Updates from: 07/12/2023 03:36:41
Category Microsoft Docs article Related commit history on GitHub Change details
admin Sharepoint Site Usage Ww https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/sharepoint-site-usage-ww.md
The **SharePoint site usage** report can be viewed for trends over the last 7 da
|Secure link for guest count |The number of times documents or folders are shared using "specific people" on the site. | |Secure link for member count |The number of times documents or folders are shared using "specific people" on the site. | |Root Web Template |The template used for creating the site. <br/> NOTE: If you want to filter the data by different site types, then export the data and use the Root Web Template column. |+
+Note that you may see differences between the sites listed above and those listed on the [Active sites page](https://go.microsoft.com/fwlink/?linkid=2185220) in the [SharePoint admin center](https://go.microsoft.com/fwlink/?linkid=2185219), from Sites > Active sites because the certain site templates and URLs are not included as Active Sites. See [Manage sites in the SharePoint admin center](/sharepoint/manage-sites-in-new-admin-center) for more information.
+
business-premium Secure Your Business Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/secure-your-business-data.md
search.appverid:
- BCS160 - MET150 - MOE150
-description: "Learn best practices to protect your data using Micrsoft 365 Business Basic, Standard, or Premium. Protect devices, email, files, and accounts."
+description: "Learn best practices to protect your data using Microsoft 365 Business Basic, Standard, or Premium. Protect devices, email, files, and accounts."
# Microsoft 365 for business security best practices
Microsoft 365 Business Basic, Standard, and Premium all include antiphishing, an
- Email & collaboration content (such as Office documents) - Data (encryption, sensitivity labels, and Data Loss Prevention)
-For more information about what each plan includes, see [Microsoft 365 User Subscription Suites for Small and Medium-sized Businesses](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWR6bM).
+This article describes the top 10 ways to secure your business data with Microsoft 365 for business. For more information about what each plan includes, see [Microsoft 365 User Subscription Suites for Small and Medium-sized Businesses](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWR6bM).
## Top 10 ways to secure your business data :::image type="content" source="media/top-10-ways-to-secure-data.png" alt-text="Diagram listing the top 10 ways to secure business data with Microsoft 365 for business" :::
-The following table summarizes recommendations by subscription for securing your business data:
+The following table summarizes how to secure your data using Microsoft 365 for business.
+
+| Best practices and capabilities | Microsoft 365 Business Premium | Microsoft 365 Business Standard | Microsoft 365 Business Basic |
+|||||
+| **1. Use multi-factor authentication** (MFA), also known as two-step verification. See [Turn on multi-factor authentication](m365bp-turn-on-mfa.md). | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| - [Security defaults](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults#enabling-security-defaults) (suitable for most organizations) | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| - [Conditional Access](m365bp-turn-on-mfa.md) (for more stringent requirements) | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| **2. Set up and protect your administrator accounts**. See [Protect your admin accounts](m365bp-protect-admin-accounts.md). | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|
+| **3. Use preset security policies to protect email and collaboration content**. See [Review and apply preset security policies](/microsoft-365/business-premium/m365bp-protect-against-malware-cyberthreats#1-review-and-apply-preset-security-policies-for-email-and-collaboration). | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| - [Anti-spam, anti-malware, and anti-phishing protection](../security/office-365-security/eop-about.md) for email | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| - [Advanced anti-phishing, spoof settings, impersonation settings, Safe Links, and Safe Attachments](../security/office-365-security/microsoft-defender-for-office-365-product-overview.md) for email and Office documents | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| **4. Protect all devices**, including personal and company devices. See [Secure managed and unmanaged devices](m365bp-managed-unmanaged-devices.md). | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| - [Microsoft 365 Apps](m365bp-users-install-m365-apps.md) (Word, Excel, PowerPoint, and more) installed on users' computers, phones, and tablets | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | |
+| - [Windows 10 or 11 Pro Upgrade](m365bp-upgrade-windows-pro.md) from Windows 7 Pro, Windows 8 Pro, or Windows 8.1 Pro | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| - [Advanced threat protection](m365bp-onboard-devices-mdb.md) for users' computers, phones, and tablets | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| **5. Train everyone on email best practices**. See [Protect yourself against phishing and other attacks](m365bp-avoid-phishing-and-attacks.md). | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| - [Anti-spam, anti-malware, and anti-phishing protection](../security/office-365-security/eop-about.md) for email | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| - [Advanced threat protection](../security/office-365-security/microsoft-defender-for-office-365-product-overview.md) for email and Office documents | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| **6. Use Microsoft Teams for collaboration and sharing**. | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| - [Microsoft Teams](create-teams-for-collaboration.md) for communication, collaboration, and sharing | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| - [Safe Links & Safe Attachments](/microsoft-365/security/office-365-security/mdo-support-teams-about) with Microsoft Teams | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| - [Sensitivity labels for meetings](/microsoft-365/compliance/sensitivity-labels-meetings) to protect calendar items, Microsoft Teams meetings, and chat | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| - [Data Loss Prevention](/microsoft-365/compliance/dlp-teams-default-policy) in Microsoft Teams to safeguard company data | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| **7. Set sharing settings for SharePoint and OneDrive files and folders**. | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| - [Safe Links](/microsoft-365/security/office-365-security/safe-links-about) and [Safe Attachments](/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-about) for SharePoint and OneDrive | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| - [Sensitivity labels](/microsoft-365/compliance/get-started-with-sensitivity-labels) to mark items as sensitive, confidential. etc. | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| - [Data Loss Prevention](/microsoft-365/compliance/get-started-with-the-default-dlp-policy) to safeguard company data | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| **8. Use Microsoft 365 Apps on devices** | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | |
+| - [Outlook and Web/mobile versions of Microsoft 365 Apps](https://support.microsoft.com/en-us/office/what-is-microsoft-365-for-business-56e60c2b-1929-4a04-bd9b-ff5b844364f3) for all users | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| - [Microsoft 365 Apps](m365bp-users-install-m365-apps.md) installed on users' devices | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | |
+| - [Employee quick setup guide](https://support.microsoft.com/office/7f34c318-e772-46a5-8c0a-ab86661542d1) to help users get set up and running | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| **9. Manage calendar sharing for your business**. | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| - [Outlook](../admin/setup/setup-outlook.md) for email and calendars | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+| - [Data Loss Prevention](/microsoft-365/compliance/get-started-with-the-default-dlp-policy) to safeguard company data | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | | |
+| **10. Maintain your environment** by performing tasks, such asl adding or removing users and devices. See [Maintain your environment](m365bp-mdb-maintain-environment.md). | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: | :::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included"::: |
+
+## More information about Microsoft 365 for business
+
+- For more information about what each plan includes, see:
+
+ - [Reimagine productivity with Microsoft 365 and Microsoft Teams](https://www.microsoft.com/en-us/microsoft-365/business/compare-all-microsoft-365-business-products-b?ef_id=8c2a86ec9ea514a008c6e419e036519c:G:s&OCID=AIDcmmwf9kwzdj_SEM_8c2a86ec9ea514a008c6e419e036519c:G:s&lnkd=Bing_O365SMB_Brand&msclkid=8c2a86ec9ea514a008c6e419e036519c)
+ - [Microsoft 365 User Subscription Suites for Small and Medium-sized Businesses](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWR6bM).
-| Step | Recommendations |
-|||
-| [1. Use multi-factor authentication](#1-use-multi-factor-authentication). <br/><br/>*See [What MFA is and why it matters](#what-mfa-is-and-why-it-matters).* | Microsoft 365 Business Basic or Standard: [Use security defaults](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults#enabling-security-defaults).<br/><br/>Microsoft 365 Business Premium: [Use either security defaults or Conditional Access](m365bp-turn-on-mfa.md). |
-| [2. Protect your administrator accounts](#2-protect-your-administrator-accounts).<br/><br/>*See [Why you should protect admin accounts](#why-you-should-protect-admin-accounts).* | Microsoft 365 Business Basic, Standard, or Premium: [Assign admin roles](/microsoft-365/admin/add-users/assign-admin-roles). |
-| [3. Use preset security policies](#3-use-preset-security-policies).<br/><br/>*See [How preset security policies help](#how-preset-security-policies-help).* | Microsoft 365 Business Basic, Standard, or Premium: [Assign Standard or Strict preset security policies to users](/microsoft-365/security/office-365-security/preset-security-policies#use-the-microsoft-365-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users). |
-| [4. Protect all devices](#4-protect-all-devices).<br/><br/>*See [Why and how to protect devices](#why-and-how-to-protect-devices).* | Microsoft 365 Business Basic: [Turn on MFA](m365bp-turn-on-mfa.md) (for basic protection).<br/><br/>Microsoft 365 Business Standard:<br/>1. [Turn on MFA](m365bp-turn-on-mfa.md).<br/>2. [Install Microsoft 365 Apps on devices](m365bp-users-install-m365-apps.md).<br/><br/>Microsoft 365 Business Premium:<br/>1. [Turn on MFA](m365bp-turn-on-mfa.md). <br/>2. [Install Microsoft 365 Apps on devices](m365bp-users-install-m365-apps.md).<br/>3. [Secure both managed and unmanaged devices](m365bp-managed-unmanaged-devices.md). |
-| [5. Train everyone on email best practices](#5-train-everyone-on-email-best-practices).<br/><br/>*See [Why and how to protect email content](#why-and-how-to-protect-email-content).* | Microsoft 365 Basic, Standard, or Premium: <br/>1. Follow the guidance in [Protect against threats](/microsoft-365/security/office-365-security/protect-against-threats). <br/>2. Share [Protect yourself against phishing and other attacks](m365bp-avoid-phishing-and-attacks.md) with everyone. |
-| [6. Use Microsoft Teams for collaboration and sharing](#6-use-microsoft-teams-for-collaboration-and-sharing).<br/><br/>*See [How to collaborate and share more securely](#how-to-collaborate-and-share-more-securely).* | Microsoft 365 Business Basic or Standard: [Use Microsoft Teams for collaboration and sharing](create-teams-for-collaboration.md). <br/><br/>Microsoft 365 Business Premium: <br/>1. [Use Microsoft Teams for meetings and information sharing](create-teams-for-collaboration.md). <br/>2. [Use Safe Links & Safe Attachments with Microsoft Teams](/microsoft-365/security/office-365-security/mdo-support-teams-about). <br/>3. [Use sensitivity labels with meetings](/microsoft-365/compliance/sensitivity-labels-meetings) to protect calendar items, Microsoft Teams meetings, and chat. <br/>4. [Use the default DLP policy in Microsoft Teams](/microsoft-365/compliance/dlp-teams-default-policy). |
-| [7. Set sharing settings for SharePoint and OneDrive files and folders](#7-set-sharing-settings-for-sharepoint-and-onedrive-files-and-folders).<br/><br/>*See [Why and how to adjust sharing settings in SharePoint and OneDrive](#why-and-how-to-adjust-sharing-settings-for-files-and-folders-in-sharepoint-and-onedrive).* | Microsoft 365 Business Basic or Standard: <br/>1. Use SharePoint and OneDrive for storing and sharing files.<br/>2. [Set sharing settings for SharePoint and OneDrive](m365bp-protect-against-malware-cyberthreats.md#3-adjust-sharing-settings-for-sharepoint-and-onedrive-files-and-folders). <br/><br/>Microsoft 365 Business Premium: <br/>1. Use SharePoint and OneDrive for storing and sharing files. <br/>2. [Set sharing settings for SharePoint and OneDrive](m365bp-protect-against-malware-cyberthreats.md#3-adjust-sharing-settings-for-sharepoint-and-onedrive-files-and-folders). <br/>3. Use [Safe Links](/microsoft-365/security/office-365-security/safe-links-about) and [Safe Attachments](/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-about) with SharePoint and OneDrive. <br/>4. Use [sensitivity labels](/microsoft-365/compliance/get-started-with-sensitivity-labels) and [DLP](/microsoft-365/compliance/get-started-with-the-default-dlp-policy). |
-| [8. Use Microsoft 365 Apps on devices](#8-use-microsoft-365-apps-on-devices).<br/><br/>*See [Why users should use Microsoft 365 Apps](#why-users-should-use-microsoft-365-apps).* | Microsoft 365 Business Basic: Use Outlook and Web/mobile versions of Microsoft 365 Apps. <br/><br/>Microsoft 365 Business Standard or Premium: <br/>1. [Install Microsoft 365 Apps on all devices](m365bp-users-install-m365-apps.md). <br/>2. Share the [Employee quick setup guide with users](https://support.microsoft.com/office/7f34c318-e772-46a5-8c0a-ab86661542d1). |
-| [9. Manage calendar sharing for your business](#9-manage-calendar-sharing-for-your-business).<br/><br/>*See [How to prevent calendar oversharing](#how-to-prevent-calendar-oversharing).* | Microsoft 365 Business Basic or Standard: Use Outlook and Exchange Online for email and calendars.<br/><br/>Microsoft 365 Business Premium:<br/>1. Use Outlook and Exchange Online for email and calendars.<br/>2. [Get started using your default DLP policy](/microsoft-365/compliance/get-started-with-the-default-dlp-policy). |
-| [10. Maintain your environment](#10-maintain-your-environment).<br/><br/>*See [Why maintenance and operations matter](#why-maintenance-and-operations-matter).* | Microsoft 365 Basic or Standard: Use the [Microsoft 365 admin center](https://admin.microsoft.com) to view subscription information, updates, and other settings. <br/><br/>Microsoft 365 Business Premium: <br/>1. Use the [Microsoft 365 admin center](https://admin.microsoft.com) to view subscription information, updates, and other settings. <br/>2. Use the [Microsoft 365 admin center](https://admin.microsoft.com) or the [Microsoft Entra portal](https://entra.microsoft.com) for managing user accounts.<br/>3. Use the [Microsoft 365 Defender portal](https://security.microsoft.com) and the [Microsoft 365 Purview compliance portal](https://compliance.microsoft.com/) for viewing and managing security & compliance capabilities. If preferred, you can use the [Intune admin center](https://intune.microsoft.com) to view or manage devices. |
-
-The following sections describe each method in more detail, including why and how to implement our recommendations in your environment.
-
-## 1. Use multi-factor authentication
-
-| Subscription | Recommendation |
-|||
-| [Microsoft 365 Business Premium](index.md) | [Use either security defaults or Conditional Access](m365bp-turn-on-mfa.md). |
-| [Microsoft 365 Business Standard](../admin/setup/setup-business-standard.md)<br/>[Microsoft 365 Business Basic](../admin/setup/setup-business-basic.md) | [Use security defaults](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults#enabling-security-defaults). |
-
-### What MFA is and why it matters
-
-[Multi-factor authentication](../admin/security-and-compliance/multi-factor-authentication-microsoft-365.md) (MFA), also known as two-step verification, requires people to use a code or authentication app on their phone to sign into Microsoft 365, and is a critical first step to protecting your business data. Using MFA can prevent bad actors from taking over your account if they know your password.
-
-To help simplify the process of enabling MFA, [security defaults in Azure Active Directory (Azure AD)](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults) are available in Microsoft 365 Business Basic, Standard, and Premium.
-
-Microsoft 365 Business Premium also includes [Azure AD Premium P1](/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses) for advanced administration. It enables you to set up and configure [Conditional Access](/azure/active-directory/conditional-access/overview) policies instead of security defaults, for more stringent requirements. See [Turn on multi-factor authentication](m365bp-turn-on-mfa.md).
-
-## 2. Protect your administrator accounts
-
-| Subscription | Recommendation |
-|||
-| [Microsoft 365 Business Premium](index.md) <br/>[Microsoft 365 Business Standard](../admin/setup/setup-business-standard.md) <br/>[Microsoft 365 Business Basic](../admin/setup/setup-business-basic.md) | [Assign admin roles](/microsoft-365/admin/add-users/assign-admin-roles). |
-
-### Why you should protect admin accounts
-
-Administrator accounts (also called admins) have elevated privileges, making these accounts more susceptible to cyberattacks. Make sure to set up and manage the right number of admin and user accounts for your business. We also recommend adhering to the information security principle of least privilege, which means that users and applications should be granted access only to the data and operations they require to perform their jobs.
-
-Microsoft 365 Business Basic, Standard, and Premium include the [Microsoft 365 admin center](https://admin.microsoft.com) and the [Microsoft Entra portal](https://entra.microsoft.com) to set up and manage your admin accounts. See [Protect your administrator accounts](m365bp-protect-admin-accounts.md).
-
-## 3. Use preset security policies
-
-| Subscription | Recommendation |
-|||
-| [Microsoft 365 Business Premium](index.md)<br/>[Microsoft 365 Business Standard](../admin/setup/setup-business-standard.md)<br/>[Microsoft 365 Business Basic](../admin/setup/setup-business-basic.md) | [Assign Standard or Strict preset security policies to users](/microsoft-365/security/office-365-security/preset-security-policies#use-the-microsoft-365-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users). |
-
-### How preset security policies help
-
-[Preset security policies](/microsoft-365/security/office-365-security/preset-security-policies) save time by applying recommended spam, anti-malware, and anti-phishing policies to users all at once. Preset security policies take the guesswork out of implementing protection for email and collaboration content.
-
-Microsoft 365 Business Basic, Standard, and Premium include [Exchange Online Protection](../security/office-365-security/eop-about.md) (EOP). It includes preset security policies for anti-spam, anti-malware, and anti-phishing.
-
-Microsoft 365 Business Premium also includes [Microsoft Defender for Office 365 Plan 1](/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet). It includes preset security policies for advanced anti-phishing, spoof settings, impersonation settings, Safe Links, and Safe Attachments.
-
-See the following articles:
--- [Policies in preset security policies](../security/office-365-security/preset-security-policies.md#policies-in-preset-security-policies)-- [Protect against malware and other cyberthreats](m365bp-protect-against-malware-cyberthreats.md)-
-## 4. Protect all devices
-
-| Subscription | Recommendations |
-|||
-| [Microsoft 365 Business Premium](index.md) | 1. [Turn on MFA](m365bp-turn-on-mfa.md).<br/>2. [Install Microsoft 365 Apps on devices](m365bp-users-install-m365-apps.md).<br/>3. [Secure managed and unmanaged devices](m365bp-managed-unmanaged-devices.md). |
-| [Microsoft 365 Business Standard](../admin/setup/setup-business-standard.md) | 1. [Turn on MFA](m365bp-turn-on-mfa.md).<br/>2. [Install Microsoft 365 Apps on devices](m365bp-users-install-m365-apps.md). |
-| [Microsoft 365 Business Basic](../admin/setup/setup-business-basic.md) | [Turn on MFA](m365bp-turn-on-mfa.md). |
-
-### Why and how to protect devices
-
-Every device is a possible attack avenue into your network and must be configured properly, even devices that are personally owned but used for work. Your security team and all employees can all take steps to protect devices. For example, all users can use MFA on their devices.
-
-Microsoft 365 Business Basic, Standard, and Premium enable users to use MFA on their devices.
-
-Microsoft 365 Business Premium also includes advanced device protection with [Microsoft Defender for Business](../security/defender-business/mdb-overview.md). Defender for Business includes threat and vulnerability management, attack surface reduction, next-generation protection, endpoint detection and response, and automated investigation capabilities.
-
-Microsoft 365 Business Premium also includes [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) for managing devices.
-
-See the following articles:
--- [Secure managed and unmanaged devices](m365bp-managed-unmanaged-devices.md) -- [Set up unmanaged (BYOD) devices](m365bp-set-up-unmanaged-devices.md)-- [Set up and secure managed devices](m365bp-protect-managed-devices.md) -
-## 5. Train everyone on email best practices
-
-| Subscription | Recommendations |
-|||
-| [Microsoft 365 Business Premium](index.md)<br/>[Microsoft 365 Business Standard](../admin/setup/setup-business-standard.md) <br/>[Microsoft 365 Business Basic](../admin/setup/setup-business-basic.md) | 1. Follow the guidance in [Protect against threats](/microsoft-365/security/office-365-security/protect-against-threats).<br/>2. Share [Protect yourself against phishing and other attacks](m365bp-avoid-phishing-and-attacks.md) with everyone. |
-
-### Why and how to protect email content
-
-Email can contain malicious attacks cloaked as harmless communications. Email systems are especially vulnerable, because email is handled by everyone in the organization, and safety relies on humans making consistently good decisions with those communications.
-
-Train everyone to know what to watch for spam or junk mail, phishing attempts, spoofing, and malware in their email.
-
-Microsoft 365 Basic, Standard, and Premium include [EOP](../security/office-365-security/eop-about.md), which provides anti-spam, anti-malware, and anti-phishing protection for email hosted in Exchange Online.
-
-Microsoft 365 Business Premium also includes [Defender for Office 365 Plan 1](/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet), which provides more advanced protection for email and collaboration, with advanced anti-phishing, anti-spam, and anti-malware protection, Safe Attachments, and Safe Links.
