Updates from: 05/31/2023 01:43:08
Category Microsoft Docs article Related commit history on GitHub Change details
compliance Compliance Manager Cloud Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-cloud-settings.md
The standards or regulations listed below are supported across Defender for Clou
- NIST SP 800-53 Rev.4 (Azure) - NIST SP 800 53 Rev.5 (Azure, AWS, GCP) - PCI DSS 3.2.1 (AWS, GCP)-- PSC DSS v4 (Azure)
+- PCI DSS 4 (Azure)
- SOC 2 Type 2 (Azure) - SWIFT CSP-CDCF v2022 (Azure)
Check the [list of standards supported by Defender for Cloud and Compliance Mana
## Resources - [Quickstart: Set up Microsoft Defender for Cloud](/azure/defender-for-cloud/get-started)-- [User roles and permissions for Defender for Cloud](/azure/defender-for-cloud/permissions)
+- [User roles and permissions for Defender for Cloud](/azure/defender-for-cloud/permissions)
compliance Dlp Owa Policy Tips https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-owa-policy-tips.md
+
+ Title: "Data loss prevention policy tip reference for Outlook on the Web"
+f1.keywords:
+- CSH
+++ Last updated : 05/24/2023
+audience: Admin
+search.appverid: MET150
+
+f1_keywords:
+- 'ms.o365.cc.UnifiedDLPRuleContainsSensitiveInformation'
+
+ms.localizationpriority: medium
+
+- tier3
+- purview-compliance
+hideEdit: true
+feedback_system: None
+recommendations: false
+description: "DLP policy tip reference for Outlook 2013 for Win32."
++
+# Data loss prevention policy tip reference for Outlook on the Web
++
+## DLP policy tips supported
+
+Yes.
+
+> [!IMPORTANT]
+> When emails are encrypted with Microsoft Purview Message Encryption and the policy used to detect them uses the detect encryption condition policy tips will not appear.
+
+## Email notification supported for Outlook on the Web
+
+Yes.
++
+## Conditions that support policy tips in Outlook on the Web
+
+- Content contains (SIT)
+- Content is shared from M365
+- Sender is a member of
+- Recipient Domain Is
+- Recipient is
+- Subject Contains Words or phrases
+- Sender is
+- Sender domain is
+- File extension is
+- Subject matches patterns
+- Subject or Body contains words or phrases
+- Doc or Attachment is password protected
+- Document name contains words or phrases
+- Sender address contains words
+- Document size equals or is greater than
+- Subject or Body matches patterns
+- Recipient address contains words
+- Sender address matches patterns
+- Document name matches patterns
+- Recipient address matches patterns
+- Message importance is
+- Any email attachment's content could not be scanned (DocIsUnsupported)
+- Document property is
+
+## Actions that support policy tips in Outlook on the Web
+
+- Restrict access or encrypt the content in Microsoft 365 locations
+- Set headers
+- Remove header
+- Redirect the message to specific users
+- Forward the message for approval to sender's manager
+- Forward the message for approval to specific approvers
+- Add recipient to the To box
+- Add recipient to the Cc box
+- Add recipient to the Bcc box
+- Add the sender's manager as recipient
+- Removed O365 Message Encryption and rights protection
+- Prepend Email Subject
+- Add HTML Disclaimer
+- Modify Email Subject
+- Deliver the message to the hosted quarantine
++
+## Sensitive information types that support policy tips in Outlook on the Web
+
+These preconfigured sensitive informaiton types (SIT) support policy tips in Outlook on the Web.
+
+- [ABA routing number](sit-defn-aba-routing.md)
+- [Argentina national identity (DNI) number](sit-defn-argentina-national-identity-numbers.md)
+- [Australia bank account number](sit-defn-australia-bank-account-number.md)
+- [Australia medical account number](sit-defn-australia-medical-account-number.md)
+- [Australia passport number](sit-defn-australia-passport-number.md)
+- [Australia tax file number](sit-defn-australia-tax-file-number.md)
+- [Azure DocumentDB auth key](sit-defn-azure-document-db-auth-key.md)
+- [Azure IAAS database connection string and Azure SQL connection string](sit-defn-azure-iaas-database-connection-string-azure-sql-connection-string.md)
+- [Azure IoT connection string](sit-defn-azure-iot-connection-string.md)
+- [Azure publish setting password](sit-defn-azure-publish-setting-password.md)
+- [Azure Redis cache connection string](sit-defn-azure-redis-cache-connection-string.md)
+- [Azure SAS](sit-defn-azure-sas.md)
+- [Azure service bus connection string](sit-defn-azure-service-bus-connection-string.md)
+- [Azure storage account key](sit-defn-azure-storage-account-key.md)
+- [Azure Storage account key (generic)](sit-defn-azure-storage-account-key-generic.md)
+- [Belgium national number](sit-defn-belgium-national-number.md)
+- [Brazil CPF number](sit-defn-brazil-cpf-number.md)
+- [Brazil legal entity number (CNPJ)](sit-defn-brazil-legal-entity-number.md)
+- [Brazil national identification card (RG)](sit-defn-brazil-national-identification-card.md)
+- [Canada bank account number](sit-defn-canada-bank-account-number.md)
+- [Canada driver's license number](sit-defn-canada-drivers-license-number.md)
+- [Canada health service number](sit-defn-canada-health-service-number.md)
+- [Canada passport number](sit-defn-canada-passport-number.md)
+- [Canada personal health identification number (PHIN)](sit-defn-canada-personal-health-identification-number.md)
+- [Canada social insurance number](sit-defn-canada-social-insurance-number.md)
+- [Chile identity card number](sit-defn-chile-identity-card-number.md)
+- [China resident identity card (PRC) number](sit-defn-china-resident-identity-card-number.md)
+- [Credit card number](sit-defn-credit-card-number.md)
+- [Croatia identity card number](sit-defn-croatia-identity-card-number.md)
+- [Croatia personal identification (OIB) number](sit-defn-croatia-personal-identification-number.md)
+- [Czech personal identity number](sit-defn-czech-personal-identity-number.md)
+- [Denmark personal identification number](sit-defn-denmark-personal-identification-number.md)
+- [Drug Enforcement Agency (DEA) number](sit-defn-drug-enforcement-agency-number.md)
+- [EU debit card number](sit-defn-eu-debit-card-number.md)
+- [EU driver's license number](sit-defn-eu-drivers-license-number.md)
+- [EU national identification number](sit-defn-eu-national-identification-number.md)
+- [EU passport number](sit-defn-eu-passport-number.md)
+- [EU social security number or equivalent identification](sit-defn-eu-social-security-number-equivalent-identification.md)
+- [EU Tax identification number](sit-defn-eu-tax-identification-number.md)
+- [Finland national ID](sit-defn-finland-national-id.md)
+- [Finland passport number](sit-defn-finland-passport-number.md)
+- [France driver's license number](sit-defn-france-drivers-license-number.md)
+- [France national id card (CNI)](sit-defn-france-national-id-card.md)
+- [France passport number](sit-defn-france-passport-number.md)
+- [France social security number (INSEE)](sit-defn-france-social-security-number.md)
+- [Germany driver's license number](sit-defn-germany-drivers-license-number.md)
+- [Germany passport number](sit-defn-germany-passport-number.md)
+- [Germany identity card number](sit-defn-germany-identity-card-number.md)
+- [Greece national ID card](sit-defn-greece-national-id-card.md)
+- [Hong Kong identity card (HKID) number](sit-defn-hong-kong-identity-card-number.md)
+- [India permanent account number (PAN)](sit-defn-india-permanent-account-number.md)
+- [India unique identification (Aadhaar) number](sit-defn-india-unique-identification-number.md)
+- [Indonesia identity card (KTP) number](sit-defn-indonesia-identity-card-number.md)
+- [International banking account number (IBAN)](sit-defn-international-banking-account-number.md)
+- [International classification of diseases (ICD-10-CM)](sit-defn-international-classification-of-diseases-icd-10-cm.md)
+- [International classification of diseases (ICD-9-CM)](sit-defn-international-classification-of-diseases-icd-9-cm.md)
+- [IP address](sit-defn-ip-address.md)
+- [Ireland personal public service (PPS) number](sit-defn-ireland-personal-public-service-number.md)
+- [Israel bank account number](sit-defn-israel-bank-account-number.md)
+- [Israel national identification number](sit-defn-israel-national-identification-number.md)
+- [Italy driver's license number](sit-defn-italy-drivers-license-number.md)
+- [Japan bank account number](sit-defn-japan-bank-account-number.md)
+- [Japan driver's license number](sit-defn-japan-drivers-license-number.md)
+- [Japan passport number](sit-defn-japan-passport-number.md)
+- [Japan resident registration number](sit-defn-japan-resident-registration-number.md)
+- [Japan social insurance number (SIN)](sit-defn-japan-social-insurance-number.md)
+- [Japan residence card number](sit-defn-japan-residence-card-number.md)
+- [Malaysia identification card number](sit-defn-malaysia-identification-card-number.md)
+- [Netherlands citizens service (BSN) number](sit-defn-netherlands-citizens-service-number.md)
+- [New Zealand ministry of health number](sit-defn-new-zealand-ministry-of-health-number.md)
+- [Norway identification number](sit-defn-norway-identification-number.md)
+- [Philippines unified multi-purpose identification number](sit-defn-philippines-unified-multi-purpose-identification-number.md)
+- [Poland identity card](sit-defn-poland-identity-card.md)
+- [Poland national ID (PESEL)](sit-defn-poland-national-id.md)
+- [Poland passport number](sit-defn-poland-passport-number.md)
+- [Portugal citizen card number](sit-defn-portugal-citizen-card-number.md)
+- [Saudi Arabia National ID](sit-defn-saudi-arabia-national-id.md)
+- [Singapore national registration identity card (NRIC) number](sit-defn-singapore-national-registration-identity-card-number.md)
+- [South Africa identification number](sit-defn-south-africa-identification-number.md)
+- [South Korea resident registration number](sit-defn-south-korea-resident-registration-number.md)
+- [Spain social security number (SSN)](sit-defn-spain-social-security-number.md)
+- [SQL Server connection string](sit-defn-sql-server-connection-string.md)
+- [Sweden national ID](sit-defn-sweden-national-id.md)
+- [Sweden passport number](sit-defn-sweden-passport-number.md)
+- [SWIFT code](sit-defn-swift-code.md)
+- [Taiwan national identification number](sit-defn-taiwan-national-identification-number.md)
+- [Taiwan passport number](sit-defn-taiwan-passport-number.md)
+- [Taiwan-resident certificate (ARC/TARC) number](sit-defn-taiwan-resident-certificate-number.md)
+- [Thai population identification code](sit-defn-thai-population-identification-code.md)
+- [Turkey national identification number](sit-defn-turkey-national-identification-number.md)
+- [U.K. drivers license number](sit-defn-uk-drivers-license-number.md)
+- [U.K. electoral roll number](sit-defn-uk-electoral-roll-number.md)
+- [U.K. national health service number](sit-defn-uk-national-health-service-number.md)
+- [U.K. national insurance number (NINO)](sit-defn-uk-national-insurance-number.md)
+- [U.S./U.K. passport number](sit-defn-us-uk-passport-number.md)
+- [U.S. bank account number](sit-defn-us-bank-account-number.md)
+- [U.S. driver's license number](sit-defn-us-drivers-license-number.md)
+- [U.S. individual taxpayer identification number (ITIN)](sit-defn-us-individual-taxpayer-identification-number.md)
+- [U.S. social security number (SSN)](sit-defn-us-social-security-number.md)
+
+## Exact data match sensitive information types support for policy tips in Outlook on the Web
+
+Yes.
+
+All exact data match sensitive information types are custom created. For more details, see [Learn about exact data match based sensitive information types](sit-learn-about-exact-data-match-based-sits.md).
+
+## Custom sensitive information types support for policy tips in Outlook on the Web
+
+Yes.
+
+Custom sensitive information types that use REGEX, functions, keyword lists and keyword dictionaries support policy tips in Outlook on the Web. For more details, see [Create custom sensitive information types in the compliance portal](create-a-custom-sensitive-information-type.md) and [Create a custom sensitive information type using PowerShell](create-a-custom-sensitive-information-type-in-scc-powershell.md).
++
+## Sensitivity labels that support policy tips in Outlook on the Web
+
+No.
++
+## Retention labels that support policy tips in Outlook on the Web
+
+No.
++
+## Trainable classifiers that support policy tips in Outlook on the Web
+
+No.
++
+<!-- END USER CONTENT ## Policy tips in Outlook on the web
+
+When you compose a new email in Outlook on the web and Outlook 2013 and later, you'll see a policy tip if you add content that matches a rule in a DLP policy, and that rule uses policy tips. The policy tip appears at the top of the message, above the recipients, while the message is being composed.
+
+![Policy tip at the top of a message being composed.](../media/9b3b6b74-17c5-4562-82d5-d17ecaaa8d95.png)
+
+Policy tips work whether the sensitive information appears in the message body, subject line, or even a message attachment as shown here.
+
+![Policy tip showing that an attachment conflicts with a DLP policy.](../media/59ae6655-215f-47d9-ad1d-39c0d1e61740.png)
+
+If the policy tips are configured to allow override, you can choose **Show Details** \> **Override** \> enter a business justification or report a false positive \> **Override**.
+
+![Policy tip in message expanded to show Override option.](../media/28bfb997-48a6-41f0-8682-d5e62488458a.png)
+
+![Policy tip dialog where you can override the policy tip.](../media/f97e836c-04bd-44b4-aec6-ed9526ea31f8.png)
+
+Note that when you add sensitive information to an email, there may be latency between when the sensitive information is added and when the policy tip appears. When emails are encrypted with Microsoft Purview Message Encryption and the policy used to detect them uses the detect encryption condition policy tips will not appear.
+-->
+
compliance Dlp Policy Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md
To learn more about user notification and policy tip configuration and use, incl
- [Send email notifications and show policy tips for DLP policies](use-notifications-and-policy-tips.md#send-email-notifications-and-show-policy-tips-for-dlp-policies).
