Updates from: 05/22/2021 03:06:49
Category Microsoft Docs article Related commit history on GitHub Change details
admin Restore User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/restore-user.md
search.appverid:
- MOE150 - GEA150 ms.assetid: 2c261e42-5dd1-48b0-845f-2a016d29cfc1
-description: "Learn how to restore deleted user accounts and all associated data."
+description: "Within 30 days after deleting a user account, you can restore the account and all data, and the user can sign in with the same account."
# Restore a user
You must have [admin permissions](about-admin-roles.md) in Microsoft 365 to do t
4. Review the results, and then select **Close**.
-## Related articles
+## Related content
-[Delete a user](delete-a-user.md)
+[Delete a user](delete-a-user.md) (article)\
+[Assign admin roles](assign-admin-roles.md) (video)\
+[Assign licenses to users](../manage/assign-licenses-to-users.md) (article)
admin Create Edit Or Delete A Security Group https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/create-edit-or-delete-a-security-group.md
No. This is just one more way you can manage security for your organization. You
## Can I send email to a security group? Yes. But if you want to use groups for email and collaboration, we recommend that you [create a Microsoft 365 group](../create-groups/create-groups.md) instead. +
+## Related content
+
+[Create a group in the Microsoft 365 admin center](../create-groups/create-groups.md) (article)\
+[Explaining Microsoft 365 Groups to your users](../create-groups/explain-groups-knowledge-worker.md) (article)\
+[Manage a group in the Microsoft 365 admin center](../create-groups/manage-groups.md) (article)
admin Create Dns Records At Any Dns Hosting Provider https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider.md
To add these values, create a single string, separating the values with spaces a
## Related content
-[Change nameservers to set up Microsoft 365 with any domain registrar](change-nameservers-at-any-domain-registrar.md) (article)
-
-[Find and fix issues after adding your domain or DNS records](find-and-fix-issues.md) (article)
-
+[Change nameservers to set up Microsoft 365 with any domain registrar](change-nameservers-at-any-domain-registrar.md) (article)\
+[Find and fix issues after adding your domain or DNS records](find-and-fix-issues.md) (article)\
[Manage domains](index.yml) (link page)
admin Find And Fix Issues https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-with-domains/find-and-fix-issues.md
If you've fixed any DNS issues and you're still having trouble, try one of the f
## Related content
-[Troubleshoot: Audit data on verified domain change](/azure/active-directory/reports-monitoring/troubleshoot-audit-data-verified-domain)
+[Troubleshoot: Audit data on verified domain change](/azure/active-directory/reports-monitoring/troubleshoot-audit-data-verified-domain) (article)\
+[Domains FAQ](../setup/domains-faq.yml) (article)
admin Customize The App Launcher https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/customize-the-app-launcher.md
search.appverid:
- MOE150 - GEA150 ms.assetid: 1136115a-75af-4497-b693-640c4ce70bc6
-description: "Create quick links to your email, documents, apps, SharePoint sites, external sites, and other resources by adding custom tiles to the app launcher. "
+description: "Create quick links to your email, documents, apps, SharePoint sites, external sites, and other resources by adding custom tiles to the app launcher."
# Add custom tiles to the app launcher
You can add your own custom tiles to the app launcher that point to SharePoint s
To delete a custom tile, from the **Custom tiles** window, select the tile, select **Remove tile** > **Delete**.
-## What's next?
+## Next steps
In addition to adding tiles to the app launcher, you can add app launcher tiles to the navigation bar ([learn more](https://support.microsoft.com/office/eb34a21b-52fa-4fbf-a8d5-146132242985)). To customize the look and feel of Microsoft 365 to match your organization's brand, see [Customize the Microsoft 365 theme](../setup/customize-your-organization-theme.md).+
+## Related content
+
+[Pin apps to your users' app launcher](pin-apps-to-app-launcher.md) (article)\
+[Upgrade your Microsoft 365 for business users to the latest Office client](../setup/upgrade-users-to-latest-office-client.md) (article)\
+[Manage add-ins in the admin center](../manage/manage-addins-in-the-admin-center.md) (article)
admin Remove Licenses From Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/remove-licenses-from-users.md
- manage_licenses - commerce_licensing search.appverid: MET150
-description: "Learn how to unassign licenses from user accounts."
+description: "The method you use to unassign product licenses depends on whether you unassign licenses from specific users or from a specific product."
Last updated 07/01/2020
admin Send Email As Distribution List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/send-email-as-distribution-list.md
search.appverid:
- MET150 - MOE150 ms.assetid: a7c98273-067e-4162-b3a1-4ba081796012
-description: "Learn how to send email as a distribution list in Microsoft 365."
+description: "Send email as a distribution list in Microsoft 365 so that when a member replies to a message it appears to be from the distribution list."
# Send email as a distribution list In Microsoft 365, you can send email as a distribution list. When a person who is a member of the distribution list replies to a message sent to the distribution list, the email appears to be from the distribution list, not from the individual user. This topic shows you how to do this.
