Updates from: 06/20/2023 02:37:20
Category Microsoft Docs article Related commit history on GitHub Change details
admin Change A User Name And Email Address https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/change-a-user-name-and-email-address.md
f1.keywords:
Previously updated : 02/18/2020 Last updated : 06/14/2023 audience: Admin
- AdminTemplateSet - adminvideo - business_assist-- BCS160-- MET150-- MOE150
-description: "Learn how a Microsoft 365 global admin can change a user's email address and display name when their name changes."
+description: "Learn how a Microsoft 365 global admin can change a user's email address and display name."
# Change a user name and email address
You may need to change someone's email address and display name if, for example,
> [!TIP] > If you need help with the steps in this topic, consider [working with a Microsoft small business specialist](https://go.microsoft.com/fwlink/?linkid=2186871). With Business Assist, you and your employees get around-the-clock access to small business specialists as you grow your business, from onboarding to everyday use.
-## Watch: Change a user's name or email address
+## Before you begin
+
+You must be a [global admin](about-admin-roles.md) to complete these steps.
+
+## Watch: Change a user's email address, display name or email alias
Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198016).
Check out this video and others on our [YouTube channel](https://go.microsoft.co
If you found this video helpful, check out the [complete training series for small businesses and those new to Microsoft 365](../../business-video/index.yml).
-## Before you begin
+## Change a user's email address
You must be a [global admin](about-admin-roles.md) to complete these steps.
-## Change a user's email address
- ::: moniker range="o365-worldwide" 1. In the admin center, go to the **Users** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=834822" target="_blank">Active users</a> page.
You must be a [global admin](about-admin-roles.md) to complete these steps.
> [!IMPORTANT] > If you get an error message, see [Resolve error messages](#resolve-error-messages).
+## Change a user's display name
+
+You must be a [global admin](about-admin-roles.md) to complete these steps.
++
+1. In the admin center, go to the **Users** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=834822" target="_blank">Active users</a> page.
+++
+1. In the admin center, go to the **Users** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=850628" target="_blank">Active users</a> page.
++
+1. Select the user's name, and then on the **Account** tab select **Manage contact information**.
+
+1. Update the user's name and contact information.
+
+1. Select **Save changes**.
+
+ If you get the error message "**We're sorry, the user couldn't be edited. Review the user information and try again**, see [Resolve error messages](#resolve-error-messages).
+
+## Add an email alias
+
+For more information on adding an email alias, see [Add another email alias for a Microsoft 365 business subscription user](../email/add-another-email-alias-for-a-user.md).
+ ## Set the primary email address ::: moniker range="o365-worldwide"
You must be a [global admin](about-admin-roles.md) to complete these steps.
> > Also, you'll only see this option if you're a global admin. If you don't see the option, you don't have permissions to change a user's name and primary email address.
-4. You'll see a big yellow warning that you're about to change the person's sign-in information. Select **Save**, then **Close**.
+4. You'll see a warning that you're about to change the person's sign-in information. Select **Save changes**, then **Close**.
5. Give the person the following information:
You must be a [global admin](about-admin-roles.md) to complete these steps.
- If their password changed too, they are prompted to enter the new password on their mobile device, or it won't sync.
-## Change a user's display name
--
-1. In the admin center, go to the **Users** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=834822" target="_blank">Active users</a> page.
---
-1. In the admin center, go to the **Users** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=850628" target="_blank">Active users</a> page.
--
-2. Select the user's name, and then on the **Account** tab select **Manage contact information**.
-
-3. In the **Display name** box, type a new name for the person, and then select **Save**.
-
- If you get the error message "**We're sorry, the user couldn't be edited. Review the user information and try again**, see [Resolve error messages](#resolve-error-messages).
+A person's previous primary email address is retained as an additional email address. **We strongly recommend that you don't remove the old email address.**
-It might take up to 24 hours for this change to take effect across all services. After the change has taken effect, the person will have to sign in to Outlook, Skype for Business and SharePoint with their updated username.
+Some people might continue to send email to the person's old email address and deleting it may result in NDR failures. Microsoft automatically routes it to the new one. Also, do not reuse old SMTP email addresses and apply them to new accounts. This can also cause NDR failures or delivery to an unintended mailbox.
## Resolve error messages
If you get the error message " **A parameter cannot be found that matches parame
If you get the error message " **We're sorry, the user couldn't be edited. Review the user information and try again**." it means you aren't a global admin and you don't have permissions to change the user name. Find the global admin in your business and ask them to make the change.
-## What to do with old email addresses
-
-A person's previous primary email address is retained as an additional email address. **We strongly recommend that you don't remove the old email address.**
-
-Some people might continue to send email to the person's old email address and deleting it may result in NDR failures. Microsoft automatically routes it to the new one. Also, do not reuse old SMTP email addresses and apply them to new accounts. This can also cause NDR failures or delivery to an unintended mailbox.
-
-## What if the person's offline address book won't sync with the Global Address List?
+### What if the person's offline address book won't sync with the Global Address List?
If they are using Exchange Online or if their account is linked with your organization's on-premises Exchange environment, you might see this error when you try to change a username and email address: "This user is synchronized with your local Active Directory. Some details can be edited only through your local Active Directory." This is due to the Microsoft Online Email Routing Address (MOERA). The MOERA is constructed from the person's _userPrincipalName_ attribute in Active Directory and is automatically assigned to the cloud account during the initial sync and once created, it cannot be modified or removed in Microsoft 365. You can subsequently change the username in the Active Directory, but it doesn't change the MOERA and you may run into issues displaying the newly changed name in the Global Address List.
-To fix this, log in to the [Microsoft Graph Powershell](/powershell/microsoftgraph/overview) with your Microsoft 365 administrator credentials. and use the following syntax:
+To fix this, log in to the [Microsoft Graph Powershell](/powershell/microsoftgraph/overview) with your Microsoft 365 administrator credentials and use the following syntax:
```powershell
-Update-MgUser -UserId anne.wallace@contoso.onmicrosoft.com -UserPrincipalName anne.jones@contoso.com
+Update-MgUser -UserId anne.wallace@contoso.com -UserPrincipalName anne.jones@contoso.com
``` > [!TIP] > This changes the person's **userPrincipalName** attribute and has no bearing on their Microsoft Online Email Routing Address (MOERA) email address. It is best practice, however, to have the person's logon UPN match their primary SMTP address.
-To learn how to change someone's username in Active Directory, in Windows Server 2003 and earlier, see [Rename a user account](/previous-versions/windows/it-pro/windows-server-2003/cc772952(v=ws.10)).
- ## Related content [Add a domain](../setup/add-domain.md)
admin Configure Email Forwarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/configure-email-forwarding.md
f1.keywords:
Previously updated : 02/18/2020 Last updated : 06/14/2023 audience: Admin
As the admin of an organization, you might have company requirements to set up e
> [!TIP] > If you need help with the steps in this topic, consider [working with a Microsoft small business specialist](https://go.microsoft.com/fwlink/?linkid=2186871). With Business Assist, you and your employees get around-the-clock access to small business specialists as you grow your business, from onboarding to everyday use.
-## Configure email forwarding
+## Before you begin
Before you set up email forwarding, note the following: - Allow automatically forwarded messages to be sent to people on the remote domain. See [Manage remote domains](/exchange/mail-flow-best-practices/remote-domains/manage-remote-domains) for details. -- Once you set up email forwarding, only **new** emails sent to the *from* mailbox will be forwarded.
+- Once you set up email forwarding, only **new** emails sent to the **from** mailbox will be forwarded.
- Email forwarding requires that the *from* account has a license. If you're setting up email forwarding because the user has left your organization, another option is to [convert their mailbox to a shared mailbox](convert-user-mailbox-to-shared-mailbox.md). This way several people can access it. However, a shared mailbox cannot exceed 50GB.
-You must be an Exchange administrator or Global administrator in Microsoft 365 to do these steps. For more information, see the topic [About admin roles](../add-users/about-admin-roles.md).
+- You must be an Exchange administrator or Global administrator in Microsoft 365 to do these steps. For more information, see the topic [About admin roles](../add-users/about-admin-roles.md).
+
+## Configure email forwarding
::: moniker range="o365-worldwide" 1. In the admin center, go to the **Users** \> **[Active users](https://go.microsoft.com/fwlink/p/?linkid=834822)** page.
-2. Select the name of the user whose email you want to forward, then open the properties page.
+2. Select the name of the user whose email you want to forward and select the **Mail** tab.
-3. On the **Mail** tab, select **Manage email forwarding**.
+3. Select **Manage email forwarding**.
-4. On the email forwarding page, select **Forward all emails sent to this mailbox**, enter the forwarding address, and choose whether you want to keep a copy of forwarded emails. If you don't see this option, make sure a license is assigned to the user account. Select **Save changes**.
-
- **To forward to multiple email addresses**, you can ask the user to set up a rule in Outlook to forward to the addresses.
-
- 1. Open **outlook** > **Home** > **Rules** > Select **Manage Rules & Alerts**
- 1. Select **New Rule** > **Select Apply rule on message I receive** located near bottom of list, then click **Next**.
- 1. Click **Yes** when asked This rule will be applied to every message you receive.
- 1. On the next list select the actions **redirect it to people or public group** and **stop processing more rules**
- 1. Click the underlined phrase **people or public group** in the bottom part of window.
- 1. Type the **email address** to forward mail to in the To field, then click **OK**.
- 1. Select **Finish**
-
-
- Or, in the admin center, [create a distribution group](../setup/create-distribution-lists.md), [add the addresses to it](add-user-or-contact-to-distribution-list.md), and then set up forwarding to point to the DL using the instructions in this article.
+4. On the email forwarding page, select **Forward all emails sent to this mailbox**. Enter the forwarding address, and choose whether you want to keep a copy of forwarded emails. If you don't see this option, make sure a license is assigned to the user account. Select **Save changes**.
5. Don't delete the account of the user who's email you're forwarding or remove their license! If you do, email forwarding will stop.
+**To forward to multiple email addresses**, you can ask this user to set up a rule in Outlook to forward to the addresses. For more info, check out [Turn on automatic forwarding in Outlook](https://support.microsoft.com/office/turn-on-automatic-forwarding-in-outlook-7f2670a1-7fff-4475-8a3c-5822d63b0c8e). For Outlook on the web, see [Use rules to automatically forward messages](https://support.microsoft.com/office/45aa9664-4911-4f96-9663-ece42816d746).
+ ::: moniker-end ::: moniker range="o365-21vianet"
You must be an Exchange administrator or Global administrator in Microsoft 365 t
::: moniker-end
-## Related content
+## Related content
[Create a shared mailbox](../email/create-a-shared-mailbox.md) (article)\ [Send email from a different address](https://support.microsoft.com/office/ccba89cb-141c-4a36-8c56-6d16a8556d2e) (article)\
admin Password Policy Recommendations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/password-policy-recommendations.md
f1.keywords:
Previously updated : 05/30/2023 Last updated : 06/15/2023 audience: Admin
- AdminSurgePortfolio - okr_smb - AdminTemplateSet-- BCS160-- MET150-- MOE150 description: "Make your organization more secure against password attacks, and ban common passwords and enable risk-based multi-factor authentication."
For more information about Microsoft 365 passwords, see:
[Let users reset their own passwords](../add-users/let-users-reset-passwords.md) (article)
-[Resend a user's password - Admin Help](../add-users/resend-user-password.md) (article)
+[Resend a user's password](../add-users/resend-user-password.md) (article)
[Time to rethink mandatory password changes](https://go.microsoft.com/fwlink/p/?linkid=861018).
The primary goal of a more secure password system is password diversity. You wan
- Enforce registration for [multi-factor authentication](../security-and-compliance/set-up-multi-factor-authentication.md) -- Enable risk-based multi-factor authentication challenges
+- Enable risk based multi-factor authentication challenges
### Password guidance for your users
Make sure your users update contact and security information, like an alternate
To learn more, see [Set up multi-factor authentication](../security-and-compliance/set-up-multi-factor-authentication.md).
-### Enable risk-based multi-factor authentication
+### Enable risk based multi-factor authentication
-Risk-based multi-factor authentication ensures that when our system detects suspicious activity, it can challenge the user to ensure that they are the legitimate account owner.
+Risk-based multi-factor authentication ensures that when our system detects suspicious activity, it can challenge the user to ensure that they are the legitimate account owner.
## Next steps
bookings Bookings Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/bookings-overview.md
Microsoft Bookings makes scheduling and managing appointments a breeze. Bookings
> [!NOTE] > The Bookings calendar is a mailbox in Exchange Online.
-Use Bookings to make your organizationΓÇÖs meetings virtual with online meetings via [Microsoft Teams](https://support.microsoft.com/office/overview-of-the-bookings-app-in-teams-7b8569e1-0c8a-444e-b712-d9968b05110b) and Skype for Business. Each appointment booked as an online meeting creates a unique meeting link that is sent to attendees so they can join via a web browser, phone dial-in, or the Skype or Teams app. Bookings is also available as an app within Teams, which allows you to create Bookings calendars, assign staff, and both schedule new and manage existing appointments without ever leaving Teams.
+Use Bookings to make your organizationΓÇÖs meetings virtual with online meetings via [Microsoft Teams](https://support.microsoft.com/office/overview-of-the-bookings-app-in-teams-7b8569e1-0c8a-444e-b712-d9968b05110b) and Skype for Business. Each appointment booked as an online meeting creates a unique meeting link that is sent to attendees so they can join via a web browser, phone dial-in, or the Skype or Teams app. Bookings is also available as an [app in Teams](https://support.microsoft.com/office/overview-of-the-bookings-app-in-teams-7b8569e1-0c8a-444e-b712-d9968b05110b), which allows you to create Bookings calendars, assign staff, and both schedule new and manage existing appointments without ever leaving Teams.
Bookings is made up of these components:
compliance Audit Log Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-log-search.md
You can export the results of an audit log search to a comma-separated value (CS
For a description of many of the properties that are listed in the **AuditData** column in the CSV file when you download all results, and the service each one applies to, see [Detailed properties in the audit log](audit-log-detailed-properties.md).
+## Scoping access to audit logs
+
+Access to search the audit log is scoped based upon the administrative units assigned to the user accessing the audit log in the compliance portal. A scoped admin can only search and export user-generated audit logs within the scope of their administrative units. A global admin has access to all audit logs, including logs generated by non-user and system accounts.
+
+| Admin units assigned to admins | Admin units available for scoped Search | Access to search and export audit logs |
+|--|--|--|
+| None (Default): Unrestricted access | All administrative units are available | Unrestricted access to all activity logs from any user, non-user, or system account. |
+| One or more administrative units: Restricted access | Only those administrative units assigned to the admin are available | Restricted access to activity logs from users with a matching administrative unit assignment. |
+
+For more information about administrative units, see [Permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/microsoft-365-compliance-center-permissions#administrative-units-preview).
+ ## Frequently asked questions **What are different Microsoft 365 services that are currently audited?**
Yes, You can retrieve audit logs by using the following methods:
In most services, auditing is enabled by default after you initially turn on auditing for your organization (as described in the [Before you search the audit log](#before-you-search-the-audit-log) section in this article).
-**Does the auditing service support de-duplication of records?**
+**Does the auditing service support deduplication of records?**
-No. The auditing service pipeline is near real time, and therefore can't support de-duplication.
+No. The auditing service pipeline is near real time, and therefore can't support deduplication.
**Where is auditing data stored?**
compliance Audit New Search https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-new-search.md
Additional information:
- Searching via an EXO PowerShell session using the Search-UnifiedAuditLog cmdlet isn't compatible with the New Search at this time. - Search jobs can take in the following criteria: Date Range, Time Range, Search Job Name, Activities, Users, Files, Folders, and Sites. - Searching and filtering using date, time, search name, activities, and users are all fully functional-- Audit Log data will be stored for the defined retention period, regardless of a search job being deleted
+- Audit Log data is stored for the defined retention period, regardless of a search job being deleted
## Get started with audit new search
Some examples of different searches include the following criteria. Explore thes
- Search across selected users - Scoping the search using the activities field - Adding a specific file, folder, or site
+ - Scoping the search using administrative units
> [!IMPORTANT] > Terms entered in the **Keyword Search** field are only searched within indexed content (content within the Audit *common schema*). Audit *data content* in the audit log isn't searched for these keywords.
Some examples of different searches include the following criteria. Explore thes
- Search jobs can take in the following criteria: Date Range, Time Range, Search Job Name, Activities, Users, Files, Folders, and Sites. - File, folder, or site search text box will return all related results for corresponding file, folders, and sites-- The search jobs will run at the bottom of the search page.
+- The search jobs runs at the bottom of the search page.
- Search jobs can be *Queued*, *In Progress*, and *Completed* - A maximum of 10 *In Progress* search jobs can be completed simultaneously per user - Full search names for jobs can be seen by hovering the cursor over the search job-- Search jobs will display the Search Name, Status, Progress %, Number of results, creation time, and searched by
+- Search jobs display the Search Name, Status, Progress %, Number of results, creation time, and searched by
## Audit search results overview
compliance Classifier Get Started With https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/classifier-get-started-with.md
f1.keywords:
Previously updated : 09/09/2019 Last updated : 06/08/2023 audience: Admin
Creating a custom trainable classifier first involves giving it samples that are
To learn more about the different types of classifiers, see [Learn about trainable classifiers](classifier-learn-about.md).
-Watch this video for a quick summary of creating a trainable classifier. You'll still need to read this full article to get the details.
-
-</br>
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWyGL7]
-- [!INCLUDE [purview-preview](../includes/purview-preview.md)] ## Prerequisites
Classifiers are a Microsoft 365 E5, or E5 Compliance feature. You must have one
### Permissions
-To access classifiers in the UI:
+To access classifiers in the UI:
- the Global admin needs to opt in for the tenant to create custom classifiers.-- Compliance Administrator role is required to train a classifier.
+- the Compliance Administrator role is required to train a classifier.
-You'll need accounts with these permissions to use classifiers in these scenarios:
+To use classifiers in the following scenarios, you will need the permissions listed:
-- Retention label policy scenario: Record Management and Retention Management roles -- Sensitivity label policy scenario: Security Administrator, Compliance Administrator, Compliance Data Administrator-- Communication compliance policy scenario: Insider Risk Management Admin, Supervisory Review Administrator
+| Scenario | Required Role Permissions|
+| -- | --|
+| Retention label policy | Record Management <br> Retention Management |
+| Sensitivity label policy | Security Administrator <br> Compliance Administrator <br> Compliance Data Administrator
+| Communication compliance policy | Insider Risk Management Administrator <br> Supervisory Review Administrator|
> [!IMPORTANT] > By default, only the user who creates a custom classifier can train and review predictions made by that classifier.
-## Prepare for a custom trainable classifier
+## Prepare for a custom trainable classifier
-It's helpful to understand what's involved in creating a custom trainable classifier before you dive in.
+It's helpful to understand what's involved in creating a custom trainable classifier before you dive in.
### Timeline
This timeline reflects a sample deployment of trainable classifiers.
![trainable-classifier-timeline.](../media/trainable-classifier-deployment-timeline_border.png) > [!TIP]
-> Opt-in is required the first time for trainable classifiers. It takes twelve days for Microsoft 365 to complete a baseline evaluation of your organizations content. Contact your global administrator to kick off the opt-in process.
+> You must opt-in to create and work with trainable classifiers. It takes twelve days for Microsoft 365 to complete a baseline evaluation of your organization's content after you opt-in. Contact your global administrator to kick off the opt-in process.
### Overall workflow
To understand more about the overall workflow of creating custom trainable class
When you want a trainable classifier to independently and accurately identify an item as being in particular category of content, you first have to present it with many samples of the type of content that are in the category. This feeding of samples to the trainable classifier is known as *seeding*. Seed content is selected by a human and is judged to represent the category of content. > [!TIP]
-> You need to have at least 50 positive samples and as many as 500. The trainable classifier will process up to the 500 most recent created samples (by file created date/time stamp). The more samples you provide, the more accurate the predictions the classifier will make.
+> You need to have at least 50 positive samples and can have as many as 500. The trainable classifier will process up to the 500 most recently created samples (by file created date/time stamp). The more samples you provide, the more accurate the predictions the classifier makes will be.
### Testing content
Once the trainable classifier has processed enough positive samples to build a p
## How to create a trainable classifier
-1. Collect between 50-500 seed content items. These must be only samples that strongly represent the type of content you want the trainable classifier to positively identify as being in the category. See, [Default crawled file name extensions and parsed file types in SharePoint Server](/sharepoint/technical-reference/default-crawled-file-name-extensions-and-parsed-file-types) for the supported file types.
+1. Collect between 50-500 seed content items. These must be limited to samples that strongly represent the type of content you want the trainable classifier to positively identify as being in the category. See, [Default crawled file name extensions and parsed file types in SharePoint Server](/sharepoint/technical-reference/default-crawled-file-name-extensions-and-parsed-file-types) for the supported file types.
> [!IMPORTANT]
- > Make sure the items in your seed set are **strong** examples of the category. The trainable classifier initially builds its model based on what you seed it with. The classifier assumes all seed samples are strong positives and has no way of knowing if a sample is a weak or negative match to the category.
+ > Make sure the items in your seed set are **strong** examples of the category. The trainable classifier initially builds its model based on what you seed it with. The classifier assumes all seed samples are strong positives and has no way of knowing whether a sample is a weak or negative match to the category.
2. Place the seed content in a SharePoint Online folder that is dedicated to holding *the seed content only*. Make note of the site, library, and folder URL. > [!TIP] > If you create a new site and folder for your seed data, allow at least an hour for that location to be indexed before creating the trainable classifier that will use that seed data.
-3. Sign in to Microsoft Purview compliance portal with compliance admin or security admin role access and open <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a> or <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a> > **Data classification**.
+3. Sign in to the [Microsoft Purview compliance portal](https://go.microsoft.com/fwlink/p/?linkid=2077149) with either Compliance admin or Security admin role access and navigate to **Data classification** > **Classifiers**.
4. Choose the **Trainable classifiers** tab. 5. Choose **Create trainable classifier**.
-6. Fill in appropriate values for the `Name` and `Description` fields of the category of items you want this trainable classifier to identify.
+6. Fill in appropriate values for the **Name** and **Description** fields of the category of items you want this trainable classifier to identify.
-7. Pick the SharePoint Online site, library, and folder URL for the seed content site from step 2. Choose `Add`.
+7. Pick the SharePoint Online site, library, and folder URL for the seed content site from step 2. Choose **Add**.
-8. Review the settings and choose `Create trainable classifier`.
+8. Review the settings and choose **Create trainable classifier**.
-9. Within 24 hours the trainable classifier will process the seed data and build a prediction model. The classifier status is `In progress` while it processes the seed data. When the classifier is finished processing the seed data, the status changes to `Need test items`.
+9. Within 24 hours the trainable classifier will process the seed data and build a prediction model. The classifier status is **In progress** while it processes the seed data. When the classifier is finished processing the seed data, the status changes to **Need test items**.
10. You can now view the details page by choosing the classifier.
Once the trainable classifier has processed enough positive samples to build a p
11. Collect at least 200 test content items (10,000 max) for best results. These should be a mix of items that are strong positives, strong negatives and some that are a little less obvious in their nature. See, [Default crawled file name extensions and parsed file types in SharePoint Server](/sharepoint/technical-reference/default-crawled-file-name-extensions-and-parsed-file-types) for the supported file types.
-12. Place the test content in a SharePoint Online folder that is dedicated to holding *the test content only*. Make note of the SharePoint Online site, library, and folder URL.
+12. Place the test content in a SharePoint Online folder that is dedicated to holding *only the test content*. Make note of the SharePoint Online site, library, and folder URL.
> [!TIP] > If you create a new site and folder for your test data, allow at least an hour for that location to be indexed before creating the trainable classifier that will use that seed data.
-13. Choose `Add items to test`.
+13. Choose **Add items to test**.
-14. Pick the SharePoint Online site, library, and folder URL for the test content site from step 12. Choose `Add`.
+14. Pick the SharePoint Online site, library, and folder URL for the test content site from step 12. Choose **Add sites**.
-15. Finish the wizard by choosing `Done`. Your trainable classifier will take up to an hour to process the test files.
+15. Finish the wizard by choosing **Done**. Your trainable classifier will take up to an hour to process the test files.
-16. When the trainable classifier is done processing your test files, the status on the details page will change to `Ready to review`. If you need to increase the test sample size, choose `Add items to test` and allow the trainable classifier to process the additional items.
+16. When the trainable classifier is done processing your test files, the status on the details page will change to `Ready to review`. If you need to increase the test sample size, choose **Add items to test** and allow the trainable classifier to process the additional items.
> [!div class="mx-imgBorder"] > ![ready to review screenshot.](../media/classifier-trainable-ready-to-review-detail.png)
-17. Choose `Tested items to review` tab to review items.
+17. Choose the **Tested items to review** tab to review items.
-18. Microsoft 365 will present 30 items at a time. Review them and in the `We predict this item is "Relevant". Do you agree?` box choose either `Yes` or `No` or `Not sure, skip to next item`. Model accuracy is automatically updated after every 30 items.
+18. Microsoft 365 will present 30 items at a time. Review them; in the **We predict this item is "Relevant". Do you agree?** box, choose **Yes**, or **No**, or **Not sure, skip to next item**. Model accuracy is automatically updated every 30 items.
> [!div class="mx-imgBorder"] > ![review items box.](../media/classifier-trainable-review-detail.png)
-19. Review *at least* 200 items. Once the accuracy score has stabilized, the **publish** option will become available and the classifier status will say `Ready to use`.
+19. Review *at least* 200 items. Once the accuracy score has stabilized, the **publish** option will become available and the classifier status will say **Ready to use**.
> [!div class="mx-imgBorder"] > ![accuracy score and ready to publish.](../media/classifier-trainable-review-ready-to-publish.png) 20. Publish the classifier.
-21. Once published your classifier will be available as a condition in [Office auto-labeling with sensitivity labels](apply-sensitivity-label-automatically.md), [auto-apply retention label policy based on a condition](apply-retention-labels-automatically.md#configuring-conditions-for-auto-apply-retention-labels) and in [Communication compliance](communication-compliance.md).
+21. Once published, your classifier will be available as a condition in [Office auto-labeling with sensitivity labels](apply-sensitivity-label-automatically.md), [auto-apply retention label policy based on a condition](apply-retention-labels-automatically.md#configuring-conditions-for-auto-apply-retention-labels) and in [Communication compliance](communication-compliance.md).
compliance Classifier How To Retrain Content Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/classifier-how-to-retrain-content-explorer.md
f1.keywords:
Previously updated : 09/02/2020 Last updated : 06/12/2023 audience: Admin
description: "Learn how to provide feedback to a trainable classifier in Content
A Microsoft 365 trainable classifier is a tool you can train to recognize various types of content by giving it samples to look at. Once trained, you can use it to identify items for application of Office sensitivity labels, communications compliance policies, and retention label policies.
-This article shows you how to improve the performance of custom trainable classifiers by providing them more feedback.
+This article shows you how to improve the performance of custom trainable classifiers by providing them with more feedback.
To learn more about the different types of classifiers, see [Learn about trainable classifiers](classifier-learn-about.md).
-Watch this video for a quick summary of the tuning and retraining process. You'll still need to read this full article to get the details.
-
-</br>
-
-<!-- > [!VIDEO https://www.microsoft.com/videoplayer/embed/RWyGMs]-->
- > [!NOTE] > Pre-trained classifiers cannot be retrained.
To access classifiers in the Microsoft Purview compliance portal:
- the Compliance admin role or Compliance Data Administrator is required to train a classifier
-You'll need accounts with these permissions to use classifiers in these scenarios:
+To use classifiers in the following scenarios, you will need the permissions listed:
-- Retention label policy scenario: Record Management and Retention Management roles
+| Scenario | Required Role Permissions|
+| -- | --|
+| Retention label policy | Record Management <br> Retention Management |
+| Sensitivity label policy | Security Administrator <br> Compliance Administrator <br> Compliance Data Administrator
+| Communication compliance policy | Insider Risk Management Administrator <br> Supervisory Review Administrator|
## Overall workflow > [!IMPORTANT]
-> You provide feedback in content explorer for auto-apply retention label policies to Exchange items and uses the classifier as a condition. **If you don't have a retention policy that auto-applies a retention label to Exchange items and uses a classifier as a condition, stop here.**
+> You provide feedback in content explorer to automatically apply retention label policies to Exchange items and that uses the classifier as a condition. **If you don't have a retention policy that automatically applies a retention label to Exchange items and that uses a classifier as a condition, stop here.**
-As you use your classifiers, you may want to increase the precision of the classifications that they're making. You do this by evaluating the quality of the classifications made for items it has identified as being a match or not a match. After you make 30 evaluations for a classifier, it takes that feedback, and automatically retrains itself.
+As you use your classifiers, you may want to increase the precision of the classifications that they're making. You do this by evaluating the quality of the classifications made for items it has identified as being a match or not a match. After you make 30 evaluations for a classifier, it takes that feedback, and automatically retrains itself.
To understand more about the overall workflow of retraining a classifier, see [Process flow for retraining a classifier](classifier-learn-about.md#retraining-classifiers).
To understand more about the overall workflow of retraining a classifier, see [P
## How to retrain a classifier in content explorer 1. Sign in to Microsoft Purview compliance portal with compliance admin or security admin role access and open **Microsoft Purview compliance portal** > **Data classification** > **Content explorer**. + 2. Under the **Filter on labels, info types, or categories** list, expand **Trainable classifiers**. > [!IMPORTANT] > It can take up to eight days for aggregated items to appear under the trainable classifiers heading.
-3. Choose the trainable classifier you used in you auto-apply retention label policy. This is the trainable classifier you'll give feedback on.
+3. Choose the trainable classifier you used in your auto-apply retention label policy. This is the trainable classifier you'll give feedback on.
> [!NOTE] > If an item has an entry in the **Retention label** column, it means that the item was classified as a `match`. If an item doesn't have an entry in the **Retention label** column, it means it was classified as a `close match`. You can improve the classifier precision the most by providing feedback on `close match` items.
-4. Choose an item and open it.
+4. In the **All locations** list, open a folder that shows that matches have been found.
+
+5. Choose an item and open it.
- > [!TIP]
+> [!TIP]
> You can provide feedback on multiple items simultaneously by choosing them all and then choosing **Improve classification** in the command bar.
-5. Choose **Provide feedback**.
-6. In the **Detailed feedback** pane, if the item is a true positive, choose, **Match**. If the item is a false positive, that is it was incorrectly included in the category, choose **Not a match**.
-7. If there's another classifier that would be more appropriate for the item, you can choose it from the **Suggest other trainable classifiers** list. This will trigger the other classifier to evaluate the item.
