microsoft Government Community Cloud (GCC) customers?
+
+Standard GCC rollout times apply.
archive Archive Manage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/archive/archive-manage.md
+
+ Title: Manage Microsoft 365 Archive (Preview)
+++
+audience: admin
+ Last updated : 11/15/2023+++
+search.appverid:
+
+ - m365initiative-syntex
+ms.localizationpriority: medium
+description: Learn how to archive, reactivate, and manage sites in Microsoft 365 Archive.
++
+# Manage Microsoft 365 Archive (Preview)
+
+> [!NOTE]
+> This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations.
+
+## Archive a site
+
+Global admins and SharePoint admins can archive both non-group connected sites and group-connected sites from the SharePoint admin center. Archiving group-connected sites will archive only the site, and the rest of the group will continue being active. As soon as a site is archived, it stops consuming storage from active storage quota, and the storage starts being counted towards Microsoft 365 Archive storage. (There might be a delay in the change in storage being reflected in the admin center.)
+
+To learn more about different archive states, see [Archive states in Microsoft 365 Archive (Preview)](archive-states.md).
+
+When a site is archived, compliance features such as eDiscovery and retention labels continue to be applied to the site.
+
+1. In the SharePoint admin center, go to [**Active sites**](https://go.microsoft.com/fwlink/?linkid=2185220), and sign in with an account that has [admin permissions](/sharepoint/sharepoint-admin-role) for your organization.
+
+ > [!NOTE]
+ > If you have Office 365 operated by 21Vianet (China), sign in to the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?linkid=850627), then browse to the SharePoint admin center and open the **Active sites** page.
+
+2. In the left column, select one or more sites.
+
+3. Select **Archive**, and to confirm, select **Archive**.
+
+4. Archived sites can be seen on the **Archived sites** page in the SharePoint admin center.
+
+ ![Screenshot of the Archived sites page in the SharePoint admin center.](../media/m365-archive/archived-sites-page.png)
+
+ > [!NOTE]
+ > To archive a hub site, you first need to unregister it as a hub site. Archiving Microsoft Teams-connected sites with private or shared channel sites is not supported. Teams sites with standard channels are supported.
+
+## Manage archived sites
+
+Archived sites can be reactivated or deleted. Deletion of archived sites follows the same behavior as that of active sites; that is, a site doesn't need to be reactivated before being deleted. However, sites in the ΓÇ£ReactivatingΓÇ¥ state can't be deleted until reactivation completes.
+
+Admins can view details of the site, such as the URL, Archive Status, or Storage, from the **Archived sites** page.
+
+## Reactivate a site
+
+If there's a need to access the site content again, the sites need to be reactivated. After a site is archived, it stays in the ΓÇ£Recently ArchivedΓÇ¥ state for seven days. All reactivations from this state are free of cost and instantaneous. After seven days, the site enters the ΓÇ£ArchivedΓÇ¥ state. Reactivations might take up to 24 hours, and have an associated reactivation cost. To learn more about the costs and how pricing works, see [Pricing model](archive-pricing.md).
+
+After reactivation, the site will move back to the **Active sites** page. The site will resume its normal function, and the users will have the same access rights to the site and its content as they did before the site was archived. After reactivation is complete, the storage consumed by the site will accrue to your storage quota consumption.
+
+1. In the SharePoint admin center, go to [**Active sites**](https://go.microsoft.com/fwlink/?linkid=2185220), and sign in with an account that has [admin permissions](/sharepoint/sharepoint-admin-role) for your organization.
+
+ > [!NOTE]
+ > If you have Office 365 operated by 21Vianet (China), sign in to the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?linkid=850627), then browse to the SharePoint admin center and open the **Active sites** page.
+
+2. In the left column, select a site that needs to be reactivated.
+
+3. On the command bar, select **Archive**.
+
+4. On the **Archive** pane, select **Reactivate**.
+
+5. If you're trying to reactivate a site from ΓÇ£ArchivedΓÇ¥ state, you'll see a confirmation pop-up that shows an estimated price for reactivation. Select **Confirm** to reactivate. The site will enter the ΓÇ£ReactivatingΓÇ¥ state. It will move to active sites once reactivation is complete.
+
+ ![Screenshot of an example site that you are reactivating in the SharePoint admin center.](../media/m365-archive/reactivate-site-example.png)
+
+When you reactivate a site, its permissions, lists, pages, files, folder-structure, site-level policies, and other metadata will revert to the prearchival state, except if files are deleted from archived sites. The only two exceptions are when files are deleted while the site is archived:
+
+- Content in the recycle bin expires naturally, and that expiration continues while archived.
+- Content marked to be deleted by retention policies will still be deleted as normal.
+
+Other than these two exceptions, you can expect the site to be unchanged.
+
+## Change the archive status of site via PowerShell
+
+You can also change the status of an archived site by using the PowerShell cmdlet [**Set-SPOSiteArchiveState**](/powershell/module/sharepoint-online/set-spositearchivestate?view=sharepoint-ps&preserve-view=true).
+
+## Site templates supported
+
+|Template ID |Template |
+|||
+|1 |Document Workspace |
+|4 |Wiki Site |
+|9 |Blog |
+|32 |News Site |
+|64 |Team Site |
+|68 |Communication Site |
archive Archive Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/archive/archive-overview.md
+
+ Title: Overview of Microsoft 365 Archive (Preview)
+++
+audience: admin
+ Last updated : 11/15/2023+++
+search.appverid:
+
+ - m365initiative-syntex
+ms.localizationpriority: medium
+description: Learn about how Microsoft 365 Archive can provide your with organization cost-effective storage solutions.
++
+# Overview of Microsoft 365 Archive (Preview)
+
+> [!NOTE]
+> This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations. Before you begin, read the [Microsoft 365 Archive preview terms and conditions](archive-preview-terms.md).
+
+Microsoft 365 Archive offers cost-effective storage for inactive SharePoint sites.
+
+Your organization might need to keep inactive or aging data for long periods of time in case you need to retrieve it later. You might prefer to store the data in SharePoint to simplify searchability, security, compliance, and data lifecycle management.
+
+Microsoft 365 Archive allows you to retain this inactive data by moving it into a cold storage tier (archive) within SharePoint. Any data archived with Microsoft 365 Archive will have the same searchability, security, and [compliance](archive-compliance.md) standards applied automatically at a much reduced cost.
+
+Some additional advantages of using Microsoft 365 Archive are:
+
+- **Speed** ΓÇô Ultra-fast archive of sites of any size and any number of sites.
+
+- **Cost savings** ΓÇô A lower list price on storage consumption beyond your license-allocated Microsoft 365 storage quota.
+
+- **Lossless metadata** ΓÇô A site will retain all of its metadata and permissions upon reactivation.
+
+- **Decluttering** ΓÇô Explicit separation between active and inactive content to help you manage your site's lifecycle.
+
+Microsoft 365 Archive, coupled with the Microsoft 365 search index and the [Microsoft Purview](/purview/purview) feature set, provides a powerful combination for your long-term data management needs at a price point that matches the lifecycle of your content. Microsoft 365 Archive is controlled in the SharePoint admin center by global or SharePoint admins.
+
+When a site is archived, it goes into an explicitly colder tier, no longer consumes a tenantΓÇÖs active storage quota, and instead drives Microsoft 365 Archive storage consumption. Being in this colder tier means the site is no longer accessible by anyone in the organization outside of Microsoft Purview or admin search.
+
+Archiving a site archives everything within it, including:
+
+- Document libraries and files
+- Lists and list data
+
+> [!NOTE]
+> Microsoft 365 Archive (Preview) is currently rolling out. More features will be rolled out as they become available.
+
+Administrators should notify the site owners and end users before a site is archived so they're aware that the site won't be accessible.
+
+## Preview limitations
+
+> [!NOTE]
+> These limitations are temporary during the preview. Unless otherwise stated, these limitations will be resolved when the product is available for general release.
+
+- As a part of the preview, tenants with more than 50,000 sites might face issues while trying to enumerate archived sites on the **Archived sites** page. Applicable enhancements are scheduled to roll out in the future. In this scenario, PowerShell can be used to more efficiently archive sites and manage archived content.
+
+- Currently, archived content exported via eDiscovery doesn't require site reactivation for exporting, but will require it before general release.
+
+- Currently, end user search results won't show any archived content.
+
+- Columns such as Archived Date and Archived By aren't currently available but are planned and will be rolled out when available.
+
+- For multi-geo tenants, while data residency requirements are honored, site moves aren't supported. Archived sites will need to be reactivated prior to any move.
+
+- Currently, tenant rename isn't supported on archived sites. Sites will need to be reactivated before a tenant rename is triggered.
+
+- Archiving a site that is currently enrolled in Microsoft 365 Backup will be blocked.
+
+- If you archive a site that has a library syncing to a device, that device's sync client will display errors after the site is archived. We recommend that you remove syncing libraries before archiving a site.
archive Archive Preview Terms https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/archive/archive-preview-terms.md
+
+ Title: Microsoft 365 Archive public preview terms and conditions
+++
+audience: admin
+ Last updated : 11/15/2023+++
+search.appverid:
+
+ - m365initiative-syntex
+ms.localizationpriority: medium
+description: Read the preview terms and conditions for Microsoft 365 Archive (Preview).
++
+# Microsoft 365 Archive preview terms and conditions
+
+Effective Date: November 15, 2023
+
+"Company" means the Enterprise customer that uses this Preview Feature.
+
+**By using this Preview Feature, you accept these Terms and Conditions and all rights and obligations within. If you do not agree to these Terms and Conditions, DO NOT use the Preview Feature.** These Terms and Conditions govern the use of the Preview Feature offerings as described below.
+
+ΓÇ£FeedbackΓÇ¥ is all suggestions, comments, feedback, ideas, or know how, in any form, that Company provides to Microsoft. It doesn't include sales forecasts, financial results, future release scheduled, marketing plans and high-level product plans or feature lists for anticipated products.
+
+**MICROSOFT OFFERING**: The goal of the Microsoft 365 Archive is to provide customers with a cost-effective, long-term storage for their inactive aging content. Customers can archive their SharePoint site using Microsoft 365 Archive from SharePoint Admin Center. Admins can also reactivate an archived site that will move the site and its contents from archived (cold tier) storage to SharePoint tenant (standard tier) storage.
+
+**PREVIEW FEATURE**: To terminate your Feature Preview during the Preview Period, stop using the Preview Feature. Microsoft may change or discontinue the Preview Feature at any time with or without notice. Microsoft may also choose not to make the Preview Feature generally commercially available.
+
+During the Preview Period, Company allows its SharePoint tenant admins to Archive SharePoint sites. Company must be aware that this is a preview service and all the limitations described in these Terms and Conditions, including but not limited, that Microsoft may change or discontinue the Preview Feature at any time and that Microsoft may also choose not to make the Preview Feature generally commercially available.
+
+Prerequisite Requirements to enable Microsoft 365 Archive pay-as-you-go are:
+
+1. An Azure subscription with admin access as owner or contributor on the subscription
+
+2. A Microsoft 365 tenancy with either Microsoft 365 admin access or SharePoint admin access
+
+3. An Azure resource group
+
+No service-level agreement (SLA) applies to this Feature Preview.
+
+THE PREVIEW FEATURE IS PROVIDED ΓÇ£AS-IS,ΓÇ¥ ΓÇ£WITH ALL FAULTS,ΓÇ¥ AND ΓÇ£AS AVAILABLE.ΓÇ¥ Microsoft provides no performance guarantee for the Feature Preview (including accompanying URLs provided for embedded or unauthenticated viewing) and Company bear the risk of using it. The Feature Preview isn't included in the SLA for Microsoft Syntex and may not be covered by customer support.
+
+**<ins>LICENSE</ins>**
+
+If Company provides Feedback, Company grants to Microsoft, without charge, the nonexclusive License to make, modify, distribute, or otherwise commercialize the Input as part of any Microsoft offering.
+
+The above License doesn't extend to any technologies that may also be necessary to make or use any offering or portion thereof that incorporates the Feedback but aren't themselves expressly part of the Input (for example, enabling technologies).
+
+**<ins>PAYMENT TERMS</ins>**
+
+Microsoft 365 Archive use pay-as-you-go (PAYG) billing through an Azure subscription. Microsoft 365 Archive billing is determined by how much data in GB you archive using Microsoft 365 Archive. Company will be able to view this usage as meter events through the Azure subscription it chooses.
+
+Microsoft 365 Archive Feature Preview pricing is as follows:
++
+|Microsoft 365 Archive Meters |Meter Unit |Price |
+||||
+|Archive storage |$/GB/Month |$0.05 |
+|Restore |$/GB |$0.60 |
+
+Company won't be charged for reactivation of an archived content within the first seven days of free reactivation period. If they reactivate after the seven days period, the restore meter charge of $0.60/GB will apply.
+
+**<ins>LENGTH OF OBLIGATIONS; DISCLOSURE</ins>**
+
+**Preview Period.** The Preview Period continues in effect until <ins>June 30, 2024, or 30 days after Commercial General Availability of the Preview Feature, whichever is first</ins>. Company may terminate their use of the Preview Feature at any time. Terminating use of the Preview Feature won't change any of the rights, licenses granted, or duties made while the Preview Period is in effect. Termination is defined as i) the CompanyΓÇÖs termination of use of the Preview Feature and/or ii) the Preview Period ends.
+
+**Effects upon Termination.** Once terminated, Company will no longer have access to Microsoft 365 Archive and all the archived content if Microsoft doesn't continue with the then generally available Microsoft 365 Archive use pay-as-you-go (PAYG) billing through an Azure subscription should Microsoft choose to make the Microsoft 365 Archive service generally available.
+
+**<ins>TERMINATION FOR NON-PAYMENT</ins>**
+
+In case the CompanyΓÇÖs Azure subscription goes into an unhealthy stage of deleted or canceled or suspended, we'll prevent any future archival and restores until the subscription is back to a healthy state. Company has 30 days to recover any archived data and restores by bringing back the subscription to an active state. If no action is taken from the Company to bring subscription back to active state in 30 days, we'll soft delete the archived data from systems after this 30 days. Upon reactivation, Company must also pay for Microsoft 365 Archive usage for the days the subscription was in unhealthy state.
+
+This Agreement can't be extended. Microsoft may also choose not to make the Preview Feature generally commercially available.
+
+**<ins>REPRESENTATIONS AND LIMITATIONS</ins>**
+
+**Input.** Company represents that it will not give any Feedback that:
+
+1. Violates any copyright or trade secret claim or right of any third party;
+
+2. It has reason to believe violates any patent claim or right of any third party; or
+
+3. Is subject to an excluded license.
+
+**Authority.** Company represents it has all rights and authority necessary to be legally bound to these Terms and Conditions and grant the rights described therein for itself and its affiliates.
+
+**Limitations.** All information, materials, and feedback are provided ΓÇ£as-isΓÇ¥ and Microsoft bears the risk of using them; Company gives no express warranties, guarantees, or conditions as to its Feedback; and to the extent permitted under local law, Company excludes the implied warranties of merchantability, fitness for a particular purpose, title, and noninfringement as to its Input.
+
+**<ins>LIMITATIONS ON AND EXCLUSIONS OF REMEDIES AND DAMAGES</ins>**
+
+Except as described herein, the only remedy for claims relating to these Terms and Conditions is for Company to terminate its use of the Preview Feature. Neither Party can recover any damages, including direct, consequential, lost profits, special, punitive, indirect, or incidental damages from the other. This limitation applies:
+
+1. To claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence, or other tort to the extent permitted by applicable law.
+
+2. Even if one of us knew or should have known about the possibility of the damages.
+
+The limitations in this section don't apply to claims arising from or in connection with any infringement, misuse, or misappropriation by one of us of the otherΓÇÖs intellectual property rights.
archive Archive Pricing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/archive/archive-pricing.md
+
+ Title: Pricing model for Microsoft 365 Archive (Preview)
+++
+audience: admin
+ Last updated : 11/15/2023+++
+search.appverid:
+
+ - m365initiative-syntex
+ms.localizationpriority: medium
+description: Learn about the pricing model for storage consumption and site reactivation in Microsoft 365 Archive.
++
+# Pricing model for Microsoft 365 Archive (Preview)
+
+> [!NOTE]
+> This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations.
+
+Microsoft 365 Archive charges you for storage and reactivation.
+
+- **Storage consumption** that is charged at a per-GB monthly rate. This meter is only charged when archived storage plus active storage in SharePoint exceeds a tenantΓÇÖs included or licensed allocated SharePoint storage capacity limit. In other words, there's no additional storage cost for archived sites if the tenant hasn't yet consumed its already licensed Storage quota. For more information about storage quota limits, see [SharePoint limits](/office365/servicedescriptions/sharepoint-online-service-description/sharepoint-online-limits).
+
+- **Site reactivation** that is charged at a per-GB rate. The reactivation fee is charged regardless of whether a tenant is above or below its SharePoint capacity limit and only if reactivation is executed more than seven days after the site was most recently put into an archive state. This seven-day grace period provides you with the opportunity to reverse an accidental archival without reaction costs.
+
+Monthly archive usage is calculated as the sum of the usage of all currently archived sites. Each siteΓÇÖs usage is equal to the site storage usage of that site, which can be seen on the site itself or from the Active sites page in the SharePoint admin center. The size of an archived site, and therefore the storage for which it's billed, can only change if the content in the site changes (for example, content naturally expiring in the recycle bin or a retention policy deleting content within the site directly from archive to the recycle bin).
+
+To see the pricing for Microsoft 365 Archive, see [Pay-as-you-go services and pricing for Microsoft Syntex](/microsoft-365/syntex/syntex-pay-as-you-go-services).
+
+### Cost savings if you archive with Microsoft 365 Archive
+
+The following table helps visualize the savings you'll realize by archiving content based on the frequency and percent of all archived content you're restoring. The key takeaway is that if you are not reactivating more than 30% of your data more than twice a year, you'll achieve most of the savings offered by the product.
+
+![Table showing the COGS savings if you archive with Microsoft 365 Archive.](../media/m365-archive/archive-cogs-savings.png)
archive Archive Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/archive/archive-setup.md
+
+ Title: Set up Microsoft 365 Archive (Preview)
+++
+audience: admin
+ Last updated : 11/15/2023+++
+search.appverid:
+
+ - m365initiative-syntex
+ms.localizationpriority: medium
+description: Learn how to set up and configure Microsoft 365 Archive.
++
+# Set up Microsoft 365 Archive (Preview)
+
+> [!NOTE]
+> This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations.
+
+Microsoft 365 Archive follows a pay-as-you-go model, and is configured through the Microsoft 365 admin center. Before you begin, read the [Microsoft 365 preview terms and conditions](archive-preview-terms.md).
+
+![Diagram showing four steps of the setup process for Microsoft 365 Archive.](../media/m365-archive/archive-setup-diagram.png)
+
+To set up Microsoft 365 Archive, follow these steps:
+
+1. Create an [Azure subscription](/azure/cloud-adoption-framework/ready/azure-best-practices/initial-subscriptions) and [resource group](/azure/azure-resource-manager/management/manage-resource-groups-portal).
+2. [Set up pay-as-you-go billing](/microsoft-365/syntex/syntex-azure-billing) for Syntex in the Microsoft 365 admin center.
+3. [Turn on Microsoft 365 Archive](#set-up-microsoft-365-archive) in the Microsoft 365 admin center.
+4. [Manage Microsoft 365 Archive](archive-manage.md) in the SharePoint admin center.
+
+## Prerequisites
+
+### Licensing
+
+Before you can use Microsoft 365 Archive, you must first link your Azure subscription in [Syntex pay-as-you-go](/microsoft-365/syntex/syntex-azure-billing). Microsoft 365 Archive is billed based on the number of gigabytes (GB) archived and number of gigabytes (GB) reactivated. For more information about pricing, see [Pricing model](archive-pricing.md).
+
+To set up pay-as-you-go billing, see [Configure Microsoft Syntex for pay-as-you-go billing at Syntex billing](/microsoft-365/syntex/syntex-azure-billing).
+
+> [!NOTE]
+> Currently in Microsoft 365 Archive (Preview), you will not be able to set up pay-as-you-go billing for two regions: US_West or Canada_East.
+
+### Permissions
+
+You must have Global admin or SharePoint admin permissions to be able to access the Microsoft 365 admin center and set up Microsoft 365 Archive.
+
+## Set up Microsoft 365 Archive
+
+Once pay-as-you-go billing has been enabled for Syntex on Microsoft 365 admin center, Microsoft 365 Archive can be enabled.