-
-See the following articles:
--- [Protect yourself against phishing and other attacks](m365bp-avoid-phishing-and-attacks.md)-- [Anti-phishing protection in Defender for Office 365](/microsoft-365/security/office-365-security/anti-phishing-protection-about#additional-anti-phishing-protection-in-microsoft-defender-for-office-365)-- [Safe Attachments](/microsoft-365/security/office-365-security/safe-attachments-about) -- [Safe Links](/microsoft-365/security/office-365-security/safe-links-about) -- [Protect against threats](../security/office-365-security/protect-against-threats.md)-
-## 6. Use Microsoft Teams for collaboration and sharing
-
-| Subscription | Recommendations |
-|||
-| [Microsoft 365 Business Premium](index.md) | 1. [Use Microsoft Teams for meetings and information sharing](create-teams-for-collaboration.md). <br/>2. [Use Safe Links & Safe Attachments with Microsoft Teams](/microsoft-365/security/office-365-security/mdo-support-teams-about). <br/>3. [Use sensitivity labels with meetings](/microsoft-365/compliance/sensitivity-labels-meetings) to protect calendar items, Microsoft Teams meetings, and chat. <br/>4. [Use the default DLP policy in Microsoft Teams](/microsoft-365/compliance/dlp-teams-default-policy). |
-| [Microsoft 365 Business Standard](../admin/setup/setup-business-standard.md)<br/>[Microsoft 365 Business Basic](../admin/setup/setup-business-basic.md) | [Use Microsoft Teams](create-teams-for-collaboration.md). |
-
-### How to collaborate and share more securely
-
-The best way to collaborate and share securely is to use Microsoft Teams. With Microsoft Teams, all your files and communications are in a protected environment and aren't being stored in unsafe ways outside of it.
-
-Microsoft 365 Business Basic, Standard, and Premium include Microsoft Teams.
-
-Microsoft 365 Business Premium also includes:
--- [Defender for Office 365 Plan 1](/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet), with [Safe Links](/microsoft-365/security/office-365-security/safe-links-about#safe-links-settings-for-microsoft-teams) and [Safe Attachments](/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-about) for Microsoft Teams.-- [Azure Information Protection Plan 1](/azure/information-protection/what-is-information-protection), with [sensitivity labels](/microsoft-365/compliance/sensitivity-labels-meetings) and [DLP](/microsoft-365/compliance/dlp-teams-default-policy) to discover, classify, protect, and govern sensitive information.-
-See the following articles:
--- [Use Microsoft Teams for collaboration](create-teams-for-collaboration.md) -- [Set up meetings with Microsoft Teams](set-up-meetings.md) -- [Share files and videos in a safe environment](share-files-and-videos.md)-- [Defender for Office 365 support for Microsoft Teams](/microsoft-365/security/office-365-security/mdo-support-teams-about)-- [Data Loss Prevention (DLP) in Microsoft Teams](/microsoft-365/compliance/dlp-teams-default-policy)-- [Use sensitivity labels to protect calendar items, Teams meetings, and chat](/microsoft-365/compliance/sensitivity-labels-meetings)--
-## 7. Set sharing settings for SharePoint and OneDrive files and folders
-
-| Subscription | Recommendations |
-|||
-| [Microsoft 365 Business Premium](index.md) | 1. Use SharePoint and OneDrive for storing and sharing files. <br/>2. [Set sharing settings for SharePoint and OneDrive](m365bp-protect-against-malware-cyberthreats.md#3-adjust-sharing-settings-for-sharepoint-and-onedrive-files-and-folders). <br/>3. Use [Safe Links](/microsoft-365/security/office-365-security/safe-links-about) and [Safe Attachments](/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-about) with SharePoint and OneDrive. <br/>4. Use [sensitivity labels](/microsoft-365/compliance/get-started-with-sensitivity-labels) and [DLP](/microsoft-365/compliance/get-started-with-the-default-dlp-policy). |
-| [Microsoft 365 Business Standard](../admin/setup/setup-business-standard.md) <br/> [Microsoft 365 Business Basic](../admin/setup/setup-business-basic.md) |1. Use SharePoint and OneDrive for storing and sharing files.<br/>2. [Set sharing settings for SharePoint and OneDrive](m365bp-protect-against-malware-cyberthreats.md#3-adjust-sharing-settings-for-sharepoint-and-onedrive-files-and-folders). |
-
-### Why and how to adjust sharing settings for files and folders in SharePoint and OneDrive
-
-Your default sharing levels for SharePoint and OneDrive might be set to a more permissive level than you should use. We recommend reviewing and if necessary, changing the default settings to better protect your business. Grant people only the access they need to do their jobs.
-
-Microsoft 365 Business Basic, Standard, and Premium include OneDrive and SharePoint.
-
-Microsoft 365 Business Premium also includes:
--- [Defender for Office 365 Plan 1](/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet), with [Safe Links](/microsoft-365/security/office-365-security/safe-links-about) and [Safe Attachments](/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-about) for Microsoft Teams, SharePoint, and OneDrive.-- [Azure Information Protection Plan 1](/azure/information-protection/what-is-information-protection), with capabilities to discover, classify, protect, and govern sensitive information.-
-See the following resources:
--- [Adjust sharing settings for SharePoint and OneDrive files and folders](m365bp-protect-against-malware-cyberthreats.md#3-adjust-sharing-settings-for-sharepoint-and-onedrive-files-and-folders)-- [Sensitivity labels for Office files in SharePoint and OneDrive](/microsoft-365/compliance/sensitivity-labels-sharepoint-onedrive-files)-
-## 8. Use Microsoft 365 Apps on devices
-
-| Subscription | Recommendations |
-|||
-| [Microsoft 365 Business Premium](index.md)<br/> [Microsoft 365 Business Standard](../admin/setup/setup-business-standard.md) | 1. [Install Microsoft 365 Apps on all devices](m365bp-users-install-m365-apps.md). <br/>2. Share the [Employee quick setup guide with users](https://support.microsoft.com/office/7f34c318-e772-46a5-8c0a-ab86661542d1). |
-| [Microsoft 365 Business Basic](../admin/setup/setup-business-basic.md) | Use Outlook and Web/mobile versions of Microsoft 365 Apps. |
-
-### Why users should use Microsoft 365 Apps
-
-Outlook and Microsoft 365 Apps (also referred to as Office apps) enable people to work productively and more securely across devices. Start a document on one device, and pick it up later on another device. Instead of sending files as email attachments, you can share links to documents that are stored in SharePoint or OneDrive.
-
-Microsoft 365 Business Basic, Standard, and Premium include Outlook and Web/mobile versions of [Microsoft 365 Apps](/deployoffice/about-microsoft-365-apps) (such as Word, PowerPoint, and Excel).
-
-Microsoft 365 Business Standard and Premium include desktop versions of Microsoft 365 Apps that can be installed on computers, tablets, and phones. Installing the Microsoft 365 Apps helps ensure users get the latest features, new tools, security updates, and bug fixes. (PC users also get Access and Publisher.)
-
-Microsoft 365 Business Premium also includes:
-- [Defender for Office 365 Plan 1](/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) (with Safe Links and Safe Attachments)-- [Azure Information Protection Plan 1](/azure/information-protection/what-is-information-protection) (with sensitivity labels)-
-See the following articles:
--- [Install Microsoft 365 Apps on all devices](m365bp-users-install-m365-apps.md).-- [Train your users on Microsoft 365](https://support.microsoft.com/topic/train-your-users-on-office-and-microsoft-365-7cba3c97-7f19-46ed-a1c6-763971a26c27)-- [How Safe Links works in Microsoft 365 Apps](/microsoft-365/security/office-365-security/safe-links-about#how-safe-links-works-in-office-apps)-- [Sensitivity bar in Microsoft 365 Apps](/microsoft-365/compliance/sensitivity-labels-office-apps#sensitivity-bar) -
-## 9. Manage calendar sharing for your business
-
-| Subscription | Recommendations |
-|||
-| [Microsoft 365 Business Premium](index.md) | 1. Use Outlook and Exchange Online for email and calendars.<br/>2. [Get started using your default DLP policy](/microsoft-365/compliance/get-started-with-the-default-dlp-policy). |
-| [Microsoft 365 Business Standard](../admin/setup/setup-business-standard.md)<br/>[Microsoft 365 Business Basic](../admin/setup/setup-business-basic.md) | Use Outlook and Exchange Online for email and calendars. |
-
-### How to prevent calendar oversharing
-
-You can help people in your organization share their calendars appropriately for better collaboration. You can manage what level of detail they can share, such as by limiting the details that are shared to free/busy times only, so that users don't accidentally overshare important information.
-
-Microsoft 365 Business Basic, Standard, and Premium include Outlook and Exchange Online.
-
-Microsoft 365 Business Premium also includes [Azure Information Protection Plan 1](/azure/information-protection/what-is-information-protection), and that includes DLP policies to protect sensitive information.
-
-See the following articles:
--- [Manage calendar sharing](m365bp-protect-against-malware-cyberthreats.md#5-manage-calendar-sharing)-- [Get started with the default DLP policy](/microsoft-365/compliance/get-started-with-the-default-dlp-policy) -
-## 10. Maintain your environment
-
-| Subscription | Recommendations |
-|||
-| [Microsoft 365 Business Premium](index.md) | 1. Use the [Microsoft 365 admin center](https://admin.microsoft.com) to view subscription information, updates, and other settings. <br/>2. Use the [Microsoft 365 admin center](https://admin.microsoft.com) or the [Microsoft Entra portal](https://entra.microsoft.com) for managing user accounts.<br/>3. Use the [Microsoft 365 Defender portal](https://security.microsoft.com) and the [Microsoft 365 Purview compliance portal](https://compliance.microsoft.com/) for viewing and managing security & compliance capabilities. If preferred, you can use the [Intune admin center](https://intune.microsoft.com) to view or manage devices. |
-| [Microsoft 365 Business Standard](../admin/setup/setup-business-standard.md)<br/> [Microsoft 365 Business Basic](../admin/setup/setup-business-basic.md) | Use the [Microsoft 365 admin center](https://admin.microsoft.com) to view subscription information, updates, and other settings. If preferred, you can use the [Microsoft Entra portal](https://entra.microsoft.com) to manage user accounts. |
-
-### Why maintenance and operations matter
-
-After your initial setup and configuration of Microsoft 365 for business is complete, your organization needs a maintenance and operations plan. As employees come and go, you'll need to add or remove users, reset passwords, and maybe even reset devices to factory settings. You'll also want to make sure people have only the access they need to do their jobs.
-
-Microsoft 365 Business Basic, Standard, and Premium include the [Microsoft 365 admin center](https://admin.microsoft.com) and the [Microsoft Entra portal](https://entra.microsoft.com) for managing user accounts.
-
-Microsoft 365 Business Premium also includes advanced security and compliance capabilities. You can use the [Microsoft 365 Defender portal](https://security.microsoft.com) or the [Microsoft 365 Purview compliance portal](https://compliance.microsoft.com/) for viewing and managing security & compliance capabilities.
-
-See the following articles:
+- [What is Defender for Business?](../security/defender-business/mdb-overview.md)
-- [Maintain your environment](m365bp-mdb-maintain-environment.md) -- [Security incident management in Microsoft 365 Business Premium](m365bp-security-incident-management.md)-- [Microsoft 365 Business Premium security operations guide](m365bp-security-operations-guide.md)
+- [Microsoft 365 Business PremiumΓÇöcybersecurity for small business](/microsoft-365/business-premium/)
-## See also
+- For more details about Defender for Business and Microsoft 365 Business Premium, see [Compare security features in Microsoft 365 plans for small and medium-sized businesses](../security/defender-business/compare-mdb-m365-plans.md)
-- For more information about what each plan includes, see [Reimagine productivity with Microsoft 365 and Microsoft Teams](https://www.microsoft.com/en-us/microsoft-365/business/compare-all-microsoft-365-business-products-b?ef_id=8c2a86ec9ea514a008c6e419e036519c:G:s&OCID=AIDcmmwf9kwzdj_SEM_8c2a86ec9ea514a008c6e419e036519c:G:s&lnkd=Bing_O365SMB_Brand&msclkid=8c2a86ec9ea514a008c6e419e036519c) and the [Microsoft 365 User Subscription Suites for Small and Medium-sized Businesses](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWR6bM).-- [What is Defender for Business?](../security/defender-business/mdb-overview.md)-- [Microsoft 365 Business PremiumΓÇöcybersecurity for small business](/microsoft-365/business-premium/)-- [Compare security features in Microsoft 365 plans for small and medium-sized businesses](../security/defender-business/compare-mdb-m365-plans.md) (for more details about Defender for Business and Microsoft 365 Business Premium) - [Compare Microsoft endpoint security plans](../security/defender-endpoint/defender-endpoint-plan-1-2.md) (for securing and managing devices)
commerce Change Payment Frequency https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/change-payment-frequency.md
Last updated 05/24/2022
When you buy a subscription, you select a billing frequency. To change how often you are billed for a subscription, use the following steps. > [!NOTE]
-> If you have a billing profile, you can only change the billing frequency when you buy or upgrade a subscription. To find out if you have a billing profile, see [View my billing profiles](manage-billing-profiles.md#view-my-billing-profiles).
+> If you have a billing profile, you can only change the billing frequency when you buy or upgrade a subscription. To find out if you have a billing profile, see [View your billing profiles](manage-billing-profiles.md#view-your-billing-profiles).
1. In the admin center, go to the **Billing**\> <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page. 2. On the **Products** tab, select the subscription that you want to change.
commerce Manage Billing Profiles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/manage-billing-profiles.md
Title: Understand billing profiles
+ Title: Understand your Microsoft business billing profile
+f1.keywords:
+- 'MACBillingBillsPaymentsBillingProfiles'
audience: Admin -- 'MACBillingBillsPaymentsBillingProfiles' ms.localizationpriority: medium
- AdminSurgePortfolio - AdminTemplateSet search.appverid: MET150
-description: "Learn how billing profiles support invoices."
Previously updated : 04/02/2021
+description: "Learn about billing profiles and how they're used to pay invoices for Microsoft business accounts."
Last updated : 07/11/2023
-# Understand billing profiles
+# Understand your Microsoft business billing profile
-A billing profile contains a payment method, Bill-to information, and other invoice settings, such as purchase order number and email invoice preference. You use a billing profile to pay for the products that you buy from Microsoft. Billing profiles are automatically created, and each are invoiced separately.
+A billing profile contains payment method and invoice information associated with your billing account. You use a billing profile to pay for business products and services that you buy from Microsoft. A billing profile is automatically created when a billing account is created. For information about billing accounts, see [Understand your Microsoft billing account](../manage-billing-accounts.md).
> [!NOTE] >
-> Not all accounts have a billing profile. If you're not sure if you have a one, you can [view a list of your billing profiles](manage-billing-profiles.md#view-my-billing-profiles).
+> Not all accounts have a billing profile. If you're not sure if you have a one, you can [view a list of your billing profiles](manage-billing-profiles.md#view-your-billing-profiles).
-## What are billing profile roles?
+## Before you begin
-Roles on billing profiles have permissions to control purchases, and view and manage invoices. Assign these roles to users who track, organize, and pay invoices. For example, members of the procurement team in your organization.
+- You must be a Global or Billing admin to do the tasks in this article. For more information, see [About admin roles](../../admin/add-users/about-admin-roles.md).
+- You must also have any role on the billing account or billing profile. For more information, see [What are billing profile roles?](#what-are-billing-profile-roles) and [What are billing account roles?](../manage-billing-accounts.md#what-are-billing-account-roles)
-| Role | Description |
-|-- | |
-| Billing profile owner | Manage everything for a billing profile |
-| Billing profile contributor | Manage everything except permissions in a billing profile |
-| Billing profile reader | Read-only view of everything in a billing profile |
-| Invoice manager | View and pay bills, and has a read-only view of everything in a billing profile |
-
-## View my billing profiles
+## View your billing profiles
> [!NOTE] > > If you follow these steps and the billing profiles list is empty, it means that you don't have a billing profile, and can't use this feature.
-1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=2102895" target="_blank">Bills & payments</a> page.
-2. Select the **Billing profile** tab, then select a billing profile from the list.
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>.
+ - If you're using the **Simplified view**, select **Subscriptions**, then select **View payment methods**.
+ - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=2102895" target="_blank">Bills & payments</a> page.
+2. On the **Bills & payments** page, select the **Billing profile** tab.
+3. Select a billing profile name to view its details page.
+
+## Understand the billing profile details page
+
+The top of the **Billing profile** details page contains information about the payment method used to pay for the products and services that you buy, and shows details about how we invoice you. You can update your profile to change your payment method, Bill-to address, email address, and phone number.
+
+The following table lists the terms shown on the **Billing profile** details page.
-Each billing profile includes the following information:
+|Field name |Description |
+|-||
+|Name |The name of your billing profile. To change the name, select **Update name**. |
+|Status |A read-only field that shows the status of the billing profile. |
+|Invoice currency |The currency used for your invoice, based on the **Sold-to** country or region of the billing account. |
+|Payment method |The payment method used for the billing profile. To make changes, select **Edit** or **Replace**. |
+|Invoice frequency |Shows how often you receive an invoice. |
+|Backup payment method |Shows the backup payment method, if one exists. |
+|Invoice date |Shows the date the invoice is created. |
+|Billing account |The billing account thatΓÇÖs associated with the billing profile. To view details about the billing account, select the link. For more information about billing accounts, see [Understand billing accounts](../manage-billing-accounts.md). |
+|Get invoices in email statements |A setting you can turn on to receive the invoice as an email attachment. The default setting is **On**. |
+|Bill-to address |Contains the contact name, address, email address, and phone number for the billing profile. |
+|PO number (optional) |If you provide a purchase order (PO) number in this field, it appears on your invoice. |
-- **Billing profile name and status** &ndash; The unique name of the billing profile, and whether the billing profile is active or disabled for purchasing.-- **Invoice settings** &ndash; Currency based on the country of the billing account, information about invoice frequency and date, the option to receive invoices as email attachments, and an optional PO number field-- **Payment methods** &ndash; Shows the primary and backup payment method, if any, for the profile-- **Billing account** &ndash; Name of the billing account the profile is related to. For more information about billing accounts, see [Understand billing accounts](../manage-billing-accounts.md).-- **Contact information** &ndash; Billing address and contact name and email address-- **Billing profile roles** &ndash; A list of people who are assigned one of the billing profile roles to do things for that profile. For example, pay bills, add a PO number, or replace the payment method that is used to make purchases.
+## What are billing profile roles?
+
+The bottom of the **Billing profile** details page contains the **Billing profile roles** section. This section lists the names of the users assigned to specific billing profile roles. Billing profile roles have permissions to control purchases, and view and manage invoices. You can assign these roles to users who track, organize, and pay invoices.
+
+Only a billing profile owner can grant access to billing profile roles. You can assign the following roles to users:
+
+| Role | Description |
+|-- | |
+| Billing profile owner | Can assign roles, edit the billing profile, use it in a purchase, pay bills, and view the billing profile. |
+| Billing profile contributor | Can edit the billing profile, use it in a purchase, pay bills, and view the billing profile. |
+| Billing profile reader | Has a read-only view of everything in a billing profile. |
+| Invoice manager | Can view and pay bills and has a read-only view of everything in a billing profile. |
+
+> [!IMPORTANT]
+>
+> Billing profile roles only apply to billing profiles, and don't apply to other Microsoft 365 admin center scenarios.
+
+## Assign billing profile roles
> [!NOTE] > > You can only assign billing profile roles to users in your organization.
-## Need help? Contact support
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>.
+ - If you're using the **Simplified view**, select **Subscriptions**, then select **View payment methods**.
+ - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=2102895" target="_blank">Bills & payments</a> page.
+2. On the **Bills & payments** page, select the **Billing profile** tab.
+3. Select a billing profile name to view its details page.
+4. On the **Billing profile** details page, under **Billing profile roles**, select **Assign roles**.
+5. In the **Assign roles** pane, type the name or email address, select the role you want to assign to them, then select **Assign**.
+
+## View related role assignments
+
+You can view the roles assigned to users for a billing account and related billing profiles across associated tenants.
-If you have questions or need help with your Azure charges, <a href="https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest" target="_blank">create a support request with Azure support</a>.
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>.
+ - If you're using the **Simplified view**, select **Subscriptions**, then select **View payment methods**.
+ - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=2102895" target="_blank">Bills & payments</a> page.
+2. On the **Bills & payments** page, select the **Billing profile** tab.
+3. Select a billing profile name to view its details page.
+4. On the **Billing profile** details page, under **Billing profile roles**, select **View related role assignments**.
-If you have questions or need help with your billing profile in Microsoft 365 admin center, [contact support](../../admin/get-help-support.md).
+To export the information shown in the **Related billing role assignments** pane, select **Export to CSV**.
