Updates from: 06/11/2022 01:19:24
Category Microsoft Docs article Related commit history on GitHub Change details
admin What Is Microsoft 365 For Business https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/what-is-microsoft-365-for-business.md
audience: Admin
ms.localizationpriority: medium--- M365-subscription-management +
+- M365-subscription-management
- Adm_O365-+ - AdminSurgePortfolio - adminvideo - intro-overview
search.appverid:
- MET150 description: "Learn about Microsoft 365 for business, a subscription service that takes care of the IT part for you." feedback_system: None Previously updated : Last updated : # What is Microsoft 365 for business
Last updated
[Microsoft 365 for business](https://www.microsoft.com/microsoft-365/business) is a subscription service that lets you run your organization in the cloud while Microsoft takes care of the IT for you. It connects employees to the people, information, and content they need to do their best work, from any device. -
-**Microsoft 365 for business plans**
+## Microsoft 365 for business plans
Microsoft 365 for business provides the following plans to select from to help you find the subscription that best suits your business needs. |Plan|Description|
-| | |
-| [Microsoft 365 Apps for Business](https://www.microsoft.com/microsoft-365/business/microsoft-365-apps-for-business) | ΓÇó Get desktop versions of Office apps: Outlook, Word, Excel, PowerPoint, OneNote (plus Access and Publisher for PC only).</br>ΓÇó Store and share files with 1 TB of OneDrive cloud storage per user.</br>ΓÇó Use one license to cover fully installed Office apps on five mobile devices, five tablets, and five PCs or Macs per user.</br>ΓÇó Automatically update your apps with new features and capabilities every month.</br>ΓÇó Get help anytime with around-the-clock phone and web support from Microsoft. |
-| [Microsoft 365 Business Basic](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-basic) | ΓÇó Host email with a 50 GB mailbox and custom email domain address.</br>ΓÇó Create a hub for teamwork to connect people using Microsoft Teams.</br>ΓÇó Use Office apps for the web, including Outlook, Word, Excel, PowerPoint, and OneNote.</br>ΓÇó Store and share files with 1 TB of OneDrive cloud storage per user.</br>ΓÇó Facilitate online meetings and video conferencing for up to 300 users.</br>ΓÇó Get help anytime with around-the-clock phone and web support from Microsoft. |
-| [Microsoft 365 Business Standard](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-standard) | ΓÇó Get desktop versions of Office apps, including Outlook, Word, Excel, PowerPoint, and OneNote (plus Access and Publisher for PC only).</br>ΓÇó Host email with a 50 GB mailbox and custom email domain.</br>ΓÇó Create a hub for teamwork to connect people using Microsoft Teams.</br>ΓÇó Store and share files with 1 TB of OneDrive cloud storage per user.</br>ΓÇó Use one license to cover fully installed Office apps on five mobile devices, five tablets, and five PCs or Macs per user.</br>ΓÇó Get help anytime with around-the-clock phone and web support from Microsoft. |
-| [Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium) | ΓÇó Stay up to date with the latest versions of Word, Excel, PowerPoint, and more.</br>ΓÇó Connect with customers and coworkers using Outlook, Exchange, and Microsoft Teams.</br>ΓÇó Manage your files from anywhere with 1 TB of cloud storage on OneDrive per user.</br>ΓÇó Defend your business against advanced cyberthreats with sophisticated phishing and ransomware protection.</br>ΓÇó Control access to sensitive information using encryption to help keep data from being accidentally shared.</br>ΓÇó Secure devices that connect to your data and help keep iOS, Android, Windows, and MacOS devices safe and up to date. |
--
-For more details, you can [compare plans](https://www.microsoft.com/microsoft-365/business#coreui-heading-hiatrep).
+|||
+|[Microsoft 365 Apps for Business](https://www.microsoft.com/microsoft-365/business/microsoft-365-apps-for-business)|<ul><li>Get desktop versions of Office apps: Outlook, Word, Excel, PowerPoint, OneNote (plus Access and Publisher for PC only).</li><li>Store and share files with 1 TB of OneDrive cloud storage per user.</li><li>Use one license to cover fully installed Office apps on five mobile devices, five tablets, and five PCs or Macs per user.</li><li>Automatically update your apps with new features and capabilities every month.</li><li>Get help anytime with around-the-clock phone and web support from Microsoft.</li></ul>|
+|[Microsoft 365 Business Basic](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-basic)|<ul><li>Host email with a 50 GB mailbox and custom email domain address.</li><li>Create a hub for teamwork to connect people using Microsoft Teams.</li><li>Use Office apps for the web, including Outlook, Word, Excel, PowerPoint, and OneNote.</li><li>Store and share files with 1 TB of OneDrive cloud storage per user.</li><li>Facilitate online meetings and video conferencing for up to 300 users.</li><li>Get help anytime with around-the-clock phone and web support from Microsoft.</li></ul>|
+|[Microsoft 365 Business Standard](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-standard)|<ul><li>Get desktop versions of Office apps, including Outlook, Word, Excel, PowerPoint, and OneNote (plus Access and Publisher for PC only).</li><li>Host email with a 50 GB mailbox and custom email domain.</li><li>Create a hub for teamwork to connect people using Microsoft Teams.</li><li>Store and share files with 1 TB of OneDrive cloud storage per user.</li><li>Use one license to cover fully installed Office apps on five mobile devices, five tablets, and five PCs or Macs per user.</li><li>Get help anytime with around-the-clock phone and web support from Microsoft.</li></ul>|
+|[Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium)|<ul><li>Stay up to date with the latest versions of Word, Excel, PowerPoint, and more.</li><li>Connect with customers and coworkers using Outlook, Exchange, and Microsoft Teams.</li><li>Manage your files from anywhere with 1 TB of cloud storage on OneDrive per user.</li><li>Defend your business against advanced cyberthreats with sophisticated phishing and ransomware protection.</li><li>Control access to sensitive information using encryption to help keep data from being accidentally shared.</li><li>Secure devices that connect to your data and help keep iOS, Android, Windows, and MacOS devices safe and up to date.</li></ul>|
+For more details, you can [compare plans](https://www.microsoft.com/microsoft-365/business#coreui-heading-hiatrep).
## Related content
commerce Subscriptions And Licenses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/licenses/subscriptions-and-licenses.md
Last updated 05/12/2022
# Understand subscriptions and licenses in Microsoft 365 for business
-When you buy a subscription to Microsoft 365 for business, you sign up for a set of apps and services that you pay for on either a monthly or an annual basis. The applications and services that you receive as part of your subscription depend on which product you purchased, such as Microsoft 365 Apps for business or Microsoft 365 Business Standard. You can see what comes with each product on the [Microsoft 365 for small and medium-sized businesses](https://www.microsoft.com/microsoft-365/business/compare-all-microsoft-365-business-products) page.
+When you buy a subscription to Microsoft 365 for business, you sign up for a set of apps and services that you pay for on either a monthly or an annual basis. The applications and services that you receive as part of your subscription depend on which product you purchased, such as Microsoft 365 Apps for business or Microsoft 365 Business Standard. You can see what comes with each product on the [Microsoft 365 for small and medium-sized businesses](https://www.microsoft.com/microsoft-365/business/compare-all-microsoft-365-business-products) page.
When you buy a subscription, you specify the number of licenses that you need, based on how many people you have in your organization. After you buy a subscription, you create accounts for people in your organization, and then assign a license to each person. As your organizational needs change, you can buy more licenses to accommodate new people, or reassign licenses to other users when someone leaves your organization.
If your subscription includes any of the following products, each person can ins
The following table lists what automatically happens when you assign a license to someone: |If the subscription has this service|This automatically happens|
-|:--|:--|
-|Exchange Online <br/> |A mailbox is created for that person. <br/> To learn about the SLA for this task to be completed, see ["Setting up..." messages in the Microsoft 365 admin center](https://support.microsoft.com/help/2635238/setting-up-messages-in-the-office-365-admin-center). |
-|SharePoint Online <br/> |Edit permissions to the default SharePoint Online team site are assigned to that person. <br/> |
-|Microsoft Teams <br/> |The person has access to the features associated with the license. <br/> |
-|Microsoft 365 Apps for enterprise and Microsoft 365 Apps for business <br/> |The person can download Office apps on up to five Macs or PCs, five tablets, and five smartphones. <br/> |
+|||
+|Exchange Online|A mailbox is created for that person. <br/> To learn about the SLA for this task to be completed, see ["Setting up..." messages in the Microsoft 365 admin center](https://support.microsoft.com/help/2635238/setting-up-messages-in-the-office-365-admin-center).|
+|SharePoint Online|Edit permissions to the default SharePoint Online team site are assigned to that person.|
+|Microsoft Teams|The person has access to the features associated with the license.|
+|Microsoft 365 Apps for enterprise and Microsoft 365 Apps for business|The person can download Office apps on up to five Macs or PCs, five tablets, and five smartphones.|
## Understand licenses for non-user mailboxes
You don't need to assign licenses to resource mailboxes, room mailboxes, and sha
Different types of admins can work with licenses in different ways, depending on their roles. The following table lists the most common options. For a complete list of admin roles and privileges, see [About admin roles](../../admin/add-users/about-admin-roles.md). |Admin role|Assign a license|Unassign a license|Buy more licenses|Delete an account|
-|:--|:--|:--|:--|:--|
+||::|::|::|::|
|Billing admin|No|No|Yes|No| |Global admin|Yes|Yes|Yes|Yes| |License admin|Yes|Yes|No|No|
compliance Bulk Create Publish Labels Using Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/bulk-create-publish-labels-using-powershell.md
f1.keywords:
- NOCSH Previously updated : Last updated : audience: Admin -+ - M365-security-compliance - SPO_Content ms.localizationpriority: high
+search.appverid:
- MOE150 - MET150
description: "Learn how to use PowerShell to create and publish retention labels
[!include[Purview banner](../includes/purview-rebrand-banner.md)] After you've decided to use [retention labels](retention.md) to help you keep or delete documents and emails in Microsoft 365, you might have realized that you have many and possibly hundreds of retention labels to create and publish. The recommended method to create retention labels at scale is by using [file plan](file-plan-manager.md) from the Microsoft Purview compliance portal. However, you can also use [PowerShell](retention.md#powershell-cmdlets-for-retention-policies-and-retention-labels).
-
+ Use the information, template files and examples, and script in this article to help you bulk-create retention labels and publish them in retention label policies. Then, the retention labels can be [applied by administrators and users](create-apply-retention-labels.md#how-to-apply-published-retention-labels). The supplied instructions don't support retention labels that are auto-applied.
-Overview:
+Overview:
1. In Excel, create a list of your retention labels and a list of their retention label policies. 2. Use PowerShell to create the retention labels and retention label policies in those lists.
-
+ ## Disclaimer The sample scripts provided in this article aren't supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such damages.
-
+ ## Step 1: Create a .csv file for the retention labels
-1. Copy the following sample .csv file for a template and example entries for four different retention labels, and paste them into Excel.
+1. Copy the following sample .csv file for a template and example entries for four different retention labels, and paste them into Excel.
2. Convert the text to columns: **Data** tab \> **Text to Columns** \> **Delimited** \> **Comma** \> **General**
-2. Replace the examples with entries for your own retention labels and settings. For more information about the parameter values, see [New-ComplianceTag](/powershell/module/exchange/new-compliancetag).
+3. Replace the examples with entries for your own retention labels and settings. For more information about the parameter values, see [New-ComplianceTag](/powershell/module/exchange/new-compliancetag).
-3. Save the worksheet as a .csv file in a location that's easy to find for a later step. For example: C:\>Scripts\Labels.csv
+4. Save the worksheet as a .csv file in a location that's easy to find for a later step. For example: C:\>Scripts\Labels.csv
-
Notes: - If the .csv file contains a retention label with the same name as one that already exists, the script skips creating that retention label. No duplicate retention labels are created.
-
+ - Don't change or rename the column headers from the sample .csv file provided, or the script will fail.
-
+ ### Sample .csv file for retention labels
-```
+```text
Name (Required),Comment (Optional),IsRecordLabel (Required),RetentionAction (Optional),RetentionDuration (Optional),RetentionType (Optional),ReviewerEmail (Optional) LabelName_t_1,Record - keep and delete - 2 years,$true,KeepAndDelete,730,CreationAgeInDays, LabelName_t_2,Keep and delete tag - 7 years,$false,KeepAndDelete,2555,ModificationAgeInDays,
LabelName_t_4,Record label tag - financial,$true,Keep,730,CreationAgeInDays,
## Step 2: Create a .csv file for the retention label policies
-1. Copy the following sample .csv file for a template and example entries for three different retention label policies, and paste them into Excel.
+1. Copy the following sample .csv file for a template and example entries for three different retention label policies, and paste them into Excel.
2. Convert the text to columns: **Data** tab \> **Text to Columns** \> **Delimited** \> **Comma** \> **General**
-2. Replace the examples with entries for your own retention label policies and their settings. For more information about the parameter values for this cmdlet, see [New-RetentionCompliancePolicy](/powershell/module/exchange/new-retentioncompliancepolicy).
-
-3. Save the worksheet as a .csv file in a location that's easy to find for a later step. For example: `<path>Policies.csv`
+3. Replace the examples with entries for your own retention label policies and their settings. For more information about the parameter values for this cmdlet, see [New-RetentionCompliancePolicy](/powershell/module/exchange/new-retentioncompliancepolicy).
+4. Save the worksheet as a .csv file in a location that's easy to find for a later step. For example: `<path>Policies.csv`
Notes:
-
+ - If the .csv file contains a retention label policy with the same name as one that already exists, the script skips creating that retention label policy. No duplicate retention label policies are created.
-
+ - Don't change or rename the column headers from the sample .csv file provided, or the script will fail.
-
+ ### Sample .csv file for retention policies
-```
+```text
Policy Name (Required),PublishComplianceTag (Required),Comment (Optional),Enabled (Required),ExchangeLocation (Optional),ExchangeLocationException (Optional),ModernGroupLocation (Optional),ModernGroupLocationException (Optional),OneDriveLocation (Optional),OneDriveLocationException (Optional),PublicFolderLocation (Optional),SharePointLocation (Optional),SharePointLocationException (Optional),SkypeLocation (Optional),SkypeLocationException (Optional) Publishing Policy Red1,"LabelName_t_1, LabelName_t_2, LabelName_t_3, LabelName_t_4",N/A,$true,All,,All,,All,,,All,,, Publishing Policy Orange1,"LabelName_t_1, LabelName_t_2",N/A,$true,All,,,,,,,,,,
Publishing Policy Yellow1,"LabelName_t_3, LabelName_t_4",N/A,$false,All,,,,,,,,,
Notes: - The script prompts you to provide the two source files that you created in the previous two steps:
- - If you don't specify the source file to create the retention labels, the script moves on to create the retention label policies.
- - If you don't specify the source file to create the retention label policies, the script creates the retention labels only.
+ - If you don't specify the source file to create the retention labels, the script moves on to create the retention label policies.
+ - If you don't specify the source file to create the retention label policies, the script creates the retention labels only.
- The script generates a log file that records each action it took and whether the action succeeded or failed. See the final step for instructions how to locate this log file.