+
+1. In the Microsoft 365 admin center, select <a href="https://go.microsoft.com/fwlink/p/?linkid=2171997" target="_blank">**Setup**</a>, and then select **Use content AI with Microsoft Syntex**.
+
+2. On the **Use content AI with Microsoft Syntex** page, select **Manage Microsoft Syntex**.
+
+3. On the **Manage Microsoft Syntex** page, select **Archive (Preview)**.
+
+4. On the **Archive (Preview)** page, select **Turn on**, and on the confirmation pane, select **Confirm**.
+
+ ![Screenshot of the Microsoft 365 Archive page in the admin center showing how to turn on Archive.](../media/m365-archive/turn-on-archive-admin-center.png)
+
+Microsoft 365 Archive is now enabled for you, and you're able to archive content from the SharePoint admin center.
+
+## Turn off Microsoft 365 Archive
+
+To turn off Microsoft 365 Archive:
+
+1. On the **Manage Microsoft Syntex** page, select **Archive (Preview)**.
+
+2. On the **Archive (Preview)** page, select **Turn off**.
+
+When you turn off Microsoft 365 Archive, any further archiving stops. The sites already archived will continue to be in an archive state, and will be billed. The sites can be reactivated with reactivation cost or deleted.
archive Archive States https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/archive/archive-states.md
+
+ Title: Archive states in Microsoft 365 Archive (Preview)
+++
+audience: admin
+ Last updated : 11/15/2023+++
+search.appverid:
+
+ - m365initiative-syntex
+ms.localizationpriority: medium
+description: Learn about the archive states and what they mean in Microsoft 365 Archive.
++
+# Archive states in Microsoft 365 Archive (Preview)
+
+> [!NOTE]
+> This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations.
+
+The following table describes the archive states and allowed operations.
+
+|Archive state |Description |Allowed operations |
+||||
+|Recently Archived |This state is the first stage after a site is archived and is valid for seven days. A site in this stage can be reactivated without any cost and will be reactivated instantaneously. |Reactivate, Delete |
+|Archived |The site enters this state after seven days after being archived. In this stage, reactivations will be charged, and might take a few hours. |Reactivate, Delete |
+|Reactivating |If a site is reactivated from ΓÇ£ArchivedΓÇ¥ state, it will be in this stage until reactivation is complete. After this, the site will be active, and will be available in Active sites page. |None |
enterprise Navigation Options For Sharepoint Online https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/navigation-options-for-sharepoint-online.md
Title: Navigation options for SharePoint Online
+ Title: Navigation options for SharePoint
Previously updated : 4/7/2020 Last updated : 04/05/2024 audience: Admin
- scotvorg - Ent_O365 - SPO_Content
+- must-keep
f1.keywords: - CSH
search.appverid:
- SPO160 - MET150 ms.assetid: adb92b80-b342-4ecb-99a1-da2a2b4782eb
-description: This article describes navigation options sites with SharePoint Publishing enabled in SharePoint Online.
+description: This article describes navigation options sites with SharePoint Publishing enabled in SharePoint.
-# Navigation options for SharePoint Online
+# Navigation options for SharePoint
-This article describes navigation options sites with SharePoint Publishing enabled in SharePoint Online. The choice and configuration of navigation significantly impacts the performance and scalability of sites in SharePoint Online. The SharePoint Publishing site template should only be used if required for a centralized portal and the publishing feature should only be enabled on specific sites and only when absolutely required as it can impact performance when used incorrectly.
+This article describes navigation options sites with SharePoint Publishing enabled in SharePoint. The choice and configuration of navigation significantly impacts the performance and scalability of sites in SharePoint. The SharePoint Publishing site template should only be used if necessary for a centralized portal and the publishing feature should only be enabled on specific sites and only when required as it can impact performance when used incorrectly.
>[!NOTE] >If you're using modern SharePoint navigation options like mega menu, cascading navigation, or hub navigation, this article does not apply to your site. Modern SharePoint site architectures leverage a more flattened site hierarchy and a hub-and-spoke model. This allows many scenarios to be achieved that do NOT require use of the SharePoint Publishing feature.
This article describes navigation options sites with SharePoint Publishing enabl
Navigation provider configuration can significantly impact performance for the entire site, and careful consideration must be taken to pick a navigation provider and configuration that scales effectively for the requirements of a SharePoint site. There are two out-of-the-box navigation providers, as well as custom navigation implementations.
-The first option, [**Structural navigation**](#using-structural-navigation-in-sharepoint-online), is the recommended navigation option in SharePoint Online for classic SharePoint sites, **if you turn on structural navigation caching for your site**. This navigation provider displays the navigation items below the current site, and optionally the current site and its siblings. It provides additional capabilities such as security trimming and site structure enumeration. If caching is disabled, this will negatively impact performance and scalability, and may be subject to throttling.
+The first option, [**Structural navigation**](#using-structural-navigation-in-sharepoint), is the recommended navigation option in SharePoint for classic SharePoint sites, **if you turn on structural navigation caching for your site**. This navigation provider displays the navigation items below the current site, and optionally the current site and its siblings. It provides additional capabilities such as security trimming and site structure enumeration. If caching is disabled, this will negatively impact performance and scalability, and might be subject to throttling.
-The second option, [**Managed (Metadata) navigation**](#using-managed-navigation-and-metadata-in-sharepoint-online), represents navigation items using a Managed Metadata term set. We recommend that security trimming be disabled unless required. Security trimming is enabled as a secure-by-default setting for this navigation provider; however, many sites do not require the overhead of security trimming since navigation elements often are consistent for all users of the site. With the recommended configuration to disable security trimming, this navigation provider does not require enumerating site structure and is highly scalable with acceptable performance impact.
+The second option, [**Managed (Metadata) navigation**](#using-managed-navigation-and-metadata-in-sharepoint), represents navigation items using a Managed Metadata term set. We recommend that security trimming be disabled unless required. Security trimming is enabled as a secure-by-default setting for this navigation provider; however, many sites don't require the overhead of security trimming since navigation elements often are consistent for all users of the site. With the recommended configuration to disable security trimming, this navigation provider doesn't require enumerating site structure and is highly scalable with acceptable performance impact.
In addition to the out-of-the-box navigation providers, many customers have successfully implemented alternative custom navigation implementations. See [Search-driven client-side scripting](#using-search-driven-client-side-scripting) in this article.
-## Pros and Cons of SharePoint Online navigation options
+## Pros and Cons of SharePoint navigation options
The following table summarizes the pros and cons of each option. |Structural navigation |Managed navigation |Search-driven navigation |Custom-navigation provider | ||||| |Pros:<br/><br/>Easy to maintain<br/>Security trimmed<br/>Automatically updates within 24 hours when content is changed<br/> |Pros:<br/><br/>Easy to maintain<br/>|Pros:<br/><br/>Security trimmed<br/>Automatically updates as sites are added<br/>Fast loading time and locally cached navigation structure<br/>|Pros:<br/><br/>Wider choice of options available<br/>Fast loading when caching is used correctly<br/>Many options work well with responsive page design<br/>|
-|Cons:<br/><br/>**Impacts performance if caching is disabled**<br/>Subject to throttling<br/>|Cons:<br/><br/>Not automatically updated to reflect site structure<br/>**Impacts performance if security trimming is enabled** or when navigation structure is complex<br/>|Cons:<br/><br/>No ability to easily order sites<br/>Requires customization of the master page (technical skills required)<br/>|Cons:<br/><br/>Custom development is required<br/>External data source / cache stored is needed e.g. Azure<br/>|
+|Cons:<br/><br/>**Impacts performance if caching is disabled**<br/>Subject to throttling<br/>|Cons:<br/><br/>Not automatically updated to reflect site structure<br/>**Impacts performance if security trimming is enabled** or when navigation structure is complex<br/>|Cons:<br/><br/>No ability to easily order sites<br/>Requires customization of the master page (technical skills required)<br/>|Cons:<br/><br/>Custom development is required<br/>External data source / cache stored is needed, e.g., Azure<br/>|
-The most appropriate option for your site will depend on your site requirements and on your technical capability. If you want an easy-to-configure navigation provider that automatically updates when content is changed, then structural navigation [with caching enabled](https://support.office.com/article/structural-navigation-and-performance-f163053f-8eca-4b9c-b973-36b395093b43) is a good option.
+The most appropriate option for your site depends on your site requirements and on your technical capability. If you want an easy-to-configure navigation provider that automatically updates when content is changed, then structural navigation [with caching enabled](https://support.office.com/article/structural-navigation-and-performance-f163053f-8eca-4b9c-b973-36b395093b43) is a good option.
>[!NOTE] >Applying the same principle as modern SharePoint sites by simplifying the overall site structure to a flatter, non-hierarchical structure improves performance and simplifies moving to modern SharePoint sites. What this means is that instead of having a single site collection with hundreds of sites (subwebs), a better approach is to have many site collections with very few subsites (subwebs).
-## Analyzing navigation performance in SharePoint Online
+## Analyzing navigation performance in SharePoint
-The [Page Diagnostics for SharePoint tool](./page-diagnostics-for-spo.md) is a browser extension for Microsoft Edge and Chrome browsers that analyzes both SharePoint Online modern portal and classic publishing site pages. This tool only works for SharePoint Online, and cannot be used on a SharePoint system page.
+The [Page Diagnostics for SharePoint tool](./page-diagnostics-for-spo.md) is a browser extension for Microsoft Edge and Chrome browsers that analyzes both SharePoint modern portal and classic publishing site pages. This tool only works for SharePoint, and can't be used on a SharePoint system page.
-The tool generates a report for each analyzed page showing how the page performs against a pre-defined set of rules and displays detailed information when results for a test fall outside the baseline value. SharePoint Online administrators and designers can use the tool to troubleshoot performance issues to ensure that new pages are optimized prior to publishing.
+The tool generates a report for each analyzed page showing how the page performs against a pre-defined set of rules and displays detailed information when results for a test fall outside the baseline value. SharePoint administrators and designers can use the tool to troubleshoot performance issues to ensure that new pages are optimized prior to publishing.
**SPRequestDuration** in particular is the time it takes for SharePoint to process the page. Heavy navigation (like including pages in navigation), complex site hierarchies, and other configuration and topology options can all dramatically contribute to longer durations.
-## Using structural navigation in SharePoint Online
+## Using structural navigation in SharePoint
-This is the out-of-the-box navigation used by default and is the most straightforward solution. It does not require any customization and a non-technical user can also easily add items, hide items, and manage the navigation from the settings page. We recommend [enabling caching](https://support.office.com/article/structural-navigation-and-performance-f163053f-8eca-4b9c-b973-36b395093b43), otherwise there is an expensive performance trade-off.
+This is the out-of-the-box navigation used by default and is the most straightforward solution. It doesn't require any customization and a nontechnical user can also easily add items, hide items, and manage the navigation from the settings page. We recommend [enabling caching](https://support.office.com/article/structural-navigation-and-performance-f163053f-8eca-4b9c-b973-36b395093b43), otherwise there's an expensive performance trade-off.
### How to implement structural navigation caching
To enable at the site level, under **Site Settings** > **Navigation**, check the
![Enable caching at site level.](../media/structural-nav/structural-nav-caching-site.png)
-## Using managed navigation and metadata in SharePoint Online
+## Using managed navigation and metadata in SharePoint
Managed navigation is another out-of-the-box option that you can use to recreate most of the same functionality as structural navigation. Managed metadata can be configured to have security trimming enabled or disabled. When configured with security trimming disabled, managed navigation is fairly efficient as it loads all the navigation links with a constant number of server calls. Enabling security trimming, however, negates some of the performance advantages of managed navigation.
If you need to enable security trimming, we recommend that you:
- Update all friendly URL links to simple links - Add required security trimming nodes as friendly URLs-- Limit the number of navigation items to no more than 100 and no more than 3 levels deep
+- Limit the number of navigation items to no more than 100 and no more than three levels deep
-Many sites do not require security trimming, as the navigation structure is often consistent for all users of the site. If security trimming is disabled and a link is added to navigation that not all users have access to, the link will still show but will lead to an access denied message. There is no risk of inadvertent access to the content.
+Many sites don't require security trimming, as the navigation structure is often consistent for all users of the site. If security trimming is disabled and a link is added to navigation that not all users have access to, the link will still show but will lead to an access denied message. There's no risk of inadvertent access to the content.
### How to implement managed navigation and the results
There are several articles on Microsoft Learn about the details of managed navig
In order to implement managed navigation, you set up terms with URLs corresponding to the navigation structure of the site. Managed navigation can even be manually curated to replace structural navigation in many cases. For example:
-![SharePoint Online site structure.](../media/SPONavOptionsListOfSites.png))
+![SharePoint site structure.](../media/SPONavOptionsListOfSites.png))
## Using Search-driven client-side scripting
One common class of custom navigation implementations embraces client-rendered d
These navigation providers have a couple of key advantages: - They generally work well with responsive page designs.-- They are extremely scalable and performant because they can render with no resource cost (and refresh in the background after a timeout).
+- They're extremely scalable and performant because they can render with no resource cost (and refresh in the background after a timeout).
- These navigation providers can retrieve navigation data using various strategies, ranging from simple static configurations to various dynamic data providers. An example of a data provider is to use a **Search-driven navigation**, which allows flexibility for enumerating navigation nodes and handling security trimming efficiently.
-There are other popular options to build **Custom navigation providers**. Please review [Navigation solutions for SharePoint Online portals](/sharepoint/dev/solution-guidance/portal-navigation) for further guidance on building a Custom navigation provider.
+There are other popular options to build **Custom navigation providers**. Review [Navigation solutions for SharePoint portals](/sharepoint/dev/solution-guidance/portal-navigation) for further guidance on building a Custom navigation provider.
Using search you can leverage the indexes that are built up in the background using continuous crawl. The search results are pulled from the search index and the results are security-trimmed. This is generally faster than out-of-the-box navigation providers when security trimming is required. Using search for structural navigation, especially if you have a complex site structure, will speed up page loading time considerably. The main advantage of this over managed navigation is that you benefit from security trimming.
-This approach involves creating a custom master page and replacing the out-of-the-box navigation code with custom HTML. Follow this procedure outlined in the following example to replace the navigation code in the file `seattle.html`. In this example, you will open the `seattle.html` file and replace the whole element `id="DeltaTopNavigation"` with custom HTML code.
+This approach involves creating a custom master page and replacing the out-of-the-box navigation code with custom HTML. Follow this procedure outlined in the following example to replace the navigation code in the file `seattle.html`. In this example, you'll open the `seattle.html` file and replace the whole element `id="DeltaTopNavigation"` with custom HTML code.
### Example: Replace the out-of-the-box navigation code in a master page 1. Navigate to the Site Settings page. 2. Open the master page gallery by clicking **Master Pages**. 3. From here you can navigate through the library and download the file `seattle.master`.
-4. Edit the code using a text editor and delete the code block in the following screen shot.<br/>![Delete the code block shown.](../media/SPONavOptionsDeleteCodeBlock.png)<br/>
+4. Edit the code using a text editor and delete the code block in the following screenshot.<br/>![Delete the code block shown.](../media/SPONavOptionsDeleteCodeBlock.png)<br/>
5. Remove the code between the `<SharePoint:AjaxDelta id="DeltaTopNavigation">` and `<\SharePoint:AjaxDelta>` tags and replace it with the following snippet:<br/> ```javascript
This approach involves creating a custom master page and replacing the out-of-th
<br/> 6. Replace the URL in the loading image anchor tag at the beginning, with a link to a loading image in your site collection. After you have made the changes, rename the file and then upload it to the master page gallery. This generates a new .master file.<br/>
-7. This HTML is the basic markup that will be populated by the search results returned from JavaScript code. You will need to edit the code to change the value for var root = "site collection URL" as demonstrated in the following snippet:<br/>
+7. This HTML is the basic markup that will be populated by the search results returned from JavaScript code. You'll need to edit the code to change the value for var root = "site collection URL" as demonstrated in the following snippet:<br/>
```javascript var root = "https://spperformance.sharepoint.com/sites/NavigationBySearch";
function addEventsToElements() {
```
-To summarize the code shown above in the `jQuery $(document).ready` function there is a `viewModel object` created and then the `loadNavigationNodes()` function on that object is called. This function either loads the previously built navigation hierarchy stored in the HTML5 local storage of the client browser or it calls the function `queryRemoteInterface()`.
+To summarize the code shown above in the `jQuery $(document).ready` function there's a `viewModel object` created and then the `loadNavigationNodes()` function on that object is called. This function either loads the previously built navigation hierarchy stored in the HTML5 local storage of the client browser or it calls the function `queryRemoteInterface()`.
`QueryRemoteInterface()` builds a request using the `getRequest()` function with the query parameter defined earlier in the script and then returns data from the server. This data is essentially an array of all the sites in the site collection represented as data transfer objects with various properties.
The objects are then put into a results array. This array is parsed into JSON us
One major benefit of [this approach](#example-replace-the-out-of-the-box-navigation-code-in-a-master-page) is that by using HTML5 local storage, the navigation is stored locally for the user the next time they load the page. We get major performance improvements from using the search API for structural navigation; however, it takes some technical capability to execute and customize this functionality.
-In the [example implementation](#example-replace-the-out-of-the-box-navigation-code-in-a-master-page), the sites are ordered in the same way as the out-of-the-box structural navigation; alphabetical order. If you wanted to deviate from this order, it would be more complicated to develop and maintain. Also, this approach requires you to deviate from the supported master pages. If the custom master page is not maintained, your site will miss out on updates and improvements that Microsoft makes to the master pages.
+In the [example implementation](#example-replace-the-out-of-the-box-navigation-code-in-a-master-page), the sites are ordered in the same way as the out-of-the-box structural navigation; alphabetical order. If you wanted to deviate from this order, it would be more complicated to develop and maintain. Also, this approach requires you to deviate from the supported master pages. If the custom master page isn't maintained, your site will miss out on updates and improvements that Microsoft makes to the master pages.
The [above code](#about-the-javascript-file) has the following dependencies:
The [above code](#about-the-javascript-file) has the following dependencies:
- KnockoutJS - https://knockoutjs.com/ - Linq.js - `https://linqjs.codeplex.com/`, or github.com/neuecc/linq.js
-The current version of LinqJS does not contain the ByHierarchy method used in the above code and will break the navigation code. To fix this, add the following method to the Linq.js file before the line `Flatten: function ()`.
+The current version of LinqJS doesn't contain the ByHierarchy method used in the above code and will break the navigation code. To fix this, add the following method to the Linq.js file before the line `Flatten: function ()`.
```javascript ByHierarchy: function(firstLevel, connectBy, orderBy, ascending, parent) {
enterprise Office 365 Network Mac Location Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-location-services.md
Title: "Microsoft 365 Network Connectivity Location Services"
Previously updated : 12/06/2021 Last updated : 04/05/2024 audience: Admin
- scotvorg - Ent_O365 - Strat_O365_Enterprise
+- must-keep
description: "Microsoft 365 Network Connectivity Location Services" # Microsoft 365 Network Connectivity Location Services
-The <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a> now shows **Network Insights and performance recommendations**, which are live performance metrics that are collected from your Microsoft 365 tenant. These metrics can be viewed only by administrative users in your tenant. Organizational network connectivity is designed per office location through a network egress location to the Internet. Microsoft 365 client connectivity uses that route and then across the Internet to Microsoft service front door servers. Identifying office locations is key to being able to show these network insights.
+The <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a> now shows **Network Insights and performance recommendations**, which are live performance metrics that are collected from your Microsoft 365 tenant. These metrics can only be viewed by administrative users in your tenant. Organizational network connectivity is designed per office location through a network egress location to the Internet. Microsoft 365 client connectivity uses that route and then across the Internet to Microsoft service front door servers. Identifying office locations is key to being able to show these network insights.
## Location in network measurements
-An organization's administrator can opt in for location to be included in the network measurements used by this feature. This enables auto-discovery of the city where each office is located. Location information is not precise and is obfuscated to 300m and categorized by city. At the time when location is captured on a Windows device, the device will show a **Location In-Use** icon in the tool tray. Administrators may want to notify users of the appearance of this icon. With this processing, the location is treated as the organization office location and not the location of a person or a device. Network insights can be shown at these discovered office location cities. If you want higher accuracy in the recommendations, you can enter specific office location addresses. The network insights will be aggregated to those locations instead. Office locations cannot be aggregated more closely than 300 meters.