+#### Policy tip references
+
+Details on support for policy tips and notfications for different apps can be found here:
+
+- [Data loss prevention policy tip reference for Outlook on the Web](dlp-owa-policy-tips.md)
+ #### Blocking and notifications in SharePoint Online and OneDrive for Business This table shows the DLP blocking and notification behavior for policies that are scoped to SharePoint Online and OneDrive for Business.
compliance Dlp Policy Tips Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-tips-reference.md
# Data Loss Prevention policy tips reference
-## DLP policy tips in Outlook Web Access
-
-Policy tips in Outlook Web Access (OWA) are supported for these conditions and actions:
- [!INCLUDE [purview-preview](../includes/purview-preview.md)]
-### Conditions that support policy tips in Outlook Web Access
--- Content contains (SIT)-- Content is shared from M365-- Sender is a member of-- Recipient Domain Is -- Recipient is-- Subject Contains Words or phrases-- Sender is-- Sender domain is-- File extension is-- Subject matches patterns-- Subject or Body contains words or phrases-- Doc or Attachment is password protected-- Document name contains words or phrases-- Sender address contains words-- Document size equals or is greater than-- Subject or Body matches patterns-- Recipient address contains words-- Sender address matches patterns-- Document name matches patterns-- Recipient address matches patterns-- Message importance is-- Any email attachment's content could not be scanned (DocIsUnsupported)-- Document property is-
-### Actions that support policy tips in Outlook Web Access
--- Restrict access or encrypt the content in Microsoft 365 locations-- Set headers-- Remove header-- Redirect the message to specific users-- Forward the message for approval to sender's manager-- Forward the message for approval to specific approvers-- Add recipient to the To box-- Add recipient to the Cc box-- Add recipient to the Bcc box-- Add the sender's manager as recipient-- Removed O365 Message Encryption and rights protection-- Prepend Email Subject-- Add HTML Disclaimer-- Modify Email Subject-- Deliver the message to the hosted quarantine--
-### Sensitive information types that support policy tips in Outlook Web Access
--- ABA Routing Number-- Argentina National Identity (DNI) Number-- Australia Bank Account Number-- Australia Medical Account Number-- Australia Passport Number-- Australia Tax File Number-- Azure DocumentDB Auth Key -- Azure IAAS Database Connection String and Azure SQL Connection String -- Azure IoT Connection String -- Azure Publish Setting Password -- Azure Redis Cache Connection String -- Azure SAS -- Azure Service Bus Connection String -- Azure Storage Account Key -- Azure Storage Account Key (Generic) -- Belgium National Number-- Brazil CPF Number-- Brazil Legal Entity Number (CNPJ)-- Brazil National ID Card (RG)-- Canada Bank Account Number-- Canada Driver's License Number-- Canada Health Service Number-- Canada Passport Number-- Canada Personal Health Identification Number (PHIN)-- Canada Social Insurance Number-- Chile Identity Card Number-- China Resident Identity Card (PRC) Number-- Credit Card Number-- Croatia Identity Card Number -- Croatia Personal Identification (OIB) Number -- Czech Personal Identity Number -- Denmark Personal Identification Number-- Drug Enforcement Agency (DEA) Number-- EU Debit Card Number-- EU Driver's License Number -- EU National Identification Number -- EU Passport Number -- EU Social Security Number (SSN) or Equivalent ID -- EU Tax Identification Number (TIN) -- Finland National ID-- Finland Passport Number-- France Driver's License Number-- France National ID Card (CNI)-- France Passport Number-- France Social Security Number (INSEE)-- German Driver's License Number-- German Passport Number-- Germany Identity Card Number-- Greece National ID Card -- Hong Kong Identity Card (HKID) Number-- India Permanent Account Number (PAN)-- India Unique Identification (Aadhaar) Number-- Indonesia Identity Card (KTP) Number-- International Banking Account Number (IBAN)-- International Classification of Diseases (ICD-10-CM) -- International Classification of Diseases (ICD-9-CM) -- IP Address-- Ireland Personal Public Service (PPS) Number -- Israel Bank Account Number-- Israel National ID-- Italy Driver's License Number-- Japan Bank Account Number-- Japan Driver's License Number-- Japan Passport Number-- Japan Resident Registration Number-- Japan Social Insurance Number (SIN)-- Japanese Residence Card Number-- Malaysia Identity Card Number-- Netherlands Citizen's Service (BSN) Number -- New Zealand Ministry of Health Number-- Norway Identity Number -- Philippines Unified Multi-Purpose ID Number-- Poland Identity Card-- Poland National ID (PESEL)-- Poland Passport-- Portugal Citizen Card Number-- Saudi Arabia National ID-- Singapore National Registration Identity Card (NRIC) Number-- South Africa Identification Number -- South Korea Resident Registration Number-- Spain Social Security Number (SSN)-- SQL Server Connection String -- Sweden National ID-- Sweden Passport Number-- SWIFT Code-- Taiwan National ID-- Taiwan Passport Number-- Taiwan Resident Certificate (ARC/TARC)-- Thai Population Identification Code-- Turkish National Identification number-- U.K. Driver's License Number-- U.K. Electoral Roll Number-- U.K. National Health Service Number-- U.K. National Insurance Number (NINO)-- U.S. / U.K. Passport Number-- U.S. Bank Account Number-- U.S. Driver's License Number-- U.S. Individual Taxpayer Identification Number (ITIN)-- U.S. Social Security Number (SSN)- ## Outlook 2013 and later supports showing policy tips for only some conditions Currently, Outlook 2013 and later supports showing policy tips for policies that contain these conditions:
Custom sensitive information types will also be detected in addition to the abov
## Support Matrix for DLP policy tips across Microsoft apps
-|**App and platform**|**DLP policy tip support**|**Sensitive information types supported**|**Predicates and actions supported**|**Comments**|
+|**App and platform**|**DLP policy tip support**|**Sensitive information types supported**|**Conditions and actions supported**|**Comments**|
|:--|:--|:--|:--|:--|
-|**Outlook On the Web**|:::image type="icon" source="../media/rightmrk.png" border="false":::|Exact Data match SITs|subset||
+|**Outlook On the Web**|:::image type="icon" source="../medi)|
|**Outlook Win32 (ver. 2105 build 14026.20000 and semi-annual channel ver. 2102 build 13801.20862)**|:::image type="icon" source="../media/rightmrk.png" border="false":::|all SITS are supported for E5 users; pre-configured SITs and customer SITs are supported for E3 users|subset|See [Outlook 2013 and later supports showing policy tips for only some conditions](#outlook-2013-and-later-supports-showing-policy-tips-for-only-some-conditions) and [Outlook 2013 and later and Office apps on Desktop support showing policy tips for only some sensitive information types](#outlook-2013-and-later-and-office-apps-on-desktop-support-showing-policy-tips-for-only-some-sensitive-information-types) for details on support for sensitive information types and DLP conditions and actions supported for showing DLP policy tips on Outlook Win32.| |**Outlook Mobile (iOS, Android)/Outlook Mac**|:::image type="icon" source="../media/crsmrk.png" border="false":::|none|none|DLP policy tips aren't supported on Outlook mobile| |**Outlook Mac**|:::image type="icon" source="../media/crsmrk.png" border="false":::|none|none|DLP policy tips are not supported on Outlook for Mac|
compliance Ediscovery Set Up Compliance Boundaries https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-set-up-compliance-boundaries.md
f1.keywords:
Previously updated : 04/10/2023 Last updated : 05/30/2023 audience: Admin
The guidance in this article can be applied when using either Microsoft Purview eDiscovery (Standard) or Microsoft Purview eDiscovery (Premium) to manage investigations.
-Compliance boundaries create logical boundaries within an organization that control the user content locations (such as mailboxes, OneDrive accounts, and SharePoint sites) that eDiscovery managers can search. Also, compliance boundaries control who can access eDiscovery cases used to manage the legal, human resources, or other investigations within your organization. The need for compliance boundaries is often necessary for multi-national corporations that have to respect geographical boarders and regulations and for governments, which are often divided into different agencies. In Microsoft 365, compliance boundaries help you meet these requirements when performing content searches and managing investigations with eDiscovery cases.
+Compliance boundaries create logical boundaries within an organization that control the user content locations (such as mailboxes, OneDrive accounts, and SharePoint sites) that eDiscovery managers can search. Compliance boundaries also control who can access eDiscovery cases used to manage the legal, human resources, or other investigations within your organization.
+
+The need for compliance boundaries is often necessary for multi-national corporations that have to respect geographical boarders and regulations and for governments, which are often divided into different agencies. In Microsoft 365, compliance boundaries help you meet these requirements when performing content searches and managing investigations with eDiscovery cases.
-We use the example in the following illustration to explain how compliance boundaries work.
+We'll use the example in the following illustration to explain how compliance boundaries work.
![Compliance boundaries consist of search permissions filters that control access to agencies and admin role groups that control access to eDiscovery cases.](../media/M365_ComplianceBoundary_OrgChart_v2.png) In this example, Contoso LTD is an organization that consists of two subsidiaries, Fourth Coffee and Coho Winery. The business requires that eDiscovery managers and investigators can only search the Exchange mailboxes, OneDrive accounts, and SharePoint sites in their agency. Also, eDiscovery managers and investigators can only see eDiscovery cases in their agency, and they can only access the cases that they're a member of. Additionally in this scenario, investigators can't place content locations on hold or export content from a case. Here's how compliance boundaries meet these requirements. -- The search permissions filtering functionality for eDiscovery controls the content locations that eDiscovery managers and investigators can search. This means eDiscovery managers and investigators in the Fourth Coffee agency can only search content locations in the Fourth Coffee subsidiary. The same restriction applies to the Coho Winery subsidiary.
+- The search permissions filtering functionality for eDiscovery controls the content locations that eDiscovery managers and investigators can search. This control means eDiscovery managers and investigators in the Fourth Coffee agency can only search content locations in the Fourth Coffee subsidiary. The same restriction applies to the Coho Winery subsidiary.
- [Role groups](ediscovery-assign-permissions.md#rbac-roles-related-to-ediscovery) provide the following functions for compliance boundaries:
- - Control who can see the eDiscovery cases in the Microsoft Purview compliance portal. This means that eDiscovery managers and investigators can only see the eDiscovery cases in their agency.
- - Control who can assign members to an eDiscovery case. This means eDiscovery managers and investigators can only assign members to cases that they themselves are a member of.
+ - Control who can see the eDiscovery cases in the Microsoft Purview compliance portal. This control means that eDiscovery managers and investigators can only see the eDiscovery cases in their agency.
+ - Control who can assign members to an eDiscovery case. This control means eDiscovery managers and investigators can only assign members to cases that they themselves are a member of.
- Control the eDiscovery-related tasks that members can perform by adding or removing roles that assign specific permissions. - When a search permissions filter is applied to a role group, members of the role group can perform the following search-related actions as long as the permissions to perform an action is assigned to the role group:
In this example, Contoso LTD is an organization that consists of two subsidiarie
- Export search results - Purge items returned by a search
-Here's the process for setting up compliance boundaries:
-
-[Step 1: Identify a user attribute to define your agencies](#step-1-identify-a-user-attribute-to-define-your-agencies)
-[Step 2: Create a role group for each agency](#step-2-create-a-role-group-for-each-agency)
-[Step 3: Create a search permissions filter to enforce the compliance boundary](#step-3-create-a-search-permissions-filter-to-enforce-the-compliance-boundary)
-[Step 4: Create an eDiscovery case for an intra-agency investigations](#step-4-create-an-ediscovery-case-for-intra-agency-investigations)
- [!INCLUDE [purview-preview](../includes/purview-preview.md)] ## Before you set up compliance boundaries -- Users must be assigned an Exchange Online license. To verify this, use the [Get-User](/powershell/module/exchange/get-user) cmdlet in Exchange Online PowerShell.
+- Users must be assigned an Exchange Online license. To verify assignments, use the [Get-User](/powershell/module/exchange/get-user) cmdlet in Exchange Online PowerShell.
+
+## Setting up compliance boundaries
-## Step 1: Identify a user attribute to define your agencies
+Here's the steps for setting up compliance boundaries:
+
+- [Step 1: Identify a user attribute to define your agencies](#step-1-identify-a-user-attribute-to-define-your-agencies)
+- [Step 2: Create a role group for each agency](#step-2-create-a-role-group-for-each-agency)
+- [Step 3: Create a search permissions filter to enforce the compliance boundary](#step-3-create-a-search-permissions-filter-to-enforce-the-compliance-boundary)
+- [Step 4: Create an eDiscovery case for an intra-agency investigations](#step-4-create-an-ediscovery-case-for-intra-agency-investigations)
+
+### Step 1: Identify a user attribute to define your agencies
-The first step is to choose an attribute to use that will define your agencies. This attribute is used to create the search permissions filter that limits an eDiscovery manager to search only the content locations of users who are assigned a specific value for this attribute. For example, let's say Contoso decides to use the **Department** attribute. The value for this attribute for users in the Fourth Coffee subsidiary would be `FourthCoffee` and the value for users in Coho Winery subsidiary would be `CohoWinery`. In Step 3, you use this `attribute:value` pair (for example, *Department:FourthCoffee*) to limit the user content locations that eDiscovery managers can search.
+The first step is to choose an attribute to use that will define your agencies. This attribute is used to create the search permissions filter that limits an eDiscovery manager to search only the content locations of users who are assigned a specific value for this attribute. For example, let's say Contoso decides to use the **Department** attribute. The value for this attribute for users in the Fourth Coffee subsidiary would be `FourthCoffee` and the value for users in Coho Winery subsidiary would be `CohoWinery`. In Step 3, you use this `attribute:value` pair (for example, *Department:FourthCoffee*) to limit the user content locations that eDiscovery managers can search.
Here are some examples of user attributes that you can use for compliance boundaries:
Here are some examples of user attributes that you can use for compliance bounda
For a complete list, see the full list of supported [mailbox filters](/powershell/exchange/recipientfilter-properties#filterable-recipient-properties).
-## Step 2: Create a role group for each agency
+### Step 2: Create a role group for each agency
The next step is to create the role groups in the compliance portal that will align with your agencies.
Using the Contoso compliance boundaries scenario, four role groups need to be cr
> [!IMPORTANT] > If a role is added or removed from a role group that you've added as a member of a case, then the role group is automatically removed as a member of the case (or any case the role group is a member of). The reason for this is to protect your organization from inadvertently providing additional permissions to members of a case. If a role group is deleted, it is removed from all cases it was a member of. We recommend that the role groups created for compliance boundaries don't have any roles assigned to them. Use separate built-in/custom role groups to assign roles to members.
-## Step 3: Create a search permissions filter to enforce the compliance boundary
+### Step 3: Create a search permissions filter to enforce the compliance boundary
After you've created role groups for each agency, the next step is to create the search permissions filters that associate each role group to its specific agency and defines the compliance boundary itself. You need to create one search permissions filter for each agency. For more information about creating security permissions filters, see [Configure permissions filtering for Content Search](ediscovery-permissions-filtering-for-content-search.md).
