Updates from: 05/04/2022 01:13:17
Category Microsoft Docs article Related commit history on GitHub Change details
admin Productivity Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/productivity/productivity-score.md
The details pages are:
- [Microsoft 365 Apps health ΓÇô technology experiences](apps-health.md) - [Endpoint Analytics](/mem/analytics/productivity-score)
-## Business continuity special report
+## Business resilience special report
-The Business continuity report is a limited-time Workplace Intelligence report available to all Microsoft 365 customers to help them guide their organizations during this challenging time.
+The Business resilience report is a limited-time Workplace Intelligence report available to all Microsoft 365 customers to help them guide their organizations during this challenging time.
This report helps organizations understand:
This report helps organizations understand:
- Whether remote meetings support effective decision-making.
-[Learn more about the Business continuity report](/Workplace-Analytics/tutorials/bcrps)
+[Learn more about the Business resilience report](/Workplace-Analytics/tutorials/bcrps)
[Learn more about Microsoft Graph](/graph/)
bookings Create A Manual Booking https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/create-a-manual-booking.md
Bookings can be scheduled and staffed in two different ways. The first way is by
1. In Microsoft 365, select the App launcher, and then select **Bookings**.
- :::image type="content" source="../media/bookings-applauncher.png" alt-text="Bookings in App launcher.":::
- 1. In the navigation pane, select **Calendar** \> **New booking**. ![Image of New booking UI.](../media/bookings-newbooking.png)
bookings Manage Attendees Bookings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/manage-attendees-bookings.md
+
+ Title: "Manage group attendees in Bookings"
+++
+audience: Admin
++
+ms.localizationpriority: medium
+description: "Follow these instructions to create your About Us page, including business name, address, phone number, website URL, logo, and business hours in Microsoft Bookings."
++
+# Manage group attendees in Bookings
+
+Owners and staff members of a Bookings calendar can now manage and update attendees for group services. For more information on service offerings in Bookings, see [Define your service offerings in Bookings](define-service-offerings.md).
+
+Make sure that you set the **Maximum number of attendees** to more than 1 on the Bookings service.
+
+## Update attendee list
+
+> [!NOTE]
+> You must have Administrator or Team member permission before you can update these settings.
+
+1. In Microsoft 365, select the app launcher, and then select **Bookings**.
+
+2. Choose your calendar, select the group meeting and choose **Edit**.
++
+3. To add attendees to the group booking, select **Add customer**.
++
+4. To remove attendees, select the user you want to remove from the group booking and select **Remove customer**. Once you remove the attendee, they'll get an email letting them know that they've been removed from this booking.
+
+## Common issues
+
+- Editing of a group booking service from the Teams app or from the mobile app resets attendees to 1. Use the Bookings web app to edit the group booking service.
+
+- Group bookings doesn't support resource bookings at this time.
compliance Apply Retention Labels Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-retention-labels-automatically.md
When you choose the option for a trainable classifier, you can select one or mor
> [!CAUTION] > We are deprecating the **Offensive Language** pre-trained classifier because it has been producing a high number of false positives. Don't use this classifier and if you are currently using it, we recommend you move your business processes off it and instead use the **Targeted Harassment**, **Profanity**, and **Threat** pre-trained classifiers.
-To automatically apply a label by using this option, SharePoint sites and mailboxes must have at least 10 MB of data.
+To automatically apply a label by using this option, SharePoint sites, as well as mailboxes, must have at least 10 MB of data.
For more information about trainable classifiers, see [Learn about trainable classifiers](classifier-learn-about.md).
compliance Compliance Easy Trials Compliance Manager Assessments https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials-compliance-manager-assessments.md
Your licensing agreement to use Compliance Manager may include one or more built
## Terms and conditions
-See the [terms and conditions](terms-conditions.md) for Microsoft Purview trials.
+See the [terms and conditions](/legal/microsoft-365/microsoft-365-trial) for Microsoft 365 trials.
## Set up a premium assessment trial
compliance Compliance Easy Trials https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials.md
The Microsoft Purview solutions trial is the easiest way to try all the capabili
## Terms and conditions
-See the [terms and conditions](terms-conditions.md) for Microsoft Purview trials.
+See the [terms and conditions](/legal/microsoft-365/microsoft-365-trial) for Microsoft 365 trials.
## Eligibility
compliance Create Apply Retention Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-apply-retention-labels.md
To edit an existing retention label policy (the policy type is **Publish**), sel
If you publish retention labels to SharePoint or OneDrive, those labels typically appear for users to select within one day. However, allow up to seven days.
-If you publish retention labels to Exchange, it can take up to seven days for those retention labels to appear for users, and the mailbox must contain at least 10 MB of data.
+If you publish retention labels to Exchange, it can take up to seven days for those retention labels to appear for users. As with all retention settings for Exchange, the mailbox must contain at least 10 MB of data.
![Diagram of when published labels take effect.](../media/retention-labels-published-timings.png)
compliance Ome Advanced Expiration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ome-advanced-expiration.md
[!include[Purview banner](../includes/purview-rebrand-banner.md)]
-Microsoft Purview Advanced Message Encryption is included in [Microsoft 365 Enterprise E5](https://www.microsoft.com/microsoft-365/enterprise/home), Office 365 E5, Microsoft 365 E5 (Nonprofit Staff Pricing), Office 365 Enterprise E5 (Nonprofit Staff Pricing), and Office 365 Education A5. If your organization has a subscription that does not include Microsoft Purview Advanced Message Encryption, you can purchase it with the Microsoft 365 E5 Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), or the Office 365 Advanced Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), or Office 365 SKUs.
