Updates from: 05/23/2023 01:34:14
Category Microsoft Docs article Related commit history on GitHub Change details
admin Welcome Business Assist https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/welcome-business-assist.md
ms.localizationpriority: medium description: "Welcome to Business Assist." Previously updated : 04/27/2023 Last updated : 05/21/2023 # Welcome to Business Assist
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE1FOfN?autoplay=false]
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RW14Ir8?autoplay=false]
compliance Audit Log Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-log-search.md
Be sure to review the following items before you start searching the audit log.
- Microsoft doesn't guarantee a specific time after an event occurs for the corresponding audit record to be returned in the results of an audit log search. For core services (such as Exchange, SharePoint, OneDrive, and Teams), audit record availability is typically 60 to 90 minutes after an event occurs. For other services, audit record availability may be longer. However, some issues that are unavoidable (such as a server outage) may occur outside of the audit service that delays the availability of audit records. For this reason, Microsoft doesn't commit to a specific time. -- Audit logging for Power BI isn't enabled by default. To search for Power BI activities in the audit log, you have to enable auditing in the Power BI admin portal. For instructions, see the "Audit logs" section in [Power BI admin portal](/power-bi/service-admin-portal#audit-logs).
+- To search for Power BI activities in the audit log, you have to enable auditing in the Power BI admin portal. For instructions, see the "Audit logs" section in [Power BI admin portal](/power-bi/service-admin-portal#audit-logs).
## Search the audit log
compliance Compliance Manager Improvement Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-improvement-actions.md
f1.keywords:
Previously updated : 05/19/2023 Last updated : 05/22/2023 audience: Admin
Compliance Manager detects signals from complementary improvement actions that a
Integration with Defender for Cloud allows Compliance Manager to facilitate improvement actions and provide continuous monitoring across multiple Microsoft and non-Microsoft cloud services, such as Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP). The cloud infrastructure of this monitoring means that action status can be evaluated and graded at the subscription level of the intended service. You can see specific implementation and testing results for each improvement action within each subscription of your service. The overall score you receive for the improvement action is an aggregate of the individual scores of each subscription within that service. Learn more about [multicloud support](compliance-manager-multicloud.md) and [scoring](compliance-score-calculation.md).
-#### Data connectors (coming soon)
+#### Connectors
-A selection of data connectors built specifically for Compliance Manager to support other non-Microsoft services such as Salesforce and Zoom are rolling out in the near future. Check back with this page for updates.
+We're rolling out a selection of connectors built specifically for Compliance Manager to support other non-Microsoft services. Connectors for Salesforce and Zoom are available now, with more connectors releasing soon. Learn more at [Working with connectors in Compliance Manager](compliance-manager-connectors.md).
## Improvement actions details page
To begin implementation, first locate the actionΓÇÖs **Testing source** to deter
- Inspect the status of each resource to determine which require ones require remediation. - For the resources needing remediation, review the **How to implement guidance** on the actionΓÇÖs **Implementation** tab. Then select the Defender for Cloud link to make the necessary changes in Defender for Cloud.
-Updates to the improvement actionΓÇÖs status will show within 24 hours.
+Updates to the improvement actionΓÇÖs status shows within 24 hours.
##### Actions not implemented through Defender for Cloud
To set up a parent testing source, follow the steps below:
- Select **Assign parent**. - On the **Assign parent improvement action** flyout pane, find the improvement action you want to assign as the parent from the list, or enter the action's name in the search bar near the top. When you identify your intended action, select the checkbox that appears to the left of the action name when you hover over it, then select **Save**.
-You'll come back to your action's details page. Under **Testing Source** on the **Overview** section, the new action you designated as the parent is listed under **Parent action**.
+You come back to your action's details page. Under **Testing Source** on the **Overview** section, the new action you designated as the parent is listed under **Parent action**.
## Storing evidence
When an update is available for an improvement action, you see a notification ne
An update occurs when there are changes related to scoring, automation, or scope. Changes may involve new guidance for improvement actions based on regulatory changes, or could be because of product changes. Only the improvement actions managed by your organizations receive update notifications.
-##### Where youΓÇÖll see assessment update notifications
+##### Where you see assessment update notifications
-When an improvement action is updated, youΓÇÖll see a **Pending update** label next to its name on the improvement actions page, and on the details page of its related assessments.
+When an improvement action is updated, you see a **Pending update** label next to its name on the improvement actions page, and on the details page of its related assessments.
Go to the improvement actionΓÇÖs details page, and select the **Review update** button in the top banner to review details about the changes and accept or defer the update.
compliance Dlp Policy Tips Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-tips-reference.md
Policy tips in Outlook Web Access (OWA) are supported for these conditions and actions: + ### Conditions that support policy tips in Outlook Web Access - Content contains (SIT)
Policy tips in Outlook Web Access (OWA) are supported for these conditions and a
- Any email attachment's content could not be scanned (DocIsUnsupported) - Document property is
-### Actions that support policty tips in Outlook Web Access
+### Actions that support policy tips in Outlook Web Access
- Restrict access or encrypt the content in Microsoft 365 locations - Set headers
Policy tips in Outlook Web Access (OWA) are supported for these conditions and a
- Modify Email Subject - Deliver the message to the hosted quarantine
-<!--### Sensitive information types that support policy tips in Outlook Web Access-->
+### Sensitive information types that support policy tips in Outlook Web Access
+
+- ABA Routing Number
+- Argentina National Identity (DNI) Number
+- Australia Bank Account Number
+- Australia Medical Account Number
+- Australia Passport Number
+- Australia Tax File Number
+- Azure DocumentDB Auth Key
+- Azure IAAS Database Connection String and Azure SQL Connection String
+- Azure IoT Connection String
+- Azure Publish Setting Password
+- Azure Redis Cache Connection String
+- Azure SAS
+- Azure Service Bus Connection String
+- Azure Storage Account Key
+- Azure Storage Account Key (Generic)
+- Belgium National Number
+- Brazil CPF Number
+- Brazil Legal Entity Number (CNPJ)
+- Brazil National ID Card (RG)
+- Canada Bank Account Number
+- Canada Driver's License Number
+- Canada Health Service Number
+- Canada Passport Number
+- Canada Personal Health Identification Number (PHIN)
+- Canada Social Insurance Number
+- Chile Identity Card Number
+- China Resident Identity Card (PRC) Number
+- Credit Card Number
+- Croatia Identity Card Number
+- Croatia Personal Identification (OIB) Number
+- Czech Personal Identity Number
+- Denmark Personal Identification Number
+- Drug Enforcement Agency (DEA) Number
+- EU Debit Card Number
+- EU Driver's License Number
+- EU National Identification Number
+- EU Passport Number
+- EU Social Security Number (SSN) or Equivalent ID
+- EU Tax Identification Number (TIN)
+- Finland National ID
+- Finland Passport Number
+- France Driver's License Number
+- France National ID Card (CNI)
+- France Passport Number
+- France Social Security Number (INSEE)
+- German Driver's License Number
+- German Passport Number
+- Germany Identity Card Number
+- Greece National ID Card
+- Hong Kong Identity Card (HKID) Number
+- India Permanent Account Number (PAN)
+- India Unique Identification (Aadhaar) Number
+- Indonesia Identity Card (KTP) Number
+- International Banking Account Number (IBAN)
+- International Classification of Diseases (ICD-10-CM)
+- International Classification of Diseases (ICD-9-CM)
+- IP Address
+- Ireland Personal Public Service (PPS) Number
+- Israel Bank Account Number
+- Israel National ID
+- Italy Driver's License Number
+- Japan Bank Account Number
+- Japan Driver's License Number
+- Japan Passport Number
+- Japan Resident Registration Number
+- Japan Social Insurance Number (SIN)
+- Japanese Residence Card Number
+- Malaysia Identity Card Number
+- Netherlands Citizen's Service (BSN) Number
+- New Zealand Ministry of Health Number
+- Norway Identity Number
+- Philippines Unified Multi-Purpose ID Number
+- Poland Identity Card
+- Poland National ID (PESEL)
+- Poland Passport
+- Portugal Citizen Card Number
+- Saudi Arabia National ID
+- Singapore National Registration Identity Card (NRIC) Number
+- South Africa Identification Number
+- South Korea Resident Registration Number
+- Spain Social Security Number (SSN)
+- SQL Server Connection String
+- Sweden National ID
+- Sweden Passport Number
+- SWIFT Code
+- Taiwan National ID
+- Taiwan Passport Number
+- Taiwan Resident Certificate (ARC/TARC)
+- Thai Population Identification Code
+- Turkish National Identification number
+- U.K. Driver's License Number
+- U.K. Electoral Roll Number
+- U.K. National Health Service Number
+- U.K. National Insurance Number (NINO)
+- U.S. / U.K. Passport Number
+- U.S. Bank Account Number
+- U.S. Driver's License Number
+- U.S. Individual Taxpayer Identification Number (ITIN)
+- U.S. Social Security Number (SSN)
## Outlook 2013 and later supports showing policy tips for only some conditions
enterprise Microsoft 365 Networking Partner Program https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/microsoft-365-networking-partner-program.md
Title: "Microsoft 365 Networking Partner Program"
+ Title: "Microsoft 365 Network Provider Program"
f1.keywords:
search.appverid: MOE150 ms.assetid: 8a113a50-0071-4155-bb8e-eba5a8dbd4c8
-description: "The Microsoft 365 Networking Partner Program allows your device to become certified as working with Microsoft 365."
+description: "The Microsoft 365 Network Provider Program allows your device to become certified as working with Microsoft 365."
hideEdit: true
-# Microsoft 365 Networking Partner Program
+# Microsoft 365 Network Provider Program
Network connectivity has a direct impact on your usersΓÇÖ ability to work quickly, collaborate effectively, and streamline business processes with Microsoft 365. For customers in any stage of their digital transformation, network design is a critical aspect that should be proactively addressed before issues negatively impact user experience.
-As customers adopt Microsoft 365 for business productivity, Microsoft has observed a common trend that network performance and the resulting end-user collaboration experience is directly influenced by network solutions in the path between the user and Microsoft 365. To help partners design optimal network solutions and help customers make informed decisions regarding such solutions, we built the Microsoft 365 Networking Partner Program.
+As customers adopt Microsoft 365 for business productivity, Microsoft has observed a common trend that network performance and the resulting end-user collaboration experience is directly influenced by network solutions in the path between the user and Microsoft 365. To help partners design optimal network solutions and help customers make informed decisions regarding such solutions, we built the Microsoft 365 Network Provider Program.
-The Microsoft 365 Networking Partner Program deepens our collaboration with network partners and identifies key products and solutions that follow Microsoft 365 networking requirements, recommendations, and best practices. The goal of the Microsoft 365 Networking Partner program is to facilitate customer ability to improve their Microsoft 365 experience through easy discovery of validated partner solutions that consistently demonstrate alignment to key principles for optimal Microsoft 365 connectivity in customer deployments.
+The Microsoft 365 Network Provider Program deepens our collaboration with network partners and identifies key products and solutions that follow Microsoft 365 networking requirements, recommendations, and best practices. The goal of the Microsoft 365 Network Provider program is to facilitate customer ability to improve their Microsoft 365 experience through easy discovery of validated partner solutions that consistently demonstrate alignment to key principles for optimal Microsoft 365 connectivity in customer deployments.
To modernize enterprise networks for great connectivity to Microsoft 365, customers often rely on network solution providers, on-premises or cloud-based security services, and system integrators to plan, design, and implement network connectivity for cloud services. Customers often ask Microsoft whether their network architecture and solutions work with Microsoft 365 and whether they align with MicrosoftΓÇÖs [Network Connectivity Principles for Microsoft 365](./microsoft-365-network-connectivity-principles.md).
-The Microsoft 365 Networking Partner Program helps answer these questions and demonstrates MicrosoftΓÇÖs commitment to help our customers build and optimize their network architecture for the best Microsoft 365 experience. The Microsoft 365 team is working with many network industry partners to help ensure that the key principles for optimal connectivity are natively built into their network product and solutions.
+The Microsoft 365 Network Provider Program demonstrates MicrosoftΓÇÖs commitment to help our customers get the best Microsoft 365 experience. The Microsoft 365 team works with many network industry partners to help ensure that key principles for optimal connectivity are natively built into their network product and solutions.