New-ComplianceSecurityFilter -FilterName <name of filter> -Users <role groups> -
Here's a description of each parameter in the command: - `FilterName`: Specifies the name of the filter. Use a name that describes or identifies the agency that the filter is used in.-- `Users`: Specifies the users or groups who get this filter applied to the search actions they perform. For compliance boundaries, this parameter specifies the role groups (that you created in Step 2) in the agency that you're creating the filter for. Note this is a multi-value parameter so you can include one or more role groups, separated by commas.+
+- `Users`: Specifies the users or groups who get this filter applied to the search actions they perform. For compliance boundaries, this parameter specifies the role groups (that you created in Step 2) in the agency that you're creating the filter for. This parameter is a multi-value parameter so you can include one or more role groups, separated by commas.
+ - `Filters`: Specifies the search criteria for the filter. For compliance boundaries, you define the following filters. Each one applies to different content locations. - `Mailbox`: Specifies the mailboxes or OneDrive accounts that the role groups defined in the `Users` parameter can search. This filter allows members of the role group to search only the mailboxes or OneDrive accounts in a specific agency; for example, `"Mailbox_Department -eq 'FourthCoffee'"`.
Here's a description of each parameter in the command:
Here are examples of the two search permissions filters that would be created to support the Contoso compliance boundaries scenario. Both of these examples include a comma-separated filters list, in which the mailbox and site filters are included in the same search permissions filter and are separated by a comma.
-### Fourth Coffee
+#### Fourth Coffee
```powershell New-ComplianceSecurityFilter -FilterName "Fourth Coffee Security Filter" -Users "Fourth Coffee eDiscovery Managers", "Fourth Coffee Investigators" -Filters "Mailbox_Department -eq 'FourthCoffee'", "SiteContent_Path -like 'https://contoso.sharepoint.com/sites/FourthCoffee' -or SiteContent_Path -like 'https://contoso-my.sharepoint.com/personal'" ```
-### Coho Winery
+#### Coho Winery
```powershell New-ComplianceSecurityFilter -FilterName "Coho Winery Security Filter" -Users "Coho Winery eDiscovery Managers", "Coho Winery Investigators" -Filters "Mailbox_Department -eq 'CohoWinery'", "SiteContent_Path -like 'https://contoso.sharepoint.com/sites/CohoWinery' -or SiteContent_Path -like 'https://contoso-my.sharepoint.com/personal'"
New-ComplianceSecurityFilter -FilterName "Coho Winery Security Filter" -Users "C
> [!NOTE] > The syntax for the `Filters` parameters in the previous examples includes a *filters list*. A filters list is a filter that includes a mailbox filter and a site path filter separated by a comma. In the previous example, notice that a comma separates `Mailbox` and `SiteContent` filters: `-Filters "Mailbox_<MailboxPropertyName> -eq '<Value> '", "SiteContent_Path -like '<SharePointURL>' -or SiteContent_Path -like '<OneDriveURL>'"`. When this filter is processed during the running of an eDiscovery search, two search permissions filters are created from the filters list: one mailbox filter and one SharePoint/OneDrive filter. An alternative to using a filters list would be to create two separate search permissions filters for each agency: one search permissions filter for the mailbox attribute and one filter for the SharePoint and OneDrive site attributes. In either case, the results will be the same. Using a filters list or creating separate search permissions filters is a matter of preference.
-### How do the search permissions filters work in this scenario?
+#### How do the search permissions filters work in this scenario?
Here's how the search permission filters are applied for each agency in this scenario.
Here's how the search permission filters are applied for each agency in this sce
3. The search permissions filter is joined to the search query by the **AND** Boolean operator. That means when an eDiscovery manager in one of the agencies runs an eDiscovery search, the items returned by the search must match the search query and the conditions defined in the search permissions filter.
-## Step 4: Create an eDiscovery case for intra-agency investigations
+### Step 4: Create an eDiscovery case for intra-agency investigations
The final step is to create a eDiscovery (Standard) case or eDiscovery (Premium) case in the compliance portal and then add the role group that you created in Step 2 as a member of the case. This results in two important characteristics of using compliance boundaries:
To create a case and assign members:
> [!NOTE] > When adding a role group to a case, you can only add the role groups that you are a member of.
-## Searching and exporting content in Multi-Geo environments
+## Searching and exporting content in multi-geo environments
Search permissions filters also let you control where content is routed for export and which datacenter can be searched when searching content locations in a [SharePoint Multi-Geo environment](../enterprise/multi-geo-capabilities-in-onedrive-and-sharepoint-online-in-microsoft-365.md).
Keep the following things in mind when searching and exporting content in multi-
## Using compliance boundaries for SharePoint hub sites
-[SharePoint hub sites](/sharepoint/dev/features/hub-site/hub-site-overview) often align with the same geographical or agency boundaries that eDiscovery compliance boundaries follow. That means you can use the site ID property of the hub site to create a compliance boundary. To do this, use the [Get-SPOHubSite](/powershell/module/sharepoint-online/get-spohubsite#examples) cmdlet in SharePoint Online PowerShell to obtain the SiteId for the hub site and then use this value for the department ID property to create a search permissions filter.
+[SharePoint hub sites](/sharepoint/dev/features/hub-site/hub-site-overview) often align with the same geographical or agency boundaries that eDiscovery compliance boundaries follow. That means you can use the site ID property of the hub site to create a compliance boundary. To do this, use the [Get-SPOHubSite](/powershell/module/sharepoint-online/get-spohubsite#examples) cmdlet in SharePoint Online PowerShell to obtain the SiteId for the hub site, and then use this value for the department ID property to create a search permissions filter.
Use the following syntax to create a search permissions filter for a SharePoint hub site:
Keep the following limitations in mind when managing eDiscovery cases and invest
- Compliance boundaries don't apply to holds in eDiscovery cases. That means an eDiscovery manager in one agency can place a user in a different agency on hold. However, the compliance boundary will be enforced if the eDiscovery manager searches the content locations of the user who was placed on hold. That means the eDiscovery manager won't be able search the user's content locations, even though they were able to place the user on hold. - If you're assigned a search permissions filter (either a mailbox or a site filter) and you try to export unindexed items for a search that includes all SharePoint sites in your organization, you'll receive the following error message: `Unable to execute the task. Reason: The scope options UnindexedItemsOnly or BothIndexedandUnindexedItems are not allowed when the executing user has a compliance security filter applied`. If you're assigned a search permissions filter and you want to export unindexed items from SharePoint, you'll have to rerun the search and include specific SharePoint sites to search. Otherwise, you'll only be able to export indexed items from a search that includes all SharePoint sites. For more information about the options when you export search results, see [Export Content search results](export-search-results.md#step-1-prepare-search-results-for-export). - Search permissions filters aren't applied to Exchange public folders.
+- Respect for compliance boundaries for OneDrive sites in searches may be impacted when:
+
+ - The sites (or associated mailboxes) are moved or re-homed
+ - OneDrive ownership is re-assigned, or more than one owner is added
+ - The OneDrive site is renamed/re-issued
+
+ Moving a OneDrive site can change the ownership of the content and may include creating an arbitration mailbox. When these resources are moved, there's a chance that content search results may be available across compliance boundaries. When a OneDrive site is re-assigned, re-named or assigned to more than one owner, it's possible that the content from these sites may be available across compliance boundaries.
+
+- Compliance boundaries for mailboxes may be impacted when:
+
+ - The mailbox isn't associated with a licensed user (includes disabled or deleted users)
+ - A mailbox isn't managed or synced from Azure Active Directory
+
+ Additionally, there are several types of mailboxes that may produce content during search, regardless of their compliance boundaries. These mailbox types include:
+
+
+ - EquipmentMailbox
+ - GuestMailUser
+ - LinkedMailbox
+ - RoomList
+ - RoomMailbox
+ - SchedulingMailbox
+ - SharedMailbox
+ - SystemMailbox
+ - TeamMailbox
+
+ To make sure that the search respects your compliance boundaries as expected, you may need to update the permissions and roles for the moved resources.
## More information
compliance Sensitivity Labels Sharepoint Onedrive Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-sharepoint-onedrive-files.md
Now rolling out in preview: For SharePoint, users can also see and apply sensiti
Enabling this feature also results in SharePoint and OneDrive being able to process the contents of Office files that have been encrypted by using a sensitivity label. The label can be applied in Office for the web, or in Office desktop apps and uploaded or saved in SharePoint and OneDrive. Until you enable this feature, these services can't process encrypted files, which means that coauthoring, eDiscovery, Microsoft Purview data loss prevention, search, and other collaborative features won't work for these files.
-After you enable sensitivity labels for Office files in SharePoint and OneDrive, for new and changed files that have a sensitivity label that applies encryption with a cloud-based key (and doesn't use [Double Key Encryption](double-key-encryption.md):
+After you enable sensitivity labels for Office files in SharePoint and OneDrive, for new and changed files that have a sensitivity label that applies encryption with a cloud-based key (and doesn't use [Double Key Encryption](double-key-encryption.md)):
- For Word, Excel, and PowerPoint files, SharePoint and OneDrive recognize the label and can now process the contents of the encrypted file.
enterprise Microsoft 365 U S Government Dod Endpoints https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/microsoft-365-u-s-government-dod-endpoints.md
Title: Office 365 US Government DOD endpoints
Previously updated : 03/01/2023 Last updated : 05/30/2023 audience: ITPro
Office 365 requires connectivity to the Internet. The endpoints below should be
|Notes|Download| |||
-|**Last updated:** 03/01/2023 - ![RSS.](../media/5dc6bb29-25db-4f44-9580-77c735492c4b.png) [Change Log subscription](https://endpoints.office.com/version/USGOVDoD?allversions=true&format=rss&clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7)|**Download:** the full list in [JSON format](https://endpoints.office.com/endpoints/USGOVDoD?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7)|
+|**Last updated:** 05/30/2023 - ![RSS.](../media/5dc6bb29-25db-4f44-9580-77c735492c4b.png) [Change Log subscription](https://endpoints.office.com/version/USGOVDoD?allversions=true&format=rss&clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7)|**Download:** the full list in [JSON format](https://endpoints.office.com/endpoints/USGOVDoD?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7)|
| Start with [Managing Office 365 endpoints](managing-office-365-endpoints.md) to understand our recommendations for managing network connectivity using this data. Endpoints data is updated as needed at the beginning of each month with new IP Addresses and URLs published 30 days in advance of being active. This lets customers who don't yet have automated updates to complete their processes before new connectivity is required. Endpoints may also be updated during the month if needed to address support escalations, security incidents, or other immediate operational requirements. The data shown on this page below is all generated from the REST-based web services. If you're using a script or a network device to access this data, you should go to the [Web service](microsoft-365-ip-web-service.md) directly.
enterprise Microsoft 365 U S Government Gcc High Endpoints https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/microsoft-365-u-s-government-gcc-high-endpoints.md
Title: "Office 365 U.S. Government GCC High endpoints"
Previously updated : 03/01/2023 Last updated : 05/30/2023 audience: ITPro
Office 365 requires connectivity to the Internet. The endpoints below should be
|Notes|Download| |||
-|**Last updated:** 03/01/2023 - ![RSS.](../media/5dc6bb29-25db-4f44-9580-77c735492c4b.png) [Change Log subscription](https://endpoints.office.com/version/USGOVGCCHigh?allversions=true&format=rss&clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7)|**Download:** the full list in [JSON format](https://endpoints.office.com/endpoints/USGOVGCCHigh?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7)|
+|**Last updated:** 05/30/2023 - ![RSS.](../media/5dc6bb29-25db-4f44-9580-77c735492c4b.png) [Change Log subscription](https://endpoints.office.com/version/USGOVGCCHigh?allversions=true&format=rss&clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7)|**Download:** the full list in [JSON format](https://endpoints.office.com/endpoints/USGOVGCCHigh?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7)|
| Start with [Managing Office 365 endpoints](managing-office-365-endpoints.md) to understand our recommendations for managing network connectivity using this data. Endpoints data is updated as needed at the beginning of each month with new IP Addresses and URLs published 30 days in advance of being active. This lets customers who don't yet have automated updates to complete their processes before new connectivity is required. Endpoints may also be updated during the month if needed to address support escalations, security incidents, or other immediate operational requirements. The data shown on this page below is all generated from the REST-based web services. If you're using a script or a network device to access this data, you should go to the [Web service](microsoft-365-ip-web-service.md) directly.
enterprise Urls And Ip Address Ranges 21Vianet https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/urls-and-ip-address-ranges-21vianet.md
Title: "URLs and IP address ranges for Office 365 operated by 21Vianet"
Previously updated : 04/28/2023 Last updated : 05/30/2023 audience: ITPro
hideEdit: true
**Office 365 endpoints:** [Worldwide (including GCC)](urls-and-ip-address-ranges.md) | *Office 365 operated by 21 Vianet* | [Office 365 U.S. Government DoD](microsoft-365-u-s-government-dod-endpoints.md) | [Office 365 U.S. Government GCC High](microsoft-365-u-s-government-gcc-high-endpoints.md) |
-**Last updated:** 04/28/2023 - ![RSS.](../media/5dc6bb29-25db-4f44-9580-77c735492c4b.png) [Change Log subscription](https://endpoints.office.com/version/China?allversions=true&format=rss&clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7)
+**Last updated:** 05/30/2023 - ![RSS.](../media/5dc6bb29-25db-4f44-9580-77c735492c4b.png) [Change Log subscription](https://endpoints.office.com/version/China?allversions=true&format=rss&clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7)
**Download:** all required and optional destinations in one [JSON formatted](https://endpoints.office.com/endpoints/China?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7) list.
enterprise Urls And Ip Address Ranges https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/urls-and-ip-address-ranges.md
Title: "Office 365 URLs and IP address ranges"
Previously updated : 04/28/2023 Last updated : 05/30/2023 audience: Admin
Office 365 requires connectivity to the Internet. The endpoints below should be
|Notes|Download|Use| ||||
-|**Last updated:** 04/28/2023 - ![RSS.](../medi#pacfiles)|
+|**Last updated:** 05/30/2023 - ![RSS.](../medi#pacfiles)|
| Start with [Managing Office 365 endpoints](managing-office-365-endpoints.md) to understand our recommendations for managing network connectivity using this data. Endpoints data is updated as needed at the beginning of each month with new IP Addresses and URLs published 30 days in advance of being active. This cadence allows for customers who don't yet have automated updates to complete their processes before new connectivity is required. Endpoints may also be updated during the month if needed to address support escalations, security incidents, or other immediate operational requirements. The data shown on this page below is all generated from the REST-based web services. If you're using a script or a network device to access this data, you should go to the [Web service](microsoft-365-ip-web-service.md) directly.