Notes:
```Powershell <# . Steps: Import and publish retention labels
- Γùï Load retention labels csv file
- Γùï Validate csv file input
- Γùï Create retention labels
- Γùï Create retention policies
- Γùï Publish retention labels for the policies
- Γùï Generate the log for retention labels and policies creation
- Γùï Generate the csv result for the labels and policies created
+ - Load retention labels csv file
+ - Validate csv file input
+ - Create retention labels
+ - Create retention policies
+ - Publish retention labels for the policies
+ - Generate the log for retention labels and policies creation
+ - Generate the csv result for the labels and policies created
. Syntax
- .\Publish-ComplianceTag.ps1 [-LabelListCSV <string>] [-PolicyListCSV <string>]
+ .\Publish-ComplianceTag.ps1 [-LabelListCSV <string>] [-PolicyListCSV <string>]
. Detailed Description 1) [-LabelListCSV <string>] -LabelListCSV ".\SampleInputFile_LabelList.csv"
Function FileExist
$inputFileExist = Test-Path $FilePath if (!$inputFileExist) {
- if ($Warning -eq $false)
- {
+ if ($Warning -eq $false)
+ {
WriteToLog -Type "Failed" -Message "[File: $FilePath] The file doesn't exist"
- throw
+ throw
}
- else
- {
+ else
+ {
WriteToLog -Type "Warning" -Message "[File: $FilePath] The file doesn't exist" } }
Function InvokePowerShellCmdlet
) try {
- WriteToLog -Type "Start" -Message "Execute Cmdlet : '$CmdLet'"
+ WriteToLog -Type "Start" -Message "Execute Cmdlet : '$CmdLet'"
return Invoke-Expression $CmdLet -ErrorAction SilentlyContinue } catch
Function CreateComplianceTag
[Parameter(Mandatory = $true)] [String]$FilePath )
-
+ WriteToLog -Type "Start" "Start to create Compliance Tag" FileExist $FilePath
-
+ # TODO Validate CSV file for the Header try {
Function CreateComplianceTag
if (![String]::IsNullOrEmpty($lab.'RetentionAction (Optional)')) { $para = $lab.'RetentionAction (Optional)'
- $cmdlet += " -RetentionAction " + $para
+ $cmdlet += " -RetentionAction " + $para
} if (![String]::IsNullOrEmpty($lab.'RetentionDuration (Optional)')) {
Function CreateComplianceTag
$eml += "'{0}'," -f $email } $eml = $eml.Substring(0, $eml.Length - 1) + ')'
-
+ $cmdlet += " -ReviewerEmail " + $eml } }
Function CreateComplianceTag
{ # Create compliance tag $msg = "Execute Cmdlet : {0}" -f $cmdlet
-
+ $ret = InvokePowerShellCmdlet $cmdlet
-
+ if ($ret -eq $null) { WriteToLog -Type "Failed" $error[0]
Function CreateRetentionCompliancePolicy
[Parameter(Mandatory = $true)] [String]$FilePath )
-
+ WriteToLog -Type "Start" "Start to Create Retention Policy" FileExist $FilePath try
Function CreateRetentionCompliancePolicy
$para = $rp.'ExchangeLocation (Optional)' $cmdlet += " -ExchangeLocation " + $para }
-
+ if (![String]::IsNullOrEmpty($rp.'ExchangeLocationException (Optional)')) { $para = $rp.'ExchangeLocationException (Optional)'
Function CreateRetentionCompliancePolicy
{ # Create retention compliance policy $msg = "Execute Cmdlet : {0}" -f $cmdlet
-
+ $ret = invokepowershellcmdlet $cmdlet
-
+ if ($ret -eq $null) { WriteToLog -Type "Failed" $error[0]
Function CreateRetentionCompliancePolicy
WriteToLog -Type "Warning" -Message "The policy '$name' already exists! Skip for creation!" $rpid = ($policies | ? { $_.Name.ToLower() -eq $name.ToLower() }).Guid }
-
+ # Retrieve tag name for publishing $ts = $rp.'PublishComplianceTag (Required)' $tagList = $ts.Split(",") | ForEach-Object { $_.Trim() }
-
- WriteToLog -Type "Message" -Message "Publish Tags : '$ts'"
-
+
+ WriteToLog -Type "Message" -Message "Publish Tags : '$ts'"
+ PublishComplianceTag -PolicyGuid $rpid -TagName $tagList } }
Function PublishComplianceTag
[Parameter(Mandatory = $true)] [String[]]$TagNames )
-
+ WriteToLog -Type "Start" "Start to Publish Compliance Tag" try { # Retrieve existing rule related to the given compliance policy $rule = InvokePowerShellCmdlet ("Get-RetentionComplianceRule -Policy {0}" -f $PolicyGuid) $tagGuids = New-Object System.Collections.ArrayList
-
+ foreach ($tn in $TagNames) { $t = InvokePowerShellCmdlet ("Get-ComplianceTag {0}" -f $tn)
Function PublishComplianceTag
} } }
-
+ foreach($t in $tagGuids) { # Publish compliance tag $cmdlet = "New-RetentionComplianceRule -Policy {0} -PublishComplianceTag {1}" -f $PolicyGuid, $t $ret = InvokePowerShellCmdlet $cmdlet
-
+ if ($ret -eq $null) { WriteToLog -Type "Failed" $error[0]
Function ExportCreatedComplianceTag
[Parameter(Mandatory = $true)] [String]$LabelFilePath )
-
+ WriteToLog -Type "Start" "Start to Export Compliance Tag Created" try {
Function ExportCreatedComplianceTag
$col5 = New-Object system.Data.DataColumn RetentionDuration,([string]) $col6 = New-Object system.Data.DataColumn RetentionType,([string]) $col7 = New-Object system.Data.DataColumn ReviewerEmail,([string])
-
+ # Add the Columns $table.columns.add($col1) $table.columns.add($col2)
Function ExportCreatedComplianceTag
foreach($lab in $labels) { $t = InvokePowerShellCmdlet ("Get-ComplianceTag '{0}' " -f $lab.'Name (Required)')
-
+ # Create a result row $row = $table.NewRow() $row['Name'] = $t.Name
Function ExportCreatedComplianceTag
$row['RetentionDuration'] = $t.RetentionDuration $row['RetentionType'] = $t.RetentionType $row['ReviewerEmail'] = $t.ReviewerEmail
-
+ # Add the row to the table $table.Rows.Add($row) }
Function ExportPublishedComplianceTagAndPolicy
[Parameter(Mandatory = $true)] [String[]]$PolicyFilePath )
-
+ WriteToLog -Type "Start" "Start to Export Published Compliance Tag and Policy" try {
Function ExportPublishedComplianceTagAndPolicy
$col13 = New-Object system.Data.DataColumn SharePointLocationException,([string]) $col14 = New-Object system.Data.DataColumn SkypeLocation,([string]) $col15 = New-Object system.Data.DataColumn SkypeLocationException,([string])
-
+ # Add the Columns $table.columns.add($col1) $table.columns.add($col2)
Function ExportPublishedComplianceTagAndPolicy
foreach($policy in $policies) { $t = InvokePowerShellCmdlet ("Get-RetentionCompliancePolicy '{0}' -DistributionDetail" -f $policy.'Policy Name (Required)')
-
+ # Create a result row $row = $table.NewRow() $row['Policy Name'] = $t.Name
-
+ $rules = InvokePowerShellCmdlet ("Get-RetentionComplianceRule -Policy {0}" -f $t.Guid) $tagList = [String]::Empty foreach($rule in $rules)
Function ExportPublishedComplianceTagAndPolicy
$row['SharePointLocationException'] = $t.SharePointLocationException $row['SkypeLocation'] = $t.SkypeLocation $row['SkypeLocationException'] = $t.SkypeLocationException
-
+ # Add the row to the table $table.Rows.Add($row) }
CreateRetentionCompliancePolicy -FilePath $PolicyListCSV
if ($ResultCSV) { ExportCreatedComplianceTag -LabelFilePath $LabelListCSV
- ExportPublishedComplianceTagAndPolicy -PolicyFilePath $PolicyListCSV
+ ExportPublishedComplianceTagAndPolicy -PolicyFilePath $PolicyListCSV
}- ``` ## Step 4: Run the PowerShell script
if ($ResultCSV)
First, [Connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell). Then, run the script that creates and publishes the retention labels:
-
+ 1. In your Security & Compliance PowerShell session, enter the path, followed by the characters `.\` and the file name of the script, and then press ENTER to run the script. For example:
-
+ ```powershell <path>.\CreateRetentionSchedule.ps1 ``` 2. The script prompts you for the locations of the .csv files that you created in the previous steps. Enter the path, followed by the characters `.\` and file name of the .csv file, and then press ENTER. For example, for the first prompt:
-
+ ```powershell <path>.\Labels.csv ```
Then, run the script that creates and publishes the retention labels:
Use the log file that the script created to check the results and identify any failures that need resolving. You can find the log file at the following location, although the digits in the example file name vary.
-
-```
+
+```DOS
<path>.\Log_Publish_Compliance_Tag_01112018_151239.txt ```
compliance Ediscovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery.md
The following sections show the minimum subscription requirements for Content se
### eDiscovery (Standard)
+- Exchange online Plan 2
+- Sharepoint online Plan 2
- Microsoft 365 E3 subscription - Microsoft 365 G3 subscription - Microsoft 365 Business Premium subscription
compliance Import Physical Badging Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/import-physical-badging-data.md
After you create the physical badging connector and push your physical badging d
![Physical badging connector log file displays number of objects from the JSON file that were uploaded.](..\media\PhysicalBadgingConnectorLogFile.png)
- The **RecordsSaved** field indicates the number of objects in the JSON file that uploaded. For example, if the JSON file contains four objects, then the value of the **RecordsSaved** fields is 4, if the script successfully uploaded all the objects in the JSON file.
+ The **RecordsSaved** field indicates the number of records in the JSON file that were uploaded. For example, if the JSON file contains four records, then the value of the **RecordsSaved** fields is 4 if the script successfully uploaded all the records in the JSON file. The **RecordsSkipped** field indicates the number of records in the JSON file that were skipped. Before uploading records in the JSON file, the Email IDs of the records will be validated. Any record with an invalid Email ID will be skipped and the corresponding Email ID is displayed in the field **EmailIdsNotSaved**
If you've haven't run the script in Step 4, a link to download the script is displayed under **Last import**. You can download the script and then follow the steps in Step 4 to run it.
compliance Increase The Recoverable Quota For Mailboxes On Hold https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/increase-the-recoverable-quota-for-mailboxes-on-hold.md
description: "Enable the archive mailbox and turn on auto-expanding archiving to
[!include[Purview banner](../includes/purview-rebrand-banner.md)]
-The default Exchange retention policyΓÇönamed *Default MRM Policy*ΓÇöthat is automatically applied to new mailboxes in Exchange Online contains a retention tag named Recoverable Items 14 days move to archive. This retention tag moves items from the Recoverable Items folder in the user's primary mailbox to the Recoverable Items folder in the user's archive mailbox after the 14-day retention period expires for an item. For this to happen, the user's archive mailbox must be enabled. If the archive mailbox isn't enabled, no action is taken, which means that items in the Recoverable Items folder for a mailbox on hold aren't moved to the archive mailbox after the 14-day retention period expires. Because nothing is deleted from a mailbox on hold, it's possible that the storage quota for the Recoverable Items folder might be exceeded, especially if the user's archive mailbox isn't enabled.
+The default Exchange retention policyΓÇönamed *Default MRM Policy*ΓÇöthat is automatically applied to new mailboxes in Exchange Online contains a retention tag named Recoverable Items 14 days move to archive. This retention tag moves items from the Recoverable Items folder in the user's primary mailbox to the Recoverable Items folder in the user's archive mailbox after the 14-day retention period expires for an item. Emails in Deletions folder will retain based on **RetainDeletedItemsFor** parameter and move to other folders in recoverable deleted items and then to archive mailbox. For this to happen, the user's archive mailbox must be enabled. If the archive mailbox isn't enabled, no action is taken, which means that items in the Recoverable Items folder for a mailbox on hold aren't moved to the archive mailbox after the 14-day retention period expires. Because nothing is deleted from a mailbox on hold, it's possible that the storage quota for the Recoverable Items folder might be exceeded, especially if the user's archive mailbox isn't enabled.
To help reduce the chance of exceeding this limit, the storage quota for the Recoverable Items folder is automatically increased from 30 GB to 100 GB when a hold is placed on a mailbox in Exchange Online. If the archive mailbox is enabled, the storage quota for the Recoverable Items folder in the archive mailbox is also increased from 30 GB to 100 GB. If the auto-expanding archiving feature in Exchange Online is enabled, the total storage quota for the user's archive mailbox, including the Recoverable Items folder, is 1.5 TB.
compliance Managing Jobs Ediscovery20 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/managing-jobs-ediscovery20.md
f1.keywords:
Previously updated : Last updated : audience: Admin ms.localizationpriority: medium-+
+search.appverid:
- MOE150 - MET150 description: "eDiscovery (Premium) jobs help you track the status of long-running processes related to performing various eDiscovery (Premium) tasks."
description: "eDiscovery (Premium) jobs help you track the status of long-runnin
Here's a list of the jobs (which are typically long-running processes) that are tracked on the **Jobs** tab of a case in Microsoft Purview eDiscovery (Premium). These jobs are triggered by user actions when using and managing cases.
-| Job type | Description |
-| :-- | :- |
-|Adding data to a review set | A user adds a collection to a review set. This job consists of two sub jobs: </br>ΓÇó **Export** - A list of items in the collection is generated. </br>ΓÇó **Ingestion & Indexing** - The items in the collection that match the search query are copied to an Azure Storage location (in a process called *ingestion*) and then those items in the Azure Storage location are reindexed. This new index is used when querying and analyzing items in the data set. </br></br>For more information, see [Add search results to a review set](add-data-to-review-set.md). |
-|Adding data to another review set | A user adds documents from one review set to a different review set in the same case. For more information, see [Add data to a review set from another review set](add-data-to-review-set-from-another-review-set.md).|
-|Adding non-Microsoft 365 data to a review set | A user uploads non-Microsoft 365 data to a review set. The data is also indexed during this process. For example, files from an on-premises file server or a client computer are uploaded to a review set. For more information, see [Load non-Microsoft 365 data into a review set](load-non-office-365-data-into-a-review-set.md).|
-|Adding remediated data to a review set | Data with processing errors is remediated and loaded back into a review set. For more information, see:</br>ΓÇó [Error remediation when processing data](error-remediation-when-processing-data-in-advanced-ediscovery.md)</br>ΓÇó [Single item error remediation](single-item-error-remediation.md)|
-|Comparing load sets | A user looks at the differences between different load sets in a review set. A load set is an instance of adding data to a review set. For example, if you add the results of two different searches to the same review set, each would represent a load set. |
+|Job type|Description|
+|||
+|Adding data to a review set|A user adds a collection to a review set. This job consists of two sub jobs: <ul><li>**Export** - A list of items in the collection is generated.</li><li>**Ingestion & Indexing** - The items in the collection that match the search query are copied to an Azure Storage location (in a process called *ingestion*) and then those items in the Azure Storage location are reindexed. This new index is used when querying and analyzing items in the data set.</li><ul> <p> For more information, see [Add search results to a review set](add-data-to-review-set.md).|
+|Adding data to another review set|A user adds documents from one review set to a different review set in the same case. For more information, see [Add data to a review set from another review set](add-data-to-review-set-from-another-review-set.md).|
+|Adding non-Microsoft 365 data to a review set|A user uploads non-Microsoft 365 data to a review set. The data is also indexed during this process. For example, files from an on-premises file server or a client computer are uploaded to a review set. For more information, see [Load non-Microsoft 365 data into a review set](load-non-office-365-data-into-a-review-set.md).|
+|Adding remediated data to a review set|Data with processing errors is remediated and loaded back into a review set. For more information, see: <ul><li>[Error remediation when processing data](error-remediation-when-processing-data-in-advanced-ediscovery.md)</li><li>[Single item error remediation](single-item-error-remediation.md)</li></ul>|
+|Comparing load sets|A user looks at the differences between different load sets in a review set. A load set is an instance of adding data to a review set. For example, if you add the results of two different searches to the same review set, each would represent a load set.|
|Conversation reconstruction|When a user adds the results of a search to a conversation review set, instant message conversations (also called *threaded conversations*) in services like Microsoft Teams are reconstructed in a PDF file. This job is also triggered when a user clicks **Action > Create conversation PDFs** in a review set. For more information, see [Review conversations in eDiscovery (Premium)](conversation-review-sets.md).
-|Converting redacted documents to PDF|After a user annotates a document in a review set and redacts a portion of it, they can choose to convert the redacted document to a PDF file. This ensures that the redacted portion will not be visible if the document is exported for presentation. For more information, see [View documents in a review set](view-documents-in-review-set.md). |
-|Estimating search results | After a user creates and runs or reruns a draft collection, the search tool searches the index for items that match the search query and prepares an estimate that includes the number and total size of all items by the search, and the number of data sources searched. For more information, see [Collect data for a case](collecting-data-for-ediscovery.md). |
-|Preparing data for export | A user exports documents from a review set. When the export process is complete, they can download the exported data to a local computer. For more information, see [Export case data](exporting-data-ediscover20.md). |
-|Preparing for error resolution |When a user selects a file and creates a new error remediation in the Error view on the **Processing** tab of a case, the first step in the process is to upload the file that has the processing error to an Azure Storage location in the Microsoft cloud. This job tracks the progress of the upload process. For more information about the error remediation workflow, see [Error remediation when processing data](error-remediation-when-processing-data-in-advanced-ediscovery.md). |
-|Preparing search preview | After a user creates and runs a new draft collection (or reruns an existing draft collection), the search tool prepares a sample subset of items (that match the search query) that can be previewed. Previewing search results help you determine the effectiveness of the search. For more information, see [Collect data for a case](collecting-data-for-ediscovery.md#view-search-results-and-statistics). |
-|Re-indexing custodian data | When you add a custodian to a case, all partially indexed items in the custodian's selected data sources are reindexed by a process called *Advanced indexing*. This job is also triggered when you click **Update index** on the **Processing** tab of a case, and when you update the index for a specific custodian on the custodian properties flyout page. For more information, see [Advanced indexing of custodian data](indexing-custodian-data.md).
-|Running analytics | A user analyzes data in a review set by running eDiscovery (Premium) analytics tools such as near duplicate detection, email threading analysis, and themes analysis. For more information, see [Analyze data in a review set](analyzing-data-in-review-set.md). |
-|Tagging documents | This job is triggered when a user clicks **Start tagging job** in the **Tagging panel** when reviewing documents in a review set. A user can start this job after tagging documents in a review set and then bulk-selecting them in the view document panel. For more information, see [Tag documents in a review set](tagging-documents.md). |
-|||
+|Converting redacted documents to PDF|After a user annotates a document in a review set and redacts a portion of it, they can choose to convert the redacted document to a PDF file. This ensures that the redacted portion will not be visible if the document is exported for presentation. For more information, see [View documents in a review set](view-documents-in-review-set.md).|
+|Estimating search results|After a user creates and runs or reruns a draft collection, the search tool searches the index for items that match the search query and prepares an estimate that includes the number and total size of all items by the search, and the number of data sources searched. For more information, see [Collect data for a case](collecting-data-for-ediscovery.md).|
+|Preparing data for export|A user exports documents from a review set. When the export process is complete, they can download the exported data to a local computer. For more information, see [Export case data](exporting-data-ediscover20.md).|
+|Preparing for error resolution|When a user selects a file and creates a new error remediation in the Error view on the **Processing** tab of a case, the first step in the process is to upload the file that has the processing error to an Azure Storage location in the Microsoft cloud. This job tracks the progress of the upload process. For more information about the error remediation workflow, see [Error remediation when processing data](error-remediation-when-processing-data-in-advanced-ediscovery.md).|
+|Preparing search preview|After a user creates and runs a new draft collection (or reruns an existing draft collection), the search tool prepares a sample subset of items (that match the search query) that can be previewed. Previewing search results help you determine the effectiveness of the search. For more information, see [Collect data for a case](collecting-data-for-ediscovery.md#view-search-results-and-statistics).|
+|Re-indexing custodian data|When you add a custodian to a case, all partially indexed items in the custodian's selected data sources are reindexed by a process called *Advanced indexing*. This job is also triggered when you click **Update index** on the **Processing** tab of a case, and when you update the index for a specific custodian on the custodian properties flyout page. For more information, see [Advanced indexing of custodian data](indexing-custodian-data.md).