+An organization's administrator can opt in for location to be included in the network measurements used by this feature. This enables autodiscovery of the city where each office is located. Location information isn't precise and is obfuscated to 300 m and categorized by city. At the time when location is captured on a Windows device, the device shows a **Location In-Use** icon in the tool tray. Administrators might want to notify users of the appearance of this icon. With this processing, the location is treated as the organization office location and not the location of a person or a device. Network insights can be shown at these discovered office location cities. If you want higher accuracy in the recommendations, you can enter specific office location addresses. The network insights will be aggregated to those locations instead. Office locations can't be aggregated more closely than 300 meters.
## Location in the Microsoft 365 Admin Center
Any content provided through Bing Maps, including geocodes, can only be used wit
This feature, provided through Bing Maps, is also supported by **TomTom**. More information about TomTom's products and services may be found at [https://www.tomtom.com/legal](https://www.tomtom.com/legal).
-## Related topics
+## Related articles
[Network connectivity in the Microsoft 365 Admin Center](office-365-network-mac-perf-overview.md)
enterprise Office 365 Network Mac Perf Cpe https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-cpe.md
Title: "Microsoft 365 informed network routing"
Previously updated : 12/06/2021 Last updated : 04/05/2024 audience: Admin
- scotvorg - Ent_O365 - Strat_O365_Enterprise
+- must-keep
description: "Microsoft 365 informed network routing" # Microsoft 365 informed network routing
-Informed network routing is a feature that integrates various Microsoft 365 applications with third party software defined network (SD-WAN) solutions in order to optimize and improve your network connectivity to Microsoft service endpoints. Optimized SD-WAN connectivity may result in improved user experiences and performance.
+Informed network routing is a feature that integrates various Microsoft 365 applications with third party software defined network (SD-WAN) solutions in order to optimize and improve your network connectivity to Microsoft service endpoints. Optimized SD-WAN connectivity might result in improved user experiences and performance.
## Overview
-Informed network routing provides a bi-directional data sharing channel between Microsoft and your SD-WAN solution. For every office location and Internet circuit that you configure, Microsoft periodically shares feedback with the SD-WAN solution on the quality of selected Microsoft 365 application experiences for network traffic associated with each specific Internet circuit. Using this feedback, the SD-WAN solution may then take smart recovery actions by routing Microsoft 365 application traffic through alternate available links.
+Informed network routing provides a bi-directional data sharing channel between Microsoft and your SD-WAN solution. For every office location and Internet circuit that you configure, Microsoft periodically shares feedback with the SD-WAN solution on the quality of selected Microsoft 365 application experiences for network traffic associated with each specific Internet circuit. Using this feedback, the SD-WAN solution might then take smart recovery actions by routing Microsoft 365 application traffic through alternate available links.
-Quality of service degradations in the path of a particular Internet circuit such as increased latency or high packet loss are difficult to detect on a continuous basis. These degradations may be detrimental to user experiences for applications such as Exchange Online, SharePoint, OneDrive, and Microsoft Teams. Common symptoms include slow search of Exchange content, high transfer times when interacting with SharePoint or OneDrive document libraries, or poor call or meeting quality in Microsoft Teams.
+Quality of service degradations in the path of a particular Internet circuit such as increased latency or high packet loss are difficult to detect on a continuous basis. These degradations might be detrimental to user experiences for applications such as Exchange Online, SharePoint, OneDrive, and Microsoft Teams. Common symptoms include slow search of Exchange content, high transfer times when interacting with SharePoint or OneDrive document libraries, or poor call or meeting quality in Microsoft Teams.
The feedback and recovery mechanism within informed network routing seeks to dynamically detect such issues in near real time and informs the deployed SD-WAN solution to take automatic recovery actions.
Microsoft is working with various partners to enable integration with Microsoft
### Network topology
-Informed network routing currently identifies traffic associated with a specific office location and Internet circuit based on the public IP address used to send network traffic to Microsoft.
+Informed network routing currently identifies traffic associated with a specific office location and Internet circuit based on the public IP address used to send network traffic to Microsoft.
-In the case where there isn't at least one network circuit providing direct Internet access at a branch location, informed network routing may not provide significant value.
+In the case where there isn't at least one network circuit providing direct Internet access at a branch location, informed network routing might not provide significant value.
### Application usage
Application experience data (reflected through network quality metrics) is colle
## Enabling informed network routing
-Enabling informed network routing requires multiple steps, some of which will need to be performed within the configuration interface of your SD-WAN solution. Consult your SD-WAN solution vendor for guidance on how to initiate the process of enabling informed network routing within the SD-WAN solution before proceeding with configuration in the Microsoft 365 admin center.
+Enabling informed network routing requires multiple steps, some of which need to be performed within the configuration interface of your SD-WAN solution. Consult your SD-WAN solution vendor for guidance on how to initiate the process of enabling informed network routing within the SD-WAN solution before proceeding with configuration in the Microsoft 365 admin center.
Once you're ready to enable informed network routing in the Microsoft 365 admin center, ensure you have the necessary **User Admin**, or **Global admin** permissions. >[!IMPORTANT] >In order to provide the necessary tenant-level applications permissions consent for the selected SD-WAN solution to access the informed network routing data sharing channel, you must perform the following steps as a global administrator. - ### Step 1: Open SD-WAN solution configuration options In the [Microsoft 365 admin center](https://admin.microsoft.com/), select **Health > Network connectivity** in the left-hand navigation pane.
Once you've completed the permissions grant, select **Next**.
### Step 5: Confirm your configuration settings
-The final step in enabling informed network routing for your tenant is a confirmation page that displays the settings you've provided.
+The final step in enabling informed network routing for your tenant is a confirmation page that displays the settings you've provided.
Informed network routing is now enabled for your tenant.
You'll perform much of the configuration for informed network routing within you
Each office location must be configured in the Microsoft 365 admin center so that informed network routing can properly identify traffic associated with the network circuits providing connectivity to these locations.
-Office locations may be auto-detected as part of Microsoft's ongoing collection of network telemetry. As a result, some locations may be pre-populated in the admin center for your tenant.
+Office locations might be autodetected as part of Microsoft's ongoing collection of network telemetry. As a result, some locations might be prepopulated in the admin center for your tenant.
-If these locations are accurate, you'll simply need to enable the informed network routing feature for each desired location and configure the Internet circuits and their public IP addresses.
+If these locations are accurate, you'll simply need to enable the informed network routing feature for each desired location and configure the Internet circuits and their public IP addresses.
-If the auto-detected locations are not accurate, or there are no locations pre-populated in your tenant, you'll have to add or edit locations manually to reflect an accurate topology of your organization.
+If the autodetected locations aren't accurate, or there are no locations prepopulated in your tenant, you'll have to add or edit locations manually to reflect an accurate topology of your organization.
### Updating locations
Data exchanged between Microsoft and the SD-WAN solution provider is stored in t
Data is retained in this location for up to 30 days. When disabled, all remaining data is removed within this 30-day retention window.
-Data in this location is exchanged with the selected SD-WAN solution, and the location of the configured SD-WAN solution may not be within the same region. Customers should work with their SD-WAN solution provider to evaluate any data storage location requirements prior to production deployment.
+Data in this location is exchanged with the selected SD-WAN solution, and the location of the configured SD-WAN solution might not be within the same region. Customers should work with their SD-WAN solution provider to evaluate any data storage location requirements prior to production deployment.
-## Related topics
+## Related articles
[Network connectivity in the Microsoft 365 admin center](office-365-network-mac-perf-overview.md)
enterprise Office 365 Network Mac Perf Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-insights.md
Title: "Microsoft 365 Network Insights"
Previously updated : 12/06/2021 Last updated : 04/05/2024 audience: Admin
- scotvorg - Ent_O365 - Strat_O365_Enterprise
+- must-keep
description: "Microsoft 365 Network Insights"
description: "Microsoft 365 Network Insights"
Insights are intended to help in designing network perimeters for your office locations. Each insight provides live details about the performance characteristics for a specific common issue for each geographic location where users are accessing your tenant.
-These are network insights that may be shown for each office location:
+These are network insights that might be shown for each office location:
- [Backhauled network egress](#backhauled-network-egress) - [Network intermediary device](#network-intermediary-device) - [Better performance detected for customers near you](#better-performance-detected-for-customers-near-you)-- [Use of a non-optimal Exchange Online service front door](#use-of-a-non-optimal-exchange-online-service-front-door)-- [Use of a non-optimal SharePoint Online service front door](#use-of-a-non-optimal-sharepoint-online-service-front-door)
+- [Use of a nonoptimal Exchange Online service front door](#use-of-a-nonoptimal-exchange-online-service-front-door)
+- [Use of a nonoptimal SharePoint service front door](#use-of-a-nonoptimal-sharepoint-service-front-door)
- [Low download speed from SharePoint front door](#low-download-speed-from-sharepoint-front-door) - [China user optimal network egress](#china-user-optimal-network-egress)
-These are tenant-level network insights that may be shown for the tenant:
+These are tenant-level network insights that might be shown for the tenant:
- [Exchange sampled connections affected by connectivity issues](#exchange-sampled-connections-affected-by-connectivity-issues) - [SharePoint sampled connections affected by connectivity issues](#sharepoint-sampled-connections-affected-by-connectivity-issues)
These insights also appear in the productivity score pages.
## Backhauled network egress
-This insight displays if the network insights service detects that the distance from a given user location to the network egress is greater than 500 miles (800 kilometers). This may indicate that Microsoft 365 traffic is being backhauled to a common Internet edge device or proxy.
+This insight displays if the network insights service detects that the distance from a given user location to the network egress is greater than 500 miles (800 kilometers). This might indicate that Microsoft 365 traffic is being backhauled to a common Internet edge device or proxy.
This insight is abbreviated as "Egress" in some summary views.
This insight is abbreviated as "Egress" in some summary views.
### What does this mean?
-This identifies that the distance between the office location and the network egress is more than 500 miles (800 kilometers). The office location is identified by an obfuscated client machine location and the network egress location is identified by using reverse IP Address to location databases. The office location may be inaccurate if Windows Location Services is disabled on machines. The network egress location may be inaccurate if the reverse IP address database information is inaccurate.
+This identifies that the distance between the office location and the network egress is more than 500 miles (800 kilometers). The office location is identified by an obfuscated client machine location and the network egress location is identified by using reverse IP Address to location databases. The office location might be inaccurate if Windows Location Services is disabled on machines. The network egress location might be inaccurate if the reverse IP address database information is inaccurate.
Details for this insight include:
This insight examines the aggregate performance of Microsoft 365 customers in th
There could be many reasons for this condition, including latency in your corporate network or ISP, bottlenecks, or architecture design issues. Examine the latency between each hop in the route between your office network and the current Microsoft 365 front door. For more information, see [Microsoft 365 Network Connectivity Principles](microsoft-365-network-connectivity-principles.md).
-## Use of a non-optimal Exchange Online service front door
+## Use of a nonoptimal Exchange Online service front door
This insight displays if the network insights service detects that users in a specific location aren't connecting to an optimal Exchange Online service front door.
We list Exchange Online service front doors that are suitable for use from the o
### What should I do?
-Network backhaul might cause use of a non-optimal Exchange Online service front door, in which case we recommend local and direct network egress. If you have implemented a remote DNS Recursive Resolver server, we recommend aligning the server configuration with the network egress.
+Network backhaul might cause use of a nonoptimal Exchange Online service front door, in which case we recommend local and direct network egress. If you have implemented a remote DNS Recursive Resolver server, we recommend aligning the server configuration with the network egress.
-## Use of a non-optimal SharePoint Online service front door
+## Use of a nonoptimal SharePoint service front door
-This insight displays if the network insights service detects that users in a specific location aren't connecting to the closest SharePoint Online service front door.
+This insight displays if the network insights service detects that users in a specific location aren't connecting to the closest SharePoint service front door.
This insight is abbreviated as "Afd" in some summary views. ### What does this mean?
-We identify the SharePoint Online service front door that the test client is connecting to, and then we compare the office location city to the expected SharePoint Online service front door for that city. If the test client service front door and the expected service front door match, we recommend connecting to a SharePoint service front door closer to the office location.
+We identify the SharePoint service front door that the test client is connecting to, and then we compare the office location city to the expected SharePoint service front door for that city. If the test client service front door and the expected service front door match, we recommend connecting to a SharePoint service front door closer to the office location.
### What should I do?
-Network backhaul before the corporate network egress could cause non-optimal SharePoint Online service front door use. If so, try local and direct network egress. Non-optimal SharePoint Online service front door use could also be caused by a remote DNS Recursive Resolver server, in which case we recommend aligning the DNS Recursive Resolver server with the network egress.
+Network backhaul before the corporate network egress could cause nonoptimal SharePoint service front door use. If so, try local and direct network egress. Nonoptimal SharePoint service front door use could also be caused by a remote DNS Recursive Resolver server, in which case we recommend aligning the DNS Recursive Resolver server with the network egress.
## Low download speed from SharePoint front door
-This insight displays if the network insights service detects that bandwidth between the specific office location and SharePoint Online is less than 1 MBps.
+This insight displays if the network insights service detects that bandwidth between the specific office location and SharePoint is less than 1 MBps.
This insight is abbreviated as "Throughput" in some summary views. ### What does this mean?
-The download speed that a user can get from SharePoint Online and OneDrive for Business service front doors is measured in megabytes per second (MBps). If this value is less than 1 MBps, then we provide this insight.
+The download speed that a user can get from SharePoint and OneDrive service front doors is measured in megabytes per second (MBps). If this value is less than 1 MBps, then we provide this insight.
### What should I do?
-To improve download speeds, your organization might need to increase bandwidth. Alternatively, network congestion might exist between computers at the office location and the SharePoint Online service front door. This condition restricts the download speed available to users even if sufficient bandwidth is available.
+To improve download speeds, your organization might need to increase bandwidth. Alternatively, network congestion might exist between computers at the office location and the SharePoint service front door. This condition restricts the download speed available to users even if sufficient bandwidth is available.
## China user optimal network egress
If your organization has private WAN connectivity, we recommend configuring a ne
- Singapore - Malaysia
-Internet egress farther away from users than these locations reduces performance, and egress in China may cause high latency and connectivity issues due to cross-border congestion.
+Internet egress farther away from users than these locations reduces performance, and egress in China might cause high latency and connectivity issues due to cross-border congestion.
### What should I do?
This insight indicates that most of your users are likely experiencing issues wi
Enable office location network connectivity visibility if you haven't already done so. Identify which offices are affected by poor network connectivity and find ways to improve the network perimeter at each that connects the users to Microsoft's network.
-## Related topics
+## Related articles
[Network connectivity in the Microsoft 365 Admin Center](office-365-network-mac-perf-overview.md)
enterprise Office 365 Network Mac Perf Nppdata https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-nppdata.md
Title: "Microsoft 365 network provider assessments."--++ Previously updated : 05/22/2023 Last updated : 04/05/2024 audience: Admin
- scotvorg - Ent_O365 - Strat_O365_Enterprise
+- must-keep
description: "Microsoft 365 network provider assessments"
Microsoft measures network performance and availability between client applicati
## Network performance
-Read about the network performance assessment calculation method at [Microsoft 365 network assessment](office-365-network-mac-perf-score.md)
+Read about the network performance assessment calculation method at [Microsoft 365 network assessment](office-365-network-mac-perf-score.md).
## Network availability
-The reliability of Microsoft 365 services as experienced by the client is shown by the network availability metric. It is measured as the length of time that Exchange and SharePoint are working, and for Microsoft Teams as a proportion of calls that connected successfully both expressed as a percentage.
+The reliability of Microsoft 365 services as experienced by the client is shown by the network availability metric. It's measured as the length of time that Exchange and SharePoint are working, and for Microsoft Teams as a proportion of calls that connected successfully both expressed as a percentage.
### Exchange and SharePoint Network availability
-Exchange and Sharepoint availability are the proportion of minutes without any major user errors out of the total user minutes. This is how it is calculated:
+Exchange and Sharepoint availability are the proportion of minutes without any major user errors out of the total user minutes. This is how it's calculated:
:::image type="content" source="../media/m365-mac-perf/m365-mac-perf-nppdata-exo-spo-availability.png" alt-text="Formula use to calculate network availability for Exchange and SharePoint.":::
We receive notification of unsuccessful connections after network connectivity i
### Teams Network availability
-By using telemetry data from the actual calls, Microsoft Teams availability is computed as a percentage of calls that failed compared to total calls. This is how it is calculated:
+By using telemetry data from the actual calls, Microsoft Teams availability is computed as a percentage of calls that failed compared to total calls. This is how it's calculated:
:::image type="content" source="../media/m365-mac-perf/m365-mac-perf-nppdata-teams-availability.png" alt-text="Formula use to calculate network availability for Microsoft Teams."::: - ## Detecting network providers Network providers are detected from network attributes in Office 365 network telemetry. Network attributes that may be used for detection include:
There are some markers we show where data can't be reported.
* **Statistical significance** ΓÇô As described above we don't show data where the standard error of sampling is greater than 20%. * **No data** ΓÇô This is displayed if for some reason this data element had no samples. * **Privacy requirement** ΓÇô This is displayed for the network provider view if there were fewer than five customers in any aggregation result or if there were fewer than 24 samples in the aggregation. We don't provide customer performance data directly to network providers for customer privacy reasons.
-* **Dominating customer** ΓÇô Even where there are five or more customers, there may be cases where a customer can be guessed due to the specific network provider having a large customer in a geographic area. To avoid this, we compare the population including the largest customer with the same population excluding the largest customer. Using a Cohen's D calculation, we discard results where the population difference is greater than 0.5. This means that where the largest customer has a medium to large Cohen's D effect on the aggregation result the result is blocked. A network provider simply needs to expand their geographic area where they have more customers to see results.
+* **Dominating customer** ΓÇô Even where there are five or more customers, there might be cases where a customer can be guessed due to the specific network provider having a large customer in a geographic area. To avoid this, we compare the population including the largest customer with the same population excluding the largest customer. Using a Cohen's D calculation, we discard results where the population difference is greater than 0.5. This means that where the largest customer has a medium to large Cohen's D effect on the aggregation result the result is blocked. A network provider simply needs to expand their geographic area where they have more customers to see results.
The markers **Privacy requirement** and **Dominating customer** aren't shown in customer reports. In addition, we remove outliers from the sample source where outliers are defined as:
Network providers will additionally not be shown in a tenant or location view if
The NPI Chart shows the network providers with the highest performance for Office 365 applications for customers who are in the same country/region and state as your office. We show availability and performance data related to these providers. This chart also has a target baseline that shows the best performance observed in the same country/region and state.
-Note: NPI Chart is currently available only for United States of America, the chart will be expanded soon to all locations globally.
+Note: NPI Chart is currently available only for United States of America. The chart will be expanded soon to all locations globally.
-## Related topics
+## Related articles
[Network connectivity in the Microsoft 365 Admin Center](office-365-network-mac-perf-overview.md)
enterprise Office 365 Network Mac Perf Nppdetails https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-nppdetails.md
Title: "Network provider details in the Microsoft 365 Admin Center (PREVIEW)"--++ Previously updated : 01/30/2024 Last updated : 04/05/2024 audience: Admin
enterprise Office 365 Network Mac Perf Nppux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-nppux.md
Title: "Network provider connectivity attribution in the Microsoft 365 Admin Center"--++ Previously updated : 05/22/2023 Last updated : 04/05/2024 audience: Admin
- scotvorg - Ent_O365 - Strat_O365_Enterprise
+- must-keep
description: "Network provider connectivity attribution in the Microsoft 365 Admin Center"
-# Network provider connectivity attribution in the Microsoft 365 Admin Center.
+# Network provider connectivity attribution in the Microsoft 365 Admin Center
## The network provider table
In the Microsoft 365 Admin Center you can view network providers in use by your
:::image type="content" source="../media/m365-mac-perf/m365-mac-perf-nppux-networktraffic.png" alt-text="Screenshot of the network provider traffic page in the admin center." lightbox="../media/m365-mac-perf/m365-mac-perf-nppux-networktraffic.png":::
-When you navigate to the Network traffic tab you will see information about connectivity solutions from network providers that have been detected between Office 365 users and Microsoft's network.
+When you navigate to the Network traffic tab, you'll see information about connectivity solutions from network providers that have been detected between Office 365 users and Microsoft's network.
Network providers are identified as either of the following:
The NPI chart shows the network providers with the highest performance for Offic
:::image type="content" source="../media/m365-mac-perf/m365-mac-perf-nppux-NPIChart-01222024.png" alt-text="Example of a network provider index chart that shows availability and performance for each network provider.":::
-Note: NPI chart is currently available only for United States of America, the chart will be expanded soon to all locations globally.