## Related content
-[How to pay for your subscription with a billing profile](pay-for-subscription-billing-profile.md) (article)\
-[Understand billing accounts](../manage-billing-accounts.md) (article)\
+[Understand billing accounts](../manage-billing-accounts.md) (article) \
+[How to pay for your subscription with a billing profile](pay-for-subscription-billing-profile.md) (article) \
[Manage payment methods](manage-payment-methods.md) (article)
commerce Manage Billing Accounts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/manage-billing-accounts.md
Title: Understand billing accounts
+ Title: Understand your Microsoft business billing account
f1.keywords:-- NOCSH
+- MACBillingBillingAccountsOverview
-+ audience: Admin
- AdminTemplateSet - admindeeplinkMAC search.appverid: MET150
-description: "Learn about billing accounts and how they're used to manage account settings, invoices, payment methods, and purchases."
Previously updated : 05/24/2022
+description: "Learn about Microsoft business billing accounts and how they're used to manage account settings, invoices, payment methods, and purchases."
Last updated : 07/11/2023
-# Understand your Microsoft billing accounts
+# Understand your Microsoft business billing account
-A billing account is created when you sign up to try or buy Microsoft products. You use your billing account to manage your account settings, invoices, payment methods, and purchases. You can have access to multiple billing accounts. For example, you signed up for Microsoft 365 directly, or you have access to your organization's Enterprise Agreement, Microsoft Product & Services Agreement or Microsoft Customer Agreement. For each of these scenarios, you would have a separate billing account.
+When you sign up to try or buy Microsoft business products, a billing account is automatically created for you. You use your billing account to manage your account settings, invoices, payment methods, and purchases from us.
-The <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a> currently supports the following type of billing accounts:
+You might have access to multiple billing accounts. For example, you can have one billing account when you buy directly from Microsoft, and another when you have access to your organizationΓÇÖs billing account.
-- Microsoft Online Services Program: This billing account is created when you sign up for a Microsoft 365 subscription directly.-- Microsoft Products & Services Agreement (MPSA) Program: This billing account is created when your organization signs an MPSA Volume Licensing agreement to purchase software and online services.-- Microsoft Customer Agreement: This billing account is created when your organization works with a Microsoft representative, an authorized partner, or purchases independently.
+## Before you begin
-The <a href="https://go.microsoft.com/fwlink/p/?linkid=2084771" target="_blank">Billing accounts</a> page provides a view of your commercial accounts with Microsoft. By default, your organization has at least one billing account associated with an agreement that is accepted either at the time of a direct purchase, or through a Volume Licensing arrangement.
+- [Determine what type of billing account you have](#view-my-billing-accounts).
+- If you have a Microsoft Online Subscription Agreement (MOSA) billing account type, you must be a Global or Billing admin to do the tasks in this article. For more information, see [About admin roles](../admin/add-users/about-admin-roles.md).
+- If you have a Microsoft Customer Agreement (MCA) billing account type, you must be a billing account reader to do the tasks in this article. For more information, see [What are billing account roles?](#what-are-billing-account-roles)
-## Understand billing account details
+## What are the types of billing accounts?
-The top of the **Billing accounts** detail page is your account profile and contains legal and tax information about your organization. You can update your profile to change your legal address and phone number. This account is the legal entity that pays for the products that you purchase.
+The <a href="https://go.microsoft.com/fwlink/p/?linkid=2084771" target="_blank">Billing accounts</a> page in the Microsoft 365 admin center provides a view of your business accounts with Microsoft. The following types of billing accounts are supported:
-The following table lists the important terms that you see in the **Billing accounts** detail page.
+- **Microsoft Online Subscription Agreement (MOSA)**: This billing account was created when you signed up for a Microsoft 365 subscription directly. You might have a MOSA billing account if your account hasnΓÇÖt yet moved to the Microsoft Customer Agreement. For MOSA billing accounts, you receive an invoice for each order, on the account anniversary.
+- **Microsoft Customer Agreement (MCA)**: This billing account is created when your organization works with a Microsoft representative, an authorized partner, or buys products and services independently. For MCA billing accounts, you have a corresponding billing profile that contains your subscriptions. You receive one invoice per billing profile, between the 5th and 9th day of the month.
-| Field name | Description |
-|||
-| Sold-to address | The legal entity responsible for payment and identified on the invoice. The address provided here is used to determine your tax rate unless you opt to provide an alternative shipping address during your purchase. For more information, see [Tax information](billing-and-payments/tax-information.md). |
-| Segment | A read-only field that identifies the business segment of your organization (Commercial, Education, Government, or Non-profit). |
-| Account status | A read-only field that specifies the status of your commercial account with Microsoft. |
-| Tax ID | If you are outside the United States, you must provide a VAT or local equivalent. For more information, see [Tax information](billing-and-payments/tax-information.md). |
-| Agreement | When a billing account is created, either through a direct purchase or a Volume Licensing arrangement, a signatory for the organization accepts, or signs, an agreement that outlines the terms & conditions of the account. If applicable, this view lists an agreement history. If you're required to accept updated terms, a link for **Approve agreement** is displayed. |
-| Billing profiles | A billing profile defines properties of your invoice, like who receives the bill, how the bill is delivered, payment terms, and a PO number. To distribute billing across your organization, you can create multiple billing profiles and identify the appropriate billing profile at the time of purchase. For more information about billing profiles and how you can use them to build more flexible billing options for your organization, [Understand billing profiles](billing-and-payments/manage-billing-profiles.md). |
+## View my billing accounts
+
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>.
+2. Select the **Navigation menu**, then select **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=2084771" target="_blank">Billing accounts</a>.
+3. The **Billing accounts** page lists the billing accounts associated with your organization.
+4. The **Billing account type** column indicates what type of agreement you signed with Microsoft for each billing account. Select a billing account name to view its details page.
+
+## Understand the billing account details page
+
+The top of the billing account details page contains your account profile and shows the legal and tax information about your organization. You can update your profile to change your legal address and phone number. This account is the legal entity that pays for the products that you buy from Microsoft.
+
+The following table lists the terms shown on the billing account details page.
+
+|Field name |Description |
+|||
+|ID |The unique identifier for your billing account. |
+|Name |The name of your billing account. To change the name, select **Update name**. |
+|Account status |A read-only field that specifies the status of your commercial account with Microsoft. |
+|Sold-to |The details of the legal entity responsible for payment and identified on the invoice. This section contains the name and address of the individual or organization responsible for the account, together with a contact email address and phone number. The address provided here is used to determine your tax rate unless you opt to provide an alternative shipping address during your purchase. For more information, see [Tax information](billing-and-payments/tax-information.md). |
+|Tax ID |This field only applies if youΓÇÖre in a country or region that requires you to provide a VAT or local equivalent. For more information, see [Tax information](billing-and-payments/tax-information.md). |
+|Billing profiles |The link goes to the list of billing profiles associated with the current billing account. A billing profile defines the properties of your invoice, like who receives the bill, how the bill is delivered, payment terms, and an optional purchase order (PO) number. For more information about billing profiles, see [Understand your Microsoft business billing profile](billing-and-payments/manage-billing-profiles.md). |
+|Registration number (Optional) |A legal registration number that you provide to us so we can review the details of your account. For more information, see [About registration numbers and under-review notifications](about-registration-numbers.md). To add a registration number, select **Edit**. |
> [!NOTE]
-> If you need to change the **Sold-to** name or address, but don't see an **Edit** link, you must [contact support](../admin/get-help-support.md) to change it. Requests for a **Sold-to** name change will require a credit check. Complete [this form](https://www.microsoft.com/download/details.aspx?id=102732), and be ready to share one of following documents with Microsoft when you contact support:
+> If you need to change the **Sold-to** name, you must [contact support](../admin/get-help-support.md) to change it. Requests to change the **Sold-to** name require a credit check. Complete [this form](https://www.microsoft.com/download/details.aspx?id=102732), and be ready to share one of following documents with Microsoft when you contact support:
> > - Government-issued document or registration letter > - Print out of the local company's registry >
-> Support can help with name and address changes where only the customer name changes, but the entity remains the same. Documentation provided should clearly show that only the entity's name has changed. If the change is the result of a transaction, including the sale of business, a change of controls, or a divestiture or "spinoff" of a Customer Affiliate, please contact your Microsoft Seller.
+> Support can help with name and address changes where only the customer name changes, but the entity remains the same. Any documentation you provide should clearly show that only the entityΓÇÖs name has changed. If the change is the result of a transaction, including the sale of a business, a change of controls, or a divestiture or ΓÇ£spinoffΓÇ¥ of a Customer Affiliate, please contact your Microsoft Seller or Microsoft support.
+
+## What are billing account roles?
+
+If you have an MCA billing account type, the bottom of the billing account details page includes a **Billing account roles** tab. This section lists the names of the users and admin center roles assigned to specific billing account roles. Billing account roles are specific to billing accounts and provide different levels of access to the billing account for your organization.
+
+> [!IMPORTANT]
+> Billing account roles only apply to billing accounts, and don't apply to other Microsoft 365 admin center scenarios.
+
+You can provide others with access to the billing account in the Microsoft 365 admin center through the billing account roles and permissions. For instructions about how to grant billing account access to other users, see [Assign billing account roles](#assign-billing-account-roles).
+
+Only a billing account owner can grant access to a billing account. You can assign the following roles to users:
+
+|Role |Description |
+|-||
+|Billing account owner |Can assign roles, edit accounts, sign agreements, and view accounts. |
+|Billing account contributor |Can edit accounts, sign agreements, and view accounts. |
+|Billing account reader |Can view accounts. |
+
+## Assign billing account roles
+
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>
+2. Select the **Navigation menu**, then select **Billing** > **Billing accounts**.
+3. On the <a href="https://go.microsoft.com/fwlink/p/?linkid=2084771" target="_blank">Billing accounts</a> page, select the billing account.
+4. Under **Billing account roles**, select **Assign roles**.
+5. In the **Assign roles** pane, type the name or email address, select the role you want to assign to them, then select **Assign**.
-## Shipping addresses
+## View related role assignments
-This section lists the shipping addresses associated with your billing account. When you make a purchase, you can use this address to identify where your purchase is shipped or used. The shipping address is editable. You can add a shipping address or update the existing address. This address is used to determine the tax rate for your purchase.
+You can view the roles assigned to users for a billing account and related billing profiles across associated tenants.
-## Understand access to billing accounts
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>
+2. Select the **Navigation menu**, then select **Billing** > **Billing accounts**.
+3. On the <a href="https://go.microsoft.com/fwlink/p/?linkid=2084771" target="_blank">Billing accounts</a> page, select a billing account.
+4. Under **Billing account roles**, select **View related role assignments**.
-You can provide others with access to the billing account in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a> through roles and permissions. Only a billing account owner can grant access to a billing account. You can assign one of the following roles to users:
+To export the information shown in the **Related billing role assignments** pane, select **Export to CSV**.
-- **Billing account owner** &mdash; Can assign permissions, edit accounts, sign agreements, and view accounts.-- **Billing account contributor** &mdash; Can edit accounts, sign agreements, and view accounts.-- **Billing account reader** &mdash; Can view accounts.
+## What are associated billing tenants?
-> [!Note]
-> - Billing account roles only apply to billing accounts, and don't apply to other Microsoft 365 admin center scenarios.
-> - For billing accounts created inside of Microsoft 365 sign-up, new Global, Billing and Global Reader Administrators are automatically granted distinct levels of access. You can manage this access from the **Billing** > **Billing accounts** page by explicitly removing those users from the role assignment section at the bottom of the page.
+If you have an MCA billing account type, you can give users from other tenants access to collaborate on a single set of resources across all products. For more information about associated billing tenants and how to add and assign roles to them, see [Manage billing across multiple tenants in the Microsoft 365 admin center](billing-and-payments/manage-multi-tenant-billing.md).
## Related content
commerce Cancel Your Subscription https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/cancel-your-subscription.md
This article only applies to canceling **Dynamics 365**, **Intune**, **Power Pla
## Before you begin - You must be a Global or Billing admin to do the tasks in this article. For more information, see [About admin roles](../../admin/add-users/about-admin-roles.md).-- If you have a billing profile, you must also be a billing account owner or billing account contributor to do the tasks in this article. [Find out if you have a billing profile](../billing-and-payments/manage-billing-profiles.md#view-my-billing-profiles). For more information about billing account roles, see [Understand access to billing accounts](../manage-billing-accounts.md).
+- If you have a billing profile, you must also be a billing account owner or billing account contributor to do the tasks in this article. [Find out if you have a billing profile](../billing-and-payments/manage-billing-profiles.md#view-your-billing-profiles). For more information about billing account roles, see [Understand access to billing accounts](../manage-billing-accounts.md).
- If you added your own domain name to use with your subscription, you must [remove the domain](../../admin/get-help-with-domains/remove-a-domain.md) before you cancel your subscription. - If you have a domain subscription, to prevent any other charges for that subscription, [turn off recurring billing](renew-your-subscription.md).
If your organization is in Chile, and you bought your subscription through a par
## Determine your cancellation options > [!IMPORTANT]
-> Before you continue, [determine if you have a billing profile](../billing-and-payments/manage-billing-profiles.md#view-my-billing-profiles).
+> Before you continue, [determine if you have a billing profile](../billing-and-payments/manage-billing-profiles.md#view-your-billing-profiles).
### If you have a billing profile
commerce Upgrade To Different Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/upgrade-to-different-plan.md
When your business needs change, or you want more features, you can change to a
## Before you begin - You must be a Global or Billing admin to do the steps in this article. For more information, see [About admin roles in the Microsoft 365 admin center](../../admin/add-users/about-admin-roles.md)-- If you have a billing profile, you must be a billing account owner or billing account contributor. [Find out if you have a billing profile](../billing-and-payments/manage-billing-profiles.md#view-my-billing-profiles). For more information about billing account roles, see [Understand access to billing accounts](../manage-billing-accounts.md#understand-access-to-billing-accounts).
+- If you have a billing profile, you must be a billing account owner or billing account contributor. [Find out if you have a billing profile](../billing-and-payments/manage-billing-profiles.md#view-your-billing-profiles). For more information about billing account roles, see [What are billing account roles?](../manage-billing-accounts.md#what-are-billing-account-roles).
## When should I change plans?
Changing plans is the right choice when you want to move all users assigned to a
## Automatically change your subscription to a new plan > [!IMPORTANT]
-> Before you continue, [determine if you have a billing profile](../billing-and-payments/manage-billing-profiles.md#view-my-billing-profiles).
+> Before you continue, [determine if you have a billing profile](../billing-and-payments/manage-billing-profiles.md#view-your-billing-profiles).
### If you don't have a billing profile
commerce Try Or Buy Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/try-or-buy-microsoft-365.md
- admindeeplinkMAC - adminvideo search.appverid: GEA150
-description: "Sign up for a free 30-day trial for Microsoft 365 Business Standard, Microsoft 365 Business Premium, or Microsoft 365 Apps for business."
Previously updated : 08/07/2020
+description: "Learn how to sign up for a free 30-day trial or buy a subscription for Microsoft 365 for business products and services."
Last updated : 07/11/2023 # Try or buy a Microsoft 365 for business subscription
-Check out all of our small business content on [Small business help & learning](https://go.microsoft.com/fwlink/?linkid=2224585).
+Check out all of our small business content on [Small business help & learning](https://go.microsoft.com/fwlink/p/?linkid=2224585) and our [Microsoft 365 small business help](https://go.microsoft.com/fwlink/p/?linkid=2197659) on YouTube.
-Check out [Microsoft 365 small business help](https://go.microsoft.com/fwlink/?linkid=2197659) on YouTube.
-
-Microsoft 365 for business is a subscription service that lets you run your organization in the cloud while Microsoft takes care of the IT for you. Microsoft manages devices, protects against real-world threats, and provides your organization with the latest in business software. You can sign up for a free trial subscription for Microsoft 365 Business Standard, Microsoft 365 Business Premium, or Microsoft 365 Apps for business and try it out for 30 days.
+Microsoft 365 for business is a subscription service that lets you run your organization in the cloud while Microsoft takes care of the IT for you. We manage your devices, protect against real-world threats, and provide your organization with the latest in business software. You can sign up for a free trial subscription for Microsoft 365 Business Basic, Microsoft 365 Business Standard, Microsoft 365 Business Premium, or Microsoft 365 Apps for business and try it out for 30 days.
> [!NOTE]
-> You must use a credit card when you sign up for a free trial. At the end of your free trial period, your trial subscription is automatically converted to a paid subscription. Your credit card isn't billed until the end of the trial period.
-
+> You must use a credit or debit card when you sign up for a free trial. At the end of your free trial period, your trial subscription is automatically converted to a paid subscription. Your card isn't billed until the trial period ends.
-> [!IMPORTANT]
-> **Payment options for Office 365 operated by 21Vianet in China**
-> International credit cards are not accepted. You can pay for your subscription by:
->
-> - Invoice
-> - Online payment using Alipay or China UnionPay
-> Proof of payment will be provided in the form of Fapiaos. You can submit your Fapiao request to our [Fapiao system](https://go.microsoft.com/fwlink/p/?LinkId=395314) about three (3) days after you have paid. For more information, see [Apply for a Fapiao for Office 365 operated by 21Vianet](../admin/services-in-chin).
+## Need help with choosing a plan?
+Choosing a plan depends on your specific business needs. The [Microsoft 365 plan chooser](https://go.microsoft.com/fwlink/p/?linkid=2224446) helps you select a plan. The tool makes recommendations based on your answers to questions about things like the size of your business, your field of work, the devices that you use, and what kind of features, IT support, and security that you're looking for.
## Before you begin
-You don't need an existing Microsoft account to sign up for a free trial. For all other procedures in this article, you must be a Global or Billing admin for your organization. For more information, see [About admin roles](../admin/add-users/about-admin-roles.md).
+You don't need an existing Microsoft account to sign up for a free trial.
+
+For all other procedures in this article, the following items are required:
+
+- You must have a Microsoft account, and you must be a Global or Billing admin for your organization. For more information, see [About admin roles](../admin/add-users/about-admin-roles.md).
+- [Find out what type of billing account you have](manage-billing-accounts.md#view-my-billing-accounts).
+- If you have a Microsoft Customer Agreement (MCA) billing account type, you must also be a billing account owner or contributor to do the tasks described in this article. For more information, see [Understand billing accounts](manage-billing-accounts.md) and [Understand billing profiles](billing-and-payments/manage-billing-profiles.md).
++
+## Payment options for Office 365 operated by 21Vianet in China
+
+International credit cards aren't accepted. You can pay for your subscription by:
+
+- Invoice
+- Online payment using Alipay or China UnionPay
-### Need help with choosing a plan?
+Proof of payment is provided in the form of Fapiaos. You can submit your Fapiao request to our [Fapiao system](https://go.microsoft.com/fwlink/p/?LinkId=395314) about three (3) days after you have paid. For more information, see [Apply for a Fapiao for Office 365 operated by 21Vianet](../admin/services-in-chin).
-Deciding on a plan can depend on your specific business needs. The Microsoft 365 plan chooser is designed to help you with this. The chooser will make recommendations based on your answers to questions such as the size of your business, your field of work, the devices you use, and what kind of features, IT support, and security you're looking for. See [Help me find the right plan for my business](https://go.microsoft.com/fwlink/p/?linkid=2224446).
## Try a free trial subscription
-Use these steps to create an account and sign up for a free trial subscription of Microsoft 365 Business Standard, Microsoft 365 Business Premium, or Microsoft 365 Apps for business.
+To create an account and sign up for a free trial subscription of Microsoft 365 Business Basic, Microsoft 365 Business Standard, Microsoft 365 Business Premium, or Microsoft 365 Apps for business, use the following steps.
-1. Go to the <a href="https://www.aka.ms/office365signup" target="_blank">Microsoft 365 Products site</a>.
-2. Select the plan that you want to sign up for, such as **Microsoft 365 Business Standard**, scroll down the page, and select **Try free for 1 month**.
+1. Go to the <a href="https://www.aka.ms/office365signup" target="_blank">Microsoft 365 Products</a> site.
+2. Select the plan that you want, such as **Microsoft 365 Business Standard**, scroll down the page, and select **Try free for 1 month**.
3. On the next page, follow the steps to set up your account.
-4. The sign-up process may take several minutes to complete. After it's complete, you're ready to start the setup wizard for your subscription. For more information about setting up your subscription, see [Next steps](#next-steps).
-## Buy a subscription from your free trial
+The sign-up process might take several minutes to complete. After it's complete, you're ready to start the setup wizard for your subscription. For more information about setting up your subscription, see [Next steps](#next-steps).
-At the end of your free trial period, your trial subscription automatically converts to a paid subscription. The paid subscription defaults to the plan you currently have. You can buy a different plan by following the steps in [Buy a different subscription](#buy-a-different-subscription).
+When you start a free trial, we automatically create a billing account for you. You use your billing account to manage your account settings, invoices, payment methods, and purchases. For more information about billing accounts, see [Understand billing accounts](manage-billing-accounts.md).
-If you want to buy your subscription before your trial is over, use these steps:
+## Extend your trial
-1. In the Microsoft 365 admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page.
-2. On the **Your products** page, find the subscription that you want to buy.
-3. In the **Licenses** section, select **Purchase subscription**.
