Updates from: 05/24/2023 01:51:49
Category Microsoft Docs article Related commit history on GitHub Change details
admin Release Options In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/release-options-in-office-365.md
If you [Set up the release option in the admin center](#set-up-the-release-optio
If you [Set up the release option in the admin center](#set-up-the-release-option-in-the-admin-center) for this option, you can define specific users, usually power users, to receive early access to features and functionality.
+It's important to ensure that your HelpDesk is opted in to Targeted release so that they have access to the Targeted release features needed to support your users.
+ > [!IMPORTANT] > Some features only roll out on a per-organization basis. This means that the entire organization will receive access to the feature at the same time. For features like this, itΓÇÖs not possible for selected users in the targeted release program to get the feature early. This means that your organization will not be able to receive these features early if you have configured selected users in targeted release. To make sure that you see all features in targeted release, you will need to configure targeted release for the entire organization or set up a test organization.
compliance Alert Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/alert-policies.md
The tables also indicate the Office 365 Enterprise and Office 365 US Government
|**Email messages from a campaign removed after delivery**|Generates an alert when any messages associated with a [Campaign](../security/office-365-security/campaigns.md) are delivered to mailboxes in your organization. If this event occurs, Microsoft removes the infected messages from Exchange Online mailboxes using [Zero-hour auto purge](../security/office-365-security/zero-hour-auto-purge.md). This policy automatically triggers [automated investigation and response in Office 365](../security/office-365-security/air-about.md). For more information on this new policy, see [New alert policies in Microsoft Defender for Office 365](new-defender-alert-policies.md).|Informational|Yes|E5/G5 or Defender for Office 365 P2 add-on subscription| |**Email messages removed after delivery**|Generates an alert when any malicious messages that do not contain a malicious entity (URL or File), or associated with a Campaign, are delivered to mailboxes in your organization. If this event occurs, Microsoft removes the infected messages from Exchange Online mailboxes using [Zero-hour auto purge](../security/office-365-security/zero-hour-auto-purge.md). This policy automatically triggers [automated investigation and response in Office 365](../security/office-365-security/air-about.md). For more information on this new policy, see [New alert policies in Microsoft Defender for Office 365](new-defender-alert-policies.md).|Informational|Yes|E5/G5 or Defender for Office 365 P2 add-on subscription| |**Email reported by user as malware or phish**|Generates an alert when users in your organization report messages as phishing using the built-in Report button in Outlook or the Report Message or Report Phishing add-ins. For more information about the add-ins, see [Use the Report Message add-in](https://support.office.com/article/b5caa9f1-cdf3-4443-af8c-ff724ea719d2). For Defender for Office 365 P2, E5, G5 customers, this alert automatically triggers [automated investigation and response in Office 365](../security/office-365-security/air-about.md).|Low|Yes|E1/F1/G1, E3/F3/G3, or E5/G5|
-|**Email reported by user as spam**|Generates an alert when users in your organization report messages as junk using the built-in Report button in Outlook or the Report Message add-in. For more information about the add-ins, see [Use the Report Message add-in](https://support.office.com/article/b5caa9f1-cdf3-4443-af8c-ff724ea719d2).|Low|No|E1/F1/G1, E3/F3/G3, or E5/G5|
+|**Email reported by user as junk**|Generates an alert when users in your organization report messages as junk using the built-in Report button in Outlook or the Report Message add-in. For more information about the add-ins, see [Use the Report Message add-in](https://support.office.com/article/b5caa9f1-cdf3-4443-af8c-ff724ea719d2).|Low|No|E1/F1/G1, E3/F3/G3, or E5/G5|
|**Email reported by user as not junk**|Generates an alert when users in your organization report messages as not junk the built-in Report button in Outlook or the Report Message add-in. For more information about the add-ins, see [Use the Report Message add-in](https://support.office.com/article/b5caa9f1-cdf3-4443-af8c-ff724ea719d2).|Low|No|E1/F1/G1, E3/F3/G3, or E5/G5| |**Email sending limit exceeded**|Generates an alert when someone in your organization has sent more mail than is allowed by the outbound spam policy. This is usually an indication the user is sending too much email or that the account may be compromised. If you get an alert generated by this alert policy, it's a good idea to [check whether the user account is compromised](../security/office-365-security/responding-to-a-compromised-email-account.md).|Medium|No|E1/F1/G1, E3/F3/G3, or E5/G5| |**Form blocked due to potential phishing attempt**|Generates an alert when someone in your organization has been restricted from sharing forms and collecting responses using Microsoft Forms due to detected repeated phishing attempt behavior.|High|No|E1, E3/F3, or E5|
compliance Archive Partner Third Party Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-partner-third-party-data.md
# Work with a partner to archive third-party data
-You can work with a Microsoft Partner to import and archive data from a third-party data source to Microsoft 365. A partner can provide you with a custom connector that is configured to extract items from the third-party data source (on a regular basis) and then import those items. The partner connector converts the content of an item from the data source to an email message format and then stores the items in mailboxes. After third-party data is imported, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, In-Place Archiving, Auditing, and Microsoft 365 retention policies to this data.
+You can work with a Microsoft Partner to import and archive data from a third-party data source to Microsoft 365. A partner can provide you with a custom connector that is configured to extract items from the third-party data source (regularly) and then import those items. The partner connector converts the content of an item from the data source to an email message format and then stores the items in mailboxes. After third-party data is imported, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, In-Place Archiving, Auditing, and Microsoft 365 retention policies to this data.
> [!IMPORTANT] > The [Communication compliance](communication-compliance.md) solution in Microsoft 365 can't be applied to the third-party data imported by partner connectors mentioned in this article.
Here are the steps for creating and configuring a third-party data mailbox for i
- Enable the archive mailbox; see [Enable archive mailboxes](enable-archive-mailboxes.md) and [Enable auto-expanding archiving](enable-autoexpanding-archiving.md). This lets you free-up storage space in the primary mailbox by setting up an archive policy that moves third-party data items to the archive mailbox. This provides you with up to 1.5 TB of storage for third-party data.
- - Place the third-party data mailbox on Litigation Hold. You can also apply a Microsoft 365 retention policy in the Microsoft Purview compliance portal. Placing this mailbox on hold retains third-party data items (indefinitely or for a specified duration) and prevent them from being purged from the mailbox. See one of the following topics:
+ - Place the third-party data mailbox on Litigation Hold. You can also apply a Microsoft 365 retention policy in the Microsoft Purview compliance portal. Placing this mailbox on hold retains third-party data items (indefinitely or for a specified duration) and prevent them from being purged from the mailbox. See one of the following articles:
- [Place a mailbox on Litigation Hold](./ediscovery-create-a-litigation-hold.md)
The next step is to configure user mailboxes to support third-party data. Comple
1. Enable the archive mailbox for each user; see [Enable archive mailboxes](enable-archive-mailboxes.md) and [Enable auto-expanding archiving](enable-autoexpanding-archiving.md).
-2. Place user mailboxes on Litigation Hold or apply a Microsoft 365 retention policy; see one of the following topics:
+2. Place user mailboxes on Litigation Hold or apply a Microsoft 365 retention policy; see one of the following articles:
- [Place a mailbox on Litigation Hold](./ediscovery-create-a-litigation-hold.md) - [Learn about retention policies and retention labels](retention.md)
The final step is to provide your partner with the following information so they
## Step 5: Register the third-party data connector in Azure Active Directory
-Starting September 30, 2018, the Azure service in Microsoft 365 will begin using modern authentication in Exchange Online to authenticate third-party data connectors that attempt to connect to your organization to import data. The reason for this change is that modern authentication provides more security than the current method, which was based on an allow list for third-party connectors that use the previously described endpoint to connect to the Azure service.
+Starting September 30, 2018, the Azure service in Microsoft 365 will begin using modern authentication in Exchange Online to authenticate third-party data connectors that attempt to connect to your organization to import data. The reason for this change is that modern authentication provides more security than the current method, which was based on an allowlist for third-party connectors that use the previously described endpoint to connect to the Azure service.
To enable a third-party data connector to connect to Microsoft 365 using the new modern authentication method, an administrator in your organization must consent to register the connector as a trusted service application in Azure Active Directory. This is done by accepting a permission request to allow the connector to access your organization's data in Azure Active Directory. After you accept this request, the third-party data connector is added as an enterprise application to Azure Active Directory and represented as a service principal. For more information the consent process, see [Tenant Admin Consent](/skype-sdk/trusted-application-api/docs/tenantadminconsent).
After you accept the request, the [Azure portal](https://portal.azure.com) is di
After your organization consents to the permissions request to register a third-party data connector in Azure Active Directory, your organization can revoke that consent at any time. However, revoking the consent for a connector means that data from the third-party data source will no longer be imported into Microsoft 365.
-To revoke consent for a third-party data connector, you can delete the application (by deleting the corresponding service principal) from Azure Active Directory using the **Enterprise applications** blade in the Azure portal, or by using the [Remove-MsolServicePrincipal](/powershell/module/msonline/remove-msolserviceprincipal) in Microsoft 365 PowerShell. You can also use the [Remove-AzureADServicePrincipal](/powershell/module/azuread/remove-azureadserviceprincipal) cmdlet in Azure Active Directory PowerShell.
+To revoke consent for a third-party data connector, you can delete the application (by deleting the corresponding service principal) from Azure Active Directory using the **Enterprise applications** blade in the Azure portal, or by using the [Remove-MgServicePrincipal](/powershell/module/microsoft.graph.applications/remove-mgserviceprincipal) in the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/installation).
## More information
To revoke consent for a third-party data connector, you can delete the applicati
|Message property|Mandatory?|Description|Example value| |||||
- |**FROM**|Yes|The user who originally created or sent the item in the third-party data source. The partner connector attempts to map the user ID from the source item (for example a Twitter handle) to a user account for all participants (users in the FROM and TO fields). A copy of the message will be imported to the mailbox of every participant. If none of the participants from the item can be mapped to a user account, the item will be imported to the third-party archiving mailbox in Microsoft 365. <br/> <br/> The participant who's identified as the sender of the item must have an active mailbox in the organization that the item is being imported to. If the sender doesn't have an active mailbox, the following error is returned:<br/><br/> `One or more messages in the Request failed to be delivered to either From or Sender email address. You will need to resend your entire Request. Error: The request failed. The remote server returned an error: (401) Unauthorized.`|`bob@contoso.com`|
+ |**FROM**|Yes|The user who originally created or sent the item in the third-party data source. The partner connector attempts to map the user ID from the source item (for example a Twitter handle) to a user account for all participants (users in the FROM and TO fields). A copy of the message will be imported to the mailbox of every participant. If none of the participants from the item can be mapped to a user account, the item is imported to the third-party archiving mailbox in Microsoft 365. <br/> <br/> The participant who's identified as the sender of the item must have an active mailbox in the organization that the item is being imported to. If the sender doesn't have an active mailbox, the following error is returned:<br/><br/> `One or more messages in the Request failed to be delivered to either From or Sender email address. You will need to resend your entire Request. Error: The request failed. The remote server returned an error: (401) Unauthorized.`|`bob@contoso.com`|
|**TO**|Yes|The user who received an item, if applicable for an item in the data source.|`bob@contoso.com`| |**SUBJECT**|No|The subject from the source item.|`"Mega deals with Contoso coming your way! #ContosoHolidayDeals"`| |**DATE**|Yes|The date the item was originally created or posted in the customer data source. For example, that date when a Twitter message was tweeted.|`01 NOV 2015`|
compliance Compliance Manager Assessments https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-assessments.md
f1.keywords:
Previously updated : 05/16/2023 Last updated : 05/23/2023 audience: Admin
The Microsoft actions tab appears for assessments based on templates that suppor
## Grant user access to individual assessments
-When you assign users a Compliance Manager role in the Microsoft Purview compliance portal, they can view or edit data within all assessments by default (review the [Compliance Manager role types](compliance-manager-setup.md#role-types)). You can restrict user access to only certain assessments by managing user roles from within an assessment or assessment template. Restricting access in this way can help ensure that users who play a role in overseeing compliance with particular regulations or standards have access only to the data and information they need to perform their duties.
+When you assign users a Compliance Manager role in the Microsoft Purview compliance portal, they can view or edit data within all assessments by default (review the [Compliance Manager role types](compliance-manager-setup.md#role-types)). You can restrict user access to only certain assessments by managing user roles from within an assessment. Restricting access in this way can help ensure that users who play a role in overseeing compliance with particular regulations or standards have access only to the data and information they need to perform their duties. (You can also set [user access for regulations](compliance-manager-templates.md#grant-user-access-to-regulations), which allows users to access all assessments created for that regulation.)
External users who need access for auditing or other purposes can also be assigned a role for viewing assessments and editing test data. You provide access to external individual by assigning them an Azure Active Directory (AD) role. Learn more about [assigning Azure AD roles](compliance-manager-setup.md#setting-permissions-in-azure-ad).
compliance Compliance Manager Improvement Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-improvement-actions.md
f1.keywords:
Previously updated : 05/22/2023 Last updated : 05/23/2023 audience: Admin
After you complete the work, conduct testing, and upload evidence, the next step
- **If test status is set to ΓÇ£FailedΓÇ¥**: the action doesn't meet the requirements, and the assessor can assign it back to the appropriate user for more work.
-Users need a **Compliance Manager Assessor** role in order to edit improvement action testing notes. You may also want to grant users access only to certain assessments. Learn [how to set permissions](compliance-manager-setup.md#set-user-permissions-and-assign-roles) and [how to grant role-based assess to assessments](compliance-manager-setup.md#role-based-access-to-assessments).
+Users need a **Compliance Manager Assessor** role in order to edit improvement action testing notes. You may also want to grant users access only to certain assessments. Learn [how to set permissions](compliance-manager-setup.md#set-user-permissions-and-assign-roles) and [how to grant role-based access to assessments and regulations](compliance-manager-setup.md#role-based-access-to-assessments-and-regulations).
## Accepting updates to improvement actions
compliance Compliance Manager Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-setup.md
f1.keywords:
Previously updated : 05/04/2023 Last updated : 05/23/2023 audience: Admin
The direct link to access Compliance Manager is [https://compliance.microsoft.co
## Set user permissions and assign roles
-Compliance Manager uses a role-based access control (RBAC) permission model. Only users who are assigned a role may access Compliance Manager, and the actions allowed by each user are restricted by [role type](#role-types). Our RBAC model also allows you to grant user access to individual assessments. See [role-based access to assessments](#role-based-access-to-assessments) below to learn more.
+Compliance Manager uses a role-based access control (RBAC) permission model. Only users who are assigned a role may access Compliance Manager, and the actions allowed by each user are restricted by [role type](#role-types). Our RBAC model also allows you to grant user access to individual assessments. See [role-based access to assessments](#role-based-access-to-assessments-and-regulations) below to learn more.
The person holding the global admin role for your organization can set user permissions for Compliance Manager. Permissions can be set in either of the following places:
A user can only hold one role at a time. Any change in a user's role will overri
| **Edit improvement action testing notes**| Compliance Manager Assessor | Compliance Administrator | | **Manage assessments, regulatory templates, and tenant data; assign improvement actions**| Compliance Manager Administration | Compliance Administrator, Compliance Data Administrator, Security Administrator |
-### Role-based access to assessments
+### Role-based access to assessments and regulations
-You can assign roles to users in order to grant access to specific assessments. Granting access to individual assessments is useful when you need to ensure that only the people working on certain regulatory requirements have access to that data. You can grant access to individual assessments to users outside of your organization, which helps when you have external auditors. For users outside your organization, you'll need to assign them an Azure AD role. For instructions, see [More about Azure AD](#setting-permissions-in-azure-ad).
+You can assign roles to users in order to grant access to specific assessments, or all assessments based on the regulation. Granting user access in these ways is useful when you need to ensure that only the people working on certain regulatory requirements have access to that data.
-The four roles listed in table above provide access to assessments: Compliance Manager Reader, Compliance Manager Contribution, Compliance Manager Assessor, and Compliance Manager Administration. What you can do with each assessment remains restricted based on which activities the role allows.
+These four roles provide access to assessments:
+- Compliance Manager Reader
+- Compliance Manager Contribution
+- Compliance Manager Assessor
+- Compliance Manager Administration
-To grant users access to an assessment, open the assessment's details page and select **Manage users access** to add users by role. If a user has a role assigned to them in the Microsoft Purview compliance portal for overall access to Compliance Manager, any role you assign them for a specific assessment will apply only to that assessment.
+What you can do with each assessment remains restricted based on which activities the role allows.
+
+To grant users access to an assessment or all assessments for a regulation, open the its details page and select **Manage users access** to add users by role. If a user has a role assigned to them in the Microsoft Purview compliance portal for overall access to Compliance Manager, any role you assign them for a specific assessment will apply only to that assessment.
**More information**:-- See [Grant user access to assessments](compliance-manager-assessments.md#grant-user-access-to-individual-assessments) for more detailed information and instructions.
+- See [Grant user access to assessments](compliance-manager-assessments.md#grant-user-access-to-individual-assessments) for more detailed instructions.
+- See [Grant user access to regulations](compliance-manager-templates.md#grant-user-access-to-regulations) for more detailed instructions.
- Learn more about [managing all users' access to assessments](#user-access) in Compliance Manager settings. ## Start a premium assessments trial
To delete a userΓÇÖs history, follow the steps below:
## User access
-The **User access** section of **Settings** displays a list of all users who have a role that allows access to one or more assessments. From this page, you can make changes to assessment-based role assignments. To add or remove such roles for users, follow the steps below:
+The **User access** section of **Settings** displays a list of all users who have a role that allows access to one or more assessments. From this page, you can make changes to role assignments.
+
+ - When you grant a user access to an **assessment**: The user will have access to just that one assessment.