+Microsoft Purview Advanced Message Encryption is included in [Microsoft 365 Enterprise E5](https://www.microsoft.com/microsoft-365/enterprise/home), Office 365 E5, Microsoft 365 E5 (Nonprofit Staff Pricing), Office 365 Enterprise E5 (Nonprofit Staff Pricing), and Office 365 Education A5. Microsoft 365 E5 Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), or the Office 365 Advanced Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), or Office 365 SKUs.
+
+If your organization has a subscription that does not include Microsoft Purview Advanced Message Encryption, you can purchase it with the Microsoft 365 E5 Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), or the Office 365 Advanced Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), or Office 365 SKUs.
You can use message expiration on emails that your users send to external recipients who use the OME Portal to access encrypted emails. You force recipients to use the OME portal to view and reply to encrypted emails sent by your organization by using a custom branded template that specifies an expiration date in Windows PowerShell.
compliance Partially Indexed Items In Content Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/partially-indexed-items-in-content-search.md
For a list of indexing limits for SharePoint documents, see [Search limits for S
- Although a file type is supported for indexing and is indexed, there can be indexing or search errors that will cause a file to be returned as a partially indexed item. For example, searching a large Excel file might be partially successful (because the first 4 MB are indexed), but then fails because the file size limit is exceeded. In this case, it's possible that the same file is returned with the search results and as a partially indexed item. -- Files that are encrypted with [Microsoft encryption technologies](encryption.md) and are attached to an email message that matches the criteria of a search can be previewed and will be decrypted when exported. At this time, files that are encrypted with Microsoft encryption technologies (and stored in SharePoint or OneDrive for Business) are partially indexed.
+- Files that are encrypted with [Microsoft encryption technologies](encryption.md) and are attached to an email message that matches the criteria of a search can be previewed and will be decrypted when exported. At this time, files that are encrypted with Microsoft encryption technologies (and stored in SharePoint or OneDrive for Business) are partially indexed.
+
+ > [!NOTE]
+ > Files encrypted using sensitivity labels will not be decrypted.
- Email messages encrypted with S/MIME are partially indexed. This includes encrypted messages with or without file attachments.
compliance Retention Policies Exchange https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-exchange.md
Contacts, and any tasks and calendar items that don't have an end date are not s
Other items stored in a mailbox, such as Skype and Teams messages, aren't included in retention policies or labels for Exchange. These items have their own retention policies.
+Mailboxes must have at least 10 MB of data before retention settings will apply to them, and retention labels can be published to them.
+ ## How retention works for Exchange Both a mailbox and a public folder use the [Recoverable Items folder](/exchange/security-and-compliance/recoverable-items-folder/recoverable-items-folder) to retain items. Only people who have been assigned eDiscovery permissions can view items in another user's Recoverable Items folder.
compliance Retention Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-settings.md
Locations in policies for retention identify specific Microsoft 365 services tha
### Configuration information for Exchange email and Exchange public folders
+Both the **Exchange email** location and the **Exchange public folders** location require mailboxes to have at least 10 MB of data before retention settings will apply to them.
+ The **Exchange email** location supports retention for users' email, calendar, and other mailbox items, by applying retention settings at the level of a mailbox. Shared mailboxes are also supported. Resource mailboxes, contacts, and Microsoft 365 group mailboxes aren't supported for Exchange email. For Microsoft 365 group mailboxes, select the **Microsoft 365 Groups** location instead. Although the Exchange location initially allows a group mailbox to be selected for a static scope, when you try to save the retention policy, you receive an error that "RemoteGroupMailbox" is not a valid selection for this location.
When you configure a policy for retention that uses adaptive policy scopes and s
To retain or delete content for a Microsoft 365 group (formerly Office 365 group), use the **Microsoft 365 Groups** location. For retention policies, this location includes the group mailbox and SharePoint teams site. For retention labels, this location includes the SharePoint teams site only.
+Mailboxes that you target with this policy location require at least 10 MB of data before retention settings will apply to them.
+ > [!NOTE] > Even though a Microsoft 365 group has an Exchange mailbox, a retention policy for the **Exchange email** location won't include content in Microsoft 365 group mailboxes.
compliance Revoke Ome Encrypted Mail https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/revoke-ome-encrypted-mail.md
audience: Admin
ms.localizationpriority: medium Previously updated : 03/04/2022 Last updated : 05/02/2022 - Strat_O365_IP - M365-security-compliance
description: "As an administrator and as a message sender, you can revoke certai
[!include[Purview banner](../includes/purview-rebrand-banner.md)]
-Email revocation is offered as part of Microsoft Purview Advanced Message Encryption. Microsoft Purview Advanced Message Encryption is included in [Microsoft 365 Enterprise E5](https://www.microsoft.com/microsoft-365/enterprise/home), Office 365 E5, Microsoft 365 E5 (Nonprofit Staff Pricing), Office 365 Enterprise E5 (Nonprofit Staff Pricing), and Office 365 Education A5. If your organization has a subscription that does not include Microsoft Purview Advanced Message Encryption, you can purchase it with the Microsoft 365 E5 Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), or the Office 365 Advanced Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), or Office 365 SKUs.