-The Microsoft 365 Networking Partner Program designates qualified networking solutions as ΓÇ£Works with Microsoft 365ΓÇ¥. Only devices or solutions that meet MicrosoftΓÇÖs rigorous testing requirements, have seamless experiences with setup, and demonstrate a high-quality networking experience when used with Microsoft 365 will receive the ΓÇ£Works with Microsoft 365ΓÇ¥ designation. These validated partner solutions are listed on the [Microsoft 365 networking partners page](https://cloudpartners.transform.microsoft.com/m365networkingpartners), along with solution details and links to learn more.
+The Microsoft 365 Network Provider program is in preview for a limited number of network providers. If you are interested in participating in the preview to give early feedback on the program, please register your interest by [filling out the form](https://aka.ms/NPPproviderpreview).
includes Microsoft 365 Content Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/microsoft-365-content-updates.md
+## Week of May 15, 2023
++
+| Published On |Topic title | Change |
+|||--|
+| 5/15/2023 | [Configure Microsoft Defender for Endpoint on iOS features](/microsoft-365/security/defender-endpoint/ios-configure-features?view=o365-worldwide) | modified |
+| 5/15/2023 | [Deploy Microsoft Defender for Endpoint on iOS with Mobile Application Management](/microsoft-365/security/defender-endpoint/ios-install-unmanaged?view=o365-worldwide) | modified |
+| 5/15/2023 | [Automatic attack disruption in Microsoft 365 Defender](/microsoft-365/security/defender/automatic-attack-disruption?view=o365-worldwide) | modified |
+| 5/15/2023 | [Configure Microsoft Syntex for pay-as-you-go billing](/microsoft-365/syntex/syntex-azure-billing) | modified |
+| 5/15/2023 | [Top 10 ways to secure your business data with Microsoft 365 for business](/microsoft-365/business-premium/secure-your-business-data?view=o365-worldwide) | modified |
+| 5/15/2023 | [What's new in Microsoft Defender for Endpoint on Mac](/microsoft-365/security/defender-endpoint/mac-whatsnew?view=o365-worldwide) | modified |
+| 5/16/2023 | [Permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/microsoft-365-compliance-center-permissions?view=o365-worldwide) | modified |
+| 5/16/2023 | [Adaptive scopes](/microsoft-365/compliance/purview-adaptive-scopes?view=o365-worldwide) | modified |
+| 5/16/2023 | [Preset security policies](/microsoft-365/security/office-365-security/preset-security-policies?view=o365-worldwide) | modified |
+| 5/16/2023 | [User tags in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/user-tags-about?view=o365-worldwide) | modified |
+| 5/16/2023 | [Check the device health at Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/check-sensor-status?view=o365-worldwide) | modified |
+| 5/16/2023 | [Salesforce connector setup for Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager-connectors-salesforce?view=o365-worldwide) | added |
+| 5/16/2023 | [Zoom connector setup for Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager-connectors-zoom?view=o365-worldwide) | added |
+| 5/16/2023 | [Connectors for Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager-connectors?view=o365-worldwide) | added |
+| 5/17/2023 | [Custom functions in the advanced hunting schema](/microsoft-365/security/defender/advanced-hunting-custom-functions?view=o365-worldwide) | added |
+| 5/17/2023 | [Deploy and manage Office Add-ins](/microsoft-365/admin/manage/office-addins?view=o365-worldwide) | added |
+| 5/17/2023 | [SaaS linked apps](/microsoft-365/admin/manage/saas-linked-apps?view=o365-worldwide) | added |
+| 5/17/2023 | [Teams apps that work on Outlook and Microsoft 365](/microsoft-365/admin/manage/teams-apps-work-on-outlook-and-m365?view=o365-worldwide) | added |
+| 5/17/2023 | [Teams apps that only work on Teams](/microsoft-365/admin/manage/teams-apps-work-only-on-teams?view=o365-worldwide) | added |
+| 5/17/2023 | [Enable admin notifications in insider risk management](/microsoft-365/compliance/insider-risk-management-settings-admin-notifications?view=o365-worldwide) | added |
+| 5/17/2023 | [Export insider risk management alert information](/microsoft-365/compliance/insider-risk-management-settings-alerts?view=o365-worldwide) | added |
+| 5/17/2023 | [Enable analytics in insider risk management](/microsoft-365/compliance/insider-risk-management-settings-analytics?view=o365-worldwide) | added |
+| 5/17/2023 | [Configure inline alert customization in insider risk management](/microsoft-365/compliance/insider-risk-management-settings-inline-alert-customization?view=o365-worldwide) | added |
+| 5/17/2023 | [Configure intelligent detections in insider risk management](/microsoft-365/compliance/insider-risk-management-settings-intelligent-detections?view=o365-worldwide) | added |
+| 5/17/2023 | [Configure policy indicators in insider risk management](/microsoft-365/compliance/insider-risk-management-settings-policy-indicators?view=o365-worldwide) | added |
+| 5/17/2023 | [Set policy timeframes in insider risk management](/microsoft-365/compliance/insider-risk-management-settings-policy-timeframes?view=o365-worldwide) | added |
+| 5/17/2023 | [Automate insider risk management actions with Microsoft Power Automate flows (preview)](/microsoft-365/compliance/insider-risk-management-settings-power-automate?view=o365-worldwide) | added |
+| 5/17/2023 | [Identify priority physical assets for insider risk management policies](/microsoft-365/compliance/insider-risk-management-settings-priority-physical-assets?view=o365-worldwide) | added |
+| 5/17/2023 | [Prioritize user groups for insider risk management policies](/microsoft-365/compliance/insider-risk-management-settings-priority-user-groups?view=o365-worldwide) | added |
+| 5/17/2023 | [Manage username privacy in insider risk management](/microsoft-365/compliance/insider-risk-management-settings-privacy?view=o365-worldwide) | added |
+| 5/17/2023 | [Enable Microsoft Teams for collaborating on insider risk management cases](/microsoft-365/compliance/insider-risk-management-settings-teams?view=o365-worldwide) | added |
+| 5/17/2023 | [Use DMARC Reports to protect against spoofing and phishing in Microsoft Office 365](/microsoft-365/security/office-365-security/email-authentication-dmarc-reports?view=o365-worldwide) | added |
+| 5/17/2023 | [Learn about insider risk management settings](/microsoft-365/compliance/insider-risk-management-settings?view=o365-worldwide) | modified |
+| 5/17/2023 | [Enable controlled folder access](/microsoft-365/security/defender-endpoint/enable-controlled-folders?view=o365-worldwide) | modified |
+| 5/17/2023 | [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint?view=o365-worldwide) | modified |
+| 5/17/2023 | [Get started using Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-get-started?view=o365-worldwide) | modified |
+| 5/17/2023 | [Microsoft Defender for Office 365 permissions in the Microsoft 365 Defender portal](/microsoft-365/security/office-365-security/mdo-portal-permissions?view=o365-worldwide) | modified |
+| 5/18/2023 | Allotment basics | removed |
+| 5/18/2023 | [Prioritize incidents in Microsoft 365 Defender](/microsoft-365/security/defender/incident-queue?view=o365-worldwide) | modified |
+| 5/18/2023 | [Data Loss Prevention policy reference](/microsoft-365/compliance/dlp-policy-reference?view=o365-worldwide) | modified |
+| 5/18/2023 | [Take response actions on a device in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/respond-machine-alerts?view=o365-worldwide) | modified |
+| 5/18/2023 | [Preset security policies](/microsoft-365/security/office-365-security/preset-security-policies?view=o365-worldwide) | modified |
+| 5/19/2023 | [Remove blocked connectors from the Restricted entities page in Microsoft 365](/microsoft-365/security/office-365-security/connectors-remove-blocked?view=o365-worldwide) | modified |
+| 5/19/2023 | [Remove blocked users from the Restricted entities page](/microsoft-365/security/office-365-security/removing-user-from-restricted-users-portal-after-spam?view=o365-worldwide) | modified |
+| 5/19/2023 | [Responding to a Compromised Email Account](/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account?view=o365-worldwide) | modified |
+| 5/19/2023 | [Create and deploy a data loss prevention policy](/microsoft-365/compliance/dlp-create-deploy-policy?view=o365-worldwide) | modified |
+| 5/19/2023 | [Data Loss Prevention policy reference](/microsoft-365/compliance/dlp-policy-reference?view=o365-worldwide) | modified |
+| 5/19/2023 | [Get started with communication compliance](/microsoft-365/compliance/communication-compliance-configure?view=o365-worldwide) | modified |
+| 5/19/2023 | [Working with improvement actions in Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager-improvement-actions?view=o365-worldwide) | modified |
+| 5/19/2023 | [Data Loss Prevention policy tips reference](/microsoft-365/compliance/dlp-policy-tips-reference?view=o365-worldwide) | modified |
+| 5/19/2023 | [Assign eDiscovery permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/ediscovery-assign-permissions?view=o365-worldwide) | modified |
+| 5/19/2023 | [Get started with eDiscovery (Premium)](/microsoft-365/compliance/ediscovery-premium-get-started?view=o365-worldwide) | modified |
+| 5/19/2023 | [Get started with eDiscovery (Standard)](/microsoft-365/compliance/ediscovery-standard-get-started?view=o365-worldwide) | modified |
++ ## Week of May 08, 2023
| 4/21/2023 | [Learn about assessment templates in Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager-templates?view=o365-worldwide) | modified | | 4/21/2023 | [Onboard Windows 10 or Windows 11 devices into Microsoft 365 overview](/microsoft-365/compliance/device-onboarding-overview?view=o365-worldwide) | modified | | 4/21/2023 | [Onboard non-Windows devices to the Microsoft Defender for Endpoint service](/microsoft-365/security/defender-endpoint/configure-endpoints-non-windows?view=o365-worldwide) | modified |--
-## Week of April 10, 2023
--
-| Published On |Topic title | Change |
-|||--|
-| 4/10/2023 | [Limits for Content search and eDiscovery (Standard) in the Microsoft Purview compliance portal](/microsoft-365/compliance/ediscovery-limits-for-content-search?view=o365-worldwide) | modified |
-| 4/10/2023 | [Automated investigation and response in Microsoft 365 Defender](/microsoft-365/security/defender/m365d-autoir?view=o365-worldwide) | modified |
-| 4/10/2023 | Configure a team with security isolation in a dev/test environment | removed |
-| 4/10/2023 | Test Lab Guides for solutions and scenarios | removed |
-| 4/10/2023 | [Deploy a connector to archive Facebook Business pages data](/microsoft-365/compliance/archive-facebook-data?view=o365-worldwide) | renamed |
-| 4/10/2023 | [Use data connectors to import and archive third-party data in Microsoft 365](/microsoft-365/compliance/archive-third-party-data?view=o365-worldwide) | renamed |
-| 4/10/2023 | [Deploy a connector to archive Twitter data](/microsoft-365/compliance/archive-twitter-data?view=o365-worldwide) | renamed |
-| 4/10/2023 | Prepare for Office client deployment with Microsoft 365 Business Premium | removed |
-| 4/10/2023 | [Microsoft 365 Business Premium - Productivity and security](/microsoft-365/business-premium/m365bp-secure-users?view=o365-worldwide) | modified |
-| 4/10/2023 | [Set up Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-setup?view=o365-worldwide) | modified |
-| 4/10/2023 | [Set up a connector to archive Twitter data](/microsoft-365/compliance/archive-twitter-data-with-sample-connector?view=o365-worldwide) | modified |
-| 4/10/2023 | [Get started using Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-get-started?view=o365-worldwide) | modified |
-| 4/10/2023 | [Enable block at first sight to detect malware in seconds](/microsoft-365/security/defender-endpoint/configure-block-at-first-sight-microsoft-defender-antivirus?view=o365-worldwide) | modified |
-| 4/10/2023 | [Address false positives/negatives in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/defender-endpoint-false-positives-negatives?view=o365-worldwide) | modified |
-| 4/10/2023 | [Turn on cloud protection in Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus?view=o365-worldwide) | modified |
-| 4/11/2023 | [Use the Microsoft 365 admin center to manage your Shifts connection to Blue Yonder Workforce Management (Preview)](/microsoft-365/frontline/shifts-connector-blue-yonder-admin-center-manage?view=o365-worldwide) | modified |
-| 4/11/2023 | [Use the Microsoft 365 admin center to manage your Shifts connection to UKG Dimensions (Preview)](/microsoft-365/frontline/shifts-connector-ukg-admin-center-manage?view=o365-worldwide) | modified |
-| 4/11/2023 | [Use PowerShell to manage your Shifts connection to UKG Dimensions](/microsoft-365/frontline/shifts-connector-ukg-powershell-manage?view=o365-worldwide) | modified |
-| 4/11/2023 | [Use the Shifts connector wizard to connect Shifts to UKG Dimensions (Preview)](/microsoft-365/frontline/shifts-connector-wizard-ukg?view=o365-worldwide) | modified |
-| 4/11/2023 | [Configure and validate Microsoft Defender Antivirus network connections](/microsoft-365/security/defender-endpoint/configure-network-connections-microsoft-defender-antivirus?view=o365-worldwide) | modified |
-| 4/11/2023 | [Create indicators](/microsoft-365/security/defender-endpoint/manage-indicators?view=o365-worldwide) | modified |
