Updates from: 06/24/2023 03:05:16
Category Microsoft Docs article Related commit history on GitHub Change details
compliance Apply Retention Labels Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-retention-labels-automatically.md
f1.keywords:
Previously updated : 05/12/2023 Last updated : 06/23/2023 audience: Admin
To consider when using trainable classifiers to auto-apply retention labels:
#### Auto-apply labels to cloud attachments
-> [!NOTE]
-> Support for cloud attachments that are shared in Yammer is in preview.
- You might need to use this option if you're required to capture and retain all copies of files in your tenant that are sent over communications by users. You use this option in conjunction with retention policies for the communication services themselves; Exchange, Teams, and Yammer. > [!IMPORTANT]
compliance Dlp Copy Matched Items Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-copy-matched-items-get-started.md
Before you start these procedures, you should review [Learn about evidence colle
## Licensing and Subscriptions
-See the [licensing requirements for Information Protection](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection) for details on the subscriptions that support DLP. You don't need any additional licenses over what is needed for endpoint DLP.
+See the [licensing requirements for Information Protection](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection) for details on the subscriptions that support DLP.
+
+See the prerequisites [licensing requirements for Azure Active Directory P1 or P2](/azure/active-directory/roles/custom-enterprise-apps) needed to create custom role-based access control (RBAC).
## Permissions
You can also configure immutability policies for your blob data that protects ag
The procedures for setting up your Azure storage account, container and blobs are documented in the Azure document set. Here are links to relevant articles you can refer to help you get started: 1. [Introduction to Azure Blob Storage](/azure/storage/blobs/storage-blobs-introduction) 1. [Create a storage account](/azure/storage/common/storage-account-create)
+1. [Default to and authorize access to blobs using Azure Active Directory](/azure/storage/blobs/authorize-access-azure-active-directory)
1. [Manage blob containers using the Azure portal](/azure/storage/blobs/blob-containers-portal) 1. [Manage block blobs with PowerShell](/azure/storage/blobs/blob-powershell) Be sure to save the name and URL of the Azure blob container. To view the URL, open the Azure storage portal \> **Home \> **Storage Accounts** \> **Container** \> **Properties**
+An example of the Azure blob container URL will be in the format `https://storageAccountName.blob.core.windows.net/containerName`.
+ ### Set permissions on the Azure blob storage
-You have to configure two sets of permissions on the blobs, one for the administrators and investigators so they can view and manage evidence and another for users whose devices need to upload items to Azure. You should [create custom role groups in Microsoft Purview compliance](../security/office-365-security/scc-permissions.md) to enforce least privileges and assign accounts to them.
+Using Azure Active Directory authorization, you have to configure two sets of permissions on the blobs; one for the administrators and investigators so they can view and manage evidence and another for users whose devices need to upload items to Azure. You should [create custom role groups in Microsoft Purview compliance](../security/office-365-security/scc-permissions.md) to enforce least privileges and assign accounts to them.
#### Permissions on Azure blob for administrators and investigators
The JSON for the investigator role group should look like this:
#### Permissions on Azure blob for users
-Assign these permissions to the Azure blob for the users role:
+Assign these permissions to the Azure blob for the user's role:
##### User actions
The JSON for user role group should look like this:
1. Set how long you want items to be cached on devices if they can't access the Azure storage account. You can choose, **7**, **30**, or **60** days.
-1. Select **+ Add storage** and provide the Name and URL of the Azure storage account.
+1. Select **+ Add storage** and provide the Name and URL of the Azure storage account. The URL format is the storage account FQDN/containerName. No SAS token is required as Azure Active Directory authorization is in use.
### Policy configuration
compliance Sensitive Information Type Entity Definitions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitive-information-type-entity-definitions.md
f1.keywords:
Previously updated : 09/17/2019 Last updated : 06/23/2023 audience: Admin search.appverid: MET150
This article is a list of all sensitive information type (SIT) entity definition
> - Medium confidence: 75 > - High confidence: 85 -- [ABA routing number](sit-defn-aba-routing.md)-- [All credentials](sit-defn-all-creds.md)-- [All full names](sit-defn-all-full-names.md)-- [All medical terms and conditions](sit-defn-all-medical-terms-conditions.md)-- [All Physical Addresses](sit-defn-all-physical-addresses.md)-- [Amazon S3 Client Secret Access Key](sit-defn-amazon-s3-client-secret-access-key.md)-- [Argentina national identity (DNI) number](sit-defn-argentina-national-identity-numbers.md)-- [Argentina Unique Tax Identification Key (CUIT/CUIL)](sit-defn-argentina-unique-tax-identification-key.md)-- [ASP.NET machine Key](sit-defn-asp-net-machine-key.md) -- [Australia bank account number](sit-defn-australia-bank-account-number.md)-- [Australia business number](sit-defn-australia-business-number.md)-- [Australia company number](sit-defn-australia-business-number.md)-- [Australia drivers license number](sit-defn-australia-drivers-license-number.md)-- [Australia medical account number](sit-defn-australia-medical-account-number.md)-- [Australia passport number](sit-defn-australia-passport-number.md)-- [Australia physical addresses](sit-defn-australia-physical-addresses.md)-- [Australia tax file number](sit-defn-australia-tax-file-number.md)-- [Austria drivers license number](sit-defn-austria-drivers-license-number.md)-- [Austria identity card](sit-defn-austria-identity-card.md)-- [Austria passport number](sit-defn-austria-passport-number.md)-- [Austria physical addresses](sit-defn-austria-physical-addresses.md)-- [Austria social security number](sit-defn-austria-social-security-number.md)-- [Austria tax identification number](sit-defn-austria-tax-identification-number.md)-- [Austria value added tax](sit-defn-austria-value-added-tax.md)-- [Azure AD client access token](sit-defn-azure-ad-client-access-token.md) -- [Azure AD client secret](sit-defn-azure-ad-client-secret.md)-- [Azure AD User Credentials](sit-defn-azure-ad-user-credentials.md)-- [Azure App Service deployment password](sit-defn-azure-app-service-deployment-password.md)-- [Azure Batch shared access key](sit-defn-azure-batch-shared-access-key.md)-- [Azure Bot Framework secret key](sit-defn-azure-bot-framework-secret-key.md)-- [Azure Bot service app secret](sit-defn-azure-bot-service-app-secret.md)-- [Azure Cognitive Search API key](sit-defn-azure-cognitive-search-api-key.md)-- [Azure Cognitive Service key](sit-defn-azure-cognitive-service-key.md)-- [Azure Container Registry access key](sit-defn-azure-container-registry-access-key.md)-- [Azure Cosmos DB account access key](sit-defn-azure-cosmos-db-account-access-key.md) -- [Azure Databricks personal access token](sit-defn-azure-databricks-personal-access-token.md)-- [Azure DevOps app secret](sit-defn-azure-devops-app-secret.md)-- [Azure DevOps personal access token](sit-defn-azure-devops-personal-access-token.md)-- [Azure DocumentDB auth key](sit-defn-azure-document-db-auth-key.md)-- [Azure EventGrid access key](sit-defn-azure-eventgrid-access-key.md) -- [Azure Function Master / API key](sit-defn-azure-function-master-api-key.md) -- [Azure IAAS database connection string and Azure SQL connection string](sit-defn-azure-iaas-database-connection-string-azure-sql-connection-string.md)-- [Azure IoT connection string](sit-defn-azure-iot-connection-string.md)-- [Azure IoT shared access key](sit-defn-azure-iot-shared-access-key.md)-- [Azure Logic app shared access signature](sit-defn-azure-logic-app-shared-access-signature.md) -- [Azure Machine Learning web service API key](sit-defn-azure-machine-learning-web-service-api-key.md) -- [Azure Maps subscription key](sit-defn-azure-maps-subscription-key.md) -- [Azure publish setting password](sit-defn-azure-publish-setting-password.md)-- [Azure Redis cache connection string](sit-defn-azure-redis-cache-connection-string.md)-- [Azure Redis cache connection string password](sit-defn-azure-redis-cache-connection-string-password.md)-- [Azure SAS](sit-defn-azure-sas.md)-- [Azure service bus connection string](sit-defn-azure-service-bus-connection-string.md)-- [Azure service bus shared access signature](sit-defn-azure-service-bus-shared-access-signature.md) -- [Azure Shared Access key / Web Hook token](sit-defn-azure-shared-access-key-web-hook-token.md) -- [Azure SignalR access key](sit-defn-azure-signalr-access-key.md)-- [Azure SQL connection string](sit-defn-azure-sql-connection-string.md)-- [Azure storage account access key](sit-defn-azure-storage-account-access-key.md)-- [Azure storage account key](sit-defn-azure-storage-account-key.md)-- [Azure Storage account key (generic)](sit-defn-azure-storage-account-key-generic.md)-- [Azure Storage account shared access signature](sit-defn-azure-storage-account-shared-access-signature.md)-- [Azure Storage account shared access signature for high risk resources](sit-defn-azure-storage-account-shared-access-signature-high-risk-resources.md)-- [Azure subscription management certificate](sit-defn-azure-subscription-management-certificate.md)-- [Belgium driver's license number](sit-defn-belgium-drivers-license-number.md)-- [Belgium national number](sit-defn-belgium-national-number.md)-- [Belgium passport number](sit-defn-belgium-passport-number.md)-- [Belgium physical addresses](sit-defn-belgium-physical-addresses.md)-- [Belgium value added tax number](sit-defn-belgium-value-added-tax-number.md)-- [Blood test terms](sit-defn-blood-test-terms.md)-- [Brand medication names](sit-defn-brand-medication-names.md)-- [Brazil CPF number](sit-defn-brazil-cpf-number.md)-- [Brazil legal entity number (CNPJ)](sit-defn-brazil-legal-entity-number.md)-- [Brazil national identification card (RG)](sit-defn-brazil-national-identification-card.md)-- [Brazil physical addresses](sit-defn-brazil-physical-addresses.md)-- [Bulgaria driver's license number](sit-defn-bulgaria-drivers-license-number.md)-- [Bulgaria passport number](sit-defn-bulgaria-passport-number.md)-- [Bulgaria physical addresses](sit-defn-bulgaria-physical-addresses.md)-- [Bulgaria uniform civil number](sit-defn-bulgaria-uniform-civil-number.md)-- [Canada bank account number](sit-defn-canada-bank-account-number.md)-- [Canada driver's license number](sit-defn-canada-drivers-license-number.md)-- [Canada health service number](sit-defn-canada-health-service-number.md)-- [Canada passport number](sit-defn-canada-passport-number.md)-- [Canada personal health identification number (PHIN)](sit-defn-canada-personal-health-identification-number.md)-- [Canada physical addresses](sit-defn-canada-physical-addresses.md)-- [Canada social insurance number](sit-defn-canada-social-insurance-number.md)-- [Chile identity card number](sit-defn-chile-identity-card-number.md)-- [China resident identity card (PRC) number](sit-defn-china-resident-identity-card-number.md)-- [Client secret / API key](sit-defn-client-secret-api-key.md)-- [Credit card number](sit-defn-credit-card-number.md)-- [Croatia driver's license number](sit-defn-croatia-drivers-license-number.md)-- [Croatia identity card number](sit-defn-croatia-identity-card-number.md)-- [Croatia passport number](sit-defn-croatia-passport-number.md)-- [Croatia personal identification (OIB) number](sit-defn-croatia-personal-identification-number.md)-- [Croatia physical addresses](sit-defn-croatia-physical-addresses.md)-- [Cyprus drivers license number](sit-defn-cyprus-drivers-license-number.md)-- [Cyprus identity card](sit-defn-cyprus-identity-card.md)-- [Cyprus passport number](sit-defn-cyprus-passport-number.md)-- [Cyprus physical addresses](sit-defn-cyprus-physical-addresses.md)-- [Cyprus tax identification number](sit-defn-cyprus-tax-identification-number.md)-- [Czech driver's license number](sit-defn-czech-drivers-license-number.md)-- [Czech passport number](sit-defn-czech-passport-number.md)-- [Czech personal identity number](sit-defn-czech-personal-identity-number.md)-- [Czech Republic physical addresses](sit-defn-czech-republic-physical-addresses.md)-- [Denmark driver's license number](sit-defn-denmark-drivers-license-number.md)-- [Denmark passport number](sit-defn-denmark-passport-number.md)-- [Denmark personal identification number](sit-defn-denmark-personal-identification-number.md)-- [Denmark physical addresses](sit-defn-denmark-physical-addresses.md)-- [Diseases](sit-defn-diseases.md)-- [Drug Enforcement Agency (DEA) number](sit-defn-drug-enforcement-agency-number.md)-- [Estonia driver's license number](sit-defn-estonia-drivers-license-number.md)-- [Estonia passport number](sit-defn-estonia-passport-number.md)-- [Estonia Personal Identification Code](sit-defn-estonia-personal-identification-code.md)-- [Estonia physical addresses](sit-defn-estonia-physical-addresses.md)-- [EU debit card number](sit-defn-eu-debit-card-number.md)-- [EU driver's license number](sit-defn-eu-drivers-license-number.md)-- [EU national identification number](sit-defn-eu-national-identification-number.md)-- [EU passport number](sit-defn-eu-passport-number.md)-- [EU social security number or equivalent identification](sit-defn-eu-social-security-number-equivalent-identification.md)-- [EU Tax identification number](sit-defn-eu-tax-identification-number.md)-- [Finland driver's license number](sit-defn-finland-drivers-license-number.md)-- [Finland european health insurance number](sit-defn-finland-european-health-insurance-number.md)-- [Finland national ID](sit-defn-finland-national-id.md)-- [Finland passport number](sit-defn-finland-passport-number.md)-- [Finland physical addresses](sit-defn-finland-physical-addresses.md)-- [France driver's license number](sit-defn-france-drivers-license-number.md)-- [France health insurance number](sit-defn-france-health-insurance-number.md)-- [France national id card (CNI)](sit-defn-france-national-id-card.md)-- [France passport number](sit-defn-france-passport-number.md)-- [France physical addresses](sit-defn-france-physical-addresses.md)-- [France social security number (INSEE)](sit-defn-france-social-security-number.md)-- [France tax identification number](sit-defn-france-tax-identification-number.md)-- [France value added tax number](sit-defn-france-value-added-tax-number.md)-- [General password](sit-defn-general-password.md)-- [General Symmetric key](sit-defn-general-symmetric-key.md)-- [Generic medication names](sit-defn-generic-medication-names.md)-- [Germany driver's license number](sit-defn-germany-drivers-license-number.md)-- [Germany identity card number](sit-defn-germany-identity-card-number.md)-- [Germany passport number](sit-defn-germany-passport-number.md)-- [Germany physical addresses](sit-defn-germany-physical-addresses.md)-- [Germany tax identification number](sit-defn-germany-tax-identification-number.md)-- [Germany value added tax number](sit-defn-germany-value-added-tax-number.md)-- [GitHub Personal Access Token](sit-defn-github-personal-access-token.md) -- [Google API key](sit-defn-google-api-key.md)-- [Greece driver's license number](sit-defn-greece-drivers-license-number.md)-- [Greece national ID card](sit-defn-greece-national-id-card.md)-- [Greece passport number](sit-defn-greece-passport-number.md)-- [Greece physical addresses](sit-defn-greece-physical-addresses.md)-- [Greece Social Security Number (AMKA)](sit-defn-greece-social-security-number.md)-- [Greece tax identification number](sit-defn-greece-tax-identification-number.md)-- [Hong Kong identity card (HKID) number](sit-defn-hong-kong-identity-card-number.md)-- [Http authorization header](sit-defn-http-authorization-header.md)-- [Hungary driver's license number](sit-defn-hungary-drivers-license-number.md)-- [Hungary passport number](sit-defn-hungary-passport-number.md)-- [Hungary personal identification number](sit-defn-hungary-personal-identification-number.md)-- [Hungary physical addresses](sit-defn-hungary-physical-addresses.md)-- [Hungary social security number (TAJ)](sit-defn-hungary-social-security-number.md)-- [Hungary tax identification number](sit-defn-hungary-tax-identification-number.md)-- [Hungary value added tax number](sit-defn-hungary-value-added-tax-number.md)-- [Iceland physical addresses](sit-defn-iceland-physical-addresses.md)-- [Impairments Listed In The U.S. Disability Evaluation Under Social Security](sit-defn-impairments-us-disability-evaluation-under-social-security.md)-- [India Driver's License Number](sit-defn-india-drivers-license-number.md)-- [India GST Number](sit-defn-india-gst-number.md)-- [India permanent account number (PAN)](sit-defn-india-permanent-account-number.md)-- [India unique identification (Aadhaar) number](sit-defn-india-unique-identification-number.md)-- [India Voter Id Card](sit-defn-india-voter-id-card.md)-- [Indonesia identity card (KTP) number](sit-defn-indonesia-identity-card-number.md)-- [International banking account number (IBAN)](sit-defn-international-banking-account-number.md)-- [International classification of diseases (ICD-10-CM)](sit-defn-international-classification-of-diseases-icd-10-cm.md)-- [International classification of diseases (ICD-9-CM)](sit-defn-international-classification-of-diseases-icd-9-cm.md)-- [IP address](sit-defn-ip-address.md)-- [IP Address v4](sit-defn-ip-address-v4.md)-- [IP Address v6](sit-defn-ip-address-v6.md)-- [Ireland driver's license number](sit-defn-ireland-drivers-license-number.md)-- [Ireland passport number](sit-defn-ireland-passport-number.md)-- [Ireland personal public service (PPS) number](sit-defn-ireland-personal-public-service-number.md)-- [Ireland physical addresses](sit-defn-ireland-physical-addresses.md)-- [Israel bank account number](sit-defn-israel-bank-account-number.md)-- [Israel national identification number](sit-defn-israel-national-identification-number.md)-- [Italy driver's license number](sit-defn-italy-drivers-license-number.md)-- [Italy fiscal code](sit-defn-italy-fiscal-code.md)-- [Italy passport number](sit-defn-italy-passport-number.md)-- [Italy physical addresses](sit-defn-italy-physical-addresses.md)-- [Italy value added tax number](sit-defn-italy-value-added-tax-number.md)-- [Japan bank account number](sit-defn-japan-bank-account-number.md)-- [Japan driver's license number](sit-defn-japan-drivers-license-number.md)-- [Japan My Number - Corporate](sit-defn-japan-my-number-corporate.md)-- [Japan My Number - Personal](sit-defn-japan-my-number-personal.md)-- [Japan passport number](sit-defn-japan-passport-number.md)-- [Japan physical addresses](sit-defn-japan-physical-addresses.md)-- [Japan residence card number](sit-defn-japan-residence-card-number.md)-- [Japan resident registration number](sit-defn-japan-resident-registration-number.md)-- [Japan social insurance number (SIN)](sit-defn-japan-social-insurance-number.md)-- [Lab test terms](sit-defn-lab-test-terms.md)-- [Latvia driver's license number](sit-defn-latvia-drivers-license-number.md)-- [Latvia passport number](sit-defn-latvia-passport-number.md)-- [Latvia personal code](sit-defn-latvia-personal-code.md)-- [Latvia physical addresses](sit-defn-latvia-physical-addresses.md)-- [Liechtenstein physical addresses](sit-defn-liechtenstein-physical-addresses.md)-- [Lifestyles that relate to medical conditions](sit-defn-lifestyles-relate-to-medical-conditions.md)-- [Lithuania driver's license number](sit-defn-lithuania-drivers-license-number.md)-- [Lithuania passport number](sit-defn-lithuania-passport-number.md)-- [Lithuania personal code](sit-defn-lithuania-personal-code.md)-- [Lithuania physical addresses](sit-defn-lithuania-physical-addresses.md)-- [Luxemburg driver's license number](sit-defn-luxemburg-drivers-license-number.md)-- [Luxemburg national identification number (natural persons)](sit-defn-luxemburg-national-identification-number-natural-persons.md)-- [Luxemburg national identification number (non-natural persons)](sit-defn-luxemburg-national-identification-number-non-natural-persons.md)-- [Luxemburg passport number](sit-defn-luxemburg-passport-number.md)-- [Luxemburg physical addresses](sit-defn-luxemburg-physical-addresses.md)-- [Malaysia identification card number](sit-defn-malaysia-identification-card-number.md)-- [Malaysia passport number](sit-defn-malaysia-passport-number.md)-- [Malta driver's license number](sit-defn-malta-drivers-license-number.md)-- [Malta identity card number](sit-defn-malta-identity-card-number.md)-- [Malta passport number](sit-defn-malta-passport-number.md)-- [Malta physical addresses](sit-defn-malta-physical-addresses.md)-- [Malta tax identification number](sit-defn-malta-tax-identification-number.md)-- [Medical specialities](sit-defn-medical-specialities.md)-- [Medicare Beneficiary Identifier (MBI) card](sit-defn-medicare-beneficiary-Identifier-card.md)-- [Mexico Unique Population Registry Code (CURP)](sit-defn-mexico-unique-population-registry-code.md)-- [Microsoft Bing maps key](sit-defn-microsoft-bing-maps-key.md)-- [Netherlands citizen's service (BSN) number](sit-defn-netherlands-citizens-service-number.md)-- [Netherlands driver's license number](sit-defn-netherlands-drivers-license-number.md)-- [Netherlands passport number](sit-defn-netherlands-passport-number.md)-- [Netherlands physical addresses](sit-defn-netherlands-physical-addresses.md)-- [Netherlands tax identification number](sit-defn-netherlands-tax-identification-number.md)-- [Netherlands value added tax number](sit-defn-netherlands-value-added-tax-number.md)-- [New Zealand bank account number](sit-defn-new-zealand-bank-account-number.md)-- [New Zealand driver's license number](sit-defn-new-zealand-drivers-license-number.md)-- [New Zealand inland revenue number](sit-defn-new-zealand-inland-revenue-number.md)-- [New Zealand ministry of health number](sit-defn-new-zealand-ministry-of-health-number.md)-- [New Zealand physical addresses](sit-defn-new-zealand-physical-addresses.md)-- [New Zealand social welfare number](sit-defn-new-zealand-social-welfare-number.md)-- [Norway identification number](sit-defn-norway-identification-number.md)-- [Norway physical addresses](sit-defn-norway-physical-addresses.md)-- [Philippines passport number](sit-defn-philippines-passport-number.md)-- [Philippines unified multi-purpose identification number](sit-defn-philippines-unified-multi-purpose-identification-number.md)-- [Poland driver's license number](sit-defn-poland-drivers-license-number.md)-- [Poland identity card](sit-defn-poland-identity-card.md)-- [Poland national ID (PESEL)](sit-defn-poland-national-id.md)-- [Poland passport number](sit-defn-poland-passport-number.md)-- [Poland physical addresses](sit-defn-poland-physical-addresses.md)-- [Poland REGON number](sit-defn-poland-regon-number.md)-- [Poland tax identification number](sit-defn-poland-tax-identification-number.md)-- [Portugal citizen card number](sit-defn-portugal-citizen-card-number.md)-- [Portugal driver's license number](sit-defn-portugal-drivers-license-number.md)-- [Portugal passport number](sit-defn-portugal-passport-number.md)-- [Portugal physical addresses](sit-defn-portugal-physical-addresses.md)-- [Portugal tax identification number](sit-defn-portugal-tax-identification-number.md)-- [Qatari identification card number](sit-defn-qatari-id-card-number.md)-- [Romania driver's license number](sit-defn-romania-drivers-license-number.md)-- [Romania passport number](sit-defn-romania-passport-number.md)-- [Romania personal numeric code (CNP)](sit-defn-romania-personal-numeric-code.md)-- [Romania physical addresses](sit-defn-romania-physical-addresses.md)-- [Russia passport number domestic](sit-defn-russia-passport-number-domestic.md)-- [Russia passport number international](sit-defn-russia-passport-number-international.md)-- [Saudi Arabia National ID](sit-defn-saudi-arabia-national-id.md)-- [Singapore passport number](sit-defn-singapore-passport-number.md#singapore-passport-number)-- [Singapore national registration identity card (NRIC) number](sit-defn-singapore-national-registration-identity-card-number.md)-- [Slack access token](sit-defn-slack-access-token.md)-- [Slovakia driver's license number](sit-defn-slovakia-drivers-license-number.md)-- [Slovakia passport number](sit-defn-slovakia-passport-number.md)-- [Slovakia personal number](sit-defn-slovakia-personal-number.md)-- [Slovakia physical addresses](sit-defn-slovakia-physical-addresses.md)-- [Slovenia driver's license number](sit-defn-slovenia-drivers-license-number.md)-- [Slovenia passport number](sit-defn-slovenia-passport-number.md)-- [Slovenia physical addresses](sit-defn-slovenia-physical-addresses.md)-- [Slovenia tax identification number](sit-defn-slovenia-tax-identification-number.md)-- [Slovenia Unique Master Citizen Number](sit-defn-slovenia-unique-master-citizen-number.md)-- [South Africa identification number](sit-defn-south-africa-identification-number.md)-- [South Korea driver's license number](sit-defn-south-korea-drivers-license-number.md)-- [South Korea passport number](sit-defn-south-korea-passport-number.md)-- [South Korea resident registration number](sit-defn-south-korea-resident-registration-number.md)-- [Spain DNI](sit-defn-spain-dni.md)-- [Spain driver's license number](sit-defn-spain-drivers-license-number.md)-- [Spain passport number](sit-defn-spain-passport-number.md)-- [Spain physical addresses](sit-defn-spain-physical-addresses.md)-- [Spain social security number (SSN)](sit-defn-spain-social-security-number.md)-- [Spain tax identification number](sit-defn-spain-tax-identification-number.md)-- [SQL Server connection string](sit-defn-sql-server-connection-string.md)-- [Surgical procedures](sit-defn-surgical-procedures.md)-- [Sweden driver's license number](sit-defn-sweden-drivers-license-number.md)-- [Sweden national ID](sit-defn-sweden-national-id.md)-- [Sweden passport number](sit-defn-sweden-passport-number.md)-- [Sweden physical addresses](sit-defn-sweden-physical-addresses.md)-- [Sweden tax identification number](sit-defn-sweden-tax-identification-number.md)-- [SWIFT code](sit-defn-swift-code.md)-- [Switzerland physical addresses](sit-defn-switzerland-physical-addresses.md)-- [Switzerland SSN AHV number](sit-defn-switzerland-ssn-ahv-number.md)-- [Taiwan national identification number](sit-defn-taiwan-national-identification-number.md)-- [Taiwan passport number](sit-defn-taiwan-passport-number.md)-- [Taiwan-resident certificate (ARC/TARC) number](sit-defn-taiwan-resident-certificate-number.md)-- [Thai population identification code](sit-defn-thai-population-identification-code.md)-- [Turkey national identification number](sit-defn-turkey-national-identification-number.md)-- [Turkey physical addresses](sit-defn-turkey-physical-addresses.md)-- [Types of medication](sit-defn-types-of-medication.md)-- [U.A.E. identity card number](sit-defn-uae-identity-card-number.md)-- [U.A.E. passport number](sit-defn-uae-passport-number.md)-- [U.K. driver's license number](sit-defn-uk-drivers-license-number.md)-- [U.K. electoral roll number](sit-defn-uk-electoral-roll-number.md)-- [U.K. national health service number](sit-defn-uk-national-health-service-number.md)-- [U.K. national insurance number (NINO)](sit-defn-uk-national-insurance-number.md)-- [U.K. physical addresses](sit-defn-uk-physical-addresses.md)-- [U.K. Unique Taxpayer Reference Number](sit-defn-uk-unique-taxpayer-reference-number.md)-- [U.S. bank account number](sit-defn-us-bank-account-number.md)-- [U.S. driver's license number](sit-defn-us-drivers-license-number.md)-- [U.S. individual taxpayer identification number (ITIN)](sit-defn-us-individual-taxpayer-identification-number.md)-- [U.S. physical addresses](sit-defn-us-physical-addresses.md)-- [U.S. social security number (SSN)](sit-defn-us-social-security-number.md)-- [U.S./U.K. passport number](sit-defn-us-uk-passport-number.md)-- [Ukraine passport domestic](sit-defn-ukraine-passport-domestic.md)-- [Ukraine passport international](sit-defn-ukraine-passport-international.md)-- [User login credentials](sit-defn-user-login-credentials.md)-- [X.509 certificate private key](sit-defn-x-509-certificate-private-key.md)+
compliance Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/whats-new.md
f1.keywords:
Previously updated : 06/21/2023 Last updated : 06/23/2023 audience: Admin
Whether it be adding new solutions to the [Microsoft Purview compliance portal](
## June 2023
+### Data lifecycle management and records management
+
+- **General availability (GA)**: Auto-labeling retention policies for [cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments) that are shared via Yammer are now in general availability.
+ ### Data loss prevention - **General availability (GA)**: Oversharing Popup for Outlook Win 32. [Scenario 2 Show policy tip as oversharing popup](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup) and [Business justification X-Header](dlp-policy-reference.md#business-justification-x-header).
enterprise Cross Tenant Mailbox Migration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/cross-tenant-mailbox-migration.md
f1.keywords: - NOCSH Previously updated : 02/16/2023 Last updated : 06/23/2023 - it-pro
When a mailbox is migrated cross-tenant with this feature, only user visible con
> If you are interested in previewing our new feature Domain Sharing for email alongside your cross-tenant mailbox migrations, please complete the form at [aka.ms/domainsharingpreview](https://aka.ms/domainsharingpreview). Domain sharing for email enables users in separate Microsoft 365 tenants to send and receive email using addresses from the same custom domain. The feature is intended to solve scenarios where users in separate tenants need to represent a common corporate brand in their email addresses. The current preview supports sharing domains indefinitely and shared domains during cross-tenant mailbox migration coexistence. ## Licensing-
-Cross Tenant User Data Migration is available as an add-on to the following Microsoft 365 subscription plans for Enterprise Agreement customers. User licenses are per migration (one-time fee) and can be assigned either on the source or target user object. This license also covers [OneDrive for Business migration](/microsoft-365/enterprise/cross-tenant-onedrive-migration). Contact your Microsoft account team for details.
+> [!IMPORTANT]
+> As of Nov. 2022, **Cross Tenant User Data Migration** is available as an add-on to the following Microsoft 365 subscription plans for Enterprise Agreement customers, and is required for cross-tenant migrations. User licenses are per migration (one-time fee) and can be assigned either on the source or target user object. This license also covers [OneDrive for Business migration](/microsoft-365/enterprise/cross-tenant-onedrive-migration). Contact your Microsoft account team for details.
Microsoft 365 Business Basic/Business Standard/Business Premium/F1/F3/E3/E5/; Office 365 F3/E1/E3/E5; Exchange Online; SharePoint Online; OneDrive for Business.
+> [!WARNING]
+> You must have purchased, or verified that you can purchase, cross tenant user data migration licenses prior to the next steps. Migrations will fail if this has not been completed. Microsoft does not offer exceptions for this licensing.
+ ## Preparing source and target tenants ### Prerequisites for source and target tenants
For any mailbox moving from a source organization, you must provision a MailUser
1. ExchangeGUID (direct flow from source to target): The mailbox GUID must match. The move process won't proceed if this isn't present on target object. 1. ArchiveGUID (direct flow from source to target): The archive GUID must match. The move process won't proceed if this isn't present on the target object. (This is only required if the source mailbox is Archive enabled).
- 1. LegacyExchangeDN (flow as proxyAddress, "x500:\<LegacyExchangeDN\>"): The LegacyExchangeDN must be present on target MailUser as x500: proxyAddress. In addition, you also need to copy all x500 addresses from the source mailbox to the target mail user. The move processes won't proceed if these aren't present on the target object. Also, this step is important for enabling reply ability for emails that are sent before migration. The sender/recipient address in each email item and the auto-complete cache in Microsoft Outlook and in Microsoft Outlook Web App (OWA) uses the value of the LegacyExchangeDN attribute. If a user can't be located using the LegacyExchangeDN value, the delivery of email messages may fail with a 5.1.1 NDR.
+ 1. LegacyExchangeDN (flow as proxyAddress, "x500:\<LegacyExchangeDN\>"): The LegacyExchangeDN must be present on target MailUser as x500: proxyAddress. **In addition, you also need to copy all x500 addresses from the source mailbox to the target mail user.** The move processes won't proceed if these aren't present on the target object. Also, this step is important for enabling reply ability for emails that are sent before migration. The sender/recipient address in each email item and the auto-complete cache in Microsoft Outlook and in Microsoft Outlook Web App (OWA) uses the value of the LegacyExchangeDN attribute. If a user can't be located using the LegacyExchangeDN value, the delivery of email messages may fail with a 5.1.1 NDR.
1. UserPrincipalName: UPN will align to the user's NEW identity or target company (for example, user@northwindtraders.onmicrosoft.com). 1. Primary SMTPAddress: Primary SMTP address will align to the user's NEW company (for example, user@northwindtraders.com). 1. TargetAddress/ExternalEmailAddress: MailUser will reference the user's current mailbox hosted in source tenant (for example user@contoso.onmicrosoft.com). When assigning this value, verify that you have/are also assigning PrimarySMTPAddress or this value will set the PrimarySMTPAddress, which will cause move failures.
For any mailbox moving from a source organization, you must provision a MailUser
| PrimarySmtpAddress | Lara.Newton@northwindtraders.com | | ExternalEmailAddress | SMTP:LaraN@contoso.onmicrosoft.com | | ExchangeGuid | 1ec059c7-8396-4d0b-af4e-d6bd4c12a8d8 |
-| LegacyExchangeDN | /o=First Organization/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=74e5385fce4b46d19006876949855035Lara |
+| LegacyExchangeDN | /o=First Organization/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=74e5385fce4b46d19006876949855035-Lara |
| EmailAddresses | x500:/o=First Organization/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=d11ec1a2cacd4f81858c81907273f1f9-Lara | | | smtp:LaraN@northwindtraders.onmicrosoft.com | | | SMTP:Lara.Newton@northwindtraders.com |
+| | X500:/o=ExchangeLabs/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=f161af74128f460fba5c0c23984b3d6c-Lara |
Example **source** Mailbox object:
Example **source** Mailbox object:
| UserPrincipalName | LaraN@contoso.onmicrosoft.com | | PrimarySmtpAddress | Lara.Newton@contoso.com | | ExchangeGuid | 1ec059c7-8396-4d0b-af4e-d6bd4c12a8d8 |
-| LegacyExchangeDN | /o=First Organization/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=d11ec1a2cacd4f81858c81907273f1f9Lara |
+| LegacyExchangeDN | /o=First Organization/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=d11ec1a2cacd4f81858c81907273f1f9-Lara|
| EmailAddresses | smtp:LaraN@contoso.onmicrosoft.com | | | SMTP:Lara.Newton@contoso.com |
+| | X500:/o=ExchangeLabs/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=f161af74128f460fba5c0c23984b3d6c-Lara |
1. Other attributes may be included in Exchange hybrid write-back already. If not, they should be included. 1. msExchBlockedSendersHash ΓÇô Writes back online safe and blocked sender data from clients to on-premises Active Directory.