+Email revocation is offered as part of Microsoft Purview Advanced Message Encryption. Microsoft Purview Advanced Message Encryption is included in [Microsoft 365 Enterprise E5](https://www.microsoft.com/microsoft-365/enterprise/home), Office 365 E5, Microsoft 365 E5 (Nonprofit Staff Pricing), Office 365 Enterprise E5 (Nonprofit Staff Pricing), and Office 365 Education A5. To use the Advanced Message Encryption revocation and expiration functions, enable the **Premium Encryption in Office 365** option in your E5 license.
+
+If your organization has a subscription that does not include Microsoft Purview Advanced Message Encryption, you can purchase it with the Microsoft 365 E5 Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), or the Office 365 Advanced Compliance SKU add-on for Microsoft 365 E3, Microsoft 365 E3 (Nonprofit Staff Pricing), or Office 365 SKUs.
This article is part of a larger series of articles about [Office 365 Message Encryption](ome.md).
compliance Terms Conditions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/terms-conditions.md
- Title: "Microsoft Purview trial terms and conditions"-- NOCSH-------- MOE150-- MET150
-description: "Microsoft Purview trial terms and conditions."
--
-# Microsoft 365 trial terms and conditions
--
-By participating in [the free trial (ΓÇ£TrialΓÇ¥) of the Microsoft Purview solutions](compliance-easy-trials.md), you agree to be bound by our [Product Terms](https://go.microsoft.com/fwlink/?linkid=2108910) and the following terms (ΓÇ£Trial TermsΓÇ¥), provided that in the event of a conflict the Trial Terms shall govern. The Trial period will be for ninety (90) days from the date you activate the Trial. Unless you purchase a subscription to Microsoft Purview prior to the expiration or termination of your Trial period, you will no longer have access to (i) any data related to the features of the Trial that you entered into your account, and (ii) configurations or customizations made by you or for you using the features of the Trial. Microsoft reserves the right to terminate or modify the Trial and/or these Trial Terms at any time without prior notice and without liability. Trial offer is not available for customers in all regions and countries.
enterprise Setup Guides For Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/setup-guides-for-microsoft-365.md
The solutions in this guide will help you gain visibility into user activities,
* With the communication compliance solution, you can identify and act on communication risks for items like workplace violence, insider trading, harassment, code of conduct, and regulatory compliance violations. * The insider risk management solution helps you identify, investigate, and take action on risks for intellectual property theft, sensitive data leaks, security violations, data spillage, and confidentiality violations.
-### Information protection setup guide
+### Microsoft Purview Information Protection setup guide
-Get an overview of the capabilities you can apply to your information protection strategy so you can be confident your sensitive information is protected. Use a four-stage lifecycle approach in which you discover, classify, protect, and monitor sensitive information. The [Microsoft information protection setup guide](https://aka.ms/mipsetupguide) provides guidance for completing each of these stages.
+Get an overview of the capabilities you can apply to your information protection strategy so you can be confident your sensitive information is protected. Use a four-stage lifecycle approach in which you discover, classify, protect, and monitor sensitive information. The [Microsoft Purview Information Protection setup guide](https://aka.ms/microsoftpurviewinformationprotectionsetupguide) provides guidance for completing each of these stages.
-### Data lifecycle management setup guide
+### Microsoft Purview Data Lifecycle Management setup guide
-The [Microsoft information governance setup guide](https://aka.ms/migsetupguide) provides you with the information you'll need to set up and manage your organization's governance strategy, to ensure that your data is classified and managed according to the specific lifecycle guidelines you set. With this guide, you'll learn how to create, auto-apply, or publish labels, label policies, and retention policies that are applied to your organization's reusable content and compliance records. You'll also get information on importing CSV files with a file plan for bulk scenarios or for applying them manually to individual documents.
+The [Microsoft Purview Data Lifecycle Management setup guide](https://aka.ms/migsetupguide) provides you with the information you'll need to set up and manage your organization's governance strategy, to ensure that your data is classified and managed according to the specific lifecycle guidelines you set. With this guide, you'll learn how to create, auto-apply, or publish retention labels, retention label policies, and retention policies that are applied to your organization's content and compliance records. You'll also get information on importing CSV files with a file plan for bulk scenarios or for applying them manually to individual documents.
### Microsoft Defender for Cloud Apps setup guide
includes Security Config Mgt Prerequisites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/security-config-mgt-prerequisites.md
To support Microsoft Defender for Endpoint security configuration management thr
1. Sign in to [Microsoft 365 Defender portal](https://security.microsoft.com/) and go to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope** and enable the platforms for security settings management:
- :::image type="content" source="../medie-settings-management-defender.png" alt-text="Enable Microsoft Defender for Endpoint settings management in the Defender console.":::
+ :::image type="content" source="../media/security-settings-mgt.png" alt-text="Enable Microsoft Defender for Endpoint settings management in the Defender console.":::
+
+ >[!NOTE]
+ >To granularly control the scope of endpoints managed via MDE settings management, consider using **Pilot Mode**.