+|Running analytics|A user analyzes data in a review set by running eDiscovery (Premium) analytics tools such as near duplicate detection, email threading analysis, and themes analysis. For more information, see [Analyze data in a review set](analyzing-data-in-review-set.md).|
+|Tagging documents|This job is triggered when a user clicks **Start tagging job** in the **Tagging panel** when reviewing documents in a review set. A user can start this job after tagging documents in a review set and then bulk-selecting them in the view document panel. For more information, see [Tag documents in a review set](tagging-documents.md).|
## Job status
compliance Sensitivity Labels Aip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-aip.md
Some features are only supported by built-in labeling for Office apps, and won't
- Access to intelligent classification services that include [trainable classifiers](classifier-learn-about.md), [exact data match (EDM)](sit-learn-about-exact-data-match-based-sits.md), and [named entities](named-entities-learn.md) - Detection of sensitive information as users type - In Word, users can review and remove the identified sensitive content-- [PDF support](sensitivity-labels-office-apps.md#pdf-support)
+- [PDF support](sensitivity-labels-office-apps.md#pdf-support) (in preview)
- For labels that let users assign permissions, different permissions (Read or Change) can be granted to users or groups - Encrypt-Only for emails - Visibility of labels on the status bar
compliance Set Up Irm In Sp Admin Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/set-up-irm-in-sp-admin-center.md
When people download files in an IRM-enabled list or library, the files are encr
You cannot create or edit documents in an IRM-enabled library using Office in a browser. Instead, one person at a time can download and edit IRM-encrypted files. Use check-in and check-out to manage *co-authoring*, or authoring across multiple users.
-When you download a PDF file from an IRM-protected library, Microsoft 365 creates a protected PDF file. The file's extension won't change, but the file is protected. To view this file you'll need the Azure Information Protection viewer, the full Azure Information Protection client, or another application that supports viewing protected PDF files. For more information, see [PDF readers supported for protected PDFs](protected-pdf-readers.md)
+When you download a PDF file from an IRM-protected library, Microsoft 365 creates a protected PDF file. The file's extension won't change, but the file is protected. To view this file you'll need the Azure Information Protection viewer, the full Azure Information Protection client, or another application that supports viewing protected PDF files.
SharePoint Online supports encryption of the following file types:
enterprise Network Planning With Expressroute https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/network-planning-with-expressroute.md
The following table highlights a few differences between the internet and Azure
|Direct connection with a predictable network profile. <br/> |No <br/> |Yes <br/> | |IPv6 connectivity. <br/> |Yes <br/> |Yes <br/> |
-Expand the titles below for more network planning guidance. We've also recorded a 10-part [Azure ExpressRoute for Office 365 Training](https://channel9.msdn.com/series/aer) series that dives deeper.
+Expand the titles below for more network planning guidance.
## Existing Azure ExpressRoute customers
When considering the topology placement of the network/security perimeter option
- Customers are encouraged to design their security/perimeter topology for use with ExpressRoute for Office 365 in accordance with best practices for redundancy, high availability, and disaster recovery.
-Here's an example of Woodgrove Bank that compares the different Azure ExpressRoute connectivity options with the perimeter security models discussed above.
+Here's an example of Contoso that compares the different Azure ExpressRoute connectivity options with the perimeter security models discussed above.
### Example 1: Securing Azure ExpressRoute
-Woodgrove Bank is considering implementing Azure ExpressRoute and after planning the optimal architecture for [Routing with ExpressRoute for Office 365](routing-with-expressroute.md) and after using the above guidance to understand bandwidth requirements, they're determining the best method for securing their perimeter.
+Contoso is considering implementing Azure ExpressRoute and after planning the optimal architecture for [Routing with ExpressRoute for Office 365](routing-with-expressroute.md) and after using the above guidance to understand bandwidth requirements, they're determining the best method for securing their perimeter.
-For Woodgrove, a multi-national organization with locations in multiple continents, security must span all perimeters. The optimal connectivity option for Woodgrove is a multi-point connection with multiple peering locations around the globe to service the needs of their employees in each continent. Each continent includes redundant Azure ExpressRoute circuits within the continent and security must span all of these.
+For Contoso, a multi-national organization with locations in multiple continents, security must span all perimeters. The optimal connectivity option for Contoso is a multi-point connection with multiple peering locations around the globe to service the needs of their employees in each continent. Each continent includes redundant Azure ExpressRoute circuits within the continent and security must span all of these.
-Woodgrove's existing infrastructure is reliable and can handle the extra work, as a result, Woodgrove Bank is able to use the infrastructure for their Azure ExpressRoute and internet perimeter security. If this weren't the case, Woodgrove could choose to purchase more equipment to supplement their existing equipment or to handle a different type of connection.
+Contoso's existing infrastructure is reliable and can handle the extra work, as a result, Contoso is able to use the infrastructure for their Azure ExpressRoute and internet perimeter security. If this weren't the case, Contoso could choose to purchase more equipment to supplement their existing equipment or to handle a different type of connection.
## High availability and failover with Azure ExpressRoute <a name="BKMK_high-availability"> </a>
We don't recommend using a single ExpressRoute circuit with the Internet as a ba
### Example 2: Failover and High Availability
-Woodgrove Bank's multi-geographic design has undergone a review of routing, bandwidth, security, and now must go through a high availability review. Woodgrove thinks about high availability as covering three categories; resiliency, reliability, and redundancy.
+Contoso's multi-geographic design has undergone a review of routing, bandwidth, security, and now must go through a high availability review. Contoso thinks about high availability as covering three categories; resiliency, reliability, and redundancy.
-Resiliency allows Woodgrove to recover from failures quickly. Reliability allows Woodgrove to offer a consistent outcome within the system. Redundancy allows Woodgrove to a move between one or more mirrored instances of infrastructure.
+Resiliency allows Contoso to recover from failures quickly. Reliability allows Contoso to offer a consistent outcome within the system. Redundancy allows Contoso to a move between one or more mirrored instances of infrastructure.
-Within each edge configuration, Woodgrove has redundant Firewalls, Proxies, and IDS. For North America, Woodgrove has one edge configuration in their Dallas datacenter and another edge configuration in their Virginia datacenter. The redundant equipment at each location offers resiliency to that location.
+Within each edge configuration, Contoso has redundant Firewalls, Proxies, and IDS. For North America, Contoso has one edge configuration in their Dallas datacenter and another edge configuration in their Virginia datacenter. The redundant equipment at each location offers resiliency to that location.
-The network configuration at Woodgrove Bank is built based on a few key principles:
+The network configuration at Contoso is built based on a few key principles:
- Within each geographic region, there are multiple Azure ExpressRoute circuits.
The network configuration at Woodgrove Bank is built based on a few key principl
- Routing will clearly prefer one or the other path depending on availability, location, and so on. -- Failover between Azure ExpressRoute circuits happens automatically without additional configuration or action required by Woodgrove.
+- Failover between Azure ExpressRoute circuits happens automatically without additional configuration or action required by Contoso.
-- Failover between Internet circuits happens automatically without additional configuration or action required by Woodgrove.
+- Failover between Internet circuits happens automatically without additional configuration or action required by Contoso.
-In this configuration, with redundancy at the physical and virtual level, Woodgrove Bank is able to offer local resiliency, regional resiliency, and global resiliency in a reliable way. Woodgrove elected this configuration after evaluating a single Azure ExpressRoute circuit per region as well as the possibility of failing over to the internet.
+In this configuration, with redundancy at the physical and virtual level, Contoso is able to offer local resiliency, regional resiliency, and global resiliency in a reliable way. Contoso elected this configuration after evaluating a single Azure ExpressRoute circuit per region as well as the possibility of failing over to the internet.
-If Woodgrove was unable to have multiple Azure ExpressRoute circuits per region, routing traffic originating in North America to the Azure ExpressRoute circuit in Asia Pacific would add an unacceptable level of latency and the required DNS forwarder configuration adds complexity.
+If Contoso was unable to have multiple Azure ExpressRoute circuits per region, routing traffic originating in North America to the Azure ExpressRoute circuit in Asia Pacific would add an unacceptable level of latency and the required DNS forwarder configuration adds complexity.
-Using the internet as a backup configuration isn't recommended. This breaks Woodgrove's reliability principle, resulting in an inconsistent experience using the connection. Additionally, manual configuration would be required to fail over considering the BGP advertisements that have been configured, NAT configuration, DNS configuration, and the proxy configuration. This added failover complexity increases the time to recover and decreases their ability to diagnose and troubleshoot the steps involved.
+Using the internet as a backup configuration isn't recommended. This breaks Contoso's reliability principle, resulting in an inconsistent experience using the connection. Additionally, manual configuration would be required to fail over considering the BGP advertisements that have been configured, NAT configuration, DNS configuration, and the proxy configuration. This added failover complexity increases the time to recover and decreases their ability to diagnose and troubleshoot the steps involved.
Still have questions about how to plan for and implement traffic management or Azure ExpressRoute? Read the rest of our [network and performance guidance](./network-planning-and-performance.md) or the [Azure ExpressRoute FAQ](/azure/expressroute/expressroute-faqs).
enterprise Office 365 Network Mac Perf Onboarding Tool https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-onboarding-tool.md
You can run it by double clicking the executable in Windows File Explorer, or yo
The first time you launch the executable you will be prompted to accept the end user license agreement (EULA) before testing is performed. If you have already read and accepted the EULA you can create an empty file called Microsoft-365-Network-Connectivity-Test-EULA-accepted.txt in the current working directory for the executable process when it is launched. To accept the EULA you can type 'y' and press enter in the command line window when prompted.
-The executable accepts a command line parameter of /h to show a link to this help documentation.
+The executable accepts the following command line parameters:
+- -h to show a link to this help documentation
+- -testlist &lt;test&gt; Specifies tests to run. By default only basic tests are run. Valid test names include: all, dnsConnectivityPerf, dnsResolverIdentification, bufferBloat, traceroute, proxy, vpn, skype, connectivity, networkInterface
+- -filepath &lt;filedir&gt; Directory path of test result files. Allowed value is absolute or relative path of an accessible directory
+- -city &lt;city&gt; For the city, state, and country fields the specified value will be used if provided. If not provided then Windows Location Services (WLS) will be queried. If WLS fails the location will be detected fromthe machines network egress
+- -state &lt;state&gt;
+- -country &lt;country&gt;
+- -proxy &lt;account&gt; &lt;password&gt; Proxy account name and password can be provided if you require a proxy to access the Internet
### Results
-Output of results are written to a JSON file in a folder called TestResults which is created in the current working directory of the process unless it already exists. The filename format for the output is connectivity_test_result_YYYY-MM-DD-HH-MM-SS.json. The results are in JSON nodes that match the output shown on the web page for the Microsoft 365 network connectivity test tool web site. A new result file is created each time you run it and the standalone executable does not upload results to your Microsoft tenant for viewing in the Admin Center Network Connectivity pages.
+Output of results are written to a JSON file in a folder called TestResults which is created in the current working directory of the process unless it already exists. The filename format for the output is connectivity_test_result_YYYY-MM-DD-HH-MM-SS.json. The results are in JSON nodes that match the output shown on the web page for the Microsoft 365 network connectivity test tool web site. A new result file is created each time you run it and the standalone executable does not upload results to your Microsoft tenant for viewing in the Admin Center Network Connectivity pages. Front door codes, longitudes, and latitudes are not included in the result file.
### Launching from Windows File Explorer You can simply double click on the executable to start the testing and a command prompt window will appear.
enterprise Office 365 Network Mac Perf Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-overview.md
The Microsoft 365 Admin Center now includes aggregated network connectivity metr
> [!div class="mx-imgBorder"] > ![Network performance page.](../media/m365-mac-perf/m365-mac-perf-page-nav.png)
->[!NOTE]
->Network connectivity in the Admin Center supports tenants in WW Commercial and Germany but not GCC Moderate, GCC High, DoD or China.
+> [!NOTE]
+> Network connectivity in the Admin Center supports tenants in WW Commercial and Germany but not GCC Moderate, GCC High, DoD or China.
When you first navigate to the network performance page, you'll have to configure your locations in order to see the map of global network performance, a network assessment scoped to the entire tenant, percentage of your users working remotely vs onsite, and a list of current issues to take action on and/or to research further. From the overview pane, you can drill down to view specific network performance metrics and issues by location. For more information, see [Network performance overview in the Microsoft 365 Admin Center](#network-connectivity-overview-in-the-microsoft-365-admin-center).
You can view a table view of the locations where they can be filtered, sorted, a
## Remote worker assessment and user connection metrics
-We classify network traffic logs as remote or onsite users and show their percentages in the user connection metrics section of the overview pane. For cities where you have remote users, you'll find the location specific remote network assessment score when you open that locationΓÇÖs page. The locations list will have both office locations and remote worker cities, which can be filtered and sorted. We provide the remote worker assessment score, with points breakdown for Exchange, SharePoint and Teams.
+We classify network traffic logs as remote or onsite users and show their percentages in the user connection metrics section of the overview pane. For cities where you have remote users, you'll find the location specific remote network assessment score when you open that location's page. The locations list will have both office locations and remote worker cities, which can be filtered and sorted. We provide the remote worker assessment score, with points breakdown for Exchange, SharePoint and Teams.
Home user networking insights are aggregated and reported at a city level and limited to cities with a minimum of 5 remote employees. We are not identifying individual employees working from home.
In the CSV file, a discovered city location shows in the userEntered column as b
> [!div class="mx-imgBorder"] > ![CSV import ready message.](../media/m365-mac-perf/m365-mac-perf-import-ready.png)
+## CQD TSV Import for LAN subnet office locations
+
+If you've uploaded building data to your Call Quality Dashboard, you can add those locations here to start assessing their network connectivity. This won't affect your existing locations.
+
+[Go to Tenant Data Upload](https://cqd.teams.microsoft.com/spd/#/TenantDataUpload) in Call Quality Dashboard. If you've uploaded your building data, you'll see an option to download it to a .tsv file. Download the .tsv file from Call Quality Dashboard, then upload it in the CQD flyout following the steps below. If you want to create the .tsv file manually, please align the schema with that in Upload building data file, or try the CSV Import for LAN subnet office locations instead.
+
+1. In the main Connectivity to Microsoft 365 window, click the **Locations** tab.
+
+2. Click the **Manage multiple locations** button just above the locations list.
+
+ > [!div class="mx-imgBorder"]
+ > ![Manage multiple locations menu.](../media/m365-mac-perf/m365-mac-perf-import-cqd-manage-multiple.png)
+
+3. Click the **Add locations from Call Quality Dashboard**, the **Add locations from Call Quality Dashboard** flyout will appear.
+
+ > [!div class="mx-imgBorder"]
+ > ![Add locations from Call Quality Dashboard flyout.](../media/m365-mac-perf/m365-mac-perf-import-cqd-add-locations.png)
+
+4. Click the **Browse** button next to the **Select a .tsv file to upload** field and select the saved TSV file. Please make sure the value in the file is tab separated.
+
+5. The file will be automatically validated and parsed to the list of office locations. If there are validation errors, the **We couldn't upload your file** flyout appears to list the errors.
+
+ > [!div class="mx-imgBorder"]
+ > ![We couldnt upload your file flyout.](../media/m365-mac-perf/m365-mac-perf-import-cqd-couldnt-upload.png)
+
+6. If there are no errors in the file, you will see the message: _Your file test.tsv is uploaded and ready. Select Import to upload your information._
+
+ > [!div class="mx-imgBorder"]
+ > ![Select a .tsc file to upload.](../media/m365-mac-perf/m365-mac-perf-import-cqd-select-tsv.png)
+
+7. Click **Upload** button at the bottom of the panel to upload the office locations.
+ ## FAQ ### What is a Microsoft 365 service front door? The Microsoft 365 service front door is an entry point on Microsoft's global network where Office clients and services terminate their network connection. For an optimal network connection to Microsoft 365, it is recommended that your network connection is terminated into the closest Microsoft 365 front door.
->[!NOTE]
->Microsoft 365 service front door has no direct relationship to the Azure Front Door Service product available in the Azure marketplace.
+> [!NOTE]
+> Microsoft 365 service front door has no direct relationship to the Azure Front Door Service product available in the Azure marketplace.
### What is an optimal Microsoft 365 service front door?
lti Index https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lti/index.md
For configuration steps, see:
- [Microsoft Teams Meetings with Canvas](teams-meetings-with-canvas.md). - [Microsoft Teams Meetings with Moodle](teams-classes-meetings-with-moodle.md).
+- [Microsoft Teams Meetings with Open LMS](open-lms-teams-classes-and-meetings.md).
### Teams classes LTI
The Microsoft Teams classes LTI app helps educators and students navigate betwee
For configuration steps, see: -- [Teams Classes LTI with Canvas](teams-classes-with-canvas.md).-- [Teams Classes LTI with Blackboard](teams-classes-with-blackboard.md).-- [Teams Classes LTI with Moodle](teams-classes-meetings-with-moodle.md).
+- [Microsoft Teams Classes LTI with Canvas](teams-classes-with-canvas.md).
