Updates from: 05/24/2022 01:06:01
Category Microsoft Docs article Related commit history on GitHub Change details
admin Forms Pro Activity Ww https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/forms-pro-activity-ww.md
You can view the activities in the Dynamics 365 Customer Voice report by choosin
Select **Choose columns** to add or remove columns from the report. <br/> ![Dynamics 365 Customer Voice activity report - choose columns.](../../media/5ab66f4b-32eb-4c9b-9683-1157ae9e2c0a.png)
-You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. If you have less than 2000 users, you can sort and filter within the table in the report itself. If you have more than 2000 users, in order to filter and sort, you will need to export the data.
+You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. If you have less than 2000 users, you can sort and filter within the table in the report itself. If you have more than 2000 users, in order to filter and sort, you'll need to export the data.
The **Dynamics 365 Customer Voice activity** report can be viewed for trends over the last 7 days, 30 days, 90 days, or 180 days. However, if you select a particular day in the report, the table will show data for up to 28 days from the current date (not the date the report was generated).
The **Dynamics 365 Customer Voice activity** report can be viewed for trends ove
|Username <br/> |The email address of the user who performed the activity on Microsoft Forms. <br/> | |Last activity date (UTC) <br/> |The latest date a form activity was performed by the user for the selected date range. To see activity that occurred on a specific date, select the date directly in the chart.<br/>This will filter the table to display file activity data only for users who performed the activity on that specific day. <br/> | |Number of surveys created <br/> |The number of surveys that the user created. <br/> |
-|Number of survey responses <br/> |The number of responses from responders to whom the survey was distributed to.|
+|Number of survey responses <br/> |The number of responses from responders to whom the survey was distributed.|
|||
admin Microsoft Teams User Activity Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/microsoft-teams-user-activity-preview.md
You can view the user activity in the Teams report by choosing the **User activi
Select **Choose columns** to add or remove columns from the report. <br/> ![Teams user activity report - choose columns.](../../media/user-activity-columns.png)
-You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. If you have less than 2000 users, you can sort and filter within the table in the report itself. If you have more than 2000 users, in order to filter and sort, you will need to export the data. The exported format for **audio time**, **video time**, and **screen share time** follows ISO8601 duration format.
+You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. If you have less than 2000 users, you can sort and filter within the table in the report itself. If you have more than 2000 users, in order to filter and sort, you'll need to export the data. The exported format for **audio time**, **video time**, and **screen share time** follows ISO8601 duration format.
The **Microsoft Teams user activity** report can be viewed for trends over the last 7 days, 30 days, 90 days, or 180 days. However, if you select a particular day in the report, the table will show data for up to 28 days from the current date (not the date the report was generated).
admin Office 365 Groups Ww https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/office-365-groups-ww.md
Select **Choose columns** to add or remove columns from the report.
:::image type="content" alt-text="Office 365 groups activity report - choose columns." source="../../media/1600556a-f5f1-47d9-b325-cd77c78f4004.png":::
-You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. If you have less than 2000 users, you can sort and filter within the table in the report itself. If you have more than 2000 users, in order to filter and sort, you will need to export the data.
+You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. If you have less than 2000 users, you can sort and filter within the table in the report itself. If you have more than 2000 users, in order to filter and sort, you'll need to export the data.
The **groups** report can be viewed for trends over the last 7 days, 30 days, 90 days, or 180 days. However, if you select a particular day in the report, the table will show data for up to 28 days from the current date (not the date the report was generated).
admin Sharepoint Activity Ww https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/sharepoint-activity-ww.md
description: "Get the SharePoint activity usage report to learn about SharePoint
# Microsoft 365 Reports in the admin center - SharePoint activity
-As an Microsoft 365 admin, the Reports dashboard shows you the activity overview across various products in your organization. It enables you to drill in to get more granular insight about the activities specific to each product. Check out the [activity reports in the Microsoft 365 admin center](activity-reports.md).
+As a Microsoft 365 admin, the Reports dashboard shows you the activity overview across various products in your organization. It enables you to drill in to get more granular insight about the activities specific to each product. Check out the [activity reports in the Microsoft 365 admin center](activity-reports.md).
For example, you can understand the activity of every user licensed to use SharePoint by looking at their interaction with files. It also helps you to understand the level of collaboration going on by looking at the number of files shared.
-## How do I get to the to the SharePoint activity report?
+## How do I get to the SharePoint activity report?
1. In the admin center, go to the **Reports** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=2074756" target="_blank">Usage</a> page. 2. From the dashboard homepage, click on the **View more** button on the SharePoint card.
You can view the activities in the SharePoint report by choosing the **Activity*
Select **Choose columns** to add or remove columns from the report. <br/> ![SharePoint activity report - choose columns.](../../media/3c396cd1-9701-4712-8eaa-eb7bba702aa8.png)
-You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. If you have less than 2000 users, you can sort and filter within the table in the report itself. If you have more than 2000 users, in order to filter and sort, you will need to export the data.
+You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. If you have less than 2000 users, you can sort and filter within the table in the report itself. If you have more than 2000 users, in order to filter and sort, you'll need to export the data.
The **SharePoint activity** report can be viewed for trends over the last 7 days, 30 days, 90 days, or 180 days. However, if you select a particular day in the report, the table will show data for up to 28 days from the current date (not the date the report was generated).
admin Yammer Groups Activity Report Ww https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/yammer-groups-activity-report-ww.md
You can view the groups activities in the Yammer report by choosing the **Groups
Select **Choose columns** to add or remove columns from the report. <br/> ![Yammer groups activity report - choose columns.](../../media/54744932-34fe-48c3-9779-1d10c3f05be1.png)
-You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. If you have less than 2000 users, you can sort and filter within the table in the report itself. If you have more than 2000 users, in order to filter and sort, you will need to export the data.
+You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. If you have less than 2000 users, you can sort and filter within the table in the report itself. If you have more than 2000 users, in order to filter and sort, you'll need to export the data.
The **Yammer groups activity** report can be viewed for trends over the last 7 days, 30 days, 90 days, or 180 days. However, if you select a particular day in the report, the table will show data for up to 28 days from the current date (not the date the report was generated).
The **Yammer groups activity** report can be viewed for trends over the last 7 d
|Group admin <br/> |The name of the group administrator, or owner. <br/> | |Deleted <br/> |The number of deleted Yammer groups. If the group is deleted, but had activity in the reporting period it will show up in the grid with this flag set to true. <br/> | |Type <br/> |The type of group, public or private. <br/> |
-|Connected to Office 365 <br/> |Indicates whether the Yammer group is also an Microsoft 365 group. <br/> |
+|Connected to Office 365 <br/> |Indicates whether the Yammer group is also a Microsoft 365 group. <br/> |
|Last activity date (UTC) <br/> | The latest date a message was read, posted or liked by the group. <br/> | |Members <br/> | The number of members in the group. <br/> | |Posted <br/> |The number of messages posted in the Yammer group over the reporting period. <br/>|
admin About Admin Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/about-admin-roles.md
Because admins have access to sensitive data and files, we recommend that you fo
| :- | :- | | Have 2 to 4 global admins | Because only another global admin can reset a global admin's password, we recommend that you have at least 2 global admins in your organization in case of account lockout. But the global admin has almost unlimited access to your org's settings and most of the data, so we also recommend that you don't have more than 4 global admins because that's a security threat. | | Assign the *least permissive* role | Assigning the *least permissive* role means giving admins only the access they need to get the job done. For example, if you want someone to reset employee passwords you shouldn't assign the unlimited global admin role, you should assign a limited admin role, like Password admin or Helpdesk admin. This will help keep your data secure. |
-| Require multi-factor authentication for admins | It's actually a good idea to require MFA for all of your users, but admins should definitely be required to use MFA to sign in. MFA makes users enter a second method of identification to verify they are who they say they are. Admins can have access to a lot of customer and employee data and if you require MFA, even if the admin's password gets compromised, the password is useless without the second form of identification. <br><br>When you turn on MFA, the next time the user signs in, they'll need to provide an alternate email address and phone number for account recovery. <br> [Set up multi-factor authentication](../security-and-compliance/set-up-multi-factor-authentication.md) |
+| Require multi-factor authentication for admins | It's actually a good idea to require MFA for all of your users, but admins should definitely be required to use MFA to sign in. MFA makes users enter a second method of identification to verify they're who they say they are. Admins can have access to much of customer and employee data and if you require MFA, even if the admin's password gets compromised, the password is useless without the second form of identification. <br><br>When you turn on MFA, the next time the user signs in, they'll need to provide an alternate email address and phone number for account recovery. <br> [Set up multi-factor authentication](../security-and-compliance/set-up-multi-factor-authentication.md) |
-If you get a message in the admin center telling you that you don't have permissions to edit a setting or page, it's because you are assigned a role that doesn't have that permission.
+If you get a message in the admin center telling you that you don't have permissions to edit a setting or page, it's because you're assigned a role that doesn't have that permission.
## Commonly used Microsoft 365 admin center roles
You'll probably only need to assign the following roles in your organization. By
## Delegated administration for Microsoft Partners
-If you're working with a Microsoft partner, you can assign them admin roles. They, in turn, can assign users in your company, or their company, admin roles. You might want them to do this, for example, if they are setting up and managing your online organization for you.
+If you're working with a Microsoft partner, you can assign them admin roles. They, in turn, can assign users in your company, or their company, admin roles. You might want them to do this, for example, if they're setting up and managing your online organization for you.
A partner can assign these roles: -- **Admin Agent** Privileges equivalent to a global admin, with the exception of managing multi-factor authentication through the Partner Center.
+- **Admin Agent** Privileges equivalent to a global admin, except for managing multi-factor authentication through the Partner Center.
- **Helpdesk Agent** Privileges equivalent to a helpdesk admin.
admin Intune Admin Roles In The Mac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/intune-admin-roles-in-the-mac.md
In the Microsoft 365 admin center, you can go to **Roles**, and then select any
## Delegated administration for Microsoft Partners
-If you're working with a Microsoft partner, you can assign them admin roles. They, in turn, can assign users in your company - or their company - admin roles. You might want them to do this, for example, if they are setting up and managing your online organization for you.
+If you're working with a Microsoft partner, you can assign them admin roles. They, in turn, can assign users in your company - or their company - admin roles. You might want them to do this, for example, if they're setting up and managing your online organization for you.
A partner can assign these roles: -- Full administration, which has privileges equivalent to a global admin, with the exception of managing multi-factor authentication through the Partner Center.
+- Full administration, which has privileges equivalent to a global admin, except for managing multi-factor authentication through the Partner Center.
- Limited administration, which has privileges equivalent to a helpdesk admin.
admin Remove Former Employee Step 7 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/remove-former-employee-step-7.md
After you've saved and accessed all the former employee's user data, you can del
2. Select the name of the employee that you want to delete. 3. Under the user's name, select **Delete user**. Choose the options you want for this user, and then select **Delete user**. If you've already given another user access to this user's email and OneDrive, you don't have to do it again here.
-When you delete a user, the account becomes inactive for approximately 30 days. You have until then to restore the account before it is permanently deleted.
+When you delete a user, the account becomes inactive for approximately 30 days. You've until then to restore the account before it's permanently deleted.
## Watch: Delete a former employee's user account
Here's information about how to get an employee out of email (Exchange).
|What you can do|How you do it| |:--|:--| |Terminate a session (such as Outlook on the web, Outlook, Exchange active sync, etc.) and force to open a new session|Reset password|
-|Terminate a session and block access to future sessions (for all protocols)|Disable the account. For example, (in the Exchange admin center or using PowerShell): <p> `Set-Mailbox user@contoso.com -AccountDisabled:$true`|
-|Terminate the session for a particular protocol (such as ActiveSync)|Disable the protocol. For example, (in the Exchange admin center or using PowerShell): <p> `Set-CASMailbox user@contoso.com -ActiveSyncEnabled:$false`|
+|Terminate a session and block access to future sessions (for all protocols)|Disable the account. For example, in the Exchange admin center or using PowerShell: <p> `Set-Mailbox user@contoso.com -AccountDisabled:$true`|
+|Terminate the session for a particular protocol (such as ActiveSync)|Disable the protocol. For example, in the Exchange admin center or using PowerShell: <p> `Set-CASMailbox user@contoso.com -ActiveSyncEnabled:$false`|
| The above operations can be done in three places:
admin Resend User Password https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/resend-user-password.md
You must be an [global admin or password administrator](about-admin-roles.md) to
3. Follow the instructions on the **Reset password** page to auto-generate a new password for the user or create one for them, and then select **Reset**.
-4. Enter an email address the user can get to so they receive the new password, and follow up with them to make sure they got it.
+4. Enter an email address the user can get to, so they receive the new password, and follow up with them to make sure they got it.
## Related content
admin Sign Up For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/sign-up-for-office-365.md
Sign up for Microsoft 365 for business so that your team can begin using the lat
::: moniker range="o365-21vianet"
-If you're in China, Office 365 operated by 21Vianet is designed to meet the needs for secure, reliable, and scalable cloud services in China. This service is powered by technology that Microsoft has licensed to 21Vianet. Microsoft does not operate the service itself. 21Vianet operates, provides, and manages delivery of the service. 21Vianet is the largest carrier-neutral Internet data center services provider in China, providing hosting, managed network services, and cloud computing infrastructure services. By licensing Microsoft technologies, 21Vianet operates local Microsoft datacenters to provide you the ability to use Microsoft services while keeping your data within China. 21Vianet also provides your subscription and billing services, as well as support.
+If you're in China, Office 365 operated by 21Vianet is designed to meet the needs for secure, reliable, and scalable cloud services in China. This service is powered by technology that Microsoft has licensed to 21Vianet. Microsoft doesn't operate the service itself. 21Vianet operates, provides, and manages delivery of the service. 21Vianet is the largest carrier-neutral Internet data center services provider in China, providing hosting, managed network services, and cloud computing infrastructure services. By licensing Microsoft technologies, 21Vianet operates local Microsoft datacenters to provide you the ability to use Microsoft services while keeping your data within China. 21Vianet also provides your subscription and billing services, and support.
> [!NOTE] > These services are subject to Chinese laws.
You don't need to cancel your trial. If you don't buy the trial subscription, it
- **The address and contact information for your subscription:**
- - **Country** where the services will be used. You **won't** be able to change the country later, even during the sign up process; you'll have to restart the sign up wizard.
+ - **Country** where the services will be used. You **won't** be able to change the country later, even during the sign-up process; you'll have to restart the sign-up wizard.
- **Email** and **phone number** so we can contact you if needed about your subscription. For example, if you forget your password, we would use this information to send you a temporary one. We also send your billing information to the email address you specify.
admin Choose Between Basic Mobility And Security And Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/choose-between-basic-mobility-and-security-and-intune.md
description: "Basic Mobility and Security is part of the Microsoft 365 plans, wh
## Availability of Basic Mobility and Security and Intune
-Both Basic Mobility and Security and Intune are included in a variety of plans, described in the following table.
+Both Basic Mobility and Security and Intune are included in various plans, described in the following table.
| Plan | Basic Mobility and Security | Microsoft Intune | |:--|:--|:--|
Microsoft Intune and built-in Basic Mobility and Security both give you the abil
|WiFi profiles |Provision a native WiFi profile on the device. |No|Yes| |VPN profiles |Provision a native VPN profile on the device. |No|Yes| |Mobile application management |Deploy your internal line-of-business apps and from apps stores to users. |No|Yes|
-|Mobile application protection |Enable your users to securely access corporate information using the Office mobile and line-of-business apps they know, while ensuring security of data by helping to restrict actions like copy, cut, paste, and save as, to only those apps managed approved for corporate data. Works even if the devices are not enrolled to Basic Mobility and Security. See Protect app data using MAM policies. |No|Yes|
+|Mobile application protection |Enable your users to securely access corporate information using the Office mobile and line-of-business apps they know, while ensuring security of data by helping to restrict actions like copy, cut, paste, and save as, to only those apps managed approved for corporate data. Works even if the devices aren't enrolled to Basic Mobility and Security. See Protect app data using MAM policies. |No|Yes|
|Managed browser |Enable more secure web browsing using the Edge app. |No|Yes| |Zero touch enrollment programs (AutoPilot) |Enroll large numbers of corporate-owned devices, while simplifying user setup. |No|Yes|
admin Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/overview.md
description: "Manage and secure mobile devices connected to your Microsoft 365 o
# Overview of Basic Mobility and Security for Microsoft 365
-You can manage and secure mobile devices when they're connected to your Microsoft 365 organization by using Basic Mobility and Security. Mobile devices like smartphones and tablets that are used to access work email, calendar, contacts, and documents play a big part in making sure that employees get their work done anytime, from anywhere. So itΓÇÖs critical that you help protect your organization's information when people use devices. You can use Basic Mobility and Security to set device security policies and access rules, and to wipe mobile devices if theyΓÇÖre lost or stolen.
+You can manage and secure mobile devices when they're connected to your Microsoft 365 organization by using Basic Mobility and Security. Mobile devices like smartphones and tablets that are used to access work email, calendar, contacts, and documents play a significant part in making sure that employees get their work done anytime, from anywhere. So itΓÇÖs critical that you help protect your organization's information when people use devices. You can use Basic Mobility and Security to set device security policies and access rules, and to wipe mobile devices if theyΓÇÖre lost or stolen.
:::image type="content" source="../../media/basic-mobility-security/bms-3-setup.png" alt-text="Basic Mobility and Security Setup.":::
admin Troubleshoot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/troubleshoot.md
If you're running into issues when you try to enroll a device in Basic Mobility
To start, check the following: -- Make sure that the device is not already enrolled with another mobile device management provider, such as Intune.
+- Make sure that the device isn't already enrolled with another mobile device management provider, such as Intune.
- Make sure that the device is set to the correct date and time.
To start, check the following:
- If you see the error message, "Profile failed to install," try one of the following:
- - Make sure that Safari is the default browser on the device, and that cookies are not disabled.
+ - Make sure that Safari is the default browser on the device, and that cookies aren't disabled.
- Reboot the device, and then navigate to portal.manage.microsoft.com. Sign in with your Microsoft 365 user ID and password, and attempt to install the profile manually.
admin Feedback Provide Microsoft https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/feedback-provide-microsoft.md
Microsoft values your feedback, and every day we look at feedback from users acr
Whether youΓÇÖre providing feedback directly in an application or website, through the Feedback portal, or in the [Windows Feedback Hub](https://aka.ms/WIPFeedbackHub), there are some simple steps you can take to make your feedback as strong as possible. -- If you are using a community feedback experience, Microsoft will prioritize feedback that high volumes of our users are experiencing or requesting. You can see if feedback you want to provide already exists by searching to browse existing feedback to see if your feedback has already been mentioned by someone in the community. ItΓÇÖs possible that you have the same feedback as someone else, and you can add your voice to the existing feedback rather than creating a copy of it. If you canΓÇÖt find feedback like yours, itΓÇÖs time to add new feedback
+- If you're using a community feedback experience, Microsoft will prioritize feedback that high volumes of our users are experiencing or requesting. You can see if feedback you want to provide already exists by searching to browse existing feedback to see if your feedback has already been mentioned by someone in the community. ItΓÇÖs possible that you have the same feedback as someone else, and you can add your voice to the existing feedback rather than creating a copy of it. If you canΓÇÖt find feedback like yours, itΓÇÖs time to add new feedback
- When providing feedback to Microsoft, itΓÇÖs important that you keep your comments specific to a single topic at a time. Product teams are continuously reading feedback, and when we see similar feedback from different users, we try to combine it to see the full impact to our userbase. Providing feedback about a single topic at a time helps us to link similar feedback together.-- If youΓÇÖre experiencing an issue, try to describe the steps you took that caused that issue to occur. ItΓÇÖs great to know if the problem is intermittent or happens every time, so our product teams can take a look at it and try to reproduce the problem. If you are using Windows Feedback Hub and your diagnostic settings allow it, you can use the ΓÇ£Recreate my problemΓÇ¥ feature to attach screenshots and diagnostic logs as you reproduce the issue youΓÇÖre facing. Typically, more details are better. If you are using an app and it tends to crash every time an action is performed, include that in your description in addition to telling us that the application is crashing.-- Whenever you provide feedback, remember not to provide any identifiable information such as phone numbers or email addresses, and make sure to avoid leaving personal information in any screenshots you attach. Feedback submitted on community platforms can be seen by other users, and you would not want to expose personal data.-- When you are finished submitting your feedback, you can log into the Feedback portal to view feedback you previously sent to Microsoft and see the status of that feedback. If you provided feedback on Windows Feedback Hub, you can open the app and view your My Feedback section to see the status of your feedback.