-4. Choose a billing frequency for your subscription, then select **Checkout**.
-5. On the next page, verify the subscription, and select **Checkout**.
-6. On the next page, verify the **Sold to** address, the **Billed to** information, and **Items in this order**. If you need to make any changes, select **Change** next to the applicable section.
-7. When you\'re finished, select **Accept agreement & place order**.
+Do you need more time to try out the features of Microsoft 365 for business before buying? If your trial subscription is within 15 days of expiring and hasn't been extended yet, you can extend your trial for another 30-day period. You can only do this one time.
-## Extend your trial
+[Find out what type of billing account you have](manage-billing-accounts.md).
-Do you need more time to try out the features of Microsoft 365 for business before buying? If your trial subscription is within 15 days of expiring and the trial hasn't been extended before then you can extend your trial for another 30 day period. You can only do this one time.
+**If you have an MCA billing account type:**
-1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page.
-2. On the **Products** tab, select the trial subscription that you want to extend.
-3. On the subscription details page, in the **Subscriptions and payment settings** section, select **Extend end date**.
-4. In the **Extend end date** pane, review the extension information, and if necessary, select a payment method. When you're finished, select **Extend trial**.
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>.
+ - If you're using the **Simplified view**, select **Subscriptions**, then select your trial subscription.
+ - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page and select the trial subscription that you want to extend.
+2. On the subscription details page, in the **Trial subscription** section, select **Extend trial end date**.
+3. In the **Extend your trial's end date** pane, review the extension information, and, if necessary, select a payment method.
+4. Select **Extend trial**.
-When you're ready to buy, see [Buy your trial version](#buy-a-subscription-from-your-free-trial).
+**If you have a MOSA billing account type:**
-## Cancel your free trial subscription
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>.
+ - If you're using the **Simplified view**, select **Subscriptions**, then select your trial subscription.
+ - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page and select the trial subscription that you want to extend.
+2. On the subscription details page, in the **Subscription and payment settings** section, select **Extend end date**.
+3. In the **Extend end date** pane, select a payment method to use, or add a new one.
+4. Select **Extend trial**.
-If you decide to cancel your trial subscription before the free trial period ends, go to the Microsoft 365 admin center and [turn off Recurring billing](subscriptions/renew-your-subscription.md#turn-recurring-billing-off-or-on). The trial will automatically expire when your month ends, and your credit card won't be charged.
+## Buy a subscription from your free trial
-## Try a different subscription
+At the end of the free trial period, most trial subscriptions automatically convert to a paid subscription. The paid subscription defaults to the plan that you currently have. You can buy a different plan by following the steps in [Buy a different subscription](#buy-a-different-subscription).
-If you already have a Microsoft 365 for business subscription, you can use the Microsoft 365 admin center to try a different subscription.
+If you want to buy your subscription before your trial is over, use the following steps.
-When you add a subscription through the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>], the new subscription is associated with the same organization (domain namespace) as your existing subscription. This association makes it easier to move users in your organization between subscriptions, or to assign them a license for the additional products they need.
+[Find out what type of billing account you have](manage-billing-accounts.md).
-1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=868433" target="_blank">Purchase services</a> page.
-2. On the **Purchase services** page, you see the plans that are available to your organization. Choose the Microsoft 365 plan that you want to try.
-3. On the next page, select **Get free trial**. The trial gives you 25 user licenses for a one-month term.
-4. Choose to receive a text or a call, enter your phone number, then choose **Text me** or **Call me**.
-5. Enter the verification code, then select **Start your free trial**.
-6. On the **Check out** page, select **Try now**.
-7. On the **order receipt** page, select **Continue**.
+**If you have an MCA billing account type:**
-## Buy a different subscription
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>.
+ - If you're using the **Simplified view**, select **Subscriptions**, then select your trial subscription.
+ - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page and select the trial subscription that you want to buy.
+2. On the subscription details page, select **Start a paid subscription now**.
+3. In the **Start a paid subscription now** pane, enter the number of licenses that you want, select a subscription length and billing frequency, then select **Change plan**.
-If you already have a Microsoft 365 for business subscription, you can go through the Microsoft 365 admin center to buy a different subscription for your organization.
+**If you have a MOSA billing account type:**
-### Watch: Move users to a different subscription
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>.
+ - If you're using the **Simplified view**, select **Subscriptions**, then select your trial subscription.
+ - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page and select the trial subscription that you want to buy.
+2. On the subscription details page, in the **License** section, select **Buy paid subscription now**.
+3. In the **Buy subscription** pane, choose a monthly or annual commitment for your subscription, then select **Checkout**.
+4. On the **Checkout** page, verify the information, including **Items in this order**, then select **Place order**.
-Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198013).
+## Cancel your free trial subscription
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE1SBE2?autoplay=false]
+If you decide to cancel your trial subscription before the free trial period ends, go to the Microsoft 365 admin center and [turn off recurring billing](subscriptions/renew-your-subscription.md#turn-recurring-billing-off-or-on). The trial automatically expires when your month ends, and your credit card isn't charged.
-As your users change roles, they may need features that aren't available in their current Microsoft 365 Business Premium subscription. When this happens, you can add a new subscription that includes those features, and assign licenses to the people who need them.
+## Try a different subscription
-> [!NOTE]
-> For some subscriptions, you can only cancel during a limited window of time after you buy or renew your subscription. If the cancellation window has passed, turn off recurring billing to cancel the subscription at the end of its term.
+If you already have a Microsoft 365 for business subscription, you can use the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a> to try a different subscription.
+
+When you add a subscription through the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>, the new subscription is associated with the same organization (domain namespace) as your existing subscription. This association makes it easier to move users in your organization between subscriptions, or to assign them a license for the other products they need.
+
+[Find out what type of billing account you have](manage-billing-accounts.md).
+
+**If you have an MCA billing account type:**
+
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>.
+ - If you're using the **Simplified view**, select **Subscriptions**, then select **Add more products**.
+ - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=868433" target="_blank">Purchase services</a> page.
+2. On the **Purchase services** page, find the plan that you want to try, and select **Details**.
+3. In the **Select a plan** drop-down list, select the trial plan.
+4. Enter the number of licenses that you want to buy when the trial ends.
+ > [!NOTE]
+ > All trial subscriptions include 25 free licenses for the duration of the trial period.
+5. Select **Start free trial**.
+6. In the **Checkout** pane, choose the billing profile that you want to use, or add a new one.
+7. The **Product name** section lists the cost, subscription term, number of licenses, and renewal date for the trial subscription. To match the renewal date with another subscription paid by the billing profile, select **Select a different renewal date**.
+8. If necessary, change the number of licenses that you want to buy when the trial ends.
+9. When you're ready, select **Place order**.
+
+**If you have a MOSA billing account type:**
+
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>.
+ - If you're using the **Simplified view**, select **Subscriptions**, then select **Add more products**.
+ - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=868433" target="_blank">Purchase services</a> page.
+2. On the **Purchase services** page, find the plan that you want to try, and select **Details**.
+3. On the next page, enter the number of licenses that you want to buy when the trail ends, then select **Start free trial**.
+ > [!NOTE]
+ > All trial subscriptions include 25 free licenses for the duration of the trial period.
+4. Choose to receive a text or a call, enter your phone number, then choose **Text me** or **Call me**.
+5. Enter the verification code, then select **Start your free trial**.
+6. On the **Check out** page, select **Try now**.
+7. On the order receipt page, select **Continue**.
+
+## Buy a different subscription
+
+As your users change roles, they might need features that aren't available in their current Microsoft 365 for business subscription. When this happens, you can add a new subscription that includes those features and assign licenses to the people who need them.
-When you buy another subscription through the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>, the new subscription is associated with the same organization (domain name space) as your existing subscription. This makes it easier to move users in your organization between subscriptions or assign them a license for the additional subscription they need.
+When you buy another subscription through the Microsoft 365 admin center, the new subscription is associated with the same organization (domain namespace) as your existing subscription. This association makes it easier to [move users in your organization between subscriptions](subscriptions/move-users-different-subscription.md), or to [assign them a license](../admin/manage/assign-licenses-to-users.md) for another subscription they need.
-1. In the admin center, go to the **Billing** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=868433" target="_blank">Purchase services</a> page.
-2. On the **Purchase services** page, select the plan that you want to buy, select **Details**, then select **Buy**.
-3. Enter the number of licenses that you need and choose whether to pay each month or for the whole year. Choose whether you want to automatically assign licenses to everyone who does not currently have a license. Then select **Check out now**.
-4. Review the pricing information and select **Next**.
-5. Provide your payment information, and then select **Place order** \> **Go to Admin Home**.
+If you want to move all of your users to a different subscription, see [Upgrade or change to a different Microsoft 365 for business plan](subscriptions/upgrade-to-different-plan.md).
> [!NOTE]
-> You must move users from your free trial subscription to the new subscription before your 90-day grace period ends after your trial subscription expires. By doing this, you keep your data, accounts, and configuration. Otherwise, that information is deleted.
+> You must move users from your free trial subscription to the new subscription before your 90-day grace period ends after your trial subscription expires. By doing this, you keep your data, accounts, and configuration. Otherwise, that information is deleted at the end of 90 days.
+[Find out what type of billing account you have](manage-billing-accounts.md).
-## Payment options
+**If you have an MCA billing account type:**
-You can pay for your subscription by:
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>.
+ - If you're using the **Simplified view**, select **Subscriptions**, then select **Add more products**.
+ - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=868433" target="_blank">Purchase services</a> page.
+2. On the **Purchase services** page, select the plan that you want to buy, then select **Details**.
+3. On the product details page, in the **Select a plan** drop-down list, select the plan, and enter the number of licenses that you want to buy. Select a subscription length and billing frequency, then select **Buy**.
+4. In the **Checkout** pane, choose the billing profile that you want to use, or add a new one.
+5. The **Product name** section lists the cost, subscription term, number of licenses, and renewal date for the subscription. To match the renewal date with another subscription paid by the billing profile, select **Select a different renewal date**.
+6. Select **Place order**.
-- Invoice
+**If you have a MOSA billing account type:**
-- Online payment using Alipay or China UnionPay
+Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198013).
-Proof of payment will be provided in the form of Fapiaos. You can submit your Fapiao request to our [Fapiao system](https://go.microsoft.com/fwlink/p/?LinkId=395314) about three (3) days after you have paid. For more information, see [Apply for a Fapiao for Office 365 operated by 21Vianet](../admin/services-in-chin).
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE1SBE2?autoplay=false]
-> [!NOTE]
-> International credit cards are not accepted.
+1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>.
+ - If you're using the **Simplified view**, select **Subscriptions**, then select **Add more products**.
+ - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=868433" target="_blank">Purchase services</a> page.
+2. On the **Purchase services** page, select the plan that you want to buy, then select **Details**.
+3. On the product details page, enter the number of licenses that you need, select a billing frequency, then select **Buy**.
+4. On the **Checkout** page, verify the **Sold to** information. Select a payment method or add a new one. Verify the number of licenses that you need, then select **Place order**.
## Next steps
If you have a new account and are setting up your first subscription, you can us
If you already have a subscription and are adding a new subscription, you can move users to it. To learn how, see [Move users to a different subscription](subscriptions/move-users-different-subscription.md).
+If you upgraded to Microsoft 365 Business Premium, use the steps in the Business Premium library to set up your new security capabilities.
+
+>[!div class="nextstepaction"]
+>[Visit the Microsoft 365 Business Premium library](/microsoft-365/business-premium/index)
+ ## Related content
-[Microsoft 365 for business training videos](https://support.office.com/article/6ab4bbcd-79cf-4000-a0bd-d42ce4d12816) (video)\
-[Add users and assign licenses at the same time](../admin/add-users/add-users.md) (article)\
-[Assign licenses to users](../admin/manage/assign-licenses-to-users.md) (article)\
-[Upgrade to a different plan](subscriptions/upgrade-to-different-plan.md) (article)\
-[Buy or edit an add-on for Microsoft 365 for business](buy-or-edit-an-add-on.md) (article)\
+[Microsoft 365 for business training videos](https://support.office.com/article/6ab4bbcd-79cf-4000-a0bd-d42ce4d12816) (video) \
+[Add users and assign licenses at the same time](../admin/add-users/add-users.md) (article) \
+[Assign licenses to users](../admin/manage/assign-licenses-to-users.md) (article) \
+[Upgrade to a different plan](subscriptions/upgrade-to-different-plan.md) (article) \
+[Buy or edit an add-on for Microsoft 365 for business](buy-or-edit-an-add-on.md) (article) \
[Add storage space for your subscription](add-storage-space.md) (article)
commerce Understand Proposal Workflow https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/understand-proposal-workflow.md
You use a billing account to manage your account settings, invoices, billing pro
Billing account permissions are managed by the billing account owner. Global admins can assign themselves to the billing account owner role, and then make other people billing account owners.
-For more information about billing accounts, see [Manage billing accounts](manage-billing-accounts.md).
+For more information about billing accounts, see [Understand your Microsoft business billing account](manage-billing-accounts.md).
### Microsoft Customer Agreement
The billing account owner and billing account contributor roles are assigned by
3. In the **Add permission** pane, select the **Role** to assign to the user. 4. Select the user, then select **Save**.
-For more information about billing account roles, see [Understand access to billing accounts](manage-billing-accounts.md#understand-access-to-billing-accounts).
+For more information about billing account roles, see [What are billing account roles?](manage-billing-accounts.md#what-are-billing-account-roles).
If this is a new billing account, and no one has accepted an agreement, you automatically become the billing account owner, provided you:
After you sign in, the first thing you do is review your organization's informat
The **Your organization** section displays the billing account associated with it. The billing account information is either pulled from an existing billing account or created for you by the Microsoft representative. If your organization is an affiliate of another organization, you also see a **Lead organization** section with the name and address of that organization.
-If this order is the first time your organization is establishing a commercial relationship with Microsoft, and you haven't yet signed an MCA, if the information under **Your organization** or **Lead organization** is incorrect, contact the representative to make changes for you. After you've accepted an MCA, you can review and change your organization's address and contact information on the [Billing accounts](https://go.microsoft.com/fwlink/p/?linkid=2084771) page in the Microsoft 365 admin center. If your organization name changes, open a support request to have it updated. [Learn how to open a support request](../admin/get-help-support.md).
+If this order is the first time your organization is establishing a commercial relationship with Microsoft, and you haven't yet signed an MCA, if the information under **Your organization** or **Lead organization** is incorrect, contact the representative to make changes for you. After you've accepted an MCA, you can review and change your organization's address and contact information on the <a href="https://go.microsoft.com/fwlink/p/?linkid=2084771" target="_blank">Billing accounts</a> page in the Microsoft 365 admin center. If your organization name changes, open a support request to have it updated. [Learn how to open a support request](../admin/get-help-support.md).
### Your information
compliance Apply Retention Labels Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-retention-labels-automatically.md
f1.keywords:
Previously updated : 06/23/2023 Last updated : 07/11/2023 audience: Admin
Unlike simulation mode for automatically applying sensitivity labels:
- Simulation mode is optional, and not required to complete before you turn on the policy. You can even turn on the policy while simulation is still running. - When simulation completes, the results automatically expire within 7 days. Then, to view samples for your policy, you must restart the simulation.
-Other considerations for simulation mode for auto-apply retention policies:
+Other considerations for simulation mode for auto-apply retention label policies:
- A maximum of 30 simulation jobs can be active in a 12-hour time period. - A maximum of 100 item samples can be collected per mailbox.
Other considerations for simulation mode for auto-apply retention policies:
- Because these scopes use dynamic queries that run daily and can take a few days to fully populate, wait and [confirm their membership](purview-adaptive-scopes.md#confirm-scope-membership) before you start simulation. - For the **Microsoft 365 Group mailboxes & sites** location, items stored in [AuxPrimary mailboxes](/powershell/module/exchange/get-mailboxlocation#-mailboxlocationtype) aren't supported. - You might need to be assigned additional permissions to see the simulation results. For information about the required roles, see the next section, [Before you begin](#before-you-begin).
+- If you're using [administrative units](microsoft-365-compliance-center-permissions.md#administrative-units): Currently, simulation mode doesn't support policies that are configured for selected administrative units. Policies with this configuration can be turned on, but if you want to first run them in simulation, select the full directory option.
- Simulation counts all items matching the policy criteria at time of simulation. However, when the policy is turned on, only content that isn't already labeled will be eligible for auto-applying retention labels. - Although auto-labeling for sensitive information types applies to emails sent and received rather than emails stored in mailboxes, simulation for Exchange locations runs against against emails stored in mailboxes. Using historical data lets you more quickly assess the effectiveness of your chosen sensitive information types and configuration. - For the **Microsoft 365 Group mailboxes & sites** and **OneDrive accounts** locations: Items that are stored in [arbitration mailboxes](/powershell/module/exchange/new-mailbox#-arbitration) aren't supported for simulation.
compliance Audit Log Encrypted Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-log-encrypted-messages.md
Access log can be enabled using [Exchange Online PowerShell](/powershell/exchang
- $true: Turn on audit feature. - $false: Turn off audit feature
-Example: Set-IrmConfiguration -EnablePortalTrackingLogs $true
+Example:
+
+```powershell
+Set-IrmConfiguration -EnablePortalTrackingLogs $true
+```
To learn more, see [Set-IRMConfiguration (ExchangePowerShell)](/powershell/module/exchange/set-irmconfiguration).
compliance Dlp Alerts Dashboard Learn https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-alerts-dashboard-learn.md
Here are some of the events associated with an alert. In the UI, you can choose
## Investigate DLP incidents in Microsoft 365 Defender portal
-Incidents for Microsoft Purview Data Loss Prevention (DLP) can be managed in the Microsoft 365 Defender portal. See, [Investigate data loss incidents with Microsoft 365 Defender](../security/defender/investigate-dlp.md) for details. You can manage DLP incidents along with security incidents from **Incidents & alerts** > **Incidents** on the quick launch of the Microsoft 365 Defender portal.
+Incidents for Microsoft Purview Data Loss Prevention (DLP) can be managed in the Microsoft 365 Defender portal. See, [Investigate data loss incidents with Microsoft 365 Defender](../security/defender/dlp-investigate-alerts-defender.md) for details. You can manage DLP incidents along with security incidents from **Incidents & alerts** > **Incidents** on the quick launch of the Microsoft 365 Defender portal.
From this page, you can:
compliance Dlp Learn About Dlp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-learn-about-dlp.md
Microsoft 365 provides you with visibility into risky user activities outside of
Microsoft 365 scans the audit logs for risky activities and runs them through a correlation engine to find activities that are occurring at a high volume. No DLP policies are required.
-To get more details on the items that users are copying or moving outside of your organization (called egress activities, or exfiltration), select the **Learn more** link on the card to open a details pane. You can investigate incidents for Microsoft Purview Data Loss Prevention (DLP) from the Microsoft 365 Defender portal **Incidents & alerts** > **Incidents**. See [Investigate data loss incidents with Microsoft 365 Defender](../security/defender/investigate-dlp.md) and [Investigate alerts in Microsoft 365 Defender](../security/defender/investigate-alerts.md).
+To get more details on the items that users are copying or moving outside of your organization (called egress activities, or exfiltration), select the **Learn more** link on the card to open a details pane. You can investigate incidents for Microsoft Purview Data Loss Prevention (DLP) from the Microsoft 365 Defender portal **Incidents & alerts** > **Incidents**. See [Investigate data loss incidents with Microsoft 365 Defender](../security/defender/dlp-investigate-alerts-defender.md) and [Investigate alerts in Microsoft 365 Defender](../security/defender/investigate-alerts.md).
### DLP Alerts Dashboard
compliance Get Started With Data Lifecycle Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-with-data-lifecycle-management.md
f1.keywords:
Previously updated : 04/26/2023 Last updated : 07/11/2023 audience: Admin
Now rolling out in preview, data lifecycle management supports [administrative u
- Currently, a restricted administrator can create and view adaptive scopes for all administrative units when they use PowerShell cmdlets.
+- Currently, [simulation mode for auto-apply retention label policies](apply-retention-labels-automatically.md#learn-about-simulation-mode) doesn't support policies that are configured for selected administrative units. Policies with this configuration can be turned on, but if you want to first run them in simulation, select the full directory option.
+ - Currently, inactive mailboxes aren't supported in a policy when you select one or more administrative units. To include inactive mailboxes in the policy, you must be an unrestricted administrator and select **Full directory**. For more information about how Microsoft Purview supports administrative units, see [Administrative units](microsoft-365-compliance-center-permissions.md#administrative-units).
compliance Get Started With Records Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-with-records-management.md
f1.keywords:
Previously updated : 04/28/2023 Last updated : 07/11/2023 audience: Admin
Now rolling out in preview, records management supports [administrative units th
- Currently, a restricted administrator can create and view adaptive scopes for all administrative units when they use PowerShell cmdlets.
-Scoped admins can view all adaptive scopes across AUs using cmdlets
+- Currently, [simulation mode for auto-apply retention label policies](apply-retention-labels-automatically.md#learn-about-simulation-mode) doesn't support policies that are configured for selected administrative units. Policies with this configuration can be turned on, but if you want to first run them in simulation, select the full directory option.