+- [Microsoft Teams Classes LTI with Blackboard](teams-classes-with-blackboard.md).
+- [Microsoft Teams Classes LTI with Moodle](teams-classes-meetings-with-moodle.md).
+- [Microsoft Teams Classes LTI with Open LMS](open-lms-teams-classes-and-meetings.md).
lti Open Lms Plugin Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lti/open-lms-plugin-configuration.md
+
+ Title: Set up and configure the Moodle plugin for Open LMS
++++
+audience: admin
++
+f1.keywords:
+- CSH
+
+ms.localizationpriority: medium
+description: Get ready to integrate One LMS and Microsoft Teams by setting up and configuring the Moodle plugin.
++
+# Set up and configure the Moodle plugin
+
+In this article, you'll learn how to install and configure the Moodle plugin to incorporate Microsoft Teams with your Open LMS experience.
+
+> [!NOTE]
+> Currently, Open LMS and Microsoft Teams LTI integrations are only available in private preview.
+>
+>If you'd like to participate in the private preview program, [sign up here](https://m365crmedu.powerappsportals.com/LMSSignup)
+
+## Prerequisites
+
+Here are the prerequisites to install the Moodle plugin:
+
+* Moodle administrator credentials.
+* Microsoft Azure Active Directory (Azure AD) administrator credentials.
+* An Azure subscription where you can create new resources.
+
+## 1. Install the Microsoft 365 Moodle Plugin
+
+Open LMS integration in Microsoft Teams is powered by the open source [Microsoft 365 Moodle plugin set](https://moodle.org/plugins/browse.php?list=set&id=72).
+
+### Requisite applications and plugins
+
+Install and download the following items before proceeding with the Microsoft 365 Moodle plugin installation:
+
+1. A [current stable version of Moodle](https://download.moodle.org/releases/latest/).
+1. Download and save the Moodle [OpenID Connect](https://moodle.org/plugins/auth_oidc) and the [Microsoft 365 Integration](https://moodle.org/plugins/local_o365) plugins to your local computer.
+
+ > [!NOTE]
+ > Installing the OpenID Connect and Microsoft 365 Integration plugins is required for the Teams integration.
+ >
+ > The [Microsoft 365 Teams Theme](https://moodle.org/plugins/theme_boost_o365teams) plugin is recommended.
+
+### Microsoft 365 Moodle plugins
+
+#### Install plugins
+
+1. Download the plugins, extract them, and upload to their corresponding folders. For example, extract the OpenID Connect plugin (auth_oidc) to a folder called **oidc**, and upload to the **auth** folder of your Moodle document root.
+2. Sign in to your Moodle site as an administrator and select **Site administration**.
+3. Upon detection of new plugins to be installed, Moodle should redirect you to the install new plugins page. If this doesn't happen, in the **Site administration** page, select **Notifications** in the **General** tab as this should trigger the installation of the plugins.
+
+ > [!IMPORTANT]
+ >
+ > * Keep your Microsoft 365 Moodle Plugins configuration page open in a separate browser tab as you need to return to this set of pages throughout the process.
+ >
+ > * If you don't have an existing Moodle site, go to the [Moodle on Azure](https://github.com/azure/moodle) repo, and quickly deploy a Moodle instance and customize it to your needs.
+
+#### Enable the OpenID Connect authentication plugin
+
+1. Navigate to **Site Administration** > **Plugins** > **Authentication** then select **Manage Authentication**.
+1. Find the **OpenID Connect** authentication plugin and select the *eye icon* to enable it.
+1. Select **Settings** for the plugin to verify the **Authorization** and **Token** endpoints.
+ 1. The default values should be:
+ 1. Authorization endpoint: ``https://login.microsoftonline.com/common/oauth2/authorize``.
+ 1. Token endpoint: ``https://login.microsoftonline.com/common/oauth2/token``.
+1. Record the **Redirect URI** for later use.
+
+## 2. Configure the connection between the Microsoft 365 plugins and Azure AD
+
+You must configure the connection between the Microsoft 365 plugins and Azure AD.
+
+### Requisites
+
+Register Moodle as an application in your Azure AD, using the PowerShell script. The script provisions the following items:
+
+* A new Azure AD application for your Microsoft 365 tenant, which is used by the Microsoft 365 Moodle Plugins.
+* The app for your Microsoft 365 tenant sets up the required reply URLs and permissions for the provisioned app and returns the `AppID` and `Key`.
+
+Use the generated `AppID` and `Key` in your Microsoft 365 Moodle Plugins setup page to configure your Moodle server site with Azure AD.
+
+> [!IMPORTANT]
+> For more information on registering your Moodle instance manually, see [Register your Moodle instance as an application](https://docs.moodle.org/400/en/Microsoft_365#Azure_App_Creation_and_Configuration).
+
+### Teams for Open LMS setup process
+
+1. From the Microsoft 365 Integration plugins page, select the **Setup** tab.
+
+1. Select the **Download PowerShell Script** button and save it as a ZIP folder to your local computer.
+
+1. Prepare the PowerShell script from the ZIP file as follows:
+
+ 1. Download and extract the `Moodle-AzureAD-Powershell.zip` file.
+ 1. Open the extracted folder.
+ 1. Right-click on the `Moodle-AzureAD-Script.ps1` file and select **Properties**.
+ 1. Under the **General** tab of the Properties window, select the `Unblock` checkbox next to the **Security** attribute located at the bottom of the window.
+ 1. Select **OK**.
+ 1. Copy the directory path to the extracted folder.
+
+1. Run PowerShell as an administrator:
+
+ 1. Select Start.
+ 1. Type PowerShell.
+ 1. Right-click on **Windows PowerShell**.
+ 1. Select **Run as Administrator**.
+
+1. Navigate to the unzipped directory by typing `cd .../.../Moodle-AzureAD-Powershell` where `.../...` is the path to the directory.
+
+1. Execute the PowerShell script:
+
+ 1. Enter `Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser`.
+ 1. Enter `./Moodle-AzureAD-Script.ps1`.
+ 1. Sign in to your Microsoft 365 administrator account in the pop-up window.
+ 1. Enter the name of the Azure AD Application, for example, Moodle or Moodle plugins.
+ 1. Enter the URL for your Moodle server.
+ 1. Copy the **Application ID (`AppID`)** and **Application Key(`Key`)** generated by the script and save them.
+
+1. Return to the plugins administration page, **Site administration** > **Plugins** > **Authentication** > **OpenID Connect**.
+
+1. Paste the `AppID` value into the **Application ID** box and the `Key` value into the **Key** box, and then select **Save changes**.
+
+1. Navigate to **Site administration** > **Plugins** > **Local plugins** and select **Microsoft 365 Integration**.
+
+1. In **Choose connection method**, select **Application access**, and then select **Save changes** again.
+
+1. After the page refreshes, you can see another new section **Admin consent & additional information**.
+ 1. Select **Provide Admin Consent** link, enter your Microsoft 365 Global Administrator credentials, then **Accept** to grant the permissions.
+ 1. Next to the **Azure AD Tenant** field, select the **Detect** button.
+ 1. Next to the **OneDrive for Business URL**, select the **Detect** button.
+ 1. After the fields populate, select the **Save changes** button again.
+
+1. Select the **Update** button to verify the installation, and then select **Save changes**.
+
+1. Synchronize users between your Moodle server and Azure AD. Depending on your environment, you can select different options during this stage. To get started:
+ 1. Switch to the **Sync Settings tab**.
+
+ 1. In the **Sync users with Azure AD** section, select the checkboxes that apply to your environment. You must select the following options:
+
+ Γ£ö Create accounts in Open LMS for users in Azure AD.
+
+ Γ£ö Update all accounts in Open LMS for users in Azure AD.
+
+ 1. In the **User Creation Restriction** section, you can set up a filter to limit the Azure AD users that are synced to Open LMS.
+ 1. In the **Course Sync** section, you can select **Course sync customization** option to enable the automatic creation of Groups and Teams for some, or all, of your existing Open LMS courses.
+
+1. To validate [cron](https://docs.moodle.org/400/en/Cron) tasks and to run them manually for the first time, navigate to **Site administration** > **Server** > **Tasks** > **Scheduled tasks**.
+
+ 1. Scroll down and find the task **Sync users with Azure AD** and select **Run now**.
+ 1. This process will sync the Azure AD user to your Open LMS site.
+ 1. Next, find the **Sync Moodle courses to Microsoft Teams** task and select **Run now**.
+ 1. This task will create groups and Teams if an owner is found.
+ 1. If the user has `local/o365:teamowner` capability in the course context, the user is a team owner. If the user has `local/o365:teammember` capability in the course context, the user is a team member.
+ 1. The default *Teacher* role has the `local/o365:teamowner` capability, and the default *Student* role has the `local/o365:teammember` capability.
+
+ > [!NOTE]
+ > The Moodle [Cron](https://docs.moodle.org/400/en/Scheduled_tasks) runs according to the task schedule. The default schedule is once a day at 1:00 AM in your server's local time zone. However, the cron should run more frequently to keep everything in sync.
+
+1. Navigate to **Site administration** > **Plugins** > **Local plugins** > **Microsoft 365 Integration** > **Teams Settings** tab.
+
+1. Select the **Check Moodle settings** button will update all required configurations for the Teams integration to work.
+
+After the plugins are installed and configured, you can:
+
+* [Deploy Moodle Assistant Bot to Azure](/microsoftteams/install-moodle-integration#step-3-deploy-the-moodle-assistant-bot-to-azure).
+* [Add Moodle tabs to Teams classes](/microsoftteams/install-moodle-integration#step-4-deploy-your-microsoft-teams-app).
+* [Add Teams classes and meetings to Open LMS](open-lms-teams-classes-and-meetings.md).
+
+## Extra Moodle plugin documentation
+
+If you would like to review Open LMS's Microsoft 365 integration guides and release notes, see these resources:
+
+* [Microsoft 365 integration documentation on Moodle Docs](https://docs.moodle.org/400/en/Microsoft_365).
lti Open Lms Teams Classes And Meetings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lti/open-lms-teams-classes-and-meetings.md
+
+ Title: Integrate Microsoft Teams classes and meetings with Open LMS
++++
+audience: admin
++
+f1.keywords:
+- CSH
+
+ms.localizationpriority: medium
+description: Create and manage Teams classes and meetings with Microsoft OneDrive Learning Tools Interoperability for Open LMS.
++
+# Integrate Microsoft Teams classes and meetings within Open LMS
+
+> [!NOTE]
+> Currently, Open LMS and Microsoft Teams LTI integrations are only available in private preview.
+>
+>If you'd like to participate in the private preview program, [sign up here](https://m365crmedu.powerappsportals.com/LMSSignup/).
+
+This guide provides the IT admin steps for registering both Teams Classes and Teams Meetings LTI apps on Open LMS.
+
+For details on managing all LTI apps for any LMS, see [Manage Microsoft LMS Gateway for any LMS](manage-microsoft-one-lti.md).
+
+## Prerequisites before set up
+
+For the integration between Open LMS and Teams to function correctly, Open LMS and Teams must be set up to communicate with one another.
+
+Follow the [instructions for installing and configuring the Moodle plugin](open-lms-plugin-configuration.md).
+
+## Register Microsoft Teams LTI for use in Open LMS
+
+> [!IMPORTANT]
+> The person who performs this integration should be an Open LMS administrator and a Microsoft 365 tenant administrator.
+
+1. Visit [Microsoft LMS Gateway](https://lti.microsoft.com/) and select the **Go to registration portal** button.
+
+2. Sign in with a Microsoft 365 administrator account.
+
+3. After signing in, select **Add new registration**.
+
+4. Select either **Teams Meetings LTI** or **Teams Classes LTI** to register and then select **Next**.
+
+5. Enter in an easily identifiable **Registration** name and select **Open LMS** as the LMS platform. Select **Next**.
+
+6. You'll be given a list of keys that need to be added to your Open LMS site.
+
+7. Open Open LMS in another tab. Don't close the Microsoft LMS Gateway tab.
+
+8. In Open LMS, go to **Site administration** > **Plugins** > **Activity modules** > **External tools** > **Manage tools**.
+
+9. On the **Manage tools** page, select **configure a tool manually**.
+
+10. Under **Tool settings**, enter in a **Tool name** like **Microsoft Teams Classes**. For **LTI version**, select **LTI 1.3**. For **Public key type**, select **Keyset URL**.
+
+11. Next, copy the keys from **Microsoft LTI keys** to the corresponding tools inputs.
+ 1. Microsoft's **Target link URL** key goes into Open LMS's **Tool URL** field.
+ 1. Microsoft's **Open ID connection URL** key goes into Open LMS's **Initiate login URL** field.
+ 1. Microsoft's **Redirect URL** key goes into Open LMS's **Redirection URI(s)** field.
+
+12. Select **Save changes**.
+
+13. The new tool should now appear in the **Tools** section of Open LMS's **Manage tools** page. Select the list icon to view **Tool configuration details**.
+
+14. Go back to the Microsoft LMS Gateway tab. Select **Next** to go to the **LMS provided registration keys** step.
+
+15. Copy and paste the values from Open LMS's **Tool configuration details** to Microsoft's **LMS provided registration keys** step.
+
+ Paste the values as follows:
+
+ | On Open LMS | On Microsoft LTI registration portal |
+ | | |
+ | Platform ID | Issuer ID URL |
+ | Client ID | Client ID |
+ | Deployment ID | Deployment ID |
+ | Public keyset URL | Keyset URL |
+ | Access token URL | Access token URL |
+ | Authentication request URL | Platform authentication URL |
+
+ Select **Next**.
+
+16. Review the **Review and add** page. If there are no errors, select **Save and exit**. You should see a message indicating successful registration.
+
+You've completed registration of either the Teams Classes or Teams Meetings LTI app.
+
+If you would like to add the other app too, repeat the steps above, selecting the other Teams LTI app in step 4.
+
+### Add Teams LTI apps to educators' Open LMS courses
+
+After registering Teams LTI apps, educators can add the Teams Classes app and the Teams Meetings app to their Open LMS courses.
+
+- [Educator instructions on adding the Teams Classes app](https://support.microsoft.com/topic/use-microsoft-teams-classes-in-your-lms-ac6a1e34-32f7-45e6-b83e-094185a1e78a).
+- [Educator instructions on adding the Teams Meetings app](https://support.microsoft.com/topic/use-microsoft-teams-meetings-in-your-lms-11b6095d-f90b-42b9-ab77-4dcff2bb3b76).
+
+## Technical requirements to launch Teams LTI apps
+
+To launch the Teams LTI apps within Open LMS, there are a few technical requirements that need to be met.
+
+> [!NOTE]
+> IT admins and educators can register LTI apps on the LTI apps registration portal.
+
+### IT admin technical requirements
+
+- Use Moodle version 3.10 or above.
+- Download the latest Microsoft O365 plugin for Moodle version 3.10 or above.
+- Access the LTI apps registration portal to register the LTI apps.
+ - Registration must be on completed on a desktop device.
+- Download the latest version of Microsoft Edge, Google Chrome, Safari, or Mozilla Firefox.
+
+### Educator technical requirements
+
+- Access the LTI apps registration portal to register the LTI apps, if the IT admin hasn't registered the apps.
+ - Registration must be on completed on a desktop device.
+- Download the latest version of Microsoft Edge, Google Chrome, Safari, or Mozilla Firefox.
+- [Teams LTI apps for Classes and Meetings in Open LMS](#add-teams-lti-apps-to-educators-open-lms-courses).
+
+### Student technical requirements
+
+- Teams LTI apps for Classes and Meetings in Open LMS.
+ - Students don't need to take any actions to add the Teams Classes or Meetings LTI apps.
security Device Control Removable Storage Access Control https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-removable-storage-access-control.md
To help you familiarize with Microsoft Defender for Endpoint Removable Storage A
1. Group 1: Any removable storage and CD/DVD. An example for this use case is: Group **9b28fae8-72f7-4267-a1a5-685f747a7146** in the sample [Any Removable Storage and CD-DVD Group.xml](https://github.com/microsoft/mdatp-devicecontrol/tree/main/Removable%20Storage%20Access%20Control%20Samples) file.
- 2. Group 2: Unapproved USBs based on device properties, for example, Vendor ID / Product ID, Friendly Name ΓÇô Group **65fa649a-a111-4912-9294-fb6337a25038** in the sample [Unapproved USBs Group.xml](https://github.com/microsoft/mdatp-devicecontrol/tree/main/Removable%20Storage%20Access%20Control%20Samples) file.
+ 2. Group 2: Unapproved USBs based on device properties, for example, Vendor ID / Product ID, Friendly Name - Group **65fa649a-a111-4912-9294-fb6337a25038** in the sample [Unapproved USBs Group.xml](https://github.com/microsoft/mdatp-devicecontrol/tree/main/Removable%20Storage%20Access%20Control%20Samples) file.
> [!TIP] > Replace `&` with `&amp;` in the value.
Before you get started with Removable Storage Access Control, you must confirm
For policy deployment in Intune, the account must have permissions to create, edit, update, or delete device configuration profiles. You can create custom roles or use any of the built-in roles with these permissions. - Policy and profile Manager role- - Custom role with Create/Edit/Update/Read/Delete/View Reports permissions turned on for Device Configuration profiles- - Global administrator ### Deploying Removable Storage Access Control by using Intune OMA-URI Go to Microsoft Endpoint Manager admin center (<https://endpoint.microsoft.com/>) **> Devices > Create profile > Platform: Windows 10 and later, Profile type: Templates > Custom**
-1. Enable or Disable Removable Storage Access Control (RSAC):<br> You can enable Removable Storage Access Control as follows:
- - Under **Custom > Configuration settings**, click **Add**.