-| 4/11/2023 | [Get started using Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-get-started?view=o365-worldwide) | modified |
-| 4/11/2023 | [Microsoft Defender Antivirus security intelligence and product updates](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates?view=o365-worldwide) | modified |
-| 4/11/2023 | [Get started with eDiscovery (Premium)](/microsoft-365/compliance/ediscovery-premium-get-started?view=o365-worldwide) | modified |
-| 4/11/2023 | [Enable the Report Message or the Report Phishing add-ins](/microsoft-365/security/office-365-security/submissions-users-report-message-add-in-configure?view=o365-worldwide) | modified |
-| 4/12/2023 | [Overview of the Microsoft Feed](/microsoft-365/ms-feed/m365-feed?view=o365-worldwide) | added |
-| 4/12/2023 | [Set up compliance boundaries for eDiscovery investigations](/microsoft-365/compliance/ediscovery-set-up-compliance-boundaries?view=o365-worldwide) | modified |
-| 4/12/2023 | [Migrate the Azure Information Protection (AIP) add-in to Microsoft Purview Information Protection built-in labeling for Office apps](/microsoft-365/compliance/sensitivity-labels-aip?view=o365-worldwide) | modified |
-| 4/12/2023 | [Minimum versions for sensitivity labels in Microsoft 365 Apps](/microsoft-365/compliance/sensitivity-labels-versions?view=o365-worldwide) | modified |
-| 4/12/2023 | [Cloud protection and Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/cloud-protection-microsoft-defender-antivirus?view=o365-worldwide) | modified |
-| 4/12/2023 | [Turn on cloud protection in Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus?view=o365-worldwide) | modified |
-| 4/12/2023 | [What's new in Microsoft Defender for Endpoint on Linux](/microsoft-365/security/defender-endpoint/linux-whatsnew?view=o365-worldwide) | modified |
-| 4/12/2023 | Why cloud protection should be enabled for Microsoft Defender Antivirus | removed |
-| 4/12/2023 | [Global settings in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-settings?view=o365-worldwide) | modified |
-| 4/12/2023 | [Training campaigns in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-training-campaigns?view=o365-worldwide) | modified |
-| 4/12/2023 | [Training modules for Training campaigns in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-training-modules?view=o365-worldwide) | modified |
-| 4/12/2023 | [Quarantined email messages](/microsoft-365/security/office-365-security/quarantine-about?view=o365-worldwide) | modified |
-| 4/12/2023 | [Manage quarantined messages and files as an admin](/microsoft-365/security/office-365-security/quarantine-admin-manage-messages-files?view=o365-worldwide) | modified |
-| 4/12/2023 | [Find and release quarantined messages as a user](/microsoft-365/security/office-365-security/quarantine-end-user?view=o365-worldwide) | modified |
-| 4/12/2023 | [Quarantine policies](/microsoft-365/security/office-365-security/quarantine-policies?view=o365-worldwide) | modified |
-| 4/12/2023 | Overview of Copilot for Microsoft Syntex | removed |
-| 4/12/2023 | [Create and manage communication compliance policies](/microsoft-365/compliance/communication-compliance-policies?view=o365-worldwide) | modified |
-| 4/13/2023 | [Quarantine policies](/microsoft-365/security/office-365-security/quarantine-policies?view=o365-worldwide) | modified |
-| 4/13/2023 | [Quarantine notifications (end-user spam notifications) in Microsoft 365](/microsoft-365/security/office-365-security/quarantine-quarantine-notifications?view=o365-worldwide) | modified |
-| 4/13/2023 | [Microsoft Purview setup guides](/microsoft-365/compliance/purview-fast-track-setup-guides?view=o365-worldwide) | added |
-| 4/13/2023 | [Use Content search for targeted collections](/microsoft-365/compliance/ediscovery-use-content-search-for-targeted-collections?view=o365-worldwide) | modified |
-| 4/13/2023 | [Allow or block URLs using the Tenant Allow/Block List](/microsoft-365/security/office-365-security/tenant-allow-block-list-urls-configure?view=o365-worldwide) | modified |
-| 4/14/2023 | [Configure Microsoft Defender for Endpoint on iOS features](/microsoft-365/security/defender-endpoint/ios-configure-features?view=o365-worldwide) | modified |
-| 4/14/2023 | [Microsoft recommendations for EOP and Defender for Office 365 security settings](/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365?view=o365-worldwide) | modified |
-| 4/14/2023 | [Secure managed and unmanaged devices](/microsoft-365/business-premium/m365bp-managed-unmanaged-devices?view=o365-worldwide) | added |
-| 4/14/2023 | [Set up unmanaged devices overview](/microsoft-365/business-premium/m365bp-devices-overview?view=o365-worldwide) | modified |
-| 4/14/2023 | [Protect unmanaged Windows PCs and Macs in Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-protect-pcs-macs?view=o365-worldwide) | modified |
security Linux Exclusions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-exclusions.md
Process|A specific process (specified either by the full path or file name) and
File, folder, and process exclusions support the following wildcards:
-Wildcard|Description|Example|Matches|Does not match
-||||
-\*|Matches any number of any characters including none (note that when this wildcard is used inside a path it will substitute only one folder)|`/var/*/*.log`|`/var/log/system.log`|`/var/log/nested/system.log`
-?|Matches any single character|`file?.log`|`file1.log`<br/>`file2.log`|`file123.log`
+Wildcard|Description|Examples|
+||
+\*|Matches any number of any characters including none (note if this wildcard is not used at the end of the path then it will substitute only one folder)| `/var/*/tmp` includes any file in `/var/abc/tmp` and its subdirectories, and `/var/def/tmp` and its subdirectories. It does not include `/var/abc/log` or `/var/def/log` <p> <p> `/var/*/` includes any file in `/var` and its subdirectories.
+?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not`file123.log`
+> [!NOTE]
+> When using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
## How to configure the list of exclusions
Examples:
- Add an exclusion for a folder with a wildcard in it: ```bash
- mdatp exclusion folder add --path "/var/*/"
+ mdatp exclusion folder add --path "/var/*/tmp"
``` > [!NOTE]
- > This will only exclude paths one level below */var/*, but not folders which are more deeply nested; for example, */var/this-subfolder/but-not-this-subfolder*.
+ > This will only exclude paths below */var/\*/tmp/*, but not folders which are siblings of *tmp*; for example, */var/this-subfolder/tmp*, but not */var/this-subfolder/log*.
```bash mdatp exclusion folder add --path "/var/" ```
+ OR
+ ```bash
+ mdatp exclusion folder add --path "/var/*/"
+ ```
+
> [!NOTE] > This will exclude all paths whose parent is */var/*; for example, */var/this-subfolder/and-this-subfolder-as-well*.
security Linux Preferences https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-preferences.md
The following configuration profile contains entries for all settings described
```JSON { "antivirusEngine":{
- "enforcementLevel":"real_time",
+ "enforcementLevel":"passive",
"scanAfterDefinitionUpdate":true, "scanArchives":true, "maximumOnDemandScanThreads":2,
The following configuration profile contains entries for all settings described
"restore" ], "nonExecMountPolicy":"unmute",
- "unmonitoredFilesystems": ["nfs"],
+ "unmonitoredFilesystems": ["nfs,fuse"],
"threatTypeSettingsMergePolicy":"merge", "threatTypeSettings":[ {
security Linux Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-whatsnew.md
sudo systemctl disable mdatp
&ensp;Signature version: **1.379.1299.0**<br/> **What's new**-- This new release is build over March 2023 release (101.98.05) with fix for Live response commands failing for one of our customers. There is no change for other customers and upgrade is optional.
+- This new release is build over March 2023 release (101.98.05) with fix for Live response commands failing for one of our customers. There's no change for other customers and upgrade is optional.
**Known issues**
sudo systemctl disable mdatp
- V2 engine is default with this release and V1 engine bits are completely removed for enhanced security. - V2 engine support configuration path for AV definitions. (mdatp definition set path) - Removed external packages dependencies from MDE package. Removed dependencies are libatomic1, libselinux, libseccomp, libfuse, and libuuid
- - In case crash collection is disabled by configuration, crash monitoring process will not be launched.
+ - In case crash collection is disabled by configuration, crash monitoring process won't be launched.
- Performance fixes to optimally use system events for AV capabilities. - Stability improvement in case of mdatp restart and loading of epsext issues. - Other fixes
sudo systemctl disable mdatp
**What's new** -- Fixes a kernel hang observed on select customer workloads running mdatp version 101.75.43. After RCA this was attributed to a race condition while releasing the ownership of a sensor file descriptor. The race condition was exposed due to a recent product change in the shutdown path. Customers on newer Kernel versions (5.1+) are not impacted by this issue. More information about the underlying issue can be found at [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
+- Fixes a kernel hang observed on select customer workloads running mdatp version 101.75.43. After RCA this was attributed to a race condition while releasing the ownership of a sensor file descriptor. The race condition was exposed due to a recent product change in the shutdown path. Customers on newer Kernel versions (5.1+) aren't impacted by this issue. More information about the underlying issue can be found at [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
**Known issues**
security Mac Exclusions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-exclusions.md
Process|A specific process (specified either by the full path or file name) and
File, folder, and process exclusions support the following wildcards:
-Wildcard|Description|Example|Matches|Does not match
-||||
-\*|Matches any number of any characters including none (note that when this wildcard is used inside a path it will substitute only one folder)|`/var/*/*.log`|`/var/log/system.log`|`/var/log/nested/system.log`
-?|Matches any single character|`file?.log`|`file1.log` <p> `file2.log`|`file123.log`
+Wildcard|Description|Examples|
+||
+\*|Matches any number of any characters including none (note if this wildcard is not used at the end of the path then it will substitute only one folder)| `/var/*/tmp` includes any file in `/var/abc/tmp` and its subdirectories, and `/var/def/tmp` and its subdirectories. It does not include `/var/abc/log` or `/var/def/log` <p> <p> `/var/*/` includes any file in `/var` and its subdirectories.
+?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not`file123.log`
+> [!NOTE]
+> When using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
+ > [!NOTE] > The product attempts to resolve firmlinks when evaluating exclusions. Firmlink resolution does not work when the exclusion contains wildcards or the target file (on the `Data` volume) does not exist.
security Connectors Detect Respond To Compromise https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connectors-detect-respond-to-compromise.md
description: Learn how to recognize and respond to a compromised connector in Mi
search.appverid: met150 Previously updated : 12/01/2022 Last updated : 5/22/2023 # Respond to a compromised connector
Last updated 12/01/2022
- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
-Connectors are used for enabling mail flow between Microsoft 365 or Office 365 and email servers that you have in your on-premises environment. For more information, see [Configure mail flow using connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/use-connectors-to-configure-mail-flow).
+Connectors are used for enabling mail flow between Microsoft 365 and email servers that you have in your on-premises environment. For more information, see [Configure mail flow using connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/use-connectors-to-configure-mail-flow).
-A compromised inbound connector is defined as when an unauthorized individual either applies change(s) to an existing inbound connector or creates a new inbound connector in a Microsoft 365 tenant, with the intention of sending spam or phish emails. Note that this is applicable only to inbound connectors of type OnPremises.
+An inbound connector with the **Type** value `OnPremises` is considered compromised when an attacker creates a new connector or modifies and existing connector to send spam or phishing email.
-## Detect a compromised connector
+This article explains the symptoms of a compromised connector and how to regain control of it.
-Here are some of the characteristics of a compromised connector:
+## Symptoms of a compromised connector
-- Sudden spike in outbound mail volume.
+A compromised connector exhibits one or more of the following characteristics:
-- Mismatch between P1 and P2 senders in outbound mails. For more information on P1 and P2 senders, see [How EOP validates the From address to prevent phishing](anti-phishing-from-email-address-validation.md#an-overview-of-email-message-standards).
+- A sudden spike in outbound mail volume.