- Currently, inactive mailboxes aren't supported in a policy when you select one or more administrative units. To include inactive mailboxes in the policy, you must be an unrestricted administrator and select **Full directory**.
compliance Insider Risk Management Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-configure.md
f1.keywords:
Previously updated : 05/09/2023 Last updated : 07/11/2023 audience: itpro - highpri
A DLP policy is optional when using the following policy templates:
See the [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) article for step-by-step guidance to configure DLP policies for your organization. After you've configured a DLP policy, return to these configuration steps.
+> [!NOTE]
+> Endpoint DLP now supports virtualized environments (preview), which means that the insider risk management solution supports virtualized environments through endpoint DLP. [Learn more about support for virtualized environments in endpoint DLP](endpoint-dlp-getting-started.md#endpoint-dlp-support-for-virtualized-environments-preview)
+ ### Configure priority user groups Insider risk management includes support for assigning priority user groups to policies to help identity unique risk activities for user with critical positions, high levels of data and network access, or a past history of risk behavior. Creating a priority user group and assigning users to the group help scope policies to the unique circumstances presented by these users.
compliance Insider Risk Management Settings Policy Indicators https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-settings-policy-indicators.md
f1.keywords:
Previously updated : 05/03/2023 Last updated : 07/11/2023 audience: itpro - highpri
Make sure that the Windows 10 devices that you plan on reporting in insider risk
2. The user account used to log into the Windows 10 device must be an active Azure AD account. The Windows 10 device may be [Azure AD](/azure/active-directory/devices/concept-azure-ad-join), Azure AD hybrid, joined, or registered. 3. Install the Microsoft Edge browser on the endpoint device to detect actions for the cloud upload activity. See [Download the new Microsoft Edge based on Chromium](https://support.microsoft.com/help/4501095/download-the-new-microsoft-edge-based-on-chromium).
+> [!NOTE]
+> Endpoint DLP now supports virtualized environments (preview), which means that the insider risk management solution supports virtualized environments through endpoint DLP. [Learn more about support for virtualized environments in endpoint DLP](endpoint-dlp-getting-started.md#endpoint-dlp-support-for-virtualized-environments-preview)
+ ### Step 2: Onboard devices You must enable device checking and onboard your endpoints before you can detect insider risk management activities on a device. Both actions are done in the Microsoft Purview compliance portal.
compliance Insider Risk Management Settings Priority User Groups https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-settings-priority-user-groups.md
f1.keywords:
Previously updated : 05/03/2023 Last updated : 07/11/2023 audience: itpro - highpri
You must be a member of the *Insider Risk Management* or *Insider Risk Managemen
- **Description (optional)**: Enter a description for the priority user group. 5. Select **Next** to continue. 6. On the **Choose members** page, select **Choose members** to search and select which mail-enabled user accounts are included in the group or select the **Select all** check box to add all users in your organization to the group. Select **Add** to continue.
+ > [!NOTE]
+ > You can add up to 10,000 users to a priority user group.
7. Select **Next** to continue. 8. On the **Choose who can view this group** page, you must define who can review users, alerts, cases, and reports for the priority user group. At least one user or insider risk management role group must be assigned. Select **Choose users and role groups**, and then select the users or insider risk management role groups you want to assign to the priority user group. Select **Add** to assign the selected users or role groups to the group. 9. Select **Next** to continue.
compliance Sensitivity Labels Versions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-versions.md
The numbers listed are the minimum Office application versions required for each
|[Different settings for default label and mandatory labeling](sensitivity-labels-office-apps.md#outlook-specific-options-for-default-label-and-mandatory-labeling) |Current Channel: 2105+ <br /><br> Monthly Enterprise Channel: 2105+ <br /><br> Semi-Annual Enterprise Channel: 2108+ |16.43+ <sup>\*</sup> |4.2111+ |4.2111+ |Yes | |[PDF support](sensitivity-labels-office-apps.md#pdf-support) |Current Channel: 2205+ <br /><br> Monthly Enterprise Channel: 2205+ <br /><br> Semi-Annual Enterprise Channel: 2302+| Under review |Under review |Under review |Under review | |[Apply S/MIME protection](sensitivity-labels-office-apps.md#configure-a-label-to-apply-smime-protection-in-outlook) |Current Channel: 2211+ <br /><br> Monthly Enterprise Channel: 2211+ <br /><br> Semi-Annual Enterprise Channel: 2302+ | 16.61+ <sup>\*</sup> |4.2226+ |4.2203+ |Yes |
-|[Sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) |Current Channel: 2302+<br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |4.2326.0+ |4.2316.0+ |Under review |
-|[Display label color](sensitivity-labels-office-apps.md#label-colors) |Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Preview: [Current Channel (Preview)](https://office.com/insider) <sup>\*</sup> |4.2316.0+ |4.2316.0+ |Under review |
+|[Sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) |Current Channel: 2302+<br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Rolling out: 4.2316.0+ |4.2316.0+ |Under review |
+|[Display label color](sensitivity-labels-office-apps.md#label-colors) |Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |16.71+ |Rolling out: 4.2316.0+ |4.2316.0+ |Under review |
|[Default sublabel for parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label)|Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review | |[Scope labels to files or emails](sensitivity-labels-office-apps.md#scope-labels-to-just-files-or-emails) |Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Rolling out: 16.70+ <sup>\*</sup> | Rolling out: 4.2309+ |Rolling out: 4.2309+ |Yes | |[Preventing oversharing as DLP policy tip](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup)|Current Channel: 2305+ <br /><br> Monthly Enterprise Channel: 2307+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review |
compliance Sensitivity Labels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels.md
f1.keywords:
Previously updated : 06/10/2023 Last updated : 07/11/2023 audience: Admin
Example of how sublabels display for users:
### Editing or deleting a sensitivity label
-If you delete a sensitivity label from the admin portal, the label is't automatically removed from content, and any protection settings continue to be enforced on content that had that label applied.
+If you delete a sensitivity label from the compliance portal, the label isn't automatically removed from content, and any protection settings continue to be enforced on content that had that label applied.
If you edit a sensitivity label, the version of the label that was applied to content is what's enforced on that content.
enterprise Additional Office365 Ip Addresses And Urls https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/additional-office365-ip-addresses-and-urls.md
Apart from DNS, these instances are all optional for most customers unless you n
|21|**Microsoft Stream** (needs the Azure AD user token). <br> Office 365 Worldwide (including GCC)|\*.cloudapp.net <br> \*.api.microsoftstream.com <br> \*.notification.api.microsoftstream.com <br> amp.azure.net <br> api.microsoftstream.com <br> az416426.vo.msecnd.net <br> s0.assets-yammer.com <br> vortex.data.microsoft.com <br> web.microsoftstream.com <br> TCP port 443|Inbound server traffic| |22|Use **MFA server** for multi-factor authentication requests, both new installations of the server and setting it up with Active Directory Domain Services (AD DS).|See [Getting started with the Azure AD multi-factor authentication Server](/azure/active-directory/authentication/howto-mfaserver-deploy#plan-your-deployment).|Outbound server-only traffic| |23|**Microsoft Graph Change Notifications** <p> Developers can use [change notifications](/graph/webhooks?context=graph%2fapi%2f1.0&view=graph-rest-1.0&preserve-view=true) to subscribe to events in the Microsoft Graph.|Public Cloud: 52.159.23.209, 52.159.17.84, 13.78.204.0, 52.147.213.251, 52.147.213.181, 20.127.53.125, 70.37.95.92, 70.37.95.11, 70.37.92.195, 20.9.36.45, 20.9.35.166, 20.9.36.128, 20.96.21.67, 20.69.245.215, 104.46.117.15, 137.135.11.161, 137.135.11.116, 20.253.156.113, 52.159.107.50, 52.159.107.4, 52.159.124.33, 20.98.68.182, 20.98.68.57, 20.98.68.200, 20.171.81.121, 20.25.189.138, 20.171.82.192, 52.142.114.29, 52.142.115.31, 20.223.139.245, 51.124.75.43, 51.124.73.177, 104.40.209.182, 20.199.102.157, 20.199.102.73, 20.216.150.67, 20.91.212.211, 20.91.212.136, 20.91.213.57, 20.44.210.83, 20.44.210.146, 20.212.153.162, 40.80.232.177, 40.80.232.118, 52.231.196.24, 20.48.12.75, 20.48.11.201, 20.89.108.161, 104.215.13.23, 104.215.6.169, 20.89.240.165 <br> <p> Microsoft Cloud for US Government: 52.244.33.45, 52.244.35.174, 52.243.157.104, 52.243.157.105, 52.182.25.254, 52.182.25.110, 52.181.25.67, 52.181.25.66, 52.244.111.156, 52.244.111.170, 52.243.147.249, 52.243.148.19, 52.182.32.51, 52.182.32.143, 52.181.24.199, 52.181.24.220 <p> Microsoft Cloud China operated by 21Vianet: 42.159.72.35, 42.159.72.47, 42.159.180.55, 42.159.180.56, 40.125.138.23, 40.125.136.69, 40.72.155.199, 40.72.155.216 <br> TCP port 443 <p> Note: Developers can specify different ports when creating the subscriptions.|Inbound server traffic|
-|24|**Network Connection Status Indicator**<p>Used by Windows 10 and 11 to determine if the computer is connected to the internet (does not apply to non-Windows clients). When this URL cannot be reached, Windows assumes it is not connected to the Internet and M365 Apps for Enterprise will not try to verify activation status, causing connections to Exchange and other services to fail.|www.msftconnecttest.com <br> 13.107.4.52<p>Also see [Manage connection endpoints for Windows 11 Enterprise](/windows/privacy/manage-windows-11-endpoints) and [Manage connection endpoints for Windows 10 Enterprise, version 21H2](/windows/privacy/manage-windows-21h2-endpoints).|Outbound server-only traffic|
+|24|**Network Connection Status Indicator**<p>Used by Windows 10 and 11 to determine if the computer is connected to the internet (does not apply to non-Windows clients). When this URL cannot be reached, Windows assumes it is not connected to the Internet and M365 Apps for Enterprise will not try to verify activation status, causing connections to Exchange and other services to fail.|www.msftconnecttest.com <br> <p> Also see [Manage connection endpoints for Windows 11 Enterprise](/windows/privacy/manage-windows-11-endpoints) and [Manage connection endpoints for Windows 10 Enterprise, version 21H2](/windows/privacy/manage-windows-21h2-endpoints).|Outbound server-only traffic|
|25|**Teams Notifications on Mobile Devices**<p>Used by Android and Apple mobile devices to receive push notifications to the Teams client for incoming calls and other Teams services. When these ports are blocked, all push notifications to mobile devices fail.|For specific ports, see [FCM ports and your firewall in the Google Firebase documentation](https://firebase.google.com/docs/cloud-messaging/concept-options#messaging-ports-and-your-firewall) and [If your Apple devices aren't getting Apple push notifications](https://support.apple.com/en-us/HT203609).|Outbound server-only traffic| ## Related Topics
enterprise M365 Dr Product Terms Dr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/m365-dr-product-terms-dr.md
Microsoft Privacy and Security product terms included with Microsoft's Cloud pro
1. Online 2. Commitments period: The length of the customers contract with Microsoft. Typically, this is 1-3 years.
-3. Country/regions included: Local Geographies, United States and the European Union.
+3. Country/regions included: Australia, Brazil, Canada, France, Germany, India, Japan, Norway, Qatar, South Africa, South Korea, Sweden, Switzerland, the United Kingdom, the United Arab Emirates, United States and the European Union.
The language at time of writing this article is:
For additional data residency capabilities, refer to the [_Multi-Geo_ service](m
## Product Terms Data Residency Migration
-When Microsoft's data centers were launched in _Local Region Geographies_, it was possible for any _Tenant_ with the appropriate _Default Geography_ to opt in to move their data into the _Local Region Geographies_. This opt in period was open for six months after the Data Center was operational.
+When Microsoft's data centers were launched in Australia, Brazil, Canada, the European Union, France, Germany, India, Japan, Norway, Qatar, South Africa, South Korea, Sweden, Switzerland, the United Kingdom, or the United Arab Emirates, it was possible for any _Tenant_ with the appropriate _Default Geography_ to opt in to move their data into the applicabile geography. This opt in period was open for six months after the Data Center was operational.
enterprise M365 Dr Workload Mdo P1 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/m365-dr-workload-mdo-p1.md
Please refer to the [Advanced Data Residency Commitment](m365-dr-commitments.md)
## Migration
-EOP customer data migrates during the Exchange Online migration. MDO P1 does not have customer data to migrate.
+EOP customer data migrates after ADR migration is initated. MDO P1 does not have customer data to migrate.
## How can I determine customer data location?
-We are in the process of updating the actual data location in the _Tenant_ Admin Center. When this change is complete you will be able to see the actual data location, for committed workloads, by navigating to Admin|Settings|Org Settings|Organization Profile|Data Location. Until that change is visible, you can view the Exchange Online data location information in order to understand where your in scope customer data is stored for this service.
+You can find the actual data location in Tenant Admin Center. As a tenant administrator you can find the actual data location, for committed data, by navigating to Admin->Settings->Org Settings->Organization Profile->Data Location.
enterprise M365 Dr Workload Viva Connections https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/m365-dr-workload-viva-connections.md
Data is stored within Exchange Online, SharePoint Online and Microsoft Teams. M
### How can I determine customer data location?
-We are in the process of updating the actual data location in _Tenant_ Admin Center. When this change is complete you will be able to see the actual data location, for committed data, by navigating to Admin->Settings->Org Settings->Organization Profile->Data Location. Until that change is visible, you can view the Exchange Online, SharePoint Online and Microsoft Teams data location information in order to understand where your committed data is stored for this service.
+You can find the actual data location in Tenant Admin Center. As a tenant administrator you can find the actual data location, for committed data, by navigating to Admin->Settings->Org Settings->Organization Profile->Data Location.
enterprise M365 Dr Workload Viva Topics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/m365-dr-workload-viva-topics.md
Data stored is maintained within Exchange Online, SharePoint Online, and Microso
## How can I determine customer data location?
-We are in the process of updating the actual data location in _Tenant_ Admin Center. When this change is complete you will be able to see the actual data location, for committed data, by navigating to Admin->Settings->Org Settings->Organization Profile->Data Location. Until that change is visible, you can view the Exchange Online data location information in order to understand where your committed data is stored for this service.
+You can find the actual data location in Tenant Admin Center. As a tenant administrator you can find the actual data location, for committed data, by navigating to Admin->Settings->Org Settings->Organization Profile->Data Location.
lighthouse M365 Lighthouse Deploy Standard Tenant Configurations Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-deploy-standard-tenant-configurations-overview.md
Previously updated : 07/08/2021 Last updated : 07/03/2023 audience: Admin
lighthouse M365 Lighthouse Deploy Task Automatically https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-deploy-task-automatically.md
Previously updated : 06/21/2023 Last updated : 07/03/2023 audience: Admin
lighthouse M365 Lighthouse Deploy Task Manually https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-deploy-task-manually.md
Previously updated : 11/29/2022 Last updated : 07/03/2023 audience: Admin
lighthouse M365 Lighthouse Device Compliance Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-device-compliance-page-overview.md
Previously updated : 07/07/2021 Last updated : 07/03/2023 audience: Admin
The Settings tab also includes the following options:
## Related content
+[Compare device compliance policy settings in Microsoft 365 Lighthouse](m365-lighthouse-compare-compliance-policies.md) (article)\
+[Overview of the Device health page in Microsoft 365 Lighthouse](m365-lighthouse-device-health-overview.md) (article)\
[Overview of the Windows 365 (Cloud PCs) page in Microsoft 365 Lighthouse](m365-lighthouse-win365-page-overview.md) (article)\ [Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
lighthouse M365 Lighthouse Device Security Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-device-security-overview.md
Previously updated : 06/02/2022 Last updated : 07/03/2023 audience: Admin
The Devices tab also includes the following options:
:::image type="content" source="../media/m365-lighthouse-device-security-overview/device-security-devices-tab.png" alt-text="Screenshot of the Devices tab on the Device security page." lightbox="../media/m365-lighthouse-device-security-overview/device-security-devices-tab.png"::: ## Related content+ [Manage Microsoft Defender for Endpoint incidents](../security/defender-endpoint/manage-incidents.md) (article)\ [Investigate incidents in Microsoft Defender for Endpoint](../security/defender-endpoint/investigate-incidents.md) (article)
lighthouse M365 Lighthouse Get Help And Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-get-help-and-support.md
Previously updated : 06/29/2021 Last updated : 07/03/2023 audience: Admin
If you're experiencing an issue that isn't listed in any of these resources, the
## Access help and support
-1. In Lighthouse, select the **?** icon at the top of the portal to open the **Help** pane, and then do one of the following:
-
- - If you're on the page of the portal where the issue occurred, select **Show diagnostics**.
+1. In Lighthouse, select the **?** icon at the top of the portal to open the **Help** pane, and then do one of the following:
+
+ - If you're on the page of the portal where the issue occurred, select **Show diagnostics**.
This will create a JSON file with information to help Support agents troubleshoot your issue. Save the file so you can attach it to your service request. > [!NOTE] > The JSON file will contain personally identifiable information.
- - If your issue isn't isolated to the current page of the portal, go to the next step.
+ - If your issue isn't isolated to the current page of the portal, go to the next step.
-2. In the **Help** pane, select the **Help + support** button. This opens the **How can we help?** pane.
+2. In the **Help** pane, select the **Help + support** button. This opens the **How can we help?** pane.
> [!NOTE] > If the **How can we help?** pane doesn't open, you'll need to reach out to someone in your partner tenant who has Global Administrator permissions and ask them to help.
-3. In the **How can we help?** pane, enter a description of your issue, and then press **Enter**. We recommend including the full product name *Microsoft 365 Lighthouse* in your description to ensure the search results include relevant help articles.
+3. In the **How can we help?** pane, enter a description of your issue, and then press **Enter**. We recommend including the full product name *Microsoft 365 Lighthouse* in your description to ensure the search results include relevant help articles.
-4. Check out the list of recommended articles to see if any of them help resolve your issue.
+4. Check out the list of recommended articles to see if any of them help resolve your issue.
If you enter a description of your issue and it doesn't return a list of help articles, rephrase your description and try another search.
-5. If the recommended articles don't help, select **Contact Support**.
+5. If the recommended articles don't help, select **Contact Support**.
-6. Fill out the information in the form, attach any screenshots and the JSON file that you saved in step&nbsp;1 if applicable, and then select **Contact me**. The expected wait time is indicated in the pane.
+6. Fill out the information in the form, attach any screenshots and the JSON file that you saved in step&nbsp;1 if applicable, and then select **Contact me**. The expected wait time is indicated in the pane.
## Related content
+[View tenant service health](m365-lighthouse-view-service-health.md)
[Known issues with Microsoft 365 Lighthouse](m365-lighthouse-known-issues.md) (article)\ [Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)\ [Troubleshooot and resolve problems and error messages in Microsoft 365 Lighthouse](m365-lighthouse-troubleshoot.md) (article)
lighthouse M365 Lighthouse Known Issues https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-known-issues.md
Previously updated : 03/01/2022 Last updated : 07/03/2023 audience: Admin
lighthouse M365 Lighthouse Manage Inactive Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-manage-inactive-users.md
Previously updated : 08/29/2022 Last updated : 07/03/2023 audience: Admin
lighthouse M365 Lighthouse Manage Tenant List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-manage-tenant-list.md
Previously updated : 10/26/2021 Last updated : 7/03/2023 audience: Admin
To help you manage your tenant list in Microsoft 365 Lighthouse, you can apply c
## Before you begin
-To manage tenant tags, you must:
--- Meet the [requirements for Microsoft 365 Lighthouse](m365-lighthouse-requirements.md).--- Complete the processes outlined in the [Sign up for Microsoft 365 Lighthouse](m365-lighthouse-sign-up.md) article.--- Complete the processes outlined in the [Configure Microsoft 365 Lighthouse portal security](m365-lighthouse-configure-portal-security.md) article.--- Be a Global Administrator of the partner tenant.
+You must be a Global Administrator of the partner tenant.
## Create a tag
After you've created and assigned tags, you can use them to filter your tenants.