- - In the **Add Row** pane, enter:
- - **Name** as **Enable RSAC**
-
- - **OMA-URI** as
- `./Vendor/MSFT/Defender/Configuration/DeviceControlEnabled`
-
- - **Data Type** as **Integer**
-
- - **Value** as **1**
-
- `Disable: 0`
- `Enable: 1`
-
- - Click **Save**.
-
- :::image type="content" source="images/enable-rsac.png" alt-text="Screenshot of enabling Removable Storage Access Control policy" lightbox="images/enable-rsac.png":::
-
-2. Set Default Enforcement:<br>
- You can set default access (Deny or Allow) to removable media if there is no policy. <br>
- For example, you have either Deny or Allow policy for RemovableMediaDevices, but you do not have any policy for CdRomDevices or WpdDevices. You set Default Deny through this policy, then Read/Write/Execute access to CdRomDevices or WpdDevices will be blocked.
-
- - In the **Add Row** pane, enter:
- - **Name** as **Default Deny**
- - **OMA-URI** as
- `./Vendor/MSFT/Defender/Configuration/DefaultEnforcement`
-
- - **Data Type** as **Integer**
-
- - **Value** as **1** or **2**
-
- `DefaultEnforcementAllow = 1`
- `DefaultEnforcementDeny = 2`
- - Click **Save**.
-
- :::image type="content" source="images/default-deny.png" alt-text="Screenshot of setting Default Enforcement as Deny" lightbox="images/default-deny.png":::
-
-3. Audit Default Deny:<br> You can create Audit policy for Default Deny as follows:
- - In the **Add Row** pane, enter:
- - **Name** as **Audit Default Deny**
- - **OMA-URI** as
- `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7bf3520ea7-fd1b-4237-8ebc-96911db44f8e%7d/RuleData`
- :::image type="content" source="images/audit-default-deny-1.png" alt-text="Screenshot of creating Audit Default Deny policy" lightbox="images/audit-default-deny-1.png":::
- - **Data Type** as **String (XML file)**
- - **Custom XML** as **Audit Default Deny.xml** file. <br>
- XML file path: [mdatp-devicecontrol/Audit Default Deny.xml at main ┬╖ microsoft/mdatp-devicecontrol (github.com](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Audit%20Default%20Deny.xml)
- <br>Use the following XML data to create Audit policy for Default Deny:
-
- :::image type="content" source="images/audit-default-deny-xml-file-1.png" alt-text="Screenshot of audit default deny xml file":::
-
-
-4. ReadOnly - Group: You can create removable storage group with ReadOnly access as follows:
- - In the **Add Row** pane, enter:
- - **Name** as **Any Removable Storage Group**
- - **OMA-URI** as
- `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b9b28fae8-72f7-4267-a1a5-685f747a7146%7d/GroupData`
- :::image type="content" source="images/any-removable-storage-group.png" alt-text="Screenshot of creating any Removable Storage Group" lightbox="images/any-removable-storage-group.png":::
- - **Data Type** as **String (XML file)**
- - **Custom XML** as **Any Removable Storage and CD-DVD and WPD Group.xml** file <br>
- XML file path: [mdatp-devicecontrol/Any Removable Storage and CD-DVD and WPD Group.xml at main ┬╖ microsoft/mdatp-devicecontrol (github.com](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Any%20Removable%20Storage%20and%20CD-DVD%20and%20WPD%20Group.xml)<br>
- Use the following XML data to create 'Any Removable Storage and CD-DVD and WPD Group' with ReadOnly access:
-
- :::image type="content" source="images/read-only-group-xml-file.png" alt-text="Screenshot of read only group xml file":::
-
-
-5. ReadOnly - Policy: You can create ReadOnly policy and apply to the ReadOnly removable storage group to allow read activity as follows:
- - In the **Add Row** pane, enter:
- - **Name** as **Allow Read Activity**
- - **OMA-URI** as
- `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7bf7e75634-7eec-4e67-bec5-5e7750cb9e02%7d/RuleData`
- :::image type="content" source="images/allow-read-activity.png" alt-text="Screenshot of Allow Read Activity policy" lightbox= "images/allow-read-activity.png":::
- - **Data Type** as **String (XML file)**
- - **Custom XML** as **Allow Read.xml** file <br>
- XML file path: [mdatp-devicecontrol/Allow Read.xml at main ┬╖ microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Allow%20Read.xml)<br>
- Use the following XML data to create ReadOnly policy and apply to the ReadOnly removable storage group:
- :::image type="content" source="images/read-only-policy-xml-file.png" alt-text="Screenshot of read only policy xml file":::
-
+1. Enable or Disable Removable Storage Access Control (RSAC):
+
+ You can enable Removable Storage Access Control as follows:
+
+ - Under **Custom > Configuration settings**, click **Add**.
+ - In the **Add Row** pane, enter:
+ - **Name** as **Enable RSAC**
+ - **OMA-URI** as `./Vendor/MSFT/Defender/Configuration/DeviceControlEnabled`
+ - **Data Type** as **Integer**
+ - **Value** as **1**
+
+ `Disable: 0`
+ `Enable: 1`
+
+ - Click **Save**.
+
+ :::image type="content" source="images/enable-rsac.png" alt-text="Screenshot of enabling Removable Storage Access Control policy" lightbox="images/enable-rsac.png":::
+
+2. Set Default Enforcement:
+
+ You can set default access (Deny or Allow) to removable media if there is no policy.
+
+ For example, you have either Deny or Allow policy for RemovableMediaDevices, but you do not have any policy for CdRomDevices or WpdDevices. You set Default Deny through this policy, then Read/Write/Execute access to CdRomDevices or WpdDevices will be blocked.
+
+ - In the **Add Row** pane, enter:
+ - **Name** as **Default Deny**
+ - **OMA-URI** as `./Vendor/MSFT/Defender/Configuration/DefaultEnforcement`
+ - **Data Type** as **Integer**
+ - **Value** as **1** or **2**
+
+ `DefaultEnforcementAllow = 1`
+ `DefaultEnforcementDeny = 2`
+
+ - Click **Save**.
+
+ :::image type="content" source="images/default-deny.png" alt-text="Screenshot of setting Default Enforcement as Deny" lightbox="images/default-deny.png":::
+
+3. Audit Default Deny:
+
+ You can create Audit policy for Default Deny as follows:
+
+ - In the **Add Row** pane, enter:
+ - **Name** as **Audit Default Deny**
+ - **OMA-URI** as `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7bf3520ea7-fd1b-4237-8ebc-96911db44f8e%7d/RuleData`
+
+ :::image type="content" source="images/audit-default-deny-1.png" alt-text="Screenshot of creating Audit Default Deny policy" lightbox="images/audit-default-deny-1.png":::
+
+ - **Data Type** as **String (XML file)**
+ - **Custom XML** as **Audit Default Deny.xml** file.
+
+ XML file path: <https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Audit%20Default%20Deny.xml>
+
+ Use the following XML data to create Audit policy for Default Deny:
+
+ :::image type="content" source="images/audit-default-deny-xml-file-1.png" alt-text="Screenshot of audit default deny xml file":::
+
+4. ReadOnly - Group:
+
+ You can create removable storage group with ReadOnly access as follows:
+
+ - In the **Add Row** pane, enter:
+ - **Name** as **Any Removable Storage Group**
+ - **OMA-URI** as `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b9b28fae8-72f7-4267-a1a5-685f747a7146%7d/GroupData`
+
+ :::image type="content" source="images/any-removable-storage-group.png" alt-text="Screenshot of creating any Removable Storage Group" lightbox="images/any-removable-storage-group.png":::
+
+ - **Data Type** as **String (XML file)**
+ - **Custom XML** as **Any Removable Storage and CD-DVD and WPD Group.xml** file
+
+ XML file path: <https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Any%20Removable%20Storage%20and%20CD-DVD%20and%20WPD%20Group.xml>
+
+ Use the following XML data to create 'Any Removable Storage and CD-DVD and WPD Group' with ReadOnly access:
+
+ :::image type="content" source="images/read-only-group-xml-file.png" alt-text="Screenshot of read only group xml file":::
+
+5. ReadOnly - Policy:
+
+ You can create ReadOnly policy and apply to the ReadOnly removable storage group to allow read activity as follows:
+
+ - In the **Add Row** pane, enter:
+ - **Name** as **Allow Read Activity**
+ - **OMA-URI** as `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7bf7e75634-7eec-4e67-bec5-5e7750cb9e02%7d/RuleData`
+
+ :::image type="content" source="images/allow-read-activity.png" alt-text="Screenshot of Allow Read Activity policy" lightbox= "images/allow-read-activity.png":::
+
+ - **Data Type** as **String (XML file)**
+ - **Custom XML** as **Allow Read.xml** file
+
+ XML file path: <https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Allow%20Read.xml>
+
+ Use the following XML data to create ReadOnly policy and apply to the ReadOnly removable storage group:
+
+ :::image type="content" source="images/read-only-policy-xml-file.png" alt-text="Screenshot of read only policy xml file":::
+ 6. Create Group for Allowed Medias: You can create allowed medias group as follows:
- - In the **Add Row** pane, enter:
- - **Name** as **Approved USBs Group**
- - **OMA-URI** as
- `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b65fa649a-a111-4912-9294-fb6337a25038%7d/GroupData`
- :::image type="content" source="images/create-group-allowed-medias.png" alt-text="Screenshot of creating Approved USBs group" lightbox="images/create-group-allowed-medias.png":::
- - **Data Type** as **String (XML file)**
- - **Custom XML** as **Approved USBs Group.xml** file <br>
- XML file path: [mdatp-devicecontrol/Approved USBs Group.xml at main ┬╖ microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Approved%20USBs%20Group.xml)<br>
- Use the following XML data to create allowed medias group:
- :::image type="content" source="images/create-group-allowed-medias-xml-file.png" alt-text="Screenshot of creating group for allowed medias xml file":::
-
-
+ - In the **Add Row** pane, enter:
+ - **Name** as **Approved USBs Group**
+ - **OMA-URI** as `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b65fa649a-a111-4912-9294-fb6337a25038%7d/GroupData`
+
+ :::image type="content" source="images/create-group-allowed-medias.png" alt-text="Screenshot of creating Approved USBs group" lightbox="images/create-group-allowed-medias.png":::
+
+ - **Data Type** as **String (XML file)**
+ - **Custom XML** as **Approved USBs Group.xml** file
+
+ XML file path: <https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Approved%20USBs%20Group.xml>
+
+ Use the following XML data to create allowed medias group:
+
+ :::image type="content" source="images/create-group-allowed-medias-xml-file.png" alt-text="Screenshot of creating group for allowed medias xml file":::
+ 7. Create Policy to allow the approved USB Group: You can create policy to allow the approved USB group as follows:
- - In the **Add Row** pane, enter:
- - **Name** as **Allow access and Audit file information**
- - **OMA-URI** as
- `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7bb2061588-029e-427d-8404-6dfec096a571%7d/RuleData`
- :::image type="content" source="images/allow-access-audit-file-information-1.png" alt-text="Screenshot of Allow access and audit file information" lightbox= "images/allow-access-audit-file-information-1.png":::
- - **Data Type** as **String (XML file)**
- - **Custom XML** as **Allow full access and audit file.xml** file <br>
- XML file path: [mdatp-devicecontrol/Allow full access and audit file.xml at main ┬╖ microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Allow%20full%20access%20and%20audit%20file.xml)<br>
- Use the following XML data to create policy to allow the approved USB group:
+ - In the **Add Row** pane, enter:
+ - **Name** as **Allow access and Audit file information**
+ - **OMA-URI** as `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7bb2061588-029e-427d-8404-6dfec096a571%7d/RuleData`
+
+ :::image type="content" source="images/allow-access-audit-file-information-1.png" alt-text="Screenshot of Allow access and audit file information" lightbox= "images/allow-access-audit-file-information-1.png":::
+
+ - **Data Type** as **String (XML file)**
+ - **Custom XML** as **Allow full access and audit file.xml** file
+
+ XML file path: <https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Allow%20full%20access%20and%20audit%20file.xml>
+
+ Use the following XML data to create policy to allow the approved USB group:
+ :::image type="content" source="images/create-policy-allow-approved-usb-group-xml-intune.png" alt-text="Screenshot of creating policy to allow the approved USB Group XML file":::
-
- What ΓÇÿ47ΓÇÖ means in the policy? <br>
- It is 9 + 2 + 36 = 47: <br>
- Read access: 1+8 = 9 <br>
- Write access: disk level 2 <br>
- Execute: 4 + 32 = 36
+
+ What does '47' mean in the policy? It's 9 + 2 + 36 = 47:
+
+ - Read access: 1 + 8 = 9.
+ - Write access: disk level 2.
+ - Execute: 4 + 32 = 36.
## Deploying and managing policy by using Intune user interface
Before you get started with Removable Storage Access Control, you must confirm y
### Deploying Removable Storage Access Control by using Group Policy
-1. Enable or Disable Removable Storage Access Control: <br> You can enable Removable Storage Access Control (RSAC) as follows:<br>
- - Go to **Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Features > Device Control**
- - In the **Device Control** window, select **Enabled**.
-
- :::image type="content" source="images/enable-rsac-gp.png" alt-text="Screenshot of Enabling RSAC using Group Policy " lightbox="images/enable-rsac-gp.png":::
-
-2. Set Default Enforcement: <br>
- You can set default access (Deny or Allow) to removable media if there is no policy as follows:
- - Go to **Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Features > Device Control > Select Device Control Default Enforcement**
-
- - In the **Select Device Control Default Enforcement** window, select **Default Deny**:
-
- :::image type="content" source="images/set-default-enforcement-deny-gp.png" alt-text="Screenshot of setting Default Enforcement = Deny using Group Policy" lightbox="images/set-default-enforcement-deny-gp.png":::
-
-3. Audit Default Deny: <br> Use the following XML data to create Audit policy for Default Deny:
-
- :::image type="content" source="images/audit-default-deny-gp.png" alt-text="Screenshot of audit default deny xml data":::
-
-
-4. ReadOnly - Group: <br>
+1. Enable or Disable Removable Storage Access Control:
+
+ You can enable Removable Storage Access Control (RSAC) as follows:
+
+ - Go to **Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Features > Device Control**
+ - In the **Device Control** window, select **Enabled**.
+
+ :::image type="content" source="images/enable-rsac-gp.png" alt-text="Screenshot of Enabling RSAC using Group Policy " lightbox="images/enable-rsac-gp.png":::
+
+2. Set Default Enforcement:
+
+ You can set default access (Deny or Allow) to removable media if there is no policy as follows:
+
+ - Go to **Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Features > Device Control > Select Device Control Default Enforcement**
+
+ - In the **Select Device Control Default Enforcement** window, select **Default Deny**:
+
+ :::image type="content" source="images/set-default-enforcement-deny-gp.png" alt-text="Screenshot of setting Default Enforcement = Deny using Group Policy" lightbox="images/set-default-enforcement-deny-gp.png":::
+
+3. Audit Default Deny:
+
+ Use the following XML data to create Audit policy for Default Deny:
+
+ :::image type="content" source="images/audit-default-deny-gp.png" alt-text="Screenshot of audit default deny xml data":::
+
+4. ReadOnly - Group:
+ Use the following XML data to create removable storage group with ReadOnly access:
-
+ :::image type="content" source="images/read-only-group-gp.png" alt-text="Screen shot of Read only removable storage group xml data":::
-
-
-5. ReadOnly - Policy: <br> Use the following XML data to create ReadOnly policy and apply to the ReadOnly removable storage group to allow read activity:
-
+
+5. ReadOnly - Policy:
+
+ Use the following XML data to create ReadOnly policy and apply to the ReadOnly removable storage group to allow read activity:
+ :::image type="content" source="images/read-only-policy-gp.png" alt-text="Screen shot of Read only policy xml data" lightbox="images/read-only-policy-gp.png":::
-
-
-6. Create Group for Allowed Medias: <br> Use the following XML data to create removable storage allowed medias group:
-
+
+6. Create Group for Allowed Medias:
+
+ Use the following XML data to create removable storage allowed medias group:
+ :::image type="content" source="images/create-group-allowed-medias-gp.png" alt-text="Screenshot of xml data for creating group for allowed medias" lightbox="images/create-group-allowed-medias-gp.png":::
-
-
-7. Create Policy to allow the approved USB Group: <br> Use the following XML data to create a policy to allow approved USB group:
-
- :::image type="content" source="images/create-policy-allow-approved-usb-group-xml.png" alt-text="Screenshot of XML data to create policy to allow the approved USB Group using Group Policy" lightbox="images/create-policy-allow-approved-usb-group-xml.png":::
-
- What ΓÇÿ47ΓÇÖ means in the policy? <br>
- It is 9 + 2 + 36 = 47: <br>
- Read access: 1+8 = 9 <br>
- Write access: disk level 2 <br>
- Execute: 4 + 32 = 36
-
-8. Combine groups into one XML file: <br> You can combine device control policy groups into one XML file as follows:<br>
- - Go to **Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Device Control > Define device control policy groups**
+
+7. Create Policy to allow the approved USB Group:
+
+ Use the following XML data to create a policy to allow approved USB group:
+
+ :::image type="content" source="images/create-policy-allow-approved-usb-group-xml.png" alt-text="Screenshot of XML data to create policy to allow the approved USB Group using Group Policy" lightbox="images/create-policy-allow-approved-usb-group-xml.png":::
+
+ What does '47' mean in the policy? It's 9 + 2 + 36 = 47:
+
+ - Read access: 1+8 = 9.