+ - When you grant a user access to a **regulation**: The user will have access to any assessment created with that regulation, including existing assessements and any assessments created in the future.
+
+To add or remove user access roles for assessments and regulations, follow the steps below:
1. In **Compliance Manager settings,** select **User access**. 1. Select the checkbox next to the name of one or more users whose role you want to edit.
-1. From the **Edit assessment roles** dropdown menu above the list of names, select **Add assessment permissions** or **Remove assessment permissions**.
+1. Depending on whether you're editing roles for assessments or regulations: From the **Edit assessment roles** or **Edit regulation roles** dropdown menu above the list of names, select **Add assessment/regulation permissions** or **Remove assessment/regulation permissions**.
-1. **For adding a role**: From the flyout pane, go to the tab that corresponds to the role you want to add (Reader, Assessor, or Contributor), then select **Add assessments**. On the next flyout pane, choose the checkbox next to the assessments and select **Apply**, then select **Save**.
+1. **For adding a role**: From the flyout pane, go to the tab that corresponds to the role you want to add (Reader, Assessor, or Contributor), then select **Add assessments/regulations**. On the next flyout pane, choose the checkbox next to the assessments/regulations and select **Apply**, then select **Save**.
-1. **For removing a role**: From the flyout pane, go to the tab that corresponds to the role you want to remove (Reader, Assessor, or Contributor). Select the button next to the assessments for which you want to remove access, and select the X mark in the **Remove** column.
+1. **For removing a role**: From the flyout pane, go to the tab that corresponds to the role you want to remove (Reader, Assessor, or Contributor). Select the button next to the assessments/regulations for which you want to remove access, and select the X mark in the **Remove** column.
1. A **Remove access?** confirmation box appears. Select **Confirm** to remove the user's role, or select **Cancel** to cancel. The name of the assessments will now be removed from the role tab.
The improvement actions page shows the following data points for each improvemen
- **Regulations**: The regulations or standards pertaining to the action. - **Group**: The group to which you assigned the action. - **Solutions**: The solution where you can go to perform the action.-- **Assessments**: The number of assessments that contain the action. Select the number to see the list of related assessments; you'll see only the assessments to which you have access ([learn more](#role-based-access-to-assessments)).
+- **Assessments**: The number of assessments that contain the action. Select the number to see the list of related assessments; you'll see only the assessments to which you have access ([learn more](#role-based-access-to-assessments-and-regulations)).
- **Categories**: The related data protection category (such as, protect information, manage devices, etc.). - **Test status**: - **None** ΓÇô no status update recorded
compliance Compliance Manager Templates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-templates.md
f1.keywords:
Previously updated : 05/04/2023 Last updated : 05/23/2023 audience: Admin
Select **View details** the counter to view a detailed list of all regulations i
## Regulations details page
-Select a regulation from the list on the **Regulations** page to bring up its details page. This page contains a description of the regulation and details about applicable services, the date it was last updated, and tabs for viewing controls and improvement actions.
+Similarly, templates that belong to the same regulation family are also counted as one template. The regulation family is shown in the **Overarching regulation** column on the **Assessment templates** page. When you purchase a template license for a regulation and activate the template, it counts as one activated template even if you create assessments for different levels or versions of that regulation. For example, if you use a template for CMMC Level 1 and a template for CMMC Level 2, your activated templates counter increases by only one.
+
+For further details, see [Compliance Manager licensing guidance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-purview-compliance-manager).
+
+## Grant user access to regulations
+
+When you assign users a Compliance Manager role in the Microsoft Purview compliance portal, their role extends by default to all regulations (review the [Compliance Manager role types](compliance-manager-setup.md#role-types)). This access means that, depending on the user's role type, they can view or interact with any existing or future assessments created with that regulation.
+
+You can give users a specific role that will apply to certain regulations by managing user roles from a regulation's details page. When you set a user's role for a regulation, the user will be able to interact at that role level for all assessments (existing and future) created with that regulation. (You can also restrict access to individual assessments following [these instructions](compliance-manager-assessments.md#grant-user-access-to-individual-assessments).)
+
+External users who need access for auditing or other purposes can also be assigned an access role for regulations. You'll provide access to external individual by assigning them an Azure Active Directory (AD) role. Learn more about [assigning Azure AD roles](compliance-manager-setup.md#setting-permissions-in-azure-ad).
+
+#### Steps for granting access
+
+Follow the steps to grant user access to a regulation.
+
+1. From the **Regulations** page, find the regulation you want to grant access to. Select it to open its details page.
+
+1. In the upper-right corner, select **Manage user access**.
+
+1. A **Manage user access** flyout pane appears. It has three tabs, one for each role of Reader, Assessor, and Contributor. Navigate to the tab for the role you want your user to hold for this regulation.
+
+1. Select the **+ Add** command for the role tab you're on: **Add readers**, or **Add assessors** or **Add contributors**.
+
+1. Another flyout pane appears which lists all the users in your organization. You can select the checkbox next to the username you want to add, or you can enter their name in the search bar and select the user from there. You can select multiple users at once.
+
+1. After making all your selections, select **Add**.
+ > [!NOTE]
+ > If you assign a role to someone who already has an existing role, the new role assignment you choose will override their existing role. In this case, you'll see a confirmation box asking you to confirm the change in role.
+
+1. The flyout pane will close and you'll arrive back at the regulation details page. Select **Save**. A confirmation message at the top will confirm the new role assignment for that regulatin.
+
+#### Steps for removing access
+
+You can remove a user's access to individual regulations by following the steps below:
+
+1. On the regulation's details page, select **Manage user access**.
+
+1. On the **Manage user access** flyout pane, go the tab corresponding to the user's role you want to remove.
+
+1. Find the user whose role you want to remove. Check the circle to the left of their name, then select the **Remove** command just below the role tab. To remove all users at once, simply select the **Remove all** command without checking the circle next to every user's name.
+
+1. A **Remove access?** dialog appears, asking you to confirm the removal. Select **Remove access** to confirm the role removal.
+
+1. Select **Save** on the flyout pane. The users' roles will now be removed from the assessment.
+
+##### Note about multiple roles
+
+- A user can have one role that applies to a regulation, while also holding another role that applies broadly to overall Compliance Manager access.
+
+ - For example, if you've assigned a user a **Compliance Manager Reader** role in Microsoft Purview compliance portal **Permissions,** you can also assign that user a **Compliance Manager Assessor** role for a specific regulation. In effect, the user will hold the two roles at the same time, but their ability to edit data will be limited to the assessment to which they've been assigned the **Assessor** role.
+ - Removing a regulation-based role won't remove the user's overall Compliance Manager role if they have one. If you want to change a user's overall role, you'll have to change it from the **Permissions** page in the Microsoft Purview compliance portal.
+
+- For an individual regulation, one user can only hold one assessment-based role at a time.
+ - For example, if a user holds a reader role for the GDPR regulation and you want to change them to a contributor role, you'll first need to remove their reader role, and then re-assign them the reader role.
+
+> [!NOTE]
+> Admins whose permissions for Compliance Manager were set in Azure AD won't appear on the **Manage user access** flyout pane. This means that if a user has access to one or more regulations, and their role is Global Administrator, Compliance Administrator, Compliance Data Administrator, or Security Administrator, they won't appear on this pane. Learn more about [setting Compliance Manager permissions and roles](compliance-manager-setup.md#set-user-permissions-and-assign-roles).
compliance Compliance Manager Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-whats-new.md
f1.keywords:
Previously updated : 05/16/2023 Last updated : 05/23/2023 audience: Admin
Compliance Manager now integrates with Microsoft Defender for Cloud so you can a
Compliance Manager also features an integrated set of connectors that can help you understand your compliance obligations across the many services you use in your organization. Connectors for Salesforce and Zoom are now available, with more coming soon. Learn more about [working with connectors in Compliance Manager](compliance-manager-connectors.md).
+Also, you can now provide scoped access to assessments based on regulation. For each regulatory template, you can assign users a role that allows them to access any assessment created for that regulation. Learn more about [granting user access to regulatory templates](compliance-manager-templates.md#grant-user-access-to-regulations).
+ ## January 2023 In preview: Compliance Manager has new improvement actions that correspond to actions taken in Microsoft Priva to bolster your organization's compliance with data privacy regulations. Learn more about [Priva](/privacy/priv#testing-source-for-automated-testing) in Compliance Manager.
compliance Dlp Microsoft Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-microsoft-teams.md
You can extend the Teams DLP policy to cover SharePoint Online and OneDrive for
> [!NOTE] > Only those Teams policies that have rules with conditions of **content contains** or **content is shared from Microsoft 365** can be extended for automatic file protection. If the condition or exception configuration has **Sender is**, **sender domain is**, **recipient is**, and **recipient domain is** present, the extension action will fail because these conditions donΓÇÖt apply to SharePoint and OneDrive. -- **Example 3: Protecting communications in Teams Shared Channels**. For shared channels, the host Teams team DLP policy is applied. For example letΓÇÖs say there's a shared channel owned by TeamA of Contoso. TeamA has a DLP policy P1. There are 3 ways to share a channel:
- - **Share with member**: You invite user1 from Contoso to join the shared channel without making him a member of TeamA. Everyone in this shared channel, including user1, will be covered by P1.
- - **Share with team (internally)**: You share the channel with another team TeamB in Contoso. That another team may have a different DLP policy, but that doesnΓÇÖt matter. P1 will apply to everyone in this shared channel, including both TeamA and TeamB users.
- - **Share with team (cross tenant)**: You share the channel with a team TeamF in Fabrikam. Fabrikam may have its own DLP policy, but that doesnΓÇÖt matter. P1 will apply to everyone in this shared channel, including both TeamA (Contoso) and TeamF (Fabrikam) users.
+- **Example 3: Protecting communications in Teams Shared Channels**. For shared channels, the host Teams team DLP policy is applied. For example letΓÇÖs say there's a shared channel owned by TeamA of Contoso. Team A has a DLP policy P1. There are 3 ways to share a channel:
+ - **Share with member**: You invite User1 from Contoso to join the shared channel without making him a member of Team A. Everyone in this shared channel, including User1, will be covered by P1.
+ - **Share with team (internally)**: You share the channel with another team Team B in Contoso. That another team may have a different DLP policy, but that doesnΓÇÖt matter. P1 will apply to everyone in this shared channel, including both Team A and Team B users.
+ - **Share with team (cross tenant)**: You share the channel with a team Team F in Fabrikam. Fabrikam may have its own DLP policy, but that doesnΓÇÖt matter. P1 will apply to everyone in this shared channel, including both Team A (Contoso) and Team F (Fabrikam) users.
+
+- **Example 4: Protecting communications when chatting with external users in Microsoft Teams**. When using the *external access* feature in Microsoft Teams, people from different Microsoft 365 organizations can all join the same chat session. Each user is subject to the DLP policies of their own organization. For instance, say that UserA, UserB and UserC, all from Contoso, and UserX, UserY, and UserZ, all from Fabrikam, are in the same Teams chat. Contoso's DLP policies with regard to sharing information in Teams apply to UserA, UserB and UserC, while Fabrikam's DLP policies apply to UserX, UserY, and UserZ. For more information on using Microsoft Teams to chat with people external to your organization, see [Manage external meetings and chat with people and organizations using Microsoft identities](/microsoftteams/trusted-organizations-external-meetings-chat)
+ [!INCLUDE [purview-preview](../includes/purview-preview.md)]
compliance Dlp Migration Assistant For Symantec Use https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-migration-assistant-for-symantec-use.md
After you've installed and launched the migration assistant, you need to log in.
1. Enter your password in the browser window that opens and select **Sign in**. > [!NOTE]
- > This application uses Exchange Online PowerShell module. Basic authentication must be enabled in WinRM on the local computer. For more information, see [Prerequisites for the Exchange Online PowerShell module](/powershell/exchange/exchange-online-powershell-v2#prerequisites-for-the-exchange-online-powershell-module).
+ > This application uses the Exchange Online PowerShell module. Basic authentication must be enabled in WinRM on the local computer. For more information, see [Prerequisites for the Exchange Online PowerShell module](/powershell/exchange/exchange-online-powershell-v2#prerequisites-for-the-exchange-online-powershell-module).
3. You need to wait until your login is validated. Simultaneously, the migration assistant fetches information that will be required in later stages of the migration process. :::image type="content" source="../media/login-fetching-details.png" alt-text="Screenshot of the screen fetching details."::: 4. Once you're logged in, choose **Next**.
compliance Ediscovery Guest Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-guest-access.md
+
+ Title: "Guest access in eDiscovery (Premium) (preview)"
+description: "Learn about guest access in eDiscovery (Premium)."
+f1.keywords:
+- NOCSH
++++ Last updated : 05/22/2023
+audience: Admin
++
+ms.localizationpriority: medium
+
+- tier1
+- purview-compliance
+- ediscovery
+search.appverid:
+- MOE150
+- MET150
++
+# Guest access in eDiscovery (Premium) (preview)
+
+With guest access, you can provide access to an eDiscovery Premium case to people outside your organization. You can invite guests users to eDiscovery (Premium) cases just like you can invite guests into your Teams environment.
+
+A guest is someone who doesn't have a work or school account with your organization. For example, guests may include external partners, vendors, suppliers, or consultants. Anyone who isn't part of your organization can be added as guest for an eDiscovery (Premium) case. This access means that anyone with an Azure Active Directory account or personal email account (Outlook, Gmail, or others) can participate as a guest in eDiscovery and have access to specific eDiscovery (Premium) cases.
+
+Guest access in eDiscovery uses [Azure B2B technology](/azure/active-directory/external-identities/what-is-b2b), which depends on an organization-wide Azure collaboration setting. When you invite a guest to eDiscovery, a guest account is created for them in Azure Active Directory. They're covered by the same compliance and auditing protection as other Microsoft 365 users. Guest access is subject to Azure AD and Microsoft 365 service limits.
+
+> [!NOTE]
+> eDiscovery guests are currently limited to *Reviewer* role group permission only. For more information about the reviewer role, see [Assign eDiscovery permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/ediscovery-assign-permissions#rbac-roles-related-to-ediscovery).
+
+## Set up guest access
+
+Setting up guest access in eDiscovery requires configuring other settings in Azure AD. To enable access to invite guests to eDiscovery cases, complete the following steps:
+
+1. Check the [B2B external collaboration settings](/microsoft-365/solutions/collaborate-as-team#azure-external-collaboration-settings) to ensure that collaboration with guests isn't blocked. If the **Guest invite settings** is set to *No one in the organization can invite guest users including admins* then inviting guest into eDiscovery won't work. Contact your system administrator to ensure [this setting is properly configured](/azure/active-directory/external-identities/external-collaboration-settings-configure). You can view and update the collaboration setting using the *Authorization Policy* [API](/graph/api/resources/authorizationpolicy).
+
+2. Depending on the specific configuration in Step 1, eDiscovery administrators may or may not need additional roles to approval a guest access request submitted from the eDiscovery user.
+
+ - If the *Anyone in the organization can invite guest users including guests and non-admins (most inclusive)* or *Member users and users assigned to specific admin roles can invite guest users including guests with member permission* options are selected, then eDiscovery administrators can approve invitation requests without additional roles.
+ - If *Only users assigned to specific admin roles can invite guest users* is selected, then the eDiscovery administrator who would approve the invitation request requires the *Invite guest* role to approve and trigger the invitation email to the guest. See the [Assign Azure AD roles to users](/active-directory/roles/manage-roles-portal) article for guidance on how to add the *Guest Inviter* role to users. If you prefer to use PowerShell to add this role, see [Assign the Guest Inviter role to a user](/azure/active-directory/external-identities/external-collaboration-settings-configure#assign-the-guest-inviter-role-to-a-user).
+
+## Enable guest access in eDiscovery (Premium)
+
+eDiscovery admins must enable guest access in eDiscovery (Premium) before they can invite users as guests.
+
+To enable guest access for guests in eDiscovery (Premium), complete the following steps:
+
+1. In the [compliance portal](https://compliance.microsoft.com), navigate to **eDiscovery** > **Premium** > **eDiscovery (Premium) settings** > **Guest users (preview)**.
+2. Toggle **Guest access** to *On*.
+
+Now eDiscovery managers and admins can initiate the guest invitation process within any eDiscovery (Premium) case.
+
+## Invite guests to an eDiscovery (Premium) case
+
+To invite guests to an eDiscovery (Premium) case, complete the following steps:
+
+1. In the [compliance portal](https://compliance.microsoft.com), navigate to **eDiscovery** > **Premium** > **eDiscovery (Premium) cases** and select the case you want to invite guests to.
+2. In the selected case, select the **Settings** tab and then select **Access & permissions**.
+3. In the **Guest users** section, select **Add**.
+4. On the **Invite guest** flyout pane, complete the following fields:
+
+ - **Full name**: Enter the full name of the guest you want to invite.
+ - **Email address**: Enter the email address of the guest you want to invite.
+ - **Organization**: Enter the organization of the guest you want to invite.
+ - **Guest role**: Select the role you want to assign to the guest. The guest is currently limited to *Reviewer* role group permission only.
+ - **Justification**: Explain why this person needs access to the case.
+5. Select **Invite** to submit the invitation request for review and approval by an eDiscovery admin.
+
+## Approve guest access requests
+
+After guest invitations are submitted, eDiscovery admins must approve the requests before the guest can access the case. To approve guest access requests, eDiscovery managers must complete the following steps:
+
+1. eDiscovery managers are notified of pending invitation requests on the **Overview** tab in eDiscovery (Premium).
+2. To review and approve or deny the request, navigate to **eDiscovery** > **Premium** > **eDsicovery (Premium) settings** > **Guest users (preview)**. Select the guest request and select **Create account** or **Deny**.