## Related content
-[Sign up for Microsoft 365 Lighthouse](m365-lighthouse-sign-up.md) (article)\
-[Overview of the Device compliance page in Microsoft 365 Lighthouse](m365-lighthouse-device-compliance-page-overview.md) (article)\
+[Overview of the Tenants page](m365-lighthouse-tenants-page-overview.md) (article)\
+[View your Azure Active Directory roles in Microsoft 365 Lighthouse](m365-lighthouse-view-your-roles.md) (article)\
+[View tenant service health](m365-lighthouse-view-service-health.md) (article)\
[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
lighthouse M365 Lighthouse Quarantine Messages Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-quarantine-messages-overview.md
Previously updated : 06/30/2022 Last updated : 07/03/2023 audience: Admin
The **Copy Link to Messages in Microsoft** **365 Defender** option provides a li
[Quarantined email messages](../security/office-365-security/quarantine-about.md) (article)\ [Microsoft recommendations for EOP and Defender for Office 365 security settings](../security/office-365-security/recommended-settings-for-eop-and-office365.md) (article)\
-[Exchange Online Protection (EOP) overview](../security/office-365-security/eop-about.md) (article)
+[Exchange Online Protection (EOP) overview](../security/office-365-security/eop-about.md) (article)\
+[Overview of the Threat management page](m365-lighthouse-threat-management-page-overview.md) (article)
lighthouse M365 Lighthouse Reinstate Task https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-reinstate-task.md
Previously updated : 10/24/2022 Last updated : 07/03/2023 audience: Admin
Additionally, each partner tenant user must meet the following requirements:
You can also select **More actions** (ellipsis icon) option directly from the task list to reinstate the task. Once a task is reinstated, status detection and reporting will update accordingly.
+## Next steps
+
+If you want to investigate why a task was dismissed, you can audit the exception using Lighthouse insights. For more information, see [Manage tenants using insights](m365-lighthouse-manage-tenants-using-deployment-insights.md).
+ ## Related content [Dismiss a task in Microsoft 365 Lighthouse](m365-lighthouse-dismiss-task.md) (article)\
lighthouse M365 Lighthouse Reprovision Cloudpc https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-reprovision-cloudpc.md
Previously updated : 05/13/2022 Last updated : 07/03/2023 audience: Admin
lighthouse M365 Lighthouse Review Audit Logs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-review-audit-logs.md
Previously updated : 01/20/2022 Last updated : 07/03/2023 audience: Admin
The following table lists activities captured within Lighthouse audit logs. The
Use Microsoft Graph API to access more audit events, if needed. For more information, see [Overview for multi-tenant management using the Microsoft 365 Lighthouse API](/graph/managedtenants-concept-overview). - ## Related content
+[Overview of the Alerts page](m365-lighthouse-alerts-overview.md) (article)\
[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)\ [View your Azure Active Directory roles in Microsoft 365 Lighthouse](m365-lighthouse-view-your-roles.md) (article)
lighthouse M365 Lighthouse Review Deployment Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-review-deployment-plan.md
Previously updated : 11/29/2022 Last updated : 07/03/2023 audience: Admin
Deployment statuses are automatically determined by Lighthouse when detection is
[Overview of using Microsoft 365 Lighthouse baselines to deploy standard tenant configurations](m365-lighthouse-deploy-standard-tenant-configurations-overview.md) (article)\ [Overview of deployment tasks](m365-lighthouse-overview-deployment-task.md) (article)\ [Overview of permissions in Microsoft 365 Lighthouse](m365-lighthouse-overview-of-permissions.md) (article)\
+[Understanding deployment insights](m365-lighthouse-deployment-insights-overview.md) (article)\
[Configure Microsoft 365 Lighthouse portal security](m365-lighthouse-configure-portal-security.md) (article)\ [Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
lighthouse M365 Lighthouse Tenants Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-tenants-page-overview.md
Previously updated : 11/19/2021 Last updated : 07/03/2023 audience: Admin
lighthouse M365 Lighthouse Threat Management Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-threat-management-page-overview.md
The Antivirus protection tab on the Threats management page shows the devices ac
## Related content
-[Overview of using Microsoft 365 Lighthouse baselines to deploy standard tenant configurations](m365-lighthouse-deploy-standard-tenant-configurations-overview.md)
+[Overview of using Microsoft 365 Lighthouse baselines to deploy standard tenant configurations](m365-lighthouse-deploy-standard-tenant-configurations-overview.md) (article)\
[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
lighthouse M365 Lighthouse Users Page Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-users-page-overview.md
Previously updated : 07/08/2021 Last updated : 07/03/2023 audience: Admin
The Risky users page also includes the following options:
## Multifactor Authentication page
-The Multifactor Authentication page provides detailed information on the status of multifactor authentication (MFA) enablement across your tenants. Select any tenant in the list to see more details for that tenant, including which Conditional Access policies requiring MFA are already configured and which users haven't yet registered for MFA.
+The Multifactor Authentication page provides detailed information on the status of multifactor authentication (MFA) enablement across your tenants. Select any tenant in the list to see more details for that tenant, including which Conditional Access policies requiring MFA are already configured and which users haven't yet registered for MFA. To learn more about MFA in Lighthouse, see [Overview of the Multifactor authentication page](m365-lighthouse-mfa-overview.md).
:::image type="content" source="../media/m365-lighthouse-users-page-overview/users-mfa-tab.png" alt-text="Screenshot of the Multifactor Authentication page." lightbox="../media/m365-lighthouse-users-page-overview/users-mfa-tab.png":::
The Password reset page shows detailed information on the status of SSPR enablem
## Related content
-[Microsoft 365 Lighthouse device compliance page overview](m365-lighthouse-device-compliance-page-overview.md) (article)\
-[Microsoft 365 Lighthouse FAQ](m365-lighthouse-faq.yml) (article)
+[Overview of the Multifactor authentication page](m365-lighthouse-mfa-overview.md) (article)\
+[Block user sign-in](m365-lighthouse-block-user-signin.md) (article)\
+[Block sign-in for shared mailbox accounts](m365-lighthouse-block-signin-shared-mailboxes.md) (article)\
+[Manage inactive users](m365-lighthouse-manage-inactive-users.md) (article)\
+[Manage multifactor authentication](m365-lighthouse-manage-mfa.md) (article)\
+[Manage self-service password reset](m365-lighthouse-manage-sspr.md) (article)\
+[Reset a user password](m365-lighthouse-reset-user-password.md) (article)\
+[Search for users](m365-lighthouse-search-for-users.md) (article)\
+[View and manage risky users](m365-lighthouse-view-manage-risky-users.md) (article)
lighthouse M365 Lighthouse View Your Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-view-your-roles.md
Previously updated : 04/29/2022 Last updated : 07/03/2023 audience: Admin
security Mdb Configure Security Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-configure-security-settings.md
If you're using Intune, and you attempt to view or edit security policies in the
:::image type="content" source="media/mdb-usingintune-switchquestion.png" alt-text="Screenshot showing a screen that prompts the user to keep using Intune or switch to the Microsoft 365 Defender portal.":::
-Note that in the preceding image, **Use Defender for Business configuration instead** refers to using the Microsoft 365 Defender portal, with a simplified configuration experience designed for small and medium-sized businesses. If you opt to use the Microsoft 365 Defender portal, you must delete any existing security policies in Intune to avoid policy conflicts. For more details, see [I need to resolve a policy conflict](/microsoft-365/security/defender-business/mdb-troubleshooting#i-need-to-resolve-a-policy-conflict).
--
+In the preceding image, **Use Defender for Business configuration instead** refers to using the Microsoft 365 Defender portal, which provides a simplified configuration experience designed for small and medium-sized businesses. If you opt to use the Microsoft 365 Defender portal, you must delete any existing security policies in Intune to avoid policy conflicts. For more details, see [I need to resolve a policy conflict](/microsoft-365/security/defender-business/mdb-troubleshooting#i-need-to-resolve-a-policy-conflict).
> [!NOTE] > If you're managing your security policies in the Microsoft 365 Defender portal, you can view those policies in the Intune admin center, where they're listed as **Antivirus** or **Firewall** policies. When you view your firewall policies in the Intune admin center, you'll see two policies listed: one policy for firewall protection and another for custom rules.--
->[!TIP]
->You can export your list of policies through the [Microsoft Intune admin center](https://intune.microsoft.com/).
+>
+> You can export your list of policies through the [Microsoft Intune admin center](https://intune.microsoft.com/).
## Next steps
security Advanced Features https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/advanced-features.md
search.appverid: met150 Previously updated : 06/06/2023 Last updated : 07/11/2023 # Configure advanced features in Defender for Endpoint
After turning on this feature, you can [block files](respond-file-alerts.md#allo
## Hide potential duplicate device records
-By enabling this feature, you can ensure that you're seeing the most accurate information about your devices by hiding potential duplicate device records. There are different reasons duplicate device records might occur, for example, the device discovery capability in Microsoft Defender for Endpoint might scan your network and discover a device that's already onboarded or a has recently been offboarded.
+By enabling this feature, you can ensure that you're seeing the most accurate information about your devices by hiding potential duplicate device records. There are different reasons duplicate device records might occur, for example, the device discovery capability in Microsoft Defender for Endpoint might scan your network and discover a device that's already onboarded or has recently been offboarded.
This feature will identify potential duplicate devices based on their hostname and last seen time. The duplicate devices will be hidden from multiple experiences in the portal, such as, the Device Inventory, Microsoft Defender Vulnerability Management pages, and Public APIs for machine data, leaving the most accurate device record visible. However, the duplicates will still be visible in global search, advanced hunting, alerts, and incidents pages.
For more information, see [Manage indicators](manage-indicators.md).
## Tamper protection
-During some kinds of cyber attacks, bad actors try to disable security features, such as anti-virus protection, on your machines. Bad actors like to disable your security features to get easier access to your data, to install malware, or to otherwise exploit your data, identity, and devices. Tamper protection essentially locks Microsoft Defender Antivirus and prevents your security settings from being changed through apps and methods.
+During some kinds of cyber attacks, bad actors try to disable security features, such as antivirus protection, on your machines. Bad actors like to disable your security features to get easier access to your data, to install malware, or to otherwise exploit your data, identity, and devices. Tamper protection essentially locks Microsoft Defender Antivirus and prevents your security settings from being changed through apps and methods.
For more information, including how to configure tamper protection, see [Protect security settings with tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md).
To receive contextual device integration in Office 365 Threat Intelligence, you'
## Endpoint Attack Notifications
-Endpoint Attack Notifications enable Microsoft to actively hunt for critical threats to be prioritized based on urgency and impact over your endpoint data.
+[Endpoint Attack Notifications](/security/defender-endpoint/endpoint-attack-notifications) enable Microsoft to actively hunt for critical threats to be prioritized based on urgency and impact over your endpoint data.
-For proactive hunting across the full scope of Microsoft 365 DefenderΓÇöincluding threats that span email, collaboration, identity, cloud applications, as and endpointsΓÇö[learn more](https://aka.ms/DefenderExpertsForHuntingGetStarted) about Microsoft Defender Experts.
+For proactive hunting across the full scope of Microsoft 365 Defender, including threats that span email, collaboration, identity, cloud applications, and endpoints, [learn more](https://aka.ms/DefenderExpertsForHuntingGetStarted) about Microsoft Defender Experts.
## Microsoft Defender for Cloud Apps
security Deployment Vdi Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md
Title: Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment description: Get an overview of how to configure Microsoft Defender Antivirus in a remote desktop or non-persistent virtual desktop environment.
-keywords: vdi, hyper-v, vm, virtual machine, windows defender, antivirus, av, virtual desktop, rds, remote desktop
-ms.sitesec: library
ms.localizationpriority: medium Last updated 03/06/2023
In Windows 10, version 1903, Microsoft introduced the shared security intelligen
|Method | Procedure | |||
-| Group Policy | <ol><li>On your Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure, and then select **Edit**.</li><li>In the Group Policy Management Editor, go to **Computer configuration**.</li><li>Select **Administrative templates**.</li><li>Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Security Intelligence Updates**.</li><li>Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**. A field automatically appears.</li><li>Enter `\\<sharedlocation\>\wdav-update` (for help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates)).</li><li>Select **OK**.</li><li>Deploy the GPO to the VMs you want to test.</li></ol> |
-| PowerShell | <ol><li>On each RDS or VDI device, use the following cmdlet to enable the feature: `Set-MpPreference -SharedSignaturesPath \\<shared location>\wdav-update`. </li><li>Push the update as you normally would push PowerShell-based configuration policies onto your VMs. (See the [Download and unpackage](#download-and-unpackage-the-latest-updates) section for what the \<shared location\> will be.) </li></ol> |
+| Group Policy | 1. On your Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure, and then select **Edit**.<br/><br/>2. In the Group Policy Management Editor, go to **Computer configuration**.<br/><br/>Select **Administrative templates**.<br/><br/>Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Security Intelligence Updates**.<br/><br/>3. Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**. A field automatically appears.<br/><br/>4. Enter `\\<sharedlocation\>\wdav-update` (for help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates)).<br/><br/>5. Select **OK**.<br/><br/>Deploy the GPO to the VMs you want to test. |
+| PowerShell | 1. On each RDS or VDI device, use the following cmdlet to enable the feature: `Set-MpPreference -SharedSignaturesPath \\<shared location>\wdav-update`. <br/><br/>2. Push the update as you normally would push PowerShell-based configuration policies onto your VMs. (See the [Download and unpackage](#download-and-unpackage-the-latest-updates) section the \<shared location\> entry.) |
## Download and unpackage the latest updates
security Machines View Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machines-view-overview.md
Filter | Description
**Group** </br> | Filter the list based on the group you're interested in investigating. </br></br> (_Computers and mobile only_) **Managed by** </br> | Managed by indicates how the device is being managed. You can filter by:</br> - Microsoft Defender for Endpoint</br> - Microsoft Intune, including co-management with Microsoft Configuration Manager via tenant attach</br>- Microsoft Configuration manager (ConfigMgr)</br> - Unknown: This could be due the running an outdated Windows version, GPO management, or another third party MDM.</br></br> (_Computers and mobile only_) **Device Type** </br> | Filter by the device type you're interested in investigating.</br></br> (_IoT devices only_)
+**Mitigation status** </br> | Filter by isolation or containment status of a device.</br></br>
## Use columns to customize the device inventory views
On the **IoT devices** tab, select **Customize columns** to see the columns avai
## Related articles [Investigate devices in the Microsoft Defender for Endpoint Devices list](investigate-machines.md)+
security Mde Sec Ops Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-sec-ops-guide.md
Title: Security Operations Guide for Defender for Endpoint-+ description: A prescriptive playbook for SecOps personnel to manage Microsoft Defender for Endpoint.
-keywords: malware, defender, antivirus, tamper protection
-ms.pagetype: security
-ms.sitesec: library
ms.localizationpriority: medium Last updated 02/07/2023 audience: ITPro
search.appverid: met150
This article gives an overview of the requirements and tasks for successfully operating Microsoft Defender for Endpoint in your organization. These tasks help your security operations center (SOC) effectively detect and respond to Microsoft Defender for Endpoint detected security threats.
-This article also describes daily, weekly, monthly, and ad-hoc tasks required to be performed by the security operations personnel in your organization.
+This article also describes daily, weekly, monthly, and ad-hoc tasks your security team can perform for your organization.
> [!NOTE] > These are recommended steps; check them against your own policies and environment to make sure they are fit for purpose.
The Microsoft Defender Endpoint should be set up to support your regular securit
- [**Configure general Defender for Endpoint settings**](preferences-setup.md)
- - General
- - Permissions
- - Rules
- - Device management
- - Configure Microsoft Defender Security Center time zone settings
+ - General
+ - Permissions
+ - Rules
+ - Device management
+ - Configure Microsoft Defender Security Center time zone settings
- **Set up Microsoft 365 Defender incident notifications** <p> To get email notifications on defined Microsoft 365 Defender incidents, it's recommended that you configure email notifications. See [Get incident notifications by email](../defender/incidents-overview.md#get-incident-notifications-by-email). -- **Connect to SIEM (Sentinel)** <p> If you have existing security information and event management (SIEM) tools, you can integrate them with Microsoft 365 Defender. See [Integrate your SIEM tools with Microsoft 365 Defender](../defender/configure-siem-defender.md) and [Microsoft 365 Defender integration with Microsoft Sentinel.](/azure/sentinel/microsoft-365-defender-sentinel-integration)
+- **Connect to SIEM (Sentinel)** <p> If you have existing security information and event management (SIEM) tools, you can integrate them with Microsoft 365 Defender. See [Integrate your SIEM tools with Microsoft 365 Defender](../defender/configure-siem-defender.md) and [Microsoft 365 Defender integration with Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration).
-- **Review data discovery configuration** <p> Review the Microsoft Defender for Endpoint device discovery configuration to ensure it's configured as required. <p> [Device discovery overview | Microsoft Learn](device-discovery.md)
+- **Review data discovery configuration** <p> Review the Microsoft Defender for Endpoint device discovery configuration to ensure it's configured as required. See [Device discovery overview](device-discovery.md).
## Daily activities
The Microsoft Defender Endpoint should be set up to support your regular securit
- **Review actions**
- In the action center, review the actions that have been taken in your environment, both automated and manual. This will help you validate that automated investigation and response (AIR) is performing as expected and identify any manual actions that need to be reviewed. See [Visit the Action center to see remediation actions.](auto-investigation-action-center.md)
+ In the action center, review the actions that have been taken in your environment, both automated and manual. This information helps you validate that automated investigation and response (AIR) is performing as expected and identify any manual actions that need to be reviewed. See [Visit the Action center to see remediation actions](auto-investigation-action-center.md).
### Security operations team - **Monitor the Microsoft 365 Defender Incidents queue**
- When Microsoft Defender for Endpoint (MDE) identifies Indicators of compromise (IOCs) or Indicators of attack (IOAs) and generates an alert, this alert will be included in an incident and displayed in the Incidents queue in the Microsoft 365 Defender console.
+ When Microsoft Defender for Endpoint identifies Indicators of compromise (IOCs) or Indicators of attack (IOAs) and generates an alert, the alert is included in an incident and displayed in the **Incidents** queue in the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)).
- Review these incidents to respond to any Microsoft Defender for Endpoint alerts and resolve once the incident has been remediated. See [Get incident notifications by email](../defender/incidents-overview.md#get-incident-notifications-by-email) and [View and organize the Microsoft Defender for Endpoint Incidents queue.](view-incidents-queue.md)
+ Review these incidents to respond to any Microsoft Defender for Endpoint alerts and resolve once the incident has been remediated. See [Get incident notifications by email](../defender/incidents-overview.md#get-incident-notifications-by-email) and [View and organize the Microsoft Defender for Endpoint Incidents queue](view-incidents-queue.md).
- **Manage false positive and false negative detections**
- Review the incident queue, identify false positive and false negative detections and submit them for review. This helps you effectively manage alerts in your environment and make your alerts more efficient. See [Address false positives/negatives in Microsoft Defender for Endpoint.](defender-endpoint-false-positives-negatives.md)
+ Review the incident queue, identify false positive and false negative detections and submit them for review. This helps you effectively manage alerts in your environment and make your alerts more efficient. See [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md).
- **Review threat analytics high-impact threats** Review threat analytics to identify any campaigns that are impacting your environment.
- The ΓÇ£High-impact threatsΓÇ¥ table lists the threats that have had the highest impact to the organization. This section ranks threats by the number of devices that have active alerts. See [Track and respond to emerging threats through threat analytics.](threat-analytics.md#view-the-threat-analytics-dashboard)
+ The ΓÇ£High-impact threatsΓÇ¥ table lists the threats that have had the highest impact to the organization. This section ranks threats by the number of devices that have active alerts. See [Track and respond to emerging threats through threat analytics](threat-analytics.md#view-the-threat-analytics-dashboard).
### Security administration team - **Review health reports**
- Review health reports to identify any device health trends that need to be addressed. The device health reports cover Microsoft Defender for Endpoint AV signature, platform health, and EDR health. See [Device health reports in Microsoft Defender for Endpoint.](device-health-reports.md)
+ Review health reports to identify any device health trends that need to be addressed. The device health reports cover Microsoft Defender for Endpoint AV signature, platform health, and EDR health. See [Device health reports in Microsoft Defender for Endpoint](device-health-reports.md).
- **Check Endpoint detection and response (EDR) sensor health**
- EDR health is maintaining the connection to the EDR service to make sure that MDE is getting all the required signals to alert and identify vulnerabilities.
+ EDR health is maintaining the connection to the EDR service to make sure that Defender for Endpoint is receiving the required signals to alert and identify vulnerabilities.
- Review unhealthy devices. See [Device health, Sensor health & OS report.](device-health-sensor-health-os.md)
+ Review unhealthy devices. See [Device health, Sensor health & OS report](device-health-sensor-health-os.md).
- **Check Microsoft Defender Antivirus health**
- The Microsoft Defence Antivirus (MDAV) update status is critical for the best performance of your MDE environment and up-to-date detections. The device health page shows you the status of your fleet for platform, intelligence, and engine version. See [Device health, Microsoft Defender Antivirus health report.](device-health-microsoft-defender-antivirus-health.md)
+ Viewing the status of Microsoft Defender Antivirus updates is critical for the best performance of Defender for Endpoint in your environment and up-to-date detections. The device health page shows current status for platform, intelligence, and engine version. See the [Device health, Microsoft Defender Antivirus health report](device-health-microsoft-defender-antivirus-health.md).
## Weekly activities
The Microsoft Defender Endpoint should be set up to support your regular securit
Microsoft 365 Defender uses the Microsoft 365 Message center to notify you of upcoming changes, such as new and changed features, planned maintenance, or other important announcements.
- Review the Message center messages to understand any upcoming changes that will impact your environment.
+ Review the Message center messages to understand any upcoming changes that impact your environment.
- You can access this in the Microsoft 365 admin center under the Health tab. See [How to check Microsoft 365 service health.](../../enterprise/view-service-health.md)
+ You can access this in the Microsoft 365 admin center under the Health tab. See [How to check Microsoft 365 service health](../../enterprise/view-service-health.md).
### Security operations team - **Review threat reporting**
- Review health reports to identify any device threat trends that need to be addressed. See [Threat protection report.](threat-protection-reports.md)
+ Review health reports to identify any device threat trends that need to be addressed. See [Threat protection report](threat-protection-reports.md).
- **Review threat analytics**
- Review threat analytics to identify any campaigns that are impacting your environment. See [Track and respond to emerging threats through threat analytics.](threat-analytics.md)
+ Review threat analytics to identify any campaigns that affect your environment. See [Track and respond to emerging threats through threat analytics](threat-analytics.md).
### Security administration team
The Microsoft Defender Endpoint should be set up to support your regular securit
- **Review attack surface reduction (ASR) reporting**
- Review ASR reporting to identify any files that are impacting your environment. See [Attack surface reduction (ASR) rules report.](attack-surface-reduction-rules-report.md)
+ Review ASR reports to identify any files that affect your environment. See [Attack surface reduction (ASR) rules report](attack-surface-reduction-rules-report.md).
- **Review web protection events**
- Review web defense reporting to identify any IP / URLs that are being blocked. See [Web protection.](web-protection-overview.md)
+
+ Review the web defense report to identify any IP addresses or URLs that are blocked. See [Web protection](web-protection-overview.md).
## Monthly activities ### General
-Review the relevant WhatΓÇÖs new pages for your fleet to understand the recently released updates in the product.
+Review the following articles to understand recently released updates:
- [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md)
Review the relevant WhatΓÇÖs new pages for your fleet to understand the recently
- **Review device excluded from policy**
- If any devices are excluded from the Microsoft Defender Endpoint policy for any reason, review whether the device still needs to be excluded from the policy.
+ If any devices are excluded from Defender for Endpoint policies, review and determine whether the device still needs to be excluded from the policy.
> [!NOTE]
- > Review the troubleshooting mode for troubleshooting. See [Get started with troubleshooting mode in Microsoft Defender for Endpoint.](enable-troubleshooting-mode.md)
+ > Review the troubleshooting mode for troubleshooting. See [Get started with troubleshooting mode in Microsoft Defender for Endpoint](enable-troubleshooting-mode.md).
## Periodically
These tasks are seen as maintenance for your security posture and are critical f
- **Review automation levels**
- Review automation levels in automated investigation and remediation capabilities. See [Automation levels in automated investigation and remediation | Microsoft Learn](automation-levels.md)
+ Review automation levels in automated investigation and remediation capabilities. See [Automation levels in automated investigation and remediation](automation-levels.md).
- **Review custom detections**
- Periodically review whether the custom detections that have been created are still valid and effective. See [Review custom detection](../defender/custom-detection-rules.md)
+ Periodically review whether the custom detections that have been created are still valid and effective. See [Review custom detection](../defender/custom-detection-rules.md).
- **Review alerts suppression**
- Periodically review any alert suppression rules that have been created to confirm they are still required and valid. See [Review alerts suppression](manage-alerts.md)
+ Periodically review any alert suppression rules that have been created to confirm they're still required and valid. See [Review alerts suppression](manage-alerts.md).
## Troubleshooting
security Microsoft Defender Antivirus Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates.md
Title: Microsoft Defender Antivirus security intelligence and product updates
description: Manage how Microsoft Defender Antivirus receives protection and product updates. ms.localizationpriority: high Previously updated : 07/07/2023 Last updated : 07/11/2023 audience: ITPro
search.appverid: met150
**Platforms** - Windows
-Keeping Microsoft Defender Antivirus up to date is critical to assure your devices have the latest technology and features needed to protect against new malware and attack techniques. Make sure to update your antivirus protection, even if Microsoft Defender Antivirus is running in [passive mode](microsoft-defender-antivirus-compatibility.md). There are two types of updates related to keeping Microsoft Defender Antivirus up to date:
+Keeping Microsoft Defender Antivirus up to date is critical to assure your devices have the latest technology and features needed to protect against new malware and attack techniques. Make sure to update your antivirus protection, even if Microsoft Defender Antivirus is running in [passive mode](microsoft-defender-antivirus-compatibility.md). This article includes information about the two types of updates for keeping Microsoft Defender Antivirus current:
- [Security intelligence updates](#security-intelligence-updates) - [Product updates](#product-updates)
+This article also includes:
+
+- [Microsoft Defender Antivirus platform support](#microsoft-defender-antivirus-platform-support)
+- [How to roll back an update](#how-to-roll-back-an-update) (if necessary)
+- [Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)
+- [Updates for Deployment Image Servicing and Management (DISM)](#updates-for-deployment-image-servicing-and-management-dism)
+ > [!TIP] > To see the most current engine, platform, and signature date, visit the [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates)
All our updates contain
- Serviceability improvements - Integration improvements (Cloud, [Microsoft 365 Defender](/microsoft-365/security/defender/microsoft-365-defender))
+### June-2023 (Platform: 4.18.23060.x | Engine: 1.1.23060.1005)
+
+- Security intelligence update version: **1.393.71.0**
+- Release date: **July 10, 2023 (Engine) / July 19, 2023 (Platform)**
+- Platform: **4.18.23060.x** (*final version number coming soon*)
+- Engine: **1.1.23060.1005**
+- Support phase: **Security and Critical Updates**
+ΓÇ»
+### What's new
+
+- Improved output for [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) if scan results fail to retrieve
+- Extended management options for configuring security intelligence updates with [Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-windows), [Group Policy](use-group-policy-microsoft-defender-antivirus.md), and [PowerShell](/powershell/module/defender/set-mppreference)
+- Improved the [unified agent](/microsoft-365/security/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) installation process to handle [MsMpEng.exe debugger](/microsoft-365/security/defender-endpoint/troubleshooting-mode-scenarios#scenario-2-high-cpu-usage-due-to-windows-defender-msmpengexe) extensions, if present
+- Fixed an issue pertaining to showing the exclusions list with PowerShell ([Get-MpPreference](/powershell/module/defender/get-mppreference)) on systems managed by Intune
+- Fixed warn notifications for two [attack surface reduction (ASR) rules](attack-surface-reduction.md) ([Block Office applications from injecting code into other processes](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes) and [Block credential stealing from the Windows local security authority subsystem](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference#block-credential-stealing-from-the-windows-local-security-authority-subsystem))
+- Fixed an issue with running `Update-MpSignature -UpdateSource:MMPC` when using a nonelevated PowerShell console. (See [Update-MpSignature](/powershell/module/defender/update-mpsignature).)
+- Fixed an issue with [ASR rules deployed via Intune](/mem/intune/protect/endpoint-security-asr-policy) to display accurately in the Microsoft 365 Defender portal
+- Fixed a performance issue when building and validating Defender cache
+- Improved performance by removing redundant exclusion checks
+
+### Known Issues
+
+- None
+ ### May-2023 *UPDATE* (Platform: 4.18.23050.5 | Engine: 1.1.23050.2) *Microsoft has released a platform update (**4.18.23050.5**) for the May 2023 release.*
All our updates contain
- Fixed a service-hang issue that caused invalid outputs to display in [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus)
-#### Known issues
--- None-
-### March-2023 (Platform: 4.18.2303.8 | Engine: 1.1.20200.4)
--- Security intelligence update version: **1.387.695.0**-- Release date: **April 4, 2023 (Engine) / April 11, 2023 (Platform)**-- Platform: **4.18.2303.8** -- Engine: **1.1.20200.4**-- Support phase: **Security and Critical Updates**-
-#### What's new
--- Beginning in April 2023, monthly platform and engine version release information (in this article) now includes two dates: Engine and Platform-- Increased file hash support -- Added support to protect registry keys against parent keys abuse -- Improved tamper protection of registry keys against parent keys abuse -- Improved log handling for DLP and Device Control -- Improved performance on developer drives - #### Known issues - None
security Msda Updates Previous Versions Technical Upgrade Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md
ms.localizationpriority: medium Previously updated : 05/30/2023 Last updated : 07/06/2023 audience: ITPro
search.appverid: met150
Microsoft regularly releases [security intelligence updates and product updates for Microsoft Defender Antivirus](microsoft-defender-antivirus-updates.md). It's important to keep Microsoft Defender Antivirus up to date. When a new package version is released, support for the previous two versions is reduced to technical support only. Versions that are older than the previous two versions are listed in this article and are provided for technical upgrade support only.
+## March-2023 (Platform: 4.18.2303.8 | Engine: 1.1.20200.4)
+
+- Security intelligence update version: **1.387.695.0**
+- Release date: **April 4, 2023 (Engine) / April 11, 2023 (Platform)**
+- Platform: **4.18.2303.8**
+- Engine: **1.1.20200.4**
+- Support phase: **Technical upgrade support (only)**
+
+### What's new
+
+- Beginning in April 2023, monthly platform and engine version release information (in this article) now includes two dates: Engine and Platform
+- Increased file hash support
+- Added support to protect registry keys against parent keys abuse
+- Improved tamper protection of registry keys against parent keys abuse
+- Improved log handling for DLP and Device Control
+- Improved performance on developer drives
+
+### Known issues
+
+- None
+ ## February-2023 (Platform: 4.18.2302.7 | Engine: 1.1.20100.6) - Security intelligence update version: **1.385.68.0**
security Printer Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/printer-protection.md
Title: Microsoft Defender for Endpoint Device Control Printer Protection description: Microsoft Defender for Endpoint Device Control Printer Protection blocks people from printing via non-corporate printers or non-approved USB printer.
-ms.sitesec: library
-ms.pagetype: security
ms.localizationpriority: medium Previously updated : 01/10/2023 Last updated : 07/11/2023 -+ audience: ITPro
Make sure that the Windows 10 or Windows 11 devices that you plan on deploying P
You can deploy the policy via Group Policy or Intune.
-<br>
-
-****
- |Title|Description|CSP Support | GPO Support | User-based Support | Machine-based Support | |||::|::|::|::| |**Enable Device control Printing Restrictions**|Block people from printing via non-corporate printer|Yes|Yes|Yes|Yes| |**List of Approved USB-connected print devices**\*|Allow specific USB printer|Yes|Yes|Yes|Yes|
-|
\* This policy must be used together with **Enable Device control Printing Restrictions**.
The CSP support string with `<enabled/>`:
`./Vendor/MSFT/Policy/Config/Printers/ApprovedUsbPrintDevicesUser`
-The CSP support string with approved USB printers via 'ApprovedUsbPrintDevices' property, example `<enabled><data id="ApprovedUsbPrintDevices_List" value="03F0/0853,0351/0872"/>`:
+The CSP support string with approved USB printers via 'ApprovedUsbPrintDevices' property. Example: `<enabled/><data id="ApprovedUsbPrintDevices_List" value="03F0/0853,0351/0872"/>`:
:::image type="content" source="../../media/editrow.png" alt-text="The Edit Row pane" lightbox="../../media/editrow.png":::
security Update Agent Mma Windows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/update-agent-mma-windows.md
ms.localizationpriority: medium Previously updated : 06/21/2023 Last updated : 07/11/2023 audience: ITPro
If you're using the Microsoft Monitoring Agent (MMA) on Windows devices, it's im
*This option applies to devices running Windows 7 SP1 Enterprise, Windows 7 SP1 Pro, Windows 8.1 Pro, Windows 8.1 Enterprise, and Windows Server 2008 R2 SP1.*
+- To help you identify older versions of the MMA inside of your organization, you can use the "EOSDate" column in advanced hunting. Or, follow the instructions in [Plan for end-of-support software and software versions](/microsoft-365/security/defender-vulnerability-management/tvm-end-of-support-software) to use the vulnerability management feature inside of Microsoft Defender for Endpoint to track remediation.
+ - See [Manage and maintain the Log Analytics agent for Windows and Linux](/azure/azure-monitor/agents/agent-manage?tabs=PowerShellLinux) for instructions on how to upgrade the agent using Azure Automation or a command line approach for use with various deployment tools and methods at your disposal. - Update MMA by using [Microsoft Update](/windows/deployment/update/how-windows-update-works), through [Windows Server Update Services](/windows/deployment/update/waas-manage-updates-wsus) or [Configuration Manager](/mem/configmgr/osd/deploy-use/manage-windows-as-a-service). Use the method that was configured when MMA was first installed on the device.
A new agent was released in April 2022 for Windows Server 2012 R2 and Windows Se
- [Make the switch from non-Microsoft endpoint protection to Microsoft Defender for Endpoint](switch-to-mde-overview.md) - [Microsoft Defender for Endpoint deployment overview](deployment-phases.md) - [Onboard to the Microsoft Defender for Endpoint service](onboarding.md)+
security Dlp Investigate Alerts Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/dlp-investigate-alerts-defender.md
+
+ Title: Investigate data loss alerts with Microsoft 365 Defender
+description: Investigate data loss in Microsoft 365 Defender.
+keywords: Data Loss Prevention, incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365
+f1.keywords:
+ - NOCSH
++++
+ms.localizationpriority: medium
+
+audience: ITPro
+
+ - m365-security
+ - tier2
+
+search.appverid:
+ - MOE150
+ - met150
Last updated : 07/11/2023++
+# Investigate data loss prevention alerts with Microsoft 365 Defender
++
+**Applies to:**
+
+- Microsoft 365 Defender
+
+You can manage Microsoft Purview Data Loss Prevention (DLP) alerts in the Microsoft 365 Defender portal. Open **Incidents & alerts** \> **Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>. From this page, you can:
+
+- View all your DLP alerts grouped under incidents in the Microsoft 365 Defender incident queue.
+- View intelligent inter-solution (DLP-MDE, DLP-MDO) and intra-solution (DLP-DLP) correlated alerts under a single incident.
+- Hunt for compliance logs along with security under Advanced Hunting.
+- In-place admin remediation actions on user, file, and device.
+- Associate custom tags to DLP incidents and filter by them.
+- Filter by DLP policy name, tag, Date, service source, incident status, and user on the unified incident queue.
+
+> [!TIP]
+> You can also pull DLP incidents along with events and evidence into Microsoft Sentinel for investigation and remediation with the Microsoft 365 Defender connector in Microsoft Sentinel.
+
+## Licensing requirements
+
+To investigate Microsoft Purview Data Loss Prevention incidents in the Microsoft 365 Defender portal, you need a license from one of the following subscriptions:
+
+- Microsoft Office 365 E5/A5
+- Microsoft 365 E5/A5
+- Microsoft 365 E5/A5 Compliance
+- Microsoft 365 E5/A5 Security
+- Microsoft 365 E5/A5 Information Protection and Governance
+
+> [!NOTE]
+> When you are licensed and eligible for this feature, DLP alerts will automatically flow into Microsoft 365 Defender. If you don't want DLP alerts to flow into Defender, open a support case to disable this feature. If you disable this feature DLP alerts will surface in the Defender portal as Microsoft Defender for Office alerts.
+
+## Before you start
+
+[Turn on alerts for all your DLP policies](/microsoft-365/compliance/dlp-configure-view-alerts-policies#alert-configuration-experience) in the <a href="https://purview.microsoft.com" target="_blank">Microsoft Purview compliance portal</a>.
+
+## Investigate DLP alerts in the Microsoft 365 Defender portal
+
+1. Go to the Microsoft 365 Defender portal, and select **Incidents** in the left hand navigation menu to open the incidents page.
+
+2. Select **Filters** on the top right, and choose **Service Source : Data Loss Prevention** to view all incidents with DLP alerts.
+
+3. Search for the DLP policy name of the alerts and incidents you're interested in.
+
+4. To view the incident summary page, select the incident from the queue. Similarly, select the alert to view the DLP alert page.
+
+5. View the **Alert story** for details about policy and the sensitive information types detected in the alert. Select the event in the **Related Events** section to see the user activity details.
+
+6. View the matched sensitive content in the **Sensitive info types** tab and the file content in the **Source** tab if you have the required permission (See details <a href="/microsoft-365/compliance/dlp-alerts-dashboard-get-started#roles" target="_blank">here</a>).
+
+You can also use Advanced Hunting to search through audit logs of user, files, and site locations for your investigation. The **CloudAppEvents** table contains all audit logs across all locations like SharePoint, OneDrive, Exchange and Devices.
+
+If the alert is for an email message, you can download the message by selecting **Actions** \> **Download email**.
+
+If the alert is for a file in SharePoint Online or One Drive for Business, you can take these actions:
+
+- Apply retention label
+- Unshare
+- Delete
+- Apply sensitivity labelUnshare file
+- Download
+- Withdraw feedback
+
+For remediation actions, select the **User card** on the top of the alert page to open the user details.
+
+For Devices DLP alerts, select the device card on the top of the alert page to view the device details and take remediation actions on the device.
+
+Go to the incident summary page and select **Manage Incident** to add incident tags, assign, or resolve an incident.
+
+> [!IMPORTANT]
+> DLP supports associating DLP policies and alert management with administrative units in the Microsoft Purview compliance portal. DLP alerts are only available to unrestricted DLP administrators in the Microsoft 365 Defender portal. Administrative unit restricted DLP administrator will not see DLP alerts. See [Administrative units](/microsoft-365/compliance/microsoft-365-compliance-center-permissions#administrative-units) for implementation details. See [Policy scoping](/microsoft-365/compliance/dlp-policy-reference#policy-scoping) for details on administrative unit scoping.
+
+## Related articles
+
+- [Incidents overview](incidents-overview.md)
+- [Prioritize incidents](incident-queue.md)
+- [Manage incidents](manage-incidents.md)
security Dlp Investigate Alerts Sentinel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/dlp-investigate-alerts-sentinel.md
+
+ Title: Investigate data loss prevention alerts with Microsoft Sentinel
+description: Investigate data loss prevention alerts in Microsoft Sentinel.
+keywords: Data Loss Prevention, incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365
+f1.keywords:
+ - NOCSH
++++
+ms.localizationpriority: medium
+
+audience: ITPro
+
+ - m365-security
+ - tier2
+
+search.appverid:
+ - MOE150
+ - met150
Last updated : 07/11/2023++
+# Investigate data loss prevention alerts with Microsoft Sentinel
++
+**Applies to:**
+
+- Microsoft 365 Defender
+- Microsoft Sentinel
+
+## Before you start
+
+See, [Investigate data loss prevention alerts with Microsoft 365 Defender](dlp-investigate-alerts-defender.md#investigate-data-loss-prevention-alerts-with-microsoft-365-defender) for more details.
+
+## DLP investigation experience in Microsoft Sentinel
+
+You can use the Microsoft 365 Defender connector in Microsoft Sentinel to import all DLP incidents into Sentinel to extend your correlation, detection, and investigation across other data sources and extend your automated orchestration flows using Sentinel's native SOAR capabilities.
+
+1. Follow instructions on Connect data from Microsoft 365 Defender to Microsoft Sentinel to import all incidents including DLP incidents and alerts into Sentinel. Enable `CloudAppEvents` event connector to pull all Office 365 audit logs into Sentinel.
+
+ You should be able to see your DLP incidents in Sentinel once the above connector is set up.
+
+2. Select **Alerts** to view the alert page.
+
+3. You can use **AlertType**, **startTime**, and **endTime** to query the **CloudAppEvents** table to get all the user activities that contributed to the alert. Use this query to identify the underlying activities:
+
+```kusto
+let Alert = SecurityAlert
+| where TimeGenerated > ago(30d)
+| where SystemAlertId == ""; // insert the systemAlertID here
+CloudAppEvents
+| extend correlationId1 = parse_json(tostring(RawEventData.Data)).cid
+| extend correlationId = tostring(correlationId1)
+| join kind=inner Alert on $left.correlationId == $right.AlertType
+| where RawEventData.CreationTime > StartTime and RawEventData.CreationTime < EndTime
+```
+
+## Related articles
+
+- [Incidents overview](incidents-overview.md)
+- [Prioritize incidents](incident-queue.md)
+- [Manage incidents](manage-incidents.md)
security Investigate Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-alerts.md
As needed for in-process incidents, continue your [investigation](investigate-in
- [Incidents overview](incidents-overview.md) - [Manage incidents](manage-incidents.md) - [Investigate incidents](investigate-incidents.md)-- [Investigate data loss incidents](investigate-dlp.md)
+- [Investigate data loss prevention alerts in Defender](dlp-investigate-alerts-defender.md)
- [Azure Active Directory Identity Protection](/azure/active-directory/identity-protection/overview-identity-protection) -
security Investigate Dlp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-dlp.md
- Title: Investigate data loss incidents with Microsoft 365 Defender
-description: Investigate data loss in Microsoft 365 Defender.