-8. Choose **Send feedback** to send your evaluation of the `match`, `not a match` classifications and suggest other trainable classifiers. When you've provided 30 instances of feedback to a classifier, it will automatically retrain. Retraining can take from one to four hours. Classifiers can only be retrained twice per day.
+6. Choose **Provide feedback**.
+
+7. In the **Detailed feedback** pane, if the item is a true positive, choose, **Match**. If the item is a false positive, that is, it was incorrectly included in the category, choose **Not a match**.
+
+8. If there's another classifier that would be more appropriate for the item, you can choose it from the **Suggest other trainable classifiers** list. This will trigger the other classifier to evaluate the item.
+
+9. Choose **Send feedback** to send your evaluation of the `match`, `not a match` classifications and suggest other trainable classifiers. When you've provided 30 instances of feedback to a classifier, it will automatically retrain. Retraining can take from one to four hours. Classifiers can only be retrained twice per day.
> [!IMPORTANT] > This information goes to the classifier in your tenant, **it does not go back to Microsoft**.
-9. Open **Trainable classifiers**.
+10. Open **Trainable classifiers**.
+ 10. The classifier that was used in your Communications compliance policy will appear under the **Re-training** heading.
-![classifier in retraining status.](../media/classifier-retraining.png)
+<!-- 6-19-2023--Comment needed until image can be replaced: classifier in retraining status.](../media/classifier-retraining.png) -->
-11. Once retraining completes, choose the classifier to open the retraining overview.
+12. Once retraining completes, choose the classifier to open the retraining overview.
![classifier retraining results overview.](../media/classifier-retraining-overview.png)
-12. Review the recommended action, and the prediction comparisons of the retrained and currently published versions of the classifier.
-13. If you satisfied with the results of the retraining, choose **Re-publish**.
-14. If you aren't satisfied with the results of the retraining, you can choose to provide more feedback to the classifier in the Content Explorer interface and start another retraining cycle or do nothing in which case the currently published version of the classifier will continue to be used.
+13. Review the recommended action, and the prediction comparisons of the retrained and currently published versions of the classifier.
+14. If you satisfied with the results of the retraining, choose **Re-publish**.
+15. If you aren't satisfied with the results of the retraining, you can choose to provide more feedback to the classifier in the Content Explorer interface and start another retraining cycle or do nothing in which case the currently published version of the classifier will continue to be used.
## Details on republishing recommendations
compliance Compliance Manager Assessments https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-assessments.md
f1.keywords:
Previously updated : 05/23/2023 Last updated : 06/19/2023 audience: Admin
If you select **Cancel**, the update won't be applied to the assessment. However
## Export an assessment report
-You can export an assessment to an Excel file for compliance stakeholders in your organization or for external auditors and regulators. On your assessment details page, select the **Generate report** button near the top of the page, which creates an Excel file you can save and share.
-
-The report is a snapshot of the assessment as of the date and time of the export. It contains the details for controls managed by both you and Microsoft, including implementation status, test date, and test results.
+You can export an assessment to an Excel file for compliance stakeholders in your organization or for external auditors and regulators. On the assessment details page, select the **Export actions** in the top right corner of the page, which creates an Excel file you can save and share. The report is a snapshot of the assessment as of the date and time of the export. It contains the details for controls managed by both you and Microsoft, including implementation status, test date, and test results.
## Delete an assessment
compliance Compliance Manager Improvement Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-improvement-actions.md
f1.keywords:
Previously updated : 05/23/2023 Last updated : 06/19/2023 audience: Admin
Automatically tested actions may also show one of the following states in the **
- **Could not be detected**: couldn't detect a test status; will be automatically checked again - **Partially tested**: action has been partially tested; neither passes nor fails
+Some actions may show a status of **Out of scope** when automatic monitoring through Defender for Cloud is first set up. This is because it can take up to 24 hours to process the signals from Defender for Cloud. Improvement action statuses refresh every 24 hours.
+ > [!NOTE] > The test status and testing notes for automatically tested improvement actions can't be edited manually. Compliance Manager updates these fields for you.
compliance Create A Custom Sensitive Information Type In Scc Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-a-custom-sensitive-information-type-in-scc-powershell.md
f1.keywords:
Previously updated : 09/17/2019 Last updated : 06/02/2023 audience: Admin
search.appverid: - MOE150 - MET150
-description: "Learn how to create and import a custom sensitive information type for policies in the Compliance center."
+description: "Learn how to create and import a custom sensitive information type for policies in the compliance portal."
# Create a custom sensitive information type using PowerShell
After you've created a well-formed XML file, you can upload it to Microsoft 365
Microsoft Support can't help you create content-matching definitions.
-For custom content-matching development, testing, and debugging, you'll need to use your own internal IT resources, or use consulting services, such as Microsoft Consulting Services (MCS). Microsoft Support engineers can provide limited support for this feature, but they can't guarantee that custom content-matching suggestions will fully meet your needs.
+For custom content-matching development, testing, and debugging, you need to use your own internal IT resources, or use consulting services, such as Microsoft Consulting Services (MCS). Microsoft Support engineers can provide limited support for this feature, but they can't guarantee that custom content-matching suggestions will fully meet your needs.
MCS can provide regular expressions for testing purposes. They can also provide assistance in troubleshooting an existing RegEx pattern that's not working as expected with a single specific content example.
For more information about the Boost.RegEx (formerly known as RegEx++) engine th
## Sample XML of a rule package
-Here's the sample XML of the rule package that we'll create in this article. Elements and attributes are explained in the sections below.
+Here's the sample XML of the rule package that we create in this article. Elements and attributes are explained in the sections that follow.
```xml <?xml version="1.0" encoding="UTF-16"?>
Here's the sample XML of the rule package that we'll create in this article. Ele
## What are your key requirements? [Rule, Entity, Pattern elements]
-It's important that you understand the basic structure of the XML schema for a rule. Your understanding of the structure will help your custom sensitive information type to identify the right content.
+It's important that you understand the basic structure of the XML schema for a rule. Your understanding of the structure helps your custom sensitive information type to identify the right content.
A rule defines one or more entities (also known as sensitive information types). Each entity defines one or more patterns. A pattern is what a policy looks for when it evaluates content (for example, email and documents).
For example, to increase the likelihood of identifying content that contains an
![Diagram of entity with multiple patterns.](../media/c8dc2c9d-00c6-4ebc-889a-53b41a90024a.png)
-There are important points to consider for multiple pattern matches:
+There are important points to consider for multiple-pattern matches:
- Patterns that require more evidence have a higher confidence level. Based on the confidence level, you can take the following actions: - Use more restrictive actions (such as block content) with higher-confidence matches. - Use less restrictive actions (such as send notifications) with lower-confidence matches. -- The supporting `IdMatch` and `Match` elements reference RegExes and keywords that are actually children of the `Rule` element, not the `Pattern`. These supporting elements are referenced by the `Pattern`, but are included in the `Rule`. This behavior means that a single definition of a supporting element, such as a regular expression or a keyword list, can be referenced by multiple entities and patterns.
+- The supporting `IdMatch` and `Match` elements reference RegExes and keywords that are actually children of the `Rule` element, not the `Pattern`. The`Pattern` references supporting elements, but they're included in the `Rule`. This behavior means that a single definition of a supporting element, such as a regular expression or a keyword list, can be referenced by multiple entities and patterns.
## What entity do you need to identify? [Entity element, ID attribute]
An entity is a sensitive information type, such as a credit card number, that ha
### Name the entity and generate its GUID 1. In your XML editor of choice, add the `Rules` and `Entity` elements.
-2. Add a comment that contains the name of your custom entity, such as Employee ID. Later, you'll add the entity name to the localized strings section, and that name appears in the admin center when you create a policy.
+2. Add a comment that contains the name of your custom entity, such as Employee ID. Later, you add the entity name to the localized strings section, and that name appears in the admin center when you create a policy.
3. Generate a unique GUID for your entity. For example, in Windows PowerShell, you can run the command `[guid]::NewGuid()`. Later, you'll also add the GUID to the localized strings section of the entity. ![XML markup showing Rules and Entity elements.](../media/c46c0209-0947-44e0-ac3a-8fd5209a81aa.png)
An entity is a sensitive information type, such as a credit card number, that ha
The pattern contains the list of what the sensitive information type is looking for. The pattern can include RegExes, keywords, and built-in functions. Functions do task like running RegExes to find dates or addresses. Sensitive information types can have multiple patterns with unique confidences.
-In the following diagram, all of the patterns reference the same regular expression. This RegEx looks for a nine-digit number `(\d{9})` surrounded by white space `(\s) ... (\s)`. This regular expression is referenced by the `IdMatch` element, and is the common requirement for all patterns that look for the Employee ID entity. `IdMatch` is the identifier that the pattern is to trying to match. A `Pattern` element must have exactly one `IdMatch` element.
+In the following diagram, all of the patterns reference the same regular expression. This RegEx looks for a nine-digit number `(\d{9})` surrounded by white space `(\s) ... (\s)`. The `IdMatch` element references this regular expression, and it is the common requirement for all patterns that look for the Employee ID entity. `IdMatch` is the identifier that the pattern is to trying to match. A `Pattern` element must have exactly one `IdMatch` element.
![XML markup showing multiple Pattern elements referencing single Regex element.](../media/8f3f497b-3b8b-4bad-9c6a-d9abf0520854.png)
A `Pattern` might include multiple `Match` elements:
- Directly in the `Pattern` element. - Combined by using the `Any` element.
-`Match` elements are joined by an implicit AND operator. In other words, all `Match` elements must be satisfied for the pattern to be matched.
+`Match` elements are joined with an implicit AND operator. In other words, all `Match` elements must be satisfied for the pattern to be matched.
You can use the `Any` element to introduce AND or OR operators. The `Any` element is described later in this article.
-You can use the optional `minCount` attribute to specify how many instances of a match need to be found for each `Match` elements. For example, you can specify that a pattern is satisfied only when at least two keywords from a keyword list are found.
+You can use the optional `minCount` attribute to specify how many instances of a match need to be found for each `Match` element. For example, you can specify that a pattern is satisfied only when at least two keywords from a keyword list are found.
![XML markup showing Match element with minOccurs attribute.](../media/607f6b5e-2c7d-43a5-a131-a649f122e15a.png)
Keywords are included as a list of `Term` elements in a `Group` element. The `Gr
- **matchStyle="word"**: A word match identifies whole words surrounded by white space or other delimiters. You should always use **word** unless you need to match parts of words or words in Asian languages. -- **matchStyle="string"**: A string match identifies strings no matter what they're surrounded by. For example, "ID" will match "bid" and "idea". Use `string` only when you need to match Asian words or if your keyword might be included in other strings.
+- **matchStyle="string"**: A string match identifies strings no matter what they're surrounded by. For example, "ID" matches both "b**id**" and "**id**ea". Use `string` only when you need to match Asian words or if your keyword might be included in other strings.
Finally, you can use the `caseSensitive` attribute of the `Term` element to specify that the content must match the keyword exactly, including lower-case and upper-case letters.
For more information, see [Sensitive information type functions](sit-functions.m
## Different combinations of evidence [Any element, minMatches and maxMatches attributes]
-In a `Pattern` element, all `IdMatch` and `Match` elements are joined by an implicit AND operator. In other words, all of the matches must be satisfied before the pattern can be satisfied.
+In a `Pattern` element, all `IdMatch` and `Match` elements are joined with an implicit AND operator. In other words, all of the matches must be satisfied before the pattern can be satisfied.
You can create more flexible matching logic by using the `Any` element to group `Match` elements. For example, you can use the `Any` element to match all, none, or an exact subset of its child `Match` elements.
The `Any` element has optional `minMatches` and `maxMatches` attributes that you
### Match at least one child Match element
-To require only a minimum number of `Match` elements, you can use the `minMatches` attribute. In effect, these `Match` elements are joined by an implicit OR operator. This `Any` element is satisfied if a US-formatted date or a keyword from either list is found.
+To require only a minimum number of `Match` elements, you can use the `minMatches` attribute. In effect, these `Match` elements are joined with an implicit OR operator. This `Any` element is satisfied if a US-formatted date or a keyword from either list is found.
```xml <Any minMatches="1" >
To require an exact number of `Match` elements, set `minMatches` and `maxMatches
</Any> ```
-### Match none of children Match elements
+### Match none of children "Match" elements
-If you want to require the absence of specific evidence for a pattern to be satisfied, you can set both minMatches and maxMatches to 0. This can be useful if you have a keyword list or other evidence that are likely to indicate a false positive.
+If you want to require the absence of specific evidence for a pattern to be satisfied, you can set both minMatches and maxMatches to 0. This can be useful if you have a keyword list or other evidence that is likely to indicate a false positive.
For example, the employee ID entity looks for the keyword "card" because it might refer to an "ID card". However, if card appears only in the phrase "credit card", "card" in this content is unlikely to mean "ID card". So you can add "credit card" as a keyword to a list of terms that you want to exclude from satisfying the pattern.
For example, the employee ID entity looks for the keyword "card" because it migh
</Any> ```
-### Match a number of unique terms
+### Match several unique terms
-If you want to match a number of unique terms, use the *uniqueResults* parameter, set to *true*, as shown in the following example:
+If you want to match several unique terms, use the *uniqueResults* parameter, set to *true*, as shown in the following example:
```xml <Pattern confidenceLevel="75">
The example below illustrates how the proximity window affects the pattern match
![Diagram of corroborative evidence and proximity window.](../media/dc68e38e-dfa1-45b8-b204-89c8ba121f96.png)
-Note that for email, the message body and each attachment are treated as separate items. This means that the proximity window doesnΓÇÖt extend beyond the end of each of these items. For each item (attachment or body), both the idMatch and corroborative evidence needs to reside in that item.
+For email, the message body and each attachment are treated as separate items. This means that the proximity window doesnΓÇÖt extend beyond the end of each of these items. For each item (attachment or body), both the idMatch and corroborative evidence needs to reside in that item.
## What are the right confidence levels for different patterns? [confidenceLevel attribute, recommendedConfidence attribute]
The Pattern element has a required confidenceLevel attribute. You can think of t
![XML markup showing Pattern elements with different values for confidenceLevel attribute.](../media/sit-xml-markedup-2.png)
-In addition to confidenceLevel for each Pattern, the Entity has a recommendedConfidence attribute. The recommended confidence attribute can be thought of as the default confidence level for the rule. When you create a rule in a policy, if you don't specify a confidence level for the rule to use, that rule will match based on the recommended confidence level for the entity. Please note that the recommendedConfidence attribute is mandatory for each Entity ID in the Rule Package, if missing you won't be able to save policies that use the Sensitive Information Type.
+In addition to confidenceLevel for each Pattern, the Entity has a recommendedConfidence attribute. The recommended confidence attribute can be thought of as the default confidence level for the rule. When you create a rule in a policy, if you don't specify a confidence level for the rule to use, that rule matches based on the recommended confidence level for the entity. Note that the recommendedConfidence attribute is mandatory for each Entity ID in the Rule Package, if missing you won't be able to save policies that use the Sensitive Information Type.
-## Do you want to support other languages in the UI of the Compliance center? [LocalizedStrings element]
+## Do you want to support other languages in the UI of the compliance portal? [LocalizedStrings element]
If your compliance team uses the Microsoft Purview compliance portal to create policies in different locales and in different languages, you can provide localized versions of the name and description of your custom sensitive information type. When your compliance team uses Microsoft 365 in a language that you support, they'll see the localized name in the UI. ![Instance count and match accuracy configuration.](../media/11d0b51e-7c3f-4cc6-96d8-b29bcdae1aeb.png)
-The Rules element must contain a LocalizedStrings element, which contains a Resource element that references the GUID of your custom entity. In turn, each Resource element contains one or more Name and Description elements that each use the langcode attribute to provide a localized string for a specific language.
+The Rules element must contain a LocalizedStrings element, which contains a Resource element that references the GUID of your custom entity. In turn, each Resource element contains one or more Name and Description elements that each use the `langcode` attribute to provide a localized string for a specific language.
![XML markup showing contents of LocalizedStrings element.](../media/a96fc34a-b93d-498f-8b92-285b16a7bbe6.png)
Note that you use localized strings only for how your custom sensitive informati
Finally, the beginning of each RulePackage contains some general information that you need to fill in. You can use the following markup as a template and replace the ". . ." placeholders with your own info.
-Most importantly, you'll need to generate a GUID for the RulePack. Above, you generated a GUID for the entity; this is a second GUID for the RulePack. There are several ways to generate GUIDs, but you can do it easily in PowerShell by typing [guid]::NewGuid().
+Most importantly, you need to generate a GUID for the RulePack. Earlier, you generated a GUID for the entity; this is a second GUID for the RulePack. There are several ways to generate GUIDs, but you can do it easily in PowerShell by typing [guid]::NewGuid().
The Version element is also important. When you upload your rule package for the first time, Microsoft 365 notes the version number. Later, if you update the rule package and upload a new version, make sure to update the version number or Microsoft 365 won't deploy the rule package.
In this example, a date validator is defined for a RegEx part of which is date.
## Changes for Exchange Online
-Previously, you might have used Exchange Online PowerShell to import your custom sensitive information types for DLP. Now your custom sensitive information types can be used in both the <a href="https://go.microsoft.com/fwlink/p/?linkid=2059104" target="_blank">Exchange admin center</a> and the Compliance center. As part of this improvement, you should use Security & Compliance PowerShell to import your custom sensitive information types ΓÇö you can't import them from Exchange Online PowerShell anymore. Your custom sensitive information types will continue to work just like before; however, it may take up to one hour for changes made to custom sensitive information types in the Compliance center to appear in the Exchange admin center.
+Previously, you might have used Exchange Online PowerShell to import your custom sensitive information types for DLP. Now your custom sensitive information types can be used in both the [Exchange admin center]()]"https://go.microsoft.com/fwlink/p/?linkid=2059104") and the Microsoft Purview compliance portal. As part of this improvement, you should use Security & Compliance PowerShell to import your custom sensitive information typesΓÇöyou can't import them from Exchange Online PowerShell anymore. Your custom sensitive information types will continue to work just like before; however, it may take up to one hour for changes made to custom sensitive information types in the Compliance center to appear in the Exchange admin center.
Note that in the Compliance center, you use the **[New-DlpSensitiveInformationTypeRulePackage](/powershell/module/exchange/new-dlpsensitiveinformationtyperulepackage)** cmdlet to upload a rule package. (Previously, in the Exchange admin center, you used the **ClassificationRuleCollection**` cmdlet.)
compliance Create A Keyword Dictionary https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-a-keyword-dictionary.md
audience: Admin Previously updated : 09/17/2019 Last updated : 06/02/2023 ms.localizationpriority: high - tier1
Microsoft Purview Data Loss Prevention (DLP) can identify, monitor, and protect
## Keyword dictionary limits
-There is a limit of 50 keyword dictionary based sensitive information types that can be created per tenant. To find out how many keyword dictionaries you have in your tenant, connect follow the procedures in [Connect to the Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell) to connect to your tenant and then run this PowerShell script:
+You can create up to 50 sensitive information types per tenant that are based on keyword dictionaries. To find out how many keyword dictionaries you have in your tenant, follow the procedures in [Connect to the Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell) to connect to your tenant and then run this PowerShell script:
```powershell $rawFile = $env:TEMP + "\rule.xml"
Use the following steps to create and import keywords for a custom dictionary:
2. Navigate to **Data Classifications > Classifiers > Sensitive info types**.
-3. Select **Create** and enter a **Name** and **Description** for your sensitive info type, then select **Next**.
+3. Select **Create** and then enter a **Name** and **Description** for your sensitive info type. Choose **Next**.
+
+4. On the **Define patterns for this sensitive info type** page, choose **Create pattern**.
-4. You can use your keyword dictionary as either the primary element or a secondary element. To use a keyword dictionary as the primary element, in the **Primary Element** field, select **Add Primary Element** and then select **Keyword dictionary** in the dropdown list.
+5. In the **New pattern** window, select a **Confidence level**.
-5. On the **Add keyword dictionary** page, you can choose from existing dictionaries, upload a dictionary, or create a dictionary.
- 1. To use an existing dictionary,choose **Choose from existing dictionaries**.
- 1. To upload a keyword dictionary, choose **Upload a dictionary** and follow the prompts to upload either a TXT or CSV file.
- 1. To create a dictionary:
- 1. Enter a **Name** for your custom dictionary.
- 1. In the **Keywords** field, enter each keyword in your dictionary on a separate line.
- 1. When you are finished, choose **Done**.
+6. Choose **Add a Primary element** and select **Keyword dictionary** list of options.
-6. On the next page, choose **Create**.
+7. Still in the **New Pattern** window, for **Character proximity**, specify how far away (in number of characters) that any supporting elements must be to be detected. The closer the primary and supporting elements are to each other, the more likely the detected content is going to be what you're looking for.
-7. If you want to add additional patterns to your sensitive information type, you can do so on the next page. When finished, choose **Next**.
+8. Add the **Supporting elements** you wish to use to increase the accuracy of detecting what you're looking for.
-8. Confirm the confidence level for your sensitive information type and choose **Next**.
-
-9. Review and finalize your sensitive info type selections, then select **Create** and then **Done**.
+9. Add any **Additional checks** and then choose **Create**.
+
+10. Choose **Next** to continue creating your sensitive information type. When you are finished, choose **Done**.
## Create a keyword dictionary from a file using PowerShell
The output of the command looks like this:
`IsValid : True` <br> `ObjectState : Unchanged` <br>
-Paste the **identity** value into the XML for your custom sensitive information type as the **idRef**. Next, upload the XML file. Your dictionary will now appear in your list of sensitive information types and you can use it right in your policy, specifying how many keywords are required to match.
+Paste the **identity** value into the XML for your custom sensitive information type as the **idRef**. Next, upload the XML file. Your dictionary now appears in your list of sensitive information types and you can use it right in your policy, specifying how many keywords are required to match.
```xml <Entity id="d333c6c2-5f4c-4131-9433-db3ef72a89e8" patternsProximity="300" recommendedConfidence="85">
Paste the **identity** value into the XML for your custom sensitive information
> > - For example, to detect a keyword like "机密的document", use two variants of the keyword; one with a space between the Japanese and English text and another without a space between the Japanese and English text. So, the keywords to be added in the SIT should be "机密的 document" and "机密的document". Similarly, to detect a phrase "東京オリンピック2020", two variants should be used; "東京オリンピック 2020" and "東京オリンピック2020". >
-> Along with Chinese/Japanese/double byte characters, if the list of keywords/phrases also contain non Chinese/Japanese words also (like English only), it is recommended to create two dictionaries/keyword lists. One for keywords containing Chinese/Japanese/double byte characters and another one for English only.
+> Along with Chinese/Japanese/double byte characters, if the list of keywords/phrases also contains non-Chinese/Japanese words also (for instance, stand-alone English words), you should create two dictionaries/keyword lists. One for keywords containing Chinese/Japanese/double byte characters and another one for English words.
> > - For example, if you want to create a keyword dictionary/list with three phrases "Highly confidential", "機密性が高い" and "机密的document", the it you should create two keyword lists. > 1. Highly confidential
compliance Customize A Built In Sensitive Information Type https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customize-a-built-in-sensitive-information-type.md
f1.keywords:
Previously updated : 07/08/2019 Last updated : 06/02/2023 audience: Admin
description: Learn how to create a custom sensitive information type that will a
# Customize a built-in sensitive information type
-When looking for sensitive information in content, you need to describe that information in what's called a *rule*. Microsoft Purview Data Loss Prevention (DLP) includes rules for the most common sensitive information types. You can use these rules right away. To use them, you must include them in a policy. You might find that you want to adjust these built-in rules to meet your organization's specific needs. You can do that by creating a custom sensitive information type. This topic shows you how to customize the XML file that contains the existing rule collection so you can detect a wider range of potential credit card information.
+When looking for sensitive information in content, you need to describe that information in what's called a *rule*. Microsoft Purview Data Loss Prevention (DLP) includes rules for the most common sensitive information types. You can use these rules right away. To use them, you must include them in a policy. If you want to adjust these built-in rules to meet your organization's specific needs. You can do that by creating a custom sensitive information type. This topic shows you how to customize the XML file that contains the existing rule collection so you can detect a wider range of potential credit card information.
You can take this example and apply it to other built-in sensitive information types. For a list of default sensitive information types and XML definitions, see [Sensitive information type entity definitions](sensitive-information-type-entity-definitions.md).
The cmdlets above exported the entire *rule collection*, which includes the defa
2. Scroll down to the `<Rules>` tag, which is the start of the section that contains the DLP rules. Because this XML file contains the information for the entire rule collection, it contains other information at the top that you need to scroll past to get to the rules.
-3. Look for *Func_credit_card* to find the Credit Card Number rule definition. In the XML, rule names can't contain spaces, so the spaces are usually replaced with underscores, and rule names are sometimes abbreviated. An example of this is the U.S. Social Security number rule, which is abbreviated _SSN_. The Credit Card Number rule XML should look like the following code sample.
+3. Look for *Func_credit_card* to find the Credit Card Number rule definition. In the XML, rule names can't contain spaces, so the spaces are usually replaced with underscores, and rule names are sometimes abbreviated. An example of this is the U.S. Social Security number rule, which is abbreviated *SSN*. The XML for the Credit Card Number rule should look like the following code sample:
```xml <Entity id="50842eb7-edc8-4019-85dd-5a5c1f2bb085"
Now, you have something that looks similar to the following XML. Because rule pa
## Remove the corroborative evidence requirement from a sensitive information type
-Now that you have a new sensitive information type that you're able to upload to the Microsoft Purview compliance portal, the next step is to make the rule more specific. Modify the rule so that it only looks for a 16-digit number that passes the checksum but doesn't require additional (corroborative) evidence, like keywords. To do this, you need to remove the part of the XML that looks for corroborative evidence. Corroborative evidence is very helpful in reducing false positives. In this case there are usually certain keywords or an expiration date near the credit card number. If you remove that evidence, you should also adjust how confident you are that you found a credit card number by lowering the `confidenceLevel`, which is 85 in the example.
+Now you have a new sensitive information type that you're able to upload to the Microsoft Purview compliance portal. The next step is to make the rule more specific. Modify the rule so that it only looks for a 16-digit number that passes the checksum but that doesn't require additional (corroborative) evidence, such as keywords. To do this, you need to remove the part of the XML that looks for corroborative evidence. Corroborative evidence is very helpful in reducing false positives. In this case, there are usually certain keywords or an expiration date near the credit card number. If you remove that evidence, you should also adjust how confident you are that you found a credit card number by lowering the `confidenceLevel`, which is 85 in the example.
```xml <Entity id="db80b3da-0056-436e-b0ca-1f4cf7080d1f" patternsProximity="300"
Now that you have a new sensitive information type that you're able to upload to
## Look for keywords that are specific to your organization
-You might want to require corroborative evidence but want different or additional keywords, and perhaps you want to change where to look for that evidence. You can adjust the `patternsProximity` to expand or shrink the window for corroborative evidence around the 16-digit number. To add your own keywords, you need to define a keyword list and reference it within your rule. The following XML adds the keywords "company card" and "Contoso card" so that any message that contains those phrases within 150 characters of a credit card number will be identified as a credit card number.
+You might want to require corroborative evidence but want different or additional keywords, and perhaps you want to change where to look for that evidence. You can adjust the `patternsProximity` to expand or shrink the window for corroborative evidence around the 16-digit number. To add your own keywords, you must define a keyword list and reference it within your rule. The following XML adds the keywords "company card" and "Contoso card", so that any message that contains those phrases within 150 characters of a credit card number will be identified as a credit card number.
```xml <Rules>
These are the definitions for the terms you encountered during this procedure.
|Term|Definition| ||| |Entity|*Entities* are what we call sensitive information types, such as credit card numbers. Each entity has a unique GUID as its ID. If you copy a GUID and search for it in the XML, you'll find the XML rule definition and all the localized translations of that XML rule. You can also find this definition by locating the GUID for the translation and then searching for that GUID.|
-|Functions|The XML file references `Func_credit_card`, which is a function in compiled code. Functions are used to run complex regexes and verify that checksums match for our built-in rules.) Because this happens in the code, some of the variables don't appear in the XML file.|
+|Functions|The XML file references `Func_credit_card`, which is a function in compiled code. Functions are used to run complex regexes and verify that checksums match for our built-in rules. Because this happens in the code, some of the variables don't appear in the XML file.|
|IdMatch|This is the identifier that the pattern is to trying to matchΓÇöfor example, a credit card number.|
-|Keyword lists|The XML file also references `keyword_cc_verification` and `keyword_cc_name`, which are lists of keywords from which we are looking for matches within the `patternsProximity` for the entity. These aren't currently displayed in the XML.|
+|Keyword lists|The XML file also references `keyword_cc_verification` and `keyword_cc_name`, which are lists of keywords that we are looking to match within the `patternsProximity` for the entity. These aren't currently displayed in the XML.|
|Pattern|The *pattern* contains the list of what the sensitive type is looking for. This includes keywords, regexes, and internal functions, which perform tasks like verifying checksums. Sensitive information types can have multiple patterns with unique confidence levels. This is useful when creating a sensitive information type that returns a high confidence if corroborative evidence is found and a lower confidence if little or no corroborative evidence is found.| |Pattern confidenceLevel|This is the level of confidence that the DLP engine found a match. This level of confidence is associated with a match for the pattern if the pattern's requirements are met. This is the confidence measure you should consider when using Exchange mail flow rules (also known as transport rules).| |patternsProximity|When we find what looks like a credit card number pattern, `patternsProximity` is the distance around that number where we'll look for corroborative evidence.|
compliance Data Classification Activity Explorer Available Events https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-activity-explorer-available-events.md
f1.keywords:
Previously updated : 10/02/2019 Last updated : 06/13/2023 audience: Admin
description: "A list of labeling activities that are available in Activity explo
This event is generated each time an unlabeled document is labeled or an email is sent with a sensitivity label. -- It is captured at the time of save in Office native applications and web applications.-- It is captured at the time of occurrence for the Azure Information Protection (AIP) unified labeling client.
+- It is captured when saved in native Microsoft Office applications and web applications.
+- It is captured when a label is applied for the Azure Information Protection (AIP) unified labeling client.
- Upgrade and downgrade labels actions can also be monitored via the *Label event type* field and filter. |Source |Reported in Activity explorer | Note |
This event is generated each time an unlabeled document is labeled or an email i
This event is generated each time a sensitivity label is updated on the document or email. -- For the AIP unified client, AIP unified scanner and MIP SDK sources, the AIP *upgrade label* and *downgrade label* action maps to Activity explorer *label changed*-- It is captured at the point of save in Office native applications and web applications.-- It is captured at the time of occurrence for the AIP unified labeling client and scanner enforcements-- Upgrade and downgrade labels actions can also be monitored via the *Label event type* field and filter. The *justification* text is also captured except for SharePoint Online and OneDrive.-- Sensitivity labeling done in Office native apps on Outlook collects the last action that was generated before file save/email send actions. For example, if the user changes label on an email multiple times before sending, the last label found on the email when it is sent is captured in the audit log and then reported in Activity explorer.