+3. If the guest is being added to the tenant for the first time, eDiscovery admins need to perform a 2-step approval process. They first need to approve creation of an account, which may take up to 24 hours. After 24 hours, eDiscovery admins can approve guest access to the case. For future access requests for access to other cases for the same guest, only one-step approval is required.
+
+In you encounter an error when approving the guest access to a case, check the following:
+
+- The guest's email isn't disabled, blocked or deleted by the tenant admin.
+- If there are any members in the *Reviewer* role group whose AAD account has been deleted. Currently, an error occurs when adding a new member to a role group that has any deleted users. If the *Reviewer* role group has any deleted users, [remove them from the role group](/microsoft-365/compliance/microsoft-365-compliance-center-permissions#remove-users-or-groups-from-a-microsoft-purview-built-in-role-group) and retry the guest approval.
+
+## Accepting guest invitations
+
+After the request is approved by the eDiscovery admin, the guest receives a welcome email from *Microsoft Invitations*. This email contains information about the eDiscovery invitation and a link where the guest can accept the invite and sign in. The guest must select the unique link provided in the email or copy/paste the link in a browser to log into the specific eDiscovery organization.
+
+![Email invitation for guest access to an eDiscovery (Premium case).](..\media\ediscovery-guest-user-invite-email.png)
+
+Guests that have a work or school account in Azure Active Directory can accept the invitation and authenticate immediately. Other users are sent a one-time passcode to validate their identity. You must ensure that the [one-time passcode setting](/azure/active-directory/external-identities/one-time-passcode) is enabled in your organization.
+
+>[!NOTE]
+>If the guest is logged into another eDiscovery organization in their browser, they need to sign out from the organization and and clear their browser cache before selecting the link in the invitation email.
+
+After accepting the invitation and authenticating, the guest can participate in the eDiscovery case like an internal reviewer of the case and perform review activities such as querying, filtering, tagging, redaction, downloading single items for review, and more.
+
+## Removing guest access
+
+An eDiscovery admin can remove a guestΓÇÖs access to a case from eDiscovery Premium settings page. To remove guest access for a user, eDiscovery admins must complete the following steps:
+
+1. To review and approve or deny the request, navigate to **eDiscovery** > **Premium** > **eDsicovery (Premium) settings** > **Guest users (preview)**.
+2. Select the guest and select **Remove** from the flyout pane.
+
+The guest continues to have access to other cases that they have been added to. When a guest is removed from the last case they have access to, they're removed from the *Reviewer* role group and won't have access to any cases in eDiscovery (Premium).
+
+The guest continues to have an AAD guest account in the organization. A regular review and clean-up of guest accounts from AAD is recommended.
compliance Ediscovery Teams Investigation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-teams-investigation.md
Here's an example of the meeting metadata.
For more information about conducting an eDiscovery investigation, see [Get started with eDiscovery (Standard)](/microsoft-365/compliance/get-started-core-ediscovery).
-Microsoft Teams data will appear as IM or Conversations in the Excel eDiscovery export output. You can open the `.pst` file in Outlook to view those messages after you export them.
+Microsoft Teams data appears as IM or Conversations in the Excel eDiscovery export output. You can open the `.pst` file in Outlook to view those messages after you export them.
When viewing the .pst file for the team, all conversations are located in the Team Chat folder under Conversation History. The title of the message contains the team name and channel name. For example, the image below shows a message from Bob who messaged the Project 7 standard channel of the Manufacturing Specs team.
You can use eDiscovery tools to search for Teams content related to guests in yo
To search for content for guests:
-1. Connect to Azure AD PowerShell. For instructions, see the "Connect with the Azure Active Directory PowerShell" section in [Connect to Microsoft 365 with PowerShell](/microsoft-365/enterprise/connect-to-microsoft-365-powershell#connect-with-the-azure-active-directory-powershell-for-graph-module). Be sure to complete Step 1 and Step 2 in the previous article.
+1. Connect to Microsoft Graph PowerShell. For more information, see the [Microsoft Graph PowerShell overview](/powershell/microsoftgraph/overview). Be sure to complete Step 1 and Step 2 in the previous article.
-2. After you successfully connect to Azure AD PowerShell, run the following command to display the user principal name (UPN) for all guests in your organization. You have to use the UPN of the guest when you create the search in step 4.
+2. After you successfully connect to Microsoft Graph PowerShell, run the following command to display the user principal name (UPN) for all guests in your organization. You have to use the UPN of the guest when you create the search in step 4.
```powershell
- Get-AzureADUser -Filter "userType eq 'Guest'" -All $true | FL UserPrincipalName
+ Get-MgUser -Filter "userType eq 'Guest'" -All $true | FL UserPrincipalName
``` > [!TIP]
compliance Information Barriers Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-policies.md
In addition to the required subscriptions and permissions, make sure that the fo
- **For organizations in *Legacy* mode**: Before you define and apply IB policies, you must remove all existing Exchange Online address book policies in your organization. IB policies are based on address book policies and existing ABPs policies aren't compatible with the ABPs created by IB. To remove your existing address book policies, see [Remove an address book policy in Exchange Online](/exchange/address-books/address-book-policies/remove-an-address-book-policy). For more information about IB policies and Exchange Online, see [Information barriers and Exchange Online](information-barriers.md#information-barriers-and-exchange-online). - **For organizations in *SingleSegment* or *MultiSegment* mode**: Information barriers is no longer based on Exchange Online Address Book Policies (ABPs). Organizations using ABPs won't have any impact to the existing ABPs when enabling information barriers. -- **Manage using PowerShell (optional)**: IB segments and policies can be defined and managed in the compliance portal, but you can also use the Office 365 Security & Compliance PowerShell if preferred or needed. Although several examples are provided in this article, you'll need to be familiar with PowerShell cmdlets and parameters if you choose to use PowerShell to configure and manage IB segments and policies. You'll also need the Azure Active Directory PowerShell module if you choose this configuration option.
+- **Manage using PowerShell (optional)**: IB segments and policies can be defined and managed in the compliance portal, but you can also use the Office 365 Security & Compliance PowerShell if preferred or needed. Although several examples are provided in this article, you'll need to be familiar with PowerShell cmdlets and parameters if you choose to use PowerShell to configure and manage IB segments and policies. You'll also need the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/installation) if you choose this configuration option.
- [Connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell)
- - [Install Azure Active Directory PowerShell for Graph](/powershell/azure/active-directory/install-adv2)
+ - [Install the Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/installation)
- **Admin consent for IB in Microsoft Teams**: When your IB policies are in place, they can remove non-IB compliance users from Groups (for example, Teams channels, which are based on groups). This configuration helps ensure your organization remains compliant with policies and regulations. Use the following procedure to enable IB policies to work as expected in Microsoft Teams.
- 1. Prerequisite: [Install Azure Active Directory PowerShell for Graph](/powershell/azure/active-directory/install-adv2).
+ 1. Prerequisite: [Install the Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/installation).
2. Run the following PowerShell cmdlets: ```powershell
- Connect-AzureAD -Tenant "<yourtenantdomain.com>" //for example: Connect-AzureAD -Tenant "Contoso.onmicrosoft.com"
+ Connect-MgGraph -Tenant "<yourtenantdomain.com>" //for example: Connect-MgGraph -Tenant "Contoso.onmicrosoft.com"
$appId="bcf62038-e005-436d-b970-2a472f8c1982"
- $sp=Get-AzureADServicePrincipal -Filter "appid eq '$($appid)'"
- if ($sp -eq $null) { New-AzureADServicePrincipal -AppId $appId }
+ $sp=Get-MgServicePrincipal -Filter "appid eq '$($appid)'"
+ if ($sp -eq $null) { New-MgServicePrincipal -AppId $appId }
Start-Process "https://login.microsoftonline.com/common/adminconsent?client_id=$appId" ```
compliance Information Barriers Sharepoint Assistant https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-barriers-sharepoint-assistant.md
These steps create a new application in your organization's enterprise applicati
1. Run the following PowerShell cmdlets. ```PowerShell
- Connect-AzureAD
+ Connect-MgGraph
Connect-AzAccount $appId="f46c682f-628c-48e6-b963-03309e34639e" $sp=Get-AzADServicePrincipal -ServicePrincipalName $appId
compliance Ocr Learn About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ocr-learn-about.md
When you first start using OCR, limit usage to just a few people and applicable
1. In the Microsoft Purview compliance portal, go to **Settings**. 2. Select **Optical character recognition (OCR) (preview)** to enter your OCR configuration settings.
-3. Select the locations where you wish to scan images. Then, for each location and solution, define the scope (users/groups/sites) for the OCR. Supported locations and solutions are listed in the following table.
+3. Select the locations where you wish to scan images. Then, for each location and solution, define the scope (users/groups/sites) for the OCR. Supported locations and solutions are listed in the table below.
+
+#### Permissions ####
+
+The account you use to create and deploy policies must be a member of one of these role groups
+
+- Compliance administrator
+- Compliance data administrator
+- Information Protection
+- Information Protection Admin
> [!NOTE]
-> For information on OCR functionality in Microsoft Purview Communication Compliance, see **[Create and manage communication compliance policies](communication-compliance-policies.md#optical-character-recognition-ocr)**.
+> - In general, OCR settings take effect about an hour after being turned on.
+>
+> - For information on OCR functionality in Microsoft Purview Communication Compliance, see **[Create and manage communication compliance policies](communication-compliance-policies.md#optical-character-recognition-ocr)**.
+#### Supported Locations and Solutions ####
| Location | Supported Solutions | |--|-| | Exchange | Data loss prevention <sup>1</sup><br> <br> Information protection: [Auto-labeling policies](apply-sensitivity-label-automatically.md#how-to-configure-auto-labeling-policies-for-sharepoint-onedrive-and-exchange)<sup>1</sup> <br> <br> Records management: [Auto-apply retention label policies](apply-retention-labels-automatically.md#automatically-apply-a-retention-label-to-retain-or-delete-content)<sup>2</sup> |
This functionality supports scanning images in the following file types, with th
<br> ## What languages are supported?
-OCR scanning supports more than [150 languages](https://azure.microsoft.com/cognitive-services/computer-vision/language-support).
+OCR scanning supports more than [150 languages](/azure/cognitive-services/language-support).
## Summary-- You can subscribe to OCR scanning without subscribing to Microsoft Syntex.
+- To use OCR, you must set up Microsoft Syntex pay-as-you-go billing. (You donΓÇÖt need to set up Microsoft Syntex itself.)
- Configuring OCR occurs at the tenant level, so once OCR is configured, they're available to the entire Microsoft Purview stack. - You don't need to create separate data classifiers for OCR. Once OCR is configured, existing [sensitive information types](sensitive-information-type-learn-about.md#learn-about-sensitive-information-types), [exact data match based sensitive information types](sit-learn-about-exact-data-match-based-sits.md#learn-about-exact-data-match-based-sensitive-information-types), [trainable classifiers](classifier-learn-about.md#learn-about-trainable-classifiers), and [fingerprint SITs](document-fingerprinting.md#document-fingerprinting) scan images as well as documents and emails.
OCR scanning supports more than [150 languages](https://azure.microsoft.com/cogn
- [Learn about data loss prevention](dlp-learn-about-dlp.md#learn-about-data-loss-prevention) - [Learn about insider risk management](insider-risk-management.md#learn-about-insider-risk-management)-- [Learn about records management](data-lifecycle-management.md#learn-about-data-lifecycle-management)
+- [Learn about records management](data-lifecycle-management.md#learn-about-data-lifecycle-management)
compliance Sensitivity Labels Office Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-office-apps.md
f1.keywords:
Previously updated : 05/11/2023 Last updated : 05/23/2023 audience: Admin
However, take into consideration the outcome when an email client doesn't suppor
## PDF support
-For built-in labeling, use the tables in [Minimum versions for sensitivity labels in Office apps](sensitivity-labels-versions.md). The Azure Information Protection unified labeling client doesn't support PDF in Office apps.
+For built-in labeling, use the tables in [Minimum versions for sensitivity labels in Office apps](sensitivity-labels-versions.md) to identify supported versions. The Azure Information Protection unified labeling client doesn't support PDF in Office apps.
-Word, Excel, and PowerPoint support the following methods to convert an Office document into a PDF document:
+Office for Windows: Word, Excel, and PowerPoint support the following methods to convert an Office document into a PDF document:
- File > Save As > PDF - File > Export > PDF
Word, Excel, and PowerPoint support the following methods to convert an Office d
This action is logged with the **Renamed file** audit event from the [File and page activities](audit-log-activities.md#file-and-page-activities) auditing group. In the auditing search results in the compliance portal, you'll see the details of this auditing event display **SensitivityLabeledFileRenamed** for the **Activity** field.
+Office for the web: You must download the file from the browser. The following methods are supported to convert an Office online document into a PDF document:
+
+- Word and PowerPoint on the web:
+ - Save as > Download as PDF > Download
+- Excel on the web:
+ - Export > Download as PDF > Download
+ - Print > Print > Download as PDF > Download
+ When the PDF is created, it inherits the label with any content markings and encryption. Encrypted PDFs can be opened with Microsoft Edge on Windows or Mac. For more information, and alternative readers, see [Which PDF readers are supported for protected PDFs?](/azure/information-protection/rms-client/protected-pdf-readers#viewing-protected-pdfs-in-microsoft-edge-on-windows-or-mac) Outlook doesn't currently support PDF attachments inheriting encryption from a labeled message. However, Outlook does support warning or blocking users from printing to PDF, as described next.
compliance Sensitivity Labels Versions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-versions.md
The numbers listed are the minimum Office application versions required for each
|[Apply a sensitivity label to files automatically](apply-sensitivity-label-automatically.md) <br /> - Using sensitive info types |Current Channel: 2009+ <br /><br> Monthly Enterprise Channel: 2009+ <br /><br> Semi-Annual Enterprise Channel: 2102+ |16.44+ |Under review | Under review |[Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) | |[Apply a sensitivity label to files automatically](apply-sensitivity-label-automatically.md) <br /> - Using trainable classifiers |Current Channel: 2105+ <br /><br> Monthly Enterprise Channel: 2105+ <br /><br> Semi-Annual Enterprise Channel: 2108+ |16.49+ |Under review |Under review |Under review | |[Support co-authoring and AutoSave](sensitivity-labels-coauthoring.md) for labeled and encrypted documents |Current Channel: 2107+ <br /><br> Monthly Enterprise Channel: 2107+ <br /><br> Semi-Annual Enterprise Channel: 2202+ |16.51+ |2.58+ |16.0.14931+ |[Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) |
-|[PDF support](sensitivity-labels-office-apps.md#pdf-support)|Current Channel: 2208+ <br /><br> Monthly Enterprise Channel: 2209+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review |
+|[PDF support](sensitivity-labels-office-apps.md#pdf-support)|Current Channel: 2208+ <br /><br> Monthly Enterprise Channel: 2209+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |[Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) |
|[Sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) and [display label color](sensitivity-labels-office-apps.md#label-colors) |Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review | |[Default sublabel for parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label)|Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review | |[Scope labels to files or emails](sensitivity-labels-office-apps.md#scope-labels-to-just-files-or-emails) |Current Channel: 2301+ <br /><br> Monthly Enterprise Channel: Under review <br /><br> Semi-Annual Enterprise Channel: Under review |16.69+ |Preview: Rolling out to [Beta Channel](https://insider.office.com/join/ios) |Preview: Rolling out to [Beta Channel](https://insider.office.com/join/android)| [Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) |
compliance Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/whats-new.md
f1.keywords:
Previously updated : 05/12/2023 Last updated : 05/23/2023 audience: Admin
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
## May 2023
+### Compliance Manager
+
+- **General availability (GA)**: New multicloud support for Compliance Manager.
+ - **New article**: [Multicloud support in Compliance Manager](compliance-manager-multicloud.md) explains the new integration with Microsoft Defender for Cloud so you can assess your compliance posture across Microsoft 365, Microsoft Azure, Google Cloud Platform (GCP), and Amazon Web Services (AWS) with resource-level testing and cloud-specific guidance.
+ - **New article**: [Configure cloud settings for use with Compliance Manager](compliance-manager-cloud-settings.md) details the setup process to receive multicloud support in Compliance Manager.
+ - **New article**: [Compliance Manager glossary of terms](compliance-manager-glossary.md) explains new and existing terms and concepts.
+- **General availability (GA)**: New configuration connectors for building assessments that cover non-Microsoft services.
+ - **New article**: [Working with connectors in Compliance Manager](compliance-manager-connectors.md) details how to set up and use connectors for building assessments for non-Microsoft services.
+ - **New article**: [Salesforce setup for Compliance Manager connector](compliance-manager-connectors-salesforce.md) explains the seupt process for using the Salesforce connector.
+ - **New article**: [Zoom setup for Compliance Manager](compliance-manager-connectors-zoom.md) explains the setup process fo using the Zoom connector.
+ - Update to [Build and manage assessments](compliance-manager-assessments.md) about incorporating connectors for non-Microsoft services.
+- **Assigning user roles per regulatory template**: New capability allowing you to provide scoped access to any assessment built for a specific regulation. Updated pages include:
+ - [Learn about regulations](compliance-manager-templates.md#grant-user-access-to-regulations)
+ - [Get started](compliance-manager-setup.md#role-based-access-to-assessments-and-regulations)
+ - [Build and manage assessments](compliance-manager-assessments.md#grant-user-access-to-individual-assessments)
+ ### Data lifecycle management and records management - **General availability (GA)**: [Simulation mode](apply-retention-labels-automatically.md#learn-about-simulation-mode) for auto-apply retention label policies is now generally available.