$mailboxes | ForEach-Object {Get-Mailbox $_} | Select-Object PrimarySMTPAddress,
```PowerShell # Copy the file $outfile to the desktop of the target on-premises then run the below to create MEU in Target $symbols = '!@#$%^&*'.ToCharArray()
-@([char[]]([char]'a'..[char]'z'), [char[]]([char]'A'..[char]'Z'), [char[]]([char]'0'..[char]'9') + $symbols)
+$characterList = @([char[]]([char]'a'..[char]'z'), [char[]]([char]'A'..[char]'Z'), [char[]]([char]'0'..[char]'9') + $symbols)
function GeneratePassword { param(
includes Sit Link List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/sit-link-list.md
+++ Last updated : 06/23/2023++++
+- [ABA routing number](../compliance/sit-defn-aba-routing.md)
+- [All credentials](../compliance/sit-defn-all-creds.md)
+- [All full names](../compliance/sit-defn-all-full-names.md)
+- [All medical terms and conditions](../compliance/sit-defn-all-medical-terms-conditions.md)
+- [All Physical Addresses](../compliance/sit-defn-all-physical-addresses.md)
+- [Amazon S3 Client Secret Access Key](../compliance/sit-defn-amazon-s3-client-secret-access-key.md)
+- [Argentina national identity (DNI) number](../compliance/sit-defn-argentina-national-identity-numbers.md)
+- [Argentina Unique Tax Identification Key (CUIT/CUIL)](../compliance/sit-defn-argentina-unique-tax-identification-key.md)
+- [ASP.NET machine Key](../compliance/sit-defn-asp-net-machine-key.md)
+- [Australia bank account number](../compliance/sit-defn-australia-bank-account-number.md)
+- [Australia business number](../compliance/sit-defn-australia-business-number.md)
+- [Australia company number](../compliance/sit-defn-australia-business-number.md)
+- [Australia drivers license number](../compliance/sit-defn-australia-drivers-license-number.md)
+- [Australia medical account number](../compliance/sit-defn-australia-medical-account-number.md)
+- [Australia passport number](../compliance/sit-defn-australia-passport-number.md)
+- [Australia physical addresses](../compliance/sit-defn-australia-physical-addresses.md)
+- [Australia tax file number](../compliance/sit-defn-australia-tax-file-number.md)
+- [Austria drivers license number](../compliance/sit-defn-austria-drivers-license-number.md)
+- [Austria identity card](../compliance/sit-defn-austria-identity-card.md)
+- [Austria passport number](../compliance/sit-defn-austria-passport-number.md)
+- [Austria physical addresses](../compliance/sit-defn-austria-physical-addresses.md)
+- [Austria social security number](../compliance/sit-defn-austria-social-security-number.md)
+- [Austria tax identification number](../compliance/sit-defn-austria-tax-identification-number.md)
+- [Austria value added tax](../compliance/sit-defn-austria-value-added-tax.md)
+- [Azure AD client access token](../compliance/sit-defn-azure-ad-client-access-token.md)
+- [Azure AD client secret](../compliance/sit-defn-azure-ad-client-secret.md)
+- [Azure AD User Credentials](../compliance/sit-defn-azure-ad-user-credentials.md)
+- [Azure App Service deployment password](../compliance/sit-defn-azure-app-service-deployment-password.md)
+- [Azure Batch shared access key](../compliance/sit-defn-azure-batch-shared-access-key.md)
+- [Azure Bot Framework secret key](../compliance/sit-defn-azure-bot-framework-secret-key.md)
+- [Azure Bot service app secret](../compliance/sit-defn-azure-bot-service-app-secret.md)
+- [Azure Cognitive Search API key](../compliance/sit-defn-azure-cognitive-search-api-key.md)
+- [Azure Cognitive Service key](../compliance/sit-defn-azure-cognitive-service-key.md)
+- [Azure Container Registry access key](../compliance/sit-defn-azure-container-registry-access-key.md)
+- [Azure Cosmos DB account access key](../compliance/sit-defn-azure-cosmos-db-account-access-key.md)
+- [Azure Databricks personal access token](../compliance/sit-defn-azure-databricks-personal-access-token.md)
+- [Azure DevOps app secret](../compliance/sit-defn-azure-devops-app-secret.md)
+- [Azure DevOps personal access token](../compliance/sit-defn-azure-devops-personal-access-token.md)
+- [Azure DocumentDB auth key](../compliance/sit-defn-azure-document-db-auth-key.md)
+- [Azure EventGrid access key](../compliance/sit-defn-azure-eventgrid-access-key.md)
+- [Azure Function Master / API key](../compliance/sit-defn-azure-function-master-api-key.md)
+- [Azure IAAS database connection string and Azure SQL connection string](../compliance/sit-defn-azure-iaas-database-connection-string-azure-sql-connection-string.md)
+- [Azure IoT connection string](../compliance/sit-defn-azure-iot-connection-string.md)
+- [Azure IoT shared access key](../compliance/sit-defn-azure-iot-shared-access-key.md)
+- [Azure Logic app shared access signature](../compliance/sit-defn-azure-logic-app-shared-access-signature.md)
+- [Azure Machine Learning web service API key](../compliance/sit-defn-azure-machine-learning-web-service-api-key.md)
+- [Azure Maps subscription key](../compliance/sit-defn-azure-maps-subscription-key.md)
+- [Azure publish setting password](../compliance/sit-defn-azure-publish-setting-password.md)
+- [Azure Redis cache connection string](../compliance/sit-defn-azure-redis-cache-connection-string.md)
+- [Azure Redis cache connection string password](../compliance/sit-defn-azure-redis-cache-connection-string-password.md)
+- [Azure SAS](../compliance/sit-defn-azure-sas.md)
+- [Azure service bus connection string](../compliance/sit-defn-azure-service-bus-connection-string.md)
+- [Azure service bus shared access signature](../compliance/sit-defn-azure-service-bus-shared-access-signature.md)
+- [Azure Shared Access key / Web Hook token](../compliance/sit-defn-azure-shared-access-key-web-hook-token.md)
+- [Azure SignalR access key](../compliance/sit-defn-azure-signalr-access-key.md)
+- [Azure SQL connection string](../compliance/sit-defn-azure-sql-connection-string.md)
+- [Azure storage account access key](../compliance/sit-defn-azure-storage-account-access-key.md)
+- [Azure storage account key](../compliance/sit-defn-azure-storage-account-key.md)
+- [Azure Storage account key (generic)](../compliance/sit-defn-azure-storage-account-key-generic.md)
+- [Azure Storage account shared access signature](../compliance/sit-defn-azure-storage-account-shared-access-signature.md)
+- [Azure Storage account shared access signature for high risk resources](../compliance/sit-defn-azure-storage-account-shared-access-signature-high-risk-resources.md)
+- [Azure subscription management certificate](../compliance/sit-defn-azure-subscription-management-certificate.md)
+- [Belgium driver's license number](../compliance/sit-defn-belgium-drivers-license-number.md)
+- [Belgium national number](../compliance/sit-defn-belgium-national-number.md)
+- [Belgium passport number](../compliance/sit-defn-belgium-passport-number.md)
+- [Belgium physical addresses](../compliance/sit-defn-belgium-physical-addresses.md)
+- [Belgium value added tax number](../compliance/sit-defn-belgium-value-added-tax-number.md)
+- [Blood test terms](../compliance/sit-defn-blood-test-terms.md)
+- [Brand medication names](../compliance/sit-defn-brand-medication-names.md)
+- [Brazil CPF number](../compliance/sit-defn-brazil-cpf-number.md)
+- [Brazil legal entity number (CNPJ)](../compliance/sit-defn-brazil-legal-entity-number.md)
+- [Brazil national identification card (RG)](../compliance/sit-defn-brazil-national-identification-card.md)
+- [Brazil physical addresses](../compliance/sit-defn-brazil-physical-addresses.md)
+- [Bulgaria driver's license number](../compliance/sit-defn-bulgaria-drivers-license-number.md)
+- [Bulgaria passport number](../compliance/sit-defn-bulgaria-passport-number.md)
+- [Bulgaria physical addresses](../compliance/sit-defn-bulgaria-physical-addresses.md)
+- [Bulgaria uniform civil number](../compliance/sit-defn-bulgaria-uniform-civil-number.md)
+- [Canada bank account number](../compliance/sit-defn-canada-bank-account-number.md)
+- [Canada driver's license number](../compliance/sit-defn-canada-drivers-license-number.md)
+- [Canada health service number](../compliance/sit-defn-canada-health-service-number.md)
+- [Canada passport number](../compliance/sit-defn-canada-passport-number.md)
+- [Canada personal health identification number (PHIN)](../compliance/sit-defn-canada-personal-health-identification-number.md)
+- [Canada physical addresses](../compliance/sit-defn-canada-physical-addresses.md)
+- [Canada social insurance number](../compliance/sit-defn-canada-social-insurance-number.md)
+- [Chile identity card number](../compliance/sit-defn-chile-identity-card-number.md)
+- [China resident identity card (PRC) number](../compliance/sit-defn-china-resident-identity-card-number.md)
+- [Client secret / API key](../compliance/sit-defn-client-secret-api-key.md)
+- [Credit card number](../compliance/sit-defn-credit-card-number.md)
+- [Croatia driver's license number](../compliance/sit-defn-croatia-drivers-license-number.md)
+- [Croatia identity card number](../compliance/sit-defn-croatia-identity-card-number.md)
+- [Croatia passport number](../compliance/sit-defn-croatia-passport-number.md)
+- [Croatia personal identification (OIB) number](../compliance/sit-defn-croatia-personal-identification-number.md)
+- [Croatia physical addresses](../compliance/sit-defn-croatia-physical-addresses.md)
+- [Cyprus drivers license number](../compliance/sit-defn-cyprus-drivers-license-number.md)
+- [Cyprus identity card](../compliance/sit-defn-cyprus-identity-card.md)
+- [Cyprus passport number](../compliance/sit-defn-cyprus-passport-number.md)
+- [Cyprus physical addresses](../compliance/sit-defn-cyprus-physical-addresses.md)
+- [Cyprus tax identification number](../compliance/sit-defn-cyprus-tax-identification-number.md)
+- [Czech driver's license number](../compliance/sit-defn-czech-drivers-license-number.md)
+- [Czech passport number](../compliance/sit-defn-czech-passport-number.md)
+- [Czech personal identity number](../compliance/sit-defn-czech-personal-identity-number.md)
+- [Czech Republic physical addresses](../compliance/sit-defn-czech-republic-physical-addresses.md)
+- [Denmark driver's license number](../compliance/sit-defn-denmark-drivers-license-number.md)
+- [Denmark passport number](../compliance/sit-defn-denmark-passport-number.md)
+- [Denmark personal identification number](../compliance/sit-defn-denmark-personal-identification-number.md)
+- [Denmark physical addresses](../compliance/sit-defn-denmark-physical-addresses.md)
+- [Diseases](../compliance/sit-defn-diseases.md)
+- [Drug Enforcement Agency (DEA) number](../compliance/sit-defn-drug-enforcement-agency-number.md)
+- [Estonia driver's license number](../compliance/sit-defn-estonia-drivers-license-number.md)
+- [Estonia passport number](../compliance/sit-defn-estonia-passport-number.md)
+- [Estonia Personal Identification Code](../compliance/sit-defn-estonia-personal-identification-code.md)
+- [Estonia physical addresses](../compliance/sit-defn-estonia-physical-addresses.md)
+- [EU debit card number](../compliance/sit-defn-eu-debit-card-number.md)
+- [EU driver's license number](../compliance/sit-defn-eu-drivers-license-number.md)
+- [EU national identification number](../compliance/sit-defn-eu-national-identification-number.md)
+- [EU passport number](../compliance/sit-defn-eu-passport-number.md)
+- [EU social security number or equivalent identification](../compliance/sit-defn-eu-social-security-number-equivalent-identification.md)
+- [EU Tax identification number](../compliance/sit-defn-eu-tax-identification-number.md)
+- [Finland driver's license number](../compliance/sit-defn-finland-drivers-license-number.md)
+- [Finland european health insurance number](../compliance/sit-defn-finland-european-health-insurance-number.md)
+- [Finland national ID](../compliance/sit-defn-finland-national-id.md)
+- [Finland passport number](../compliance/sit-defn-finland-passport-number.md)
+- [Finland physical addresses](../compliance/sit-defn-finland-physical-addresses.md)
+- [France driver's license number](../compliance/sit-defn-france-drivers-license-number.md)
+- [France health insurance number](../compliance/sit-defn-france-health-insurance-number.md)
+- [France national id card (CNI)](../compliance/sit-defn-france-national-id-card.md)
+- [France passport number](../compliance/sit-defn-france-passport-number.md)
+- [France physical addresses](../compliance/sit-defn-france-physical-addresses.md)
+- [France social security number (INSEE)](../compliance/sit-defn-france-social-security-number.md)
+- [France tax identification number](../compliance/sit-defn-france-tax-identification-number.md)
+- [France value added tax number](../compliance/sit-defn-france-value-added-tax-number.md)
+- [General password](../compliance/sit-defn-general-password.md)
+- [General Symmetric key](../compliance/sit-defn-general-symmetric-key.md)
+- [Generic medication names](../compliance/sit-defn-generic-medication-names.md)
+- [Germany driver's license number](../compliance/sit-defn-germany-drivers-license-number.md)
+- [Germany identity card number](../compliance/sit-defn-germany-identity-card-number.md)
+- [Germany passport number](../compliance/sit-defn-germany-passport-number.md)
+- [Germany physical addresses](../compliance/sit-defn-germany-physical-addresses.md)
+- [Germany tax identification number](../compliance/sit-defn-germany-tax-identification-number.md)
+- [Germany value added tax number](../compliance/sit-defn-germany-value-added-tax-number.md)
+- [GitHub Personal Access Token](../compliance/sit-defn-github-personal-access-token.md)
+- [Google API key](../compliance/sit-defn-google-api-key.md)
+- [Greece driver's license number](../compliance/sit-defn-greece-drivers-license-number.md)
+- [Greece national ID card](../compliance/sit-defn-greece-national-id-card.md)
+- [Greece passport number](../compliance/sit-defn-greece-passport-number.md)
+- [Greece physical addresses](../compliance/sit-defn-greece-physical-addresses.md)
+- [Greece Social Security Number (AMKA)](../compliance/sit-defn-greece-social-security-number.md)
+- [Greece tax identification number](../compliance/sit-defn-greece-tax-identification-number.md)
+- [Hong Kong identity card (HKID) number](../compliance/sit-defn-hong-kong-identity-card-number.md)
+- [Http authorization header](../compliance/sit-defn-http-authorization-header.md)
+- [Hungary driver's license number](../compliance/sit-defn-hungary-drivers-license-number.md)
+- [Hungary passport number](../compliance/sit-defn-hungary-passport-number.md)
+- [Hungary personal identification number](../compliance/sit-defn-hungary-personal-identification-number.md)
+- [Hungary physical addresses](../compliance/sit-defn-hungary-physical-addresses.md)
+- [Hungary social security number (TAJ)](../compliance/sit-defn-hungary-social-security-number.md)
+- [Hungary tax identification number](../compliance/sit-defn-hungary-tax-identification-number.md)
+- [Hungary value added tax number](../compliance/sit-defn-hungary-value-added-tax-number.md)
+- [Iceland physical addresses](../compliance/sit-defn-iceland-physical-addresses.md)
+- [Impairments Listed In The U.S. Disability Evaluation Under Social Security](../compliance/sit-defn-impairments-us-disability-evaluation-under-social-security.md)
+- [India Driver's License Number](../compliance/sit-defn-india-drivers-license-number.md)
+- [India GST Number](../compliance/sit-defn-india-gst-number.md)
+- [India permanent account number (PAN)](../compliance/sit-defn-india-permanent-account-number.md)
+- [India unique identification (Aadhaar) number](../compliance/sit-defn-india-unique-identification-number.md)
+- [India Voter Id Card](../compliance/sit-defn-india-voter-id-card.md)
+- [Indonesia identity card (KTP) number](../compliance/sit-defn-indonesia-identity-card-number.md)
+- [International banking account number (IBAN)](../compliance/sit-defn-international-banking-account-number.md)
+- [International classification of diseases (ICD-10-CM)](../compliance/sit-defn-international-classification-of-diseases-icd-10-cm.md)
+- [International classification of diseases (ICD-9-CM)](../compliance/sit-defn-international-classification-of-diseases-icd-9-cm.md)
+- [IP address](../compliance/sit-defn-ip-address.md)
+- [IP Address v4](../compliance/sit-defn-ip-address-v4.md)
+- [IP Address v6](../compliance/sit-defn-ip-address-v6.md)
+- [Ireland driver's license number](../compliance/sit-defn-ireland-drivers-license-number.md)
+- [Ireland passport number](../compliance/sit-defn-ireland-passport-number.md)
+- [Ireland personal public service (PPS) number](../compliance/sit-defn-ireland-personal-public-service-number.md)
+- [Ireland physical addresses](../compliance/sit-defn-ireland-physical-addresses.md)
+- [Israel bank account number](../compliance/sit-defn-israel-bank-account-number.md)
+- [Israel national identification number](../compliance/sit-defn-israel-national-identification-number.md)
+- [Italy driver's license number](../compliance/sit-defn-italy-drivers-license-number.md)
+- [Italy fiscal code](../compliance/sit-defn-italy-fiscal-code.md)
+- [Italy passport number](../compliance/sit-defn-italy-passport-number.md)
+- [Italy physical addresses](../compliance/sit-defn-italy-physical-addresses.md)
+- [Italy value added tax number](../compliance/sit-defn-italy-value-added-tax-number.md)
+- [Japan bank account number](../compliance/sit-defn-japan-bank-account-number.md)
+- [Japan driver's license number](../compliance/sit-defn-japan-drivers-license-number.md)
+- [Japan My Number - Corporate](../compliance/sit-defn-japan-my-number-corporate.md)
+- [Japan My Number - Personal](../compliance/sit-defn-japan-my-number-personal.md)
+- [Japan passport number](../compliance/sit-defn-japan-passport-number.md)
+- [Japan physical addresses](../compliance/sit-defn-japan-physical-addresses.md)
+- [Japan residence card number](../compliance/sit-defn-japan-residence-card-number.md)
+- [Japan resident registration number](../compliance/sit-defn-japan-resident-registration-number.md)
+- [Japan social insurance number (SIN)](../compliance/sit-defn-japan-social-insurance-number.md)
+- [Lab test terms](../compliance/sit-defn-lab-test-terms.md)
+- [Latvia driver's license number](../compliance/sit-defn-latvia-drivers-license-number.md)
+- [Latvia passport number](../compliance/sit-defn-latvia-passport-number.md)
+- [Latvia personal code](../compliance/sit-defn-latvia-personal-code.md)
+- [Latvia physical addresses](../compliance/sit-defn-latvia-physical-addresses.md)
+- [Liechtenstein physical addresses](../compliance/sit-defn-liechtenstein-physical-addresses.md)
+- [Lifestyles that relate to medical conditions](../compliance/sit-defn-lifestyles-relate-to-medical-conditions.md)
+- [Lithuania driver's license number](../compliance/sit-defn-lithuania-drivers-license-number.md)
+- [Lithuania passport number](../compliance/sit-defn-lithuania-passport-number.md)
+- [Lithuania personal code](../compliance/sit-defn-lithuania-personal-code.md)
+- [Lithuania physical addresses](../compliance/sit-defn-lithuania-physical-addresses.md)
+- [Luxemburg driver's license number](../compliance/sit-defn-luxemburg-drivers-license-number.md)
+- [Luxemburg national identification number (natural persons)](../compliance/sit-defn-luxemburg-national-identification-number-natural-persons.md)
+- [Luxemburg national identification number (non-natural persons)](../compliance/sit-defn-luxemburg-national-identification-number-non-natural-persons.md)
+- [Luxemburg passport number](../compliance/sit-defn-luxemburg-passport-number.md)
+- [Luxemburg physical addresses](../compliance/sit-defn-luxemburg-physical-addresses.md)
+- [Malaysia identification card number](../compliance/sit-defn-malaysia-identification-card-number.md)
+- [Malaysia passport number](../compliance/sit-defn-malaysia-passport-number.md)
+- [Malta driver's license number](../compliance/sit-defn-malta-drivers-license-number.md)
+- [Malta identity card number](../compliance/sit-defn-malta-identity-card-number.md)
+- [Malta passport number](../compliance/sit-defn-malta-passport-number.md)
+- [Malta physical addresses](../compliance/sit-defn-malta-physical-addresses.md)
+- [Malta tax identification number](../compliance/sit-defn-malta-tax-identification-number.md)
+- [Medical specialities](../compliance/sit-defn-medical-specialities.md)
+- [Medicare Beneficiary Identifier (MBI) card](../compliance/sit-defn-medicare-beneficiary-Identifier-card.md)
+- [Mexico Unique Population Registry Code (CURP)](../compliance/sit-defn-mexico-unique-population-registry-code.md)
+- [Microsoft Bing maps key](../compliance/sit-defn-microsoft-bing-maps-key.md)
+- [Netherlands citizen's service (BSN) number](../compliance/sit-defn-netherlands-citizens-service-number.md)
+- [Netherlands driver's license number](../compliance/sit-defn-netherlands-drivers-license-number.md)
+- [Netherlands passport number](../compliance/sit-defn-netherlands-passport-number.md)
+- [Netherlands physical addresses](../compliance/sit-defn-netherlands-physical-addresses.md)
+- [Netherlands tax identification number](../compliance/sit-defn-netherlands-tax-identification-number.md)
+- [Netherlands value added tax number](../compliance/sit-defn-netherlands-value-added-tax-number.md)
+- [New Zealand bank account number](../compliance/sit-defn-new-zealand-bank-account-number.md)
+- [New Zealand driver's license number](../compliance/sit-defn-new-zealand-drivers-license-number.md)
+- [New Zealand inland revenue number](../compliance/sit-defn-new-zealand-inland-revenue-number.md)
+- [New Zealand ministry of health number](../compliance/sit-defn-new-zealand-ministry-of-health-number.md)
+- [New Zealand physical addresses](../compliance/sit-defn-new-zealand-physical-addresses.md)
+- [New Zealand social welfare number](../compliance/sit-defn-new-zealand-social-welfare-number.md)
+- [Norway identification number](../compliance/sit-defn-norway-identification-number.md)
+- [Norway physical addresses](../compliance/sit-defn-norway-physical-addresses.md)
+- [Philippines passport number](../compliance/sit-defn-philippines-passport-number.md)
+- [Philippines unified multi-purpose identification number](../compliance/sit-defn-philippines-unified-multi-purpose-identification-number.md)
+- [Poland driver's license number](../compliance/sit-defn-poland-drivers-license-number.md)
+- [Poland identity card](../compliance/sit-defn-poland-identity-card.md)
+- [Poland national ID (PESEL)](../compliance/sit-defn-poland-national-id.md)
+- [Poland passport number](../compliance/sit-defn-poland-passport-number.md)
+- [Poland physical addresses](../compliance/sit-defn-poland-physical-addresses.md)
+- [Poland REGON number](../compliance/sit-defn-poland-regon-number.md)
+- [Poland tax identification number](../compliance/sit-defn-poland-tax-identification-number.md)
+- [Portugal citizen card number](../compliance/sit-defn-portugal-citizen-card-number.md)
+- [Portugal driver's license number](../compliance/sit-defn-portugal-drivers-license-number.md)
+- [Portugal passport number](../compliance/sit-defn-portugal-passport-number.md)
+- [Portugal physical addresses](../compliance/sit-defn-portugal-physical-addresses.md)
+- [Portugal tax identification number](../compliance/sit-defn-portugal-tax-identification-number.md)
+- [Qatari identification card number](../compliance/sit-defn-qatari-id-card-number.md)
+- [Romania driver's license number](../compliance/sit-defn-romania-drivers-license-number.md)
+- [Romania passport number](../compliance/sit-defn-romania-passport-number.md)
+- [Romania personal numeric code (CNP)](../compliance/sit-defn-romania-personal-numeric-code.md)
+- [Romania physical addresses](../compliance/sit-defn-romania-physical-addresses.md)
+- [Russia passport number domestic](../compliance/sit-defn-russia-passport-number-domestic.md)
+- [Russia passport number international](../compliance/sit-defn-russia-passport-number-international.md)
+- [Saudi Arabia National ID](../compliance/sit-defn-saudi-arabia-national-id.md)
+- [Singapore passport number](../compliance/sit-defn-singapore-passport-number.md#singapore-passport-number)
+- [Singapore national registration identity card (NRIC) number](../compliance/sit-defn-singapore-national-registration-identity-card-number.md)
+- [Slack access token](../compliance/sit-defn-slack-access-token.md)
+- [Slovakia driver's license number](../compliance/sit-defn-slovakia-drivers-license-number.md)
+- [Slovakia passport number](../compliance/sit-defn-slovakia-passport-number.md)
+- [Slovakia personal number](../compliance/sit-defn-slovakia-personal-number.md)
+- [Slovakia physical addresses](../compliance/sit-defn-slovakia-physical-addresses.md)
+- [Slovenia driver's license number](../compliance/sit-defn-slovenia-drivers-license-number.md)
+- [Slovenia passport number](../compliance/sit-defn-slovenia-passport-number.md)
+- [Slovenia physical addresses](../compliance/sit-defn-slovenia-physical-addresses.md)
+- [Slovenia tax identification number](../compliance/sit-defn-slovenia-tax-identification-number.md)
+- [Slovenia Unique Master Citizen Number](../compliance/sit-defn-slovenia-unique-master-citizen-number.md)
+- [South Africa identification number](../compliance/sit-defn-south-africa-identification-number.md)
+- [South Korea driver's license number](../compliance/sit-defn-south-korea-drivers-license-number.md)
+- [South Korea passport number](../compliance/sit-defn-south-korea-passport-number.md)
+- [South Korea resident registration number](../compliance/sit-defn-south-korea-resident-registration-number.md)
+- [Spain DNI](../compliance/sit-defn-spain-dni.md)
+- [Spain driver's license number](../compliance/sit-defn-spain-drivers-license-number.md)
+- [Spain passport number](../compliance/sit-defn-spain-passport-number.md)
+- [Spain physical addresses](../compliance/sit-defn-spain-physical-addresses.md)
+- [Spain social security number (SSN)](../compliance/sit-defn-spain-social-security-number.md)
+- [Spain tax identification number](../compliance/sit-defn-spain-tax-identification-number.md)
+- [SQL Server connection string](../compliance/sit-defn-sql-server-connection-string.md)
+- [Surgical procedures](../compliance/sit-defn-surgical-procedures.md)
+- [Sweden driver's license number](../compliance/sit-defn-sweden-drivers-license-number.md)
+- [Sweden national ID](../compliance/sit-defn-sweden-national-id.md)
+- [Sweden passport number](../compliance/sit-defn-sweden-passport-number.md)
+- [Sweden physical addresses](../compliance/sit-defn-sweden-physical-addresses.md)
+- [Sweden tax identification number](../compliance/sit-defn-sweden-tax-identification-number.md)
+- [SWIFT code](../compliance/sit-defn-swift-code.md)
+- [Switzerland physical addresses](../compliance/sit-defn-switzerland-physical-addresses.md)
+- [Switzerland SSN AHV number](../compliance/sit-defn-switzerland-ssn-ahv-number.md)
+- [Taiwan national identification number](../compliance/sit-defn-taiwan-national-identification-number.md)
+- [Taiwan passport number](../compliance/sit-defn-taiwan-passport-number.md)
+- [Taiwan-resident certificate (ARC/TARC) number](../compliance/sit-defn-taiwan-resident-certificate-number.md)
+- [Thai population identification code](../compliance/sit-defn-thai-population-identification-code.md)
+- [Turkey national identification number](../compliance/sit-defn-turkey-national-identification-number.md)
+- [Turkey physical addresses](../compliance/sit-defn-turkey-physical-addresses.md)
+- [Types of medication](../compliance/sit-defn-types-of-medication.md)
+- [U.A.E. identity card number](../compliance/sit-defn-uae-identity-card-number.md)
+- [U.A.E. passport number](../compliance/sit-defn-uae-passport-number.md)
+- [U.K. driver's license number](../compliance/sit-defn-uk-drivers-license-number.md)
+- [U.K. electoral roll number](../compliance/sit-defn-uk-electoral-roll-number.md)
+- [U.K. national health service number](../compliance/sit-defn-uk-national-health-service-number.md)
+- [U.K. national insurance number (NINO)](../compliance/sit-defn-uk-national-insurance-number.md)
+- [U.K. physical addresses](../compliance/sit-defn-uk-physical-addresses.md)
+- [U.K. Unique Taxpayer Reference Number](../compliance/sit-defn-uk-unique-taxpayer-reference-number.md)
+- [U.S. bank account number](../compliance/sit-defn-us-bank-account-number.md)
+- [U.S. driver's license number](../compliance/sit-defn-us-drivers-license-number.md)
+- [U.S. individual taxpayer identification number (ITIN)](../compliance/sit-defn-us-individual-taxpayer-identification-number.md)
+- [U.S. physical addresses](../compliance/sit-defn-us-physical-addresses.md)
+- [U.S. social security number (SSN)](../compliance/sit-defn-us-social-security-number.md)
+- [U.S./U.K. passport number](../compliance/sit-defn-us-uk-passport-number.md)
+- [Ukraine passport domestic](../compliance/sit-defn-ukraine-passport-domestic.md)
+- [Ukraine passport international](../compliance/sit-defn-ukraine-passport-international.md)
+- [User login credentials](../compliance/sit-defn-user-login-credentials.md)
+- [X.509 certificate private key](../compliance/sit-defn-x-509-certificate-private-key.md)
lighthouse M365 Lighthouse Apps Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-apps-page-overview.md
Previously updated : 04/19/2023 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Block Signin Shared Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-block-signin-shared-mailboxes.md
Previously updated : 12/15/2022 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Block User Signin https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-block-user-signin.md
Previously updated : 11/30/2021 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Change Cloud Pc Account Type https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-change-cloud-pc-account-type.md
Previously updated : 07/26/2022 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Compare Compliance Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-compare-compliance-policies.md
Previously updated : 01/21/2022 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Deploy Task Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-deploy-task-automatically.md
Previously updated : 3/20/2023 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Device Health Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-device-health-overview.md
Previously updated : 04/19/2023 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Dismiss Task https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-dismiss-task.md
Previously updated : 10/24/2022 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Manage Sspr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-manage-sspr.md
Previously updated : 10/21/2021 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Mitigate Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-mitigate-threats.md
Previously updated : 11/19/2021 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Overview Deployment Task https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-overview-deployment-task.md
Previously updated : 3/20/2023 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Overview Of Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-overview-of-permissions.md
Previously updated : 03/25/2022 Last updated : 06/23/2023 audience: Admin
lighthouse M365 Lighthouse Reprovision Cloudpc https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-reprovision-cloudpc.md
Previously updated : 05/13/2022 audience: Admin
lighthouse M365 Lighthouse Reset User Password https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-reset-user-password.md
Previously updated : 11/30/2021 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Search For Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-search-for-users.md
Previously updated : 11/30/2021 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Threat Management Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-threat-management-page-overview.md
Previously updated : 07/07/2021 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Understand Deployment Statuses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-understand-deployment-statuses.md
Previously updated : 3/21/2023 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse View Failed Network Connections https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-view-failed-network-connections.md
Previously updated : 05/13/2022 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse View Service Health https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-view-service-health.md
Previously updated : 02/07/2022 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Vulnerability Management Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-vulnerability-management-page-overview.md
Previously updated : 03/23/2023 Last updated : 06/21/2023 audience: Admin
lighthouse M365 Lighthouse Win365 Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-win365-page-overview.md
Previously updated : 08/04/2021 Last updated : 06/21/2023 audience: Admin
security Android Configure Mam https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure-mam.md
Microsoft Defender for Endpoint on Android, which already protects enterprise us
Microsoft Defender for Endpoint on Android threat information is applied by Intune App Protection Policies to protect these apps. App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A managed application has app protection policies applied to it and can be managed by Intune.
-Microsoft Defender for Endpoint on Android supports both the configurations of MAM.
+Microsoft Defender for Endpoint on Android supports both the configurations of MAM.
- **Intune MDM + MAM**: IT administrators can only manage apps using App Protection Policies on devices that are enrolled with Intune mobile device management (MDM). - **MAM without device enrollment**: MAM without device enrollment, or MAM-WE, allows IT administrators to manage apps using [App Protection Policies](/mem/intune/apps/app-protection-policy) on devices not enrolled with Intune MDM. This provision means that apps can be managed by Intune on devices enrolled with third-party EMM providers.
End users also need to take steps to install Microsoft Defender for Endpoint on
Select **Setting > Max allowed device threat level** in **Device Conditions** and enter a value. Then select **Action: "Block Access"**. Microsoft Defender for Endpoint on Android shares this Device Threat Level. + :::image type="content" source="images/conditional-launch.png" alt-text="The Device conditions pane in the Microsoft 365 Defender portal" lightbox="images/conditional-launch.png"::: - **Assign user groups for whom the policy needs to be applied.**
End users also need to take steps to install Microsoft Defender for Endpoint on
Select **Included groups**. Then add the relevant groups. :::image type="content" source="images/assignment.png" alt-text="The Included groups pane in the Microsoft 365 Defender portal." lightbox="images/assignment.png":::
+>[!NOTE]
+>If a config policy is to be targeted at unenrolled devices (MAM), the recommendation is to deploy the general app configuration settings in Managed Apps instead of using Managed Devices.
+>When deploying app configuration policies to devices, issues can occur when multiple policies have different values for the same configuration key and are targeted for the same app and user. These issues are due to the lack of a conflict resolution mechanism for resolving the differing values. You can prevent these issues by ensuring that only a single app configuration policy for devices is defined and targeted for the same app and user.
+ ## End-user prerequisites
Admins can use the following steps to enable privacy and not collect the domain
1. Give the policy a **name**. 1. Under the Select Public Apps, choose **Microsoft Defender for Endpoint** as the target app.
+4. On the Settings page, under General Configuration Settings, add **DefenderExcludeURLInReport** and **DefenderExcludeAppInReport** as the keys and value as 1.
+
+1. Add **DefenderMAMConfigs** key and set the value as 1.
+
+5. Assign this policy to users. By default, this value is set to 0.
1. In Settings page, under the General Configuration Settings add **DefenderExcludeURLInReport**, **DefenderExcludeAppInReport** as the keys and value as true.
Admins can use the following steps to enable privacy and not collect the domain
1. Assign this policy to users. By default, this value is set to false. + 1. Review and create the policy. ## Optional permissions
Use the following steps to enable Optional permissions for devices.
1. Select **Microsoft Defender for Endpoint** in public apps. +
+4. On the Settings page, select **Use configuration designer** and **DefenderOptionalVPN** or **DefenderOptionalAccessibility** or **both** as the key.
+
+1. Add **DefenderMAMConfigs** key and set the value as 1.
+
+5. To enable Optional permissions, enter the value as **1** and assign this policy to users. By default, this value is set to 0.
+For users with key set as 1, they will be able to onboard the app without giving these permissions.
+ 1. In Settings page, select **Use configuration designer** and **DefenderOptionalVPN** or **DefenderOptionalAccessibility** or **both** as the key and value type as Boolean. 1. Add **DefenderMAMConfigs** key and set the value as 1.
Use the following steps to enable Optional permissions for devices.
1. To enable Optional permissions, enter value as **true** and assign this policy to users. By default, this value is set to false. For users with key set as true, the users are able to onboard the app without giving these permissions. + 1. Select **Next** and assign this profile to targeted devices/users. ### User flow
security Android Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure.md
Last updated 12/18/2020
## Conditional Access with Defender for Endpoint on Android
-Microsoft Defender for Endpoint on Android along with Microsoft Intune and Azure Active Directory enables enforcing Device compliance and Conditional Access policies based on device risk levels. Defender for Endpoint is a Mobile Threat Defense (MTD) solution that you can deploy to leverage this capability through Intune.
+Microsoft Defender for Endpoint on Android, along with Microsoft Intune and Azure Active Directory, enables enforcing Device compliance and Conditional Access policies based on device risk levels. Defender for Endpoint is a Mobile Threat Defense (MTD) solution that you can deploy through Intune.
For more information about how to set up Defender for Endpoint on Android and Conditional Access, see [Defender for Endpoint and Intune](/mem/intune/protect/advanced-threat-protection).
For more information about how to set up Defender for Endpoint on Android and Co
Defender for Endpoint on Android enables admins to configure custom indicators to support Android devices as well. For more information on how to configure custom indicators, see [Manage indicators](manage-indicators.md). ## Configure web protection+ Defender for Endpoint on Android allows IT Administrators the ability to configure the web protection feature. This capability is available within the Microsoft Intune admin center. [Web protection](web-protection-overview.md) helps to secure devices against web threats and protect users from phishing attacks. Anti-phishing and custom indicators (URL and IP addresses) are supported as part of web protection. Web content filtering is currently not supported on mobile platforms.
Defender for Endpoint on Android allows IT Administrators the ability to configu
This feature provides protection against rogue Wi-Fi related threats and rogue certificates, which are the primary attack vector for Wi-Fi networks. Admins can list the root Certificate Authority (CA) and private root CA certificates in Microsoft Intune admin center and establish trust with endpoints. It provides the user a guided experience to connect to secure networks and also notifies them if a related threat is detected.
-It includes several admin controls to offer flexibility, such as the ability to configure the feature from within the Microsoft Intune admin center and add trusted certificates. Admins can also enable [privacy controls](/microsoft-365/security/defender-endpoint/android-configure#privacy-controls) to configure the data that's sent by Defender for Endpoint from Android devices.
+It includes several admin controls to offer flexibility, such as the ability to configure the feature from within the Microsoft Intune admin center and add trusted certificates. Admins can enable [privacy controls](/microsoft-365/security/defender-endpoint/android-configure#privacy-controls) to configure the data sent to Defender for Endpoint from Android devices.
Network protection in Microsoft Defender for endpoint is disabled by default. Admins can use the following steps to **configure Network protection in Android devices.**
Network protection in Microsoft Defender for endpoint is disabled by default. Ad
> [!div class="mx-imgBorder"] > ![Image of add configuration policy.](images/npvalue.png)
-1. If your organization uses root CAs that are private in nature, you need to establish explicit trust between Intune (MDM solution) and user devices so Defender doesn't flag them as rogue certificates.
+1. If your organization uses root CAs that are private, you must establish explicit trust between Intune (MDM solution) and user devices. Establishing trust helps prevent Defender from flagging root CAs as rogue certificates.
To establish trust for the root CAs, use **'Trusted CA certificate list for Network Protection'** as the key. In the value, add the **'comma separated list of certificate thumbprints (SHA 1)'**.
Network protection in Microsoft Defender for endpoint is disabled by default. Ad
| Configuration Key| Description| |||
- |Trusted CA certificate list for Network Protection|This setting is managed by a security admin to establish trust for root CA and self-signed certificates|
+ |Trusted CA certificate list for Network Protection|Security admins manage this setting to establish trust for root CA and self-signed certificates.|
+ |Enable Network protection in Microsoft Defender|1 - Enable, 0- Disable (default). This setting is used by the IT admin to enable or disable the network protection capabilities in the Defender app.|
+ |Enable Network Protection Privacy|1 - Enable (default), 0 - Disable. Security admins manage this setting to enable or disable privacy in network protection.|
+ |Enable Users to Trust Networks and Certificates|1 - Enable, 0 - Disable (default). Security admins manage this setting to enable or disable the end user's in-app experience to trust and untrust unsecure and suspicious networks and malicious certificates.|
+ |Automatic Remediation of Network Protection Alerts|1 - Enable (default), 0 - Disable. Security admins manage this setting to enable or disable the remediation alerts that are sent when a user performs remediation activities, such as switching to a safer Wi-Fi access point or deleting suspicious certificates detected by Defender.|
+ |Manage Network Protection detection for Open Networks|0 - Disable (default), 1 - Audit Mode, 2 - Enable. Security admins manage this setting to disable, audit, or enable open network detection, respectively. In 'Audit' mode, alerts are sent only to the ATP portal with no end user experience. For user experience, set the config to 'Enable' mode.|
+ |Manage Network protection Detection for Certificates|0 - Disable, 1 - Audit mode (default), 2 - Enable. When network protection is enabled, Audit mode for certificate detection is enabled by default. In Audit mode, notification alerts are sent to SOC admins, but no end-user notifications are displayed to the user when Defender detects a bad certificate. Admins can, however, disable this detection with 0 as the value and enable full feature functionality by setting 2 as the value. When the feature is enabled with the value of 2, end-user notifications are sent to the user when Defender detects a bad certificate, and alerts are also sent to the SOC Admin.|
+
+6. Add the required groups to which the policy will have to be applied. Review and create the policy.
+
+ | Configuration Key| Description|
+ |||
|Enable Network protection in Microsoft Defender|1: Enable <br/> 0: Disable (default) <br/><br/> This setting is used by the IT admin to enable or disable the network protection capabilities in the Defender app.|
- |Enable Network Protection Privacy|1: Enable (default) <br/> 0: Disable <br/><br/> This setting is managed by IT admins to enable or disable privacy in network protection.|
+ |Enable Network Protection Privacy|1: Enable (default) <br/> 0: Disable <br/><br/> Security admins manage this setting to enable or disable privacy in network protection.|
|Enable Users to Trust Networks and Certificates|1 <br/> Enable <br/> 0:Disable (default) <br/><br/> This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks and malicious certificates.| |Automatic Remediation of Network Protection Alerts|1: Enable (default) <br/> 0: Disable <br/><br/> This setting is used by IT admins to enable or disable the remediation alerts that are sent when a user does remediation activities. For example, the user switches to a safer Wi-Fi access point or deletes suspicious certificates that were detected by Defender.|
- |Manage Network Protection detection for Open Networks|0: Disable (default) <br/> 1: Audit Mode <br/><br/> This setting is managed by IT Admin to enable or disable open network detection.|
+ |Manage Network Protection detection for Open Networks|0: Disable (default) <br/> 1: Audit Mode <br/><br/> Security admins manage this setting to enable or disable open network detection.|
|Manage Network protection Detection for Certificates|0: Disable <br/> 1: Audit mode (default) <br/> 2: Enable <br/><br/> When network protection is enabled, Audit mode for certificate detection is enabled by default. In audit mode, notification alerts are sent to SOC admins, but no end user notifications are shown when Defender detects a bad certificate. Admins can disable this detection with the value 0 or enable full feature functionality by setting the value 2. When the value is 2, end user notifications are sent to users and alerts are sent to SOC admins when Defender detects a bad certificate.|
-1. Add the required groups on which the policy will have to be applied. Review and create the policy.
+1. Add the required groups to which the policy has to be applied. Review and create the policy.
> [!NOTE] > Users need to enable location permission (which is an optional permission); this enables Defender for Endpoint to scan their networks and alert them when there are WIFI-related threats. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates. + ## Privacy Controls Following privacy controls are available for configuring the data that is sent by Defender for Endpoint from Android devices: |Threat Report |Details | |--|-|
-|Malware report |Admins can set up privacy control for malware report - If privacy is enabled, then Defender for Endpoint will not send the malware app name and other app details as part of the malware alert report |
-|Phish report |Admins can set up privacy control for phish report - If privacy is enabled, then Defender for Endpoint will not send the domain name and details of the unsafe website as part of the phish alert report |
+|Malware report |Admins can set up privacy control for malware report. If privacy is enabled, then Defender for Endpoint won't send the malware app name and other app details as part of the malware alert report. |
+|Phish report |Admins can set up privacy control for phishing reports. If privacy is enabled, then Defender for Endpoint won't send the domain name and details of the unsafe website as part of the phishing alert report. |
|Vulnerability assessment of apps |By default only information about apps installed in the work profile is sent for vulnerability assessment. Admins can disable privacy to include personal apps|
-|Network Protection (preview)| Admins can enable or disable privacy in network protection - If enabled, then Defender will not send network details.|
+|Network Protection (preview)| Admins can enable or disable privacy in network protection. If enabled, then Defender won't send network details.|
### Configure privacy alert report
-Admins can now enable privacy control for the phish report, malware report and network report sent by Microsoft Defender for Endpoint on android. This configuration ensures that the domain name, app details and network details respectively are not sent as part of the alert whenever a corresponding threat is detected.
+Admins can now enable privacy control for the phishing report, malware report, and network report sent by Microsoft Defender for Endpoint on Android. This configuration ensures that the domain name, app details, and network details, respectively, aren't sent as part of the alert whenever a corresponding threat is detected.
Admin Privacy Controls (MDM) Use the following steps to enable privacy.
Admin Privacy Controls (MDM) Use the following steps to enable privacy.
3. Select **Microsoft Defender for Endpoint** as the target app.
-4. In Settings page, select **Use configuration designer** and add click on **Add**.
+4. On the Settings page, select **Use configuration designer** and then select **Add**.
5. Select the required privacy setting - - Hide URLs in report
Admin Privacy Controls (MDM) Use the following steps to enable privacy.
These controls help the end user to configure the information shared to their organization.
-1. For **Android Enterprise work profile**, end user controls will not be visible. Admins control these settings.
+1. For **Android Enterprise work profile**, end user controls won't be visible. Admins control these settings.
2. For **Android Enterprise personal profile**, the control is displayed under **Settings> Privacy**.
-3. Users will see a toggle for Unsafe Site Info, malicious application, and network protection.
+3. Users see a toggle for Unsafe Site Info, malicious application, and network protection.
These toggles will only be visible if enabled by the admin. Users can decide if they want to send the information to their organization or not.
-Enabling/disabling the above privacy controls will not impact the device compliance check or conditional access.
+Enabling/disabling the above privacy controls won't impact the device compliance check or conditional access.
## Configure vulnerability assessment of apps for BYOD devices
-From version 1.0.3425.0303 of Microsoft Defender for Endpoint on Android, you'll be able to run vulnerability assessments of OS and apps installed on the onboarded mobile devices.
+From version 1.0.3425.0303 of Microsoft Defender for Endpoint on Android, you're able to run vulnerability assessments of the OS and apps installed on the onboarded mobile devices.
> [!NOTE] > Vulnerability assessment is part of [Microsoft Defender Vulnerability Management](../defender-vulnerability-management/defender-vulnerability-management.md) in Microsoft Defender for Endpoint.
Use the following steps to **enable vulnerability assessment of apps** from devi
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings: - **Platform**: Select Android device administrator
- - **Profile**: Select "Custom" and click Create
+ - **Profile**: Select "Custom" and select Create.
2. In the **Basics** section, specify a name and description of the profile.
Use the following steps to **enable vulnerability assessment of apps** from devi
- Data type: Select Integer in the drop-down list. - Value: Enter 0 to disable privacy setting (By default, the value is 1)
-4. Click **Next** and assign this profile to targeted devices/users.
+4. Select **Next** and assign this profile to targeted devices/users.
### Configure privacy for Android Enterprise work profile
Defender for Endpoint supports vulnerability assessment of apps in the work prof
3. Select **Microsoft Defender for Endpoint** as the target app. 4. In Settings page, select **Use configuration designer** and add **DefenderTVMPrivacyMode** as the key and value type as **Integer** - To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
- - For users with key set as `0`, Defender for Endpoint will send the list of apps from the work profile to the backend service for vulnerability assessment.
-5. Click **Next** and assign this profile to targeted devices/users.
+ - For users with key set as `0`, Defender for Endpoint sends the list of apps from the work profile to the backend service for vulnerability assessment.
+5. Select **Next** and assign this profile to targeted devices/users.
-Turning the above privacy controls on or off will not impact the device compliance check or conditional access.
+Turning the above privacy controls on or off won't impact the device compliance check or conditional access.
## Configure privacy for phishing alert report
Use the following steps to turn it on for targeted users:
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings: - **Platform**: Select Android device administrator.
- - **Profile**: Select "Custom" and click **Create**.
+ - **Profile**: Select "Custom" and select **Create**.
2. In the **Basics** section, specify a name and description of the profile.
Use the following steps to turn it on for targeted users:
- Data type: Select Integer in the drop-down list. - Value: Enter 1 to enable privacy setting. The default value is 0.
-4. Click **Next** and assign this profile to targeted devices/users.
+4. Select **Next** and assign this profile to targeted devices/users.
-Using this privacy control will not impact the device compliance check or conditional access.
+Using this privacy control won't impact the device compliance check or conditional access.
### Configure privacy for phishing alert report on Android Enterprise work profile
Use the following steps to turn on privacy for targeted users in the work profil
3. Select **Microsoft Defender for Endpoint** as the target app. 4. In Settings page, select **Use configuration designer** and add **DefenderExcludeURLInReport** as the key and value type as **Integer**. - Enter **1 to enable privacy**. The default value is 0.
-5. Click **Next** and assign this profile to targeted devices/users.
+5. Select **Next** and assign this profile to targeted devices/users.
-Turning the above privacy controls on or off will not impact the device compliance check or conditional access.
+Turning the above privacy controls on or off won't impact the device compliance check or conditional access.
## Configure privacy for malware threat report
Use the following steps to turn it on for targeted users:
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings: - **Platform**: Select Android device administrator.
- - **Profile**: Select "Custom" and click **Create**.
+ - **Profile**: Select "Custom" and select **Create**.
2. In the **Basics** section, specify a name and description of the profile.
Use the following steps to turn it on for targeted users:
- Data type: Select Integer in the drop-down list. - Value: Enter 1 to enable privacy setting. The default value is 0.
-4. Click **Next** and assign this profile to targeted devices/users.
+4. Select **Next** and assign this profile to targeted devices/users.
-Using this privacy control will not impact the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
+Using this privacy control won't impact the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
### Configure privacy for malware alert report on Android Enterprise work profile
Use the following steps to turn on privacy for targeted users in the work profil
3. Select **Microsoft Defender for Endpoint** as the target app. 4. In Settings page, select **Use configuration designer** and add **DefenderExcludeAppInReport** as the key and value type as **Integer** - Enter **1 to enable privacy**. The default value is 0.
-5. Click **Next** and assign this profile to targeted devices/users.
+5. Select **Next** and assign this profile to targeted devices/users.
-Using this privacy control will not impact the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
+Using this privacy control won't impact the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
-## Related topics
+## Related articles
- [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md) - [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)
security Android Support Signin https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-support-signin.md
from Google Play Store and try again.
## Sign in failed - invalid license
-**Sign in failed:** *Invalid license, please contact administrator*
+**Sign in failed:** *Invalid license, contact administrator*
:::image type="content" source="images/920e433f440fa1d3d298e6a2a43d4811.png" alt-text="The directive contact details in the sign-in page of the Microsoft Defender 365 portal" lightbox="images/920e433f440fa1d3d298e6a2a43d4811.png":::
-**Message:** *Invalid license, please contact administrator*
+**Message:** *Invalid license, contact administrator*
**Cause:**
Phishing websites impersonate trustworthy websites for obtaining your personal o
- **Xiaomi**
-Phishing and harmful web threats that are detected by Defender for Endpoint
+Phishing and harmful web threats detected by Defender for Endpoint
for Android aren't blocked on some Xiaomi devices. The following functionality doesn't work on these devices. :::image type="content" source="images/0c04975c74746a5cdb085e1d9386e713.png" alt-text="A site-unsafe notification message" lightbox="images/0c04975c74746a5cdb085e1d9386e713.png"::: **Cause:**
-Xiaomi devices include a new permission model. This prevents Defender for Endpoint for Android from displaying pop-up windows while it runs in the background.
+Xiaomi devices include a new permission model. This permission model prevents Defender for Endpoint for Android from displaying pop-up windows while it runs in the background.
Xiaomi devices permission: "Display pop-up windows while running in the background."
Defender App asks for Battery Optimization/Permanent Protection permission on de
Xiaomi changed the battery optimization permissions in Android 11. Defender for Endpoint isn't allowed to configure this setting to ignore battery optimizations. **Solution:**
+1. Install MDE app in personal profile. (Sign-in is not required.)
+2. Open the Company Portal and tap on Settings.
+3. Go to the Battery Optimization section, tap on the ΓÇ£Turn OffΓÇ¥ button, and then click on ΓÇ£AllowΓÇ¥ to turn Battery Optimization off for the Company Portal.
+4. Again, go to the Battery Optimization section and tap on the ΓÇ£Turn OnΓÇ¥ button. The battery saver section opens.
+5. Find the Defender app and tap on it.
+6. Select ΓÇ£No RestrictionΓÇ¥. Go back to the Defender app in work profile and tap on "Allow" button.
+7. The application should not be uninstalled from personal profile for this to work.
++
+>[!NOTE]
+>This is a temporary workaround. This can be used to unblock onboarding on Xiaomi devices. The Defender team is working on a permanent fix. As the MDE app is not onboarded in the personal profile, it will not have any visibility there.
+
+## Unable to use banking applications with MDE app
+
+**Applies to:** Banking apps like iMobile Pay (ICICI), PNB ONE.
+
+**Cause:** Android allows apps in the personal profile to check if there is a VPN active on the device, even outside of the personal profile. The banking app checks that and blocks it in VPN work profiles only. The banking app does not work with any other VPN product.
+
+**Solution:**
+Users will need to disable MDE VPN from the Settings page. The following steps can be used:
+1. Go to Settings on the mobile device.
+2. Search for VPN or open 'Network and Internet' and click on VPN.
+3. Click on Microsoft Defender and select Disconnect.
+
+Users should enable VPN when they are no longer using the banking app to ensure that their devices are protected.
+
+>[!NOTE]
+> This is a temporary workaround. We are working on other alternatives to provide users more control over the VPN settings from wihtin the app.
+
-> [!IMPORTANT]
-> This issue has been resolved. Please update to the latest app version to complete the onboarding process. If the issue persists, please send an **[in-app feedback](/microsoft-365/security/defender-endpoint/android-support-signin#send-in-app-feedback)**.
## Send in-app feedback
security Configure Server Endpoints https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-server-endpoints.md
Data collected by Defender for Endpoint is stored in the geo-location of the ten
- Download the onboarding package - Follow the onboarding steps for the corresponding tool
-> [!IMPORTANT]
-> To be eligible to acquire Microsoft Defender for Endpoint Server licenses (one per covered server instance), you must have already purchased a combined minimum of 50 licenses for one or more of the following:
->
-> - Microsoft Defender for Endpoint (per user)
-> - Windows E5/A5
-> - Microsoft 365 E5/A5
-> - Microsoft 365 E5 Security User subscription licenses.
- ## Windows Server 2012 R2 and Windows Server 2016 ### New Windows Server 2012 R2 and 2016 functionality in the modern unified solution
security Enable Controlled Folders https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-controlled-folders.md
For more information about disabling local list merging, see [Prevent or allow u
2. Go to **Attack Surface Reduction** \> **Policy**.
-3. Select **Platform**, choose **Windows 10 and later**, and select the profile **Attack Surface Reduction rules** \> **Create**.
+3. Select **Platform**, choose **Windows 10, Windows 11, and Windows Server**, and select the profile **Attack Surface Reduction rules** \> **Create**.
4. Name the policy and add a description. Select **Next**.
security Ios Configure Features https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-configure-features.md
Follow the below steps for setting up MDM configuration for enrolled devices for
| Key | Value Type | Default (true-enable, false-disable) | Description | | | | | |
- | `DefenderOpenNetworkDetection` | Integer | 0 | 1 - enable, 0 - disable; This setting is managed by IT Admin to enable or disable open network detection informational alerts with no end user detection experience. |
+ | `DefenderOpenNetworkDetection` | Integer | 0 | 1 - Audit, 0 - Disable(default), 2 - Enable. This setting is managed by an IT Admin to audit, disable, or enable open network detection, respectively. In 'Audit' mode, alerts will be sent only to the ATP portal with no end-user experience. For end-user experience, set the config to 'Enable' mode.|
| `DefenderEndUserTrustFlowEnable` | String | false | true - enable, false - disable; This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks. | | `DefenderNetworkProtectionAutoRemediation` | String | true | true - enable, false - disable; This setting is used by the IT admin to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer WIFI access points or deleting suspicious certificates detected by Defender. | | `DefenderNetworkProtectionPrivacy` | String | true | true - enable, false - disable; This setting is managed by IT admin to enable or disable privacy in network protection. |
Follow the below steps for setting up MAM config for unenrolled devices for Netw
|Key| Default (true - enable, false - disable)|Description| ||||
- |`DefenderOpenNetworkDetection`|0|1 - enable, 0 - disable; This setting is managed by IT Admin to enable or disable open network detection informational alerts with no end user detection experience.|
+ |`DefenderOpenNetworkDetection`|0|1 - enable, 0 - disable, 2 - Enable. This setting is managed by an IT Admin to enable, audit, or disable open network detection. In Audit mode, alerts will be sent only to the ATP portal with no user side experience. For user experience, set the config to "Enable" mode.|
|`DefenderEndUserTrustFlowEnable`| false | true - enable, false - disable; This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks.| |`DefenderNetworkProtectionAutoRemediation`| true |true - enable, false - disable; This setting is used by the IT admin to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer WIFI access points or deleting suspicious certificates detected by Defender.| |`DefenderNetworkProtectionPrivacy`| true |true - enable, false - disable; This setting is managed by IT admin to enable or disable privacy in network protection.|
security Linux Install Manually https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-manually.md
This article describes how to deploy Microsoft Defender for Endpoint on Linux ma
- [Prerequisites and system requirements](#prerequisites-and-system-requirements) - [Configure the Linux software repository](#configure-the-linux-software-repository)
+ - [RHEL and variants (CentOS, Fedora, Oracle Linux and Amazon Linux 2)](#rhel-and-variants-centos-fedora-oracle-linux-and-amazon-linux-2-1)
+ - [SLES and variants](#sles-and-variants-1)
+ - [Ubuntu and Debian systems](#ubuntu-and-debian-systems-1)
+- [Application installation](#application-installation)
- [RHEL and variants (CentOS, Fedora, Oracle Linux and Amazon Linux 2)](#rhel-and-variants-centos-fedora-oracle-linux-and-amazon-linux-2) - [SLES and variants](#sles-and-variants) - [Ubuntu and Debian systems](#ubuntu-and-debian-systems)-- [Application installation](#application-installation) - [Download the onboarding package](#download-the-onboarding-package) - [Client configuration](#client-configuration)
In order to preview new features and provide early feedback, it is recommended t
- Install `yum-utils` if it isn't installed yet:
- ```bash
- sudo yum install yum-utils
- ```
+ ```bash
+ sudo yum install yum-utils
+ ```
> [!NOTE] > Your distribution and version, and identify the closest entry (by major, then minor) for it under `https://packages.microsoft.com/config/rhel/`.
- Use the following table to help guide you in locating the package:
+ Use the following table to help guide you in locating the package:
- |Distro & version|Package|
- |||
- |For RHEL/Centos/Oracle 8.0-8.7|<https://packages.microsoft.com/config/rhel/8/prod.repo>|
- |For RHEL/Centos/Oracle 7.2-7.9 & Amazon Linux 2 |<https://packages.microsoft.com/config/rhel/7.2/prod.repo>|
- |For Fedora 33|<https://packages.microsoft.com/config/fedora/33/prod.repo>|
- |For Fedora 34|<https://packages.microsoft.com/config/fedora/34/prod.repo>|
+ |Distro & version|Package|
+ |||
+ |For RHEL/Centos/Oracle 8.0-8.7|<https://packages.microsoft.com/config/rhel/8/prod.repo>|
+ |For RHEL/Centos/Oracle 7.2-7.9 & Amazon Linux 2 |<https://packages.microsoft.com/config/rhel/7.2/prod.repo>|
+ |For Fedora 33|<https://packages.microsoft.com/config/fedora/33/prod.repo>|
+ |For Fedora 34|<https://packages.microsoft.com/config/fedora/34/prod.repo>|
- <!--|For RHEL/Centos 6.7-6.10|<https://packages.microsoft.com/config/rhel/6/[channel].repo>|-->
+ <!--|For RHEL/Centos 6.7-6.10|<https://packages.microsoft.com/config/rhel/6/[channel].repo>|-->
- In the following commands, replace *[version]* and *[channel]* with the information you've identified:
+ In the following commands, replace *[version]* and *[channel]* with the information you've identified:
- ```bash
- sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/[version]/[channel].repo
- ```
+ ```bash
+ sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/[version]/[channel].repo
+ ```
- > [!TIP]
- > Use hostnamectl command to identify system related information including release *[version]*.
+ > [!TIP]
+ > Use hostnamectl command to identify system related information including release *[version]*.
- For example, if you are running CentOS 7 and want to deploy Defender for Endpoint on Linux from the *prod* channel:
+ For example, if you are running CentOS 7 and want to deploy Defender for Endpoint on Linux from the *prod* channel:
- ```bash
- sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/prod.repo
- ```
+ ```bash
+ sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/prod.repo
+ ```
- Or if you wish to explore new features on selected devices, you might want to deploy Microsoft Defender for Endpoint on Linux to *insiders-fast* channel:
+ Or if you wish to explore new features on selected devices, you might want to deploy Microsoft Defender for Endpoint on Linux to *insiders-fast* channel:
- ```bash
- sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/insiders-fast.repo
- ```
+ ```bash
+ sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/insiders-fast.repo
+ ```
- Install the Microsoft GPG public key:
- ```bash
- sudo rpm --import http://packages.microsoft.com/keys/microsoft.asc
- ```
+ ```bash
+ sudo rpm --import http://packages.microsoft.com/keys/microsoft.asc
+ ```
### SLES and variants
In order to preview new features and provide early feedback, it is recommended t
- Install the Microsoft GPG public key:
- ```bash
- sudo rpm --import http://packages.microsoft.com/keys/microsoft.asc
- ```
+ ```bash
+ sudo rpm --import http://packages.microsoft.com/keys/microsoft.asc
+ ```
### Ubuntu and Debian systems - Install `curl` if it isn't installed yet:
- ```bash
- sudo apt-get install curl
- ```
+ ```bash
+ sudo apt-get install curl
+ ```
- Install `libplist-utils` if it isn't installed yet:
- ```bash
- sudo apt-get install libplist-utils
- ```
+ ```bash
+ sudo apt-get install libplist-utils
+ ```
- > [!NOTE]
- > Your distribution and version, and identify the closest entry (by major, then minor) for it under `https://packages.microsoft.com/config/[distro]/`.
+ > [!NOTE]
+ > Your distribution and version, and identify the closest entry (by major, then minor) for it under `https://packages.microsoft.com/config/[distro]/`.
- In the following command, replace *[distro]* and *[version]* with the information you've identified:
+ In the following command, replace *[distro]* and *[version]* with the information you've identified:
- ```bash
- curl -o microsoft.list https://packages.microsoft.com/config/[distro]/[version]/[channel].list
- ```
+ ```bash
+ curl -o microsoft.list https://packages.microsoft.com/config/[distro]/[version]/[channel].list
+ ```
- > [!TIP]
- > Use hostnamectl command to identify system related information including release *[version]*.
+ > [!TIP]
+ > Use hostnamectl command to identify system related information including release *[version]*.
- For example, if you are running Ubuntu 18.04 and wish to deploy Microsoft Defender for Endpoint on Linux from the *prod* channel:
+ For example, if you are running Ubuntu 18.04 and wish to deploy Microsoft Defender for Endpoint on Linux from the *prod* channel:
- ```bash
- curl -o microsoft.list https://packages.microsoft.com/config/ubuntu/18.04/prod.list
- ```
+ ```bash
+ curl -o microsoft.list https://packages.microsoft.com/config/ubuntu/18.04/prod.list
+ ```
- Install the repository configuration:
- ```bash
- sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-[channel].list
- ```
+ ```bash
+ sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-[channel].list
+ ```
- For example, if you chose *prod* channel:
+ For example, if you chose *prod* channel:
- ```bash
- sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-prod.list
- ```
+ ```bash
+ sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-prod.list
+ ```
- Install the `gpg` package if not already installed:
- ```bash
- sudo apt-get install gpg
- ```
+ ```bash
+ sudo apt-get install gpg
+ ```
If `gpg` is not available, then install `gnupg`.
- ```bash
- sudo apt-get install gnupg
- ```
+ ```bash
+ sudo apt-get install gnupg
+ ```
- Install the Microsoft GPG public key:
- ```bash
- curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /etc/apt/trusted.gpg.d/microsoft.gpg >
- ```
+ ```bash
+ curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /etc/apt/trusted.gpg.d/microsoft.gpg >
+ ```
- Install the HTTPS driver if not already installed:
- ```bash
- sudo apt-get install apt-transport-https
- ```
+ ```bash
+ sudo apt-get install apt-transport-https
+ ```
- Update the repository metadata:
- ```bash
- sudo apt-get update
- ```
+ ```bash
+ sudo apt-get update
+ ```
## Application installation -- RHEL and variants (CentOS and Oracle Linux):-
- ```bash
- sudo yum install mdatp
- ```
+### RHEL and variants (CentOS, Fedora, Oracle Linux and Amazon Linux 2)
- > [!NOTE]
- > If you have multiple Microsoft repositories configured on your device, you can be specific about which repository to install the package from. The following example shows how to install the package from the `production` channel if you also have the `insiders-fast` repository channel configured on this device. This situation can happen if you are using multiple Microsoft products on your device. Depending on the distribution and the version of your server, the repository alias might be different than the one in the following example.
+```bash
+sudo yum install mdatp
+```
- ```bash
- # list all repositories
- yum repolist
- ```
+> [!NOTE]
+> If you have multiple Microsoft repositories configured on your device, you can be specific about which repository to install the package from. The following example shows how to install the package from the `production` channel if you also have the `insiders-fast` repository channel configured on this device. This situation can happen if you are using multiple Microsoft products on your device. Depending on the distribution and the version of your server, the repository alias might be different than the one in the following example.
- ```Output
- ...
- packages-microsoft-com-prod packages-microsoft-com-prod 316
- packages-microsoft-com-prod-insiders-fast packages-microsoft-com-prod-ins 2
- ...
- ```
+```bash
+# list all repositories
+yum repolist
+```
- ```bash
- # install the package from the production repository
- sudo yum --enablerepo=packages-microsoft-com-prod install mdatp
- ```
+```Output
+...
+packages-microsoft-com-prod packages-microsoft-com-prod 316
+packages-microsoft-com-prod-insiders-fast packages-microsoft-com-prod-ins 2
+...
+```
-- SLES and variants:
+```bash
+# install the package from the production repository
+sudo yum --enablerepo=packages-microsoft-com-prod install mdatp
+```
- ```bash
- sudo zypper install mdatp
- ```
+### SLES and variants
- > [!NOTE]
- > If you have multiple Microsoft repositories configured on your device, you can be specific about which repository to install the package from. The following example shows how to install the package from the `production` channel if you also have the `insiders-fast` repository channel configured on this device. This situation can happen if you are using multiple Microsoft products on your device.
+```bash
+sudo zypper install mdatp
+```
- ```bash
- zypper repos
- ```
+> [!NOTE]
+> If you have multiple Microsoft repositories configured on your device, you can be specific about which repository to install the package from. The following example shows how to install the package from the `production` channel if you also have the `insiders-fast` repository channel configured on this device. This situation can happen if you are using multiple Microsoft products on your device.
- ```Output
- ...
- # | Alias | Name | ...
- XX | packages-microsoft-com-insiders-fast | microsoft-insiders-fast | ...
- XX | packages-microsoft-com-prod | microsoft-prod | ...
- ...
+```bash
+zypper repos
+```
- ```
+```Output
+...
+# | Alias | Name | ...
+XX | packages-microsoft-com-insiders-fast | microsoft-insiders-fast | ...
+XX | packages-microsoft-com-prod | microsoft-prod | ...
+...
+```
- ```bash
- sudo zypper install packages-microsoft-com-prod:mdatp
- ```
+```bash
+sudo zypper install packages-microsoft-com-prod:mdatp
+```
-- Ubuntu and Debian system:
+### Ubuntu and Debian systems
- ```bash
- sudo apt-get install mdatp
- ```
+```bash
+sudo apt-get install mdatp
+```
- > [!NOTE]
- > If you have multiple Microsoft repositories configured on your device, you can be specific about which repository to install the package from. The following example shows how to install the package from the `production` channel if you also have the `insiders-fast` repository channel configured on this device. This situation can happen if you are using multiple Microsoft products on your device.
+> [!NOTE]
+> If you have multiple Microsoft repositories configured on your device, you can be specific about which repository to install the package from. The following example shows how to install the package from the `production` channel if you also have the `insiders-fast` repository channel configured on this device. This situation can happen if you are using multiple Microsoft products on your device.
- ```bash
- cat /etc/apt/sources.list.d/*
- ```
+```bash
+cat /etc/apt/sources.list.d/*
+```
- ```Output
- deb [arch=arm64,armhf,amd64] https://packages.microsoft.com/config/ubuntu/18.04/prod insiders-fast main
- deb [arch=amd64] https://packages.microsoft.com/config/ubuntu/18.04/prod bionic main
- ```
+```Output
+deb [arch=arm64,armhf,amd64] https://packages.microsoft.com/config/ubuntu/18.04/prod insiders-fast main
+deb [arch=amd64] https://packages.microsoft.com/config/ubuntu/18.04/prod bionic main
+```
- ```bash
- sudo apt -t bionic install mdatp
- ```
+```bash
+sudo apt -t bionic install mdatp
+```
> [!NOTE] > Reboots are NOT required after installing or updating Microsoft Defender for Endpoint on Linux except when you're running auditD in immutable mode.
Download the onboarding package from Microsoft 365 Defender portal.
4. From a command prompt, verify that you have the file, and extract the contents of the archive:
- ```bash
- ls -l
- ```
+ ```bash
+ ls -l
+ ```
- ```Output
- total 8
- -rw-r--r-- 1 test staff 5752 Feb 18 11:22 WindowsDefenderATPOnboardingPackage.zip
- ```
+ ```Output
+ total 8
+ -rw-r--r-- 1 test staff 5752 Feb 18 11:22 WindowsDefenderATPOnboardingPackage.zip
+ ```
- ```bash
- unzip WindowsDefenderATPOnboardingPackage.zip
- ```
+ ```bash
+ unzip WindowsDefenderATPOnboardingPackage.zip
+ ```
- ```Output
- Archive: WindowsDefenderATPOnboardingPackage.zip
- inflating: MicrosoftDefenderATPOnboardingLinuxServer.py
- ```
+ ```Output
+ Archive: WindowsDefenderATPOnboardingPackage.zip
+ inflating: MicrosoftDefenderATPOnboardingLinuxServer.py
+ ```
## Client configuration 1. Copy MicrosoftDefenderATPOnboardingLinuxServer.py to the target device.
- > [!NOTE]
- > Initially the client device is not associated with an organization and the *orgId* attribute is blank.
+ > [!NOTE]
+ > Initially the client device is not associated with an organization and the *orgId* attribute is blank.
- ```bash
- mdatp health --field org_id
- ```
+ ```bash
+ mdatp health --field org_id
+ ```
2. Run MicrosoftDefenderATPOnboardingLinuxServer.py.
- > [!NOTE]
- > To run this command, you must have `python` or `python3` installed on the device depending on the distro and version. If needed, see [Step-by-step Instructions for Installing Python on Linux](https://opensource.com/article/20/4/install-python-linux).
+ > [!NOTE]
+ > To run this command, you must have `python` or `python3` installed on the device depending on the distro and version. If needed, see [Step-by-step Instructions for Installing Python on Linux](https://opensource.com/article/20/4/install-python-linux).
- > [!NOTE]
- > To onboard a device that was previously offboarded you must remove the mdatp_offboard.json file located at /etc/opt/microsoft/mdatp.
+ > [!NOTE]
+ > To onboard a device that was previously offboarded you must remove the mdatp_offboard.json file located at /etc/opt/microsoft/mdatp.
- If you're running RHEL 8.x or Ubuntu 20.04 or higher, you will need to use `python3`.
+ If you're running RHEL 8.x or Ubuntu 20.04 or higher, you will need to use `python3`.
- ```bash
- sudo python3 MicrosoftDefenderATPOnboardingLinuxServer.py
- ```
+ ```bash
+ sudo python3 MicrosoftDefenderATPOnboardingLinuxServer.py
+ ```
- For the rest of distros and versions, you will need to use `python`.
+ For the rest of distros and versions, you will need to use `python`.
- ```bash
- sudo python MicrosoftDefenderATPOnboardingLinuxServer.py
- ```
+ ```bash
+ sudo python MicrosoftDefenderATPOnboardingLinuxServer.py
+ ```
3. Verify that the device is now associated with your organization and reports a valid organization identifier:
- ```bash
- mdatp health --field org_id
- ```
+ ```bash
+ mdatp health --field org_id
+ ```
4. Check the health status of the product by running the following command. A return value of `1` denotes that the product is functioning as expected:
- ```bash
- mdatp health --field healthy
- ```
+ ```bash
+ mdatp health --field healthy
+ ```
- > [!IMPORTANT]
- > When the product starts for the first time, it downloads the latest antimalware definitions. This may take up to a few minutes depending on the network connectivity. During this time the above command returns a value of `false`. You can check the status of the definition update using the following command:
- >
- > ```bash
- > mdatp health --field definitions_status
- > ```
- >
- > Please note that you may also need to configure a proxy after completing the initial installation. See [Configure Defender for Endpoint on Linux for static proxy discovery: Post-installation configuration](linux-static-proxy-configuration.md#post-installation-configuration).
+ > [!IMPORTANT]
+ > When the product starts for the first time, it downloads the latest antimalware definitions. This may take up to a few minutes depending on the network connectivity. During this time the above command returns a value of `false`. You can check the status of the definition update using the following command:
+ >
+ > ```bash
+ > mdatp health --field definitions_status
+ > ```
+ >
+ > Please note that you may also need to configure a proxy after completing the initial installation. See [Configure Defender for Endpoint on Linux for static proxy discovery: Post-installation configuration](linux-static-proxy-configuration.md#post-installation-configuration).
5. Run an AV detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
- - Ensure that real-time protection is enabled (denoted by a result of `1` from running the following command):
+ - Ensure that real-time protection is enabled (denoted by a result of `1` from running the following command):
- ```bash
- mdatp health --field real_time_protection_enabled
- ```
+ ```bash
+ mdatp health --field real_time_protection_enabled
+ ```
- If it is not enabled, execute the following command:
+ If it is not enabled, execute the following command:
- ```bash
- mdatp config real-time-protection --value enabled
- ```
+ ```bash
+ mdatp config real-time-protection --value enabled
+ ```
- - Open a Terminal window and execute the following command:
+ - Open a Terminal window and execute the following command:
- ``` bash
- curl -o /tmp/eicar.com.txt https://www.eicar.org/download/eicar.com.txt
- ```
+ ``` bash
+ curl -o /tmp/eicar.com.txt https://www.eicar.org/download/eicar.com.txt
+ ```
- - The file should have been quarantined by Defender for Endpoint on Linux. Use the following command to list all the detected threats:
+ - The file should have been quarantined by Defender for Endpoint on Linux. Use the following command to list all the detected threats:
- ```bash
- mdatp threat list
- ```
+ ```bash
+ mdatp threat list
+ ```
6. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
- - Verify that the onboarded Linux server appears in Microsoft 365 Defender. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
+ - Verify that the onboarded Linux server appears in Microsoft 365 Defender. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
- - Download and extract the [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
+ - Download and extract the [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
- - After a few minutes, a detection should be raised in Microsoft 365 Defender.
+ - After a few minutes, a detection should be raised in Microsoft 365 Defender.
- - Look at the alert details, machine timeline, and perform your typical investigation steps.
+ - Look at the alert details, machine timeline, and perform your typical investigation steps.
## Microsoft Defender for Endpoint package external package dependencies
The following external package dependencies exist for the mdatp package:
The mde-netfilter package also has the following package dependencies: - For DEBIAN the mde-netfilter package requires "libnetfilter-queue1", "libglib2.0-0"-- for RPM the mde-netfilter package requires "libmnl", "libnfnetlink", "libnetfilter_queue", "glib2"
+- for RPM the mde-netfilter package requires "libmnl", "libnfnetlink", "libnetfilter_queue", "glib2"
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the pre-requisite dependencies.
See [Log installation issues](linux-resources.md#log-installation-issues) for mo
1. Uninstall the "Insiders-Fast channel" version of Defender for Endpoint on Linux.
- ```bash
- sudo yum remove mdatp
- ```
+ ```bash
+ sudo yum remove mdatp
+ ```
1. Disable the Defender for Endpoint on Linux Insiders-Fast repo
- ```bash
- sudo yum repolist
- ```
+ ```bash
+ sudo yum repolist
+ ```
- > [!NOTE]
- > The output should show "packages-microsoft-com-fast-prod".
+ > [!NOTE]
+ > The output should show "packages-microsoft-com-fast-prod".
- ```bash
- sudo yum-config-manager --disable packages-microsoft-com-fast-prod
- ```
+ ```bash
+ sudo yum-config-manager --disable packages-microsoft-com-fast-prod
+ ```
1. Redeploy Microsoft Defender for Endpoint on Linux using the "Production channel".
security Linux Static Proxy Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-static-proxy-configuration.md
Note that installation and uninstallation will not necessarily fail if a proxy i
## Post installation configuration
-After installation, configure Defender for Endpoint with static proxy using one of the following methods:
+After installation, configure Defender for Endpoint with static proxy using the following method:
```bash mdatp config proxy set --value http://address:port
mdatp config proxy set --value http://address:port
The `HTTPS_PROXY` environment variable must be defined in the Defender for Endpoint service file. To do this, run `sudo systemctl edit --full mdatp.service`. You can then propagate the variable to the service in one of two ways: -- Uncomment the line `#Environment="HTTPS_PROXY=http://address:port"` and specify your static proxy address.
+1) Uncomment the line `#Environment="HTTPS_PROXY=http://address:port"` and specify your static proxy address.
-- Add a line `EnvironmentFile=/path/to/env/file`. This path can point to `/etc/environment` or a custom file, either of which needs to add the following line:
+2) Add a line `EnvironmentFile=/path/to/env/file`. This path can point to `/etc/environment` or a custom file, either of which needs to add the following line:
```bash HTTPS_PROXY="http://proxy.server:port/"
security Mac Device Control Jamf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-jamf.md
See [Device Control for macOS](mac-device-control-overview.md) for information a
### Step 2: Update MDE Preferences Schema
-The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macOS/schemE Preferences configuration profile should be updated to use the new schema fileΓÇÖs content.
+The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schemE Preferences configuration profile should be updated to use the new schema fileΓÇÖs content.
:::image type="content" source="images/macos-device-control-jamf-mde-preferences-schema.png" alt-text="Shows where to edit the Microsoft Defender for Endpoint Preferences Schema to update." lightbox="images/macos-device-control-jamf-mde-preferences-schema.png":::
security Microsoft Secure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score.md
For example, a recommended action states you get 10 points by protecting all you
Currently there are recommendations for the following products: -- Microsoft 365 (including Exchange Online)
+- App governance
- Azure Active Directory
+- Citrix ShareFile
- Microsoft Defender for Endpoint - Microsoft Defender for Identity
+- Microsoft Defender for Office
+- Docusign
+- Exchange Online
+- Github
- Microsoft Defender for Cloud Apps
+- Microsoft Information Protection
- Microsoft Teams
+- Okta
+- Salesforce
+- ServiceNow
+- SharePoint Online
+- Zoom
Recommendations for other security products are coming soon. The recommendations won't cover all the attack surfaces associated with each product, but they're a good baseline. You can also mark the recommended actions as covered by a third party or alternate mitigation.
security Anti Malware Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-policies-configure.md
In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to
2. On the **Anti-malware** page, select the anti-malware policy by using either of the following methods:
- - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** drop down list that appears:
+ - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
- **Enable selected policies**. - **Disable selected policies**. - **Delete selected policies**.
security Anti Phishing Policies Eop Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-eop-configure.md
For anti-phishing policy procedures in organizations with Microsoft Defender for
For more information, see [Spoof protection and sender DMARC policies](anti-phishing-policies-about.md#spoof-protection-and-sender-dmarc-policies).
- - **If the message is detected as spoof by spoof intelligence**: This setting is available only if you selected **Enable spoof intelligence** on the previous page. Select one of the following actions in the drop down list for messages from blocked spoofed senders:
+ - **If the message is detected as spoof by spoof intelligence**: This setting is available only if you selected **Enable spoof intelligence** on the previous page. Select one of the following actions in the dropdown list for messages from blocked spoofed senders:
- **Move the message to the recipients' Junk Email folders** (default) - **Quarantine the message**: If you select this action, an **Apply quarantine policy** box appears where you select the quarantine policy that applies to messages that are quarantined by spoof intelligence protection.
Select a policy by clicking anywhere in the row other than the check box next to
2. On the **Anti-phishing** page, select the anti-phishing policy by using either of the following methods:
- - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** drop down list that appears:
+ - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
- **Enable selected policies**. - **Disable selected policies**. - **Delete selected policies**.
security Anti Phishing Policies Mdo Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-mdo-configure.md
For anti-phishing policy procedures in organizations without Defender for Office
Select :::image type="icon" source="../../media/m365-cc-sc-add-internal-icon.png" border="false"::: **Add user**. In the **Add user** flyout that opens, do the following steps:
- - **Internal users**: Click in the **Add a valid email** box or start typing the user's email address. Select the email address in the **Suggested contacts** drop down list that appears. The user's display name is added to the **Add a name** box (which you can change). When you're finished selecting the user, select **Add**.
+ - **Internal users**: Click in the **Add a valid email** box or start typing the user's email address. Select the email address in the **Suggested contacts** dropdown list that appears. The user's display name is added to the **Add a name** box (which you can change). When you're finished selecting the user, select **Add**.
- - **External users**: Type the external user's full email address in the **Add a valid email** box, and then select the email address in the **Suggested contacts** drop down list that appears. The email address is also added in the **Add a name** box (which you can change to a display name).
+ - **External users**: Type the external user's full email address in the **Add a valid email** box, and then select the email address in the **Suggested contacts** dropdown list that appears. The email address is also added in the **Add a name** box (which you can change to a display name).
The users you added are listed on the **Add user** flyout by **Name** and **Email address**. To remove a user, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: next to the entry.
For anti-phishing policy procedures in organizations without Defender for Office
> - `no-reply@sharepointonline.com` > - `noreply@planner.office365.com`
- - **Domain** tab: Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add domains**. In the **Add trusted domains** flyout that opens, enter domain in the **Domain** box, and then select the domain in drop down list that appears. Repeat this step as many times as necessary. To remove an existing entry, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: for the entry.
+ - **Domain** tab: Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add domains**. In the **Add trusted domains** flyout that opens, enter domain in the **Domain** box, and then select the domain in dropdown list that appears. Repeat this step as many times as necessary. To remove an existing entry, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: for the entry.
When you're finished on the **Add trusted domains** flyout, select **Add domains**.
For anti-phishing policy procedures in organizations without Defender for Office
- **Message actions** section: Configure the following actions:
- - **If a message is detected as user impersonation**: This setting is available only if you selected **Enable users to protect** on the previous page. Select one of the following actions in the drop down list:
+ - **If a message is detected as user impersonation**: This setting is available only if you selected **Enable users to protect** on the previous page. Select one of the following actions in the dropdown list:
- **Don't apply any action** (default) - **Redirect the message to other email addresses** - **Move the message to the recipients' Junk Email folders**
For anti-phishing policy procedures in organizations without Defender for Office
- **Deliver the message and add other addresses to the Bcc line** - **Delete the message before it's delivered**
- - **If the message is detected as an impersonated domain**: This setting is available only if you selected **Enable domains to protect** on the previous page. Select one of the following actions in the drop down list:
+ - **If the message is detected as an impersonated domain**: This setting is available only if you selected **Enable domains to protect** on the previous page. Select one of the following actions in the dropdown list:
- **Don't apply any action** (default) - **Redirect the message to other email addresses** - **Move the message to the recipients' Junk Email folders**
For anti-phishing policy procedures in organizations without Defender for Office
- **Deliver the message and add other addresses to the Bcc line** - **Delete the message before it's delivered**
- - **If mailbox intelligence detects an impersonated user**: This setting is available only if you selected **Enable intelligence for impersonation protection** on the previous page. Select one of the following actions in the drop down list:
+ - **If mailbox intelligence detects an impersonated user**: This setting is available only if you selected **Enable intelligence for impersonation protection** on the previous page. Select one of the following actions in the dropdown list:
- **Don't apply any action** (default) - **Redirect the message to other email addresses** - **Move the message to the recipients' Junk Email folders**
For anti-phishing policy procedures in organizations without Defender for Office
For more information, see [Spoof protection and sender DMARC policies](anti-phishing-policies-about.md#spoof-protection-and-sender-dmarc-policies).
- - **If the message is detected as spoof by spoof intelligence**: This setting is available only if you selected **Enable spoof intelligence** on the previous page. Select one of the following actions in the drop down list for messages from blocked spoofed senders:
+ - **If the message is detected as spoof by spoof intelligence**: This setting is available only if you selected **Enable spoof intelligence** on the previous page. Select one of the following actions in the dropdown list for messages from blocked spoofed senders:
- **Move the message to the recipients' Junk Email folders** (default) - **Quarantine the message**: If you select this action, an **Apply quarantine policy** box appears where you select the quarantine policy that applies to messages that are quarantined by spoof intelligence protection.
Select a policy by clicking anywhere in the row other than the check box next to
2. On the **Anti-phishing** page, select the anti-phishing policy by using either of the following methods:
- - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** drop down list that appears:
+ - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
- **Enable selected policies**. - **Disable selected policies**. - **Delete selected policies**.
security Anti Spam Backscatter About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-backscatter-about.md
description: In this article, admins can about backscatter and how Microsoft Exchange Online Protection (EOP) tries to prevent it. Previously updated : 06/09/2023 Last updated : 6/22/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 plan 1 and plan 2</a>
appliesto:
# Backscatter in EOP
-*Backscatter* is non-delivery reports (also known as NDRs or bounce messages) that you receive for messages that you didn't send. Spammers often use real email addresses as the From address to lend credibility to their messages, and forge (spoof) the From address (also known as the `5322.From` or P2 address) to create backscatter. When a non-existent recipient receives spam, the destination email server is essentially tricked into returning the undeliverable message in an NDR to the forged sender in the From address.
+*Backscatter* is non-delivery reports (also known as NDRs or bounce messages) that you receive for messages that you didn't send. Spammers often use real email addresses as the From address to lend credibility to their messages. When a nonexistent recipient receives spam, the destination email server unwittingly sends the NDR to the forged sender in the From address.
-Exchange Online Protection (EOP) makes every effort to identify and silently drop messages from dubious sources without generating an NDR. But, based on the sheer volume email flowing through the service, there's always the possibility that EOP will unintentionally send backscatter.
+Exchange Online Protection (EOP) makes every effort to identify and silently drop messages from dubious sources without generating an NDR. But, it's almost impossible for EOP to send absolutely no backscatter, based on the sheer volume email flowing through the service.
-Backscatterer.org maintains a blocklist (also known as a DNS blocklist or DNSBL) of email servers that were responsible for sending backscatter, and EOP servers might appear on this list. This list isn't a list of spammers.
+Backscatterer.org maintains a blocklist (also known as a DNS blocklist or DNSBL) of email servers that were responsible for sending backscatter. Their blocklist isn't a list of spammers, and EOP servers might appear on their list.
> [!TIP] > The Backscatterer.org website (<http://www.backscatterer.org/?target=usage>) recommends using their service in Safe mode as large email services almost always send some backscatter.
+>
+> The Advanced Spam Filter (ASF) in anti-spam policies has a setting to mark backscatter as spam, but this setting isn't required in most environments. For more information, see [ASF 'mark as spam' settings](anti-spam-policies-asf-settings-about.md#mark-as-spam-settings).
security Anti Spam Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-policies-configure.md
You can configure anti-spam policies in the Microsoft 365 Defender portal or in
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
-2. On the **Anti-spam policies** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** **Create policy** and then select **Inbound** from the drop down list to start the new anti-spam policy wizard.
+2. On the **Anti-spam policies** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** **Create policy** and then select **Inbound** from the dropdown list to start the new anti-spam policy wizard.
3. On the **Name your policy** page, configure these settings: - **Name**: Enter a unique, descriptive name for the policy.
You can configure anti-spam policies in the Microsoft 365 Defender portal or in
<sup>\*</sup> The **Contains specific languages** and **from these countries** settings aren't part of ASF.
- - **Contains specific languages**: Select **On** or **Off** from the drop down list. If you turn it on, a box appears. Start typing the name of a language in the box. A filtered list of supported languages appears. When you find the language that you're looking for, select it. Repeat this step as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
+ - **Contains specific languages**: Select **On** or **Off** from the dropdown list. If you turn it on, a box appears. Start typing the name of a language in the box. A filtered list of supported languages appears. When you find the language that you're looking for, select it. Repeat this step as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
- - **From these countries***: Select **On** or **Off** from the drop down list. If you turn it on, a box appears. Start typing the name of a country in the box. A filtered list of supported countries appears. When you find the country that you're looking for, select it. Repeat this step as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
+ - **From these countries***: Select **On** or **Off** from the dropdown list. If you turn it on, a box appears. Start typing the name of a country in the box. A filtered list of supported countries appears. When you find the country that you're looking for, select it. Repeat this step as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
When you're finished on the **Bulk email threshold & spam properties** page, select **Next**.
security Anti Spam Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-protection-about.md
- tier2 - seo-marvel-apr2020
-description: Admins can learn about the anti-spam settings and filters that will help prevent spam in Exchange Online Protection (EOP).
+description: Admins can learn about the anti-spam settings and filters that help prevent spam in Exchange Online Protection (EOP).
Previously updated : 06/09/2023 Last updated : 6/22/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 plan 1 and plan 2</a>
appliesto:
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, email messages are automatically protected against spam (junk email) by EOP.
-Microsoft's email safety roadmap involves an unmatched cross-product approach. EOP anti-spam and anti-phishing technology is applied across our email platforms to provide users with the latest anti-spam and anti-phishing tools and innovations throughout the network. The goal for EOP is to offer a comprehensive and usable email service that helps detect and protect users from junk email, fraudulent email threats (phishing), and malware.
+Microsoft's email safety roadmap involves an unmatched cross-product approach. Anti-spam and anti-phishing technology in EOP is applied across our email platforms to provide users with the latest anti-spam and anti-phishing tools and innovations throughout the network. The goal for EOP is to offer a comprehensive and usable email service that helps detect and protect users from junk email, fraudulent email threats (phishing), and malware.
-As email use has grown, so has email abuse. Unmonitored junk email can clog inboxes and networks, impact user satisfaction, and hamper the effectiveness of legitimate email communications. That's why Microsoft continues to invest in anti-spam technologies. Simply put, it starts by containing and filtering junk email.
+As email use has grown, so has email abuse. Unmonitored junk email can clog inboxes and networks, affect user satisfaction, and hamper the effectiveness of legitimate email communications. That's why Microsoft continues to invest in anti-spam technologies. Simply put, it starts by containing and filtering junk email.
> [!TIP] > The following anti-spam technologies are useful when you want to allow or block messages based on the message envelope (for example, the sender's domain or the source IP address of the message). To allow or block messages based on payload (for example, URLs in the message or attached files), then you should use the [Tenant Allow/Block List portal](tenant-allow-block-list-about.md).
The anti-spam settings in EOP are made of the following technologies:
- **Connection filtering**: Identifies good and bad email source servers early in the inbound email connection via the IP Allow List, IP Block List, and the *safe list* (a dynamic but non-editable list of trusted senders maintained by Microsoft). You configure these settings in the connection filter policy. Learn more at [Configure connection filtering](connection-filter-policies-configure.md). -- **Spam filtering (content filtering)**: EOP uses the spam filtering verdicts **Spam**, **High confidence spam**, **Bulk email**, **Phishing email** and **High confidence phishing email** to classify messages. You can configure the actions to take based on these verdicts, and you can configure what users are allowed to do to quarantined messages and whether user receive quarantine notifications by using [quarantine policies](quarantine-policies.md#anatomy-of-a-quarantine-policy). For more information, see [Configure anti-spam policies in Microsoft 365](anti-spam-policies-configure.md).
+- **Spam filtering (content filtering)**: EOP uses the spam filtering verdicts **Spam**, **High confidence spam**, **Bulk email**, **Phishing email** and **High confidence phishing email** to classify messages. You can configure the actions to take based on these verdicts. [Quarantine policies](quarantine-policies.md#anatomy-of-a-quarantine-policy) determine what users are allowed to do to quarantined messages, and whether they receive notifications for their quarantined messages. For more information, see [Configure anti-spam policies in Microsoft 365](anti-spam-policies-configure.md).
> [!NOTE] > By default, spam filtering is configured to send messages that were marked as spam to the recipient's Junk Email folder. However, in hybrid environments where EOP protects on-premises Exchange mailboxes, you need to configure two mail flow rules (also known as transport rules) in your on-premises Exchange organization to recognize the EOP spam headers that are added to messages. For details, see [Configure EOP to deliver spam to the Junk Email folder in hybrid environments](/exchange/standalone-eop/configure-eop-spam-protection-hybrid).
Here are some best practices that apply to either scenario:
- Always report misclassified messages to Microsoft. For more information, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md). -- **Examine the anti-spam message headers**: These values will tell you why a message was marked as spam, or why it skipped spam filtering. For more information, see [Anti-spam message headers](message-headers-eop-mdo.md).
+- **Examine the anti-spam message headers**: These values tell you why a message was marked as spam, or why it skipped spam filtering. For more information, see [Anti-spam message headers](message-headers-eop-mdo.md).
- **Point your MX record to Microsoft 365**: In order for EOP to provide the best protection, we always recommend that you have email delivered to Microsoft 365 first. For instructions, see [Create DNS records at any DNS hosting provider for Microsoft 365](../../admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider.md). If the MX record points to some other location (for example, a third-party anti-spam solution or appliance), it's difficult for EOP to provide accurate spam filtering. In this scenario, you need to configure Enhanced Filtering for connectors (also known as _skip listing_). For instructions, see [Enhanced Filtering for Connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors). -- **Use email authentication**: If you own an email domain, you can use DNS to help insure that messages from senders in that domain are legitimate. To help prevent spam and unwanted spoofing in EOP, use all of the following email authentication methods:
+- **Use email authentication**: If you own an email domain, you can use DNS to help ensure that messages from senders in that domain are legitimate. To help prevent spam and unwanted spoofing in EOP, use all of the following email authentication methods:
- - **SPF**: Sender Policy Framework verifies the source IP address of the message against the owner of the sending domain. For a quick introduction to SPF and to get it configured quickly, see [Set up SPF to help prevent spoofing](email-authentication-spf-configure.md). For a more in-depth understanding of how Microsoft 365 uses SPF, or for troubleshooting or non-standard deployments such as hybrid deployments, start with [How Microsoft 365 uses Sender Policy Framework (SPF) to prevent spoofing](email-authentication-anti-spoofing.md).
+ - **SPF**: Verifies the source IP address of the message against the owner of the sending domain. For a quick introduction to SPF and to get it configured quickly, see [Set up SPF to help prevent spoofing](email-authentication-spf-configure.md). For a more in-depth understanding of how Microsoft 365 uses SPF, or for troubleshooting or nonstandard deployments such as hybrid deployments, start with [How Microsoft 365 uses Sender Policy Framework (SPF) to prevent spoofing](email-authentication-anti-spoofing.md).
- - **DKIM**: DomainKeys Identified Mail adds a digital signature to the message header of messages sent from your domain. For information, see [Use DKIM to validate outbound email sent from your custom domain in Microsoft 365](email-authentication-dkim-configure.md).
+ - **DKIM**: Adds a digital signature to the message header of messages sent from your domain. For information, see [Use DKIM to validate outbound email sent from your custom domain in Microsoft 365](email-authentication-dkim-configure.md).
- - **DMARC**: Domain-based Message Authentication, Reporting, and Conformance helps destination email systems determine what to do with messages that fail SPF or DKIM checks and provides another level of trust for your email partners. For more information, see [Use DMARC to validate email in Microsoft 365](email-authentication-dmarc-configure.md).
+ - **DMARC**: Helps destination email systems determine what to do with messages that fail SPF or DKIM checks, and provides another level of trust for your email partners. For more information, see [Use DMARC to validate email in Microsoft 365](email-authentication-dmarc-configure.md).
- **Verify your bulk email settings**: The bulk complaint level (BCL) threshold that you configure in anti-spam policies determines whether bulk email (also known as _gray mail_) is marked as spam. The PowerShell-only setting _MarkAsSpamBulkMail_ that's on by default also contributes to the results. For more information, see [Configure anti-spam policies in Microsoft 365](anti-spam-policies-configure.md).
You can also use the following suggestions to help prevent false negatives:
- **Use the available blocked sender lists**: For information, see [Create blocked sender lists](create-block-sender-lists-in-office-365.md). -- **Unsubscribe from bulk email** If the message was something that the user signed up for (newsletters, product announcements, etc.) and contains an unsubscribe link from a reputable source, consider asking them to simply unsubscribe.
+- **Unsubscribe from bulk email** If the message was something that the user signed up for (newsletters, product announcements, etc.) and contains an unsubscribe link from a reputable source, consider asking them to unsubscribe.
- **Standalone EOP: create mail flow rules in on-premises Exchange for EOP spam filtering verdicts**: In hybrid environments where EOP protects on-premises Exchange mailboxes, you need to configure mail flow rules (also known as transport rules) in on-premises Exchange. These mail flow rules translate the EOP spam filtering verdict so the junk email rule in the mailbox can move the message to the Junk Email folder. For details, see [Configure EOP to deliver spam to the Junk Email folder in hybrid environments](/exchange/standalone-eop/configure-eop-spam-protection-hybrid).
You can also use the following suggestions to help prevent false positives:
- **Verify the user's Outlook Junk Email Filter settings**: - **Verify the Outlook Junk Email Filter is disabled**: When the Outlook Junk Email Filter is set to the default value **No automatic filtering**, Outlook doesn't attempt to classify messages as spam. When it's set to **Low** or **High**, the Outlook Junk Email Filter uses its own SmartScreen filter technology to identify and move spam to the Junk Email folder, so you could get false positives. Microsoft stopped producing spam definition updates for the SmartScreen filters in Exchange and Outlook in November 2016. The existing SmartScreen spam definitions were left in place, but their effectiveness is likely degraded.
- - **Verify the Outlook 'Safe Lists Only' setting is disabled**: When this setting is enabled, only messages from senders in the user's Safe Senders list or Safe Recipients list are delivered to the Inbox; email from everyone else is automatically moved to the Junk Email folder.
+ - **Verify the Outlook 'Safe Lists Only' setting is disabled**: When this setting is enabled, only messages from senders in the user's Safe Senders list or Safe Recipients list are delivered to the Inbox. Email from everyone else is automatically moved to the Junk Email folder.
For more information about these settings, see [Configure junk email settings on Exchange Online mailboxes in Microsoft 365](configure-junk-email-settings-on-exo-mailboxes.md).
security Attack Simulation Training End User Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-end-user-notifications.md
To see the available end-user notifications, open the Microsoft 365 Defender por
**End user notifications** in the **Content library** tab has two tabs: -- **Global notifications**: Contains the built-in, non-modifiable notifications.
+- **Global notifications**: Contains the built-in, nonmodifiable notifications.
- **Tenant notifications**: Contains the custom notifications that you've created. The following information is shown for each notification<sup>\*</sup>:
On the **Tenant notifications** tab only, select :::image type="icon" source="..
When you select a notification from the list, a details flyout appears with the following information: -- **Preview** tab: View the notification message as users will see it. To view the message in different languages, use the **Select notification language** drop down list.
+- **Preview** tab: View the notification message as users will see it. To view the message in different languages, use the **Select notification language** dropdown list.
- **Details** tab: View details about the notification: - **Notification description** - **Source**: For built-in notifications, the value is **Global**. For custom notifications, the value is **Tenant**.
On the details flyout from the **Tenant notifications** tab only, select **Edit
- **From display name**: Enter the display name of the sender. - **From email address**: Enter the email address of the sender. - **Select the language of the email**: Select a language from the list.
- - **Mark this as the default language**: Because this is the first and only language for the notification, this language value is selected as the default and you can't change it.
+ - **Mark this as the default language**: Because this is the first and only language for the notification, this language value is selected as the default, and you can't change it.
- **Subject**: The default that's used depends on the notification type that you selected in the previous step, but you can change it: - Positive reinforcement: **Thank you for reporting a phish!** - Simulation: **Thank you for participating in a phishing campaign!**
On the details flyout from the **Tenant notifications** tab only, select **Edit
When you're finished in new end-user notification wizard, select **Save**.
- Back on the **Define content** page, the notification you created is listed on the page. In the **Action** colum, you can select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** or :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png" border="false"::: **Preview** to edit or view the notification.
+ Back on the **Define content** page, the notification is listed on the page. In the **Action** column, you can select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** or :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png" border="false"::: **Preview** to edit or view the notification.
Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add translation** to create up to 11 more translations of the notification in other languages (12 translations total).
- Other than the flyout title changing to **Add translation**, the same options are available as the the **Add content in default language** flyout in the first notification you created. Now the **Mark this as default language** check box is available to select. Only one translation of the notification can be the default language.
+ Other than the flyout title changing to **Add translation**, the same options are available as the **Add content in default language** flyout in the first notification you created. Now the **Mark this as default language** check box is available to select. Only one translation of the notification can be the default language.
When two or more translations of the notification are listed on the **Define content** page, the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** icon is available in the **Actions** column to delete any notification translations that aren't designated as the default language.
To remove an existing custom notification from the **Tenant notifications** tab,
- Select the notification from the list by clicking the check box next to the name, and then select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears. - Select **Γï«** (**Actions**) next to the **Notifications** value, and then select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete**.
-In the confirmation dialog tht opens, select **Delete**.
+In the confirmation dialog that opens, select **Delete**.
## Related links
security Attack Simulation Training Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-faq.md
description: Admins can learn about deployment considerations and frequently asked questions regarding Attack simulation and training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations. Previously updated : 6/14/2023 Last updated : 6/22/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview" target="_blank">Microsoft Defender for Office 365 plan 2</a>
appliesto:
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
-Attack simulation training enables Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations to measure and manage social engineering risk by allowing the creation and management of phishing simulations that are powered by real-world, de-weaponized phishing payloads. Hyper-targeted training, delivered in partnership with Terranova security, helps improve knowledge and change employee behavior.
+Attack simulation training enables Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations to measure and manage social engineering risk by allowing the creation and management of phishing simulations that are powered by real-world, harmless phishing payloads. Hyper-targeted training, delivered in partnership with Terranova security, helps improve knowledge and change employee behavior.
For more information about getting started with Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
-While the whole simulation creation and scheduling experience has been designed to be free-flowing and frictionless, running simulations at an enterprise scale often requires planning. This article helps address specific challenges that we see as our customers run simulations in their own environments.
+While the simulation creation and scheduling experience is designed to be free-flowing and frictionless, simulations at an enterprise scale require planning. This article helps address specific challenges that we see as our customers run simulations in their own environments.
## Issues with end user experiences
A URL reputation service might identify one or more of the URLs that are used by
:::image type="content" source="../../media/attack-sim-training-faq-chrome-deceptive-site-message.png" alt-text="The Deceptive site ahead warning in Google Chrome" lightbox="../../media/attack-sim-training-faq-chrome-deceptive-site-message.png":::
-Note that this issue doesn't affect Microsoft Edge.
+This issue doesn't affect Microsoft Edge.
As part of the planning phase, be sure to check the availability of the URL in your supported web browsers before you use the URL in a phishing campaign. If the URLs are blocked by Google Safe Browsing, [follow this guidance](https://support.google.com/chrome/a/answer/7532419) from Google to allow access to the URLs.
While we have seen few customers being blocked at this layer, it does happen. If
### Simulation messages not delivered to all targeted users
-It's possible that the number of users who actually receive the simulation email messages is less than the number of users who were targeted by the simulation. The following types of users will be excluded as part of target validation:
+It's possible that the number of users who actually receive the simulation email messages is less than the number of users who were targeted by the simulation. The following types of users are excluded as part of target validation:
- Invalid recipient email addresses. - Guest users.
If you use distribution groups or mail-enabled security groups to target users,
## Issues with Attack simulation training reporting
-### Attack simulation training reports do not contain any activity details
+### Attack simulation training reports don't contain any activity details
Attack simulation training comes with rich, actionable insights that keep you informed of the threat readiness progress of your employees. If Attack simulation training reports aren't populated with data, verify that audit logging is turned on in your organization (it's on by default). Audit logging is required by Attack simulation training so events can be captured, recorded, and read back. Turning off audit logging has the following consequences for Attack simulation training: -- Reporting data isn't available across all reports. The reports will appear empty.
+- Reporting data isn't available across all reports. The reports appear empty.
- Training assignments are blocked, because data isn't available. To verify that audit logging is on or to turn it on, see [Turn auditing on or off](../../compliance/audit-log-enable-disable.md).
Attack simulation training supports on-premises mailboxes, but with reduced repo
- Data on whether users read, forwarded, or deleted the simulation email isn't available for on-premises mailboxes. - The number of users who reported the simulation email isn't available for on-premises mailboxes.
-### Simulation reports are not updated immediately
+### Simulation reports aren't updated immediately
Detailed simulation reports aren't updated immediately after you launch a campaign. Don't worry; this behavior is expected.
While a simulation is in the **Scheduled** state, the simulation reports are mos
:::image type="content" source="../../media/attack-sim-training-faq-scheduled-state.png" alt-text="Simulation details showing the simulation in the Scheduled state" lightbox="../../media/attack-sim-training-faq-scheduled-state.png":::
-Once the simulation enters the **In progress** stage, you'll notice information starting to trickle into the reporting:
+Once the simulation enters the **In progress** stage, information starts trickling into the reporting:
:::image type="content" source="../../media/attack-sim-training-faq-in-progress-state.png" alt-text="Simulation details showing the simulation in the In progress state" lightbox="../../media/attack-sim-training-faq-in-progress-state.png"::: It can take up to 30 minutes for the individual simulation reports to update after the transition to the **In progress** state. The report data continues to build until the simulation reaches the **Completed** state. Reporting updates occur at the following intervals: - Every 10 minutes for the first 60 minutes.-- Every 15 minutes after 60 minutes until 2 days.-- Every 30 minutes after 2 days until 7 days.-- Every 60 minutes after 7 days.
+- Every 15 minutes after 60 minutes until two days.
+- Every 30 minutes after two days until seven days.
+- Every 60 minutes after seven days.
Widgets on the **Overview** page provide a quick snapshot of your organization's simulation-based security posture over time. Because these widgets reflect your overall security posture and journey over time, they're updated after each simulation campaign is completed.
If messages that users reported as phishing aren't captured in Attack simulation
If users are assigned training after they report a phishing simulation message, check to see if your organization uses a reporting mailbox to receive user reported messages at <https://security.microsoft.com/securitysettings/userSubmission>. The reporting mailbox needs to be configured to skip many security checks as described in the [reporting mailbox prerequisites](submissions-user-reported-messages-custom-mailbox.md#configuration-requirements-for-the-reporting-mailbox).
-If you don't configure the required exclusions for the custom reporting mailbox, these messages might be detonated by Safe Links or Safe Attachments protection, which will cause training assignments.
+If you don't configure the required exclusions for the custom reporting mailbox, the messages might be detonated by Safe Links or Safe Attachments protection, which causes training assignments.
## Other frequently asked questions
A: Several options are available to target users:
- Select users from a CSV file (one email address per line). - Azure AD group-based targeting.
-We've found that campaigns where the targeted users are identified by Azure AD groups are generally easier to manage.
+We've found that campaigns where the targeted users are identified by Azure AD groups are easier to manage.
### Q: Are there any limits in targeting users while importing from a CSV or adding users?
Managing a large CSV file or adding many individual recipients can be cumbersome
### Q: Does Microsoft provide payloads in other languages?
-A: Currently, there are 40+ localized payloads available in 29+ languages: English, Spanish, German, Japanese, French, Portuguese, Dutch, Italian, Swedish, Chinese (Simplified), Norwegian Bokmål, Polish, Russian, Finnish, Korean, Turkish, Hungarian, Hebrew, Thai, Arabic, Vietnamese, Slovak, Greek, Indonesian, Romanian, Slovenian, Croatian, Catalan, and Other. We've noticed that any direct or machine translations of existing payloads to other languages will lead to inaccuracies and decreased relevance.