+- For the AIP unified client, AIP unified scanner, and MIP SDK sources, the AIP *upgrade label* and *downgrade label* action maps to Activity explorer *label changed*
+- It is captured when the action is saved in native Microsoft Office applications and web applications.
+- It is captured when the action occurs for the AIP unified labeling client and scanner enforcements
+- Upgrade and downgrade labels actions can also be monitored via the *Label event type* field and filter. The *justification* text is also captured, except for SharePoint Online and OneDrive.
+- Sensitivity labeling done in native Microsoft Office apps: Outlook collects the last action that was generated before *file save*/*email send* actions. For example, if the user changes label on an email multiple times before sending, the last label found on the email when it is sent is captured in the audit log and then reported in Activity explorer.
|Source |Reported in Activity explorer|Note | ||||
This event is generated each time a sensitivity label is updated on the document
This event is generated each time a sensitivity label is removed from a file or document. -- This event is captured at the time of save in Office native applications and web applications.-- It is captured at the time of occurrence for the Azure Information Protection (AIP) unified labeling client.-- Sensitivity labeling, with Office built-in labels, on Outlook collects the last labeling event that was generated before file save/email send actions.
+- This event is captured when the document is saved in native Microsoft Office applications and web applications.
+- It is captured at when the label is removed for the Azure Information Protection (AIP) unified labeling client.
+- Sensitivity labeling in Microsoft Office, with built-in labels: Outlook collects the last labeling event that was generated before *file save*/*email send* actions.
|Source |Reported in Activity explorer | Note | ||||
This event is generated each time a DLP policy is matched on a document or an em
|On-premises |No| |Microsoft Defender for Cloud Apps |No |
-The Endpoint DLP events for devices running Windows 10, Windows 11, and any of the three most recently release major versions of mac OS are:
+The Endpoint DLP events for devices running Windows 10, Windows 11, and any of the three most recently released major versions of macOS are:
- File deleted - File created
This event is generated each time a label is removed from a file or document.
## Known issues -- When the recommended label tool tip is shown to an end user, it is not captured. But if the user chooses to apply the recommended label, the label will be shown under the *How applied* field as *Recommended*.
+- When the recommended label tool tip is shown to an end user, it is not captured. However, if the user chooses to apply the recommended label, the label will be shown under the *How applied* field as *Recommended*.
-- Justification text is not currently available on sensitivity label downgrade from SharePoint and OneDrive.
+- Justification text is not currently available when downgrading sensitivity labels from SharePoint and OneDrive.
-- Sensitive information types are currently not available for autolabeling activities from Word, Excel, PowerPoint, and Outlook, as well as SharePoint Online, and OneDrive.
+- Sensitive information types are currently not available for autolabeling activities from Word, Excel, PowerPoint, and Outlook, SharePoint Online, and OneDrive.
compliance Data Classification Activity Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-activity-explorer.md
f1.keywords:
Previously updated : 05/14/2023 Last updated : 06/13/2023 audience: Admin
description: "Activity explorer lets you see and filter on the actions users are
# Get started with activity explorer
-The [data classification overview](data-classification-overview.md) and [content explorer](data-classification-content-explorer.md) tabs give you visibility into what content has been discovered and labeled, and where that content is. [Activity explorer](https://compliance.microsoft.com/dataclassification?viewid=activitiesexplorer) rounds out this suite of functionality by allowing you to monitor what's being done with your labeled content. Activity explorer provides a historical view of activities on your labeled content. The activity information is collected from the Microsoft 365 unified audit logs, transformed, and made available in the Activity explorer UI. Activity explorer reports on up to 30 days worth of data.
+The [data classification overview](data-classification-overview.md) and [content explorer](data-classification-content-explorer.md) tabs give you visibility into what content has been discovered and labeled, and where that content is. [Activity explorer](https://compliance.microsoft.com/dataclassification?viewid=activitiesexplorer) rounds out this suite of functionality by allowing you to monitor what's being done with your labeled content. Activity explorer provides a historical view of activities on your labeled content. The activity information is collected from the Microsoft 365 unified audit logs, transformed, and then made available in the Activity explorer UI. Activity explorer reports on up to 30 days worth of data.
![placeholder screenshot overview activity explorer.](../media/data-classification-activity-explorer-1.png)
-There are over 30 different filters available for use, some are:
+There are more than 30 different filters available for use, some are:
- Date range - Activity type
Every account that accesses and uses data classification must have a license ass
### Permissions
-An account must be explicitly assigned membership in any one of these role groups or explicitly granted the role.
+An account must be explicitly assigned membership in any one of these role groups, or must be explicitly granted the role.
### Roles and Role Groups
In addition, using **Endpoint data loss prevention (DLP)**, Activity explorer ga
- Copy to network share - Access by an unallowed app
-Understanding the actions that are taken on content with sensitivity labels helps you determine whether the controls that you have in place, such as [Microsoft Purview Data Loss Prevention](dlp-learn-about-dlp.md) policies, are effective. If not, or if you discover something unexpectedΓÇösuch as a large number of items that are labeled `highly confidential` and are downgraded to `general`ΓÇöyou can manage your policies and take new actions to restrict the undesired behavior.
+Understanding the actions that are taken on content with sensitivity labels helps you determine whether the controls that you have in place, such as [Microsoft Purview Data Loss Prevention](dlp-learn-about-dlp.md) policies, are effective. If not, or if you discover something unexpected (such as a large number of items labeled `highly confidential` that are downgraded to `general`), you can manage your policies and take new actions to restrict the undesired behavior.
> [!NOTE] > Activity explorer doesn't currently monitor retention activities for Exchange.
compliance Data Classification Content Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-content-explorer.md
f1.keywords:
Previously updated : 04/20/2023 Last updated : 06/02/2023 audience: Admin
compliance Data Classification Increase Accuracy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-increase-accuracy.md
f1.keywords:
Previously updated : 03/03/2023 Last updated : 04/03/2023 audience: ITPro
description: "Learn how to increase the accuracy of your classifiers"
# Increase classifier accuracy
-Classifiers, like [sensitive information types](sensitive-information-type-learn-about.md) (SIT) and [trainable classifiers](classifier-learn-about.md) are used in various kinds of policies to identify sensitive information. Like most such models, sometimes they identify an item as being sensitive that isn't. Or, they may not identify an item as being sensitive when it actually is. These are called false positives and false negatives.
+Classifiers, such as [sensitive information types](sensitive-information-type-learn-about.md) (SIT) and [trainable classifiers](classifier-learn-about.md), are used in various types of policies to identify sensitive information. Like most such models, sometimes they identify an item as being sensitive that isn't. Or, they may not identify an item as being sensitive when it actually is. These are called false positives and false negatives.
-This article shows you how to confirm whether items matched by a classifier are true positive (a **Match**) or a false positive (**Not a match**) and provide **Match**/**Not a match** feedback. You can use that feedback to tune your classifiers to increase accuracy. You can also send redacted versions of the document as well as the **Match**, **Not a Match** feedback to Microsoft if you want to help increase the accuracy of the classifiers that Microsoft provides.
+This article shows you how to confirm whether items matched by a classifier are true positives (a **Match**) or false positives (**Not a match**) and provide **Match**/**Not a match** feedback. You can use that feedback to tune your classifiers to increase accuracy. You can also send redacted versions of the document as well as the **Match**, **Not a Match** feedback to Microsoft if you want to help increase the accuracy of the classifiers that Microsoft provides.
The **Match**, **Not a match** experience is available in:
The **Match**, **Not a match** experience is available in:
|Custom trainable classifier |No| No| Yes| > [!IMPORTANT]
-> The match/not a match feedback experience supports items in :
-> SharePoint sites & OneDrive sites - for Content Explorer, Sensitive Information Type/ Trainaable Classifier Matched Items, DLP Alerts and MTP Alerts.
+> The match/not a match feedback experience supports items in:
+> SharePoint sites & OneDrive sites - for Content Explorer, Sensitive Information Type and Trainable Classifier Matched Items, DLP Alerts and MTP Alerts.
> Emails in Exchange - for DLP Alerts and MTP Alerts. ## Licensing and Subscriptions
-For information on the relevant licensing and subscriptions,7 -
-b
--------------------------------------------------------------------------------------------------------------------------------
- see the [licensing requirements for Data classification analytics: Overview Content & Activity Explorer](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection-data-classification-analytics-overview-content--activity-explorer).
+For information on the relevant licensing and subscriptions, see the [licensing requirements for Data classification analytics: Overview Content & Activity Explorer](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection-data-classification-analytics-overview-content--activity-explorer).
## Known limitations for this preview
The contextual summary experience, where you indicate whether a matched item is
### Using Content Explorer
-This example shows you how to use the **Contextual Summary** tab to give feedback.
+This example shows you how to use the **Contextual Summary** tab to give feedback. <!-- Can't fully verify procedure b/c I can't get Content Explorer to display any data in this view on ediscosdf or on ocg1-->
1. Open the **Microsoft Purview compliance portal** > **Data classification** > **Content explorer** page. 1. Type the name of the SIT or trainable classifier that you want to check matches for in **Filter on labels, info types, or categories**.
You can access the same feedback mechanisms in the **Sensitive Info types** page
### Using Trainable Classifier Matched Items page
-1. Open the **Microsoft Purview compliance portal** and navigate to **Data classification** > **Trainable classifiers**.
+1. Open the **Microsoft Purview compliance portal** and navigate to **Data classification** > **Classifiers** > **Trainable classifiers**.
1. Select the trainable classifier whose accuracy you want to check. 1. Open the trainable classifier. This brings up **Overview** tab. Here you can see the count of the number of items that match, a count of the number of items that aren't a match, and the number of items with feedback. 1. Select the **Matched items** tab.
compliance Device Onboarding Configure Proxy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-configure-proxy.md
f1.keywords:
Previously updated : 12/14/2020 Last updated : 02/16/2023 audience: ITPro f1_keywords:
compliance Dlp Adaptive Protection Learn https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-adaptive-protection-learn.md
f1.keywords:
Previously updated : 01/25/2023 Last updated : 06/02/2023 audience: ITPro
If quick setup is used to configure Adaptive Protection in insider risk, DLP pol
> [!TIP] > Insider risk presents a view of just the DLP policies that use the **User's risk level for adaptive protection is** condition. Open **Microsoft Purview compliance portal** > **Insider risk management** > **Adaptive protection (preview)** to see the list. You'll need DLP to be in one of these roles to access the insider risk node:
->- Compliance administrator
->- Compliance Data administrator
->- Organization Management (Users who are not global administrators must be Exchange administrators to see and take action on devices that are managed by Basic Mobility and Security for Microsoft 365)
->- Global administrator
->- DLP compliance management
->- View-only DLP compliance management
+> - Compliance administrator
+> - Compliance Data administrator
+> - Organization management (Users who are not global administrators must be Exchange administrators to see and take action on devices that are managed by Basic Mobility and Security for Microsoft 365)
+> - Global administrator
+> - DLP compliance management
+> - View-only DLP compliance management
#### Policy values for Teams and Exchange online DLP policy
-This is the configuration for the quick setup created Teams and Exchange DLP policy. The policy name is **Adaptive Protection policy for Teams and Exchange DLP**.
+This is the configuration for the Teams and Exchange DLP policy created during Quick Setup. The policy name is **Adaptive Protection policy for Teams and Exchange DLP**.
##### Rule: Adaptive Protection block rule for Teams and Exchange DLP
This is the configuration for the quick setup created Teams and Exchange DLP pol
#### Policy values for Devices DLP policy
-This is the configuration for the quick setup created Devices DLP policy. The policy name is **Adaptive Protection policy for Endpoint DLP**.
+This is the configuration for the Devices DLP policy created during Quick Setup. The policy name is **Adaptive Protection policy for Endpoint DLP**.
> [!IMPORTANT] > For Adaptive Protection to work on Devices, you must either enable [Advanced classification scanning and protection](dlp-configure-endpoint-settings.md#advanced-classification-scanning-and-protection) or if you are manually creating the adaptive protection policy, select the **File Type is** condition. > [!IMPORTANT]
-> If a user is targeted by a default Adaptive Protection DEvice DLP policy and is targeted by an independent Device DLP policy, only the actions of the *most restrictive* policy will be applied.
+> If a user is targeted by a default Adaptive Protection Device DLP policy and is targeted by an independent Device DLP policy, only the actions of the *most restrictive* policy will be applied.
##### Rule: Adaptive Protection block rule for Endpoint DLP
compliance Dlp Alerts Dashboard Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-alerts-dashboard-get-started.md
f1.keywords:
Previously updated : 10/12/2020 Last updated : 06/14/2023 audience: ITPro f1_keywords:
If you are new to DLP alerts, you should review [Learn about the data loss preve
Before you begin, make sure you have the necessary prerequisites: -- Licensing for the DLP alerts management dashboard-- Licensing for alert configuration options-- Roles
+- Licensing for the DLP alerts management dashboard
+- Licensing for alert configuration options
+- Required roles
### Licensing for the DLP alert management dashboard
-All eligible tenants for DLP can access the DLP alert management dashboard. To get started, you should be eligible for Microsoft Purview DLP for Exchange Online, SharePoint Online, and OneDrive for Business. For more information about the licensing requirements for DLP, see [Which licenses provide the rights for a user to benefit from the service?](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#which-licenses-provide-the-rights-for-a-user-to-benefit-from-the-service-16).
+All eligible tenants for DLP can access the DLP alert management dashboard. To get started, you should be eligible for Microsoft Purview DLP for Exchange, SharePoint, and OneDrive. For more information about the licensing requirements for DLP, see [Which licenses provide the rights for a user to benefit from the service?](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#which-licenses-provide-the-rights-for-a-user-to-benefit-from-the-service-16).
Customers who use [Endpoint DLP](endpoint-dlp-learn-about.md) who are eligible for [Teams DLP](dlp-microsoft-teams.md) will see their endpoint DLP policy alerts and Teams DLP policy alerts in the DLP alert management dashboard.
The **content preview** feature is available only for these licenses:
### Licensing for alert configuration options
-**Single-event alert configuration**: Organizations that have an E1, F1, or G1 subscription or an E3 or G3 subscription can create alert policies only where an alert is triggered every time an activity occurs.
+**Single-event alert configuration**: Organizations that have an E1, F1, or G1 subscription, or an E3 or G3 subscription, can create alert policies only where an alert is triggered every time an activity occurs.
-**Aggregated alert configuration**: To configure aggregate alert policies based on a threshold, you must one of these licensing configurations:
+**Aggregated alert configuration**: To configure aggregate alert policies based on a threshold, you must use one of these licensing configurations:
- An E5 or G5 subscription - An E1, F1, or G1 subscription or an E3 or G3 subscription that includes one of the following features:
If you want to view the DLP alert management dashboard or to edit the alert conf
- Security Operator - Security Reader
-To access the DLP alert management dashboard, you need the:
--- Manage alerts-
-and either of these two roles:
+To access the DLP alert management dashboard, you need the *Manage alerts* role and either of these two roles:
- DLP Compliance Management - View-Only DLP Compliance Management
-To access the Content preview feature and the Matched sensitive content and context features you must be a member of:
--- Content Explorer Content Viewer role group-
-which has the data classification content viewer role pre-assigned.
+To access the Content preview feature and the Matched sensitive content and context features you must be a member of the *Content Explorer Content Viewer* role group, which has the *Data classification content viewer* role pre-assigned.
### Roles and Role Groups
Here's a list of applicable role groups. To learn more about them, see [Permissi
## DLP alert configuration
-To learn how to configure an alert in your DLP policy, see [Configure and view alerts for data loss prevention polices](dlp-configure-view-alerts-policies.md).
+To learn how to configure an alert in your DLP policy, see [Configure and view alerts for data loss prevention policies](dlp-configure-view-alerts-policies.md).
> [!IMPORTANT]
-> Your organizations audit log retention policy configuration controls how long an alert remains visible in the console. See, [Manage audit log retention policies](audit-log-retention-policies.md#manage-audit-log-retention-policies) for more information.
+> Your organization's audit log retention policy configuration controls how long an alert remains visible in the console. See, [Manage audit log retention policies](audit-log-retention-policies.md#manage-audit-log-retention-policies) for more information.
### Aggregate event alert configuration
-If your org is licensed for [aggregated alert configuration options](#licensing-for-alert-configuration-options),
+If your organization is licensed for [aggregated alert configuration options](#licensing-for-alert-configuration-options),
then you'll see these options when you create or edit a DLP policy. :::image type="content" source="../media/incident-reports-options-aggregated-alerts.png" alt-text="Screenshot showing options for incident reports for users who are eligible for aggregated alert configuration options." border="false":::
This configuration allows you to set up a policy to generate an alert every time
### Single event alert configuration
-If your org is licensed for [single-event alert configuration options](#licensing-for-alert-configuration-options), then you'll see these options when you create or edit a DLP policy. Use this option to create an alert that's raised every time a DLP rule match happens.
+If your organization is licensed for [single-event alert configuration options](#licensing-for-alert-configuration-options), then you'll see these options when you create or edit a DLP policy. Use this option to create an alert that's raised every time a DLP rule match happens.
:::image type="content" source="../media/incident-reports-options-single-event-alerts.png" alt-text="Screenshot showing options for incident reports for users who are eligible for single-event alert configuration options." border="false":::
To work with the DLP alert management dashboard:
:::image type="content" source="../media/alert-details.png" alt-text="Screenshot showing alert details on the DLP alert management dashboard." border="false":::
-4. Select the **Events** tab to view all of the events associated with the alert. You can choose a particular event to view its details. For a list of some of the available event details, see, [Learn about the data loss prevention Alerts dashboard](dlp-alerts-dashboard-learn.md).
-5. Select **Details** to open the **Overview** page for the alert. The overview page provides a summary:
+4. Select the **Events** tab to view all of the events associated with the alert. (You can choose a particular event to view its details. For a list of some of the available event details, see, [Learn about the data loss prevention Alerts dashboard](dlp-alerts-dashboard-learn.md).)
+5. Select **View details** to open the **Overview** page for the alert. The overview page provides a summary:
1. of what happened 1. who performed the actions that caused the policy match
- 1. information about the matched policy, and more
+ 1. information about the matched policy, and more
6. Choose the **Events** tab to access the: 1. content involved 1. sensitive information types matched 1. metadata
-7. Select the **Sensitive Info Types** tab to view details about the sensitive information types detected in the content. Details include confidence, count, and the content that matches the sensitive information type.
-
-8. After you investigate the alert, return to the **Overview** tab where you can manage triage and manage the disposition of the alert and add comments.
+7. After you investigate the alert, return to the **Overview** tab where you can manage triage and manage the disposition of the alert and add comments.
- To see the history of workflow management, choose **Management log**. - After you take the required action for the alert, set the status of the alert to **Resolved**.
compliance Dlp Alerts Dashboard Learn https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-alerts-dashboard-learn.md
f1.keywords:
Previously updated : 02/28/2023 Last updated : 06/14/2023 audience: ITPro f1_keywords:
description: Learn about data loss prevention alerts and the alerts dashboard.
# Learn about the data loss prevention Alerts dashboard
-When the criteria in a Microsoft Purview Data Loss Prevention (DLP) policy is matched by the actions a user is taking on a sensitive item, the policy can generate an alert. This situation can result in a high volume of alerts. DLP alerts are collected in the alerts dashboard. The alerts dashboard gives you a single place to go to do a deep investigation of all the details about the policy match.
+When the criteria in a Microsoft Purview Data Loss Prevention (DLP) policy is matched by the actions a user is taking on a sensitive item, the policy can generate an alert. This situation can result in a high volume of alerts. DLP alerts are collected in the alerts dashboard of the compliance portal. The alerts dashboard gives you a single place to go to do a deep investigation of all the details about the policy match.
<!-- [Microsoft Purview compliance portal](https://compliance.microsoft.com/)-->
The [DLP alert management dashboard](https://compliance.microsoft.com/datalosspr
- SharePoint - OneDrive - Teams-- Windows 10 devices
+- Windows 10/11 devices
> [!TIP] > Customers who use [Endpoint DLP](endpoint-dlp-learn-about.md) who are eligible for [Teams DLP](dlp-microsoft-teams.md) will see their endpoint DLP policy alerts and Teams DLP policy alerts in the DLP alert management dashboard.
There are two types of alerts that can be configured in DLP policies.
## Types of events
-Here are some of the events associated with an alert. In the UI, you can choose a particular event to view its details.
+Here are some of the events associated with an alert. In the UI, you can choose a particular event to view its details.
### Event details
Here are some of the events associated with an alert. In the UI, you can choose
## Investigate DLP incidents in Microsoft 365 Defender portal
-Incidents for Microsoft Purview Data Loss Prevention (DLP) can be managed in the Microsoft 365 Defender portal. See, [Investigate data loss incidents with Microsoft 365 Defender](../security/defender/investigate-dlp.md) for details. You can manage DLP incidents along with security incidents from **Incidents & alerts** > **Incidents** on the quick launch of the Microsoft 365 Defender portal.
+Incidents for Microsoft Purview Data Loss Prevention (DLP) can be managed in the Microsoft 365 Defender portal. See, [Investigate data loss incidents with Microsoft 365 Defender](../security/defender/investigate-dlp.md) for details. You can manage DLP incidents, along with security incidents from **Incidents & alerts** > **Incidents**, on the quick launch of the Microsoft 365 Defender portal.
From this page, you can: -- View all your DLP alerts grouped under incidents in the Microsoft 365 Defender incident queue.
+- View all your DLP alerts grouped under **Incidents** in the Microsoft 365 Defender incident queue.
- View intelligent inter-solution (DLP-MDE, DLP-MDO) and intra-solution (DLP-DLP) correlated alerts under a single incident. - Hunt for compliance logs along with security under Advanced Hunting.-- In-place admin remediation actions on user, file, and device.
+- Administer remediation actions in-place on user, file, and device.
- Associate custom tags to DLP incidents and filter by them. - Filter by DLP policy name, tag, Date, service source, incident status, and user on the unified incident queue.
compliance Dlp Chrome Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-chrome-get-started.md
f1.keywords:
Previously updated : 09/09/2019 Last updated : 06/02/2023 audience: ITPro f1_keywords:
Use these procedures to roll out the Microsoft Purview extension for Chrome.
## Before you begin
-To use Microsoft Purview extension for Chrome, the device must be onboarded into endpoint DLP. Review these articles if you are new to DLP or endpoint DLP
+To use Microsoft Purview extension for Chrome, the device must be onboarded into endpoint DLP. Review these articles if you are new to DLP or Endpoint DLP
- [Learn about Microsoft Purview extension for Chrome](dlp-chrome-learn-about.md) - [Learn about Microsoft Purview Data Loss Prevention](dlp-learn-about-dlp.md)
Before you get started, you should confirm your [Microsoft 365 subscription](htt
For detailed licensing guidance, see [Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection). -- Your org must be licensed for Endpoint DLP
+- Your organization must be licensed for Endpoint DLP.
- Your devices must be running Windows 10 x64 build 1809 or later.-- The device must have Antimalware Client Version is 4.18.2202.x or later. Check your current version by opening **Windows Security** app, select the **Settings** icon, and then select **About**.-
+- The device must have Antimalware Client version 4.18.2202.x or later. Check your current version by opening the **Windows Security** app, select the **Settings** icon, and then select **About**.
### Permissions
Here's a list of applicable role groups. To learn more about them, see [Permissi
- Information Protection Readers ### Overall installation workflow
+<!-- 6/14/2023--No test environment available for verifying the procedures herein. -->
Deploying the extension is a multi-phase process. You can choose to install on one machine at a time, or use Microsoft Intune or Group Policy for organization-wide deployments.
Using the settings catalog, follow these steps to manage Chrome extensions:
12. Change the toggle to **Enabled**. 13. Enter the following value for the extensions and app IDs and update URL: `echcggldkblhodogklpincgchnpgcdco;https://clients2.google.com/service/update2/crx`.-
-11. Select **Next**.
+14. Select **Next**.
-12. Add or edit scope tags on the **Scope tags** tab as needed and select **Next**.
+15. Add or edit scope tags on the **Scope tags** tab as needed and select **Next**.
-13. Add the required deployment users, devices, and groups on the **Assignments** tab and select **Next**.
+16. Add the required deployment users, devices, and groups on the **Assignments** tab and select **Next**.
-14. Add applicability rules on the **Applicability Rules** tab as required and select **Next**.
+17. Add applicability rules on the **Applicability Rules** tab as required and select **Next**.
-15. Select **Create**.
+18. Select **Create**.
### Deploy using Group Policy
If you don't want to use Microsoft Intune, you can use group policies to deploy
#### Upload to cloud service, or access by unallowed browsers Cloud Egress
-1. Create or get a sensitive item and, try to upload a file to one of your organizationΓÇÖs restricted service domains. The sensitive data must match one of our built-in [Sensitive Info Types](sensitive-information-type-entity-definitions.md), or one of your organizationΓÇÖs sensitive information types. You should get a DLP toast notification on the device you are testing from that shows that this action is not allowed when the file is open.
+1. Create or get a sensitive item and try to upload a file to one of your organizationΓÇÖs restricted service domains. The sensitive data must match one of our built-in [Sensitive Info Types](sensitive-information-type-entity-definitions.md), or one of your organizationΓÇÖs sensitive information types. You should get a DLP toast notification on the device you are testing from that shows that this action is not allowed when the file is open.
#### Testing other DLP scenarios in Chrome
Now that youΓÇÖve removed Chrome from the disallowed browsers/apps list, you can
- Print a document - To test, open a file that is protected against print actions in the Chrome browser and attempt to print the file. - Expected Result: A DLP toast notification showing that this action is not allowed when the file is open.-- Copy to USB Removeable Media
- - To test, try to save the file to a removeable media storage.
+- Copy to USB Removable Media
+ - To test, try to save the file to a removable media storage.
- Expected Result: A DLP toast notification showing that this action is not allowed when the file is open. - Copy to Network Share - To test, try to save the file to a network share.
compliance Dlp Chrome Learn About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-chrome-learn-about.md
f1.keywords:
Previously updated : 09/09/2019 Last updated : 06/14/2023 audience: ITPro f1_keywords:
compliance Dlp Configure Endpoint Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-configure-endpoint-settings.md
f1.keywords:
Previously updated : 05/12/2023 Last updated : 06/02/2023 audience: ITPro f1_keywords:
These Windows versions support advanced classification scanning and protection:
> - DLP policy evaluation always occurs in the cloud, even if user content is not being sent. > [!TIP]
-> To use advanced classification for Windows 10 devices, you must install KB5016688. To use advanced classification for Windows 11 devices, you must install KB5016691 be installed for Windows 11 devices. Additionally, you must enable advanced classification before **Activity explorer** will display contextual text for DLP rule-matched events. To learn more about contextual text, see [Contextual summary](dlp-learn-about-dlp.md#contextual-summary).
+> To use advanced classification for Windows 10 devices, you must install KB5016688. To use advanced classification for Windows 11 devices, KB5016691 must be installed on those Windows 11 devices. Additionally, you must enable advanced classification before **Activity explorer** will display contextual text for DLP rule-matched events. To learn more about contextual text, see [Contextual summary](dlp-learn-about-dlp.md#contextual-summary).
## File path exclusions
For performance reasons, Endpoint DLP includes a list of recommended file path e
## Set up evidence collection for file activities on devices (preview)
-When it identifies items that match policies on devices, DLP can copy them to an [Azure storage account](/azure/storage/common/storage-account-overview). This is useful for auditing policy activity and troubleshooting specific matches. Use this section to add the name and URL of the storage account.
+When it identifies items that match policies on devices, DLP can copy them to an [Azure storage account](/azure/storage/common/storage-account-overview). This is useful for auditing policy activity and troubleshooting specific matches. Use this section to add the name and URL of the storage account.
> [!NOTE] > Before you enable this feature, you must create an Azure storage account and a container in that storage account. You must also configure permissions for the account. As you set up your Azure storage account, keep in mind that you'll probably want to use a storage account that's in the same Azure region/geopolitical boundary as your tenant. You should also consider configuring [Azure storage account access tiers](/azure/storage/blobs/storage-blob-storage-tiers) and [Azure storage account pricing](/azure/storage/common/storage-account-overview#pricing).
This table shows the default settings for network share coverage and exclusions.
|Network share coverage and exclusions (preview) |Just in time protection (preview) |Resultant behavior | |||| |Enabled |Disabled |- DLP policies scoped to Devices are applied to all network shares and mapped drives that the device is connected to. [Devices actions](dlp-policy-reference.md#devices-actions) |
-|Disabled |Enabled |- Just in time protection is applied only to the files on storage devices that are local to the endpoint. |
-|Enabled |Enabled |- DLP policies that are scoped to Devices are applied to all network shares and mapped drives that the device is connected to. [Devices actions](dlp-policy-reference.md#devices-actions) </br>- Just in time protection is applied to all network shares and mapped drives that the device is connected to. |
+|Disabled |Enabled |- Just-in-time protection is applied only to the files on storage devices that are local to the endpoint. |
+|Enabled |Enabled |- DLP policies that are scoped to Devices are applied to all network shares and mapped drives that the device is connected to. [Devices actions](dlp-policy-reference.md#devices-actions) </br>- Just-in-time protection is applied to all network shares and mapped drives that the device is connected to. |
| | | | **Network share coverage and exclusions** complements [DLP On-premises repository actions](dlp-on-premises-scanner-learn.md#dlp-on-premises-repository-actions). This table shows the exclusion settings and the resulting behavior depending on whether DLP is enabled or disabled for on-premises repositories.
The **Restricted apps** list (previously called **Unallowed apps**), is a custom
> [!IMPORTANT] > - Do not include the path to the executable. Include only the executable name (such as browser.exe). >
-> - The action (`audit`, `block with override`, or `block`) defined for apps that are on the restricted apps list only applies when a user attempts to ***access*** a protected item.
+> - The action (`audit`, `block with override`, or `block`) defined for apps that are on the restricted apps list only applies when a user attempts to ***access*** a protected item.
When **Access by restricted apps** is selected in a policy and a user uses an app that is on the restricted apps list to access a protected file, the activity is `audited`, `blocked`, or `blocked with override`, depending on how you configured the **Restricted apps** list. EXCEPTION: If an app on the **Restricted apps** list is also a member of a **Restricted app group**, the actions configured for activities in the **Restricted app group** override the actions configured for the **Restricted apps** list. All activity is audited and available for review in activity explorer.