+- A mismatch between the `5321.MailFrom` address (also known as the **MAIL FROM** address, P1 sender, or envelope sender) and the `5322.From` address (also known as the From address or P2 sender) in outbound email. For more information about these senders, see [How EOP validates the From address to prevent phishing](anti-phishing-from-email-address-validation.md#an-overview-of-email-message-standards).
+- Outbound mail sent from a domain that isn't provisioned or registered.
+- The connector is blocked from sending or relaying mail.
+- The presence of an inbound connector that wasn't created by an admin.
+- Unauthorized changes in the configuration of an existing connector (for example, the name, domain name, and IP address).
+- A recently compromised admin account. Creating or editing connectors requires admin access.
-- Outbound mails sent from a domain that isn't provisioned or registered.--- The connector is blocked from sending relaying mail.--- The presence of an inbound connector wasn't created by the intended user or the administrator.--- Unauthorized change(s) in existing connector configuration, such as name, domain name, and IP address.--- A recently compromised administrator account. Note that you can edit connector configuration only if you have administrative access.
+If you see these symptoms or other unusual symptoms, you should investigate.
## Secure and restore email function to a suspected compromised connector
-You must complete all the following steps to regain access to your connector. These steps help you remove any back-door entries that may have been added to your connector.
+Do **all** of the following steps to regain control of the connector. Go through the steps as soon as you suspect a problem and as quickly as possible to make sure that the attacker doesn't resume control of the connector. These steps also help you remove any back-door entries that the attacker might have added to the connector.
### Step 1: Identify if an inbound connector has been compromised #### Review recent suspicious connector traffic or related messages
-If you have [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md), go directly to <https://security.microsoft.com/threatexplorer>.
+In [Microsoft Defender for Office 365 Plan 2](defender-for-office-365.md), open the Microsoft 365 Defender portal at <https://security.microsoft.com> and go to **Explorer**. Or, to go directly to the **Explorer** page, use <https://security.microsoft.com/threatexplorer>.
-1. Select **Connector**, insert **Connector Name**, select date range, and then click **Refresh**.
+1. On the **Explorer** page, verify that the **All email** tab is selected and then configure the following options:
+ - Select the date/time range.
+ - Select **Connector**.
+ - Enter the connector name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box.
+ - Select **Refresh**.
:::image type="content" source="../../media/connector-compromise-explorer.png" alt-text="Inbound connector explorer view" lightbox="../../media/connector-compromise-explorer.png":::
-2. Identify if there's any abnormal spike or dip in email traffic.
+2. Look for abnormal spikes or dips in email traffic.
:::image type="content" source="../../media/connector-compromise-abnormal-spike.png" alt-text="Number of emails delivered to junk folder" lightbox="../../media/connector-compromise-abnormal-spike.png":::
-3. Identify:
-
- - If **Sender IP** matches with your organization's on-premises IP address.
-
- - If a significant number of emails were recently sent to the **Junk** folder. This is a good indicator of a compromised connector being used to send spam.
-
- - If the recipients are the ones that your organization usually stays in contact with.
+3. Answer the following questions:
+ - Does the **Sender IP** match your organization's on-premises IP address?
+ - Were a significant number of recent messages sent to the **Junk Email** folder? This result clearly indicates that a compromised connector was used to send spam.
+ - Is it reasonable for the message recipients to receive email from senders in your organization?
:::image type="content" source="../../media/connector-compromise-sender-ip.png" alt-text="Sender IP and your organization's on-prem IP address" lightbox="../../media/connector-compromise-sender-ip.png":::
-If you have [Microsoft Defender for Office 365 Plan 1](defender-for-office-365.md) or [Exchange Online Protection](eop-about.md), go to <https://admin.exchange.microsoft.com/#/messagetrace>.
+In [Microsoft Defender for Office 365 Plan 1](defender-for-office-365.md) or [Exchange Online Protection](eop-about.md), use **Alerts** and **Message trace** to look for the symptoms of connector compromise:
+
+1. Open the Defender portal at <https://security.microsoft.com> and go to **Incidents & alerts** \> **Alerts**. Or, to go directly to the **Alerts** page, useOpen **Suspicious connector activity** alert in <https://security.microsoft.com/alerts>.
-1. Open **Suspicious connector activity** alert in <https://security.microsoft.com/alerts>.
+2. On the **Alerts** page, use the :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** \> **Policy** \> **Suspicious connector activity** to find any alerts related to suspicious connector activity.
-2. Select an activity under **Activity list**, and copy suspicious **connector domain** and **IP address** detected in the alert.
+3. Select a suspicious connector activity alert by clicking anywhere in the row other than the check box next to the name. On the details page that opens, select an activity under **Activity list**, and copy the **Connector domain** and **IP address** values from the alert.
:::image type="content" source="../../media/connector-compromise-outbound-email-details.png" alt-text="Connector compromise outbound email details" lightbox="../../media/connector-compromise-outbound-email-details.png":::
-3. Search by using **connector domain** and **IP address** in [**Message trace**](https://admin.exchange.microsoft.com/#/messagetrace).
+4. Open the Exchange admin center at <https://admin.exchange.microsoft.com> and go to **Mail flow** \> **Message trace**. Or, to go directly to the **Message trace** page, use <https://admin.exchange.microsoft.com/#/messagetrace>.
- :::image type="content" source="../../media/connector-compromise-new-message-trace.png" alt-text="New message trace flyout" lightbox="../../media/connector-compromise-new-message-trace.png":::
+ On the **Message trace** page, select the **Custom queries** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Start a trace**, and use the **Connector domain** and **IP address** values from the previous step.
-4. In the **Message trace** search results, identify:
+ For more information about message trace, see [Message trace in the modern Exchange admin center in Exchange Online](/exchange/monitoring/trace-an-email-message/message-trace-modern-eac).
- - If a significant number of emails were recently marked as **FilteredAsSpam**. This is a good indicator of a compromised connector being used to send spam.
+ :::image type="content" source="../../media/connector-compromise-new-message-trace.png" alt-text="New message trace flyout" lightbox="../../media/connector-compromise-new-message-trace.png":::
- - If the recipients are the ones that your organization usually stays in contact with.
+4. In the message trace results, look for the following information:
+ - A significant number of messages were recently marked as **FilteredAsSpam**. This result clearly indicates that a compromised connector was used to send spam.
+ - Whether it's reasonable for the message recipients to receive email from senders in your organization
- :::image type="content" source="../../media/connector-compromise-message-trace-results.png" alt-text="New message trace search results" lightbox="../../media/connector-compromise-message-trace-results.png":::
+ :::image type="content" source="../../media/connector-compromise-message-trace-results.png" alt-text="New message trace search results" lightbox="../../media/connector-compromise-message-trace-results.png":::
#### Investigate and validate connector-related activity
-Use the following command line in PowerShell to investigate and validate connector-related activity by a user in the audit log. For more information, see [Use a PowerShell script to search the audit log](/compliance/audit-log-search-script).
+In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), replace \<StartDate\> and \<EndDate\> with your values, and then run the following command to find and validate admin-related connector activity in the audit log. For more information, see [Use a PowerShell script to search the audit log](/compliance/audit-log-search-script).
```powershell
-Search-UnifiedAuditLog -StartDate "<ExDateTime>" -EndDate "<ExDateTime>" -Operations "New-InboundConnector", "Set-InboundConnector", "Remove-InboundConnector
+Search-UnifiedAuditLog -StartDate "<ExDateTime>" -EndDate "<ExDateTime>" -Operations "New-InboundConnector","Set-InboundConnector","Remove-InboundConnector
```
+For detailed syntax and parameter information, see [Search-UnifiedAuditLog](/powershell/module/exchange/search-unifiedauditlog).
+ ### Step 2: Review and revert unauthorized change(s) in a connector
-1. Sign into <https://admin.exchange.microsoft.com/>.
+Open the Exchange admin center at <https://admin.exchange.microsoft.com> and go to **Mail flow** \> **Connectors**. Or, to go directly to the **Connectors** page, use <https://admin.exchange.microsoft.com/#/connectors>.
-2. Review and revert unauthorized connector change(s).
+On the **Connectors** page, review the list of connectors. Remove or turn off any unknown connectors, and check each connector for unauthorized configuration changes.
### Step 3: Unblock the connector to re-enable mail flow
-1. Sign into <https://security.microsoft.com/restrictedentities>.
-
-2. Select the restricted connector to unblock the connector.
+After you've regained control of the compromised connector, unblock the connector on the **Restricted entities** page in the Defender portal. For instructions, see [Remove blocked connectors from the Restricted entities page](connectors-remove-blocked.md).
-### Step 4: Investigate and remediate potentially compromised administrative user account
+### Step 4: Investigate and remediate potentially compromised admin accounts
-If a user with an unauthorized connector activity is identified, you can investigate this user for potential compromise. For more information, see [Responding to a Compromised Email Account](responding-to-a-compromised-email-account.md).
+After you identify the admin account that was responsible for the unauthorized connector configuration activity, investigate the admin account for compromise. For instructions, see [Responding to a Compromised Email Account](responding-to-a-compromised-email-account.md).
## More information
security Mdo Portal Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-portal-permissions.md
Last updated 5/17/2023
Global roles in Azure Active Directory (Azure AD) allow you to manage permissions and access to capabilities in all of Microsoft 365, which also includes Microsoft Defender for Office 365. But, if you need to limit permissions and capabilities to security features in Defender for Office 365 only, you can assign **Email & collaboration** permissions in the Microsoft 365 Defender portal.
-To manage Defender for Office 365 permissions in the Microsoft 365 Defender portal, go to **Permissions & roles** \> expand **Email & collaboration roles** \> select **Roles** or go directly to <https://security.microsoft.com/securitypermissions>. You need to be a **Global administrator** or a member of the **Organization Management** role group in Defender for Office 365 permissions. Specifically, the **Role Management** role in Defender for Office 365 allows users to view, create, and modify Defender for Office 365 role groups. By default, that role is assigned only to the **Organization Management** role group (and by extension, global administrators).
+To manage Defender for Office 365 permissions in the Microsoft 365 Defender portal, go to **Permissions** \> **Email & collaboration roles** \> **Roles** or go directly to <https://security.microsoft.com/emailandcollabpermissions>.
+
+You need to be member of the **Global Administrator** role in Azure AD or a member of the **Organization Management** role group in Defender for Office 365 permissions. Specifically, the **Role Management** role in Defender for Office 365 allows users to view, create, and modify Defender for Office 365 role groups. By default, that role is assigned only to the **Organization Management** role group (and by extension, global administrators).
> [!NOTE] > Some Defender for Office 365 features require additional permissions in Exchange Online. For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
Defender for Office 365 permissions in the Microsoft 365 Defender portal include
## Roles and role groups in the Microsoft 365 Defender portal
-The following types of roles and role groups are available in on the **Permissions & roles** page at <https://security.microsoft.com/securitypermissions> in the Microsoft 365 Defender portal:
+On the **Permissions** page in the Defender portal at <https://security.microsoft.com/securitypermissions>, the following types of roles and role groups are available:
- **Azure AD roles**: You can view the roles and assigned users, but you can't manage them directly in the Microsoft 365 Defender portal. Azure AD roles are central roles that assign permissions for **all** Microsoft 365 services.
security Migrate To Defender For Office 365 Onboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-onboard.md
description: "Complete the steps for migrating from a third-party protection service or device to Microsoft Defender for Office 365 protection." Previously updated : 1/31/2023 Last updated : 5/22/2023 # Migrate to Microsoft Defender for Office 365 - Phase 3: Onboard
Last updated 1/31/2023
<br>
-|[![Phase 1: Prepare.](../../medi)|![Phase 3: Onboard.](../../media/phase-diagrams/onboard.png) <br> Phase 3: Onboard|
+|[:::image type="content" source="../../medi)|:::image type="content" source="../../media/phase-diagrams/onboard.png" alt-text="Phase 3: Onboard." lightbox="../../media/phase-diagrams/onboard.png"::: <br> Phase 3: Onboard|
|||| |||*You are here!*|
Welcome to **Phase 3: Onboard** of your **[migration to Microsoft Defender for O
## Step 1: Begin onboarding Security Teams
-If your organization has a security response team, now is the time to begin integrating Microsoft Defender for Office 365 into your response processes, including ticketing systems. This is an entire topic unto itself, but it's sometimes overlooked. Getting the security response team involved early will ensure that your organization is ready to deal with threats when you switch your MX records. Incident response needs to be well equipped to handle the following tasks:
+If your organization has a security response team, now is the time to begin integrating Microsoft Defender for Office 365 into your response processes, including ticketing systems. This process is an entire topic unto itself, but it's sometimes overlooked. Getting the security response team involved early ensures that your organization is ready to deal with threats when you switch your MX records. Incident response needs to be well equipped to handle the following tasks:
- Learn the new tools and integrate them into existing flows. For example: - Admin management of quarantined messages is important. For instructions, see [Manage quarantined messages and files as an admin](quarantine-admin-manage-messages-files.md).