+ - Write access: disk level 2.
+ - Execute: 4 + 32 = 36.
+
+8. Combine groups into one XML file:
+
+ You can combine device control policy groups into one XML file as follows:
+
+ - Go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Define device control policy groups**.
+ :::image type="content" source="images/define-device-control-policy-grps-gp.png" alt-text="Screenshot of Define device control policy groups" lightbox="images/define-device-control-policy-grps-gp.png":::
- - In the **Define device control policy groups** window, enter the file path containing the XML groups data. <br>
- XML file path: [mdatp-devicecontrol/Demo_Groups.xml at main ┬╖ microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Group%20Policy/Demo_Groups.xml)<br>
- The following is the device control policy groups xml schema:
- :::image type="content" source="images/combine-grps-xml-file-gp.png" alt-text="Screenshot of combine groups into one XML file":::
-
-9. Combine policies into one XML file: <br> You can combine device control policy rules into one XML file as follows:<br>
- - Go to **Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Device Control > Define device control policy rules**
- :::image type="content" source="images/define-device-cntrl-policy-rules-gp.png" alt-text="Screenshot of define device control policy rules" lightbox="images/define-device-cntrl-policy-rules-gp.png":::
- - In the **Define device control policy rules** window, select **Enabled**, and enter the file path containing the XML rules data. <br>
- XML file path: [mdatp-devicecontrol/Demo_Policies.xml at main ┬╖ microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Group%20Policy/Demo_Policies.xml)<br>
- The following is the device control policy rules xml schema:
+
+ - In the **Define device control policy groups** window, enter the file path containing the XML groups data.
+
+ XML file path: <https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Group%20Policy/Demo_Groups.xml>
+
+ The following is the device control policy groups xml schema:
+
+ :::image type="content" source="images/combine-grps-xml-file-gp.png" alt-text="Screenshot of combine groups into one XML file":::
+
+9. Combine policies into one XML file:
+
+ You can combine device control policy rules into one XML file as follows:
+
+ - Go to **Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Device Control > Define device control policy rules**
+
+ :::image type="content" source="images/define-device-cntrl-policy-rules-gp.png" alt-text="Screenshot of define device control policy rules" lightbox="images/define-device-cntrl-policy-rules-gp.png":::
+
+ - In the **Define device control policy rules** window, select **Enabled**, and enter the file path containing the XML rules data.
+
+ XML file path: <https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Group%20Policy/Demo_Policies.xml>
+
+ The following is the device control policy rules xml schema:
+ :::image type="content" source="images/combine-policies-xml-gp.png" alt-text="Screenshot of combine policies into one XML file":::
-10. Set location for a copy of the file (evidence): <br>If you want to have a copy of the file (evidence) when Write access happens, you have to set the location where system can save the copy.<br>
+10. Set location for a copy of the file (evidence):
+
+ If you want to have a copy of the file (evidence) when Write access happens, you have to set the location where system can save the copy.
+ - Go to **Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Device Control > Define Device Control evidence data remote location**.
- - In the **Define Device Control evidence data remote location** window, select **Enabled** and enter the local or network share folder path. <br>
- :::image type="content" source="images/evidence-data-remote-location-gp.png" alt-text="Screenshot of Define Device Control evidence data remote location" lightbox="images/evidence-data-remote-location-gp.png":::
+
+ - In the **Define Device Control evidence data remote location** window, select **Enabled** and enter the local or network share folder path.
+
+ :::image type="content" source="images/evidence-data-remote-location-gp.png" alt-text="Screenshot of Define Device Control evidence data remote location" lightbox="images/evidence-data-remote-location-gp.png":::
## View Device Control Removable Storage Access Control data in Microsoft Defender for Endpoint
DeviceEvents
``` ```kusto
-//information of file written to removable storage
+//information of file written to removable storage
DeviceEvents | where ActionType contains "RemovableStorageFileEvent" | extend parsed=parse_json(AdditionalFields)
-| extend Policy = tostring(parsed.Policy)
-| extend PolicyRuleId = tostring(parsed.PolicyRuleId)
+| extend Policy = tostring(parsed.Policy)
+| extend PolicyRuleId = tostring(parsed.PolicyRuleId)
| extend MediaClassName = tostring(parsed.ClassName) | extend MediaInstanceId = tostring(parsed.InstanceId) | extend MediaName = tostring(parsed.MediaName)
-| extend MediaProductId = tostring(parsed.ProductId)
-| extend MediaVendorId = tostring(parsed.VendorId)
-| extend MediaSerialNumber = tostring(parsed.SerialNumber)
+| extend MediaProductId = tostring(parsed.ProductId)
+| extend MediaVendorId = tostring(parsed.VendorId)
+| extend MediaSerialNumber = tostring(parsed.SerialNumber)
| extend FileInformationOperation = tostring(parsed.DuplicatedOperation)
-| extend FileEvidenceLocation = tostring(parsed.TargetFileLocation)
+| extend FileEvidenceLocation = tostring(parsed.TargetFileLocation)
| project Timestamp, DeviceId, DeviceName, InitiatingProcessAccountName, ActionType, Policy, PolicyRuleId, FileInformationOperation, MediaClassName, MediaInstanceId, MediaName, MediaProductId, MediaVendorId, MediaSerialNumber, FileName, FolderPath, FileSize, FileEvidenceLocation, AdditionalFields | order by Timestamp desc ```
You can generate GUID through online open source, or through PowerShell - [How t
### What are the removable storage media and policy limitations?
-Either from the Microsoft Endpoint Manager admin center (Intune) or through Microsoft Graph API, the backend call is done through OMA-URI (GET to read or PATCH to update) and therefore the limitation is the same as any OMA-URI custom configuration profile in Microsoft which is officially 350,000 characters for XML files.
-
-For example, if you need two blocks of entries per user SID to "Allow"/"Audit allowed" specific users and two blocks of entries at the end to "Deny" all, you will be able to manage 2,276 users.
+Either from the Microsoft Endpoint Manager admin center (Intune) or through Microsoft Graph API, the backend call is done through OMA-URI (GET to read or PATCH to update) and therefore the limitation is the same as any OMA-URI custom configuration profile in Microsoft which is officially 350,000 characters for XML files.
+
+For example, if you need two blocks of entries per user SID to "Allow"/"Audit allowed" specific users and two blocks of entries at the end to "Deny" all, you will be able to manage 2,276 users.
### Why does the policy not work?
security Enable Troubleshooting Mode https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode.md
Microsoft Defender for Endpoint troubleshooting mode allows you to troubleshoot
- Local admins will be able to configure all other security settings in the Microsoft Defender Antivirus suite (for example, cloud protection, tamper protection). -- Admins with ΓÇ£Manage Security settingsΓÇ¥ permissions will have access to turn on troubleshooting mode.
+- Admins with "Manage Security settings" permissions will have access to turn on troubleshooting mode.
- Microsoft Defender for Endpoint collects logs and investigation data throughout the troubleshooting process.
search in (DeviceEvents)
ActionType == "AntivirusTroubleshootModeEvent" | extend _tsmodeproperties = parse_json(AdditionalFields) | where Timestamp > ago(3h)
-| where _tsmodeproperties.TroubleshootingStateChangeReason contains "started"
+| where _tsmodeproperties.TroubleshootingStateChangeReason contains "started"
|summarize (Timestamp, ReportId)=arg_max(Timestamp, ReportId), count() by DeviceId ```
search in (DeviceEvents)
ActionType == "AntivirusTroubleshootModeEvent" | extend _tsmodeproperties = parse_json(AdditionalFields) | where Timestamp > ago(30d) // choose the date range you want
-| where _tsmodeproperties.TroubleshootingStateChangeReason contains "started"
+| where _tsmodeproperties.TroubleshootingStateChangeReason contains "started"
| summarize (Timestamp, ReportId)=arg_max(Timestamp, ReportId), count() by DeviceId | sort by count_ ```
ActionType == "AntivirusTroubleshootModeEvent"
| extend _tsmodeproperties = parse_json(AdditionalFields) | where Timestamp > ago(2d) //beginning of time range | where Timestamp < ago(1d) //end of time range
-| where _tsmodeproperties.TroubleshootingStateChangeReason contains "started"
+| where _tsmodeproperties.TroubleshootingStateChangeReason contains "started"
| summarize (Timestamp, ReportId)=arg_max(Timestamp, ReportId), count() | where count_ > 5 // choose your max # of TS mode instances for your time range ```
security Linux Preferences https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-preferences.md
-
+ Title: Set preferences for Microsoft Defender for Endpoint on Linux description: Describes how to configure Microsoft Defender for Endpoint on Linux in enterprises.
ms.technology: mde
> [!IMPORTANT] > This topic contains instructions for how to set preferences for Defender for Endpoint on Linux in enterprise environments. If you are interested in configuring the product on a device from the command-line, see [Resources](linux-resources.md#configure-from-the-command-line).
-In enterprise environments, Defender for Endpoint on Linux can be managed through a configuration profile. This profile is deployed from the management tool of your choice. Preferences managed by the enterprise take precedence over the ones set locally on the device. In other words, users in your enterprise are not able to change preferences that are set through this configuration profile.
+In enterprise environments, Defender for Endpoint on Linux can be managed through a configuration profile. This profile is deployed from the management tool of your choice. Preferences managed by the enterprise take precedence over the ones set locally on the device. In other words, users in your enterprise are not able to change preferences that are set through this configuration profile. If exclusions were added through the managed configuration profile, they can only be removed through the managed configuration profile. The command line works for exclusions that were added locally.
This article describes the structure of this profile (including a recommended profile that you can use to get started) and instructions on how to deploy the profile.
The top level of the configuration profile includes product-wide preferences and
The *antivirusEngine* section of the configuration profile is used to manage the preferences of the antivirus component of the product.
-<br>
-
-****
- |Description|Value| ||| |**Key**|antivirusEngine| |**Data type**|Dictionary (nested preference)| |**Comments**|See the following sections for a description of the dictionary contents.|
-|
#### Enforcement level for antivirus engine
Specifies the enforcement preference of antivirus engine. There are three values
- Automatic threat remediation is turned off. - Security intelligence updates are turned on.
-<br>
-
-****
- |Description|Value| ||| |**Key**|enforcementLevel| |**Data type**|String| |**Possible values**|real_time (default) <p> on_demand <p> passive| |**Comments**|Available in Defender for Endpoint version 101.10.72 or higher.|
-|
- #### Enable/disable behavior-monitoring
Determines whether behavior monitoring and blocking capability is enabled on the
||| |**Key**|behaviorMonitoring| |**Data type**|String|
-|**Possible values**|disabled (default) <p> enabled |
+|**Possible values**|disabled (default) <p> enabled|
|**Comments**|Available in Defender for Endpoint version 101.45.00 or higher.| #### Run a scan after definitions are updated Specifies whether to start a process scan after new security intelligence updates are downloaded on the device. Enabling this setting will trigger an antivirus scan on the running processes of the device.
-<br>
-
-****
- |Description|Value| ||| |**Key**|scanAfterDefinitionUpdate| |**Data type**|Boolean| |**Possible values**|true (default) <p> false| |**Comments**|Available in Defender for Endpoint version 101.45.00 or higher.|
-|
#### Scan archives (on-demand antivirus scans only) Specifies whether to scan archives during on-demand antivirus scans.
-<br>
-
-****
- |Description|Value| ||| |**Key**|scanArchives| |**Data type**|Boolean| |**Possible values**|true (default) <p> false| |**Comments**|Available in Microsoft Defender for Endpoint version 101.45.00 or higher.|
-|||
#### Degree of parallelism for on-demand scans Specifies the degree of parallelism for on-demand scans. This corresponds to the number of threads used to perform the scan and impacts the CPU usage, as well as the duration of the on-demand scan.
-<br>
-
-****
- |Description|Value| ||| |**Key**|maximumOnDemandScanThreads| |**Data type**|Integer| |**Possible values**|2 (default). Allowed values are integers between 1 and 64.| |**Comments**|Available in Microsoft Defender for Endpoint version 101.45.00 or higher.|
-|||
-
#### Exclusion merge policy Specifies the merge policy for exclusions. It can be a combination of administrator-defined and user-defined exclusions (`merge`) or only administrator-defined exclusions (`admin_only`). This setting can be used to restrict local users from defining their own exclusions.
-<br>
-
-****
- |Description|Value| ||| |**Key**|exclusionsMergePolicy| |**Data type**|String| |**Possible values**|merge (default) <p> admin_only| |**Comments**|Available in Defender for Endpoint version 100.83.73 or higher.|
-|
#### Scan exclusions Entities that have been excluded from the scan. Exclusions can be specified by full paths, extensions, or file names. (Exclusions are specified as an array of items, administrator can specify as many elements as necessary, in any order.)
-<br>
-
-****
- |Description|Value| ||| |**Key**|exclusions| |**Data type**|Dictionary (nested preference)| |**Comments**|See the following sections for a description of the dictionary contents.|
-|
##### Type of exclusion Specifies the type of content excluded from the scan.
-<br>
-
-****
- |Description|Value| ||| |**Key**|$type| |**Data type**|String| |**Possible values**|excludedPath <p> excludedFileExtension <p> excludedFileName|
-|
##### Path to excluded content Used to exclude content from the scan by full file path.
-<br>
-
-****
- |Description|Value| ||| |**Key**|path| |**Data type**|String| |**Possible values**|valid paths| |**Comments**|Applicable only if *$type* is *excludedPath*|
-|
##### Path type (file / directory) Indicates if the *path* property refers to a file or directory.
-<br>
-
-****
- |Description|Value| ||| |**Key**|isDirectory| |**Data type**|Boolean| |**Possible values**|false (default) <p> true| |**Comments**|Applicable only if *$type* is *excludedPath*|
-|
##### File extension excluded from the scan Used to exclude content from the scan by file extension.
-<br>
-
-****
- |Description|Value| ||| |**Key**|extension| |**Data type**|String| |**Possible values**|valid file extensions| |**Comments**|Applicable only if *$type* is *excludedFileExtension*|
-|
##### Process excluded from the scan* Specifies a process for which all file activity is excluded from scanning. The process can be specified either by its name (for example, `cat`) or full path (for example, `/bin/cat`).
-<br>
-
-****
- |Description|Value| ||| |**Key**|name| |**Data type**|String| |**Possible values**|any string| |**Comments**|Applicable only if *$type* is *excludedFileName*|
-|
#### Allowed threats List of threats (identified by their name) that are not blocked by the product and are instead allowed to run.
-<br>
-
-****
- |Description|Value| ||| |**Key**|allowedThreats| |**Data type**|Array of strings|
-|
#### Disallowed threat actions Restricts the actions that the local user of a device can take when threats are detected. The actions included in this list are not displayed in the user interface.
-<br>
-
-****
- |Description|Value| ||| |**Key**|disallowedThreatActions| |**Data type**|Array of strings| |**Possible values**|allow (restricts users from allowing threats) <p> restore (restricts users from restoring threats from the quarantine)| |**Comments**|Available in Defender for Endpoint version 100.83.73 or higher.|
-|
#### Threat type settings The *threatTypeSettings* preference in the antivirus engine is used to control how certain threat types are handled by the product.
-<br>
-
-****
- |Description|Value| ||| |**Key**|threatTypeSettings| |**Data type**|Dictionary (nested preference)| |**Comments**|See the following sections for a description of the dictionary contents.|
-|
##### Threat type Type of threat for which the behavior is configured.
-<br>
-
-****
- |Description|Value| ||| |**Key**|key| |**Data type**|String| |**Possible values**|potentially_unwanted_application <p> archive_bomb|
-|
##### Action to take
Action to take when coming across a threat of the type specified in the precedin
- **Block**: The device is protected against this type of threat and you are notified in the security console. - **Off**: The device is not protected against this type of threat and nothing is logged.
-<br>
-
-****
- |Description|Value| ||| |**Key**|value| |**Data type**|String| |**Possible values**|audit (default) <p> block <p> off|
-|
#### Threat type settings merge policy Specifies the merge policy for threat type settings. This can be a combination of administrator-defined and user-defined settings (`merge`) or only administrator-defined settings (`admin_only`). This setting can be used to restrict local users from defining their own settings for different threat types.
-<br>
-
-****
- |Description|Value| ||| |**Key**|threatTypeSettingsMergePolicy| |**Data type**|String| |**Possible values**|merge (default) <p> admin_only| |**Comments**|Available in Defender for Endpoint version 100.83.73 or higher.|
-|
#### Antivirus scan history retention (in days) Specify the number of days that results are retained in the scan history on the device. Old scan results are removed from the history. Old quarantined files that are also removed from the disk.
-<br>
-
-****
- |Description|Value| ||| |**Key**|scanResultsRetentionDays| |**Data type**|String| |**Possible values**|90 (default). Allowed values are from 1 day to 180 days.| |**Comments**|Available in Defender for Endpoint version 101.04.76 or higher.|
-|
#### Maximum number of items in the antivirus scan history Specify the maximum number of entries to keep in the scan history. Entries include all on-demand scans performed in the past and all antivirus detections.
-<br>
-
-****
- |Description|Value| ||| |**Key**|scanHistoryMaximumItems| |**Data type**|String| |**Possible values**|10000 (default). Allowed values are from 5000 items to 15000 items.| |**Comments**|Available in Defender for Endpoint version 101.04.76 or higher.|
-|
### Cloud-delivered protection preferences The *cloudService* entry in the configuration profile is used to configure the cloud-driven protection feature of the product.