+Note: NPI chart is currently available only for United States of America. The chart will be expanded soon to all locations globally.
-## Providers used at this location
+## Providers used at this location
Below the NPI Chart is a list of network providers detected for your users at this specific office location. The Table of network providers for this location has the following fields: * Network provider name * Solution name
Below the NPI Chart is a list of network providers detected for your users at th
* Availability * Performance
-## Related topics
+## Related articles
[Network connectivity in the Microsoft 365 admin center](office-365-network-mac-perf-overview.md)
enterprise Office 365 Network Mac Perf Onboarding Tool https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-onboarding-tool.md
Title: "Microsoft 365 network connectivity test tool"
Previously updated : 9/18/2023 Last updated : 04/05/2024 audience: Admin
- scotvorg - Ent_O365 - Strat_O365_Enterprise
+- must-keep
description: "Microsoft 365 network connectivity test tool"
The Microsoft 365 network connectivity test tool is located at <https://connecti
> [!NOTE] > This document mentions the URL (<https://connectivity.office.com>) for the Global version of this tool. For other versions, please refer to the table below for the corresponding URLs. - |Feature|Global service <https://connectivity.office.com>|US Government L4| US Government L5 (DOD) | China operated by 21Vianet <https://connectivity.sovcloud.cn>| |:--|:--|:--|:--|:--| |Anonymous test|✅|✖️|✖️|✅|
The Microsoft 365 network connectivity test tool is located at <https://connecti
|Share report in tenant | ✅|✖️|✖️|✖️| |Share report to public | ✅|✖️|✖️|✖️| |Network health status | ✅|✖️|✖️|✅|
-|Multi-languages support: English,Chinese Simplified,Chinese Tranditional,Japanese| ✅|✖️|✖️|✅|
+|Multi-languages support: English, Chinese Simplified, Chinese Traditional, Japanese| ✅|✖️|✖️|✅|
|Testing from the command line| ✅|✖️|✖️|✖️| |FAQ| ✅|✖️|✖️|✅| |Community forum| ✅|✖️|✖️|✅| - > [!IMPORTANT] > It's important to sign in to your Microsoft 365 tenant as all test reports are shared with your administrator and uploaded to the tenant while you are signed in.
We identify the network egress IP address on the server side. Location databases
#### Your distance from the network egress location
-We determine the distance from that location to the office location. This distance is shown as a network insight if the distance is greater than **500 miles** (800 kilometers) since that is likely to increase the TCP latency by more than 25 ms and may affect user experience.
+We determine the distance from that location to the office location. This distance is shown as a network insight if the distance is greater than **500 miles** (800 kilometers) since that is likely to increase the TCP latency by more than 25 ms and might affect user experience.
The map shows the network egress location in relation to the user office location indicating the network backhaul inside of the enterprise WAN.
This is provided for information only and doesn't contribute to any network insi
#### Your distance from and/or time to connect to a DNS recursive resolver
-The in-use DNS Recursive Resolver is identified by making a specific DNS request and then asking the DNS Name Server for the IP Address that it received the same request from. This IP Address is the DNS Recursive Resolver and it is looked up in IP Address location databases to find the location. The distance from the user office location to the DNS Recursive Resolver server location is then calculated. This is shown as a network insight if the distance is greater than **500 miles** (800 kilometers).
+The in-use DNS Recursive Resolver is identified by making a specific DNS request and then asking the DNS Name Server for the IP Address that it received the same request from. This IP Address is the DNS Recursive Resolver and it's looked up in IP Address location databases to find the location. The distance from the user office location to the DNS Recursive Resolver server location is then calculated. This is shown as a network insight if the distance is greater than **500 miles** (800 kilometers).
-The location looked up from the network egress IP Address may not be accurate and this inaccuracy would lead to a false result from this test. To validate if this error is occurring for a specific IP Address, you can use publicly accessible network IP Address location web sites.
+The location looked up from the network egress IP Address might not be accurate and this inaccuracy would lead to a false result from this test. To validate if this error is occurring for a specific IP Address, you can use publicly accessible network IP Address location web sites.
This network insight affects the selection of the Exchange Online service front door. To address this insight local and direct network egress should be a prerequisite and then DNS Recursive Resolver should be located close to that network egress.
This section shows test results related to Exchange Online.
#### Exchange service front door location
-The in-use Exchange service front door is identified in the same way that Outlook does this and we measure the network TCP latency from the user location to it. The TCP latency is shown and the in-use Exchange service front door is compared to the list of best service front doors for the current location. This is shown as a network insight if one of the best Exchange service front door(s) isn't in use.
+The in-use Exchange service front door is identified in the same way that Outlook does this and we measure the network TCP latency from the user location to it. The TCP latency is shown and the in-use Exchange service front door is compared to the list of best service front doors for the current location. This is shown as a network insight if one of the best Exchange service front doors isn't in use.
-Not using one of the best Exchange service front door(s) could be caused by network backhaul before the corporate network egress in which case we recommend local and direct network egress. It could also be caused by use of a remote DNS recursive resolver server in which case we recommend aligning the DNS recursive resolver server with the network egress.
+Not using one of the best Exchange service front doors could be caused by network backhaul before the corporate network egress in which case we recommend local and direct network egress. It could also be caused by use of a remote DNS recursive resolver server in which case we recommend aligning the DNS recursive resolver server with the network egress.
We calculate a potential improvement in TCP latency (ms) to the Exchange service front door. This is done by looking at the tested user office location network latency and subtracting the network latency from the current location to the closets Exchange service front door. The difference represents the potential opportunity for improvement.
This lists the best Exchange service front door locations by city for your locat
This shows the DNS name and IP Address of the Exchange service front door server that you were directed to. It's provided for information only and there's no associated network insight.
-### SharePoint Online
+### SharePoint
-This section shows test results related to SharePoint Online and OneDrive.
+This section shows test results related to SharePoint and OneDrive.
#### The service front door location
We measure the download speed for a 15-Mb file from the SharePoint service front
#### Buffer bloat
-During the 15 Mb download, we measure the TCP latency to the SharePoint service front door. This is the latency under load and it's compared to the latency when not under load. The increase in latency when under load is often attributable to consumer network device buffers being loaded (or bloated). A network insight is shown for any bloat of 100 ms or more.
+During the 15-Mb download, we measure the TCP latency to the SharePoint service front door. This is the latency under load and it's compared to the latency when not under load. The increase in latency when under load is often attributable to consumer network device buffers being loaded (or bloated). A network insight is shown for any bloat of 100 ms or more.
#### Service front door recorded in the client DNS
This section shows test results related to Microsoft Teams.
#### Media connectivity (audio, video, and application sharing)
-This tests for UDP connectivity to the Microsoft Teams service front door. If this is blocked, then Microsoft Teams may still work using TCP, but audio and video will be impaired. Read more about these UDP network measurements, which also apply to Microsoft Teams at [Media Quality and Network Connectivity Performance in Skype for Business Online](/skypeforbusiness/optimizing-your-network/media-quality-and-network-connectivity-performance).
+This tests for UDP connectivity to the Microsoft Teams service front door. If this is blocked, then Microsoft Teams might still work using TCP, but audio and video will be impaired. Read more about these UDP network measurements, which also apply to Microsoft Teams at [Media Quality and Network Connectivity Performance in Skype for Business Online](/skypeforbusiness/optimizing-your-network/media-quality-and-network-connectivity-performance).
#### Packet loss
Shows the measured UDP jitter, which should be lower than **30ms**.
We test for HTTP connectivity from the user office location to all of the required Microsoft 365 network endpoints. These are published at [https://aka.ms/o365ip](./urls-and-ip-address-ranges.md). A network insight is shown for any required network endpoints, which can't be connected to.
-Connectivity may be blocked by a proxy server, a firewall, or another network security device on the enterprise network perimeter. Connectivity to TCP port 80 is tested with an HTTP request and connectivity to TCP port 443 is tested with an HTTPS request. If there's no response the FQDN is marked as a failure. If there's an HTTP response code 407 the FQDN is marked as a failure. If there's an HTTP response code 403, then we check the Server attribute of the response and if it appears to be a proxy server we mark this as a failure. You can simulate the tests we perform with the Windows command-line tool curl.exe.
+Connectivity might be blocked by a proxy server, a firewall, or another network security device on the enterprise network perimeter. Connectivity to TCP port 80 is tested with an HTTP request and connectivity to TCP port 443 is tested with an HTTPS request. If there's no response the FQDN is marked as a failure. If there's an HTTP response code 407 the FQDN is marked as a failure. If there's an HTTP response code 403, then we check the Server attribute of the response and if it appears to be a proxy server we mark this as a failure. You can simulate the tests we perform with the Windows command-line tool curl.exe.
We test the TLS/SSL certificate at each required Microsoft 365 network endpoint that is in the optimize or allow category as defined at [https://aka.ms/o365ip](./urls-and-ip-address-ranges.md). If any tests don't find a Microsoft TLS/SSL certificate, then the encrypted network connected must have been intercepted by an intermediary network device. A network insight is shown on any intercepted encrypted network endpoints.
-Where an TLS/SSL certificate is found that isn't provided by Microsoft, we show the FQDN for the test and the in-use TLS/SSL certificate owner. This TLS/SSL certificate owner may be a proxy server vendor, or it may be an enterprise self-signed certificate.
+Where an TLS/SSL certificate is found that isn't provided by Microsoft, we show the FQDN for the test and the in-use TLS/SSL certificate owner. This TLS/SSL certificate owner might be a proxy server vendor, or it might be an enterprise self-signed certificate.
#### Network path
-This section shows the results of an ICMP traceroute to the Exchange Online service front door, the SharePoint Online service front door, and the Microsoft Teams service front door. It's provided for information only and there's no associated network insight. There are three traceroutes provided. A traceroute to _outlook.office365.com_, a traceroute to the customers SharePoint front end or to _microsoft.sharepoint.com_ if one wasn't provided, and a traceroute to _world.tr.teams.microsoft.com_.
+This section shows the results of an ICMP traceroute to the Exchange Online service front door, the SharePoint service front door, and the Microsoft Teams service front door. It's provided for information only and there's no associated network insight. There are three traceroutes provided. A traceroute to _outlook.office365.com_, a traceroute to the customers SharePoint front end or to _microsoft.sharepoint.com_ if one wasn't provided, and a traceroute to _world.tr.teams.microsoft.com_.
> [!NOTE] > In reports generated in different versions, the addresses you see above may also vary slightly.
You can run it by double clicking the executable in Windows File Explorer, or yo
The first time you launch the executable you'll be prompted to accept the end user license agreement (EULA) before testing is performed. If you have already read and accepted the EULA, you can create an empty file called Microsoft-365-Network-Connectivity-Test-EULA-accepted.txt in the current working directory for the executable process when it's launched. To accept the EULA, you can type 'y' and press enter in the command line window when prompted. The executable accepts the following command line parameters:+ - -h to show a link to this help documentation - -testlist &lt;test&gt; Specifies tests to run. By default only basic tests are run. Valid test names include: all, dnsConnectivityPerf, dnsResolverIdentification, bufferBloat, traceroute, proxy, vpn, skype, connectivity, networkInterface - -filepath &lt;filedir&gt; Directory path of test result files. Allowed value is absolute or relative path of an accessible directory-- -city &lt;city&gt; For the city, state, and country/region fields the specified value will be used if provided. If not provided then Windows Location Services (WLS) will be queried. If WLS fails the location will be detected from the machines network egress
+- -city &lt;city&gt; For the city, state, and country/region fields the specified value will be used if provided. If not provided then Windows Location Services (WLS) will be queried. If WLS fails the location will be detected from the machines network egress
- -state &lt;state&gt;-- -country &lt;country&gt;
+- -country &lt;country&gt;
- -proxy &lt;account&gt; &lt;password&gt; Proxy account name and password can be provided if you require a proxy to access the Internet ### Results+ Output of results is written to a JSON file in a folder called TestResults, which is created in the current working directory of the process unless it already exists. The filename format for the output is connectivity_test_result_YYYY-MM-DD-HH-MM-SS.json. The results are in JSON nodes that match the output shown on the web page for the Microsoft 365 network connectivity test tool web site. A new result file is created each time you run it and the standalone executable doesn't upload results to your Microsoft tenant for viewing in the Admin Center Network Connectivity pages. Front door codes, longitudes, and latitudes aren't included in the result file. ### Launching from Windows File Explorer+ You can double select on the executable to start the testing and a command prompt window will appear. ### Launching from the Command Prompt
-On a CMD.EXE command prompt window you can type the path and name of the executable to run it. The filename is Microsoft.Connectivity.Test.exe
+
+In a CMD.EXE command prompt window, you can type the path and name of the executable to run it. The filename is Microsoft.Connectivity.Test.exe.
### Launching from Windows Task Scheduler
-In Windows Task Scheduler you can add a task to launch the standalone test executable. You should specify the current working directory of the task to be where you have created the EULA accepted file since the executable blocks until the EULA is accepted. You can't interactively accept the EULA if the process is started in the background with no console.
+
+In Windows Task Scheduler, you can add a task to launch the standalone test executable. You should specify the current working directory of the task to be where you have created the EULA accepted file since the executable blocks until the EULA is accepted. You can't interactively accept the EULA if the process is started in the background with no console.
### More details on the standalone executable
-The commandline tool uses Windows Location Services to find the users City State Country/region information for determining some distances. If Windows Location Services is disabled in the control panel, then user location based assessments are blank. In Windows Settings "Location services" must be on and "Let desktop apps access your location" must also be on.
+
+The commandline tool uses Windows Location Services to find the users City State Country/region information for determining some distances. If Windows Location Services is disabled in the control panel, then user location based assessments are blank. In Windows Settings, "Location services" must be on and "Let desktop apps access your location" must also be on.
The commandline tool attempts to install the .NET Framework if it isn't already installed. It also downloads the main testing executable from the Microsoft 365 network connectivity test tool and launch that.
The commandline tool attempts to install the .NET Framework if it isn't already
[Microsoft Support and Recovery Assistant](https://aka.ms/SaRA_home) (Assistant) automates all the steps required to execute the command-line version of the Microsoft 365 network connectivity test tool on a userΓÇÖs machine and creates a report similar to the one created by the web version of the connectivity test tool. Note, the Assistant runs the command line version of Microsoft 365 network connectivity test tool to produce the same JSON result file, but the JSON file is converted into .CSV file format.
-[Download and Run the Assistant Here](https://aka.ms/SaRA-NetworkConnectivity-Learn)
+You can [download and run the Assistant here](https://aka.ms/SaRA-NetworkConnectivity-Learn).
### Viewing Test Results
To view the information about the test results and telemetry, double-click and o
### Types of result files
-Microsoft Support and Recovery Assistant creates 2 files:
+Microsoft Support and Recovery Assistant creates two files:
1. Network Connectivity Report (CSV) This report runs the raw JSON file against a rule engine to make sure defined thresholds are being met and if they aren't met a &#8220;warning&#8221; or &#8220;error&#8221; is displayed in the output column of the CSV file. You can view the NetworkConnectivityReport.csv file to be informed about any detected issues or defects. See [What happens at each test step](office-365-network-mac-perf-onboarding-tool.md#what-happens-at-each-test-step) for details on each test and the thresholds for warnings.
Here are answers to some of our frequently asked questions.
The advanced test client requires .NET 6.0 Runtime. If you run the advanced test client without that installed you'll be directed to [the .NET 6.0 installer page](https://dotnet.microsoft.com/en-us/download/dotnet/6.0/runtime?utm_source=getdotnetcore). Be sure to install from the Run desktop apps column for Windows. Administrator permissions on the machine are required to install .NET 6.0 Runtime.
-The advanced test client uses SignalR to communicate to the web page. For this, you must ensure that TCP port 443 connectivity to **connectivity.service.signalr.net** is open. This URL isn't published in the <https://aka.ms/o365ip> because that connectivity isn't required for a Microsoft 365 client application user. If you are using an HTTP proxy for connection to FQDN connectivity.office.com and encounter the error **SignalR proxy configuration is different than origin.**, ensure connection to FQDN connectivity.service.signalr.net is allowed through the proxy. If a PAC file is being used to push proxy configuration settings, ensure the PAC file will return the same proxy settings for FQDN's connectivity.office.com and connectivity.service.signalr.net.
+The advanced test client uses SignalR to communicate to the web page. For this, you must ensure that TCP port 443 connectivity to **connectivity.service.signalr.net** is open. This URL isn't published in the <https://aka.ms/o365ip> because that connectivity isn't required for a Microsoft 365 client application user. If you're using an HTTP proxy for connection to FQDN connectivity.office.com and encounter the error **SignalR proxy configuration is different than origin.**, ensure connection to FQDN connectivity.service.signalr.net is allowed through the proxy. If a PAC file is being used to push proxy configuration settings, ensure the PAC file will return the same proxy settings for FQDN's connectivity.office.com and connectivity.service.signalr.net.
### What is Microsoft 365 service front door?
A best Microsoft 365 service front door (formerly known as an optimal service fr
### What is an internet egress location?
-The internet egress Location is the location where your network traffic exits your enterprise network and connects to the Internet. This is also identified as the location where you have a Network Address Translation (NAT) device and usually where you connect with an Internet Service Provider (ISP). If you see a long distance between your location and your internet egress location, then this may identify a significant WAN backhaul.
+The internet egress Location is the location where your network traffic exits your enterprise network and connects to the Internet. This is also identified as the location where you have a Network Address Translation (NAT) device and usually where you connect with an Internet Service Provider (ISP). If you see a long distance between your location and your internet egress location, then this might identify a significant WAN backhaul.
## Related articles
enterprise Office 365 Network Mac Perf Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-overview.md
Title: "Network connectivity in the Microsoft 365 Admin Center"
Previously updated : 01/30/2024 Last updated : 04/05/2024 audience: Admin
To access the network connectivity page, you must be an administrator for the or
## Prerequisites for network connectivity assessments to appear
-To get started, turn on your location opt-in setting to automatically collect data from devices using Windows Location Services, go to your Locations list to add or upload location data, or run the Microsoft 365 network connectivity test from your office locations. These three options for office location information are detailed below. Whilst network connectivity can be evaluated across the organization, any network design improvements need to be done for specific office locations. Network connectivity information is provided for each office location once those locations can be determined. There are three options for getting network assessments from your office locations:
+To get started, turn on your location opt-in setting to automatically collect data from devices using Windows Location Services, go to your Locations list to add or upload location data, or run the Microsoft 365 network connectivity test from your office locations. These three options for office location information are detailed below. While network connectivity can be evaluated across the organization, any network design improvements need to be done for specific office locations. Network connectivity information is provided for each office location once those locations can be determined. There are three options for getting network assessments from your office locations:
### 1. Enable Windows Location Services
You don't need to add locations in the Admin Center with this method as they're
The machines should have Wi-Fi networking rather than an ethernet cable. Machines with an ethernet cable don't have accurate location information.
-Measurement samples and office locations should start to appear 24 hours after these prerequisites have been met. Office locations discovered from Windows Location Services are aggregated per City and are retained in your view for 90 days after samples are no longer received. If you choose to switch to office locations added by the Administrator with LAN subnet information you can disable Windows Location Services and hide all of the discovered locations. They'll be removed after the 90 day period.
+Measurement samples and office locations should start to appear 24 hours after these prerequisites have been met. Office locations discovered from Windows Location Services are aggregated per City and are retained in your view for 90 days after samples are no longer received. If you choose to switch to office locations added by the Administrator with LAN subnet information, you can disable Windows Location Services and hide all of the discovered locations. They'll be removed after the 90 day period.
### 2. Add locations and provide LAN subnet information For this option, neither Windows Location Services nor Wi-Fi is required. Your OneDrive for Windows version must be up-to-date and installed on at least one computer at the location and you must know your LAN subnet information for each of your offices. This option allows multiple office locations per city and you can name your office locations. You can also upload them from other sources.
-Make sure that you also add locations in the **locations page** or import those from a CSV file. The locations added must include your office LAN subnet information. In the dialog for adding or editing a location, you can specify a number of LAN subnets and a number of public egress IP subnets. The LAN subnets are required and one of them must match the LAN subnet attribute on a received network assessment for results to show up. We now support matching of all subnets under a given network when you add locations using LAN subnets. The main advantage with this is, you no longer need to define exact matches for LAN subnets when you add locations. For example, you added a location using /20 as the LAN subnet definition, in the network assessment we received a LAN subnet attribute containing /24 which is part of the supernet you defined using /20 and there is no other specific match for the /24 subnet, we will map this network assessment to the location you added using the /20 LAN subnet definition.