-## Send email as a distribution list
+## Before you begin
Before you perform these steps, make sure you've been added to a Microsoft 365 distribution list and you've have been granted Send as permission on it.
Before you perform these steps, make sure you've been added to a Microsoft 365 d
3. Select the **Distribution List** address from the Global Address List. 4. Send the email.+
+## Related content
+
+[Create, edit, or delete a security group in the Microsoft 365 admin center](../email/create-edit-or-delete-a-security-group.md) (article)\
+[Email collaboration](../email/email-collaboration.md) (article)\
+[Add a user or contact to a distribution group](../email/add-user-or-contact-to-distribution-list.md)
admin Update Phone Number And Email Address https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/update-phone-number-and-email-address.md
search.appverid:
- MET150 - MOE150 ms.assetid: 767349fa-f646-46d9-9dab-4a65049bdd1f
-description: "Update your administrator phone number and email address in the admin center. You'll need this information if you want to reset your own admin password."
+description: "Update your administrator phone number and email address in the admin center if you want to reset your own admin password."
# Update your admin phone number and email address
For answers to billing questions, see:
## Related content
-[Change a user name and email address](../add-users/change-a-user-name-and-email-address.md) (video)
-
-[Add a new employee](../add-users/add-new-employee.md) (video)
-
-[Remove a former employee](../add-users/remove-former-employee.md) (video)
-
+[Change a user name and email address](../add-users/change-a-user-name-and-email-address.md) (video)\
+[Add a new employee](../add-users/add-new-employee.md) (video)\
+[Remove a former employee](../add-users/remove-former-employee.md) (video)\
[Access and back up a former user's data](../add-users/get-access-to-and-back-up-a-former-user-s-data.md) (article)
admin Add Partner https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/add-partner.md
search.appverid:
- MOE150 - GEA150 ms.assetid: f86e8177-936e-491e-9024-44dea2b296ff
-description: "Learn how to add a subscription advisor partner as partner of record at the time of Microsoft 365 purchase, change the partner, or delete a partner from a subscription."
+description: "Add a partner of record at the time of Microsoft 365 purchase, change the partner, or delete a partner from a subscription."
# Add, change, or delete a subscription advisor partner
An authorized partner of Microsoft who serves as your subscription advisor provi
::: moniker-end
+## Before you begin
+ ::: moniker range="o365-worldwide" The partner you choose depends on the Microsoft services you use and the country or region where you'll use those services. If you are adding a partner, or changing the partner for your subscription, first you need to get the partner's Microsoft Partner ID by asking the partner for it.
You will have to ask your reseller partner to follow these instructions: [Remove
::: moniker-end
-## Related articles
+## Related content
-[Find your Microsoft 365 partner or reseller](../manage/find-your-partner-or-reseller.md)
+[Find your Microsoft 365 partner or reseller](../manage/find-your-partner-or-reseller.md) (article)\
+[Plan your setup of Microsoft 365 for business](../setup/plan-your-setup.md) (article)
admin User Consent https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/user-consent.md
Here's how to turn User consent to apps on or off.
2. On the **User consent to apps** page, select the option to turn user consent on or off.
-## More info
+## Related content
<a name="__toc379982114"> </a>
-To learn about how to configure your consent settings in Azure active directory, read [Configure the admin consent workflow](/azure/active-directory/manage-apps/configure-admin-consent-workflow).
-
-To learn about managing user consent to apps, read [Managing consent to applications and evaluating consent requests](/azure/active-directory/manage-apps/manage-consent-requests).
+[Configure the admin consent workflow](/azure/active-directory/manage-apps/configure-admin-consent-workflow) (article)\
+[Managing consent to applications and evaluating consent requests](/azure/active-directory/manage-apps/manage-consent-requests) (article)
admin Multi Factor Authentication Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/multi-factor-authentication-microsoft-365.md
search.appverid:
- MOE150 ms.assetid: 043807b2-21db-4d5c-b430-c8a6dee0e6ba
-description: "Learn about multi-factor authentication in Microsoft 365."
+description: "Multi-factor authentication (MFA) uses both a password, which should be strong, and an additional verification method."
# Multi-factor authentication for Microsoft 365
In the Microsoft 365 admin center, you can configure per-user and service MFA se
[Set up MFA for Microsoft 365](set-up-multi-factor-authentication.md)
-## Related topics
+## Related content
-[Video: Turn on multi-factor authentication](../../business-video/turn-on-mfa.md)
-
-[Video: Turn on multi-factor authentication for your phone](../../business-video/set-up-mfa.md)
+[Turn on multi-factor authentication](../../business-video/turn-on-mfa.md) (video)\
+[Turn on multi-factor authentication for your phone](../../business-video/set-up-mfa.md) (video)
admin Configure Focused Inbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/configure-focused-inbox.md
search.appverid:
- MET150 - MOE150 ms.assetid: 613a845c-4b71-41de-b331-acdcf5b6625d
-description: "Learn to configure Focused Inbox for all or specific users of your organization. "
+description: "If you're responsible for configuring email settings for everyone in a business this article explains how to configure Focused Inbox for users."