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
- **In preview**: [Fine-tune policy indicator thresholds with real-time analytics](insider-risk-management-settings-policy-indicators.md) to reduce alert noise. - **In preview**: New [Ignore email signature attachments setting](insider-risk-management-settings-intelligent-detections.md) reduces alert noise. - Updates for [forensic evidence billing](insider-risk-management-forensic-evidence-manage.md#capacity-and-billing).-- Updates for forensic evidence policy enforcement SLA: [Get started with insider risk management forensic evidence](insider-risk-management-forensic-evidence-configure.md#next-steps).
+- Updates for forensic evidence policy enforcement SLA: [Get started with insider risk management forensic evidence](insider-risk-management-forensic-evidence-configure.md#next-steps).
+
+### Microsoft Priva
+
+- Updates to [Get started with Priva](/privacy/priva/priva-setup#when-insights-start-to-populate): insights for the data minimization policy begin surfacing within three days after starting Priva for data that hasn't been modified within the last 30 days.
+- Updates to [Find and visualize personal data in Priva](/privacy/priva/priva-data-profile#privacy-regulations) for the privacy regulations card, which pulls in insights from Compliance Manager.
+
+### Sensitivity labels
+
+- **Rolling out**: [PDF support for Office on the web](sensitivity-labels-office-apps.md#pdf-support) so that when Word, Excel, and PowerPoint converts a labeled Office document into a PDF document, the label with any content markings and encryption persists.
## April 2023
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
- New conditions for [Regulatory compliance policy template](communication-compliance-policies.md#policy-templates). - **New video**: Learn how to [detect communication risks in Microsoft Teams with communication compliance](communication-compliance-channels.md#microsoft-teams).
+### Compliance Manager
+
+- Updated [regulatory templates list](compliance-manager-templates-list.md) with templates Turkey - Information and Communication Security Guide and SA - Saudi Arabia Monetary Authority (SAMA) & National Cybersecurity Authority (NCA).
### Data lifecycle management and records management - **In preview**: Scan for sensitive information in images with support for [optical character recognition](ocr-learn-about.md) when you use auto-apply retention label policies. - **In preview**: Auto-labeling retention policies for [cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments) that were already in preview now include attachments and links shared in Yammer.-- **In preview**: Support for Azure Active Directory administrative unitsΓÇöfor both [data lifecycle managment](get-started-with-data-lifecycle-management.md#support-for-administrative-units) and [records management](get-started-with-records-management.md#support-for-administrative-units)ΓÇöis starting to roll out.
+- **In preview**: Support for Azure Active Directory administrative unitsΓÇöfor both [data lifecycle management](get-started-with-data-lifecycle-management.md#support-for-administrative-units) and [records management](get-started-with-records-management.md#support-for-administrative-units)ΓÇöis starting to roll out.
- **In preview**: You can now optionally configure [auto-approval](disposition.md#auto-approval-for-disposition) when you configure a retention label for disposition review. ### Data loss prevention
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
- **In preview**: Scan for sensitive information in images with support for [optical character recognition](ocr-learn-about.md).
+### Microsoft Priva
+
+- **General availability (GA)**: [Recommended policy alert thresholds for more relevant and actionable alerts](/privacy/priva/risk-management-policies#set-alerts)
+- **General availability (GA)**: [Flexible boundary options when setting conditions for data transfer policies](/privacy/priva/risk-management-policy-data-transfer#custom-setup-guided-policy-creation-process)
### Sensitivity labels
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
### Compliance Manager -- New [role-based access to assessments](compliance-manager-setup.md#role-based-access-to-assessments) allows you to [assign users roles for viewing and managing individual assessments](compliance-manager-assessments.md#grant-user-access-to-individual-assessments).
+- New [role-based access to assessments](compliance-manager-setup.md#role-based-access-to-assessments-and-regulations) allows you to assign users roles for viewing and managing individual assessments.
- [Working with improvement actions](compliance-manager-improvement-actions.md#assign-improvement-action-to-assessor-for-completion) - clarified that users need a **Compliance Manager Assessor** role in order to edit improvement action testing notes, and that roles can now be assigned for individual assessments. ### eDiscovery
enterprise Office 365 Network Mac Perf Nppdata https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-nppdata.md
+
+ Title: "Microsoft 365 network provider assessments (PREVIEW)"
+++ Last updated : 05/22/2023
+audience: Admin
++
+ms.localizationpriority: medium
+search.appverid:
+- MET150
+
+- scotvorg
+- Ent_O365
+- Strat_O365_Enterprise
+description: "Microsoft 365 network provider assessments"
+++
+# Microsoft 365 network provider assessments (PREVIEW)
+
+Microsoft measures network performance and availability between client applications on user machines and Microsoft's network.
+
+## Network performance
+
+Read about the network performance assessment calculation method at [Microsoft 365 network assessment](office-365-network-mac-perf-score.md)
+
+## Network availability
+
+Network availability is measured from the client and is defined using this formula.
++
+We receive notification of unsuccessful connections after network connectivity is restored.
+
+## Detecting network providers
+
+Network providers are detected from network attributes in Office 365 network telemetry. Network attributes that may be used for detection include:
+
+* Public IP Address ownership
+* Public ASN ownership
+* VPN network interface details
+* SSL Certificate ownership
+
+Specific network attributes for a network provider solution are either obtained from public sources, from Microsoft network telemetry, or contributed to Microsoft by the network provider.
+
+When a network provider solution is detected on network telemetry the Office 365 measured performance and availability from that connection is attributed to the network provider and aggregated. This isn't intended to represent the network provider but rather represents Office 365 performance and availability experienced by users as attributed to detected network providers.
+
+## Calculation of standard error of sampling
+
+What if you don't see the exact same measurement as our aggregation? Our aggregation of network telemetry is sample based and this sample represents the complete possible population of network connections that may be made. We calculate the standard error of sampling and present it along with results. If this error is greater than 20% or there are fewer than 24 samples, then we don't show the result, but instead show an error marker in the data field.
+
+The formula used for the standard error is:
++
+Where:
+
+* z is the statistical coefficient and for 95% confidence interval the value is 1.96
+* c is the error coefficient for the percentile and for the 50th percentile it's 1.09
+* σ is the standard deviation of the aggregation
+* n is the number of samples
+
+## Data aggregation slicing
+
+For customer specific reporting the aggregations are sliced by the customer and by detected network provider and by work location type. They're also sliced by office location for drill-down capability. For the NPI Chart views including Target Baseline metrics are aggregations sliced by network provider and by country and state. The NPI Chart data is aggregated from all Office 365 customers.
+
+For network providers the aggregations are sliced by network provider, by geography (including country, state, and city), and by /24 public network.
+
+## Data aggregation statistical evaluations
+
+There are some markers we show where data can't be reported.
+
+* **Statistical significance** ΓÇô As described above we don't show data where the standard error of sampling is greater than 20%.
+* **No data** ΓÇô This is displayed if for some reason this data element had no samples.
+* **Privacy requirement** ΓÇô This is displayed for the network provider view if there were fewer than five customers in any aggregation result or if there were fewer than 24 samples in the aggregation. We don't provide customer performance data directly to network providers for customer privacy reasons.
+* **Dominating customer** ΓÇô Even where there are five or more customers, there may be cases where a customer can be guessed due to the specific network provider having a large customer in a geographic area. To avoid this, we compare the population including the largest customer with the same population excluding the largest customer. Using a Cohen's D calculation, we discard results where the population difference is greater than 0.5. This means that where the largest customer has a medium to large Cohen's D effect on the aggregation result the result is blocked. A network provider simply needs to expand their geographic area where they have more customers to see results.
+
+The markers **Privacy requirement** and **Dominating customer** aren't shown in customer reports.
+In addition, we remove outliers from the sample source where outliers are defined as:
++
+Network providers will additionally not be shown in a tenant or location view if that network provider accounts for fewer than 0.01% of users represented in that view.
+
+## Network Provider Index Chart
+
+The Network Provider Index Chart (NPI Chart) shows aggregated performance and availability for network providers for a given State (or Province) and Country. The chart shows the largest network providers in that geography ordered by network performance. The chart also includes a Target Baseline entry, which shows average performance and availability for the best performing five network providers in the geography, excluding network providers with insignificant Office 365 usage.
+
+## Related topics
+
+[Network connectivity in the Microsoft 365 Admin Center](office-365-network-mac-perf-overview.md)
+
+[Network provider reporting](office-365-network-mac-perf-nppux.md)
+
+[Microsoft 365 network assessment](office-365-network-mac-perf-score.md)
+
+[Microsoft 365 network connectivity test tool](office-365-network-mac-perf-onboarding-tool.md)
+
+[Microsoft 365 Network Connectivity Location Services](office-365-network-mac-location-services.md)
enterprise Office 365 Network Mac Perf Nppux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-nppux.md
+
+ Title: "Network provider connectivity attribution in the Microsoft 365 Admin Center (PREVIEW)"
+++ Last updated : 05/22/2023
+audience: Admin
++
+ms.localizationpriority: medium
+search.appverid:
+- MET150
+
+- scotvorg
+- Ent_O365
+- Strat_O365_Enterprise
+description: "Network provider connectivity attribution in the Microsoft 365 Admin Center"
+++
+# Network provider connectivity attribution in the Microsoft 365 Admin Center (PREVIEW)
+
+## The network provider table
+
+In the Microsoft 365 Admin Center you can view network providers in use by your users and we apportion network connectivity performance and availability experienced by your users to each. To access these reports in the Microsoft 365 Admin Center, select the **Health | Network connectivity** menu.
++
+When you navigate to the Network traffic tab you will see information about connectivity solutions from network providers that have been detected between Office 365 users and Microsoft's network.
+
+Network providers are identified as either of the following:
+
+* **ISP** ΓÇô Internet Service Provider that provides data transmission media such as terrestrial ISP, cellular ISP, or satellite ISP
+* **Overlay** ΓÇô An additional detected network provider providing other services such as VPN, Cloud Proxy, SD-WAN, and SASE
+* **Corporate** ΓÇô The customer owns detection attributes for network providers
+
+The top five network providers by network requests from your users are shown on the left. On the right is a historical chart showing the performance assessment of each of the top five network providers over time. You can adjust the time range back as far as two years though the default is one month.
+
+In the lower part of the page shows a table of all significant detected network providers. It can show these attributes for each network provider:
+
+* **Network provider name** ΓÇô The network provider name from public contributions
+* **Solution name** ΓÇô Listed if a network provider has multiple network solutions which are measured separately
+* **Percent of requests** ΓÇô The percentage of requests for the specific provider for all your users
+* **Performance** ΓÇô The network assessment performance out of 100 attributed to this network provider
+* **Work type** ΓÇô Shows either remote, onsite, or remote and onsite
+* **Type** ΓÇô Shows either ISP, Overlay, or Corporate
+* **Exchange Performance** ΓÇô Exchange network assessment out of 100
+* **SharePoint Performance** ΓÇô SharePoint network assessment out of 100
+* **Teams Performance** ΓÇô Teams network assessment out of 100
+* **SharePoint Throughput** ΓÇô SharePoint throughput aggregate with error margin in Megabytes per second
+* **Exchange Latency** ΓÇô Exchange TCP latency aggregate with error margin in milliseconds
+* **Teams packet loss** ΓÇô Teams UDP Packet loss in percent aggregate with error margin
+* **Teams jitter** ΓÇô Teams UDP Jitter with error margin in milliseconds
+* **Teams latency** ΓÇô Teams UDL latency with error margin in milliseconds
+* **Availability** ΓÇô The network availability as a percentage attributed to this network provider
+* **Exchange Availability** ΓÇô Exchange specific availability
+* **SharePoint Availability** ΓÇô SharePoint specific availability
+* **Teams Availability** ΓÇô Teams specific availability
+
+You can filter the table of network providers by connections from onsite corporate office locations or remote worker locations such as homes, cafés, hotels.
+
+If you click the network provider name a flyout will appear showing details about that network provider.
+
+The flyout shows more information about a particular network provider. If this network provider is in the Microsoft 365 network partner program, then a **Setup info** section will be shown with a link to configuration instructions that the network provider shares for optimal connectivity to Microsoft 365.
+
+The flyout also has a Location section which contains a link to open the **Network connectivity | Location** table filtered for this network provider.
+If the network provider selected has an identified network insight causing poor Microsoft 365 user experience, then the flyout text will provide recommendations for improvement.
+
+## Network providers by location
+
+The table of locations can be filtered by specific network providers. The table will be filtered to only show locations where the specified network provider is detected. If multiple network providers are selected in the filter, then locations where any of them were detected are shown.
++
+A network providers column is included in the table where network providers are shown as fit. The network providers are all shown in the details tab.
+
+## Network Provider Index Chart for the location
+
+The Network Provider Index Chart (NPI Chart) shows in an office location summary and lists large network providers that are being used by Office 365 customers in the same country and state as your office. We include availability and performance information attributed to these providers. This chart also shows a target baseline that shows what good performance observed in the same country and state looks like.
++
+Below the NPI Chart is a list of network providers detected for your users at this specific office location. The Table of network providers for this location has the following fields:
+
+* Network provider name
+* Solution name
+* Percent of requests
+* Availability
+* Performance
+
+## Related topics
+
+[Network connectivity in the Microsoft 365 admin center](office-365-network-mac-perf-overview.md)
+
+[Network provider program data calculations](office-365-network-mac-perf-nppdata.md)
+
+[Microsoft 365 network assessment](office-365-network-mac-perf-score.md)
+
+[Microsoft 365 network connectivity test tool](office-365-network-mac-perf-onboarding-tool.md)
security Admin Submissions Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/admin-submissions-mde.md
In Microsoft Defender for Endpoint, admins can use the unified submissions featu
## What do you need to know before you begin? -- The new unified submissions experience is available only in subscriptions that include Microsoft 365 Defender, Microsoft Defender for Endpoint Plan 2, or Microsoft Defender for Office Plan 2.
+- The new unified submissions experience is available only in subscriptions that include Microsoft 365 Defender or Microsoft Defender for Endpoint Plan 2.
- To submit files to Microsoft, you need to be a member of one of the following role groups:
security Enable Attack Surface Reduction https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction.md
Enterprise-level management such as Intune or Microsoft Configuration Manager is
## Exclude files and folders from ASR rules
-You can exclude files and folders from being evaluated by most attack surface reduction rules. This means that even if an ASR rule determines the file or folder contains malicious behavior, it doesn't block the file from running. This could potentially allow unsafe files to run and infect your devices.
-
-You can also exclude ASR rules from triggering based on certificate and file hashes by allowing specified Defender for Endpoint file and certificate indicators. (See [Manage indicators](manage-indicators.md).)
+You can exclude files and folders from being evaluated by most attack surface reduction rules. This means that even if an ASR rule determines the file or folder contains malicious behavior, it doesn't block the file from running.
> [!IMPORTANT] > Excluding files or folders can severely reduce the protection provided by ASR rules. Excluded files will be allowed to run, and no report or event will be recorded. > If ASR rules are detecting files that you believe shouldn't be detected, you should [use audit mode first to test the rule](attack-surface-reduction-rules-deployment-test.md#step-1-test-asr-rules-using-audit).
-You can specify individual files or folders (using folder paths or the full path of the file to be excluded). An exclusion is applied only when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service continues to trigger events until the service is stopped and restarted.
+An exclusion is applied only when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service continues to trigger events until the service is stopped and restarted.
-For information about per-rule exclusions, see the section titled **Configure ASR rules per-rule exclusions** in the article [Test attack surface reduction (ASR) rules](attack-surface-reduction-rules-deployment-test.md)
+When adding exclusions, keep in mind:
-ASR rules support environment variables and wildcards. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](configure-extension-file-exclusions-microsoft-defender-antivirus.md#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists).
+ * Exclusions are typically based on individual files or folders (using folder paths or the full path of the file to be excluded).
+ * Exclusion paths can use environment variables and wildcards. See [Use wildcards in the file name and folder path or extension exclusion lists](configure-extension-file-exclusions-microsoft-defender-antivirus.md#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists)
+ * When deployed through Group Policy or PowerShell, exclusions apply to all ASR rules. Using Intune, it is possible to configure an exclusion for a specific ASR rule. See [Configure ASR rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-asr-rules-per-rule-exclusions)
+ * Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Manage indicators](manage-indicators.md).
## Policy Conflict
security Mac Preferences https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-preferences.md
Specifies the value of tag
> - Only one value per tag type can be set. > - Type of tags are unique, and should not be repeated in the same configuration profile.
+### Tamper Protection
+
+Manage the preferences of the Tamper Protection component of Microsoft Defender for Endpoint on macOS.
+
+****
+
+|Section|Value|
+|||
+|**Domain**|`com.microsoft.wdav`|
+|**Key**|tamperProtection|
+|**Data type**|Dictionary (nested preference)|
+|**Comments**|See the following sections for a description of the dictionary contents.|
+|||
+
+#### Enforcement level
+
+If Tamper Protection is enabled and if it is in the strict mode
+
+****
+
+|Section|Value|
+|||
+|**Domain**|`com.microsoft.wdav`|
+|**Key**|enforcementLevel|
+|**Data type**|String|
+|**Comments**|One of 'disabled', 'audit', or 'block'|
+|||
+
+Possible values:
+
+- disabled - Tamper Protection is turned off, no prevention of attacks or reporting to the Cloud
+- audit - Tamper Protection reports tampering attempts to the Cloud only, but does not block them
+- block - Tamper Protection both blocks and reports attacks to the Cloud
+
+#### Exclusions
+
+Defines processes that are allowed altering Microsoft Defender's asset, without being considering tampering.
+Either path, or teamId, or signingId, or their combination must be provided.
+Args can be provided additionally, to specify allowed process more precisely.
+
+****
+
+|Section|Value|
+|||
+|**Domain**|`com.microsoft.wdav`|
+|**Key**|exclusions|
+|**Data type**|Dictionary (nested preference)|
+|**Comments**|See the following sections for a description of the dictionary contents.|
+|||
+
+##### Path
+
+Exact path of the process executable.
+
+****
+
+|Section|Value|
+|||
+|**Domain**|`com.microsoft.wdav`|
+|**Key**|path|
+|**Data type**|String|
+|**Comments**| In case of a shell script it will be the exact path to the interpreter binary, e.g. `/bin/zsh`. No wildcards allowed. |
+|||
+
+##### Team Id
+
+Apple's "Team Id" of the vendor.
+
+****
+
+|Section|Value|
+|||
+|**Domain**|`com.microsoft.wdav`|
+|**Key**|teamId|
+|**Data type**|String|
+|**Comments**| For example, `UBF8T346G9` for Microsoft |
+|||
+
+##### Signing Id
+
+Apple's "Signing Id" of the package.
+
+****
+
+|Section|Value|
+|||
+|**Domain**|`com.microsoft.wdav`|
+|**Key**|signingId|
+|**Data type**|String|
+|**Comments**| For example, `com.apple.ruby` for Ruby interpreter |
+|||
+
+##### Process arguments
+
+Used in combination with other parameters to identify the process.
+
+****
+
+|Section|Value|
+|||
+|**Domain**|`com.microsoft.wdav`|
+|**Key**|signingId|
+|**Data type**|Array of strings|
+|**Comments**| If specified, process argument must match those arguments exactly, case-sensitive |
+|||
+ ## Recommended configuration profile To get started, we recommend the following configuration for your enterprise to take advantage of all protection features that Microsoft Defender for Endpoint provides.
The following configuration profile (or, in case of JAMF, a property list that c
<key>automaticDefinitionUpdateEnabled</key> <true/> </dict>
+ <key>tamperProtection</key>
+ <dict>
+ <key>enforcementLevel</key>
+ <string>block</key>
+ </dict>
</dict> </plist> ```
The following configuration profile (or, in case of JAMF, a property list that c
<key>automaticDefinitionUpdateEnabled</key> <true/> </dict>
+ <key>tamperProtection</key>
+ <dict>
+ <key>enforcementLevel</key>
+ <string>block</key>
+ </dict>
</dict> </array> </dict>
The following templates contain entries for all settings described in this docum
</dict> </array> </dict>
+ <key>tamperProtection</key>
+ <dict>
+ <key>enforcementLevel</key>
+ <string>block</key>
+ </dict>
<key>userInterface</key> <dict> <key>hideStatusMenuIcon</key>
The following templates contain entries for all settings described in this docum
</dict> </array> </dict>
+ <key>tamperProtection</key>
+ <dict>
+ <key>enforcementLevel</key>
+ <string>block</key>
+ </dict>
<key>userInterface</key> <dict> <key>hideStatusMenuIcon</key>
security Mac Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-whatsnew.md
Apple has fixed an issue on macOS [Ventura upgrade](<https://developer.apple.com
Microsoft Defender for Endpoint no longer supports macOS Catalina (10.15) as Apple ended support for Catalina (10.15) in December 2022. </br>
+### May-2023 (Build: 101.98.71 | Release version: 20.123032.19871.0)
+
+| Build: | **101.98.71** |
+|--|--|
+| Release version: | **20.123032.19871.0** |
+| Engine version: | **1.1.20300.4** |
+| Signature version: | **1.389.1872.0** |
+
+##### What's new
+
+- Tamper Protection health command `mdatp health --details tamper_protection`
+- Tamper Protection - [MDM processes exclusions](tamperprotection-macos.md#exclusions)
+- Fix: Remove Codesigned Artifact from App Bundle
+- Bug and performance fixes
+ ### May-2023 (Build: 101.98.70 | Release version: 20.123022.19870.0) | Build: | **101.98.70** |
security Microsoft Defender Endpoint Antivirus Performance Mode https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-antivirus-performance-mode.md
+
+ Title: Protect Dev Drive using performance mode
+description: Learn how to manage, configure, Microsoft Defender Antivirus performance mode for developers who use Dev Drive.
+keywords: performance mode, Dev Drive, Real-time protection (Real-time protection), Windows Security App, Microsoft Defender Antivirus, windows Defender, Resilient File System (ReFS), virus, malware, threat, detection, protection, security
+
+ms.mktglfcycl: manage
+ms.sitesec: library
+ms.pagetype: security
+ms.localizationpriority: high
++++++++
+- m365-security
+- tier2
+search.appverid: met150
Last updated : 05/04/2023++
+# Protecting Dev Drive using performance mode
+
+> [!IMPORTANT]
+> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+
+> [!NOTE]
+> Want to experience Microsoft 365 Defender? Learn more about how you can [evaluate and pilot Microsoft 365 Defender](/microsoft-365/security/defender/eval-overview?ocid=cx-docs-MTPtriallab).
+
+**Applies to:**
+
+- Microsoft Defender for Endpoint Plans 1 and 2
+- Microsoft Defender for Business
+- Microsoft Defender Antivirus
+
+**Platforms**
+
+- Windows 11
+
+## What is performance mode
+
+Performance mode is now available on Windows 11 as a new Microsoft Defender Antivirus capability. Performance mode reduces the performance impact of Microsoft Defender Antivirus scans for files stored on designated _Dev Drive_. The goal of performance mode is to improve functional performance for developers who use Windows 11 devices.
+
+ItΓÇÖs important to note that performance mode can run only on Dev Drive. Additionally, Real-time protection (ΓÇ£OnΓÇ¥) is required for performance mode to function. Enabling this feature on a Dev Drive doesnΓÇÖt change standard Real-time protection running on volumes having operating systems or other volumes formatted FAT32 or NTFS.
+
+### Dev Drive
+
+Dev Drive is a new form of storage volume available to improve performance for key developer workloads.
+
+Dev Drive builds on ReFS technology to employ targeted file system optimizations and provide more control over storage volume settings and security, including trust designation, antivirus configuration, and administrative control over which filters are attached.
+
+For more information about Dev Drive, see: [Set up a Dev Drive on Windows 11](/windows/dev-drive).
+
+### Performance mode compared to real-time protection
+
+By default, to give the best possible performance, creating a Dev Drive automatically grants trust in the new volume. A _trusted_ Dev Drive volume causes real-time protection to run in a special _asynchronous_ ΓÇ£performance modeΓÇ¥ for that volume. Running performance mode provides a balance between threat protection and performance. The balance is achieved by deferring security scans until after the _open file_ operation has completed, instead of performing the security scan synchronously while the file operation is being processed. This mode of performing security scans inherently provides faster performance, but with less protection. However, enabling performance mode provides significantly better protection than other _performance tuning_ methods such as using folder exclusions, which block security scans altogether.
+
+> [!NOTE]
+> To enable performance mode, Real-time protection must be "On".
+
+The following table summarizes performance mode synchronous and asynchronous scan behavior.
+
+| Performance mode state | Scan type | Description | Summary |
+|:|:|:|:|
+|Not enabled (Off) | **Synchronous** <br> (Real-time protection) | Opening a file initiates a Real-time protection scan. | Open now, scan now. |
+|Enabled (On) | **Asynchronous** | File open operations are scanned asynchronously. | Open now, scan later. |
+
+An _untrusted_ Dev Drive doesn't have the same benefits as a _trusted_ Dev Drive. Security runs in synchronous, Real-time protection mode when a Dev Drive is _untrusted_. Real-time protection scans may impact performance.
+
+## Microsoft Defender Antivirus requirements for performance mode
+
+- Antimalware platform version of 4.18.2303.8 (or higher)
+- Antimalware signature version of 1.385.1455.0 (or higher)
+- Real-time protection must be turned on
+
+For requirements specific to Dev Drive, see [Set up a Dev Drive on Windows 11](/windows/dev-drive).
+
+## Manage performance mode
+
+Performance mode is enabled by default when a new Dev Drive is created. To control of the balance between performance and security when protecting a Dev Drive, administrators can choose between these options:
+
+- Real-time protection
+- Performance mode (default)
+- No antivirus filter attached to Dev Drive. In this scenario, Dev Drive isn't protected by Real-time protection or performance mode.
+
+A Dev Drive is automatically designated as trusted, providing the best possible performance by default. A trusted Dev Drive means that the developer using the volume has high confidence in the security of the content stored there.
+
+Similar to when an administrator chooses to add an exclusion to a Microsoft Defender Antivirus configuration, it's the administrator's responsibility to assess the performance benefits and security risks when using performance mode. As mentioned, security runs in Real-time protection mode when a Dev Drive is untrusted.
+
+> [!NOTE]
+> Performance mode can only run on a ΓÇ£trustedΓÇ¥ Dev Drive.
+
+For more information on trusted Dev Drive and to confirm whether a designated Dev Drive is trusted, see: [Set up a Dev Drive on Windows 11](/windows/dev-drive).
+
+## See also
+
+[Set up a Dev Drive on Windows 11](/windows/dev-drive)
security Professional Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/professional-services.md
Managed security services that assist organizations to detect threats early and
|Service name|Vendor|Description| ||||
-|[Microsoft Defender Experts](https://go.microsoft.com/fwlink/?linkid=2203232)|Microsoft|Defender Experts for Hunting is a proactive threat hunting service for Microsoft 365 Defender.|
+|[Microsoft Defender Experts](https://go.microsoft.com/fwlink/?linkid=2203232)|Microsoft|Defender Experts for Hunting are a proactive threat hunting service for Microsoft 365 Defender.|
|[Cloud Security Operations Center](https://go.microsoft.com/fwlink/?linkid=2202671)|glueckkanja-gab AG|Monitors your Microsoft Security Solutions 24/7, responds to threats on your behalf and works closely with your IT to continuously improve your security posture.| |[Wortell Protect](https://go.microsoft.com/fwlink/?linkid=2202480)|Wortell|Wortell offers a 24.7.365 Managed Detection and Response service, SOC-as-a-service, to secure your Azure subscriptions and Microsoft 365 environment. With this managed service, Wortell will provide security monitoring and incident response, and operate Microsoft Defender and (optionally) Microsoft Sentinel on your behalf. The service also includes threat intelligence feeds and custom machine learning models| |[CRITICALSTART® Managed Detection & Response Services for Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2202761)|CRITICALSTART|Critical Start Managed Detection and Response (MDR) services for Microsoft 365 Defender (M365D) extends security defenses to provide cross-domain threat protection and simplify breach prevention. Their team of Microsoft security experts leverages integration with M365D to detect, investigate and respond with the right actions to alerts from identity, to email and cloud – before they disrupt business operations.|
Managed security services that assist organizations to detect threats early and
|[Managed Microsoft XDR](https://go.microsoft.com/fwlink/?linkid=2202846)|Quorum Cyber|Quorum Cyber's Managed Microsoft XDR, a solution designed to enable customers to unleash the power of Microsoft security to reduce cyber risk and maximize return of investment in security.| |[SecureShield365](https://go.microsoft.com/fwlink/?linkid=2209718)|Patriot Consulting|SecureShield365 includes a full deployment of all Microsoft 365 Defender products including Intune plus 12 months of support. Microsoft XDR including Sentinel, Defender for Cloud, and MDR are available options.| |[Open Systems MDR+](https://go.microsoft.com/fwlink/?linkid=2208895)|Open Systems|Built for Microsoft security customers, MDR+ combines certified experts, exemplary processes, and seamless technology to deliver tailored, 24x7 protection while reducing attack surfaces and MTTR.|
+|[Kroll](https://www.kroll.com/en)|Kroll|Kroll provides proprietary data, technology and insights to help our clients stay ahead of complex demands related to risk, governance and growth. Our solutions deliver a powerful competitive advantage, enabling faster, smarter and more sustainable decisions. With 5,000 experts around the world, we create value and impact for our clients and communities.|
## Respond
Respond to security incidents quickly, effectively and at scale with complete in
|[SecureShield365](https://go.microsoft.com/fwlink/?linkid=2209718)|Patriot Consulting|SecureShield365 includes a full deployment of all Microsoft 365 Defender products including Intune plus 12 months of support. Microsoft XDR including Sentinel, Defender for Cloud, and MDR are available options.| |[Open Systems MDR+](https://go.microsoft.com/fwlink/?linkid=2208895)|Open Systems|Built for Microsoft security customers, MDR+ combines certified experts, exemplary processes, and seamless technology to deliver tailored, 24x7 protection while reducing attack surfaces and MTTR.| + ## Protect Protect your organization proactively by evaluating your organization's ability to effectively prevent, detect, and respond to cyber threats before they disrupt your business.
security Tamperprotection Macos https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/tamperprotection-macos.md
Last updated 03/24/2023
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-rbac-abovefoldlink) -- Tamper protection in macOS helps prevent unwanted changes to security settings from being made by unauthorized users. Tamper protection helps prevent unauthorized removal of Microsoft Defender for Endpoint on macOS. This capability also helps important security files, processes, and configuration settings from being tampered. > [!IMPORTANT]
-> Between March and May of 2023, Microsoft Defender for Endpoint on macOS will start respecting the selection for tamper protection applied via the global tamper protection switch under advanced settings in the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). You can choose to enforce (block/audit/disable) your own macOS tamper protection settings by using a Mobile Device Management (MDM) solution such as Intune or JAMF (recommended). If the tamper protection setting was not enforced via MDM, a local administrator can continue to manually change the setting with the following command: `sudo mdatp config tamper-protection enforcement-level --value (chosen mode)`.
+> Starting March of 2023, Microsoft Defender for Endpoint on macOS will start respecting the selection for tamper protection applied via the global tamper protection switch under advanced settings in the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). You can choose to enforce (block/audit/disable) your own macOS tamper protection settings by using a Mobile Device Management (MDM) solution such as Intune or JAMF (recommended). If the tamper protection setting was not enforced via MDM, a local administrator can continue to manually change the setting with the following command: `sudo mdatp config tamper-protection enforcement-level --value (chosen mode)`.
-You can set tamper protection in the following modes:
+You can set Tamper Protection in the following modes:
|Topic|Description| ||| |Disabled|Tamper protection is completely off.|
-|Audit|Tampering operations are logged, but not blocked. This is the default mode after installation.|
+|Audit|Tampering operations are logged, but not blocked. This mode is the default after installation.|
|Block|Tamper protection is on; tampering operations are blocked.| When tamper protection is set to audit or block mode, you can expect the following outcomes:
When tamper protection is set to audit or block mode, you can expect the followi
- Renaming of Defender for Endpoint files is blocked - Commands to stop the agent fail
-Here is an example of a system message in response to a blocked action:
+Here's an example of a system message in response to a blocked action:
![Screenshot of operation blocked message.](images/operation-blocked.png) - You can configure the tamper protection mode by providing the mode name as enforcement-level. > [!NOTE]
You can configure the tamper protection mode by providing the mode name as enfor
- Use a Mobile device management (MDM) tool to configure Microsoft Defender for Endpoint. - Ensure that Defender for Endpoint has **Full Disk Access** authorization.
-> [!NOTE]
->
-> Enabling **TCC** (Transparency, Consent & Control) through an Mobile Device Management solution such as [Intune](mac-install-with-intune.md), will eliminate the risk of Defender for Endpoint losing **Full Disk Access** Authorization to function properly
-.
+ > [!NOTE]
+ > Both having SIP enabled and all configuration done via MDM is not mandatory, but required for a fully secured machine, as otherwise a local admin still can make tampering changes that macOS manages. For example, enabling **TCC** (Transparency, Consent & Control) through an Mobile Device Management solution such as [Intune](mac-install-with-intune.md), will eliminate the risk of a global admin revoking **Full Disk Access** Authorization by a local admin.
-## Configure tamper protection on macOS devices
+## Configure Tamper Protection on macOS devices
-There are several ways you can configure tamper protection:
+Microsoft Defender evaluates these settings in the following order.
+If a higher priority setting is configured, the rest are ignored:
-- [Manual configuration](#manual-configuration)-- [JAMF](#jamf)-- [Intune](#intune)
+1) Managed configuration profile (tamperProtection/enforcementLevel setting):
+ - [JAMF](#jamf)
+ - [Intune](#intune)
+2) [Manual configuration](#manual-configuration) (with `mdatp config tamper-protection enforcement-level --value { disabled|audit|block }`)
+3) If Tamper Protection flag in Security Portal is set, the "block" mode is used (in Preview, not available to all customers)
+4) If machine is licensed, then "audit" mode is used by default
+5) If machine isn't licensed, then Tamper Protection is in the "block" mode
### Before you begin
-Verify that "tamper_protection" is set to "disabled" or "audit" to observe the state change.
+Make sure that your machine is licensed and healthy (corresponding values report `true`):
```bash mdatp health
mdatp health
healthy : true health_issues : [] licensed : true
-engine_version : "1.1.19300.3"
-app_version : "101.70.19"
-org_id : "..."
-log_level : "info"
-machine_guid : "..."
-release_ring : "InsiderFast"
-product_expiration : Dec 29, 2022 at 09:48:37 PM
-cloud_enabled : true
-cloud_automatic_sample_submission_consent : "safe"
-cloud_diagnostic_enabled : false
-passive_mode_enabled : false
-real_time_protection_enabled : true
-real_time_protection_available : true
-real_time_protection_subsystem : "endpoint_security_extension"
-network_events_subsystem : "network_filter_extension"
-device_control_enforcement_level : "audit"
+...
tamper_protection : "audit"
-automatic_definition_update_enabled : true
-definitions_updated : Jul 06, 2022 at 01:57:03 PM
-definitions_updated_minutes_ago : 5
-definitions_version : "1.369.896.0"
-definitions_status : "up_to_date"
-edr_early_preview_enabled : "disabled"
-edr_device_tags : []
-edr_group_ids : ""
-edr_configuration_version : "20.199999.main.2022.07.05.02-ac10b0623fd381e28133debe14b39bb2dc5b61af"
-edr_machine_id : "..."
-conflicting_applications : []
-network_protection_status : "stopped"
-data_loss_prevention_status : "disabled"
-full_disk_access_enabled : true
```
+`tamper_protection` reports the effective enforcement level.
+ ### Manual configuration
-1. Use the following command:
+1. Use the following command to switch to the most restrictive mode:
- ```console
+```console
sudo mdatp config tamper-protection enforcement-level --value block ```
- ![Image of manual configuration command](images/manual-config-cmd.png)
+![Image of manual configuration command](images/manual-config-cmd.png)
- > [!NOTE]
- > If you use manual configuration to enable tamper protection, you can also disable tamper protection manually at any time. For example, you can revoke Full Disk Access from Defender in System Preferences manually. You must use MDM instead of manual configuration to prevent a local admin from doing that.
+> [!NOTE]
+> You must use managed configuration profile (deployed via MDM) on production machines. If a local admin changed tamper protection mode via a manual configuration, they can change it to a less restrictive mode at any time as well. If tamper protection mode was set via a managed profile, only a global admin will be able to undo it.
2. Verify the result.
-```bash
-mdatp health
-```
- ```console healthy : true health_issues : []
Configure tamper protection mode in Microsoft Defender for Endpoint [configurati
### Intune
-Follow the documented Intune profile example to configure tamper protection through Intune. For more information, see [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md).
+Follow the documented Intune profile example to configure Tamper Protection through Intune. For more information, see [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md).
Add the following configuration in your Intune profile:
The result shows "block" if tamper protection is on:
![Image of tamper protection in block mode](images/tp-block-mode.png)
+You can also run full `mdatp health` and look for the "tamper_protection" in the output.
-You can also run full `mdatp health` and look for the "tamper_protection" in the output
+For extended information on the tamper protection status, run `mdatp health --details tamper_protection`.
## Verify tamper protection preventive capabilities
Tampering alert is raised in the Microsoft 365 Defender portal
:::image type="content" source="images/tampering-sensor-portal.png" alt-text="Screenshot of tampering alert raised in the Microsoft 365 Defender portal." lightbox="images/tampering-sensor-portal.png"::: - ### Verify block mode and audit modes - Using Advanced hunting, you see tampering alerts appear
Tampering alert is raised in the Microsoft 365 Defender portal
![Screenshot of tamper protection log.](images/tamper-protection-log.png) - ### DIY scenarios - With tamper protection set to "block", attempt different methods to uninstall Defender for Endpoint. For example, drag the app tile into trash or uninstall tamper protection using the command line.
Tampering alert is raised in the Microsoft 365 Defender portal
- /Library/Managed Preferences/com.microsoft.wdav.atp.offboarding.plist - /usr/local/bin/mdatp
-## Turning off tamper protection
+## Turning off Tamper Protection
-You can turn off tamper protection using any of the following methods.
+You can turn off Tamper Protection using any of the following methods.
### Manual configuration Use the following command: ```console
-sudo mdatp config tamper-protection enforcement-level - -value disabled
+sudo mdatp config tamper-protection enforcement-level --value disabled
``` ## JAMF
-Change the `enforcementLevel` value to "disabled" in your configuration profile, and push it to the machine:
+Change the `enforcementLevel` value to "disabled" [in your configuration profile](mac-preferences.md#tamper-protection), and push it to the machine:
```console <?xml version="1.0" encoding="UTF-8"?>
Change the `enforcementLevel` value to "disabled" in your configuration profile,
</dict> </dict> </plist>- ``` ### Intune
-Add the following configuration in your Intune profile:
+Add the following configuration in your Intune [profile](mac-preferences.md#tamper-protection):
```XML <?xml version="1.0" encoding="utf-8"?>
Add the following configuration in your Intune profile:
<true/> <key>tamperProtection</key> <dict>
- <key>enforcementLevel</key>
- <string>disabled</string>
+ <key>enforcementLevel</key>
+ <string>disabled</string>
</dict> </dict> </array>
Add the following configuration in your Intune profile:
</plist> ```
+## Exclusions
+
+> [!NOTE]
+> Available in version 101.98.71 or newer.
+
+Tamper Protection prevents any macOS process from making changes to Microsoft Defender's assets or killing Microsoft Defender's processes.
+Protected assets include installation and configuration files.
+
+Internally, Microsoft Defender makes exceptions to certain macOS processes, under certain circumstances.
+As an example, macOS can upgrade Defender's package, if Tamper Protection verifies the packages authenticity.
+There are other exclusions as well.
+For example, macOS MDM process can replace Microsoft's Defender's managed configuration files.
+
+There are situations when a global administrator needs to restart Defender on all or some managed machines.
+Typically it's done by creating and running a JAMF's policy that runs a script on remote machines (or similar operations for other MDM vendors.)
+
+In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune,
+and permit tampering operations from them.
+At the same time, Tamper Protection will block the same script from restarting Microsoft Defender, if it is started from a Terminal locally.
+
+However, those policy running processes are vendor specific.
+While Microsoft Defender provides built in exclusions for JAMF and Intune, it can't provide those exclusions for all possible MDM vendors.
+Instead, a global administrator can add their own exclusions to Tamper Protection.
+Exclusions can be done only through MDM profile, not local configuration.
+
+To do that, you need to first figure out the path to the MDM helper process that runs policies. You can do it either by following the MDM vendor's documentation.
+You can also initiate tampering with a test policy, get an alert in the Security Portal, inspect the hierarchy of processes that initiated the "attack", and pick the process that looks like an MDM helper candidate.
+
+Once the process path is identified, you have few choices on how to configure an exclusion:
+
+- By the path itself. It's the simplest (you already have this path) and the least secure way to do it, in other words, not recommended.
+- By getting the signing ID from the executable, either TeamIdentifier or signing Identifier, by running `codesign -dv --verbose=4 path_to_helper` (look for Identifier and TeamIdentifier, the latter isn't available for Apple's own tools.)
+- Or by using a combination of those attributes.
+
+Example:
+
+```bash
+codesign -dv --verbose=4 /usr/bin/ruby
+```
+
+```console
+Executable=/usr/bin/ruby
+Identifier=com.apple.ruby
+Format=Mach-O universal (x86_64 arm64e)
+CodeDirectory v=20400 size=583 flags=0x0(none) hashes=13+2 location=embedded
+Platform identifier=14
+VersionPlatform=1
+VersionMin=852992
+VersionSDK=852992
+Hash type=sha256 size=32
+CandidateCDHash sha256=335c10d40db9417d80db87f658f6565018a4c3d6
+CandidateCDHashFull sha256=335c10d40db9417d80db87f658f6565018a4c3d65ea3b850fc76c59e0e137e20
+Hash choices=sha256
+CMSDigest=335c10d40db9417d80db87f658f6565018a4c3d65ea3b850fc76c59e0e137e20
+CMSDigestType=2
+Executable Segment base=0
+Executable Segment limit=16384
+Executable Segment flags=0x1
+Page size=4096
+Launch Constraints:
+ None
+CDHash=335c10d40db9417d80db87f658f6565018a4c3d6
+Signature size=4442
+Authority=Software Signing
+Authority=Apple Code Signing Certification Authority
+Authority=Apple Root CA
+Signed Time=Apr 15, 2023 at 4:45:52 AM
+Info.plist=not bound
+TeamIdentifier=not set
+Sealed Resources=none
+Internal requirements count=1 size=64
+```
+
+Configure [preferences](mac-preferences.md#exclusions), for example for JAMF:
+
+```xml
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
+<plist version="1.0">
+ <dict>
+ <key>tamperProtection</key>
+ <dict>
+ <key>enforcementLevel</key>
+ <string>block</string>
+ <key>exclusions</key>
+ <array>
+ <dict>
+ <key>path</key>
+ <string>/usr/bin/ruby</string>
+ <key>teamId</key>
+ <string/>
+ <key>signingId</key>
+ <string>com.apple.ruby</string>
+ <key>args</key>
+ <array>
+ <string>/usr/local/bin/global_mdatp_restarted.rb</string>
+ </array>
+ </dict>
+ </array>
+ </dict>
+ </dict>
+</plist>
+```
+
+Note, that excluding a scripting interpreter (like Ruby from the example above) instead of a compiled executable isn't secure, as it can run *any script*, not just the one that a global admin uses.
+
+To minimize the risk, we recommend using extra `args` to allow only specific scripts to run with scripting interpreters.
+In the example above, only `/usr/bin/ruby /usr/local/bin/global_mdatp_restarted.rb` is permitted to restart Defender.
+But, for example, `/usr/bin/ruby /Library/Application Support/Global Manager/global_mdatp_restarted.rb` or even `/usr/bin/ruby /usr/local/bin/global_mdatp_restarted.rb $USER` aren't allowed.
+
+> [!WARNING]
+> Always use the most restrictive criteria to prevent unexpected attacks!
+ ## Troubleshooting configuration issues ### Issue: Tamper protection is reported as disabled If running the command `mdatp health` reports that the tamper protection is disabled, even if you enabled it and more than an hour has passed since the onboarding, then you can check if you have the right configuration by running the following command:
-```console
-$ sudo grep -F '[{tamperProtection}]: Feature state:' /Library/Logs/Microsoft/mdatp/microsoft_defender_core.log | tail -n 1
-
+```bash
+mdatp health --details tamper_protection
+```
+```console
+tamper_protection : "audit"
+exclusions : [{"path":"/usr/bin/ruby","team_id":"","signing_id":"com.apple.ruby","args":["/usr/local/bin/global_mdatp_restarted.rb"]}] [managed]
+feature_enabled_protection : true
+feature_enabled_portal : true
+configuration_source : "local"
+configuration_local : "audit"
+configuration_portal : "block"
+configuration_default : "audit"
+configuration_is_managed : false
```
-The mode must be "block" (or "audit"). If it is not, then you haven't set the tamper protection mode either through `mdatp config` command or through Intune.
+- `tamper_protection` is the *effective* mode. If this mode is the mode you intended to use, then you're all set.
+- `configuration_source` indicates how Tamper Protection enforcement level is set. It must match how you configured tamper protection. (If you set its mode through a managed profile, and `configuration_source` shows something different, then you most probably misconfigured your profile.)
+ - `mdm` - it's configured through a managed profile. Only a global admin can change it with an update to the profile!
+ - `local` - it's configured with `mdatp config` command
+ - `portal` - default enforcement level set in Security Portal
+ - `defaults` - not configured, the default mode is used
+- If `feature_enabled_protection` is false, then Tamper Protection isn't enabled for your organization (it happens if Defender doesn't report 'licensed')
+- If `feature_enabled_portal` is false, then setting default mode via Security Portal isn't enabled for you yet.
+- `configuration_local`, `configuration_portal`, `configuration_default` tells the mode that would be used, *if the corresponding configuration channel was used*. (As an example, you can configure Tamper Protection to the "block" mode via an MDM profile, and `configuration_default` tells you `audit`. It only means that *if you remove* your profile, and the mode wasn't set with `mdatp config` or through Security Portal, then it uses the default mode, which is `audit`.)
+
+> [!NOTE]
+> You need to inspect Microsoft Defender's logs to get the same information prior to version 101.98.71. See below for an example.
+```console
+$ sudo grep -F '[{tamperProtection}]: Feature state:' /Library/Logs/Microsoft/mdatp/microsoft_defender_core.log | tail -n 1
+```
security Whats New In Microsoft Defender Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
For more information on Microsoft Defender for Endpoint on specific operating sy
- [What's new in Defender for Endpoint on iOS](ios-whatsnew.md) - [What's new in Defender for Endpoint on Linux](linux-whatsnew.md)
+## May 2023
+
+- Performance mode for Microsoft Defender Antivirus is now available for public preview. This new capability provides asynchronous scanning on a Dev Drive, and does not change the security posture of your system drive or other drives. For more information, see [Protecting Dev Drive using performance mode](microsoft-defender-endpoint-antivirus-performance-mode.md).
+ ## March 2023 - Support for [Mixed-licensing scenarios](defender-endpoint-plan-1-2.md#mixed-licensing-scenarios) is now in preview! With these capabilities, you can [Manage Microsoft Defender for Endpoint subscription settings across client devices (preview!)](defender-endpoint-subscription-settings.md).
security Microsoft Secure Score Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-whats-new.md
The more improvement actions you take, the higher your Secure Score will be. For
Microsoft Secure Score can be found at <https://security.microsoft.com/securescore> in the [Microsoft 365 Defender portal](microsoft-365-defender-portal.md).
+## May 2023
+
+A new Microsoft Exchange Online recommendation is now available as Secure Score improvement action:
+
+- Ensure mail transport rules do not allow specific domains
+
+New Microsoft SharePoint recommendations are now available as Secure Score improvement actions:
+
+- Ensure modern authentication for SharePoint applications is required
+- Ensure that external users cannot share files, folders, and sites they do not own
+
+## April 2023
+
+New recommendations are now available in Microsoft Secure Score for customers with an active Microsoft Defender for Cloud Apps license:
+
+- Ensure that only organizationally managed/approved public groups exist
+- Ensure Sign-in frequency is enabled and browser sessions are not persistent for Administrative users
+- Ensure Administrative accounts are separate, unassigned, and cloud-only
+- Ensure third party integrated applications are not allowed
+- Ensure the admin consent workflow is enabled
+- Ensure DLP policies are enabled for Microsoft Teams
+- Ensure that SPF records are published for all Exchange Domains
+- Ensure Microsoft Defender for Cloud Apps is Enabled
+- Ensure mobile device management policies are set to require advanced security configurations to protect from basic internet attacks
+- Ensure that mobile device password reuse is prohibited
+- Ensure that mobile devices are set to never expire passwords
+- Ensure that users cannot connect from devices that are jail broken or rooted
+- Ensure mobile devices are set to wipe on multiple sign-in failures to prevent brute force compromise
+- Ensure that mobile devices require a minimum password length to prevent brute force attacks
+- Ensure devices lock after a period of inactivity to prevent unauthorized access
+- Ensure that mobile device encryption is enabled to prevent unauthorized access to mobile data
+- Ensure that mobile devices require complex passwords (Type = Alphanumeric)
+- Ensure that mobile devices require complex passwords (Simple Passwords = Blocked)
+- Ensure that devices connecting have AV and a local firewall enabled
+- Ensure mobile device management policies are required for email profiles
+- Ensure mobile devices require the use of a password
+
+> [!NOTE]
+> To view the new Defender for Cloud Apps recommendations, the Office 365 connector in Microsoft Defender for Cloud Apps must be toggled on via the App connectors settings page. For more information see, [How to connect Office 365 to Defender for Cloud Apps](/defender-cloud-apps/connect-office-365#how-to-connect-office-365-to-defender-for-cloud-apps).
+ ## September 2022 New Microsoft Defender for Office 365 recommendations for anti-phishing policies are now available as Secure Score improvement actions:
New Microsoft Defender for Office 365 recommendations are now available as Secur
- Set action to take on bulk spam detection - Retain spam in quarantine for 30 days - Ensure spam safety tips are enabled
- - Ensure that no sender domains are allowed for anti-spam policies (will replace "Ensure that there are no sender domains allowed for Anti-spam policies" to extend functionality also for specific senders)
+ - Ensure that no sender domains are allowed for anti-spam policies (replaces "Ensure that there are no sender domains allowed for Anti-spam policies" to extend functionality also for specific senders)
- **Anti-spam - Outbound policy** - Set maximum number of external recipients that a user can email per hour
New Microsoft Defender for Office 365 recommendations are now available as Secur
## We want to hear from you
-If you have any issues, let us know by posting in the [Security, Privacy & Compliance](https://techcommunity.microsoft.com/t5/Security-Privacy-Compliance/bd-p/security_privacy) community. We're monitoring the community and will provide help.
+If you have any issues, let us know by posting in the [Security, Privacy & Compliance](https://techcommunity.microsoft.com/t5/Security-Privacy-Compliance/bd-p/security_privacy) community. We're monitoring the community to provide help.
## Related resources
security Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/campaigns.md
A campaign might be short-lived, or could span several days, weeks, or months wi
## Campaigns in the Microsoft 365 Defender portal
-Campaigns is available in the Microsoft 365 Defender portal at <https://security.microsoft.com> at **Email & collaboration** \> **Campaigns**, or directly at <https://security.microsoft.com/campaigns>.
+Campaigns is available in the Microsoft 365 Defender portal at <https://security.microsoft.com> at **Email & collaboration** \> **Campaigns**. Or, to go directly to the **Campaigns** page, use <https://security.microsoft.com/campaigns>.
:::image type="content" source="../../media/campaigns-overview.png" alt-text="Screenshot that shows the Campaigns in the Microsoft 365 Defender portal." lightbox="../../media/campaigns-overview.png":::
security Mdo Portal Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-portal-permissions.md
search.appverid: - MOE150 - MET150
-description: Admins can learn how to manage Microsoft Defender for Office 365 (Email & collaboration) permissions in the Microsoft 365 Defender portal for all tasks related to Defender for Office 365 security features.
+description: Admins can learn how to manage Microsoft Defender for Office 365 (Email & collaboration) permissions in the Microsoft 365 Defender portal.
- seo-marvel-apr2020 Previously updated : 5/17/2023 Last updated : 5/23/2023 # Microsoft Defender for Office 365 permissions in the Microsoft 365 Defender portal
You need to be member of the **Global Administrator** role in Azure AD or a memb
## Relationship of members, roles, and role groups
-Defender for Office 365 permissions in the Microsoft 365 Defender portal are based on the role-based access control (RBAC) permissions model. RBAC is the same permissions model that's used by most Microsoft 365 services, so if you're familiar with the permission structure in these services, granting permissions in the Microsoft 365 Defender portal will be very familiar.