+- If youΓÇÖre experiencing an issue, try to describe the steps you took that caused that issue to occur. ItΓÇÖs great to know if the problem is intermittent or happens every time, so our product teams can take a look at it and try to reproduce the problem. If you're using Windows Feedback Hub and your diagnostic settings allow it, you can use the ΓÇ£Recreate my problemΓÇ¥ feature to attach screenshots and diagnostic logs as you reproduce the issue youΓÇÖre facing. Typically, more details are better. If you're using an app and it tends to crash every time an action is performed, include that in your description in addition to telling us that the application is crashing.
+- Whenever you provide feedback, remember not to provide any identifiable information such as phone numbers or email addresses, and make sure to avoid leaving personal information in any screenshots you attach. Feedback submitted on community platforms can be seen by other users, and you wouldn't want to expose personal data.
+- When you're finished submitting your feedback, you can log into the Feedback portal to view feedback you previously sent to Microsoft and see the status of that feedback. If you provided feedback on Windows Feedback Hub, you can open the app and view your My Feedback section to see the status of your feedback.
## Where to provide feedback
There are many places you can provide feedback to Microsoft. Within an applicat
:::image type="content" source="../../media/i-have-a-suggestion.png" alt-text="Screenshot: Text field to enter feedback suggestion to Microsoft":::
-Depending on the platform and application, you may be able to submit additional logs and screenshots. These are very helpful for the product teams at Microsoft to understand your feedback, so please include screenshots and logs when possible.
+Depending on the platform and application, you may be able to submit additional logs and screenshots. These are helpful for the product teams at Microsoft to understand your feedback, so please include screenshots and logs when possible.
### Sending feedback from Feedback, our community feedback web portal
-If you are using [Feedback](https://feedbackportal.microsoft.com/), you can provide feedback directly within the web portal. Community feedback allows you to browse or vote on feedback from the community. Community feedback is publicly displayed within different forums. Your user name will be displayed by feedback you submit publicly or comments you provide.
+If you're using [Feedback](https://feedbackportal.microsoft.com/), you can provide feedback directly within the web portal. Community feedback allows you to browse or vote on feedback from the community. Community feedback is publicly displayed within different forums. Your user name will be displayed by feedback you submit publicly or comments you provide.
:::image type="content" source="../../media/sending-feedback-community-portal.png" alt-text="Screenshot: Selection of Microsoft products you can send feedback on":::
-Selecting a forum allows you to see all feedback related to that product, and you can upvote or comment on feedback that matches yours. If you do not see feedback that is similar to your own, you can submit new feedback through the portal itself.
+Selecting a forum allows you to see all feedback related to that product, and you can upvote or comment on feedback that matches yours. If you don't see feedback that is similar to your own, you can submit new feedback through the portal itself.
### Sending feedback from Windows Feedback Hub
-If you are using Windows Feedback Hub, you can provide feedback from within the Feedback Hub application. For more details on using Feedback Hub, you can [read this article](/windows-insider/feedback). Feedback Hub allows you to also view feedback from other users in the community directly from your Windows device. You may also browse, upvote, or comment on existing feedback, or submit your own using the new feedback form to provide bug reports or feature suggestions.
+If you're using Windows Feedback Hub, you can provide feedback from within the Feedback Hub application. For more details on using Feedback Hub, you can [read this article](/windows-insider/feedback). Feedback Hub allows you to also view feedback from other users in the community directly from your Windows device. You may also browse, upvote, or comment on existing feedback, or submit your own using the new feedback form to provide bug reports or feature suggestions.
:::image type="content" source="../../media/summarize-your-feedback.png" alt-text="Screenshot: Page to enter and summarize your feedback"::: ## Deleting public feedback
-If you submitted feedback publicly on the Feedback web portal that you wish to delete, you can remove it by navigating to your My Feedback section. Then, select the feedback item you wish to delete, and select ΓÇ£Delete.ΓÇ¥ You will be presented with a warning that deleting feedback is irreversible, and that by removing your feedback it will remove all comments, votes, flags, and follows associated with it.
+If you submitted feedback publicly on the Feedback web portal that you wish to delete, you can remove it by navigating to your My Feedback section. Then, select the feedback item you wish to delete, and select ΓÇ£Delete.ΓÇ¥ You'll be presented with a warning that deleting feedback is irreversible, and that by removing your feedback it will remove all comments, votes, flags, and follows associated with it.
:::image type="content" source="../../media/delete-feedback.png" alt-text="Screenshot: Option to delete feedback"::: ## How Microsoft uses feedback
-Once your feedback is sent to Microsoft, it is routed to the relevant product teams who can review it. We look at new feedback that comes in to evaluate if other users have reported similar feedback, and we try to group these similar feedback reports together to surface the most impactful issues and help prioritize future work.
-Through Windows Feedback Hub and the Feedback web portal, Microsoft has the ability to update the status of your feedback and respond to it. We cannot promise to respond to every single feedback report, but we do try to evaluate all feedback that comes in to help prioritize product changes.
+Once your feedback is sent to Microsoft, it's routed to the relevant product teams who can review it. We look at new feedback that comes in to evaluate if other users have reported similar feedback, and we try to group these similar feedback reports together to surface the most impactful issues and help prioritize future work.
+Through Windows Feedback Hub and the Feedback web portal, Microsoft has the ability to update the status of your feedback and respond to it. We canΓÇÖt promise to respond to every single feedback report, but we do try to evaluate all feedback that comes in to help prioritize product changes.
### What responses can I expect?
-You will see each feedback card on the feedback portal tagged with one of the statuses below. You can find this status tag as shown in the screenshot below.
+You'll see each feedback card on the feedback portal tagged with one of the statuses below. You can find this status tag as shown in the screenshot below.
:::image type="content" source="../../media/ink-to-text-conversion.png" alt-text="Screenshot: Example of feedback card on Ink to text conversion on an iPad":::
Once your feedback has moved to each product teamsΓÇÖ review process this is the
Once your feedback was deemed to be a suggestion for product improvement and has moved to each product teamsΓÇÖ review process this is the status the feedback would move to. **WeΓÇÖre looking into this** The product team is investigating the reported issue.
-If you submitted feedback related to an issue you were facing and the product team has started investigation the feedback status would move to this.
+If you submitted feedback related to an issue, you were facing and the product team has started investigation the feedback status would move to this.
**We need more details** We need your help to better understand this feedback. We were unable to determine next steps from the information that was provided. This could be due to lack of sufficient description, missing context, screenshots, etc. Typically, this will be accompanied by a Microsoft response clarifying what additional information is needed.
-**WeΓÇÖre working on this** We are working on a change in the product to address your feedback.
+**WeΓÇÖre working on this** We're working on a change in the product to address your feedback.
Your feedback will move to this status when itΓÇÖs in the process of being addressed and the product team is actively working on it. **WeΓÇÖve closed this** We were unable to act on this feedback. Please see the Microsoft response for more information.
-Your feedback will move to this status when we cannot take any next steps with it because it was irrelevant to our products or violates our code of conduct. Typically the Microsoft response will clarify why it was closed.
+Your feedback will move to this status when we canΓÇÖt take any next steps with it because it was irrelevant to our products or violates our code of conduct. Typically the Microsoft response will clarify why it was closed.
**Already supported** We believe this already exists in the product.
-Your feedback would move to this status when the product team has reviewed your feedback and determined that there is either a workaround to the issue you are facing or your ask is already implemented in the product. Typically the Microsoft response will contain more information on what you can do to self-help.
+Your feedback would move to this status when the product team has reviewed your feedback and determined that there's either a workaround to the issue you're facing or your ask is already implemented in the product. Typically the Microsoft response will contain more information on what you can do to self-help.
**Great News! WeΓÇÖve added this** This suggestion has been added. When the product team has implemented and has released or is releasing a new build with the improvement, your feedback would move to this status. Typically the Microsoft response would contain relevant instructions on how to access new features or fixes.
Thank you: We appreciate your feedback.
## Public feedback moderation
-Moderation of community feedback may be performed by Microsoft employees or approved vendors. Feedback that violates the Feedback Code of Conduct may be hidden from the public view, but Microsoft will not delete this data outside of our data retention policies.
+Moderation of community feedback may be performed by Microsoft employees or approved vendors. Feedback that violates the Feedback Code of Conduct may be hidden from the public view, but Microsoft won't delete this data outside of our data retention policies.
## Data Handling and Privacy
admin Solution Provider Partners In Russia https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/solution-provider-partners-in-russia.md
description: "Get a list of Microsoft Cloud Solutions providers in Russia."
# Microsoft Cloud Solution Provider Partners in Russia
-Here is a list of Microsoft Cloud Solution Providers in Russia.
+Here's a list of Microsoft Cloud Solution Providers in Russia.
- [Mont](https://www.mont.com/ru-ru/)
admin Multi Factor Authentication Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/multi-factor-authentication-microsoft-365.md
description: "Multi-factor authentication (MFA) uses both a password, which shou
# Multifactor authentication for Microsoft 365
-Passwords are the most common method of authenticating a sign-in to a computer or online service, but they are also the most vulnerable. People can choose easy passwords and use the same passwords for multiple sign-ins to different computers and services.
+Passwords are the most common method of authenticating a sign-in to a computer or online service, but they're also the most vulnerable. People can choose easy passwords and use the same passwords for multiple sign-ins to different computers and services.
-To provide an additional level of security for sign-ins, you must use multifactor authentication (MFA), which uses both a password, which should be strong, and an additional verification method based on:
+To provide an extra level of security for sign-ins, you must use multifactor authentication (MFA), which uses both a password, which should be strong, and an additional verification method based on:
-- Something you have with you that is not easily duplicated, such as a smart phone.
+- Something you have with you that isn't easily duplicated, such as a smart phone.
- Something you uniquely and biologically have, such as your fingerprints, face, or other biometric attribute.
-The additional verification method is not employed until after the user's password has been verified. With MFA, even if a strong user password is compromised, the attacker does not have your smart phone or your fingerprint to complete the sign-in.
+The additional verification method isn't employed until after the user's password has been verified. With MFA, even if a strong user password is compromised, the attacker doesn't have your smart phone or your fingerprint to complete the sign-in.
## MFA support in Microsoft 365
By default, both Microsoft 365 and Office 365 support MFA for user accounts usin
- A phone call. - The Microsoft Authenticator smart phone app.
-In both cases, the MFA sign-in is using the "something you have with you that is not easily duplicated" method for the additional verification. There are multiple ways in which you can enable MFA for Microsoft 365 and Office 365:
+In both cases, the MFA sign-in is using the "something you have with you that isn't easily duplicated" method for the additional verification. There are multiple ways in which you can enable MFA for Microsoft 365 and Office 365:
- With security defaults - With Conditional Access policies
These ways are based on your Microsoft 365 plan.
|Plan|Recommendation|Type of customer| ||||
-|All Microsoft 365 plans|Use security defaults, which require MFA for all user accounts. <p> You can also configure per-user MFA on individual user accounts, but this is not recommended.|Small business|
+|All Microsoft 365 plans|Use security defaults, which require MFA for all user accounts. <p> You can also configure per-user MFA on individual user accounts, but this isn't recommended.|Small business|
|Microsoft 365 Business Premium <p> Microsoft 365 E3 <p> Azure Active Directory (Azure AD) Premium P1 licenses|Use Conditional Access policies to require MFA for user accounts based on group membership, apps, or other criteria.|Small business to enterprise| |Microsoft 365 E5 <p> Azure AD Premium P2 licenses|Use Azure AD Identity Protection to require MFA based on sign-in risk criteria.|Enterprise| ||||
Conditional Access policies are a set of rules that specify the conditions under
- If the user account name is a member of a group for users that are assigned the Exchange, user, password, security, SharePoint, or global administrator roles, require MFA before allowing access.
-This policy allows you to require MFA based on group membership, rather than trying to configure individual user accounts for MFA when they are assigned or unassigned from these administrator roles.
+This policy allows you to require MFA based on group membership, rather than trying to configure individual user accounts for MFA when they're assigned or unassigned from these administrator roles.
You can also use Conditional Access policies for more advanced capabilities, such as requiring MFA for specific apps or that the sign-in is done from a compliant device, such as your laptop running Windows 10.
For more information, see this [overview of Azure AD Identity Protection](/azure
### Legacy per-user MFA (not recommended)
-You should be using either security defaults or Conditional Access policies to require MFA for your user account sign-ins. However, if either of these cannot be used, Microsoft strongly recommends MFA for user accounts that have administrator roles, especially the global administrator role, for any size subscription.
+You should be using either security defaults or Conditional Access policies to require MFA for your user account sign-ins. However, if either of these canΓÇÖt be used, Microsoft strongly recommends MFA for user accounts that have administrator roles, especially the global administrator role, for any size subscription.
You enable MFA for individual user accounts from the <a href="https://go.microsoft.com/fwlink/p/?linkid=834822" target="_blank">**Active users**</a> pane of the Microsoft 365 admin center. ![Picture of Multi factor authentication option on Active users page.](../../media/multi-factor-authentication-microsoft-365/per-user-mfa.png)
-After being enabled, the next time the user signs in, they will be prompted to register for MFA and to choose and test the additional verification method.
+After being enabled, the next time the user signs in, they'll be prompted to register for MFA and to choose and test the additional verification method.
### Using these methods together
This table shows the results of enabling MFA with security defaults, Conditional
||||| |**Security defaults**|Can't use Conditional Access policies|Can use Conditional Access policies|Microsoft Authenticator app| |**Conditional Access policies**|If any are enabled, you can't enable security defaults|If all are disabled, you can enable security defaults|User-specified during MFA registration|
-|**Legacy per-user MFA (not recommended)**|Overrides security defaults and Conditional Access policies requiring MFA at each sign in|Overridden by security defaults and Conditional Access policies|User-specified during MFA registration|
+|**Legacy per-user MFA (not recommended)**|Overrides security defaults and Conditional Access policies requiring MFA at each sign-in|Overridden by security defaults and Conditional Access policies|User-specified during MFA registration|
|||| If security defaults are enabled, all new users are prompted for MFA registration and the use of the Microsoft Authenticator app at their next sign-in.
admin Secure Your Business Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/secure-your-business-data.md
We recommend you get started with this protection by creating a policy for your
4. Specify the name, description, and settings for your policy as recommended in the chart below. For more information, see [Learn about anti-phishing policy in Microsoft Defender for Office 365 options](../../security/office-365-security/set-up-anti-phishing-policies.md).
-5. After you have reviewed your settings, select **Create this policy** or **Save**, as appropriate.
+5. After you've reviewed your settings, select **Create this policy** or **Save**, as appropriate.
|Setting or option|Recommended setting| ||| |Name|Domain and most valuable campaign staff|
-|Description|Ensure most important staff and our domain are not being impersonated.|
+|Description|Ensure most important staff and our domain aren't being impersonated.|
|Add users to protect|Select **+ Add a condition, The recipient is**. Type user names or enter the email address of the candidate, campaign manager, and other important staff members. You can add up to 20 internal and external addresses that you want to protect from impersonation.| |Add domains to protect|Select **+ Add a condition, The recipient domain is**. Enter the custom domain associated with your Microsoft 365 subscription, if you defined one. You can enter more than one domain.| |Choose actions|If email is sent by an impersonated user: select **Redirect message to another email address**, and then type the email address of the security administrator; for example, securityadmin@contoso.com. <br/> If email is sent by an impersonated domain: select **Quarantine message**.|
We recommend you get started with this protection by creating a policy for your
## Protect against malicious attachments, files, and URLs
-People regularly send, receive, and share attachments, such as documents, presentations, spreadsheets, and more. It's not always easy to tell whether an attachment is safe or malicious just by looking at an email message. Microsoft Defender for Office 365 includes Safe Attachment protection, but this protection is not turned on by default. We recommend that you create a new rule to begin using this protection. This protection extends to files in SharePoint, OneDrive, and Microsoft Teams.
+People regularly send, receive, and share attachments, such as documents, presentations, spreadsheets, and more. It's not always easy to tell whether an attachment is safe or malicious just by looking at an email message. Microsoft Defender for Office 365 includes Safe Attachment protection, but this protection isn't turned on by default. We recommend that you create a new rule to begin using this protection. This protection extends to files in SharePoint, OneDrive, and Microsoft Teams.
### Set up Safe Attachments
You can use pre-set Safe Attachments policies, or create your own. To create a S
4. Apply the settings in the following table.
-5. After you have reviewed your settings, select **Create this policy** or **Save**, as appropriate.
+5. After you've reviewed your settings, select **Create this policy** or **Save**, as appropriate.
|Setting or option|Recommended setting| |||
admin Set Up Multi Factor Authentication https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication.md
Multifactor authentication means you and your employees must provide more than o
### Turn off legacy per-user MFA
-If you have previously turned on per-user MFA, you must turn it off before enabling Security defaults.
+If you've previously turned on per-user MFA, you must turn it off before enabling Security defaults.
1. In the Microsoft 365 admin center, in the left nav choose **Users** \> **Active users**. 1. On the **Active users** page, choose **Multi-factor authentication**.
You enable or disable security defaults from the **Properties** pane for Azure A
4. At the bottom of the page, choose **Manage Security defaults**. 5. Choose **Yes** to enable security defaults or **No** to disable security defaults, and then choose **Save**.
-If you have been using [baseline Conditional Access policies](/azure/active-directory/conditional-access/concept-baseline-protection), you will be prompted to turn them off before you move to using security defaults.
+If you have been using [baseline Conditional Access policies](/azure/active-directory/conditional-access/concept-baseline-protection), you'll be prompted to turn them off before you move to using security defaults.
1. Go to the [Conditional Access - Policies page](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ConditionalAccessBlade/Policies). 2. Choose each baseline policy that is **On** and set **Enable policy** to **Off**.
For more information about the Azure AD P1 and P2, see [Azure Active Directory p
### Turn on Modern authentication for your organization
-For most subscriptions modern authentication is automatically turned on, but if you purchased your subscription before August 2017, it is likely that you will need to turn on Modern Authentication in order to get features like Multifactor Authentication to work in Windows clients like Outlook.
+For most subscriptions modern authentication is automatically turned on, but if you purchased your subscription before August 2017, it's likely that you'll need to turn on Modern Authentication in order to get features like Multifactor Authentication to work in Windows clients like Outlook.
1. In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>, in the left nav choose **Settings** \> **Org settings**.
admin Whats New In Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/whats-new-in-preview.md
And if you'd like to know what's new with other Microsoft cloud
- [Office updates](/OfficeUpdates/) - [How to check Windows release health](/windows/deployment/update/check-release-health)
+## May 2022
+
+<!-- ### Role based access controls (RBAC)
+
+There are new Azure AD built-in roles in the Microsoft 365 admin center. Give admins only the access they need to manage Virtual Visits.
+
+There are also 4 new roles in the Microsoft 365 admin center centered around management of custom security attributes. These roles are available for everyone to use in the Role assignments node under Roles.
+
+For more information about Azure AD built-in roles, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference).
+
+**Virtual Visits Administrator** Manage and share Virtual Visits information and metrics from admin centers or the Virtual Visits app.
+
+**Attribute Assignment Administrator** Assign custom security attribute keys and values to supported Azure AD objects.
+
+**Attribute Assignment Reader** Reads custom security attribute keys and values for supported Azure AD objects.
+
+**Attribute Definition Administrator** Define and manage the definition of custom security attributes.
+
+**Attribute Definition Reader** Reads the definition of custom security attributes. -->
+
+### Quick Assist
+
+We've moved Quick Assist to the Windows Store to enhance the performance and security of the app. The Windows Quick Assist app allows you and your end-users to receive or provide PC assistance over a remote connection.
+
+With the new Quick Assist Store app, you should see a significant improvement in passcode generation times and a reduction in application errors.
+
+For more information, see [Solve PC problems over a remote connection](https://support.microsoft.com/windows/solve-pc-problems-over-a-remote-connection-b077e31a-16f4-2529-1a47-21f6a9040bf3) and [Install Quick Assist](https://support.microsoft.com/windows/install-quick-assist-c17479b7-a49d-4d12-938c-dbfb97c88bca)
+ ## April 2022 ### NPS Sentiment Insights
We've added a couple of new categories to Search functionality.
- You can now find simplified setup experiences through global search. This can help you and your team quickly get started with how to use new features. For example, search for **set password to never expire**. To learn more about search in the admin center, see [Search in the Microsoft 365 admin center](manage/search-in-the-mac.md).-
-## May 2021
-
-### Admin mobile app
-
-### Keep track of support ticket updates using the Admin mobile app
-
-For all the service requests created in your tenant you can now keep track of the ticket status, view ticket details and provide / request additional information by adding notes & attachments.
--
-### Stay on top of all the major updates to the app and your Microsoft 365 subscription
--- Stay on top of all the major updates to your Microsoft 365 subscription through Message Center push notifications (now enabled by default).--- Keep track of the latest features available in the app using the **What's New** section. Go to **Settings** > **WhatΓÇÖs new?**--
-## April 2021
-
-### Admin mobile app
-
-### Manage licenses and bills from the Admin mobile app
--- You can now view all available and assigned licenses for your subscriptions. You can also assign or un-assign licenses to users, and add or remove licenses.-- You can now view detailed invoices in the app.-- These updates are available on both [Android](https://go.microsoft.com/fwlink/p/?linkid=2159786) and [iOS](https://go.microsoft.com/fwlink/p/?linkid=2159787) devices.--
-### Updated Message center feed in the Admin mobile app
--- You now have a more flexible reading experience of the Message center feed. You now have the ability to filter messages based on service or tags and mark messages as favorite. Bulk actions for marking messages as read, unread or archived has also been added.-- These updates are available on both [Android](https://go.microsoft.com/fwlink/p/?linkid=2159786) and [iOS](https://go.microsoft.com/fwlink/p/?linkid=2159787) devices.--
-## Ignite 2021 (March)
-
-Welcome to Microsoft Ignite. We hope you were able to attend some of one of our sessions: [Microsoft Ignite 2021](https://myignite.microsoft.com/sessions). Here's a few of the things we talked about at Ignite.
-> [!NOTE]
-> Not all features are going to be available to everyone right away. If you aren't seeing the new features, [join Targeted Release](manage/release-options-in-office-365.md).
-
-### Message center
-
-WeΓÇÖve revamped the Message center to help you discover relevant messages and added a more flexible reading experience. We've added a new **Service** column to help you scan which Service a message applies to and filter messages by Service and other metadata. You can favorite a message to mark it for follow-up, choose which columns appear in the message list, and navigate between messages with the back and next buttons. We've also improved the process to make it easier to give feedback on Message center posts.
--
-To learn more about the new features, check out [Message center](manage/message-center.md).
-
-### What's new features
-
-We've made improvements to how you view the "What's new" features for users in the Office apps. You can now see the rich content in the What's new pane that your users can see. You can also learn more about the feature before you decide to let your users know about the feature. For more info, check out [Manage which Office features appear in What's New](manage/show-hide-new-features.md).
-
bookings Add Questions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/add-questions.md
description: "If you need to ask customers questions when they book an appointme
# Add custom and required questions to the booking page
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- Bookings lets you create questions to ask your customers when they are booking appointments. It also lets you choose which questions are required. You associate the questions with a service, so each service can have a different set of questions. For example, a hair stylist may ask customers who are booking a hair coloring appointment if they have any known allergies to bleaches or tints. This allows you and your customers to save time when they arrive for their appointment.
bookings Add Staff https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/add-staff.md
description: "Use this page to create your staff list and to manage staff member
# Add staff to Bookings
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- The Staff page in Bookings is where you create your staffing list and manage staff member details such as name, phone number, and email address. You can also set working hours for each staff member from here. ## Before you begin
bookings Bookings Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/bookings-overview.md
description: "An overview of the Microsoft Bookings app, which includes a web-ba
# Microsoft Bookings
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- Microsoft Bookings makes scheduling and managing appointments a breeze. Bookings includes a web-based booking calendar and integrates with Outlook to optimize your staffΓÇÖs calendar and give your customers flexibility to book a time that works best for them. Email and SMS text notifications reduce no-shows and enhances customer satisfaction. Your organization saves time with a reduction in repetitive scheduling tasks. With built-in flexibility and ability to customize, Bookings can be designed to fit the situation and needs of many different parts of an organization. > [!NOTE]
bookings Campaign Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/campaign-id.md
+
+ Title: "Add a marketing campaign ID to a Bookings page URL"
+++
+audience: Admin
++
+ms.localizationpriority: medium
+description: "How to add a campaign ID to a Bookings page URL"
++
+# Add a marketing campaign ID to a Bookings page URL
+
+Keep track of your Bookings marketing campaigns by adding a campaign ID to the end of your Booking page URL.
+
+Use a campaign ID to see how your marketing campaigns are doing. Add a campaign ID you choose to the end of your Bookings page URL and use the campaign ID in your different marketing platforms to see which of your campaigns are connecting with customers.
+
+## Add campaign ID
+
+1. In Microsoft 365, select the App launcher, and then select **Bookings**.
+
+2. Choose your calendar and in the left navigation pane, select **Booking page** and copy your booking page URL and paste it into a text editing program, like Notepad.
+
+ :::image type="content" source="../media/copy-booking-page-url.png" alt-text="Screenshot: Copy Bookings page URL so you can add a campaign ID for marketing":::
+
+3. Add a campaign ID to the end of the Booking page URL. For example, if your booking page URL looks like this, [https://outlook.office365.com/owa/calendar/TailspinToys@contosopetscom.onmicrosoft.com/bookings/](https://outlook.office365.com/owa/calendar/TailspinToys@contosopetscom.onmicrosoft.com/bookings/), you would choose an ID to add to the end. For example, if you wanted to track your booking details from your Twitter page, you could add Twitter to the end of the URL. The new URL that you would add to your Twitter page would look like this: [https://outlook.office365.com/owa/calendar/TailspinToys@contosopetscom.onmicrosoft.com/bookings/?RefID=Twitter](https://outlook.office365.com/owa/calendar/TailspinToys@contosopetscom.onmicrosoft.com/bookings/?RefID=Twitter). Use different campaign IDs to track the marketing campaigns you're running.
+
+> [!NOTE]
+> Characters in the campaign ID must be one of the following: alphanumeric characters, underscore or hyphen. Make sure you test your Campaign ID url by copying and pasting into a web browser.
+
+## Track campaign IDs
+
+You can track how your campaigns are doing by downloading a report (TSV file) that shows you the last four months of activities of your Bookings calendar. The TSV file will show you four months of data, but you can select different four month periods over the course of a year. For more information on how to download the report, see [Reporting info for Bookings](reporting-info.md).
bookings Comparison Chart https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/comparison-chart.md
description: "A comparison chart that shows the feature differences between the
# Comparison chart: Bookings web app vs. Bookings Teams app
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- The Bookings app in Teams lets schedulers handle their main tasks and change some settings. However, the Bookings web includes advanced features and settings that are not yet available in the Teams app. Teams app features are being added all the time and we will continue to update this list. See the **Is all the functionality of the original Bookings Web app available in Microsoft Teams?** section in the [FAQ](bookings-faq.yml) for more details.
bookings Create A Manual Booking https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/create-a-manual-booking.md
description: "Follow these instructions to create an appointment and assign an e
# Create a manual booking
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- Bookings can be scheduled and staffed in two different ways. The first way is by the customer using a standalone booking page or an embedded booking page that you add to your website. The other way is for you or one of your employees to enter the bookings manually, such as when a customer calls for an appointment. This article covers the manual scenario. 1. In Microsoft 365, select the App launcher, and then select **Bookings**.
bookings Customize Booking Page https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/customize-booking-page.md
description: "Change the color theme of your booking page in the Microsoft Booki
# Customize and publish your booking page
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- The Booking Page is where you set up what your external facing booking page will look like. Once you customize and publish your booking page, people will use it to book appointments with you. To customize your booking page, sign in to [Office.com](https://office.com), and then go to **Bookings** \> **Booking page**. You can customize the booking page with the following options. Once you've setup up your Booking Page, you can publish it so people can start booking appointments with you.
bookings Define Service Offerings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/define-service-offerings.md
description: "Instructions for entering service offerings information, including
# Define your service offerings in Bookings
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- When you define your service offerings in Microsoft Bookings, you set a service name, description, location (choose whether you want to meet in person or have an online meeting), duration, default reminders to customers and staff, internal notes about the service, and pricing. You can also tag the employees who are qualified to provide the service. Then, when customers come to your business web site to book an appointment, they can see exactly what types of appointments are available, choose the person they want to provide the service, and how much their service will cost. You can also add customized information and URLs to the email confirmation and reminders that you send when someone books a service through your booking page.
bookings Delete Calendar https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/delete-calendar.md
description: "Use the Microsoft 365 admin center or Windows PowerShell to delete
# Delete a booking calendar in Bookings
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- This article explains how you can delete an unwanted booking calendar. You can delete the booking calendar in the Microsoft 365 admin center or you can use PowerShell. The Bookings calendar is a mailbox in Exchange Online so you delete the corresponding user account to delete the booking calendar. > [!IMPORTANT]
bookings Employee Hours https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/employee-hours.md
description: "Set employee working hours and availability in Microsoft Bookings.
# Employee working hours in Microsoft Bookings
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- Setting employee working hours ensures that their availability is accurately shown when your customers try to book them. By default, the working hours for each of your employees match the business hours you've established in the Microsoft Bookings app. See the "Set your business hours" section of [Enter business information](enter-business-information.md). On the **Staff** page, you can customize employee working hours to match the needs of your business and employees.
bookings Enter Business Information https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/enter-business-information.md
description: "Follow these instructions to create your About Us page with busine
# Enter your business information in Microsoft Bookings
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- In Microsoft Bookings, the Business Information page within the web app contains all the details that you'd typically find on a business' "About us" page. These details include a relevant name, address, phone number, web site URL, privacy policy URL, logo, and business hours. The information you provide here will be displayed on the page customers and clients use to book appointments (known as the booking page) and in messages and reminders sent to them by Bookings. An example of this information on the booking page is highlighted below.
bookings Get Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/get-access.md
description: "Learn how to get access to the Bookings feature in Microsoft 365."
# Get access to Microsoft Bookings
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- This topic describes how to get access to Bookings for the first time. It also tells you how to turn on or off Bookings in your organization. It also explains how you can assign licenses to your users so they can access and use Bookings. ## Access Bookings for the first time
bookings Get Bookings App https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/get-bookings-app.md
description: "The Bookings mobile apps are not yet available worldwide. This art
# Get the Microsoft Bookings app for iOS and Android
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- Microsoft Bookings is available as a mobile app for iOS and Android. The Bookings app for iOS is available in all regions and countries that Apple supports. You can download the app from the [iTunes App Store](https://apps.apple.com/app/microsoft-bookings/id1065657468). The Bookings app for Android is available for download from the [Google Play Store](https://play.google.com/store/apps/details?id=com.microsoft.exchange.bookings) in the US and Canada. ## Before you begin
bookings Metrics And Activity Tracking https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/metrics-and-activity-tracking.md
description: "Various metrics are available on the main Bookings page, allowing
# Microsoft Bookings metrics and activity tracking
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- Various metrics are available on the main Bookings page, allowing you to easily track revenue and customer activity. | Metric | Description |
bookings Reporting Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/reporting-info.md
description: "Learn how you can see a 4 month view of your Bookings activity"
# Reporting info for Bookings
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- You can now see a four month view of your Bookings calendar in a TSV file. The TSV file will show you four months of data, but you can select different four month periods over the course of a year. This appointment level information can be used to visualize the customer activity around your Bookings calendar. TSV files are tab separated value files. You can view or edit a file like this with any text editor or spreadsheet program, such as Excel.
The improved report now contains the following fields.
- **Text Notifications Enabled** Whether customers can receive SMS text-related notifications. - **Custom Fields** All the questions and answers related to a single booking are combined in this field. - **Booking ID** This is helpful to identify the same bookings of a group service.
+- **Tracking data** Track the metrics for the campaign IDs you're using in your marketing campaigns.
bookings Schedule Closures Time Off Vacation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/schedule-closures-time-off-vacation.md
description: "Schedule office closures and employee time off from the Bookings c
# Schedule Bookings business closures, time off, and vacation time
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- Occasionally, you'll want to close your business for holidays or team events, or your employees will need time off when they're sick, on vacation, or unavailable for other reasons. You can schedule time off from the Microsoft Bookings calendar, and the employee will be unavailable for bookings during the specified time. Once the business reopens or employees return to work, everyone will be listed on the booking page according to their established work hours. ## Watch: Enter business hours and time off for employees
bookings Set Buffer Time https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/set-buffer-time.md
description: "Set buffer time before or after an appointment in Microsoft Bookin
# Set buffer time in Microsoft Bookings
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- Some of your appointments might require time before or after you meet with your customer to set up, clean up, or reset your room and equipment. Or if youΓÇÖre on the road between customer appointments, you may need time to ensure you and your team can travel between appointments without making the customer wait. You can set buffer time before appointments start, after appointments end, or both to give staff the extra time they need to prepare for their next appointment.
bookings Set Language Time Zones https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/set-language-time-zones.md
description: "Change your language and time zone settings in Microsoft Bookings.
# Set language and time zones in Microsoft Bookings
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- If you are using Microsoft Bookings and bookings are created at the wrong time, then your time zone settings might need to be changed. Likewise, if some bookings are in the wrong language, you might need to change your language settings. There are two separate language and time zone settings for Bookings. The first setting controls the language and time zone of the booking calendar and is set using the Outlook on the web settings for the personal calendar of the logged-in user. The second setting affects the self-service booking page that your customers use and is set using a "regional settings" page that controls language and time zone only for that page.
bookings Set Scheduling Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/set-scheduling-policies.md
description: "Learn how to set scheduling policies for your business. Scheduling
# Set your Microsoft Bookings scheduling policies
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
- Not all appointments are the same. Some take only a few minutes, while others can take hours or more. In Microsoft Bookings, the booking page is where you set the scheduling policies for your business. Scheduling policies include the length of appointments, acceptable lead and cancellation times, and automatic notifications of booking changes. Additional customization can be added for each service within the Services page, with additional duration settings and policies that apply only to that service.
-The policies you set here are the top-level policies. They are automatically applied to all the services you offer unless you choose to modify them on a per-service basis. For example, let's say that for most services, such as initial consultations, one-day notice for cancellations is acceptable. But for those services that require facility reservations or fees, such as golf lessons, you might require three days' notice. You can set this service-level policy on the Services page. See [Define your service offerings](define-service-offerings.md) for instructions.
+The policies you set here are the top-level policies. They're automatically applied to all the services you offer unless you choose to modify them on a per-service basis. For example, let's say that for most services, such as initial consultations, one-day notice for cancellations is acceptable. But for those services that require facility reservations or fees, such as golf lessons, you might require three days' notice. You can set this service-level policy on the Services page. See [Define your service offerings](define-service-offerings.md) for instructions.
## Types of scheduling policies
bookings Turn Bookings On Or Off https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/turn-bookings-on-or-off.md
description: "Learn how to get access to Microsoft Bookings in Microsoft 365."
# Turn Microsoft Bookings on or off
-> [!NOTE]
-> This article helps you to interact with the latest version of Microsoft Bookings. Previous versions will be retired in coming months.
-
-This article is for admins.
-
-Bookings can be turned on or off for your entire organization or for specific users. When you turn on Bookings for users, they can create a Bookings page, create a calendar, and allow other people to book time with them.
+Bookings can be turned on or off for your entire organization or for specific users. When you turn on Bookings for users, they can create a Bookings page, create a calendar, and allow other people to book time with them. This article is for owners and administrators who manage Bookings for their organizations.
> [!NOTE] > The admin controls described in these sections are not available for Office 365 Operated by 21Vianet (China) customers.
commerce Allotment Basics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/licenses/allotment-basics.md
You can use allotments with any product available to users:
The following products can't be used with allotments: - Microsoft Store apps-- Perpetual software, or software that is directly assigned to a user if there is no license involved.
+- Perpetual software, or software that is directly assigned to a user if there's no license involved.
- Azure resources You must be a global or license admin to get started with an allotment. ## Getting started
-The allotments feature is available in a private preview to only a small number of customers. If you're interested in joining, fill out this form: [https://aka.ms/allotment-pilot-signup](https://aka.ms/allotment-pilot-signup).
+The allotments feature is available in a private preview to only a few customers. If you're interested in joining, fill out this form: [https://aka.ms/allotment-pilot-signup](https://aka.ms/allotment-pilot-signup).
commerce Important Information E4 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/important-information-e4.md
The Office 365 E4 plan was retired in 2015. As a Microsoft 365 global admin, you
## Compare your options for upgrading or changing plans
-You can choose to maintain the same functionality you had with E4 or take advantage of new features and functionality from Microsoft 365 and Microsoft 365 Audio Conferencing. To move to a new plan you have five options.
+You can choose to maintain the same functionality you had with E4 or take advantage of new features and functionality from Microsoft 365 and Microsoft 365 Audio Conferencing. To move to a new plan, you have five options.
| | Option 1: Upgrade to Office 365 E5 | Option 2: Upgrade to Microsoft 365 E5 | Option 3: Upgrade to Microsoft 365 E5 without Audio Conferencing | Option 4: Change to Office 365 E3 | Option 5: Change to Microsoft 365 E3 | |-|-|-|-|-|-|
compliance Auditing Solutions Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/auditing-solutions-overview.md
The following sections identify the licensing requirements for Audit (Standard)
### Audit (Standard) -- Microsoft Purview Business Basic subscription-- Microsoft Purview Apps for Business subscription-- Microsoft Purview Enterprise E3 subscription-- Microsoft Purview Business Premium-- Microsoft Purview Education A3 subscription-- Microsoft Purview Government G3 subscription-- Microsoft Purview Government G1 subscription-- Microsoft Purview Frontline F1 or F3 subscription, or F5 Security add-on
+- Microsoft Business Basic subscription
+- Microsoft 365 Apps for Business subscription
+- Microsoft 365 Enterprise E3 subscription
+- Microsoft 365 Business Premium
+- Microsoft 365 Education A3 subscription
+- Microsoft 365 Government G3 subscription
+- Microsoft 365 Government G1 subscription
+- Microsoft 365 Frontline F1 or F3 subscription, or F5 Security add-on
- Office 365 Enterprise E3 subscription - Office 365 Enterprise E1 subscription - Office 365 Education A1 subscription
If your organization has a subscription that supports Audit (Premium), perform t
- Turning on the Audit (Premium) app/service plan must be for those users.
- - Enabling the auditing of crucial events and then turning on the Audit (Premium)ing app/service plan for those users.
+ - Enabling the auditing of crucial events and then turning on the Audit (Premium) app/service plan for those users.
2. Enable Audit (Premium) events to be logged when users perform searches in Exchange Online and SharePoint Online.
compliance Create Test Tune Dlp Policy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-test-tune-dlp-policy.md
Here's a list of applicable role groups that are in preview. To learn more, see
DLP finds sensitive information by regular expression (RegEx) pattern matching, in combination with other indicators such as the proximity of certain keywords to the matching patterns. For example, a VISA credit card number has 16 digits. But, those digits can be written in different ways, such as 1111-1111-1111-1111, 1111 1111 1111 1111, or 1111111111111111.
-Any 16-digit string is not necessarily a credit card number, it could be a ticket number from a help desk system, or a serial number of a piece of hardware. To tell the difference between a credit card number and a harmless 16-digit string, a calculation is performed (checksum) to confirm that the numbers match a known pattern from the various credit card brands.
+Any 16-digit string isn't necessarily a credit card number, it could be a ticket number from a help desk system, or a serial number of a piece of hardware. To tell the difference between a credit card number and a harmless 16-digit string, a calculation is performed (checksum) to confirm that the numbers match a known pattern from the various credit card brands.
If DLP finds keywords such as "VISA" or "AMEX", near date values that might be the credit card expiry date, DLP also uses that data to help it decide whether the string is a credit card number or not.
Give your new DLP policy a name. The default name will match the DLP policy temp
![Option to name your policy.](../media/DLP-create-test-tune-name-policy.png)
-Choose the locations that the policy will apply to. DLP policies can apply to Exchange Online, SharePoint Online, and OneDrive for Business. I am going to leave this policy configured to apply to all locations.
+Choose the locations that the policy will apply to. DLP policies can apply to Exchange Online, SharePoint Online, and OneDrive for Business. I'm going to leave this policy configured to apply to all locations.
![Option to choose all locations.](../media/DLP-create-test-tune-choose-locations.png)
As an example, the DLP policy I created for this article will detect Australian
![Documentation on Australia Tax File Number.](../media/DLP-create-test-tune-Australia-Tax-File-Number-doc.png)
-To demonstrate TFN detection in a rather blunt manner, an email with the words "Tax file number" and a nine digit string in close proximity will sail through without any issues. The reason it does not trigger the DLP policy is that the nine digit string must pass the checksum that indicates it is a valid TFN and not just a harmless string of numbers.
+To demonstrate TFN detection in a rather blunt manner, an email with the words "Tax file number" and a nine digit string in close proximity will sail through without any issues. The reason it doesn't trigger the DLP policy is that the nine digit string must pass the checksum that indicates it's a valid TFN and not just a harmless string of numbers.
![Australia tax file number that does not pass checksum.](../media/DLP-create-test-tune-email-test1.png)
The incident report email includes the type of sensitive information that was de
![Incident report showing tax file number detected.](../media/DLP-create-test-tune-email-incident-report.png)
-If you leave your DLP policy in test mode and analyze the incident report emails, you can start to get a feel for the accuracy of the DLP policy and how effective it will be when it is enforced. In addition to the incident reports, you can [use the DLP reports](view-the-dlp-reports.md) to see an aggregated view of policy matches across your tenant.
+If you leave your DLP policy in test mode and analyze the incident report emails, you can start to get a feel for the accuracy of the DLP policy and how effective it will be when it's enforced. In addition to the incident reports, you can [use the DLP reports](view-the-dlp-reports.md) to see an aggregated view of policy matches across your tenant.
## Tune a DLP policy
When editing a rule within a DLP policy, you can change:
- The conditions, including the type and number of instances of sensitive data that will trigger the rule. - The actions that are taken, such as restricting access to the content. - User notifications, which are policy tips that are displayed to the user in their email client or web browser.-- User overrides determines whether users can choose to proceed with their email or file sharing anyway.
+- User overrides determine whether users can choose to proceed with their email or file sharing anyway.
- Incident reports, to notify administrators. ![Options to edit parts of a rule.](../media/DLP-create-test-tune-editing-options.png)
If you have policy tips enabled, the user will begin to see the tips in Outlook,
## Investigate false positives
-DLP policy templates are not perfect straight out of the box. It's likely that you'll find some false positives occurring in your environment, which is why it's so important to ease your way into a DLP deployment, taking the time to adequately test and tune your policies.
+DLP policy templates aren't perfect straight out of the box. It's likely that you'll find some false positives occurring in your environment, which is why it's so important to ease your way into a DLP deployment, taking the time to adequately test and tune your policies.
-Here's an example of a false positive. This email is quite harmless. The user is providing their mobile phone number to someone, and including their email signature.
+Here's an example of a false positive. This email is harmless. The user is providing their mobile phone number to someone, and including their email signature.
![Email showing false positive information.](../media/DLP-create-test-tune-false-positive-email.png)
compliance Dlp Policy Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md
The user notifications and policy tips configuration options vary depending on t
You can enable/disable user notifications for various Microsoft apps, see [Data Loss Prevention policy tips reference](dlp-policy-tips-reference.md#data-loss-prevention-policy-tips-reference) -- You can enable/disable **Notifying users in Office 365 service** with a policy tip.
+- You can enable/disable notifications with a policy tip.
- email notifications to the user who sent, shared, or last modified the content OR - notify specific people
compliance Enable Archive Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/enable-archive-mailboxes.md
If you don't see the **Archive** page in the Microsoft Purview compliance portal
> [!NOTE] > The **Archive** page shows a maximum of 500 users. Use the search box if you can't immediately see the name of the user you want.
-3. In the list of mailboxes, select the user to enable their mailbox for archive, and then select the **Enable Archive** option:
-
+3. In the list of mailboxes, select the user to enable their mailbox for archive, and then select the **Enable archive** option:
+
![Enable archive option for a selected user.](../media/enable-archive-option.png)--
+
A warning is displayed saying that if you enable the archive mailbox, items in the user's mailbox that are older than the archiving policy assigned to the mailbox will be moved to the new archive mailbox. The default archive policy that is part of the retention policy assigned to Exchange Online mailboxes moves items to the archive mailbox two years after the date the item was delivered to the mailbox or created by the user. For more information, see [Learn about archive mailboxes](archive-mailboxes.md). 5. Select **Enable** to confirm.
compliance Encryption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/encryption.md
With Office 365, multiple layers and kinds of encryption work together to secure
|:--|:--|:--| |Files on a device. These files can include email messages saved in a folder, Office documents saved on a computer, tablet, or phone, or data saved to the Microsoft cloud. <br/> |BitLocker in Microsoft datacenters. BitLocker can also be used on client machines, such as Windows computers and tablets <br/> Distributed Key Manager (DKM) in Microsoft datacenters <br/> Customer Key for Microsoft 365 <br/> |[Windows IT Center: BitLocker](/windows/device-security/bitlocker/bitlocker-overview) <br/> [Microsoft Trust Center: Encryption](https://www.microsoft.com/TrustCenter/Security/Encryption) <br/> [Cloud security controls series: Encrypting Data at Rest](https://blogs.microsoft.com/microsoftsecure/2015/09/10/cloud-security-controls-series-encrypting-data-at-rest) <br/> [How Exchange Online secures your email secrets](exchange-online-secures-email-secrets.md) <br/> [Service encryption with Customer Key](customer-key-overview.md) <br/> | |Files in transit between users. These files can include Office documents or SharePoint list items shared between users. <br/> |TLS for files in transit <br/> |[Data Encryption in OneDrive for Business and SharePoint Online](data-encryption-in-odb-and-spo.md) <br/> [Skype for Business Online: Security and Archiving](/office365/servicedescriptions/skype-for-business-online-service-description/skype-for-business-online-features) <br/> |
-|Email in transit between recipients. This email includes email hosted by Exchange Online. <br/> |Microsoft Purview Message Encryption with Azure Rights Management, S/MIME, and TLS for email in transit <br/> |[essage Encryption](ome.md) <br/> [Email encryption in Office 365](email-encryption.md) <br/> [How Exchange Online uses TLS to secure email connections in Office 365](exchange-online-uses-tls-to-secure-email-connections.md) <br/> |
+|Email in transit between recipients. This email includes email hosted by Exchange Online. <br/> |Microsoft Purview Message Encryption with Azure Rights Management, S/MIME, and TLS for email in transit <br/> |[Message Encryption](ome.md) <br/> [Email encryption in Office 365](email-encryption.md) <br/> [How Exchange Online uses TLS to secure email connections in Office 365](exchange-online-uses-tls-to-secure-email-connections.md) <br/> |
|Chats, messages, and files in transit between recipients using Microsoft Teams. <br/> |Teams uses TLS and MTLS to encrypt instant messages. Media traffic is encrypted using Secure RTP (SRTP). Teams uses FIPS (Federal Information Processing Standard) compliant algorithms for encryption key exchanges. <br/> |[Encryption for Teams](/microsoftteams/teams-security-guide#encryption-for-teams) <br/> | ## What if I need more control over encryption to meet security and compliance requirements?
compliance Named Entities Use https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/named-entities-use.md
Here are some practices you can use when you create or edit a policy that uses a
- Use low instance counts (three to five) when you're looking for data that's in a spreadsheet and the keyword that's required by the SIT for that data is only in the column header. For example, let's say you're looking for US Social Security numbers, and the keyword `Social Security Number` only occurs in the column header. Since the values (the corroborative evidence) is in the cells below, it's likely that only the first few instances would be in close enough proximity to the keyword to be detected. -- If you are using a named entity SIT, like All Full Names, to help find US Social Security numbers, use larger instance counts such as 10 or 50. Then when both the person names and the SSNs are detected together, you're more likely to get getting true positives.
+- If you are using a named entity SIT, like All Full Names, to help find US Social Security numbers, use larger instance counts such as 10 or 50. Then when both the person names and the SSNs are detected together, you're more likely to get true positives.
- You can use [Auto-labeling simulations](apply-sensitivity-label-automatically.md#learn-about-simulation-mode) to test the accuracy of named entity SITs. Run a simulation using a named entity SIT to see what items match the policy. With this information you can fine tune accuracy by adjusting the instance counts and confidence levels in your custom policies or the enhanced template conditions. You can iterate simulations until the accuracy is where you want it, before deploying a DLP or auto-labeling policy containing named entities in production. Here's an overview of the flow: 1. Identify the SIT or combination of SITs you want to test in simulation mode, either custom or cloned and edited. 1. Identify or create a sensitivity label to be applied when the auto-labeling policy finds a match in Exchange, SharePoint sites, or OneDrive accounts.
-1. Create an sensitivity auto-labeling policy that uses the SIT from step 1 and with same Conditions and Exceptions that will be used in your DLP policy
+1. Create a sensitivity auto-labeling policy that uses the SIT from step 1 and with same Conditions and Exceptions that will be used in your DLP policy
1. Run the policy simulation 1. View the results 1. Tune the SIT or policy and the instance count and confidence levels to reduce false positives.
includes Improve Request Performance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/improve-request-performance.md
->[!TIP]
->For better performance, you can use server closer to your geo location:
+> [!TIP]
+> For better performance, you can use server closer to your geo location:
+>
> - api-us.securitycenter.microsoft.com > - api-eu.securitycenter.microsoft.com > - api-uk.securitycenter.microsoft.com
includes Machineactionsnote https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/machineactionsnote.md
ms.prod: w10
->[!Note]
+> [!NOTE]
> This page focuses on performing a machine action via API. See [take response actions on a machine](/microsoft-365/security/defender-endpoint/respond-machine-alerts) for more information about response actions functionality via Microsoft Defender for Endpoint.
includes Microsoft 365 Content Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/microsoft-365-content-updates.md
+## Week of May 16, 2022
++
+| Published On |Topic title | Change |
+|||--|
+| 5/16/2022 | [Delete an inactive mailbox](/microsoft-365/compliance/delete-an-inactive-mailbox?view=o365-21vianet) | modified |
+| 5/16/2022 | [Recover an inactive mailbox](/microsoft-365/compliance/recover-an-inactive-mailbox?view=o365-21vianet) | modified |
+| 5/16/2022 | [Restore an inactive mailbox](/microsoft-365/compliance/restore-an-inactive-mailbox?view=o365-21vianet) | modified |
+| 5/16/2022 | [Reprovision a Windows 365 Cloud PC](/microsoft-365/lighthouse/m365-lighthouse-reprovision-cloudpc?view=o365-21vianet) | added |
+| 5/16/2022 | [Automatically apply a sensitivity label in Microsoft 365](/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-21vianet) | modified |
+| 5/16/2022 | [Microsoft Defender for Office 365 in Microsoft 365 Defender](/microsoft-365/security/defender/microsoft-365-security-center-mdo?view=o365-21vianet) | modified |
+| 5/16/2022 | [Create exact data match sensitive information type/rule package](/microsoft-365/compliance/sit-get-started-exact-data-match-create-rule-package?view=o365-21vianet) | modified |
+| 5/16/2022 | [Create the schema for exact data match based sensitive information types](/microsoft-365/compliance/sit-get-started-exact-data-match-create-schema?view=o365-21vianet) | modified |
+| 5/16/2022 | [Lightweight base configuration](/microsoft-365/enterprise/lightweight-base-configuration-microsoft-365-enterprise?view=o365-21vianet) | modified |
+| 5/16/2022 | [Microsoft Defender for Business frequently asked questions](/microsoft-365/security/defender-business/mdb-faq?view=o365-21vianet) | modified |
+| 5/16/2022 | [What is Microsoft Defender for Business?](/microsoft-365/security/defender-business/mdb-overview?view=o365-21vianet) | modified |
+| 5/16/2022 | [Overview of endpoint detection and response capabilities](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response?view=o365-21vianet) | modified |
+| 5/16/2022 | [Take response actions on a device in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/respond-machine-alerts?view=o365-21vianet) | modified |
+| 5/16/2022 | [Anti-phishing policies](/microsoft-365/security/office-365-security/set-up-anti-phishing-policies?view=o365-21vianet) | modified |
+| 5/16/2022 | [Web content filtering](/microsoft-365/security/defender-endpoint/web-content-filtering?view=o365-21vianet) | modified |
+| 5/17/2022 | Use customer-managed keys to encrypt your organization's auditing data | removed |
+| 5/17/2022 | [Lightweight base configuration](/microsoft-365/enterprise/lightweight-base-configuration-microsoft-365-enterprise?view=o365-21vianet) | modified |
+| 5/17/2022 | [Disposition of content](/microsoft-365/compliance/disposition?view=o365-21vianet) | modified |
+| 5/17/2022 | [Form processing overview in Microsoft SharePoint Syntex](/microsoft-365/contentunderstanding/form-processing-overview) | modified |
+| 5/18/2022 | [Microsoft 365 encryption chains](/microsoft-365/compliance/encryption-office-365-certificate-chains?view=o365-21vianet) | modified |
+| 5/18/2022 | [Manage devices with Intune](/microsoft-365/solutions/manage-devices-with-intune-overview?view=o365-21vianet) | modified |
+| 5/18/2022 | [Increase threat protection for Microsoft 365 for business](/microsoft-365/admin/security-and-compliance/increase-threat-protection?view=o365-21vianet) | added |
+| 5/18/2022 | [Set the password expiration policy for your organization](/microsoft-365/admin/manage/set-password-expiration-policy?view=o365-21vianet) | modified |
+| 5/18/2022 | [Manage Customer Key](/microsoft-365/compliance/customer-key-manage?view=o365-21vianet) | modified |
+| 5/18/2022 | [What's new in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/whats-new-in-defender-for-office-365?view=o365-21vianet) | modified |
+| 5/18/2022 | [Create an extractor Microsoft SharePoint Syntex](/microsoft-365/contentunderstanding/create-an-extractor) | modified |
+| 5/18/2022 | [Visit the Action center to see remediation actions](/microsoft-365/security/defender-endpoint/auto-investigation-action-center?view=o365-21vianet) | modified |
+| 5/18/2022 | [Use automated investigations to investigate and remediate threats](/microsoft-365/security/defender-endpoint/automated-investigations?view=o365-21vianet) | modified |
+| 5/18/2022 | [Automation levels in automated investigation and remediation](/microsoft-365/security/defender-endpoint/automation-levels?view=o365-21vianet) | modified |
+| 5/18/2022 | [Configure automated investigation and remediation capabilities](/microsoft-365/security/defender-endpoint/configure-automated-investigations-remediation?view=o365-21vianet) | modified |
+| 5/18/2022 | [Get started with troubleshooting mode in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode?view=o365-21vianet) | modified |
+| 5/18/2022 | [Review remediation actions following automated investigations](/microsoft-365/security/defender-endpoint/manage-auto-investigation?view=o365-21vianet) | modified |
+| 5/18/2022 | Anti-spam and anti-malware protection | removed |
+| 5/19/2022 | [Get Microsoft Defender for Business](/microsoft-365/security/defender-business/get-defender-business?view=o365-21vianet) | modified |
+| 5/19/2022 | [Configure alert notifications in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-email-notifications?view=o365-21vianet) | modified |
+| 5/19/2022 | [Configure vulnerability email notifications in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-vulnerability-email-notifications?view=o365-21vianet) | modified |
+| 5/19/2022 | [Microsoft Defender Vulnerability Management public preview](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management?view=o365-21vianet) | modified |
+| 5/19/2022 | [Apply encryption using sensitivity labels](/microsoft-365/compliance/encryption-sensitivity-labels?view=o365-21vianet) | modified |
+| 5/19/2022 | Add users and assign licenses in Microsoft Defender Vulnerability Management | removed |
+| 5/19/2022 | [Microsoft recommendations for EOP and Defender for Office 365 security settings](/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365?view=o365-21vianet) | modified |
+| 5/20/2022 | [View an enterprise Cloud PC failed network connection in Microsoft 365 Lighthouse](/microsoft-365/lighthouse/m365-lighthouse-view-failed-network-connections?view=o365-21vianet) | added |
+| 5/20/2022 | [GDPR simplified: A guide for your small business](/microsoft-365/admin/security-and-compliance/gdpr-compliance?view=o365-21vianet) | modified |
+| 5/20/2022 | [Create and publish sensitivity labels](/microsoft-365/compliance/create-sensitivity-labels?view=o365-21vianet) | modified |
+| 5/20/2022 | [Customer-managed encryption features](/microsoft-365/compliance/office-365-customer-managed-encryption-features?view=o365-21vianet) | modified |
+| 5/20/2022 | [Microsoft 365 informed network routing](/microsoft-365/enterprise/office-365-network-mac-perf-cpe?view=o365-21vianet) | modified |
+| 5/20/2022 | [Network connectivity in the Microsoft 365 Admin Center](/microsoft-365/enterprise/office-365-network-mac-perf-overview?view=o365-21vianet) | modified |
+| 5/20/2022 | [Use the Page Diagnostics tool for SharePoint Online](/microsoft-365/enterprise/page-diagnostics-for-spo?view=o365-21vianet) | modified |
+| 5/20/2022 | [Performance troubleshooting plan for Office 365](/microsoft-365/enterprise/performance-troubleshooting-plan?view=o365-21vianet) | modified |
+| 5/20/2022 | [Step 2. Protect your Microsoft 365 privileged accounts](/microsoft-365/enterprise/protect-your-global-administrator-accounts?view=o365-21vianet) | modified |
+| 5/20/2022 | [Using Content Search Web Part instead of Content Query Web Part to improve performance in SharePoint Online](/microsoft-365/enterprise/using-content-search-web-part-instead-of-content-query-web-part-to-improve-perfo?view=o365-21vianet) | modified |
+| 5/20/2022 | [View email security reports](/microsoft-365/security/office-365-security/view-email-security-reports?view=o365-21vianet) | modified |
+| 5/20/2022 | [Validate app protection settings on Android or iOS devices](/microsoft-365/business-premium/m365bp-validate-settings-on-android-or-ios?view=o365-21vianet) | renamed |
+| 5/20/2022 | [Validate app protection settings for Windows 10 PCs](/microsoft-365/business-premium/m365bp-validate-settings-on-windows-10-pcs?view=o365-21vianet) | renamed |
+| 5/20/2022 | [Set app protection settings for Android or iOS devices](/microsoft-365/business-premium/m365bp-app-protection-settings-for-android-and-ios?view=o365-21vianet) | modified |
+| 5/20/2022 | [Enable domain-joined Windows 10 devices to be managed by Microsoft 365 for business](/microsoft-365/business-premium/m365bp-manage-windows-devices?view=o365-21vianet) | modified |
+| 5/20/2022 | [Set up multi-factor authentication for Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-multifactor-authentication?view=o365-21vianet) | modified |
+| 5/20/2022 | [Prepare for Office client deployment with Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-prepare-for-office-client-deployment?view=o365-21vianet) | modified |
+| 5/20/2022 | Edit or create device protection settings for Windows 10 PCs | removed |
+| 5/20/2022 | [View or edit device protection policies](/microsoft-365/business-premium/m365bp-view-edit-create-mdb-policies?view=o365-21vianet) | modified |
+| 5/20/2022 | [Working with improvement actions in Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager-improvement-actions?view=o365-21vianet) | modified |
+| 5/20/2022 | [Get started with content explorer](/microsoft-365/compliance/data-classification-content-explorer?view=o365-21vianet) | modified |
+| 5/20/2022 | [Send email notifications and show policy tips for DLP policies](/microsoft-365/compliance/use-notifications-and-policy-tips?view=o365-21vianet) | modified |
+| 5/20/2022 | [Cross-tenant mailbox migration](/microsoft-365/enterprise/cross-tenant-mailbox-migration?view=o365-21vianet) | modified |
+| 5/20/2022 | [Office 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-21vianet) | modified |
+| 5/20/2022 | [Apply Microsoft Defender Antivirus protection updates to out of date endpoints](/microsoft-365/security/defender-endpoint/manage-outdated-endpoints-microsoft-defender-antivirus?view=o365-21vianet) | modified |
+| 5/20/2022 | Microsoft Defender Antivirus on Windows Server | removed |
+| 5/20/2022 | [Learn about trainable classifiers](/microsoft-365/compliance/classifier-learn-about?view=o365-21vianet) | modified |
+| 5/20/2022 | [Protect security settings with tamper protection](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection?view=o365-21vianet) | modified |
+| 5/20/2022 | [Anti-malware protection FAQ](/microsoft-365/security/office-365-security/anti-malware-protection-faq-eop?view=o365-21vianet) | modified |
+| 5/20/2022 | [Smart reports and insights](/microsoft-365/security/office-365-security/reports-and-insights-in-security-and-compliance?view=o365-21vianet) | modified |
++ ## Week of May 09, 2022
| 4/29/2022 | [Manage spoofed senders using the spoof intelligence policy and spoof intelligence insight](/microsoft-365/security/office-365-security/walkthrough-spoof-intelligence-insight?view=o365-21vianet) | modified | | 4/29/2022 | [Use customer-managed keys to encrypt your organization's auditing data](/microsoft-365/compliance/auditing-cmk-encryption?view=o365-21vianet) | added | | 4/29/2022 | [Microsoft Purview auditing solutions](/microsoft-365/compliance/auditing-solutions-overview?view=o365-21vianet) | modified |--
-## Week of April 18, 2022
--
-| Published On |Topic title | Change |
-|||--|
-| 4/18/2022 | [Get started with records management in Microsoft 365](/microsoft-365/compliance/get-started-with-records-management?view=o365-21vianet) | modified |
-| 4/18/2022 | [Plan external collaboration with channel conversations, file collaboration, and shared apps](/microsoft-365/solutions/plan-external-collaboration?view=o365-21vianet) | modified |
-| 4/18/2022 | [Use sensitivity labels with Microsoft Teams, Microsoft 365 groups, and SharePoint sites](/microsoft-365/compliance/sensitivity-labels-teams-groups-sites?view=o365-21vianet) | modified |
-| 4/18/2022 | [Onboard devices to Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-onboard-devices?view=o365-21vianet) | modified |
-| 4/19/2022 | [Test Binaries package on Test Base](/microsoft-365/test-base/testapplication?view=o365-21vianet) | added |
-| 4/19/2022 | [Test your Intune application on Test Base](/microsoft-365/test-base/testintuneapplication?view=o365-21vianet) | added |
-| 4/19/2022 | [Test your application on Test Base](/microsoft-365/test-base/testoverview?view=o365-21vianet) | added |
-| 4/19/2022 | [Add custodians to an eDiscovery (Premium) case](/microsoft-365/compliance/add-custodians-to-case?view=o365-21vianet) | modified |
-| 4/19/2022 | [Add search results to a review set](/microsoft-365/compliance/add-data-to-review-set?view=o365-21vianet) | modified |
-| 4/19/2022 | [Add your organization brand to your encrypted messages](/microsoft-365/compliance/add-your-organization-brand-to-encrypted-messages?view=o365-21vianet) | modified |
-| 4/19/2022 | [Audit (Premium) in Microsoft 365](/microsoft-365/compliance/advanced-audit?view=o365-21vianet) | modified |
-| 4/19/2022 | [Collect cloud attachments in eDiscovery (Premium)](/microsoft-365/compliance/advanced-ediscovery-cloud-attachments?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage custodian communications templates in the Communications library in eDiscovery (Premium)](/microsoft-365/compliance/advanced-ediscovery-communications-library?view=o365-21vianet) | modified |
-| 4/19/2022 | [eDiscovery (Premium) dashboard for review sets](/microsoft-365/compliance/advanced-ediscovery-dashboard?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up historical versions in eDiscovery (Premium)](/microsoft-365/compliance/advanced-ediscovery-historical-versions?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage issuing officers in eDiscovery (Premium)](/microsoft-365/compliance/advanced-ediscovery-issuing-officers?view=o365-21vianet) | modified |
-| 4/19/2022 | [New case format in eDiscovery (Premium)](/microsoft-365/compliance/advanced-ediscovery-new-case-format?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft 365 alert policies](/microsoft-365/compliance/alert-policies?view=o365-21vianet) | modified |
-| 4/19/2022 | [Analyze data in a review set in eDiscovery (Premium)](/microsoft-365/compliance/analyzing-data-in-review-set?view=o365-21vianet) | modified |
-| 4/19/2022 | [Automatically apply a retention label to retain or delete content](/microsoft-365/compliance/apply-retention-labels-automatically?view=o365-21vianet) | modified |
-| 4/19/2022 | [Automatically apply a sensitivity label to content in Microsoft 365](/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive BlackBerry data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-blackberry-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Bloomberg data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-bloomberg-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Cisco Jabber data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-cisco-jabber-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive FactSet data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-factset-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Fuze data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-fuze-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a 17a-4 DataParser connector to archive FX Connect data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-fxconnect-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive ICE Connect Chat data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-ice-im-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive InvestEdge data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-investedge-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive LivePerson Conversational Cloud data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-liveperson-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Quip data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-quip-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Refinitiv Eikon Messenger data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-refinitiv-messenger-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive ServiceNow 17a-4 DataParser data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-servicenow-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Skype for Business Server data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-skype-for-business-server-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Slack data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-slack-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive SQL data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-sql-database-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a Symphony DataParser connector to archive data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-symphony-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Cisco Webex data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-webex-teams-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Zoom data in Microsoft 365](/microsoft-365/compliance/archive-17a-4-zoom-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Android mobile data](/microsoft-365/compliance/archive-android-archiver-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive AT&T SMS/MMS Network data](/microsoft-365/compliance/archive-att-network-archiver-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Bell SMS/MMS Network data](/microsoft-365/compliance/archive-bell-network-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Bloomberg Message data](/microsoft-365/compliance/archive-bloomberg-message-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive CellTrust data in Microsoft 365](/microsoft-365/compliance/archive-celltrust-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Cisco Jabber on MS SQL data in Microsoft 365](/microsoft-365/compliance/archive-ciscojabberonmssql-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Cisco Jabber on Oracle data in Microsoft 365](/microsoft-365/compliance/archive-ciscojabberonoracle-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Cisco Jabber on PostgreSQL data in Microsoft 365](/microsoft-365/compliance/archive-ciscojabberonpostgresql-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Archive data from the CellTrust SL2 platform to Microsoft 365](/microsoft-365/compliance/archive-data-from-celltrustsl2?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive EML data in Microsoft 365](/microsoft-365/compliance/archive-eml-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive data from the TeleMessage Enterprise Number Archiver](/microsoft-365/compliance/archive-enterprise-number-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Facebook data](/microsoft-365/compliance/archive-facebook-data-with-sample-connector?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive FX Connect data in Microsoft 365](/microsoft-365/compliance/archive-fxconnect-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive ICE Chat data](/microsoft-365/compliance/archive-icechat-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Instant Bloomberg data](/microsoft-365/compliance/archive-instant-bloomberg-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Jive data in Microsoft 365](/microsoft-365/compliance/archive-jive-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about archive mailboxes for Microsoft Purview](/microsoft-365/compliance/archive-mailboxes?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive data from MS SQL Database](/microsoft-365/compliance/archive-mssqldatabaseimporter-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive O2 Network data in Microsoft 365](/microsoft-365/compliance/archive-o2-network-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Pivot data in Microsoft 365](/microsoft-365/compliance/archive-pivot-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Red tail Speak data in Microsoft 365](/microsoft-365/compliance/archive-redtailspeak-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Reuters Dealing data in Microsoft 365](/microsoft-365/compliance/archive-reutersdealing-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Reuters Eikon data in Microsoft 365](/microsoft-365/compliance/archive-reuterseikon-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Reuters FX data in Microsoft 365](/microsoft-365/compliance/archive-reutersfx-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive RingCentral data in Microsoft 365](/microsoft-365/compliance/archive-ringcentral-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Rogers Network data in Microsoft 365](/microsoft-365/compliance/archive-rogers-network-archiver-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Salesforce Chatter data in Microsoft 365](/microsoft-365/compliance/archive-salesforcechatter-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive ServiceNow data in Microsoft 365](/microsoft-365/compliance/archive-servicenow-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Signal communications data in Microsoft 365](/microsoft-365/compliance/archive-signal-archiver-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Skype for Business data in Microsoft 365](/microsoft-365/compliance/archive-skypeforbusiness-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Slack eDiscovery data in Microsoft 365](/microsoft-365/compliance/archive-slack-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Symphony data in Microsoft 365](/microsoft-365/compliance/archive-symphony-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Telegram communications data in Microsoft 365](/microsoft-365/compliance/archive-telegram-archiver-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive TELUS Network data in Microsoft 365](/microsoft-365/compliance/archive-telus-network-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive text-delimited data in Microsoft 365](/microsoft-365/compliance/archive-text-delimited-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Twitter data](/microsoft-365/compliance/archive-twitter-data-with-sample-connector?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Twitter data in Microsoft 365](/microsoft-365/compliance/archive-veritas-twitter-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Verizon Network data in Microsoft 365](/microsoft-365/compliance/archive-verizon-network-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to Webex Teams data in Microsoft 365](/microsoft-365/compliance/archive-webexteams-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive webpage data in Microsoft 365](/microsoft-365/compliance/archive-webpagecapture-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive WeChat data in Microsoft 365](/microsoft-365/compliance/archive-wechat-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive WhatsApp data in Microsoft 365](/microsoft-365/compliance/archive-whatsapp-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Workplace from Facebook data in Microsoft 365](/microsoft-365/compliance/archive-workplacefromfacebook-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive XIP source data in Microsoft 365](/microsoft-365/compliance/archive-xip-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive XSLT/XML data in Microsoft 365](/microsoft-365/compliance/archive-xslt-xml-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Yieldbroker data in Microsoft 365](/microsoft-365/compliance/archive-yieldbroker-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive YouTube data in Microsoft 365](/microsoft-365/compliance/archive-youtube-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to archive Zoom Meetings data in Microsoft 365](/microsoft-365/compliance/archive-zoommeetings-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Use data connectors to import and archive third-party data in Microsoft 365](/microsoft-365/compliance/archiving-third-party-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Understand Assessment in Relevance in eDiscovery (Premium)](/microsoft-365/compliance/assessment-in-relevance-in-advanced-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Assign eDiscovery permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/assign-ediscovery-permissions?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up attorney-client privilege detection in eDiscovery (Premium)](/microsoft-365/compliance/attorney-privilege-detection?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage audit log retention policies](/microsoft-365/compliance/audit-log-retention-policies?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft 365 auditing solutions](/microsoft-365/compliance/auditing-solutions-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Use retention labels to manage the lifecycle of documents stored in SharePoint](/microsoft-365/compliance/auto-apply-retention-labels-scenario?view=o365-21vianet) | modified |
-| 4/19/2022 | [Build search queries in eDiscovery (Premium)](/microsoft-365/compliance/building-search-queries?view=o365-21vianet) | modified |
-| 4/19/2022 | [Import custodians to an eDiscovery (Premium) case](/microsoft-365/compliance/bulk-add-custodians?view=o365-21vianet) | modified |
-| 4/19/2022 | [Change the hold duration for an inactive mailbox](/microsoft-365/compliance/change-the-hold-duration-for-an-inactive-mailbox?view=o365-21vianet) | modified |
-| 4/19/2022 | [Close or delete a case](/microsoft-365/compliance/close-or-delete-case?view=o365-21vianet) | modified |
-| 4/19/2022 | [Close, reopen, and delete eDiscovery (Standard) cases](/microsoft-365/compliance/close-reopen-delete-core-ediscovery-cases?view=o365-21vianet) | modified |
-| 4/19/2022 | [Collection statistics and reports](/microsoft-365/compliance/collection-statistics-reports?view=o365-21vianet) | modified |
-| 4/19/2022 | [Overview of collections in eDiscovery (Premium)](/microsoft-365/compliance/collections-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Commit a draft collection to a review set](/microsoft-365/compliance/commit-draft-collection?view=o365-21vianet) | modified |
-| 4/19/2022 | [Case study - Contoso quickly configures an inappropriate text policy for Microsoft Teams, Exchange, and Yammer communications](/microsoft-365/compliance/communication-compliance-case-study?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with communication compliance](/microsoft-365/compliance/communication-compliance-configure?view=o365-21vianet) | modified |
-| 4/19/2022 | [Investigate and remediate communication compliance alerts](/microsoft-365/compliance/communication-compliance-investigate-remediate?view=o365-21vianet) | modified |
-| 4/19/2022 | [Plan for communication compliance](/microsoft-365/compliance/communication-compliance-plan?view=o365-21vianet) | modified |
-| 4/19/2022 | [Communication compliance policies](/microsoft-365/compliance/communication-compliance-policies?view=o365-21vianet) | modified |
-| 4/19/2022 | [Communication compliance](/microsoft-365/compliance/communication-compliance-solution-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about communication compliance](/microsoft-365/compliance/communication-compliance?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview Compliance Manager premium assessments trial playbook](/microsoft-365/compliance/compliance-easy-trials-compliance-manager-assessment-playbook?view=o365-21vianet) | modified |
-| 4/19/2022 | [About the Microsoft Purview Compliance Manager premium assessment trial](/microsoft-365/compliance/compliance-easy-trials-compliance-manager-assessments?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview solutions trial playbook](/microsoft-365/compliance/compliance-easy-trials-compliance-playbook?view=o365-21vianet) | modified |
-| 4/19/2022 | [About the Microsoft Purview trial](/microsoft-365/compliance/compliance-easy-trials?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview extensibility](/microsoft-365/compliance/compliance-extensibility?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview Compliance Manager alerts and alert policies](/microsoft-365/compliance/compliance-manager-alert-policies?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview Compliance Manager FAQ](/microsoft-365/compliance/compliance-manager-faq?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview Compliance Manager quickstart guide](/microsoft-365/compliance/compliance-manager-quickstart?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager-setup?view=o365-21vianet) | modified |
-| 4/19/2022 | [Working with assessment templates in Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager-templates?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager?view=o365-21vianet) | modified |
-| 4/19/2022 | [Quick tasks for getting started with Microsoft Purview](/microsoft-365/compliance/compliance-quick-tasks?view=o365-21vianet) | modified |
-| 4/19/2022 | [Configure search and analytics settings - eDiscovery (Premium)](/microsoft-365/compliance/configure-search-and-analytics-settings-in-advanced-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Review conversations in eDiscovery (Premium)](/microsoft-365/compliance/conversation-review-sets?view=o365-21vianet) | modified |
-| 4/19/2022 | [Create a DLP policy from a template](/microsoft-365/compliance/create-a-dlp-policy-from-a-template?view=o365-21vianet) | modified |
-| 4/19/2022 | [Create activity alerts](/microsoft-365/compliance/create-activity-alerts?view=o365-21vianet) | modified |
-| 4/19/2022 | [Create and manage eDiscovery (Premium) cases in Microsoft 365](/microsoft-365/compliance/create-and-manage-advanced-ediscoveryv2-case?view=o365-21vianet) | modified |
-| 4/19/2022 | [Publish retention labels and apply them in apps to retain or delete content](/microsoft-365/compliance/create-apply-retention-labels?view=o365-21vianet) | modified |
-| 4/19/2022 | [Create eDiscovery holds in a eDiscovery (Standard) case](/microsoft-365/compliance/create-ediscovery-holds?view=o365-21vianet) | modified |
-| 4/19/2022 | [Create a legal hold notice](/microsoft-365/compliance/create-hold-notification?view=o365-21vianet) | modified |
-| 4/19/2022 | [Create retention labels for exceptions to your retention policies](/microsoft-365/compliance/create-retention-labels-information-governance?view=o365-21vianet) | modified |
-| 4/19/2022 | [Create and configure retention policies to automatically retain or delete content](/microsoft-365/compliance/create-retention-policies?view=o365-21vianet) | modified |
-| 4/19/2022 | [Create and publish sensitivity labels](/microsoft-365/compliance/create-sensitivity-labels?view=o365-21vianet) | modified |
-| 4/19/2022 | [Create, test, and tune a DLP policy](/microsoft-365/compliance/create-test-tune-dlp-policy?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage Customer Key](/microsoft-365/compliance/customer-key-manage?view=o365-21vianet) | modified |
-| 4/19/2022 | [Service encryption with Microsoft Purview Customer Key](/microsoft-365/compliance/customer-key-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up Customer Key](/microsoft-365/compliance/customer-key-set-up?view=o365-21vianet) | modified |
-| 4/19/2022 | [Customer Lockbox requests](/microsoft-365/compliance/customer-lockbox-requests?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with content explorer](/microsoft-365/compliance/data-classification-content-explorer?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about data classification](/microsoft-365/compliance/data-classification-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [eDiscovery solution series Data spillage scenario - Search and purge](/microsoft-365/compliance/data-spillage-scenariosearch-and-purge?view=o365-21vianet) | modified |
-| 4/19/2022 | [Decision based on the results in eDiscovery (Premium)](/microsoft-365/compliance/decision-based-on-the-results-in-advanced-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Declare records by using retention labels](/microsoft-365/compliance/declare-records?view=o365-21vianet) | modified |
-| 4/19/2022 | [Define mail flow rules to encrypt email messages](/microsoft-365/compliance/define-mail-flow-rules-to-encrypt-email?view=o365-21vianet) | modified |
-| 4/19/2022 | [Delete items in the Recoverable Items folder of cloud mailbox's on hold](/microsoft-365/compliance/delete-items-in-the-recoverable-items-folder-of-mailboxes-on-hold?view=o365-21vianet) | modified |
-| 4/19/2022 | [Deprecating Message Encryption Viewer App](/microsoft-365/compliance/deprecating-ome-viewer?view=o365-21vianet) | modified |
-| 4/19/2022 | [Onboard Windows 10 and Windows 11 devices via Group Policy](/microsoft-365/compliance/device-onboarding-gp?view=o365-21vianet) | modified |
-| 4/19/2022 | [Onboard macOS devices into Microsoft 365 overview (preview)](/microsoft-365/compliance/device-onboarding-macos-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Onboard and offboard macOS devices into Compliance solutions using Microsoft Intune for Microsoft Defender for Endpoint customers (preview)](/microsoft-365/compliance/device-onboarding-offboarding-macos-intune-mde?view=o365-21vianet) | modified |
-| 4/19/2022 | [Onboard and offboard macOS devices into Microsoft Purview solutions using Microsoft Intune (preview)](/microsoft-365/compliance/device-onboarding-offboarding-macos-intune?view=o365-21vianet) | modified |
-| 4/19/2022 | [Onboard and offboard macOS devices into Compliance solutions using JAMF Pro for Microsoft Defender for Endpoint customers (preview)](/microsoft-365/compliance/device-onboarding-offboarding-macos-jamfpro-mde?view=o365-21vianet) | modified |
-| 4/19/2022 | [Onboard and offboard macOS devices into Microsoft Purview solutions using JAMF Pro (preview)](/microsoft-365/compliance/device-onboarding-offboarding-macos-jamfpro?view=o365-21vianet) | modified |
-| 4/19/2022 | [Onboard Windows 10 or Windows 11 devices into Microsoft 365 overview](/microsoft-365/compliance/device-onboarding-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Onboard Windows 10 and Windows 11 devices using Configuration Manager](/microsoft-365/compliance/device-onboarding-sccm?view=o365-21vianet) | modified |
-| 4/19/2022 | [Onboard Windows 10 and Windows 11 devices using a local script](/microsoft-365/compliance/device-onboarding-script?view=o365-21vianet) | modified |
-| 4/19/2022 | [Onboard non-persistent virtual desktop infrastructure (VDI) devices](/microsoft-365/compliance/device-onboarding-vdi?view=o365-21vianet) | modified |
-| 4/19/2022 | [Disposition of content](/microsoft-365/compliance/disposition?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with the data loss prevention alert dashboard](/microsoft-365/compliance/dlp-alerts-dashboard-get-started?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with the Microsoft Purview Extension](/microsoft-365/compliance/dlp-chrome-get-started?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about the Microsoft Purview Extension](/microsoft-365/compliance/dlp-chrome-learn-about?view=o365-21vianet) | modified |
-| 4/19/2022 | [DLP policy conditions, exceptions, and actions](/microsoft-365/compliance/dlp-conditions-and-exceptions?view=o365-21vianet) | modified |
-| 4/19/2022 | [Configure endpoint data loss prevention settings](/microsoft-365/compliance/dlp-configure-endpoint-settings?view=o365-21vianet) | modified |
-| 4/19/2022 | [Configure and view alerts for data loss prevention policies](/microsoft-365/compliance/dlp-configure-view-alerts-policies?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about data loss prevention](/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-21vianet) | modified |
-| 4/19/2022 | [Migrate Exchange Online data loss prevention policies to Compliance center](/microsoft-365/compliance/dlp-migrate-exo-policy-to-unified-dlp?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with data loss prevention on-premises scanner](/microsoft-365/compliance/dlp-on-premises-scanner-get-started?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about data loss prevention on-premises scanner](/microsoft-365/compliance/dlp-on-premises-scanner-learn?view=o365-21vianet) | modified |
-| 4/19/2022 | [Use data loss prevention on-premises scanner](/microsoft-365/compliance/dlp-on-premises-scanner-use?view=o365-21vianet) | modified |
-| 4/19/2022 | [Plan for data loss prevention](/microsoft-365/compliance/dlp-overview-plan-for-dlp?view=o365-21vianet) | modified |
-| 4/19/2022 | [Data Loss Prevention policy reference](/microsoft-365/compliance/dlp-policy-reference?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with Data loss prevention for Power BI](/microsoft-365/compliance/dlp-powerbi-get-started?view=o365-21vianet) | modified |
-| 4/19/2022 | [Document metadata fields in eDiscovery (Premium)](/microsoft-365/compliance/document-metadata-fields-in-advanced-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Double Key Encryption overview and FAQ](/microsoft-365/compliance/double-key-encryption-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Double Key Encryption (DKE)](/microsoft-365/compliance/double-key-encryption?view=o365-21vianet) | modified |
-| 4/19/2022 | [Export documents to your organization's Azure Storage account](/microsoft-365/compliance/download-export-jobs?view=o365-21vianet) | modified |
-| 4/19/2022 | [CJK/Double Byte support for eDiscovery (Premium)](/microsoft-365/compliance/ediscovery-cjk-support?view=o365-21vianet) | modified |
-| 4/19/2022 | [Decryption in eDiscovery](/microsoft-365/compliance/ediscovery-decryption?view=o365-21vianet) | modified |
-| 4/19/2022 | [Collect eDiscovery diagnostic information](/microsoft-365/compliance/ediscovery-diagnostic-info?view=o365-21vianet) | modified |
-| 4/19/2022 | [Use the KQL editor to build search queries](/microsoft-365/compliance/ediscovery-kql-editor?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft 365 eDiscovery solutions](/microsoft-365/compliance/ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Email encryption in Microsoft 365](/microsoft-365/compliance/email-encryption?view=o365-21vianet) | modified |
-| 4/19/2022 | [Enable archive mailboxes for Microsoft 365](/microsoft-365/compliance/enable-archive-mailboxes?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage mailbox auditing](/microsoft-365/compliance/enable-mailbox-auditing?view=o365-21vianet) | modified |
-| 4/19/2022 | [Encryption in Microsoft 365](/microsoft-365/compliance/encryption?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-getting-started?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-learn-about?view=o365-21vianet) | modified |
-| 4/19/2022 | [Error remediation when processing data](/microsoft-365/compliance/error-remediation-when-processing-data-in-advanced-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Export a Content search report](/microsoft-365/compliance/export-a-content-search-report?view=o365-21vianet) | modified |
-| 4/19/2022 | [Export and download content from a eDiscovery (Standard) case](/microsoft-365/compliance/export-content-in-core-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Export Content search results](/microsoft-365/compliance/export-search-results?view=o365-21vianet) | modified |
-| 4/19/2022 | [FAQ about importing PST files](/microsoft-365/compliance/faqimporting-pst-files-to-office-365?view=o365-21vianet) | modified |
-| 4/19/2022 | [Use file plan to manage retention labels throughout the content lifecycle](/microsoft-365/compliance/file-plan-manager?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with eDiscovery (Standard) cases in Microsoft 365](/microsoft-365/compliance/get-started-core-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up eDiscovery (Premium) in Microsoft 365](/microsoft-365/compliance/get-started-with-advanced-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with data lifecycle management](/microsoft-365/compliance/get-started-with-information-governance?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with records management in Microsoft 365](/microsoft-365/compliance/get-started-with-records-management?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with sensitivity labels](/microsoft-365/compliance/get-started-with-sensitivity-labels?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to import Epic EHR data](/microsoft-365/compliance/import-epic-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to import generic healthcare audit data](/microsoft-365/compliance/import-healthcare-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to import HR data to the US Government cloud](/microsoft-365/compliance/import-hr-data-us-government?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to import HR data](/microsoft-365/compliance/import-hr-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up a connector to import physical badging data](/microsoft-365/compliance/import-physical-badging-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about importing your organization's PST files](/microsoft-365/compliance/importing-pst-files-to-office-365?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview documentation # < 60 chars](/microsoft-365/compliance/index?view=o365-21vianet) | modified |
-| 4/19/2022 | [Advanced indexing of custodian data](/microsoft-365/compliance/indexing-custodian-data?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage information barrier policies](/microsoft-365/compliance/information-barriers-edit-segments-policies?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with information barriers](/microsoft-365/compliance/information-barriers-policies?view=o365-21vianet) | modified |
-| 4/19/2022 | [Information barriers](/microsoft-365/compliance/information-barriers-solution-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about information barriers](/microsoft-365/compliance/information-barriers?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about Microsoft Purview Data Lifecycle Management](/microsoft-365/compliance/information-governance?view=o365-21vianet) | modified |
-| 4/19/2022 | [Deploy an information protection solution with Microsoft Purview](/microsoft-365/compliance/information-protection-solution?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview Information Protection](/microsoft-365/compliance/information-protection?view=o365-21vianet) | modified |
-| 4/19/2022 | [Exchange Online mail encryption with AD RMS](/microsoft-365/compliance/information-rights-management-in-exchange-online?view=o365-21vianet) | modified |
-| 4/19/2022 | [Investigate insider risk management activities](/microsoft-365/compliance/insider-risk-management-activities?view=o365-21vianet) | modified |
-| 4/19/2022 | [Insider risk management cases](/microsoft-365/compliance/insider-risk-management-cases?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with insider risk management](/microsoft-365/compliance/insider-risk-management-configure?view=o365-21vianet) | modified |
-| 4/19/2022 | [Insider risk management notice templates](/microsoft-365/compliance/insider-risk-management-notices?view=o365-21vianet) | modified |
-| 4/19/2022 | [Plan for insider risk management](/microsoft-365/compliance/insider-risk-management-plan?view=o365-21vianet) | modified |
-| 4/19/2022 | [Insider risk management policies](/microsoft-365/compliance/insider-risk-management-policies?view=o365-21vianet) | modified |
-| 4/19/2022 | [Insider risk management settings](/microsoft-365/compliance/insider-risk-management-settings?view=o365-21vianet) | modified |
-| 4/19/2022 | [Insider risk management](/microsoft-365/compliance/insider-risk-management-solution-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about insider risk management](/microsoft-365/compliance/insider-risk-management?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview insider risk solutions](/microsoft-365/compliance/insider-risk-solution-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Keyword queries and search conditions for eDiscovery](/microsoft-365/compliance/keyword-queries-and-search-conditions?view=o365-21vianet) | modified |
-| 4/19/2022 | [Retirement of legacy eDiscovery tools](/microsoft-365/compliance/legacy-ediscovery-retirement?view=o365-21vianet) | modified |
-| 4/19/2022 | [Legacy information for Office 365 Message Encryption](/microsoft-365/compliance/legacy-information-for-message-encryption?view=o365-21vianet) | modified |
-| 4/19/2022 | [eDiscovery (Premium) limits](/microsoft-365/compliance/limits-ediscovery20?view=o365-21vianet) | modified |
-| 4/19/2022 | [Limits for Content search and eDiscovery (Standard) in the compliance center](/microsoft-365/compliance/limits-for-content-search?view=o365-21vianet) | modified |
-| 4/19/2022 | [Load non-Microsoft 365 data into a review set](/microsoft-365/compliance/load-non-office-365-data-into-a-review-set?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview Data Lifecycle Management & Microsoft Purview Records Management](/microsoft-365/compliance/manage-information-governance?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage hold notifications](/microsoft-365/compliance/manage-hold-notification?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage legal investigations in Microsoft 365](/microsoft-365/compliance/manage-legal-investigations?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage custodians in an eDiscovery (Premium) case](/microsoft-365/compliance/manage-new-custodians?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage Office 365 Message Encryption](/microsoft-365/compliance/manage-office-365-message-encryption?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage Relevance setup in eDiscovery (Premium)](/microsoft-365/compliance/manage-relevance-setup-in-advanced-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Work with communications in eDiscovery (Premium)](/microsoft-365/compliance/managing-custodian-communications?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage holds in eDiscovery (Premium)](/microsoft-365/compliance/managing-holds?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage jobs in eDiscovery (Premium)](/microsoft-365/compliance/managing-jobs-ediscovery20?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage review sets in eDiscovery (Premium)](/microsoft-365/compliance/managing-review-sets?view=o365-21vianet) | modified |
-| 4/19/2022 | [Permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/microsoft-365-compliance-center-permissions?view=o365-21vianet) | modified |
-| 4/19/2022 | [Redirection of users from the Office 365 Security and Compliance center to the Microsoft Purview compliance portal](/microsoft-365/compliance/microsoft-365-compliance-center-redirection?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview compliance portal](/microsoft-365/compliance/microsoft-365-compliance-center?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview solution catalog](/microsoft-365/compliance/microsoft-365-solution-catalog?view=o365-21vianet) | modified |
-| 4/19/2022 | [Azure Active Directory classification and sensitivity labels for Microsoft 365 groups](/microsoft-365/compliance/migrate-aad-classification-sensitivity-labels?view=o365-21vianet) | modified |
-| 4/19/2022 | [Migrate legacy eDiscovery searches and holds to the Microsoft Purview compliance portal](/microsoft-365/compliance/migrate-legacy-ediscovery-searches-and-holds?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about the default labels and policies to protect your data](/microsoft-365/compliance/mip-easy-trials?view=o365-21vianet) | modified |
-| 4/19/2022 | [Add non-custodial data sources to an eDiscovery (Premium) case](/microsoft-365/compliance/non-custodial-data-sources?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set an expiration date for email encrypted by Microsoft Purview Advanced Message Encryption](/microsoft-365/compliance/ome-advanced-expiration?view=o365-21vianet) | modified |
-| 4/19/2022 | [Advanced Message Encryption](/microsoft-365/compliance/ome-advanced-message-encryption?view=o365-21vianet) | modified |
-| 4/19/2022 | [Message Encryption FAQ](/microsoft-365/compliance/ome-faq?view=o365-21vianet) | modified |
-| 4/19/2022 | [Message encryption version comparison](/microsoft-365/compliance/ome-version-comparison?view=o365-21vianet) | modified |
-| 4/19/2022 | [Message Encryption](/microsoft-365/compliance/ome?view=o365-21vianet) | modified |
-| 4/19/2022 | [Overview of the eDiscovery (Premium) solution in Microsoft 365](/microsoft-365/compliance/overview-ediscovery-20?view=o365-21vianet) | modified |
-| 4/19/2022 | [Partially indexed items in Content Search and other eDiscovery tools](/microsoft-365/compliance/partially-indexed-items-in-content-search?view=o365-21vianet) | modified |
-| 4/19/2022 | [Configure permissions filtering for eDiscovery](/microsoft-365/compliance/permissions-filtering-for-content-search?view=o365-21vianet) | modified |
-| 4/19/2022 | [Create a predictive coding model in eDiscovery (Premium)](/microsoft-365/compliance/predictive-coding-create-model?view=o365-21vianet) | modified |
-| 4/19/2022 | [Predictive coding module for eDiscovery (Premium) (preview)](/microsoft-365/compliance/predictive-coding-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Predictive coding in eDiscovery (Premium) - Quick start](/microsoft-365/compliance/predictive-coding-quick-start?view=o365-21vianet) | modified |
-| 4/19/2022 | [Preserve Bcc and expanded distribution group recipients for eDiscovery](/microsoft-365/compliance/preserve-bcc-and-expanded-distribution-group-recipients-for-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about privileged access management](/microsoft-365/compliance/privileged-access-management-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Privileged access management](/microsoft-365/compliance/privileged-access-management-solution-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Protect user and device access](/microsoft-365/compliance/protect-access-to-data-and-services?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about Microsoft Purview Records Management](/microsoft-365/compliance/records-management?view=o365-21vianet) | modified |
-| 4/19/2022 | [Resources to help you meet regulatory requirements for data lifecycle management and records management](/microsoft-365/compliance/retention-regulatory-requirements?view=o365-21vianet) | modified |
-| 4/19/2022 | [Configure retention settings to automatically retain or delete content](/microsoft-365/compliance/retention-settings?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about retention policies & labels to automatically retain or delete content](/microsoft-365/compliance/retention?view=o365-21vianet) | modified |
-| 4/19/2022 | [Revoke email encrypted by Advanced Message Encryption](/microsoft-365/compliance/revoke-ome-encrypted-mail?view=o365-21vianet) | modified |
-| 4/19/2022 | [Search for and delete email messages in your organization](/microsoft-365/compliance/search-for-and-delete-messages-in-your-organization?view=o365-21vianet) | modified |
-| 4/19/2022 | [Search for content in a core eDiscovery case](/microsoft-365/compliance/search-for-content-in-core-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Search for eDiscovery activities in the audit log](/microsoft-365/compliance/search-for-ediscovery-activities-in-the-audit-log?view=o365-21vianet) | modified |
-| 4/19/2022 | [Search the audit log in the Microsoft Purview compliance portal](/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance?view=o365-21vianet) | modified |
-| 4/19/2022 | [Sensitive information type entity definitions](/microsoft-365/compliance/sensitive-information-type-entity-definitions?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about sensitive information types](/microsoft-365/compliance/sensitive-information-type-learn-about?view=o365-21vianet) | modified |
-| 4/19/2022 | [Choose Microsoft Purview Information Protection built-in labeling for Office apps over the Azure Information Protection (AIP) add-in](/microsoft-365/compliance/sensitivity-labels-aip?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage sensitivity labels in Office apps](/microsoft-365/compliance/sensitivity-labels-office-apps?view=o365-21vianet) | modified |
-| 4/19/2022 | [Enable sensitivity labels for Office files in SharePoint and OneDrive](/microsoft-365/compliance/sensitivity-labels-sharepoint-onedrive-files?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about sensitivity labels](/microsoft-365/compliance/sensitivity-labels?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up Audit (Premium) in Microsoft 365](/microsoft-365/compliance/set-up-advanced-audit?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up Azure Rights Management for the previous version of Message Encryption](/microsoft-365/compliance/set-up-azure-rms-for-previous-version-message-encryption?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up Audit (Standard) in Microsoft 365](/microsoft-365/compliance/set-up-basic-audit?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up compliance boundaries for eDiscovery investigations](/microsoft-365/compliance/set-up-compliance-boundaries?view=o365-21vianet) | modified |
-| 4/19/2022 | [Set up Microsoft Purview Message Encryption](/microsoft-365/compliance/set-up-new-message-encryption-capabilities?view=o365-21vianet) | modified |
-| 4/19/2022 | [Get started with exact data match based sensitive information types](/microsoft-365/compliance/sit-get-started-exact-data-match-based-sits-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Learn about exact data match based sensitive information types](/microsoft-365/compliance/sit-learn-about-exact-data-match-based-sits?view=o365-21vianet) | modified |
-| 4/19/2022 | [Tagging and Relevance training in eDiscovery (Premium)](/microsoft-365/compliance/tagging-and-relevance-training-in-advanced-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Tag documents in a review set](/microsoft-365/compliance/tagging-documents?view=o365-21vianet) | modified |
-| 4/19/2022 | [Teams workflow in eDiscovery (Premium)](/microsoft-365/compliance/teams-workflow-in-advanced-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview trial terms and conditions](/microsoft-365/compliance/terms-conditions?view=o365-21vianet) | modified |
-| 4/19/2022 | [Test Relevance analysis in eDiscovery (Premium)](/microsoft-365/compliance/test-relevance-analysis-in-advanced-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Track Relevance analysis in eDiscovery (Premium)](/microsoft-365/compliance/track-relevance-analysis-in-advanced-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Troubleshoot AzCopy in eDiscovery (Premium)](/microsoft-365/compliance/troubleshooting-azcopy?view=o365-21vianet) | modified |
-| 4/19/2022 | [Turn auditing on or off](/microsoft-365/compliance/turn-audit-log-search-on-or-off?view=o365-21vianet) | modified |
-| 4/19/2022 | [Use a script to add users to a hold in a eDiscovery (Standard) case](/microsoft-365/compliance/use-a-script-to-add-users-to-a-hold-in-ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Use Content search for targeted collections](/microsoft-365/compliance/use-content-search-for-targeted-collections?view=o365-21vianet) | modified |
-| 4/19/2022 | [Use drive shipping to import your organization's PST files](/microsoft-365/compliance/use-drive-shipping-to-import-pst-files-to-office-365?view=o365-21vianet) | modified |
-| 4/19/2022 | [Use network upload to import your organization's PST files](/microsoft-365/compliance/use-network-upload-to-import-pst-files?view=o365-21vianet) | modified |
-| 4/19/2022 | [View custodian audit activity](/microsoft-365/compliance/view-custodian-activity?view=o365-21vianet) | modified |
-| 4/19/2022 | [View statistics for eDiscovery search results](/microsoft-365/compliance/view-keyword-statistics-for-content-search?view=o365-21vianet) | modified |
-| 4/19/2022 | [What's new in Microsoft Purview](/microsoft-365/compliance/whats-new?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft 365 Zero Trust deployment plan](/microsoft-365/security/microsoft-365-zero-trust?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Defender for Office 365 in Microsoft 365 Defender](/microsoft-365/security/defender/microsoft-365-security-center-mdo?view=o365-21vianet) | modified |
-| 4/19/2022 | [Permissions - Security & Compliance Center](/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center?view=o365-21vianet) | modified |
-| 4/19/2022 | [Create a secure guest sharing environment](/microsoft-365/solutions/create-secure-guest-sharing-environment?view=o365-21vianet) | modified |
-| 4/19/2022 | [Key Compliance and Security Considerations for the Energy Industry](/microsoft-365/solutions/energy-secure-collaboration?view=o365-21vianet) | modified |
-| 4/19/2022 | [Key compliance and security considerations for US banking and capital markets](/microsoft-365/solutions/financial-services-secure-collaboration?view=o365-21vianet) | modified |
-| 4/19/2022 | [Protect information subject to data privacy regulation](/microsoft-365/solutions/information-protection-deploy-protect-information?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage devices with Intune](/microsoft-365/solutions/manage-devices-with-intune-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [About the Microsoft Purview solutions trial](/microsoft-365/compliance/compliance-easy-trials?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview eDiscovery solutions](/microsoft-365/compliance/ediscovery?view=o365-21vianet) | modified |
-| 4/19/2022 | [Test Binaries package on Test Base](/microsoft-365/test-base/testapplication?view=o365-21vianet) | modified |
-| 4/19/2022 | [Onboard macOS devices into Microsoft 365 overview](/microsoft-365/compliance/device-onboarding-macos-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Configure endpoint DLP settings](/microsoft-365/compliance/dlp-configure-endpoint-settings?view=o365-21vianet) | modified |
-| 4/19/2022 | [Windows and Office 365 deployment lab kit](/microsoft-365/enterprise/modern-desktop-deployment-and-management-lab?view=o365-21vianet) | modified |
-| 4/19/2022 | [Setting up Scheduler for Microsoft 365.](/microsoft-365/scheduler/scheduler-setup?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft 365 enterprise resource planning - Security architecture](/microsoft-365/solutions/identity-design-principles?view=o365-21vianet) | modified |
-| 4/19/2022 | [Plan external collaboration with channel conversations, file collaboration, and shared apps](/microsoft-365/solutions/plan-external-collaboration?view=o365-21vianet) | modified |
-| 4/19/2022 | [Build a package](/microsoft-365/test-base/buildpackage?view=o365-21vianet) | modified |
-| 4/19/2022 | [Test Base FAQ](/microsoft-365/test-base/faq?view=o365-21vianet) | modified |
-| 4/19/2022 | [Test Base API & SDK](/microsoft-365/test-base/sdkapi?view=o365-21vianet) | modified |
-| 4/19/2022 | [Microsoft Purview auditing solutions](/microsoft-365/compliance/auditing-solutions-overview?view=o365-21vianet) | modified |
-| 4/19/2022 | [Legacy eDiscovery tools retired](/microsoft-365/compliance/legacy-ediscovery-retirement?view=o365-21vianet) | modified |
-| 4/19/2022 | Create, close, reopen, and delete cases in core eDiscovery | removed |
-| 4/19/2022 | [Learn about named entities](/microsoft-365/compliance/named-entities-learn?view=o365-21vianet) | modified |
-| 4/19/2022 | [Use named entities in DLP policies](/microsoft-365/compliance/named-entities-use?view=o365-21vianet) | modified |
-| 4/19/2022 | [Search for and delete chat messages in Teams](/microsoft-365/compliance/search-and-delete-teams-chat-messages?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage submissions](/microsoft-365/security/office-365-security/admin-submission?view=o365-21vianet) | modified |
-| 4/19/2022 | [Email authentication in Microsoft 365](/microsoft-365/security/office-365-security/email-validation-and-authentication?view=o365-21vianet) | modified |
-| 4/19/2022 | [Enable the Report Message or the Report Phishing add-ins](/microsoft-365/security/office-365-security/enable-the-report-message-add-in?view=o365-21vianet) | modified |
-| 4/19/2022 | [Configuring and controlling external email forwarding in Microsoft 365.](/microsoft-365/security/office-365-security/external-email-forwarding?view=o365-21vianet) | modified |
-| 4/19/2022 | [Common Zero Trust identity and device access policies - Microsoft 365 for enterprise \| Microsoft Docs](/microsoft-365/security/office-365-security/identity-access-policies?view=o365-21vianet) | modified |
-| 4/19/2022 | [Application Guard for Office for admins](/microsoft-365/security/office-365-security/install-app-guard?view=o365-21vianet) | modified |
-| 4/19/2022 | [Manage your allows in the Tenant Allow/Block List](/microsoft-365/security/office-365-security/manage-tenant-allows?view=o365-21vianet) | modified |
-| 4/19/2022 | [Modify and remove entries in the Tenant Allow/Block List](/microsoft-365/security/office-365-security/modify-remove-entries-tenant-allow-block?view=o365-21vianet) | modified |
-| 4/19/2022 | [View Defender for Office 365 reports](/microsoft-365/security/office-365-security/view-reports-for-mdo?view=o365-21vianet) | modified |
-| 4/20/2022 | [Onboard macOS devices into Microsoft 365 overview](/microsoft-365/compliance/device-onboarding-macos-overview?view=o365-21vianet) | modified |
-| 4/20/2022 | [Admin training video library # < 60 chars](/microsoft-365/admin/admin-video-library?view=o365-21vianet) | modified |
-| 4/21/2022 | [About the Microsoft Purview solutions trial](/microsoft-365/compliance/compliance-easy-trials?view=o365-21vianet) | modified |
-| 4/21/2022 | [Deploy Microsoft 365 Lighthouse baselines](/microsoft-365/lighthouse/m365-lighthouse-deploy-baselines?view=o365-21vianet) | modified |
-| 4/21/2022 | [Overview of using Microsoft 365 Lighthouse baselines to deploy standard tenant configurations](/microsoft-365/lighthouse/m365-lighthouse-deploy-standard-tenant-configurations-overview?view=o365-21vianet) | modified |
-| 4/21/2022 | [Overview of the Tenants page in Microsoft 365 Lighthouse](/microsoft-365/lighthouse/m365-lighthouse-tenants-page-overview?view=o365-21vianet) | modified |
-| 4/22/2022 | [Deploy add-ins in the admin center](/microsoft-365/admin/manage/manage-deployment-of-add-ins?view=o365-21vianet) | modified |
-| 4/22/2022 | [Test and deploy Microsoft 365 Apps by partners in the Integrated apps portal](/microsoft-365/admin/manage/test-and-deploy-microsoft-365-apps?view=o365-21vianet) | modified |
-| 4/22/2022 | [Overview of Microsoft 365 Lighthouse](/microsoft-365/lighthouse/m365-lighthouse-overview?view=o365-21vianet) | modified |
-| 4/22/2022 | [Overview of the Windows 365 (Cloud PCs) page in Microsoft 365 Lighthouse](/microsoft-365/lighthouse/m365-lighthouse-win365-page-overview?view=o365-21vianet) | modified |
-| 4/22/2022 | [Simulation automations for Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations?view=o365-21vianet) | modified |
-| 4/22/2022 | [Simulate a phishing attack with Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training?view=o365-21vianet) | modified |
-| 4/22/2022 | [Upload your package](/microsoft-365/test-base/uploadapplication?view=o365-21vianet) | modified |
includes Microsoft Defender Api Usgov https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/microsoft-defender-api-usgov.md
->[!NOTE]
->If you are a US Government customer, please use the URIs listed in [Microsoft Defender for Endpoint for US Government customers](/microsoft-365/security/defender-endpoint/gov#api).
+> [!NOTE]
+> If you are a US Government customer, please use the URIs listed in [Microsoft Defender for Endpoint for US Government customers](/microsoft-365/security/defender-endpoint/gov#api).
lighthouse M365 Lighthouse Deploy Standard Tenant Configurations Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-deploy-standard-tenant-configurations-overview.md
Lighthouse baseline configurations are designed to make sure all managed tenants
| Require MFA for end users | A Conditional Access policy that requires multi-factor authentication for all users. It's required for all cloud applications. For more information about this baseline, see [Conditional Access: Require MFA for all users](/azure/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa). | | Block legacy authentication | A Conditional Access policy to block legacy client authentication. For more information about this baseline, see [Block legacy authentication to Azure AD with Conditional Access](/azure/active-directory/conditional-access/block-legacy-authentication).| | Set up device enrollment | Device enrollment to allow your tenant devices to enroll in Microsoft Endpoint Manager. This is done by setting up Auto Enrollment between Azure Active Directory and Microsoft Endpoint Manager. For more information about this baseline, see [Set up enrollment for Windows devices](/mem/intune/enrollment/windows-enroll). |
+| Setup Exchange Online Protection and Microsoft Defender for Office 365 | A policy to apply recommended anti-spam, anti-malware, anti-phishing, safe links and safe attachment policies to your tenants Exchange Online mailboxes. |
| Configure Microsoft Defender Antivirus for Windows 10 and later | A device configuration profile for Windows devices with pre-configured Microsoft Defender Antivirus settings. For more information about this baseline, see [Configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure).| | Configure Microsoft Defender Firewall for Windows 10 and later | A firewall policy to help secure devices by preventing unwanted and unauthorized network traffic. For more information about this baseline, see [Best practices for configuring Windows Defender Firewall](/windows/security/threat-protection/windows-firewall/best-practices-configuring). | | Configure a device compliance policy for Windows 10 and later | A Windows device policy with pre-configured settings to meet basic compliance requirements. For more information about this baseline, see [Conditional Access: Require compliant or hybrid Azure AD joined device](/azure/active-directory/conditional-access/howto-conditional-access-policy-compliant-device). |
security Enable Attack Surface Reduction https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction.md
Each ASR rule contains one of four settings:
- **Audit**: Evaluate how the ASR rule would impact your organization if enabled - **Warn**: Enable the ASR rule but allow the end user to bypass the block
-> [!IMPORTANT]
-> Currently, warn mode is not supported for three ASR rules when you configure ASR rules in Microsoft Endpoint Manager (MEM). To learn more, see [Cases where warn mode is not supported](attack-surface-reduction.md#cases-where-warn-mode-is-not-supported).
- We recommend using ASR rules with a Windows E5 license (or similar licensing SKU) to take advantage of the advanced monitoring and reporting capabilities available in [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) (Defender for Endpoint). However, if you have another license, such as Windows Professional or Windows E3 that don't include advanced monitoring and reporting capabilities, you can develop your own monitoring and reporting tools on top of the events that are generated at each endpoint when ASR rules are triggered (for example, Event Forwarding). > [!TIP]
security Host Firewall Reporting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/host-firewall-reporting.md
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
-If you are an Global or security administrator, you can now host firewall reporting to the [Microsoft 365 Defender portal](https://security.microsoft.com). This feature enables you to view Windows 10, Windows 11, Windows Server 2019, and Windows Server 2022 firewall reporting from a centralized location.
+If you are a Global or security administrator, you can now host firewall reporting to the [Microsoft 365 Defender portal](https://security.microsoft.com). This feature enables you to view Windows 10, Windows 11, Windows Server 2019, and Windows Server 2022 firewall reporting from a centralized location.
## What do you need to know before you begin?
If you are an Global or security administrator, you can now host firewall report
- The two PowerShell commands are: - **auditpol /set /subcategory:"Filtering Platform Packet Drop" /failure:enable** - **auditpol /set /subcategory:"Filtering Platform Connection" /failure:enable**
+```powershell
+param (
+ [switch]$remediate
+)
+try {
+
+ $categories = "Filtering Platform Packet Drop,Filtering Platform Connection"
+ $current = auditpol /get /subcategory:"$($categories)" /r | ConvertFrom-Csv
+ if ($current."Inclusion Setting" -ne "failure") {
+ if ($remediate.IsPresent) {
+ Write-Host "Remediating. No Auditing Enabled. $($current | ForEach-Object {$_.Subcategory + ":" + $_.'Inclusion Setting' + ";"})"
+ $output = auditpol /set /subcategory:"$($categories)" /failure:enable
+ if($output -eq "The command was successfully executed.") {
+ Write-Host "$($output)"
+ exit 0
+ }
+ else {
+ Write-Host "$($output)"
+ exit 1
+ }
+ }
+ else {
+ Write-Host "Remediation Needed. $($current | ForEach-Object {$_.Subcategory + ":" + $_.'Inclusion Setting' + ";"})."
+ exit 1
+ }
+ }
+
+}
+catch {
+ throw $_
+}
+```
## The process
security Linux Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-whatsnew.md
ms.technology: mde
**Applies to:** - [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+## 101.68.80 (30.122042.16880.0)
+
+- Added support for kernel version `2.6.32-754.47.1.el6.x86_64` when running on RHEL 6
+- On RHEL 6, product can now be installed on devices running Unbreakable Enterprise Kernel (UEK)
+- Fixed an issue where the process name was sometimes incorrectly displayed as `unknown` when running `mdatp diagnostic real-time-protection-statistics`
+- Fixed a bug where the product sometimes was incorrectly detecting files inside the quarantine folder
+- Fixed an issue where the `mdatp` command-line tool was not working when `/opt` was mounted as a soft-link
+- Performance improvements & bug fixes
+ ## 101.65.77 (30.122032.16577.0) - Improved the `conflicting_applications` field in `mdatp health` to show only the most recent 10 processes and also to include the process names. This makes it easier to identify which processes are potentially conflicting with Microsoft Defender for Endpoint for Linux.
security Microsoft Defender Endpoint Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-linux.md
If you experience any installation failures, refer to [Troubleshooting installat
- 2.6.32-754.39.1.el6.x86_64 - 2.6.32-754.41.2.el6.x86_64 - 2.6.32-754.43.1.el6.x86_64
+ - 2.6.32-754.47.1.el6.x86_64
- 2.6.32-754.6.3.el6.x86_64 - 2.6.32-754.9.1.el6.x86_64
security Troubleshoot Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus.md
This error indicates that there might be a problem with your security product.
</tr><tr><td>Resolution</td><td> <ol> <li>Update the definitions. Either:<ol>
-<li>Click the <b>Update definitions</b> button on the <b>Update</b> tab in Microsoft Defender Antivirus. <img src="images/defender-updatedefs2.png" alt="Update definitions in Microsoft Defender Antivirus"/>Or,
+<li>Get your security intelligence updates in the Windows Security app. <img src="images/defender-updatedefs2.png" alt="Update definitions in Microsoft Defender Antivirus"/>Or,
</li> <li>Download the latest definitions from the <a href="https://aka.ms/wdsi">Microsoft Security Intelligence site</a>. Note: The size of the definitions file downloaded from the site can exceed 60 MB and should not be used as a long-term solution for updating definitions.
security Web Content Filtering https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-content-filtering.md
ms.technology: mde
# Web content filtering - **Applies to:** - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
Before trying out this feature, make sure you meet the requirements described in
| Requirement | Description | |:|:|
-| Subscription | Your subscription must include one of the following:<br/>- [Windows 10/11 Enterprise E5](/windows/deployment/deploy-enterprise-licenses)<br/>- [Microsoft 365 E5](https://www.microsoft.com/microsoft-365/enterprise/e5?activetab=pivot%3aoverviewtab)<br/>- Microsoft 365 E5 Security<br/>- [Microsoft 365 E3](https://www.microsoft.com/microsoft-365/enterprise/e3?activetab=pivot%3aoverviewtab)<br/>- [Microsoft Defender for Endpoint Plan 1 or Plan 2](../defender/eval-defender-endpoint-overview.md)<br/>- [Microsoft Defender for Business](../defender-business/mdb-overview.md) |
+| Subscription | Your subscription must include one of the following:<br/>- [Windows 10/11 Enterprise E5](/windows/deployment/deploy-enterprise-licenses)<br/>- [Microsoft 365 E5](https://www.microsoft.com/microsoft-365/enterprise/e5?activetab=pivot%3aoverviewtab)<br/>- Microsoft 365 E5 Security<br/>- [Microsoft 365 E3](https://www.microsoft.com/microsoft-365/enterprise/e3?activetab=pivot%3aoverviewtab)<br/>- [Microsoft Defender for Endpoint Plan 1 or Plan 2](../defender/eval-defender-endpoint-overview.md)<br/>- [Microsoft Defender for Business](../defender-business/mdb-overview.md)<br/>- [Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium)|
| Portal access | You must have access to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>. | | Operating system | Your organization's devices must be running one of the following operating systems with the [latest antivirus/antimalware updates](manage-updates-baselines-microsoft-defender-antivirus.md): <br/>- Windows 11<br/>- Windows 10 Anniversary Update (version 1607) or later | | Related protection | [Windows Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) and [network protection](network-protection.md) must be enabled on your organization's devices. |
To add a new policy, follow these steps:
4. Specify the policy scope. Select the device groups to specify where to apply the policy. Only devices in the selected device groups will be prevented from accessing websites in the selected categories. > [!IMPORTANT]
- > If you're using Defender for Business, your web content filtering policy is applied to all users by default. Scoping does not apply.
+ > If you're using either Microsoft 365 Business Premium or Defender for Business, your web content filtering policy is applied to all users by default. Scoping does not apply.
5. Review the summary and save the policy. The policy refresh might take up to 2 hours to apply to your selected devices.
To add a new policy, follow these steps:
## End-user experience
-The blocking experience for third-party supported browsers is provided by Network Protection, which provides a system-level message notifying the user of a blocked connection. For a more user-friendly, in-browser experience, consider using Microsoft Edge.
+The blocking experience for third-party supported browsers is provided by network protection, which provides a system-level message notifying the user of a blocked connection. For a more user-friendly, in-browser experience, consider using Microsoft Edge.
### Allow specific websites
To define a custom indicator, follow these steps:
### Dispute categories
-If you encounter a domain that has been incorrectly categorized, you can dispute the category directly from the portal.
+If you encounter a domain that has been incorrectly categorized, you can dispute the category directly from the Microsoft 365 Defender portal.
To dispute the category of a domain, navigate to **Reports** \> **Web protection** \> **Web Content Filtering Details** \> **Domains**. On the domains tab of the Web Content Filtering reports, you will see an ellipsis beside each of the domains. Hover over this ellipsis and select **Dispute Category**.
Use the time range filter at the top left of the page to select a time period. Y
Only Microsoft Edge is supported if your device's OS configuration is Server (**cmd** \> **Systeminfo** \> **OS Configuration**). Network Protection is only supported in Inspect mode on Server devices, which is responsible for securing traffic across supported third-party browsers.
-Only Microsoft Edge is supported and Network Protection is not supported on Windows 10 Azure Virtual Desktop multi-session hosts.
+Only Microsoft Edge is supported and network protection is not supported on Windows 10 Azure Virtual Desktop multi-session hosts.
+
+Network protection does not currently support SSL inspection, which might result in some sites being allowed by web content filtering that would normally be blocked. Sites would be allowed due to a lack of visibility into encrypted traffic after the TLS handshake has taken place and an inability to parse certain redirects. This includes redirections from some web-based mail login pages to the mailbox page. As an accepted workaround, you can create a custom block indicator for the login page to ensure no users are able to access the site. Keep in mind, this might block their access to other services associated with the same website.
-Network Protection does not currently support SSL inspection, which might result in some sites being allowed by Web Content Filtering that would normally be blocked. Sites would be allowed due to a lack of visibility into encrypted traffic after the TLS handshake has taken place and an inability to parse certain redirects. This includes redirections from some web-based mail login pages to the mailbox page. As an accepted workaround, you can create a custom block indicator for the login page to ensure no users are able to access the site. Keep in mind, this might block their access to other services associated with the same website.
+If you are using Microsoft 365 Business Premium or Microsoft Defender for Business, you can define one web content filtering policy for your environment. That policy will apply to all users by default.
## See also
security Address Compromised Users Quickly https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/address-compromised-users-quickly.md
ms.prod: m365-security
# Address compromised user accounts with automated investigation and response + **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
security Advanced Spam Filtering Asf Options https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/advanced-spam-filtering-asf-options.md
ms.prod: m365-security
# Advanced Spam Filter (ASF) settings in EOP - **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
security Air Custom Reporting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-custom-reporting.md
ms.prod: m365-security
# Custom or third-party reporting solutions for Microsoft Defender for Office 365
-With [Microsoft Defender for Office 365](defender-for-office-365.md), you get [detailed information about automated investigations](air-view-investigation-results.md). However, some organizations also use a custom or third-party reporting solution. If your organization wants to integrate information about [automated investigations](office-365-air.md) with such a solution, you can use the Office 365 Management Activity API.
**Applies to** - [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+With [Microsoft Defender for Office 365](defender-for-office-365.md), you get [detailed information about automated investigations](air-view-investigation-results.md). However, some organizations also use a custom or third-party reporting solution. If your organization wants to integrate information about [automated investigations](office-365-air.md) with such a solution, you can use the Office 365 Management Activity API.
+ With [Microsoft Defender for Office 365](defender-for-office-365.md), you get [detailed information about automated investigations](air-view-investigation-results.md). However, some organizations also use a custom or third-party reporting solution. If your organization wants to integrate information about automated investigations with such a solution, you can use the Office 365 Management Activity API. |Resource|Description|
security Air Review Approve Pending Completed Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-review-approve-pending-completed-actions.md
Last updated 06/10/2021
# Review and manage remediation actions in Office 365 + **Applies to** - [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md)
security Air View Investigation Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-view-investigation-results.md
ms.prod: m365-security
# Details and results of an automated investigation in Microsoft 365 + **Applies to** - [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md)-- [Microsoft 365 Defender](../defender/microsoft-365-defender.md) When an [automated investigation](office-365-air.md) occurs in [Microsoft Defender for Office 365](defender-for-office-365.md), details about that investigation are available during and after the automated investigation process. If you have the necessary permissions, you can view those details in the Microsoft 365 Defender portal. Investigation details provide you with up-to-date status, and the ability to approve any pending actions.
security Attack Simulation Training End User Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-end-user-notifications.md
ms.technology: mdo
# End-user notifications for Attack simulation training +
+**Applies to**
+- [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md)
+ In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, end-user notifications are email messages that are sent to users There are two basic types of notifications: - **Simulation notifications**: These messages are sent when users are enrolled in trainings, and as reminders for required trainings.
security Attack Simulation Training Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-faq.md
ms.prod: m365-security
# Attack simulation training deployment considerations and FAQ +
+**Applies to**
+- [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md)
+ Attack simulation training enables Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations to measure and manage social engineering risk by allowing the creation and management of phishing simulations that are powered by real-world, de-weaponized phishing payloads. Hyper-targeted training, delivered in partnership with Terranova security, helps improve knowledge and change employee behavior. For more information about getting started with Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
security Attack Simulation Training Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-insights.md
ms.technology: mdo
# Insights and reports for Attack simulation training in Defender for Office 365 + **Applies to** [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md)
security Attack Simulation Training Payload Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-payload-automations.md
ms.technology: mdo
# Payload automations for Attack simulation training + **Applies to** [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md)
security Attack Simulation Training Payloads https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-payloads.md
ms.technology: mdo
# Create custom payloads for Attack simulation training in Defender for Office 365 + **Applies to** [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md)
security Attack Simulation Training Simulation Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations.md
ms.technology: mdo
# Simulation automations for Attack simulation training + **Applies to** [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md)
security Attack Simulation Training https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training.md
ms.technology: mdo
# Simulate a phishing attack with Attack simulation training in Defender for Office 365 + **Applies to** [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md)
security Azure Ip Protection Features https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/azure-ip-protection-features.md
ms.prod: m365-security
# Protection features in Azure Information Protection rolling out to existing tenants - **Applies to** - [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
security Backscatter Messages And Eop https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/backscatter-messages-and-eop.md
ms.prod: m365-security
# Backscatter in EOP - **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
security Bulk Complaint Level Values https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/bulk-complaint-level-values.md
ms.prod: m365-security
# Bulk complaint level (BCL) in EOP - **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
security Configure Advanced Delivery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/configure-advanced-delivery.md
ms.prod: m365-security
# Configure the delivery of third-party phishing simulations to users and unfiltered messages to SecOps mailboxes + **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
security Email Security In Microsoft Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-security-in-microsoft-defender.md
ms.prod: m365-security
# Email security with Threat Explorer in Microsoft Defender for Office 365 +
+**Applies to:**
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+ In this article: - [View malware detected in email](#view-malware-detected-in-email)
In this article:
This article explains how to view and investigate malware and phishing attempts that are detected in email by Microsoft 365 security features.
-**Applies to:**
--- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)-- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)- ## View malware detected in email To see malware detected in email sorted by Microsoft 365 technology, use the [**Email \> Malware**](threat-explorer-views.md#email--malware) view of Explorer (or Real-time detections). Malware is the default view, so it might be selected as soon as you open Explorer.
security Mail Flow In Eop https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mail-flow-in-eop.md
- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
-In Microsoft 365 organizations with Exchange Online mailboxes, or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, all messages sent to your organization pass through EOP before your workers see them. You have options about how to route messages that pass through EOP for processing before they are routed to your worker inboxes.
+In Microsoft 365 organizations with Exchange Online mailboxes, or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, all messages sent to your organization pass through EOP before users see them. You have options about how to route messages that pass through EOP for processing before they are routed to user mailboxes.
## Working with messages and message access options
security Mail Flow Insights V2 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mail-flow-insights-v2.md
Admins can use Mail flow dashboard in the Security & Compliance Center to discov
The available insights are: - [Auto-forwarded messages insight](mfi-auto-forwarded-messages-report.md)- - [Fix possible mail loop insight](mfi-mail-loop-insight.md)<sup>1</sup>- - [Fix slow mail flow rules insight](mfi-slow-mail-flow-rules-insight.md)<sup>1</sup>- - [Mail flow map](mfi-mail-flow-map-report.md)- - [New domains being forwarded email insight](mfi-new-domains-being-forwarded-email.md)<sup>2</sup>- - [New users forwarding email insight](mfi-new-users-forwarding-email.md)<sup>2</sup>- - [Non-accepted domain report](mfi-non-accepted-domain-report.md)- - [Non-delivery report](mfi-non-delivery-report.md)- - [Outbound and inbound mail flow insight](mfi-outbound-and-inbound-mail-flow.md)- - [Queues insight](mfi-queue-alerts-and-queues.md)- - [SMTP Auth clients insight and report](mfi-smtp-auth-clients-report.md)- - [Top domain mail flow status insight](mfi-domain-mail-flow-status-insight.md) <sup>1</sup> This insight appears in the **Recommended for you** area of the Mail flow dashboard only after the issue is detected. Otherwise, you won't see it.
For more information about permissions, see [Permissions in the Security & Compl
## Where to find the Mail flow dashboard
-Open the Security & Compliance Center at <https://protection.office.com>, expand **Mail flow**, and then select **Dashboard**.
- To go directly to the Mail flow dashboard, open <https://protection.office.com/mailflow/dashboard>.
security Mdo Email Entity Page https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-email-entity-page.md
description: Microsoft Defender for Office 365 E5 and P1 and P2 customers can no
# The Email entity page +
+**Applies to:**
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+ **In this article:** - [Reach the email entity page](#reach-the-email-entity-page) - [Read the email entity page](#read-the-email-entity-page)
security Mdo Sec Ops Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-guide.md
ms.prod: m365-security
# Microsoft Defender for Office 365 Security Operations Guide +
+**Applies to:**
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+ This article gives an overview of the requirements and tasks for successfully operating Microsoft Defender for Office 365 in your organization. These tasks help ensure that your security operations center (SOC) provides a high-quality, reliable approach to protect, detect, and respond to email and collaboration-related security threats. The rest of this guide describes the required activities for SecOps personnel. The activities are grouped into prescriptive daily, weekly, monthly, and ad-hoc tasks.
security Mdo Sec Ops Manage Incidents And Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-manage-incidents-and-alerts.md
ms.prod: m365-security
# Manage incidents and alerts from Microsoft Defender for Office 365 in Microsoft 365 Defender +
+**Applies to:**
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+ An [incident](/microsoft-365/security/defender/incidents-overview) in Microsoft 365 Defender is a collection of correlated alerts and associated data that define the complete story of an attack. Defender for Office 365 [alerts](/microsoft-365/compliance/alert-policies#default-alert-policies), [automated investigation and response (AIR)](office-365-air.md#the-overall-flow-of-air), and the outcome of the investigations are natively integrated and correlated on the **Incidents** page in Microsoft 365 Defender at <https://security.microsoft.com/incidents-queue>. We'll refer to this page as the _Incidents queue_. Alerts are created when malicious or suspicious activity affects an entity (for example, email, users, or mailboxes). Alerts provide valuable insights about in-progress or completed attacks. However, an ongoing attack can affect multiple entities, which results in multiple alerts from different sources. Some built-in alerts will automatically trigger AIR playbooks. These playbooks do a series of investigation steps to look for other impacted entities or suspicious activity.
security Monitor For Leaks Of Personal Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/monitor-for-leaks-of-personal-data.md
ms.prod: m365-security
# Monitor for leaks of personal data - There are many tools that can be used to monitor the use and transport of personal data. This topic describes three tools that work well. :::image type="content" source="../../media/Monitor-for-leaks-of-personal-data-image1.png" alt-text="The tools to monitor the use and transport of personal data" lightbox="../../media/Monitor-for-leaks-of-personal-data-image1.png":::
security Office365 Security Incident Response Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/office365-security-incident-response-overview.md
ms.prod: m365-security
# Security Incident Response - **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
security Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/overview.md
ms.prod: m365-security
# Microsoft Defender for Office 365 security overview + **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
security Protection Stack Microsoft Defender For Office365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/protection-stack-microsoft-defender-for-office365.md
# Step-by-step threat protection in Microsoft Defender for Office 365 +
+**Applies to:**
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+ The Microsoft Defender for Office 365 protection or filtering stack can be broken out into 4 phases, as in this article. Generally speaking, incoming mail passes through all of these phases before delivery, but the actual path email takes is subject to an organization's Defender for Office 365 configuration. > [!TIP]
security Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-policies.md
ms.prod: m365-security
# Quarantine policies +
+**Applies to:**
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+ Quarantine policies (formerly known as _quarantine tags_) in Exchange Online Protection (EOP) and Microsoft Defender for Office 365 allow admins to control what users are able to do to quarantined messages based on why the message was quarantined. Traditionally, users have been allowed or denied levels of interactivity for quarantine messages based on why the message was quarantined. For example, users can view and release messages that were quarantined by anti-spam filtering as spam or bulk, but they can't view or release messages that were quarantined as high confidence phishing or malware.
security Real Time Detections https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/real-time-detections.md
ms.prod: m365-security
# Explorer and Real-time detections + **Applies to** - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
security Recover From Ransomware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recover-from-ransomware.md
ms.prod: m365-security
# Recover from a ransomware attack in Microsoft 365 - **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
security Reports And Insights In Security And Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/reports-and-insights-in-security-and-compliance.md
ms.prod: m365-security
# Smart reports and insights in the Security & Compliance Center - **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
-If you have the necessary [permissions assigned](permissions-in-the-security-and-compliance-center.md) you can access smart reports and insights.
+Security teams can use the smart reports and insights in the Security & Compliance Center to monitor the health and security of their organizations. This information is presented in the **Dashboard** at <https://protection.office.com/insightdashboard>:
++
+The smart reports and insights on the **Dashboard** have the following capabilities:
-## Smart reports and insights overview
+- Highlight problem areas.
+- Recommendations and links to view and explore data.
+- Take quick action.
-Monitoring capabilities include smart reports and insights that enable your compliance and security admins to focus on high-priority issues, such as security attacks or increased suspicious activity. In a dashboard, smart reports and insights resemble the following image:
+For example, if users in your organization are suddenly reporting a high number of email messages as spam, you should verify the settings in your anti-spam policies.
+## Types of reports in the Security & Compliance Center
-In addition to highlighting problem areas, smart reports and insights include recommendations and links to view and explore data and also take quick actions. For example, if your organization suddenly has a high number of email messages being marked as spam by end users, you might be advised to revisit your anti-spam policies to ensure the right level of protection is in place.
+The following table list the reports that are available in the **Dashboard**:
-A wide variety of reports are available. (Go to **Reports** \> **Security report** to get an all-up view).
+|Type of information|How to get there|Where to go to learn more|
+||||
+|**All up** <p> Top insights and recommendations, and links to available security reports and compliance reports.|<https://protection.office.com/insightdashboard>|[Reports in the Security & Compliance Center](../../compliance/reports-in-security-and-compliance.md)|
+|**Email & collaboration reports** <p> Threat detections, malware trends, top targeted users, details about sent and received email messages, and more.|<https://security.microsoft.com/emailandcollabreport>|[View email security reports](view-email-security-reports.md) <p> [View reports for Defender for Office 365](view-reports-for-mdo.md)|
+|**Explorer** (also referred to as Threat explorer) or **Real-time detections** <p> Suspected malware detected in email and files in Microsoft 365.|<https://security.microsoft.com/threatexplorer> <p> <https://security.microsoft.com/realtimereports>|[Threat Explorer (or real-time detections)](threat-explorer.md)|
## Related topics
security Secure By Default https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/secure-by-default.md
ms.prod: m365-security
# Secure by default in Office 365 [!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)] **Applies to**
security Security Recommendations For Priority Accounts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/security-recommendations-for-priority-accounts.md
ms.prod: m365-security
# Security recommendations for priority accounts in Microsoft 365 +
+**Applies to:**
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+ Not all user accounts have access to the same company information. Some accounts have access to sensitive information, such as financial data, product development information, partner access to critical build systems, and more. If compromised, accounts that have access to highly confidential information pose a serious threat. We call these types of accounts _priority accounts_. Priority accounts include (but aren't limited to) CEOs, CISOs, CFOs, infrastructure admin accounts, build system accounts, and more. For attackers, ordinary phishing attacks that cast a random net for ordinary or unknown users are inefficient. On the other hand, _spear phishing_ or _whaling_ attacks that target priority accounts are very rewarding for attackers. So, priority accounts require stronger than ordinary protection to help prevent account compromise.
security Sending Mail To Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/sending-mail-to-office-365.md
ms.prod: m365-security
# Sending mail to Microsoft 365 - These articles help external senders improve their reputation and increase their ability to deliver email to users at Microsoft 365. They also provide some information about how you can report junk email and phishing attempts even if you aren't a Microsoft 365 user yourself. If you're not a customer, but are trying to send mail to someone in who is, you're in the right place. If you're an admin and you need help with fighting spam, this isn't the right section for you. Instead, go to [anti-spam](anti-spam-protection.md) and [anti-malware](anti-malware-protection.md).
security Services For Non Customers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/services-for-non-customers.md
ms.prod: m365-security
# Services for non-customers sending mail to Microsoft 365 - Email abuse, junk email, and fraudulent emails (phishing) continue to burden the entire email ecosystem. To help maintain user trust in the use of email, Microsoft has put various policies and technologies in place to help protect our users. However, Microsoft understands that legitimate email should not be negatively affected. Therefore, we have established a suite of services to help senders improve their ability to deliver email to Microsoft 365 users by proactively managing their sending reputation. This overview provides information about benefits we provide to your organization even if you aren't a customer.
security Spam Confidence Levels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/spam-confidence-levels.md
ms.prod: m365-security
- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md) - In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, inbound messages go through spam filtering in EOP and are assigned a spam score. That score is mapped to an individual spam confidence level (SCL) that's added to the message in an X-header. A higher SCL indicates a message is more likely to be spam. EOP takes action on the message based on the SCL. What the SCL means and the default actions that are taken on messages are described in the following table. For more information about actions you can take on messages based on the spam filtering verdict, see [Configure anti-spam policies in EOP](configure-your-spam-filter-policies.md).
security Submitting Malware And Non Malware To Microsoft For Analysis https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submitting-malware-and-non-malware-to-microsoft-for-analysis.md
ms.prod: m365-security
# Submit malware and non-malware to Microsoft for analysis - **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
security Support For Anonymous Inbound Email Messages Over Ipv6 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/support-for-anonymous-inbound-email-messages-over-ipv6.md
ms.prod: m365-security
# Add support for anonymous inbound email over IPv6 in Microsoft 365 - **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
security Threat Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-explorer.md
ms.prod: m365-security
# Threat Explorer and Real-time detections + **Applies to** - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
security Threat Hunting In Threat Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-hunting-in-threat-explorer.md
ms.prod: m365-security
# Threat hunting in Threat Explorer for Microsoft Defender for Office 365 +
+**Applies to:**
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+ In this article: - [Threat Explorer walk-through](#threat-explorer-walk-through)
security Trial Playbook Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/trial-playbook-defender-for-office-365.md
description: "Microsoft Defender for Office 365 solutions trial playbook."
# Trial playbook: Microsoft Defender for Office 365 +
+**Applies to:**
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+ Welcome to the Microsoft Defender for Office 365 trial playbook. This playbook will help you make the most of your 90-day free trial by teaching you how to safeguard your organization with Defender for Office 365. Using Microsoft recommendations, you'll learn how Defender for Office 365 can help you define protection policies, analyze threats to your organization, and respond to attacks. :::image type="content" source="../../medio.png":::
security Tuning Anti Phishing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tuning-anti-phishing.md
ms.prod: m365-security
# Tune anti-phishing protection - **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
security Use The Delist Portal To Remove Yourself From The Office 365 Blocked Senders Lis https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/use-the-delist-portal-to-remove-yourself-from-the-office-365-blocked-senders-lis.md
ms.prod: m365-security
# Use the delist portal to remove yourself from the blocked senders list and address 5.7.511 Access denied errors - **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
security User Tags https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/user-tags.md
ms.prod: m365-security
# User tags in Microsoft Defender for Office 365 +
+**Applies to:**
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+ User tags are identifiers for specific groups of users in [Microsoft Defender for Office 365](defender-for-office-365.md). There are two types of user tags: - **System tags**: Currently, [Priority accounts](../../admin/setup/priority-accounts.md) is the only type of system tag.
security View And Release Quarantined Messages From Shared Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/view-and-release-quarantined-messages-from-shared-mailboxes.md
ms.prod: m365-security
# View and release quarantined messages from shared mailboxes +
+**Applies to:**
+- [Exchange Online Protection](exchange-online-protection-overview.md)
+- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
+ Users can manage quarantined messages where they are one of the recipients as described in [Find and release quarantined messages as a user in EOP](find-and-release-quarantined-messages-as-a-user.md). But what about **shared mailboxes** where the user has Full Access and Send As or Send on Behalf permissions to the mailbox as described in [Shared mailboxes in Exchange Online](/exchange/collaboration-exo/shared-mailboxes)? Previously, the ability for users to manage quarantined messages sent to a shared mailbox required admins to leave automapping enabled for the shared mailbox (it's enabled by default when an admin gives a user access to another mailbox). However, depending on the size and number of mailboxes that the user has access to, performance can suffer as Outlooks tries to open _all_ mailboxes that the user has access to. For this reason, many admins choose to [remove automapping for shared mailboxes](/outlook/troubleshoot/profiles-and-accounts/remove-automapping-for-shared-mailbox).
security Walkthrough Spoof Intelligence Insight https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/walkthrough-spoof-intelligence-insight.md
# Manage spoofed senders using the spoof intelligence policy and spoof intelligence insight in EOP - **Applies to** - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
security What S The Difference Between Junk Email And Bulk Email https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/what-s-the-difference-between-junk-email-and-bulk-email.md
ms.prod: m365-security
# What's the difference between junk email and bulk email in EOP? - **Applies to** - [Exchange Online Protection](exchange-online-protection-overview.md) - [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)