2. Make sure the relevant users have permissions to manage endpoint security settings in Microsoft Endpoint Manager or grant those permissions by configuring a role in the Defender portal. Go to **Settings** > **Roles** > **Add item**:
Microsoft Defender for Endpoint supports several options to onboard devices. For
## Co-existence with Microsoft Endpoint Configuration Manager
-When using Configuration Manager, the best path for management of security policy is using the [Configuration Manager tenant attach](/mem/configmgr/tenant-attach/endpoint-security-get-started). In some environments it may be desired to use Security Management for Microsoft Defender. When using Security Management for Microsoft Defender with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels will create the opportunity for conflicts and undesired results.
+In some environments it may be desired to use Security Management for Microsoft Defender in conjunction with Configuration Manager.
+This is possible by disabling the **Manage Security settings using Configuration Manager** toggle in the **Settings page** (Settings > Endpoints > Configuration Management > Enforcement Scope):
++
+>[!NOTE]
+>When using Security Management for Microsoft Defender for Endpoint with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels may cause conflicts and undesired results.
## Create Azure AD Groups
lighthouse M365 Lighthouse Configure Portal Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-configure-portal-security.md
MSPs may use risk-based Conditional Access to make sure their staff members prov
## Related content [Password reset permissions](/azure/active-directory/roles/permissions-reference#password-reset-permissions) (article)\
+[Overview of permissions in Microsoft 365 Lighthouse](m365-lighthouse-overview-of-permissions.md) (article)\
+[View your Azure Active Directory roles in Microsoft 365 Lighthouse](m365-lighthouse-view-your-roles.md) (article)\
[Requirements for Microsoft 365 Lighthouse](m365-lighthouse-requirements.md) (article)\ [Overview of Microsoft 365 Lighthouse](m365-lighthouse-overview.md) (article)\ [Sign up for Microsoft 365 Lighthouse](m365-lighthouse-sign-up.md) (article)\
lighthouse M365 Lighthouse Overview Of Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-overview-of-permissions.md
For certain actions in Lighthouse, role assignments in the partner tenant are re
[Requirements for Microsoft 365 Lighthouse](m365-lighthouse-requirements.md) (article) [Delegated administration privileges (DAP) FAQ](/partner-center/dap-faq) (article)
+[View your Azure Active Directory roles in Microsoft 365 Lighthouse](m365-lighthouse-view-your-roles.md) (article)
[Assign roles and permissions to users](/partner-center/permissions-overview) (article) [Overview of Microsoft 365 Lighthouse](m365-lighthouse-overview.md) (article) [Sign up for Microsoft 365 Lighthouse](m365-lighthouse-sign-up.md) (article)
lighthouse M365 Lighthouse Review Audit Logs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-review-audit-logs.md
If you need more information, use Microsoft Graph API to access more audit event
## Related content
-[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
+[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)\
+[View your Azure Active Directory roles in Microsoft 365 Lighthouse](m365-lighthouse-view-your-roles.md) (article)
lighthouse M365 Lighthouse Troubleshoot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-troubleshoot.md
audience: Admin-+ ms.prod: microsoft-365-lighthouse ms.localizationpriority: medium
lighthouse M365 Lighthouse View Service Health https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-view-service-health.md
On the **Tenants affected** tab, you can export a list of affected tenants to a
## Related content [How to check Microsoft 365 service health](/microsoft-365/enterprise/view-service-health) (article)\
-[Known issues with Microsoft 365 Lighthouse](m365-lighthouse-known-issues.md) (article)
+[Known issues with Microsoft 365 Lighthouse](m365-lighthouse-known-issues.md) (article)\
+[View your Azure Active Directory roles in Microsoft 365 Lighthouse](m365-lighthouse-view-your-roles.md) (article)
lighthouse M365 Lighthouse View Your Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-view-your-roles.md
+
+ Title: "View your Azure Active Directory roles in Microsoft 365 Lighthouse"
+f1.keywords: NOCSH
+++
+audience: Admin
+
+ms.localizationpriority: medium
+
+- M365-subscription-management
+- Adm_O365
+
+- AdminSurgePortfolib
+- M365-Lighthouse
+search.appverid: MET150
+description: "For Managed Service Provider (MSP) technicians using Microsoft 365 Lighthouse, learn how to view your Azure Active Directory (Azure AD) roles across the different customer tenants that your organization manages."
++
+# View your Azure Active Directory roles in Microsoft 365 Lighthouse
+
+This article provides instructions for how to view your Azure Active Directory (Azure AD) roles across the different customer tenants that your organization manages. Your role determines which actions you can perform in Lighthouse.
+
+## Before you begin
+
+You must have access to a partner tenant that has onboarded to the Microsoft 365 Lighthouse service.
+
+## View your roles
+
+1. In the left navigation pane in Lighthouse, select **Tenants**.
+
+2. From the tenant list, select any tenant name to open the tenant's **Overview** page.
+
+3. Next to **Roles**, select the link indicating the number of roles you hold in the tenant. The **Roles** page opens.
+
+ If you hold one or more roles in a customer tenant, you'll see a green checkmark in the **Enabled** column for that tenant, along with the number of roles you hold. If you don't hold any roles in a tenant, you'll see a red **X**.
+
+4. For customer tenants with a green checkmark next to them, expand the tenant to see the list of roles you hold in that tenant. For more information about Azure AD roles and the permissions they grant, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference).