-<br>
-
-****
- |Description|Value| ||| |**Key**|cloudService| |**Data type**|Dictionary (nested preference)| |**Comments**|See the following sections for a description of the dictionary contents.|
-|
#### Enable / disable cloud delivered protection Determines whether cloud-delivered protection is enabled on the device or not. To improve the security of your services, we recommend keeping this feature turned on.
-<br>
-
-****
- |Description|Value| ||| |**Key**|enabled| |**Data type**|Boolean| |**Possible values**|true (default) <p> false|
-|
#### Diagnostic collection level Diagnostic data is used to keep Defender for Endpoint secure and up-to-date, detect, diagnose and fix problems, and also make product improvements. This setting determines the level of diagnostics sent by the product to Microsoft.
-<br>
-
-****
- |Description|Value| ||| |**Key**|diagnosticLevel| |**Data type**|String| |**Possible values**|optional (default) <p> required|
-|
#### Enable / disable automatic sample submissions
Determines whether suspicious samples (that are likely to contain threats) are s
- **Safe**: only suspicious samples that do not contain personally identifiable information (PII) are submitted automatically. This is the default value for this setting. - **All**: all suspicious samples are submitted to Microsoft.
-<br>
-
-****
- |Description|Value| ||| |**Key**|automaticSampleSubmissionConsent| |**Data type**|String| |**Possible values**|none <p> safe (default) <p> all|
-|
#### Enable / disable automatic security intelligence updates Determines whether security intelligence updates are installed automatically:
-<br>
-
-****
- |Description|Value| ||| |**Key**|automaticDefinitionUpdateEnabled| |**Data type**|Boolean| |**Possible values**|true (default) <p> false|
-|
## Recommended configuration profile
security Troubleshoot Security Config Mgt https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-security-config-mgt.md
To successfully register devices to Azure Active Directory, you'll need to ensur
Through the Microsoft Defender for Endpoint portal, security administrators can now troubleshoot Security Management for Microsoft Defender for Endpoint onboarding.
-In **Endpoints** \> **Device inventory**, the **Managed By** column has been added to filter by management channel (for example, MEM).
+In **Configuration management** the **Onboarded via MDE security management** widget has been added to present the enrollment status breakdown of Microsoft Defender for Endpoint-managed devices.
+To see a list of all devices managed by Microsoft Defender for Endpoint, select **View all devices managed by MDE**.
-To see a list of all devices that have failed the Security Management for Microsoft Defender for Endpoint onboarding process, filter the table by **MDE-Error**.
-
-In the list, select a specific device to see troubleshooting details in the side panel, pointing to the root cause of the error, and corresponding documentation.
+In the list, if a device's enrollment status is not "Success", select the device to see troubleshooting details in the side panel, pointing to the root cause of the error, and corresponding documentation.
:::image type="content" source="./images/secconfig-mde-error.png" alt-text="The filter criteria applied on the device inventory page" lightbox="./images/secconfig-mde-error.png":::
+> [!NOTE]
+> We are aware of an issue impacting the accurate detection of third-party MDMs when trying to use the security management feature and are working on a fix.
+ ## Run Microsoft Defender for Endpoint Client Analyzer on Windows Consider running the Client Analyzer on endpoints that are failing to complete the Security Management for Microsoft Defender for Endpoint onboarding flow. For more information about the client analyzer, see [Troubleshoot sensor health using Microsoft Defender for Endpoint Client Analyzer](overview-client-analyzer.md).
security Advanced Hunting Devicelogonevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicelogonevents-table.md
For information on other tables in the advanced hunting schema, [see the advance
| `IsLocalAdmin` | `boolean` | Boolean indicator of whether the user is a local administrator on the machine | | `LogonId` | `string` | Identifier for a logon session. This identifier is unique on the same machine only between restarts | | `RemoteDeviceName` | `string` | Name of the machine that performed a remote operation on the affected machine. Depending on the event being reported, this name could be a fully-qualified domain name (FQDN), a NetBIOS name or a host name without domain information |
-| `RemoteIP` | `string` | IP address that was being connected to |
+| `RemoteIP` | `string` | IP address of the device from which the logon attempt was performed |
| `RemoteIPType` | `string` | Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast | | `RemotePort` | `int` | TCP port on the remote device that was being connected to | | `InitiatingProcessAccountDomain` | `string` | Domain of the account that ran the process responsible for the event |
security Admin Submission https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/admin-submission.md
The reported message will be marked as a false positive or a false negative. An
> [!NOTE] > If malware filtering has replaced the message attachments with the Malware Alert Text.txt file, you need to submit the original message from quarantine that contains the original attachments. For more information on quarantine and how to release messages with malware false positives, see [Manage quarantined messages and files as an admin](manage-quarantined-messages-and-files.md).
-## View admin submissions to Microsoft
+## View email admin submissions to Microsoft
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Actions & submissions** \> **Submissions**. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-2. On the **Submissions** page, verify that the **Emails**, **URL**, or **Email attachment** tab is selected.
+2. On the **Submissions** page, verify that the **Emails** tab is selected.
- - You can sort the entries by clicking on an available column header. Click **Customize columns** to show a maximum of seven columns. The default values are marked with an asterisk (<sup>\*</sup>):
+ - You can sort the entries by clicking on an available column header. Click **Customize columns** to select the columns you need. All columns can be selected and showed in the submission grid. The default values are marked with an asterisk (<sup>\*</sup>):
- **Submission name**<sup>\*</sup> - **Sender**<sup>\*</sup> - **Recipient**
The reported message will be marked as a false positive or a false negative. An
When you're finished, click **Apply**. > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/admin-submission-customize-columns.png" alt-text="The New Customize column options for admin submissions" lightbox="../../media/admin-submission-customize-columns.png":::
+ > :::image type="content" source="../../media/admin-submission-customize-columns.png" alt-text="The New Customize column options for admin submissions" lightbox="../../media/email-admin-submission-customize-columns.png":::
- To filter the entries, click **Filter**. The available filters are: - **Date submitted**: **Start date** and **End date**.
The reported message will be marked as a false positive or a false negative. An
When you're finished, click **Apply**. > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/admin-submission-filters.png" alt-text="The New Filter options for admin submissions" lightbox="../../media/admin-submission-filters.png":::
+ > :::image type="content" source="../../media/admin-submission-filters.png" alt-text="The New Filter options for admin submissions" lightbox="../../media/email-admin-submission-filters.png":::
+
+ - To group the entries, click **Group** and select one of the following values from the dropdown list:
+ - **None**
+ - **Reason**
+ - **Status**
+ - **Result**
+ - **Tags**
+
+ - To export the entries, click **Export**. In the dialog that appears, save the .csv file.
+
+## View email attachment admin submissions to Microsoft
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Actions & submissions** \> **Submissions**. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
+
+2. On the **Submissions** page, verify that the **Email attachments** tab is selected.
+
+ - You can sort the entries by clicking on an available column header. Click **Customize columns** to select the columns you need. All columns can be selected and showed in the submission grid. The default values are marked with an asterisk (<sup>\*</sup>):
+ - **Attachment name**<sup>\*</sup>
+ - **Date submitted**<sup>\*</sup>
+ - **Reason for submitting**<sup>\*</sup>
+ - **Status**<sup>\*</sup>
+ - **Result**<sup>\*</sup>
+ - **Filter verdict**
+ - **Delivery/Block reason**
+ - **Submission ID**
+ - **Object ID**
+ - **Policy action**
+ - **Submitted by**
+ - **Tags**<sup>\*</sup>
+ - **Allow**
+
+ When you're finished, click **Apply**.
+
+ > [!div class="mx-imgBorder"]
+ > :::image type="content" source="../../media/admin-submission-customize-columns.png" alt-text="The New Customize column options for admin submissions" lightbox="../../media/email-attachment-admin-submission-customize-columns.png":::
+
+ - To filter the entries, click **Filter**. The available filters are:
+ - **Date submitted**: **Start date** and **End date**.
+ - **Submission ID**: A GUID value that's assigned to every submission.
+ - **Attachment filename**
+ - **Submitted by**
+ - **Reason for submitting**
+ - **Status**
+ - **Tags**
+
+ When you're finished, click **Apply**.
+
+ > [!div class="mx-imgBorder"]
+ > :::image type="content" source="../../media/admin-submission-filters.png" alt-text="The New Filter options for admin submissions" lightbox="../../media/email-attachment-admin-submission-filters.png":::
+
+ - To group the entries, click **Group** and select one of the following values from the dropdown list:
+ - **None**
+ - **Reason**
+ - **Status**
+ - **Result**
+ - **Tags**
+
+ - To export the entries, click **Export**. In the dialog that appears, save the .csv file.
+
+## View URLs admin submissions to Microsoft
+
+1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Actions & submissions** \> **Submissions**. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
+
+2. On the **Submissions** page, verify that the **URLs** tab is selected.
+
+ - You can sort the entries by clicking on an available column header. Click **Customize columns** to select the columns you need. All columns can be selected and showed in the submission grid. The default values are marked with an asterisk (<sup>\*</sup>):
+ - **URL**<sup>\*</sup>
+ - **Date submitted**<sup>\*</sup>
+ - **Reason for submitting**<sup>\*</sup>
+ - **Status**<sup>\*</sup>
+ - **Result**<sup>\*</sup>
+ - **Filter verdict**
+ - **Delivery/Block reason**
+ - **Submission ID**
+ - **Object ID**
+ - **Policy action**
+ - **Submitted by**
+ - **Tags**<sup>\*</sup>
+ - **Allow**
+
+ When you're finished, click **Apply**.
+
+ > [!div class="mx-imgBorder"]
+ > :::image type="content" source="../../media/admin-submission-customize-columns.png" alt-text="The New Customize column options for admin submissions" lightbox="../../media/url-admin-submission-customize-columns.png":::
+
+ - To filter the entries, click **Filter**. The available filters are:
+ - **Date submitted**: **Start date** and **End date**.
+ - **Submission ID**: A GUID value that's assigned to every submission.
+ - **URL**
+ - **Submitted by**
+ - **Reason for submitting**
+ - **Status**
+ - **Tags**
+
+ When you're finished, click **Apply**.
+
+ > [!div class="mx-imgBorder"]
+ > :::image type="content" source="../../media/admin-submission-filters.png" alt-text="The New Filter options for admin submissions" lightbox="../../media/url-admin-submission-filters.png":::
- To group the entries, click **Group** and select one of the following values from the dropdown list: - **None**
- - **Type**
- **Reason** - **Status** - **Result**
security Enable The Report Message Add In https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/enable-the-report-message-add-in.md
If you're a global administrator or an Exchange Online administrator, and Exchan
- Outlook included with Microsoft 365 apps for Enterprise - Outlook app for iOS and Android -- Both add-ins are not available for shared mailboxes.
+- Both add-ins are not available for shared, group, or delegated mailboxes (the add-ins will be greyed out).
- Both add-ins are not available for on-premises Exchange mailboxes.
security Migrate To Defender For Office 365 Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-setup.md
When you're ready to begin testing, add these groups as exceptions to [the SCL=-
**Notes**: -- The terms Standard and Strict come from our [recommended security settings](recommended-settings-for-eop-and-office365.md), which are also used in [preset security policies](preset-security-policies.md). Ideally, we would tell you to define your pilot users in the Standard and Strict preset security policies, but we can't do that. Why? Because you can't customize the settings in preset security policies (in particular, actions that are taken on messages, or adjustment of impersonation protection settings). During your migration testing, you'll want to see what Defender for Office 365 would do to messages, verify that's what you want to happen, and possibly adjust the policy configurations to allow or prevent those results.
+- The terms Standard and Strict come from our [recommended security settings](recommended-settings-for-eop-and-office365.md), which are also used in [preset security policies](preset-security-policies.md). Ideally, we would tell you to define your pilot users in the Standard and Strict preset security policies, but we can't do that. Why? Because you can't customize the settings in preset security policies (in particular, actions that are taken on messages). During your migration testing, you'll want to see what Defender for Office 365 would do to messages, verify that's what you want to happen, and possibly adjust the policy configurations to allow or prevent those results.
So, instead of using preset security policies, you're going to manually create custom policies with settings that are very similar to, but in some cases are different than, the settings of Standard and Strict preset security policies.
security Preset Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/preset-security-policies.md
Preset security policies use the corresponding policies from the various protect
> Outbound spam policies are not part of preset security policies. The default outbound spam policy automatically protects members of preset security policies. Or, you can create custom outbound spam policies to customize the protection for members of preset security policies. For more information, see [Configure outbound spam filtering in EOP](configure-the-outbound-spam-policy.md). - **Microsoft Defender for Office 365 policies**: This includes organizations with Microsoft 365 E5 or Defender for Office 365 add-on subscriptions:
- - Anti-phishing policies in Microsoft Defender for Office 365 named **Standard Preset Security Policy** and **Strict Preset Security Policy**, which include:
+ - Anti-phishing policies in Defender for Office 365 named **Standard Preset Security Policy** and **Strict Preset Security Policy**, which include:
- The same [spoof settings](set-up-anti-phishing-policies.md#spoof-settings) that are available in the EOP anti-phishing policies. - [Impersonation settings](set-up-anti-phishing-policies.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) - [Advanced phishing thresholds](set-up-anti-phishing-policies.md#advanced-phishing-thresholds-in-anti-phishing-policies-in-microsoft-defender-for-office-365) - [Safe Links policies](set-up-safe-links-policies.md) named **Standard Preset Security Policy**, **Strict Preset Security Policy**, and **Built-in Protection Policy**. - [Safe Attachments policies](set-up-safe-attachments-policies.md) named **Standard Preset Security Policy**, **Strict Preset Security Policy**, and **Built-in Protection Policy**.
-You can apply EOP protections to different users than Microsoft Defender for Office 365 protections.
+You can apply EOP protections to different users than Defender for Office 365 protections, or you can apply EOP and Defender for Office 365 to the same recipients.
### Policy settings in preset security policies You can't modify the policy settings in the protection profiles. The **Standard**, **Strict**, and **Built-in protection** policy setting values are described in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md).
+> [!NOTE]
+> In Defender for Office 365 protections, you need to identify the senders for [user impersonation protection](set-up-anti-phishing-policies.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) and the internal or external domains for [domain impersonation protection](set-up-anti-phishing-policies.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
+>
+> All domains that you own ([accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains)) automatically receive domain impersonation protection in preset security policies.
+>
+> All recipients automatically receive impersonation protection from [mailbox intelligence](set-up-anti-phishing-policies.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) in preset security policies.
+ ### Order of precedence for preset security policies and other policies When multiple policies are applied to a user, the following order is applied from highest priority to lowest priority:
For example, if a security setting exists in **Standard protection** and an admi
2. On the **Preset security policies** page, click **Manage** in the **Standard protection** or **Strict protection** sections.
-3. The **Apply Standard protection** or **Apply Strict protection** wizard starts in a flyout. On the **EOP protections apply to** page, identify the internal recipients that the [EOP protections](#policies-in-preset-security-policies) apply to (recipient conditions):
- - **Users**
- - **Groups**
- - **Domains**
+3. The **Apply Standard protection** or **Apply Strict protection** wizard starts in a flyout.
- Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, click remove ![Remove icon.](../../media/m365-cc-sc-remove-selection-icon.png) next to the value.
+ On the **Apply Exchange Online Protection** page, identify the internal recipients that the [EOP protections](#policies-in-preset-security-policies) apply to (recipient conditions):
+ - **All recipients**
+ - **Specific recipients**:
+ - **Users**
+ - **Groups**
+ - **Domains**
- For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users, enter an asterisk (\*) by itself to see all available values.
+ Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, click remove ![Remove icon.](../../media/m365-cc-sc-remove-selection-icon.png) next to the value.
+
+ For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users, enter an asterisk (\*) by itself to see all available values.
- - **Exclude these users, groups, and domains**: To add exceptions for the internal recipients that the policy applies to (recipient exceptions), select this option and configure the exceptions. The settings and behavior are exactly like the conditions.
+ - **None**
+
+ - **Exclude these recipients**: To add exceptions for the internal recipients that the policy applies to (recipient exceptions), select this option and configure the exceptions. The settings and behavior are exactly like the conditions.
When you're finished, click **Next**.
-4. In Microsoft Defender for Office 365 organizations, you're taken to the **Defender for Office 365 protections apply to** page to identify the internal recipients that the [Microsoft Defender for Office 365 protections](#policies-in-preset-security-policies) apply to (recipient conditions).
+ > [!NOTE]
+ > In organizations without Defender for Office 365, clicking **Next** takes you to the **Review** page. The remaining steps/pages before the **Review** page are available only in organizations with Defender for Office 365.
+
+4. On the **Apply Defender for Office 365 protection** page, identify the internal recipients that the [Defender for Office 365 protections](#policies-in-preset-security-policies) apply to (recipient conditions).
The settings and behavior are exactly like the **EOP protections apply to** page in the previous step.
+ You can also select **Previously selected recipients** to use the same recipients that you selected for EOP protection on the previous page.
+
+ When you're finished, click **Next**.
+
+5. On the **Impersonation protection** page, click **Next**.
+
+6. On the **Add email addresses to flag when impersonated by attackers** page, add internal and external senders who are protected by [user impersonation protection](set-up-anti-phishing-policies.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
+
+ > [!NOTE]
+ > All recipients automatically receive impersonation protection from [mailbox intelligence](set-up-anti-phishing-policies.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) in preset security policies.
+
+ Each entry consists of a display name and an email address. Enter each value in the boxes and then click **Add**. Repeat this step as many times as necessary.
+
+ You can specify a maximum of 350 users, and you can't specify the same user in the user impersonation protection settings in multiple policies.