-keywords: Data Loss Prevention, incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365
- - NOCSH
------
- - m365-security
- - tier2
-
- - MOE150
- - met150
Previously updated : 05/23/2022--
-# Investigate data loss incidents with Microsoft 365 Defender
--
-**Applies to:**
--- Microsoft 365 Defender-
-Incidents for Microsoft Purview Data Loss Prevention (DLP) can now be managed in the Microsoft 365 Defender portal. You can manage DLP incidents along with security incidents from **Incidents & alerts** \> **Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>. From this page, you can:
--- View all your DLP alerts grouped under incidents in the Microsoft 365 Defender incident queue.-- View intelligent inter-solution (DLP-MDE, DLP-MDO) and intra-solution (DLP-DLP) correlated alerts under a single incident.-- Hunt for compliance logs along with security under Advanced Hunting.-- In-place admin remediation actions on user, file, and device. -- Associate custom tags to DLP incidents and filter by them.-- Filter by DLP policy name, tag, Date, service source, incident status, and user on the unified incident queue. -
-You can also use the Microsoft 365 Defender connector in Microsoft Sentinel to pull DLP incidents along with events and evidence into Microsoft Sentinel for investigation and remediation.
-
-## Licensing requirements
-
-To investigate Microsoft Purview Data Loss Prevention incidents in the Microsoft 365 Defender portal, you need a license from one of the following subscriptions:
--- Microsoft Office 365 E5/A5-- Microsoft 365 E5/A5-- Microsoft 365 E5/A5 Compliance-- Microsoft 365 E5/A5 Security-- Microsoft 365 E5/A5 Information Protection and Governance-
-> [!NOTE]
-> When you are licensed and eligible for this feature, DLP alerts will automatically flow into Microsoft 365 Defender. Open a support case if you want to disable this feature. If you disable this feature the behavior will be reverted to DLP alerts surfacing in the Defender portal as Microsoft Defender for Office alerts.
-
-## DLP investigation experience in the Microsoft 365 Defender portal
-
-Before you start, [turn on alerts for all your DLP policies](/microsoft-365/compliance/dlp-configure-view-alerts-policies#alert-configuration-experience) in the <a href="https://purview.microsoft.com" target="_blank">Microsoft Purview compliance portal</a>.
-
-1. Go to the Microsoft 365 Defender portal, and select **Incidents** in the left hand navigation menu to open the incidents page.
-
-2. Select **Filters** on the top right, and choose **Service Source : Data Loss Prevention** to view all incidents with DLP alerts.
-
-3. Search for the DLP policy name of the alerts and incidents you're interested in.
-
-4. To view the incident summary page, select the incident from the queue. Similarly, select the alert to view the DLP alert page.
-
-5. View the **Alert story** for details about policy and the sensitive information types detected in the alert. Select the event in the **Related Events** section to see the user activity details.
-
-6. View the matched sensitive content in the **Sensitive info types** tab and the file content in the **Source** tab if you have the required permission (See details <a href="/microsoft-365/compliance/dlp-alerts-dashboard-get-started#roles" target="_blank">here</a>).
-
-7. You can also use Advanced Hunting to search through audit logs of user, files, and site locations for your investigation. The **CloudAppEvents** table contains all audit logs across all locations like SharePoint, OneDrive, Exchange and Devices.
-
-8. You can also download the email by selecting **Actions** \> **Download email**.
-
-9. For remediation actions on files on SPO or ODB sites, you can see actions like:
-
- - Apply retention label
- - Apply sensitivity label
- - Unshare file
- - Delete
-
- For remediation actions, select the **User card** on the top of the alert page to open the user details.
-
- For Devices DLP alerts, select the device card on the top of the alert page to view the device details and take remediation actions on the device.
-
-10. Go to the incident summary page and select **Manage Incident** to add incident tags, assign, or resolve an incident.
-
-> [!IMPORTANT]
-> DLP supports associating DLP policies and alert management with administrative units in the Microsoft Purview compliance portal (preview). DLP alerts are only available to unrestricted DLP administrators in the Microsoft 365 Defender portal. Administrative unit restricted DLP administrator will not see DLP alerts. See [Administrative units](/microsoft-365/compliance/microsoft-365-compliance-center-permissions#administrative-units-preview) for implementation details. See [Policy scoping](/microsoft-365/compliance/dlp-policy-reference#policy-scoping) for details on administrative unit scoping.
-
-## DLP investigation experience in Microsoft Sentinel
-
-You can use the Microsoft 365 Defender connector in Microsoft Sentinel to import all DLP incidents into Sentinel to extend your correlation, detection, and investigation across other data sources and extend your automated orchestration flows using Sentinel's native SOAR capabilities.
-
-1. Follow instructions on Connect data from Microsoft 365 Defender to Microsoft Sentinel to import all incidents including DLP incidents and alerts into Sentinel. Enable `CloudAppEvents` event connector to pull all O365 audit logs into Sentinel.
-
- You should be able to see your DLP incidents in Sentinel once the above connector is set up.
-
-2. Select **Alerts** to view the alert page.
-
-3. You can use **AlertType**, **startTime**, and **endTime** to query the **CloudAppEvents** table to get all the user activities that contributed to the alert. Use this query to identify the underlying activities:
-
-```kusto
-let Alert = SecurityAlert
-| where TimeGenerated > ago(30d)
-| where SystemAlertId == ""; // insert the systemAlertID here
-CloudAppEvents
-| extend correlationId1 = parse_json(tostring(RawEventData.Data)).cid
-| extend correlationId = tostring(correlationId1)
-| join kind=inner Alert on $left.correlationId == $right.AlertType
-| where RawEventData.CreationTime > StartTime and RawEventData.CreationTime < EndTime
-```
-
-## Related articles
--- [Incidents overview](incidents-overview.md)-- [Prioritize incidents](incident-queue.md)-- [Manage incidents](manage-incidents.md)
security Anti Phishing Policies About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-about.md
description: Admins can learn about the anti-phishing policies that are availabl
search.appverid: met150 Previously updated : 7/5/2023 Last updated : 7/11/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 plan 1 and plan 2</a>
The **Show first contact safety tip** setting is available in EOP and Defender f
- The first time they get a message from a sender - They don't often get messages from the sender.
-This capability adds an extra layer of security protection against potential impersonation attacks, so we recommend that you turn it on.
+This capability adds an extra layer of protection against potential impersonation attacks, so we recommend that you turn it on.
-The first contact safety tip also replaces the need to create mail flow rules (also known as transport rules) that add the header named **X-MS-Exchange-EnableFirstContactSafetyTip** with the value **Enable** to messages (although this capability is still available).
+The first contact safety tip is controlled by the value 9.25 of the `SFTY` field in the **X-Forefront-Antispam-Report** header of the message. This functionality replaces the need to create mail flow rules (also known as transport rules) that add a header named **X-MS-Exchange-EnableFirstContactSafetyTip** with the value `Enable` to messages, although this capability is still available.
Depending on the number of recipients in the message, the first contact safety tip can be either of the following values:
Depending on the number of recipients in the message, the first contact safety t
:::image type="content" source="../../media/safety-tip-first-contact-multiple-recipients.png" alt-text="The First contact safety tip for messages with multiple recipients" lightbox="../../media/safety-tip-first-contact-multiple-recipients.png":::
+> [!NOTE]
> If the message has multiple recipients, whether the tip is shown and to whom is based on a majority model. If the majority of recipients have never or don't often receive messages from the sender, then the affected recipients will receive the **Some people who received this message...** tip. If you're concerned that this behavior exposes the communication habits of one recipient to another, you should not enable the first contact safety tip and continue to use mail flow rules and the **X-MS-Exchange-EnableFirstContactSafetyTip** header instead. > > The first contact safety tip is not stamped in S/MIME signed messages.
For impersonation attempts detected by mailbox intelligence, the following actio
Impersonation safety tips appear to users when messages are identified as impersonation attempts. The following safety tips are available: - **Show user impersonation safety tip**: The From address contains a user specified in [user impersonation protection](#user-impersonation-protection). Available only if **Enable users to protect** is turned on and configured.+
+ This safety tip is controlled by the value 9.20 of the `SFTY` field in the **X-Forefront-Antispam-Report** header of the message. The text says:
+
+ > This sender appears similar to someone who previously sent you email, but may not be that person.
+ - **Show domain impersonation safety tip**: The From address contains a domain specified in [domain impersonation protection](#domain-impersonation-protection). Available only if **Enable domains to protect** is turned on and configured.-- **Show user impersonation unusual characters safety tip**: The From address contains unusual character sets (for example, mathematical symbols and text or a mix of uppercase and lowercase letters) in a sender specified in [user impersonation protection](#user-impersonation-protection). Available only if **Enable users to protect** is turned on and configured.+
+ This safety tip is controlled by the value 9.19 of the `SFTY` field in the **X-Forefront-Antispam-Report** header of the message. The text says:
+
+ > This sender might be impersonating a domain that's associated with your organization.
+
+- **Show user impersonation unusual characters safety tip**: The From address contains unusual character sets (for example, mathematical symbols and text or a mix of uppercase and lowercase letters) in an sender specified in [user impersonation protection](#user-impersonation-protection). Available only if **Enable users to protect** is turned on and configured.
> [!NOTE] > Safety tips are not stamped in the following messages:
security Defender For Office 365 Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/defender-for-office-365-whats-new.md
For more information on what's new with other Microsoft Defender security produc
## July 2023 - Use anti-phishing policies to control what happens to messages where the sender fails explicit [DMARC](email-authentication-dmarc-configure.md) checks and the DMARC policy is set to `p=quarantine` or `p=reject`. For more information, see [Spoof protection and sender DMARC policies](anti-phishing-policies-about.md#spoof-protection-and-sender-dmarc-policies).
+- [User tags](user-tags-about.md) are now fully integrated with Defender for Office 365 reports, including:
+ - [Threat protection status report](reports-email-security.md#threat-protection-status-report)
+ - [Compromised users report](reports-email-security.md#compromised-users-report)
+ - [Top senders and recipients report](reports-email-security.md#top-senders-and-recipients-report)
+ - [URL protection report](reports-email-security.md#url-protection-report)
## May 2023
security Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-policies.md
The relationship between permissions, permissions groups, and the default quaran
|Permission|No access|Limited access|Full access| ||::|::|::|
-|_PermissionToViewHeader_┬╣|Γ£ö|Γ£ö|Γ£ö|
+|(_PermissionToViewHeader_)┬╣|Γ£ö|Γ£ö|Γ£ö|
|**Block sender** (_PermissionToBlockSender_)||Γ£ö|Γ£ö| |**Delete** (_PermissionToDelete_)||Γ£ö|Γ£ö| |**Preview** (_PermissionToPreview_)┬▓||Γ£ö|Γ£ö|
security Safe Attachments Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-policies-configure.md
description: Learn about how to define Safe Attachments policies to protect your
Previously updated : 6/19/2023 Last updated : 7/10/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 plan 1 and plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft 365 Defender</a>
To verify that you've successfully created, modified, or removed Safe Attachment
Get-SafeAttachmentRule -Identity "<Name>" | Format-List ```
-To verify that Safe Attachments is scanning messages, check the available Defender for Office 365 reports. For more information, see [View reports for Defender for Office 365](reports-defender-for-office-365.md) and [Use Explorer in the Microsoft 365 Defender portal](threat-explorer-about.md).
+- Add the URL `http://spamlink.contoso.com` to a file (for example, a Word document), and attach that file in an email message to test Safe Attachments protection. This URL is similar to the GTUBE text string for testing anti-spam solutions. This URL isn't harmful, but when it's included in an email attachment, it triggers a Safe Attachments protection response.
+
+- To verify that Safe Attachments is scanning messages, check the available Defender for Office 365 reports. For more information, see [View reports for Defender for Office 365](reports-defender-for-office-365.md) and [Use Explorer in the Microsoft 365 Defender portal](threat-explorer-about.md).
security Safe Links About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-about.md
appliesto:
> [!IMPORTANT] > This article is intended for business customers who have [Microsoft Defender for Office 365](defender-for-office-365.md). If you're using Outlook.com, Microsoft 365 Family, or Microsoft 365 Personal, and you're looking for information about Safelinks in Outlook, see [Advanced Outlook.com security](https://support.microsoft.com/office/882d2243-eab9-4545-a58a-b36fee4a46e2).
-In organizations with Microsoft Defender for Office 365, Safe Links scanning protects your organization from malicious links that are used in phishing and other attacks. Specifically, Safe Links provides URL scanning and rewriting of inbound email messages during mail flow, and time-of-click verification of URLs and links in email messages, Teams, and supported Office 365 apps. Safe Links scanning occurs in addition to regular [anti-spam](anti-spam-protection-about.md) and [anti-malware](anti-malware-protection-about.md) protection.
+In organizations with Microsoft Defender for Office 365, Safe Links scanning protects your organization from malicious links, including QR codes, that are used in phishing and other attacks. Specifically, Safe Links provides URL scanning and rewriting of inbound email messages during mail flow, and time-of-click verification of URLs and links in email messages, Teams, and supported Office 365 apps. Safe Links scanning occurs in addition to regular [anti-spam](anti-spam-protection-about.md) and [anti-malware](anti-malware-protection-about.md) protection.
Watch this short video on how to protect against malicious links with Safe Links in Microsoft Defender for Office 365.
security How To Enable Dmarc Reporting For Microsoft Online Email Routing Address Moera And Parked Domains https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-enable-dmarc-reporting-for-microsoft-online-email-routing-address-moera-and-parked-domains.md
This guide is designed to help you configure DMARC for domains not covered by th
1. Select **+ Add record**. 1. A flyout will appear on the right. Ensure that the selected Type is **TXT (Text)**. 1. Add `_dmarc` as **TXT name**.
-1. Add your specific DMARC value.
+1. Add your specific DMARC value. For more information, see [Form the DMARC TXT record for your domain](../email-authentication-dmarc-configure.md#step-4-form-the-dmarc-txt-record-for-your-domain).
1. Press **Save**. ## Active DMARC for parked domains
security Tenant Allow Block List About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-about.md
Use the **Submissions** page (also known as *admin submission*) at <https://secu
- **Domains and email addresses**: - Email messages from these senders are marked as *high confidence spam* (SCL = 9). What happens to the messages is determined by the [anti-spam policy](anti-spam-policies-configure.md) that detected the message for the recipient. In the default anti-spam policy and new custom policies, messages that are marked as high confidence spam are delivered to the Junk Email folder by default. In Standard and Strict [preset security policies](preset-security-policies.md), high confidence spam messages are quarantined.
- - Users in the organization can't send email to these blocked domains and addresses. They'll receive the following non-delivery report (also known as an NDR or bounce message): '550 5.7.703 Your message can't be delivered because one or more recipients are blocked by your organization's tenant recipient block policy'. The entire message is blocked for all recipients of the message, even if only one recipient email address or domain is defined in a block entry.
+ - Users in the organization can't send email to these blocked domains and addresses. They'll receive the following non-delivery report (also known as an NDR or bounce message): '550 5.7.703 Your message can't be delivered because one or more recipients are blocked by your organization's tenant recipient block policy'. The entire message is blocked for all *external* recipients of the message, even if only one recipient email address or domain is defined in a block entry.
> [!TIP] > To block only spam from a specific sender, add the email address or domain to the block list in [anti-spam policies](anti-spam-policies-configure.md). To block all email from the sender, use **Domains and email addresses** in the Tenant Allow/Block List.
syntex Copilot Syntex https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/copilot-syntex.md
+
+ Title: Overview of Syntex File Q&A for Microsoft 365 Copilot (Preview)
+++
+audience: admin
+ Last updated : 07/11/2023++
+search.appverid:
+
+ - enabler-strategic
+ - m365initiative-syntex
+ms.localizationpriority: medium
+
+description: Learn how to use Microsoft 365 Copilot to easily find information in Microsoft Syntex.
++
+# Overview of Syntex File Q&A for Microsoft 365 Copilot (Preview)
+
+> [!NOTE]
+> This feature is currently in limited preview and subject to change.
+
+Microsoft Syntex is now integrated with Microsoft 365 Copilot to bring the power of assistive AI into your organization's intelligent document processing.
+
+Syntex File Q&A for Copilot analyzes the text of a selected file in a SharePoint document library, in OneDrive for Business, or in Teams. It then generates a set of questions you can ask about the information in the file. The questions can be used to quickly identify the type of document, generate a summary of information in the document, and identify key points or other important information. You can also ask your own questions, such as "When does this contract expire?" or "What is the fee schedule for this project?"
+
+## To use Syntex File Q&A for Copilot
+
+1. From a SharePoint document library, select a document.
+
+2. On the ribbon, select **Copilot**.
+
+ ![Screenshot of a document library page showing a document selected and the Copilot button on the ribbon.](../media/content-understanding/copilot-document-selected.png)
+
+3. The first time you use Syntex File Q&A for Copilot, you'll see this **Copilot** panel.
+
+ ![Screenshot of the first-run experience Copilot panel.](../media/content-understanding/copilot-panel-first-run.png)
+
+4. After that, you'll see this **Copilot** panel.
+
+ ![Screenshot of the Copilot panel.](../media/content-understanding/copilot-panel.png)
+
+5. On the **Copilot** panel, you can:
+
+ - Select one of the questions Copilot has generated for you tailored for the specific file. Or select **Refresh** (![Image of the Refresh icon.](../media/content-understanding/copilot-refresh-icon.png)) to generate more questions.
+
+ ![Screenshot of the generated questions on the Copilot panel.](../media/content-understanding/copilot-generated-questions.png)
+
+ - In the text box, enter your own specific question or make a request.
+
+ ![Screenshot of the text box on the Copilot panel.](../media/content-understanding/copilot-text-box.png)
+
+<! - In the text box, select **More from Syntex** to find more information about the file.
+
+ ![Screenshot of the text box on the Copilot panel with the starter prompt highlighted.](../media/content-understanding/copilot-starter-prompt.png)>
+
+> [!NOTE]
+> If you want to clear the current session, at the top of the **Copilot** panel, select **More options** (<sup>**...**</sup>), and then select **Clear session**.
+
+## Current limitations
+
+- Syntex File Q&A for Copilot currently works on Word (.docx), PowerPoint (.pptx), and text-readable .pdf file types. More file types will be added in the future.
+
+- Syntex File Q&A for Copilot is currently only available to customers in the United States, and currently only understands instructions in English. More languages and locales will be added in the future.
+
+- Syntex File Q&A for Copilot works on a single selected file at a time, and it only processes the first 4,000 tokens (approximately six pages).
+
+- Syntex File Q&A for Copilot won't process encrypted files or files stamped with "Confidential" or "Highly Confidential" sensitivity labels.
+
+- Syntex File Q&A for Copilot doesn't save the context of your session, but you can copy the information if you want to save it.
+
+> [!IMPORTANT]
+> It's important that you review any content the AI generates for you to make sure it has accurately produced what you wanted.
+
+## Data security and privacy
+
+The new Copilot experiences don't change Microsoft's commitment and principles for data security and privacy. Learn more about [Microsoft's standards for data security and privacy](https://techcommunity.microsoft.com/t5/microsoft-365-blog/administration-of-microsoft-365-in-the-new-era-of-ai/ba-p/3767079) and [how data is maintained in the Azure OpenAI service](/legal/cognitive-services/openai/data-privacy#how-is-data-retained-and-what-customer-controls-are-available).
+
+## Let us know what you think
+
+If you have a suggestion for Syntex File Q&A for Copilot, or if there's something you like or something you don't like about it, you can submit feedback to Microsoft from the **Copilot** panel. Select **More options** (<sup>**...**</sup>), and then select **Send feedback**.
+
+ ![Screenshot of the Copilot panel showing the Send feedback option.](../media/content-understanding/copilot-send-feedback.png)
+
+This feedback is used to help us improve your experience in Syntex File Q&A for Copilot.
syntex Syntex Licensing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/syntex-licensing.md
description: Learn about licensing for Microsoft Syntex.
# Licensing for Microsoft Syntex
-Microsoft Syntex has two types of product offerings to choose from:
+Microsoft Syntex has two types of licensing:
- [Microsoft Syntex pay-as-you-go](#microsoft-syntex-pay-as-you-go) - [SharePoint Syntex per-user licensing](#microsoft-syntex-per-user-licensing)
All users in your organization will be able to create and apply unstructured and
## Microsoft Syntex per-user licensing
+> [!NOTE]
+> As of July 1, 2023, per-user licenses are no longer available for purchase. You will need to [set up pay-as-you-go billing](syntex-azure-billing.md).<br><br>
+> Per-user licenses purchased before July 1 can still be assigned to new users. After existing per-user licenses expire, you will need to opt-in to Syntex [pay-as-you-go billing](syntex-azure-billing.md).
+ To use Syntex, you must have a license for each Syntex user. If you remove all Syntex per-user licenses from your tenant at a future date (or your trial expires), users will no longer be able to create, publish, or run custom models. Additionally, term store reports, SKOS taxonomy import, and content type push will no longer be available. No models, content, or metadata will be deleted, and site permissions won't be changed. #### Tasks requiring a per-user license