+Make sure that you also add locations in the **locations page** or import those from a CSV file. The locations added must include your office LAN subnet information. In the dialog for adding or editing a location, you can specify a number of LAN subnets and a number of public egress IP subnets. The LAN subnets are required and one of them must match the LAN subnet attribute on a received network assessment for results to show up. We now support matching of all subnets under a given network when you add locations using LAN subnets. The main advantage with this is, you no longer need to define exact matches for LAN subnets when you add locations. For example, you added a location using /20 as the LAN subnet definition, in the network assessment we received a LAN subnet attribute containing /24 which is part of the supernet you defined using /20 and there's no other specific match for the /24 subnet, we'll map this network assessment to the location you added using the /20 LAN subnet definition.
Usually, LAN subnets are private IP address ranges as defined in RFC1918 such that the use of public IP addresses as the LAN subnets is likely to be incorrect. The dialog shows suggestions of LAN subnets that have been seen in recent network assessment tests for your organization so that you can choose.
All test measurements from client machines include the LAN subnet information, w
### 3. Manually gather test reports with the Microsoft 365 network connectivity test tool
-For this option, you need to identify a person at each location. Ask them to browse to [Microsoft 365 network connectivity test](https://connectivity.office.com) on a Windows machine on which they have administrative permissions. On the web site, they need to sign in to their Office 365 account for the same organization that you want to see the results. Then they should click **Run test**. During the test there's a downloaded Connectivity test EXE. They need to open and execute that. Once the tests are completed, the test result is uploaded to the Admin Center.
+For this option, you need to identify a person at each location. Ask them to browse to [Microsoft 365 network connectivity test](https://connectivity.office.com) on a Windows machine on which they have administrative permissions. On the web site, they need to sign in to their Office 365 account for the same organization that you want to see the results. Then they should click **Run test**. During the test, there's a downloaded Connectivity test EXE. They need to open and execute that. Once the tests are completed, the test result is uploaded to the Admin Center.
Test reports are linked to a location if it was added with LAN subnet information, otherwise they're shown at the discovered City location only.
Many enterprises have network perimeter configurations, which have grown over ti
## How we can solve these challenges
-Enterprises can improve general user experience and secure their environment by following [Office 365 connectivity principles](./microsoft-365-network-connectivity-principles.md) and by using the Microsoft 365 Admin Center network connectivity feature. In most cases, following these general principles will have a significant positive impact on end-user latency, service reliability and overall performance of Microsoft 365.
+Enterprises can improve general user experience and secure their environment by following [Office 365 connectivity principles](./microsoft-365-network-connectivity-principles.md) and by using the Microsoft 365 Admin Center network connectivity feature. In most cases, following these general principles will have a significant positive impact on end-user latency, service reliability, and overall performance of Microsoft 365.
Microsoft is sometimes asked to investigate network performance issues with Microsoft 365 for large enterprise customers, and these frequently have a root cause related to the customer's network perimeter infrastructure. When a common root cause of a customer network perimeter issue is found, we seek to identify simple test measurements. A test with a measurement threshold that identifies a specific problem is valuable because we can test the same measurement at any location, tell whether this root cause is present there and share it as a network insight with the administrator.
The overview page also shows the network assessment for the customer as a weight
> [!div class="mx-imgBorder"] > ![Network assessment.](../media/m365-mac-perf/m365-mac-perf-overview-score.png)
-You can view a table view of the locations where they can be filtered, sorted, and edited in the **Locations** tab. Locations with specific recommendations may also include an estimated potential latency improvement. This is calculated by taking the median latency of your organization users at the location and subtracting the median latency for all organizations in the same city.
+You can view a table view of the locations where they can be filtered, sorted, and edited in the **Locations** tab. Locations with specific recommendations might also include an estimated potential latency improvement. This is calculated by taking the median latency of your organization users at the location and subtracting the median latency for all organizations in the same city.
> [!div class="mx-imgBorder"] > ![Network insights locations.](../media/m365-mac-perf/m365-mac-perf-locations.png) ## Remote worker assessment and user connection metrics
-We classify network traffic logs as remote or onsite users and show their percentages in the user connection metrics section of the overview pane. For cities where you have remote users, you'll find the location specific remote network assessment score when you open that location's page. The locations list will have both office locations and remote worker cities, which can be filtered and sorted. We provide the remote worker assessment score, with points breakdown for Exchange, SharePoint and Teams.
+We classify network traffic logs as remote or onsite users and show their percentages in the user connection metrics section of the overview pane. For cities where you have remote users, you'll find the location specific remote network assessment score when you open that location's page. The locations list will have both office locations and remote worker cities, which can be filtered and sorted. We provide the remote worker assessment score, with points breakdown for Exchange, SharePoint, and Teams.
-Home user networking insights are aggregated and reported at a city level and limited to cities with a minimum of five remote employees. We are not identifying individual employees working from home.
+Home user networking insights are aggregated and reported at a city level and limited to cities with a minimum of five remote employees. We aren't identifying individual employees working from home.
Locations are auto classified as onsite or remote, however, you have the option to enter all your onsite egress IP addresses manually to ensure a 100% classification. If you decide to go this route, you'll have to check the **Enter all onsite egress IP addresses manually** checkbox in the Locations Settings flyout after adding all your egress IP addresses. When this is done, all network traffic logs from egress IP addresses you've marked as onsite will always be classified as offices and every other egress IP address will be classified as remote.
By default, the network assessments for your organization and the network insigh
## CSV Import for LAN subnet office locations
-For LAN subnet office identification, you need to add each location in advance. Instead of adding individual office locations in the **Locations** tab you can import them from a CSV file. You may be able to obtain this data from other places you have stored it such as the Call Quality Dashboard or Active Directory Sites and Services
+For LAN subnet office identification, you need to add each location in advance. Instead of adding individual office locations in the **Locations** tab you can import them from a CSV file. You might be able to obtain this data from other places you have stored it such as the Call Quality Dashboard or Active Directory Sites and Services.
In the CSV file, a discovered city location shows in the userEntered column as blank, and a manually added office location shows as 1.
In the CSV file, a discovered city location shows in the userEntered column as b
> [!div class="mx-imgBorder"] > ![CSV import message.](../media/m365-mac-perf/m365-mac-perf-import.png)
-1. Click the **Download current office locations (.csv)** link to export the current locations list to a CSV file, and save it to your local hard disk. This will provide you with a correctly formatted CSV with column headings to which you can add locations. You can leave the existing exported locations as they are; they won't be duplicated when you import the updated CSV. If you wish to change the address of an existing location, it is updated when you import the CSV. You can't change the address of a discovered city.
+1. Click the **Download current office locations (.csv)** link to export the current locations list to a CSV file, and save it to your local hard disk. This will provide you with a correctly formatted CSV with column headings to which you can add locations. You can leave the existing exported locations as they are; they won't be duplicated when you import the updated CSV. If you wish to change the address of an existing location, it's updated when you import the CSV. You can't change the address of a discovered city.
1. Open the CSV and add your locations by filling out the following fields on a new line for each location you want to add. Leave all other fields blank; values you enter in other fields will be ignored.
If you've uploaded building data to your Call Quality Dashboard, you can add tho
> [!div class="mx-imgBorder"] > ![We couldnt upload your file flyout.](../media/m365-mac-perf/m365-mac-perf-import-cqd-couldnt-upload.png)
-6. If there are no errors in the file, you'll see the message: _Your file test.tsv is uploaded and ready. Select Import to upload your information._
+6. If there are no errors in the file, you'll see the message: _Your file test.tsv is uploaded and ready. Select **Import** to upload your information._
> [!div class="mx-imgBorder"] > ![Select a .tsc file to upload.](../media/m365-mac-perf/m365-mac-perf-import-cqd-select-tsv.png)
If you've uploaded building data to your Call Quality Dashboard, you can add tho
## FAQ
-### What role is needed to access Network Connectivity in Microsoft 365 Admin Center?
-You will need Network Administrator or Global Administrator role.
+### What role is needed to access Network Connectivity in Microsoft 365 Admin Center?
+
+You'll need the Network Administrator or Global Administrator role.
### What is a Microsoft 365 service front door?
An optimal Microsoft 365 service front door is one that is closest to your netwo
### What is an internet egress location?
-The internet egress location is the location where your network traffic exits your enterprise network and connects to the Internet. This is also identified as the location where you have a Network Address Translation (NAT) device and usually where you connect with an Internet Service Provider (ISP). If you see a long distance between your location and your internet egress location, this may indicate a significant WAN backhaul.
+The internet egress location is the location where your network traffic exits your enterprise network and connects to the Internet. This is also identified as the location where you have a Network Address Translation (NAT) device and usually where you connect with an Internet Service Provider (ISP). If you see a long distance between your location and your internet egress location, this might indicate a significant WAN backhaul.
### What license is needed for this capability?
-You require a license that provides access to the Microsoft 365 admin center.
+You require a license that provides access to the Microsoft 365 admin center.
## Related articles
enterprise Office 365 Network Mac Perf Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-score.md
Title: "Microsoft 365 network assessment"
Previously updated : 12/06/2021 Last updated : 04/05/2024 audience: Admin
- scotvorg - Ent_O365 - Strat_O365_Enterprise
+- must-keep
description: "Microsoft 365 network assessment"
The network assessment points value is from 0 to 100 and is an average of TCP la
> [!div class="mx-imgBorder"] > ![Network assessment value.](../media/m365-mac-perf/m365-mac-perf-overview-score-top.png)
-A very low network assessment value suggests that Microsoft 365 clients will have significant problems connecting to the tenant or maintaining a responsive user experience. A high value indicates a properly configured network with few ongoing performance issues. A value of 80% represents a healthy baseline, above which you should not expect to receive regular user complaints about Microsoft 365 connectivity or responsiveness due to network performance. As iterative network connectivity improvements are made, this value will increase along with user experience.
+A very low network assessment value suggests that Microsoft 365 clients will have significant problems connecting to the tenant or maintaining a responsive user experience. A high value indicates a properly configured network with few ongoing performance issues. A value of 80% represents a healthy baseline, above which you shouldn't expect to receive regular user complaints about Microsoft 365 connectivity or responsiveness due to network performance. As iterative network connectivity improvements are made, this value increases along with user experience.
| Network assessment | Expected user experience | | :-- | :-- | | 100 | Best | | 80 | Meets recommendations | | 60 | Acceptable |
-| 40 | Users may experience issues |
-| 20 | Users may complain |
+| 40 | Users might experience issues |
+| 20 | Users might complain |
| 0 | Network problems a common topic of discussion | ## Network assessment panel
The **Assessment history** shows the past 30 days of the assessment and the benc
A network assessment measures the design of the network perimeter of an office location to Microsoft's network. Improvements to the network perimeter are best done at each office location.
-We show a network assessment value for the whole Microsoft 365 tenant on the network performance overview page. This value is a weighted average of the network assessments for all office locations. There is also a specific network assessment value for each detected office location on that location's summary page.
+We show a network assessment value for the whole Microsoft 365 tenant on the network performance overview page. This value is a weighted average of the network assessments for all office locations. There's also a specific network assessment value for each detected office location on that location's summary page.
## Exchange Online
-For Exchange Online, the TCP latency from the client machine to the Exchange service front door is measured. This latency can be impacted by the distance the network travels over the customers LAN and WAN. It can also be impacted by network intermediary devices or services, which delay the connectivity or cause packets to be resent. And it is impacted by how far away the nearest Exchange service front door is. The median (also known as the 50th percentile or P50 measure) is taken for all measurements over the previous three days.
+For Exchange Online, the TCP latency from the client machine to the Exchange service front door is measured. This latency can be impacted by the distance the network travels over the customers LAN and WAN. It can also be impacted by network intermediary devices or services, which delay the connectivity or cause packets to be resent. And it's impacted by how far away the nearest Exchange service front door is. The median (also known as the 50th percentile or P50 measure) is taken for all measurements over the previous three days.
The Exchange Online assessment is made using the following table. Any TCP latency number between the thresholds are assigned points linearly within the band.
-| TCP Latency | Points |
-| : | :-- |
+| TCP Latency | Points |
+| :- | :-- |
| 10 ms or less | 100 | | 25 ms | 80 | | 100 ms | 60 |
The Exchange Online assessment is made using the following table. Any TCP latenc
| 300 ms | 20 | | 350 ms or more | 0 |
-## SharePoint Online
+## SharePoint
-For SharePoint Online the download speed available for a user to access a document from SharePoint or OneDrive is measured. This can be impacted by the bandwidth available on network circuits between the client machine and Microsoft's network. It is also often impacted by network congestion that exists in bottlenecks in complex network devices or in poor coverage Wi-Fi areas. The download speed is measured in megabytes per second, which is approximately one tenth of a circuits rated megabits per second. The MegaByte per second unit is helpful because you can directly see what size file can be downloaded in 1 second. The 25th percentile (also known as the P25 measure) is taken for all measurements over the previous three days. This 25th percentile helps reduce the impact of varying congestion over time.
+For SharePoint the download speed available for a user to access a document from SharePoint or OneDrive is measured. This can be impacted by the bandwidth available on network circuits between the client machine and Microsoft's network. It's also often impacted by network congestion that exists in bottlenecks in complex network devices or in poor coverage Wi-Fi areas. The download speed is measured in megabytes per second, which is approximately one tenth of a circuit's rated megabits per second. The MegaByte per second unit is helpful because you can directly see what size file can be downloaded in 1 second. The 25th percentile (also known as the P25 measure) is taken for all measurements over the previous three days. This 25th percentile helps reduce the impact of varying congestion over time.
-The SharePoint Online assessment is made using the following table. Any download speed number between the thresholds are assigned points linearly within the band.
+The SharePoint assessment is made using the following table. Any download speed number between the thresholds are assigned points linearly within the band.
-| Download speed | Points |
-| :- | :-- |
-| 20MBps or more | 100 |
-| 14MBps | 80 |
-| 8MBps | 60 |
-| 4MBps | 40 |
-| 2MBps | 20 |
-| 0MBps | 0 |
+| Download speed | Points |
+| :-- | :-- |
+| 20 MBps or more | 100 |
+| 14 MBps | 80 |
+| 8 MBps | 60 |
+| 4 MBps | 40 |
+| 2 MBps | 20 |
+| 0 MBps | 0 |
## Microsoft Teams
We calculate a mean opinion score from these UDP measurements for a scale from o
## Understanding test sampling
-Network test sampling does not include user or device identities and hence the size of offices and number of users in them is estimated. We use the number of test results from Exchange tests and the number of tests from SharePoint tests to do this. If no samples are received for the office location then summary assessment information is still shown for up to 60 days but detail information is not shown and that includes the estimated number users.
+Network test sampling doesn't include user or device identities and hence the size of offices and number of users in them is estimated. We use the number of test results from Exchange tests and the number of tests from SharePoint tests to do this. If no samples are received for the office location, then summary assessment information is still shown for up to 60 days but detailed information isn't shown, including the estimated number of users.
-## Related topics
+## Related articles
[Network connectivity in the Microsoft 365 Admin Center](office-365-network-mac-perf-overview.md)
enterprise Use The Centralized Deployment Powershell Cmdlets To Manage Add Ins https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/use-the-centralized-deployment-powershell-cmdlets-to-manage-add-ins.md
Title: "Use the Centralized Deployment PowerShell cmdlets to manage add-ins"
Previously updated : 1/24/2020 Last updated : 04/04/2024 audience: Admin
f1.keywords:
ms.assetid: 94f4e86d-b8e5-42dd-b558-e6092f830ec9 - seo-marvel-apr2020-+
+- scotvorg
+- must-keep
description: "Use the Centralized Deployment PowerShell cmdlets to help you deploy and manage Office Add-ins for your Microsoft 365 organization." # Use the Centralized Deployment PowerShell cmdlets to manage add-ins
-As a Microsoft 365 global admin, you can deploy Office Add-ins to users via the Centralized Deployment feature (see [Deploy Office Add-ins in the admin center](../admin/manage/manage-deployment-of-add-ins.md). In addition to deploying Office Add-ins via the Microsoft 365 admin center, you can also use Microsoft PowerShell. Install the [O365 Centralized Add-In Deployment Module for Windows PowerShell](https://www.powershellgallery.com/packages/O365CentralizedAddInDeployment).
+As a Microsoft 365 global admin, you can deploy Office Add-ins to users via the Centralized Deployment feature (see [Deploy Office Add-ins in the admin center](../admin/manage/manage-deployment-of-add-ins.md)). In addition to deploying Office Add-ins via the Microsoft 365 admin center, you can also use Microsoft PowerShell. Install the [O365 Centralized Add-In Deployment Module for Windows PowerShell](https://www.powershellgallery.com/packages/O365CentralizedAddInDeployment).
After you download the module, open a regular Windows PowerShell window and run the following cmdlet:
New-OrganizationAddIn -AssetId 'WA104099688' -Locale 'en-US' -ContentMarket 'en-
To determine the value for the _AssetId_ parameter, you can copy it from the URL of the Office Store webpage for the add-in. AssetIds always begin with "WA" followed by a number. For example, in the previous example, the source for the AssetId value of WA104099688 is the Office Store webpage URL for the add-in: [https://store.office.com/en-001/app.aspx?assetid=WA104099688](https://store.office.com/en-001/app.aspx?assetid=WA104099688).
-The values for the _Locale_ parameter and the _ContentMarket_ parameter are identical and indicate the country/region you're trying to install the add-in from. The format is en-US, fr-FR. and so forth.
+The values for the _Locale_ parameter and the _ContentMarket_ parameter are identical and indicate the country/region you're trying to install the add-in from. The format is en-US, fr-FR and so forth.
> [!NOTE] > Add-ins uploaded from the Office Store will update automatically within a few days of the latest update being available on the Office Store.
security Linux Support Offline Security Intelligence Update https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-offline-security-intelligence-update.md
Title: Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux
+ Title: Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux (preview)
description: Offline Security Intelligence Update in Microsoft Defender for Endpoint on Linux.
search.appverid: met150
Last updated 03/12/2024
-# Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux
+# Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux (preview)
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
Last updated 03/12/2024
This document describes the Offline Security Intelligence Update feature of Microsoft Defender for Endpoint on Linux.
+> [!IMPORTANT]
+> Information in this article relates to a prerelease product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+ This feature enables an organization to update the security intelligence (also referred to as definitions or signatures in this document) on Linux endpoints with limited or no exposure to the internet using a local hosting server (termed as *Mirror Server* in this document). Mirror Server is any server in the customer's environment that can connect to the Microsoft cloud to download the signatures. Other Linux endpoints pull the signatures from the Mirror Server at a predefined interval.
Fig. 2: Process flow diagram on the Linux endpoint for security intelligence upd
## Prerequisites - Defender for Endpoint version "101.24022.0001" or higher needs to be installed on the Linux endpoints.
- > [!NOTE]
- > This version of Defender for Endpoint on Linux will be rolled out to the Production ring soon.