+Defender for Office 365 permissions in the Microsoft 365 Defender portal are based on the role-based access control (RBAC) permissions model. RBAC is the same permissions model that's used by most Microsoft 365 services, so if you're familiar with the permission structure in these services, granting permissions in the Microsoft 365 Defender portal should be familiar.
A **role** grants the permissions to do a set of tasks.
On the **Permissions** page in the Defender portal at <https://security.microsof
- **Azure AD roles**: You can view the roles and assigned users, but you can't manage them directly in the Microsoft 365 Defender portal. Azure AD roles are central roles that assign permissions for **all** Microsoft 365 services. -- **Email & collaboration roles**: You can view and manage these role groups directly in the Microsoft 365 Defender portal. These permissions are specific to the Microsoft 365 Defender portal and the Microsoft Purview compliance portal, and don't cover all of the permissions that are needed in other Microsoft 365 workloads.
+- **Email & collaboration roles**: You can view and manage these role groups directly in the Microsoft 365 Defender portal. These permissions are specific to the Microsoft 365 Defender portal and the Microsoft Purview compliance portal. These permissions don't cover all of the permissions that you need in other Microsoft 365 workloads.
:::image type="content" source="../../media/m365-sc-permissions-and-roles-page.png" alt-text="The Permissions & roles page in the Microsoft 365 Defender portal" lightbox="../../media/m365-sc-permissions-and-roles-page.png"::: ### Azure AD roles in the Microsoft 365 Defender portal
-When you open the Microsoft 365 Defender portal at <https://security.microsoft.com> and go to **Permissions** \> **Azure AD** \> **Roles** (or directly to <https://security.microsoft.com/aadpermissions>) you see the Azure AD roles that are described in this section.
+Azure AD roles that are described in this section are available in the [Defender portal](https://security.microsoft.com) \> **Permissions** \> **Azure AD** \> **Roles** or directly at <https://security.microsoft.com/aadpermissions>.
-When you select a role, a details flyout that contains the description of the role and the user assignments appears. But to manage those assignments, you need to click **Manage members in Azure AD** in the details flyout.
+When you select a role, a details flyout opens that contains the description of the role and the user assignments. But to manage those assignments, you need to select **Manage members in Azure AD** at the bottom of the flyout.
:::image type="content" source="../../media/permissions-manage-in-azure-ad-link.png" alt-text="The link to manage permissions in Azure Active Directory" lightbox="../../media/permissions-manage-in-azure-ad-link.png":::
For more information, see [View and assign administrator roles in Azure Active D
|**Compliance data administrator**|Keep track of your organization's data across Microsoft 365, make sure it's protected, and get insights into any issues to help mitigate risks. For more information, see [Compliance Data Administrator](/azure/active-directory/roles/permissions-reference#compliance-data-administrator).| |**Compliance administrator**|Help your organization stay compliant with any regulatory requirements, manage eDiscovery cases, and maintain data governance policies across Microsoft 365 locations, identities, and apps. For more information, see [Compliance Administrator](/azure/active-directory/roles/permissions-reference#compliance-administrator).| |**Security operator**|View, investigate, and respond to active threats to your Microsoft 365 users, devices, and content. For more information, see [Security Operator](/azure/active-directory/roles/permissions-reference#security-operator).|
-|**Security reader**|View and investigate active threats to your Microsoft 365 users, devices, and content, but (unlike the Security operator) they do not have permissions to respond by taking action. For more information, see [Security Reader](/azure/active-directory/roles/permissions-reference#security-reader).|
+|**Security reader**|View and investigate active threats to your Microsoft 365 users, devices, and content, but (unlike the Security operator) they don't have permissions to respond by taking action. For more information, see [Security Reader](/azure/active-directory/roles/permissions-reference#security-reader).|
|**Security administrator**|Control your organization's overall security by managing security policies, reviewing security analytics and reports across Microsoft 365 products, and staying up-to-speed on the threat landscape. For more information, see [Security Administrator](/azure/active-directory/roles/permissions-reference#security-administrator).| |**Global reader**|The read-only version of the **Global administrator** role. View all settings and administrative information across Microsoft 365. For more information, see [Global Reader](/azure/active-directory/roles/permissions-reference#global-reader).| |**Attack simulation administrator**|Create and manage all aspects of [attack simulation](attack-simulation-training-simulations.md) creation, launch/scheduling of a simulation, and the review of simulation results. For more information, see [Attack Simulation Administrator](/azure/active-directory/roles/permissions-reference#attack-simulation-administrator).|
For more information, see [View and assign administrator roles in Azure Active D
### Email & collaboration roles in the Microsoft 365 Defender portal
-The same role groups and roles are available in the Microsoft 365 Defender portal and in the Microsoft Purview compliance portal:
+The same role groups and roles are available in the Defender portal and in the Purview compliance portal:
- [Defender portal](https://security.microsoft.com): **Permissions** \> **Email & collaboration roles** \> **Roles** or directly at <https://security.microsoft.com/emailandcollabpermissions> - [Purview compliance portal](https://compliance.microsoft.com): **Roles & Scopes** \> **Permissions** \> **Microsoft Purview solutions** \> **Roles** or directly at <https://compliance.microsoft.com/compliancecenterpermissions> For complete information about these role groups, see [Roles and role groups in the Microsoft 365 Defender and Microsoft Purview compliance portals](scc-permissions.md)
-#### Modify Email & collaboration role membership in the Microsoft 365 Defender portal
+The following actions are available for Email & collaboration role groups in the Defender portal:
+
+- [Create role groups](#create-email--collaboration-role-groups-in-the-microsoft-365-defender-portal)
+- [Copy role groups](#copy-email--collaboration-role-groups-in-the-microsoft-365-defender-portal)
+- [Modify role group membership](#modify-email--collaboration-role-group-membership-in-the-microsoft-365-defender-portal)
+- [Modify role assignments](#modify-email--collaboration-role-group-role-assignments-in-the-microsoft-365-defender-portal) (custom role groups only)
+- [Remove role groups](#remove-email--collaboration-role-groups-in-the-microsoft-365-defender-portal) (custom role groups only)
+
+#### Create Email & collaboration role groups in the Microsoft 365 Defender portal
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
+
+2. On the **Permissions** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** to start the new role group wizard.
+
+3. On the **Name your role group** page, enter the following information:
+ - **Name**: Enter a unique name for the role group.
+ - **Description**: Enter an optional description for the role group.
+
+ When you're finished on the **Name your role group** page, select **Next**.
+
+4. On the **Choose roles** page, select **Choose roles**.
+
+ 1. In the **Chose roles** flyout that opens, select **Add** at the top of the flyout.
+
+ 2. In the new **Choose roles** flyout that opens, select one or more roles. Select the **Name** column header to sort the list by name, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role.
+
+ After you've selected one or more roles to add, select **Add** at the bottom of the flyout.
+
+ Back on the original **Choose roles** flyout, the roles you added are listed on the page. To add more roles, repeat the previous step. Roles that you already selected are grayed out.
+
+ To remove roles, select **Remove**. In the new **Choose roles** flyout that opens, select one or more roles, and then select **Remove**.
+
+ 3. When you're finished on the original **Choose roles** flyout, select **Done**.
+
+ Back on the **Choose roles** page, the roles are shown in the **Selected roles** section.
+
+ When you're finished on the **Choose roles** page, select **Next**.
+
+5. On the **Choose members** page, select **Choose members**.
+
+ 1. In the **Choose members** flyout that opens, select **Add** at the top of the flyout.
+
+ 2. In the new **Choose members** flyout that opens, select one or more users. Select a column header to sort the list by **Name** or **Email address**, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the user.
+
+ After you've selected one or more users to add, select **Add** at the bottom of the flyout.
+
+ Back on the original **Choose members** flyout, the members you added are listed on the page. To add more members, repeat the previous step. Members that you already selected are grayed out.
+
+ To remove members, select **Remove**. In the new **Choose members** flyout that opens, select one or more members, and then select **Remove**.
+
+ 3. When you're finished on the original **Choose roles** flyout, select **Done**.
+
+ Back on the **Choose members** page, the members are shown in the **Selected members** section.
+
+ When you're finished on the **Choose page** page, select **Next**.
+
+6. On the **Review your settings** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
+
+ When you're finished on the **Review your settings** page, select **Create role group**.
+
+Back on the **Permissions** page, the new role group is listed.
+
+#### Copy Email & collaboration role groups in the Microsoft 365 Defender portal
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
+
+2. On the **Permissions** page, select the role group from the list. Use the **Name** column header to sort the list by name, or the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role group.
+
+3. In the role group details flyout that opens, select **Copy role group** at the top of the flyout.
+
+The new role group wizard opens as previously described for [creating a new role group](#create-email--collaboration-role-groups-in-the-microsoft-365-defender-portal).
+
+The default name of the new role group is **Copy of \<original role group name\>**, but you can change it.
+
+The roles and members are populated with the values from the role you're copying, but you can change them.
+
+#### Modify Email & collaboration role group membership in the Microsoft 365 Defender portal
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
+
+2. On the **Permissions** page, select the role group from the list. Use the **Name** column header to sort the list by name, or the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role group.
+
+3. In the role group details flyout that opens, do one of the following steps:
+
+ - Select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit role group** at the top of the flyout. In the edit role group wizard that opens, select the **Choose members** tab.
+ - In the **Members** section of the flyout, select **Edit**.
+
+4. On the **Choose members** tab of the edit role group wizard that opens, do one of the following steps:
+ - If there are no role group members, select **Choose members**.
+ - If there are existing role group members, select **Edit**
+
+5. In the **Choose members** flyout that opens, do one of the following steps:
+
+ - **Add members**: Select **Add** at the top of the flyout. In the new **Choose members** flyout that opens, select one or more users. Select a column header to sort the list by **Name** or **Email address**, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the user.
+
+ After you've selected one or more users to add, select **Add** at the bottom of the flyout.
+
+ Back in the original **Choose members** flyout, the added users are shown in the **Members** section.
+
+ - **Remove members**: Select **Remove** at the top of the flyout. In the new **Choose members** flyout that opens, select one or more users. Select a column header to sort the list by **Name** or **Email address**, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the user.
+
+ After you've selected one or more users to remove, select **Remove**.
+
+ Back on the original **Choose members** flyout, the removed users are no longer shown in the **Members** section.
+
+ When you're finished in the original **Choose members** flyout, select **Done**.
+
+7. Back on the **Choose members** tab of the wizard, select **Save**.
+
+8. Back on the role group details flyout, select **Done**.
+
+#### Modify Email & collaboration role group role assignments in the Microsoft 365 Defender portal
+
+> [!NOTE]
+> You can modify the role assignments for custom role groups only. You can't modify the role assignments for built-in role groups.
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
-2. On the **Permissions** page, select the role group that you want to modify from the list. You can click on the **Name** column header to sort the list by name, or you can click **Search** ![Search icon.](../../media/m365-cc-sc-search-icon.png) to find the role group.
+2. On the **Permissions** page, select the role group from the list. Select the **Name** column header to sort the list by name, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role group.
+
+3. In the role group details flyout that opens, do one of the following steps:
+
+ - Select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit role group** at the top of the flyout. In the edit role group wizard that opens, select the **Choose roles** tab.
+ - In the **Assigned roles** section of the flyout, select **Edit**.
+
+4. On the **Choose roles** tab of the edit role group wizard that opens, do one of the following steps:
+ - If there are no assigned roles, select **Choose roles**.
+ - If there are existing roles assigned, select **Edit**
+
+5. In the **Choose roles** flyout that opens, do one of the following steps:
-3. In the role group details flyout that appears, click **Edit** in the **Members** section.
+ - **Add roles**: Select **Add** at the top of the flyout. In the new **Choose roles** flyout that opens, select one or more roles. Roles that are already assigned are grayed out. Select the **Name** column header to sort the list by name, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role.
-4. In the **Editing choose members** page that appears, do one of the following steps:
- - If there are no role group members, click **Choose members**.
- - If there are existing role group members, click **Edit**
+ After you've selected one or more roles to add, select **Add** at the bottom of the flyout.
-5. In the **Choose members** flyout that appears, do one of the following steps:
+ Back in the original **Choose roles** flyout, the added roles are shown in the **Roles** section.
- - Click **Add**. In the list of users that appears, select one or more users. Or, you can click **Search** ![Search icon.](../../media/m365-cc-sc-search-icon.png) to find and select users.
+ - **Remove roles**: Select **Remove** at the top of the flyout. In the new **Choose roles** flyout that opens, select one or more roles. Select a column header to sort the list by **Name**, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role.
- When you've selected the users that you want to add, click **Add**.
+ After you've selected one or more roles to remove, select **Remove**.
- - Click **Remove**. Select one or more of the existing members. Or, you can click **Search** ![Search icon.](../../media/m365-cc-sc-search-icon.png) to find and select members.
+ Back on the original **Choose roles** flyout, the removed roles are no longer shown in the **Roles** section.
+
+ When you're finished in the original **Choose roles** flyout, select **Done**.
+
+7. Back on the **Choose roles** tab of the wizard, select **Save**.
+
+8. Back on the role group details flyout, select **Done**.
+
+#### Remove Email & collaboration role groups in the Microsoft 365 Defender portal
+
+> [!NOTE]
+> You can remove custom role groups only. You can't remove built-in role groups.
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
- When you've selected the users that you want to remove, click **Remove**.
+2. On the **Permissions** page, select the role group from the list. Select the **Name** column header to sort the list by name, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role group.
-6. Back on the **Choose members** flyout, click **Done**.
+3. In the role group details flyout that opens, select **Delete role group** at the top of the flyout.
-7. Back on the **Editing choose members** page, click **Save**.
+4. Select **Yes** in the warning dialog that opens.
-8. Back on the role group details flyout, click **Done**.
+Back on the **Permissions** page, the role group is no longer listed.
security Mdo Sec Ops Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-guide.md
The following permissions (roles and role groups) are available in Defender for
- Data Investigator - eDiscovery Manager
- To assign this role to a new or existing role group, see [Modify Email & collaboration role membership in the Microsoft 365 Defender portal](mdo-portal-permissions.md#modify-email--collaboration-role-membership-in-the-microsoft-365-defender-portal).
+ To assign this role to a new or existing custom role group, see [Email & collaboration roles in the Microsoft 365 Defender portal](mdo-portal-permissions.md#email--collaboration-roles-in-the-microsoft-365-defender-portal).
- **Search and Purge** role (Email & collaboration): Approve the deletion of malicious messages as recommended by AIR or take manual action on messages in hunting experiences like Threat Explorer.
The following permissions (roles and role groups) are available in Defender for
- Data Investigator - Organization Management
- To assign this role to a new or existing role group, see [Modify Email & collaboration role membership in the Microsoft 365 Defender portal](mdo-portal-permissions.md#modify-email--collaboration-role-membership-in-the-microsoft-365-defender-portal).
+ To assign this role to a new or existing custom role group, see [Email & collaboration roles in the Microsoft 365 Defender portal](mdo-portal-permissions.md#email--collaboration-roles-in-the-microsoft-365-defender-portal).
- **Tenant AllowBlockList Manager** (Exchange Online): Manage allow and block entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). Blocking URLs, files (using file hash) or senders is a useful response action to take when investigating malicious email that was delivered.
security Preset Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/preset-security-policies.md
The differences in meaningful policy settings in the Standard preset security po
The differences in Safe Attachments and Safe Links policy settings in the Built-in protection preset security policy and in the Standard and Strict preset security policies are summarized in the following table: |&nbsp;|Built-in protection|Standard and Strict|
-||::|::|::|
+||::|::|
|**Safe Attachments policy**|No difference|No difference|
-|**Safe Links policy**||||
+|**Safe Links policy**|||
|&nbsp;&nbsp;**Let users click through to the original URL** (_AllowClickThrough_)|Selected (`$true`)|Not selected (`$false`)| |&nbsp;&nbsp;**Do not rewrite URLs, do checks via Safe Links API only** (_DisableURLRewrite_)|Selected (`$true`)|Not selected (`$false`)| |&nbsp;&nbsp;**Apply Safe Links to email messages sent within the organization** (_EnableForInternalSenders_)|Not selected (`$false`)|Selected (`$true`)|
security Priority Accounts Turn On Priority Account Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/priority-accounts-turn-on-priority-account-protection.md
Title: Configure and review priority accounts in Microsoft Defender for Office 365
+ Title: Configure and review priority account protection in Microsoft Defender for Office 365
f1.keywords: - NOCSH Previously updated : 5/1/2023 Last updated : 5/23/2023 audience: ITPro ms.localizationpriority: medium
- m365-security - tier1
-description: Learn how to identify critical people in an organization and add the priority account tag to provide them with extra protection.
+description: Admins can learn how to turn on priority account protection in Microsoft Defender for Office 365 Plan 2 organizations.
-# Configure and review Priority accounts in Microsoft Defender for Office 365
+# Configure and review priority account protection in Microsoft Defender for Office 365
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)] **Applies to**-- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md)
+- [Microsoft Defender for Office 365 plan 2](defender-for-office-365.md)
- [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
-In every organization, there are people that are critical, like executives, leaders, managers, or other users who have access to sensitive, proprietary, or high priority information. You can tag these users within Microsoft Defender for Office 365 as priority accounts, allowing security teams to prioritize their focus on these critical individuals. With differentiated protection for priority accounts, users tagged as priority accounts will receive a higher level of protection against threats.
+In Microsoft 365 organizations with Microsoft Defender for Office 365 Plan 2, _priority account protection_ is a differentiated level of protection that's applied to accounts that have the **Priority account** tag applied to them. For more information about the Priority account tag and how to apply it to users, see [Manage and monitor priority accounts](../../admin/setup/priority-accounts.md).