includes Microsoft 365 Content Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/microsoft-365-content-updates.md
+## Week of May 22, 2023
++
+| Published On |Topic title | Change |
+|||--|
+| 5/22/2023 | [Working with improvement actions in Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager-improvement-actions?view=o365-worldwide) | modified |
+| 5/22/2023 | [Data Loss Prevention policy tips reference](/microsoft-365/compliance/dlp-policy-tips-reference?view=o365-worldwide) | modified |
+| 5/22/2023 | [Microsoft 365 Network Provider Program](/microsoft-365/enterprise/microsoft-365-networking-partner-program?view=o365-worldwide) | modified |
+| 5/22/2023 | [Microsoft 365 Lighthouse frequently asked questions (FAQs)](/microsoft-365/lighthouse/m365-lighthouse-faq?view=o365-worldwide) | modified |
+| 5/22/2023 | [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](/microsoft-365/security/defender-endpoint/linux-exclusions?view=o365-worldwide) | modified |
+| 5/22/2023 | [What's new in Microsoft Defender for Endpoint on Linux](/microsoft-365/security/defender-endpoint/linux-whatsnew?view=o365-worldwide) | modified |
+| 5/22/2023 | [Configure and validate exclusions for Microsoft Defender for Endpoint on Mac](/microsoft-365/security/defender-endpoint/mac-exclusions?view=o365-worldwide) | modified |
+| 5/22/2023 | [Respond to a compromised connector in Microsoft 365](/microsoft-365/security/office-365-security/connectors-detect-respond-to-compromise?view=o365-worldwide) | modified |
+| 5/22/2023 | [Migrate to Microsoft Defender for Office 365 Phase 3: Onboard](/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-onboard?view=o365-worldwide) | modified |
+| 5/22/2023 | [Migrate to Microsoft Defender for Office 365 Phase 1: Prepare](/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-prepare?view=o365-worldwide) | modified |
+| 5/22/2023 | [Migrate to Microsoft Defender for Office 365 Phase 2: Setup](/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-setup?view=o365-worldwide) | modified |
+| 5/22/2023 | [Responding to a Compromised Email Account](/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account?view=o365-worldwide) | modified |
+| 5/22/2023 | [Safe Documents in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/safe-documents-in-e5-plus-security-about?view=o365-worldwide) | modified |
+| 5/22/2023 | [Microsoft 365 network provider assessments (PREVIEW)](/microsoft-365/enterprise/office-365-network-mac-perf-nppdata?view=o365-worldwide) | added |
+| 5/22/2023 | [Network provider connectivity attribution in the Microsoft 365 Admin Center (PREVIEW)](/microsoft-365/enterprise/office-365-network-mac-perf-nppux?view=o365-worldwide) | added |
+| 5/23/2023 | [Guest access in eDiscovery (Premium) (preview)](/microsoft-365/compliance/ediscovery-guest-access?view=o365-worldwide) | added |
+| 5/23/2023 | [Protect Dev Drive using performance mode](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-antivirus-performance-mode?view=o365-worldwide) | added |
+| 5/23/2023 | [Get started with Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager-setup?view=o365-worldwide) | modified |
+| 5/23/2023 | [Learn about regulations in Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager-templates?view=o365-worldwide) | modified |
+| 5/23/2023 | [Data loss prevention and Microsoft Teams](/microsoft-365/compliance/dlp-microsoft-teams?view=o365-worldwide) | modified |
+| 5/23/2023 | [Learn about optical character recognition in Microsoft Purview (preview)](/microsoft-365/compliance/ocr-learn-about?view=o365-worldwide) | modified |
+| 5/23/2023 | [Manage sensitivity labels in Office apps](/microsoft-365/compliance/sensitivity-labels-office-apps?view=o365-worldwide) | modified |
+| 5/23/2023 | [Microsoft 365 network provider assessments (PREVIEW)](/microsoft-365/enterprise/office-365-network-mac-perf-nppdata?view=o365-worldwide) | modified |
+| 5/23/2023 | [Network provider connectivity attribution in the Microsoft 365 Admin Center (PREVIEW)](/microsoft-365/enterprise/office-365-network-mac-perf-nppux?view=o365-worldwide) | modified |
+| 5/23/2023 | [Set preferences for Microsoft Defender for Endpoint on Mac](/microsoft-365/security/defender-endpoint/mac-preferences?view=o365-worldwide) | modified |
+| 5/23/2023 | [What's new in Microsoft Defender for Endpoint on Mac](/microsoft-365/security/defender-endpoint/mac-whatsnew?view=o365-worldwide) | modified |
+| 5/23/2023 | [Protect macOS security settings with tamper protection](/microsoft-365/security/defender-endpoint/tamperprotection-macos?view=o365-worldwide) | modified |
+| 5/23/2023 | [What's new in Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score-whats-new?view=o365-worldwide) | modified |
+| 5/23/2023 | [What's new in Microsoft Purview risk and compliance solutions](/microsoft-365/compliance/whats-new?view=o365-worldwide) | modified |
+| 5/23/2023 | [Enable attack surface reduction rules](/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction?view=o365-worldwide) | modified |
+| 5/23/2023 | [Configure and review priority account protection in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/priority-accounts-turn-on-priority-account-protection?view=o365-worldwide) | modified |
+| 5/23/2023 | [User tags in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/user-tags-about?view=o365-worldwide) | modified |
+| 5/24/2023 | [Configure endpoint DLP settings](/microsoft-365/compliance/dlp-configure-endpoint-settings?view=o365-worldwide) | modified |
+| 5/24/2023 | [Learn about Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-learn-about?view=o365-worldwide) | modified |
+| 5/24/2023 | [Using Endpoint DLP](/microsoft-365/compliance/endpoint-dlp-using?view=o365-worldwide) | modified |
+| 5/24/2023 | [What's new in Microsoft Purview risk and compliance solutions](/microsoft-365/compliance/whats-new?view=o365-worldwide) | modified |
+| 5/25/2023 | [Create conditional sections for templates in Microsoft Syntex](/microsoft-365/syntex/content-assembly-conditional-sections) | added |
+| 5/25/2023 | [Trainable classifiers definitions](/microsoft-365/compliance/classifier-tc-definitions?view=o365-worldwide) | modified |
+| 5/25/2023 | [Get started with eDiscovery (Standard)](/microsoft-365/compliance/ediscovery-standard-get-started?view=o365-worldwide) | modified |
+| 5/25/2023 | [Built-in protection helps guard against ransomware](/microsoft-365/security/defender-endpoint/built-in-protection?view=o365-worldwide) | modified |
+| 5/25/2023 | [Onboard non-persistent virtual desktop infrastructure (VDI) devices](/microsoft-365/security/defender-endpoint/configure-endpoints-vdi?view=o365-worldwide) | modified |
+| 5/25/2023 | [Enable and configure Microsoft Defender Antivirus always-on protection](/microsoft-365/security/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus?view=o365-worldwide) | modified |
+| 5/25/2023 | [Turn on cloud protection in Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus?view=o365-worldwide) | modified |
+| 5/25/2023 | [Get started with troubleshooting mode in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode?view=o365-worldwide) | modified |
+| 5/25/2023 | [Frequently asked questions (FAQs) on tamper protection](/microsoft-365/security/defender-endpoint/faqs-on-tamper-protection?view=o365-worldwide) | modified |
+| 5/25/2023 | [Manage tamper protection on an individual device](/microsoft-365/security/defender-endpoint/manage-tamper-protection-individual-device?view=o365-worldwide) | modified |
+| 5/25/2023 | [Manage tamper protection for your organization using Microsoft Intune](/microsoft-365/security/defender-endpoint/manage-tamper-protection-intune?view=o365-worldwide) | modified |
+| 5/25/2023 | [Manage tamper protection for your organization using Microsoft 365 Defender](/microsoft-365/security/defender-endpoint/manage-tamper-protection-microsoft-365-defender?view=o365-worldwide) | modified |
+| 5/25/2023 | [Protect security settings with tamper protection](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection?view=o365-worldwide) | modified |
+| 5/25/2023 | [Troubleshoot problems with tamper protection](/microsoft-365/security/defender-endpoint/troubleshoot-problems-with-tamper-protection?view=o365-worldwide) | modified |
+| 5/25/2023 | [Configure Microsoft Defender Antivirus with Group Policy](/microsoft-365/security/defender-endpoint/use-group-policy-microsoft-defender-antivirus?view=o365-worldwide) | modified |
+| 5/25/2023 | [Tenant administration guide for Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-admin-guide?view=o365-worldwide) | added |
+| 5/25/2023 | [Maintain your Microsoft Defender for Business environment](/microsoft-365/security/defender-business/mdb-maintain-environment?view=o365-worldwide) | added |
+| 5/25/2023 | [Security administration guide for Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-security-admin-guide?view=o365-worldwide) | added |
+| 5/25/2023 | [Security operations guide for Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-security-operations-guide?view=o365-worldwide) | added |
+| 5/25/2023 | [Submit files in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/admin-submissions-mde?view=o365-worldwide) | modified |
+| 5/25/2023 | [Audit log activities](/microsoft-365/compliance/audit-log-activities?view=o365-worldwide) | modified |
+| 5/26/2023 | [Report phishing and suspicious emails in Outlook for admins](/microsoft-365/security/office-365-security/submissions-outlook-report-messages?view=o365-worldwide) | modified |
+| 5/26/2023 | [Onboard non-persistent virtual desktop infrastructure (VDI) devices](/microsoft-365/security/defender-endpoint/configure-endpoints-vdi?view=o365-worldwide) | modified |
+| 5/26/2023 | [Microsoft Defender Antivirus security intelligence and product updates](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates?view=o365-worldwide) | modified |
++ ## Week of May 15, 2023
| 4/28/2023 | [Onboard and offboard macOS devices into Compliance solutions using JAMF Pro for Microsoft Defender for Endpoint customers](/microsoft-365/compliance/device-onboarding-offboarding-macos-jamfpro-mde?view=o365-worldwide) | modified | | 4/28/2023 | [Onboard and offboard macOS devices into Microsoft Purview solutions using JAMF Pro](/microsoft-365/compliance/device-onboarding-offboarding-macos-jamfpro?view=o365-worldwide) | modified | | 4/28/2023 | [What's new in Microsoft Purview risk and compliance solutions](/microsoft-365/compliance/whats-new?view=o365-worldwide) | modified |--
-## Week of April 17, 2023
--
-| Published On |Topic title | Change |
-|||--|
-| 4/17/2023 | [Key compliance and security considerations for US banking and capital markets](/microsoft-365/solutions/financial-services-secure-collaboration?view=o365-worldwide) | modified |
-| 4/17/2023 | [Records management for documents and emails in Microsoft 365](/microsoft-365/compliance/records-management?view=o365-worldwide) | modified |
-| 4/17/2023 | [Send email notifications and show policy tips for DLP policies](/microsoft-365/compliance/use-notifications-and-policy-tips?view=o365-worldwide) | modified |
-| 4/17/2023 | Manage Microsoft Defender for Endpoint Plan 1 | removed |
-| 4/18/2023 | [Identify internet-facing devices in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/internet-facing-devices?view=o365-worldwide) | added |
-| 4/18/2023 | [How Microsoft names threat actors](/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide) | added |
-| 4/18/2023 | [Run live response commands on a device](/microsoft-365/security/defender-endpoint/run-live-response?view=o365-worldwide) | modified |
-| 4/18/2023 | How Microsoft names threat actors | removed |
-| 4/18/2023 | [Get started with Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-getting-started?view=o365-worldwide) | modified |
-| 4/18/2023 | [Configure advanced features in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/advanced-features?view=o365-worldwide) | modified |
-| 4/18/2023 | Glossary: Microsoft 365 Business Premium security concepts | removed |
-| 4/18/2023 | [Audit log activities](/microsoft-365/compliance/audit-log-activities?view=o365-worldwide) | modified |
-| 4/18/2023 | [Performance analyzer for Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/tune-performance-defender-antivirus?view=o365-worldwide) | modified |
-| 4/18/2023 | [Configure anti-malware policies](/microsoft-365/security/office-365-security/anti-malware-policies-configure?view=o365-worldwide) | modified |
-| 4/18/2023 | [Configure anti-phishing policies in EOP](/microsoft-365/security/office-365-security/anti-phishing-policies-eop-configure?view=o365-worldwide) | modified |
-| 4/18/2023 | [Configure anti-phishing policies in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/anti-phishing-policies-mdo-configure?view=o365-worldwide) | modified |
-| 4/19/2023 | [Trainable classifiers definitions](/microsoft-365/compliance/classifier-tc-definitions?view=o365-worldwide) | modified |
-| 4/19/2023 | [Create and manage communication compliance policies](/microsoft-365/compliance/communication-compliance-policies?view=o365-worldwide) | modified |
-| 4/19/2023 | [Create a legal hold notice](/microsoft-365/compliance/ediscovery-create-hold-notification?view=o365-worldwide) | modified |
-| 4/19/2023 | [Microsoft Purview setup guides](/microsoft-365/compliance/purview-fast-track-setup-guides?view=o365-worldwide) | modified |
-| 4/19/2023 | [Data Residency for SharePoint Online and OneDrive for Business](/microsoft-365/enterprise/m365-dr-workload-spo?view=o365-worldwide) | modified |
-| 4/19/2023 | [Troubleshooting issues when moving to Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/switch-to-mde-troubleshooting?view=o365-worldwide) | modified |