- The Linux endpoints need to have connectivity to the Mirror Server. - The Mirror Server can be either an HTTP/ HTTPS server or a network share server. For example, an NFS Server. - The Mirror Server needs to have access to the following URLs:
security Before You Begin Defender Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/before-you-begin-defender-experts.md
- tier1 search.appverid: met150 Previously updated : 11/10/2023 Last updated : 04/05/2024 # Before you begin using Defender Experts for Hunting
To enable us to get started with this threat hunting service, we require the fol
- Microsoft Defender for Endpoint P2 must be licensed and enabled on eligible devices - Microsoft Defender Antivirus must be licensed and enabled in active mode on devices onboarded to Defender for Endpoint (required for endpoint detection and response capabilities)-- Microsoft Entra ID P1 must be licensed for all users and enabled (required for enabling secure service provider access) The following products are also eligible to get Defender Experts for Hunting coverage, and you must have their appropriate product licenses to get started with the service:
security Address Compromised Users Quickly https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/address-compromised-users-quickly.md
Last updated 06/09/2023 description: Learn how to speed up the process of detecting and addressing compromised user accounts with automated investigation and response capabilities in Microsoft Defender for Office 365 Plan 2.--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Advanced Delivery Policy Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/advanced-delivery-policy-configure.md
- tier3 description: Admins can learn how to use the advanced delivery policy in Exchange Online Protection (EOP) to identify messages that shouldn't be filtered in specific supported scenarios (third-party phishing simulations and messages delivered to security operations (SecOps) mailboxes.--+ Last updated 11/2/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Air About Office https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-about-office.md
description: See how automated investigation and response capabilities work in M
- air - seo-marvel-mar2020--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Air About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-about.md
description: Get started using automated investigation and response capabilities
- air - seo-marvel-mar2020--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Air Custom Reporting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-custom-reporting.md
description: Learn how to integrate automated investigation and response with a
Last updated 06/09/2023 - air--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Air Remediation Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-remediation-actions.md
description: "Learn about remediation actions following automated investigation
Last updated 06/09/2023 - air--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Air Report False Positives Negatives https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-report-false-positives-negatives.md
f1.keywords:
- NOCSH -+ Last updated 06/09/2023 ms.localizationpriority: medium
- autoir- appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Air Review Approve Pending Completed Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-review-approve-pending-completed-actions.md
- tier2 description: Learn about remediation actions in automated investigation and response capabilities in Microsoft Defender for Office 365 Plan 2.--+ Last updated 06/09/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Air User Automatic Feedback Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-user-automatic-feedback-response.md
Last updated 12/21/2023-+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Air View Investigation Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-view-investigation-results.md
- tier2 description: During and after an automated investigation in Microsoft 365, you can view the results and key findings. Last updated 06/09/2023--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Alert Policies Defender Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/alert-policies-defender-portal.md
ms.assetid:
- seo-marvel-apr2020 description: Admins can use the Alert policy page in the Microsoft Defender portal to view and create alert policies to trigger alerts when the specified actions occur.--+ search.appverid: met150 Last updated 10/9/2023 appliesto:
security Anti Malware Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-policies-configure.md
- tier2 description: Admins can learn how to view, create, modify, and remove anti-malware policies in Exchange Online Protection (EOP). --+ Last updated 11/2/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Malware Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-protection-about.md
- tier2 description: Admins can learn about anti-malware protection and anti-malware policies that protect against viruses, spyware, and ransomware in Exchange Online Protection (EOP). --+ Last updated 9/26/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Malware Protection For Spo Odfb Teams About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-protection-for-spo-odfb-teams-about.md
- tier2 description: Learn about how SharePoint Online detects viruses in files that users upload and prevents users from downloading or syncing the files. --+ Last updated 06/09/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Phishing From Email Address Validation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-from-email-address-validation.md
- tier2 description: Admins can learn how Exchange Online Protection (EOP) and Outlook.com enforce email address syntax to help prevent phishing. --+ Last updated 3/28/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Phishing Mdo Impersonation Insight https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-mdo-impersonation-insight.md
description: Admins use the impersonation insight in Microsoft Defender for Office 365 to view information about the senders and sender domains that are detected as impersonation attempts over the last week by anti-phishing policies. - seo-marvel-apr2020--+ Last updated 11/2/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Anti Phishing Policies About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-about.md
- seo-marvel-apr2020 description: Admins can learn about the anti-phishing policies that are available in Exchange Online Protection (EOP) and Microsoft Defender for Office 365.--+ search.appverid: met150 Previously updated : 3/7/2024 Last updated : 4/5/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
The relationship between spoof intelligence and whether sender DMARC policies ar
|&nbsp;|Honor DMARC policy On|Honor DMARC policy Off| ||||
-|**Spoof intelligence On**|Separate actions for implicit and explicit email authentication failures: <ul><li><u>Implicit failures</u>: Use the **If the message is detected as spoof by spoof intelligence** action in the anti-phishing policy.</li><li><u>Explicit failures</u>: <ul><li>DMARC policy `p=quarantine`: Use the **If the message is detected as spoof and DMARC policy is set as p=quarantine** action in the anti-phishing policy.</li><li>DMARC policy `p=reject`: Use the **If the message is detected as spoof and DMARC policy is set as p=reject** action in the anti-phishing policy.</li><li>DMARC policy `p=none` or other values: Use the **If the message is detected as spoof by spoof intelligence** action in the anti-phishing policy.</li></ul></li></ul>|The **If the message is detected as spoof by spoof intelligence** action in the anti-phishing policy is used for both implicit and explicit email authentication failures. Explicit email authentication failures ignore `p=quarantine`, `p=reject`, `p=none`, or other values in the DMARC policy.|
-|**Spoof intelligence Off**|Implicit email authentication checks aren't used. <br/><br/> Explicit email authentication failures: <ul><li>DMARC policy `p=quarantine`: Use the **If the message is detected as spoof and DMARC policy is set as p=quarantine** action in the anti-phishing policy.</li><li>DMARC policy `p=reject`: Use the **If the message is detected as spoof and DMARC policy is set as p=reject** action in the anti-phishing policy.</li><li>DMARC policy `p=none`: The message isn't identified as spoofing by Microsoft 365, but other protection features in the filtering stack are still able to act on the message.</li></ul>|Implicit email authentication checks aren't used. <br/><br/> Explicit email authentication failures: <ul><li>DMARC policy `p=quarantine`: Messages are quarantined.</li><li>DMARC policy `p=reject`: Messages are quarantined.</li><li>DMARC policy `p=none`: The message isn't identified as spoofing by Microsoft 365, but other protection features in the filtering stack are still able to act on the message.|
+|**Spoof intelligence On**|Separate actions for implicit and explicit email authentication failures: <ul><li><u>Implicit failures</u>: Use the **If the message is detected as spoof by spoof intelligence** action in the anti-phishing policy.</li><li><u>Explicit failures</u>: <ul><li>DMARC policy `p=quarantine`: Use the **If the message is detected as spoof and DMARC policy is set as p=quarantine** action in the anti-phishing policy.</li><li>DMARC policy `p=reject`: Use the **If the message is detected as spoof and DMARC policy is set as p=reject** action in the anti-phishing policy.</li><li>DMARC policy `p=none`: No action is applied by Microsoft 365, but other protection features in the filtering stack are still able to act on the message.</li></ul></li></ul>|The **If the message is detected as spoof by spoof intelligence** action in the anti-phishing policy is used for both implicit and explicit email authentication failures. Explicit email authentication failures ignore `p=quarantine`, `p=reject`, `p=none`, or other values in the DMARC policy.|
+|**Spoof intelligence Off**|Implicit email authentication checks aren't used. <br/><br/> Explicit email authentication failures: <ul><li>DMARC policy `p=quarantine`: Use the **If the message is detected as spoof and DMARC policy is set as p=quarantine** action in the anti-phishing policy.</li><li>DMARC policy `p=reject`: Use the **If the message is detected as spoof and DMARC policy is set as p=reject** action in the anti-phishing policy.</li><li>DMARC policy `p=none`: The message isn't identified as spoofing by Microsoft 365, but other protection features in the filtering stack are still able to act on the message.</li></ul>|Implicit email authentication checks aren't used. <br/><br/> Explicit email authentication failures: <ul><li>DMARC policy `p=quarantine`: Messages are quarantined.</li><li>DMARC policy `p=reject`: Messages are quarantined.</li><li>DMARC policy `p=none`: No action is applied by Microsoft 365, but other protection features in the filtering stack are still able to act on the message.|
> [!NOTE] > If the MX record for the Microsoft 365 domain points to a third-party service or device that sits in front of Microsoft 365, the **Honor DMARC policy** setting is applied only if [Enhanced Filtering for Connectors](/Exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) is enabled for the connector that receives inbound messages.
security Anti Phishing Policies Eop Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-eop-configure.md
- tier2 description: Admins can learn how to create, modify, and delete the anti-phishing policies that are available in Exchange Online Protection (EOP) organizations with or without Exchange Online mailboxes.--+ search.appverid: met150 Last updated 11/2/2023 appliesto:
security Anti Phishing Policies Mdo Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-mdo-configure.md
- tier2 description: Admins can learn how to create, modify, and delete the advanced anti-phishing policies that are available in organizations with Microsoft Defender for Office 365.--+ search.appverid: met150 Last updated 11/2/2023 appliesto:
security Anti Phishing Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-protection-about.md
- TopSMBIssues description: Admins can learn about the anti-phishing protection features in Exchange Online Protection (EOP) and Microsoft Defender for Office 365.--+ Last updated 7/5/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Phishing Protection Spoofing About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-protection-spoofing-about.md
- seo-marvel-apr2020 ms.localizationpriority: high description: Admins can learn about the anti-spoofing features that are available in Exchange Online Protection (EOP), which can help mitigate against phishing attacks from spoofed senders and domains.--+ Last updated 3/7/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Phishing Protection Tuning https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-protection-tuning.md
- tier2 - MET150 description: Admins can learn to identify the reasons why and how a phishing message got through in Microsoft 365, and what to do to prevent more phishing messages in the future.--+ Last updated 06/09/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Spam Backscatter About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-backscatter-about.md
- seo-marvel-apr2020 description: In this article, admins can about backscatter and how Microsoft Exchange Online Protection (EOP) tries to prevent it.--+ Last updated 6/22/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Spam Bulk Complaint Level Bcl About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-bulk-complaint-level-bcl-about.md
- m365-security - tier2 description: Admins can learn about bulk complaint level (BCL) values that are used in Exchange Online Protection (EOP).--+ Last updated 10/17/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Spam Policies Asf Settings About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-policies-asf-settings-about.md
- seo-marvel-apr2020 description: Admins can learn about the Advanced Spam Filter (ASF) settings that are available in anti-spam policies in Exchange Online Protection (EOP).--+ Last updated 06/09/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Spam Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-policies-configure.md
- m365-security description: Admins can learn how to view, create, modify, and delete anti-spam policies in Exchange Online Protection (EOP).--+ Last updated 1/2/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Spam Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-protection-about.md
- seo-marvel-apr2020 description: Admins can learn about the anti-spam settings and filters that help prevent spam in Exchange Online Protection (EOP).--+ Last updated 10/18/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Spam Spam Confidence Level Scl About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-spam-confidence-level-scl-about.md
- seo-marvel-apr2020 description: Admins can learn about the spam confidence level (SCL) that applied to messages in Exchange Online Protection (EOP).--+ Last updated 11/3/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Spam Spam Vs Bulk About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-spam-vs-bulk-about.md
- seo-marvel-apr2020 description: Admins can learn about the differences between junk email (spam) and bulk email (gray mail) in Exchange Online Protection (EOP).--+ Last updated 9/25/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Anti Spoofing Spoof Intelligence https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spoofing-spoof-intelligence.md
- seo-marvel-apr2020 description: Admins can learn about the spoof intelligence insight in Exchange Online Protection (EOP).--+ Last updated 11/2/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security App Guard For Office Install https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/app-guard-for-office-install.md
- m365-security - tier3 description: Get the latest in hardware-based isolation. Prevent current and emerging attacks like exploits or malicious links from disrupting employee productivity and enterprise security.--+ Last updated 11/27/2023
security Attack Simulation Training End User Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-end-user-notifications.md
audience: ITPro -+ ms.localizationpriority: medium - m365-security - tier2 description: Admins can learn how to create end-user notification email messages for Attack simulation training in Microsoft Defender for Office 365 Plan 2.- search.appverid: met150 Last updated 3/11/2024 appliesto:
security Attack Simulation Training Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-faq.md
- seo-marvel-apr2020 description: Admins can learn about deployment considerations and frequently asked questions regarding Attack simulation and training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations.--+ Last updated 6/22/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Attack Simulation Training Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-get-started.md
- seo-marvel-apr2020 description: Admins can learn how to use Attack simulation training to run simulated phishing and password attacks in their Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations.--+ Last updated 3/21/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Attack Simulation Training Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-insights.md
audience: ITPro -+ ms.localizationpriority: medium - m365-security - tier2 description: Admins can learn how Attack simulation training in the Microsoft Defender portal affects users and can gain insights from simulation and training outcomes.- search.appverid: met150 Last updated 3/14/2024 appliesto:
security Attack Simulation Training Landing Pages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-landing-pages.md
audience: ITPro -+ ms.localizationpriority: medium - m365-security - tier2 description: Admins can learn how to create and manage landing pages for simulated phishing attacks in Microsoft Defender for Office 365 Plan 2.- search.appverid: met150 Last updated 6/22/2023 appliesto:
security Attack Simulation Training Login Pages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-login-pages.md
audience: ITPro -+ ms.localizationpriority: medium - m365-security - tier2 description: Admins can learn how to create and manage login pages for simulated phishing attacks in Microsoft Defender for Office 365 Plan 2.- search.appverid: met150 Last updated 3/11/2024 appliesto:
security Attack Simulation Training Payload Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-payload-automations.md
audience: ITPro -+ ms.localizationpriority: medium - m365-security - tier2 description: Admins can learn how to use payload automations (payload harvesting) to collect and launch automated simulations for Attack simulation training in Microsoft Defender for Office 365 Plan 2.- search.appverid: met150 Last updated 3/14/2024 appliesto:
security Attack Simulation Training Payloads https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-payloads.md
audience: ITPro -+ ms.localizationpriority: medium - m365-security - tier2 description: Admins can learn how to create and manage payloads for Attack simulation training in Microsoft Defender for Office 365 Plan 2.- search.appverid: met150 Last updated 3/11/2024 appliesto:
security Attack Simulation Training Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-settings.md
audience: ITPro -+ ms.localizationpriority: medium - m365-security - tier2 description: Admins can learn how to configure global settings in Attack simulation training in Microsoft Defender for Office 365 Plan 2.- search.appverid: met150 Last updated 6/14/2023 appliesto:
security Attack Simulation Training Simulation Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations.md
audience: ITPro -+ ms.localizationpriority: medium - m365-security - tier2 description: Admins can learn how to create automated simulations that contain specific techniques and payloads that launch when the specified conditions are met in Microsoft Defender for Office 365 Plan 2.- search.appverid: met150 Last updated 3/14/2024 appliesto:
security Attack Simulation Training Simulations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-simulations.md
audience: ITPro -+ ms.localizationpriority: medium - m365-security - tier2 description: Admins can learn how to simulate phishing attacks and train their users on phishing prevention using Attack simulation training in Microsoft Defender for Office 365 Plan 2.- search.appverid: met150 Last updated 3/15/2024 appliesto:
security Attack Simulation Training Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-teams.md
audience: ITPro -+ ms.localizationpriority: medium - m365-security - tier2 description: Admins can learn about the addition of Microsoft Teams in delivering simulated phishing attacks in Attack simulation training in Microsoft Defender for Office 365 Plan 2.- search.appverid: met150 Last updated 3/15/2024 appliesto:
security Attack Simulation Training Training Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-training-campaigns.md
audience: ITPro -+ ms.localizationpriority: medium - m365-security - tier2 description: Admins can learn how to create training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2.- search.appverid: met150 Last updated 3/11/2024 appliesto:
security Attack Simulation Training Training Modules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-training-modules.md
audience: ITPro -+ ms.localizationpriority: medium - m365-security - tier2 description: Admins can learn about the Training modules that are available to use in Training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2.- search.appverid: met150 Last updated 3/11/2024 appliesto:
security Audit Log Search Defender Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/audit-log-search-defender-portal.md
ms.assetid:
- seo-marvel-apr2020 description: Admins can use the Audit page in the Microsoft Defender portal to search the unified audit log for user and admin actions in the organization.--+ search.appverid: met150 Last updated 10/9/2023 appliesto:
security Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/campaigns.md
- tier1 description: Learn about Campaigns in Microsoft Defender for Office 365.--+ Last updated 2/20/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Configuration Analyzer For Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/configuration-analyzer-for-security-policies.md
- tier1 description: Admins can learn how to use the configuration analyzer to find and fix security policies that are less secure than Standard protection and Strict protection in preset security policies.--+ Last updated 1/29/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Configure Junk Email Settings On Exo Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/configure-junk-email-settings-on-exo-mailboxes.md
- m365-security - tier2 description: Admins can learn how to configure the junk email settings in Exchange Online mailboxes. Many of these settings are available to users in Outlook or Outlook on the web.--+ Last updated 11/28/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Connection Filter Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connection-filter-policies-configure.md
- seo-marvel-apr2020 description: Admins can learn how to configure connection filtering in Exchange Online Protection (EOP) to allow or block emails from email servers.--+ Last updated 11/2/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Connectors Detect Respond To Compromise https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connectors-detect-respond-to-compromise.md
- tier2 description: Learn how to recognize and respond to a compromised connector in Microsoft 365.--+ search.appverid: met150 Last updated 6/14/2023 appliesto:
security Connectors Mail Flow Intelligence https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connectors-mail-flow-intelligence.md
search.appverid:
- MET150 ms.assetid: c29f75e5-c16e-409e-a123-430691e38276 description: Admins can learn about the error codes that are associated with message delivery using connectors (also known as mail flow intelligence).--+ - m365-security - tier2
security Connectors Remove Blocked https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connectors-remove-blocked.md
- tier2 description: Admins can learn how to remove connectors from the Restricted entities page in the Microsoft Defender portal. Connectors are added to the Restricted entities page after signs of compromise.--+ search.appverid: met150 Last updated 6/14/2023 appliesto:
security Create Block Sender Lists In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/create-block-sender-lists-in-office-365.md
ms.localizationpriority: medium
search.appverid: - MET150s description: Admins can learn about the available and preferred options to block inbound messages in Exchange Online Protection (EOP).--+ Last updated 6/14/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Create Safe Sender Lists In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/create-safe-sender-lists-in-office-365.md
ms.assetid: 9721b46d-cbea-4121-be51-542395e6fd21
- seo-marvel-apr2020 description: Admins can learn about the available and preferred options to allow inbound messages in Exchange Online Protection (EOP).--+ Last updated 6/14/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Defender For Office 365 Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/defender-for-office-365-whats-new.md
--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Detect And Remediate Illicit Consent Grants https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/detect-and-remediate-illicit-consent-grants.md
- seo-marvel-apr2020 - has-azure-ad-ps-ref - azure-ad-ref-level-one-done--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Detect And Remediate Outlook Rules Forms Attack https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/detect-and-remediate-outlook-rules-forms-attack.md
search.appverid:
- MET150 description: Learn how to recognize and remediate the Outlook rules and custom forms injections attacks in Office 365 --+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Email Analysis Investigations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-analysis-investigations.md
description: See how email analysis in investigations work in Microsoft Defender
- air - seo-marvel-mar2020--+ Last updated 6/15/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Email Authentication About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-about.md
ms.localizationpriority: high description: Admins can learn how email authentication (SPF, DKIM, DMARC) works and how Microsoft 365 uses traditional email authentication and composite email authentication to identify messages as spoofing, or pass messages that would otherwise be identified as spoofing.--+ Last updated 3/7/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Email Authentication Arc Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-arc-configure.md
- seo-marvel-apr2020 description: Authenticated Received Chain (ARC) is an email authentication method that tries to preserve authentication results across devices and any message modification that occurs between the sender and recipient.--+ Last updated 1/29/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Email Authentication Dkim Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-dkim-configure.md
- seo-marvel-apr2020 description: Learn how Microsoft 365 uses DomainKeys Identified Mail (DKIM) to sign outbound mail, and how to configure DKIM signing of outbound mail using custom domains.--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Email Authentication Dmarc Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-dmarc-configure.md
- m365-security - tier1 description: Learn how to configure Domain-based Message Authentication, Reporting, and Conformance (DMARC) to validate messages sent from your organization.--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Email Authentication Spf Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-spf-configure.md
- seo-marvel-apr2020 description: Learn how to update a Domain Name Service (DNS) record to use Sender Policy Framework (SPF) with your custom domain in Office 365.--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Eop About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/eop-about.md
ms.assetid: 1270a65f-ddc3-4430-b500-4d3a481efb1e
- seo-marvel-apr2020 description: Learn how Exchange Online Protection (EOP) can help protect your on-premises email organization in standalone and hybrid environments.--+ search.appverid: met150 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security External Senders Mail Flow Troubleshooting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/external-senders-mail-flow-troubleshooting.md
- seo-marvel-apr2020 description: This article provides troubleshooting information for issues with sending email to inboxes in Microsoft 365 & best practices for bulk mailing to Microsoft 365 customers.--+ Last updated 6/15/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security External Senders Microsoft 365 Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/external-senders-microsoft-365-services.md
- m365-security - tier2 description: To help maintain user trust in the use of email, Microsoft has put in place various policies and technologies to help protect our users.--+ Last updated 10/9/2023
Third parties occasionally violate our terms of use and use Microsoft 365 to sen
## Legal stuff you need to know
-The following article explains how external organizations can avoid having their email blocked by adhering to our anti-spam rules, and contains legal stuff that you need to know: [External senders - Policies, practices, and guidelines](external-senders-policies-practices-guidelines.md).