-Priority accounts are targeted by attackers more often and are generally attacked with more sophisticated techniques. Differentiated protection for priority accounts focuses on this specific user set and provides higher level of protection using enhanced machine learning models. This differentiation in learning and message handling provides the highest level of protection for these accounts and helps maintain a low false positive rate, as a high rate of false positives can also have a negative impact on these users.
+Priority account protection offers additional heuristics that are tailored to company executives that don't benefit regular employees. Priority account protection is better suited to the mail flow patterns of company executives based on extensive data from the Microsoft datacenters.
-## Configure Priority account protection
+By default, priority account protection is turned on in organizations with Defender for Office 365 Plan 2. This default behavior means an account that's tagged as a Priority account automatically receives priority account protection.
-Priority account protection is turned on by default for pre-identified critical users.
+This article describes how to confirm that priority account protection is turned on, how to turn it on, and identifies the reporting features that allow you to see the results of priority account protection.
-You need to be assigned permissions before you can do the procedures in this article. You have the following options:
+## What do you need to know before you begin?
-- [Exchange Online RBAC](/exchange/permissions-exo/permissions-exo): Membership in the **Organization Management** or **Security Administrator** role groups.-- [Azure AD RBAC](../../admin/add-users/about-admin-roles.md): Membership in the **Global Administrator** or **Security Administrator** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
+- You open the Microsoft 365 Defender portal at <https://security.microsoft.com>.
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **Priority account protection**. To go directly to the **Priority account protection** page, use <https://security.microsoft.com/securitysettings/priorityAccountProtection>.
+- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
+ - [Exchange Online RBAC](/exchange/permissions-exo/permissions-exo): Membership in the **Organization Management** or **Security Administrator** role groups.
+ - [Azure AD RBAC](../../admin/add-users/about-admin-roles.md): Membership in the **Global Administrator** or **Security Administrator** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
-2. On the **Priority account protection** page, turn on **Priority account protection** (:::image type="icon" source="../../media/scc-toggle-on.png" border="false":::).
+- As previously described, priority account protection is applied to accounts that have the **Priority account** tag applied to them. For instructions, see [Manage and monitor priority accounts](../../admin/setup/priority-accounts.md).
- > [!div class="mx-imgBorder"]
- > ![Turn on Priority account protection.](../../media/mdo-priority-account-protection.png)
+- The Priority account tag is a type of _user tag_. You can create custom user tags to differentiate specific groups of users in reporting and other features. For more information about user tags, see [User tags in Microsoft Defender for Office 365](user-tags-about.md).
+
+## Review or turn on priority account protection in the Microsoft 365 Defender portal
> [!NOTE]
-> We don't recommend disabling or turning off priority account protection.
+> We don't recommend turning off priority account protection.
-If you want to use Exchange Online PowerShell to turn on priority account protection, do the following steps:
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **Priority account protection**. Or, to go directly to the **Priority account protection** page, use <https://security.microsoft.com/securitysettings/priorityAccountProtection>.
-1. [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) and run the following command:
+2. On the **Priority account protection** page, verify that **Priority account protection** is turned on (:::image type="icon" source="../../media/scc-toggle-on.png" border="false":::).
- ```powershell
- Set-EmailTenantSettings -EnablePriorityAccountProtection $true
- ```
+ :::image type="content" source="../../medio-priority-account-protection.png":::
-2. To verify that priority account protection is turned on, run the following command to verify the EnablePriorityAccountProtection property value:
+### Review or turn on priority account protection in Exchange Online PowerShell
- ```powershell
- Get-EmailTenantSettings | Format-List Identity,EnablePriorityAccountProtection
- ```
+If you'd rather use PowerShell to verify that priority account protection is turned on, run the following command in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
- The value True means priority account protection is turned on. The value False means priority account protection is turned off.
+```powershell
+Get-EmailTenantSettings | Format-List Identity,EnablePriorityAccountProtection
+```
-### Assign the Priority account tag to users
+The value True for the EnablePriorityAccountProtection property means priority account protection is turned on. The value False means priority account protection is turned off.
-Microsoft Defender for Office 365 supports priority accounts as tags that can be used as filters in alerts, reports, incidents, and more.
+To turn on priority account protection, run the following command:
-For more information, see [User tags in Microsoft Defender for Office 365](user-tags-about.md).
+```powershell
+Set-EmailTenantSettings -EnablePriorityAccountProtection $true
+```
-> [!NOTE]
-> Currently, you can only apply user tags to mailbox users.
->
-> Your organization can tag a maximum of 250 users using the Priority account tag.
->
-> Each custom tag has a maximum of 10,000 users per tag and your organization can create up to 500 custom tags.
+For detailed syntax and parameter information, see [Get-EmailTenantSettings](/powershell/module/exchange/get-emailtenantsettings) and [Set-EmailTenantSettings](/powershell/module/exchange/set-emailtenantsettings).
## Review differentiated protection from priority account protection
-The effects of priority account protection are visible in the following features:
+The effects of priority account protection are visible in the following reporting features:
-- [Alerts](alerts.md)-- [Custom alert policies](../../compliance/alert-policies.md#view-alerts)
+- [Threat protection status report](reports-email-security.md#threat-protection-status-report)
+ - [View data by Email \> Phish and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--phish-and-chart-breakdown-by-detection-technology)
+ - [View data by Email \> Spam and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--spam-and-chart-breakdown-by-detection-technology)
+ - [View data by Email \> Malware and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--malware-and-chart-breakdown-by-detection-technology)
+ - [Chart breakdown by Policy type](reports-email-security.md#chart-breakdown-by-policy-type)
+ - [Chart breakdown by Delivery status](reports-email-security.md#chart-breakdown-by-delivery-status)
- [Threat Explorer and real-time detections](threat-explorer-about.md)-- [Compromised user report](reports-email-security.md#compromised-users-report) - [Email entity page](mdo-email-entity-page.md)-- [Threat protection status report](reports-email-security.md#threat-protection-status-report)-- [Top senders and recipients report](reports-email-security.md#top-senders-and-recipients-report)-- [Attack simulation](attack-simulation-training-simulations.md#target-users)-- [Campaign Views](campaigns.md)-- [Admin submissions and user reported messages](submissions-admin.md)-- [Quarantine](quarantine-about.md)-
-### Threat protection status report
-The **Threat protection status** report is a single view that brings together information about malicious content and malicious email detected and blocked by Microsoft Defender for Office 365.
+For information about where the Priority account tag and other user tags are available as filters, see [User tags in reports and features](user-tags-about.md#user-tags-in-reports-and-features).
-To view the report, do the following steps:
+### Threat protection status report
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Reports** \> **Email & collaboration** \> **Email & collaboration reports** \> find **Threat protection status** and then click **View details**. To go directly to the report, use <https://security.microsoft.com/reports/TPSAggregateReportATP>.
+The **Threat protection status** report brings together information about malicious content and malicious email detected and blocked by Exchange Online Protection and Defender for Office 365. For more information, see [Threat protection status report](reports-email-security.md#threat-protection-status-report).
-2. The default view is **View data by Overview**. Click on this value to change the view by selecting one of the following values:
- - **View data by Email \> Phish**
- - **View data by Email \> Malware**
- - **View data by Email \> Spam**
+In the previously mentioned views in the report, the option **Priority account protection** and the value **Yes** is available when you select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. This option allows you to filter the data in the report by priority account protection detections.
-3. Click ![Filter icon.](../../media/m365-cc-sc-filter-icon.png) **Filter**.
+### Threat Explorer
-4. On the **Filters** flyout that opens, in the **Priority accounts** section, select **Yes**, **No** or both values.
+For more information about Threat Explorer, see [Threat Explorer and Real-time detections](threat-explorer-about.md).
- ![Priority account protection filters in the Threat protection status report.](../../media/priority-account-protection-tps-report.png)
+To view the results of priority account protection in Threat Explorer, do the following steps:
-### Threat Explorer
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer**. Or, to go directly to the **Explorer** page, use <https://security.microsoft.com/threatexplorer>.
-Context filter within Threat Explorer helps search for emails where priority account protection was involved in the detection of the message. This allows security operations teams to be able to see the value provided by this protection. You can still filter messages by priority account tag to find all messages for the specific set of users.
+2. On the **Explorer** page, on the **All email**, **Malware**, or **Phish** tabs, select **Context** \> **Equal any of** \> **Priority account protection**, and then select **Refresh**.
-To view the extra protection in Threat Explorer, do the following steps:
+ :::image type="content" source="../../media/threat-explorer-context-filter.png" alt-text="Context filter within Threat Explorer." lightbox="../../media/threat-explorer-context-filter.png":::
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer**. To go directly to the **Threat Explorer** page, use <https://security.microsoft.com/threatexplorer>.
+### Email entity page
-2. Select **Context** from the dropdown, and then select the checkbox next to **Priority account protection**.
+The email entity page is available in **Threat Explorer**. For more information, see [The Email entity page](mdo-email-entity-page.md).
-> [!div class="mx-imgBorder"]
-> ![Context filter within Threat Explorer.](../../media/threat-explorer-context-filter.png)
+In the filtered results on the **All email**, **Malware**, or **Phish** tabs of the **Explorer** page, select the **Subject** of an email message in the results.
-### Email entity page
+In the details flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Open email entity** at the top of the flyout.
-The email entity page is available in **Threat Explorer**. Select the subject of an email you're investigating. A gold bar will display at the top of the email flyout for that mail. Select to view the new page.
+On the email entity page that opens, select the **Analysis** tab. **Priority account protection** is listed in the **Threat detection details** section.
-The tabs along the top of the entity page will allow you to investigate email efficiently. Click the **Analysis** tab. Priority account protection is now listed under **Threat detection details**.
## More information
security Reports Email Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/reports-email-security.md
Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" bord
- **Rescan status**: - **Pending** - **Completed**-- **Tags**
+- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).
When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" bord
- **Date (UTC)**: **Start date** and **End date** - **Detection**: The same values as in the chart.-- **Priority account protection**: **Yes** and **No**. For more information, see [Configure and review Priority accounts in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
+- **Priority account protection**: **Yes** and **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
- **Evaluation**: **Yes** or **No**. - **Protected by**: **MDO** (Defender for Office 365) and **EOP** - **Direction**:
Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" bord
- **Date (UTC)** **Start date** and **End date** - **Detection**: The same values as in the chart.-- **Priority account protection**: **Yes** and **No**. For more information, see [Configure and review Priority accounts in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
+- **Priority account protection**: **Yes** and **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
- **Direction**: - **All** - **Inbound**
security Protect Your C Suite With Priority Account Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/protect-your-c-suite-with-priority-account-protection.md
To learn what priority account tags are see [Manage and monitor priority account
## Next Steps
-[Review the differentiated protection for users tagged as priority accounts](../../office-365-security/priority-accounts-turn-on-priority-account-protection.md).
+[Review differentiated protection from priority account protection]
+
+[Review the differentiated protection for users tagged as Priority accounts](../priority-accounts-turn-on-priority-account-protection.md#review-differentiated-protection-from-priority-account-protection).
## PowerShell configuration
security User Tags About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/user-tags-about.md
f1.keywords:
Previously updated : 5/16/2023 Last updated : 5/23/2023 audience: ITPro ms.localizationpriority: medium
If your organization has Defender for Office 365 Plan 2 (included in your subscr
> > Each custom tag has a maximum of 10,000 users per tag and your organization can create up to 500 custom tags.
-After you apply system tags or custom tags to users, you can use those tags as filters in alerts, incidents, reports, and investigations:
--- [Alerts](alerts.md)-- [Incidents](mdo-sec-ops-manage-incidents-and-alerts.md)-- [Custom alert policies](../../compliance/alert-policies.md#view-alerts)-- [Threat Explorer and real-time detections](threat-explorer-about.md)-- [Compromised user report](reports-email-security.md#compromised-users-report)-- [Email entity page](mdo-email-entity-page.md)-- [Threat protection status report](reports-email-security.md#threat-protection-status-report)-- [Top senders and recipients report](reports-email-security.md#top-senders-and-recipients-report)-- [Attack simulation](attack-simulation-training-simulations.md#target-users)-- [Campaign Views](campaigns.md)-- [Admin submissions and user reported messages](submissions-admin.md)-- [Quarantine](quarantine-about.md)-- For priority accounts, you can use the [Email issues for priority accounts report](/exchange/monitoring/mail-flow-reports/mfr-email-issues-for-priority-accounts-report) in the Exchange admin center (EAC).-
-This article explains how to configure user tags in the Microsoft 365 Defender portal. You can also apply or remove the Priority Account tag using the _VIP_ parameter on the [Set-User](/powershell/module/exchange/set-user) cmdlet in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). No PowerShell cmdlets are available to manage custom user tags.
+This article explains how to configure user tags in the Microsoft 365 Defender portal. You can also apply or remove the Priority account tag using the _VIP_ parameter on the [Set-User](/powershell/module/exchange/set-user) cmdlet in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). No PowerShell cmdlets are available to manage custom user tags.
To see how user tags are part of the strategy to help protect high-impact user accounts, see [Security recommendations for priority accounts in Microsoft 365](priority-accounts-security-recommendations.md).
To see how user tags are part of the strategy to help protect high-impact user a
- [Microsoft 365 Defender role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac): **configuration/system (manage)** or **configuration/system (read)**. Currently, this option requires membership in the Microsoft 365 Defender Preview program. - [Email & collaboration RBAC in the Microsoft 365 Defender portal](mdo-portal-permissions.md): - _Create, modify, and delete custom user tags_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Add and remove members from the Priority Account tag_: Membership in the **Security Administrator** and **Exchange Admin** role groups.
- - _Add and remove members from existing custom user tags_: Membership in the **Organization Management** or **Security Administrator** role groups.
+ - _Apply and remove the Priority account tag from users_: Membership in the **Security Administrator** and **Exchange Admin** role groups.
+ - _Apply and remove existing custom user tags from users_: Membership in the **Organization Management** or **Security Administrator** role groups.
> [!NOTE] > User tag management is controlled by the **Tag Reader** and **Tag Manager** roles. -- You can also manage and monitor priority accounts in the Microsoft 365 admin center. For instructions, see [Manage and monitor priority accounts](../../admin/setup/priority-accounts.md).
+- You can also manage and monitor the Priority account tag in the Microsoft 365 admin center. For instructions, see [Manage and monitor priority accounts](../../admin/setup/priority-accounts.md).
- For information about securing _privileged accounts_ (admin accounts), see [this article](/security/compass/critical-impact-accounts).
Select a user tag by clicking anywhere in the row other than the check box next
The details flyout of the user tag contains the following information, based on the type of tag: -- **System tags**: The details flyout for the Priority Account tag contains the following information:
+- **System tags**: The details flyout for the Priority account tag contains the following information:
- **Last updated** - **Description** - A link to <https://security.microsoft.com/securitysettings/priorityAccountProtection> to turn on or turn off [priority account protection](priority-accounts-turn-on-priority-account-protection.md)
After you select the user tag, use either of the following methods to modify it:
The same wizard and most of the same settings are available as described in the [Use the Microsoft 365 Defender portal to create user tags](#use-the-microsoft-365-defender-portal-to-create-user-tags) section earlier in this article, with the following exceptions: -- You can't rename or change the description of the Priority Account tag, so the **Define tag** page isn't available for the Priority Account tag.
+- You can't rename or change the description of the Priority account tag, so the **Define tag** page isn't available for the Priority account tag.
- The **Define tag** page is available for custom tags, but you can't rename the tag; you can only change the description. ## Use the Microsoft 365 Defender portal to remove user tags
-You can't remove the built-in Priority Account tag.
+You can't remove the built-in Priority account tag.
After you select the custom tag, use either of the following methods to remove it:
Read the warning in the confirmation dialog that opens, and then select **Yes, r
Back on the **User tags** page, the custom tag is no longer listed.
+## User tags in reports and features
+
+After you apply system tags or custom tags to users, you can use those tags as filters in the following features:
+
+- [Alerts](../defender/investigate-alerts.md)
+- [Incidents](mdo-sec-ops-manage-incidents-and-alerts.md)
+- [Custom alert policies](../../compliance/alert-policies.md#view-alerts)
+- [Threat Explorer](threat-explorer-about.md)
+- [Campaign Views](campaigns.md)
+- [Email entity page](mdo-email-entity-page.md)
+- [Email security reports](reports-email-security.md)
+ - [Compromised user report](reports-email-security.md#compromised-users-report)
+ - [Submissions report](reports-email-security.md#submissions-report)
+ - [Threat protection status report](reports-email-security.md#threat-protection-status-report)
+ - [Top senders and recipients report](reports-email-security.md#top-senders-and-recipients-report)
+- [Attack simulation training](attack-simulation-training-get-started.md)
+ - [Simulations](attack-simulation-training-simulations.md)
+ - [Simulation automations](attack-simulation-training-simulation-automations.md)
+ - [Payloads](attack-simulation-training-payloads.md)
+ - [Training campaigns](attack-simulation-training-training-campaigns.md)
+ - [Training modules](attack-simulation-training-training-modules.md)
+- [Quarantine](quarantine-admin-manage-messages-files.md)
+- [Admin submissions and user reported messages](submissions-admin.md)
+- In organizations above a certain size, the [Email issues for priority accounts report](/exchange/monitoring/mail-flow-reports/mfr-email-issues-for-priority-accounts-report) is available in the Exchange admin center (EAC).
+
+For information about where the effects of priority account protection are visible, see [Review differentiated protection from priority account protection](priority-accounts-turn-on-priority-account-protection.md#review-differentiated-protection-from-priority-account-protection).
+ ## More information
-[Configure and review priority accounts in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md)
+- [Configure and review priority account protection](priority-accounts-turn-on-priority-account-protection.md)
+- [Manage and monitor priority accounts](../../admin/setup/priority-accounts.md)