-| 4/19/2023 | [Configure anti-malware policies](/microsoft-365/security/office-365-security/anti-malware-policies-configure?view=o365-worldwide) | modified |
-| 4/19/2023 | [Configure anti-phishing policies in EOP](/microsoft-365/security/office-365-security/anti-phishing-policies-eop-configure?view=o365-worldwide) | modified |
-| 4/19/2023 | [Configure anti-phishing policies in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/anti-phishing-policies-mdo-configure?view=o365-worldwide) | modified |
-| 4/19/2023 | [Configure spam filter policies](/microsoft-365/security/office-365-security/anti-spam-policies-configure?view=o365-worldwide) | modified |
-| 4/19/2023 | [Configure outbound spam policies](/microsoft-365/security/office-365-security/outbound-spam-policies-configure?view=o365-worldwide) | modified |
-| 4/19/2023 | Change the size of PST files when exporting eDiscovery search results | removed |
-| 4/19/2023 | [Learn about optical character recognition in Microsoft Purview (preview)](/microsoft-365/compliance/ocr-learn-about?view=o365-worldwide) | added |
-| 4/19/2023 | [Work with a partner to archive third-party data](/microsoft-365/compliance/archive-partner-third-party-data?view=o365-worldwide) | modified |
-| 4/19/2023 | [Microsoft Purview extensibility](/microsoft-365/compliance/compliance-extensibility?view=o365-worldwide) | modified |
-| 4/19/2023 | [Get started with insider risk management](/microsoft-365/compliance/insider-risk-management-configure?view=o365-worldwide) | modified |
-| 4/19/2023 | [Get started with privileged access management](/microsoft-365/compliance/privileged-access-management-configuration?view=o365-worldwide) | modified |
-| 4/19/2023 | [Learn about retention policies & labels to retain or delete](/microsoft-365/compliance/retention?view=o365-worldwide) | modified |
-| 4/19/2023 | [What's new in Microsoft Purview risk and compliance solutions](/microsoft-365/compliance/whats-new?view=o365-worldwide) | modified |
-| 4/19/2023 | [Anti-malware protection](/microsoft-365/security/office-365-security/anti-malware-protection-about?view=o365-worldwide) | modified |
-| 4/19/2023 | [End-user notifications for Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-end-user-notifications?view=o365-worldwide) | modified |
-| 4/19/2023 | [Insights and reports Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-insights?view=o365-worldwide) | modified |
-| 4/19/2023 | [Landing pages in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-landing-pages?view=o365-worldwide) | modified |
-| 4/19/2023 | [Login pages in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-login-pages?view=o365-worldwide) | modified |
-| 4/19/2023 | [Payload automations for Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-payload-automations?view=o365-worldwide) | modified |
-| 4/19/2023 | [Payloads in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-payloads?view=o365-worldwide) | modified |
-| 4/19/2023 | [Simulation automations for Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations?view=o365-worldwide) | modified |
-| 4/19/2023 | [Simulate a phishing attack with Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-simulations?view=o365-worldwide) | modified |
-| 4/19/2023 | [Microsoft Teams in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-teams?view=o365-worldwide) | modified |
-| 4/19/2023 | [Training campaigns in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-training-campaigns?view=o365-worldwide) | modified |
-| 4/19/2023 | [Training modules for Training campaigns in Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-training-modules?view=o365-worldwide) | modified |
-| 4/19/2023 | [Configure the default connection filter policy](/microsoft-365/security/office-365-security/connection-filter-policies-configure?view=o365-worldwide) | modified |
-| 4/19/2023 | [Manage quarantined messages and files as an admin](/microsoft-365/security/office-365-security/quarantine-admin-manage-messages-files?view=o365-worldwide) | modified |
-| 4/19/2023 | [Find and release quarantined messages as a user](/microsoft-365/security/office-365-security/quarantine-end-user?view=o365-worldwide) | modified |
-| 4/19/2023 | [Quarantine policies](/microsoft-365/security/office-365-security/quarantine-policies?view=o365-worldwide) | modified |
-| 4/20/2023 | [Remove a former employee - Overview](/microsoft-365/admin/add-users/remove-former-employee?view=o365-worldwide) | modified |
-| 4/20/2023 | [Set an individual user's password to never expire](/microsoft-365/admin/add-users/set-password-to-never-expire?view=o365-worldwide) | modified |
-| 4/20/2023 | [Microsoft 365 Experience insights dashboard](/microsoft-365/admin/misc/experience-insights-dashboard?view=o365-worldwide) | modified |
-| 4/20/2023 | [What's new in the Microsoft 365 admin center?](/microsoft-365/admin/whats-new-in-preview?view=o365-worldwide) | modified |
-| 4/20/2023 | [Learn about retention policies & labels to retain or delete](/microsoft-365/compliance/retention?view=o365-worldwide) | modified |
-| 4/20/2023 | [Set up and configure Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-setup-configuration?view=o365-worldwide) | modified |
-| 4/20/2023 | The simplified configuration process in Microsoft Defender for Business | removed |
-| 4/20/2023 | Use setup wizard in Microsoft Defender for Business | removed |
-| 4/20/2023 | [What's new in Microsoft Defender for Endpoint on Linux](/microsoft-365/security/defender-endpoint/linux-whatsnew?view=o365-worldwide) | modified |
-| 4/20/2023 | [Migrate to Microsoft Defender for Endpoint - Onboard](/microsoft-365/security/defender-endpoint/switch-to-mde-phase-3?view=o365-worldwide) | modified |
-| 4/20/2023 | [How Microsoft names threat actors](/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide) | modified |
-| 4/20/2023 | [Configure spam filter policies](/microsoft-365/security/office-365-security/anti-spam-policies-configure?view=o365-worldwide) | modified |
-| 4/20/2023 | [Configure outbound spam policies](/microsoft-365/security/office-365-security/outbound-spam-policies-configure?view=o365-worldwide) | modified |
-| 4/20/2023 | [Set up Safe Attachments policies in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/safe-attachments-policies-configure?view=o365-worldwide) | modified |
-| 4/20/2023 | [Set up Safe Links policies in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/safe-links-policies-configure?view=o365-worldwide) | modified |
-| 4/20/2023 | [Manage clients for Microsoft Whiteboard in GCC High environments](/microsoft-365/whiteboard/manage-clients-gcc-high?view=o365-worldwide) | modified |
-| 4/20/2023 | [About admin roles in the Microsoft 365 admin center](/microsoft-365/admin/add-users/about-admin-roles?view=o365-worldwide) | modified |
-| 4/20/2023 | [Upgrade Windows devices to Windows 10 or 11 Pro](/microsoft-365/business-premium/m365bp-upgrade-windows-10-pro?view=o365-worldwide) | modified |
-| 4/21/2023 | [Get scan agent by ID](/microsoft-365/security/defender-endpoint/get-agent-details?view=o365-worldwide) | added |
-| 4/21/2023 | [Add, update or delete a scan definition](/microsoft-365/security/defender-endpoint/add-a-new-scan-definition?view=o365-worldwide) | modified |
-| 4/21/2023 | [Authenticated scan methods and properties](/microsoft-365/security/defender-endpoint/get-authenticated-scan-properties?view=o365-worldwide) | modified |
-| 4/21/2023 | [Configure anti-phishing policies in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/anti-phishing-policies-mdo-configure?view=o365-worldwide) | modified |
-| 4/21/2023 | [Configure spam filter policies](/microsoft-365/security/office-365-security/anti-spam-policies-configure?view=o365-worldwide) | modified |
-| 4/21/2023 | [Microsoft recommendations for EOP and Defender for Office 365 security settings](/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365?view=o365-worldwide) | modified |
-| 4/21/2023 | [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-about?view=o365-worldwide) | modified |
-| 4/21/2023 | [Turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-configure?view=o365-worldwide) | modified |
-| 4/21/2023 | [Complete Safe Links overview for Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/safe-links-about?view=o365-worldwide) | modified |
-| 4/21/2023 | [Set up Safe Links policies in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/safe-links-policies-configure?view=o365-worldwide) | modified |
-| 4/21/2023 | [Configure global settings for Safe Links settings in Defender for Office 365](/microsoft-365/security/office-365-security/safe-links-policies-global-settings-configure?view=o365-worldwide) | modified |
-| 4/21/2023 | Microsoft Purview Compliance Manager quickstart guide | removed |
-| 4/21/2023 | Create assessment templates in Microsoft Purview Compliance Manager | removed |
-| 4/21/2023 | Extend assessment templates in Microsoft Purview Compliance Manager | removed |
-| 4/21/2023 | Format assessment template data in Excel for Microsoft Purview Compliance Manager | removed |
-| 4/21/2023 | Modify assessment templates in Microsoft Purview Compliance Manager | removed |
-| 4/21/2023 | [Learn about assessment templates in Microsoft Purview Compliance Manager](/microsoft-365/compliance/compliance-manager-templates?view=o365-worldwide) | modified |
-| 4/21/2023 | [Onboard Windows 10 or Windows 11 devices into Microsoft 365 overview](/microsoft-365/compliance/device-onboarding-overview?view=o365-worldwide) | modified |
-| 4/21/2023 | [Onboard non-Windows devices to the Microsoft Defender for Endpoint service](/microsoft-365/security/defender-endpoint/configure-endpoints-non-windows?view=o365-worldwide) | modified |
includes Office 365 Operated By 21Vianet Endpoints https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/office-365-operated-by-21vianet-endpoints.md
-<!--THIS FILE IS AUTOMATICALLY GENERATED. MANUAL CHANGES WILL BE OVERWRITTEN.-->
+<!--THIS FILE IS AUTOMATICALLY GENERATED. MANUAL CHANGES WILL BE OVERWRITTEN.-->
<!--Please contact the Office 365 Endpoints team with any questions.-->
-<!--China endpoints version 2023042800-->
-<!--File generated 2023-04-28 08:00:07.7632-->
-
-## Exchange Online
+<!--China endpoints version 2023053000-->
+<!--File generated 2023-05-30 08:00:10.8736-->
+
+## Exchange Online
ID | Category | ER | Addresses | Ports -- | -- | -- | -- |
ID | Category | ER | Addresses | Ports
2 | Allow<BR>Required | No | `*.protection.partner.outlook.cn`<BR>`42.159.33.192/27, 42.159.36.0/24, 42.159.161.192/27, 42.159.164.0/24, 139.219.16.0/27, 139.219.17.0/24, 139.219.24.0/22, 139.219.145.0/27, 139.219.146.0/24, 139.219.156.0/22, 2406:e500:4420::/43, 2406:e500:4440::/43, 2406:e500:c020::/44, 2406:e500:c120::/44` | **TCP:** 25, 443, 53, 80 12 | Default<BR>Required | No | `*.partner.outlook.cn, attachments.office365-net.cn` | **TCP:** 443, 80 20 | Allow<BR>Required | No | `*.partner.outlook.cn`<BR>`40.73.132.0/24, 40.73.164.128/25, 40.73.165.0/26, 42.159.40.0/24, 42.159.44.0/22, 42.159.163.128/25, 42.159.165.0/24, 42.159.172.0/22, 2406:e500:4010::/48, 2406:e500:4030::/53, 2406:e500:4030:800::/54, 2406:e500:4040::/53, 2406:e500:4040:800::/54, 2406:e500:4040:1000::/54, 2406:e500:4040:1400::/54, 2406:e500:4110::/48, 2406:e500:4210::/48, 2406:e500:4310::/48` | **TCP:** 587, 993, 995-
-## SharePoint Online and OneDrive for Business
+
+## SharePoint Online and OneDrive for Business
ID | Category | ER | Addresses | Ports | -- | -- | | -
+-- | - | -- | | -
4 | Allow<BR>Required | No | `*.partner.microsoftonline.cn, *.sharepoint.cn`<BR>`40.73.129.0/24, 40.73.161.0/24, 42.159.34.0/27, 42.159.38.0/23, 42.159.162.0/27, 42.159.166.0/23, 2406:e500:4000:2::/63, 2406:e500:4101:2::/64` | **TCP:** 443, 80-
-## Skype for Business Online and Microsoft Teams
+21 | Default<BR>Required | No | `*.wns.windows.com` | **TCP:** 443, 80
+
+## Skype for Business Online and Microsoft Teams
ID | Category | ER | Addresses | Ports -- | -- | -- | -- | - 3 | Optimize<BR>Required | No | `42.159.34.32/27, 42.159.34.64/27, 42.159.34.96/28, 42.159.162.32/27, 42.159.162.64/27, 42.159.162.96/28, 159.27.160.0/21` | **UDP:** 3479, 3480, 3481, 3478 19 | Allow<BR>Required | No | `*.partner.lync.cn, *.teams.microsoftonline.cn`<BR>`40.72.124.128/28, 42.159.34.32/27, 42.159.34.64/27, 42.159.34.96/28, 42.159.162.32/27, 42.159.162.64/27, 42.159.162.96/28, 159.27.160.0/21` | **TCP:** 443, 80-
-## Microsoft 365 Common and Office Online
+
+## Microsoft 365 Common and Office Online
ID | Category | ER | Addresses | Ports | - | -- | -- | -
+-- | - | -- | - | -
6 | Allow<BR>Required | No | `webshell.suite.partner.microsoftonline.cn`<BR>`40.73.248.8/32, 40.73.252.10/32` | **TCP:** 443, 80
-7 | Allow<BR>Required | No | `*.azure-mobile.cn, *.chinacloudapi.cn, *.chinacloudapp.cn, *.chinacloud-mobile.cn, *.chinacloudsites.cn, *.partner.microsoftonline-m.cn, *.partner.microsoftonline-m.net.cn, *.partner.microsoftonline-m-i.cn, *.partner.microsoftonline-m-i.net.cn, *.partner.microsoftonline-p.net.cn, *.partner.microsoftonline-p-i.cn, *.partner.microsoftonline-p-i.net.cn, *.partner.officewebapps.cn, *.windowsazure.cn, portal.partner.microsoftonline.cdnsvc.com, r4.partner.outlook.cn`<BR>`23.236.126.0/24, 42.159.224.122/32, 42.159.233.91/32, 42.159.237.146/32, 42.159.238.120/32, 58.68.168.0/24, 112.25.33.0/24, 123.150.49.0/24, 125.65.247.0/24, 139.217.17.219/32, 139.217.19.156/32, 139.217.21.3/32, 139.217.25.244/32, 171.107.84.0/24, 180.210.232.0/24, 180.210.234.0/24, 209.177.86.0/24, 209.177.90.0/24, 209.177.94.0/24, 222.161.226.0/24` | **TCP:** 443, 80