For more information about integrating with your SIEM/SOAR, see the following ar
- [Advanced Hunting API](/microsoft-365/security/defender/api-advanced-hunting) - [Incidents APIs](/microsoft-365/security/defender/api-incident)
-If your organization does not have a security response team or existing process flows, you can use this time to familiarize yourself with basic hunting and response features in Defender for Office 365. For more information, see [Threat investigation and response](office-365-ti.md).
+If your organization doesn't have a security response team or existing process flows, you can use this time to familiarize yourself with basic hunting and response features in Defender for Office 365. For more information, see [Threat investigation and response](office-365-ti.md).
### RBAC roles
-Permissions in Defender for Office 365 is based on role-based access control (RBAC) and is explained in Permissions in the [Microsoft 365 Defender portal](mdo-portal-permissions.md). These are the important points to keep in mind:
+Permissions in Defender for Office 365 are based on role-based access control (RBAC) and is explained in Permissions in the [Microsoft 365 Defender portal](mdo-portal-permissions.md). Here are the important points to keep in mind:
- Azure AD roles give permissions to **all** workloads in Microsoft 365. For example, if you add a user to the Security Administrator in the Azure portal, they have Security Administrator permissions everywhere. - Email & collaboration roles in the Microsoft 365 Defender portal give permissions to the Microsoft 365 Defender Portal and the Microsoft Purview compliance portal. For example, if you add a user to Security Administrator in the Microsoft 365 Defender portal, they have Security Administrator access **only** in the Microsoft 365 Defender Portal and the Microsoft Purview compliance portal. - Many features in the Microsoft 365 Defender portal are based on Exchange Online PowerShell cmdlets and therefore require role group membership in the corresponding roles (technically, role groups) in Exchange Online (in particular, for access to the corresponding Exchange Online PowerShell cmdlets). - There are Email & collaboration roles in the Microsoft 365 Defender portal that have no equivalent to Azure AD roles, and are important for security operations (for example the Preview role and the Search and Purge role).
-Typically, only a subset of security personnel will need additional rights to download messages directly from user mailboxes. This requires an additional permission that Security Reader does not have by default.
+Typically, only a subset of security personnel needs additional rights to download messages directly from user mailboxes. This need requires an additional permission that Security Reader doesn't have by default.
## Step 2: (Optional) Exempt pilot users from filtering by your existing protection service
Spoof intelligence can rescue email from domains without proper email authentica
- Message sources that have the highest number of messages. - Message sources that have the highest impact on your organization.
-Spoof intelligence will eventually tune itself after you configure user reported settings, so there is no need for perfection.
+Spoof intelligence will eventually tune itself after you configure user reported settings, so there's no need for perfection.
## Step 4: Tune impersonation protection and mailbox intelligence
After you've had enough time to observe the results of impersonation protection
- Domain impersonation protection: **Quarantine the message** for both Standard and Strict. - Mailbox intelligence protection: **Move the message to the recipients' Junk Email folders** for Standard; **Quarantine the message** for Strict.
-The longer you monitor the impersonation protection results without acting on the messages, the more data you'll have to identify allows or blocks that might be required. Consider using a delay between turning on each protection that's significant enough to allow for observation and adjustment.
+The longer you monitor the impersonation protection results without acting on the messages, the more data you have to identify allows or blocks that might be required. Consider using a delay between turning on each protection that's significant enough to allow for observation and adjustment.
> [!NOTE] > Frequent and continuous monitoring and tuning of these protections is important. If you suspect a false positive, investigate the cause and use overrides only as necessary and only for the detection feature that requires it. ### Tune mailbox intelligence
-Although mailbox intelligence has been configured to take no action on messages that were [determined to be impersonation attempts](anti-phishing-mdo-impersonation-insight.md), it has been on and learning the email sending and receiving patterns of the pilot users. If an external user is in contact with one your pilot users, messages from that external user won't be identified as impersonation attempts by mailbox intelligence (thus reducing false positives).
+Although mailbox intelligence has been configured to take no action on messages that were [determined to be impersonation attempts](anti-phishing-mdo-impersonation-insight.md), it has been on and learning the email sending and receiving patterns of the pilot users. If an external user is in contact with one your pilot users, messages from that external user aren't identified as impersonation attempts by mailbox intelligence (thus reducing false positives).
When you're ready, do the following steps to allow mailbox intelligence to act on messages that are detected as impersonation attempts:
Observe the results and make any adjustments as necessary.
## Step 5: Use data from user reported messages to measure and adjust
-As your pilot users report false positives and false negatives, the messages will appear on the **User reported** tab of the [Submissions page in the Microsoft 365 Defender portal](submissions-admin.md). You can report the misidentified messages to Microsoft for analysis and use the information to adjust the settings and exceptions in your pilot polices as necessary.
+As your pilot users report false positives and false negatives, the messages appear on the **User reported** tab of the [Submissions page in the Microsoft 365 Defender portal](submissions-admin.md). You can report the misidentified messages to Microsoft for analysis and use the information to adjust the settings and exceptions in your pilot policies as necessary.
Use the following features to monitor and iterate on the protection settings in Defender for Office 365:
If your organization uses a third-party service for user reported messages, you
## Step 6: (Optional) Add more users to your pilot and iterate
-As you find and fix issues, you can add more users to the pilot groups (and correspondingly exempt those new pilot users from scanning by your existing protection service as appropriate). The more testing that you do now, the fewer user issues that you'll need to deal with later. This "waterfall" approach allows tuning against larger portions of the organization and gives your security teams time to adjust to the new tools and processes.
+As you find and fix issues, you can add more users to the pilot groups (and correspondingly exempt those new pilot users from scanning by your existing protection service as appropriate). The more testing that you do now, the fewer user issues that you need to deal with later. This "waterfall" approach allows tuning against larger portions of the organization and gives your security teams time to adjust to the new tools and processes.
- Microsoft 365 generates alerts when high confidence phishing messages are allowed by organizational policies. To identify these messages, you have the following options: - Overrides in the [Threat protection status report](reports-email-security.md#threat-protection-status-report).
As you find and fix issues, you can add more users to the pilot groups (and corr
Report any false positives to Microsoft as early as possible through admin submissions, use the [Tenant Allow/Block List](tenant-allow-block-list-about.md) feature to configure safe overrides for those false positives. -- It's also a good idea to examine unnecessary overrides. In other words, look at the verdicts that Microsoft 365 would have provided on the messages. If Microsoft365 rendered the correct verdict, then the need for override is greatly diminished or eliminated.
+- It's also a good idea to examine unnecessary overrides. In other words, look at the verdicts that Microsoft 365 would have provided on the messages. If Microsoft 365 rendered the correct verdict, then the need for override is greatly diminished or eliminated.
## Step 7: Extend Microsoft 365 protection to all users and turn off the SCL=-1 mail flow rule Do the steps in this section when you're ready to switch your MX records to point to Microsoft 365.
-1. Extend the pilot policies to the entire organization. Fundamentally, there are different ways to do this:
- - Use [preset security](preset-security-policies.md) policies and divide your users between the Standard protection profile and the Strict protection profile (make sure everyone is covered). Preset security policies are applied before any custom polices that you've created or any default policies. You can turn off your individual pilot policies without deleting them.
+1. Extend the pilot policies to the entire organization. Fundamentally, there are different ways to extend the policies:
+ - Use [preset security](preset-security-policies.md) policies and divide your users between the Standard protection profile and the Strict protection profile (make sure everyone is covered). Preset security policies are applied before any custom policies that you've created or any default policies. You can turn off your individual pilot policies without deleting them.
The drawback to preset security policies is you can't change many of the important settings after you've created them.
Feel free to pause and evaluate here at any point. But, remember: once you turn
Congratulations! You have completed your [migration to Microsoft Defender for Office 365](migrate-to-defender-for-office-365.md#the-migration-process)! Because you followed the steps in this migration guide, the first few days where mail is delivered directly into Microsoft 365 should be much smoother.
-Now you begin the normal operation and maintenance of Defender for Office 365. Monitor and watch for issues that are similar to what you experienced during the pilot, but on a larger scale. The [spoof intelligence insight](anti-spoofing-spoof-intelligence.md) and the [impersonation insight](anti-phishing-mdo-impersonation-insight.md) will be most helpful, but consider making the following activities a regular occurrence:
+Now you begin the normal operation and maintenance of Defender for Office 365. Monitor and watch for issues that are similar to what you experienced during the pilot, but on a larger scale. The [spoof intelligence insight](anti-spoofing-spoof-intelligence.md) and the [impersonation insight](anti-phishing-mdo-impersonation-insight.md) are most helpful, but consider making the following activities a regular occurrence:
- Review user reported messages, especially [user-reported phishing messages](air-about-office.md) - Review overrides in the [Threat protection status report](reports-email-security.md#threat-protection-status-report).
security Migrate To Defender For Office 365 Prepare https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-prepare.md
description: "Prerequisite steps for migrating from a third-party protection service or device to Microsoft Defender for Office 365 protection." Previously updated : 1/31/2023 Last updated : 5/22/2023 # Migrate to Microsoft Defender for Office 365 - Phase 1: Prepare
Last updated 1/31/2023
<br>
-|![Phase 1: Prepare.](../../medi)|
+|:::image type="content" source="../../medi)|
|||| |*You are here!*|||
A complete inventory of settings, rules, exceptions, etc. from your existing pro
**But, it's very important that you do not automatically or arbitrarily recreate all of your existing customizations in Defender for Office 365**. At best, you might introduce settings that are no longer required, relevant, or functional. At worse, some of your previous customizations might actually create security issues in Defender for Office 365.
-Your testing and observation of the native capabilities and behavior of Defender for Office 365 will ultimately determine the overrides and settings that you need. You might find it helpful to organize the settings from your existing protection service into the following categories:
+Your testing and observation of the native capabilities and behavior of Defender for Office 365 ultimately determines the overrides and settings that you need. You might find it helpful to organize the settings from your existing protection service into the following categories:
- **Connection or content filtering**: You'll likely find that you don't need most of these customizations in Defender for Office 365.-- **Business routing**: The majority of the customizations that you need to recreate will likely fall into this category. For example, you can recreate these settings in Microsoft 365 as Exchange mail flow rules (also known as transport rules), connectors, and exceptions to spoof intelligence.
+- **Business routing**: Most of the customizations that you need to recreate likely fall into this category. For example, you can recreate these settings in Microsoft 365 as Exchange mail flow rules (also known as transport rules), connectors, and exceptions to spoof intelligence.
-Instead of moving old settings blindly into Microsoft 365, we recommend a waterfall approach that involves a pilot phase with ever-increasing user membership, and observation-based tuning based on balancing security considerations with organizational business needs.
+Instead of moving old settings blindly into Microsoft 365, we recommend a waterfall approach. This approach involves a pilot phase with ever-increasing user membership, and observation-based tuning based on balancing security considerations with organizational business needs.
## Check your existing protection configuration in Microsoft 365
Review your existing protection features in Microsoft 365 and consider removing
- If you're using any sort of complex routing (for example [Centralized Mail Transport](/exchange/transport-options)), you should consider simplifying your routing and thoroughly documenting it. External hops, especially after Microsoft 365 has already received the message, can complicate configuration and troubleshooting. -- Outbound and relay mail flow is out of the scope for this article. However, be aware that you might need to do one or more of the following steps:
+- Outbound and relay mail flow is out of the scope for this article. However, you might need to do one or more of the following steps:
- Verify that all of the domains that you use to send email have the proper SPF records. For more information, see [Set up SPF to help prevent spoofing](email-authentication-spf-configure.md).
- - We strongly recommend that you setup DKIM signing in Microsoft 365. For more information, see [Use DKIM to validate outbound email](email-authentication-dkim-configure.md).
+ - We strongly recommend that you set up DKIM signing in Microsoft 365. For more information, see [Use DKIM to validate outbound email](email-authentication-dkim-configure.md).
- If you're not routing mail directly from Microsoft 365, you need to change that routing by removing or changing the outbound connector. -- Using Microsoft 365 to relay email from your on-premises email servers can be a complex project in itself. A simple example is a small number of apps or devices that send most of their messages to internal recipients and aren't used for mass mailings. See [this guide](/exchange/mail-flow-best-practices/how-to-set-up-a-multifunction-device-or-application-to-send-email-using-microsoft-365-or-office-365) for details. More extensive environments will need to be more thoughtful. Marketing email and messages that could be seen as spam by recipients are not allowed.
+- Using Microsoft 365 to relay email from your on-premises email servers can be a complex project in itself. A simple example is a small number of apps or devices that send most of their messages to internal recipients and aren't used for mass mailings. See [this guide](/exchange/mail-flow-best-practices/how-to-set-up-a-multifunction-device-or-application-to-send-email-using-microsoft-365-or-office-365) for details. More extensive environments need to be more thoughtful. Marketing email and messages that could be seen as spam by recipients aren't allowed.
-- Defender for Office 365 does not have a feature for aggregating DMARC reports. Visit the [Microsoft Intelligent Security Association (MISA) catalog](https://www.microsoft.com/misapartnercatalog) to view third-party vendors that offer DMARC reporting for Microsoft 365.
+- Defender for Office 365 doesn't have a feature for aggregating DMARC reports. Visit the [Microsoft Intelligent Security Association (MISA) catalog](https://www.microsoft.com/misapartnercatalog) to view third-party vendors that offer DMARC reporting for Microsoft 365.
## Move features that modify messages into Microsoft 365
You need to transfer any customizations or features that modify messages in any
If you don't turn off message modification features in your existing protection service, you can expect the following negative results in Microsoft 365: -- DKIM will break. Not all senders rely on DKIM, but those that do will fail authentication.-- [Spoof intelligence](anti-phishing-protection-spoofing-about.md) and the tuning step later in this guide will not work properly.
+- DKIM will break. Not all senders rely on DKIM, but senders that do will fail authentication.
+- [Spoof intelligence](anti-phishing-protection-spoofing-about.md) and the tuning step later in this guide won't work properly.
- You'll probably get a high number of false positives (good mail marked as bad). To recreate external sender identification in Microsoft 365, you have the following options:
To recreate external sender identification in Microsoft 365, you have the follow
- The [Outlook external sender call-out feature](https://techcommunity.microsoft.com/t5/exchange-team-blog/native-external-sender-callouts-on-email-in-outlook/ba-p/2250098), together with [first contact safety tips](anti-phishing-policies-about.md#first-contact-safety-tip). - Mail flow rules (also known as transport rules). For more information, see [Organization-wide message disclaimers, signatures, footers, or headers in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/disclaimers-signatures-footers-or-headers).
-Microsoft is working with the industry to support the Authenticated Received Chain (ARC) standard in the near future. If you wish to leave any message modification features enabled at your current mail gateway provider, then we recommend contacting them about their plans to support this standard.
+Microsoft is working with the industry to support the Authenticated Received Chain (ARC) standard. If you wish to leave any message modification features enabled at your current mail gateway provider, then we recommend contacting them about their plans to support this standard.
## Account for any active phishing simulations
If you have active third-party phishing simulations, you need to prevent the mes
Ultimately, it's your decision if you want to prevent delivery of email to the Junk Email folder in favor of delivery to quarantine. But, one thing is certain: if the experience in Defender for Office 365 is different than what your users are used to, you need to notify them and provide basic training. Incorporate learnings from the pilot and make sure that users are prepared for any new behavior for email delivery. -- **Wanted bulk mail vs. unwanted bulk mail**: Many protection systems allow users to allow or block bulk email for themselves. These settings do not easily migrate to Microsoft 365, so you should consider working with VIPs and their staff to recreate their existing configurations in Microsoft 365.
+- **Wanted bulk mail vs. unwanted bulk mail**: Many protection systems allow users to allow or block bulk email for themselves. These settings don't easily migrate to Microsoft 365, so you should consider working with VIPs and their staff to recreate their existing configurations in Microsoft 365.
- Today, Microsoft 365 considers some bulk mail (for example, newsletters) as safe based on the message source. Mail from these "safe" sources is currently not marked as bulk (the bulk complaint level or BCL is 0 or 1), so it's difficult to globally block mail from these sources. For most users, the solution is to ask them to individually unsubscribe from these bulk messages or use Outlook to block the sender. But, some users will not like blocking or unsubscribing from bulk messages themselves.
+ Today, Microsoft 365 considers some bulk mail (for example, newsletters) as safe based on the message source. Mail from these "safe" sources is currently not marked as bulk (the bulk complaint level or BCL is 0 or 1), so it's difficult to globally block mail from these sources. For most users, the solution is to ask them to individually unsubscribe from these bulk messages or use Outlook to block the sender. But, some users don't like blocking or unsubscribing from bulk messages themselves.
- Mail flow rules that filter bulk email can be helpful when VIP users do not wish to manage this themselves. For more information, see [Use mail flow rules to filter bulk email](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-filter-bulk-mail).
+ Mail flow rules that filter bulk email can be helpful when VIP users don't wish to manage bulk email themselves. For more information, see [Use mail flow rules to filter bulk email](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-filter-bulk-mail).
## Identify and designate priority accounts
security Migrate To Defender For Office 365 Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-setup.md
description: "Take the steps to begin migrating from a third-party protection service or device to Microsoft Defender for Office 365 protection." Previously updated : 1/31/2023 Last updated : 5/22/2023 # Migrate to Microsoft Defender for Office 365 - Phase 2: Setup
Last updated 1/31/2023
<br>
-|[![Phase 1: Prepare.](../../medi)|
+|[:::image type="content" source="../../medi)|
|||| ||*You are here!*||
Welcome to **Phase 2: Setup** of your **[migration to Microsoft Defender for Off
Distribution groups are required in Microsoft 365 for the following aspects of your migration: -- **Exceptions for the SCL=-1 mail flow rule**: You want pilot users to get the full effect of Defender for Office 365 protection, so you need their incoming messages to be scanned by Defender for Office 365. You do this by defining your pilot users in the appropriate distribution groups in Microsoft 365, and configuring these groups as exceptions to the SCL=-1 mail flow rule.
+- **Exceptions for the SCL=-1 mail flow rule**: You want pilot users to get the full effect of Defender for Office 365 protection, so you need their incoming messages to be scanned by Defender for Office 365. You get this result by defining your pilot users in the appropriate distribution groups in Microsoft 365, and configuring these groups as exceptions to the SCL=-1 mail flow rule.
As we described in [Onboard Step 2: (Optional) Exempt pilot users from filtering by your existing protection service](migrate-to-defender-for-office-365-onboard.md#step-2-optional-exempt-pilot-users-from-filtering-by-your-existing-protection-service), you should consider exempting these same pilot users from scanning by your existing protection service. Eliminating the possibility of filtering by your existing protection service and relying exclusively on Defender for Office 365 is the best and closest representation of what's going to happen after your migration is complete.
Distribution groups are required in Microsoft 365 for the following aspects of y
For clarity, we use these specific group names throughout this article, but you're free to use your own naming convention.
-When you're ready to begin testing, add these groups as exceptions to [the SCL=-1 mail flow rule](#step-3-maintain-or-create-the-scl-1-mail-flow-rule). As you create policies for the various protection features in Defender for Office 365, you'll use these groups as conditions that define who the policy applies to.
+When you're ready to begin testing, add these groups as exceptions to [the SCL=-1 mail flow rule](#step-3-maintain-or-create-the-scl-1-mail-flow-rule). As you create policies for the various protection features in Defender for Office 365, use these groups as conditions that define who the policy applies to.
**Notes**: -- The terms Standard and Strict come from our [recommended security settings](recommended-settings-for-eop-and-office365.md), which are also used in [preset security policies](preset-security-policies.md). Ideally, we would tell you to define your pilot users in the Standard and Strict preset security policies, but we can't do that. Why? Because you can't customize the settings in preset security policies (in particular, actions that are taken on messages). During your migration testing, you want to see what Defender for Office 365 would do to messages, verify that's what you want to happen, and possibly adjust the policy configurations to allow or prevent those results.
+- The terms Standard and Strict come from our [recommended security settings](recommended-settings-for-eop-and-office365.md), which are also used in [preset security policies](preset-security-policies.md). Ideally, we would tell you to define your pilot users in the Standard and Strict preset security policies, but we can't do that. Why? Because you can't customize the settings in preset security policies (in particular, actions that are taken on messages). During your migration testing, you want to see what Defender for Office 365 would do to messages, verify that's the result you want, and possibly adjust the policy configurations to allow or prevent those results.
So, instead of using preset security policies, you're going to manually create custom policies with settings that are similar to, but in some cases are different than, the settings of Standard and Strict preset security policies.
You should also confirm that all users in the pilot have a supported way to repo
Don't underestimate the importance of this step. Data from user reported messages will give you the feedback loop that you need to verify a good, consistent end-user experience before and after the migration. This feedback helps you to make informed policy configuration decisions, and provide data-backed reports to management that the migration went smoothly.
-Instead of relying on data that's backed by the experience of the entire organization, more than one migration has resulted in emotional speculation based on a single negative user experience. Furthermore, if you've been running phishing simulations, you can use feedback from your users to inform you when they see something risky that might require investigation.
+Instead of relying on data that's based on the experience of the entire organization, more than one migration has resulted in emotional speculation based on a single negative user experience. Furthermore, if you've been running phishing simulations, you can use feedback from your users to inform you when they see something risky that might require investigation.
## Step 3: Maintain or create the SCL=-1 mail flow rule
For impersonation detections, ignore the recommended Standard and Strict actions
Use the impersonation insight to observe the results. For more information, see [Impersonation insight in Defender for Office 365](anti-phishing-mdo-impersonation-insight.md).
-You tune spoofing protection (adjust allows and blocks) and turn on each impersonation protection action to quarantine or move the messages to the Junk Email folder (based on the Standard or Strict recommendations). You can observe the results and adjust their settings as necessary.
+Tune spoofing protection (adjust allows and blocks) and turn on each impersonation protection action to quarantine or move the messages to the Junk Email folder (based on the Standard or Strict recommendations). Observe the results and adjust their settings as necessary.
For more information, see the following articles:
security Responding To A Compromised Email Account https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account.md
search.appverid:
description: Learn how to recognize and respond to a compromised email account using tools available in Microsoft 365. Previously updated : 1/31/2023 Last updated : 5/22/2023 # Responding to a compromised email account
Last updated 1/31/2023
- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
-**Summary** Learn how to recognize and respond to a compromised email account in Microsoft 365.
+Access to Microsoft 365 mailboxes, data, and other services is controlled by credentials (for example a username and a password or PIN). When someone other than the intended user steals those credentials, the associated account is considered to be compromised.
-Access to Microsoft 365 mailboxes, data and other services, is controlled by using credentials, for example a user name and password or PIN. When someone other than the intended user steals those credentials, the stolen credentials are considered to be compromised. With them the attacker can sign in as the original user and perform illicit actions.
+After an attacker steals the credentials and gains access to the account, they can access the associated Microsoft 365 mailbox, SharePoint folders, or files in the user's OneDrive. Attackers often use the compromised mailbox to send email as the original user to recipients inside and outside of the organization. Attackers using email to send data to external recipients is known as _data exfiltration_.
-Using the stolen credentials, the attacker can access the user's Microsoft 365 mailbox, SharePoint folders, or files in the user's OneDrive. One action commonly seen is the attacker sending email as the original user to recipients both inside and outside of the organization. When the attacker email data to external recipients, this is called data exfiltration.
+This article explains the symptoms of account compromise and how to regain control of the compromised account.
## Symptoms of a compromised Microsoft email account
-Users might notice and report unusual activity in their Microsoft 365 mailboxes. Here are some common symptoms:
+Users might notice and report unusual activity in their Microsoft 365 mailboxes. For example:
- Suspicious activity, such as missing or deleted email.-- Other users might receive email from the compromised account without the corresponding email existing in the **Sent Items** folder of the sender.-- The presence of inbox rules that weren't created by the intended user or the administrator. These rules may automatically forward email to unknown addresses or move them to the **Notes**, **Junk Email**, or **RSS Subscriptions** folders.-- The user's display name might be changed in the Global Address List.
+- Users receiving email from the compromised account without the corresponding email in the sender's **Sent Items** folder.
+- Inbox rules that weren't created by the user or admins. These rules might automatically forward email to unknown addresses or move messages to the **Notes**, **Junk Email**, or **RSS Subscriptions** folders.
+- The user's display name is changed in the Global Address List.
- The user's mailbox is blocked from sending email.-- The Sent or Deleted Items folders in Microsoft Outlook or Outlook on the web (formerly known as Outlook Web App) contain common hacked-account messages, such as "I'm stuck in London, send money."-- Unusual profile changes, such as the name, the telephone number, or the postal code were updated.-- Unusual credential changes, such as multiple password changes are required.
+- The **Sent Items** or **Deleted Items** folders in Microsoft Outlook or Outlook on the web (formerly known as Outlook Web App) contain typical messages for compromised accounts (for example, "I'm stuck in London, send money.").
+- Unusual profile changes. For example, name, telephone number, or the postal code updates.
+- Multiple and frequent password changes.
- Mail forwarding was recently added.-- An unusual signature was recently added, such as a fake banking signature or a prescription drug signature.
+- Unusual signatures were recently added. For example, a fake banking signature or a prescription drug signature.
-If a user reports any of the above symptoms, you should perform further investigation. The Microsoft 365 Defender portal and the Azure portal offer tools to help you investigate the activity of a user account that you suspect may be compromised.
+If a user reports these symptoms or other unusual symptoms, you should investigate. The Microsoft 365 Defender portal and the Azure portal offer the following tools to help you investigate suspicious activity on a user account.
-- **Unified audit logs in the Microsoft 365 Defender portal**: Review all the activities for the suspected account by filtering the results for the date range spanning from immediately before the suspicious activity occurred to the current date. Do not filter on the activities during the search. For more information, see [Search the audit log in the compliance center](../../compliance/search-the-audit-log-in-security-and-compliance.md).
+- **Unified audit logs in the Microsoft 365 Defender portal**: Filter the logs for activity using a date range that starts immediately before the suspicious activity occurred to today. Don't filter on specific activities during the search. For more information, see [Search the audit log](../../compliance/search-the-audit-log-in-security-and-compliance.md).
- **Azure AD Sign-in logs and other risk reports in the Azure AD portal**: Examine the values in these columns: - Review IP address
If a user reports any of the above symptoms, you should perform further investig
- sign-in success or failure > [!IMPORTANT]
-> The button below will let you test and identify suspicious activities against an account and return information that can be used to recover in the case an account is compromised.
+> The following button lets you test and identify suspicious account activity. You can use this information to recover a compromised account.
> <div class="nextstepaction"> <p><a href="https://aka.ms/diagca" data-linktype="external">Run Tests: Compromised Accounts</a></p> </div>
-## How to secure and restore email function to a suspected compromised Microsoft 365 account and mailbox
+## Secure and restore email function to a compromised Microsoft 365 account and mailbox
<! [!VIDEO https://videoplayercdn.osi.office.net/hub/?csid=ux-cms-en-us-msoffice&uuid=RE2jvOb&AutoPlayVideo=false] >
-Even after you've regained access to your account, the attacker may have added back-door entries that enable the attacker to resume control of the account.
+Even after the user regains access to their account, the attacker might have left back-door entries that allow the attacker to resume control of the account.
-You must do all the following steps to regain access to your account the sooner the better to make sure that the hijacker doesn't resume control your account. These steps help you remove any back-door entries that the hijacker may have added to your account. After you do these steps, we recommend that you run a virus scan to make sure that your computer isn't compromised.
+Do **all** of the following steps to regain control of the account. Go through the steps as soon as you suspect a problem and as quickly as possible to make sure that the attacker doesn't resume control of the account. These steps also help you remove any back-door entries that the attacker might have added to the account. After you do these steps, we recommend that you run a virus scan to make sure that the client computer isn't compromised.
### Step 1: Reset the user's password
Follow the procedures in [Reset a business password for someone](../../admin/add
> [!IMPORTANT] >
-> - Do not send the new password to the intended user through email as the attacker still has access to the mailbox at this point.
+> - Don't send the new password to the user through email, because the attacker still has access to the mailbox at this point.
>
-> - Make sure that the password is strong and that it contains upper and lowercase letters, at least one number, and at least one special character.
+> - Be sure to use a strong password: upper and lowercase letters, at least one number, and at least one special character.
>
-> - Don't reuse any of your last five passwords. Even though the password history requirement lets you reuse a more recent password, you should select something that the attacker can't guess.
+> - Even if the password history requirement allows it, don't reuse any of the last five passwords. Use a unique password that the attacker can't guess.
>
-> - If your on-premises identity is federated with Microsoft 365, you must change your password on-premises, and then you must notify your administrator of the compromise.
+> - If the on-premises identity is federated with Microsoft 365, you must change the on-premises account password on-premises, and then notify the administrator of the compromise.
>
-> - Be sure to update app passwords. App passwords aren't automatically revoked when a user account password reset. The user should delete existing app passwords and create new ones. For instructions, see [Create and delete app passwords from the Additional security verification page](/azure/active-directory/user-help/multi-factor-authentication-end-user-app-passwords#create-and-delete-app-passwords-from-the-additional-security-verification-page).
+> - Be sure to update app passwords. App passwords aren't automatically revoked when you reset the password. The user should delete existing app passwords and create new ones. For instructions, see [Create and delete app passwords from the Additional security verification page](/azure/active-directory/user-help/multi-factor-authentication-end-user-app-passwords#create-and-delete-app-passwords-from-the-additional-security-verification-page).
>
-> - We highly recommended that you enable Multi-Factor Authentication (MFA) in order to prevent compromise, especially for accounts with administrative privileges. To learn more about MFA, go to [Set up multi-factor authentication](../../admin/security-and-compliance/set-up-multi-factor-authentication.md).
+> - We highly recommended that you enable multi-factor authentication (MFA) for the account. MFA is a good way to help prevent account compromise, and is very important for accounts with administrative privileges. For instructions, see [Set up multi-factor authentication](../../admin/security-and-compliance/set-up-multi-factor-authentication.md).
### Step 2: Remove suspicious email forwarding addresses
-1. In the Microsoft 365 admin center at <https://admin.microsoft.com>, go to **Users** \> **Active users**. To go directly to the **Active users** page, use <https://admin.microsoft.com/Adminportal/Home#/users>.
+1. In the Microsoft 365 admin center at <https://admin.microsoft.com>, go to **Users** \> **Active users**. Or, to go directly to the **Active users** page, use <https://admin.microsoft.com/Adminportal/Home#/users>.
-2. On the **Active users** page, find the user account in question, and select the user (row) without selecting the checkbox.
+2. On the **Active users** page, find the user account, and select it by clicking anywhere in the row other than the check box next to the name.
-3. In the details flyout that appears, select the **Mail** tab.
+3. In the details flyout that opens, select the **Mail** tab.
-4. If the value in the **Email forwarding** section is **Applied**, click **Manage email forwarding**. In the **Manage email forwarding** flyout that appears, clear **Forward all email sent to this mailbox**, and then click **Save changes**.
+4. The value **Applied** in the **Email forwarding** section indicates that mail forwarding is configured on the account.
-### Step 3: Disable any suspicious inbox rules
+ Select **Manage email forwarding**, clear the **Forward all email sent to this mailbox** check box in the **Manage email forwarding** flyout that opens, and then select **Save changes**.
-1. Sign in to the user's mailbox using Outlook on the web.
+### Step 3: Disable suspicious Inbox rules
-2. Click on the gear icon and click **Mail**.
+1. Sign in to the user's mailbox using Outlook on the web.
-3. Click **Inbox and sweep rules** and review the rules.
+2. Select **Settings** (gear icon), enter 'rules' in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box, and then select **Inbox rules** from the results.
-4. Disable or delete suspicious rules.
+3. On the **Rules** tab of the flyout that opens, review the existing rules, and turn off or delete any suspicious rules.
### Step 4: Unblock the user from sending mail
-If the suspected compromised mailbox was used illicitly to send spam email, it's likely that the mailbox has been blocked from sending mail.
+If the account was used to send spam or a high volume of email, it's likely that the mailbox has been blocked from sending mail.
-To unblock a mailbox from sending mail, follow the procedures in [Remove blocked users from the Restricted entities page](removing-user-from-restricted-users-portal-after-spam.md).
+To unblock a mailbox from sending email, follow the procedures in [Remove blocked users from the Restricted entities page](removing-user-from-restricted-users-portal-after-spam.md).
### Step 5 Optional: Block the user account from signing-in > [!IMPORTANT]
-> You can block the suspected compromised account from signing-in until you believe it's safe to re-enable access.
+> You can block the account from signing-in until you believe it's safe to re-enable access.
1. Do the following steps in the Microsoft 365 admin center at <https://admin.microsoft.com>: 1. Go to **Users** \> **Active users**. Or, to go directly to the **Active users** page, use <https://admin.microsoft.com/Adminportal/Home#/users>.
- 2. On the **Active users** page, find and then select the user account by doing either of the following steps:
- - Select the user from the list by clicking anywhere in the row other than the check box. In the user details flyout that opens, click ![Block sign-in icon.](../../media/m365-cc-sc-no-icon.png) **Block sign-in** at the top of the flyout.
- - Select the user from the list by clicking the check box in the row. Click ![More actions icon.](../../media/ITPro-EAC-MoreOptionsIcon.png) **More actions**, and then select ![Edit sign-in status icon.](../../media/m365-cc-sc-no-icon.png) **Edit sign-in status**.
- 3. On the **Block sign-in** flyout that opens, select **Block this user from signing in**, click **Save changes** and then click ![Close icon.](../../media/m365-cc-sc-close-icon.png) **Close**.
+ 2. On the **Active users** page, find and select the user account from the list by doing one of the following steps:
+ - Select the user by clicking anywhere in the row other than the check box next to the name. In the details flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-no-icon.png" border="false"::: **Block sign-in** at the top of the flyout.
+ - Select the user by selecting the check box next to the name. Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> :::image type="icon" source="../../media/m365-cc-sc-no-icon.png" border="false"::: **Edit sign-in status**.
+ 3. In the **Block sign-in** flyout that opens, read the information, select **Block this user from signing in**, select **Save changes**, and then select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: **Close** at the top of the flyout.
2. Do the following steps in the Exchange admin center (EAC) at <https://admin.exchange.microsoft.com>: 1. Go to **Recipients** \> **Mailboxes**. Or, to go directly to the **Mailboxes** page, use <https://admin.exchange.microsoft.com/#/mailboxes>.
- 2. On the **Mailboxes** page, find and select the user from the list by clicking anywhere in the row other than the check box.
- 3. In the mailbox details flyout that opens, do the following steps:
- 1. Verify the **General** tab is selected, and then click **Manage email apps settings** in the **Email apps & mobile devices** section.
- 2. In the **Manage settings for email apps** flyout that opens, disable all of the available settings by changing the toggles to ![Disabled.](../../media/scc-toggle-off.png) **Disabled**:
- - **Outlook on the web**
+ 2. On the **Mailboxes** page, find and select the user from the list by doing one of the following steps:
+ - Select the user by clicking anywhere in the row other than the round check box that appears next to the name.
+ - Select the user by selecting the round check box that appears next to the name, and then selecting the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears on the page.
+ 3. In the details flyout that opens, do the following steps:
+ 1. Verify the **General** tab is selected, and then select **Manage email apps settings** in the **Email apps & mobile devices** section.
+ 2. In the **Manage settings for email apps** flyout that opens, disable all of the available settings by changing the toggles to :::image type="icon" source="../../media/scc-toggle-off.png" border="false"::: **Disabled**:
- **Outlook desktop (MAPI)** - **Exchange Web Services** - **Mobile (Exchange ActiveSync)** - **IMAP** - **POP3**
+ - **Outlook on the web**
- When you're finished, click **Save** and then click ![Close icon.](../../media/m365-cc-sc-close-icon.png) **Close**.
+ When you're finished in the **Manage settings for email apps** flyout, select **Save**, and then select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: **Close** at the top of the flyout.
### Step 6 Optional: Remove the suspected compromised account from all administrative role groups > [!NOTE]
-> Administrative role group membership can be restored after the account has been secured.
+> You can restore the user's membership in administrative role groups after the account has been secured.
1. In the Microsoft 365 admin center at <https://admin.microsoft.com>, do the following steps:
- 1. Go to **Users** \> **Active users**. To go directly to the **Active users** page, use <https://admin.microsoft.com/Adminportal/Home#/users>.
- 2. On the **Active users** page, find and select the user account, click ![More icon.](../../media/ITPro-EAC-MoreOptionsIcon.png), and then select **Manage roles**.