+A: Currently, there are 40+ localized payloads available in 29+ languages: English, Spanish, German, Japanese, French, Portuguese, Dutch, Italian, Swedish, Chinese (Simplified), Norwegian Bokmål, Polish, Russian, Finnish, Korean, Turkish, Hungarian, Hebrew, Thai, Arabic, Vietnamese, Slovak, Greek, Indonesian, Romanian, Slovenian, Croatian, Catalan, and Other. We've determined that direct or machine translation of existing payloads to other languages leads to inaccuracies and decreased relevance.
That being said, you can create your own payload in the language of your choice using the custom payload authoring experience. We also strongly recommend that you harvest existing payloads that were used to target users in a specific geography. In other words, let the attackers localize the content for you.
That being said, you can create your own payload in the language of your choice
A: In Microsoft 365 or Office 365, language configuration is specific and centralized for each user account. For instructions on how to change your language setting, see [Change your display language and time zone in Microsoft 365 for Business](https://support.microsoft.com/office/6f238bff-5252-441e-b32b-655d5d85d15b).
-Note that the configuration change might take up to 30 minutes to synchronize across all services.
+The configuration change might take up to 30 minutes to synchronize across all services.
### Q: Can I trigger a test simulation to understand what it looks like prior to launching a full-fledged campaign?
-A: Yes you can! On the very last **Review Simulation** page in the wizard to create a new simulation, there's an option to **Send a test**. This option sends a sample phishing simulation message to the currently logged in user. After you validate the phishing message in your Inbox, you can submit the simulation.
+A: Yes you can! On the last **Review Simulation** page in the new simulation wizard, select **Send a test**. This option sends a sample phishing simulation message to the currently logged in user. After you validate the phishing message in your Inbox, you can submit the simulation.
:::image type="content" source="../../media/attack-sim-training-simulations-review-simulation.png" alt-text="The Send a test button on the Review simulation page" lightbox="../../media/attack-sim-training-simulations-review-simulation.png":::
So, on the initial run of a campaign with region aware delivery enabled, it migh
### Q: Does Microsoft collect or store any information that users enter at the Credential Harvest sign-in page, used in the Credential Harvest simulation technique?
-A: No. Any information entered at the credential harvest login page is discarded silently. Only the 'click' is recorded to capture the compromise event. Microsoft doesn't collect, log or store any details that users enter at this step.
+A: No. Any information entered at the credential harvest sign-in page is discarded silently. Only the 'click' is recorded to capture the compromise event. Microsoft doesn't collect, log or store any details that users enter at this step.
security Attack Simulation Training Landing Pages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-landing-pages.md
description: Admins can learn how to create and manage landing pages for simulated phishing attacks in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Previously updated : 6/14/2023 Last updated : 6/22/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview" target="_blank">Microsoft Defender for Office 365 plan 2</a>
To see the available landing pages, open the Microsoft 365 Defender portal at <h
**Landing pages** in the **Content library** tab has two tabs: -- **Global landing pages** tab: Contains the built-in, non-modifiable landing page templates named **Microsoft Landing Page Template 1** to **Microsoft Landing Page Template 5**. These built-in landing pages are localized into 12+ languages.
+- **Global landing pages** tab: Contains the built-in, nonmodifiable landing page templates named **Microsoft Landing Page Template 1** to **Microsoft Landing Page Template 5**. These built-in landing pages are localized into 12+ languages.
- **Tenant landing pages** tab: Contains the custom landing pages that you've created. The following information is shown for each landing page<sup>\*</sup>:
Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" bord
When you select a landing page from the list by clicking anywhere in the row other than the check box next to the name, a details flyout appears with the following information: -- **Preview** tab: View the landing page as users see it. Use the **Select language** drop down list to see the landing page in different languages.
+- **Preview** tab: View the landing page as users see it. Use the **Select language** dropdown list to see the landing page in different languages.
- **Details** tab: View details about the landing page: - **Description** - **Status**: **Ready** or **Draft**.
In custom landing pages only, an **Edit landing page** link is available at the
When you're finished on the **Add content in default language** flyout, select **Save**.
- Back on the **Configure landing page** page, the landing page you created is now listed. In the **Action** colum, you can select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** or :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png" border="false"::: **Preview** to edit or view the landing page.
+ Back on the **Configure landing page** page, the landing page you created is now listed. In the **Action** column, you can select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** or :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png" border="false"::: **Preview** to edit or view the landing page.
Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add translation** to create additional translations of the landing page in other languages.
- Other than the flyout title changing to **Add translation**, the same options are available as the the **Add content in default language** flyout in the first landing page you created. Now the **Mark this as default language** check box is available to select. Only one translation of landing page can be the default language.
+ Other than the flyout title changing to **Add translation**, the same options are available as the **Add content in default language** flyout in the first landing page you created. Now the **Mark this as default language** check box is available to select. Only one translation of landing page can be the default language.
When two or more translations of the landing page are listed on the **Configure landing page** page, the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** icon is available in the **Actions** column to delete any landing page translations that aren't designated as the default language.
To remove an existing custom landing page from the **Tenant landing pages** tab,
- Select the landing page from the list by clicking the check box next to the name, and then select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears. - Select **Γï«** (**Actions**) next to the **Name** value of the landing page, and then select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete**.
-In the confirmation dialog tht opens, select **Delete**.
+In the confirmation dialog that opens, select **Delete**.
## Related links
security Attack Simulation Training Payload Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-payload-automations.md
description: Admins can learn how to use payload automations (payload harvesting) to collect and launch automated simulations for Attack simulation training in Microsoft Defender for Office 365 Plan 2. search.appverid: met150 Previously updated : 6/14/2023 Last updated : 6/21/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview" target="_blank">Microsoft Defender for Office 365 plan 2</a>
appliesto:
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
-In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, payload automations (also known as _payload harvesting_) collect information from real-world phishing attacks that were reported by users in your organization. Although the numbers of these messages are likely low in your organization, you can specify the conditions to look for in phishing attacks (for example, recipients, social engineering technique, sender information, etc.). Attack simulation training will then mimic the messages and payloads used in the attack to automatically launch harmless simulations to targeted users.
+In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, payload automations (also known as _payload harvesting_) collect information from real-world phishing attacks that were reported by users in your organization. Although the numbers of these messages are likely low in your organization, you can specify the conditions to look for in phishing attacks (for example, recipients, social engineering technique, sender information, etc.). Attack simulation training then mimics the messages and payloads used in the attack to automatically launch harmless simulations to targeted users.
For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
To create a payload automation, do the following steps:
When you're finished on the **Automation name** page, select **Next**.
-4. On the **Run conditions** page, select the conditions of the real phishing attack that determines when the automation will run.
+4. On the **Run conditions** page, select the conditions of the real phishing attack that determines when the automation runs.
Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add condition** and then select from one of the following conditions:
security Attack Simulation Training Simulation Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations.md
On the **Assign training** page, you can assign trainings for the simulation. We
Use the following options on the page to assign trainings as part of the simulation: -- **Select training content preference**: Choose one of the following options in the drop down list:
+- **Select training content preference**: Choose one of the following options in the dropdown list:
- **Microsoft training experience (Recommended)**: This is the default value that has the following associated options to configure on the page: - Select one of the following options:
security Attack Simulation Training Simulations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-simulations.md
On the **Assign training** page, you can assign trainings for the simulation. We
Use the following options on the page to assign trainings as part of the simulation: -- **Select training content preference**: Choose one of the following options in the drop down list:
+- **Select training content preference**: Choose one of the following options in the dropdown list:
- **Microsoft training experience (Recommended)**: This is the default value that has the following associated options to configure on the page: - Select one of the following options:
security Configuration Analyzer For Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/configuration-analyzer-for-security-policies.md
Configuration analyzer in the Microsoft 365 Defender portal provides a central l
The following types of policies are analyzed by the configuration analyzer: -- **Exchange Online Protection (EOP) policies**: This includes Microsoft 365 organizations with Exchange Online mailboxes and standalone EOP organizations without Exchange Online mailboxes:
+- **Exchange Online Protection (EOP) policies**: Includes Microsoft 365 organizations with Exchange Online mailboxes and standalone EOP organizations without Exchange Online mailboxes:
- [Anti-spam policies](anti-spam-policies-configure.md). - [Anti-malware policies](anti-malware-policies-configure.md). - [EOP anti-phishing policies](anti-phishing-policies-about.md#spoof-settings). -- **Microsoft Defender for Office 365 policies**: This includes organizations with Microsoft 365 E5 or Defender for Office 365 add-on subscriptions:
+- **Microsoft Defender for Office 365 policies**: Includes organizations with Microsoft 365 E5 or Defender for Office 365 add-on subscriptions:
- Anti-phishing policies in Microsoft Defender for Office 365, which include: - The same [spoof settings](anti-phishing-policies-about.md#spoof-settings) that are available in the EOP anti-phishing policies. - [Impersonation settings](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)
security Connectors Remove Blocked https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connectors-remove-blocked.md
The default alert policy named **Suspicious connector activity** automatically n
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Alert policy**. Or, to go directly to the **Alert policy** page, use <https://security.microsoft.com/alertpoliciesv2>.
-2. On the **Alert policy** page, find the alert named **Suspicious connector activity**. You can sort the alerts by name, or use the ::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the alert.
+2. On the **Alert policy** page, find the alert named **Suspicious connector activity**. You can sort the alerts by name, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the alert.
Select the **Suspicious connector activity** alert by clicking anywhere in the row other than the check box next to the name.
security Email Security In Microsoft Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-security-in-microsoft-defender.md
To see malware detected in email sorted by Microsoft 365 technology, use the [Ma
2. In the **Explorer** page, verify that **Malware** is selected.
-3. Select the filter dropdown, and then choose **Basic** \> **Detection technology** in the drop down list.
+3. Select the filter dropdown, and then choose **Basic** \> **Detection technology** in the dropdown list.
:::image type="content" source="../../media/threat-explorer-malware-detection.png" alt-text="Screenshot of the malware detection technology." lightbox="../../media/threat-explorer-malware-detection.png":::
You can use the **Report clean** option in Explorer to report a message as false
:::image type="content" source="../../media/report-clean-option-explorer-new.png" alt-text="Screenshot of the Report clean option in the Explorer." lightbox="../../media/report-clean-option-explorer-new.png":::
-5. Select the **Allow emails with similar attributes** checkbox. From the drop down list, specify the number of days you want the message to be removed, add a note if needed, and then select **Submit**.
+5. Select the **Allow emails with similar attributes** checkbox. From the dropdown list, specify the number of days you want the message to be removed, add a note if needed, and then select **Submit**.
## View phishing URL and click verdict data
You can view phishing attempts through URLs in email, including a list of URLs t
:::image type="content" source="../../media/explorer-view-email-phish-menu-new.png" alt-text="Screenshot of the View menu for Explorer in phishing context." lightbox="../../media/explorer-view-email-phish-menu-new.png":::
-3. Select the filter dropdown, and then choose **URLs** \> **Click verdict** in the drop down list.
+3. Select the filter dropdown, and then choose **URLs** \> **Click verdict** in the dropdown list.
4. In options that appear, select one or more options, such as **Blocked** and **Block overridden**, and then click **Refresh** (don't refresh your browser window).
security Investigate Malicious Email That Was Delivered https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/investigate-malicious-email-that-was-delivered.md
Threat Explorer is a powerful report that can serve multiple purposes, such as f
On the **Explorer** page, the **Additional actions** column shows admins the outcome of processing an email. The **Additional actions** column can be accessed in the same place as **Delivery action** and **Delivery location**. Special actions might be updated at the end of Threat Explorer's email timeline, which is a new feature aimed at making the hunting experience better for admins.
-2. In the **View** menu, choose **Email** \> **All email** from the drop down list.
+2. In the **View** menu, choose **Email** \> **All email** from the dropdown list.
:::image type="content" source="../../media/tp-InvestigateMalEmail-viewmenu.png" alt-text="The Malware drop-down list" lightbox="../../media/tp-InvestigateMalEmail-viewmenu.png":::
security Mail Flow About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mail-flow-about.md
In Microsoft 365 organizations with Exchange Online mailboxes, or standalone Exc
EOP offers flexibility in how your messages are routed. The following articles explain steps in the mail flow process.
-[Directory Based Edge Blocking](/exchange/mail-flow-best-practices/use-directory-based-edge-blocking) reject messages to invalid recipients at the service network perimeter by default.
+[Directory Based Edge Blocking](/exchange/mail-flow-best-practices/use-directory-based-edge-blocking) rejects messages to invalid recipients at the service network perimeter by default.
[View or edit accepted domains in EOP](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) describes how to manage domains that are associated with your EOP service.
security Mdo Sec Ops Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-guide.md
description: A prescriptive playbook for SecOps personnel to manage Microsoft Defender for Office 365. Previously updated : 6/15/2023 Last updated : 6/22/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 plan 1 and plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft 365 Defender</a>
The following permissions (roles and role groups) are available in Defender for
- **[Security Administrator](/azure/active-directory/roles/permissions-reference#security-administrator)** - **[Security Reader](/azure/active-directory/roles/permissions-reference#security-reader)** -- **Exchange Online** and **Email & collaboration**: Roles and role groups that grant permission specific to Microsoft Defender for Office 365. The following roles are not available in Azure AD, but can be important for security teams:
+- **Exchange Online** and **Email & collaboration**: Roles and role groups that grant permission specific to Microsoft Defender for Office 365. The following roles aren't available in Azure AD, but can be important for security teams:
- **Preview** role (Email & collaboration): Assign this role to team members who need to preview or download email messages as part of investigation activities. Allows users to [preview and download](investigate-malicious-email-that-was-delivered.md#preview-role-permissions) email messages in cloud mailboxes using the [email entity page](mdo-email-entity-page.md#email-preview-and-download-for-cloud-mailboxes).
The following permissions (roles and role groups) are available in Defender for
- **Tenant AllowBlockList Manager** (Exchange Online): Manage allow and block entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). Blocking URLs, files (using file hash) or senders is a useful response action to take when investigating malicious email that was delivered.
- By default, this role is assigned only to the **Security Operator role group in Exchange Online**, not in Azure AD. Membership in the **[Security Operator role in Azure AD](/azure/active-directory/roles/permissions-reference#security-operator)** _does not_ allow you to manage entries the Tenant Allow/Block List.
+ By default, this role is assigned only to the **Security Operator role group in Exchange Online**, not in Azure AD. Membership in the **[Security Operator role in Azure AD](/azure/active-directory/roles/permissions-reference#security-operator)** _doesn't_ allow you to manage entries the Tenant Allow/Block List.
Members of the **Security Administrator** or **Organization management** roles in Azure AD or the corresponding role groups in Exchange Online _are_ able to manage entries in the Tenant Allow/Block List.
Defender for Office 365 exposes most of its data through a set of programmatic A
- [Incident API](/microsoft-365/security/defender/api-incident): Defender for Office 365 alerts and automated investigations are active parts of incidents in Microsoft 365 Defender. Security teams can focus on what's critical by grouping the full attack scope and all impacted assets together. -- [Event streaming API](/microsoft-365/security/defender/streaming-api): Allows shipping of real-time events and alerts into a single data stream as they happen. Supported Defender for Office 365 event types include:
+- [Event streaming API](/microsoft-365/security/defender/streaming-api): Allows shipping of real-time events and alerts into a single data stream as they happen. Supported event types in Defender for Office 365 include:
- [EmailEvents](/microsoft-365/security/defender/advanced-hunting-emailevents-table) - [EmailUrlInfo](/microsoft-365/security/defender/advanced-hunting-emailurlinfo-table) - [EmailAttachmentInfo](/microsoft-365/security/defender/advanced-hunting-emailattachmentinfo-table)
Defender for Office 365 exposes most of its data through a set of programmatic A
To connect Defender for Office 365 incidents and raw data with Microsoft Sentinel, you can use the [Microsoft 365 Defender (M365D) connector](/azure/sentinel/connect-microsoft-365-defender?tabs=MDO)
-You can use this simple "Hello World" example to test API access to Microsoft Defender APIs: [Hello World for Microsoft 365 Defender REST API](/microsoft-365/security/defender/api-hello-world).
+You can use the following "Hello World" example to test API access to Microsoft Defender APIs: [Hello World for Microsoft 365 Defender REST API](/microsoft-365/security/defender/api-hello-world).
For more information about SIEM tool integration, see [Integrate your SIEM tools with Microsoft 365 Defender](/microsoft-365/security/defender/configure-siem-defender).
Organizations have multiple options for configuring user reported messages. Depe
- **Send the reported messages to**: **Microsoft only**. - **Send the reported messages to**: **Microsoft and my reporting mailbox**.
- Security teams members should do add-hoc [admin submissions](submissions-admin.md) when false positives or false negatives that were not reported by users were discovered by the operations teams.
+ Security teams members should do add-hoc [admin submissions](submissions-admin.md) when the operations team discovers false positives or false negatives that weren't reported by users.
- When user reported messages are configured to send messages only to the organization's mailbox, security teams should actively send user-reported false positives and false negatives to Microsoft via admin submissions.
-Whenever a user reports a message as phishing, Defender for Office 365 generates an alert and the alert will trigger an AIR playbook. Incident logic will correlate this information to other alerts and events where possible. This consolidation of information helps security teams triage, investigate, and respond to user reported messages.
+When a user reports a message as phishing, Defender for Office 365 generates an alert, and the alert triggers an AIR playbook. Incident logic correlates this information to other alerts and events where possible. This consolidation of information helps security teams triage, investigate, and respond to user reported messages.
-User reported messages and admin submissions are handled by the submission pipeline by Microsoft, which follows a tightly integrated process. This process includes:
+The submission pipeline in the service follows a tightly integrated process when user report messages and admins submit messages. This process includes:
- Noise reduction. - Automated triage.
security Mdo Sec Ops Manage Incidents And Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-manage-incidents-and-alerts.md
Security teams can take wide variety of response actions on email using Defender
- You can block undetected malicious files, URLs, or senders using the [Tenant Allow/Block List](tenant-allow-block-list-about.md).
-Defender for Office 365 actions are seamlessly integrated into hunting experiences and the history of actions are visible on the **History** tab in the unified **Action center** at <https://security.microsoft.com/action-center/history>.
+Actions in Defender for Office 365 are seamlessly integrated into hunting experiences and the history of actions are visible on the **History** tab in the unified **Action center** at <https://security.microsoft.com/action-center/history>.
The most effective way to take action is to use the built-in integration with Incidents in Microsoft 365 Defender. You can approve the actions that were recommended by AIR in Defender for Office 365 on the [Evidence and response](/microsoft-365/security/defender/investigate-incidents#evidence-and-response) tab of an incident in Microsoft 365 Defender. This method of tacking action is recommended for the following reasons:
security Message Headers Eop Mdo https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/message-headers-eop-mdo.md
The following table describes the fields and possible values for each email auth
|`dmarc`|Describes the results of the DMARC check for the message. Possible values include: <ul><li>**pass**: Indicates the DMARC check for the message passed.</li><li>**fail**: Indicates the DMARC check for the message failed.</li><li>**bestguesspass**: Indicates that no DMARC TXT record exists for the domain exists. If the domain had a DMARC TXT record, the DMARC check for the message would have passed.</li><li>**none**: Indicates that no DMARC TXT record exists for the sending domain in DNS.| |`header.d`|Domain identified in the DKIM signature if any. This is the domain that's queried for the public key.| |`header.from`|The domain of the `5322.From` address in the email message header (also known as the From address or P2 sender). Recipient sees the From address in email clients.|
-|`reason`|The reason the composite authentication passed or failed. The value is a 3-digit code. For example: <ul><li>**000**: The message failed explicit authentication (`compauth=fail`). For example, the message received a DMARC fail with an action of quarantine or reject.</li><li>**001**: The message failed implicit authentication (`compauth=fail`). This result means that the sending domain didn't have email authentication records published, or if they did, they had a weaker failure policy (SPF `~all` or `?all`, or s DMARC policy of `p=none`).</li><li>**002**: The organization has a policy for the sender/domain pair that is explicitly prohibited from sending spoofed email. An admin manually configures this setting.</li><li>**010**: The message failed DMARC with an action of reject or quarantine, and the sending domain is one of your organization's accepted-domains (self-to-self or intra-org spoofing).</li><li>**1xx** or **7xx**: The message passed authentication (`compauth=pass`). The last two digits are internal codes used by Microsoft 365.</li><li>**2xx**: The message soft-passed implicit authentication (`compauth=softpass`). The last two digits are internal codes used by Microsoft 365.</li><li>**3xx**: The message wasn't checked for composite authentication (`compauth=none`).</li><li>**4xx** or **9xx**: The message bypassed composite authentication (`compauth=none`). The last two digits are internal codes used by Microsoft 365.</li><li>**6xx**: The message failed implicit email authentication, and the sending domain is one of your organization's accepted domains (self-to-self or intra-org spoofing).</li></ul>|
+|`reason`|The reason the composite authentication passed or failed. The value is a three-digit code. For example: <ul><li>**000**: The message failed explicit authentication (`compauth=fail`). For example, the message received a DMARC fail with an action of quarantine or reject.</li><li>**001**: The message failed implicit authentication (`compauth=fail`). This result means that the sending domain didn't have email authentication records published, or if they did, they had a weaker failure policy (SPF `~all` or `?all`, or s DMARC policy of `p=none`).</li><li>**002**: The organization has a policy for the sender/domain pair that is explicitly prohibited from sending spoofed email. An admin manually configures this setting.</li><li>**010**: The message failed DMARC with an action of reject or quarantine, and the sending domain is one of your organization's accepted-domains (self-to-self or intra-org spoofing).</li><li>**1xx** or **7xx**: The message passed authentication (`compauth=pass`). The last two digits are internal codes used by Microsoft 365.</li><li>**2xx**: The message soft-passed implicit authentication (`compauth=softpass`). The last two digits are internal codes used by Microsoft 365.</li><li>**3xx**: The message wasn't checked for composite authentication (`compauth=none`).</li><li>**4xx** or **9xx**: The message bypassed composite authentication (`compauth=none`). The last two digits are internal codes used by Microsoft 365.</li><li>**6xx**: The message failed implicit email authentication, and the sending domain is one of your organization's accepted domains (self-to-self or intra-org spoofing).</li></ul>|
|`smtp.mailfrom`|The domain of the `5321.MailFrom` address (also known as the MAIL FROM address, P1 sender, or envelope sender). This email address is used for non-delivery reports (also known as NDRs or bounce messages).| |`spf`|Describes the results of the SPF check for the message. Possible values include: <ul><li>`pass (IP address)`: The SPF check for the message passed and includes the sender's IP address. The client is authorized to send or relay email on behalf of the sender's domain.</li><li>`fail (IP address)`: The SPF check for the message failed and includes the sender's IP address. This result is sometimes called _hard fail_.</li><li>`softfail (reason)`: The SPF record designated the host as not being allowed to send, but is in transition.</li><li>`neutral`: The SPF record explicitly states that it doesn't assert whether the IP address is authorized to send.</li><li>`none`: The domain doesn't have an SPF record or the SPF record doesn't evaluate to a result.</li><li>`temperror`: A temporary error has occurred. For example, a DNS error. The same check later might succeed.</li><li>`permerror`: A permanent error has occurred. For example, the domain has a badly formatted SPF record.</li></ul>|
security Message Trace Scc https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/message-trace-scc.md
You can use the information from message trace to efficiently answer user questi
## What do you need to know before you begin? -- You need to be a member of the **Organization Management**, **Compliance Management** or **Help Desk** role groups in **Exchange Online** to use message trace. For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).-
- **Notes**: Membership in the corresponding Azure Active Directory role in the Microsoft 365 admin center gives users the required permissions _and_ permissions for other features in Microsoft 365. For more information, see [About admin roles](../../admin/add-users/about-admin-roles.md).
- - The maximum number of messages that are displayed in the results of a message trace depends on the report type you selected (see the [Choose report type](/exchange/monitoring/trace-an-email-message/message-trace-modern-eac#choose-report-type) section for details). The [Get-HistoricalSearch](/powershell/module/exchange/get-historicalsearch) cmdlet in Exchange Online PowerShell or standalone EOP PowerShell returns all messages in the results.
+- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
+ - [Exchange Online RBAC](/exchange/permissions-exo/permissions-exo): Membership in the **Organization Management**, **Compliance Management** or **Help Desk** role groups.
+ - [Azure AD RBAC](../../admin/add-users/about-admin-roles.md): Membership in the **Global Administrator** or **Compliance Administrator** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
+ ## Open message trace
-In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Exchange message trace**. To go directly to the message trace page, use <https://admin.exchange.microsoft.com/#/messagetrace>.
+In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Exchange message trace**. Or, to go directly to the message trace page, use <https://admin.exchange.microsoft.com/#/messagetrace>.
At this point, message trace in the EAC opens. For more information, see [Message trace in the modern Exchange admin center](/exchange/monitoring/trace-an-email-message/message-trace-modern-eac).
security Migrate To Defender For Office 365 Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-setup.md
Welcome to **Phase 2: Setup** of your **[migration to Microsoft Defender for Off
Distribution groups are required in Microsoft 365 for the following aspects of your migration: -- **Exceptions for the SCL=-1 mail flow rule**: You want pilot users to get the full effect of Defender for Office 365 protection, so you need their incoming messages to be scanned by Defender for Office 365. You get this result by defining your pilot users in the appropriate distribution groups in Microsoft 365, and configuring these groups as exceptions to the SCL=-1 mail flow rule.
+- **Exceptions for the SCL=-1 mail flow rule**: You want pilot users to get the full effect of Defender for Office 365 protection, so you need Defender for Office 365 to scan their incoming messages. You get this result by defining your pilot users in the appropriate distribution groups in Microsoft 365, and configuring these groups as exceptions to the SCL=-1 mail flow rule.
As we described in [Onboard Step 2: (Optional) Exempt pilot users from filtering by your existing protection service](migrate-to-defender-for-office-365-onboard.md#step-2-optional-exempt-pilot-users-from-filtering-by-your-existing-protection-service), you should consider exempting these same pilot users from scanning by your existing protection service. Eliminating the possibility of filtering by your existing protection service and relying exclusively on Defender for Office 365 is the best and closest representation of what's going to happen after your migration is complete.
security Migrate To Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365.md
appliesto:
# Migrate from a third-party protection service or device to Microsoft Defender for Office 365
-If you already have an existing third-party protection service or device that sits in front of Microsoft 365, you can use this guide to migrate your protection to Microsoft Defender for Office 365 to get the benefits of a consolidated management experience, potentially reduced cost (using products that you already pay for), and a mature product with integrated security protection. For more information, see [Microsoft Defender for Office 365](https://www.microsoft.com/security/business/threat-protection/office-365-defender).
+If you already have an existing third-party protection service or device that sits in front of Microsoft 365, you can use this guide to migrate your protection to Microsoft Defender for Office 365. Defender for Office 365 gives you the benefits of a consolidated management experience, potentially reduced cost (using products that you already pay for), and a mature product with integrated security protection. For more information, see [Microsoft Defender for Office 365](https://www.microsoft.com/security/business/threat-protection/office-365-defender).
Watch this short video to learn more about migrating to Defender for Office 365. > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWRwfH] This guide provides specific and actionable steps for your migration, and assumes the following facts: -- You already have Microsoft 365 mailboxes, but you're currently using a third-party service or device for email protection. Mail from the internet flows through the protection service before delivery into your Microsoft 365 organization, and Microsoft 365 protection is as low as possible (it's never completely off; for example, malware protection is always enforced).
+- You already have Microsoft 365 mailboxes, but you're currently using a third-party service or device for email protection. Mail from the internet flows through the protection service before delivery into your Microsoft 365 organization. Microsoft 365 protection is as low as possible (it's never completely off. For example, malware protection is always enforced).
:::image type="content" source="../../medio-migration-before.png":::
This guide provides specific and actionable steps for your migration, and assume
- You've already purchased Defender for Office 365 licenses. -- You need to retire your existing third-party protection service, which means you'll ultimately need to point the MX records for your email domains to Microsoft 365. When you're done, mail from the internet will flow directly into Microsoft 365 and will be protected exclusively by Exchange Online Protection (EOP) and Defender for Office 365.
+- You need to retire your existing third-party protection service, which means you ultimately need to point the MX records for your email domains to Microsoft 365. When you're done, mail from the internet flows directly into Microsoft 365 and is protected exclusively by Exchange Online Protection (EOP) and Defender for Office 365.
:::image type="content" source="../../medio-migration-after.png"::: Eliminating your existing protection service in favor of Defender for Office 365 is a big step that you shouldn't take lightly, nor should you rush to make the change. The guidance in this migration guide will help you transition your protection in an orderly manner with minimal disruption to your users.
-The very high-level migration steps are illustrated in the following diagram. The actual steps are listed in the section named [The migration process](#the-migration-process) later in this article.
+The high-level migration steps are illustrated in the following diagram. The actual steps are listed in the section named [The migration process](#the-migration-process) later in this article.
:::image type="content" source="../../medio-migration-overview.png":::
The very high-level migration steps are illustrated in the following diagram. Th
In the IT industry, surprises are generally bad. Simply flipping your MX records to point to Microsoft 365 without prior and thoughtful testing will result in many surprises. For example: -- You or your predecessors have likely spent a lot of time and effort customizing your existing protection service for optimal mail delivery (in other words, blocking what needs to be blocked, and allowing what needs to be allowed). It's almost a guaranteed certainty that not every customization in your current protection service is required in Defender for Office 365. It's also very possible that Defender for Office 365 will introduce new issues (allows or blocks) that didn't happen or weren't required in your current protection service.
+- You or your predecessors have likely spent a lot of time and effort customizing your existing protection service for optimal mail delivery (in other words, blocking what needs to be blocked, and allowing what needs to be allowed). It's almost a guaranteed certainty that not every customization in your current protection service is required in Defender for Office 365. It's also possible that Defender for Office 365 will introduce new issues (allows or blocks) that didn't happen or weren't required in your current protection service.
- Your help desk and security personnel need to know what to do in Defender for Office 365. For example, if a user complains about a missing message, does your help desk know where or how to look for it? They're likely familiar with the tools in your existing protection service, but what about the tools in Defender for Office 365?
-In contrast, if you follow the steps in this migration guide, you'll get the following tangible benefits for your migration:
+In contrast, if you follow the steps in this migration guide, you get the following tangible benefits for your migration:
- Minimal disruption to users. - Objective data from Defender for Office 365 that you can use as you report on the progress and success of the migration to management.
In contrast, if you follow the steps in this migration guide, you'll get the fol
The more you familiarize yourself with how Defender for Office 365 will affect your organization, the better the transition will be for users, help desk personnel, security personnel, and management.
-This migration guide gives you a plan for gradually "turning the dial" so you can monitor and test how Defender for Office 365 affects your users and their email so you can react quickly to any issues that you encounter.
+This migration guide gives you a plan for gradually "turning the dial" so you can monitor and test how Defender for Office 365 affects users and their email so you can react quickly to any issues that you encounter.
## The migration process
security Outbound Spam High Risk Delivery Pool About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-high-risk-delivery-pool-about.md
These scenarios can result in the IP address of the affected Microsoft 365 datac
To prevent our IP addresses from being blocked, all outbound messages from Microsoft 365 datacenter servers that are determined to be spam are sent through the _high-risk delivery pool_.
-The high risk delivery pool is a separate IP address pool for outbound email that's only used to send "low quality" messages (for example, spam and [backscatter](anti-spam-backscatter-about.md). Using the high risk delivery pool helps prevent the normal IP address pool for outbound email from sending spam. The normal IP address pool for outbound email maintains the reputation sending "high quality" messages, which reduces the likelihood that these IP address appear on IP blocklists.
+The high risk delivery pool is a separate IP address pool for outbound email that's only used to send "low quality" messages (for example, spam and [backscatter](anti-spam-backscatter-about.md). Using the high risk delivery pool helps prevent the normal IP address pool for outbound email from sending spam. The normal IP address pool for outbound email maintains the reputation sending "high quality" messages, which reduces the likelihood that these IP addresses appear on IP blocklists.
-The very real possibility that IP addresses in the high-risk delivery pool are placed on IP blocklists remains, but this is by design. Delivery to the intended recipients isn't guaranteed, because many email organizations don't accept messages from the high risk delivery pool.
+The possibility that IP addresses in the high-risk delivery pool are placed on IP blocklists remains, but this behavior is by design. Delivery to the intended recipients isn't guaranteed, because many email organizations don't accept messages from the high risk delivery pool.
For more information, see [Control outbound spam](outbound-spam-protection-about.md).
For more information, see [Control outbound spam](outbound-spam-protection-about
### Bounce messages
-The outbound high-risk delivery pool manages the delivery for all non-delivery reports (also known as NDRs, bounce messages, delivery status notifications, or DSNs).
-
-Possible causes for a surge in NDRs include:
+The outbound high-risk delivery pool manages the delivery of all non-delivery reports (also known as NDRs or bounce messages). Possible causes for a surge in NDRs include:
- A spoofing campaign that affects one of the customers using the service. - A directory harvest attack. - A spam attack. - A rogue email server.
-All of these issues can result in a sudden increase in the number of NDRs being processed by the service. Many times, these NDRs appear to be spam to other email servers and services (also known as _[backscatter](anti-spam-backscatter-about.md)_).
+Any of these issues can result in a sudden increase in the number of NDRs being processed by the service. These NDRs often appear to be spam to other email servers and services (also known as _[backscatter](anti-spam-backscatter-about.md)_).
### Relay pool
-Messages that are forwarded or relayed via Microsoft 365 in certain scenarios are sent using a special relay pool, because the destination shouldn't consider Microsoft 365 as the actual sender. It's important for us to isolate this email traffic, because there are legitimate and invalid scenarios for auto forwarding or relaying email out of Microsoft 365. Similar to the high-risk delivery pool, a separate IP address pool is used for relayed mail. This address pool isn't published because it can change often, and it's not part of published SPF record for Microsoft 365.
+In certain scenarios, messages that are forwarded or relayed via Microsoft 365 are sent using a special relay pool, because the destination shouldn't consider Microsoft 365 as the actual sender. It's important for us to isolate this email traffic, because there are legitimate and invalid scenarios for auto forwarding or relaying email out of Microsoft 365. Similar to the high-risk delivery pool, a separate IP address pool is used for relayed mail. This address pool isn't published because it can change often, and it's not part of published SPF record for Microsoft 365.
Microsoft 365 needs to verify that the original sender is legitimate so we can confidently deliver the forwarded message.
The forwarded or relayed message should meet one of the following criteria to av
- SPF passes when the message comes to Microsoft 365. - DKIM on the sender domain passes when the message comes to Microsoft 365.
-You can tell that a message was sent via the relay pool by looking at the outbound server IP (the relay pool is in the 40.95.0.0/16 range), or by looking at the outbound server name (it has "rly" in the name).
+You can tell that a message was sent via the relay pool by looking at the outbound server IP (the relay pool is in the 40.95.0.0/16 range), or by looking at the outbound server name (the name contains the value `rly`).
In cases where we can authenticate the sender, we use Sender Rewriting Scheme (SRS) to help the recipient email system know that the forwarded message is from a trusted source. You can read more about how that works and what you can do to help make sure the sending domain passes authentication in [Sender Rewriting Scheme (SRS) in Office 365](/office365/troubleshoot/antispam/sender-rewriting-scheme). For DKIM to work, make sure you enable DKIM for sending domain. For example, fabrikam.com is part of contoso.com and is defined in the accepted domains of the organization. If the message sender is sender@fabrikam.com, DKIM needs to be enabled for fabrikam.com. you can read on how to enable at [Use DKIM to validate outbound email sent from your custom domain](email-authentication-dkim-configure.md).
-To add a custom domains, follow the steps in [Add a domain to Microsoft 365](../../admin/setup/add-domain.md).
+To add a custom domain, follow the steps in [Add a domain to Microsoft 365](../../admin/setup/add-domain.md).
-If the MX record for your domain points to a third party service or an on-premises email server, you should use [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors). Enhanced Filtering ensures SPF validation is correct for inbound mail and will avoid sending email through the relay pool.
+If the MX record for your domain points to a third party service or an on-premises email server, you should use [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors). Enhanced Filtering ensures SPF validation is correct for inbound mail and avoids sending email through the relay pool.
security Outbound Spam Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-policies-configure.md
You can configure outbound spam policies in the Microsoft 365 Defender portal or
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
-2. On the **Anti-spam policies** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create policy** and then select **Outbound** from the drop down list to start the new outbound spam policy wizard.
+2. On the **Anti-spam policies** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create policy** and then select **Outbound** from the dropdown list to start the new outbound spam policy wizard.
3. On the **Name your policy page**, configure these settings: - **Name**: Enter a unique, descriptive name for the policy.
You can configure outbound spam policies in the Microsoft 365 Defender portal or
Enter a value in the box, or use the increase/decrease arrows on the box.
- - **Restriction placed on users who reach the message limit**: Select an action from the drop down list when any of the limits in the **Protection settings** section are exceeded.
+ - **Restriction placed on users who reach the message limit**: Select an action from the dropdown list when any of the limits in the **Protection settings** section are exceeded.
For all actions, the senders specified in the **User restricted from sending email** alert policy (and in the now redundant **Notify these users and groups if a sender is blocked due to sending outbound spam** setting on this page) receive email notifications.
You can configure outbound spam policies in the Microsoft 365 Defender portal or
- **Forwarding rules** section: The setting in this section controls automatic email forwarding by **Exchange Online mailboxes** to external recipients. For more information, see [Control automatic external email forwarding in Microsoft 365](outbound-spam-policies-external-email-forwarding.md).
- Select one of the following actions from the **Automatic forwarding rules** drop down list:
+ Select one of the following actions from the **Automatic forwarding rules** dropdown list:
- **Automatic - System-controlled**: This is the default value. This value is now the same as **Off**. When this value was originally introduced, it was equivalent to **On**. Over time, thanks to the principles of [secure by default](secure-by-default.md), the effect of this value was eventually changed to **Off** for all customers. For more information, see [this blog post](https://techcommunity.microsoft.com/t5/exchange-team-blog/all-you-need-to-know-about-automatic-email-forwarding-in/ba-p/2074888). - **On**: Automatic external email forwarding isn't disabled by the policy.
security Outbound Spam Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-protection-about.md
description: Admins can learn about the outbound spam controls in Exchange Online Protection (EOP), and what to do if you need to send mass mailings. Previously updated : 6/19/2023 Last updated : 6/22/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 plan 1 and plan 2</a>
This article describes the controls and notifications that are designed to help
- **Use built-in notifications**: When a user exceeds sending limits of [the service](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options) or [outbound spam policies](outbound-spam-policies-configure.md) and is restricted from sending email, the default alert policy named **User restricted from sending email** sends email notifications to members of the **TenantAdmins** (**Global admins**) group. To configure who else receives these notifications, see [Verify the alert settings for restricted users](removing-user-from-restricted-users-portal-after-spam.md#verify-the-alert-settings-for-restricted-users). Also, the default alert policies named **Email sending limit exceeded** and **Suspicious email sending patterns detected** send email notifications to members of the **TenantAdmins** (**Global admins**) group. For more information about alert policies, see [Alert policies in Microsoft 365](../../compliance/alert-policies.md). -- **Review spam complaints from third-party email providers**: Many email services like Outlook.com, Yahoo, and AOL provide a feedback loop where if any user in their service marks an email from Microsoft 365 as spam, the message is packaged up and sent back to us for review. To learn more about sender support for Outlook.com, go to <https://sendersupport.olc.protection.outlook.com/pm/services.aspx>.
+- **Review spam complaints from third-party email providers**: Many email services like Outlook.com, Yahoo, and AOL provide a feedback loop where we review our messages that are identified as spam by their users. To learn more about sender support for Outlook.com, go to <https://sendersupport.olc.protection.outlook.com/pm/services.aspx>.
## How EOP controls outbound spam
This article describes the controls and notifications that are designed to help
It's difficult to strike a balance between customers who want to send a large volume of email vs. protecting the service from compromised accounts and bulk email senders with poor recipient acquisition practices. The cost of a Microsoft 365 email source landing on a third-party IP block list is greater than blocking a user who's sending too much email.
-As described in the [Exchange Online Service Description](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits), using EOP to send bulk email is not a supported use of the service, and is only permitted on a "best-effort" basis. For customers who do want to send bulk email, we recommend the following solutions:
+As described in the [Exchange Online Service Description](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits), using EOP to send bulk email isn't a supported use of the service, and is permitted only on a "best-effort" basis. For customers who want to send bulk email, we recommend the following solutions:
- **Send bulk email through on-premises email servers**: Customers maintain their own email infrastructure for mass mailings.- - **Use a third-party bulk email provider**: There are several third-party bulk email solution providers that you can use to send mass mailings. These companies have a vested interest in working with customers to ensure good email sending practices. The Messaging, Mobile, Malware Anti-Abuse Working Group (MAAWG) publishes its membership roster at <https://www.maawg.org/about/roster>. Several bulk email providers are on the list, and are known to be responsible internet citizens.
security Preset Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/preset-security-policies.md
The rest of this article how to configure preset security policies.
Each entry consists of a display name and an email address:
- - **Internal users**: Click in the **Add a valid email** box or start typing the user's email address. Select the email address in the **Suggested contacts** drop down list that appears. The user's display name is added to the **Add a name** box (which you can change). When you're finished selecting the user, select **Add**.
+ - **Internal users**: Click in the **Add a valid email** box or start typing the user's email address. Select the email address in the **Suggested contacts** dropdown list that appears. The user's display name is added to the **Add a name** box (which you can change). When you're finished selecting the user, select **Add**.
- - **External users**: Type the external user's full email address in the **Add a valid email** box, and then select the email address in the **Suggested contacts** drop down list that appears. The email address is also added in the **Add a name** box (which you can change to a display name).
+ - **External users**: Type the external user's full email address in the **Add a valid email** box, and then select the email address in the **Suggested contacts** dropdown list that appears. The email address is also added in the **Add a name** box (which you can change to a display name).
Repeat these steps as many times as necessary.
A profile determines the level of protection. The following profiles are availab
- **Strict protection**: A more aggressive profile for selected users (high value targets or priority users). - **Built-in protection** (Microsoft Defender for Office 365 only): Effectively provides default policies for Safe Links and Safe Attachments only.
-In general, the **Strict protection** profile tends to quarantine less harmful email (for example, bulk and spam) than the **Strict protection** profile, but many of the settings in both profiles are the same (in particular, for unquestionably harmful email like malware or phishing). For a comparison of the setting differences, see the tables in the next section.
+In general, the **Strict protection** profile tends to quarantine less harmful email (for example, bulk and spam) than the **Standard protection** profile, but many of the settings in both profiles are the same (in particular, for unquestionably harmful email like malware or phishing). For a comparison of the setting differences, see the tables in the next section.
Until you turn on the profiles and assign users to them, the Standard and Strict preset security policies are assigned to no one. In contrast, the Built-in protection preset security policy is assigned to all recipients by default, but you can configure exceptions.
When a recipient is defined in multiple policies, the policies are applied in th
4. Custom policies based on the priority of the policy (a lower number indicates a higher priority). 5. The Built-in protection preset security policy for Safe Links and Safe Attachments; the default policies for anti-malware, anti-spam, and anti-phishing.
-In other words, the settings of the Strict preset security policy override the settings of the Standard preset security policy, which overrides the settings from any anti-phishing, Safe Links, or Safe Attachments evaluation policies, which overrides the settings from any custom policies, which override the settings of the Built-in protection preset security policy for Safe Links and Safe Attachments, and the default policies for anti-spam, anti-malware, and anti-phishing.
+In other words, the settings of the Strict preset security policy override the settings of the Standard preset security policy, which overrides the settings from any anti-phishing, Safe Links, or Safe Attachments evaluation policies, which override the settings from any custom policies, which override the settings of the Built-in protection preset security policy for Safe Links and Safe Attachments, and the default policies for anti-spam, anti-malware, and anti-phishing.
This order is shown on the pages of the individual security policies in the Defender portal (the policies are applied in the order they're shown on the page).
security Priority Accounts Security Recommendations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/priority-accounts-security-recommendations.md
After you secure and tag your priority users, you can use the available reports,
## Train users
-Training users with priority accounts can help save those users and your security operations team much time and frustration. Savvy users are less likely to open attachments or click links in questionable email messages, and they are more likely to avoid suspicious websites.
+Training users with priority accounts can help save those users and your security operations team much time and frustration. Savvy users are less likely to open attachments or click links in questionable email messages, and they're more likely to avoid suspicious websites.
The Harvard Kennedy School [Cybersecurity Campaign Handbook](https://www.belfercenter.org/CyberPlaybook) provides excellent guidance for establishing a strong culture of security awareness within your organization, including training users to identify phishing attacks.
security Quarantine Admin Manage Messages Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-admin-manage-messages-files.md
Back on the **Files** tab, the file is no longer listed.
#### Take action on multiple quarantined files
-When you select multiple quarantined files on the **Files** tab by selecting the check boxes next to the first column (up to 100 files), a **Bulk actions** drop down list appears where you can take the following actions:
+When you select multiple quarantined files on the **Files** tab by selecting the check boxes next to the first column (up to 100 files), a **Bulk actions** dropdown list appears where you can take the following actions:
- [Release quarantined files from quarantine](#release-quarantined-files-from-quarantine) - [Delete quarantined files from quarantine](#delete-quarantined-files-from-quarantine) - [Download quarantined files from quarantine](#download-quarantined-files-from-quarantine) ## Use the Microsoft 365 Defender portal to manage quarantined messages in Microsoft Teams
security Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-policies.md
You create and assign quarantine policies in the Microsoft 365 Defender portal o
2. On the **Quarantine policies** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add custom policy** to start the new quarantine policy wizard.
-3. On the **Policy name** page, enter a brief but unique name in the **Policy name** box. The policy name is selectable in drop-down lists in upcoming steps.
+3. On the **Policy name** page, enter a brief but unique name in the **Policy name** box. The policy name is selectable in dropdown lists in upcoming steps.
When you're finished on the **Policy name** page, select **Next**.
You create and assign quarantine policies in the Microsoft 365 Defender portal o
- **Limited access**: The individual permissions that are included in this permission group are described in the [Appendix](#appendix) section. Basically, users can do anything to their quarantined messages except release them from quarantine without admin approval. - **Set specific access (Advanced)**: Use this value to specify custom permissions. Configure the following settings that appear:
- - **Select release action preference**: Select one of the following values from the drop down:
+ - **Select release action preference**: Select one of the following values from the dropdown list:
- Blank: Users can't release or request the release of their messages from quarantine. This is the default value. - **Allow recipients to request a message to be released from quarantine** - **Allow recipients to release a message from quarantine**
The rest of this step explains how to assign quarantine policies for supported f
2. On the **Anti-spam policies** page, use either of the following methods: - Select an existing **inbound** anti-spam policy by clicking anywhere in the row other than the check box next to the name. In the policy details flyout that opens, go to the **Actions** section and then select **Edit actions**.
- - Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create policy**, select **Inbound** from the drop down list to start the new anti-spam policy wizard, and then get to the **Actions** page.
+ - Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create policy**, select **Inbound** from the dropdown list to start the new anti-spam policy wizard, and then get to the **Actions** page.
3. On the **Actions** page or flyout, every verdict that has the **Quarantine message** action selected also has the **Select quarantine policy** box for you to select a quarantine policy.
security Quarantine Shared Mailbox Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-shared-mailbox-messages.md
description: Users can learn how to view and act on quarantined messages that were sent to shared mailboxes that they have permissions to. Previously updated : 6/19/2023 Last updated : 6/22/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 plan 1 and plan 2</a>
appliesto:
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
-Users can manage quarantined messages where they are one of the recipients as described in [Find and release quarantined messages as a user in EOP](quarantine-end-user.md). But what about **shared mailboxes** where the user has Full Access and Send As or Send on Behalf permissions to the mailbox as described in [Shared mailboxes in Exchange Online](/exchange/collaboration-exo/shared-mailboxes)?
+Users can manage quarantined messages where they're one of the recipients as described in [Find and release quarantined messages as a user in EOP](quarantine-end-user.md). But what about **shared mailboxes** where the user has Full Access and Send As or Send on Behalf permissions to the mailbox as described in [Shared mailboxes in Exchange Online](/exchange/collaboration-exo/shared-mailboxes)?
Previously, the ability for users to manage quarantined messages sent to a shared mailbox required admins to leave automapping enabled for the shared mailbox (it's enabled by default when an admin gives a user access to another mailbox). However, depending on the size and number of mailboxes that the user has access to, performance can suffer as Outlooks tries to open _all_ mailboxes that the user has access to. For this reason, many admins choose to [remove automapping for shared mailboxes](/outlook/troubleshoot/profiles-and-accounts/remove-automapping-for-shared-mailbox).
Now, automapping is no longer required for users to manage quarantined messages
- The user has access to quarantine notifications of the shared mailbox. - The user has Full Access permissions to the shared mailbox (directly or via a security group).
- The user can click the **Review** button in the notification to go to quarantine in the Microsoft 365 Defender portal. This method only allows access to quarantined messages that were sent to the shared mailbox. Users can't manage their own quarantine messages in this context.
+ The user can select **Review** in the notification to go to quarantine in the Microsoft 365 Defender portal. This method only allows access to quarantined messages that were sent to the shared mailbox. Users can't manage their own quarantine messages in this context.
-- The user can [go to quarantine in the Microsoft 365 Defender portal](quarantine-end-user.md) and click **Filter** to filter the results by **Recipient address** (the email address of the shared mailbox). On the main **Quarantine** page, you can click on the **Recipient** column to sort by messages that were sent to the shared mailbox.
+- The user can [go to quarantine in the Microsoft 365 Defender portal](quarantine-end-user.md) and select **Filter** to filter the results by **Recipient address** (the email address of the shared mailbox). On the main **Quarantine** page, you can click on the **Recipient** column header to sort by messages that were sent to the shared mailbox.
## Things to keep in mind
Now, automapping is no longer required for users to manage quarantined messages
- The first user to act on the quarantined message decides the fate of the message for everyone who uses the shared mailbox. For example, if a shared mailbox is accessed by 10 users, and a user decides to delete the quarantine message, the message is deleted for all 10 users. Likewise, if a user decides to release the message, it's released to the shared mailbox and is accessible by all other users of the shared mailbox. -- Currently, the **Block sender** button is not available in the **Details** flyout for quarantined messages that were sent to the shared mailbox.
+- Currently, the **Block sender** button isn't available in the **Details** flyout for quarantined messages that were sent to the shared mailbox.
-- Regarding quarantine operations for shared mailboxes, if you use nested security groups to grant access to a shared mailbox, we recommend no more than two levels of nested groups. For example, Group A is a member of Group B, which is a member of Group C. To assign permissions to a shared mailbox, don't add the user to Group A and then assign Group C to the shared mailbox.
+- Regarding quarantine operations for shared mailboxes, if you use nested security groups to grant access to a shared mailbox, we recommend no more than two levels of nested groups. For example, Group A is a member of Group B, which is a member of Group C. To assign permissions to a shared mailbox, don't add the user to Group A, and then assign Group C to the shared mailbox.
- Access to quarantined items for shared mailboxes in on-premises environments is currently not supported (directly or by using security groups). - As of July 2022, users with primary SMTP addresses that are different from their user principal names (UPNs) should be able to access quarantined messages for the shared mailbox. -- To manage quarantined messages for the shared mailbox in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), the end-user will need to use the [Get-QuarantineMessage](/powershell/module/exchange/get-quarantinemessage) cmdlet with shared mailbox email address for the value of the _RecipientAddress_ parameter to identify the messages. For example:
+- To manage quarantined messages for the shared mailbox in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), the user needs to use the [Get-QuarantineMessage](/powershell/module/exchange/get-quarantinemessage) cmdlet with shared mailbox email address for the value of the _RecipientAddress_ parameter to identify the messages. For example:
```powershell Get-QuarantineMessage -RecipientAddress officeparty@contoso.com ```
- Then, the end-user can select a quarantined message from the list to view or take action on.
+ Then, the user can select a quarantined message from the list to view or take action on.
This example shows all of the quarantined messages that were sent to the shared mailbox, and then releases the first message in the list from quarantine (the first message in the list is 0, the second is 1, and so on).
Now, automapping is no longer required for users to manage quarantined messages
Release-QuarantineMessage -Identity $SharedMessages[0] ```
- For detailed syntax and parameter information, see the following topics:
+ For detailed syntax and parameter information, see the following articles:
- [Get-QuarantineMessage](/powershell/module/exchange/get-quarantinemessage) - [Get-QuarantineMessageHeader](/powershell/module/exchange/get-quarantinemessageheader)
security Recommended Settings For Eop And Office365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365.md
To create and configure anti-spam policies, see [Configure anti-spam policies in
Wherever you select **Quarantine message** as the action for a spam filter verdict, a **Select quarantine policy** box is available. Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-If you _change_ the action of a spam filtering verdict to **Quarantine message** when you create anti-spam policies the the Defender portal, the **Select quarantine policy** box is blank by default. A blank value means the default quarantine policy for that spam filtering verdict is used. These default quarantine policies enforce the historical capabilities for the spam filter verdict that quarantined the message as described in the table [here](quarantine-end-user.md). When you later view or edit the anti-spam policy settings, the quarantine policy name is shown.
+If you _change_ the action of a spam filtering verdict to **Quarantine message** when you create anti-spam policies the Defender portal, the **Select quarantine policy** box is blank by default. A blank value means the default quarantine policy for that spam filtering verdict is used. These default quarantine policies enforce the historical capabilities for the spam filter verdict that quarantined the message as described in the table [here](quarantine-end-user.md). When you later view or edit the anti-spam policy settings, the quarantine policy name is shown.
Admins can create or use quarantine policies with more restrictive or less restrictive capabilities. For instructions, see [Create quarantine policies in the Microsoft 365 Defender portal](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-365-defender-portal).
Admins can create or use quarantine policies with more restrictive or less restr
|**Spam** detection action (_SpamAction_)|**Move message to Junk Email folder** (`MoveToJmf`)|**Move message to Junk Email folder** (`MoveToJmf`)|**Quarantine message** (`Quarantine`)|| |**Quarantine policy** for **Spam** (_SpamQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if spam detections are quarantined.| |**High confidence spam** detection action (_HighConfidenceSpamAction_)|**Move message to Junk Email folder** (`MoveToJmf`)|**Quarantine message** (`Quarantine`)|**Quarantine message** (`Quarantine`)||
-|**Quarantine policy** for **Hight confidence spam** (_HighConfidenceSpamQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessWithNotificationPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if high confidence spam detections are quarantined.|
+|**Quarantine policy** for **High confidence spam** (_HighConfidenceSpamQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessWithNotificationPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if high confidence spam detections are quarantined.|
|**Phishing** detection action (_PhishSpamAction_)|**Move message to Junk Email folder** (`MoveToJmf`)<sup>\*</sup>|**Quarantine message** (`Quarantine`)|**Quarantine message** (`Quarantine`)|<sup>\*</sup> The default value is **Move message to Junk Email folder** in the default anti-spam policy and in new anti-spam policies that you create in PowerShell. The default value is **Quarantine message** in new anti-spam policies that you create in the Defender portal.| |**Quarantine policy** for **Phishing** (_PhishQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessWithNotificationPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if phishing detections are quarantined.| |**High confidence phishing** detection action (_HighConfidencePhishAction_)|**Quarantine message** (`Quarantine`)|**Quarantine message** (`Quarantine`)|**Quarantine message** (`Quarantine`)|Users can't release their own messages that were quarantined as high confidence phishing, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined high-confidence phishing messages.|
security Reference Policies Practices And Guidelines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/reference-policies-practices-and-guidelines.md
description: Microsoft has developed various policies, procedures, and adopted several industry best practices to help protect our users from abusive, unwanted, or malicious email. Previously updated : 6/19/2023 Last updated : 6/22/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 plan 1 and plan 2</a>
appliesto:
Microsoft is dedicated to helping provide the most trusted user experience on the web. Therefore, Microsoft has developed various policies, procedures, and adopted several industry best practices to help protect our users from abusive, unwanted, or malicious email. Senders attempting to send email to users should ensure they fully understand and are following the guidance in this article to help in this effort and to help avoid potential delivery issues.
-If you are not in compliance with these policies and guidelines, it may not be possible for our support team to assist you. If you are adhering to the guidelines, practices, and policies presented in this article and are still experiencing delivery issues based on your sending IP address, please follow the steps to submit a delisting request. For instructions, see [Use the delist portal to remove yourself from the blocked senders list](use-the-delist-portal-to-remove-yourself-from-the-office-365-blocked-senders-lis.md).
+If you aren't in compliance with these policies and guidelines, it may not be possible for our support team to assist you. If you're adhering to the guidelines, practices, and policies presented in this article and are still experiencing delivery issues based on your sending IP address, follow the steps to submit a delisting request. For instructions, see [Use the delist portal to remove yourself from the blocked senders list](use-the-delist-portal-to-remove-yourself-from-the-office-365-blocked-senders-lis.md).
## General Microsoft policies Email sent to Microsoft 365 users must comply with all Microsoft policies governing email transmission and use of Microsoft 365. - Terms of Services applicable to Microsoft 365; in particular, the prohibition against using the service to spam or distribute malware.- - [Microsoft Services Agreement](https://www.microsoft.com/servicesagreement/) ## Governmental regulations
Email sent to Microsoft 365 users must comply with all Microsoft policies govern
Email sent to Microsoft 365 users must adhere to all applicable laws and regulations governing email communications in the applicable jurisdiction. - [CAN-SPAM Act: A Compliance Guide for Business](https://www.ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide-business)- - ["Remove Me" Responses and Responsibilities: Email Marketers Must Honor "Unsubscribe" Claims](https://www.lawpublish.com/ftc-emai-marketers-unsubscribe-claims.html) ## Technical guidelines
-Email sent to Microsoft 365 should comply with the applicable recommendations listed in the documents below (some links are only available in English).
+Email sent to Microsoft 365 should comply with the applicable recommendations listed in the following documents (some links are only available in English).
- [RFC 2505: Anti-Spam Recommendations for SMTP MTAs](https://www.ietf.org/rfc/rfc2505.txt)- - [RFC 2920: SMTP Service Extension for Command Pipelining](https://www.ietf.org/rfc/rfc2920.txt) In addition, email servers connecting to Microsoft 365 must adhere to the following requirements: -- Sender is expected to comply with all technical standards for the transmission of Internet email, as published by The Internet Society's Internet Engineering Task Force (IETF), including RFC 5321, RFC 5322, and others.-
+- The sender is expected to comply with all technical standards for the transmission of Internet email, as published by The Internet Society's Internet Engineering Task Force (IETF), including RFC 5321, RFC 5322, and others.
- After given a numeric SMTP error response code between 500 and 599 (also known as a permanent non-delivery response or NDR), the sender must not attempt to retransmit that message to that recipient.- - After multiple non-delivery responses, the sender must cease further attempts to send email to that recipient.- - Messages must not be transmitted through insecure email relay or proxy servers.- - The mechanism for unsubscribing, either from individual lists or all lists hosted by the sender, must be clearly documented and easy for recipients to find and use.--- Connections from dynamic IP space may not be accepted.-
+- Connections from dynamic IP addresses might not be accepted.
- Email servers must have valid reverse DNS records. ## Reputation management
Senders must adhere to Microsoft 365 limits listed in [Exchange Online Protectio
## Email delivery resources and organizations
-Microsoft actively works with industry bodies and service providers in order to improve the internet and email ecosystem. These organizations have published best practice documents that we support and recommend senders adhere to. This improves your ability to deliver email among several email service providers around the world.
+Microsoft actively works with industry bodies and service providers in order to improve the internet and email ecosystem. These organizations have published best practice documents that we support and recommend senders adhere to. Adhering to these recommendations improves your ability to deliver email among several email service providers around the world.
- [Messaging Malware Mobile Anti-Abuse Working Group](https://www.m3aawg.org/)- - [Online Trust Alliance](https://www.internetsociety.org/ota/)- - [Email Sender & Provider Coalition](https://www.espcoalition.org/) ## Abuse and spam reporting
-To report unlawful, abusive, unwanted or malicious email, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md). Sending these types of communications is a violation of Microsoft policy, and appropriate action will be taken on confirmed reports.
+To report unlawful, abusive, unwanted or malicious email, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md). Sending these types of communications is a violation of Microsoft policy, and appropriate action is taken on confirmed reports.
## Law enforcement
-If you are a member of law enforcement and wish to serve Microsoft Corporation with legal documentation regarding Office 365, or if you have questions regarding legal documentation you have submitted to Microsoft, please call (1) (425) 722-1299.
+If you're a member of law enforcement and wish to serve Microsoft Corporation with legal documentation regarding Microsoft 365, or if you have questions regarding legal documentation that you submitted to Microsoft, call +1 (425) 722-1299.
security Removing User From Restricted Users Portal After Spam https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/removing-user-from-restricted-users-portal-after-spam.md
The default alert policy named **User restricted from sending email** automatica
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Alert policy**. Or, to go directly to the **Alert policy** page, use <https://security.microsoft.com/alertpoliciesv2>.
-2. On the **Alert policy** page, find the alert named **User restricted from sending email**. You can sort the alerts by name, or use the ::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the alert.
+2. On the **Alert policy** page, find the alert named **User restricted from sending email**. You can sort the alerts by name, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the alert.
Select the **User restricted from sending email** alert by clicking anywhere in the row other than the check box next to the name.
security Safe Attachments About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-about.md
The following table describes scenarios for Safe Attachments in Microsoft 365 an
|Scenario|Result| |||
-|Pat's Microsoft 365 E5 organization has no Safe Attachments policies configured.|Pat is protected by Safe Attachments due to the **Built-in protection** preset security policy that applies to all recipients who are not otherwise defined in Safe Attachments policies.|
-|Lee's organization has a Safe Attachments policy that applies only to finance employees. Lee is a member of the sales department.|Lee and the rest of the sales department are protected by Safe Attachments due to the **Built-in protection** preset security policy that applies to all recipients who are not otherwise defined in Safe Attachments policies.|
+|Pat's Microsoft 365 E5 organization has no Safe Attachments policies configured.|Pat is protected by Safe Attachments due to the **Built-in protection** preset security policy that applies to all recipients who aren't otherwise defined in Safe Attachments policies.|
+|Lee's organization has a Safe Attachments policy that applies only to finance employees. Lee is a member of the sales department.|Lee and the rest of the sales department are protected by Safe Attachments due to the **Built-in protection** preset security policy that applies to all recipients who aren't otherwise defined in Safe Attachments policies.|
|Yesterday, an admin in Jean's organization created a Safe Attachments policy that applies to all employees. Earlier today, Jean received an email message that included an attachment.|Jean is protected by Safe Attachments due to that custom Safe Attachments policy. <br/><br/> Typically, it takes about 30 minutes for a new policy to take effect.| |Chris's organization has long-standing Safe Attachments policies for everyone in the organization. Chris receives an email that has an attachment, and then forwards the message to external recipients.|Chris is protected by Safe Attachments. <br/><br/> If the external recipients are in a Microsoft 365 organization, then the forwarded messages are also protected by Safe Attachments.|
This section describes the settings in Safe Attachments policies:
|**Off**|Attachments aren't scanned for malware by Safe Attachments. Messages are still scanned for malware by [anti-malware protection in EOP](anti-malware-protection-about.md).|Turn scanning off for selected recipients. <br/><br/> Prevent unnecessary delays in routing internal mail. <br/><br/> **This option is not recommended for most users. You should only use this option to turn off Safe Attachments scanning for recipients who only receive messages from trusted senders. ZAP will not quarantine messages if Safe Attachments is turned off and a malware signal is not received. For details, see [Zero-hour auto purge](zero-hour-auto-purge.md)**| |**Monitor**|Delivers messages with attachments and then tracks what happens with detected malware. <br/><br/> Delivery of safe messages might be delayed due to Safe Attachments scanning.|See where detected malware goes in your organization.| |**Block**|Prevents messages with detected malware attachments from being delivered. <br/><br/> Messages are quarantined. By default, only admins (not users) can review, release, or delete the messages.┬╣ <br/><br/> Automatically blocks future instances of the messages and attachments. <br/><br/> Delivery of safe messages might be delayed due to Safe Attachments scanning.|Protects your organization from repeated attacks using the same malware attachments. <br/><br/> This is the default value, and the recommended value in Standard and Strict [preset security policies](preset-security-policies.md).|
- |**Replace**|**Note**: This action will be deprecated. For more information, see [MC424901](https://admin.microsoft.com/AdminPortal/Home#/MessageCenter/:/messages/MC424901). <br/><br/> Removes detected malware attachments. <br/><br/> Notifies recipients that attachments have been removed. <br/><br/> Messages that contain malicious attachments are quarantined. By default, only admins (not users) can review, release, or delete the messages.┬╣ <br/><br/> Delivery of safe messages might be delayed due to Safe Attachments scanning.|Raise visibility to recipients that attachments were removed because of detected malware.|
|**Dynamic Delivery**|Delivers messages immediately, but replaces attachments with placeholders until Safe Attachments scanning is complete. <br/><br/> Messages that contain malicious attachments are quarantined. By default, only admins (not users) can review, release, or delete the messages.┬╣ <br/><br/> For details, see the [Dynamic Delivery in Safe Attachments policies](#dynamic-delivery-in-safe-attachments-policies) section later in this article.|Avoid message delays while protecting recipients from malicious files.| ┬╣ Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy). Users can't release their own messages that were quarantined as malware by Safe Attachments, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages. -- **Redirect messages with detected attachments**: **Enable redirect** and **Send messages that contain blocked, monitored, or replaced attachments to the specified email address**: For **Block**, **Monitor**, or **Replace** actions, send messages that contain malware attachments to the specified internal or external email address for analysis and investigation.
+- **Redirect messages with detected attachments**: **Enable redirect** and **Send messages that contain blocked, monitored, or replaced attachments to the specified email address**: For **Block** or **Monitor** actions, send messages that contain malware attachments to the specified internal or external email address for analysis and investigation.
The recommendation for Standard and Strict policy settings is to enable redirection. For more information, see [Safe Attachments settings](recommended-settings-for-eop-and-office365.md#safe-attachments-settings).
security Safe Attachments For Spo Odfb Teams Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-configure.md
You can create an alert policy that notifies admins when Safe Attachments for Sh
3. On the **Name your alert, categorize it, and choose a severity** page, configure the following settings: - **Name**: Type a unique and descriptive name. For example, **Malicious Files in Libraries**. - **Description**: Type an optional description. For example, **Notifies admins when malicious files are detected in SharePoint Online, OneDrive, or Microsoft Teams**.
- - **Severity**: Select **Low**, **Medium**, or **High** from the drop down list.
- - **Category**: Select **Threat management** from the drop down list.
+ - **Severity**: Select **Low**, **Medium**, or **High** from the dropdown list.
+ - **Category**: Select **Threat management** from the dropdown list.
When you're finished on the **Name your alert, categorize it, and choose a severity** page, select **Next**. 4. On the **Choose an activity, conditions and when to trigger the alert** page, configure the following settings:
- - **What do you want to alert on?** section \> **Activity is** \> **Common user activities** section \> Select **Detected malware in file** from the drop down list.
+ - **What do you want to alert on?** section \> **Activity is** \> **Common user activities** section \> Select **Detected malware in file** from the dropdown list.
- **How do you want the alert to be triggered?** section: Select **Every time an activity matches the rule**. When you're finished on the **Choose an activity, conditions and when to trigger the alert** page, select **Next**.
security Safe Attachments Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-policies-configure.md
You configure Safe Attachments policies in the Microsoft 365 Defender portal or
4. On the **Users and domains** page, identify the internal recipients that the policy applies to (recipient conditions): - **Users**: The specified mailboxes, mail users, or mail contacts. - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups are not supported).
+ - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- The specified Microsoft 365 Groups. - **Domains**: All recipients in the specified [accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) in your organization.
You configure Safe Attachments policies in the Microsoft 365 Defender portal or
- **Off** - **Monitor** - **Block**: This is the default value, and the recommended value in Standard and Strict [preset security policies](preset-security-policies.md).
- - **Replace**: This action will be deprecated. For more information, see [MC424901](https://admin.microsoft.com/AdminPortal/Home#/MessageCenter/:/messages/MC424901).
- **Dynamic Delivery (Preview messages)** These values are explained in [Safe Attachments policy settings](safe-attachments-about.md#safe-attachments-policy-settings).
- - **Quarantine policy**: Select the quarantine policy that applies to messages that are quarantined by Safe Attachments (**Block**, **Replace**, or **Dynamic Delivery**). Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
+ - **Quarantine policy**: Select the quarantine policy that applies to messages that are quarantined by Safe Attachments (**Block** or **Dynamic Delivery**). Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
By default, the quarantine policy named AdminOnlyAccessPolicy is used for malware detections by Safe Attachments policies. For more information about this quarantine policy, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to
2. On the **Safe Attachments** page, select the Safe Attachments policy by using either of the following methods:
- - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** drop down list that appears:
+ - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
- **Enable selected policies**. - **Disable selected policies**. - **Delete selected policies**.
In PowerShell, the difference between safe attachment policies and safe attachme
- In PowerShell, you create the safe attachment policy first, then you create the safe attachment rule, which identifies the associated policy that the rule applies to. - In PowerShell, you modify the settings in the safe attachment policy and the safe attachment rule separately.-- When you remove an safe attachment policy from PowerShell, the corresponding safe attachment rule isn't automatically removed, and vice versa.
+- When you remove a safe attachment policy from PowerShell, the corresponding safe attachment rule isn't automatically removed, and vice versa.
### Use PowerShell to create Safe Attachments policies
security Safe Documents In E5 Plus Security About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-documents-in-e5-plus-security-about.md
appliesto:
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
-Safe Documents is a premium feature that uses the cloud back end of [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) to scan opened Office documents in [Protected View](https://support.microsoft.com/office/d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653) or [Application Guard for Office](https://support.microsoft.com/topic/9e0fb9c2-ffad-43bf-8ba3-78f785fdba46).
+Safe Documents is a premium feature that uses the cloud back end of [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint) to scan opened Office documents in [Protected View](https://support.microsoft.com/office/d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653) or [Application Guard for Office](https://support.microsoft.com/topic/9e0fb9c2-ffad-43bf-8ba3-78f785fdba46).
Users don't need Defender for Endpoint installed on their local devices to get Safe Documents protection. Users get Safe Documents protection if all of the following requirements are met:
security Safe Links Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-policies-configure.md
In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to
2. On the **Safe Links** page, select the Safe Links policy by using either of the following methods:
- - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** drop down list that appears:
+ - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
- **Enable selected policies**. - **Disable selected policies**. - **Delete selected policies**.
security Scc Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/scc-permissions.md
- seo-marvel-apr2020 Previously updated : 02/27/2023 Last updated : 6/23/2023 # Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview compliance
The [Microsoft 365 Defender portal](/microsoft-365/security/defender/microsoft-3
- [Email & collaboration permissions in the Microsoft 365 Defender portal](/microsoft-365/security/office-365-security/mdo-portal-permissions) - [Microsoft Purview solutions permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/microsoft-365-compliance-center-permissions)
-These portals let you grant permissions to people who perform tasks like device management, data loss prevention, eDiscovery, retention, and so on. These people can perform only the tasks that you explicitly grant them access to. To access these portals, users need to be a global admin or a member of one or more Defender for Office 365 (Email & collaboration) or Purview compliance groups.
+These portals let you grant permissions to people who perform tasks like device management, data loss prevention, eDiscovery, retention, and so on. These people can perform only the tasks that you explicitly grant them access to. To access these portals, users need to be a global admin or a member of one or more role groups in Defender for Office 365 (**Email & collaboration** role groups) or Purview compliance (**Microsoft Purview solutions** role groups).
-Permissions in these portals are based on the role-based access control (RBAC) permissions model. RBAC is the same permissions model that's used by Exchange, so if you're familiar with Exchange Online, granting permissions in these portals will be very similar. But, It's important to remember that role groups in Exchange Online and role groups for Defender for Office 365 or Purview compliance don't share membership or permissions. For example, while an Organization Management role group exists in Exchange Online, the permissions granted and role group members are different than the Organization Management role group in Defender for Office 365 and Purview compliance.
+Permissions in these portals are based on the role-based access control (RBAC) permissions model. RBAC is the same permissions model that's used by Exchange, so if you're familiar with Exchange Online, granting permissions in these portals is very similar. But, It's important to remember that role groups in Exchange Online and role groups for Defender for Office 365 or Purview compliance don't share membership or permissions. For example, while an Organization Management role group exists in Exchange Online, the permissions granted and role group members are different than the Organization Management role group in Defender for Office 365 and Purview compliance.
This article contains the inventory of Defender for Office 365 and Purview compliance roles and role groups.
This article contains the inventory of Defender for Office 365 and Purview compl
## Role groups in Microsoft Defender for Office 365 and Microsoft Purview compliance
-The table in this section lists the default role groups that are available in the Microsoft 365 Defender and Microsoft Purview compliance portals, and the roles that are assigned to the role groups by default. To grant permissions to a user to perform taks in Defender for Office 365 or Purview compliance, add them to the appropriate role group.
+The table in this section lists the default role groups that are available in the Microsoft 365 Defender portal and the Microsoft Purview compliance portal, and the roles that are assigned to the role groups by default. To grant permissions to a user to perform tasks in Defender for Office 365 or Purview compliance, add them to the appropriate role group.
Managing permissions in Defender for Office 365 or Purview compliance gives users access to security and compliance features that are available within their respective portals. To grant permissions to other features, such as Exchange mail flow rules (also known as transport rules), you need to grant permissions in Exchange Online. For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
Managing permissions in Defender for Office 365 or Purview compliance gives user
|**Content Explorer Content Viewer**|View the contents files in Content explorer.|Data Classification Content Viewer| |**Content Explorer List Viewer**|View all items in Content explorer in list format only.|Data Classification List Viewer| |**Data Investigator**|Perform searches on mailboxes, SharePoint Online sites, and OneDrive for Business locations.|Communication <br/><br/> Compliance Search <br/><br/> Custodian <br/><br/> Data Investigation Management <br/><br/> Export <br/><br/> Preview <br/><br/> Review <br/><br/> RMS Decrypt <br/><br/> Search And Purge|
-|**eDiscovery Manager**|Members can perform searches and place holds on mailboxes, SharePoint Online sites, and OneDrive for Business locations. Members can also create and manage eDiscovery cases, add and remove members to a case, create and edit Content Searches associated with a case, and access case data in eDiscovery (Premium). <br/><br/> An eDiscovery Administrator is a member of the eDiscovery Manager role group who has been assigned additional permissions. In addition to the tasks that an eDiscovery Manager can perform, an eDiscovery Administrator can:<ul><li>View all eDiscovery cases in the organization.</li><li>Manage any eDiscovery case after they add themselves as a member of the case.</li></ul> <br/><br/> The primary difference between an eDiscovery Manager and an eDiscovery Administrator is that an eDiscovery Administrator can access all cases that are listed on the **eDiscovery cases** page in the compliance portal. An eDiscovery manager can only access the cases they created or cases they are a member of. For more information about making a user an eDiscovery Administrator, see [Assign eDiscovery permissions in the compliance portal](../../compliance/assign-ediscovery-permissions.md).|Case Management <br/><br/> Communication <br/><br/> Compliance Search <br/><br/> Custodian <br/><br/> Export <br/><br/> Hold <br/><br/> Manage Review Set Tags <br/><br/> Preview <br/><br/> Review <br/><br/> RMS Decrypt <br/><br/> Scope Manager|
+|**eDiscovery Manager**|Members can perform searches and place holds on mailboxes, SharePoint Online sites, and OneDrive for Business locations. Members can also create and manage eDiscovery cases, add and remove members to a case, create and edit Content Searches associated with a case, and access case data in eDiscovery (Premium). <br/><br/> An eDiscovery Administrator is a member of the eDiscovery Manager role group who has been assigned additional permissions. In addition to the tasks that an eDiscovery Manager can perform, an eDiscovery Administrator can:<ul><li>View all eDiscovery cases in the organization.</li><li>Manage any eDiscovery case after they add themselves as a member of the case.</li></ul> <br/><br/> The primary difference between an eDiscovery Manager and an eDiscovery Administrator is that an eDiscovery Administrator can access all cases that are listed on the **eDiscovery cases** page in the compliance portal. An eDiscovery manager can only access the cases they created or cases they're a member of. For more information about making a user an eDiscovery Administrator, see [Assign eDiscovery permissions in the compliance portal](../../compliance/assign-ediscovery-permissions.md).|Case Management <br/><br/> Communication <br/><br/> Compliance Search <br/><br/> Custodian <br/><br/> Export <br/><br/> Hold <br/><br/> Manage Review Set Tags <br/><br/> Preview <br/><br/> Review <br/><br/> RMS Decrypt <br/><br/> Scope Manager|
|**Global Reader**|Members have read-only access to reports, alerts, and can see all the configuration and settings. <br/><br/> The primary difference between Global Reader and Security Reader is that a Global Reader can access **configuration and settings**.|Compliance Manager Reader <br/><br/> Security Reader <br/><br/> Sensitivity Label Reader <br/><br/> Service Assurance View <br/><br/> View-Only Audit Logs <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management| |**Information Protection**|Full control over all information protection features, including sensitivity labels and their policies, DLP, all classifier types, activity and content explorers, and all related reports.|Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Information Protection Admin <br/><br/> Information Protection Analyst <br/><br/> Information Protection Investigator <br/><br/> Information Protection Reader| |**Information Protection Admins**|Create, edit, and delete DLP policies, sensitivity labels and their policies, and all classifier types. Manage endpoint DLP settings and simulation mode for auto-labeling policies.|Information Protection Admin| |**Information Protection Analysts**|Access and manage DLP alerts and activity explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Data Classification List Viewer <br/><br/> Information Protection Analyst| |**Information Protection Investigators**|Access and manage DLP alerts, activity explorer, and content explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Information Protection Analyst <br/><br/> Information Protection Investigator| |**Information Protection Readers**|View-only access to reports for DLP policies and sensitivity labels and their policies.|Information Protection Reader|
-|**Insider Risk Management**|Use this role group to manage insider risk management for your organization in a single group. By adding all user accounts for designated administrators, analysts, and investigators, you can configure insider risk management permissions in a single group. This role group contains all the insider risk management permission roles. This is the easiest way to quickly get started with insider risk management and is a good fit for organizations that do not need separate permissions defined for separate groups of users.|Case Management <br/><br/> Data Connector Admin <br/><br/> Insider Risk Management Admin <br/><br/> Insider Risk Management Analysis <br/><br/> Insider Risk Management Approval <br/><br/> Insider Risk Management Audit <br/><br/> Insider Risk Management Investigation <br/><br/> Insider Risk Management Sessions <br/><br/> Review <br/><br/> View-Only Case|
+|**Insider Risk Management**|Use this role group to manage insider risk management for your organization in a single group. By adding all user accounts for designated administrators, analysts, and investigators, you can configure insider risk management permissions in a single group. This role group contains all the insider risk management permission roles. This role group is the easiest way to quickly get started with insider risk management and is a good fit for organizations that don't need separate permissions defined for separate groups of users.|Case Management <br/><br/> Data Connector Admin <br/><br/> Insider Risk Management Admin <br/><br/> Insider Risk Management Analysis <br/><br/> Insider Risk Management Approval <br/><br/> Insider Risk Management Audit <br/><br/> Insider Risk Management Investigation <br/><br/> Insider Risk Management Sessions <br/><br/> Review <br/><br/> View-Only Case|
|**Insider Risk Management Admins**|Use this role group to initially configure insider risk management and later to segregate insider risk administrators into a defined group. Users in this role group can create, read, update, and delete insider risk management policies, global settings, and role group assignments.|Case Management <br/><br/> Custodian <br/><br/> Data Connector Admin <br/><br/> Insider Risk Management Admin <br/><br/> View-Only Case|
-|**Insider Risk Management Analysts**|Use this group to assign permissions to users that will act as insider risk case analysts. Users in this role group can access all insider risk management alerts, cases, and notices templates. They cannot access the insider risk Content Explorer.|Case Management <br/><br/> Insider Risk Management Analysis <br/><br/> View-Only Case|
+|**Insider Risk Management Analysts**|Use this group to assign permissions to users that act as insider risk case analysts. Users in this role group can access all insider risk management alerts, cases, and notices templates. They can't access the insider risk Content Explorer.|Case Management <br/><br/> Insider Risk Management Analysis <br/><br/> View-Only Case|
|**Insider Risk Management Approvers**|For internal approval use only.|Insider Risk Management Approval|
-|**Insider Risk Management Auditors**|Use this group to assign permissions to users that will audit insider risk management activities. Users in this role group can access the insider risk audit log.|Insider Risk Management Audit|
-|**Insider Risk Management Investigators**|Use this group to assign permissions to users that will act as insider risk data investigators. Users in this role group can access all insider risk management alerts, cases, notices templates, and the Content Explorer for all cases.|Case Management <br/><br/> Custodian <br/><br/> Insider Risk Management Investigation <br/><br/> Review <br/><br/> View-Only Case|
+|**Insider Risk Management Auditors**|Use this group to assign permissions to users that audit insider risk management activities. Users in this role group can access the insider risk audit log.|Insider Risk Management Audit|
+|**Insider Risk Management Investigators**|Use this group to assign permissions to users that act as insider risk data investigators. Users in this role group can access all insider risk management alerts, cases, notices templates, and the Content Explorer for all cases.|Case Management <br/><br/> Custodian <br/><br/> Insider Risk Management Investigation <br/><br/> Review <br/><br/> View-Only Case|
|**Insider Risk Management Session Approvers**|For internal approval use only.|Insider Risk Management Sessions| |**IRM Contributors**|This role group is visible, but is used by background services only.|Insider Risk Management Permanent contribution <br/><br/> Insider Risk Management Temporary contribution| |**Knowledge Administrators**|Configure knowledge, learning, assign trainings and other intelligent features.|Knowledge Admin|
-|**MailFlow Administrator**|Members can monitor and view mail flow insights and reports in the Defender portal. Global admins can add ordinary users to this group, but, if the user isn't a member of the Exchange Admin group, the user will not have access to Exchange admin-related tasks.|View-Only Recipients|
-|**Organization Management**<sup>1</sup>|Members can control permissions for accessing features in these portals, and also manage settings for device management, data loss prevention, reports, and preservation. <br/><br/> Users who are not global administrators must be Exchange administrators to see and take action on devices that are managed by Basic Mobility and Security for Microsoft 365 (formerly known as Mobile Device Management or MDM). <br/><br/> Global admins are automatically added as members of this role group, but you won't see them in the output of the [Get-RoleGroupMember](/powershell/module/exchange/get-rolegroupmember) cmdlet in [Security & Compliance PowerShell](/powershell/module/exchange/get-rolegroupmember).|Audit Logs <br/><br/> Case Management <br/><br/> Communication Compliance Admin <br/><br/> Communication Compliance Case Management <br/><br/> Compliance Administrator <br/><br/> Compliance Manager Administration <br/><br/> Compliance Search <br/><br/> Data Connector Admin <br/><br/> Device Management <br/><br/> DLP Compliance Management <br/><br/> Hold <br/><br/> IB Compliance Management <br/><br/> Insider Risk Management Admin <br/><br/> Manage Alerts <br/><br/> Organization Configuration <br/><br/> Quarantine <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Role Management <br/><br/> Scope Manager <br/><br/> Search And Purge <br/><br/> Security Administrator <br/><br/> Security Reader <br/><br/> Sensitivity Label Administrator <br/><br/> Sensitivity Label Reader <br/><br/> Service Assurance View <br/><br/> Tag Manager <br/><br/> Tag Reader <br/><br/> View-Only Audit Logs <br/><br/> View-Only Case <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management|
+|**MailFlow Administrator**|Members can monitor and view mail flow insights and reports in the Defender portal. Global admins can add ordinary users to this group, but, if the user isn't a member of the Exchange Admin group, the user doesn't have access to Exchange admin-related tasks.|View-Only Recipients|
+|**Organization Management**<sup>1</sup>|Members can control permissions for accessing features in these portals, and also manage settings for device management, data loss prevention, reports, and preservation. <br/><br/> Users who aren't global administrators must be Exchange administrators to see and take action on devices that are managed by Basic Mobility and Security for Microsoft 365 (formerly known as Mobile Device Management or MDM). <br/><br/> Global admins are automatically added as members of this role group, but you don't see them in the output of the [Get-RoleGroupMember](/powershell/module/exchange/get-rolegroupmember) cmdlet in [Security & Compliance PowerShell](/powershell/module/exchange/get-rolegroupmember).|Audit Logs <br/><br/> Case Management <br/><br/> Communication Compliance Admin <br/><br/> Communication Compliance Case Management <br/><br/> Compliance Administrator <br/><br/> Compliance Manager Administration <br/><br/> Compliance Search <br/><br/> Data Connector Admin <br/><br/> Device Management <br/><br/> DLP Compliance Management <br/><br/> Hold <br/><br/> IB Compliance Management <br/><br/> Insider Risk Management Admin <br/><br/> Manage Alerts <br/><br/> Organization Configuration <br/><br/> Quarantine <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Role Management <br/><br/> Scope Manager <br/><br/> Search And Purge <br/><br/> Security Administrator <br/><br/> Security Reader <br/><br/> Sensitivity Label Administrator <br/><br/> Sensitivity Label Reader <br/><br/> Service Assurance View <br/><br/> Tag Manager <br/><br/> Tag Reader <br/><br/> View-Only Audit Logs <br/><br/> View-Only Case <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management|
|**Privacy Management**|Manage access control for Priva in the Microsoft Purview compliance portal.|Case Management <br/><br/> Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Admin <br/><br/> Privacy Management Analysis <br/><br/> Privacy Management Investigation <br/><br/> Privacy Management Permanent contribution <br/><br/> Privacy Management Temporary contribution <br/><br/> Privacy Management Viewer <br/><br/> Subject Rights Request Admin <br/><br/> View-Only Case| |**Privacy Management Administrators**|Administrators of privacy management solution that can create/edit policies and define global settings.|Case Management <br/><br/> Privacy Management Admin <br/><br/> View-Only Case| |**Privacy Management Analysts**|Analysts of privacy management solution that can investigate policy matches, view messages meta data, and take remediation actions.|Case Management <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Analysis <br/><br/> View-Only Case|
Managing permissions in Defender for Office 365 or Purview compliance gives user
|**Quarantine Administrator**|Members can access all Quarantine actions. For more information, see [Manage quarantined messages and files as an admin in EOP](quarantine-admin-manage-messages-files.md)|Quarantine| |**Records Management**|Members can configure all aspects of records management, including retention labels and disposition reviews.|Disposition Management <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Scope Manager| |**Reviewer**|Members can access review sets in [eDiscovery (Premium)](../../compliance/overview-ediscovery-20.md) cases. Members of this role group can see and open the list of cases on the **eDiscovery \> Advanced** page in the Microsoft Purview compliance portal that they're members of. After the user accesses an eDiscovery (Premium) case, they can select **Review sets** to access case data. This role doesn't allow the user to preview the results of a collection search that's associated with the case or do other search or case management tasks. Members of this role group can only access the data in a review set.|Review|
-|**Security Administrator**|Members have access to a number of security features of Identity Protection Center, Privileged Identity Management, Monitor Microsoft 365 Service Health, and the Defender and compliance portals. <br/><br/> By default, this role group may not appear to have any members. However, the Security Administrator role from Azure Active Directory is assigned to this role group. Therefore, this role group inherits the capabilities and membership of the Security Administrator role from Azure Active Directory. <br/><br/> To manage permissions centrally, add and remove group members in the Azure Active Directory admin center. For more information, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference). If you edit this role group in these portals (membership or roles), those changes apply only to the security and compliance areas and not to any other services. <br/><br/> This role group includes all of the read-only permissions of the Security reader role, plus a number of additional administrative permissions for the same
+|**Security Administrator**|Members have access to many security features of Identity Protection Center, Privileged Identity Management, Monitor Microsoft 365 Service Health, and the Defender and compliance portals. <br/><br/> By default, this role group may not appear to have any members. However, the Security Administrator role from Azure Active Directory is assigned to this role group. Therefore, this role group inherits the capabilities and membership of the Security Administrator role from Azure Active Directory. <br/><br/> To manage permissions centrally, add and remove group members in the Azure Active Directory admin center. For more information, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference). If you edit this role group in these portals (membership or roles), those changes apply only to the security and compliance areas and not to any other services. <br/><br/> This role group includes all of the read-only permissions of the Security reader role, plus many additional administrative permissions for the same
|**Security Operator**|Members can manage security alerts, and also view reports and settings of security features.|Compliance Search <br/><br/> Manage Alerts <br/><br/> Security Reader <br/><br/> Tag Reader <br/><br/> Tenant AllowBlockList Manager <br/><br/> View-Only Audit Logs <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts|
-|**Security Reader**|Members have read-only access to a number of security features of Identity Protection Center, Privileged Identity Management, Monitor Microsoft 365 Service Health, and the Defender and compliance portals. <br/><br/> By default, this role group may not appear to have any members. However, the Security Reader role from Azure Active Directory is assigned to this role group. Therefore, this role group inherits the capabilities and membership of the Security Reader role from Azure Active Directory. <br/><br/> To manage permissions centrally, add and remove group members in the Azure Active Directory admin center. For more information, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference). If you edit this role group in the portals (membership or roles), those changes apply only to security and compliance areas and not to any other services.|Compliance Manager Reader <br/><br/> Security Reader <br/><br/> Sensitivity Label Reader <br/><br/> Tag Reader <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts|
+|**Security Reader**|Members have read-only access to many security features of Identity Protection Center, Privileged Identity Management, Monitor Microsoft 365 Service Health, and the Defender and compliance portals. <br/><br/> By default, this role group may not appear to have any members. However, the Security Reader role from Azure Active Directory is assigned to this role group. Therefore, this role group inherits the capabilities and membership of the Security Reader role from Azure Active Directory. <br/><br/> To manage permissions centrally, add and remove group members in the Azure Active Directory admin center. For more information, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference). If you edit this role group in the portals (membership or roles), those changes apply only to security and compliance areas and not to any other services.|Compliance Manager Reader <br/><br/> Security Reader <br/><br/> Sensitivity Label Reader <br/><br/> Tag Reader <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts|
|**Service Assurance User**|Members can access the Service assurance section in the compliance portal. Service assurance provides reports and documents that describe Microsoft's security practices for customer data that's stored in Microsoft 365. It also provides independent third-party audit reports on Microsoft 365. For more information, see [Service assurance in the compliance portal](../../compliance/service-assurance.md).|Service Assurance View| |**Subject Rights Request Administrators**|Create subject rights requests.|Case Management <br/><br/> Subject Rights Request Admin <br/><br/> View-Only Case| |**Subject Rights Request Approvers**|Approvers who are able to approve subject rights requests.|Subject Rights Request Approver|
The following roles aren't assigned to the Organization Management role group by
|**Attack Simulator Payload Author**|Don't use this role in the portals. Use the corresponding role in Azure AD.|Attack Payload Author| |**Audit Logs**|Turn on and configure auditing for the organization, view the organization's audit reports, and then export these reports to a file.|Organization Management <br/><br/> Security Administrator| |**Case Management**|Create, edit, delete, and control access to eDiscovery cases.|Communication Compliance <br/><br/> Communication Compliance Investigators <br/><br/> Compliance Administrator <br/><br/> eDiscovery Manager <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Admins <br/><br/> Insider Risk Management Analysts <br/><br/> Insider Risk Management Investigators <br/><br/> Organization Management <br/><br/> Privacy Management <br/><br/> Privacy Management Administrators <br/><br/> Privacy Management Analysts <br/><br/> Privacy Management Investigators <br/><br/> Subject Rights Request Administrators|
-|**Communication**|Manage all communications with the custodians identified in an eDiscovery (Premium) case. Create hold notifications, hold reminders, and escalations to management. Track custodian acknowledgment of hold notifications and manage access to the custodian portal that is used by each custodian in a case to track communications for the cases where they were identified as a custodian.|Data Investigator <br/><br/> eDiscovery Manager|
+|**Communication**|Manage all communications with the custodians identified in an eDiscovery (Premium) case. Create hold notifications, hold reminders, and escalations to management. Track custodian acknowledgment of hold notifications and manage access to the custodian portal that's used by each custodian in a case to track communications for the cases where they were identified as a custodian.|Data Investigator <br/><br/> eDiscovery Manager|
|**Communication Compliance Admin**|Used to manage policies in the Communication Compliance feature.|Communication Compliance <br/><br/> Communication Compliance Administrators <br/><br/> Compliance Administrator <br/><br/> Organization Management| |**Communication Compliance Analysis**|Used to perform investigation, remediation of the message violations in the Communication Compliance feature. Can only view message meta data.|Communication Compliance <br/><br/> Communication Compliance Analysts <br/><br/> Communication Compliance Investigators| |**Communication Compliance Case Management**|Used to access Communication Compliance cases.|Communication Compliance <br/><br/> Communication Compliance Administrators <br/><br/> Communication Compliance Analysts <br/><br/> Communication Compliance Investigators <br/><br/> Communication Compliance Viewers <br/><br/> Compliance Administrator <br/><br/> Organization Management|
The following roles aren't assigned to the Organization Management role group by
|**Data Connector Admin**|Create and manage connectors to import and archive non-Microsoft data in Microsoft 365.|Communication Compliance <br/><br/> Communication Compliance Administrators <br/><br/> Compliance Administrator <br/><br/> Compliance Manager Administrators <br/><br/> Compliance Manager Assessors <br/><br/> Compliance Manager Contributors <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Admins <br/><br/> Organization Management| |**Data Investigation Management**|Create, edit, delete, and control access to data investigation.|Compliance Administrator <br/><br/> Data Investigator| |**Device Management**|View and edit settings and reports for device management features.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator|
-|**Disposition Management**|Control permissions for accessing Manual Disposition in the the Defender and compliance portals.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Records Management|
+|**Disposition Management**|Control permissions for accessing Manual Disposition in the Defender and compliance portals.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Records Management|
|**DLP Compliance Management**|View and edit settings and reports for data loss prevention (DLP) policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator| |**Export**|Export mailbox and site content that's returned from searches.|Data Investigator <br/><br/> eDiscovery Manager|
-|**Hold**|Place content in mailboxes, sites, and public folders on hold. When on hold, a copy of the content is stored in a secure location. Content owners will still be able to modify or delete the original content.|Compliance Administrator <br/><br/> eDiscovery Manager <br/><br/> Organization Management|
+|**Hold**|Place content in mailboxes, sites, and public folders on hold. When on hold, a copy of the content is stored in a secure location. Content owners are still able to modify or delete the original content.|Compliance Administrator <br/><br/> eDiscovery Manager <br/><br/> Organization Management|
|**IB Compliance Management**|View, create, remove, modify, and test Information Barrier policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator| |**Information Protection Admin**|Create, edit, and delete DLP policies, sensitivity labels and their policies, and all classifier types. Manage endpoint DLP settings and simulation mode for auto-labeling policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Information Protection <br/><br/> Information Protection Admins| |**Information Protection Analyst**|Access and manage DLP alerts and activity explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Information Protection <br/><br/> Information Protection Analysts <br/><br/> Information Protection Investigators|
security Sending Mail To Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/sending-mail-to-office-365.md
description: Learn as a guest sender, how can you increase the ability to deliver email to users in Microsoft 365. Also learn how to report junk email & phishing attempts as a guest. Previously updated : 1/31/2023 Last updated : 6/23/2023 # Sending mail to Microsoft 365
-These articles help external senders improve their reputation and increase their ability to deliver email to users at Microsoft 365. They also provide some information about how you can report junk email and phishing attempts even if you aren't a Microsoft 365 user yourself.
+The links in this article can help external senders improve their reputation and increase their ability to deliver email to users in Microsoft 365. They also provide information about how you can report junk email and phishing attempts, even if you aren't a Microsoft 365 customer.
-If you're not a customer, but are trying to send mail to someone in who is, you're in the right place. If you're an admin and you need help with fighting spam, this isn't the right section for you. Instead, go to [anti-spam](anti-spam-protection-about.md) and [anti-malware](anti-malware-protection-about.md).
+If you're not a Microsoft 365 customer, and you're trying to send email to Microsoft 365, this article is for you. If you're an admin in Microsoft 365 and you need help with fighting spam, this article isn't for you. Instead, see [anti-spam](anti-spam-protection-about.md) and [anti-malware](anti-malware-protection-about.md).
|For information about...|See...| |||
-|Services provided to email system admins that are sending individual and bulk email to customers.|[Services for non-customers sending mail to Office 365](services-for-non-customers.md)|
+|Services provided to email admins sending mail (including bulk mail) to Microsoft 365.|[Services for non-customers sending mail to Office 365](services-for-non-customers.md)|
|How to fix problems reaching customers at Microsoft 365 through email. Best practices for sending bulk mail to Microsoft 365 recipients.|[Troubleshooting mail sent to Office 365](mail-flow-troubleshooting.md)|
-|How Microsoft 365 prevents junk email, including phishing and spoofing email, from being sent to our customers.|[Anti-spam protection in Microsoft 365](anti-spam-protection-about.md)|
-|How you, an admin sending email to Microsoft 365 customers, can avoid having email blocked by adhering to our anti-spam policies. This is the legal stuff you need to know.|[Reference: Policies, practices, and guidelines](reference-policies-practices-and-guidelines.md)|
+|How Microsoft 365 prevents junk email (including phishing and spoofing) from being sent to our customers.|[Anti-spam protection in Microsoft 365](anti-spam-protection-about.md)|
+|How external organizations can avoid having email blocked by adhering to our anti-spam policies. This article contains legal stuff that you need to know.|[Reference: Policies, practices, and guidelines](reference-policies-practices-and-guidelines.md)|
security Services For Non Customers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/services-for-non-customers.md
Title: Services for non-customers sending mail to Microsoft 365
+ Title: Services for external organizations sending mail to Microsoft 365
f1.keywords: - NOCSH
description: To help maintain user trust in the use of email, Microsoft has put in place various policies and technologies to help protect our users. Previously updated : 1/31/2023 Last updated : 6/23/2023
-# Services for non-customers sending mail to Microsoft 365
+# Microsoft 365 services for external email senders
-Email abuse, junk email, and fraudulent emails (phishing) continue to burden the entire email ecosystem. To help maintain user trust in the use of email, Microsoft has put various policies and technologies in place to help protect our users. However, Microsoft understands that legitimate email shouldn't be negatively affected. Therefore, we've established a suite of services to help senders improve their ability to deliver email to Microsoft 365 users by proactively managing their sending reputation.
+Email abuse, junk email, and fraudulent email (phishing) continue to burden internet email. To help maintain trust in the use of email, Microsoft uses several features to help protect our users. However, we understand the importance of not affecting legitimate email. Therefore, we have a suite of services to help external senders proactively manage their sender reputation and improve their ability to deliver email to Microsoft 365 users.
-This overview provides information about benefits we provide to your organization even if you aren't a customer.
+This overview provides information about the benefits we provide to your organization, even if you aren't a Microsoft 365 customer.
## Sender solutions |Service|Benefits| |||
-|This online help content|Provides: <ul><li>A starting point for any questions related to delivering communications to EOP users.</li><li>Includes a simple online guide with our policies and requirements.</li><li>An overview of the junk email filters and authentication technologies employed by Microsoft.</li><ul>|
+|This article|Provides: <ul><li>A starting point for any questions related to delivering email to Microsoft 365 users.</li><li>Includes a simple online guide with our policies and requirements.</li><li>An overview of the junk email filters and authentication technologies employed by Microsoft.</li><ul>|
|[Microsoft support](#microsoft-support)|Provides self-help and escalation support for delivery issues.|
-|[Anti-Spam IP Delist Portal](#anti-spam-ip-delist-portal)|A tool to submit IP delist request. Before submitting this request, it's the sender's responsibility to ensure that any further mail originating from the IP in question isn't abusive or malicious.|
-|[Abuse and spam reporting for junk email originating from Exchange Online](#abuse-and-spam-reporting-for-junk-email-originating-from-exchange-online)|Keeps spam and other unwanted mail from being sent from Exchange Online and cluttering up the internet and your mail system.|
+|[Anti-Spam IP Delist Portal](#anti-spam-ip-delist-portal)|A tool to submit IP delist requests. Before submitting this request, it's the sender's responsibility to ensure that any further mail originating from the IP in question isn't abusive or malicious.|
+|[Abuse and spam reporting for junk email originating from Exchange Online](#abuse-and-spam-reporting-for-junk-email-originating-from-exchange-online)|Keeps spam and other unwanted mail from being sent from Microsoft 365.|
## Microsoft support Microsoft offers several support options for people having trouble sending mail to Microsoft 365 recipients. We recommend that you: -- Follow the instructions in any non-delivery report you receive.
+- Follow the instructions in any non-delivery report (also known as an NDR or bounce message) that you receive.
+- Check out the most common problems that external senders encounter in [Troubleshooting mail sent to Office 365](mail-flow-troubleshooting.md).
+- Use the delist portal at <https://sender.office.com> to submit a request to have your IP removed from the blocked senders list.
+- Check the [Microsoft community forums](https://community.office365.com/f/).
+- Ask the Microsoft 365 recipient to contact Microsoft Support and open a support ticket on your behalf. Typically, external senders can't open support tickets in Microsoft 365. But, there are legal reasons that might require Microsoft Support to communicate directly with owner of the blocked source IP address space.
-- Check out the most common problems that non-customers encounter in [Troubleshooting mail sent to Office 365](mail-flow-troubleshooting.md).--- Use the [Microsoft 365 delist portal](https://sender.office.com) to submit a request to have your IP removed from the blocked sender's list.--- Read the [Microsoft community forums](https://community.office365.com/f/).--- Contact the customer you're trying to email using another method and ask them to contact Microsoft Support and open a support ticket on your behalf. In some cases, for legal reasons, Microsoft Support must communicate directly with the sender who owns the IP space that is being blocked. However, non-customers typically can't open support tickets.-
- For more information about Microsoft Technical support for Office 365, see [Support](/office365/servicedescriptions/office-365-platform-service-description/support).
+ For more information about Microsoft Technical support for Microsoft 365, see [Support](/office365/servicedescriptions/office-365-platform-service-description/support).
## Anti-Spam IP Delist Portal
-This is a self-service portal you can use to remove yourself from the Microsoft 365 blocked senders list. Use this portal if you're getting an error message when you try to send an email to a recipient whose email address is in Microsoft 365 and you don't think you should be. For more information, see [Use the delist portal to remove yourself from the blocked senders list](use-the-delist-portal-to-remove-yourself-from-the-office-365-blocked-senders-lis.md).
+This self-service portal at <https://sender.office.com/> allows you to request your removal from the Microsoft 365 blocked senders list. Use the portal if you get errors sending messages to Microsoft 365 recipients. For more information, see [Use the delist portal to remove yourself from the blocked senders list](use-the-delist-portal-to-remove-yourself-from-the-office-365-blocked-senders-lis.md).
## Abuse and spam reporting for junk email originating from Exchange Online
-Sometimes Microsoft 365 is used by third parties to send junk email, in violation of our terms of use and policy. If you receive any junk email from Office 365, you can report these messages to Microsoft. For instructions, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md).
+Third parties occasionally violate our terms of use and use Microsoft 365 to send junk email. If you receive junk email from Microsoft 365 senders, you can report these messages to Microsoft. For instructions, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md).
security Skip Filtering Phishing Simulations Sec Ops Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes.md
description: Admins can learn how to use the advanced delivery policy in Exchange Online Protection (EOP) to identify messages that shouldn't be filtered in specific supported scenarios (third-party phishing simulations and messages delivered to security operations (SecOps) mailboxes. Previously updated : 6/20/2023 Last updated : 6/23/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 plan 1 and plan 2</a>
appliesto:
To keep your organization [secure by default](secure-by-default.md), Exchange Online Protection (EOP) doesn't allow safe lists or filtering bypass for messages that are identified as malware or high confidence phishing. But, there are specific scenarios that require the delivery of unfiltered messages. For example: -- **Third-party phishing simulations**: Simulated attacks can help you identify vulnerable users before a real attack impacts your organization.
+- **Third-party phishing simulations**: Simulated attacks can help you identify and train vulnerable users before a real attack impacts your organization.
- **Security operations (SecOps) mailboxes**: Dedicated mailboxes that are used by security teams to collect and analyze unfiltered messages (both good and bad).
-You use the _advanced delivery policy_ in Microsoft 365 to prevent inbound messages _in these specific scenarios_ from being filtered┬╣. The advanced delivery policy ensures that messages in these scenarios achieve the following results:
+Use the _advanced delivery policy_ in EOP to prevent inbound messages _in these specific scenarios_ from being filtered┬╣. The advanced delivery policy ensures that messages in these scenarios achieve the following results:
- Filters in EOP and Defender for Office 365 take no action on these messages.┬╣ - [Zero-hour Purge (ZAP)](zero-hour-auto-purge.md) for spam and phishing take no action on these messages┬▓. - [Default system alerts](/microsoft-365/compliance/alert-policies#default-alert-policies) aren't triggered for these scenarios. - [AIR and clustering in Defender for Office 365](air-about.md) ignores these messages. - Specifically for third-party phishing simulations:
- - [Admin submissions](submissions-admin.md) generates an automatic response saying that the message is part of a phishing simulation campaign and isn't a real threat. Alerts and AIR aren't triggered. The admin submissions experience shows these messages as a simulated threat.
+ - [Admin submission](submissions-admin.md) generates an automatic response saying that the message is part of a phishing simulation campaign and isn't a real threat. Alerts and AIR aren't triggered. The admin submissions experience shows these messages as a simulated threat.
- When a user reports a phishing simulation message using the [built-in Report button in Outlook on the web](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook-on-the-web) or the [Microsoft Report Message or Report Phishing add-ins](submissions-outlook-report-messages.md#use-the-report-message-and-report-phishing-add-ins-in-outlook), the system doesn't generate an alert, investigation, or incident. The links or files aren't detonated, but the message appears on the **User reported** tab of the **Submissions** page. - [Safe Links in Defender for Office 365](safe-links-about.md) doesn't block or detonate the specified URLs in these messages at time of click. URLs are still wrapped, but they aren't blocked. - [Safe Attachments in Defender for Office 365](safe-attachments-about.md) doesn't detonate attachments in these messages.
You use the _advanced delivery policy_ in Microsoft 365 to prevent inbound messa
┬▓ You can bypass ZAP for malware by creating an anti-malware policy for the SecOps mailbox where ZAP for malware is turned off. For instructions, see [Configure anti-malware policies in EOP](anti-malware-policies-configure.md).
-Messages that are identified by the advanced delivery policy aren't security threats, so the messages are marked with system overrides. Admin experiences show these messages as **Phishing simulation** or **SecOps mailbox** system overrides. Admins can filter and analyze on these system overrides in the following experiences:
+Messages that are identified by the advanced delivery policy aren't security threats, so the messages are marked with system overrides. Admin experiences show these messages as **Phishing simulation** or **SecOps mailbox** system overrides. Admins can use these values to filter and analyze messages in the following experiences:
- [Threat Explorer/Real-time detections in Defender for Office 365 plan 2](threat-explorer-about.md): Admin can filter on **System override source** and select either **Phishing simulation** or **SecOps Mailbox**. - The [Email entity Page in Threat Explorer/Real-time detections](mdo-email-entity-page.md): Admin can view a message that was allowed by organization policy by either **SecOps mailbox** or **Phishing simulation** under **Tenant override** in the **Override(s)** section.
Messages that are identified by the advanced delivery policy aren't security thr
## What do you need to know before you begin? -- You open the Microsoft 365 Defender portal at <https://security.microsoft.com>. To go directly to the **Advanced delivery** page, open <https://security.microsoft.com/advanceddelivery>.
+- You open the Microsoft 365 Defender portal at <https://security.microsoft.com>. To go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).
Back on the **SecOps mailbox** tab, the SecOps mailbox entries that you configur
## Use the Microsoft 365 Defender portal to configure third-party phishing simulations in the advanced delivery policy
+To configure a third-party phishing simulation, you need to provide the following information:
+
+- At least one **Domain**.
+- At least one **Sending IP**.
+- For **non-email** phishing simulations (for example, Microsoft Teams messages, Word documents, or Excel spreadsheets), you can optionally identify the **Simulation URLs to allow** that shouldn't be treated as real threats at time of click: the URLs aren't blocked or detonated, and no URL click alerts or resulting incidents are generated. The URLs are wrapped at time of click, but they aren't blocked.
+
+There must be a match on at least one **Domain** and one **Sending IP**, but no association between values is maintained.
+
+If your MX record doesn't point to Microsoft 365, the IP address in the `Authentication-results` header must match the IP address in the advanced delivery policy. If the IP addresses don't match, you might need to configure [Enhanced Filtering for Connectors](/Exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) so the correct IP address is detected.
+ > [!NOTE]
-> To configure a third-party phishing simulation, you need to provide the following information:
->
-> - At least one **Domain**.
-> - At least one **Sending IP**.
-> - For **non-email** phishing simulations (for example, Microsoft Teams messages, Word documents, or Excel spreadsheets), you can optionally identify the **Simulation URLs to allow** that shouldn't be treated as real threats at time of click: the URLs aren't blocked or detonated, and no URL click alerts or resulting incidents are generated. The URLs are wrapped at time of click, but they aren't blocked.
->
-> There must be a match on at least one **Domain** and one **Sending IP**, but no association between values is maintained.
+> If you're using the [Built-in protection preset security policy](preset-security-policies.md#profiles-in-preset-security-policies) or your custom Safe Links policies have the setting **Do not rewrite URLs, do checks via SafeLinks API only** enabled, time of click protection doesn't treat phishing simuation links in email as threats in Outlook on the web, Outlook for iOS and Android, Outlook for Windows v16.0.15317.10000 or later, and Outlook for Mac v16.74.23061100 or later. If you're using older versions of Outlook, consider disabling the **Do not rewrite URLs, do checks via SafeLinks API only** setting in custom Safe Links policies.
>
-> If your MX record doesn't point to Microsoft 365, the IP address in the `Authentication-results` header must match the IP address in the advanced delivery policy. If the IP addresses don't match, you might need to configure [Enhanced Filtering for Connectors](/Exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) so the correct IP address is detected.
+> By design, Safe Links sends a `HEAD` request to all URLs in the email message to determine what to do with the URL. Some phishing simulation vendors might show these `HEAD` requests as user clicks, so you might see two user clicks for a URL. This problem isn't an issue with Defender for Office 365. Ask your phishing simulation vendor to fix this problem by ignoring `HEAD` requests.
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
security Trial User Guide Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/trial-user-guide-defender-for-office-365.md
search.appverid:
description: "Microsoft Defender for Office 365 solutions trial user guide." Previously updated : 6/20/2023 Last updated : 6/23/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 plan 1 and plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft 365 Defender</a>
appliesto:
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
-Welcome to the Microsoft Defender for Office 365 trial user guide! This user guide will help you make the most of your free trial by teaching you how to safeguard your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
+Welcome to the Microsoft Defender for Office 365 trial user guide! This user guide helps you make the most of your free trial by teaching you how to safeguard your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
## What is Defender for Office 365?
-Defender for Office 365 helps organizations secure their enterprise by offering a comprehensive slate of capabilities including threat protection policies, reports, threat investigation and response capabilities and automated investigation and response capabilities.
+Defender for Office 365 helps organizations secure their enterprise by offering a comprehensive slate of capabilities, including threat protection policies, reports, threat investigation and response capabilities, and automated investigation and response capabilities.
:::image type="content" source="../../media/microsoft-defender-for-office-365.png" alt-text="Microsoft Defender for Office 365 conceptual diagram." lightbox="../../media/microsoft-defender-for-office-365.png":::
Do you want your Defender for Office 365 experience to be active or passive? The
- **Audit mode**: Special *evaluation policies* are created for anti-phishing (which includes impersonation protection), Safe Attachments, and Safe Links. These evaluation policies are configured to *detect* threats only. Defender for Office 365 detects harmful messages for reporting, but the messages aren't acted upon (for example, detected messages aren't quarantined). The settings of these evaluation policies are described in the [Policies in audit mode](try-microsoft-defender-for-office-365.md#policies-in-audit-mode) section later in this article.
- Audit mode provides access to customized reports for threats detected by Defender for Office 365 on the **Evaluation mode** page at <https://security.microsoft.com/atpEvaluation>.
+ Audit mode provides access to customized reports for threats detected by the evaluation policies in Defender for Office 365 on the **Microsoft Defender for Office 365 evaluation** page at <https://security.microsoft.com/atpEvaluation>.
-- **Blocking mode**: The Standard template for [preset security policies](preset-security-policies.md) is turned on and used for the trial, and the users you specify to include in the trial are added to the Standard preset security policy. Defender for Office 365 *detects* and *takes action on* harmful messages (for example, detected messages are quarantined).
+- **Blocking mode**: The Standard template for [preset security policies](preset-security-policies.md#profiles-in-preset-security-policies) is turned on and used for the trial, and the users you specify to include in the trial are added to the Standard preset security policy. Defender for Office 365 *detects* and *takes action on* harmful messages (for example, detected messages are quarantined).
- The default and recommended selection is to scope these Defender for Office 365 policies to all users in the organization. But during or after the setup of your trial, you can change the policy assignment to specific users, groups, or email domains in the Microsoft 365 Defender portal or in [Policy settings associated with Defender for Office 365 evaluations and trials](try-microsoft-defender-for-office-365.md#policy-settings-associated-with-defender-for-office-365-evaluations-and-trials)
+ The default and recommended selection is to scope these Defender for Office 365 policies to all users in the organization. But, during or after the setup of your trial, you can change the policy assignment to specific users, groups, or email domains in the Microsoft 365 Defender portal or in PowerShell.
- Blocking mode does not provide customized reports for threats detected by Defender for Office 365. Instead, the information is available in the regular reports and investigation features of Defender for Office 365 Plan 2.
+ Blocking mode doesn't provide customized reports for threats detected by Defender for Office 365. Instead, the information is available in the regular reports and investigation features of Defender for Office 365 Plan 2. For more information, see [Reports for blocking mode](try-microsoft-defender-for-office-365.md#reports-for-blocking-mode).
-A key factor in audit mode vs. blocking mode is how email is delivered to your Microsoft 365 organization:
+The key factors that determine which modes are available to you are:
-- Mail from the internet flows directly Microsoft 365, but your current subscription has only [Exchange Online Protection (EOP)](eop-about.md) or [Defender for Office 365 Plan 1](overview.md#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
+- Whether or not you currently have Defender for Office 365 (Plan 1 or Plan 2) as described in [Evaluation vs. trial for Defender for Office 365](try-microsoft-defender-for-office-365.md#evaluation-vs-trial-for-defender-for-office-365).
+- How email is delivered to your Microsoft 365 organization as described in the following scenarios:
- ![Mail flows from the internet into Microsoft 365, with protection from EOP and/or Defender for Office 365 Plan 1.](../../media/mdo-trial-mail-flow.png)
+ - Mail from the internet flows directly Microsoft 365, but your current subscription has only [Exchange Online Protection (EOP)](eop-about.md) or [Defender for Office 365 Plan 1](overview.md#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
- In these environments, you can select **audit mode** or **blocking mode**.
+ :::image type="content" source="../../medio-trial-mail-flow.png":::
-- You're currently using a third-party service or device for email protection of your Microsoft 365 mailboxes. Mail from the internet flows through the protection service before delivery into your Microsoft 365 organization. Microsoft 365 protection is as low as possible (it's never completely off; for example, malware protection is always enforced).
+ In these environments, **audit mode** or **blocking mode** are available, [depending on your licensing](try-microsoft-defender-for-office-365.md#evaluation-vs-trial-for-defender-for-office-365).
- ![Mail flows from the internet through the third-party protection service or device before delivery into Microsoft 365.](../../media/mdo-migration-before.png)
+ - You're currently using a third-party service or device for email protection of your Microsoft 365 mailboxes. Mail from the internet flows through the protection service before delivery into your Microsoft 365 organization. Microsoft 365 protection is as low as possible (it's never completely off; for example, malware protection is always enforced).
- In these environments, you can select **audit mode** only. You don't need to change your mail flow (MX records).
+ :::image type="content" source="../../medio-migration-before.png":::
+
+ In these environments, only **audit mode** is available. You don't need to change your mail flow (MX records) to evaluate Defender for Office 365 Plan 2.
Let's get started!
Let's get started!
After you've initiated the trial and completed the [setup process](try-microsoft-defender-for-office-365.md#set-up-an-evaluation-or-trial-in-blocking-mode), it may take up to 2 hours for changes to take effect.
-We've automatically configured [Preset security policies](preset-security-policies.md) in your environment. These policies represent a baseline protection profile that's suitable for most users. Standard protection includes:
+We've automatically enabled the [Standard preset security policy](preset-security-policies.md) in your environment. This profile represents a baseline protection profile that's suitable for most users. Standard protection includes:
- Safe Links, Safe Attachments and anti-phishing policies that are scoped to the entire tenant or subset of users you may have chosen during the trial setup process. - Safe Attachments protection for SharePoint, OneDrive, and Microsoft Teams.
Watch this video to learn more: [Protect against malicious links with Safe Links
Defender for Office 365 enables users to report messages to their security teams and allows admins to submit messages to Microsoft for analysis. -- Deploy the [Report Message add-in or the Report Phishing add-in](submissions-users-report-message-add-in-configure.md).
+- Verify or configure [user reported settings](submissions-user-reported-messages-custom-mailbox.md) so reported messages go to a specified reporting mailbox, to Microsoft, or both.
+- Deploy the [Report Message add-in or the Report Phishing add-in](submissions-users-report-message-add-in-configure.md) for users to report messages. Or, users can use the built-in **Report** button in Outlook on the web (formerly known as Outlook Web App or OWA).
- Establish a workflow to [Report false positives and false negatives](submissions-outlook-report-messages.md).-- Use the [Submissions page](submissions-admin.md).
+- Use the **User reported** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user> to see and manage user reported messages.
Watch this video to learn more: [Learn how to use the Submissions page to submit messages for analysis - YouTube](https://www.youtube.com/watch?v=ta5S09Yz6Ks&ab_channel=MicrosoftSecurit).
Use the reporting capabilities in Defender for Office 365 to get more details ab
- Understand threats received in email and collaboration tools with the [Threat protection status report](reports-email-security.md#threat-protection-status-report). - See where threats are blocked with the [Mailflow status report](reports-email-security.md#mailflow-status-report).-- [Review links](reports-defender-for-office-365.md#url-protection-report) that were viewed by users or blocked by the system.
+- Use the [URL protection report](reports-defender-for-office-365.md#url-protection-report) to review links that were viewed by users or blocked by the system.
:::image type="content" source="../../medio-trial-playbook-reporting.png":::
Protect your most targeted and most visible users with Priority Account Protecti
- Identify your most targeted or most visible users. - [Tag these users](../../admin/setup/priority-accounts.md#add-priority-accounts-from-the-microsoft-365-defender-page) as priority accounts.-- Track threats to priority account throughout the portal.
+- Track threats to priority accounts throughout the portal.
Watch this video to learn more: [Protecting priority accounts in Microsoft Defender for Office 365 - YouTube](https://www.youtube.com/watch?v=tqnj0TlzQcI&list=PL3ZTgFEc7LystRja2GnDeUFqk44k7-KXf&index=11).
Defender for Office 365 enables you to investigate activities that put people in
See the bigger picture with Campaign Views in Defender for Office 365, which gives you a view of the attack campaigns targeting your organization and the impact they have on your users. - [Identify campaigns](campaigns.md#what-is-a-campaign) targeting your users.-- - [Visualize the scope](campaigns.md#campaigns-page-in-the-microsoft-365-defender-portal) of the attack. - [Track user interaction](campaigns.md#campaign-details) with these messages.
Evaluation policies ensure no action is taken on email that's detected by Defend
Defender for Office 365 enables users to report messages to their security teams and allows admins to submit messages to Microsoft for analysis. -- Deploy the [Report Message add-in or the Report Phishing add-in](submissions-users-report-message-add-in-configure.md).
+- Verify or configure [user reported settings](submissions-user-reported-messages-custom-mailbox.md) so reported messages go to a specified reporting mailbox, to Microsoft, or both.
+- Deploy the [Report Message add-in or the Report Phishing add-in](submissions-users-report-message-add-in-configure.md) for users to report messages. Or, users can use the built-in **Report** button in Outlook on the web (formerly known as Outlook Web App or OWA).
- Establish a workflow to [Report false positives and false negatives](submissions-outlook-report-messages.md).-- Use the [Submissions page](submissions-admin.md).
+- Use the **User reported** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user> to see and manage user reported messages.
Watch this video to learn more: [Learn how to use the Submissions page to submit messages for analysis - YouTube](https://www.youtube.com/watch?v=ta5S09Yz6Ks&ab_channel=MicrosoftSecurit).
Defender for Office 365 enables you to investigate activities that put people in
#### Convert to Standard Protection at the end of evaluation period
-When you're ready to turn on Defender for Office 365 policies in production, you can use "Convert to Standard Protection" within the evaluation management experience to easily move to Standard protection in [preset security policies](preset-security-policies.md).
-
-1. On the **Microsoft Defender for Office 365 evaluation** page at <https://security.microsoft.com/atpEvaluation>, click **Manage**.
-
- :::image type="content" source="../../medio-evaluation-page.png":::
-
-2. In the flyout that opens, click **Convert to Standard protection**
-
- :::image type="content" source="../../medio-trial-playbook-manage-flyout.png":::
-
-3. In the **Convert to standard protection** dialog that opens, click **Continue** to initiate the setup.
+When you're ready to turn on Defender for Office 365 policies in production, you can use [Convert to Standard Protection](try-microsoft-defender-for-office-365.md#convert-to-standard-protection) to easily move from audit mode to blocking mode by turning on the [Standard preset security policy](preset-security-policies.md#profiles-in-preset-security-policies), which contains any/all recipients from audit mode.
#### Migrate from a third-party protection service or device to Defender for Office 365
security User Tags About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/user-tags-about.md
To see how user tags are part of the strategy to help protect high-impact user a
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **User tags**. Or, to go directly to the **User tags** page, use <https://security.microsoft.com/securitysettings/userTags>.
-2. On the **User tags** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create tag** to start the new tag wizard.
+2. On the **User tags** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** to start the new tag wizard.
3. On the **Define tag** page, configure the following settings: - **Name**: Enter a unique, descriptive name for the tag. You can't rename a tag after you create it.
To see how user tags are part of the strategy to help protect high-impact user a
In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **User tags**. Or, to go directly to the **User tags** page, use <https://security.microsoft.com/securitysettings/userTags>.
-On the **User tags** page, the following properties are displayed in the list of user tags:
+On the **User tags** page, you can sort the entries by clicking on an available column header. The following columns are available:
- **Tag**: The name of the user tag. - **Applied to**: The number of members
security Zero Hour Auto Purge https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-hour-auto-purge.md
- tier2 - seo-marvel-apr2020
-description: Zero-hour auto purge (ZAP) retroactively moves delivered messages in an Exchange Online mailbox to the Junk Email folder or quarantine if those messages are found to be spam, phishing, or contain malware.
+description: Zero-hour auto purge (ZAP) moves delivered messages in Microsoft 365 mailboxes to the Junk Email folder or quarantine if those messages are retroactively found to be spam, phishing, or contain malware.
Previously updated : 6/20/2023 Last updated : 6/23/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 plan 1 and plan 2</a>
-# Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365
+# Zero-hour auto purge (ZAP) in Microsoft 365
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
-## Zero-hour auto purge (ZAP) basics
+In Microsoft 365 organizations with Exchange Online mailboxes, zero-hour auto purge (ZAP) is a protection feature in Exchange Online Protection (EOP) that retroactively detects and neutralizes malicious phishing, spam, or malware messages that have already been delivered to Exchange Online mailboxes.
-In Microsoft 365 organizations with Exchange Online mailboxes and in Microsoft Teams, zero-hour auto purge (ZAP) is a protection feature that retroactively detects and neutralizes malicious phishing, spam, or malware messages that have already been delivered to Exchange Online mailboxes or over Teams chat.
+ZAP doesn't work in standalone EOP environments that protect on-premises mailboxes.
-ZAP doesn't work in standalone Exchange Online Protection (EOP) environments that protect on-premises Exchange mailboxes.
-
-## Zero-hour auto purge (ZAP) in Exchange Online
+> [!NOTE]
+> Currently in Preview, ZAP is also able to retroactively detect existing malicious chat messages in Microsoft Teams.
-Spam and malware signatures are updated in the service real-time on a daily basis. However, users can still receive malicious messages for a variety of reasons, including if content is weaponized after being delivered to users. ZAP addresses this issue by continually monitoring updates to the spam and malware signatures in the service. ZAP can find and take automated actions on messages that are already in a user's mailbox up to 48 hours after delivery.
+Spam and malware signatures in the service are updated in real-time on a daily basis. However, users can still receive malicious messages. For example:
-The ZAP action is seamless for the user; they aren't notified if a message is detected and moved.
+- Zero-day malware that was undetectable during mail flow.
+- Content that's weaponized after being delivered to users.
-[Safe sender lists](create-safe-sender-lists-in-office-365.md), mail flow rules (also known as transport rules), Inbox rules, or additional filters take precedence over ZAP. Similar to what happens in mail flow, this means that even if the service determines the delivered message needs ZAP, the message isn't acted on because of the safe senders configuration. This is another reason to be careful about configuring messages to bypass filtering.
+ZAP addresses these issues by continually monitoring spam and malware signature updates in the service. ZAP can find and take automated actions on messages that are already in a user's mailbox up to 48 hours after delivery. ZAP is seamless for users. Users aren't notified if a message is detected and moved.
Watch this short video to learn how ZAP in Microsoft Defender for Office 365 automatically detects and neutralizes threats in email.+ > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGrLg]
+## Zero-hour auto purge (ZAP) for email messages
+ ### Zero-hour auto purge (ZAP) for malware
-For **read or unread messages** that are found to contain malware after delivery, ZAP quarantines the message that contains the malware attachment. By default, only admins can view and manage quarantined malware messages. But, admins can create and use _quarantine policies_ to define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
+For *read or unread messages* that are found to contain malware after delivery, ZAP quarantines the message that contains the malware attachment. By default, only admins can view and manage quarantined malware messages. But, admins can create and use _quarantine policies_ to define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
> [!NOTE] > Users can't release their own messages that were quarantined as malware, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages.
ZAP for malware is enabled by default in anti-malware policies. For more informa
### Zero-hour auto purge (ZAP) for phishing
-For **read or unread messages** that are identified as phishing after delivery, the ZAP outcome depends on the action that's configured for a **Phishing email** filtering verdict in the applicable anti-spam policy. The available filtering verdict actions for phishing and their possible ZAP outcomes are described in the following list:
+For *read or unread messages* that are identified as phishing (not high confidence phishing) after delivery, the ZAP outcome depends on the action that's configured for a **Phishing email** verdict in the applicable anti-spam policy. The available actions for a **Phishing email** verdict and the possible ZAP outcomes are described in the following list:
- **Add X-Header**, **Prepend subject line with text**, **Redirect message to email address**, **Delete message**: ZAP takes no action on the message.- - **Move message to Junk Email**: ZAP moves the message to the Junk Email folder. For more information, see [Configure junk email settings on Exchange Online mailboxes in Microsoft 365](configure-junk-email-settings-on-exo-mailboxes.md).- - **Quarantine message**: ZAP quarantines the message.
-By default, ZAP for phishing is enabled in anti-spam policies, and the default action for the **Phishing email** filtering verdict is **Quarantine message**, which means ZAP for phishing quarantines the message by default.
+By default, ZAP for phishing is enabled in anti-spam policies, and the default action for the **Phishing email** filtering verdict is described in the following list:
+
+- **Move message to Junk Email folder** in the default anti-spam policy, and custom anti-spam policies that you create in PowerShell.
+- **Quarantine message** in the [Standard and Strict preset security policies](preset-security-policies.md#profiles-in-preset-security-policies), and in custom anti-spam policies that you create in the Defender portal.
For more information about configuring spam filtering verdicts, see [Configure anti-spam policies in Microsoft 365](anti-spam-policies-configure.md). ### Zero-hour auto purge (ZAP) for high confidence phishing
-For **read or unread messages** that are identified as high confidence phishing after delivery, ZAP quarantines the message. By default, only admins can view and manage quarantined high confidence phish messages. But, admins can create and use _quarantine policies_ to define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
+For *read or unread messages* that are identified as high confidence phishing after delivery, ZAP quarantines the message. By default, only admins can view and manage quarantined high confidence phishing messages. But, admins can create and use _quarantine policies_ to define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
> [!NOTE] > Users can't release their own messages that were quarantined as high confidence phishing, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined high-confidence phishing messages.
-ZAP for high confidence phish is enabled by default. For more information, see [Secure by Default in Office 365](secure-by-default.md).
+ZAP for high confidence phishing is enabled by default. For more information, see [Secure by Default in Office 365](secure-by-default.md).
### Zero-hour auto purge (ZAP) for spam
-For **unread messages** that are identified as spam after delivery, the ZAP outcome depends on the action that's configured for the **Spam** filtering verdict in the applicable anti-spam policy. The available filtering verdict actions for spam and their possible ZAP outcomes are described in the following list:
+For *unread messages* that are identified as spam after delivery, the ZAP outcome depends on the action that's configured for the **Spam** verdict in the applicable anti-spam policy. The available actions for a **Spam** verdict and the possible ZAP outcomes are described in the following list:
- **Add X-Header**, **Prepend subject line with text**, **Redirect message to email address**, **Delete message**: ZAP takes no action on the message.- - **Move message to Junk Email**: ZAP moves the message to the Junk Email folder. For more information, see [Configure junk email settings on Exchange Online mailboxes in Microsoft 365](configure-junk-email-settings-on-exo-mailboxes.md).- - **Quarantine message**: ZAP quarantines the message. By default, end-users can view and manage spam quarantined messages where they're a recipient. But, admins can create and use _quarantine policies_ to define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-By default, spam ZAP is enabled in anti-spam policies, and the default action for the **Spam** filtering verdict is **Move message to Junk Email folder**, which means spam ZAP moves **unread** messages to the Junk Email folder by default.
+By default, ZAP for spam is enabled in anti-spam policies, and the default action for the **Spam** filtering verdict is described in the following list:
+
+- **Move message to Junk Email folder** in the default anti-spam policy, new custom anti-spam policies and the [Standard preset security policy](preset-security-policies.md#profiles-in-preset-security-policies).
+- **Quarantine message** in the [Strict preset security policy](preset-security-policies.md#profiles-in-preset-security-policies).
For more information about configuring spam filtering verdicts, see [Configure anti-spam policies in Microsoft 365](anti-spam-policies-configure.md).
To determine if ZAP moved your message, you have the following options:
### Zero-hour auto purge (ZAP) considerations for Microsoft Defender for Office 365
-ZAP will not quarantine any message that's in the process of [Dynamic Delivery](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies) in Safe Attachments policy scanning. If a phishing or spam signal is received for messages in this state, and the filtering verdict in the anti-spam policy is set to take some action on the message (Move to Junk, Redirect, Delete, or Quarantine) then ZAP will default to a 'Move to Junk' action.
+ZAP doesn't quarantine messages that are in the process of [Dynamic Delivery](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies) in Safe Attachments policy scanning. If a phishing or spam signal is received for messages in this state, and the filtering verdict in the anti-spam policy is set to take some action on the message (Move to Junk, Redirect, Delete, or Quarantine), ZAP reverts to the 'Move to Junk' action.
## Zero-hour auto purge (ZAP) in Microsoft Teams > [!NOTE]
-> This section lists new features which are currently in preview.
+> ZAP for Microsoft Teams is currently in Preview, and is available only to customers with Microsoft Defender for Office 365 E5 and Defender for Office P2 subscriptions.
+>
+> Currently, ZAP is available only for messages that are identified as malware or high confidence phishing.
-When a chat message is identified as potentially phishing or malicious in Microsoft Teams, ZAP blocks the message and quarantines it. This message is blocked for both the recipient and the sender. Note that this protection feature only applies to messages in a chat or in a meeting within the organization.
+When a chat message is identified as potentially phishing or malicious in Microsoft Teams, ZAP blocks the message and quarantines it. This message is blocked for both the recipient and the sender. This protection feature applies only to messages in a chat or in a meeting within the organization.
**Sender view**:
When a chat message is identified as potentially phishing or malicious in Micros
:::image type="content" source="../../media/zero-hour-auto-purge-recipient.png" alt-text="Image showing how zero-hour auto purge works for the recipient." lightbox="../../media/zero-hour-auto-purge-recipient.png":::
-Admins can view and manage these quarantined messages in Microsoft Teams. For more information, see [Manage quarantined messages and files as an admin](quarantine-admin-manage-messages-files.md#use-the-microsoft-365-defender-portal-to-manage-quarantined-messages-in-microsoft-teams). Note that if you're not an admin, you won't be able to view or manage quarantined messages for this release.
-
-> [!NOTE]
-> Zero-hour auto purge (ZAP) in Microsoft Teams is available only to customers with Microsoft Defender for Office 365 E5 and Defender for Office P2 subscriptions.
-
-### Zero-hour auto purge (ZAP) for high confidence phishing in Teams
+Admins can view and manage these quarantined messages in Microsoft Teams. For more information, see [Manage quarantined messages and files as an admin](quarantine-admin-manage-messages-files.md#use-the-microsoft-365-defender-portal-to-manage-quarantined-messages-in-microsoft-teams). Currently, you can't view or manage quarantined Teams messages unless you're an admin.
-For messages that are identified as high confidence phishing after delivery, ZAP blocks and quarantines the message. By default, only admins can view and manage quarantined high confidence phishing messages.
+### Zero-hour auto purge (ZAP) for high confidence phishing messages in Teams
-### Zero-hour auto purge (ZAP) for malware in Teams
+For Teams messages that are identified as high confidence phishing after delivery, ZAP blocks and quarantines the message. By default, only admins can view and manage quarantined high confidence phishing messages.
-For messages that are identified as malware, ZAP blocks and quarantines the message. By default, only admins can view and manage quarantined malware messages.
+### Zero-hour auto purge (ZAP) for malware in Teams messages
-Note that for this release, ZAP is available only for messages that are identified as high confidence phish or malware.
+For Teams messages that are identified as malware, ZAP blocks and quarantines the message. By default, only admins can view and manage quarantined malware messages.
-### Review messages blocked in Teams
+### How to see if ZAP blocked your Teams message
-To find out if ZAP blocked your message, see [Manage quarantined messages and files as an admin](quarantine-admin-manage-messages-files.md#use-the-microsoft-365-defender-portal-to-manage-quarantined-messages-in-microsoft-teams).
+To find out if ZAP blocked your Teams message, see [Manage quarantined messages and files as an admin](quarantine-admin-manage-messages-files.md#use-the-microsoft-365-defender-portal-to-manage-quarantined-messages-in-microsoft-teams).
## Zero-hour auto purge (ZAP) FAQ
-### What happens if a legitimate message is moved to the Junk Email folder?
+### What happens if ZAP moves legitimate messages to the Junk Email folder?
-You should follow the normal reporting process for [false positives](submissions-report-messages-files-to-microsoft.md). The only reason the message would be moved from the Inbox to the Junk Email folder would be because the service has determined that the message was spam or malicious.
+Follow the normal process for [reporting false positives to Microsoft](submissions-report-messages-files-to-microsoft.md). ZAP moves the message from the Inbox folder to the Junk Email folder only if the service determines that the message is spam or malicious.
### What if I use the Quarantine folder instead of the Junk Mail folder?
-ZAP will take action on a message based on the configuration your anti-spam policies as described earlier in this article.
+ZAP takes action on a message based on the configuration of anti-spam policies as described earlier in this article.
-### What if I'm using safe senders, mail flow rules, or allowed/blocked sender lists?
+### How is ZAP affected by the exceptions to protection features in EOP and Defender for Office 365?
-Safe senders, mail flow rules, or block and allow organizational settings take precedence. These messages are excluded from ZAP since the service is doing what you configured it to do. This is another reason to be careful about configuring messages to bypass filtering.
+[Safe sender lists](create-safe-sender-lists-in-office-365.md), mail flow rules, and other organizational block and allow settings take precedence over ZAP. These messages are excluded from ZAP, since the service is doing what you configured it to do. This behavior is another reason to be careful about configuring messages to bypass filtering.
-### What are the licensing Requirements for Zero-hour auto purge (ZAP) to work?
+### What are the licensing requirements for ZAP?
-There are no limitations on licenses. ZAP works on all mailboxes hosted on Exchange online. ZAP doesn't work in standalone Exchange Online Protection (EOP) environments that protect on-premises Exchange mailboxes.
+There are no special licensing requirements for ZAP. ZAP works on all mailboxes hosted in Exchange Online. ZAP doesn't work in on-premises mailboxes that are protected by standalone EOP.
-### What if a message is moved to another folder (e.g. Inbox rules)?
+### Does ZAP work on messages in other folders in the mailbox (for example, messages moved by Inbox rules)?
-Zero-hour auto purge still works as long as the message hasn't been deleted, or as long as the same, or stronger, action hasn't already been applied. For example, if the anti-phishing policy is set to quarantine and message is already in the Junk Email, then ZAP will take action to quarantine the message.
+ZAP still works as long as the message hasn't been deleted, or as long as the same or stronger action hasn't already been applied. For example, if the message is in the Junk Email folder, and the action in the applicable anti-phishing policy is quarantine, ZAP quarantines the message.
### How does ZAP affect mailboxes on hold?
-Zero-hour auto purge will quarantine messages from mailboxes on hold. ZAP can move messages to the Junk Email folder based on the action that's configured for a spam or phishing verdict in anti-spam policies.
+ZAP quarantines messages from mailboxes on hold. ZAP can move messages to the Junk Email folder based on the action that's configured for a spam or phishing verdict in anti-spam policies.
For more information about holds in Exchange Online, see [In-Place Hold and Litigation Hold in Exchange Online](/Exchange/security-and-compliance/in-place-and-litigation-holds).
solutions Collaborate As Team https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/collaborate-as-team.md
- admindeeplinkMAC - admindeeplinkTEAMS - admindeeplinkSPO
+ms.localizationpriority: medium
f1.keywords: NOCSH recommendations: false description: Learn about the Microsoft 365 configuration steps necessary to set up a team for task, conversation, and documentation collaboration with guests in Teams.
Sharing in Microsoft 365 is governed at its highest level by the [B2B external c
Check the B2B external collaboration settings to ensure that sharing with guests isn't blocked.
-![Screenshot of Azure Active Directory Organizational Relationships Settings page.](../media/azure-ad-organizational-relationships-settings.png)
+![Screenshot of Azure Active Directory external collaboration settings page.](../media/azure-ad-organizational-relationships-settings.png)
To set external collaboration settings 1. Log in to Azure Active Directory at [https://aad.portal.azure.com](https://aad.portal.azure.com).
-2. In the left navigation pane, click **Azure Active Directory**.
-3. Click **External identities**.
-4. On the **Get started** screen, in the left navigation pane, click **External collaboration settings**.
-5. Ensure that either **Member users and users assigned to specific admin roles can invite guest users including guests with member permissions** or **Anyone in the organization can invite guest users including guests and non-admins** is selected.
-6. If you made changes, click **Save**.
+1. In the left navigation pane, expand **External identities**.
+1. Select **External collaboration settings**.
+1. Ensure that either **Member users and users assigned to specific admin roles can invite guest users including guests with member permissions** or **Anyone in the organization can invite guest users including guests and non-admins** is selected.
+1. If you made changes, select **Save**.
Note the settings in the **Collaboration restrictions** section. Make sure that the domains of the guests that you want to collaborate with aren't blocked.
Check to ensure that guest access is enabled in Teams and make any adjustment to
To set Teams guest access settings 1. Log in to the Microsoft 365 admin center at [https://admin.microsoft.com](https://admin.microsoft.com).
-2. In the left navigation pane, click **Show all**.
-3. Under **Admin centers**, click **Teams**.
+2. In the left navigation pane, select **Show all**.
+3. Under **Admin centers**, select **Teams**.
4. In the Teams admin center, in the left navigation pane select **Users** > <a href="https://go.microsoft.com/fwlink/p/?linkid=2173122" target="_blank">**Guest access**</a>.
-5. Ensure that **Allow guest access in Teams** is set to **On**.
-6. Make any desired changes to the additional guest settings, and then click **Save**.
+5. Ensure that **Guest access** is set to **On**.
+6. Make any desired changes to the additional guest settings, and then select **Save**.
Once Teams guest access is turned on, you can optionally control guest access to individual teams and their associated SharePoint sites using sensitivity labels. For more information, see [Use sensitivity labels to protect content in Microsoft Teams, Microsoft 365 groups, and SharePoint sites](../compliance/sensitivity-labels-teams-groups-sites.md).
Teams uses Microsoft 365 Groups for team membership. The Microsoft 365 Groups gu
To set Microsoft 365 Groups guest settings 1. In the Microsoft 365 admin center, in the left navigation pane, expand **Settings**.
-2. Click **Org settings**.
-3. In the list, click **Microsoft 365 Groups**.
+2. Select **Org settings**.
+3. In the list, select **Microsoft 365 Groups**.
4. Ensure that the **Let group owners add people outside your organization to Microsoft 365 Groups as guests** and **Let guest group members access group content** check boxes are both checked.
-5. If you made changes, click **Save changes**.
+5. If you made changes, select **Save changes**.
## SharePoint organization level sharing settings
To set the SharePoint organization-level default link settings
The next step is to create the team that you plan to use for collaborating with guests. To create a team
-1. In Teams, on the **Teams** tab, click **Join or create a team** at the bottom of the left pane.
-2. Click **Create a team**.
-3. Click **Build a team from scratch**.
+1. In Teams, on the **Teams** tab, select **Join or create a team** at the bottom of the left pane.
+2. Select **Create a team**.
+3. Select **Build a team from scratch**.
4. Choose **Private** or **Public**.
-5. Type a name and description for the team, and then click **Create**.
-6. Click **Skip**.
+5. Type a name and description for the team, and then select **Create**.
+6. Select **Skip**.
We'll invite users later. Next, it's important to check the site-level sharing settings for the SharePoint site that is associated with the team.
To set site-level sharing settings
Guest sharing settings are now configured, so you can start adding internal users and guests to your team. To invite internal users to a team
-1. In the team, click **More options** (**\*\*\***), and then click **Add member**.
+1. In the team, select **More options** (**\*\*\***), and then select **Add member**.
2. Type the name of the person who you want to invite.
-3. Click **Add**, and then click **Close**.
+3. Select **Add**, and then select **Close**.
To invite guests to a team
-1. In the team, click **More options** (**\*\*\***), and then click **Add member**.
+1. In the team, select **More options** (**\*\*\***), and then select **Add member**.
2. Type the email address of the guest whom you want to invite.
-3. Click **Edit guest information**.
-4. Type the guest's full name and click the check mark.
-5. Click **Add**, and then click **Close**.
+3. Select **Edit guest information**.
+4. Type the guest's full name and select the check mark.
+5. Select **Add**, and then select **Close**.
> [!NOTE] > Guests with a work or school account can only be invited by using their User Principal Name (UPN) (for example, adele@contoso.com). Inviting guests by using EAS ID, or other email formats, is not supported.
-## See also
+## Related topics
[Best practices for sharing files and folders with unauthenticated users](best-practices-anonymous-sharing.md)