+7 | Allow<BR>Required | No | `*.azure-mobile.cn, *.chinacloudapi.cn, *.chinacloudapp.cn, *.chinacloud-mobile.cn, *.chinacloudsites.cn, *.partner.microsoftonline-m.cn, *.partner.microsoftonline-m.net.cn, *.partner.microsoftonline-m-i.cn, *.partner.microsoftonline-m-i.net.cn, *.partner.microsoftonline-p.net.cn, *.partner.microsoftonline-p-i.cn, *.partner.microsoftonline-p-i.net.cn, *.partner.officewebapps.cn, *.windowsazure.cn, portal.partner.microsoftonline.cdnsvc.com, r4.partner.outlook.cn`<BR>`23.236.126.0/24, 40.73.240.0/24, 40.73.242.0/24, 42.159.224.122/32, 42.159.233.91/32, 42.159.237.146/32, 42.159.238.120/32, 58.68.168.0/24, 112.25.33.0/24, 123.150.49.0/24, 125.65.247.0/24, 139.217.17.219/32, 139.217.19.156/32, 139.217.21.3/32, 139.217.25.244/32, 171.107.84.0/24, 180.210.232.0/24, 180.210.234.0/24, 209.177.86.0/24, 209.177.90.0/24, 209.177.94.0/24, 222.161.226.0/24, 2406:e500:4900::/48` | **TCP:** 443, 80
8 | Allow<BR>Required | No | `*.onmschina.cn, *.partner.microsoftonline.net.cn, *.partner.microsoftonline-i.cn, *.partner.microsoftonline-i.net.cn, *.partner.office365.cn`<BR>`101.28.252.0/24, 115.231.150.0/24, 123.235.32.0/24, 171.111.154.0/24, 175.6.10.0/24, 180.210.229.0/24, 211.90.28.0/24` | **TCP:** 443, 80 9 | Allow<BR>Required | No | `*.partner.microsoftonline-p.cn`<BR>`42.159.4.68/32, 42.159.4.200/32, 42.159.7.156/32, 42.159.132.138/32, 42.159.133.17/32, 42.159.135.78/32, 182.50.87.0/24` | **TCP:** 443, 80 10 | Allow<BR>Required | No | `*.partner.microsoftonline.cn`<BR>`42.159.4.68/32, 42.159.4.200/32, 42.159.7.156/32, 42.159.132.138/32, 42.159.133.17/32, 42.159.135.78/32, 103.9.8.0/22` | **TCP:** 443, 80
-11 | Allow<BR>Required | No | `*.office.com, activation.sls.microsoft.com, bjb-odcsm.officeapps.partner.office365.cn, bjb-ols.officeapps.partner.office365.cn, bjb-roaming.officeapps.partner.office365.cn, crl.microsoft.com, odc.officeapps.live.com, office15client.microsoft.com, officeclient.microsoft.com, officecdn.microsoft.com, ols.officeapps.partner.office365.cn, osi-prod-bjb01-odcsm.chinacloudapp.cn, osiprod-scus01-odcsm.cloudapp.net, osi-prod-sha01-odcsm.chinacloudapp.cn, roaming.officeapps.partner.office365.cn, sha-odcsm.officeapps.partner.office365.cn, sha-ols.officeapps.partner.office365.cn, sha-roaming.officeapps.partner.office365.cn`<BR>`40.73.248.0/21, 42.159.4.45/32, 42.159.4.50/32, 42.159.4.225/32, 42.159.7.13/32, 42.159.132.73/32, 42.159.132.74/32, 42.159.132.75/32, 65.52.98.231/32, 65.55.69.140/32, 65.55.227.140/32, 70.37.81.47/32, 168.63.252.62/32` | **TCP:** 443, 80
+11 | Allow<BR>Required | No | `activation.sls.microsoft.com, bjb-odcsm.officeapps.partner.office365.cn, bjb-ols.officeapps.partner.office365.cn, bjb-roaming.officeapps.partner.office365.cn, crl.microsoft.com, odc.officeapps.live.com, office15client.microsoft.com, officecdn.microsoft.com, ols.officeapps.partner.office365.cn, osi-prod-bjb01-odcsm.chinacloudapp.cn, osiprod-scus01-odcsm.cloudapp.net, osi-prod-sha01-odcsm.chinacloudapp.cn, roaming.officeapps.partner.office365.cn, sha-odcsm.officeapps.partner.office365.cn, sha-ols.officeapps.partner.office365.cn, sha-roaming.officeapps.partner.office365.cn`<BR>`40.73.248.0/21, 42.159.4.45/32, 42.159.4.50/32, 42.159.4.225/32, 42.159.7.13/32, 42.159.132.73/32, 42.159.132.74/32, 42.159.132.75/32, 65.52.98.231/32, 65.55.69.140/32, 65.55.227.140/32, 70.37.81.47/32, 168.63.252.62/32` | **TCP:** 443, 80
13 | Default<BR>Required | No | `*.msauth.cn, *.msauthimages.cn, *.msftauth.cn, *.msftauthimages.cn, login.microsoftonline.com` | **TCP:** 443, 80 15 | Default<BR>Required | No | `loki.office365.cn` | **TCP:** 443 16 | Default<BR>Required | No | `*.cdn.office.net, shellprod.msocdn.com` | **TCP:** 443
includes Office 365 U.S. Government Dod Endpoints https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/office-365-u.s.-government-dod-endpoints.md
<!--THIS FILE IS AUTOMATICALLY GENERATED. MANUAL CHANGES WILL BE OVERWRITTEN.--> <!--Please contact the Office 365 Endpoints team with any questions.-->
-<!--USGovDoD endpoints version 2023030100-->
-<!--File generated 2023-03-01 08:00:04.6482-->
+<!--USGovDoD endpoints version 2023053000-->
+<!--File generated 2023-05-30 08:00:08.5578-->
## Exchange Online
ID | Category | ER | Addresses | Ports
18 | Default<BR>Required | No | `cdn.odc.officeapps.live.com, mrodevicemgr.officeapps.live.com, odc.officeapps.live.com, officeclient.microsoft.com` | **TCP:** 443, 80 24 | Default<BR>Required | No | `lpcres.delve.office.com` | **TCP:** 443 25 | Default<BR>Required | No | `*.cdn.office.net` | **TCP:** 443
-26 | Allow<BR>Required | Yes | `*.compliance.apps.mil, *.security.apps.mil, compliance.apps.mil, security.apps.mil`<BR>`23.103.191.0/24, 23.103.199.0/25, 23.103.204.0/22, 52.181.167.52/32, 52.181.167.91/32, 52.182.95.219/32, 2001:489a:2202::/62, 2001:489a:2202:8::/62, 2001:489a:2202:2000::/63` | **TCP:** 443, 80
+26 | Allow<BR>Required | Yes | `*.compliance.apps.mil, *.security.apps.mil, compliance.apps.mil, scc.protection.apps.mil, security.apps.mil`<BR>`23.103.204.0/22, 52.127.72.0/21, 52.180.255.219/32, 52.181.166.108/32` | **TCP:** 443, 80
28 | Default<BR>Required | No | `activity.windows.com, dod.activity.windows.us` | **TCP:** 443 29 | Default<BR>Required | No | `dod-mtis.cortana.ai` | **TCP:** 443 30 | Default<BR>Required | No | `*.aadrm.us, *.informationprotection.azure.us` | **TCP:** 443
includes Office 365 U.S. Government Gcc High Endpoints https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/office-365-u.s.-government-gcc-high-endpoints.md
<!--THIS FILE IS AUTOMATICALLY GENERATED. MANUAL CHANGES WILL BE OVERWRITTEN.--> <!--Please contact the Office 365 Endpoints team with any questions.-->
-<!--USGovGCCHigh endpoints version 2023030100-->
-<!--File generated 2023-03-01 08:00:06.0052-->
+<!--USGovGCCHigh endpoints version 2023053000-->
+<!--File generated 2023-05-30 08:00:09.7122-->
## Exchange Online
ID | Category | ER | Addresses | Ports
23 | Default<BR>Required | No | `*.office365.us` | **TCP:** 443, 80 24 | Default<BR>Required | No | `lpcres.delve.office.com` | **TCP:** 443 25 | Default<BR>Required | No | `*.cdn.office.net` | **TCP:** 443
-26 | Allow<BR>Required | Yes | `*.compliance.microsoft.us, *.security.microsoft.us, compliance.microsoft.us, security.microsoft.us`<BR>`13.72.179.197/32, 13.72.183.70/32, 23.103.191.0/24, 23.103.199.128/25, 23.103.208.0/22, 52.227.170.14/32, 52.227.170.120/32, 52.227.178.94/32, 52.227.180.138/32, 52.227.182.149/32, 52.238.74.212/32, 52.244.65.13/32, 2001:489a:2202:4::/62, 2001:489a:2202:c::/62, 2001:489a:2202:2000::/63` | **TCP:** 443, 80
+26 | Allow<BR>Required | Yes | `*.compliance.microsoft.us, *.security.microsoft.us, compliance.microsoft.us, scc.office365.us, security.microsoft.us`<BR>`52.127.240.0/20, 52.227.182.149/32, 52.244.65.13/32` | **TCP:** 443, 80
28 | Default<BR>Required | No | `activity.windows.com, gcc-high.activity.windows.us` | **TCP:** 443 29 | Default<BR>Required | No | `gcch-mtis.cortana.ai` | **TCP:** 443 30 | Default<BR>Required | No | `*.aadrm.us, *.informationprotection.azure.us` | **TCP:** 443
includes Office 365 Worldwide Endpoints https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/office-365-worldwide-endpoints.md
<!--THIS FILE IS AUTOMATICALLY GENERATED. MANUAL CHANGES WILL BE OVERWRITTEN.--> <!--Please contact the Office 365 Endpoints team with any questions.-->
-<!--Worldwide endpoints version 2023042800-->
-<!--File generated 2023-04-28 08:00:06.2024-->
+<!--Worldwide endpoints version 2023053000-->
+<!--File generated 2023-05-30 08:00:07.1339-->
## Exchange Online ID | Category | ER | Addresses | Ports
- | | | -- | --
+-- | - | | - | --
1 | Optimize<BR>Required | Yes | `outlook.office.com, outlook.office365.com`<BR>`13.107.6.152/31, 13.107.18.10/31, 13.107.128.0/22, 23.103.160.0/20, 40.96.0.0/13, 40.104.0.0/15, 52.96.0.0/14, 131.253.33.215/32, 132.245.0.0/16, 150.171.32.0/22, 204.79.197.215/32, 2603:1006::/40, 2603:1016::/36, 2603:1026::/36, 2603:1036::/36, 2603:1046::/36, 2603:1056::/36, 2620:1ec:4::152/128, 2620:1ec:4::153/128, 2620:1ec:c::10/128, 2620:1ec:c::11/128, 2620:1ec:d::10/128, 2620:1ec:d::11/128, 2620:1ec:8f0::/46, 2620:1ec:900::/46, 2620:1ec:a92::152/128, 2620:1ec:a92::153/128` | **TCP:** 443, 80<BR>**UDP:** 443
-2 | Allow<BR>Required | Yes | `smtp.office365.com`<BR>`13.107.6.152/31, 13.107.18.10/31, 13.107.128.0/22, 23.103.160.0/20, 40.96.0.0/13, 40.104.0.0/15, 52.96.0.0/14, 131.253.33.215/32, 132.245.0.0/16, 150.171.32.0/22, 204.79.197.215/32, 2603:1006::/40, 2603:1016::/36, 2603:1026::/36, 2603:1036::/36, 2603:1046::/36, 2603:1056::/36, 2620:1ec:4::152/128, 2620:1ec:4::153/128, 2620:1ec:c::10/128, 2620:1ec:c::11/128, 2620:1ec:d::10/128, 2620:1ec:d::11/128, 2620:1ec:8f0::/46, 2620:1ec:900::/46, 2620:1ec:a92::152/128, 2620:1ec:a92::153/128` | **TCP:** 587
-5 | Allow<BR>Optional<BR>**Notes:** Exchange Online IMAP4 migration | Yes | `*.outlook.office.com, outlook.office365.com`<BR>`13.107.6.152/31, 13.107.18.10/31, 13.107.128.0/22, 23.103.160.0/20, 40.96.0.0/13, 40.104.0.0/15, 52.96.0.0/14, 131.253.33.215/32, 132.245.0.0/16, 150.171.32.0/22, 204.79.197.215/32, 2603:1006::/40, 2603:1016::/36, 2603:1026::/36, 2603:1036::/36, 2603:1046::/36, 2603:1056::/36, 2620:1ec:4::152/128, 2620:1ec:4::153/128, 2620:1ec:c::10/128, 2620:1ec:c::11/128, 2620:1ec:d::10/128, 2620:1ec:d::11/128, 2620:1ec:8f0::/46, 2620:1ec:900::/46, 2620:1ec:a92::152/128, 2620:1ec:a92::153/128` | **TCP:** 143, 993
-6 | Allow<BR>Optional<BR>**Notes:** Exchange Online POP3 migration | Yes | `*.outlook.office.com, outlook.office365.com`<BR>`13.107.6.152/31, 13.107.18.10/31, 13.107.128.0/22, 23.103.160.0/20, 40.96.0.0/13, 40.104.0.0/15, 52.96.0.0/14, 131.253.33.215/32, 132.245.0.0/16, 150.171.32.0/22, 204.79.197.215/32, 2603:1006::/40, 2603:1016::/36, 2603:1026::/36, 2603:1036::/36, 2603:1046::/36, 2603:1056::/36, 2620:1ec:4::152/128, 2620:1ec:4::153/128, 2620:1ec:c::10/128, 2620:1ec:c::11/128, 2620:1ec:d::10/128, 2620:1ec:d::11/128, 2620:1ec:8f0::/46, 2620:1ec:900::/46, 2620:1ec:a92::152/128, 2620:1ec:a92::153/128` | **TCP:** 995
-8 | Default<BR>Required | No | `*.outlook.com` | **TCP:** 443, 80
+2 | Allow<BR>Optional<BR>**Notes:** POP3, IMAP4, SMTP Client traffic | Yes | `*.outlook.office.com, outlook.office365.com, smtp.office365.com`<BR>`13.107.6.152/31, 13.107.18.10/31, 13.107.128.0/22, 23.103.160.0/20, 40.96.0.0/13, 40.104.0.0/15, 52.96.0.0/14, 131.253.33.215/32, 132.245.0.0/16, 150.171.32.0/22, 204.79.197.215/32, 2603:1006::/40, 2603:1016::/36, 2603:1026::/36, 2603:1036::/36, 2603:1046::/36, 2603:1056::/36, 2620:1ec:4::152/128, 2620:1ec:4::153/128, 2620:1ec:c::10/128, 2620:1ec:c::11/128, 2620:1ec:d::10/128, 2620:1ec:d::11/128, 2620:1ec:8f0::/46, 2620:1ec:900::/46, 2620:1ec:a92::152/128, 2620:1ec:a92::153/128` | **TCP:** 587, 993, 995, 143
+8 | Default<BR>Required | No | `*.outlook.com, autodiscover.<tenant>.onmicrosoft.com` | **TCP:** 443, 80
9 | Allow<BR>Required | Yes | `*.protection.outlook.com`<BR>`40.92.0.0/15, 40.107.0.0/16, 52.100.0.0/14, 52.238.78.88/32, 104.47.0.0/17, 2a01:111:f400::/48, 2a01:111:f403::/48` | **TCP:** 443 10 | Allow<BR>Required | Yes | `*.mail.protection.outlook.com`<BR>`40.92.0.0/15, 40.107.0.0/16, 52.100.0.0/14, 104.47.0.0/17, 2a01:111:f400::/48, 2a01:111:f403::/48` | **TCP:** 25
-154 | Default<BR>Required | No | `autodiscover.<tenant>.onmicrosoft.com` | **TCP:** 443, 80
## SharePoint Online and OneDrive for Business
ID | Category | ER | Addresses | Ports
125 | Default<BR>Required | No | `*.entrust.net, *.geotrust.com, *.omniroot.com, *.public-trust.com, *.symcb.com, *.symcd.com, *.verisign.com, *.verisign.net, apps.identrust.com, cacerts.digicert.com, cert.int-x3.letsencrypt.org, crl.globalsign.com, crl.globalsign.net, crl.identrust.com, crl3.digicert.com, crl4.digicert.com, isrg.trustid.ocsp.identrust.com, mscrl.microsoft.com, ocsp.digicert.com, ocsp.globalsign.com, ocsp.msocsp.com, ocsp2.globalsign.com, ocspx.digicert.com, secure.globalsign.com, www.digicert.com, www.microsoft.com` | **TCP:** 443, 80 126 | Default<BR>Optional<BR>**Notes:** Connection to the speech service is required for Office Dictation features. If connectivity is not allowed, Dictation will be disabled. | No | `officespeech.platform.bing.com` | **TCP:** 443 147 | Default<BR>Required | No | `*.office.com, www.microsoft365.com` | **TCP:** 443, 80
-148 | Default<BR>Required | No | `cdnprod.myanalytics.microsoft.com, myanalytics.microsoft.com, myanalytics-gcc.microsoft.com` | **TCP:** 443, 80
152 | Default<BR>Optional<BR>**Notes:** These endpoints enables the Office Scripts functionality in Office clients available through the Automate tab. This feature can also be disabled through the Office 365 Admin portal. | No | `*.microsoftusercontent.com` | **TCP:** 443
-153 | Default<BR>Required | No | `*.azure-apim.net, *.flow.microsoft.com, *.powerapps.com` | **TCP:** 443
+153 | Default<BR>Required | No | `*.azure-apim.net, *.flow.microsoft.com, *.powerapps.com, *.powerautomate.com` | **TCP:** 443
156 | Default<BR>Required | No | `*.activity.windows.com, activity.windows.com` | **TCP:** 443 157 | Default<BR>Required | No | `ocsp.int-x3.letsencrypt.org` | **TCP:** 80 158 | Default<BR>Required | No | `*.cortana.ai` | **TCP:** 443
security Internet Facing Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/internet-facing-devices.md
You can use filters to focus in on internet-facing devices and investigate the r
:::image type="content" source="../../media/defender-endpoint/internet-facing-filter.png" alt-text="Screenshot of the internet-facing filter" lightbox="../../media/defender-endpoint/internet-facing-filter.png":::
+> [!NOTE]
+> If no new events for a device occur for 48 hours, the Internet-facing tag is removed and it will no longer be visible in the Microsoft 365 Defender portal.