+
+ The **Roles** page also shows any custom tags that have been applied to your tenants. You can filter the data on the page by assigned roles or tags.
+
+## Next steps
+
+If you don't have permission to perform an action that you need to perform in Lighthouse, reach out to an admin in your partner tenant who can assign you the appropriate role for the action you're trying to perform.
+
+## Related content
+
+[Overview of permissions in Microsoft 365 Lighthouse](m365-lighthouse-overview-of-permissions.md) (article)\
+[Manage your tenant list in Microsoft 365 Lighthouse](m365-lighthouse-manage-tenant-list.md) (article)
security Gov https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/gov.md
These are the features and known gaps for [Mobile Threat Defense (Microsoft Defe
|Conditional Access/Conditional Launch|![Yes](images/svg/check-yes.svg)|![Yes](images/svg/check-yes.svg)|![Yes](images/svg/check-yes.svg)| |Support for MAM|![Yes](images/svg/check-yes.svg)|![Yes](images/svg/check-yes.svg)|![Yes](images/svg/check-yes.svg)| |Privacy Controls|![Yes](images/svg/check-yes.svg)|![Yes](images/svg/check-yes.svg)|![Yes](images/svg/check-yes.svg)|
-|Threat and Vulnerability Management (TVM)|![No](images/svg/check-no.svg) In development|![No](images/svg/check-no.svg) In development|![No](images/svg/check-no.svg) In development|
+|Threat and Vulnerability Management (TVM)|![Yes](images/svg/check-yes.svg)|![Yes](images/svg/check-yes.svg)|![Yes](images/svg/check-yes.svg)|
security Ios Install https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-install.md
For unsupervised devices, a VPN is used in order to provide the Web Protection f
Admins can configure auto-setup of VPN profile. This will automatically setup the Defender for Endpoint VPN profile without having the user to do so while onboarding.
-This step simplifies the onboarding process by setting up the VPN profile. For a zero-touch or silent onboarding experience, see the next section: [Zero-touch onboard](#zero-touch-onboarding-of-microsoft-defender-for-endpoint-preview).
+This step simplifies the onboarding process by setting up the VPN profile. For a zero-touch or silent onboarding experience, see the next section: [Zero-touch onboard](#zero-touch-onboarding-of-microsoft-defender-for-endpoint).
1. In [Microsoft Endpoint manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** -> **Configuration Profiles** -> **Create Profile**. 1. Choose **Platform** as **iOS/iPadOS** and **Profile type** as **VPN**. Click **Create**.
This step simplifies the onboarding process by setting up the VPN profile. For a
1. Click Next and assign the profile to targeted users. 1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**.
-## Zero-touch onboarding of Microsoft Defender for Endpoint (Preview)
+## Zero-touch onboarding of Microsoft Defender for Endpoint
+
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
> [!NOTE] > Zero-touch cannot be configured on iOS devices that are enrolled without user affinity (user-less devices or shared devices).
security Ios Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-whatsnew.md
ms.technology: mde
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink) +
+## Integration with Tunnel
+Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. Integration with Tunnel provides a simpler, secure VPN experience on iOS with just one app. This feature was earlier available only on Android. For more details, [see the techcommunity post here](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/what-s-new-in-microsoft-endpoint-manager-2204-april-edition/ba-p/3297995)
+ ## Improved experience on supervised iOS devices Microsoft Defender for Endpoint on iOS now has specialized ability on supervised iOS/iPadOS devices, given the increased management capabilities provided by the platform on these types of devices. It can also provide Web Protection **without setting up a local VPN on the device**. This gives end-users a seamless experience while still being protected from phishing and other web-based attacks. For details, visit [this documentation](ios-install.md#complete-deployment-for-supervised-devices)
Microsoft Defender for Endpoint is now available as **Microsoft Defender** in th
On January 25, 2022, we announced the general availability of Threat and Vulnerability management on Android and iOS. For more details, see [the techcommunity post here](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-general-availability-of-vulnerability-management/ba-p/3071663). +
+## 1.1.28250101
+- **Integration with Tunnel** - Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. For more information, see [Microsft Tunnel Overview](/mem/intune/protect/microsoft-tunnel-overview).
+- **Zero-touch onboard for enrolled iOS devices** enrolled through Microsoft Endpoint Manager (Intune) is generally available. For more information, see [Zero touch onboarding of Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/ios-install#zero-touch-onboarding-of-microsoft-defender-for-endpoint).
+- Bug fixes.
++ ## 1.1.24210103 - Resolved internet connectivity issues on supervised devices. For more information, see [Deploy Defender for Endpoint on enrolled iOS devices](ios-install.md).
On January 25, 2022, we announced the general availability of Threat and Vulnera
## 1.1.23250104 - Performance optimizations - Test battery performance with this version and let us know your feedback.-- **Zero-touch onboard for enrolled iOS devices** - With this version, the preview of Zero-touch onboard for devices enrolled through Microsoft Endpoint Manager (Intune) has been added. For more information, see this [documentation](ios-install.md#zero-touch-onboarding-of-microsoft-defender-for-endpoint-preview) for more details on setup and configuration.
+- **Zero-touch onboard for enrolled iOS devices** - With this version, the preview of Zero-touch onboard for devices enrolled through Microsoft Endpoint Manager (Intune) has been added. For more information, see this [documentation](ios-install.md#zero-touch-onboarding-of-microsoft-defender-for-endpoint) for more details on setup and configuration.
- **Privacy Controls** - Configure privacy controls for phish alert report. For more information, see [Configure iOS features](ios-configure-features.md). ## 1.1.23010101
security Mtd https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mtd.md
Microsoft Defender for Endpoint on Android and iOS provides the below key capabi
|Unified alerting|Alerts from all platforms in the unified M365 security console| |Conditional Access, Conditional launch|Blocking risky devices from accessing corporate resources. Defender for Endpoint risk signals can also be added to app protection policies (MAM)| |Privacy Controls. In preview (see note below)|Configure privacy in the threat reports by controlling the data sent by Microsoft Defender for Endpoint. *Note that privacy controls are currently available only for enrolled devices. Controls for unenrolled devices will be added later*|
-|Integration with Microsoft Tunnel|Can integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. Available only on Android currently|
+|Integration with Microsoft Tunnel|Can integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. Available on Android and is now generally available on iOS also.|
All these capabilities are available for Microsoft Defender for Endpoint license holders. For more information, see [Licensing requirements](minimum-requirements.md#licensing-requirements).
The following table summarizes how to deploy Microsoft Defender for Endpoint on
### End-user onboarding -- [Configure Zero-touch onboard for iOS enrolled devices](ios-install.md#zero-touch-onboarding-of-microsoft-defender-for-endpoint-preview): Admins can configure zero-touch install to silently onboard Microsoft Defender for Endpoint on enrolled iOS devices without requiring the user to open the app.
+- [Configure Zero-touch onboard for iOS enrolled devices](ios-install.md#zero-touch-onboarding-of-microsoft-defender-for-endpoint): Admins can configure zero-touch install to silently onboard Microsoft Defender for Endpoint on enrolled iOS devices without requiring the user to open the app.
- [Configure Conditional Access to enforce user onboarding](android-configure.md#conditional-access-with-defender-for-endpoint-on-android): This can be applied to ensure end-users onboard to the Microsoft Defender for Endpoint app after deploying. Watch this video for a quick demo on configuring conditional access with Defender for Endpoint risk signals.
The following table summarizes how to deploy Microsoft Defender for Endpoint on
### Simplify Onboarding -- [iOS - Zero-Touch Onboard](ios-install.md#zero-touch-onboarding-of-microsoft-defender-for-endpoint-preview)
+- [iOS - Zero-Touch Onboard](ios-install.md#zero-touch-onboarding-of-microsoft-defender-for-endpoint)
- [Android Enterprise - Setup Always-on VPN](android-intune.md#auto-setup-of-always-on-vpn). - [iOS - Auto-setup of VPN profile](ios-install.md#auto-onboarding-of-vpn-profile-simplified-onboarding)
security Security Config Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/security-config-management.md
ms.technology: mde
-- > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
security Whats New In Microsoft Defender Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
For more information on Microsoft Defender for Endpoint on other operating syste
## April 2022 - [Updated onboarding and feature parity for Windows Server 2012 R2 and Windows Server 2016)](configure-server-endpoints.md)<br/> The new unified solution package is now generally available and makes it easier to onboard servers by removing dependencies and installation steps. In addition, this unified solution package comes with many new feature improvements.
+- Integration with Tunnel. Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app.This feature was earlier available only on Android. [Learn more](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/what-s-new-in-microsoft-endpoint-manager-2204-april-edition/ba-p/3297995)
## January 2022
security Virus Initiative Criteria https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/virus-initiative-criteria.md
To qualify for the MVI program, your organization must meet all the following re
|SKD Labs|Certification Requirements Product: Anti-virus or Antimalware </br> <http://www.skdlabs.com/html/english/> </br> <http://www.skdlabs.com/cert/>|SKD Labs Star Check Certification Requirements Pass >= 98.5% with On Demand, On Access and Total Detection tests| |VB 100|VB100 Certification Test V1.1 </br> <https://www.virusbulletin.com/testing/vb100/vb100-methodology/vb100-methodology-ver1-1/>|VB100 Certification| |West Coast Labs|Checkmark Certified </br> <http://www.checkmarkcertified.com/sme/>|"A" Rating on Product Security Performance|
+|SE Labs|Protection, Small Business or Enterprise EP Protection Test </br> <https://selabs.uk/en/reports/consumers/>|Protection A rating or Small Business EP A rating or Enterprise EP Protection A rating |
## Apply now
security Manage Tenant Allows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/manage-tenant-allows.md
Allow senders (or domains) on the **Submissions** page in Microsoft 365 Defender
> [!NOTE] >
-> - Based on what filters determined the mail to be malicious, during mail flow, the allows are added. For example, if filters found both sender and URL to be bad, an allow will be added for each.
+> - During mail flow, Based on which filters determined the mail to be malicious, the allows are added. For example, the sender and URL are determined to be bad, an allow will be added for each.
> - When that entity (sender, domain, URL, file) is encountered again, all filters associated with that entity are skipped.
-> - For an email (containing this entity) during mail flow, if the rest of the filters find the email to be clean, the email will be delivered. For example, a sender allow (when authentication passes) will bypass all verdicts except malware and high confidence phishing associated with an attachment or URL.
+> - During mail flow, if the rest of the filters find the email containing this entity to be clean, the email will be delivered. For example, a sender allow (when authentication passes) will bypass all verdicts except malware and high confidence phishing associated with an attachment or URL.
## Add URL allows using the Submissions portal
Allow Files on the **Submissions** page in Microsoft 365 Defender.
> [!NOTE] >
-> - When the file is encountered again, it is not sent for detonation or reputation checks and all other file-based filters are skipped.
-> - So for an email (containing this file), during mail flow, if the rest of the filters find the email to be clean then the email will be delivered.
+> When the file is encountered again, it is not sent for detonation or reputation checks, and all other file-based filters are skipped. During mail flow, if the rest of the filters find the email that contains the file to be clean, then the email will be delivered.
## Create spoofed sender allow entries using Microsoft 365 Defender
security Manage Tenant Blocks https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/manage-tenant-blocks.md
Title: Manage your blocks in the Tenant Allow/Block List
+f1.keywords:
- NOCSH Previously updated : Last updated : audience: ITPro ms.localizationpriority: medium
+search.appverid:
- MET150-+ - M365-security-compliance description: Admins can learn how to configure blocks in the Tenant Allow/Block List in the Security portal. ms.technology: mdo
ms.prod: m365-security
- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
-## Use the Microsoft 365 Defender portal
+## Use the Microsoft 365 Defender portal
### Create block sender entries in the Tenant Allow/Block List
-1. In the Microsoft 365 Defender portal, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**.
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
2. On the **Tenant Allow/Block List** page, verify that the **Senders** tab is selected, and then click ![Block icon.](../../media/m365-cc-sc-create-icon.png) **Block**.
ms.prod: m365-security
4. When you're finished, click **Add**. > [!NOTE]
-> The emails from these senders will be blocked as *high confidence spam (SCL = 9)*.
+> The emails from these senders will be blocked as _high confidence spam_ (SCL = 9).
### Create block URL entries in the Tenant Allow/Block List
-1. In the Microsoft 365 Defender portal, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**.
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
2. On the **Tenant Allow/Block List** page, verify that the **URLs** tab is selected, and then click ![Block icon.](../../media/m365-cc-sc-create-icon.png) **Block**.
ms.prod: m365-security
4. When you're finished, click **Add**. > [!NOTE]
-> The emails containing these URLs will be blocked as *phish*.
+> The emails containing these URLs will be blocked as _phish_.
### Create block file entries in the Tenant Allow/Block List
-1. In the Microsoft 365 Defender portal, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**.
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
2. On the **Tenant Allow/Block List** page, select the **Files** tab, and then click ![Block icon.](../../media/m365-cc-sc-create-icon.png) **Block**.
ms.prod: m365-security
4. When you're finished, click **Add**. > [!NOTE]
-> The emails containing these files will be blocked as *malware*.
+> The emails containing these files will be blocked as _malware_.
### Create spoofed sender block entries
ms.prod: m365-security
- **Action**: Select **Block**. 4. When you're finished, click **Add**.+ > [!NOTE]
-> The emails from these senders will be blocked as *phish*.
+> The emails from these senders will be blocked as _phish_.
## Use PowerShell
New-TenantAllowBlockListItems -ListType Url -Block -Entries ~contoso.com
For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
-### Add spoofed sender block entries
+### Add spoofed sender block entries
To add spoofed sender entries in the Tenant Allow/Block List, use the following syntax:
security Modify Remove Entries Tenant Allow Block https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/modify-remove-entries-tenant-allow-block.md
You can use the Microsoft 365 Defender portal or PowerShell to modify and remove
### Modify entries in the Tenant Allow/Block List
-1. In the Microsoft 365 Defender portal, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**.
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
2. Select the tab that contains the type of entry that you want to modify: - **Senders**
You can use the Microsoft 365 Defender portal or PowerShell to modify and remove
### Remove entries from the Tenant Allow/Block List
-1. In the Microsoft 365 Defender portal, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**.
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
2. Select the tab that contains the type of entry that you want to remove: - **Senders**
security Report Junk Email Messages To Microsoft https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/report-junk-email-messages-to-microsoft.md
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone E
> [!NOTE] > When you report an email entity to Microsoft, we make a copy of everything associated with the email to include it in our continual algorithm reviews. This copy includes the email content, the email headers, and related data about the email routing. Attachments in the message are also included. >
-> Microsoft treats your feedback as your organization's permission for us to analyze all of the previously described information and to work to fine tune the message hygiene algorithms. We hold your message in our secure audited datacenters in the USA until we delete your submission no later than 30 days after you provided it to us. Personnel at Microsoft may read your submitted message and attachments, which is normally not permitted for email in Office 365. However, your email is still treated as confidential between you and Microsoft, and we will provide your submission to any other party to read the email or its attachments for this review process.
+> Microsoft treats your feedback as your organization's permission for us to analyze all of the previously described information and to work to fine tune the message hygiene algorithms. We hold your message in our secure audited datacenters in the USA until we delete your submission no later than 30 days after you provided it to us. Personnel at Microsoft may read your submitted message and attachments, which is normally not permitted for email in Office 365. However, your email is still treated as confidential between you and Microsoft, and we will not provide your submission to any other party to read the email or its attachments for this review process.
security Respond Compromised Connector https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/respond-compromised-connector.md
If you have [Microsoft Defender for Office 365 plan 2](defender-for-office-365.m
:::image type="content" source="../../media/connector-compromise-sender-ip.png" alt-text="Sender IP and your organization's on-prem IP address" lightbox="../../media/connector-compromise-sender-ip.png":::
-If you have [Microsoft Defender for Office 365 Plan 1](defender-for-office-365.md) or [Exchange Online Protection](exchange-online-protection-overview.md), go to https://admin-sdf.exchange.microsoft.com/#/messagetrace.
+If you have [Microsoft Defender for Office 365 Plan 1](defender-for-office-365.md) or [Exchange Online Protection](exchange-online-protection-overview.md), go to https://admin.exchange.microsoft.com/#/messagetrace.
1. Open **Suspicious connector activity** alert in https://security.microsoft.com/alerts.
If you have [Microsoft Defender for Office 365 Plan 1](defender-for-office-365.m
:::image type="content" source="../../media/connector-compromise-outbound-email-details.png" alt-text="Connector compromise outbound email details" lightbox="../../media/connector-compromise-outbound-email-details.png":::
-3. Search by using **connector domain** and **IP address** in [**Message trace**](https://admin-sdf.exchange.microsoft.com/#/messagetrace).
+3. Search by using **connector domain** and **IP address** in [**Message trace**](https://admin.exchange.microsoft.com/#/messagetrace).
:::image type="content" source="../../media/connector-compromise-new-message-trace.png" alt-text="New message trace flyout" lightbox="../../media/connector-compromise-new-message-trace.png"::: 4. In the **Message trace** search results, identify:
- - If a significant number of emails were recently marked as **FilteredAsSpam**. This is a good indicator of a compromised connector being used to send spam.
+ - If a significant number of emails were recently marked as **FilteredAsSpam**. This is a good indicator of a compromised connector being used to send spam.
- If the recipients are the ones that your organization usually stays in contact with.
security Tenant Allow Block List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list.md
This article describes how to configure entries in the Tenant Allow/Block List i
> [!NOTE] > > - Adding users to the corresponding Azure Active Directory role in the Microsoft 365 admin center gives users the required permissions *and* permissions for other features in Microsoft 365. For more information, see [About admin roles](../../admin/add-users/about-admin-roles.md).
- >
> - The **View-Only Organization Management** role group in [Exchange Online](/Exchange/permissions-exo/permissions-exo#role-groups) also gives read-only access to the feature. ## Configure the Tenant Allow/Block List
To manage all allows and blocks, see [Add blocks in the Tenant Allow/Block List]
## View entries in the Tenant Allow/Block List
-1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. To go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
2. Select the tab you want. The columns that are available depend on the tab you selected:
To manage all allows and blocks, see [Add blocks in the Tenant Allow/Block List]
- **Last updated** - **Remove on** - **Notes**
+ - **Spoofing**
+ - **Spoofed user**
+ - **Sending infrastructure**
+ - **Spoof type**: The value **Internal** or **External**.
+ - **Action**: The value **Block** or **Allow**.
- **URLs**: - **Value**: The URL. - **Action**: The value **Allow** or **Block**.
To manage all allows and blocks, see [Add blocks in the Tenant Allow/Block List]
- **Last updated** - **Remove on** - **Notes**
- - **Spoofing**
- - **Spoofed user**
- - **Sending infrastructure**
- - **Spoof type**: The value **Internal** or **External**.
- - **Action**: The value **Block** or **Allow**.
You can click on a column heading to sort in ascending or descending order. You can click **Group** to group the results. The values that are available depend on the tab you selected: - **Senders**: You can group the results by **Action**.
+ - **Spoofing**: You can group the results by **Action** or **Spoof type**.
- **URLs**: You can group the results by **Action**. - **Files**: You can group the results by **Action**.
- - **Spoofing**: You can group the results by **Action** or **Spoof type**.
Click **Search**, enter all or part of a value, and then press ENTER to find a specific value. When you're finished, click ![Clear search icon.](../../media/m365-cc-sc-close-icon.png) **Clear search**.
To manage all allows and blocks, see [Add blocks in the Tenant Allow/Block List]
- **Never expire** - **Last updated date** - **Remove on**
+ - **Spoofing**
+ - **Action**
+ - **Spoof type**
- **URLs** - **Action** - **Never expire**
To manage all allows and blocks, see [Add blocks in the Tenant Allow/Block List]
- **Never expire** - **Last updated** - **Remove on**
- - **Spoofing**
- - **Action**
- - **Spoof type**
When you're finished, click **Apply**. To clear existing filters, click **Filter**, and in the **Filter** flyout that appears, click **Clear filters**.
solutions Collaborate Teams Direct Connect https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/collaborate-teams-direct-connect.md
To configure outbound settings for an organization
1. On the **External applications** tab, choose **Allow access** and **Select external applications**. 1. Select **Add Microsoft applications**. 1. Select the **Office 365** application, and then choose **Select**.
-1. Select **Save** and close the **Outbound access settings** blade.
+1. Select **Save**, choose **Yes** to confirm, and close the **Outbound access settings** blade.
## See also