When User A opens a DLP-protected file using Notepad, DLP allows the access and
If an app *isn't* in the **File activities for apps in restricted app groups** or the **Restricted app activities** list, or *is* in the **Restricted app activities** list, with an action of either `Audit only`, or `Block with override`, any restrictions defined in the **File activities for all apps** are applied in the same rule. ### macOS devices
+<!-- 6/14/2023: No Mac access; can't verify -->
You can also prevent macOS apps from accessing sensitive data by defining them in the **Restricted app activities** list.
Restrict sensitive files that match your policies from being shared with unrestr
For Windows devices you can restrict the use of specified web browsers, identified by their executable names. The specified browsers are blocked from accessing files that match the conditions of an enforced a DLP policy where the upload-to-cloud services restriction is set to `block` or `block override`. When these browsers are blocked from accessing a file, end users see a toast notification asking them to open the file through Microsoft Edge. For macOS devices, you must add the full file path. To find the full path of Mac apps:
+<!-- 6/14/2023: No Mac access; can't verify -->
1. On the macOS device, open **Activity Monitor**. Find and double-click the process you want to restrict
If a user attempts to upload a sensitive file with credit card numbers to contos
However, if a user attempts to upload a sensitive file with credit card numbers to wingtiptoys.com (which isn't on the restricted list), the policy *isn't* applied and the user activity is simply audited. An event is generated, but it doesn't list the policy name or that of the triggering rule in the event details. No alert is generated. > [!IMPORTANT]
-> When the service restriction mode is set to `Allow`, you must have at least one service domain configured before restrictions are enforced.
+> When the service restriction mode is set to **Allow**, you must have at least one service domain configured before restrictions are enforced.
**Summary table** The following table shows how the system behaves depending on the settings listed.
For example:
| **`www.contoso.com`** |**Matches the specified domain name**: <p>`www.contoso.com` <p>**Does not match unspecified domains or subdomains** <p>*://anysubdomain.contoso.com/, in this case, you have to put the FQDN domain name itself `www.contoso.com`| | | |
-You can configure Up to 50 domains under **Sensitive Service domains**.
+You can configure up to 50 domains under **Sensitive Service domains**.
### Sensitive service domains
When you list a website in **Sensitive service domains**, you can `audit`, `bloc
For the print, copy data, and save actions, each website must be listed in a website group. > [!NOTE]
-> The **Service domains** setting only applies to files uploaded using Microsoft Edge or an instance of Google Chrome that has the [Microsoft Purview Chrome Extension](dlp-chrome-learn-about.md) installed.
+> The **Service domains** setting only applies to files uploaded using Microsoft Edge or an instance of Google Chrome or Mozilla Firefox that has the [Microsoft Purview Chrome Extension](dlp-chrome-learn-about.md) installed.
The following table shows which browsers support these features:
The following table shows which browsers support these features:
||| | Microsoft Edge | - Print <br> - Copy <br> - Save <br> - Paste (preview) </br>- Upload| | Google Chrome (with the Microsoft Purview extension)| - Upload </br>- Paste (preview)|
+| Mozilla Firefox (with the Microsoft Purview extension)| - Upload </br>- Paste (preview)|
Additionally, for Devices, you must use **Sensitive service domains** with a DLP policy. You can also define website groups that you want to assign policy actions to that are different from the global website group actions. You can add a maximum of 50 websites into a single group and you can create a maximum of 20 groups. For more information, see [Scenario 6: Monitor or restrict user activities on sensitive service domains](endpoint-dlp-using.md#scenario-6-monitor-or-restrict-user-activities-on-sensitive-service-domains).
Don't include the networking protocol as part of the URL (for instance, *https:/
- Use `*` as a wildcard to specify all domains or all subdomains - Use `/` as a terminator at the end of a URL to scope to that specific site only.
-When you add a URL without a terminating slash mark ( `/`), that URL is scoped to that site and all subsites.
+When you add a URL without a terminating slash mark ( `/`), that URL is scoped to that site and all sub-sites.
This syntax applies to all http/https websites. Here are some examples:
This syntax applies to all http/https websites. Here are some examples:
### Business justification in policy tips
-You can control how users interact with the business justification option in DLP policy tip notifications. This option appears when users perform an activity that's protected by the **Block with override** setting in a DLP policy. This is a global setting. You can choose from one the following options:
+You can control how users interact with the business justification option in [DLP policy tip notifications](use-notifications-and-policy-tips.md#add-user-notifications-to-a-dlp-policy). This option appears when users perform an activity that's protected by the **Block with override** setting in a DLP policy. This is a global setting. You can choose from one the following options:
- **Show default options and custom text box**: By default, users can select either a built-in justification, or enter their own text. - **Only show default options**: Users are limited to selecting from a list of built-in justifications.
Let's look at an example. Say you want your DLP policy to block printing of cont
- **IP range** - **Print to file** - Microsoft Print to PDF or Microsoft XPS Document Writer. If you only want to enforce Microsoft Print to PDF, you should use Friendly printer name with 'Microsoft Print to PDF'. - **Universal print deployed on a printer** - For more information on universal printers, see [Set up Universal Print](/universal-print/fundamentals/universal-print-getting-started).
- - **Corporate printer** - is a print queue shared through on-premises Windows print server in your domain. Its path might look like \\print-server\contoso.com\legal_printer_001
+ - **Corporate printer** - is a print queue shared through on-premises Windows print server in your domain. Its path might look like this: \\print-server\contoso.com\legal_printer_001
- **Print to local** - Any printer connecting through Microsoft print port but not any of above types. For example: print through remote desktop or redirect printer. 2. Assign each printer in the group a **Display name**. These names appear only in the Microsoft Purview console.
Let's look at an example. Say you want your DLP policy to block printing of cont
1. Select the parameters and provide the values to unambiguously identify the specific printer. 1. Select **Add**. 1. Add other printers as needed.
-1. Select **Close**.
+1. Select **Save** and then **Close**.
## Removable storage device groups
You can assign these policy actions to the group in a DLP policy:
6. Select the parameters and provide the values to unambiguously identify the specific device. 7. Select **Add**. 8. Add other devices to the group as needed.
-9. Select **Close**.
+9. Select **Save** and then **Close**.
The most common use case for creating removable storage groups is to use them to specify which removable storage devices users can copy files to. Generally, copying is only allowed for devices in a designated **Backup** group.
Once you have defined a network share group, you can use it in all of your DLP p
1. Add the file path to the share. 1. Select **Add**. 1. Add other share paths to the group as needed.
-1. Select **Close**.
+1. Select **Save** and then **Close**.
## VPN settings
compliance Dlp Configure View Alerts Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-configure-view-alerts-policies.md
f1.keywords:
Previously updated : 04/06/2023 Last updated : 06/15/2023 audience: ITPro f1_keywords:
description: Learn how to define and manage alerts for data loss prevention policies.
-# Configure and view alerts for data loss prevention polices
+# Configure and view alerts for data loss prevention policies
-Microsoft Purview Data Loss Prevention (DLP) policies can take protective actions to prevent unintentional sharing of sensitive items. When an action is taken on a sensitive item, you can be notified by configuring alerts for DLP. This article shows you how to define rich alert policies that are linked to your data loss prevention (DLP) policies. You'll see how to use the
-new DLP alert management dashboard in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a> to view alerts, events, and associated metadata for DLP policy violations.
+Microsoft Purview Data Loss Prevention (DLP) policies can take protective actions to prevent unintentional sharing of sensitive items. When an action is taken on a sensitive item, you can be notified by configuring alerts for DLP. This article shows you how to define rich alert policies that are linked to your data loss prevention (DLP) policies. You'll see how to use the new DLP alert management dashboard in the [Microsoft Purview compliance portal](https://go.microsoft.com/fwlink/p/?linkid=2077149) to view alerts, events, and associated metadata for DLP policy violations.
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
new DLP alert management dashboard in the <a href="https://go.microsoft.com/fwli
The following features are part of this: -- **DLP alert management dashboard**: In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>, this dashboard shows
- alerts for DLP policies that are enforced on the following workloads:
+- **DLP alert management dashboard**: This dashboard in the [Microsoft Purview compliance portal](https://go.microsoft.com/fwlink/p/?linkid=2077149) shows alerts for DLP policies that are enforced on the following workloads:
- Exchange - SharePoint - OneDrive - Teams - Devices+ - **Advanced alert configuration options**: These options are part of the DLP policy authoring flow. Use them to create rich alert configurations. You can create a single-event alert or an aggregated alert, based on the number of events or the size of the leaked data. ## Before you begin
Before you begin, make sure you have the necessary prerequisites:
- Licensing for the DLP alerts management dashboard - Licensing for alert configuration options-- Roles
+- Required roles
### Licensing for the DLP alert management dashboard
-All eligible tenants for Office 365 DLP can access the new DLP alert management dashboard. To get started, you should be eligible for Office
-365 DLP for Exchange Online, SharePoint Online, and OneDrive for Business. For more information about the licensing requirements for Office 365 DLP, see [Which licenses provide the rights for a user to benefit from the service?](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#which-licenses-provide-the-rights-for-a-user-to-benefit-from-the-service-16).
+All eligible tenants for Office 365 DLP can access the DLP alert management dashboard. To get started, you should be eligible for Office 365 DLP for Exchange, SharePoint, and OneDrive. For more information about the licensing requirements for Office 365 DLP, see [Which licenses provide the rights for a user to benefit from the service?](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#which-licenses-provide-the-rights-for-a-user-to-benefit-from-the-service-16).
-Customers who use [Endpoint DLP](endpoint-dlp-learn-about.md) who are eligible for [Teams DLP](dlp-microsoft-teams.md) will see their endpoint DLP policy alerts and Teams DLP policy alerts in the DLP alert management dashboard.
+Customers who use [Endpoint DLP](endpoint-dlp-learn-about.md) and who are eligible for [Teams DLP](dlp-microsoft-teams.md) will see their endpoint DLP policy alerts and Teams DLP policy alerts in the DLP alert management dashboard.
### Licensing for alert configuration options
If you want to view the DLP alert management dashboard or to edit the alert conf
- Security Operator - Security Reader
-To access the DLP alert management dashboard, you need the Manage alerts role and either of the following roles:
+To access the DLP alert management dashboard, you need the *Manage alerts* role and either of the following roles:
- DLP Compliance Management - View-Only DLP Compliance Management
This configuration allows you to set up a policy to generate an alert:
- based on the number of activities - based on the volume of exfiltrated data
-To prevent a flood of notification emails, all matches that occur within a one-minute time window and are for the same DLP rule and on the same location are grouped together in the same alert. The one minute aggregation time window feature is available in:
+To prevent a flood of notification emails, all matches that occur within a one-minute time window that are for the same DLP rule and on the same location are grouped together in the same alert. The one minute aggregation time window feature is available in:
- An E5 or G5 subscription - An E1, F1, or G1 subscription or an E3 or G3 subscription that includes one of the following features:
To work with the DLP alert management dashboard:
| | User overrode policy | Whether the user overrode the policy through the policy tip | All events | | | Override justification text | Justification provided to override the policy tip | All events |
-1. Select the **Sensitive Info Types** tab to view details about the sensitive information types detected in the content. Details include confidence and count.
-
-2. After you investigate the alert, choose **Manage alert** to change the status (**Active**, **Investigating**, **Dismissed**, or
- **Resolved**). You can also add comments and assign the alert to someone in your organization.
+After you investigate the alert, choose **Manage alert** to change the status (**Active**, **Investigating**, **Dismissed**, or **Resolved**). You can also add comments and assign the alert to someone in your organization.
- - To see the history of workflow management, choose **Management log**.
- - After you take the required action for the alert, set the status of the alert to **Resolved**.
+- To see the history of workflow management, choose **Management log**.
+- After you take the required action for the alert, set the status of the alert to **Resolved**.
### Other matched conditions
Matched events information is supported for these conditions
|Sender address matches patterns|Yes|No|No|No| |Sender is a member of|Yes|No|No|No| |Sender IP address is|Yes|No|No|No|
-|Has sender overriden the policy tip|Yes|No|No|No|
+|Has sender overridden the policy tip|Yes|No|No|No|
|SenderAdAttribute Contains words|Yes|No|No|No| |SenderAdAttribute Matches patterns|Yes|No|No|No| |Recipient is|Yes|No|Yes|No|
compliance Dlp Copy Matched Items Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-copy-matched-items-get-started.md
f1.keywords:
Previously updated : 04/27/2023 Last updated : 06/02/2023 audience: ITPro
compliance Dlp Copy Matched Items Learn https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-copy-matched-items-learn.md
f1.keywords:
Previously updated : 04/27/2023 Last updated : 06/02/2023 audience: ITPro
If you're new to Microsoft Purview DLP, here's a list of the core articles you'l
## Where evidence collection for file activities on devices fits in Purview Endpoint DLP is part of the [larger DLP offering](dlp-learn-about-dlp.md) and part of the larger range of services offered in [Microsoft Purview](/microsoft-365/compliance.md). You should understand how evidence collection for file activities on devices fits into the larger set of service offerings.+ ### Evidence collection for file activities on devices and eDiscovery
-This feature makes copies of items that match DLP policies on onboarded Windows devices and places those copies in an Azure storage account. These copies aren't held in a changless state and aren't evidence in the legal sense of the term. If you need to find and hold items for legal purposes, you should use the [Microsoft Purview eDiscovery solutions](ediscovery.md). Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in legal cases.
+This feature makes copies of items that match DLP policies on onboarded Windows devices and places those copies in an Azure storage account. These copies aren't held in a changeless state and aren't evidence in the legal sense of the term. If you need to find and hold items for legal purposes, you should use the [Microsoft Purview eDiscovery solutions](ediscovery.md). Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in legal cases.
+ ### Evidence collection for file activities on devices and contextual summary
- When an item and the activity that a user is taking on that item match the conditions defined in a DLP policy, a **DLPRuleMatch** event shows up in [Activity explorer](data-classification-activity-explorer.md). This is true for every location that DLP supports. The **DLPRuleMatch** event contains a limited amount of the text that surrounds the matched content. This limited amount of text is called [contextual summary](dlp-learn-about-dlp.md#contextual-summary).
-It's important to understand the difference between evidence collection for file activities on devices and contextual summary. Evidence collection for file activities on devices is only available for onboarded Windows devices and saves a copy of the entire item that matched a policy to the Azure storage account. Contextual summary is captured for every DLP policy rule match and only contains a limited amount of the text that surrounds the target text that triggered the match.
+ When an item and the activity that a user takes on that item match the conditions defined in a DLP policy, a **DLPRuleMatch** event shows up in [Activity explorer](data-classification-activity-explorer.md). This is true for every location that DLP supports. The **DLPRuleMatch** event contains a limited amount of the text that surrounds the matched content. This limited amount of text is called [contextual summary](dlp-learn-about-dlp.md#contextual-summary).
+
+It's important to understand the difference between evidence collection for file activities on devices and a contextual summary. Evidence collection for file activities on devices is only available for onboarded Windows devices. It saves a copy of the entire item that matched a policy to the Azure storage account. A contextual summary is captured for every DLP policy rule match and only contains a limited amount of the text that surrounds the target text that triggered the match.
## Covered user activities You can configure evidence collection for file activities on devices to save a copy of a matched item to the Azure storage account when a user attempts to do one of these activities on a matched item:+ - Copy to a removable USB - Copy to Network share - Print
When you enable evidence collection for file activities on devices in Endpoint D
These actions are configured in the DLP policy. For more information on how to create a DLP policy, see [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) and [Using Endpoint data loss prevention](endpoint-dlp-using.md).
-## Design consideration
+## Design considerations
### Regions for your Azure Storage accounts
-To comply with regulatory requirements, make sure that the Azure storage accounts that you use are in the same geo-political or regulatory boundaries as the devices that they're being copied from. Also, be aware of the geo-political location of the DLP investigators who will be accessing the sensitive items once they're saved. Consider using [Administrative units (preview)](microsoft-365-compliance-center-permissions.md#administrative-units-preview) to scope the administration of the users and devices that the DLP policy will be scoped to. To learn how to use data loss prevention to comply with data privacy regulations, see [Deploy information protection for data privacy regulations with Microsoft Purview](../solutions/information-protection-deploy.md) (aka.ms/m365dataprivacy).
-Evidence collection for file activities on devices supports up to 10 Azure storage accounts.
+To comply with regulatory requirements, make sure that the Azure storage accounts that you use are in the same geopolitical or regulatory boundaries as the devices that they're being copied from. Also, be aware of the geopolitical location of the DLP investigators who will be accessing the sensitive items once they're saved. Consider using [Administrative units (preview)](microsoft-365-compliance-center-permissions.md#administrative-units-preview) to scope the administration of the users and devices that the DLP policy will be scoped to. To learn how to use data loss prevention to comply with data privacy regulations, see [Deploy information protection for data privacy regulations with Microsoft Purview](https://go.microsoft.com/fwlink/?linkid=2239593&clcid=0x409). Evidence collection for file activities on devices supports up to 10 Azure storage accounts.
-To learn how to use data loss prevention to comply with data privacy regulations, see [Deploy information protection for data privacy regulations with Microsoft Purview](../solutions/information-protection-deploy.md) (aka.ms/m365dataprivacy).
+To learn how to use data loss prevention to comply with data privacy regulations, see [Deploy information protection for data privacy regulations with Microsoft Purview](https://go.microsoft.com/fwlink/?linkid=2239593&clcid=0x409).
### Local storage and bandwidth By default, copies of matched items are saved asynchronously to the configured Azure storage account over the existing network connection. If the device doesn't have connectivity, matched items are save locally, up to the 500-MB limit. You can save items locally up to 60 days.+ While the device has connectivity to the Azure storage account URL, there's no limit on bandwidth usage. The bandwidth that evidence collection for file activities on devices uses doesn't impact the default or configured bandwidth limits for [Advanced classification scanning and protection](dlp-configure-endpoint-settings.md#advanced-classification-scanning-and-protection). ### Azure storage accounts
Similarly, all administrators who are reviewing the saved items must have read p
Your next step is to configure evidence collection for file activities on devices -- [Get started with collecting files that match data loss prevention policies from devices (preview)](dlp-copy-matched-items-get-started.md#get-started-with-collecting-files-that-match-data-loss-prevention-policies-from-devices-preview)
+- [Get started with collecting files that match data loss prevention policies from devices (preview)](dlp-copy-matched-items-get-started.md#get-started-with-collecting-files-that-match-data-loss-prevention-policies-from-devices-preview)
compliance Dlp Exchange Conditions And Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-exchange-conditions-and-actions.md
+
+ Title: "Data loss prevention Exchange conditions and actions reference"
+f1.keywords:
+- NOCSH
+++ Last updated : 06/19/2023
+audience: Admin
++
+ms.localizationpriority: null
+
+- tier1
+- purview-compliance
+search.appverid:
+- MOE150
+- MET150
+recommendations: false
+description: "Learn about dlp policy conditions that identify sensitive items that the policy is applied to."
++
+# Data loss prevention Exchange conditions and actions reference
+
+Conditions in Microsoft Purview Data Loss Prevention (DLP) policies identify sensitive items that the policy is applied to. Actions define what happens as a consequence of a condition of exception being met.
+
+- Conditions define what to include
+- Actions define what happens as a consequence of condition being met
+
+Most conditions have one property that supports one or more values. For example, if the DLP policy is being applied to Exchange emails, the **The sender** is condition requires the sender of the message. Some conditions have two properties. For example, the **A message header includes any of these words** condition requires one property to specify the message header field, and a second property to specify the text to look for in the header field. Some conditions or exceptions don't have any properties. For example, the **Attachment is password protected** condition simply looks for attachments in messages that are password protected.
+
+Actions typically require additional properties. For example, when the DLP policy rule redirects a message, you need to specify where the message is redirected to.
+<!-- Some actions have multiple properties that are available or required. For example, when the rule adds a header field to the message header, you need to specify both the name and value of the header. When the rule adds a disclaimer to messages, you need to specify the disclaimer text, but you can also specify where to insert the text, or what to do if the disclaimer can't be added to the message. Typically, you can configure multiple actions in a rule, but some actions are exclusive. For example, one rule can't reject and redirect the same message.-->
++
+## Conditions Exchange for DLP policies
+<!-- this is in DLP policy reference-->
+The tables in the following sections describe the conditions and exceptions that are available in DLP.
+
+- [Senders](#senders)
+- [Recipients](#recipients)
+- [Message subject or body](#message-subject-or-body)
+- [Attachments](#attachments)
+- [Message headers](#message-headers)
+- [Message properties](#message-properties)
+
+### Senders
+
+If you use the sender address as a condition the actual field where the value is looked for varies depending on the sender address location configured. By default, DLP rules use the Header address as the sender address.
+
+![Image of an email header showing the difference between the Envelope (P1) address and the Header (P2) address](../media/dlp-conditions-exceptions-meetinginvite-callouts.png)
+
+At the tenant level, you can configure a sender address location to be used across all rules, unless overridden by a single rule. To set tenant DLP policy configuration to evaluate the sender address from the Envelope across all rules, you can run the following command:
+
+```PowerShell
+Set-PolicyConfig -SenderAddressLocation Envelope
+```
+
+To configure the sender address location at a DLP rule level, the parameter is *SenderAddressLocation*. The available values are:
+
+- **Header**: Only examine senders in the message headers (for example, the **From**, **Sender**, or **Reply-To** fields). This is the default value.
+
+- **Envelope**: Only examine senders from the message envelope (the **MAIL FROM** value that was used in the SMTP transmission, which is typically stored in the **Return-Path** field).
+
+- **Header or envelope** (`HeaderOrEnvelope`) Examine senders in the message header and the message envelope.
+
+|condition or exception in DLP|condition/exception parameters in Security & Compliance PowerShell|property type|description|
+|||||
+|Sender is|condition: *From* <br/><br/> exception: *ExceptIfFrom*|Addresses|Messages that are sent by the specified mailboxes, mail users, mail contacts, or Microsoft 365 groups in the organization.|
+|The sender is a member of |*FromMemberOf* <br/><br/> *ExceptIfFromMemberOf*|Addresses|Messages that are sent by a member of the specified distribution group, mail-enabled security group, or Microsoft 365 group.|
+|Sender IP address is|condition: *SenderIPRanges*<br/><br/> exception: *ExceptIfSenderIPRanges*|IPAddressRanges|Messages where the sender's IP address matches the specified IP address, or falls within the specified IP address range.|
+|Sender address contains words|condition: *FromAddressContainsWords* <br/><br/> exception: *ExceptIfFromAddressContainsWords*|Words|Messages that contain the specified words in the sender's email address.|
+|Sender address matches patterns|condition: *FromAddressMatchesPatterns* <br/><br/> exception: *ExceptFromAddressMatchesPatterns*|Patterns|Messages where the sender's email address contains text patterns that match the specified regular expressions.|
+|Sender domain is|condition: *SenderDomainIs* <br/><br/> exception: *ExceptIfSenderDomainIs*|DomainName|Messages where the domain of the sender's email address matches the specified value. If you need to find sender domains that *contain* the specified domain (for example, any subdomain of a domain), use **The sender address matches**(*FromAddressMatchesPatterns*) condition and specify the domain by using the syntax: '\.domain\.com$'.|
+|Sender scope|condition: *FromScope* <br/><br/> exception: *ExceptIfFromScope*|UserScopeFrom|Messages that are sent by either internal or external senders.|
+|The sender's specified properties include any of these words|condition: *SenderADAttributeContainsWords* <br/><br/> exception: *ExceptIfSenderADAttributeContainsWords*|First property: `ADAttribute` <br/><br/> Second property: `Words`|Messages where the specified Active Directory attribute of the sender contains any of the specified words.|
+|The sender's specified properties match these text patterns|condition: *SenderADAttributeMatchesPatterns* <br/><br/> exception: *ExceptIfSenderADAttributeMatchesPatterns*|First property: `ADAttribute` <br/><br/> Second property: `Patterns`|Messages where the specified Active Directory attribute of the sender contains text patterns that match the specified regular expressions.|
+
+### Recipients
+
+|condition or exception in DLP|condition/exception parameters in Security & Compliance PowerShell|property type|description|
+|||||
+|Recipient is|condition: *SentTo* <br/><br/> exception: *ExceptIfSentTo*|Addresses|Messages where one of the recipients is the specified mailbox, mail user, or mail contact in the organization. The recipients can be in the **To**, **Cc**, or **Bcc** fields of the message.|
+|Recipient domain is|condition: *RecipientDomainIs* <br/><br/> exception: *ExceptIfRecipientDomainIs*|DomainName|Messages where the domain of the recipient's email address matches the specified value.|
+|Recipient address contains words|condition: *AnyOfRecipientAddressContainsWords* <br/><br/> exception: *ExceptIfAnyOfRecipientAddressContainsWords*|Words|Messages that contain the specified words in the recipient's email address. <br/><br/>**Note**: This condition doesn't consider messages that are sent to recipient proxy addresses. It only matches messages that are sent to the recipient's primary email address.|
+|Recipient address matches patterns|condition: *AnyOfRecipientAddressMatchesPatterns* <br/><br/> exception: *ExceptIfAnyOfRecipientAddressMatchesPatterns*|Patterns|Messages where a recipient's email address contains text patterns that match the specified regular expressions. <br/><br/> **Note**: This condition doesn't consider messages that are sent to recipient proxy addresses. It only matches messages that are sent to the recipient's primary email address.|
+|Sent to member of|condition: *SentToMemberOf* <br/><br/> exception: *ExceptIfSentToMemberOf*|Addresses|Messages that contain recipients who are members of the specified distribution group, mail-enabled security group, or Microsoft 365 group. The group can be in the **To**, **Cc**, or **Bcc** fields of the message.|
+|The recipient's specified properties include any of these words |*RecipientADAttributeContainsWords* <br/><br/> *ExceptIfRecipientADAttributeContainsWords*|First property: `ADAttribute` <br/><br/> Second property: `Words`|Messages where the specified Active Directory attribute of a recipient contains any of the specified words. <br/><br/> Note that the **Country** attribute requires the two-letter country code value (for example, DE for Germany).|
+|The recipient's specified properties match these text patterns |*RecipientADAttributeMatchesPatterns* <br/><br/> *ExceptIfRecipientADAttributeMatchesPatterns*|First property: `ADAttribute` <br/><br/> Second property: `Patterns`|Messages where the specified Active Directory attribute of a recipient contains text patterns that match the specified regular expressions.|
+|Recipient scope/Content is shared with|condition: *AccessScope* <br/><br/> exception: *ExceptIfAccessScope*|UserScopeFrom|Messages that are received by either internal or external recipients.|
+
+### Message subject or body
+
+|condition or exception in DLP|condition/exception parameters in Security & Compliance PowerShell|property type|description|
+|||||
+|Subject contains words or phrases|condition: *SubjectContainsWords* <br/> exception: *ExceptIf SubjectContainsWords*|Words|Messages that have the specified words in the Subject field.|
+|Subject matches patterns|condition: *SubjectMatchesPatterns* <br/> exception: *ExceptIf SubjectMatchesPatterns*|Patterns|Messages where the Subject field contain text patterns that match the specified regular expressions.|
+|Content contains|condition: *ContentContainsSensitiveInformation* <br/> exception *ExceptIfContentContainsSensitiveInformation*|SensitiveInformationTypes|Messages or documents that contain sensitive information as defined by Microsoft Purview Data Loss Prevention (DLP) policies.|
+|Subject or Body matches pattern|condition: *SubjectOrBodyMatchesPatterns* <br/> exception: *ExceptIfSubjectOrBodyMatchesPatterns*|Patterns|Messages where the subject field or message body contains text patterns that match the specified regular expressions.|
+|Subject or Body contains words|condition: *SubjectOrBodyContainsWords* <br/> exception: *ExceptIfSubjectOrBodyContainsWords*|Words|Messages that have the specified words in the subject field or message body|
++
+### Attachments
+
+|condition or exception in DLP|condition/exception parameters in Security & Compliance PowerShell|property type|description|
+|||||
+|Attachment is password protected|condition: *DocumentIsPasswordProtected* <br/><br/> exception: *ExceptIfDocumentIsPasswordProtected*|none|Messages where an attachment is password protected (and therefore can't be scanned). Password detection works for Office documents, archive documents (such as .zip, .7z, .rar, and .tar files), and .pdf files.|
+|Attachment's file extension is|condition: *ContentExtensionMatchesWords* <br/><br/> exception: *ExceptIfContentExtensionMatchesWords*|Words|Messages where an attachment's file extension matches any of the specified words.|
+|Any email attachment's content could not be scanned|condition: *DocumentIsUnsupported* <br/><br/>exception: *ExceptIf DocumentIsUnsupported*|n/a|Messages where an attachment isn't natively recognized by Exchange Online.|
+|Any email attachment's content didn't complete scanning|condition: *ProcessingLimitExceeded* <br/><br/> exception: *ExceptIfProcessingLimitExceeded*|n/a|Messages where the rules engine couldn't complete the scanning of the attachments. You can use this condition to create rules that work together to identify and process messages where the content couldn't be fully scanned.|
+|Document name contains words|condition: *DocumentNameMatchesWords* <br/><br/> exception: *ExceptIfDocumentNameMatchesWords*|Words|Messages where an attachment's file name matches any of the specified words.|
+|Document name matches patterns|condition: *DocumentNameMatchesPatterns* <br/><br/> exception: *ExceptIfDocumentNameMatchesPatterns*|Patterns|Messages where an attachment's file name contains text patterns that match the specified regular expressions. This is discontinued for SharePoint and OneDrive workloads. Existing rules can't be modified and new rules can't be created. Existing customers can continue to use this condition.|
+|Document property is|condition: *ContentPropertyContainsWords* <br/><br/> exception: *ExceptIfContentPropertyContainsWords*|Words|Messages with documents where an attachment's custom property matches the given value.|
+|Document size equals or is greater than|condition: *DocumentSizeOver* <br/><br/> exception: *ExceptIfDocumentSizeOver*|Size|Messages where any attachment is greater than or equal to the specified value.|
+|Any attachment's content includes any of these words|condition: *DocumentContainsWords* <br/><br/> exception: *ExceptIfDocumentContainsWords*|`Words`|Messages where an attachment contains the specified words.|
+|Any attachments content matches these text patterns|condition: *DocumentMatchesPatterns* <br/><br/> exception: *ExceptIfDocumentMatchesPatterns*|`Patterns`|Messages where an attachment contains text patterns that match the specified regular expressions.|
+
+### Message Headers
+
+|condition or exception in DLP|condition/exception parameters in Security & Compliance PowerShell|property type|description|
+|||||
+|Header contains words or phrases|condition: *HeaderContainsWords* <br/><br/> exception: *ExceptIfHeaderContainsWords*|Hash Table|Messages that contain the specified header field, and the value of that header field contains the specified words.|
+|Header matches patterns|condition: *HeaderMatchesPatterns* <br/><br/> exception: *ExceptIfHeaderMatchesPatterns*|Hash Table|Messages that contain the specified header field, and the value of that header field contains the specified regular expressions.|
+
+### Message properties
+
+|condition or exception in DLP|condition/exception parameters in Security & Compliance PowerShell|property type|description|
+|||||
+|With importance|condition: *WithImportance* <br/><br/> exception: *ExceptIfWithImportance*|Importance|Messages that are marked with the specified importance level.|
+|Content character set contains words|condition: *ContentCharacterSetContainsWords* <br/><br/> *ExceptIfContentCharacterSetContainsWords*|CharacterSets|Messages that have any of the specified character set names.|
+|Has sender override|condition: *HasSenderOverride* <br/><br/> exception: *ExceptIfHasSenderOverride*|n/a|Messages where the sender has chosen to override a data loss prevention (DLP) policy. For more information about DLP policies see [Learn about data loss prevention](./dlp-learn-about-dlp.md)|
+|Message type matches|condition: *MessageTypeMatches* <br/><br/> exception: *ExceptIfMessageTypeMatches*|MessageType|Messages of the specified type. **Note**: The available message types are Automatic reply, Auto-forward, Encrypted (S/MIME), Calendaring, Permission controlled (rights management), Voicemail, Signed, Read receipt, and Approval request. |
+|The message size is greater than or equal to|condition: *MessageSizeOver* <br/><br/> exception: *ExceptIfMessageSizeOver*|`Size`|Messages where the total size (message plus attachments) is greater than or equal to the specified value. **Note**: Message size limits on mailboxes are evaluated before mail flow rules. A message that's too large for a mailbox will be rejected before a rule with this condition is able to act on the message.|
+
+## Actions for DLP policies
+
+This table describes the actions that are available in DLP.