+ ## Investigate your internet-facing devices To learn more about an internet-facing device, select the device in the device inventory to open its flyout pane:
security Respond File Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/respond-file-alerts.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security--++ ms.localizationpriority: medium audience: ITPro
search.appverid: met150 Previously updated : 12/18/2020 Last updated : 05/29/2023 # Take response actions on a file
The **Download file** button can have the following states:
Non-Portable Executable file (.txt, .docx, and others) - Global admin or Advanced live response
+ - Tenants with [role-based access (RBAC) permissions](/microsoft-365/security/defender/manage-rbac.md) enabled
:::image type="content" source="images/atp-download-file-action.png" alt-text="The download file action" lightbox="images/atp-download-file-action.png":::
security Respond Machine Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/respond-machine-alerts.md
ms.pagetype: security
ms.localizationpriority: medium Previously updated : 03/16/2023 Last updated : 05/29/2023 audience: ITPro
Depending on the severity of the attack and the sensitivity of the device, you m
> - You must have at least one the following role permissions: 'Active remediation actions'. For more information, see [Create and manage roles](user-roles.md). > - You must have access to the device based on the device group settings. For more information, see [Create and manage device groups](machine-groups.md). > - Exclusion for both macOS and Linux isolation is not supported.
+> - An isolated device is removed from isolation when an administrator modifies or adds a new iptable rule to the isolated device.
+> - Isolating a server running on Microsoft Hyper-V blocks network traffic to all child virtual machines of the server.
This device isolation feature disconnects the compromised device from the network while retaining connectivity to the Defender for Endpoint service, which continues to monitor the device.
security Defender Vulnerability Management Capabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities.md
The table below shows the availability of Defender Vulnerability Management capa
|[Software usages insights](tvm-usage-insights.md)|Γ£ö|Γ£ö| |[Security baselines assessment](tvm-security-baselines.md)|-|Γ£ö| |[Block vulnerable applications](tvm-block-vuln-apps.md)|-|-*|
+|[Browser extensions assessment](tvm-browser-extensions.md)|-|Γ£ö|
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Γ£ö| |[Network share analysis](tvm-network-share-assessment.md)|-|Γ£ö| |[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Γ£ö|
security Device Restart Status https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/device-restart-status.md
+
+ Title: Device restart status
+description: Learn about the device restart status tag in Microsoft Defender Vulnerability Management
++
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
++
+ms.localizationpriority: medium
+
+audience: ITPro
+
+ - m365-security-compliance
+ - tier1
+
+search.appverid: met150
Last updated : 03/04/2022++
+# Device restart status
+
+**Applies to:**
+
+- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)
+- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)
+- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
+- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
++
+Security recommendations in Defender Vulnerability Management can help reduce your overall vulnerability exposure and your exposure score. A robust update process is key when it comes to addressing these recommendations in your organization. If an update hasn't completed for some devices due to a pending restart, the effect of addressing the security recommendation isn't reflected in your exposure score.
+
+The **Pending restart** tag helps you identify devices in this state so you can take action, and it gives you visibility into why some update actions taken aren't being reflected in your exposure score.
+
+> [!NOTE]
+> The tag is currently available for Windows(OS) updates and KB corrections.
+
+> [!TIP]
+> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
+
+## View the device restart status
+
+The device restart status is visible in the following experiences in the Microsoft 365 Defender portal.
+
+### Security recommendations page
+
+On the security recommendations pages, filter by the **Pending restart** tag to only see security recommendations with devices pending a restart.
++
+### Software page
+
+On the software page filter by, the **Pending restart** tag to see missing KBs with devices that are pending a restart:
+++
+## Related articles
+
+- [Security recommendations](tvm-security-recommendation.md)
+- [Vulnerabilities in my organization](tvm-weaknesses.md)
security Advanced Hunting Query Builder Details https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder-details.md
Last updated 08/11/2022
Advanced hunting in guided mode supports several data types that you can use to fine-tune your query. - Numbers<br>
-![Screenshot of numbers as third condition](../../media/guided-hunting/data-numbers.png)
+![Screenshot of numbers as third condition](../../media/guided-hunting/21-numbers.png)
- Strings<br>
-![Screenshot of strings as third condition](../../media/guided-hunting/data-strings.png)
+![Screenshot of strings as third condition](../../media/guided-hunting/21-string.png)
In the free text box, type the value and press **Enter** to add it. Note that the delimiter between values is **Enter**.<br>
- ![Screenshot showing different conditions you can use](../../media/guided-hunting/data-strings-2.png)
+ ![Screenshot showing different conditions you can use](../../media/guided-hunting/23-string2.png)
- Boolean<br>
-![Screenshot of Boolean values as third condition](../../media/guided-hunting/boolean.png)
+![Screenshot of Boolean values as third condition](../../media/guided-hunting/24-boolean.png)
- Datetime<br>
-![Screenshot of datetime values as third condition](../../media/guided-hunting/data-datetime.png)
+![Screenshot of datetime values as third condition](../../media/guided-hunting/25-datetime.png)
- Closed list - You don't need to remember the exact value you are looking for. You can easily choose from a suggested closed list that supports multi-selection.<br>
-![Screenshot of a closed list used as third condition](../../media/guided-hunting/data-closed.png)
+![Screenshot of a closed list used as third condition](../../media/guided-hunting/26-closed.png)
## Use subgroups You can create groups of conditions by clicking **Add subgroup**:
-![Screenshot highlighting Add subgroup button](../../media/guided-hunting/subgroup-1.png)
+![Screenshot highlighting Add subgroup button](../../media/guided-hunting/27-subgroup1.png)
-![Screenshot showing use of subgroups](../../media/guided-hunting/subgroup-2.png)
+![Screenshot showing use of subgroups](../../media/guided-hunting/28-subgroup2.png)
## Use smart auto-complete for search Smart auto-complete for searching devices and user accounts is supported. You don't need to remember the device ID, full device name, or user account name. You can start typing the first few characters of the device or user you are looking for and a suggested list appears from which you can choose what you need:
-![Screenshot showing smart auto-complete support](../../media/guided-hunting/smart-auto.png)
+![Screenshot showing smart auto-complete support](../../media/guided-hunting/29-smart-auto.png)
## Use `EventType` You can even look for specific event types like all failed logons, file modification events, or successful network connections by using the **EventType** filter in any section where it is applicable. For instance, if you want to add a condition that looks for registry value deletions, you can go to the **Registry Events** section and select **EventType**.
-![Screenshot of various EventTypes](../../media/guided-hunting/hunt-specific-events-1.png)
+![Screenshot of various EventTypes](../../media/guided-hunting/30-eventtype1.png)
Selecting EventType under Registry Events allows you to choose from different registry events, including the one you're hunting for, **RegistryValueDeleted**.
-![Screenshot of EventType RegistryValueDeleted](../../media/guided-hunting/hunt-specific-events-2.png)
+![Screenshot of EventType RegistryValueDeleted](../../media/guided-hunting/31-eventtype2.png)
> [!NOTE] >`EventType` is the equivalent of `ActionType` in the data schema, which users of advanced mode might be more familiar with.
Selecting EventType under Registry Events allows you to choose from different re
## Test your query with a smaller sample size If you're still working on your query and would like to see its performance and some sample results quickly, adjust the number of records to return by picking a smaller set through the **Sample size** dropdown menu.
-![Screenshot of sample size dropdown menu](../../media/guided-hunting/smaller-sample.png)
+![Screenshot of sample size dropdown menu](../../media/guided-hunting/32-sample-size.png)
The sample size is set to 10,000 results by default. This is the maximum number of records that can be returned in hunting. However, we highly recommend lowering the sample size to 10 or 100 to quickly test your query as doing so consumes less resources while you are still working on improving the query.
Then, once you finalize your query and are ready to use it to get all the releva
## Switch to advanced mode after building a query You can click on **Edit in KQL** to view the KQL query generated by your selected conditions. Editing in KQL opens a new tab in advanced mode, with the corresponding KQL query:
-![Screenshot highlighting Edit in KQL button](../../media/guided-hunting/switch-to-advanced.png)
+![Screenshot highlighting Edit in KQL button](../../media/guided-hunting/33-edit-kql.png)
-![Screenshot showing same query from guided to advanced](../../media/guided-hunting/switch-to-advanced-2.png)
+![Screenshot showing same query from guided to advanced](../../media/guided-hunting/33-edit-kql-2.png)
In the above example, the selected view is All, therefore you can see that the KQL query searches all tables that have file properties of name and SHA256, and in all the relevant columns covering these properties. If you change the view to **Emails & collaboration**, the query is narrowed down to:
-![Screenshot showing same query from guided to advanced but with limited domain](../../media/guided-hunting/switch-to-advanced-3.png)
+![Screenshot showing same query from guided to advanced but with limited domain](../../media/guided-hunting/34-edit-kql-3.png)
## See also - [Advanced hunting quotas and usage parameters](advanced-hunting-limits.md)
security Advanced Hunting Query Builder Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder-results.md
Last updated 08/11/2022
In hunting using guided mode, the results of the query appear in the **Results** tab.
-[![Screenshot of results tab](../../media/guided-hunting/results-view.png)](../../media/guided-hunting/results-view.png#lightbox)
+![Screenshot of results tab](../../media/guided-hunting/35-query-results.png)
You can work on the results further by exporting them to a CSV file by selecting **Export**. This downloads the CSV file for your use.
To view more columns:
1. Select **Customize columns** in the upper right-hand portion of the results view. 2. From here, select the columns to include in the results view and deselect columns to hide.
- [![Screenshot of list of columns you can add to the results view](../../media/guided-hunting/results-view-customize-columns.png)](../../media/guided-hunting/results-view-customize-columns-tb.png#lightbox)
+ ![Screenshot of list of columns you can add to the results view](../../media/guided-hunting/36-columns.png)
3. Select **Apply** to view results with the added columns. Use the scroll bars if necessary.
security Advanced Hunting Query Builder https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder.md
The analyst can choose which data set to look at and which filters and condition
## Open Query in builder In the **Advanced hunting** page, select **Create new** to open a new query tab and select **Query in builder**.
-![Screenshot of guided mode query builder](../../media/guided-hunting/query-in-builder-page.png)
+![Screenshot of guided mode query builder](../../media/guided-hunting/01-open-query-builder.png)
This brings you to the guided mode, where you can then construct your query by selecting different components using dropdown menus. ## Specify the data domain to hunt in You can control the scope of the hunt by selecting which domain the query covers:
-![Screenshot of guided mode query builder domains dropdown](../../media/guided-hunting/query-builder-view-in.png)
+![Screenshot of guided mode query builder domains dropdown](../../media/guided-hunting/02-specify-domain.png)
Selecting **All** includes data from all domains you currently have access to. Narrowing down to a specific domain allows filters relevant to that domain only.
You can choose from:
By default, guided hunting includes a few basic filters to get you started fast.
-![Screenshot of guided mode query builder basic filter set](../../media/guided-hunting/query-builder-basic-filters.png)
+![Screenshot of guided mode query builder basic filter set](../../media/guided-hunting/03-use-basic-filters.png)
When you choose one data source, for instance, **Endpoints**, the query builder displays only the applicable filter groups. You can then choose a filter you are interested in narrowing down by selecting that filter group, for instance, **EventType**, and selecting the filter of your choice.
-![Screenshot of guided mode query builder endpoint basic filter set](../../media/guided-hunting/query-builder-query-basic-filter.png)
+![Screenshot of guided mode query builder endpoint basic filter set](../../media/guided-hunting/03a-use-basic-filters.png)
Once the query is ready, select the blue **Run query** button. If the button is
## Load sample queries Another quick way to get familiar with guided hunting is to load sample queries using the **Load sample queries** dropdown menu.
-![Screenshot of guided mode query builder load sample queries list](../../media/guided-hunting/load-sample-queries.png)
+![Screenshot of guided mode query builder load sample queries list](../../media/guided-hunting/05-load-sample-queries.png)
> [!NOTE] > Selecting a sample query overrides the existing query. Once the sample query is loaded, select **Run query**.
-![Screenshot of guided mode query builder loaded query](../../media/guided-hunting/load-sample-queries-1.png)
+![Screenshot of guided mode query builder loaded query](../../media/guided-hunting/06-load-sample-queries.png)
If you have previously selected a domain, the list of available sample queries changes accordingly.
-![Screenshot of guided mode query builder restricted list](../../media/guided-hunting/load-sample-queries-2.png)
+![Screenshot of guided mode query builder restricted list](../../media/guided-hunting/07-load-sample-queries.png)
To restore the complete list of sample queries, select **All domains** then reopen **Load sample queries**.