- 3. Remove any administrative roles that are assigned to the account. When you're finished, click **Save changes**.
-
-2. in the Microsoft 365 Defender portal at <https://security.microsoft.com>, do the following steps:
- 1. Go to **Permissions & roles** \> **Email & collaboration roles** \> **Roles**. To go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
- 2. On the **Permissions** page, select each role group in the list and look for the user account in the **Members** section of the details flyout that appears. If the role group contains the user account, do the following steps:
- 1. In the **Members** section, click **Edit**.
- 2. On the **Editing Choose members** flyout that appears, click **Edit**.
- 3. On the **Choose members** flyout that appears, click **Remove**.
- 4. In the flyout that appears, select the user account, and then click **Remove**.
-
- When you're finished, click **Done**, **Save**, and then **Close**.
+ 1. Go to **Users** \> **Active users**. Or, to go directly to the **Active users** page, use <https://admin.microsoft.com/Adminportal/Home#/users>.
+ 2. On the **Active users** page, find and select the user account from the list by doing one of the following steps:
+ - Select the user by clicking anywhere in the row other than the check box next to the name. In the details flyout that opens, verify the **Account** tab is selected, and then select **Manage roles** in the **Roles** section.
+ - Select the user by selecting the check box next to the name. Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> :::image type="icon" source="../../media/m365-cc-sc-manage-roles-icon.png" border="false"::: **Manage roles**.
+ 3. In the **Manage admin roles** flyout that opens, do the following steps:
+ - Record any information that you want to restore later.
+ - Remove administrative role membership by selecting **User (no admin center access)**.
+
+ When you're finished in the **Manage admin roles** flyout, select **Save changes**.
+
+2. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, do the following steps:
+ 1. Go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
+ 2. On the **Permissions** page, select a role group from the list.
+ 3. Look for the user account in the **Members** section of the details flyout that opens. If the role group contains the user account, do the following steps:
+ 1. In the **Members** section, select **Edit**.
+ 2. On the **Choose members** tab of the flyout that opens, select **Edit**.
+ 3. In the **Choose members** flyout that opens, select **Remove**.
+ 4. In the **Members** section that appears, select the user account by selecting the check box next to the name, select **Remove**, and then select **Done**.
+ 5. In the **Editing Choose members** flyout, select **Save**.
+ 6. In the role group details flyout, select **Close**.
+ 4. Repeat the previous steps for each role group in the list.
3. In the Exchange admin center at <https://admin.exchange.microsoft.com/>, do the following steps:
- 1. Select **Roles** \> **Admin roles**. To go directly to the **Admin roles** page, use <https://admin.exchange.microsoft.com/#/adminRoles>.
- 2. On the **Admin roles** page, manually select each role group, and in the details pane, select the **Assigned** tab to verify the user accounts. If the role group contains the user account, do the following steps:
+ 1. Go to **Roles** \> **Admin roles**. Or to go directly to the **Admin roles** page, use <https://admin.exchange.microsoft.com/#/adminRoles>.
+ 2. On the **Admin roles** page, select a role group from the list by clicking anywhere in the row other than the round check box that appears next to the name.
+ 3. In the details flyout that opens, select the **Assigned** tab, and then look for the user account. If the role group contains the user account, do the following steps:
1. Select the user account.
- 2. Click the ![Delete icon.](../../media/m365-cc-sc-delete-icon.png).
+ 2. Select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears, select **Yes, remove** in the warning dialog, and then select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: **Close** at the top of the flyout.
- When you're finished, click **Save**.
+ 4. Repeat the previous steps for each role group in the list.
### Step 7 Optional: Additional precautionary steps
-1. Make sure that you verify your sent items. You may have to inform people on your contacts list that your account was compromised. The attacker may have asked them for money, spoofing, for example, that you were stranded in a different country and needed money, or the attacker may send them a virus to also hijack their computers.
+1. Verify the contents of the **Sent items** folder of the account in Outlook or Outlook on the web.
+
+ You might need to inform people in your contacts list that your account was compromised. For example, the attacker might have sent messages asking your contacts for money, or the attacker might have sent a virus to hijack their computers.
-2. Any other service that used this Exchange account as its alternative email account may have been compromised. First, do these steps for your Microsoft 365 subscription, and then do these steps for your other accounts.
+2. The accounts for any other services that use this account as an alternative email account might have also been compromised. After you do the steps in this article for the account in this Microsoft 365 organization, do these steps for your other accounts.
-3. Make sure that your contact information, such as telephone numbers and addresses, is correct.
+3. Verify the contact information (for example, telephone numbers and addresses) of the account.
## See also
security Safe Documents In E5 Plus Security About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-documents-in-e5-plus-security-about.md
Title: Safe Documents in Microsoft Defender for Office 365
-+ audience: ITPro ms.localizationpriority: medium
description: Learn about Safe Documents in Microsoft 365 A5 or E5 Security. Previously updated : 12/05/2022 Last updated : 5/19/2023 # Safe Documents in Microsoft 365 A5 or E5 Security
Last updated 12/05/2022
**Applies to** - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
-Safe Documents is a premium feature that uses the cloud backend of [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) to scan opened Office documents in [Protected View](https://support.microsoft.com/office/d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653) or [Application Guard for Office](https://support.microsoft.com/topic/9e0fb9c2-ffad-43bf-8ba3-78f785fdba46).
+Safe Documents is a premium feature that uses the cloud back end of [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) to scan opened Office documents in [Protected View](https://support.microsoft.com/office/d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653) or [Application Guard for Office](https://support.microsoft.com/topic/9e0fb9c2-ffad-43bf-8ba3-78f785fdba46).
Users don't need Defender for Endpoint installed on their local devices to get Safe Documents protection. Users get Safe Documents protection if all of the following requirements are met:
Users don't need Defender for Endpoint installed on their local devices to get S
- Microsoft 365 A5 for Students - Microsoft 365 E5 Security
- Safe Documents is not included in Microsoft Defender for Office 365 licensing plans.
+ Safe Documents isn't included in Microsoft Defender for Office 365 licensing plans.
For more information, see [Product names and service plan identifiers for licensing](/azure/active-directory/enterprise-users/licensing-service-plan-reference).
File information sent by Safe Documents isn't retained in Defender for Endpoint
## Use the Microsoft 365 Defender portal to configure Safe Documents
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Safe Attachments** in the **Policies** section. To go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.
+1. In the Microsoft 365 Defender portal, go to the **Safe Attachments** page at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Safe Attachments** in the **Policies** section. Or, to go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.
-2. On the **Safe Attachments** page, click **Global settings**.
+2. On the **Safe Attachments** page, select :::image type="icon" source="../../media/m365-cc-sc-gear-icon.png" border="false"::: **Global settings**.
-3. In the **Global settings** fly out that appears, configure the following settings:
- - **Turn on Safe Documents for Office clients**: Move the toggle to the right to turn on the feature: ![Toggle on.](../../media/scc-toggle-on.png).
- - **Allow people to click through Protected View even if Safe Documents identified the file as malicious**: We recommend that you leave this option turned off (leave the toggle to the left: ![Toggle off.](../../media/scc-toggle-off.png)).
+3. In the **Global settings** flyout that opens, confirm or configure the following settings:
+ - **Turn on Safe Documents for Office clients**: Move the toggle to the right to turn on the feature: :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
+ - **Allow people to click through Protected View even if Safe Documents identified the file as malicious**: We recommend that you leave this option turned off :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::.
- When you're finished, click **Save**.
+ When you're finished in the **Global settings** flyout, select **Save**.
:::image type="content" source="../../media/safe-docs-global-settings.png" alt-text="The Safe Documents settings after selecting Global settings on the Safe Attachments page" lightbox="../../media/safe-docs-global-settings.png"::: ### Use Exchange Online PowerShell to configure Safe Documents
-If you'd rather user PowerShell to configure Safe Documents, use the following syntax in Exchange Online PowerShell:
+If you'd rather user PowerShell to configure Safe Documents, use the following syntax in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
```powershell Set-AtpPolicyForO365 -EnableSafeDocs <$true | $false> -AllowSafeDocsOpen <$true | $false>
If you want to selectively allow or block access to the Safe Documents feature,
The name of the service plan to disable in PowerShell is **SAFEDOCS**.
-For more information, see the following topics:
+For more information, see the following articles:
- [View Microsoft 365 licenses and services with PowerShell](/microsoft-365/enterprise/view-licenses-and-services-with-microsoft-365-powershell) - [View Microsoft 365 account license and service details with PowerShell](/microsoft-365/enterprise/view-account-license-and-service-details-with-microsoft-365-powershell)
For more information, see the following topics:
To enable auditing capabilities, the local device needs to have Microsoft Defender for Endpoint installed. To deploy Microsoft Defender for Endpoint, you need to go through the various phases of deployment. After onboarding, you can configure auditing capabilities in the Microsoft 365 Defender portal.
-To learn more, see [Onboard to the Microsoft Defender for Endpoint service](/microsoft-365/security/defender-endpoint/onboarding). If you need additional help, refer to [Troubleshoot Microsoft Defender for Endpoint onboarding issues](/microsoft-365/security/defender-endpoint/troubleshoot-onboarding).
+To learn more, see [Onboard to the Microsoft Defender for Endpoint service](/microsoft-365/security/defender-endpoint/onboarding). If you need help, see [Troubleshoot Microsoft Defender for Endpoint onboarding issues](/microsoft-365/security/defender-endpoint/troubleshoot-onboarding).
-### How do I know this worked?
+### How do I know this procedure worked?
To verify that you've enabled and configured Safe Documents, do any of the following steps: -- In the Microsoft 365 Defender portal, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Safe Attachments** in the **Policies** section \> **Global settings**, and verify the **Turn on Safe Documents for Office clients** and **Allow people to click through Protected View even if Safe Documents identifies the file as malicious** settings.
+- In the Microsoft 365 Defender portal, go to the **Safe Attachments** page at <https://security.microsoft.com/safeattachmentv2>, select :::image type="icon" source="../../media/m365-cc-sc-gear-icon.png" border="false"::: **Global settings**, and verify the **Turn on Safe Documents for Office clients** and **Allow people to click through Protected View even if Safe Documents identifies the file as malicious** settings.
- Run the following command in Exchange Online PowerShell and verify the property values:
To verify that you've enabled and configured Safe Documents, do any of the follo
Get-AtpPolicyForO365 | Format-List *SafeDocs* ``` -- The following files are available to test Safe Documents protection. These files are similar to the EICAR.TXT file for testing anti-malware and anti-virus solutions. The files are not harmful, but they will trigger Safe Documents protection.
+- The following files are available to test Safe Documents protection. These files are similar to the EICAR.TXT file for testing anti-malware and anti-virus solutions. The files aren't harmful, but they trigger Safe Documents protection.
- [SafeDocsDemo.docx](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/SafeDocsDemo.docx) - [SafeDocsDemo.pptx](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/SafeDocsDemo.pptx)
security Use Privileged Identity Management In Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/use-privileged-identity-management-in-defender-for-office-365.md
Using [Privileged Access groups](/azure/active-directory/privileged-identity-man
In the Microsoft 365 Defender portal, create a custom role group that contains the permissions that we want.
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Permissions & Roles**, and then select **Roles** under **Email and Collaboration**. To go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
2. On the **Permissions** page, click ![Create icon.](../../media/m365-cc-sc-create-icon.png) **Create**. 3. Name your group to reflect its purpose such as 'Search and Purge PIM'. 4. Don't add members, simply save the group and move on to the next part!
syntex Annotations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/annotations.md
description: Learn how to use universal annotations to mark and collaborate on i
Use the annotations feature in Microsoft Syntex to add notes and comments to your content in document librariesΓÇöeither for yourself or for collaborating with others. You can use the annotations feature without modifying the original files, so the original records are preserved.
-Annotation tools currently include pen and highlighter, where can choose the colors you want to use, and an eraser for removing ink strokes and previous annotations. The feature is currently available for the following files types: .ai, .dwg, .epub, .pdf, .rtf, and .tiff. More annotation tools and file types will be added in future releases.
+Annotation tools currently include pen and highlighter, where can choose the colors you want to use, and an eraser for removing ink strokes and previous annotations.
+
+The feature is currently available for the following file types: .ai, .dwg, .epub, .pdf, .rtf, and .tiff.
+
+More annotation tools and file types will be added in future releases.
> [!NOTE] > This feature is available only for users who are licensed for Syntex.