+The following article explains how external organizations can avoid having their email blocked by adhering to our anti-spam rules, and contains legal stuff that you need to know: [External senders - Policies, practices, and guidelines](external-senders-policies-practices-guidelines.md).
security External Senders Policies Practices Guidelines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/external-senders-policies-practices-guidelines.md
- m365-security - tier2 description: Microsoft has developed various policies, procedures, and adopted several industry best practices to help protect our users from abusive, unwanted, or malicious email.--+ Last updated 6/22/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security External Senders Use The Delist Portal To Unblock Yourself https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/external-senders-use-the-delist-portal-to-unblock-yourself.md
- seo-marvel-apr2020 description: In this article, you learn how to use the delist portal to remove yourself from the Microsoft 365 blocked senders list. This action is the best response to address 5.7.511 Access denied errors.--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security How Policies And Protections Are Combined https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/how-policies-and-protections-are-combined.md
- seo-marvel-apr2020 description: Admins can learn how the order of protection settings and the priority order of security policies affect the application of security policies in Microsoft 365.--+ search.appverid: met150 Last updated 10/20/2023 appliesto:
security Mail Flow About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mail-flow-about.md
ms.assetid: e109077e-cc85-4c19-ae40-d218ac7d0548
- seo-marvel-apr2020 description: Admin can learn about the options for configuring mail flow and routing in Exchange Online Protection (EOP).--+ - m365-security - tier3
security Mdo About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-about.md
- intro-overview - curated-apr-2023 description: Is Microsoft Defender for Office 365 worth it? Let's find out.--+ adobe-target: true Last updated 4/1/2024 appliesto:
security Mdo Data Retention https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-data-retention.md
Last updated 6/15/2023 audience: ITPro --+ ms.localizationpriority: medium - m365-security
security Mdo Deployment Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-deployment-guide.md
- essentials-get-started description: Learn how to get started with the initial deployment and configuration of Microsoft Defender for Office 365.--+ Last updated 01/31/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Mdo Email Entity Page https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-email-entity-page.md
Last updated 2/22/2024 audience: ITPro --+ ms.localizationpriority: medium - m365-security
security Mdo Portal Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-portal-permissions.md
search.appverid:
description: Admins can learn how to manage Microsoft Defender for Office 365 (Email & collaboration) permissions in the Microsoft Defender portal. - seo-marvel-apr2020--+ Last updated 6/15/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Mdo Sec Ops Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-guide.md
- essentials-manage description: A prescriptive playbook for SecOps personnel to manage Microsoft Defender for Office 365.--+ Last updated 01/19/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Mdo Sec Ops Manage Incidents And Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-manage-incidents-and-alerts.md
- tier1 description: SecOps personnel can learn how to use the Incidents queue in Microsoft Defender XDR to manage incidents in Microsoft Defender for Office 365.--+ Last updated 6/15/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Mdo Support Teams About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-support-teams-about.md
- m365-security - tier1 description: Admins can learn about Microsoft Teams features in Microsoft Defender for Office 365 Plan 2.--+ Last updated 10/17/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Mdo Usage Card About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-usage-card-about.md
- tier2 description: Learn about your organization's active usage of Microsoft Defender for Office 365 licenses versus the actual number of licenses purchased.--+ Last updated 1/17/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Message Headers Eop Mdo https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/message-headers-eop-mdo.md
- tier2 description: Admins can learn about the header fields that are added to messages by Exchange Online Protection (EOP). These header fields provide information about the message and how it was processed. --+ Last updated 9/8/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Message Trace Defender Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/message-trace-defender-portal.md
ms.assetid: 3e64f99d-ac33-4aba-91c5-9cb4ca476803
- seo-marvel-apr2020 description: Admins can use the Message trace link in the Microsoft Defender portal to find out what happened to messages.--+ search.appverid: met150 Last updated 10/9/2023 appliesto:
security Migrate To Defender For Office 365 Onboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-onboard.md
- tier1 description: "Complete the steps for migrating from a third-party protection service or device to Microsoft Defender for Office 365 protection."--+ Last updated 6/15/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Migrate To Defender For Office 365 Prepare https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-prepare.md
- tier1 description: "Prerequisite steps for migrating from a third-party protection service or device to Microsoft Defender for Office 365 protection."--+ Last updated 6/15/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Migrate To Defender For Office 365 Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-setup.md
- tier1 description: "Take the steps to begin migrating from a third-party protection service or device to Microsoft Defender for Office 365 protection."--+ Last updated 6/15/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Migrate To Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365.md
- tier1 description: Learn the right way to migrate from third-party protection services or devices to Microsoft Defender for Office 365. For example, Google Postini, the Barracuda Spam and Virus Firewall, or Cisco IronPort.--+ Last updated 6/15/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 PlanPlan 2</a>
security Office 365 Ti https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/office-365-ti.md
- seo-marvel-apr2020 description: Learn about threat investigation and response capabilities in Microsoft Defender for Office 365 Plan.--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Outbound Spam High Risk Delivery Pool About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-high-risk-delivery-pool-about.md
- m365-security - tier2 description: Learn how the delivery pools are used to protect the reputation of email servers in the Microsoft 365 datacenters.--+ Last updated 11/3/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Outbound Spam Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-policies-configure.md
- seo-marvel-apr2020 description: Admins can learn how to view, create, modify, and delete outbound spam policies in Exchange Online Protection (EOP).--+ Last updated 11/2/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Outbound Spam Policies External Email Forwarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-policies-external-email-forwarding.md
- seo-marvel-apr2020 - adminvideo description: This article covers topics including external email forwarding, Automatic forwarding, 5.7.520 Access Denied messages, disabling external forwarding, 'Your administrator has disabled external forwarding' messages, as well as outbound anti-spam policy.--+ search.appverid: met150 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Outbound Spam Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-protection-about.md
- seo-marvel-apr2020 description: Admins can learn about the outbound spam controls in Exchange Online Protection (EOP), and what to do if you need to send mass mailings.--+ Last updated 1/29/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Outbound Spam Restore Restricted Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-restore-restricted-users.md
description: Admins can learn how to remove user accounts from the Restricted entities page in the Microsoft Defender portal. Users are added to the Restricted entities page for sending outbound spam, typically as a result of account compromise. - seo-marvel-apr2020--+ Last updated 11/2/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Pim In Mdo Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/pim-in-mdo-configure.md
- seo-marvel-apr2020 description: Learn to integrate Azure PIM in order to grant just-in-time, time limited access to users to do elevated privilege tasks in Microsoft Defender for Office 365, lowering risk to your data.--+ # Privileged Identity Management (PIM) and why to use it with Microsoft Defender for Office 365
security Preset Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/preset-security-policies.md
- tier1 description: Admins can learn how to apply Standard and Strict policy settings across the protection features of Exchange Online Protection (EOP) and Microsoft Defender for Office 365--+ search.appverid: met150 Last updated 11/2/2023 appliesto:
security Priority Accounts Security Recommendations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/priority-accounts-security-recommendations.md
- tier1 description: Admins can learn how to elevate the security settings and use reports, alerts, and investigations for priority accounts in their Microsoft 365 organizations.--+ Last updated 7/31/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Priority Accounts Turn On Priority Account Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/priority-accounts-turn-on-priority-account-protection.md
- tier1 description: Admins can learn how to turn on priority account protection in Microsoft Defender for Office 365 Plan 2 organizations.--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Protection Stack Microsoft Defender For Office365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/protection-stack-microsoft-defender-for-office365.md
audience: ITPro
ms.localizationpriority: medium description: Follow the path of an incoming message through the threat filtering stack in Microsoft Defender for Office 365.--+ - m365-security - tier2
security Quarantine About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-about.md
- seo-marvel-apr2020 description: Admins can learn about quarantine in Exchange Online Protection (EOP) that holds potentially dangerous or unwanted messages.--+ Last updated 1/17/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Quarantine Admin Manage Messages Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-admin-manage-messages-files.md
- seo-marvel-apr2020 description: Admins can learn how to view and manage quarantined messages for all users in Exchange Online Protection (EOP). Admins in organizations with Microsoft Defender for Office 365 can also manage quarantined files in SharePoint Online, OneDrive for Business, and Microsoft Teams.--+ Last updated 11/2/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Quarantine End User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-end-user.md
- seo-marvel-apr2020 description: Users can learn how to view and manage quarantined messages in Exchange Online Protection (EOP) that should have been delivered to them.--+ adobe-target: true Last updated 8/2/2023 appliesto:
security Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-policies.md
- tier1 description: Admins can learn how to use quarantine policies to control what users are able to do to quarantined messages.--+ Last updated 11/16/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Quarantine Quarantine Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-quarantine-notifications.md
- seo-marvel-apr2020 description: Admins can learn about end-user spam notifications for quarantined messages in Exchange Online Protection (EOP).--+ Last updated 12/11/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Quarantine Shared Mailbox Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-shared-mailbox-messages.md
- m365-security - tier1 description: Users can learn how to view and act on quarantined messages that were sent to shared mailboxes that they have permissions to.--+ Last updated 7/24/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Recommended Settings For Eop And Office365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365.md
- highpri - tier1 description: What are best practices for Exchange Online Protection (EOP) and Defender for Office 365 security settings? What's the current recommendations for standard protection? What should be used if you want to be more strict? And what extras do you get if you also use Defender for Office 365?--+ Last updated 3/19/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Remediate Malicious Email Delivered Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/remediate-malicious-email-delivered-office-365.md
f1.keywords:
ms.localizationpriority: medium search.appverid: MET150 description: Threat remediation--+ Last updated 1/16/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Reports Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/reports-defender-for-office-365.md
description: Admins can learn how to find and use the Defender for Office 365 reports that are available in the Microsoft Defender portal. - seo-marvel-apr2020--+ Last updated 3/7/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Reports Email Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/reports-email-security.md
description: "Admins can learn how to find and use the email security reports that are available in the Microsoft Defender portal. This article helps answer the question, 'What is the Threat protection status report in EOP and Microsoft Defender for Office 365?'" - seo-marvel-apr2020--+ Last updated 3/7/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Responding To A Compromised Email Account https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account.md
ms.localizationpriority: high
search.appverid: - MET150 description: Learn how to recognize and respond to a compromised email account using tools available in Microsoft 365.--+ Last updated 6/19/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Safe Attachments About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-about.md
- m365-security - tier1 description: Admins can learn about the Safe Attachments feature in Microsoft Defender for Office 365.--+ Last updated 6/19/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Safe Attachments For Spo Odfb Teams About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-about.md
- seo-marvel-apr2020 - seo-marvel-jun2020 description: Learn about Microsoft Defender for Office 365 for files in SharePoint Online, OneDrive for Business, and Microsoft Teams.--+ Last updated 6/19/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
When a file is identified as malicious by Safe Attachments for SharePoint, OneDr
- Make sure your SharePoint sites are configured to use the [Modern experience](/sharepoint/guide-to-sharepoint-modern-experience). Visual indicators that a file is blocked are available only in the Modern experience. -- Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is part of your organization's overall threat protection strategy, which includes anti-spam and anti-malware protection in Exchange Online Protection (EOP), as well as Safe Links and Safe Attachments protection in Microsoft Defender for Office 365.
+- Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is part of your organization's overall threat protection strategy, which includes anti-spam and anti-malware protection in Exchange Online Protection (EOP), as well as Safe Links and Safe Attachments protection in Microsoft Defender for Office 365.
security Safe Attachments For Spo Odfb Teams Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-configure.md
description: Admins can learn how to turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams, including how to set alerts for detected files. - seo-marvel-apr2020--+ Last updated 6/19/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Safe Attachments Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-policies-configure.md
- tier2 description: Learn about how to define Safe Attachments policies to protect your organization from malicious files in email. --+ Last updated 11/2/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Safe Documents In E5 Plus Security About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-documents-in-e5-plus-security-about.md
- m365-security - tier1 description: Learn about Safe Documents in Microsoft 365 A5 or E5 Security.--+ Last updated 10/13/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Safe Links About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-about.md
search.appverid:
- ZWD160 ms.assetid: dd6a1fef-ec4a-4cf4-a25a-bb591c5811e3 description: Learn about Safe Links protection in Defender for Office 365 to protect an organization from phishing and other attacks that use malicious URLs. Discover Teams Safe Links, and see graphics of Safe Links messages.--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Safe Links Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-policies-configure.md
- tier1 description: Admins can learn how to view, create, modify, and delete Safe Links policies in Microsoft Defender for Office 365.--+ Last updated 11/2/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Scc Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/scc-permissions.md
search.appverid:
description: Admins can learn about the roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview. - seo-marvel-apr2020--+ Last updated 11/14/2023
security Secure By Default https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/secure-by-default.md
- tier2 - essentials-security description: Learn more about the secure by default setting in Exchange Online Protection (EOP)--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Siem Integration With Office 365 Ti https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/siem-integration-with-office-365-ti.md
- tier2 description: Integrate your organization's SIEM server with Microsoft Defender for Office 365 and related threat events in the Office 365 Activity Management API. --+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Siem Server Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/siem-server-integration.md
- SIEM - seo-marvel-apr2020 description: Get an overview of Security Information and Event Management (SIEM) server integration with your Microsoft 365 cloud services and applications.--+ search.appverid: met150 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Assess The Impact Of Security Configuration Changes With Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/assess-the-impact-of-security-configuration-changes-with-explorer.md
Title: Assess the impact of security configuration changes with Explorer description: Examples and walk-through of using Explorer to determine the impact of a security control (configuration) change in Microsoft Defender for Office 365.--+ f1.keywords: - NOCSH
security Connect Microsoft Defender For Office 365 To Microsoft Sentinel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/connect-microsoft-defender-for-office-365-to-microsoft-sentinel.md
Title: Connect Microsoft Defender for Office 365 to Microsoft Sentinel description: The steps to connect Microsoft Defender for Office 365 to Sentinel. Add your Microsoft Defender for Office 365 data (*and* data from the rest of the Microsoft Defender XDR suite), including incidents, to Microsoft Sentinel for a single pane of glass into your security.--+ f1.keywords: - NOCSH
security Defense In Depth Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/defense-in-depth-guide.md
Title: Getting started with defense in-depth configuration for email security description: Step-by-step configuration guidance on how to get security value from Microsoft Defender for Office 365 when you have third party email filtering.--+ f1.keywords: - NOCSH
security Deploy And Configure The Report Message Add In https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/deploy-and-configure-the-report-message-add-in.md
Title: How-to deploy and configure the report message add-in description: The steps to deploy and configure Microsoft's phish reporting add-ins aimed at security administrators.--+ f1.keywords: - NOCSH
security Ensuring You Always Have The Optimal Security Controls With Preset Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/ensuring-you-always-have-the-optimal-security-controls-with-preset-security-policies.md
Title: Steps to set up the Standard or Strict preset security policies for Microsoft Defender for Office 365 description: Step to set up preset security policies in Microsoft Defender for Office 365 so you have the security recommended by the product. Preset policies set a security profile of either *Standard* or *Strict*. Set these and Microsoft Defender for Office 365 will manage and maintain these security controls for you.-
- - NOCSH
+
+f1.keywords:
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 8/21/2023
security How To Configure Quarantine Permissions With Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-configure-quarantine-permissions-with-quarantine-policies.md
Title: How to configure quarantine permissions and policies description: The steps to configure quarantine policies and permissions across different groups, including AdminOnlyPolicy, limited access, full access, and providing security admins and users with a simple way to manage false positive folders.-
- - NOCSH
+
+f1.keywords:
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security How To Enable Dmarc Reporting For Microsoft Online Email Routing Address Moera And Parked Domains https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-enable-dmarc-reporting-for-microsoft-online-email-routing-address-moera-and-parked-domains.md
Title: How to enable DMARC Reporting for Microsoft Online Email Routing Address (MOERA) and parked Domains description: The steps to configure DMARC for MOERA and parked domains.-
- - NOCSH
+
+f1.keywords:
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security How To Handle False Negatives In Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365.md
Title: (False Negatives) How to handle malicious emails that are delivered to recipients using Microsoft Defender for Office 365 description: The steps to handle malicious emails coming through to end users and inboxes (as False Negatives) with Microsoft Defender for Office 365 in order to prevent loss of business.-
- - NOCSH
+
+f1.keywords:
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security How To Handle False Positives In Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365.md
Title: (False Positives) How to handle legitimate emails getting blocked from delivery using Microsoft Defender for Office 365 description: The steps to handle legitimate email getting blocked(False Positive) by Microsoft Defender for Office 365 in order to prevent lose of business.-+ f1.keywords:
- - NOCSH
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security How To Prioritize And Manage Automated Investigations And Response Air https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-prioritize-and-manage-automated-investigations-and-response-air.md
Title: How to prioritize and manage Automated Investigations and Response (AIR). description: How to steps to analyze and approve AIR actions directly from the Action Center. When alerts are triggered, Automated Investigation and Response (AIR) determines the scope of impact of a threat in your organization and provided recommended remediation actions.-+ f1.keywords:
- - NOCSH
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 04/04/2024
security How To Prioritize Manage Investigate And Respond To Incidents In Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-prioritize-manage-investigate-and-respond-to-incidents-in-microsoft-365-defender.md
Title: How to prioritize, Manage, Investigate & Respond to Incidents in Microsoft Defender XDR description: The steps to manage alerts triggered in Microsoft Defender XDR. Automated investigation and response (AIR) hunt across the subscription and determines the impact and scope of a threat, and combines the information into a single Incident.-
- - NOCSH
+
+f1.keywords:
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security How To Run Attack Simulations For Your Team https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-run-attack-simulations-for-your-team.md
Title: How to run attack simulations for your team description: The steps to send an Attack Simulation payload to your target users for your team or organization for training. Simulated attacks can help you identify and find vulnerable users, policies, and practices before a real attack impacts your organization.-+ f1.keywords: - NOCSH
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security How To Setup Attack Simulation Training For Automated Attacks And Training https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-setup-attack-simulation-training-for-automated-attacks-and-training.md
Title: How to setup automated attacks and training within Attack simulation training description: The steps to automate Attack Simulation training and send a payload to target users. By following this guide, you learn to create automated attack flows with specific techniques and payloads.-
- - NOCSH
+
+f1.keywords:
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security Optimize And Correct Security Policies With Configuration Analyzer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/optimize-and-correct-security-policies-with-configuration-analyzer.md
Title: Optimize and correct security policies with configuration analyzer description: The steps to optimize and correct security policies with configuration analyzer. Configuration analyzer is a central location and single pane of glass for administering and viewing the email security policies you have configured in your tenant.-
- - NOCSH
+ ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security Protect Your C Suite With Priority Account Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/protect-your-c-suite-with-priority-account-protection.md
Title: Protect your c-suite with Priority account protection in Microsoft Defender for Office 365 Plan 2 description: The steps to protect your c-suite with priority account protection. Tagging an account as a Priority account enables the extra protection tuned for the mail flow patterns targeting company executives, along with extra visibility in reports, alerts, and investigations.-+ f1.keywords:
- - NOCSH
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security Reducing Attack Surface In Microsoft Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/reducing-attack-surface-in-microsoft-teams.md
Title: Reduce the attack surface for Microsoft Teams description: Configuration which can be used to reduce the attack surface in Microsoft Teams, including enabling Microsoft Defender for Office 365.-
- - NOCSH
+ ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/05/2023
security Review Allow Entries https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/review-allow-entries.md
Title: Review and remove unnecessary allowlist entries with Advanced Hunting in Microsoft Defender for Office 365 description: Steps and sample queries for advanced hunting to start reviewing your security configuration and removing unnecessary allowlist entries.-