+
+|action in DLP|action parameters in Security & Compliance PowerShell|property type|description|
+|||||
+|Restrict access or encrypt content in Microsoft 365 locations|BlockAccess|First property: *Boolean* <br/><br/> Second property: *BlockAccessScope*|This will allow you to block the access or encrypt the content to the specified users.|
+|Set header|SetHeader|First property: *Header Name* <br/><br/> Second property: *Header Value*|The SetHeader parameter specifies an action for the DLP rule that adds or modifies a header field and value in the message header. This parameter uses the syntax "HeaderName:HeaderValue". You can specify multiple header name and value pairs separated by commas|
+|Remove header|RemoveHeader|First property: *MessageHeaderField*<br/><br/> Second property: *String*|The RemoveHeader parameter specifies an action for the DLP rule that removes a header field from the message header. This parameter uses the syntax "HeaderName" or "HeaderName:HeaderValue".You can specify multiple header names or header name and value pairs separated by commas|
+|Redirect the message to specific users|*RedirectMessageTo*|Addresses|Redirects the message to the specified recipients. The message isn't delivered to the original recipients, and no notification is sent to the sender or the original recipients.|
+|Forward the message for approval to sender's manager|Moderate|First property: *ModerateMessageByManager*<br/><br/> Second property: *Boolean*|The Moderate parameter specifies an action for the DLP rule that sends the email message to a moderator. This parameter uses the syntax: @{ModerateMessageByManager = <$true \|$false>;|
+|Forward the message for approval to specific approvers|Moderate|First property: *ModerateMessageByUser*<br/><br/>Second property: *Addresses*|The Moderate parameter specifies an action for the DLP rule that sends the email message to a moderator. This parameter uses the syntax: @{ ModerateMessageByUser = @("emailaddress1","emailaddress2",..."emailaddressN")}|
+|Add recipient|AddRecipients|First property: *Field*<br/><br/>Second property: *Addresses*|Adds one or more recipients to the To/Cc/Bcc field of the message. This parameter uses the syntax: @{<AddToRecipients \<CopyTo \| BlindCopyTo\> = "emailaddress"}|
+|Add the sender's manager as recipient|AddRecipients|First property: *AddedManagerAction*<br/><br/>Second property: *Field*|Adds the sender's manager to the message as the specified recipient type (To, Cc, Bcc), or redirects the message to the sender's manager without notifying the sender or the recipient. This action only works if the sender's Manager attribute is defined in Active Directory. This parameter uses the syntax: @{AddManagerAsRecipientType = "\<To \| Cc \| Bcc\>"}|
+Prepend subject|PrependSubject|String|Adds the specified text to the beginning of the Subject field of the message. Consider using a space or a colon (:) as the last character of the specified text to differentiate it from the original subject text.<br/><br/>To prevent the same string from being added to messages that already contain the text in the subject (for example, replies), add the "The subject contains words" (ExceptIfSubjectContainsWords) exception to the rule.|
+|Apply HTML disclaimer|ApplyHtmlDisclaimer|First property: *Text*<br/><br/>Second property: *Location*<br/><br/>Third property: *Fallback action*|Applies the specified HTML disclaimer to the required location of the message.<br/><br/>This parameter uses the syntax: @{ Text = " " ; Location = \<Append \| Prepend\>; FallbackAction = \<Wrap \| Ignore \| Reject\> }|
+|Remove message encryption and rights protection|RemoveRMSTemplate|n/a|Removes message encryption applied on an email|
+|Deliver the message to the hosted quarantine |*Quarantine*|n/a| This action is currently in **public preview**. During this phase, emails quarantined by DLP policies will show policy type as ExchangeTransportRule.<br/><br/> Delivers the message to the quarantine in EOP. For more information, see [Quarantined email messages in EOP](/microsoft-365/security/office-365-security/quarantine-about).|
+|Modify Subject|ModifySubject|PswsHashTable | Remove text from the subject line that matches a specific pattern and replace it with different text. See the example below. You can: <br/><br/>- **Replace** all matches in the subject with the replacement text <br/><br/>- **Append** to remove all matches in the subject and inserts the replacement text at the end of the subject. <br/><br/>- **Prepend** to remove all matches and inserts the replacement text at the beginning of the subject. See ModifySubject parameter in, /powershell/module/exchange/new-dlpcompliancerule|
compliance Dlp Firefox Extension Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-firefox-extension-get-started.md
f1.keywords:
Previously updated : 09/09/2019 Last updated : 06/02/2023 audience: ITPro f1_keywords:
After ingesting the ADMX, the steps below can be followed to create a configurat
} }'/> `
-9. Note: It is critical that updates_disabled is set to false so that the extension can automatically update over time.
+9. Note: It is critical that `updates_disabled` is set to `false` so that the extension can automatically update over time.
10. Click create.
Now that youΓÇÖve removed Firefox from the disallowed browsers/apps list, you ca
- Print a document - To test, open a file that is protected against print actions in the Firefox browser and attempt to print the file. - Expected Result: A DLP toast notification showing that this action is not allowed when the file is open.-- Copy to USB Removeable Media
- - To test, try to save the file to a removeable media storage.
+- Copy to USB Removable Media
+ - To test, try to save the file to a removable media storage.
- Expected Result: A DLP toast notification showing that this action is not allowed when the file is open. - Copy to Network Share - To test, try to save the file to a network share.
compliance Dlp Firefox Extension Learn https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-firefox-extension-learn.md
f1.keywords:
Previously updated : 09/09/2019 Last updated : 06/02/2023 audience: ITPro f1_keywords:
description: "The Microsoft Purview extension for Firefox extends monitoring and
# Learn about the Microsoft Purview extension for Firefox
-[Endpoint data loss prevention (endpoint DLP)](endpoint-dlp-learn-about.md) extends the activity monitoring and protection capabilities of [Microsoft Purview data loss prevention (DLP)](dlp-learn-about-dlp.md) to sensitive items that are on Windows 10 devices. Once devices are onboarded into the Microsoft Purview solutions, the information about what users are doing with sensitive items is made visible in [activity explorer](data-classification-activity-explorer.md) and you can enforce protective actions on those items via [DLP policies](dlp-learn-about-dlp.md).
+[Endpoint data loss prevention (endpoint DLP)](endpoint-dlp-learn-about.md) extends the activity monitoring and protection capabilities of [Microsoft Purview data loss prevention (DLP)](dlp-learn-about-dlp.md) to sensitive items that are on Windows 10/11 devices. Once devices are onboarded into the Microsoft Purview solutions, the information about what users are doing with sensitive items is made visible in [activity explorer](data-classification-activity-explorer.md) and you can enforce protective actions on those items via [DLP policies](dlp-learn-about-dlp.md).
-Once the Firefox extension is installed on a Windows 10 device, organizations can monitor when a user attempts to access or upload a sensitive item to a cloud service using Mozilla Firefox and enforce protective actions via DLP.
+Once the Firefox extension is installed on a Windows 10/11 device, organizations can monitor when a user attempts to access or upload a sensitive item to a cloud service using Mozilla Firefox and enforce protective actions via DLP.
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
compliance Dlp Learn About Dlp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-learn-about-dlp.md
f1.keywords:
Previously updated : 04/27/2023 Last updated : 06/02/2023 audience: ITPro
In Microsoft Purview, you implement data loss prevention by defining and applyin
- Microsoft 365 services such as Teams, Exchange, SharePoint, and OneDrive accounts - Office applications such as Word, Excel, and PowerPoint-- Windows 10, Windows 11 and macOS (three latest released versions) endpoints
+- Windows 10, Windows 11, and macOS (three latest released versions) endpoints
- non-Microsoft cloud apps - on-premises file shares and on-premises SharePoint - Power BI
DLP policies can block prohibited activities, like inappropriate sharing of sens
A successful DLP implementation is as much dependent on getting your users trained and acclimated to data loss prevention practices as it is on well planned and tuned policies. Since your users are heavily involved, be sure to plan for training for them too. You can strategically use policy tips to raise awareness with your users before changing the policy enforcement from test mode to more restrictive modes.
-<!--For more information on planning for DLP, including suggestions for deployment based on your needs and resources, see [Planning for data loss prevention](dlp-plan-for-dlp.md).-->
- ### Prepare for DLP
-You can apply DLP policies to data at rest, data in use, and data in motion in locations, such as:
+You can apply DLP policies to data at rest, data in use, and data in motion in locations such as:
- Exchange Online email - SharePoint Online sites
You can apply DLP policies to data at rest, data in use, and data in motion in l
- On-premises repositories - Power BI sites
-Each one has different prerequisites. Sensitive items in some locations, like Exchange online, can be brought under the DLP umbrella by just configuring a policy that applies to them. Others, such as on-premises file repositories require a deployment of Azure Information Protection (AIP) scanner. You'll need to prepare your environment, code draft policies, and test them thoroughly before activating any blocking actions.
+Each one has different prerequisites. Sensitive items in some locations, like Exchange online, can be brought under the DLP umbrella by just configuring a policy that applies to them. Others, such as on-premises file repositories, require a deployment of Azure Information Protection (AIP) scanner. You'll need to prepare your environment, code draft policies, and test them thoroughly before activating any blocking actions.
### Deploy your policies in production
While in test mode, monitor the outcomes of the policy and fine-tune it so that
#### Enable the control and tune your policies
-Once the policy meets all your objectives, turn it on. Continue to monitor the outcomes of the policy application and tune as needed.
+Once the policy meets all your objectives, turn it on. Continue to monitor the outcomes of the policy application and tune as needed.
> [!NOTE] > In general, policies take effect about an hour after being turned on.
Once the policy meets all your objectives, turn it on. Continue to monitor the o
You have flexibility in how you create and configure your DLP policies. You can start from a predefined template and create a policy in just a few clicks or you can design your own from the ground up. No matter which you choose, all DLP policies require the same information from you. 1. **Choose what you want to monitor** - DLP comes with many predefined policy templates to help you get started or you can create a custom policy.
- - A predefined policy template: Financial data, Medical and health data, Privacy data all for various countries and regions.
+ - A predefined policy template, such as Financial data, Medical and health data, Privacy data all for various countries and regions.
- A custom policy that uses the available sensitive information types, retention labels, and sensitivity labels. 2. **Choose administrative scoping** - DLP supports assigning [Administrative Units](/azure/active-directory/roles/administrative-units) to policies (preview). Administrators who are assigned to an administrative unit can only create and manage policies for the users, groups, distribution groups, and accounts that they're assigned to. So, policies can be applied to all users and groups by an unrestricted administrator, or they can be scoped to administrative units. See, [Policy Scoping](dlp-policy-reference.md#policy-scoping) for more DLP specific details. See, [Administrative units (preview)](microsoft-365-compliance-center-permissions.md#administrative-units-preview) for the details on administrative units across Microsoft Purview Information Protection.
You have flexibility in how you create and configure your DLP policies. You can
|On-premises repositories| repository file path| |Power BI (preview)| workspaces|
-4. **Choose the conditions that must be matched for a policy to be applied to an item** - You can accept preconfigured conditions or define custom conditions. Some examples are:
+4. **Choose the conditions that must be matched for a policy to be applied to an item** - You can accept preconfigured conditions or you can define custom conditions. Some examples are:
- item contains a specified kind of sensitive information that is being used in a certain context. For example, 95 social security numbers being emailed to recipient outside your org. - item has a specified sensitivity label
You have flexibility in how you create and configure your DLP policies. You can
- SharePoint/Exchange/OneDrive: Block people who are outside your organization from accessing the content. Show the user a tip and send them an email notification that they're taking an action that is prohibited by the DLP policy. - Teams Chat and Channel: Block sensitive information from being shared in the chat or channel
- - Windows 10, Windows 11, and macOS (three latest released versions) Devices: Audit or restrict copying a sensitive item to a removeable USB device
+ - Windows 10, Windows 11, and macOS (three latest released versions) Devices: Audit or restrict copying a sensitive item to a removable USB device
- Office Apps: Show a popup notifying the user that they're engaging in a risky behavior and block or block but allow override. - On-premises file shares: move the file from where it's stored to a quarantine folder > [!NOTE]
- > The conditions and the actions to take are defined in an object called a Rule.
+ > The conditions and the actions to take are defined in an object called a *rule*.
## Create and deploy a DLP policy
All DLP policies are created and maintained in the Microsoft Purview center. See
After you create a DLP policy in the compliance portal, it's stored in a central policy store, and then synced to the various content sources, including: -- Exchange Online, and from there to Outlook on the web and Outlook.-- OneDrive for Business sites.-- SharePoint Online sites.-- Office desktop programs (Excel, PowerPoint, and Word).-- Microsoft Teams channels and chat messages.
+- Exchange, and from there to Outlook on the web and Outlook
+- OneDrive
+- SharePoint sites
+- Office desktop programs (Excel, PowerPoint, and Word)
+- Microsoft Teams channels and chat messages
-After the policy's synced to the right locations, it starts to evaluate content and enforce actions.
+After the policy is synced to the right locations, it starts to evaluate content and enforce actions.
## Viewing policy application results
-DLP reports a vast amount of information into Microsoft Purview from monitoring, policy matches and actions, and user activities. You'll need to consume and act on that information to tune your policies and triage actions taken on sensitive items. The telemetry goes into the [Microsoft Purview compliance portal Audit Logs](audit-log-search.md#search-the-audit-log-in-the-compliance-portal) first, is processed, and makes its way to different reporting tools. Each reporting tool has a different purpose.
+DLP reports a vast amount of information to Microsoft Purview from monitoring to policy matches and actions, to user activities. You'll need to consume and act on that information to tune your policies and triage actions taken on sensitive items. The telemetry goes into the [Microsoft Purview compliance portal Audit Logs](audit-log-search.md#search-the-audit-log-in-the-compliance-portal) first, is processed, and makes its way to different reporting tools. Each reporting tool has a different purpose.
### High volume of sensitive info shared or save externally
You can also view details of the associated event with rich metadata in the same
### DLP Activity Explorer and reports
-The Activity explorer tab on the DLP page has the *Activity* filter preset to *DLPRuleMatch*. Use this tool to review activity related to content that contains sensitive info or has labels applied, such as what labels were changed, files were modified, and matched a rule.
-
-<!--![screenshot of the DLPRuleMatch scoped activity explorer.](../media/dlp-activity-explorer.png)-->
+The Activity explorer tab on the DLP page has multiple filters you can use to view DLP events. Use this tool to review activity related to content that contains sensitive info or has labels applied, such as what labels were changed, files were modified, and matched a rule.
-You can view the last 30 days of DLP information in [Activity Axplorer](data-classification-activity-explorer.md) using these preconfigured filters:
+You can view the last 30 days of DLP information in [Activity Explorer](data-classification-activity-explorer.md) using these preconfigured filters:
- Endpoint DLP activities - Files containing sensitive info types
You can view the last 30 days of DLP information in [Activity Axplorer](data-cla
- DLP policies that detected activities - DLP policy rules that detected activities +
+|To see this information |Select this activity |
+|||
+|User overrides |**DLP rule undo** |
+|Items that match a DLP rule|**DLP rule matched** |
+ You can also access DLP report using via these cmdlets in the Security & Compliance PowerShell. 1. [Connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell) Use these cmdlets:
-[Get-DlpDetailReport](/powershell/module/exchange/get-dlpdetailreport)
-[Get-DlpDetectionsReport](/powershell/module/exchange/get-dlpdetectionsreport)
-[Get-DlpSiDetectionsReport](/powershell/module/exchange/get-dlpsidetectionsreport)
+- [Get-DlpDetailReport](/powershell/module/exchange/get-dlpdetailreport)
+- [Get-DlpDetectionsReport](/powershell/module/exchange/get-dlpdetectionsreport)
+- [Get-DlpSiDetectionsReport](/powershell/module/exchange/get-dlpsidetectionsreport)
-However, DLP reports need pull data from across Microsoft 365, including Exchange Online. For this reason, the following cmdlets for DLP reports are available in Exchange Online Powershell. To use the cmdlets for these DLP reports, do these steps:
+However, DLP reports need to pull data from across Microsoft 365, including Exchange. For this reason, the following cmdlets for DLP reports are available in Exchange Powershell. To use the cmdlets for these DLP reports, take the following steps:
-1. [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell)
+1. [Connect to Exchange PowerShell](/powershell/exchange/connect-to-exchange-online-powershell)
Use these cmdlets:
-[Get-DlpDetailReport](/powershell/module/exchange/get-dlpdetailreport)
-[Get-MailDetailDlpPolicyReport](/powershell/module/exchange/get-maildetaildlppolicyreport)
+- [Get-DlpDetailReport](/powershell/module/exchange/get-dlpdetailreport)
+- [Get-MailDetailDlpPolicyReport](/powershell/module/exchange/get-maildetaildlppolicyreport)
#### Contextual summary You can see the text that surrounds the matched content, like a credit card number in a **DLPRuleMatch** event in Activity explorer. To do this you must first enable [Advanced classification scanning and protection](dlp-configure-endpoint-settings.md#advanced-classification-scanning-and-protection).
-**DLPRuleMatch** events are paired with the user activity event. The should be right next to (or at least very close to) each other in Activity explorer. You'll want to look at both because the **user activity event** contains details about the matched policy and the **DLPRuleMatch** event contains the details about the text that surrounds the matched content.
+**DLPRuleMatch** events are paired with the user activity event. They should be right next to (or at least very close to) each other in Activity explorer. You'll want to look at both because the **user activity event** contains details about the matched policy and the **DLPRuleMatch** event contains the details about the text that surrounds the matched content.
For endpoint, be sure that you have applied KB5016688 for Windows 10 devices and KB5016691 for Windows 11 devices or above
compliance Dlp Policy Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md
The available context options change depending on which location you choose. If
- Message type is - Message importance is
+> [!TIP]
+> For more information on the conditions that Exchange supports, including PowerShell values, see: [Data loss prevention Exchange conditions and actions reference](dlp-exchange-conditions-and-actions.md).
+ ##### Conditions SharePoint supports - Content contains
The actions that are available in a rule depend on the locations that have been
- Modify Email Subject - Deliver the message to the hosted quarantine
+> [!TIP]
+> For more information on the actions that Exchange supports, including PowerShell values, see: [Data loss prevention Exchange conditions and actions reference](dlp-exchange-conditions-and-actions.md).
+ #### SharePoint sites location actions - Restrict access or encrypt the content in Microsoft 365 locations
compliance Ediscovery Create Draft Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-create-draft-collection.md
Here's the descriptions of the pre-collection estimate management options.
- The total size (in bytes) of the items in each content location. - The service (such as Exchange or SharePoint) in which the content location is located.
+ The limits for the export report and report results are as follows:
+
+ - Total items: 1 million
+ - Total locations: 500,000
+ - Exported results (items): 500,000
+ - Exported results (locations): 100,000
+ - **Copy collection**: Create a new collection estimate by copying the settings from an existing collection. You have to use a different name for the new collection. You also have the option to modify the settings before you submit the new collection. After you submit it, the search query runs and new estimates and statistics are generated. This is a good way to quickly create additional collection estimate and then modify selected settings as necessary while still preserving information in the original collection. This also lets you easily compare the results of two similar collections. > [!NOTE]
compliance Ediscovery Legacy Retirement https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-legacy-retirement.md
f1.keywords:
Previously updated : 01/01/2023 Last updated : 06/15/2023 audience: Admin
> [!IMPORTANT] > The functionality of the legacy eDiscovery tools described in this article has either been removed from the Microsoft 365 service or is still available, but no longer supported. Any functionality that's still available may be removed without notice. If you're still using any of these legacy tools, consider migrating to the eDiscovery tools in the Microsoft Purview compliance portal or one of the alternatives described in this article.
-Over the years, Microsoft has provided eDiscovery tools that let you search, preview, and export email content from Exchange Online. However, these tools no longer offer an effective way to search for non-Exchange content in other Microsoft 365 services, such as SharePoint Online and Microsoft 365 Groups. To address this, Microsoft offers other eDiscovery tools that help you search for a wide variety of Microsoft 365 content. And we've been working hard to incorporate the most current and powerful eDiscovery functionality in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">compliance portal</a>. This allows organizations to respond to legal, internal, and other document requests for content across many Microsoft 365 services, including Exchange Online.
+Over the years, Microsoft has provided eDiscovery tools that let you search, preview, and export email content from Exchange Online. However, these tools no longer offer an effective way to search for non-Exchange content in other Microsoft 365 services, such as SharePoint Online and Microsoft 365 Groups.
-As a result of this new and improved eDiscovery functionality in the compliance portal, we're retiring the following eDiscovery-related features and functionality related to searching for email content in Exchange Online and Microsoft 365:
+To address this, Microsoft offers other eDiscovery tools that help you search for a wide variety of Microsoft 365 content. And we've been working hard to incorporate the most current and powerful eDiscovery functionality in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">compliance portal</a>. This allows organizations to respond to legal, internal, and other document requests for content across many Microsoft 365 services, including Exchange Online.
+
+As a result of this new and improved eDiscovery functionality in the compliance portal, the following eDiscovery-related features and functionality related to searching for email content in Exchange Online and Microsoft 365 are retired:
- [In-Place eDiscovery](/exchange/security-and-compliance/in-place-ediscovery/in-place-ediscovery) and [In-Place Holds](/exchange/security-and-compliance/create-or-remove-in-place-holds) in the Exchange admin center.
The following sections in this article provide guidance about each feature being
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
-## In-Place eDiscovery and In-Place Holds in the Exchange admin center
+## In-Place eDiscovery and In-Place Holds in the Exchange admin center
As per the original announcement on July 1, 2017, the In-Place eDiscovery & Hold functionality in the Exchange admin center (EAC) is being retired. The In-Place eDiscovery & Holds page in the EAC allowed you to search, hold, and export content from Exchange Online. In-Place eDiscovery also let you copy search results to a discovery mailbox so that you or other eDiscovery managers could review content and make it available for legal, regulatory, and public requests.
Because all of these capabilities (except for copying search results to a discov
- Office 365 and Microsoft 365 Enterprise organizations - Office 365 and Microsoft 365 Education organizations - Office 365 and Microsoft 365 Government organizations; this includes GCC, GCC High, and DoD-- Office 365 Germany
+- Office 365 and Microsoft 365 operated by 21Vianet (China)
+- Office 365 and Microsoft 365 Germany
### Timeline for retirement - July 1, 2020: You won't be able to create new searches and holds, but you can still run, edit, and delete existing searches at your own risk. Microsoft Support will no longer In-Place eDiscovery & Holds in the EAC.-- October 1, 2020: The In-Place eDiscovery & Holds functionality in the EAC will be placed in a read-only mode. This means you'll only be able to remove existing searches and holds.
+- October 1, 2020: The In-Place eDiscovery & Holds functionality in the EAC was placed in a read-only mode. This means you'll only be able to remove existing searches and holds.
### Alternative tools
Because these capabilities are now available in the [<span class="underline">com
- Office 365 and Microsoft 365 Enterprise organizations - Office 365 and Microsoft 365 Education organizations - Office 365 and Microsoft 365 Government organizations; this includes GCC, GCC High, and DoD
+- Office 365 and Microsoft 365 operated by 21Vianet (China)
- Office 365 Germany ### Timeline - July 1, 2020: You won't be able to use **New-MailboxSearch** to create new In-Place eDiscovery searches and In-Place Holds, but you can still use cmdlets to run, edit, and delete existing searches and holds at your own risk. Microsoft Support will no longer provide assistance for these types of searches and holds.-- October 1, 2020: As previously stated, The In-Place eDiscovery & Holds functionality in the EAC will be placed in a read-only mode. That also means that you won't be able to use the **New-MailboxSearch**, **Start-MailboxSearch**, or **Set-MailboxSearch** cmdlets. You'll only be able to get and remove existing searches and holds.
+- October 1, 2020: The In-Place eDiscovery & Holds functionality in the EAC was placed in a read-only mode. You won't be able to use the **New-MailboxSearch**, **Start-MailboxSearch**, or **Set-MailboxSearch** cmdlets. You'll only be able to get and remove existing searches and holds.
### Alternative tools
The **Search-Mailbox** cmdlet in Exchange Online PowerShell is being retired as
- Office 365 and Microsoft 365 Enterprise organizations - Office 365 and Microsoft 365 Education organizations - Office 365 and Microsoft 365 Government organizations; this includes GCC, GCC High, and DoD
+- Office 365 and Microsoft 365 operated by 21Vianet (China)
- Office 365 Germany ### Timeline
compliance Ediscovery Teams Investigation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-teams-investigation.md
Not all Teams content is eDiscoverable. The following table shows the Teams cont
|Reactions (such as likes, hearts, and other reactions)|Reactions are supported for all commercial customers after June 1, 2022. Reactions before this date aren't available for eDiscovery. Expanded reactions are now supported. To understand reaction history, the content must be on legal hold.| |Subject|| |Tables||
-|Teams Video Clip (TVC)|Search TVC with "Video-Clip" keyword and "save as" a .mp4 file for each TVC attachment by right-clicking the preview (search by keyword will be available in October 2022). TVC data is discoverable in eDiscovery [review sets](/microsoft-365/compliance/add-data-to-review-set).
+|Teams Video Clip (TVC)|Search TVC with "Video-Clip" keyword and "save as" a .mp4 file for each TVC attachment by right-clicking the preview. <p> TVCs are collected as Teams conversation attachments and separate .mp4 files. TVC file data is discoverable in eDiscovery [review sets](/microsoft-365/compliance/add-data-to-review-set) and can be exported.
<a name="teams-metadata"></a><sup>1</sup> Meeting (and call) metadata includes the following:
compliance Microsoft 365 Compliance Center Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/microsoft-365-compliance-center-permissions.md
f1.keywords:
Previously updated : 05/16/2023 Last updated : 06/06/2023 audience: ITPro
# Permissions in the Microsoft Purview compliance portal
-The Microsoft Purview compliance portal supports directly managing permissions for users who perform compliance tasks in Microsoft 365. This update means you'll no longer have to use the Office 365 Security & Compliance Center to manage permissions for compliance solutions. Using the new **Permissions** page in the compliance portal, you can manage permissions to users for compliance tasks in features like device management, Microsoft Purview Data Loss Prevention, eDiscovery, insider risk management, retention, and many others. Users can perform only the compliance tasks that you explicitly grant them access to.
+The Microsoft Purview compliance portal supports directly managing permissions for users who perform compliance tasks in Microsoft 365. Using the new **Permissions** page in the compliance portal, you can manage permissions to users for compliance tasks in features like device management, Microsoft Purview Data Loss Prevention, eDiscovery, insider risk management, retention, and many others. Users can perform only the compliance tasks that you explicitly grant them access to.
To view the **Permissions** tab in the compliance portal, users need to be a global administrator or need to be assigned the *Role Management* role (a role is assigned only to the *Organization Management* role group). The *Role Management* role allows users to view, create, and modify role groups.
The roles that appear in the **Azure AD** > **Roles** section of the compliance
|**Compliance data administrator**|Keep track of your organization's data across Microsoft 365, make sure it's protected, and get insights into any issues to help mitigate risks. For more information, see [Compliance Data Administrator](/azure/active-directory/roles/permissions-reference#compliance-data-administrator).| |**Compliance administrator**|Help your organization stay compliant with any regulatory requirements, manage eDiscovery cases, and maintain data governance policies across Microsoft 365 locations, identities, and apps. For more information, see [Compliance Administrator](/azure/active-directory/roles/permissions-reference#compliance-administrator).| |**Security operator**|View, investigate, and respond to active threats to your Microsoft 365 users, devices, and content. For more information, see [Security Operator](/azure/active-directory/roles/permissions-reference#security-operator).|
-|**Security reader**|View and investigate active threats to your Microsoft 365 users, devices, and content, but (unlike the Security operator) they do not have permissions to respond by taking action. For more information, see [Security Reader](/azure/active-directory/roles/permissions-reference#security-reader).|
+|**Security reader**|View and investigate active threats to your Microsoft 365 users, devices, and content, but (unlike the Security operator) they don't have permissions to respond by taking action. For more information, see [Security Reader](/azure/active-directory/roles/permissions-reference#security-reader).|
|**Security administrator**|Control your organization's overall security by managing security policies, reviewing security analytics and reports across Microsoft 365 products, and staying up-to-speed on the threat landscape. For more information, see [Security Administrator](/azure/active-directory/roles/permissions-reference#security-administrator).| |**Global reader**|The read-only version of the **Global administrator** role. View all settings and administrative information across Microsoft 365. For more information, see [Global Reader](/azure/active-directory/roles/permissions-reference#global-reader).| |**Attack simulation administrator**|Create and manage all aspects of attack simulation creation, launch/scheduling of a simulation, and the review of simulation results. For more information, see [Attack Simulation Administrator](/azure/active-directory/roles/permissions-reference#attack-simulation-administrator).|
The following Microsoft Purview compliance solutions support administrative unit
|**Solution**|**Configuration support**| |:--|:-|
+| [Audit](/microsoft-365/compliance/audit-solutions-overview) | [Audit log search access](/microsoft-365/compliance/audit-log-search) |
| [Data lifecycle management](data-lifecycle-management.md) | [Role groups, retention policies, and retention label policies](get-started-with-data-lifecycle-management.md#support-for-administrative-units) | | [Data Loss Prevention (DLP)](/microsoft-365/compliance/dlp-learn-about-dlp) | Role groups and [DLP policies](/microsoft-365/compliance/dlp-create-deploy-policy) | | [Communication compliance](/microsoft-365/compliance/communication-compliance.md)|Adaptive scopes|
The configuration for administrative units automatically flows down to the follo
- When a restricted administrator configures a policy that's using adaptive scopes, that administrator can only select adaptive scopes that are assigned to their administrative units - Data lifecycle management and records management: - [Policy lookup](retention.md#policy-lookup): Restricted administrators will see policies only from users within their assigned administrative units
- - [Disposition review and verification](disposition.md): Restricted administrators will be able to add reviewers only from within their assigned administrative units, and see disposition reviews and items disposed only from users within their assigned administrative units
+ - [Disposition review and verification](disposition.md): Restricted administrators are able to add reviewers only from within their assigned administrative units, and see disposition reviews and items disposed only from users within their assigned administrative units
You can add users and groups to administrative units by using the following built-in role groups:
Complete the following steps to configure and use administrative units with Micr
4. Use any of the role groups from the Microsoft Purview compliance solutions that support administrative units to assign administrative units to members.
-Now, when these restricted administrators create or edit policies that support administrative units, they can select administrative units so that only the users in those administrative units will be eligible for the policy:
+Now, when these restricted administrators create or edit policies that support administrative units, they can select administrative units so that only the users in those administrative units are eligible for the policy:
- *Unrestricted administrators* don't have to select administrative units as part of the policy configuration. They can keep the default of the entire directory, or select one or more administrative units. - *Restricted administrators* must now select one or more administrative units as part of the policy configuration.
Complete the following steps to add users or groups to a Microsoft Purview role
## Remove users or groups from a Microsoft Purview built-in role group
-Complete the following steps to remove users or groups rom a Microsoft Purview role group:
+Complete the following steps to remove users or groups from a Microsoft Purview role group:
1. Sign into the permissions area of the compliance portal using credentials for an admin account in your Microsoft 365 organization, and go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2173597" target="_blank">**Permissions**</a> to select the link to view and manage the Microsoft Purview compliance roles. 2. Expand the **Microsoft Purview solutions** section and select **Roles**.
Complete the following steps to create a custom Microsoft Purview role group:
1. Sign into the permissions area of the compliance portal using credentials for an admin account in your Microsoft 365 organization, and go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2173597" target="_blank">**Permissions**</a>. 2. Expand the **Microsoft Purview solutions** section and select **Roles**. 3. On the **Role groups for Microsoft Purview solutions** page, select **Create role group**.
-4. On the **Name the role group** page, enter a name for the custom role group in the **Name** field. The name of the role group cannot be changed after creation of the role group. If needed, enter a description for the custom role group in the **Description** field. Select **Next** to continue.
+4. On the **Name the role group** page, enter a name for the custom role group in the **Name** field. The name of the role group can't be changed after creation of the role group. If needed, enter a description for the custom role group in the **Description** field. Select **Next** to continue.
5. On the **Add roles to the role group** page, select **Choose roles**. 6. Select the checkboxes for the roles to add to the custom role group. Select **Select**. 7. Select **Next** to continue.
Complete the following steps to update a custom Microsoft Purview role group:
1. Sign into the permissions area of the compliance portal using credentials for an admin account in your Microsoft 365 organization, and go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2173597" target="_blank">**Permissions**</a>. 2. Expand the **Microsoft Purview solutions** section and select **Roles**. 3. On the **Role groups for Microsoft Purview solutions** page, select a Microsoft Purview role group you want to update, then select **Edit** on the control bar.
-4. On the **Name the role group** page, update the description for the custom role group in the **Description** field. The name of the custom role group cannot be changed. Select **Next**.
+4. On the **Name the role group** page, update the description for the custom role group in the **Description** field. The name of the custom role group can't be changed. Select **Next**.
5. On the **Edit roles of the role group** page, you can select **Choose roles** to add roles to update the roles assigned to the role group. You can also select any of the currently assigned roles and select **Remove roles** to remove the roles from the role group. After you've updated the roles, select **Next**. 6. On the **Edit members of the role group** page, you can select **Choose users** or **Choose groups** to add users or groups assigned to the role group. To update the administrative units for users or groups, select any of the currently assigned user or groups and select **Assign admin units**. You can also select any of the currently assigned users and groups and select **Remove members** to remove the users or groups from the role group. After you've updated the members, select **Next**. 7. On the **Review the role group and finish** page, review the details for the custom role group. If you need to edit the information, select **Edit** in the appropriate section. When all the settings are correct, select **Save** to update the custom role group or select **Cancel** to discard the changes and not update the custom role group.
compliance Sensitivity Labels Coauthoring https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-coauthoring.md
audience: Admin Previously updated : 01/31/2021 Last updated : 06/19/2023 ms.localizationpriority: high - purview-compliance
You can read more about this metadata change from the following resources:
- Open Specifications: [2.6.3 LabelInfo versus Custom Document Properties](/openspecs/office_file_formats/ms-offcrypto/13939de6-c833-44ab-b213-e0088bf02341)
-Because of these changes, do not enable this setting if you have any apps, services, scripts, or tools in your organization that reads or writes labeling metadata to the old location. If you do, some example consequences:
+Because of these changes, don't enable this setting if you have any apps, services, scripts, or tools in your organization that reads or writes labeling metadata to the old location. If you do, some example consequences:
- A document that is labeled appears to users to be unlabeled.
Make sure you understand the following prerequisites before you turn on this fea
- You must be a global admin to turn on this feature. -- Sensitivity labels must be [enabled for Office files in SharePoint and OneDrive](sensitivity-labels-sharepoint-onedrive-files.md) for the tenant. If this feature isn't already enabled, it will be automatically enabled when you select the setting to turn on co-authoring for files with sensitivity labels.
+- Sensitivity labels must be [enabled for Office files in SharePoint and OneDrive](sensitivity-labels-sharepoint-onedrive-files.md) for the tenant. If this feature isn't already enabled, it is automatically enabled when you select the setting to turn on co-authoring for files with sensitivity labels.
- Microsoft 365 Apps for enterprise: - **Windows**: Minimum version 2107 from Current Channel or Monthly Enterprise Channel, or minimum version 2202 from Semi-Annual Enterprise Channel
Before you enable the tenant setting for co-authoring for files encrypted with s
Specific to Excel: Metadata for a sensitivity label that doesn't apply encryption can be deleted from a file if somebody edits and saves that file by using a version of Excel that doesn't support the metadata changes for sensitivity labels. -- Co-authoring and AutoSave aren't supported and don't work for labeled and encrypted Office documents that have any of the following [configurations for encryption](encryption-sensitivity-labels.md#configure-encryption-settings):
- - **Let users assign permissions when they apply the label** and the checkbox **In Word, PowerPoint, and Excel, prompt users to specify permissions** is selected. This configuration is sometimes referred to as "user-defined permissions".
- - **User access to content expires** is set to a value other than **Never**.
- - **Double Key Encryption**
+- Co-authoring and AutoSave aren't supported for Office documents that use the [label encryption configuration](encryption-sensitivity-labels.md#configure-encryption-settings) **User access to content expires** when it's set to a value other than **Never**, or **Double Key Encryption** is configured.
- For labels with any of these encryption configurations, the labels display in Office apps. However, when users select these labels and nobody else is editing the document, they're warned that co-authoring and AutoSave won't be available. If somebody else is editing the document, users see a message that the labels can't be applied.
+ Labels with these configurations do still display in Office apps. However, when users select these labels and nobody else is editing the document, they're warned that co-authoring and AutoSave won't be available. If somebody else is editing the document, users see a message that the labels can't be applied.
+
+- Co-authoring and AutoSave are now supported in preview with [specific versions and limitations](sensitivity-labels-sharepoint-onedrive-files.md#support-for-labels-configured-for-user-defined-permissions) for sensitivity labels that are configured for user-defined permissions. This encryption configuration refers to the setting **Let users assign permissions when they apply the label** and the checkbox **In Word, PowerPoint, and Excel, prompt users to specify permissions** is selected.
- If you use the Azure Information Protection unified labeling client: Check the documentation for this labeling client for [more requirements or limitations](/azure/information-protection/known-issues#known-issues-for-co-authoring). > [!NOTE]
Before you enable the tenant setting for co-authoring for files encrypted with s
> [!IMPORTANT] > If you do need to disable this feature, for example, you've discovered some apps don't support the metadata changes and you can't immediately update these apps, be aware that labeling information can be lost.
-After you've enabled co-authoring for files with sensitivity labels for your tenant, you can't disable this setting in the compliance portal and this action is supported only by using PowerShell. This is not a setting that you casually disable, and why it's so important that you check and understand the prerequisites, consequences, and limitations before you enable the setting.
+After you've enabled co-authoring for files with sensitivity labels for your tenant, you can't disable this setting in the compliance portal, and this action is supported only by using PowerShell. This isn't a setting that you casually disable, and why it's so important that you check and understand the prerequisites, consequences, and limitations before you enable the setting.
If you do disable this setting for your tenant: - For apps and services that support the new labeling metadata, they now revert to the original metadata format and location when labels are read or saved. -- The new metadata format and location for Office documents that were used while the setting was enabled will not be copied to the original format and location. As a result, this labeling information for unencrypted Word, Excel, and PowerPoint files will be lost.
+- The new metadata format and location for Office documents that were used while the setting was enabled won't be copied to the original format and location. As a result, this labeling information for unencrypted Word, Excel, and PowerPoint files will be lost.
- Co-authoring and AutoSave no longer work in your tenant for labeled and encrypted documents.
compliance Sensitivity Labels Sharepoint Onedrive Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-sharepoint-onedrive-files.md
audience: Admin Previously updated : 06/06/2023 Last updated : 06/19/2023 ms.localizationpriority: high
Enable built-in labeling for [supported Office files](sensitivity-labels-office-
Now rolling out in preview: For SharePoint, users can also see and apply sensitivity labels from the details pane. This method is also available from the **Files** tab in Teams.
-Enabling this feature also results in SharePoint and OneDrive being able to process the contents of Office files that have been encrypted by using a sensitivity label. The label can be applied in Office for the web, or in Office desktop apps and uploaded or saved in SharePoint and OneDrive. Until you enable this feature, these services can't process encrypted files, which means that coauthoring, eDiscovery, data loss prevention, search, and other collaborative features won't work for these files.
+Enabling this feature also results in SharePoint and OneDrive being able to process the contents of Office files that have been encrypted by using a sensitivity label. The label can be applied in Office for the web, or in Office desktop apps and uploaded or saved in SharePoint and OneDrive. Until you enable this feature, these services can't process encrypted files, which means that coauthoring, eDiscovery, data loss prevention, search, and other collaborative features don't work for these files.
After you enable sensitivity labels for Office files in SharePoint and OneDrive, for new and changed files that have a sensitivity label that applies encryption with a cloud-based key (and doesn't use [Double Key Encryption](double-key-encryption.md)):
Watch the following video (no audio) to see the new capabilities in action:
You always have the choice to disable sensitivity labels for Office files in SharePoint and OneDrive ([opt-out](#how-to-disable-sensitivity-labels-for-sharepoint-and-onedrive-opt-out)) at any time.
-If you are currently protecting documents in SharePoint by using SharePoint Information Rights Management (IRM), be sure to check the [SharePoint Information Rights Management (IRM) and sensitivity labels](#sharepoint-information-rights-management-irm-and-sensitivity-labels) section on this page.
+If you're currently protecting documents in SharePoint by using SharePoint Information Rights Management (IRM), be sure to check the [SharePoint Information Rights Management (IRM) and sensitivity labels](#sharepoint-information-rights-management-irm-and-sensitivity-labels) section on this page.
[!INCLUDE [purview-preview](../includes/purview-preview.md)]
Uploading a labeled document, and then extracting and displaying that sensitivit
- **Excel**: .xls, .xlt, .xla, .xlc, .xlm, .xlw, .xlsx, .xltx, .xlsm, .xltm, .xlam, .xlsb - **PowerPoint**: .ppt, .pot, .pps, .ppa, .pptx, .ppsx, .ppsxm, .potx, .ppam, .pptm, .potm, .ppsm
+## Support for labels configured for user-defined permissions
+
+Rolling out in preview, there's now limited support for labels configured for user-defined permissions. This encryption configuration refers to the setting **Let users assign permissions when they apply the label** and the checkbox **In Word, PowerPoint, and Excel, prompt users to specify permissions** is selected:
+
+- When a document is labeled with user-defined permissions and uploaded to SharePoint or OneDrive, these services can now process the document so that it can be opened and edited in Office for the web, the label name is displayed in the **Sensitivity** column, and the encrypted file is returned in search results for the label ID.
+
+- Labels with this configuration are now displayed in Office for the web. However, currently, users can't apply these labels in Office for the web and if these labels are selected, users see a message instructing them to apply the label using a desktop app.
+
+- The contents currently can't be inspected for search, data loss prevention, or eDiscovery.
+
+To support AutoSave and co-authoring for these encrypted files using a desktop app, you must have [enabled co-authoring for files encrypted with sensitivity labels](sensitivity-labels-coauthoring.md) and for your Microsoft 365 Apps for enterprise:
+- **Windows**: Minimum version of 16.0.16327 from Current Channel (Preview), or minimal version of 16.0.16414 from the Beta Channel
+- **macOS**: Minimum version of 16.51 from Current Channel (Preview) or from the Beta Channel
+
+> [!NOTE]
+> If you use earlier versions and co-authoring is enabled for your tenant, AutoSave and co-authoring will be temporarily disabled for documents after users apply a sensitivity label that's configured with user-defined permissions, or users change the permissions. After they close the document and wait 10 minutes, these features are available again.
+
+This preview of labels configured for user-defined permissions is automatically applied to tenants. To opt out, contact [Microsoft Support](../admin/get-help-support.md) and request to turn off this preview.
+ ## Limitations -- SharePoint and OneDrive can't process some files that are labeled and encrypted from Office desktop apps when these files contain PowerQuery data, data stored by custom add-ins, or custom XML parts such as Cover Page Properties, content type schemas, custom Document Information Panel, and Custom XSN. This limitation also applies to files that include a [bibliography](https://support.microsoft.com/en-us/office/create-a-bibliography-citations-and-references-17686589-4824-4940-9c69-342c289fa2a5), and to files that have a [Document ID](https://support.microsoft.com/office/enable-and-configure-unique-document-ids-ea7fee86-bd6f-4cc8-9365-8086e794c984) added when they are uploaded.
+- SharePoint and OneDrive can't process some files that are labeled and encrypted from Office desktop apps when these files contain PowerQuery data, data stored by custom add-ins, or custom XML parts such as Cover Page Properties, content type schemas, custom Document Information Panel, and Custom XSN. This limitation also applies to files that include a [bibliography](https://support.microsoft.com/en-us/office/create-a-bibliography-citations-and-references-17686589-4824-4940-9c69-342c289fa2a5), and to files that have a [Document ID](https://support.microsoft.com/office/enable-and-configure-unique-document-ids-ea7fee86-bd6f-4cc8-9365-8086e794c984) added when they're uploaded.
For these files, either apply a label without encryption so that they can later be opened in Office on the web, or instruct users to open the files in their desktop apps. Files that are labeled and encrypted only in Office on the web aren't affected. - SharePoint and OneDrive don't automatically apply sensitivity labels to existing files that have been encrypted using the older-style Azure Information Protection labels that used to be published from the Azure portal. For the features to work after you enable sensitivity labels for Office files in SharePoint and OneDrive, download these files and then upload them to their original location in SharePoint or OneDrive. -- SharePoint and OneDrive can't process encrypted files when the label that applied the encryption has any of the following [configurations for encryption](encryption-sensitivity-labels.md#configure-encryption-settings):
- - **Let users assign permissions when they apply the label** and the checkbox **In Word, PowerPoint, and Excel, prompt users to specify permissions** is selected. This setting is sometimes referred to as "user-defined permissions".
+- Users can't apply [sensitivity labels configured for user-defined permissions](#support-for-labels-configured-for-user-defined-permissions) while using Office for the web.
+
+- SharePoint and OneDrive can't process encrypted files when the label that applied the encryption has either of the following [configurations for encryption](encryption-sensitivity-labels.md#configure-encryption-settings):
- **User access to content expires** is set to a value other than **Never**. - **Double Key Encryption** is selected.
- For labels with any of these encryption configurations, the labels aren't displayed to users in Office for the web. If they are parent labels, this means that users wonΓÇÖt see that label's sublabels, even if the sublabels aren't configured to apply encryption.
+ For labels with either of these encryption configurations, the labels aren't displayed to users in Office for the web. If they're parent labels, this means that users wonΓÇÖt see that label's sublabels, even if the sublabels aren't configured to apply encryption.
- Additionally, the new capabilities can't be used with labeled documents that already have these encryption settings. For example, these documents won't be returned in search results, even if they are updated.
+ Additionally, the new capabilities can't be used with labeled documents that already have these encryption settings. For example, these documents won't be returned in search results, even if they're updated.
- For performance reasons, when you upload or save a document to SharePoint and the file's label doesn't apply encryption, the **Sensitivity** column in the document library can take a while to display the label name. Factor in this delay if you use scripts or automation that depend on the label name in this column.
Uploading a labeled document, and then extracting and displaying that sensitivit
- By default, Office desktop apps and mobile apps don't support co-authoring for files that are labeled with encryption. These apps continue to open labeled and encrypted files in exclusive editing mode. To change the default behavior, see [Enable co-authoring for files encrypted with sensitivity labels](sensitivity-labels-coauthoring.md). -- If an admin changes settings for a published label that's already applied to files downloaded to users' sync client, users might be unable to save changes they make to the file in their OneDrive Sync folder. This scenario applies to files that are labeled with encryption, and also when the label change is from a label that didn't apply encryption to a label that does apply encryption. Users see a [red circle with a white cross icon error](https://support.office.com/article/what-do-the-onedrive-icons-mean-11143026-8000-44f8-aaa9-67c985aa49b3), and they are asked to save new changes as a separate copy. Instead, they can close and reopen the file, or use Office for the web.
+- If an admin changes settings for a published label that's already applied to files downloaded to users' sync client, users might be unable to save changes they make to the file in their OneDrive Sync folder. This scenario applies to files that are labeled with encryption, and also when the label change is from a label that didn't apply encryption to a label that does apply encryption. Users see a [red circle with a white cross icon error](https://support.office.com/article/what-do-the-onedrive-icons-mean-11143026-8000-44f8-aaa9-67c985aa49b3), and they're asked to save new changes as a separate copy. Instead, they can close and reopen the file, or use Office for the web.
- Sensitivity labels that are configured for [automatic labeling](apply-sensitivity-label-automatically.md#how-to-configure-auto-labeling-for-office-apps) are supported for Office on the web when the label settings for conditions are for sensitive information types only. Automatic labeling isn't supported for Office on the web when the conditions include trainable classifiers.
Before you run the PowerShell command to enable sensitivity labels for Office fi
5. Choose between the x64 and x86 .msi file. Download the x64 file if you run the 64-bit version of Windows or the x86 file if you run the 32-bit version. If you donΓÇÖt know, see [Which version of Windows operating system am I running?](https://support.microsoft.com/help/13443/windows-which-operating-system)
-6. After you have downloaded the file, run the file and follow the steps in the Setup Wizard.
+6. After you have downloaded the file, run the file and follow the steps in the Setup configuration.
#### Run the PowerShell command to enable support for sensitivity labels
To enable the new capabilities, use the [Set-SPOTenant](/powershell/module/share
When you use sensitivity labels with SharePoint and OneDrive, keep in mind that you need to allow for replication time when you publish new sensitivity labels or update existing sensitivity labels. This is especially important for new labels that apply encryption.
-For example: You create and publish a new sensitivity label that applies encryption and it very quickly appears in a user's desktop app. The user applies this label to a document and then uploads it to SharePoint or OneDrive. If the label replication hasn't completed for the service, the new capabilities won't be applied to that document on upload. As a result, the document won't be returned in search or for eDiscovery and the document can't be opened in Office for the web.
+For example: You create and publish a new sensitivity label that applies encryption and it very quickly appears in a user's desktop app. The user applies this label to a document and then uploads it to SharePoint or OneDrive. If the label replication hasn't completed for the service, the new capabilities won't be applied to that document on upload. As a result, the document won't be returned in search or for eDiscovery, and the document can't be opened in Office for the web.
For more information about the timing of labels, see [When to expect new labels and changes to take effect](create-sensitivity-labels.md#when-to-expect-new-labels-and-changes-to-take-effect).
-As a safeguard, we recommend publishing new labels to just a few test users first, wait for at least one hour, and then verify the label behavior on SharePoint and OneDrive. Wait at least a day before making the label available to more users by either adding more users to the existing label policy, or adding the label to an existing label policy for your standard users. By the time your standard users see the label, it has already synchronized to SharePoint and OneDrive.
+As a safeguard, we recommend publishing new labels to just a few test users first, wait for at least one hour, and then verify the label behavior on SharePoint and OneDrive. Wait at least a day before you make the label available to more users by either adding more users to the existing label policy, or adding the label to an existing label policy for your standard users. By the time your standard users see the label, it has already synchronized to SharePoint and OneDrive.
## SharePoint Information Rights Management (IRM) and sensitivity labels
compliance Sensitivity Labels Versions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-versions.md
The numbers listed are the minimum Office application versions required for each
|[Dynamic markings with variables](sensitivity-labels-office-apps.md#dynamic-markings-with-variables) |Current Channel: 2010+ <br /><br> Monthly Enterprise Channel: 2010+ <br /><br> Semi-Annual Enterprise Channel: 2102+ |16.42+ |2.42+ |16.0.13328+ |[Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) | |[Assign permissions now](encryption-sensitivity-labels.md#assign-permissions-now) |Current Channel: 1910+ <br /><br> Monthly Enterprise Channel: 1910+ <br /><br> Semi-Annual Enterprise Channel: 2002+ |16.21+ |2.21+ |16.0.11231+ |[Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) | |[Let users assign permissions: <br /> - Prompt users for custom permissions (users and groups)](encryption-sensitivity-labels.md#let-users-assign-permissions) |Current Channel: 2004+ <br /><br> Monthly Enterprise Channel: 2004+ <br /><br> Semi-Annual Enterprise Channel: 2008+ |16.35+ |Under review | Under review | Under review |
-|[Let users assign permissions: <br /> - Prompt users for custom permissions (users, groups, and organizations)](encryption-sensitivity-labels.md#support-for-organization-wide-custom-permissions)|Current Channel: 2212+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+|Under review|Under review|Under review| Under review|
+|[Let users assign permissions: <br /> - Prompt users for custom permissions (users, groups, and organizations)](encryption-sensitivity-labels.md#support-for-organization-wide-custom-permissions)|Current Channel: 2212+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+|Under review|Under review|Under review| [Preview: Rolling out](sensitivity-labels-sharepoint-onedrive-files.md#support-for-labels-configured-for-user-defined-permissions)|
|[Audit label-related user activity](sensitivity-labels-office-apps.md#auditing-labeling-activities): <br /> - Excludes encryption details |Current Channel: 2011+ <br /><br> Monthly Enterprise Channel: 2011+ <br /><br> Semi-Annual Enterprise Channel: 2108+ |16.43+ |2.46+ |16.0.13628+ |Yes | |[Audit label-related user activity](sensitivity-labels-office-apps.md#auditing-labeling-activities): <br /> - Includes encryption details |Current Channel: 2301+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |16.70+ |2.70+ |16.0.16130+ |Under review | |[Require users to apply a label to their email and documents](sensitivity-labels-office-apps.md#require-users-to-apply-a-label-to-their-email-and-documents) |Current Channel: 2101+ <br /><br> Monthly Enterprise Channel: 2101+ <br /><br> Semi-Annual Enterprise Channel: 2108+ |16.45+ |2.47+ |16.0.13628+ |[Yes - opt-in](sensitivity-labels-sharepoint-onedrive-files.md) |
compliance Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/whats-new.md
f1.keywords:
Previously updated : 06/08/2023 Last updated : 06/19/2023 audience: Admin
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
### Sensitivity labels - **General availability (GA)**: Now rolling out, Outlook for Android and Outlook for iOS support a setting for mandatory labeling that you can configure with Microsoft Intune to [prompt users to select a sensitivity label when they first compose an email](sensitivity-labels-office-apps.md#for-outlook-mobile-change-when-users-are-prompted-for-a-label) instead of when they send it.-- **In preview**: Now rolling out, OneDrive locations for [auto-labeling policies](apply-sensitivity-label-automatically.md#how-to-configure-auto-labeling-policies-for-sharepoint-onedrive-and-exchange) are changing from sites specified by URLs to users and groups. This change of configuration means that [administrative units](microsoft-365-compliance-center-permissions.md#administrative-units-preview) are now supported for OneDrive auto-labeling policies. Any existing OneDrive sites specified in auto-labeling policies as site URLs will continue to work but before you can add more OneDrive locations, or for restricted admins, you must first delete any existing OneDrive sites specified as URLs. Groups supported: distribution groups, Microsoft 365 groups, mail-enabled security groups, and security groups.
+- **In preview**: Now rolling out, OneDrive locations for [auto-labeling policies](apply-sensitivity-label-automatically.md#how-to-configure-auto-labeling-policies-for-sharepoint-onedrive-and-exchange) are changing from sites specified by URLs to users and groups. This change of configuration means that [administrative units](microsoft-365-compliance-center-permissions.md#administrative-units-preview) are now supported for OneDrive auto-labeling policies. Any existing OneDrive sites specified in auto-labeling policies as site URLs will continue to work but before you can add more OneDrive locations, or for restricted admins, you must first delete any existing OneDrive sites specified as URLs. Groups supported: distribution groups, Microsoft 365 groups, mail-enabled security groups, and security groups.
+- **In preview**: Now rolling out in preview, [limited support for labels configured for user-defined permissions](sensitivity-labels-sharepoint-onedrive-files.md#support-for-labels-configured-for-user-defined-permissions) for Office on the web, SharePoint and OneDrive.
- **Removal of limitations for Teams when using sensitivity labels**: Several previous limitations are removed for [Teams protected meetings](sensitivity-labels-meetings.md), which include Safari and Firefox support to prevent copy chat, support for virtual desktop infrastructure (VDI), policy settings for justification for changing a label, mandatory labeling, and a help link to a custom help page, and more methods are now supported to prevent copying chat. ## May 2023
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
### Sensitivity labels -- **Rolling out**: [PDF support for Office on the web](sensitivity-labels-office-apps.md#pdf-support) so that when Word, Excel, and PowerPoint converts a labeled Office document into a PDF document, the label with any content markings persists.
+- **Rolling out**: [PDF support for Office on the web](sensitivity-labels-office-apps.md#pdf-support) so that when Word, Excel, and PowerPoint convert a labeled Office document into a PDF document, the label with any content markings persists.
- **In preview**: Built-in labeling support for [Double Key Encryption (DKE)](encryption-sensitivity-labels.md#double-key-encryption) is in preview as a parity feature for the AIP add-in. ## April 2023
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
- **Rolling out in preview**: As a parity feature for the AIP add-in, built-in labeling for Windows supports the configuration of a [default sublabel for a parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label). - **Rolling out in preview**: Word, Excel, and PowerPoint in Office for Mac also supports the [sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) and [label colors](sensitivity-labels-office-apps.md#label-colors).-- The earliest version for the AIP add-in to be [disabled by default in Office apps](sensitivity-labels-aip.md#how-to-disable-the-aip-add-in-to-use-built-in-labeling-for-office-apps) for the Current Channel and Monthly Enterprise Channel is now version 2302. The minimum version for the Semi-Annual Channel hasn't changed.
+- The earliest version for the AIP add-in to be [disabled by default in Office apps](sensitivity-labels-aip.md#how-to-disable-the-aip-add-in-to-use-built-in-labeling-for-office-apps) for the Current Channel and Monthly Enterprise Channel is now version 2302. The minimum version for the Semi-Annual Channel hasn't changed.
frontline Browser Join https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/browser-join.md
Here are the browsers that are currently supported. We support the latest versio
|Platform |Google Chrome |Apple Safari |Microsoft Edge (Chromium)| ||:|:|::| |Android | &#x2714; &sup1; | | |
-|iOS | | &#x2714; &sup1; &sup2; | |
+|iOS | &#x2714; | &#x2714; &sup1; &sup2; | |
|macOS | &#x2714; | &#x2714;| | |Windows | &#x2714; | | &#x2714; | |Ubuntu/Linux | &#x2714; | | |
frontline Virtual Appointments Toolkit https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/virtual-appointments-toolkit.md
You can link to your organizationΓÇÖs cancellation and rescheduling policy here,
**What equipment do I need for a virtual appointment?**
-Customers can join a virtual appointment from any web browser or through the Microsoft Teams app. List here if your organization has additional specifications, such as a high-quality webcam or microphone. If your healthcare organization has integrated your Electronic Health Record (EHR) system with Teams, patients can join visits from your healthcare portal.
+Customers can join a virtual appointment from any [supported web browser](browser-join.md#supported-browsers) or through the Microsoft Teams app. List here if your organization has additional specifications, such as a high-quality webcam or microphone. If your healthcare organization has integrated your Electronic Health Record (EHR) system with Teams, patients can join visits from your healthcare portal.
**How do I join a virtual appointment?**
includes Microsoft 365 Content Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/microsoft-365-content-updates.md
+## Week of June 12, 2023
++
+| Published On |Topic title | Change |
+|||--|
+| 6/12/2023 | [Monthly security summary reporting in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/monthly-security-summary-report?view=o365-worldwide) | added |
+| 6/12/2023 | [Create and publish sensitivity labels](/microsoft-365/compliance/create-sensitivity-labels?view=o365-worldwide) | modified |
+| 6/12/2023 | [Apply encryption using sensitivity labels](/microsoft-365/compliance/encryption-sensitivity-labels?view=o365-worldwide) | modified |
+| 6/12/2023 | [Learn about sensitivity labels](/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide) | modified |
+| 6/12/2023 | [What's new in Microsoft Defender for Endpoint on Linux](/microsoft-365/security/defender-endpoint/linux-whatsnew?view=o365-worldwide) | modified |
+| 6/12/2023 | [Run the client analyzer on macOS or Linux](/microsoft-365/security/defender-endpoint/run-analyzer-macos-linux?view=o365-worldwide) | modified |
+| 6/12/2023 | [Create and manage custom detection rules in Microsoft 365 Defender](/microsoft-365/security/defender/custom-detection-rules?view=o365-worldwide) | modified |
+| 6/12/2023 | [Anti-malware protection](/microsoft-365/security/office-365-security/anti-malware-protection-about?view=o365-worldwide) | modified |
+| 6/12/2023 | [Anti-malware protection FAQ](/microsoft-365/security/office-365-security/anti-malware-protection-faq?view=o365-worldwide) | modified |
+| 6/12/2023 | [How EOP validates the From address to prevent phishing](/microsoft-365/security/office-365-security/anti-phishing-from-email-address-validation?view=o365-worldwide) | modified |
+| 6/12/2023 | [Impersonation insight](/microsoft-365/security/office-365-security/anti-phishing-mdo-impersonation-insight?view=o365-worldwide) | modified |
+| 6/12/2023 | [Anti-phishing protection](/microsoft-365/security/office-365-security/anti-phishing-protection-about?view=o365-worldwide) | modified |
+| 6/12/2023 | [Anti-spoofing protection](/microsoft-365/security/office-365-security/anti-phishing-protection-spoofing-about?view=o365-worldwide) | modified |
+| 6/12/2023 | [Tune anti-phishing protection](/microsoft-365/security/office-365-security/anti-phishing-protection-tuning?view=o365-worldwide) | modified |
+| 6/12/2023 | [ASF settings in EOP](/microsoft-365/security/office-365-security/anti-spam-policies-asf-settings-about?view=o365-worldwide) | modified |
+| 6/12/2023 | [Mail flow intelligence](/microsoft-365/security/office-365-security/connectors-mail-flow-intelligence?view=o365-worldwide) | modified |
+| 6/12/2023 | [Enable autoexpanding archiving](/microsoft-365/compliance/enable-autoexpanding-archiving?view=o365-worldwide) | modified |
+| 6/12/2023 | [Microsoft Purview Information Protection](/microsoft-365/compliance/information-protection?view=o365-worldwide) | modified |
+| 6/12/2023 | [Microsoft Defender Antivirus security intelligence and product updates](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates?view=o365-worldwide) | modified |
+| 6/12/2023 | [Microsoft recommendations for EOP and Defender for Office 365 security settings](/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365?view=o365-worldwide) | modified |
+| 6/13/2023 | [Migrate business email and calendar from Google Workspace](/microsoft-365/admin/moveto-microsoft-365/migrate-email?view=o365-worldwide) | modified |
+| 6/13/2023 | [Create eDiscovery holds in a eDiscovery (Standard) case](/microsoft-365/compliance/ediscovery-create-holds?view=o365-worldwide) | modified |
+| 6/13/2023 | [How Sender Policy Framework (SPF) prevents spoofing](/microsoft-365/security/office-365-security/email-authentication-anti-spoofing?view=o365-worldwide) | modified |
+| 6/13/2023 | [Overview of freeform document processing in Microsoft Syntex](/microsoft-365/syntex/freeform-document-processing-overview) | modified |
+| 6/13/2023 | [Import a term set using a SKOS-based format](/microsoft-365/syntex/import-term-set-skos) | modified |
+| 6/13/2023 | [Overview of prebuilt models in Microsoft Syntex](/microsoft-365/syntex/prebuilt-overview) | modified |
+| 6/13/2023 | [Push content types to a hub](/microsoft-365/syntex/push-content-type-to-hub) | modified |
+| 6/13/2023 | [SKOS format reference for SharePoint taxonomy](/microsoft-365/syntex/skos-format-reference) | modified |
+| 6/13/2023 | [Term store reports](/microsoft-365/syntex/term-store-analytics) | modified |
+| 6/14/2023 | [Manage Loop experiences (Loop workspaces and Loop components) in SharePoint](/microsoft-365/loop/loop-components-sharepoint?view=o365-worldwide) | added |
+| 6/14/2023 | [Overview of Loop components in Teams](/microsoft-365/loop/loop-components-teams?view=o365-worldwide) | added |
+| 6/14/2023 | [Mail flow in EOP](/microsoft-365/security/office-365-security/mail-flow-about?view=o365-worldwide) | modified |
+| 6/14/2023 | [Add support for anonymous inbound email over IPv6](/microsoft-365/security/office-365-security/mail-flow-inbound-ipv6-support-about?view=o365-worldwide) | modified |
+| 6/14/2023 | [Troubleshooting mail sent to Microsoft 365](/microsoft-365/security/office-365-security/mail-flow-troubleshooting?view=o365-worldwide) | modified |
+| 6/14/2023 | [Anti-spam message headers](/microsoft-365/security/office-365-security/message-headers-eop-mdo?view=o365-worldwide) | modified |
+| 6/14/2023 | [Microsoft Defender for Identity in Microsoft 365 Defender](/microsoft-365/security/defender/microsoft-365-security-center-mdi?view=o365-worldwide) | modified |
+| 6/14/2023 | [Give mailbox permissions to another user - Admin Help](/microsoft-365/admin/add-users/give-mailbox-permissions-to-another-user?view=o365-worldwide) | modified |
+| 6/14/2023 | [About the Microsoft Purview Compliance Manager premium assessment trial](/microsoft-365/compliance/compliance-easy-trials-compliance-manager-assessments?view=o365-worldwide) | modified |
+| 6/14/2023 | [Encryption in Microsoft 365](/microsoft-365/compliance/encryption?view=o365-worldwide) | modified |
+| 6/14/2023 | [Technical reference details about encryption](/microsoft-365/compliance/technical-reference-details-about-encryption?view=o365-worldwide) | modified |
+| 6/14/2023 | [Microsoft Defender Antivirus compatibility with other security products](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-compatibility?view=o365-worldwide) | modified |
+| 6/14/2023 | [Configuration analyzer for security policies](/microsoft-365/security/office-365-security/configuration-analyzer-for-security-policies?view=o365-worldwide) | modified |
+| 6/14/2023 | [Configure junk email settings on Exchange Online mailboxes](/microsoft-365/security/office-365-security/configure-junk-email-settings-on-exo-mailboxes?view=o365-worldwide) | modified |
+| 6/14/2023 | [Configure the default connection filter policy](/microsoft-365/security/office-365-security/connection-filter-policies-configure?view=o365-worldwide) | modified |
+| 6/14/2023 | [Respond to a compromised connector in Microsoft 365](/microsoft-365/security/office-365-security/connectors-detect-respond-to-compromise?view=o365-worldwide) | modified |
+| 6/14/2023 | [Mail flow intelligence](/microsoft-365/security/office-365-security/connectors-mail-flow-intelligence?view=o365-worldwide) | modified |
+| 6/14/2023 | [Remove blocked connectors from the Restricted entities page in Microsoft 365](/microsoft-365/security/office-365-security/connectors-remove-blocked?view=o365-worldwide) | modified |
+| 6/14/2023 | [Create blocked sender lists](/microsoft-365/security/office-365-security/create-block-sender-lists-in-office-365?view=o365-worldwide) | modified |
+| 6/14/2023 | [Create safe sender lists](/microsoft-365/security/office-365-security/create-safe-sender-lists-in-office-365?view=o365-worldwide) | modified |
+| 6/14/2023 | [What's new in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365-whats-new?view=o365-worldwide) | modified |
+| 6/14/2023 | [Detect and Remediate Illicit Consent Grants](/microsoft-365/security/office-365-security/detect-and-remediate-illicit-consent-grants?view=o365-worldwide) | modified |
+| 6/14/2023 | [Learn about data loss prevention](/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide) | modified |
+| 6/14/2023 | [Data Loss Prevention policy reference](/microsoft-365/compliance/dlp-policy-reference?view=o365-worldwide) | modified |
+| 6/14/2023 | View the reports for data loss prevention | removed |
+| 6/14/2023 | [Step 7. Implement data loss prevention (DLP) with information protection capabilities](/microsoft-365/solutions/manage-devices-with-intune-dlp-mip?view=o365-worldwide) | modified |
+| 6/15/2023 | [Microsoft 365 admin center Viva Goals activity reports](/microsoft-365/admin/activity-reports/viva-goals-activity?view=o365-worldwide) | added |
+| 6/15/2023 | [Email authentication in Microsoft 365](/microsoft-365/security/office-365-security/email-authentication-about?view=o365-worldwide) | modified |
+| 6/15/2023 | [How Sender Policy Framework (SPF) prevents spoofing](/microsoft-365/security/office-365-security/email-authentication-anti-spoofing?view=o365-worldwide) | modified |
+| 6/15/2023 | [How to use DKIM for email in your custom domain](/microsoft-365/security/office-365-security/email-authentication-dkim-configure?view=o365-worldwide) | modified |
+| 6/15/2023 | [Support for validation of Domain Keys Identified Mail (DKIM) signed messages](/microsoft-365/security/office-365-security/email-authentication-dkim-support-about?view=o365-worldwide) | modified |
+| 6/15/2023 | [Use DMARC to validate email, setup steps](/microsoft-365/security/office-365-security/email-authentication-dmarc-configure?view=o365-worldwide) | modified |
+| 6/15/2023 | [Set up SPF to help prevent spoofing](/microsoft-365/security/office-365-security/email-authentication-spf-configure?view=o365-worldwide) | modified |
+| 6/15/2023 | [Email security with Threat Explorer in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/email-security-in-microsoft-defender?view=o365-worldwide) | modified |
+| 6/15/2023 | [Exchange Online Protection (EOP) overview](/microsoft-365/security/office-365-security/eop-about?view=o365-worldwide) | modified |
+| 6/15/2023 | [Help and support for EOP](/microsoft-365/security/office-365-security/help-and-support-for-eop?view=o365-worldwide) | modified |
+| 6/15/2023 | [Order and precedence of email protection](/microsoft-365/security/office-365-security/how-policies-and-protections-are-combined?view=o365-worldwide) | modified |
+| 6/15/2023 | [Investigate malicious email that was delivered in Microsoft 365, Find and investigate malicious email](/microsoft-365/security/office-365-security/investigate-malicious-email-that-was-delivered?view=o365-worldwide) | modified |
+| 6/15/2023 | [Mail flow in EOP](/microsoft-365/security/office-365-security/mail-flow-about?view=o365-worldwide) | modified |
+| 6/15/2023 | [Add support for anonymous inbound email over IPv6](/microsoft-365/security/office-365-security/mail-flow-inbound-ipv6-support-about?view=o365-worldwide) | modified |
+| 6/15/2023 | [Microsoft Defender for Office 365 email entity page](/microsoft-365/security/office-365-security/mdo-email-entity-page?view=o365-worldwide) | modified |
+| 6/15/2023 | [Microsoft Defender for Office 365 permissions in the Microsoft 365 Defender portal](/microsoft-365/security/office-365-security/mdo-portal-permissions?view=o365-worldwide) | modified |
+| 6/15/2023 | [Anti-spam message headers](/microsoft-365/security/office-365-security/message-headers-eop-mdo?view=o365-worldwide) | modified |
+| 6/15/2023 | [Message trace in the Microsoft 365 Defender portal](/microsoft-365/security/office-365-security/message-trace-scc?view=o365-worldwide) | modified |
+| 6/16/2023 | [Microsoft 365 Lighthouse frequently asked questions (FAQs)](/microsoft-365/lighthouse/m365-lighthouse-faq?view=o365-worldwide) | modified |
+| 6/16/2023 | [Alert classification for suspicious email forwarding activity](/microsoft-365/security/defender/alert-grading-playbook-email-forwarding?view=o365-worldwide) | modified |
+| 6/16/2023 | [Data loss prevention and Microsoft Teams](/microsoft-365/compliance/dlp-microsoft-teams?view=o365-worldwide) | modified |
+| 6/16/2023 | [Migrate Exchange Online DLP policies to Microsoft Purview compliance portal](/microsoft-365/compliance/dlp-migrate-exo-policy-to-unified-dlp?view=o365-worldwide) | modified |
+| 6/16/2023 | [Use the Microsoft Purview Data Loss Prevention migration assistant for Symantec](/microsoft-365/compliance/dlp-migration-assistant-for-symantec-use?view=o365-worldwide) | modified |
+| 6/16/2023 | [Get started with data loss prevention on-premises repositories](/microsoft-365/compliance/dlp-on-premises-scanner-get-started?view=o365-worldwide) | modified |
+| 6/16/2023 | [Learn about data loss prevention on-premises repositories](/microsoft-365/compliance/dlp-on-premises-scanner-learn?view=o365-worldwide) | modified |
+| 6/16/2023 | [Use data loss prevention on-premises repositories](/microsoft-365/compliance/dlp-on-premises-scanner-use?view=o365-worldwide) | modified |
+| 6/16/2023 | [Plan for data loss prevention](/microsoft-365/compliance/dlp-overview-plan-for-dlp?view=o365-worldwide) | modified |
+| 6/16/2023 | [Data loss prevention policy tip reference for Outlook on the Web](/microsoft-365/compliance/dlp-owa-policy-tips?view=o365-worldwide) | modified |
+| 6/16/2023 | [Design a Data loss prevention policy](/microsoft-365/compliance/dlp-policy-design?view=o365-worldwide) | modified |
+| 6/16/2023 | [Data Loss Prevention policy reference](/microsoft-365/compliance/dlp-policy-reference?view=o365-worldwide) | modified |
+| 6/16/2023 | [Data Loss Prevention policy tips reference](/microsoft-365/compliance/dlp-policy-tips-reference?view=o365-worldwide) | modified |
+| 6/16/2023 | [Get started with DLP for Power BI](/microsoft-365/compliance/dlp-powerbi-get-started?view=o365-worldwide) | modified |
+| 6/16/2023 | [Use sensitivity labels as conditions in DLP policies](/microsoft-365/compliance/dlp-sensitivity-label-as-condition?view=o365-worldwide) | modified |
+| 6/16/2023 | [Share DLP alerts](/microsoft-365/compliance/dlp-share-alerts?view=o365-worldwide) | modified |
+| 6/16/2023 | [Test your DLP policies](/microsoft-365/compliance/dlp-test-dlp-policies?view=o365-worldwide) | modified |
+| 6/16/2023 | [Use DLP policies for non-Microsoft cloud apps](/microsoft-365/compliance/dlp-use-policies-non-microsoft-cloud-apps?view=o365-worldwide) | modified |
+| 6/16/2023 | [Get started with Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-getting-started?view=o365-worldwide) | modified |
+| 6/16/2023 | [Learn about Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-learn-about?view=o365-worldwide) | modified |
+| 6/16/2023 | [Using Endpoint DLP](/microsoft-365/compliance/endpoint-dlp-using?view=o365-worldwide) | modified |
+| 6/16/2023 | [Get started with the default DLP policy](/microsoft-365/compliance/get-started-with-the-default-dlp-policy?view=o365-worldwide) | modified |
+| 6/16/2023 | [How DLP works with Compliance portal & Exchange admin center](/microsoft-365/compliance/how-dlp-works-between-admin-centers?view=o365-worldwide) | modified |
+| 6/16/2023 | [Use information barriers with SharePoint](/microsoft-365/compliance/information-barriers-sharepoint?view=o365-worldwide) | modified |
+| 6/16/2023 | [Use named entities in DLP policies](/microsoft-365/compliance/named-entities-use?view=o365-worldwide) | modified |
+| 6/16/2023 | [Create a DLP policy to protect documents](/microsoft-365/compliance/protect-documents-that-have-fci-or-other-properties?view=o365-worldwide) | modified |
+| 6/16/2023 | [Common usage scenarios for sensitive information types](/microsoft-365/compliance/sit-common-scenarios?view=o365-worldwide) | modified |
+| 6/16/2023 | [Manage your exact data match schema](/microsoft-365/compliance/sit-use-exact-data-manage-schema?view=o365-worldwide) | modified |
+| 6/16/2023 | [Device health Microsoft Defender Antivirus health report](/microsoft-365/security/defender-endpoint/device-health-microsoft-defender-antivirus-health?view=o365-worldwide) | modified |
++ ## Week of June 05, 2023
| 5/19/2023 | [Assign eDiscovery permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/ediscovery-assign-permissions?view=o365-worldwide) | modified | | 5/19/2023 | [Get started with eDiscovery (Premium)](/microsoft-365/compliance/ediscovery-premium-get-started?view=o365-worldwide) | modified | | 5/19/2023 | [Get started with eDiscovery (Standard)](/microsoft-365/compliance/ediscovery-standard-get-started?view=o365-worldwide) | modified |--
-## Week of May 08, 2023
--
-| Published On |Topic title | Change |
-|||--|
-| 5/8/2023 | [Security Operations Guide for Defender for Endpoint](/microsoft-365/security/defender-endpoint/mde-sec-ops-guide?view=o365-worldwide) | added |
-| 5/8/2023 | [Manual deployment for Microsoft Defender for Endpoint on macOS](/microsoft-365/security/defender-endpoint/mac-install-manually?view=o365-worldwide) | modified |
-| 5/8/2023 | [Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro](/microsoft-365/security/defender-endpoint/mac-jamfpro-policies?view=o365-worldwide) | modified |
-| 5/8/2023 | [Manage automation file uploads](/microsoft-365/security/defender-endpoint/manage-automation-file-uploads?view=o365-worldwide) | modified |
-| 5/8/2023 | [Investigate users in Microsoft 365 Defender](/microsoft-365/security/defender/investigate-users?view=o365-worldwide) | modified |
-| 5/8/2023 | [Get started using Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-get-started?view=o365-worldwide) | modified |
-| 5/8/2023 | [Manage quarantined messages and files as an admin](/microsoft-365/security/office-365-security/quarantine-admin-manage-messages-files?view=o365-worldwide) | modified |
-| 5/8/2023 | [Administration guide for Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-admin-guide?view=o365-worldwide) | added |
-| 5/8/2023 | [Security operations guide for Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-security-operations-guide?view=o365-worldwide) | added |
-| 5/8/2023 | Add a new user to your network and systems | removed |
-| 5/8/2023 | [Maintain your environment](/microsoft-365/business-premium/m365bp-maintain-environment?view=o365-worldwide) | modified |
-| 5/8/2023 | [Secure managed and unmanaged devices](/microsoft-365/business-premium/m365bp-managed-unmanaged-devices?view=o365-worldwide) | modified |
-| 5/8/2023 | Remove company data from devices | removed |
-| 5/8/2023 | Reset Windows devices to their factory settings | removed |
-| 5/8/2023 | Reset passwords | removed |
-| 5/8/2023 | Security operations guide for Microsoft 365 Business Premium | removed |
-| 5/8/2023 | [Microsoft Purview Compliance Manager regulations list](/microsoft-365/compliance/compliance-manager-templates-list?view=o365-worldwide) | modified |
-| 5/8/2023 | Security Operations Guide for Defender for Endpoint | removed |
-| 5/9/2023 | [Security administration guide for Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-security-admin-guide?view=o365-worldwide) | added |
-| 5/9/2023 | [Document compliance with Microsoft Syntex](/microsoft-365/syntex/scenario-document-compliance) | added |
-| 5/9/2023 | [Find content details with Microsoft Syntex](/microsoft-365/syntex/scenario-find-content-details) | added |
-| 5/9/2023 | [Generate documents in bulk with Microsoft Syntex](/microsoft-365/syntex/scenario-generate-documents-bulk) | added |
-| 5/9/2023 | [Automatically generate routine documents with Microsoft Syntex](/microsoft-365/syntex/scenario-generate-routine-documents) | added |
-| 5/9/2023 | [Handle incoming documents with Microsoft Syntex](/microsoft-365/syntex/scenario-handle-incoming-documents) | added |
-| 5/9/2023 | [Make information easier to find with Microsoft Syntex](/microsoft-365/syntex/scenario-organize-repositories) | added |
-| 5/9/2023 | [Get started with Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-getting-started?view=o365-worldwide) | modified |
-| 5/9/2023 | [Get started with insider risk management](/microsoft-365/compliance/insider-risk-management-configure?view=o365-worldwide) | modified |
-| 5/9/2023 | [Create and manage insider risk management policies](/microsoft-365/compliance/insider-risk-management-policies?view=o365-worldwide) | modified |
-| 5/9/2023 | [Get started with insider risk management settings](/microsoft-365/compliance/insider-risk-management-settings?view=o365-worldwide) | modified |
-| 5/9/2023 | [Investigate alerts in Microsoft 365 Defender](/microsoft-365/security/defender/investigate-alerts?view=o365-worldwide) | modified |
-| 5/9/2023 | [Scenarios and use cases for Microsoft Syntex](/microsoft-365/syntex/adoption-scenarios) | modified |
-| 5/9/2023 | [Protect against malware and other threats with Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-protect-against-malware-cyberthreats?view=o365-worldwide) | modified |
-| 5/9/2023 | [Boost your security protection with Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-security-overview?view=o365-worldwide) | modified |
-| 5/9/2023 | [Top 10 ways to secure your business data with Microsoft 365 for business](/microsoft-365/business-premium/secure-your-business-data?view=o365-worldwide) | modified |
-| 5/10/2023 | [Set up Microsoft 365 Business Premium](/microsoft-365/business-premium/m365-business-premium-setup?view=o365-worldwide) | renamed |
-| 5/10/2023 | Sign up for Microsoft 365 Business Premium | removed |
-| 5/10/2023 | Get Microsoft 365 for Campaigns | removed |
-| 5/10/2023 | [Microsoft 365 Business Premium overview](/microsoft-365/business-premium/index?view=o365-worldwide) | modified |
-| 5/10/2023 | [Setup overview for Microsoft 365 for Campaigns](/microsoft-365/business-premium/m365-campaigns-setup?view=o365-worldwide) | modified |
-| 5/10/2023 | [Why choose Microsoft 365 Business Premium? Productivity and security](/microsoft-365/business-premium/why-choose-microsoft-365-business-premium?view=o365-worldwide) | modified |
-| 5/10/2023 | [Get started with Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-getting-started?view=o365-worldwide) | modified |
-| 5/10/2023 | [Microsoft 365 documentation # < 60 chars](/microsoft-365/index?view=o365-worldwide) | modified |
-| 5/10/2023 | [Set up Microsoft 365 Business Premium](/microsoft-365/business-premium/m365-business-premium-setup?view=o365-worldwide) | modified |
-| 5/10/2023 | Get Microsoft Defender for Business servers | removed |
-| 5/10/2023 | [Get Microsoft Defender for Business](/microsoft-365/security/defender-business/get-defender-business?view=o365-worldwide) | modified |
-| 5/10/2023 | [Microsoft Defender for Business frequently asked questions](/microsoft-365/security/defender-business/mdb-faq?view=o365-worldwide) | modified |
-| 5/10/2023 | [Manage devices in Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-manage-devices?view=o365-worldwide) | modified |
-| 5/10/2023 | [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/defender-endpoint-antivirus-exclusions?view=o365-worldwide) | modified |
-| 5/10/2023 | Recover from a ransomware attack | removed |
-| 5/11/2023 | [Audit log activities](/microsoft-365/compliance/audit-log-activities?view=o365-worldwide) | modified |
-| 5/11/2023 | [Search the audit log in the Microsoft Purview compliance portal](/microsoft-365/compliance/audit-log-search?view=o365-worldwide) | modified |
-| 5/11/2023 | [Search for and delete chat messages in Teams](/microsoft-365/compliance/ediscovery-search-and-delete-teams-chat-messages?view=o365-worldwide) | modified |
-| 5/11/2023 | [View Defender for Office 365 reports](/microsoft-365/security/office-365-security/reports-defender-for-office-365?view=o365-worldwide) | modified |
-| 5/11/2023 | [View email security reports](/microsoft-365/security/office-365-security/reports-email-security?view=o365-worldwide) | modified |
-| 5/11/2023 | [Malaysia passport number entity definition](/microsoft-365/compliance/sit-defn-malaysia-passport-number?view=o365-worldwide) | added |
-| 5/11/2023 | [Singapore driver's license number entity definition](/microsoft-365/compliance/sit-defn-singapore-drivers-license-number?view=o365-worldwide) | added |
-| 5/11/2023 | [Singapore passport number entity definition](/microsoft-365/compliance/sit-defn-singapore-passport-number?view=o365-worldwide) | added |
-| 5/11/2023 | [South Korea driver's license number entity definition](/microsoft-365/compliance/sit-defn-south-korea-drivers-license-number?view=o365-worldwide) | added |
-| 5/11/2023 | [South Korea passport number entity definition](/microsoft-365/compliance/sit-defn-south-korea-passport-number?view=o365-worldwide) | added |
-| 5/11/2023 | [UAE identity card number entity definition](/microsoft-365/compliance/sit-defn-uae-identity-card-number?view=o365-worldwide) | added |
-| 5/11/2023 | [UAE passport number entity definition](/microsoft-365/compliance/sit-defn-uae-passport-number?view=o365-worldwide) | added |
-| 5/11/2023 | [Data Residency Legacy Move Program](/microsoft-365/enterprise/m365-dr-legacy-move-program?view=o365-worldwide) | modified |
-| 5/11/2023 | [Overview and Definitions](/microsoft-365/enterprise/m365-dr-overview?view=o365-worldwide) | modified |
-| 5/11/2023 | [Microsoft Defender for Endpoint Device Control Removable Storage frequently asked questions](/microsoft-365/security/defender-endpoint/device-control-removable-storage-access-control-faq?view=o365-worldwide) | modified |
-| 5/12/2023 | [Restore a deleted Microsoft 365 group](/microsoft-365/admin/create-groups/restore-deleted-group?view=o365-worldwide) | modified |
-| 5/12/2023 | [Configure endpoint DLP settings](/microsoft-365/compliance/dlp-configure-endpoint-settings?view=o365-worldwide) | modified |
-| 5/12/2023 | [Malaysia passport number entity definition](/microsoft-365/compliance/sit-defn-malaysia-passport-number?view=o365-worldwide) | modified |
-| 5/12/2023 | [Singapore passport number entity definition](/microsoft-365/compliance/sit-defn-singapore-passport-number?view=o365-worldwide) | modified |
-| 5/12/2023 | [South Korea driver's license number entity definition](/microsoft-365/compliance/sit-defn-south-korea-drivers-license-number?view=o365-worldwide) | modified |
-| 5/12/2023 | [South Korea passport number entity definition](/microsoft-365/compliance/sit-defn-south-korea-passport-number?view=o365-worldwide) | modified |
-| 5/12/2023 | [UAE identity card number entity definition](/microsoft-365/compliance/sit-defn-uae-identity-card-number?view=o365-worldwide) | modified |
-| 5/12/2023 | [UAE passport number entity definition](/microsoft-365/compliance/sit-defn-uae-passport-number?view=o365-worldwide) | modified |
-| 5/12/2023 | [Create and publish sensitivity labels](/microsoft-365/compliance/create-sensitivity-labels?view=o365-worldwide) | modified |
-| 5/12/2023 | [Impersonation insight](/microsoft-365/security/office-365-security/anti-phishing-mdo-impersonation-insight?view=o365-worldwide) | modified |
-| 5/12/2023 | [Configure anti-phishing policies in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/anti-phishing-policies-mdo-configure?view=o365-worldwide) | modified |
loop Loop Components Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/loop/loop-components-teams.md
Title: Overview of Loop components in Teams
+ Title: Overview of Loop components in the Microsoft 365 ecosystem
ms.localizationpriority: medium
search.appverid: MET150 - M365-collaboration
-description: Learn how to manage Loop components in Teams.
+description: Learn how to manage Loop components in the Microsoft 365 ecosystem.
f1.keywords: - CSH
appliesto:
- Microsoft Teams
-# Overview of Loop components in Teams
+# Overview of Loop components in the Microsoft 365 ecosystem
-Loop components in Teams chat offer a new way to ideate, create, and make decisions together. Send a component - like a table, task list, or paragraph ΓÇö where everyone in your chat can edit inline and see changes as they're made.
+Loop components in Teams chat, Outlook emails, Whiteboards, or other places in the Microsoft 365 ecosystem offer a new way to ideate, create, and make decisions together. Send a component - like a table, task list, or paragraph ΓÇö where everyone in your chat, email or document can edit inline and see changes as they're made.
> [!Note]
-> Loop components is the first feature of the [Microsoft Loop app](https://www.microsoft.com/en-us/microsoft-loop) to become available in Teams.
+> Loop components is the first feature of the [Microsoft Loop app](https://www.microsoft.com/en-us/microsoft-loop) to become available in Teams, Outlook, Whiteboard and Word for the web.
**Get tasks done faster together.** Crowd-source an agenda, track a group's action items, or take notes collectively. These are just a few scenarios made easier with Loop components.
-**Share components.** In this release, you can share Loop components into different Teams chats. Recipients can edit from wherever they are and see updates instantly no matter where the changes were made.
+**Share components.** In this release, you can share Loop components into different Teams chats, Outlook emails, Whiteboards and other places in the Microsoft 365 ecosystem. Recipients can edit from wherever they are and see updates instantly no matter where the changes were made.
-**Start in chat, build from there.** Every component you create from Teams chat is automatically saved to a file in OneDrive. So, you might begin collaborating in chat then later move to the file on Office.com, where you have a larger visual space for editing and can add as many components as you like.
+**Start in chat or email, build from there.** Every component you create from Teams chat or Outlook email is automatically saved to a file in OneDrive. So, you might begin collaborating in chat then later move to the file in a full tab on Office.com, where you have a larger visual space for editing and can add as many components as you like.
-For information on admin settings for Loop components in Teams, see [Manage Loop components in SharePoint](loop-components-sharepoint.md).
+For information on admin settings for Loop components in Teams, see [Manage Loop components in SharePoint and OneDrive](loop-components-sharepoint.md).
## Clients and platforms
-Available on Teams apps on Windows, Mac, iOS, and Android.
+Available on Teams apps on Windows, Mac, iOS, Android, and web.
+Available on Outlook apps on Windows and web.
+Available on Whiteboard apps on Windows, Surface, iOS, Android, and web. iOS and Android are view and edit but users cannot paste new ones.
-## Loop components and .fluid files
+## Loop components and .loop files
-Loop components created in Teams are backed by a .fluid (will be changed to .loop in the near future) file stored in the creator's OneDrive. Being a file in OneDrive means that users can create, discover, and manage Loop components (.fluid files) as easily as any Office document.
+Loop components created in Teams, Outlook are backed by a .loop (earlier versions of Loop created .fluid) file stored in the creator's OneDrive. Being a file in OneDrive means that users can create, discover, and manage Loop components (.loop files) as easily as any Office document.
-## How are .fluid files stored?
+## How are .loop files stored?
-.fluid files appear on Office.com and OneDrive, such as in the Recent and Recommended areas. Users can search for content in .fluid files from Office.com and OneDrive. .fluid files can be restored to previous versions from OneDrive. To create Loop components chat participants must have a OneDrive account. Without a valid OneDrive account, chat participants might still be able to collaborate on a component created by other users who have a valid OneDrive account, but can't create their own.
+.loop files appear on Office.com and OneDrive, such as in the Recent and Recommended areas. Users can search for content in .loop files from Office.com and OneDrive. .loop files can be restored to previous versions from OneDrive. To create Loop components chat or email creators must have a OneDrive account. Without a valid OneDrive account, chat or email creators might still be able to collaborate on a component created by other users who have a valid OneDrive account, but can't create their own.
-Moving a .fluid file from OneDrive to a SharePoint site will result in the live component failing to load in Teams chat.
+Moving a .loop file from OneDrive to a SharePoint site will result in the live component failing to load in Teams chat, Outlook email, or any other place it was previously shared.
## What happens if the owner of the file leaves the company?
-OneDrive retention policies apply to .fluid files just as they do to other content created by the user.
+OneDrive retention policies apply to .loop files just as they do to other content created by the user.
-## How are .fluid files shared?
+## How are .loop files shared?
-Loop components can be inserted in Teams chat or copied from one chat to another. (Loop components aren't yet supported in channels.) They default to the organization's existing permissions, but users can change permissions before sending to ensure everyone has access.
+Loop components can be inserted in Teams chat, Outlook email, etc., or copied from one chat, email, etc. to another. (Loop components aren't yet supported in Teams channels.) They default to the organization's existing permissions, but users can change permissions before sending to ensure everyone has access.
-Opening components from Teams chat in Office.com offers share functionality at the top of the window, similar to the sharing options offered for other Office documents.
+Opening components from Teams chat, Outlook email, or Whiteboard in Office.com offers share functionality at the top of the window, similar to the sharing options offered for other Office documents.
-## What if a .fluid file becomes corrupted or damaged?
+## What if a .loop file becomes corrupted or damaged?
Version History allows you to review, restore, or copy from previous versions of the file.
-## What apps can open and edit .fluid files?
+## What apps can open and edit .loop files?
-.fluid files can only be opened as links in your browser, such as Office.com, and as Loop components in Teams chat. If downloaded, they can't be opened again without first uploading them back to OneDrive or SharePoint.
+.loop files can only be opened as links in your browser, such as Office.com, and as Loop components in Teams chat, Outlook email, Whiteboard, and Word for the web. If downloaded, they can't be opened again without first uploading them back to OneDrive or SharePoint.
-## Does .fluid files support eDiscovery?
+## Do .loop (and .fluid) files support eDiscovery?
-Currently, .fluid files are stored in the creator's OneDrive and are available for search and collection in eDiscovery (Standard) and available for search, collection, review, and export in eDiscovery (Premium). More information about eDiscovery support is outlined in the [Settings management](loop-components-sharepoint.md#settings-management-for-loop-functionality-in-teams) section.
+Loop components created in Teams, Outlook, Word for the web, are discoverable and have eDiscovery workflow support using the Microsoft Purview tool. Currently, these files are stored in the creatorΓÇÖs OneDrive and are available for search and collection, and render in review for both eDiscovery (Standard) and eDiscovery (Premium). The HTML offline export format is supported on eDiscovery (Premium). You can also download and re-upload the files to any OneDrive to view them in their native format.
+
+Microsoft is currently working on a third-party graph export API solution for Loop components.
## If Loop is disabled from the admin switch, what will the user experience be?
-If you disable these experiences as outlined in the [Settings management](loop-components-sharepoint.md#settings-management-for-loop-functionality-in-teams) section, the following experience changes will apply:
+If you disable these experiences as outlined in the [Settings management for Loop functionality in Teams](loop-components-sharepoint.md#settings-management-for-loop-functionality-in-teams) section, or disable these experiences as outlined in the [Settings management in Cloud Policy](loop-components-sharepoint.md#settings-management-in-cloud-policy) section, the following experience changes will apply:
-- The create/insert entry point within Teams messaging will be hidden. Users won't be able to create new .fluid files.-- Existing messages that would have formerly rendered as an interactive Loop component will instead render as a hyperlink "Loop component." No interactive content will be displayed within Teams.-- When an end-user clicks on the "Loop component" hyperlink or browses to a .fluid file in OneDrive for Business and clicks to open, it will open the file in a separate browser tab. End-users will still be able to edit the file.
+- The create/insert entry point within Teams messaging and Outlook email will be hidden. Users won't be able to create new .loop files.
+- Existing messages that would have formerly rendered as an interactive Loop component will instead render as a hyperlink. No interactive content will be displayed within the app that Loop components have been disabled in.
+- When an end-user clicks on the hyperlink or browses to a .loop file in OneDrive for Business and clicks to open, it will open in a separate browser tab. End-users will still be able to edit the file.
## Known issues -- With tenant default file permissions set to *Specific people* (only the people the user specifies), copying the link to the Loop component and pasting it in another chat requires the sender to use the permissions dialog and add the recipients in the Specific people option to grant access properly.-- With tenant default file permissions set to *Specific people* (only the people the user specifies), creating a live component in group chat with more than 20 members will require the sender to manually select the permission options for the component.-- Searching for Loop components in Teams search will return a link to the component in office.com, not the chat message itself.
+- With tenant default file permissions set to *Specific people* (only the people the user specifies), copying the link to the Loop component and pasting it in another Teams chat requires the sender to use the permissions dialog and add the recipients in the Specific people option to grant access properly.
+- With tenant default file permissions set to *Specific people* (only the people the user specifies), creating a Loop component in group chat with more than 20 members will require the sender to manually select the permission options for the component.
+- Searching for Loop components in Teams search or Outlook email search will return a link to the component in office.com, not the message itself that contained the Loop component link.
- Loop components are disabled in federated chats. - Guests won't be able to view or collaborate on a Loop component.
+- External recipients of emails won't be able to view or collaborate on a Loop component.
- Loop components aren't supported in Teams channels.-- Loop components in chat won't load only if file was moved to different library. If file is moved to different folder then it will continue to load in chat.
+- Loop components won't load only if file was moved to a different library. If file is moved to different folder within the same library then it will continue to load in the message containing the link to the Loop component.
+
+## Related topics
+
+[Overview of Loop components in Teams](/microsoftteams/live-components-in-teams)
+
+[Use Loop components in Outlook](https://support.microsoft.com/office/9b47c279-011d-4042-bd7f-8bbfca0cb136)
+
+[Use Loop components in Word for the web](https://support.microsoft.com/office/use-loop-components-in-word-for-the-web-645cc20d-5c98-4bdb-b559-380c5a27c5e5)
+
+[Loop components in Whiteboard](https://support.microsoft.com/office/loop-components-in-whiteboard-c5f08f54-995e-473e-be6e-7f92555da347)
+
+[Get started with Microsoft Loop - Microsoft Support](https://support.microsoft.com/office/get-started-with-microsoft-loop-9f4d8d4f-dfc6-4518-9ef6-069408c21f0c)
security Mdb Onboard Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-onboard-devices.md
You can use the following methods to onboard an instance of Linux Server to Defe
## View a list of onboarded devices
-To view the list of devices that are onboarded to Defender for Business, go to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). In the navigation pane, go to **Assets** > **Devices**.
+> [!IMPORTANT]
+> You must be assigned an appropriate role, such as Global Administrator, Security Administrator, or Security Reader to perform the following procedure. For more information, see [Roles in Defender for Business](mdb-roles-permissions.md#roles-in-defender-for-business).
+
+1. Go to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
+
+2. In the navigation pane, go to **Assets** > **Devices**. The **Device inventory** view opens.
## Run a phishing test on a device
security Mdb Roles Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-roles-permissions.md
ms.localizationpriority: medium Previously updated : 05/01/2023 Last updated : 06/19/2023 f1.keywords: NOCSH
The following table describes the three roles that can be assigned in Defender f
| Permission level | Description | |:|:|
-| **Global administrators** (also referred to as global admins) <p> *As a best practice, limit the number of global admins.* | Global admins can perform all kinds of tasks. The person who signed up your company for Microsoft 365 or for Defender for Business is a global administrator by default. <p> Global admins are able to modify settings across all Microsoft 365 portals, such as: <br/>- The Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com))<br/>- Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) |
-| **Security administrators** (also referred to as security admins) | Security admins can perform the following tasks: <br/>- View and manage security policies<br/>- View and manage security threats and alerts (these activities include taking response actions on endpoints)<br/>- View security information and reports |
-| **Security reader** | Security readers can perform the following tasks:<br/>- View security policies<br/>- View security threats and alerts<br/>- View security information and reports |
+| **Global administrators** (also referred to as global admins) <br/><br/> *As a best practice, limit the number of global admins. See [Security guidelines for assigning roles](/microsoft-365/admin/add-users/about-admin-roles#security-guidelines-for-assigning-roles).* | Global admins can perform all kinds of tasks. The person who signed up your company for Microsoft 365 or for Defender for Business is a global administrator by default. Global admins typically complete the setup and configuration process in Defender for Business, including onboarding devices.<br/><br/> Global admins are able to modify settings across all Microsoft 365 portals, such as: <br/>- The Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com))<br/>- Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) |
+| **Security administrators** (also referred to as security admins) | Security admins can perform the following tasks: <br/>- View and manage security policies<br/>- View, respond to, and manage alerts <br/>- Take response actions on devices with detected threats<br/>- View security information and reports <br/><br/>In general, security admins use the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) to perform security tasks. |
+| **Security reader** | Security readers can perform the following tasks:<br/>- View a list of onboarded devices<br/>- View security policies<br/>- View alerts and detected threats<br/>- View security information and reports <br/><br/>Security readers cannot add or edit security policies, nor can they onboard devices. |
## View or edit role assignments
The following table describes the three roles that can be assigned in Defender f
3. Select one of the following roles to open its side pane:
- - Global administrator
- - Security administrator
- - Security reader
+ - Global Administrator
+ - Security Administrator
+ - Security Reader
> [!IMPORTANT] > Microsoft recommends that you grant people access to only what they need to perform their tasks. We call this concept *least privilege* for permissions. To learn more, see [Best practices for least-privileged access for applications](/azure/active-directory/develop/secure-least-privileged-access).
security Defender Endpoint Antivirus Exclusions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-antivirus-exclusions.md
Previously updated : 05/10/2023 Last updated : 06/19/2023
The following table summarizes exclusion types that can be defined for Defender
| Product/service | Exclusion types | |:|:-|
-| [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) <br/>[Defender for Endpoint Plan 1 or Plan 2](defender-endpoint-plan-1-2.md) | - [Automatic exclusions](#automatic-exclusions) (for Windows Server 2016 and later)<br/>- [Custom exclusions](#custom-exclusions), such as process-based exclusions, folder location-based exclusions, file extension exclusions, or contextual file and folder exclusions<br/>- [Custom remediation actions](#custom-remediation-actions) based on threat severity or for specific threats<br/><br/>*The standalone versions of Defender for Endpoint Plan 1 and Plan 2 don't include server licenses. To onboard servers, you'll need another license, such as Microsoft Defender for Endpoint for Servers or [Microsoft Defender for Servers Plan 1 or 2](/azure/defender-for-cloud/defender-for-servers-introduction). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).*<br/><br/>*If you're a small or medium-sized business using [Microsoft Defender for Business](../defender-business/mdb-overview.md), you can get [Microsoft Defender for Business servers](../defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).* |
+| [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) <br/>[Defender for Endpoint Plan 1 or Plan 2](defender-endpoint-plan-1-2.md) | - [Automatic exclusions](#automatic-exclusions) (for Windows Server 2016 and later)<br/>- [Custom exclusions](#custom-exclusions), such as process-based exclusions, folder location-based exclusions, file extension exclusions, or contextual file and folder exclusions<br/>- [Custom remediation actions](#custom-remediation-actions) based on threat severity or for specific threats<br/><br/>*The standalone versions of Defender for Endpoint Plan 1 and Plan 2 don't include server licenses. To onboard servers, you'll need another license, such as [Microsoft Defender for Servers Plan 1 or 2](/azure/defender-for-cloud/defender-for-servers-introduction). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).*<br/><br/>*If you're a small or medium-sized business using [Microsoft Defender for Business](../defender-business/mdb-overview.md), you can get [Microsoft Defender for Business servers](../defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).* |
| [Defender for Endpoint Plan 1 or Plan 2](defender-endpoint-plan-1-2.md) | - [Indicators](#defender-for-endpoint-indicators) for files, certificates, or IP addresses, URLs/domains<br/>- [Attack surface reduction exclusions](#attack-surface-reduction-exclusions)<br/>- [Controlled folder access exclusions](#controlled-folder-access-exclusions) | | [Defender for Endpoint Plan 2](microsoft-defender-endpoint.md) | [Automation folder exclusions](#automation-folder-exclusions) (for automated investigation and remediation) |
security Defender Endpoint Plan 1 2 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2.md
audience: ITPro Previously updated : 05/04/2023 Last updated : 06/19/2023 ms.localizationpriority: medium
You can also use a newly added license usage report to track status.
## Options for onboarding servers
-Defender for Endpoint Plan 1 and 2 (standalone), Defender for Business (standalone), and Microsoft 365 Business Premium don't include server licenses. To onboard servers, choose from the following options:
+Defender for Endpoint Plan 1 and 2, Defender for Business, and Microsoft 365 Business Premium don't include server licenses. To onboard servers, choose from the following options:
-- **Microsoft Defender for Servers Plan 1 or Plan 2** (*recommended for enterprise customers*) as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering. To learn more. see [Overview of Microsoft Defender for Servers](/azure/defender-for-cloud/defender-for-servers-introduction).
+- **Microsoft Defender for Servers Plan 1 or Plan 2** (*recommended for enterprise customers*) as part of the [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering. To learn more. see [Overview of Microsoft Defender for Servers](/azure/defender-for-cloud/defender-for-servers-introduction).
- **Microsoft Defender for Business servers** (*recommended for small and medium-sized businesses who have [Microsoft Defender for Business](../defender-business/mdb-overview.md)*). To learn more, see [How to get Microsoft Defender for Business servers](../defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).-- **Microsoft Defender for Endpoint for Servers** (*if you already have these licenses*). See [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).+
+> [!NOTE]
+> Microsoft Defender for Endpoint for Servers is no longer available. If you previously purchased these licenses, consider moving to [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction).
## Start a trial
Defender for Endpoint Plan 1 and 2 (standalone), Defender for Business (standalo
> [!TIP] > If your organization is a small or medium-sized business, see [What happens if I have a mix of Microsoft endpoint security subscriptions](/microsoft-365/security/defender-business/mdb-faq#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions)?
-## More resources
+## Learn more about subscriptions and licensing
- [Licensing and product terms for Microsoft 365 subscriptions](https://www.microsoft.com/licensing/terms/productoffering/Microsoft365/MCA).-- [How to contact support for Defender for Endpoint](contact-support.md).-- [Get started with Microsoft Security (trial offers)](https://www.microsoft.com/security/business/get-started/start-free-trial)-- [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md) (endpoint protection for small and medium-sized businesses) - [Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance)-- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
security Defender Endpoint Plan 1 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1.md
ms.localizationpriority: medium Previously updated : 01/25/2023 Last updated : 06/19/2023 f1.keywords: NOCSH
Servers require an additional license, such as:
- **Microsoft Defender for Servers Plan 1 or Plan 2** (*recommended for enterprise customers*) as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering. To learn more. see [Overview of Microsoft Defender for Servers](/azure/defender-for-cloud/defender-for-servers-introduction). - **Microsoft Defender for Business servers** (*for small and medium-sized businesses who have [Microsoft Defender for Business](../defender-business/mdb-overview.md)*). To learn more, see [How to get Microsoft Defender for Business servers](../defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).-- **Microsoft Defender for Endpoint for Servers**. See [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
-> [!TIP]
-> For more details about supported operating systems, see the following articles:
->
-> - [Defender for Endpoint Hardware and software requirements](minimum-requirements.md#hardware-and-software-requirements)
-> - [Defender for Endpoint capabilities by platform](supported-capabilities-by-platform.md)
-> - [Microsoft licensing and product terms](https://www.microsoft.com/en-us/licensing/product-licensing/products)
+
+> [!NOTE]
+> Microsoft Defender for Endpoint for Servers is no longer available. If you previously purchased these licenses, consider moving to [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction).
+> See [Microsoft licensing and product terms](https://www.microsoft.com/en-us/licensing/product-licensing/products).
## Next steps
security Mde P1 Setup Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-p1-setup-configuration.md
ms.localizationpriority: medium Previously updated : 01/27/2023 Last updated : 06/19/2023 f1.keywords: NOCSH
The following table lists the basic requirements for Defender for Endpoint Plan
|:|:| | Licensing requirements | Defender for Endpoint Plan 1 (standalone, or as part of Microsoft 365 E3 or A3) | | Browser requirements | Microsoft Edge <br/> Internet Explorer version 11 <br/> Google Chrome |
-| Operating systems | Windows 11, or Windows 10, version 1709, or later <br/>macOS (the three most recent releases are supported) <br/>iOS <br/>Android OS <br/><br/>Note that the standalone version of Defender for Endpoint Plan 1 does not include server licenses. To onboard servers, you'll need either Microsoft Defender for Endpoint for Servers, or Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)) offering. To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md). |
+| Operating systems | Windows 11, or Windows 10, version 1709, or later <br/>macOS (the three most recent releases are supported) <br/>iOS <br/>Android OS <br/><br/>Note that the standalone version of Defender for Endpoint Plan 1 does not include server licenses. To onboard servers, you'll require an additional license, such as Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)) offering. To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md). |
| Datacenter | One of the following datacenter locations: <br/>- European Union <br/>- United Kingdom <br/>- United States |
security Minimum Requirements https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/minimum-requirements.md
ms.pagetype: security
ms.localizationpriority: medium Previously updated : 05/11/2023 Last updated : 06/19/2023 audience: ITPro
For more information on supported versions of Windows 10, see [Windows 10 releas
> > - For virtual environments, we recommend using Windows 10 Enterprise LTSC 2019 or later. >
-> - The standalone versions of [Defender for Endpoint Plan 1 and Plan 2](defender-endpoint-plan-1-2.md) do not include server licenses. To onboard servers to those plans, you'll need either Defender for Endpoint for Servers, or Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering). To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
+> - The standalone versions of [Defender for Endpoint Plan 1 and Plan 2](defender-endpoint-plan-1-2.md) do not include server licenses. To onboard servers to those plans, you'll need an additional license, such as Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering). To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
When components are up-to-date on Microsoft Windows operating systems, Microsoft Defender for Endpoint support follows the respective operating system's lifecycle. For more information, see [Lifecycle FAQ](/lifecycle/faq/general-lifecycle). New features or capabilities are typically provided only on operating systems that haven't yet reached the end of their lifecycle. Security intelligence updates (definition and engine updates) and detection logic continues to be provided until at least:
security Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection.md
Title: Use network protection to help prevent connections to bad sites description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
-keywords: Network protection, exploits, malicious website, ip, domain, domains, command and control, SmartScreen, toast notification
-ms.sitesec: library
-ms.pagetype: security
ms.localizationpriority: medium Previously updated : 12/02/2022 Last updated : 06/19/2023 audience: ITPro
The following table summarizes network protection areas of coverage.
| Web Content Filtering | SmartScreen must be enabled | NP has to be in block mode | Not supported | > [!NOTE]
-> Network protection does not monitor msedge.exe on Windows devices.
-> For Mac and Linux, you must have network protection in block mode to get support for these features in Edge.
-> For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage Network Protection for inspection and enforcement:
+> On Mac and Linux, you must have network protection in block mode to get support for these features in Edge.
+> On Windows, network protection does not monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
> - IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)). > - Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators. > - Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
security Run Analyzer Macos Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-analyzer-macos-linux.md
Usage example `sudo ./mde_support_tool.sh ratelimit -e true`
> [!NOTE] > This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This could reduces the number of events for other subscribers as well.
+### AuditD Skip Faulty Rules
+
+This option enables you to skip the faulty rules added in the auditd rules file while loading them. This option allows the auditd subsystem to continue loading rules even if there is a faulty rule. This option summarizes the results of loading the rules. In the background, this option runs the auditctl with the -c option.
+
+> [!NOTE]
+> This functionality is only available on Linux.
+
+```console
+
+```console
+-h, --help show this help message and exit
+-e <true/false>, --enable <true/false> enable/disable the option to skip the faulty rules. In case no argumanet is passed, the option will be true by default.
+```
+
+Usage example `sudo ./mde_support_tool.sh skipfaultyrules -e true`
+
+> [!NOTE]
+> This functionality will be skipping the faulty rules. The faulty rule then needs to be further identified and fixed.
+ ## Result package contents on macOS and Linux - report.html
security Switch To Mde Phase 1 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/switch-to-mde-phase-1.md
Title: Migrate to Microsoft Defender for Endpoint - Prepare description: Get ready to move to Microsoft Defender for Endpoint. Update your devices and configure your network connections.
-keywords: migration, Microsoft Defender for Endpoint, best practice
-ms.sitesec: library
-ms.pagetype: security
ms.localizationpriority: medium
- migrationguides - admindeeplinkDEFENDER Previously updated : 01/12/2023 Last updated : 06/19/2023 search.appverid: met150
To enable communication between your devices and Defender for Endpoint, you migh
\* Windows Server 2016 and Windows Server 2012 R2 require installation of the modern, unified solution for Windows Server 2012 R2 and 2016. For more information, see [Onboard Windows servers to Defender for Endpoint: Windows Server 2012 R2 and Windows Server 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#windows-server-2012-r2-and-windows-server-2016). > [!IMPORTANT]
-> The standalone versions of Defender for Endpoint Plan 1 and Plan 2 do not include server licenses. To onboard servers, you'll need an additional license, such as either Defender for Endpoint for Servers, or [Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
+> The standalone versions of Defender for Endpoint Plan 1 and Plan 2 do not include server licenses. To onboard servers, you'll need an additional license, such as either [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
## Next step
security Switch To Mde Phase 3 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/switch-to-mde-phase-3.md
- migrationguides - admindeeplinkDEFENDER Previously updated : 04/20/2023 Last updated : 06/19/2023 search.appverid: met150
Deployment methods vary, depending on operating system and preferred methods. Th
(<a id="fn1">1</a>) Windows Server 2016 and Windows Server 2012 R2 will need to be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016). > [!IMPORTANT]
-> The standalone versions of Defender for Endpoint Plan 1 and Plan 2 do not include server licenses. To onboard servers, you'll need an additional license, such as either Defender for Endpoint for Servers, or [Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
+> The standalone versions of Defender for Endpoint Plan 1 and Plan 2 do not include server licenses. To onboard servers, you'll need an additional license, such as [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
## Step 2: Run a detection test
security Update Agent Mma Windows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/update-agent-mma-windows.md
Title: Update your agent on devices for Microsoft Defender for Endpoint description: Learn about your options for updating or replacing your MMA agent on Windows devices for Defender for Endpoint.
-keywords: MMA, agent, azure log
-ms.sitesec: library
-ms.pagetype: security
ms.localizationpriority: medium Previously updated : 10/25/2022 Last updated : 06/19/2023 audience: ITPro
If you're using the Microsoft Monitoring Agent (MMA) on Windows devices, it's im
*This option applies to devices running Windows 7 SP1 Enterprise, Windows 7 SP1 Pro, Windows 8.1 Pro, Windows 8.1 Enterprise, and Windows Server 2008 R2 SP1.*
+To help you identify older versions of the MMA inside of your organization, you can leverage the "EOSDate" column in advanced hunting, or follow the instructions in [Plan for end-of-support software and software versions](/microsoft-365/security/defender-vulnerability-management/tvm-end-of-support-software) to leverage the vulnerability management feature inside of Microsoft Defender for Endpoint to track remediation.
+ - See [Manage and maintain the Log Analytics agent for Windows and Linux](/azure/azure-monitor/agents/agent-manage?tabs=PowerShellLinux) for instructions on how to upgrade the agent using Azure Automation or a command line approach for use with various deployment tools and methods at your disposal. - Update MMA by using [Microsoft Update](/windows/deployment/update/how-windows-update-works), through [Windows Server Update Services](/windows/deployment/update/waas-manage-updates-wsus) or [Configuration Manager](/mem/configmgr/osd/deploy-use/manage-windows-as-a-service). Use the method that was configured when MMA was first installed on the device.
A new agent was released in April 2022 for Windows Server 2012 R2 and Windows Se
- [Make the switch from non-Microsoft endpoint protection to Microsoft Defender for Endpoint](switch-to-mde-overview.md) - [Microsoft Defender for Endpoint deployment overview](deployment-phases.md)-- [Onboard to the Microsoft Defender for Endpoint service](onboarding.md)
+- [Onboard to the Microsoft Defender for Endpoint service](onboarding.md)
security Anti Phishing Policies About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-about.md
The following spoof settings are available in anti-phishing policies in EOP and
> [!NOTE] > The features described in this section are currently in Preview, aren't available in all organizations, and are subject to change.
-In ant-phishing policies, you can control whether `p=quarantine` or `p=reject` values in sender DMARC policies are honored. If a messages fails DMARC checks, you can specify separate actions for `p=quarantine` or `p=reject` in the sender's DMARC policy. The following settings are involved:
+In anti-phishing policies, you can control whether `p=quarantine` or `p=reject` values in sender DMARC policies are honored. If a message fails DMARC checks, you can specify separate actions for `p=quarantine` or `p=reject` in the sender's DMARC policy. The following settings are involved:
- **Honor DMARC record policy when the message is detected as spoof**: This setting turns on honoring the sender's DMARC policy for explicit email authentication failures. When you select this setting, the following settings are available: - **If the message is detected as spoof and DMARC Policy is set as p=quarantine**: The available actions are:
Depending on the number of recipients in the message, the first contact safety t
> Some people who received this message don't often get email from \<email address\>.
- :::image type="content" source="../../media/safety-tip-first-contact-multiple-recipients.png" alt-text="The First contact safety tip for messages with with multiple recipients" lightbox="../../media/safety-tip-first-contact-multiple-recipients.png":::
+ :::image type="content" source="../../media/safety-tip-first-contact-multiple-recipients.png" alt-text="The First contact safety tip for messages with multiple recipients" lightbox="../../media/safety-tip-first-contact-multiple-recipients.png":::
> If the message has multiple recipients, whether the tip is shown and to whom is based on a majority model. If the majority of recipients have never or don't often receive messages from the sender, then the affected recipients will receive the **Some people who received this message...** tip. If you're concerned that this behavior exposes the communication habits of one recipient to another, you should not enable the first contact safety tip and continue to use mail flow rules and the **X-MS-Exchange-EnableFirstContactSafetyTip** header instead. >
security Submissions User Reported Messages Custom Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-user-reported-messages-custom-mailbox.md
Before you get started, you need to configure Exchange Online Protection and Def
- Create a Safe Links policy for the reporting mailbox where Safe Links scanning in email is turned off (**URL & click protection settings** \> **On: Safe Links checks a list of known, malicious links when users click links in email** isn't selected or `EnableSafeLinksForEmail $false` in PowerShell). For instructions, see [Set up Safe Links policies in Microsoft Defender for Office 365](safe-links-policies-configure.md). -- If you have data loss prevention (DLP), exclude the reporting mailbox from DLP. For instructions, see [Creating exceptions in DLP](/microsoft-365/compliance/dlp-conditions-and-exceptions).
+- If you have data loss prevention (DLP), exclude the reporting mailbox from DLP. For more information, see [Data loss prevention Exchange conditions and actions reference](../../compliance/dlp-exchange-conditions-and-actions.md).
After you verify that the reporting mailbox meets all of these requirements, use the procedures in this article to identify the reporting mailbox and to configure the related settings.
syntex Manage Library Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/manage-library-settings.md
To access library settings from a SharePoint document library, select **Settings
When you apply a model to a library, Syntex automatically adds the content type and updates the default view with the labels you extracted showing as columns. Then, every time you add or edit a document in the library, Syntex processes the document again, classifying the document and extracting text from it.
-By default, Syntex processes a file every time the file is uploaded or edited. If you want Syntex to process new files only and not every time a file is modified, you can enable the setting.
+By default, Syntex processes a file every time the file is uploaded or edited. If you want Syntex to process new files only and not every time a file is modified, you can change the setting.
### To process new files only
syntex Ocr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/ocr.md
You can set up the OCR service in the same admin area that you used to set up bi
2. On the **Use content AI with Microsoft Syntex** page, select **Manage Microsoft Syntex**.
-3. On the **Manage Microsoft Syntex** page, select **OCR**.
+3. On the **Manage Microsoft Syntex** page, select **Optical character recognition**.
-4. On the **OCR** page, select the SharePoint libraries where you want to enable OCR. The default is no SharePoint libraries, but you can select **Edit** to choose specific SharePoint libraries or to choose all SharePoint libraries.
+4. On the **Optical character recognition** page, select the SharePoint libraries where you want to enable OCR. The default is no SharePoint libraries, but you can select **Edit** to choose specific SharePoint libraries or to choose all SharePoint libraries.
### Microsoft Purview compliance portal
syntex Syntex Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/syntex-overview.md
With Syntex, you can automate your content-based processesΓÇöcapturing the infor
You can dive deeper into your content to truly understand it, and you can turn the information into meaningful insights that your organization can use to make informed business decisions.
+## Scenarios and use cases
+
+ :::column span="3":::
+ Syntex can help your organization automate business processes, improve search accuracy, and manage compliance risk.
+
+ With content AI services and capabilities, you can build content understanding and classification directly into the content management flow.
+ :::column-end:::
+ :::column span="":::
+ ![Image of generic scenario icon.](../media/content-understanding/scenarios-image.png)
+ :::column-end:::
+
+[Learn more about how to use Syntex to streamline processes in your organization.](adoption-scenarios.md)
+ ## Models :::row:::
This feature is useful when you have a specific piece of information you want to
Learn more about how to apply [retention labels](apply-a-retention-label-to-a-model.md) and [sensitivity labels](apply-a-sensitivity-label-to-a-model.md) to models in Microsoft Syntex.
+## Content processing
+
+ :::column span="":::
+ ![Image of generic content processing icon.](../media/content-understanding/content-processing-image.png)
+ :::column-end:::
+ :::column span="3":::
+ Syntex lets you build simple rules-driven actions in document libraries based on metadata. From a document library, you can create rules to automate tasks such as sending a notification when metadata changes in a file, when a new file is created in the library, or when files are moved or copied based on metadata extracted by Syntex models.
+ :::column-end:::
+
+[Learn more about content processing rules in Microsoft Syntex.](content-processing-overview.md)
+ ## Premium taxonomy services :::row:::
Learn more about how to apply [retention labels](apply-a-retention-label-to-a-mo
- [Term store reports](term-store-analytics.md), which provides you insights into published term sets and their use across your organization.
-## Scenarios and use cases
-
- :::column span="3":::
- Syntex can help your organization automate business processes, improve search accuracy, and manage compliance risk.
-
- With content AI services and capabilities, you can build content understanding and classification directly into the content management flow.
- :::column-end:::
- :::column span="":::
- ![Image of generic scenario icon.](../media/content-understanding/scenarios-image.png)
- :::column-end:::
-
-[Learn more about how to use Syntex to streamline processes in your organization.](adoption-scenarios.md)
<!<br><br> > [!div class="nextstepaction"] > [Learn more about model types in Microsoft Syntex](model-types-overview.md)