If the loaded sample query uses filters outside of the basic filter set, the tog
To view more filter groups and conditions, select **Toggle to see more filters and conditions**.
-![Screenshot of guided mode query builder more filters toggle](../../media/guided-hunting/query-builder-view-in-endpoints.png)
+![Screenshot of guided mode query builder more filters toggle](../../media/guided-hunting/08-use-more-filters.png)
When the **All filters** toggle is active, you can now use the full range of filters and conditions in guided mode.
-![Screenshot of guided mode query builder all filters active](../../media/guided-hunting/query-builder-all-filters.png)
+![Screenshot of guided mode query builder all filters active](../../media/guided-hunting/09-use-more-filters.png)
When the **All filters** toggle is active, you can now use the full range of fil
To specify a set of data to be used in the query, select **Select a filter**. Explore the different filter sections to find what is available to you.
-![Screenshot showing different filters you can use](../../media/guided-hunting/query-builder-filters.png)
+![Screenshot showing different filters you can use](../../media/guided-hunting/10-create-conditions.png)
Type the section's titles in the search box at the top of the list to find the filter. Sections ending in *info* contain filters that provide information about the different components you can look at and filters for the states of entities. Sections ending in *events* contain filters that allow you to look for any monitored event on the entity. For instance, to hunt for activities involving certain devices, you can use the filters under the **Device events** section.
Type the section's titles in the search box at the top of the list to find the f
Next, set the appropriate condition to further filter the data by selecting it from the second dropdown menu and providing entries in the third dropdown menu if necessary:
-![Screenshot showing different conditions you can use](../../media/guided-hunting/query-builder-operators-equals.png)
+![Screenshot showing different conditions you can use](../../media/guided-hunting/11-create-conditions.png)
You can add more conditions to your query by using **AND**, and **OR** conditions. AND returns results that fulfill all conditions in the query, while OR returns results that fulfill any of the conditions in the query.
-![Screenshot showing AND OR operators](../../media/guided-hunting/query-builder-operators.png)
+![Screenshot showing AND OR operators](../../media/guided-hunting/12-create-conditions.png)
Refining your query allows you to automatically sift through voluminous records to generate a list of results that is already targeted to your specific threat hunting need.
Another way to get familiar with guided hunting is to load sample queries pre-cr
In the **Getting started** section of the hunting page, we have provided three guided query examples that you can load. The query examples contain some of the most common filters and inputs you would typically need in your hunting. Loading any of the three sample queries opens a guided tour of how you would construct the entry using guided mode.
-![Screenshot of guided mode query builder getting started query walkthroughs](../../media/guided-hunting/load-examples.png)
+![Screenshot of guided mode query builder getting started query walkthroughs](../../media/guided-hunting/13-try-sample-query-walkthroughs.png)
Follow the instructions in the blue teaching bubbles to construct your query. Select **Run query**.
Follow the instructions in the blue teaching bubbles to construct your query. Se
### Hunt for successful connections to specific IP To hunt for successful network communications to a specific IP address, start typing "ip" to get suggested filters:
-![Screenshot of guided mode query builder hunt for successful connections to specific IP first filter](../../media/guided-hunting/query-builder-hunt-ip.png)
+![Screenshot of guided mode query builder hunt for successful connections to specific IP first filter](../../media/guided-hunting/14-hunt-for-ips.png)
To look for events involving a specific IP address where the IP is the destination of the communication, select `DestinationIPAddress` under the IP Address Events section. Then select the **equals** operator. Type the IP in the third dropdown menu and press **Enter**:
-![Screenshot of guided mode query builder hunt for successful connections to specific IP](../../media/guided-hunting/query-builder-hunt-ip-2.png)
+![Screenshot of guided mode query builder hunt for successful connections to specific IP](../../media/guided-hunting/15-hunt-for-ips.png)
Then, to add a second condition which searches for successful network communication events, search for the filter of a specific event type:
-![Screenshot of guided mode query builder hunt for successful connections to specific IP, second condition](../../media/guided-hunting/query-builder-hunt-ip-3.png)
+![Screenshot of guided mode query builder hunt for successful connections to specific IP, second condition](../../media/guided-hunting/16-hunt-for-ips.png)
The **EventType** filter looks for the different event types logged. It is equivalent to the **ActionType** column which exists in most of the tables in advanced hunting. Select it to choose one or more event types to filter for. To look for successful network communication events, expand the **DeviceNetworkEvents** section and then choose `ConnectionSuccess`:
-![Screenshot of guided mode query builder hunt for successful connections to specific IP third condition](../../media/guided-hunting/query-builder-hunt-ip-4.png)
+![Screenshot of guided mode query builder hunt for successful connections to specific IP third condition](../../media/guided-hunting/17-hunt-for-ips.png)
Finally, select **Run query** to hunt for all successful network communications to the 52.168.117.170 IP address:
-![Screenshot of guided mode query builder hunt for successful connections to specific IP results view](../../media/guided-hunting/query-builder-hunt-ip-5.png)
+![Screenshot of guided mode query builder hunt for successful connections to specific IP results view](../../media/guided-hunting/18-hunt-for-ips.png)
### Hunt for high confidence phish or spam emails delivered to inbox To look for all high confidence phish and spam emails that were delivered to the inbox folder at the time of delivery, first select **ConfidenceLevel** under Email Events, select **equals** and choose **High** under both **Phish** and **Spam** from the suggested closed list which supports multi-selection:
-![Screenshot of guided mode query builder hunt high confidence phish or spam emails delivered to inbox, first condition](../../media/guided-hunting/hunt-phishing-1.png)
+![Screenshot of guided mode query builder hunt high confidence phish or spam emails delivered to inbox, first condition](../../media/guided-hunting/19-hunt-for-phish.png)
Then, add another condition, this time specifying the folder or **DeliveryLocation, Inbox/folder**.
-![Screenshot of guided mode query builder hunt high confidence phish or spam emails delivered to inbox, second condition](../../media/guided-hunting/hunt-phishing-2.png)
+![Screenshot of guided mode query builder hunt high confidence phish or spam emails delivered to inbox, second condition](../../media/guided-hunting/20-hunt-for-phish.png)
security Investigate Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-alerts.md
search.appverid: - MOE150 - met150 Previously updated : 05/09/2023 Last updated : 05/30/2023 # Investigate alerts in Microsoft 365 Defender
The **Recommendations** tab provides next-step actions and advice for investigat
:::image type="content" source="../../media/investigate-alerts/alerts-ss-alerts-recommendations-example.png" lightbox="../../media/investigate-alerts/alerts-ss-alerts-recommendations-example.png" alt-text="Screenshot of an example of alert recommendations":::
-## Public preview: Tune an alert
-
-> [!IMPORTANT]
-> Some information relates to pre-release feature that might be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+## Tune an alert
As a security operations center (SOC) analyst, one of the top issues is triaging the sheer number of alerts that are triggered daily. An analyst's time is valuable, wanting to focus only on high severity and high priority alerts. Meanwhile, analysts are also required to triage and resolve lower priority alerts, which tends to be a manual process.
security Investigate Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-users.md
This card includes all incidents and alerts, grouped into severities, associated
This card includes the calculated investigation priority score breakdown and a two-week trend for an identity, including whether the identity score is on the high percentile for that tenant.
+### Active directory account control
+
+In this card, Defender for Identity surfaces security settings that may need your attentions. You can see important flags about the user, such as if the user can press enter to bypass the password, and if the user has a password that never expires, etc.
+
+For more information, see [User Account Control flags](/windows/win32/adschema/a-useraccountcontrol).
+ ### Scored activities This card includes all activities and alerts contributing to the overall Investigation priority score over the last seven days.
As needed for in-process incidents, continue your [investigation](investigate-in
+
security Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/whats-new.md
You can also get product updates and important notifications through the [messag
## May 2023 -- (Preview) [Alert tuning](investigate-alerts.md#public-preview-tune-an-alert) is now available in public preview. Alert tuning lets you fine-tune alerts to reduce investigation time and focus on resolving high priority alerts. Alert tuning replaces the Alert suppression feature.
+- (GA) [Alert tuning](investigate-alerts.md#tune-an-alert) is now generally available. Alert tuning lets you fine-tune alerts to reduce investigation time and focus on resolving high priority alerts. Alert tuning replaces the Alert suppression feature.
- (Preview) [Custom functions](advanced-hunting-custom-functions.md) are now available in advanced hunting. You can now create your own custom functions so you can reuse any query logic when you hunt in your environment. ## April 2023
syntex Image Tagging https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/image-tagging.md
Title: Image tagging in Microsoft Syntex--- Previously updated : 09/24/2020
+ Title: Find and manage images using image tagging in Microsoft Syntex
+++ audience: admin+ Last updated : 05/30/2023
- enabler-strategic - m365initiative-syntex ms.localizationpriority: medium-
-description: Learn about image tagging in Microsoft Syntex.
+description: Learn how to use image tagging to search, sort, filter, and manage images in Microsoft Syntex.
-# Image tagging in Microsoft Syntex
+# Find and manage images using image tagging in Microsoft Syntex
+
+Microsoft Syntex makes it easier to find and manage images in SharePoint document libraries. It does this by automatically tagging images with descriptive keywords using AI. These keywords are stored in a managed metadata column (the **Image Tags** column), which makes it easier to search, sort, filter, and manage the images.
+
+The image tagging feature makes it even easier to tag images without any training, thereby reducing the need for manual tagging or custom AI model building. This means you can quickly find images in your libraries and set up processes based on the tags for the images.
+
+> [!NOTE]
+> Syntex image tagger is available on a [pay-as-you-go basis](syntex-pay-as-you-go-services.md) and is not included in the Syntex seat license.
+
+## To enable image tagging in a library
+
+There are two methods you can use to enable image tagging in a document library:
+
+- [Use an existing **Image Tags** column](#use-an-existing-image-tags-column)
+- [Enable the **Image Tags** column](#enable-the-image-tags-column)
+
+### Use an existing Image Tags column
+
+If you already have an [**Image Tags** column in your library](https://support.microsoft.com/office/work-with-image-tags-in-a-sharepoint-library), use these steps to enable enhanced image tagging:
+
+1. On the **Image Tags** column, select **Column settings** > **Edit**.
+
+2. On the **Edit column** panel, in the **Automatically tag images with detected objects** section, toggle the switch to **Yes**.
+
+ ![Screenshot showing the Column settings panel for the Image Tags column.](../media/content-understanding/image-tagger-edit-column-toggle-highlighted.png)
+
+3. Once enabled, any new images uploaded to the library are tagged with the descriptive keywords.
+
+### Enable the Image Tags column
+
+If you don't have an **Image Tags** column in your library, use these steps to enable enhanced image tagging:
+
+1. From the document library, select **Automate** > **Enable image tagger**.
+
+ ![Screenshot showing the Automate menu in a document library.](../media/content-understanding/image-tagger-automate-menu.png)
+
+2. Enhanced image tagging is then activated. Images uploaded are tagged with a set of descriptive keywords. The keywords are available in the **Image Tags** column that is added to the library view.
+
+ ![Screenshot showing the library view with the Image Tags column.](../media/content-understanding/image-tagger-image-tags-column.png)
+
+3. Once the **Image Tags** column is configured, you can upload images. The relevant tags are displayed in the library for each image.
++
+ > [!NOTE]
+ >- **Supported image file types:** .bmp, .png, .gif, .jpeg, .jpg, .tif, .tiff, .ari, .arw, .bay, .cap, .crw, .cr2, .cr3, .dcr, .dcs, .dng, .drf, .eip, .erf, .fff, .heic, .heif, .iiq, .kdc, .k25, .mef, .mos, .mrw, .nef, .nrw, .orf, .pef, .ptx, .pxn, .raf, .raw, .rwl, .rw2, .sr2, .srf, .srw, .x3f, and .3fr.<br>
+ >- **Time taken to reflect tags getting in the **Image Tags** column:** Minimum: 5 minutes, maximum: 24 hours.<br>
+ >- **Existing image processing:** Currently, existing images aren't processed when image tagger is enabled. Any newly uploaded images are processed for automatic image tagging.<br>
+ >- **Responsible AI guidelines:** Send us feedback on the image tagging quality. We monitor feedback closely and take appropriate action based on the feedback.
+++
+<!
+# Set up image tagging in Microsoft Syntex
(Coming soon)
To turn image tagging on or off
6. Click **Save**. ![Screenshot of image tagging control.](../media/content-understanding/sharepoint-syntex-image-tagging-control.png)
+>
syntex Syntex Pay As You Go Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/syntex-pay-as-you-go-services.md
description: Learn about pay-as-you-go services and pricing for Microsoft Syntex
# Pay-as-you-go services and pricing for Microsoft Syntex
-When you use Microsoft Syntex pay-as-you-go, services are billed using Syntex meters in the Azure subscription that you specified when you set up Microsoft Syntex. The table below describes each meter, its pricing, and how it measures usage. When you connect your Azure subscription to Microsoft Syntex, users in your organization will be able to take advantage of Syntex services right away. Your tenant will be billed according to the details shown in this article.
+When you use Microsoft Syntex [pay-as-you-go](syntex-azure-billing.md), services are billed using Syntex meters in the Azure subscription that you specified when you set up Microsoft Syntex. The following table describes each meter, its pricing, and how it measures usage. When you connect your Azure subscription to Microsoft Syntex, users in your organization will be able to take advantage of Syntex services right away. Your tenant will be billed according to the details shown in this article.
|Service|What's counted?|What's billed?| |:-|:--|:-| |Unstructured document processing|The number of pages processed for Word, PDF, or TIFF files; the number of sheets for Excel files; the number of slides for PowerPoint files; or the number of files for other file types. Each of these counts as one transaction. You won't be charged for model training. You will be charged for processing whether or not there's a positive classification, or any entities extracted.<br><br>Processing occurs on document upload and on subsequent updates. Processing is counted for each model applied. For example, if you have two models applied to a library and you upload or update a five-page document in that library, the total pages processed is 10.|$0.10/transaction| |Prebuilt document processing|The number of pages processed for PDF or image files. Each of these counts as one transaction. You won't be charged for model training. You will be charged for processing whether or not there's a positive classification, or any entities extracted.<br><br>Processing occurs on document upload and on subsequent updates. Processing is counted for each model applied. For example, if you have two models applied to a library and you upload or update a five-page document in that library, the total pages processed is 10.|$0.01/transaction|
+|Image tagging |The number of images processed. Each processed image counts as one transaction. You wonΓÇÖt be charged if you only enable pay-as-you-go billing for image tagging. You will be charged only when you enable image tagging on a [document library](image-tagging.md#to-enable-image-tagging-in-a-library). |$0.001/image
## Related topics