# Configure Focused Inbox for everyone in your organization
There are two cmdlets for controlling Focused Inbox. When you run Get-FocusedInb
No, and this is by design. Focused Inbox enablement is a client-side setting, so all the cmdlet can do is tell you if the user's mailbox is eligible for the client experience. It is possible for it to be simultaneously enabled in some clients and disabled in others, for example, enabled in Outlook app and Outlook Mobile but disabled in Outlook on the web.
+## Related content
+
+[Configure Clutter for your organization](../email/configure-clutter.md) (article)\
+[Configure shared mailbox settings](../email/configure-a-shared-mailbox.md) (article)\
+[Create signatures and disclaimers](create-signatures-and-disclaimers.md) (video)
admin Customize Sign In Page https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/customize-sign-in-page.md
The following figure shows which parts of the sign-in page can be modified in Az
In addition to the sign-in page, you can customize the Access Panel page in Azure.
-If you are ready to add branding, explore the customization options in the Azure content set: [Add company branding to your Sign-in and Access Panel pages](/azure/active-directory/fundamentals/customize-branding).
+If you are ready to add branding, explore the customization options in the Azure content set: [Add company branding to your Sign-in and Access Panel pages](/azure/active-directory/fundamentals/customize-branding).
+
+## Related content
+
+[Customize the Microsoft 365 theme for your organization](customize-your-organization-theme.md) (article)\
+[Difference between the setup wizard and the Setup page](o365-setup-wizard-and-setup-page.md) (article)\
+[Set up mobile devices for Microsoft 365 for business users](../../business/set-up-mobile-devices.md) (video)
admin Setup Business Standard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/setup-business-standard.md
search.appverid:
- MET150 - MOE150 - BEA160
-description: "Learn how to set up your Microsoft 365 Business Standard subscription."
+description: "When you purchase Microsoft 365 Business Standard, you have the option of using a domain you own, or buying one during the sign-up."
# Set up Microsoft Business Standard
Microsoft 365 doesn't include a public website for your business. If you want to
> [!VIDEO https://www.microsoft.com/videoplayer/embed/4839abc6-9323-4cbf-a79d-2907235f9ebb]
-More at [Use a public website](../../business-video/create-web-site.md).
+## Related content
+
+[Create a website](../../business-video/create-web-site.md) (video)\
+[Microsoft 365 for your business](../../business-video/index.yml) (link page)
business-video Admin Center Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-video/admin-center-overview.md
search.appverid:
- BCS160 - MET150 - MOE150
-description: "Learn more about the Microsoft 365 admin center."
+description: "Use either simplified view in Microsoft 365 to manage common tasks or dashboard view for more complex settings and tasks."
# Overview of the Microsoft 365 admin center -- [The admin center in simplified view](#the-admin-center-in-simplified-view)-- [The admin center in dashboard view](#the-admin-center-in-dashboard-view)
+- [The admin center in simplified view](#watch-the-admin-center-in-simplified-view)
+- [The admin center in dashboard view](#watch-the-admin-center-in-dashboard-view)
The Microsoft 365 admin center has two views: simplified view helps smaller organizations manage their most common tasks. Dashboard view includes more complex settings and tasks. You can switch between them from a button at the top of the admin center.
-## The admin center in simplified view
+## Watch: The admin center in simplified view
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWD3sq?autoplay=false]
On the **Learn** tab, browse videos and articles about the admin center and othe
If you need assistance, select **Help & support**. Search for topic you want help with and view the recommended solution or select the headset to contact support, and then enter your question and contact information.
-## The admin center in dashboard view
+## Watch: The admin center in dashboard view
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWfvDL?autoplay=false]
The Microsoft 365 admin center is fully localized in 40 languages.
|Vietnamese | vi | |Chinese Simplified | zh-hans | |Chinese Traditional | zh-hant |+
+## Related content
+
+[What is a Microsoft 365 admin?](what-is-admin.md) (video)\
+[Add an admin](add-admin.md) (video)\
+[Customize the Microsoft 365 theme for your organization](../admin/setup/customize-your-organization-theme.md) (article)
business Add Autopilot Devices And Profile https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business/add-autopilot-devices-and-profile.md
If you haven't created device groups or profiles yet, the best way to get starte
Choose **Next**. 6. **You're done** indicates that the profile you created (or chose) will be applied to the device group you created by uploading the list of devices. The settings will be in effect when the device users sign in next. Choose **Close**.+
+## Related content
+
+[About AutoPilot Profile settings](autopilot-profile-settings.md) (article)\
+[Options for protecting your devices and app data](../admin/devices/choose-device-security.md) (article)
business Manage Protected Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business/manage-protected-devices.md
description: "Learn to remove company data from devices managed through protecti
After a user connects their device to your organization by signing in with their work account to the device or to Office apps on the device, you can protect the device with the policies you set up. Connected devices are listed on the **Devices** page. If a device is lost or stolen, you can manage it from this page to remove any company data. You can also reset Windows 10 devices to their factory settings to wipe out any custom settings.
-For more information on the tasks you can use to manage devices, see these articles:
+## Related content
-[Remove company data from devices](remove-company-data.md)
-
-[Reset Windows 10 devices to their factory settings](reset-devices-to-factory-settings.md)
-
-[Add a managed device](./app-protection-settings-for-android-and-ios.md)
+[Remove company data from devices](remove-company-data.md) (article)\
+[Reset Windows 10 devices to their factory settings](reset-devices-to-factory-settings.md) (article)\
+[Add a managed device](./app-protection-settings-for-android-and-ios.md) (article)
business Migrate From E3 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business/migrate-from-e3.md
search.appverid: - BCS160 - MET150
-description: "Learn how to move your business to Microsoft 365 Business Premium from Office 365 E3."
+description: "If you have an Office 365 E3 subscription but don't have more than 300 employees, consider switching to Microsoft 365 Business Premium."
# Migrating from Office 365 E3 to Microsoft 365 Business Premium
After migrating to Microsoft 365 Business Premium, you have Defender for Office
### Sensitivity labels To start using sensitivity labels, see [Overview of sensitivity labels](../compliance/sensitivity-labels.md) and [create and manage sensitivity labels](../business-video/create-sensitivity-labels.md) video.+
+## Related content
+
+[Change plans manually](../commerce/subscriptions/change-plans-manually.md) (article)\
+[Upgrade Windows devices to Windows 10 Pro](upgrade-to-windows-pro-creators-update.md) (video)\
+[Set app protection settings for Android or iOS devices](app-protection-settings-for-android-and-ios.md) (article)\
+[Set or edit application protection settings for Windows 10 devices](protection-settings-for-windows-10-devices.md) (article)\
+[]
+
business Set Up https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business/set-up.md
description: "Discover the setup steps for Microsoft 365 Business Premium, inclu
# Set up Microsoft 365 Business Premium in the setup wizard
+## Watch: Overview of Microsoft 365 setup
+ Watch this video for an overview of Microsoft 365 Business Premium setup.<br><br> > [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4jZwg]
To install Office on mobile iOS or Android devices, see [Set up mobile devices f
You can also install Office individually. See [install Office on a PC or Mac](https://support.microsoft.com/office/4414eaaf-0478-48be-9c42-23adc4716658) for instructions.
-## See also
+## Related content
-[Microsoft 365 for business training videos](../business-video/index.yml)
+[Microsoft 365 for business training videos](../business-video/index.yml) (link page)
commerce Close Your Account https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/close-your-account.md
- fwlink 2133922 to Delete subscription heading - commerce_subscription search.appverid: MET150
-description: "Learn how to close your account with Microsoft."
+description: "When you close your account with Microsoft all information related to your account is deleted including licenses, users, and user data."
Last updated 04/02/2021
You can also [use PowerShell to disable multi-factor authentication for multiple
5. If your organization fails one or more checks, you see a link to more information on how to pass the checks. After you pass all checks, select **Delete** to complete the process. After you complete this final step, your account with Microsoft is closed and deleted.+
+## Related content
+
+[Understand your bill or invoice for Microsoft 365 for business](./billing-and-payments/understand-your-invoice2.md) (article)\
+[Cancel your subscription](./subscriptions/cancel-your-subscription.md) (article)
+
commerce Upgrade To Different Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/upgrade-to-different-plan.md
- AdminSurgePortfolio - commerce_subscriptions search.appverid: MET150
-description: "Learn how to upgrade to a different plan."
+description: "The easiest way to upgrade plans is to use the Upgrade tab in the admin center. However, the Upgrade tab isn't always supported."
Last updated 04/21/2021
You can [change plans manually](change-plans-manually.md) or [call support](../.
You can [change plans manually](change-plans-manually.md) or [call support](../../business-video/get-help-support.md).
-### Additional reasons you can't Upgrade
+### Additional reasons you can't upgrade
#### You have two or more plans for the same product
When you upgrade plans, the plans that are available for you to upgrade to are d
If your plan isn't eligible to upgrade plans automatically, you might be able to [change plans manually](change-plans-manually.md), instead. You can also [call support](../../business-video/get-help-support.md) for help.
-#### Your subscription has an Add-on
+#### Your subscription has an add-on
If you have an Add-on with your subscription, you might be able to [change plans manually](change-plans-manually.md).
compliance Communication Compliance Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-configure.md
For more information about configuring Yammer in Native Mode, see:
- Choose a limited condition field, usually a sensitive info type or keyword dictionary to apply to the policy. >[!NOTE]
- >If you want to enable [optical character recognition (OCR)](communication-compliance-feature-reference.md#optical-character-recognition-ocr-preview) to scan embedded or attached images in messages for printed or handwritten text that match policy conditions, select **Customize policy** > **Conditions and percentage** and enable **Extract printed or handwritten text from images for evaluation**.
+ >If you want to enable [optical character recognition (OCR)](communication-compliance-feature-reference.md#optical-character-recognition-ocr) to scan embedded or attached images in messages for printed or handwritten text that match policy conditions, select **Customize policy** > **Conditions and percentage** and enable **Extract printed or handwritten text from images for evaluation**.
If you choose to use the policy wizard to create a custom policy, you will:
For more information about configuring Yammer in Native Mode, see:
- Choose if you'd like to enable classifiers. Classifiers can detect inappropriate language and images sent or received in the body of email messages or other types of text. You can choose the following built-in classifiers: *Threat*, *Profanity*, *Targeted harassment*, *Adult images*, *Racy images*, and *Gory images*.
- - Enable [optical character recognition (OCR)](communication-compliance-feature-reference.md#optical-character-recognition-ocr-preview) to scan embedded or attached images in messages for printed or handwritten text that match policy conditions. For custom policies, one or more conditional settings associated with text, keywords, classifiers, or sensitive info types must be configured in the policy to enable the selection of optical character recognition scanning.
+ - Enable [optical character recognition (OCR)](communication-compliance-feature-reference.md#optical-character-recognition-ocr) to scan embedded or attached images in messages for printed or handwritten text that match policy conditions. For custom policies, one or more conditional settings associated with text, keywords, classifiers, or sensitive info types must be configured in the policy to enable the selection of optical character recognition scanning.
- Define the percentage of communications to review.
compliance Communication Compliance Feature Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-feature-reference.md
The built-in trainable and global classifiers don't provide an exhaustive list o
For information about trainable classifiers in Microsoft 365, see [Getting started with trainable classifiers](classifier-get-started-with.md).
-### Optical character recognition (OCR) (preview)
+### Optical character recognition (OCR)
-Configure built-in or custom communication compliance policies to scan and identify printed or handwritten text from images that may be inappropriate in your organization. Integrated Azure Cognitive Services and optical scanning support for identifying text in images help analysts and investigators detect and act on instances where inappropriate conduct may be missed in communications that is primarily non-textual.
+Configure built-in or custom communication compliance policies to scan and identify printed or handwritten text from images that may be inappropriate in your organization. Integrated [Azure Cognitive Services and optical scanning support](/azure/cognitive-services/computer-vision/overview-ocr) for identifying text in images help analysts and investigators detect and act on instances where inappropriate conduct may be missed in communications that is primarily non-textual.
You can enable optical character recognition (OCR) in new policies from templates, custom policies, or update existing policies to expand support for processing embedded images and attachments. When enabled in a policy created from a policy template, automatic scanning is supported for embedded or attached images in email and Microsoft Teams chat messages. For custom policies, one or more conditional settings associated with keywords, built-in classifiers, or sensitive info types must be configured in the policy to enable the selection of OCR scanning.
The **Reports dashboard** contains the following report widgets and detailed rep
Use the *Export* option to create a .csv file containing the report details.
+- **Sensitive information type per location** detailed report (preview): Review and export information about the detection of sensitive information types and the associated sources in communication compliance policies. Includes the overall total and the specific breakdown of sensitive information type instances in the sources configured in your organization. Examples are:
+
+ - **Email**: Sensitive information types detected in Exchange email messages.
+ - **Teams**: Sensitive information types detected in Microsoft Teams channels and chat messages.
+ - **Skype for Business**: Sensitive information types detected in Skype for business communications.
+ - **Yammer**: Sensitive information types detected in Yammer inboxes, posts, chats, and replies.
+ - **Third-party sources**: Sensitive information types detected for activities associated with third-party connectors configured in your organization. To view the breakdown of third-party sources for a specific sensitive information type in the report, hover your mouse over the value for the sensitive information type in the Third-party source column.
+ - **Other**: Sensitive information types used for internal system processing. Selecting or deselecting this source for the report will not affect any values.
+
+ Use the *Export* option to create a .csv file containing the report details. The values for each third-party source are displayed in separate columns in the .csv file.
+ ## Audit In some instances, you must provide information to regulatory or compliance auditors to prove supervision of user activities and communications. This information may be a summary of all activities associated with a defined organizational policy or anytime a communication compliance policy changes. Communication compliance policies have built-in audit trails for complete readiness for internal or external audits. Detailed audit histories of every create, edit, and delete action are captured by your communication policies to provide proof of supervisory procedures.
compliance Communication Compliance Investigate Remediate https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-investigate-remediate.md
No matter where you start to review alerts or the filtering you configure, the n
After reviewing the message basics, it's time to open a message to examine the details and to determine further remediation actions. Select a message to view the complete message header and body information. Several different views are available to help you decide the proper course of action: -- **Source view**: This view is the standard message view commonly seen in most web-based messaging platforms. The header information is formatted in the normal style and the message body supports imbedded graphic files and word-wrapped text. If [optical character recognition (OCR)](communication-compliance-feature-reference.md#optical-character-recognition-ocr-preview) is enabled for the policy, images containing printed or handwritten text that match policy conditional are viewed as a child item for the associated message in this view.
+- **Source view**: This view is the standard message view commonly seen in most web-based messaging platforms. The header information is formatted in the normal style and the message body supports imbedded graphic files and word-wrapped text. If [optical character recognition (OCR)](communication-compliance-feature-reference.md#optical-character-recognition-ocr) is enabled for the policy, images containing printed or handwritten text that match policy conditional are viewed as a child item for the associated message in this view.
- **Text view**: Text view displays a line-numbered text-only view of the message and includes keyword highlighting in messages and attachments for sensitive info type terms or keywords matched in the associated communication compliance policy. Keyword highlighting can help you quickly scan long messages and attachments for the area of interest. In some cases, highlighted text may be only in attachments for messages matching policy conditions. Keyword highlighting isn't supported for terms identified by built-in classifiers assigned to a policy. Embedded files aren't displayed and the line numbering this view is helpful for referencing pertinent details among multiple reviewers.-- **Annotate view**: This view allows reviewers to add annotations directly on the message that are saved to the view of the message. If [OCR is enabled](communication-compliance-feature-reference.md#optical-character-recognition-ocr-preview) for the policy, images containing printed or handwritten text that match policy conditional are viewed as a child item for the associated message in this view and may be annotated.
+- **Annotate view**: This view allows reviewers to add annotations directly on the message that are saved to the view of the message. If [OCR is enabled](communication-compliance-feature-reference.md#optical-character-recognition-ocr) for the policy, images containing printed or handwritten text that match policy conditional are viewed as a child item for the associated message in this view and may be annotated.
- **User history**: User history view displays all other alerts generated by any communication compliance policy for the user sending the message. - **Pattern detected notification**: Many harassing and bullying actions over time and involve reoccurring instances of the same behavior by a user. The *Pattern detected* notification is displayed in the alert details and raises attention to the alert. Detection of patterns is on a per-policy basis and evaluates behavior over the last 30 days when at least two messages are sent to the same recipient by a sender. Investigators and reviewers can use this notification to identify repeated behavior to evaluate the alert as appropriate. - **Show Translate view**: This view automatically converts alert message text to the language configured in the *Displayed language* setting in the Microsoft 365 subscription for each reviewer. The Translate view helps broaden investigative support for organizations with multilingual users and eliminates the need for additional translation services outside of the communication compliance review process. Using Microsoft Translate services, the Translate view can be turned on and off as needed and supports a wide range of languages. For a complete list of supported languages, see [Microsoft Translator Languages](https://www.microsoft.com/translator/business/languages/). Languages listed in the *Translator Language List* are supported in the Translate view.
compliance Encryption Sensitivity Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/encryption-sensitivity-labels.md
Before you can use encryption, you might need to do some configuration tasks.
For sensitivity labels to apply encryption, the protection service (Azure Rights Management) from Azure Information Protection must be activated for your tenant. In newer tenants, this is the default setting, but you might need to manually activate the service. For more information, see [Activating the protection service from Azure Information Protection](/azure/information-protection/activate-service).
+- Check for network requirements
+
+ You might need to make some changes on your network devices such as firewalls. For details, see [Firewalls and network infrastructure](/azure/information-protection/requirements#firewalls-and-network-infrastructure) from the Azure Information Protection documentation.
+ - Configure Exchange for Azure Information Protection Exchange does not have to be configured for Azure Information Protection before users can apply labels in Outlook to encrypt their emails. However, until Exchange is configured for Azure Information Protection, you do not get the full functionality of using Azure Rights Management protection with Exchange.
compliance Insider Risk Management Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-settings.md
Alerts are triggered by policies when users perform activities related to policy
Policy indicators are segmented into the following areas. You can choose the indicators to activate and customize indicator event limits for each indicator level when creating an insider risk policy: - **Office indicators**: These include policy indicators for SharePoint sites, Microsoft Teams, and email messaging.-- **Device indicators**: These include policy indicators for activity such as sharing files over the network or with devices. Indicators include activities involving Microsoft Office files, .csv (comma-separated values) files, and .pdf (portable document format) files. If you select **Device indicators**, activity is processed only for devices with Windows 10 Build 1809 or higher and you must first onboard devices to the compliance center. For more information on configuring devices for integration with insider risk, see the following [Enable device indicators and onboard devices](insider-risk-management-settings.md#OnboardDevices) section in this article.
+- **Device indicators**: These include policy indicators for activity such as sharing files over the network or with devices. Indicators include activities involving all file types, excluding executable (.exe) and dynamic link library (.dll) file activity. If you select **Device indicators**, activity is processed only for devices with Windows 10 Build 1809 or higher and you must first onboard devices to the compliance center. For more information on configuring devices for integration with insider risk, see the following [Enable device indicators and onboard devices](insider-risk-management-settings.md#OnboardDevices) section in this article.
- **Security policy violation indicator (preview)**: These include indicators from Microsoft Defender for Endpoint related to unapproved or malicious software installation or bypassing security controls. To receive alerts in insider risk management, you must have an active Defender for Endpoint license and insider risk integration enabled. For more information on configuring Defender for Endpoint for insider risk management integration, see [Configure advanced features in Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/advanced-features\#share-endpoint-alerts-with-microsoft-compliance-center). - **Physical access indicators (preview)**: These include policy indicators for physical access to sensitive assets. For example, attempted access to a restricted area in your physical badging system logs can be shared with insider risk management policies. To receive these types of alerts in insider risk management, you must have priority physical assets enabled in insider risk management and the [Physical badging data connector](import-physical-badging-data.md) configured. To learn more about configuring physical access, see the [Priority physical access section](#priority-physical-assets-preview) in this article. - **Microsoft Cloud App Security indicators (preview)**: These include policy indicators from shared alerts from Cloud App Security. Automatically enabled anomaly detection in Cloud App Security immediately starts detecting and collating results, targeting numerous behavioral anomalies across your users and the machines and devices connected to your network. To include these activities in insider risk management policy alerts, select one or more indicators in this section. To learn more about Cloud App Security analytics and anomaly detection, see [Get behavioral analytics and anomaly detection](/cloud-app-security/anomaly-detection-policy).
knowledge Scale Topics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/knowledge/scale-topics.md
First, a reminder of the [four stages for topics](manage-topics.md#topic-stages)
- **Suggested**: A topic has been identified by AI and has enough supporting resources, connections, and properties. (These are marked as a **Suggested Topic** in the UI.) -- **Confirmed**: A topic that has been suggested by AI needs to be validated. Topic validation occurs when either:
+- **Confirmed**: A topic that has been discovered by AI and has been validated. Topic validation occurs when either:
- A knowledge manager confirms a topic. A knowledge manager [confirms a topic](manage-topics.md#confirmed-topics) on the **Manage topics** page. - Multiple users confirm a topic. There must be a net of two positive votes received from users who voted using the feedback mechanism on the topic card. For example, if one user voted positive and one user voted negative for a particular topic, you would still need two more positive votes for the topic to be confirmed. -- **Published**: A confirmed topic that has been curated. Manual edits have been made to improve its quality.
+- **Published**: A topic that has been curated. Manual edits have been made to improve its quality, or it has been created by a user.
- **Removed**: A topic that has been rejected and will no longer be visible to viewers. A topic can be removed in any state (suggested, confirmed, or published). Topic removal occurs when either:+ - A knowledge manager removes a topic. A knowledge manager removes a topic on the **Manage topics** page. - Multiple users cast negative votes using the feedback mechanism on the topic card. For a topic to be removed, there must be a net of two negative votes received from users. For example, if one user voted negative and one user voted positive for a particular topic, you would still need two more negative votes for the topic to be removed.
security TOC https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/TOC.md
## [Overview]() ### [What is Microsoft Defender for Endpoint?](microsoft-defender-endpoint.md) ### [Minimum requirements](minimum-requirements.md)
-### [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-atp.md)
+### [What's new in Microsoft Defender for Endpoint?](whats-new-in-microsoft-defender-atp.md)
### [Preview features](preview.md) ### [Data storage and privacy](data-storage-privacy.md) ### [Overview of Microsoft Defender Security Center](use.md)
###### [Manual deployment](linux-install-manually.md) ###### [Puppet based deployment](linux-install-with-puppet.md) ###### [Ansible based deployment](linux-install-with-ansible.md)
-
+###### [Deploy Defender for Endpoint on Linux with Chef](linux-deploy-defender-for-endpoint-with-chef.md)
+ ##### [Update](linux-updates.md) ##### [Configure]()
###### [Detect and block Potentially Unwanted Applications](linux-pua.md) ###### [Schedule scans with Microsoft Defender for Endpoint on Linux](linux-schedule-scan-atp.md) ###### [Schedule an update of the Microsoft Defender for Endpoint (Linux)](linux-update-MDE-Linux.md)
-###### [Deploy Defender for Endpoint on Linux with Chef](linux-deploy-defender-for-endpoint-with-chef.md)
+ ##### [Troubleshoot]() ###### [Troubleshoot installation issues](linux-support-install.md)
solutions Microsoft 365 Guest Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/microsoft-365-guest-settings.md
Azure Active Directory is the directory service used by Microsoft 365. The Azure
> [!NOTE] > These settings only affect SharePoint when [SharePoint and OneDrive integration with Azure AD B2B](/sharepoint/sharepoint-azureb2b-integration-preview) has been configured. The table below assumes that this has been configured.
-### Organizational relationships settings
+### External collaboration settings
**Navigation:** [Azure Active Directory admin center](https://aad.portal.azure.com) > Azure Active Directory > External Identities > External collaboration settings
Azure Active Directory is the directory service used by Microsoft 365. The Azure
| Setting | Default | Description | |:--|:--|:--|
-|Guest users permissions are limited|Yes|This setting affects the directory tasks that a guest can perform.|
-|Admins and users in the guest inviter role can invite|Yes|When set to **Yes**, admins can invite guests via Azure AD and via Microsoft 365 sharing experiences such as Teams and SharePoint; when set to **No**, they cannot.|
-|Members can invite|Yes|When set to **Yes**, Azure AD members can invite guests via Azure AD; when set to **No**, they cannot. When set to **Yes**, Microsoft 365 Group members can invite guests with owner approval; when set to **No**, Microsoft 365 Group members can invite guests with owner approval but owners must be global administrators to approve. <br><br>Note that **Members can invite** refers to members in Azure AD (as opposed to guests) and not to site or group members in Microsoft 365. <br><br>This is identical to the **Let users add new guests to the organization** setting in Microsoft 365 Security & privacy.|
-|Guests can invite|Yes|When set to **Yes**, guests in the directory can invite other guests to collaborate on Azure AD resources and on files and folders in SharePoint and OneDrive; when set to **No**, they cannot. <br><br>Note that **Allow external users to find user accounts in the directory by typing in exact email address matches** must be turned on in the SharePoint admin center for guests to share files and folders with other guests.|
-|Enable Email One-Time Passcode for guests (Preview)|No|When set to **Yes**, guests without an MSA or a work or school account can [authenticate with Azure AD using a one-time passcode](/azure/active-directory/b2b/one-time-passcode); when set to **No**, users will need to create a Microsoft account in order to authenticate. This setting must be set to **Yes** for [SharePoint and OneDrive integration with Azure AD B2B (Preview)](/sharepoint/sharepoint-azureb2b-integration-preview) to work.|
+|Guest user access|Guest users have limited access to properties and memberships of directory objects|Determines the [permissions that guests have in Azure Active Directory](/azure/active-directory/fundamentals/users-default-permissions).|
+|Guest invite settings|Anyone in the organization can invite guest users including guests and non-admins|Determines whether guests, members, and admins can invite guests to the organization.<br><br> This setting affects Microsoft 365 sharing experiences such as Teams and SharePoint.|
+|Enable guest self-service sign up via user flows|No|Determines if you can create user flows that allow someone to sign up for an app that you created and create a new guest account.|
|Collaboration restrictions|Allow invitations to be sent to any domain|This setting allows you to specify a list of allowed or blocked domains for sharing. When allowed domains are specified, then sharing invitations can only be sent to those domains. When denied domains are specified, then sharing invitations cannot be sent to those domains.<br><br> This setting affects Microsoft 365 sharing experiences such as Teams and SharePoint. You can allow or block domains at a more granular level by using domain filtering in SharePoint or Teams.| These settings affect how users are invited to the directory. They do not affect sharing with guests who are already in the directory.
solutions Productivity Illustrations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/productivity-illustrations.md
to move your content to SharePoint, Teams, and OneDrive and how your data flows
| Item | Description | |:--|:--|
-|[![Model poster: Migrate to Microsoft 365](../media/solutions-architecture-center/msft-migration-thumb.png)](https://download.microsoft.com/download/0/5/b/05b7fb7c-1557-4ebb-9036-c5fc3a4cd94c/Migration-posters-mm-spmt.pdf) <br/> [Download as a PDF](https://download.microsoft.com/download/0/5/b/05b7fb7c-1557-4ebb-9036-c5fc3a4cd94c/Migration-posters-mm-spmt.pdf) \| [Download as a Visio](https://download.microsoft.com/download/0/5/b/05b7fb7c-1557-4ebb-9036-c5fc3a4cd94c/Migration-posters-mm-spmt.vsdx) <br/> Updated March 2021 |Includes: <ul><li> File share migration</li><li>SharePoint Server migration </li> </ul><br> For more information, see [Migrate your content to Microsoft 365](/sharepointmigration/migrate-to-sharepoint-online).|
+|[![Model poster: Migrate to Microsoft 365](../media/solutions-architecture-center/msft-migration-thumb.png)](https://download.microsoft.com/download/0/5/b/05b7fb7c-1557-4ebb-9036-c5fc3a4cd94c/Migration-posters-mm-spmt.pdf) <br/>[Download as a PDF](https://download.microsoft.com/download/0/5/b/05b7fb7c-1557-4ebb-9036-c5fc3a4cd94c/m365-migration-posters-mm-spmt.pdf) | [Download as a Visio](https://download.microsoft.com/download/0/5/b/05b7fb7c-1557-4ebb-9036-c5fc3a4cd94c/m-365-migration-posters-mm-spmt.vsdx) <br/> Updated March 2021 |Includes: <ul><li> File share migration</li><li>SharePoint Server migration </li> </ul><br> For more information, see [Migrate your content to Microsoft 365](/sharepointmigration/migrate-to-sharepoint-online).|
## Microsoft 365 information protection and compliance capabilities