- - NOCSH
+
+f1.keywords:
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/04/2023
security Search For Emails And Remediate Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/search-for-emails-and-remediate-threats.md
Title: Search for emails and remediate threats using Threat Explorer in Microsoft Defender XDR description: The steps to do manual remediation in Threat Explorer in Microsoft Defender XDR, including how to get the best performance and scenarios that call for remediation.-
- - NOCSH
+
+f1.keywords:
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security Stay Informed With Message Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/stay-informed-with-message-center.md
Title: Steps to set up a weekly digest email of message center changes for Microsoft Defender for Office 365 description: The steps to set up a weekly digest email of message center activity to stay up-to-date about changes to Microsoft Defender for Office 365.-
- - NOCSH
+
+f1.keywords:
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security Step By Step Guide Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/step-by-step-guide-overview.md
Title: Microsoft Defender for Office 365 step-by-step guides and how to use them description: What are the step-by-step-guides for Microsoft Defender XDR for Office 365? See *only the steps needed to complete a task* and set up features. Information for use in trial subscriptions and production. Guidance designed to minimize information overload and speed up your configuration and use.-
- - NOCSH
+
+f1.keywords:
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 04/04/2024
security Track And Respond To Emerging Threats With Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/track-and-respond-to-emerging-threats-with-campaigns.md
Title: Track and respond to emerging security threats with campaigns view in Microsoft Defender for Office 365 description: Walkthrough of threat campaigns within Microsoft Defender for Office 365 to demonstrate how they can be used to investigate a coordinated email attack against your organization.-+ f1.keywords:
- - NOCSH
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security Tune Bulk Mail Filtering Walkthrough https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/tune-bulk-mail-filtering-walkthrough.md
Title: Assess and tune your filtering for bulk mail in Defender for Office 365 description: Tune bulk filtering settings within Exchange Online and Microsoft Defender for Office 365--+ f1.keywords: - NOCSH
security Understand Detection Technology In Email Entity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/understand-detection-technology-in-email-entity.md
Last updated 07/03/2023 audience: ITPro- - m365-guidance-templates - m365-security
security Understand Overrides In Email Entity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/understand-overrides-in-email-entity.md
description: Shows the different overrides in the email entity page in Microsoft
-+ audience: ITPro- - m365-guidance-templates - m365-security
security Utilize Microsoft Defender For Office 365 In Sharepoint Online https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/utilize-microsoft-defender-for-office-365-in-sharepoint-online.md
Title: Use Microsoft Defender for Office 365 in SharePoint Online description: The steps to ensure that you can use, and get the value from, Microsoft Defender for Office 365 in SharePoint Online and OneDrive.-+ f1.keywords:
- - NOCSH
+ - NOCSH
ms.localizationpriority: medium
- m365-security - tier3 - search.appverid: met150 Last updated 01/31/2023
security Submissions Admin Review User Reported Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-admin-review-user-reported-messages.md
- tier2 description: Admins can learn how to review messages that were reported by users and give them feedback.--+ search.appverid: met150 Last updated 6/20/2023 appliesto:
security Submissions Admin https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-admin.md
- tier1 description: "Admins can learn how to use the Submissions page in the Microsoft Defender portal to submit messages, URLs, and email attachments to Microsoft for analysis. Reasons for submission include: legitimate messages that were blocked, suspicious messages that were allowed, suspected phishing email, spam, malware, and other potentially harmful messages."--+ Last updated 8/7/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Submissions Error Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-error-messages.md
- m365-security - tier1 description: Learn about the errors that admins might encounter when they try to report email, URLs, and email attachments to Microsoft as false positives and false negatives.--+ search.appverid: met150 Last updated 6/20/2023 appliesto:
security Submissions Outlook Report Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-outlook-report-messages.md
- m365-security - tier1 description: Learn how to report phishing and suspicious emails in Outlook using the built-in Report button or the Report Message and Report Phishing add-ins.--+ search.appverid: met150 Last updated 11/9/2023 appliesto:
security Submissions Report Messages Files To Microsoft https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-report-messages-files-to-microsoft.md
- m365-security - tier1 description: How do I report a suspicious email or file to Microsoft? Report messages, URLs, email attachments and files to Microsoft for analysis. Learn to report spam email and phishing emails.--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Submissions Submit Files To Microsoft https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-submit-files-to-microsoft.md
- m365-security - tier1 description: Admins and end-users can learn about submitting undetected malware or mis-identified malware attachments to Microsoft for analysis.--+ Last updated 6/20/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Submissions Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-teams.md
- tier1 description: "Admins can configure whether users can report malicious message in Microsoft Teams."--+ Last updated 3/19/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Submissions User Reported Messages Custom Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-user-reported-messages-custom-mailbox.md
- tier1 description: "Admins can configure where user reported messages go for analysis: to an internal reporting mailbox, to Microsoft, or both. Other settings complete the reporting experience for users when they report good messages, spam, or phishing messages from Outlook."--+ Last updated 3/19/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Submissions Users Report Message Add In Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-users-report-message-add-in-configure.md
- m365-security - tier2 description: Learn how to enable the Report Message or the Report Phishing add-ins for Outlook and Outlook on the web, for individual users, or for your entire organization.--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Teams Message Entity Panel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/teams-message-entity-panel.md
- tier1 - highpri description: Describes the Teams Message Entity Panel for Microsoft Teams in Microsoft Defender for Office 365, how it does post-breach work like ZAP and Safe Links and gives admins a single pane of glass on Teams chat and channel threats like suspicious URLs.--+ Last updated 11/16/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Tenant Allow Block List About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-about.md
- tier1 description: Learn how to manage allow entries and block entries in the Tenant Allow/Block List in the Security portal.--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Tenant Allow Block List Email Spoof Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-email-spoof-configure.md
- m365-security - tier1 description: Admins can learn how to allow or block email and spoofed sender entries in the Tenant Allow/Block List.--+ Last updated 11/27/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Tenant Allow Block List Files Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-files-configure.md
- m365-security - tier1 description: Admins can learn how to allow or block files in the Tenant Allow/Block List.--+ Last updated 11/2/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Tenant Allow Block List Urls Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-urls-configure.md
- m365-security - tier1 description: Admins can learn how to allow or block URLs in the Tenant Allow/Block List.--+ Last updated 11/2/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Tenant Wide Setup For Increased Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-wide-setup-for-increased-security.md
- seo-marvel-apr2020 - admindeeplinkSPO description: Manual configurations for Exchange Online Protection, Microsoft Defender for Office 365, Plan 1 and 2, and Microsoft Defender XDR, for complete protection of your Office 365 subscription.--+ Last updated 10/16/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Threat Explorer Email Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-explorer-email-security.md
description: Use Threat Explorer (Explorer) or Real-time detections to view and investigate malware and phishing attempts in email. - seo-marvel-apr2020--+ search.appverid: met150 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Threat Explorer Investigate Delivered Malicious Email https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-explorer-investigate-delivered-malicious-email.md
description: Learn how to use threat investigation and response capabilities to find and investigate malicious email. - seo-marvel-apr2020--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Threat Explorer Real Time Detections About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-explorer-real-time-detections-about.md
description: Learn about the available views, filters, and actions in Threat Explorer (Explorer) or Real-time detections to investigate and respond to threats. - seo-marvel-apr2020--+ search.appverid: met150 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Threat Explorer Threat Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-explorer-threat-hunting.md
description: Learn about threat hunting and remediation in Microsoft Defender for Office 365 using Threat Explorer or Real-time detections in the Microsoft Defender portal. - seo-marvel-apr2020--+ search.appverid: met150 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
security Threat Trackers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-trackers.md
- tier2 description: Learn about Threat Trackers, including new Noteworthy Trackers, to help your organization stay on top of security concerns.--+ Last updated 3/19/2024 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
security Trial User Guide Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/trial-user-guide-defender-for-office-365.md
- m365-security - tier1 ms.localizationpriority: high-+ search.appverid: - MOE150 - MET150 description: "Microsoft Defender for Office 365 solutions trial user guide."- Last updated 6/23/2023 appliesto:
security Try Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/try-microsoft-defender-for-office-365.md
- m365-security - tier1 --+ ROBOTS: Last updated 7/31/2023
security User Tags About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/user-tags-about.md
- tier2 description: Admins can learn how to identify specific groups of users with user tags in Microsoft Defender for Office 365 Plan 2. Tag filtering is available across alerts, reports, and investigations in Microsoft Defender for Office 365 to quickly identify the tagged users.--+ appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
security Zero Hour Auto Purge https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-hour-auto-purge.md
- seo-marvel-apr2020 description: Zero-hour auto purge (ZAP) moves delivered messages in Microsoft 365 mailboxes to the Junk Email folder or quarantine if those messages are retroactively found to be spam, phishing, or contain malware.--+ Last updated 11/16/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
security Zero Trust Continuous Access Evaluation Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-trust-continuous-access-evaluation-microsoft-365.md
description: Describes how conditional access evaluation for Microsoft 365 and M
-+ audience: Admin f1.keywords:
- m365solution-scenario - highpri - tier1- search.appverid: met150 Last updated 1/31/2023
solutions Tenant Management Networking https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/tenant-management-networking.md
Title: Step 2. Optimal networking for your Microsoft 365 for enterprise tenants
Previously updated : 12/01/2020 Last updated : 04/05/2024 audience: ITPro
- m365solution-tenantmanagement - tenant-management - m365solution-scenario
+- must-keep
- Ent_Solutions description: "Optimize the network access to your Microsoft 365 tenants."
These are the specific network insights for each office location:
- [Backhauled network egress](../enterprise/office-365-network-mac-perf-insights.md#backhauled-network-egress) - [Better performance detected for customers near you](../enterprise/office-365-network-mac-perf-insights.md#better-performance-detected-for-customers-near-you)-- [Use of a non-optimal Exchange Online service front door](../enterprise/office-365-network-mac-perf-insights.md#use-of-a-non-optimal-exchange-online-service-front-door)-- [Use of a non-optimal SharePoint Online service front door](../enterprise/office-365-network-mac-perf-insights.md#use-of-a-non-optimal-sharepoint-online-service-front-door)
+- [Use of a non-optimal Exchange Online service front door](../enterprise/office-365-network-mac-perf-insights.md#use-of-a-nonoptimal-exchange-online-service-front-door)
+- [Use of a non-optimal SharePoint Online service front door](../enterprise/office-365-network-mac-perf-insights.md#use-of-a-nonoptimal-sharepoint-service-front-door)
- [Low download speed from SharePoint front door](../enterprise/office-365-network-mac-perf-insights.md#low-download-speed-from-sharepoint-front-door) - [China user optimal network egress](../enterprise/office-365-network-mac-perf-insights.md#china-user-optimal-network-egress)
syntex Archive Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/archive/archive-compliance.md
ms.localizationpriority: medium
description: Learn about compliance features for archived sites in Microsoft 365 Archive.
-# Compliance features in Microsoft 365 Archive (Preview)
+# Compliance features in Microsoft 365 Archive
> [!NOTE] > Microsoft Purview features work seamlessly with archived content. For example, you can apply retention hold on archived content without needing to unarchive it. Likewise, you can also archive content in retention hold without needing to move or delete it from retention scope.
syntex Archive End User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/archive/archive-end-user.md
ms.localizationpriority: medium
description: Learn about end-user features for archived sites in Microsoft 365 Archive.
-# End user experience in Microsoft 365 Archive (Preview)
+# End user experience in Microsoft 365 Archive
> [!NOTE] > This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations.
syntex Archive Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/archive/archive-faq.md
ms.localizationpriority: medium
description: Read frequently asked questions about Microsoft 365 Archive.
-# Frequently asked questions about Microsoft 365 Archive (Preview)
+# Frequently asked questions about Microsoft 365 Archive
> [!NOTE] > This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations. Before you begin, read the [Microsoft 365 Archive preview terms and conditions](archive-preview-terms.md).
syntex Archive Manage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/archive/archive-manage.md
ms.localizationpriority: medium
description: Learn how to archive, reactivate, and manage sites in Microsoft 365 Archive.
-# Manage Microsoft 365 Archive (Preview)
+# Manage Microsoft 365 Archive
> [!NOTE] > This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations.
Other than these two exceptions, you can expect the site to be unchanged.
## Change the archive status of site via PowerShell
-You can also change the status of an archived site by using the PowerShell cmdlet [**Set-SPOSiteArchiveState**](/powershell/module/sharepoint-online/set-spositearchivestate?view=sharepoint-ps).
+You can also change the status of an archived site by using the PowerShell cmdlet [**Set-SPOSiteArchiveState**](/powershell/module/sharepoint-online/set-spositearchivestate?view=sharepoint-ps&preserve-view=true).
## Site templates supported
syntex Archive Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/archive/archive-overview.md
ms.localizationpriority: medium
description: Learn about how Microsoft 365 Archive can provide your with organization cost-effective storage solutions.
-# Overview of Microsoft 365 Archive (Preview)
+# Overview of Microsoft 365 Archive
> [!NOTE] > This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations. Before you begin, read the [Microsoft 365 Archive preview terms and conditions](archive-preview-terms.md).
syntex Archive Preview Terms https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/archive/archive-preview-terms.md
ms.localizationpriority: medium
description: Read the preview terms and conditions for Microsoft 365 Archive (Preview).
-# Microsoft 365 Archive preview terms and conditions
+# Microsoft 365 Archive preview terms
Effective Date: November 15, 2023
-ΓÇ£CompanyΓÇ¥ means the Enterprise customer that uses this Preview Feature.
+"Company" means the Enterprise customer that uses this Preview Feature.
**By using this Preview Feature, you accept these Terms and Conditions and all rights and obligations within. If you do not agree to these Terms and Conditions, DO NOT use the Preview Feature.** These Terms and Conditions govern the use of the Preview Feature offerings as described below.
-ΓÇ£FeedbackΓÇ¥ is all suggestions, comments, feedback, ideas, or know how, in any form, that Company provides to Microsoft. It doesn't include sales forecasts, financial results, future release scheduled, marketing plans and high-level product plans or feature lists for anticipated products.
+"Feedback" is all suggestions, comments, feedback, ideas, or know how, in any form, that Company provides to Microsoft. It doesn't include sales forecasts, financial results, future release scheduled, marketing plans and high-level product plans or feature lists for anticipated products.
**MICROSOFT OFFERING**: The goal of the Microsoft 365 Archive is to provide customers with a cost-effective, long-term storage for their inactive aging content. Customers can archive their SharePoint site using Microsoft 365 Archive from SharePoint Admin Center. Admins can also reactivate an archived site that will move the site and its contents from archived (cold tier) storage to SharePoint tenant (standard tier) storage.
-**PREVIEW FEATURE**: To terminate your Feature Preview during the Preview Period, stop using the Preview Feature. Microsoft may change or discontinue the Preview Feature at any time with or without notice. Microsoft may also choose not to make the Preview Feature generally commercially available.
+**PREVIEW FEATURE**: To terminate your Feature Preview during the Preview Period, stop using the Preview Feature. Microsoft may change or discontinue the Preview Feature at any time with or without notice. Microsoft may also choose not to make the Preview Feature commercially available.
-During the Preview Period, Company allows its SharePoint tenant admins to Archive SharePoint sites. Company must be aware that this is a preview service and all the limitations described in these Terms and Conditions, including but not limited, that Microsoft may change or discontinue the Preview Feature at any time and that Microsoft may also choose not to make the Preview Feature generally commercially available.
+During the Preview Period, Company allows its SharePoint tenant admins to Archive SharePoint sites. Company must be aware that this is a preview service and all the limitations described in these Terms and Conditions, including but not limited, that Microsoft may change or discontinue the Preview Feature at any time and that Microsoft may also choose not to make the Preview Feature commercially available.
Prerequisite Requirements to enable Microsoft 365 Archive pay-as-you-go are: 1. An Azure subscription with admin access as owner or contributor on the subscription
-2. A Microsoft 365 tenancy with either Microsoft 365 admin access or SharePoint Online admin access
+2. A Microsoft 365 tenancy with either Microsoft 365 admin access or SharePoint admin access
3. An Azure resource group No SLA applies to this Feature Preview.
-THE PREVIEW FEATURE IS PROVIDED ΓÇ£AS-IS,ΓÇ¥ ΓÇ£WITH ALL FAULTS,ΓÇ¥ AND ΓÇ£AS AVAILABLE.ΓÇ¥ Microsoft provides no performance guarantee for the Feature Preview (including accompanying URLs provided for embedded or unauthenticated viewing) and Company bear the risk of using it. The Feature Preview isn't included in the SLA for Microsoft Syntex and may not be covered by customer support.
+THE PREVIEW FEATURE IS PROVIDED "AS-IS," "WITH ALL FAULTS," AND "AS AVAILABLE." Microsoft provides no performance guarantee for the Feature Preview (including accompanying URLs provided for embedded or unauthenticated viewing) and Company bear the risk of using it. The Feature Preview isn't included in the SLA for Microsoft Syntex and may not be covered by customer support.
**<ins>LICENSE</ins>**
Company won't be charged for reactivation of an archived content within the firs
**<ins>LENGTH OF OBLIGATIONS; DISCLOSURE</ins>**
-**Preview Period.** The Preview Period continues in effect until <ins>June 30, 2024, or 30 days after Commercial General Availability of the Preview Feature, whichever is first</ins>. Company may terminate their use of the Preview Feature at any time. Terminating use of the Preview Feature won't change any of the rights, licenses granted, or duties made while the Preview Period is in effect. Termination is defined as i) the CompanyΓÇÖs termination of use of the Preview Feature and/or ii) the Preview Period ends.
+**Preview Period.** The Preview Period continues in effect until <ins>June 30, 2024, or 30 days after Commercial General Availability of the Preview Feature, whichever is first</ins>. Company may terminate their use of the Preview Feature at any time. Terminating use of the Preview Feature won't change any of the rights, licenses granted, or duties made while the Preview Period is in effect. Termination is defined as i) the CompanyΓÇÖs termination of use of the Preview Feature and/or ii) the Preview Period ends.
**Effects upon Termination.** Once terminated, Company will no longer have access to Microsoft 365 Archive and all the archived content if Microsoft doesn't continue with the then generally available Microsoft 365 Archive use pay-as-you-go (PAYG) billing through an Azure subscription should Microsoft choose to make the Microsoft 365 Archive service generally available.
Company won't be charged for reactivation of an archived content within the firs
In case the CompanyΓÇÖs Azure subscription goes into an unhealthy stage of deleted or canceled or suspended, we'll prevent any future archival and restores until the subscription is back to a healthy state. Company has 30 days to recover any archived data and restores by bringing back the subscription to an active state. If no action is taken from the Company to bring subscription back to active state in 30 days, we'll soft delete the archived data from systems after this 30 days. Upon reactivation, Company must also pay for Microsoft 365 Archive usage for the days the subscription was in unhealthy state.
-This Agreement cannot be extended. Microsoft may also choose not to make the Preview Feature generally commercially available.
+This Agreement can't be extended. Microsoft may also choose not to make the Preview Feature commercially available.
**<ins>REPRESENTATIONS AND LIMITATIONS</ins>**
This Agreement cannot be extended. Microsoft may also choose not to make the Pre
**Authority.** Company represents it has all rights and authority necessary to be legally bound to these Terms and Conditions and grant the rights described therein for itself and its affiliates.
-**Limitations.** All information, materials and feedback are provided ΓÇ£as-isΓÇ¥ and Microsoft bears the risk of using them; Company gives no express warranties, guarantees or conditions as to its Feedback; and to the extent permitted under local law, Company excludes the implied warranties of merchantability, fitness for a particular purpose, title and noninfringement as to its Input.
+**Limitations.** All information, materials, and feedback are provided ΓÇ£as-isΓÇ¥ and Microsoft bears the risk of using them; Company gives no express warranties, guarantees, or conditions as to its Feedback; and to the extent permitted under local law, Company excludes the implied warranties of merchantability, fitness for a particular purpose, title, and noninfringement as to its Input.
**<ins>LIMITATIONS ON AND EXCLUSIONS OF REMEDIES AND DAMAGES</ins>**
-Except as described herein, the only remedy for claims relating to these Terms and Conditions is for Company to terminate its use of the Preview Feature. Neither Party can recover any damages, including direct, consequential, lost profits, special, punitive, indirect or incidental damages from the other. This limitation applies:
+Except as described herein, the only remedy for claims relating to these Terms and Conditions is for Company to terminate its use of the Preview Feature. Neither Party can recover any damages, including direct, consequential, lost profits, special, punitive, indirect, or incidental damages from the other. This limitation applies:
1. To claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence, or other tort to the extent permitted by applicable law. 2. Even if one of us knew or should have known about the possibility of the damages.
-The limitations in this section don't apply to claims arising from or in connection with any infringement, misuse or misappropriation by one of us of the otherΓÇÖs intellectual property rights.
+The limitations in this section don't apply to claims arising from or in connection with any infringement, misuse, or misappropriation by one of us of the otherΓÇÖs intellectual property rights.
syntex Archive Pricing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/archive/archive-pricing.md
ms.localizationpriority: medium
description: Learn about the pricing model for storage consumption and site reactivation in Microsoft 365 Archive.
-# Pricing model for Microsoft 365 Archive (Preview)
+# Pricing model for Microsoft 365 Archive
> [!NOTE] > This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations.
syntex Archive Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/archive/archive-setup.md
ms.localizationpriority: medium
description: Learn how to set up and configure Microsoft 365 Archive.
-# Set up Microsoft 365 Archive (Preview)
+# Set up Microsoft 365 Archive
> [!NOTE] > This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations.
syntex Archive States https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/archive/archive-states.md
ms.localizationpriority: medium
description: Learn about the archive states and what they mean in Microsoft 365 Archive.
-# Archive states in Microsoft 365 Archive (Preview)
+# Archive states in Microsoft 365 Archive
> [!NOTE] > This feature is currently in preview and subject to change. The feature is currently rolling out and might not yet be fully available to all organizations.