+
+ To remove an existing entry from the list, click ![Remove user from impersonation protection icon.](../../media/m365-cc-sc-remove.png).
+
+ When you're finished, click **Next**.
+
+7. On the **Add domains to flag when impersonated by attackers** page, add internal and external domains that are protected by [domain impersonation protection](set-up-anti-phishing-policies.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
+
+ > [!NOTE]
+ > All domains that you own ([accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains)) automatically receive domain impersonation protection in preset security policies.
+
+ All senders in the specified domains are protected by domain impersonation protection.
+
+ Enter the domain in the box, and then click **Add**. Repeat this step as many times as necessary.
+
+ To remove an existing entry from the list, select the entry, and then click ![Remove domain from impersonation protection icon.](../../media/m365-cc-sc-remove.png).
+
+ The maximum number of domains that you can specify for domain impersonation protection in all anti-phishing policies is 50.
+
+ When you're finished, click **Next**.
+
+8. On the **Add trusted email addresses and domains to not flag as impersonation** page, enter the sender email addresses and domains that you want to excluded from impersonation protection. Messages from these senders will never be flagged as an impersonation attack, but the senders are still subject to scanning by other filters in EOP and Defender for Office 365.
+
+ Enter the email address or domain in the box, and then click **Add**. Repeat this step as many times as necessary.
+
+ To remove an existing entry from the list, select the entry, and then click ![Remove exceptions to impersonation protection icon.](../../media/m365-cc-sc-remove.png).
+ When you're finished, click **Next**.
-5. On the **Review and confirm your changes** page, verify your selections, and then click **Confirm**.
+9. On the **Review and confirm this policy** page, verify your selections, and then click **Confirm**.
### Use the Microsoft 365 Defender portal to modify the assignments of Standard and Strict preset security policies
Therefore, we typically don't recommend exceptions to the **Built-in protection*
- **Groups** - **Domains**
- Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, click remove ![Remove icon.](../../media/m365-cc-sc-remove-selection-icon.png) next to the value.
+ Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, click remove ![Remove exclusions from Built-in protection icon.](../../media/m365-cc-sc-remove-selection-icon.png) next to the value.
For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users, enter an asterisk (\*) by itself to see all available values.
security Recommended Settings For Eop And Office365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365.md
For more information about these settings, see [Impersonation settings in anti-p
|Security feature name|Default|Standard|Strict|Comment| ||::|::|::|| |**Phishing threshold & protection**|||||
-|**Enable users to protect** (impersonated user protection) <br/><br/> _EnableTargetedUserProtection_ <br/><br/> _TargetedUsersToProtect_|Not selected <br/><br/> `$false` <br/><br/> none|Selected <br/><br/> `$true` <br/><br/> \<list of users\>|Selected <br/><br/> `$true` <br/><br/> \<list of users\>|We recommend adding users (message senders) in key roles. Internally, protected senders might be your CEO, CFO, and other senior leaders. Externally, protected senders could include council members or your board of directors. <br/><br/> In preset security policies, you can't specify the users to protect. You need to disable the preset security policies and use custom anti-phishing policies to add users in key roles as suggested.|
+|**Enable users to protect** (impersonated user protection) <br/><br/> _EnableTargetedUserProtection_ <br/><br/> _TargetedUsersToProtect_|Not selected <br/><br/> `$false` <br/><br/> none|Selected <br/><br/> `$true` <br/><br/> \<list of users\>|Selected <br/><br/> `$true` <br/><br/> \<list of users\>|We recommend adding users (message senders) in key roles. Internally, protected senders might be your CEO, CFO, and other senior leaders. Externally, protected senders could include council members or your board of directors.|
|**Enable domains to protect** (impersonated domain protection)|Not selected|Selected|Selected|| |**Include domains I own** <br/><br/> _EnableOrganizationDomainsProtection_|Off <br/><br/> `$false`|Selected <br/><br/> `$true`|Selected <br/><br/> `$true`||
-|**Include custom domains** <br/><br/> _EnableTargetedDomainsProtection_ <br/><br/> _TargetedDomainsToProtect_|Off <br/><br/> `$false` <br/><br/> none|Selected <br/><br/> `$true` <br/><br/> \<list of domains\>|Selected <br/><br/> `$true` <br/><br/> \<list of domains\>|We recommend adding domains (sender domains) that you don't own, but you frequently interact with. <br/><br/> In preset security policies, you can't specify the custm domains to protect. You need to disable the preset security policies and use custom anti-phishing policies to add custom domains to protect as suggested.|
+|**Include custom domains** <br/><br/> _EnableTargetedDomainsProtection_ <br/><br/> _TargetedDomainsToProtect_|Off <br/><br/> `$false` <br/><br/> none|Selected <br/><br/> `$true` <br/><br/> \<list of domains\>|Selected <br/><br/> `$true` <br/><br/> \<list of domains\>|We recommend adding domains (sender domains) that you don't own, but you frequently interact with.|
|**Add trusted senders and domains** <br/><br/> _ExcludedSenders_ <br/><br/> _ExcludedDomains_|None|None|None|Depending on your organization, we recommend adding senders or domains that are incorrectly identified as impersonation attempts.| |**Enable mailbox intelligence** <br/><br/> _EnableMailboxIntelligence_|Selected <br/><br/> `$true`|Selected <br/><br/> `$true`|Selected <br/><br/> `$true`|| |**Enable intelligence for impersonation protection** <br/><br/> _EnableMailboxIntelligenceProtection_|Off <br/><br/> `$false`|Selected <br/><br/> `$true`|Selected <br/><br/> `$true`|This setting allows the specified action for impersonation detections by mailbox intelligence.|
security Connect Microsoft Defender For Office 365 To Microsoft Sentinel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/connect-microsoft-defender-for-office-365-to-microsoft-sentinel.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo
security Ensuring You Always Have The Optimal Security Controls With Preset Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/ensuring-you-always-have-the-optimal-security-controls-with-preset-security-policies.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo
security How To Configure Quarantine Permissions With Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-configure-quarantine-permissions-with-quarantine-policies.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo
security How To Handle False Negatives In Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo
Defender for Office 365 can help you understand why emails are getting delivered
- 5-10 minutes to perform the steps below. ## Handling malicious emails in the Inbox folder of end users+ 1. Ask end users to report the email as **phishing** or **junk** using Microsoft Message Add-in or Microsoft Phish add-in or the Outlook buttons.
-2. End users can also add the sender to the [block senders list](https://support.microsoft.com/en-us/office/block-a-mail-sender-b29fd867-cac9-40d8-aed1-659e06a706e4#:~:text=1%20On%20the%20Home%20tab%2C%20in%20the%20Delete,4%20Click%20OK%20in%20both%20open%20dialog%20boxes..) in Outlook to prevent emails from this sender being delivered to their inbox.
-3. Admins can triage the user reported messages from [user reported content](/microsoft-365/security/office-365-security/admin-submission?view=o365-worldwide#view-user-submissions-to-microsoft) portal.
-4. From those reported messages, admins can **submit to** [Microsoft for analysis](/microsoft-365/security/office-365-security/admin-submission?view=o365-worldwide#notify-users-from-within-the-portal) to learn why that email was allowed in the first place.
-5. If needed, while submitting to Microsoft for analysis, admins can create a [block for the sender](/microsoft-365/security/office-365-security/manage-tenant-blocks?view=o365-worldwide) to mitigate the problem.
+2. End users can also add the sender to the [block senders list](https://support.microsoft.com/en-us/office/block-a-mail-sender-b29fd867-cac9-40d8-aed1-659e06a706e4#:~:text=1%20On%20the%20Home%20tab%2C%20in%20the%20Delete,4%20Click%20OK%20in%20both%20open%20dialog%20boxes..) in Outlook to prevent emails from this sender from being delivered to their inbox.
+3. Admins can triage the user reported messages from [user reported content](/microsoft-365/security/office-365-security/admin-submission?view=o365-worldwide#view-user-submissions-to-microsoft&preserve-view=true) portal.
+4. From those reported messages, admins can **submit to** [Microsoft for analysis](/microsoft-365/security/office-365-security/admin-submission?view=o365-worldwide#notify-users-from-within-the-portal&preserve-view=true) to learn why that email was allowed in the first place.
+5. If needed, while submitting to Microsoft for analysis, admins can create a [block for the sender](/microsoft-365/security/office-365-security/manage-tenant-blocks?view=o365-worldwide&preserve-view=true) to mitigate the problem.
6. Once the results for submissions are available, read the verdict to understand why emails were allowed, and how your tenant setup could be improved to prevent similar situations from happening in the future. ## Handling malicious emails in junk folder of end users 1. Ask end users to report the email as **phishing** using Microsoft Message Add-in, or Microsoft Phish Add-in, or the Outlook buttons.
-2. Admins can triage the user reported messages from the [user reported content](/microsoft-365/security/office-365-security/admin-submission?view=o365-worldwide#view-user-submissions-to-microsoft) portal.
-3. From those reported messages admins can **submit to** [Microsoft for analysis](/microsoft-365/security/office-365-security/admin-submission?view=o365-worldwide#notify-users-from-within-the-portal) and learn why that email was allowed in the first place.
-4. If needed, while submitting to Microsoft for analysis, admins can create a [block for the sender](/microsoft-365/security/office-365-security/manage-tenant-blocks?view=o365-worldwide) to mitigate the problem.
+2. Admins can triage the user reported messages from the [user reported content](/microsoft-365/security/office-365-security/admin-submission?view=o365-worldwide#view-user-submissions-to-microsoft&preserve-view=true) portal.
+3. From those reported messages admins can **submit to** [Microsoft for analysis](/microsoft-365/security/office-365-security/admin-submission?view=o365-worldwide#notify-users-from-within-the-portal&preserve-view=true) and learn why that email was allowed in the first place.
+4. If needed, while submitting to Microsoft for analysis, admins can create a [block for the sender](/microsoft-365/security/office-365-security/manage-tenant-blocks?view=o365-worldwide&preserve-view=true) to mitigate the problem.
5. Once the results for submissions are available, read the verdict to understand why emails were allowed, and how your tenant setup could be improved to prevent similar situations from happening in the future. ## Handling malicious emails landing in the quarantine folder of end users
-1. End users receive an [email digest](/microsoft-365/security/office-365-security/use-spam-notifications-to-release-and-report-quarantined-messages?view=o365-worldwide) about quarantined messages as per the settings enabled by admins.
+1. End users receive an [email digest](/microsoft-365/security/office-365-security/use-spam-notifications-to-release-and-report-quarantined-messages?view=o365-worldwide&preserve-view=true) about quarantined messages as per the settings enabled by admins.
2. End users can preview the messages in quarantine, block the sender, and submit those messages to Microsoft for analysis. ## Handling malicious emails landing in the quarantine folder of admins
-1. Admins can view the quarantined emails (including the ones asking permission to request release) from the [review page](/microsoft-365/security/office-365-security/manage-quarantined-messages-and-files?view=o365-worldwide).
-2. Admins can submit any malicious, or suspicous messages to Microsoft for analysis, and create a block to mitigate the situation while waiting for verdict.
+
+1. Admins can view the quarantined emails (including the ones asking permission to request release) from the [review page](/microsoft-365/security/office-365-security/manage-quarantined-messages-and-files?view=o365-worldwide&preserve-view=true).
+2. Admins can submit any malicious, or suspicious messages to Microsoft for analysis, and create a block to mitigate the situation while waiting for verdict.
3. Once the results for submissions are available, read the verdict to learn why the emails were allowed, and how your tenant setup could be improved to prevent similar situations from happening in the future.
security How To Handle False Positives In Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo
Microsoft Defender for Office 365 helps deal with important legitimate business
1. Ask end users to report the email as **not junk** using Microsoft Message Add-in or the Outlook buttons. 2. End users can also add the sender to the [**safe sender list**](https://support.microsoft.com/en-us/office/safe-senders-in-outlook-com-470d4ee6-e3b6-402b-8cd9-a6f00eda7339) in Outlook to prevent the email from these senders landing in Junk folder.
-3. Admins can triage the user-reported messages from [user-reported content](/microsoft-365/security/office-365-security/admin-submission?view=o365-worldwide#view-user-submissions-to-microsoft) portal.
-4. From those reported messages admins can submit to [**Microsoft for analysis**](/microsoft-365/security/office-365-security/admin-submission?view=o365-worldwide#notify-users-from-within-the-portal) and understand why was that email blocked in the first place.
-5. If needed, while submitting to Microsoft for analysis, admins can judiciously create an [**allow** for a sender](/microsoft-365/security/office-365-security/manage-tenant-allows?view=o365-worldwide#add-sender-allows-using-the-submissions-portal) to mitigate the problem.
+3. Admins can triage the user-reported messages from [user-reported content](/microsoft-365/security/office-365-security/admin-submission?view=o365-worldwide#view-user-submissions-to-microsoft&preserve-view=true) portal.
+4. From those reported messages admins can submit to [**Microsoft for analysis**](/microsoft-365/security/office-365-security/admin-submission?view=o365-worldwide#notify-users-from-within-the-portal&preserve-view=true) and understand why was that email blocked in the first place.
+5. If needed, while submitting to Microsoft for analysis, admins can judiciously create an [**allow** for a sender](/microsoft-365/security/office-365-security/manage-tenant-allows?view=o365-worldwide#add-sender-allows-using-the-submissions-portal&preserve-view=true) to mitigate the problem.
6. Once the results from the admin submission are available, read it to understand why emails were blocked and how your tenant setup could be improved to *prevent* similar situations from happening in the future. ## Handling legitimate emails that are in quarantine folder of end users
-1. An end user receives an [email digest](/microsoft-365/security/office-365-security/use-spam-notifications-to-release-and-report-quarantined-messages?view=o365-worldwide) about quarantined messages as per the settings enabled by security admins.
+1. An end user receives an [email digest](/microsoft-365/security/office-365-security/use-spam-notifications-to-release-and-report-quarantined-messages?view=o365-worldwide&preserve-view=true) about quarantined messages as per the settings enabled by security admins.
2. End users can preview the messages in quarantine, block the sender, release the messages, submit those messages to Microsoft for analysis, and request release of those emails from admins. ## Handling legitimate emails in quarantine folder of an admin
-1. Admins can view the quarantined emails (including the ones asking permission to request release) from the [review page](/microsoft-365/security/office-365-security/manage-quarantined-messages-and-files?view=o365-worldwide).
+1. Admins can view the quarantined emails (including the ones asking permission to request release) from the [review page](/microsoft-365/security/office-365-security/manage-quarantined-messages-and-files?view=o365-worldwide&preserve-view=true).
2. Admins can release the message from quarantine while submitting it to Microsoft for analysis, and create an allow to mitigate the situation. 3. Once the results for submissions are available, admins should read the verdict to understand why emails were blocked, and how the tenant setup could be improved to prevent similar situations from happening in the future.
security How To Prioritize And Manage Automated Investigations And Response Air https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-prioritize-and-manage-automated-investigations-and-response-air.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo
security How To Prioritize Manage Investigate And Respond To Incidents In Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-prioritize-manage-investigate-and-respond-to-incidents-in-microsoft-365-defender.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo
security How To Run Attack Simulations For Your Team https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-run-attack-simulations-for-your-team.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo
security How To Setup Attack Simulation Training For Automated Attacks And Training https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-setup-attack-simulation-training-for-automated-attacks-and-training.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo
security Optimize And Correct Security Policies With Configuration Analyzer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/optimize-and-correct-security-policies-with-configuration-analyzer.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo # Optimize and correct security policies with configuration analyzer
security Protect Your C Suite With Priority Account Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/protect-your-c-suite-with-priority-account-protection.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo # Protect your c-suite with priority account protection
security Search For Emails And Remediate Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/search-for-emails-and-remediate-threats.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo
security Stay Informed With Message Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/stay-informed-with-message-center.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo
security Step By Step Guide Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/step-by-step-guide-overview.md
ms.localizationpriority: medium
audience: ITPro -+ ms.technology: mdo
security Tenant Allow Block List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list.md
This article describes how to configure entries in the Tenant Allow/Block List i
- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell). - You need to be assigned permissions in Exchange Online before you can do the procedures in this article:
- - **Senders, URLs and files**:
- To add and remove values from the Tenant Allow/Block List, you need to be a member of - **Organization Management** or **Security Administrator** role group (**Security admin role**) - **Security Operator** role group (**Tenant AllowBlockList Manager**). - For read-only access to the Tenant Allow/Block List, you need to be a member of - **Global Reader** role group - **Security Reader** role group
- - **Spoofing**: One of the following combinations:
- - **Organization Management**
- - **Security Administrator** <u>and</u> **View-Only Configuration** or **View-Only Organization Management**.
+ - **View-Only Configuration** role group.
For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
security Use Spam Notifications To Release And Report Quarantined Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/use-spam-notifications-to-release-and-report-quarantined-messages.md
For shared mailboxes, quarantine notifications are supported only for users who
> [!NOTE] > By default, messages that are quarantined as high confidence phishing, malware, by mail flow rules (also known as transport rules), or Safe Attachments policies in Defender for Office 365 are only available to admins (by default, the AdminOnlyAccessPolicy quarantine policy is used). For more information, see [Manage quarantined messages and files as an admin in EOP](manage-quarantined-messages-and-files.md). >
-> Currently, quarantine notifications are not supported for groups.
+> Quarantine notifications for messages sent to distribution groups or mail-enabled security groups are sent to all group members.
+>
+> Quarantine notifications for messages sent to Microsoft 365 Groups are sent to all group members only if the **Send copies of group conversations and events to group members** setting is turned on.
When you receive a quarantine notification, the following information is always available for each quarantined message: