Category | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
admin | Active Users Ww | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/active-users-ww.md | You can also export the report data into an Excel .csv file, by selecting the Ex You can change what information is displayed in the grid table with column controls. -If your subscription is operated by 21Vianet, then you will not see Yammer. +If your subscription is operated by 21Vianet, then you will not see Viva Engage. If your organization's policies prevents you from viewing reports where user information is identifiable, you can change the privacy setting for all these reports. Check out the **How do I hide user level details?** section in [Activity Reports in the Microsoft 365 admin center](activity-reports.md). |
admin | Activity Reports | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/activity-reports.md | Depending on your subscription, here are the available reports in all environmen |[OneDrive for Business usage](onedrive-for-business-usage-ww.md)|Yes|Yes|Yes|Yes|Yes| |[SharePoint site usage](sharepoint-site-usage-ww.md)|Yes|Yes|Yes|Yes|Yes| |[SharePoint activity](sharepoint-activity-ww.md)|Yes|Yes|Yes|Yes|Yes|-|[Microsoft Teams user activity](microsoft-teams-user-activity-preview.md)|Yes|Yes|Yes|Yes|Yes| -|[Microsoft Teams device usage](microsoft-teams-device-usage-preview.md)|Yes|Yes|Yes|Yes|Yes| -|[Microsoft Teams team activity](microsoft-teams-usage-activity.md)|Yes|Yes|Yes|Yes|Yes| -|[Yammer activity](yammer-activity-report-ww.md)|Yes|Yes|N/A<sup>2</sup>|N/A<sup>2</sup>|N/A<sup>2</sup>| -|[Yammer device usage](yammer-device-usage-report-ww.md)|Yes|Yes|N/A<sup>2</sup>|N/A<sup>2</sup>|N/A<sup>2</sup>| -|[Yammer groups activity report](yammer-groups-activity-report-ww.md)|Yes|Yes|N/A<sup>2</sup>|N/A<sup>2</sup>|N/A<sup>2</sup>| +|[Microsoft Teams user activity](microsoft-teams-user-activity-preview.md)|Yes|Yes|Yes|Yes|N/A<sup>1</sup>| +|[Microsoft Teams device usage](microsoft-teams-device-usage-preview.md)|Yes|Yes|Yes|Yes|N/A<sup>1</sup>| +|[Microsoft Teams team activity](microsoft-teams-usage-activity.md)|Yes|Yes|Yes|Yes|N/A<sup>1</sup>| +|[Viva Engage activity](viva-engage-activity-report-ww.md)|Yes|Yes|N/A<sup>2</sup>|N/A<sup>2</sup>|N/A<sup>2</sup>| +|[Viva Engage device usage](viva-engage-device-usage-report-ww.md)|Yes|Yes|N/A<sup>2</sup>|N/A<sup>2</sup>|N/A<sup>2</sup>| +|[Viva Engage groups activity report](viva-engage-groups-activity-report-ww.md)|Yes|Yes|N/A<sup>2</sup>|N/A<sup>2</sup>|N/A<sup>2</sup>| |[Forms activity](forms-activity-ww.md)|Yes|Yes|N/A<sup>1</sup>|N/A<sup>1</sup>|N/A<sup>1</sup>| |[Dynamics 365 Customer Voice activity](forms-pro-activity-ww.md)|Yes|Yes|N/A<sup>2</sup>|N/A<sup>2</sup>|N/A<sup>2</sup>| |[Skype for Business Online activity](/SkypeForBusiness/skype-for-business-online-reporting/activity-report)|Yes|Yes|N/A<sup>1</sup>|N/A<sup>1</sup>|Yes| |
admin | Office 365 Groups Ww | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/office-365-groups-ww.md | The following are definitions of the metrics available in the report table. |Group name |The name of the group. | |Deleted |The number of deleted groups. If the group is deleted, but had activity in the reporting period it will show up in the grid with this flag set to true. | |Group owner |The name of the group owner. |-|Last activity date (UTC) |The latest date a message was received by the group. - This is the latest date an activity happened in an email conversation, Yammer, or the Site. | +|Last activity date (UTC) |The latest date a message was received by the group. - This is the latest date an activity happened in an email conversation, Viva Engage, or the Site. | |Type |The type of group. This can be private or public group. | |Emails received in Exchange |The number of messages received by the group.| |Emails in Exchange (total) |The total number of items in the group's mailbox. | The following are definitions of the metrics available in the report table. |SharePoint files (total) |The number of files stored in SharePoint group sites. | |SharePoint files (active) |The number of files in the SharePoint group site that were acted on (viewed or modified, synched, shared internally or externally) during the reporting period. | |Total site storage used for SharePoint (MB) |The amount of storage in MB used during the reporting period. |-|Messages in Yammer (posted) |The number of messages posted in the Yammer group over the reporting period. | -|Messages in Yammer (read) |The number of conversations read in the Yammer group over the reporting period. | -|Messages in Yammer (liked) |The number of messages liked in the Yammer group over the reporting period. | +|Messages in Viva Engage (posted) |The number of messages posted in the Viva Engage group over the reporting period. | +|Messages in Viva Engage (read) |The number of conversations read in the Viva Engage group over the reporting period. | +|Messages in Viva Engage (liked) |The number of messages liked in the Viva Engage group over the reporting period. | |Members |The number of members in the group. | |External members |The number of external users in the group.| |Total organized meetings |The sum of one-time scheduled and recurring meetings a user organized during the specified time period.| |
admin | Viva Engage Activity Report Ww | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/viva-engage-activity-report-ww.md | + + Title: "Microsoft 365 admin center Viva Engage activity reports" +f1.keywords: +- NOCSH +++ Last updated : 10/26/2020+audience: Admin +++ms.localizationpriority: medium ++- Tier2 +- scotvorg +- M365-subscription-management +- Adm_O365 +- Adm_NonTOC ++search.appverid: +- BCS160 +- MST160 +- MET150 +- MOE150 +description: "Get the Viva Engage Activity report and know more about the number of users using Viva Engage to post, like, or read a message." +++# Microsoft 365 Reports in the admin center - Viva Engage activity report ++As Microsoft 365 admin, the Reports dashboard shows you data on the usage of the products within your organization. Check out [activity reports in the admin center](activity-reports.md). With the **Viva Engage Activity report**, you can understand the level of engagement of your organization with Viva Engage by looking at the number of unique users using Viva Engage to post, like or read a message and the amount of activity generated across the organization. + +## How do I get to the Viva Engage activity report? ++1. In the admin center, go to the **Reports**, and then select **Usage**. +2. From the dashboard homepage, click on the **View more** button on the Viva Engage card. ++ +## Interpret the Viva Engage activity report ++You can view the activities in the Viva Engage report by choosing the **Activity** tab. ++ ++Select **Choose columns** to add or remove columns from the report. ++ ++You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. ++The **Viva Engage activity** report can be viewed for trends over the last 7 days, 30 days, 90 days, or 180 days. However, if you select a particular day in the report, the table will show data for up to 28 days from the current date (not the date the report was generated). + +|Item|Description| +|:--|:--| +|**Metric**|**Definition**| +|Username <br/> |The email address of the user. You can display the actual email address or make this field anonymous. This grid shows users who logged into Viva Engage using the Microsoft 365 account or who logged into the network using single sign-on. <br/> | +|Display name <br/> |The full name of the user. You can display the actual email address or make this field anonymous. <br/> | +|User state <br/> |One of three values: Activated, Deleted, or Suspended. These reports show data for active, suspended, and deleted users. They do not reflect pending users, because pending users cannot post, read, or like a message. <br/> | +|State change date (UTC) <br/> |The date on which the user's state was changed in Viva Engage. <br/> | +|Last activity date (UTC) <br/> | The last date that the user posted, read, or liked a message. <br/> | +|Posted <br/> |The number of messages the user posted during the time period you specified. <br/>| +|Read <br/> |The number of conversations that the user read during the time period you specified. <br/> | +|Liked <br/> |The number of messages that the user liked during the time period you specified. <br/>| +|Product assigned <br/> |The products that are assigned to this user.| +||| |
admin | Viva Engage Device Usage Report Ww | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/viva-engage-device-usage-report-ww.md | + + Title: "Microsoft 365 admin center Viva Engage device usage reports" +f1.keywords: +- NOCSH +++ Last updated : 10/26/2020+audience: Admin +++ms.localizationpriority: medium ++- Tier2 +- scotvorg +- M365-subscription-management +- Adm_O365 +- Adm_NonTOC ++search.appverid: +- BCS160 +- MST160 +- MET150 +- MOE150 +description: "Get the Viva Engage device usage report to learn more about which devices your users are using Viva Engage on, number of daily users by device type, and details per user." +++# Microsoft 365 Reports in the admin center - Viva Engage device usage report ++The Microsoft 365 Reports dashboard shows you the activity overview across the products in your organization. It enables you to drill in to individual product level reports to give you more granular insight about the activities within each product. Check out the [Reports overview topic](activity-reports.md). ++The Viva Engage device usage reports give you information about which devices your users are using Viva Engage on. You can view the number of daily users by device type, and number of users by device type. You can view both over a selected time period. You can also view details per user. + +## How do I get to the Viva Engage device usage report? ++1. In the admin center, go to the **Reports**, and then select **Usage**. +2. From the dashboard homepage, select **View more** on the Viva Engage card. + +## Interpret the Viva Engage device usage report ++Select the **Device usage** tab to view the usage in the OneDrive report. +++Select **Choose columns** to add or remove columns from the report. +++You also can export the report data into an Excel .csv file by selecting the Export link. This link exports data of all users and enables you to do simple sorting and filtering for further analysis. ++The **Viva Engage device usage** report can be viewed for trends over the last 7 days, 30 days, 90 days, or 180 days. However, if you select a particular day in the report, the table will show data for up to 28 days from the current date (not the date the report was generated). + +|Metric|Definition| +|:--|:--| +|Username |The email address of the user. You can display the actual email address or make this field anonymous. This grid shows users who logged in to Viva Engage using the Microsoft 365 account or who logged in to the network using single sign-on. | +|Display name |The full name of the user. You can display the actual email address or make this field anonymous. | +|User state |One of three values: Active, Deleted, or Suspended. These reports show data for active, suspended, and deleted users. They don't reflect pending users, because pending users can't post, read, or like a message. | +|State change date (UTC) |The date on which the user's state was changed in Viva Engage. | +|Last activity date (UTC) |The last date (UTC) that the user participated in a Viva Engage activity. | +|Web |Indicates if the user has used Viva Engage on the web. | +|Windows phone | Indicates if the user has used Viva Engage on a Windows phone. | +|Android phone |Indicates if the user has used Viva Engage on an Android phone. | +|iPhone | Indicates if the user has used Viva Engage on an iPhone. | +|iPad |Indicates if the user has used Viva Engage on an iPad. | +|other |Indicates if the user has used Viva Engage on another client, which wasn't listed previously. This includes Viva Engage Embed, SharePoint Web Part, Viva Engage, and select Outlook emails. | |
admin | Viva Engage Groups Activity Report Ww | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/viva-engage-groups-activity-report-ww.md | + + Title: "Microsoft 365 admin center Viva Engage groups activity reports" +f1.keywords: +- NOCSH +++ Last updated : 10/26/2020+audience: Admin +++ms.localizationpriority: medium ++- Tier2 +- scotvorg +- M365-subscription-management +- Adm_O365 +- Adm_NonTOC ++search.appverid: +- BCS160 +- MST160 +- MET150 +- MOE150 +description: "Get the Viva Engage groups activity report to learn more about the number of Viva Engage groups being created and used in your organization and their activity." +++# Microsoft 365 Reports in the admin center - Viva Engage groups activity report ++The Microsoft 365 Reports dashboard shows you the activity overview across the products in your organization. It enables you to drill in to individual product level reports to give you more granular insight about the activities within each product. Check out [the Reports overview topic](activity-reports.md). In the Viva Engage groups activity report, you can gain insights into the activity of Viva Engage groups in your organization and see how many Viva Engage groups are being created and used. + +## How do I get to the Viva Engage groups activity report? ++1. In the admin center, go to the **Reports**, then select **Usage**. +2. From the dashboard homepage, click on the **View more** button on the Viva Engage card. + +## Interpret the Viva Engage groups activity report ++You can view the groups activities in the Viva Engage report by choosing the **Groups activity** tab. ++ ++Select **Choose columns** to add or remove columns from the report. ++ ++You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. ++The **Viva Engage groups activity** report can be viewed for trends over the last 7 days, 30 days, 90 days, or 180 days. However, if you select a particular day in the report, the table will show data for up to 28 days from the current date (not the date the report was generated). + +|Item|Description| +|:--|:--| +|**Metric**|**Definition**| +|Group name |The name of the group. | +|Group admin |The name of the group administrator, or owner. | +|Deleted |The number of deleted Viva Engage groups. If the group is deleted, but had activity in the reporting period it will show up in the grid with this flag set to true. | +|Type |The type of group, public or private. | +|Connected to Office 365 |Indicates whether the Viva Engage group is also a Microsoft 365 group. | +|Last activity date (UTC) | The latest date a message was read, posted or liked by the group. | +|Members | The number of members in the group. | +|Posted |The number of messages posted in the Viva Engage group over the reporting period. | +|Read |The number of conversations read in the Viva Engage group over the reporting period. | +|Liked |The number of messages liked in the Viva Engage group over the reporting period. | +|Network name |The full name of the network that the group belongs to. | |
admin | Yammer Device Usage Report Ww | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/yammer-device-usage-report-ww.md | - Title: "Microsoft 365 admin center Yammer device usage reports"-- NOCSH--- Previously updated : 10/26/2020----- Tier2-- scotvorg-- M365-subscription-management-- Adm_O365-- Adm_NonTOC--- BCS160-- MST160-- MET150-- MOE150 -description: "Get the Yammer device usage report to learn more about which devices your users are using Yammer on, number of daily users by device type, and details per user." ---# Microsoft 365 Reports in the admin center - Yammer device usage report --The Microsoft 365 Reports dashboard shows you the activity overview across the products in your organization. It enables you to drill in to individual product level reports to give you more granular insight about the activities within each product. Check out the [Reports overview topic](activity-reports.md). --The Yammer device usage reports give you information about which devices your users are using Yammer on. You can view the number of daily users by device type, and number of users by device type. You can view both over a selected time period. You can also view details per user. - -## How do I get to the Yammer device usage report? --1. In the admin center, go to the **Reports**, and then select **Usage**. -2. From the dashboard homepage, select **View more** on the Yammer card. - -## Interpret the Yammer device usage report --Select the **Device usage** tab to view the usage in the OneDrive report. ---Select **Choose columns** to add or remove columns from the report. ---You also can export the report data into an Excel .csv file by selecting the Export link. This link exports data of all users and enables you to do simple sorting and filtering for further analysis. --The **Yammer device usage** report can be viewed for trends over the last 7 days, 30 days, 90 days, or 180 days. However, if you select a particular day in the report, the table will show data for up to 28 days from the current date (not the date the report was generated). - -|Metric|Definition| -|:--|:--| -|Username |The email address of the user. You can display the actual email address or make this field anonymous. This grid shows users who logged in to Yammer using the Microsoft 365 account or who logged in to the network using single sign-on. | -|Display name |The full name of the user. You can display the actual email address or make this field anonymous. | -|User state |One of three values: Active, Deleted, or Suspended. These reports show data for active, suspended, and deleted users. They don't reflect pending users, because pending users can't post, read, or like a message. | -|State change date (UTC) |The date on which the user's state was changed in Yammer. | -|Last activity date (UTC) |The last date (UTC) that the user participated in a Yammer activity. | -|Web |Indicates if the user has used Yammer on the web. | -|Windows phone | Indicates if the user has used Yammer on a Windows phone. | -|Android phone |Indicates if the user has used Yammer on an Android phone. | -|iPhone | Indicates if the user has used Yammer on an iPhone. | -|iPad |Indicates if the user has used Yammer on an iPad. | -|other |Indicates if the user has used Yammer on another client, which wasn't listed previously. This includes Yammer Embed, SharePoint Web Part, Viva Engage, and select Outlook emails. | |
admin | Yammer Groups Activity Report Ww | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/yammer-groups-activity-report-ww.md | - Title: "Microsoft 365 admin center Yammer groups activity reports"-- NOCSH--- Previously updated : 10/26/2020----- Tier2 -- scotvorg-- M365-subscription-management-- Adm_O365-- Adm_NonTOC--- BCS160-- MST160-- MET150-- MOE150 -description: "Get the Yammer groups activity report to learn more about the number of Yammer groups being created and used in your organization and their activity." ---# Microsoft 365 Reports in the admin center - Yammer groups activity report --The Microsoft 365 Reports dashboard shows you the activity overview across the products in your organization. It enables you to drill in to individual product level reports to give you more granular insight about the activities within each product. Check out [the Reports overview topic](activity-reports.md). In the Yammer groups activity report, you can gain insights into the activity of Yammer groups in your organization and see how many Yammer groups are being created and used. - -## How do I get to the Yammer groups activity report? --1. In the admin center, go to the **Reports**, then select **Usage**. -2. From the dashboard homepage, click on the **View more** button on the Yammer card. - -## Interpret the Yammer groups activity report --You can view the groups activities in the Yammer report by choosing the **Groups activity** tab. -- --Select **Choose columns** to add or remove columns from the report. -- --You can also export the report data into an Excel .csv file by selecting the **Export** link. This exports data of all users and enables you to do simple sorting and filtering for further analysis. --The **Yammer groups activity** report can be viewed for trends over the last 7 days, 30 days, 90 days, or 180 days. However, if you select a particular day in the report, the table will show data for up to 28 days from the current date (not the date the report was generated). - -|Item|Description| -|:--|:--| -|**Metric**|**Definition**| -|Group name |The name of the group. | -|Group admin |The name of the group administrator, or owner. | -|Deleted |The number of deleted Yammer groups. If the group is deleted, but had activity in the reporting period it will show up in the grid with this flag set to true. | -|Type |The type of group, public or private. | -|Connected to Office 365 |Indicates whether the Yammer group is also a Microsoft 365 group. | -|Last activity date (UTC) | The latest date a message was read, posted or liked by the group. | -|Members | The number of members in the group. | -|Posted |The number of messages posted in the Yammer group over the reporting period. | -|Read |The number of conversations read in the Yammer group over the reporting period. | -|Liked |The number of messages liked in the Yammer group over the reporting period. | -|Network name |The full name of the network that the group belongs to. | |
admin | About Admin Roles | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/about-admin-roles.md | f1.keywords: Previously updated : 05/31/2023 Last updated : 07/06/2023 audience: Admin You'll probably only need to assign the following roles in your organization. By ||| |Billing admin | Assign the Billing admin role to users who make purchases, manage subscriptions and service requests, and monitor service health. <br><br> Billing admins also can:<br> - Manage all aspects of billing <br> - Create and manage support tickets in the Azure portal <br> | |Exchange admin | Assign the Exchange admin role to users who need to view and manage your user's email mailboxes, Microsoft 365 groups, and Exchange Online. <br><br> Exchange admins can also:<br> - Recover deleted items in a user's mailbox <br> - Set up "Send As" and "Send on behalf" delegates <br> |+|Fabric admin | Assign the Fabric admin role to users who need to do the following: <br> - Manage all admin features for Microsoft Fabric and Power BI <br> - Report on usage and performance <br> - Review and manage auditing | |Global admin | Assign the Global admin role to users who need global access to most management features and data across Microsoft online services. <br><br> Giving too many users global access is a security risk and we recommend that you have between two and four Global admins. <br><br> Only global admins can:<br> - Reset passwords for all users <br> - Add and manage domains <br> - Unblock another global admin <br> <br> **Note:** The person who signed up for Microsoft online services automatically becomes a Global admin. | |Global reader | Assign the global reader role to users who need to view admin features and settings in admin centers that the global admin can view. The global reader admin can't edit any settings. | |Groups admin | Assign the groups admin role to users who need to manage all groups settings across admin centers, including the Microsoft 365 admin center and Azure Active Directory portal. <br><br> Groups admins can:<br> - Create, edit, delete, and restore Microsoft 365 groups <br> - Create and update group creation, expiration, and naming policies <br> - Create, edit, delete, and restore Azure Active Directory security groups| You'll probably only need to assign the following roles in your organization. By |Office Apps admin | Assign the Office Apps admin role to users who need to do the following: <br> - Use the Cloud Policy service for Microsoft 365 to create and manage cloud-based policies. <br> - Create and manage service requests <br> - Manage the What's New content that users see in their Microsoft 365 apps <br> - Monitor service health | |Organizational Message Writer | Assign the Organizational Message Writer role to users who need to write, publish, manage, and review the organizational messages for end-users through Microsoft product surfaces. | |Password admin | Assign the Password admin role to a user who needs to reset passwords for non-administrators and Password Administrators. |-|Power Platform admin | Assign the Power Platform admin role to users who need to do the following: <br> - Manage all admin features for Power Apps, Power Automate, and Microsoft Purview Data Loss Prevention <br> - Create and manage service requests <br> - Monitor service health | +|Power Platform admin | Assign the Power Platform admin role to users who need to do the following: <br> - Manage all admin features for Power Apps, Power Automate, Power BI, Microsoft Fabric, and Microsoft Purview Data Loss Prevention <br> - Create and manage service requests <br> - Monitor service health | |Reports reader | Assign the Reports reader role to users who need to do the following: <br> - View usage data and the activity reports in the Microsoft 365 admin center <br> - Get access to the Power BI adoption content pack <br> - Get access to sign-in reports and activity in Azure AD <br> - View data returned by Microsoft Graph reporting API| |Service Support admin | Assign the Service Support admin role as an additional role to admins or users who need to do the following in addition to their usual admin role: <br> - Open and manage service requests <br> - View and share message center posts <br> - Monitor service health | |SharePoint admin | Assign the SharePoint admin role to users who need to access and manage the SharePoint Online admin center. <br><br>SharePoint admins can also: <br> - Create and delete sites <br> - Manage site collections and global SharePoint settings | Permissions to volume licensing information in Microsoft 365 admin center are co [Assign admin roles](assign-admin-roles.md) (article)\ [Azure AD roles in the Microsoft 365 admin center](azure-ad-roles-in-the-mac.md) (article)\ [Activity reports in the Microsoft 365 admin center](../activity-reports/activity-reports.md) (article)\-[Exchange Online admin role](about-exchange-online-admin-role.md) (article) +[Exchange Online admin role](about-exchange-online-admin-role.md) (article) |
admin | About Guest Users | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/about-guest-users.md | In addition to Microsoft Teams and SharePoint, Microsoft 365 also supports guest - OneDrive - [External or guest sharing in OneDrive, SharePoint, and Lists](https://support.microsoft.com/office/external-or-guest-sharing-in-onedrive-sharepoint-and-lists-7aa070b8-d094-4921-9dd9-86392f2a79e7). - Planner ΓÇô Applies to Web and mobile platforms. [Guest access in Microsoft Planner](https://support.microsoft.com/office/guest-access-in-microsoft-planner-cc5d7f96-dced-4da4-ab62-08c72d9759c6). - Microsoft 365 groups - [Manage guest access in Microsoft 365 groups](../create-groups/manage-guest-access-in-groups.md).-- Yammer - [Work with external groups in Yammer networks not aligned to native mode](/yammer/work-with-external-users/create-and-manage-external-groups).+- Viva Engage - [Work with external groups in Viva Engage networks not aligned to native mode](/viva/engage/work-with-external-users/create-and-manage-external-groups). For Microsoft 365 apps like Microsoft Word and Excel, guest access is controlled by the location of the output file, for example, Microsoft SharePoint, Teams, and OneDrive. |
admin | Let Users Reset Passwords | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/let-users-reset-passwords.md | f1.keywords: Previously updated : 02/18/2020 Last updated : 07/06/2023 audience: Admin description: "Learn how you can set a policy in the Microsoft 365 admin center t Check out all of our small business content on [Small business help & learning](https://go.microsoft.com/fwlink/?linkid=2224585). -Check out [Microsoft 365 small business help](https://go.microsoft.com/fwlink/?linkid=2197659) on YouTube. +Check out [Microsoft 365 small business video help](https://go.microsoft.com/fwlink/?linkid=2197659) on YouTube. -As the Microsoft 365 admin, you can let people use the [self-service password reset tool](https://go.microsoft.com/fwlink/p/?LinkId=522677) so you don't have to reset passwords for them. Less work for you! +This article is for people who set password expiration policy for a business, school, or nonprofit. You can let people use the [self-service password reset tool](https://go.microsoft.com/fwlink/p/?LinkId=522677) so you don't have to reset passwords for them. Less work for you! ++To complete these steps, you must be a [global admin or password administrator](about-admin-roles.md). > [!TIP] > If you need help with the steps in this topic, consider [working with a Microsoft small business specialist](https://go.microsoft.com/fwlink/?linkid=2186871). With Business Assist, you and your employees get around-the-clock access to small business specialists as you grow your business, from onboarding to everyday use.- -## Watch: Let users reset their own passwords --Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198214). --> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE3AY8S] --1. In the Microsoft 365 admin center, in the left navigation pane, select **Settings** > **Org settings**, and then <a href="https://go.microsoft.com/fwlink/p/?linkid=2072756" target="_blank">**Security & privacy**</a>. -1. Under **Self-service password reset**, select **Go to the Azure portal to turn on self-service password reset**. -1. In the left navigation pane, select **Users**, and then on the **Users - all users** page, select **Password reset**. -1. Select **All** to enable self-service password reset, and then select **Save**. -1. In the left navigation pane, select **Authentication methods** and select the **Number of methods required to reset** and desired **Methods available to users**, and then select **Save**. -If you found this video helpful, check out the [complete training series for small businesses and those new to Microsoft 365](../../business-video/index.yml). - ## Before you begin - You get self-service password reset for cloud users **free** with any Microsoft 365 business, education, or nonprofit paid plan. It doesn't work with Microsoft 365 trial. -- It uses Azure. You'll automatically get this feature in Azure for **free** when you do these steps. It won't cost you anything to turn on self-service password reset if you don't use other Azure features.--- **If you're using an on-premises Active Directory**, the above two points don't apply. Rather, you can set this up but **it requires a paid subscription to Azure AD Premium**.--This article is for people who set password expiration policy for a business, school, or nonprofit. To complete these steps, you need to sign in with your Microsoft 365 admin account. [What's an admin account?](Overview of the Microsoft 365 admin center](../admin-overview/admin-center-overview.md) +- It uses Azure. You'll automatically get this feature in Azure for **free** when you do these steps. It won't cost you anything to turn on self-service password reset. -You must be an [global admin or password administrator](about-admin-roles.md) to perform these steps. +- **If you're using an on-premises Active Directory**, you can set this up but **it requires a paid subscription to Azure AD Premium**. -## Steps: Let people reset their own passwords --These steps turn on self-service password reset for everyone in your business. --1. In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>, go to the **Settings** > **Org settings** page. +## Watch: Let users reset their own passwords -2. At the top of the **Org settings** page, select the **Security & Privacy** tab. - -3. Select **Self-service Password Reset**. +Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198214). -4. Under **Self-service password reset**, select **Go to the Azure portal to turn on self-service password reset**. +> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE3AY8S] -5. On the **Properties** page, select **All** to enable it for everyone in your business, and then select **Save**. +## Steps: Let people reset their own passwords -6. In the left navigation pane, select **Authentication methods** and select the **Number of methods required to reset** and desired **Methods available to users**, and then select **Save**. - -7. When your users sign in, they will be prompted to enter additional contact information that will help them reset their password in the future. +1. In the Microsoft 365 admin center, in the left navigation pane, select **Settings** > **Org settings**, and then <a href="https://go.microsoft.com/fwlink/p/?linkid=2072756" target="_blank">**Security & privacy**</a>. +1. Select **Self-service password reset**, and then choose **Go to the Azure portal to turn on self-service password reset**. +1. In the left navigation pane, select **Users**, and then **Users - all users** +1. Select **Password reset**. +1. Select **All** to enable self-service password reset for all your users, or choose **Selected** to specify **Groups** you want, and then select **Save**. +1. On the **Password reset | Properties** page, select **Authentication methods** and select the **Number of methods required to reset** and desired **Methods available to users**, and then select **Save**. +1. When your users sign in, they will be prompted to enter additional contact information that will help them reset their password in the future. ## Related content |
admin | Reset Passwords | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/reset-passwords.md | f1.keywords: Previously updated : 02/18/2020 Last updated : 06/30/2023 audience: Admin Check out all of our small business content on [Small business help & learning]( Check out [Microsoft 365 small business help](https://go.microsoft.com/fwlink/?linkid=2197659) on YouTube. -This article explains how to reset passwords for yourself and for your users when you have a Microsoft 365 for business subscription. +This article explains how to reset passwords for yourself and for your users when you have a **Microsoft 365 for business subscription**. If you don't have a Microsoft 365 for business subscription try this article: [I forgot the username or password for the account I use with Microsoft 365.](https://support.microsoft.com/office/eba0b4a2-c0ae-472c-99f6-bc63ee2425a8?wt.mc_id=SCL_reset-passwords_AdmHlp). > [!NOTE] > You can also set up self-service password reset for your users so they can reset their own passwords. To learn more, see [Let users reset their own passwords](let-users-reset-passwords.md). You must be an [global admin or password administrator](about-admin-roles.md) to Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198204). > [!VIDEO https://www.microsoft.com/videoplayer/embed/RE1FVVP]--1. When a user requests a new password, you'll receive a password reset request in email. To reset the password, open the app launcher and select **Admin**. -1. In the Microsoft 365 admin center, select **Users**, <a href="https://go.microsoft.com/fwlink/p/?linkid=834822" target="_blank">**Active users**</a>, and then select the key icon next to the user who requested the reset. -1. Select **Auto-generate password** to have a random password automatically created. -1. Select **Reset**. --If you found this video helpful, check out the [complete training series for small businesses and those new to Microsoft 365](../../business-video/index.yml). ## Steps: Reset a business password for a user -1. In the admin center, go to the **Users** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=834822" target="_blank">Active users</a> page. +When a user requests a new password, you'll receive a password reset request in email. Follow these steps to reset the password. ++1. In the Microsoft 365 admin center, go to the **Users** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=834822" target="_blank">Active users</a> page. 2. On the **Active users** page, select the user and then select **Reset password**. 3. Follow the instructions on the **Reset password** page to auto-generate a new password for the user or create one for them, and then select **Reset**. -4. Enter an email address the user can get to so they receive the new password, and follow up with them to make sure they got it. +4. Enter your email address to get the new password, and then send to the user's alternate email address or give it to them in person. ++If you found this video helpful, check out the [complete training series for small businesses and those new to Microsoft 365](../../business-video/index.yml). ## Let users reset their own passwords Check out this great blog post by Vasil Michev, Microsoft MVP: [Force password c > [!NOTE] > The userPrincipalName must be in the Internet-style sign-in format where the user name is followed by the at sign (@) and a domain name. For example: user@contoso.com. -## I don't have a Microsoft 365 for business subscription --Try this article: [I forgot the username or password for the account I use with Microsoft 365.](https://support.microsoft.com/office/eba0b4a2-c0ae-472c-99f6-bc63ee2425a8?wt.mc_id=SCL_reset-passwords_AdmHlp) - ## Related content [Let users reset their own passwords](../add-users/let-users-reset-passwords.md) (article)\ |
admin | Set Password To Never Expire | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/set-password-to-never-expire.md | f1.keywords: Previously updated : 02/18/2020 Last updated : 07/06/2023 audience: Admin This article explains how to set a password for an individual user to not expire ## Before you begin -This article is for people who set password expiration policy for a business, school, or nonprofit. To complete these steps, you need to sign in with your Microsoft 365 admin account. See [Overview of the Microsoft 365 admin center](/microsoft-365/admin/admin-overview/admin-center-overview). +This article is for people who set password expiration policy for a business, school, or nonprofit. You must be a [global admin or password administrator](about-admin-roles.md) to perform these steps. -You must be a [global admin or password administrator](about-admin-roles.md) to perform these steps. --A global admin for a Microsoft cloud service can use the [Microsoft Graph Powershell](/powershell/microsoftgraph/overview) to set passwords not to expire for specific users, remove the never-expire configuration or see which users' passwords are set to never expire. +You can use the Microsoft cloud service [Microsoft Graph Powershell](/powershell/microsoftgraph/overview) to set passwords not to expire for specific users, remove the never-expire configuration or see which users' passwords are set to never expire. This guide applies to other providers, such as Intune and Microsoft 365, which also rely on Azure AD for identity and directory services. Password expiration is the only part of the policy that can be changed. Use the `Connect-MgGraph` command to sign in with the required scopes. You need Connect-MgGraph -Scopes "User.Read.All","Group.ReadWrite.All" ``` The command prompts you to go to a web page to sign in using a device code. Once you've done that, the command indicates success with a `Welcome To Microsoft Graph!` message. You only need to sign in once per session.- + Run one of the following commands: - To see if a single user's password is set to never expire, run the following cmdlet by using the UPN (for example, *user@contoso.onmicrosoft.com*) or the user ID of the user you want to check: |
admin | Admin Center Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/admin-center-overview.md | Here are the features and settings you'll find in the left-hand navigation of th |**Setup**|Manage existing domains, turn on and manage multi-factor authentication, manage admin access, migrate user mailboxes to Microsoft 365, manage feature updates, and help users install their Microsoft 365 apps.| |**Reports**|See at a glance how your organization is using Microsoft 365 with detailed reports on email use, Microsoft 365 activations, and more. Learn how to use the new [activity reports](../activity-reports/activity-reports.md).| |**Health**|View health at a glance. You can also check out more details and the health history. See [How to check service health](../../enterprise/view-service-health.md) and [How to check Windows release health](/windows/deployment/update/check-release-health) for more information. <p> Use Message center to keep track of upcoming changes to features and services. We post announcements there with information that helps you plan for change and understand how it may affect users. Get more details in [Message center](../manage/message-center.md).|-|**Admin centers**|Open separate admin centers for Exchange, Skype for Business, SharePoint, Yammer, and Azure AD. Each admin center includes all available settings for that service. <p> For example, in the Exchange admin center, set up and manage email, calendars, distribution groups, and more. In the SharePoint admin center, create and manage site collections, site settings, and OneDrive for Business. In the Skype for Business admin center, set up instant messaging notifications, dial-in conferencing, and online presence. <p> Learn more about the [Exchange admin center](/exchange/exchange-admin-center) and [SharePoint Admin Center](/sharepoint/sharepoint-online). <p> **Note:** The admin centers available to you depend on your plan and region.| +|**Admin centers**|Open separate admin centers for Exchange, Skype for Business, SharePoint, Viva Engage, and Azure AD. Each admin center includes all available settings for that service. <p> For example, in the Exchange admin center, set up and manage email, calendars, distribution groups, and more. In the SharePoint admin center, create and manage site collections, site settings, and OneDrive for Business. In the Skype for Business admin center, set up instant messaging notifications, dial-in conferencing, and online presence. <p> Learn more about the [Exchange admin center](/exchange/exchange-admin-center) and [SharePoint Admin Center](/sharepoint/sharepoint-online). <p> **Note:** The admin centers available to you depend on your plan and region.| ## Two dashboard views |
admin | Admin Mobile App | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/admin-mobile-app.md | f1.keywords: Previously updated : 02/18/2020 Last updated : 06/30/2023 audience: Admin description: "Get the Microsoft 365 Admin app, your companion to the web-based M Check out all of our small business content on [Small business help & learning](https://go.microsoft.com/fwlink/?linkid=2224585). -Check out [Microsoft 365 small business help](https://go.microsoft.com/fwlink/?linkid=2197659) on YouTube. +Check out [Microsoft 365 small business video help](https://go.microsoft.com/fwlink/?linkid=2197659) on YouTube. -Are you an admin whoΓÇÖs usually on the go? Even if you arenΓÇÖt, there may be times when you need to manage Microsoft 365 from your phone or tablet. Check out the free [Microsoft 365 Admin app](https://go.microsoft.com/fwlink/?LinkID=627216), the perfect companion to the web-based Microsoft 365 admin center. You can download the app from the [Apple App Store](https://apps.apple.com/app/apple-store/id761397963?pt=80423&ct=docsaboutadminapp&mt=8), and from the [Google Play Store](https://play.google.com/store/apps/details?id=com.ms.office365admin&referrer=utm_source%3Ddocsaboutadminapp%26utm_campaign%25docsaboutadminapp), as well as from Microsoft 365 Admin app link in the upper right in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>. +Are you an admin whoΓÇÖs usually on the go? Even if you arenΓÇÖt, there may be times when you need to manage Microsoft 365 from your phone or tablet. Check out the free [Microsoft 365 Admin app](https://go.microsoft.com/fwlink/?LinkID=627216), the perfect companion to the web-based Microsoft 365 admin center. +- Download the app from the [Apple App Store](https://apps.apple.com/app/apple-store/id761397963?pt=80423&ct=docsaboutadminapp&mt=8). +- Download the app from the [Google Play Store](https://play.google.com/store/apps/details?id=com.ms.office365admin&referrer=utm_source%3Ddocsaboutadminapp%26utm_campaign%25docsaboutadminapp). -The admin app has a lot of capabilities that enable you to manage Microsoft 365 from your mobile or tablet device when you canΓÇÖt get to a computer. Here's a list of a few of the tasks you can do from the app: +You can also get a link from the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>. -- **Manage users and devices** Add or edit a user, reset a userΓÇÖs password, assign a role, block user, delete user, manage alias, assign licenses, wipe device data and more.-- **Manage groups** Add a group, add or remove users from groups.-- **License management and billing** View a list of purchased and assigned licenses, assign licenses to users, purchase or remove licenses and view and download invoices.-- **Support** Create a new service request and keep track of all the updates related to the service requests while you are on the go.-- **Message Center** Stay on top of all the upcoming changes, planned maintenance, or other important announcements related to Microsoft 365-- **Service Health** Monitor the health of all the services by viewing the current status of the service and details about service disruption and outages.-- **Notifications** Stay on top of all the important information and updates related to message center posts, service health and billing through push notifications. You can even customize what you want to be notified of. -If you're an admin and you're responsible for more than one Microsoft 365 organization, you can sign in to multiple organizations and quickly switch between them. The app supports dark theme and is available in 39 languages. - -> [!IMPORTANT] -> If you're having issues using the Admin mobile app on iOS or Android, email us at [feedback365@microsoft.com](mailto:feedback365@microsoft.com) to let us know. +## Before you begin ++You must be an administrator in a Microsoft 365 organization to use the admin mobile app. ## Watch: Install and use the admin mobile app Check out this video and others on our [YouTube channel](https://go.microsoft.co > [!VIDEO https://www.microsoft.com/videoplayer/embed/05c1d439-9ec2-415f-9178-250f64dec64c] +## Steps: Install and use the admin mobile app + 1. To get the Microsoft 365 Admin mobile app, search for **Microsoft 365 Admin** in the app store for your device and install it. 2. Sign in with your global admin email address, and view the dashboard to see service health, monitor user licenses, and see messages and service requests. -## Before you begin --You must be an administrator in a Microsoft 365 organization to use the admin mobile app. - -## Download the admin mobile app +Admin mobile app capabilities -<a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a> from the Microsoft 365 Admin app link in the upper right. +The admin app has a lot of capabilities that allows you to manage Microsoft 365 from your mobile or tablet device when you canΓÇÖt get to a computer. Here's a list of some of the tasks you can do from the app: -[Apple App Store](https://apps.apple.com/app/apple-store/id761397963?pt=80423&ct=docsaboutadminapp&mt=8) +- **Manage users and devices** Add or edit a user, reset a userΓÇÖs password, assign a role, block user, delete user, manage alias, assign licenses, wipe device data and more. +- **Manage groups** Add a group, add or remove users from groups. +- **License management and billing** View a list of purchased and assigned licenses, assign licenses to users, purchase or remove licenses and view and download invoices. +- **Support** Create a new service request and keep track of all the updates related to the service requests while you are on the go. +- **Message Center** Stay on top of all the upcoming changes, planned maintenance, or other important announcements related to Microsoft 365 +- **Service Health** Monitor the health of all the services by viewing the current status of the service and details about service disruption and outages. +- **Notifications** Stay on top of all the important information and updates related to message center posts, service health and billing through push notifications. You can even customize what you want to be notified of. -[Google Play Store](https://play.google.com/store/apps/details?id=com.ms.office365admin&referrer=utm_source%3Ddocsaboutadminapp%26utm_campaign%25docsaboutadminapp). +If you're an admin and you're responsible for more than one Microsoft 365 organization, you can sign in to multiple organizations and quickly switch between them. The app supports dark theme and is available in 39 languages. + +> [!IMPORTANT] +> If you're having issues using the Admin mobile app on iOS or Android, email us at [feedback365@microsoft.com](mailto:feedback365@microsoft.com) to let us know. ## Frequently asked questions Below are answers to frequently asked questions. -### Does the admin app support multi-tenant billing features? +### Does the admin app support multi-tenant billing features? -The admin mobile app is missing a few multi-tenant features where the authorized admin can see the products and licenses of the tenant in question along with the products and licenses of associated tenants in a single view. +The admin mobile app is missing a few multi-tenant features where the authorized admin can see the products and licenses of the tenant in question along with the products and licenses of associated tenants in a single view. This feature is not yet part of Microsoft 365 Admin mobile app and will be coming soon. For more information, admins can go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>. |
admin | Adoption Score | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/adoption/adoption-score.md | In each score category, we quantify the key indicators for how your organization ### Products included in Adoption Score -Adoption Score includes data from Exchange, SharePoint, OneDrive, Teams, Word, Excel, PowerPoint, OneNote, Outlook, Yammer, and Skype. +Adoption Score includes data from Exchange, SharePoint, OneDrive, Teams, Word, Excel, PowerPoint, OneNote, Outlook, Viva Engage, and Skype. Your organization's score is updated daily and reflects user actions completed in the last 28 (including the current day). |
admin | Communication | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/adoption/communication.md | Adoption Score supports the journey to digital transformation with insights abou To get started with Communication insights, people in your organization need to be licensed for: - Microsoft Teams-- Yammer+- Viva Engage - Exchange Online For more information, see [assign licenses to users](../manage/assign-licenses-to-users.md). Microsoft 365 provides people the flexibility to fit everyone's communication st - Sending emails through Exchange - Sending messages through Teams- - Posting on communities in Yammer + - Posting on communities in Viva Engage - This key metric is shown as a percentage of all people who are using two or more of Exchange, Teams, or Yammer. + This key metric is shown as a percentage of all people who are using two or more of Exchange, Teams, or Viva Engage. 2. **Body:** Provides more information on how flexibility in the modes of communication is valuable to people in your org. We also provide you with information that helps you gain visibility into how you - **Numerator**: People sending messages on Microsoft Teams in the last 28 days. - **Denominator**: People enabled for Microsoft Teams in the last 28 days. - - **People posting in communities:** The colored portion and the fraction represent the percentage of users enabled for Yammer that are posting in communities. This fraction is constructed from: + - **People posting in communities:** The colored portion and the fraction represent the percentage of users enabled for Viva Engage that are posting in communities. This fraction is constructed from: - - **Numerator:** People posting in Yammer communities in the last 28 days. - - **Denominator:** People enabled for Yammer in the last 28 days. + - **Numerator:** People posting in Viva Engage communities in the last 28 days. + - **Denominator:** People enabled for Viva Engage in the last 28 days. 4. **View related content:** Select this link to view collated videos, and other related help content. We also provide you with information that helps you gain visibility into how you 4. **View related content:** Select this link to view collated videos, and other related help content. -### Questions and Answers in Yammer +### Questions and Answers in Viva Engage -1. **Header:** Highlights the posts marked as questions on Yammer that have received an answer marked as "Best answer" as a percentage of all posts marked as questions on Yammer in the last 28 days. +1. **Header:** Highlights the posts marked as questions on Viva Engage that have received an answer marked as "Best answer" as a percentage of all posts marked as questions on Viva Engage in the last 28 days. -2. **Body:** Provides information on the value of using questions and answers in Yammer to share knowledge. +2. **Body:** Provides information on the value of using questions and answers in Viva Engage to share knowledge. 3. **Visualization:** Breaks down the use of the questions and answers feature in your organization: |
admin | Mobility | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/adoption/mobility.md | After people have been active in the above products at least once in the last 28 ## Why your organization's mobility score matters -A fundamental pillar of organizational productivity is how well people are able to work flexibly from wherever they are. With Microsoft 365, people can stay connected with Outlook, Microsoft Teams, and Yammer. People can also seamlessly collaborate on content by using Word, Excel, PowerPoint, and OneNote from any location, and platforms. +A fundamental pillar of organizational productivity is how well people are able to work flexibly from wherever they are. With Microsoft 365, people can stay connected with Outlook, Microsoft Teams, and Viva Engage. People can also seamlessly collaborate on content by using Word, Excel, PowerPoint, and OneNote from any location, and platforms. ## How we calculate the score We provide a primary insight in the experience that contains the key metrics for ### Primary insight -Microsoft 365 lets people work flexibly across apps, including Microsoft Outlook, Word, Excel, PowerPoint, OneNote, Microsoft Teams, Yammer, and Skype for Business. People can also work from anywhere by using a seamless experience across desktop, web, and mobile platforms. The primary insight looks at the products that are enabled for people in your organization ΓÇô and how many of these people are active on at least two platforms. +Microsoft 365 lets people work flexibly across apps, including Microsoft Outlook, Word, Excel, PowerPoint, OneNote, Microsoft Teams, Viva Engage, and Skype for Business. People can also work from anywhere by using a seamless experience across desktop, web, and mobile platforms. The primary insight looks at the products that are enabled for people in your organization ΓÇô and how many of these people are active on at least two platforms. :::image type="content" source="../../media/primary-mobility.png" alt-text="Chart showing primary insight for Mobility - people experiences Adoption Score."::: Microsoft 365 lets people work flexibly across apps, including Microsoft Outlook 3. **Visualization (current state):** Shows how many people use more than one platform across desktop, mobile, and web for at least one Microsoft 365 (list below) as follows: - **Horizontal bar** where the blue (colored) portion represents the percentage expressed in the header. - **The fraction** on the bar highlights the (numerator/denominator) used for calculating the percentage in the header.- - Numerator: The number of people in your org using any application within Microsoft Outlook, Word, Excel, PowerPoint, OneNote and Microsoft Teams, Yammer, and Skype on more than one platform from desktop, web, and mobile in the last 28 days. - - Denominator: The number of people licensed for Microsoft 365 Apps, Exchange, Yammer, Microsoft Teams, or Skype for at least 1 of the last 28 days. + - Numerator: The number of people in your org using any application within Microsoft Outlook, Word, Excel, PowerPoint, OneNote and Microsoft Teams, Viva Engage, and Skype on more than one platform from desktop, web, and mobile in the last 28 days. + - Denominator: The number of people licensed for Microsoft 365 Apps, Exchange, Viva Engage, Microsoft Teams, or Skype for at least 1 of the last 28 days. - The **peer benchmark** value for the key metric is also shown as a percentage. 4. **View Mobility resources:** Select this link to view help content. This chart shows the trend-line, where the numerator is the number of people who ### Scoring framework -The mobility score for your organization measures at an organization (aggregate) level whether people are using Microsoft 365 Apps - Outlook, Teams, Word, Excel, PowerPoint, OneNote, Yammer, and Skype - across the different platforms - desktop, web, and mobile. +The mobility score for your organization measures at an organization (aggregate) level whether people are using Microsoft 365 Apps - Outlook, Teams, Word, Excel, PowerPoint, OneNote, Viva Engage, and Skype - across the different platforms - desktop, web, and mobile. The scores are not provided at the individual user level. |
admin | Create Groups | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/create-groups/create-groups.md | description: "Learn to create and delete Microsoft 365 groups, add and remove gr While users can create a Microsoft 365 group from Outlook or other apps, as an admin, you may need to create or delete groups, add or remove members, and customize how they work. The <a href="https://go.microsoft.com/fwlink/p/?linkid=2052855" target="_blank">Microsoft 365 admin center</a> is the place to do this. > [!TIP]-> Microsoft 365 connected Yammer groups must be created in Yammer, but can be managed in the Microsoft 365 admin center like other Microsoft 365 groups. To learn more, see [Yammer and Microsoft 365 groups](/yammer/manage-yammer-groups/yammer-and-office-365-groups). +> Microsoft 365 connected Viva Engage groups must be created in Viva Engage, but can be managed in the Microsoft 365 admin center like other Microsoft 365 groups. To learn more, see [Viva Engage and Microsoft 365 groups](/viva/engage/manage-viva-engage-groups/viva-engage-and-office-365-groups). ## Create a Microsoft 365 group |
admin | Group Mailbox Size Management | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/create-groups/group-mailbox-size-management.md | -Each Microsoft 365 group comes equipped with a dedicated mailbox that stores the emails received on the group. The group mailbox is also used by applications like SharePoint Online, Yammer, Teams etc. The group mailbox is equipped with initial storage quota of 50 GB. If the group mailbox quota is reached, people sending emails to the group receive a non-delivery report. Hence, itΓÇÖs a good practice to remove the older content from group mailboxes, to ensure the group mailbox doesnΓÇÖt reach its quota. +Each Microsoft 365 group comes equipped with a dedicated mailbox that stores the emails received on the group. The group mailbox is also used by applications like SharePoint Online, Viva Engage, Teams etc. The group mailbox is equipped with initial storage quota of 50 GB. If the group mailbox quota is reached, people sending emails to the group receive a non-delivery report. Hence, itΓÇÖs a good practice to remove the older content from group mailboxes, to ensure the group mailbox doesnΓÇÖt reach its quota. The following ways help you understand how the quota calculation works, best practices or proactive approach taken to ensure the group mailbox doesn't reach its quota. And the course of action to be performed if the group mailbox as reached or exceeded its quota. |
admin | Manage Guest Access In Groups | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/create-groups/manage-guest-access-in-groups.md | When it's turned on, group members can invite guests to a Microsoft 365 group th Once approved, the guest is added to the directory and the group. > [!Note]-> Yammer Enterprise networks that are in Native Mode or the [EU Geo](/yammer/manage-security-and-compliance/manage-data-compliance) do not support network guests. -> Microsoft 365 Connected Yammer groups do not currently support guest access, but you can create non-connected, external groups in your Yammer network. See [Create and manage external groups in Yammer](/yammer/work-with-external-users/create-and-manage-external-groups) for instructions. +> Viva Engage Enterprise networks that are in Native Mode or the [EU Geo](/viva/engage/manage-security-and-compliance/manage-data-compliance) do not support network guests. +> Microsoft 365 Connected Viva Engage groups do not currently support guest access, but you can create non-connected, external groups in your Viva Engage network. See [Create and manage external groups in Viva Engage](/viva/engage/work-with-external-users/create-and-manage-external-groups) for instructions. Guest access in groups is often used as part of a broader scenario that includes SharePoint or Teams. These services have their own guest sharing settings. For complete instructions for setting up guest sharing across groups, SharePoint, and Teams, see: |
admin | Office 365 Groups | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/create-groups/office-365-groups.md | Microsoft 365 Groups is the foundational membership service that drives all team - A Planner - A OneNote notebook - Power BI-- Yammer (if the group was created from Yammer)+- Viva Engage (if the group was created from Viva Engage) - A Team (if the group was created from Teams) - Roadmap (if you have Project for the web) - Stream With a Microsoft 365 group, you don't have to manually assign permissions to each of these resources. Adding people to the group automatically gives them the permissions they need. -Any user can create a group unless you [limit group creation to a specific set of people](../../solutions/manage-creation-of-groups.md). If you limit group creation, users who cannot create groups will not be able to create SharePoint sites, Planners, teams, Outlook group calendars, Stream groups, Yammer groups, Shared libraries in OneDrive, or shared Power BI workspaces. These services require the people creating them to be able to create a group. Users can still participate in group activities, such as creating tasks in Planner or using Teams chat, provided they are a member of the group. +Any user can create a group unless you [limit group creation to a specific set of people](../../solutions/manage-creation-of-groups.md). If you limit group creation, users who cannot create groups will not be able to create SharePoint sites, Planners, teams, Outlook group calendars, Stream groups, Viva Engage groups, Shared libraries in OneDrive, or shared Power BI workspaces. These services require the people creating them to be able to create a group. Users can still participate in group activities, such as creating tasks in Planner or using Teams chat, provided they are a member of the group. Groups have the following roles: |
admin | Restore Deleted Group | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/create-groups/restore-deleted-group.md | When a group is restored, the following content is restored: - Teams -- Yammer group and group content (If the Microsoft 365 group was created from Yammer)+- Viva Engage group and group content (If the Microsoft 365 group was created from Viva Engage) - Power BI [Classic workspace](/power-bi/collaborate-share/service-create-workspaces) |
admin | Find And Fix Issues | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-with-domains/find-and-fix-issues.md | What if you don't want to move email for everyone on your domain to Microsoft 36 There are a couple of scenarios when you just need to verify your organization's domain and not set up any services. For example, to prove to Microsoft 365 that your organization qualifies for a school subscription. -Check out the guidance in [Verify your Microsoft 365 domain to prove ownership, nonprofit or education status, or to activate Yammer](../setup/domains-faq.yml) to make sure you've completed all the required steps. It's a little different for each situation. +Check out the guidance in [Verify your Microsoft 365 domain to prove ownership, nonprofit or education status, or to activate Viva Engage](../setup/domains-faq.yml) to make sure you've completed all the required steps. It's a little different for each situation. ## Services not working with your domain? |
admin | Office365 Admin Content Updates | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/includes/office365-admin-content-updates.md | Last updated 02/18/2020 | 1/10/2020 | [Microsoft 365 Reports in the admin center - OneDrive for Business usage](/Office365/Admin/activity-reports/onedrive-for-business-usage) | modified | | 1/10/2020 | [Microsoft 365 Reports in the admin center - SharePoint activity](/Office365/Admin/activity-reports/sharepoint-activity) | modified | | 1/10/2020 | [Microsoft 365 Reports in the admin center - SharePoint site usage](/Office365/Admin/activity-reports/sharepoint-site-usage) | modified |-| 1/10/2020 | [Microsoft 365 Reports in the admin center - Yammer activity report](/Office365/Admin/activity-reports/yammer-activity-report) | modified | -| 1/10/2020 | [Microsoft 365 Reports in the admin center - Yammer device usage report](/Office365/Admin/activity-reports/yammer-device-usage-report) | modified | -| 1/10/2020 | [Microsoft 365 Reports in the admin center - Yammer groups activity report](/Office365/Admin/activity-reports/yammer-groups-activity-report) | modified | +| 1/10/2020 | [Microsoft 365 Reports in the admin center - Viva Engage activity report](/Office365/Admin/activity-reports/viva-engage-activity-report) | modified | +| 1/10/2020 | [Microsoft 365 Reports in the admin center - Viva Engage device usage report](/Office365/Admin/activity-reports/viva-engage-device-usage-report) | modified | +| 1/10/2020 | [Microsoft 365 Reports in the admin center - Viva Engage groups activity report](/Office365/Admin/activity-reports/viva-engage-groups-activity-report) | modified | | 1/10/2020 | [About admin roles in the Microsoft 365 admin center](/Office365/Admin/add-users/about-admin-roles) | modified | | 1/10/2020 | [Add users individually or in bulk to Microsoft 365](/Office365/Admin/add-users/add-users) | modified | | 1/10/2020 | [About admin roles](/Office365/Admin/add-users/admin-roles-page) | modified | |
admin | M365 Feature Descriptions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/m365-feature-descriptions.md | Microsoft Office 365 provides the following help and training resources. Communi **Community:** The Office 365 Community is a single destination for self-help support information. It has the latest information to help customers find answers to a variety of technical, billing, and service questions through support forums, wikis, and blogs. The support forums are staffed and moderated by Microsoft Support agents. From the Office 365 Community home page, customers can access the following resources: Forums, Wikis, Blogs. For more information, visit the [Office 365 community](https://techcommunity.microsoft.com/). -**Forums:** Forums are intended to provide community participants with an online destination where they can post technical support questions and discuss topics related to the Office 365 services. Here are the forums that are available: Deploy Office 365, Directory integration services, Domains in Office 365, Downloads, Email and calendar, IM, meetings and conferencing, Manage Office 365, Manage projects, Mobile access, Office 365 for Mac, Office apps, Sites and document sharing, Trust Center documents, Upgrade to Office 365, Yammer +**Forums:** Forums are intended to provide community participants with an online destination where they can post technical support questions and discuss topics related to the Office 365 services. Here are the forums that are available: Deploy Office 365, Directory integration services, Domains in Office 365, Downloads, Email and calendar, IM, meetings and conferencing, Manage Office 365, Manage projects, Mobile access, Office 365 for Mac, Office apps, Sites and document sharing, Trust Center documents, Upgrade to Office 365, Viva Engage **Wikis:** Wikis include wiki pages created by Microsoft employees and authenticated community members. This collaborative site encompasses the latest collective content about specific Office 365 technical scenarios. Each individual wiki page typically includes links to websites, webcasts, troubleshooting videos, FAQ pages, documents, and downloads about that specific technical scenario. Historical tracking of every revision date and author alias is provided along with the ability to compare versions. |
admin | Change Address Contact And More | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/change-address-contact-and-more.md | An explanation of each field is provided below. |**Field** |**Description** | |||-|Name <br/> | The name entered here is what users will see on the following pages: <br/> Sign-in page: If your users have set up other Microsoft accounts with their business or school email address, they may see the organization name on the sign-in page. This helps them distinguish between their work or school account and their other accounts, so they can identify which one to use when they sign in. <br/> Organization profile link and page: The link to your organization's profile displays the organization name. <br/> Yammer navigation: In Yammer, the left navigation uses the organization name as the name of the home Yammer network. <br/> OneDrive sync client: The organization name is shown in File Explorer on Windows and Finder on Mac, the file paths, the OneDrive activity center, the tooltip of the OneDrive cloud icon, and the OneDrive settings window. Currently, updating the organization name does not update it for configured clients. <br/> MS Teams: Organization Switcher in Teams displays the organization Name <br/> | +|Name <br/> | The name entered here is what users will see on the following pages: <br/> Sign-in page: If your users have set up other Microsoft accounts with their business or school email address, they may see the organization name on the sign-in page. This helps them distinguish between their work or school account and their other accounts, so they can identify which one to use when they sign in. <br/> Organization profile link and page: The link to your organization's profile displays the organization name. <br/> Viva Engage navigation: In Viva Engage, the left navigation uses the organization name as the name of the home Viva Engage network. <br/> OneDrive sync client: The organization name is shown in File Explorer on Windows and Finder on Mac, the file paths, the OneDrive activity center, the tooltip of the OneDrive cloud icon, and the OneDrive settings window. Currently, updating the organization name does not update it for configured clients. <br/> MS Teams: Organization Switcher in Teams displays the organization Name <br/> | |Address, City, State/Province, Postal code <br/> | The address entered here is what you will see on your bill, under Sold To: The Sold To address on your bill is the same as your organization address on your profile page (see [Understand your bill or invoice for Microsoft 365 for business](../../commerce/billing-and-payments/understand-your-invoice2.md). <br/> | |Country or region <br/> | This is the country or region where the company is headquartered. The selected country or region determines which services are available to you, the taxes and billing currency for your country or region, and the location of the data center closest to you (see [About license restrictions](https://www.microsoft.com/microsoft-365/business/microsoft-office-license-restrictions)).<br/>NOTE: Once selected, the country or region cannot be changed. If you want to change the selection, you'll have to cancel your subscription and sign up again. For help with this process, [contact support](../get-help-support.md). | |Phone <br/> | This is the primary number for your company. It's usually the number of your company headquarters. <br/> | |
admin | Manage Feedback Ms Org | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/manage-feedback-ms-org.md | The table below represents which apps and services are currently connected to th |**Viva Goals**|Yes|Yes|Yes|Yes| |**Viva Insights**|Yes|Yes|Yes|Yes| |**Whiteboard**|Yes|Yes|Yes|Yes|-|**Yammer**|Yes|Yes|Yes|Yes| +|**Viva Engage**|Yes|Yes|Yes|Yes| [See here for some examples of in-product surveys and feedback.](/microsoft-365/admin/misc/feedback-user-control#in-product-surveys) |
admin | Share Calendars With External Users | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/share-calendars-with-external-users.md | f1.keywords: Previously updated : 02/18/2020 Last updated : 06/30/2023 audience: Admin description: "Enable calendar sharing in the Microsoft 365 admin center so users It's sometimes necessary for your users to schedule meetings with people outside your organization. To simplify the process of finding mutually agreeable meeting times, Microsoft 365 enables you to make calendars available to external users. These are people who need to see free and busy times for users in your organization, but don't have user accounts for your Microsoft 365 organization. -As the admin, you can enable calendar sharing for all users in your organization. Once sharing is enabled, users can use Outlook Web App to share their calendars with anyone inside or outside the organization. People inside the organization can view the shared calendar along with their own calendar. People outside the organization will be sent a URL that they can use to view the calendar. Users decide when to share, how much to share, and when to keep their calendars private. +As the admin, you can enable external calendar sharing for all users in your organization. Once sharing is enabled, users can use Outlook Web App to share their calendars with anyone inside or outside the organization. People inside the organization can view the shared calendar along with their own calendar. People outside the organization will be sent a URL that they can use to view the calendar. Users decide when to share, how much to share, and when to keep their calendars private. > [!NOTE] > If you want to share calendars with an organization that uses Exchange Server 2013 (an on-premises solution), the Exchange administrator will need to set up an authentication relationship with the cloud. This is known as "federation" and must meet minimum software requirements. See [Sharing](https://technet.microsoft.com/library/dd638083%28v=exchg.150%29.aspx) for more information. ## Enable calendar sharing using the Microsoft 365 admin center -1. In the admin center, go to **Settings** \> **Org Settings**. +1. In the admin center, go to **Settings** -> **Org Settings**. 2. On the **Services** tab, select **Calendar**. |
admin | Compare Ways To Block Access | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/compare-ways-to-block-access.md | When an employee leaves your organization, on good terms or bad, you need to blo |:--|:--|:--| |Block sign-in <br/> |One way to block a user from accessing Microsoft 365 is to change their sign-in status to **Sign-in blocked**. This prevents them from signing into Microsoft 365 from their computers and mobile devices though they can still view previously downloaded or synced email and documents. If you're using Blackberry Enterprise Service, you can disable their access there as well. <br/> |Use when an employee plans to leave the organization or they plan to take a long-term leave of absence. <br/> | |Reset user password <br/> |Another way to prevent a user from accessing Microsoft 365 is to reset their password. This prevents them from using their account though they can still view previously downloaded or synced email and documents. You can then sign in as them and change the password to one of your choosing. <br/> |Use when an employee leaves suddenly and permanently and you feel there's concern for business data. <br/> |-|Remove all assigned licenses <br/> |Another option is to remove any Microsoft 365 licenses assigned to the user. This prevents them from using applications and services like the Microsoft 365, Microsoft 365 apps, Yammer, and SharePoint Online. They can still sign in but canΓÇÖt use these services. <br/> |Use when you feel this user no longer needs access to specific features in Microsoft 365. <br/> <br> **Important:** When you remove a license, the user's mailbox will be deleted in 30 days. +|Remove all assigned licenses <br/> |Another option is to remove any Microsoft 365 licenses assigned to the user. This prevents them from using applications and services like the Microsoft 365, Microsoft 365 apps, Viva Engage, and SharePoint Online. They can still sign in but canΓÇÖt use these services. <br/> |Use when you feel this user no longer needs access to specific features in Microsoft 365. <br/> <br> **Important:** When you remove a license, the user's mailbox will be deleted in 30 days. ## Related articles |
admin | Services In China | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/services-in-china/services-in-china.md | If you would like to learn how to get started with general Office 365 services, |Ability to translate text or pages|Available, but off by default. Tenant admins can turn this ability on, but the translation cloud service may be located outside your country. If you do not want users to send content to a translation cloud service, you may keep these features disabled.| |Public website ICP registration|China Internet compliance policy requires that you get an Internet Content Provider (ICP) number for your public website.| |Public website features|Public websites are available only if you purchased Office 365 before March 9, 2015. However, Bing maps, external sharing, and comments are not available in a public web site as these features may send data outside of your country.|-|Newsfeed and Yammer (enterprise social networks)|Newsfeed (the social hub where you'll see updates from the people, documents, sites, and tags you're following) is available. Yammer is unavailable.| +|Newsfeed and Viva Engage (enterprise social networks)|Newsfeed (the social hub where you'll see updates from the people, documents, sites, and tags you're following) is available. Viva Engage is unavailable.| |Autohosted apps|You can deploy a provider-hosted app that uses SharePoint and SQL Azure. For more information, see [Create a basic provider hosted app for SharePoint](/sharepoint/dev/sp-add-ins/get-started-creating-provider-hosted-sharepoint-add-ins). Coming soon is the ability for developers to deploy an app that uses an autohosted web site.| |InfoPath|Not available.| |SharePoint Store|The Office and SharePoint App Stores are optional services operated by Microsoft Corporation or its affiliate from any of Microsoft's worldwide facilities. The apps available in the Store are provided by various app publishers, and are subject to the app publisher's terms and conditions and privacy statement. Your use of any of these apps may result in your data being transferred to, stored, or processed in any country where the app publisher, its affiliates or service providers maintain facilities. Please carefully review the app publisher's terms and conditions and privacy statements before downloading and using such apps.| |
admin | Customize Your Organization Theme | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/customize-your-organization-theme.md | f1.keywords: Previously updated : 02/19/2020 Last updated : 07/06/2023 audience: Admin You can add or update a default theme that applies to everyone within your org. 2. On the **Organization profile** tab, select **Custom themes**. +3. Choose **Add theme**. + All organization themes can be customized using the following tabs. |Tab|What can you do?| |
admin | Active User In Usage Reports | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/usage-analytics/active-user-in-usage-reports.md | An active user of Microsoft 365 products for [Microsoft 365 usage analytics](usa |Exchange Online <br/> |Any user who has performed any of the following actions: Mark as read, send messages, create appointments, send meeting requests, accept (as tentative) or decline meeting requests, cancel meetings. <br/> |No calendar information is represented, this will be added in an upcoming update. <br/> | |SharePoint Online <br/> |Any user who has interacted with a file by creating, modifying, viewing, deleting, sharing internally or externally, or synchronizing to clients on any site or viewed a page on any site. <br/> |The active user metrics for SharePoint Online in the Microsoft 365 Usage Analytics template app only reflect users who did file activity against a SharePoint Team site or a Group site. The template app will be updated to synchronize the definition to the same as that on the usage reports in the admin center. <br/> | |OneDrive for Business <br/> |Any user who has interacted with a file by creating, modifying, viewing, deleting, sharing internally or externally, or synchronizing to clients. <br/> ||-|Yammer <br/> |Any user who has read, posted, or liked a message on Yammer. <br/> || +|Viva Engage <br/> |Any user who has read, posted, or liked a message on Viva Engage. <br/> || |Skype for Business <br/> |Any user who has participated in a peer-to-peer session (including instant messaging, audio and video calls, application sharing, and file transfers) or who has organized or participated in a conference. <br/> || |Microsoft 365 <br/> |Any user who has activated their Microsoft 365 Apps for enterprise, Visio Pro or Project Pro subscription on at least one device. <br/> ||-|Microsoft 365 Groups <br/> |Any group member that has mailbox activity (if a message has been sent to the group) <br/> |This definition will be enhanced with group site file activity and Yammer group activity (file activity on group site and message posted to Yammer group associated with the group.) This data is currently not available in the Microsoft 365 Usage Analytics template app <br/> | +|Microsoft 365 Groups <br/> |Any group member that has mailbox activity (if a message has been sent to the group) <br/> |This definition will be enhanced with group site file activity and Viva Engage group activity (file activity on group site and message posted to Viva Engage group associated with the group.) This data is currently not available in the Microsoft 365 Usage Analytics template app <br/> | |Microsoft Teams <br/> |Any user who has participated in chat messages, private chat messages, calls, meetings, or other activity. Other activity is defined as the number of other team activities by the user some of which include, and not limited to: liking messages, apps, working on files, searching, following teams and channel and favoriting them. <br/> || ## Adoption Metrics |
admin | Customize Reports | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/usage-analytics/customize-reports.md | This example shows how to modify the **Activation** tab within the **Activation/ ### Create a new visual -The following example shows how to create a new visual to track new Yammer users on monthly basis. +The following example shows how to create a new visual to track new Viva Engage users on monthly basis. -1. Go to the **Product Usage** report using the left nav and select the **Yammer** tab. +1. Go to the **Product Usage** report using the left nav and select the **Viva Engage** tab. 2. Switch to edit mode by choosing  and **Edit**. The following example shows how to create a new visual to track new Yammer users 10. Drag **Product** to the **Filters** area, directly below the **Visual level filters** heading. -11. In the **Filter Type** area that appears, select the **Yammer** check box. +11. In the **Filter Type** area that appears, select the **Viva Engage** check box. -  +  12. Just below the list of visualizations, choose the **Format** icon . -13. Expand Title and change the **Title Text** value to **First-Time Yammer Users by Month**. +13. Expand Title and change the **Title Text** value to **First-Time Viva Engage Users by Month**. 14. Change the **Text Size** value to **12**. |
admin | Usage Analytics Data Model | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/usage-analytics/usage-analytics-data-model.md | This API provides information about the monthly trend of usage of the various Mi |Tenant Product Activity <br/> |Contains monthly totals of activities and active user count for various activities within the products. <br/> See [active user definition](active-user-in-usage-reports.md) for information about the activities within a product that are returned in this data table. <br/> |Contains monthly aggregated data for a rolling 12-month period including the current partial month. <br/> | |Tenant Office Licenses <br/> |Contains data about number of Microsoft Office subscriptions assigned to users <br/> |Contains end-of-month state data for a rolling 12-month period including the current partial month. <br/> | |Tenant Mailbox Usage <br/> |Contains data about the user's mailbox, for total mailbox count and how storage is used. <br/> |Contains end-of-month state data for a rolling 12-month period including the current partial month. <br/> |-|Tenant Client Usage <br/> |Contains data about the number of users actively using specific client/devices to connect to Exchange Online, Skype for Business and Yammer. <br/> |Contains monthly aggregated data for a rolling 12-month period including the current partial month. <br/> | +|Tenant Client Usage <br/> |Contains data about the number of users actively using specific client/devices to connect to Exchange Online, Skype for Business and Viva Engage. <br/> |Contains monthly aggregated data for a rolling 12-month period including the current partial month. <br/> | |Tenant SharePoint Online Usage <br/> |Contains data about the SharePoint sites, covering Team or Groups sites such as total number of sites, number of documents on site, file count by activity type and storage used. <br/> |Contains end-of-month state data for a rolling 12-month period including the current partial month. <br/> | |Tenant OneDrive for Business Usage <br/> |Contains data about the OneDrive accounts such as number of accounts, number of documents across OneDrives, storage used, file count by activity type. <br/> |Contains end-of-month state data for a rolling 12-month period including the current partial month. <br/> |-|Tenant Microsoft 365 Groups Usage <br/> |Contains data about Microsoft 365 Groups usage including Mailbox, SharePoint, and Yammer. <br/> |Contains end-of-month state data for a rolling 12-month period including the current partial month. <br/> | +|Tenant Microsoft 365 Groups Usage <br/> |Contains data about Microsoft 365 Groups usage including Mailbox, SharePoint, and Viva Engage. <br/> |Contains end-of-month state data for a rolling 12-month period including the current partial month. <br/> | |Tenant Office Activation <br/> |Contains data about number of Office subscription activations, count of activation per device (Android/iOS/Mac/PC), activations by service plan, for example, Microsoft 365 Apps for enterprise, Visio, Project. <br/> |Contains end-of-month state data for a rolling 12-month period including the current partial month. <br/> | |User State <br/> |Contains metadata about users, including user display name, products assigned, location, department, title, company. This data is about users who were assigned a license during the last complete month. Every user is uniquely represented by a user ID. <br/> |This data is about users that had a license assigned during the last complete month. <br/> | |User Activity <br/> |Contains per-user level information about activity performed by licensed users. <br/> See [active user definition](active-user-in-usage-reports.md) for information about the activities within a product that are returned in this data table. <br/> |This data is about users that performed an activity in any of the services during the last complete month. <br/> | This table provides user level details for all users that have a license assigne |Timeframe <br/> |Month value for which this table has data for. <br/> | |UPN <br/> |User principal name, uniquely identifies the user to be able to join with other external data sources. <br/> | |DisplayName <br/> |User's display name. <br/> |-|IDType <br/> |ID type is set to 1 if the user is a Yammer user who connects by using their Yammer ID or 0 if they connect to Yammer by using their Microsoft 365 ID. <br/> Value is 1 to represent that this user connects to Yammer with their Yammer ID and not their Microsoft 365 ID <br/> | +|IDType <br/> |ID type is set to 1 if the user is a Viva Engage user who connects by using their Viva Engage ID or 0 if they connect to Viva Engage by using their Microsoft 365 ID. <br/> Value is 1 to represent that this user connects to Viva Engage with their Viva Engage ID and not their Microsoft 365 ID <br/> | |HasLicenseEXO <br/> |Set to true if user is assigned a license and enabled to use Exchange on the last day of the month. <br/> | |HasLicenseODB <br/> |Set to true if user is assigned a license and enabled to use OneDrive for Business on the last day of the month. <br/> | |HasLicenseSPO <br/> |Set to true if user is assigned a license and enabled to use SharePoint Online on the last day of the month. <br/> |-|HasLicenseYAM <br/> |Set to true if user is assigned a license and enabled to use Yammer on the last day of the month. <br/> | +|HasLicenseYAM <br/> |Set to true if user is assigned a license and enabled to use Viva Engage on the last day of the month. <br/> | |HasLicenseSFB <br/> |Set to true if user is assigned a license and enabled to use Skype For Business on the last day of the month. <br/> | |HasLicenseTeams <br/> |Set to true if user is assigned a license and enable to use Microsoft Teams on the last day of the month. <br/> | |Company <br/> |Company data represented in Azure Active Directory for this user. <br/> | This table provides user level details for all users that have a license assigne |Title <br/> |Title data represented in Azure Active Directory for this user. <br/> | |Deleted <br/> |True if the user has been deleted from Microsoft 365 in that last complete month. <br/> | |DeletedDate <br/> |Date when the user was deleted from Microsoft 365. <br/> |-|YAM_State <br/> |States of the user in the Yammer system, can be active, deleted, or suspended. <br/> | -|YAM_ActivationDate <br/> |Date the user entered the state of being active in Yammer. <br/> | -|YAM_DeletionDate <br/> |Date the user entered the state of being deleted in Yammer. <br/> | -|YAM_SuspensionDate <br/> |Date the user entered the state of being suspended in Yammer. <br/> | +|YAM_State <br/> |States of the user in the Viva Engage system, can be active, deleted, or suspended. <br/> | +|YAM_ActivationDate <br/> |Date the user entered the state of being active in Viva Engage. <br/> | +|YAM_DeletionDate <br/> |Date the user entered the state of being deleted in Viva Engage. <br/> | +|YAM_SuspensionDate <br/> |Date the user entered the state of being suspended in Viva Engage. <br/> | ### Data table - User Activity This table contains data about each user who had an activity in any of the servi |**Column name**|**Column description**| |:--|:--| |UserID <br/> |Unique user ID that represents a user and enables joining with other data tables within the data set. <br/> |-|IDType <br/> |ID type is set to 1 if the user is a Yammer user who connects by using their Yammer ID or 0 if they connect to Yammer by using their Microsoft 365 ID. <br/> Value is 1 to represent that this user connects to Yammer with their Yammer ID and not their Microsoft 365 ID <br/> | +|IDType <br/> |ID type is set to 1 if the user is a Viva Engage user who connects by using their Viva Engage ID or 0 if they connect to Viva Engage by using their Microsoft 365 ID. <br/> Value is 1 to represent that this user connects to Viva Engage with their Viva Engage ID and not their Microsoft 365 ID <br/> | |Timeframe <br/> |Month value for which this table represents data for. <br/> | |EXO_EmailSent <br/> |Number of emails sent. <br/> | |EXO_EmailReceived <br/> |Number of emails received. <br/> | This table contains data about each user who had an activity in any of the servi |Teams_CallParticipate <br/> |Number of calls the user participated in. <br/> | |Teams_MeetingParticipate <br/> |Number of meetings the user joined. <br/> | |Teams_HasOtherAction <br/> |Boolean value if the user performed other actions in Microsoft Teams. <br/> |-|YAM_MessagePost <br/> |Number of Yammer messages this user posted. <br/> | -|YAM_MessageLiked <br/> |Number of Yammer messages this user liked. <br/> | -|YAM_MessageRead <br/> |Number of Yammer messages this user read. <br/> | +|YAM_MessagePost <br/> |Number of Viva Engage messages this user posted. <br/> | +|YAM_MessageLiked <br/> |Number of Viva Engage messages this user liked. <br/> | +|YAM_MessageRead <br/> |Number of Viva Engage messages this user read. <br/> | |SFB_P2PSummary <br/> |Number of peer-to-peer sessions this user took part in. <br/> | |SFB_ConfOrgSummary <br/> |Number of conference sessions this user organized. <br/> | |SFB_ConfPartSummary <br/> |Number of conference sessions this user participated in. <br/> | This table consists of summary data across all licensed Exchange Online users wh ### Data table - Tenant Client Usage -This table provides month-over-month summary data about the clients that the users are using to connect to Exchange Online, Skype for Business and Yammer. This table doesn't yet have client use data for SharePoint Online and OneDrive for Business. +This table provides month-over-month summary data about the clients that the users are using to connect to Exchange Online, Skype for Business and Viva Engage. This table doesn't yet have client use data for SharePoint Online and OneDrive for Business. |**Column name**|**Column description**| |:--|:--| This table provides data about how Microsoft 365 Groups is used across the organ |SPO_TotalFiles <br/> |Number of SharePoint files. <br/> | |SPO_ActiveFiles <br/> |Number of active SharePoint files. <br/> | |SPO_StorageUsed <br/> |Quantity of SharePoint storage used. <br/> |-|YAM_TotalGroups <br/> |Number of Yammer groups. <br/> | -|YAM_ActiveGroups <br/> |Number of active Yammer groups. <br/> | -|YAM_LikedActiveGroups <br/> |Number of Yammer groups which have like activities. <br/> | -|YAM_PostedActiveGroups <br/> |Number of Yammer groups which have post activities. <br/> | -|YAM_ReadActiveGroups <br/> |Number of Yammer groups which have read activities. <br/> | -|YAM_TotalActivities <br/> |Number of Yammer activities. <br/> | -|YAM_LikedActivities <br/> |Number of Yammer like activities. <br/> | -|YAM_PostedActivties <br/> |Number of Yammer post activities. <br/> | -|YAM_ReadActivites <br/> |Number of Yammer read activities. <br/> | +|YAM_TotalGroups <br/> |Number of Viva Engage groups. <br/> | +|YAM_ActiveGroups <br/> |Number of active Viva Engage groups. <br/> | +|YAM_LikedActiveGroups <br/> |Number of Viva Engage groups which have like activities. <br/> | +|YAM_PostedActiveGroups <br/> |Number of Viva Engage groups which have post activities. <br/> | +|YAM_ReadActiveGroups <br/> |Number of Viva Engage groups which have read activities. <br/> | +|YAM_TotalActivities <br/> |Number of Viva Engage activities. <br/> | +|YAM_LikedActivities <br/> |Number of Viva Engage like activities. <br/> | +|YAM_PostedActivties <br/> |Number of Viva Engage post activities. <br/> | +|YAM_ReadActivites <br/> |Number of Viva Engage read activities. <br/> | ### Data table - Tenant Office Licenses |
admin | Usage Analytics | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/usage-analytics/usage-analytics.md | The Microsoft 365 overview report contains the following reports. You can view t - **Usage** – Offers a drill-down view into the volume of active users and the key activities for each product for the last 12 months. Use the reports in this section to learn how people in your organization are using Microsoft 365. -- **Communication** – You can see at a glance whether people in your organization prefer to stay in touch by using Teams, Yammer, email, or Skype calls. You can observe if there are shifts in patterns in the use of communication tools among your employees. +- **Communication** – You can see at a glance whether people in your organization prefer to stay in touch by using Teams, Viva Engage, email, or Skype calls. You can observe if there are shifts in patterns in the use of communication tools among your employees. - **Collaboration** – See how people in your organization use OneDrive and SharePoint to store documents and collaborate with each other, and how these trends evolve month over month. You can also see how many users shared documents internally or externally and how many users used SharePoint sites or OneDrive accounts, broken out by owners and other collaborators. - **Storage** – Use this report to track cloud storage for mailboxes, OneDrive, and SharePoint sites. -- **Mobility** – Track which clients and devices people use to connect to email, Teams, Skype, or Yammer.+- **Mobility** – Track which clients and devices people use to connect to email, Teams, Skype, or Viva Engage. ## Activation and licensing The activation and license page offers reports on Microsoft 365 activation; that ## Product usage -This report contains a separate report for each Microsoft 365 service, including Exchange, Microsoft 365 groups, OneDrive, SharePoint, Skype, Teams, and Yammer. Each report contains total enabled vs. total active user reports, counts of entities such as mailboxes, sites, groups, and accounts, as well as activity type reports where appropriate. All values of the month shown on the top section of the report refer to the latest complete month. +This report contains a separate report for each Microsoft 365 service, including Exchange, Microsoft 365 groups, OneDrive, SharePoint, Skype, Teams, and Viva Engage. Each report contains total enabled vs. total active user reports, counts of entities such as mailboxes, sites, groups, and accounts, as well as activity type reports where appropriate. All values of the month shown on the top section of the report refer to the latest complete month. ## User activity The current version of the template app includes file activity from SharePoint t ### Which groups are included in the Microsoft 365 Groups usage report? -The current version of the template app includes usage from Outlook groups, Yammer groups, and SharePoint groups. It does not include groups related to Microsoft Teams or Planner. +The current version of the template app includes usage from Outlook groups, Viva Engage groups, and SharePoint groups. It does not include groups related to Microsoft Teams or Planner. ### When will an updated version of the template app become available? |
commerce | Manage Auto Claim Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/licenses/manage-auto-claim-policies.md | Last updated 04/06/2021 An auto-claim policy lets users automatically claim a license for a product the first time that they sign into an app. As an admin, you typically assign licenses to users either manually, or by using group-based licensing. By using auto-claim policies, you manage the products for which users can automatically claim licenses. You can also control which products those licenses come from. > [!IMPORTANT]-> Auto-claim policies are currently only available for Microsoft Teams. More products will be available to use in the future. +> Auto-claim policies are currently only available for Microsoft Teams and Minecraft Education. More products will be available to use in the future. ## Before you begin |
commerce | Move Users Different Subscription | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/move-users-different-subscription.md | After the switch to the new plan is finished, users can [Import email, contacts, Before being switched to a different subscription, users can [download files and folders from OneDrive or SharePoint](https://support.microsoft.com/office/5c7397b7-19c7-4893-84fe-d02e8fa5df05) to a different location, such as a folder on their computer's hard drive, or a file share on the organization's network. -### Save Yammer information +### Save Viva Engage information -Admins can export all messages, notes, files, topics, users, and groups to a .zip file. For more information, see [Export data from Yammer Enterprise](/yammer/manage-security-and-compliance/export-yammer-enterprise-data). +Admins can export all messages, notes, files, topics, users, and groups to a .zip file. For more information, see [Manage data in the Viva Engage admin center](/viva/engage/eac-as-manage-data). ### How to save SharePoint information |
commerce | Try Or Buy Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/try-or-buy-microsoft-365.md | +- ContentEnagagementFY23 - commerce_purchase - VSBFY23 |
compliance | Apply Retention Labels Automatically | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-retention-labels-automatically.md | To consider when using trainable classifiers to auto-apply retention labels: #### Auto-apply labels to cloud attachments -You might need to use this option if you're required to capture and retain all copies of files in your tenant that are sent over communications by users. You use this option in conjunction with retention policies for the communication services themselves; Exchange, Teams, and Yammer. +> [!NOTE] +> Support for cloud attachments that are shared in Viva Engage is in preview. ++You might need to use this option if you're required to capture and retain all copies of files in your tenant that are sent over communications by users. You use this option in conjunction with retention policies for the communication services themselves; Exchange, Teams, and Viva Engage. > [!IMPORTANT] > When you select a label to use for auto-applying retention labels for cloud attachments, ensure that the label retention setting **Start the retention period based on** is **When items were labeled**. -Cloud attachments, sometimes also known as modern attachments, are a sharing mechanism that uses embedded links to files that are stored in the cloud. They support centralized storage for shared content with collaborative benefits, such as version control. Cloud attachments are not attached copies of a file or a URL text link to a file. However, support for URL text links are also now gradually rolling out. You might find it helpful to refer to the visual checklists for supported cloud attachments in [Outlook](/microsoft-365/troubleshoot/retention/cannot-retain-cloud-attachments#cloud-attachments-in-outlook), [Teams](/microsoft-365/troubleshoot/retention/cannot-retain-cloud-attachments#cloud-attachments-in-teams), and [Yammer](/microsoft-365/troubleshoot/retention/cannot-retain-cloud-attachments#cloud-attachments-in-yammer). +Cloud attachments, sometimes also known as modern attachments, are a sharing mechanism that uses embedded links to files that are stored in the cloud. They support centralized storage for shared content with collaborative benefits, such as version control. Cloud attachments are not attached copies of a file or a URL text link to a file. However, support for URL text links are also now gradually rolling out. You might find it helpful to refer to the visual checklists for supported cloud attachments in [Outlook](/microsoft-365/troubleshoot/retention/cannot-retain-cloud-attachments#cloud-attachments-in-outlook), [Teams](/microsoft-365/troubleshoot/retention/cannot-retain-cloud-attachments#cloud-attachments-in-teams), and [Viva Engage](/microsoft-365/troubleshoot/retention/cannot-retain-cloud-attachments#cloud-attachments-in-viva-engage). When you choose the option to apply a retention label to cloud attachments, for compliance purposes, a copy of that file is created at the time of sharing. Your selected retention label is then applied to the copy that can then be [identified using eDiscovery](ediscovery-cloud-attachments.md). Users aren't aware of the copy that is stored in the Preservation Hold library. The retention label isn't applied to the message itself, or to the original file. If the file is modified and shared again, a new copy of the file as a new version is saved in the Preservation Hold library. For more information, including why you should use the **When items were labeled** label setting, see [How retention works with cloud attachments](retention-policies-sharepoint.md#how-retention-works-with-cloud-attachments). -The cloud attachments supported for this option are files such as documents, videos, and images that are stored in SharePoint and OneDrive. For Teams, cloud attachments shared in chat messages, and standard and private channels are supported. For Yammer, cloud attachments shared with users in storylines, community posts, and Inbox messages are supported. +The cloud attachments supported for this option are files such as documents, videos, and images that are stored in SharePoint and OneDrive. For Teams, cloud attachments shared in chat messages, and standard and private channels are supported. For Viva Engage, cloud attachments shared with users in storylines, community posts, and Inbox messages are supported. -Cloud attachments shared over meeting invites and apps other than Teams, Outlook, or Yammer aren't supported. The cloud attachments must be shared by users; cloud attachments sent via bots aren't supported. +Cloud attachments shared over meeting invites and apps other than Teams, Outlook, or Viva Engage aren't supported. The cloud attachments must be shared by users; cloud attachments sent via bots aren't supported. Although not required for this option, we recommend that you ensure versioning is enabled for your SharePoint sites and OneDrive accounts so that the version shared can be accurately captured. If versioning isn't enabled, the last available version will be retained. Documents in draft or that have never been published aren't supported. When you configure the locations for this option, you can select: - **Microsoft 365 Groups** for shared files that are stored in team sites connected by Microsoft 365 groups. - **OneDrive accounts** for shared files stored in users' OneDrive. -You will need to create separate retention policies if you want to retain or delete the original files, email messages, or messages from Teams and Yammer. +You will need to create separate retention policies if you want to retain or delete the original files, email messages, or messages from Teams and Viva Engage. > [!NOTE]-> If you want retained cloud attachments to expire at the same time as the messages that contained them, configure the retention label to have the same retain and then delete actions and timings as your retention policies for Exchange, Teams, and Yammer. +> If you want retained cloud attachments to expire at the same time as the messages that contained them, configure the retention label to have the same retain and then delete actions and timings as your retention policies for Exchange, Teams, and Viva Engage. To consider when auto-applying retention labels to cloud attachments: -- Yammer must be in [native mode](/yammer/configure-your-yammer-network/overview-native-mode) to support cloud attachments.+- Viva Engage must be in [native mode](/viva-engage/configure-your-viva-engage-network/overview-native-mode) to support cloud attachments. -- If cloud attachments and links in a Teams or Yammer message are changed after the message is sent by editing the message, those changed cloud attachments and links aren't supported for retention.+- If cloud attachments and links in a Teams or Viva Engage message are changed after the message is sent by editing the message, those changed cloud attachments and links aren't supported for retention. - When a user is added to a Teams conversation and given access to the full history of the conversation, that history can include cloud attachments and URL text links. If these attachments were shared within 48 hours of the user added to the conversation, current copies of the attachments are auto-labeled for retention. Attachments shared before this time period aren't supported for newly added users. -- Attachments and links shared outside Teams, Outlook, and Yammer aren't supported, and the attachments and links must be content stored in SharePoint or OneDrive.+- Attachments and links shared outside Teams, Outlook, and Viva Engage aren't supported, and the attachments and links must be content stored in SharePoint or OneDrive. - Cloud attachments and links in encrypted emails or encrypted messages aren't supported. -- Sharing an existing Yammer message with an attachment isn't supported.+- Sharing an existing Viva Engage message with an attachment isn't supported. - Specific to shared documents from URL text links: - Supported in the message body but not in the email subject or Teams channel subject, announcement, or subheadings. - Not supported for previous responses in the same thread, only the current message - Total limit of 25 attachments in a single message, where this maximum can be any combination of cloud attachments and shared documents from URL text links- - Not supported beyond 5,000 characters in the initial email body or in Teams and Yammer messages + - Not supported beyond 5,000 characters in the initial email body or in Teams and Viva Engage messages - The following items aren't supported as attachments that can be retained: - SharePoint sites, pages, lists, forms, folders, document sets, and OneNote pages. |
compliance | Apply Sensitivity Label Automatically | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/apply-sensitivity-label-automatically.md | There are two different methods for automatically applying a sensitivity label t Specific to auto-labeling for SharePoint and OneDrive: - - <a name="file-extensions"></a>Office files for Word (.docx), PowerPoint (.pptx), and Excel (.xlsx) are supported. + - <a name="file-extensions"></a> [PDF documents](sensitivity-labels-office-apps.md#pdf-support) and Office files for Word (.docx), PowerPoint (.pptx), and Excel (.xlsx) are supported. - These files can be auto-labeled at rest before or after the auto-labeling policies are created. Files can't be auto-labeled if they're part of an open session (the file is open). - Currently, attachments to list items aren't supported and won't be auto-labeled. - Maximum of 25,000 automatically labeled files in your tenant per day. There are two different methods for automatically applying a sensitivity label t Specific to auto-labeling for Exchange: - - Unlike manual labeling or auto-labeling with Office apps, PDF attachments as well as Office attachments are also scanned for the conditions you specify in your auto-labeling policy. When there's a match, the email is labeled but not the attachment. - - For PDF files, if the label applies encryption, these files, if unencrypted, are now encrypted by using [Message encryption](ome.md) when your tenant is [enabled for PDF attachments](ome-faq.yml#are-pdf-file-attachments-supported-). The encryption settings applied are inherited from the email. + - PDF attachments and Office attachments are scanned for the conditions you specify in your auto-labeling policy. When there's a match, the email is labeled but not the attachment. + - For PDF files, if the label applies encryption, these files are encrypted by using [Message encryption](ome.md) when your tenant is [enabled for PDF attachments](ome-faq.yml#are-pdf-file-attachments-supported-). - For these Office files, Word, PowerPoint, and Excel are supported. If the label applies encryption and these files are unencrypted, they're now encrypted by using [Message encryption](ome.md). The encryption settings are inherited from the email. - If you have Exchange mail flow rules or Microsoft Purview Data Loss Prevention (DLP) policies that apply IRM encryption: When content is identified by these rules or policies and an auto-labeling policy, the label is applied. If that label applies encryption, the IRM settings from the Exchange mail flow rules or DLP policies are ignored. However, if that label doesn't apply encryption, the IRM settings from the mail flow rules or DLP policies are applied in addition to the label. - Email that has IRM encryption with no label will be replaced by a label with any encryption settings when there's a match by using auto-labeling. |
compliance | Archive Partner Third Party Data | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-partner-third-party-data.md | Title: "Work with a partner to archive third-party data" -description: Learn how to set up a custom connector to import third-party data from data sources such as Salesforce Chatter, Yahoo Messenger, or Yammer. +description: Learn how to set up a custom connector to import third-party data from data sources such as Salesforce Chatter, Yahoo Messenger, or Viva Engage. f1.keywords: - NOCSH The following sections list the Microsoft partners (and the third-party data sou - Microsoft Exchange Server - Microsoft OneDrive for Business - Microsoft Teams-- Microsoft Yammer+- Microsoft Viva Engage - Mobile Guard - Pivot - Salesforce Chatter The following sections list the Microsoft partners (and the third-party data sou - WinMX - Winny - Yahoo-- Yammer+- Viva Engage - YouTube ### Verba |
compliance | Audit Log Activities | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-log-activities.md | The following table lists the user and admin activities in Viva Goals that are l |Dashboard updated |Dashboard updated |User has updated a dashboard on Viva Goals | |Dashboard deleted |Dashboard deleted |User has deleted a dashboard on Viva Goals. | -## Yammer activities +## Viva Engage activities -The following table lists the user and admin activities in Yammer that are logged in the audit log. To return Yammer-related activities from the audit log, you have to select **Show results for all activities** in the **Activities** list. Use the date range boxes and the **Users** list to narrow the search results. +The following table lists the user and admin activities in Viva Engage that are logged in the audit log. To return Viva Engage-related activities from the audit log, you have to select **Show results for all activities** in the **Activities** list. Use the date range boxes and the **Users** list to narrow the search results. > [!NOTE]-> Some Yammer audit activities are only available in Audit (Premium). That means users must be assigned the appropriate license before these activities are logged in the audit log. For more information about activities only available in Audit (Premium), see [Audit (Premium) in Microsoft 365](audit-premium.md#audit-premium-events). For Audit (Premium) licensing requirements, see [Auditing solutions in Microsoft 365](audit-solutions-overview.md#licensing-requirements). <br/><br/>In the following table, Audit (Premium) activities are highlighted with an asterisk (*). +> Some Viva Engage audit activities are only available in Audit (Premium). That means users must be assigned the appropriate license before these activities are logged in the audit log. For more information about activities only available in Audit (Premium), see [Audit (Premium) in Microsoft 365](audit-premium.md#audit-premium-events). For Audit (Premium) licensing requirements, see [Auditing solutions in Microsoft 365](audit-solutions-overview.md#licensing-requirements). <br/><br/>In the following table, Audit (Premium) activities are highlighted with an asterisk (*). |Friendly name|Operation|Description| |:--|:--|:--| |Changed data retention policy|SoftDeleteSettingsUpdated|Verified admin updates the setting for the network data retention policy to either Hard Delete or Soft Delete. Only verified admins can perform this operation.|-|Changed network configuration|NetworkConfigurationUpdated|Network or verified admin changes the Yammer network's configuration. This includes setting the interval for exporting data and enabling chat.| +|Changed network configuration|NetworkConfigurationUpdated|Network or verified admin changes the Viva Engage network's configuration. This includes setting the interval for exporting data and enabling chat.| |Changed network profile settings|ProcessProfileFields|Network or verified admin changes the information that appears on member profiles for network users network.| |Changed private content mode|SupervisorAdminToggled|Verified admin turns *Private Content Mode* on or off. This mode lets an admin view the posts in private groups and view private messages between individual users (or groups of users). Only verified admins only can perform this operation.|-|Changed security configuration|NetworkSecurityConfigurationUpdated|Verified admin updates the Yammer network's security configuration. This includes setting password expiration policies and restrictions on IP addresses. Only verified admins can perform this operation.| +|Changed security configuration|NetworkSecurityConfigurationUpdated|Verified admin updates the Viva Engage network's security configuration. This includes setting password expiration policies and restrictions on IP addresses. Only verified admins can perform this operation.| |Created file|FileCreated|User uploads a file.| |Created group|GroupCreation|User creates a group.| |Created message<sup>*</sup>|MessageCreated|User creates a message.|-|Deleted group|GroupDeletion|A group is deleted from Yammer.| +|Deleted group|GroupDeletion|A group is deleted from Viva Engage.| |Deleted message|MessageDeleted|User deletes a message.| |Downloaded file|FileDownloaded|User downloads a file.|-|Exported data|DataExport|Verified admin exports Yammer network data. Only verified admins can perform this operation.| +|Exported data|DataExport|Verified admin exports Viva Engage network data. Only verified admins can perform this operation.| |Failed to access community<sup>*</sup>|CommunityAccessFailure|User failed to access a community.| |Failed to access file<sup>*</sup>|FileAccessFailure|User failed to access a file.| |Failed to access message<sup>*</sup>|MessageAccessFailure|User failed to access a message.| |Reacted to message|MarkedMessageChanged|User reacted to a message.| |Shared file|FileShared|User shares a file with another user.|-|Suspended network user|NetworkUserSuspended|Network or verified admin suspends (deactivates) a user from Yammer.| +|Suspended network user|NetworkUserSuspended|Network or verified admin suspends (deactivates) a user from Viva Engage.| |Suspended user|UserSuspension|User account is suspended (deactivated).| |Updated file description|FileUpdateDescription|User changes the description of a file.| |Updated file name|FileUpdateName|User changes the name of a file.| |
compliance | Audit Log Search | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-log-search.md | Why a unified audit log? Because you can search the audit log for activities per |Threat Intelligence|ThreatIntelligence, ThreatIntelligenceUrl, ThreatFinder, ThreatIntelligenceAtpContent| |Viva Goals|VivaGoals| |Viva Insights|VivaInsights|-|Yammer|Yammer| +|Viva Engage|Viva Engage| For more information about the operations that are audited in each of the services listed in the previous table, see the [Audit log activities](audit-log-activities.md) article. |
compliance | Audit Premium | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-premium.md | In addition to the events in Exchange Online and SharePoint Online, there are ev - [Microsoft Project for the web](audit-log-activities.md#microsoft-project-for-the-web-activities) - [Microsoft Teams](/microsoftteams/audit-log-events#teams-activities) - [Microsoft To Do](audit-log-activities.md#microsoft-to-do-activities)-- [Yammer](audit-log-activities.md#yammer-activities)+- [Viva Engage](audit-log-activities.md#viva-engage-activities) ## High-bandwidth access to the Office 365 Management Activity API |
compliance | Classifier Tc Definitions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/classifier-tc-definitions.md | Microsoft Purview comes with multiple pre-trained classifiers. They appear in th |**Description**|**File types**|**Languages**| |:-|:--|:--|-| Wire transfer is a method of electronic funds transfer from one person or entity to another. The model captures all the wire transfer receipts and acknowledgements. | Detects content in .docx, .docm, .doc, .dotx, .dotm, .dot, .pdf, .rtf, .txt files. | English | +| Wire transfer is a method of electronic funds transfer from one person or entity to another. The model captures all the wire transfer receipts and acknowledgments. | Detects content in .docx, .docm, .doc, .dotx, .dotm, .dot, .pdf, .rtf, .txt files. | English | ## Word count requirements Some classifiers have minimum word count requirements for messages. To identify |**Classifier**|**Minimum word count**|**Language**| |:-|:--|:--|-| Threat, Harassment, and Profanity | 12 words | non-English | +| Threat, Harassment, and Profanity | 6 words | Dutch, French, German, Italian, Japanese, Portuguese, Spanish | +| Threat, Harassment, and Profanity | 12 words | Arabic, Chinese Simplified, Chinese Traditional, Korean | | Threat and Harassment | 3 words | English | | Profanity | 5 words | English | | Corporate sabotage, Customer complaints, Gifts & entertainment, Money laundering, Regulatory collusion, Stock manipulation, and Unauthorized disclosure | 6 words | English | |
compliance | Communication Compliance Case Study | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-case-study.md | Title: "Case study - Contoso configures a communication compliance policy to identify potentially inappropriate text" -description: "A case study for Contoso and how they quickly configure a communication compliance policy to detect potentially inappropriate text in Microsoft Teams, Exchange Online, and Yammer communications." +description: "A case study for Contoso and how they quickly configure a communication compliance policy to detect potentially inappropriate text in Microsoft Teams, Exchange Online, and Viva Engage communications." keywords: Microsoft 365, Microsoft Purview, compliance, communication compliance f1.keywords: - NOCSH search.appverid: - MOE150 -# Case study - Contoso configures a communication compliance policy to identify potentially inappropriate text for Microsoft Teams, Exchange, and Yammer communications +# Case study - Contoso configures a communication compliance policy to identify potentially inappropriate text for Microsoft Teams, Exchange, and Viva Engage communications > [!IMPORTANT] > Microsoft Purview Communication Compliance provides the tools to help organizations detect regulatory compliance (for example, SEC or FINRA) and business conduct violations such as sensitive or confidential information, harassing or threatening language, and sharing of adult content. Built with privacy by design, usernames are pseudonymized by default, role-based access controls are built in, investigators are opted in by an admin, and audit logs are in place to help ensure user-level privacy. -[Microsoft Purview Communication Compliance](/microsoft-365/compliance/communication-compliance) helps minimize communication risks by helping you detect, capture, and act on messages with potentially inappropriate text in your organization. Potentially inappropriate text may include profanity, threats, harassment, and adult content. Pre-defined and custom [policies](/microsoft-365/compliance/communication-compliance-policies) allow you to review internal and external communications for policy matches, so they can be examined by designated reviewers. Reviewers can [investigate alerts](/microsoft-365/compliance/communication-compliance-investigate-remediate#investigate-alerts) for email, Microsoft Teams, Yammer, or third-party communications throughout your organization and take appropriate [remediation actions](/microsoft-365/compliance/communication-compliance-investigate-remediate#remediate-alerts) to make sure they're compliant with your organization's message standards. +[Microsoft Purview Communication Compliance](/microsoft-365/compliance/communication-compliance) helps minimize communication risks by helping you detect, capture, and act on messages with potentially inappropriate text in your organization. Potentially inappropriate text may include profanity, threats, harassment, and adult content. Pre-defined and custom [policies](/microsoft-365/compliance/communication-compliance-policies) allow you to review internal and external communications for policy matches, so they can be examined by designated reviewers. Reviewers can [investigate alerts](/microsoft-365/compliance/communication-compliance-investigate-remediate#investigate-alerts) for email, Microsoft Teams, Viva Engage, or third-party communications throughout your organization and take appropriate [remediation actions](/microsoft-365/compliance/communication-compliance-investigate-remediate#remediate-alerts) to make sure they're compliant with your organization's message standards. -The Contoso Corporation is a fictional organization that needs to quickly configure a policy to detect potentially inappropriate text. They have been using Microsoft 365 primarily for email, Microsoft Teams, and Yammer support for their users, but have new requirements to enforce company policy around workplace harassment. Contoso IT administrators and compliance specialists have a basic understanding of the fundamentals of working with Microsoft 365 and are looking for end-to-end guidance for how to quickly get started with communication compliance. +The Contoso Corporation is a fictional organization that needs to quickly configure a policy to detect potentially inappropriate text. They have been using Microsoft 365 primarily for email, Microsoft Teams, and Viva Engage support for their users, but have new requirements to enforce company policy around workplace harassment. Contoso IT administrators and compliance specialists have a basic understanding of the fundamentals of working with Microsoft 365 and are looking for end-to-end guidance for how to quickly get started with communication compliance. This case study covers the basics for quickly configuring a communication compliance policy to detect potentially inappropriate text. This guidance includes: This case study covers the basics for quickly configuring a communication compli ## Step 1: Planning for communication compliance -Contoso IT administrators and compliance specialists attended online webinars about compliance solutions in Microsoft Purview and decided that communication compliance policies will help them meet the updated corporate policy requirements for reducing workplace harassment. Working together, they've developed a plan to create and enable a communication compliance policy that will detect potentially inappropriate messages. This configuration includes detecting text for chats sent in Microsoft Teams, private messages and community conversations in Yammer, and in email messages sent in Exchange Online. +Contoso IT administrators and compliance specialists attended online webinars about compliance solutions in Microsoft Purview and decided that communication compliance policies will help them meet the updated corporate policy requirements for reducing workplace harassment. Working together, they've developed a plan to create and enable a communication compliance policy that will detect potentially inappropriate messages. This configuration includes detecting text for chats sent in Microsoft Teams, private messages and community conversations in Viva Engage, and in email messages sent in Exchange Online. Their plan includes identifying the: Communication compliance requires audit logs to show alerts and track remediatio Contoso IT administrators review and complete the [step-by-step instructions](/microsoft-365/compliance/turn-audit-log-search-on-or-off) to turn on auditing. After they turn on auditing, a message is displayed that says the audit log is being prepared and that they can run a search in a couple of hours after the preparation is complete. The Contoso IT administrators only have to do this action once. -### Configuring Yammer tenant for Native Mode +### Configuring Viva Engage tenant for Native Mode -Communication compliance requires that the Yammer tenant for an organization is in Native Mode to detect potentially inappropriate text in private messages and public community conversations. +Communication compliance requires that the Viva Engage tenant for an organization is in Native Mode to detect potentially inappropriate text in private messages and public community conversations. -Contoso IT administrators make sure they review the information in the [Overview of Yammer Native Mode in Microsoft 365 article](/yammer/configure-your-yammer-network/overview-native-mode) and follow the steps for running the migration tool in the [Configure your Yammer network for Native Mode for Microsoft 365](/yammer/configure-your-yammer-network/native-mode) article. +Contoso IT administrators make sure they review the information in the [Overview of Viva Engage Native Mode in Microsoft 365 article](/viva/engage/configure-your-viva-engage-network/overview-native-mode) and follow the steps for running the migration tool in the [Configure your Viva Engage network for Native Mode for Microsoft 365](/viva/engage/configure-your-viva-engage-network/native-mode) article. ### Setting up a group for in-scope users |
compliance | Communication Compliance Channels | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-channels.md | Use the following group management configurations to bring individual user chats Mailboxes hosted on Microsoft Exchange Online as part of your Microsoft 365 or Office 365 subscription are all eligible for message analysis. Exchange email messages and attachments matching communication compliance policy conditions may take approximately 24 hours to process. Supported attachment types for communication compliance are the same as the [file types supported for Exchange mail flow rule content inspections](/exchange/security-and-compliance/mail-flow-rules/inspect-message-attachments#supported-file-types-for-mail-flow-rule-content-inspection). -## Yammer +## Viva Engage -Private messages and public conversations and associated attachments in Microsoft Yammer communities can also be analyzed. When users are added to a communication compliance policy that includes Yammer as a defined channel, communications across all Yammer communities that a user is a member of are included in the analysis. Yammer chats and attachments matching communication compliance policy conditions may take up to 24 hours to process. +Private messages and public conversations and associated attachments in Microsoft Viva Engage communities can also be analyzed. When users are added to a communication compliance policy that includes Viva Engage as a defined channel, communications across all Viva Engage communities that a user is a member of are included in the analysis. Viva Engage chats and attachments matching communication compliance policy conditions may take up to 24 hours to process. -Yammer must be configured in [Native Mode](/yammer/configure-your-yammer-network/overview-native-mode) for communication compliance policies to detect Yammer communications and attachments. In Native Mode, all Yammer users are in Azure Active Directory, all groups are Office 365 Groups, and all files are stored in SharePoint Online. +Viva Engage must be configured in [Native Mode](/viva/engage/configure-your-viva-engage-network/overview-native-mode) for communication compliance policies to detect Viva Engage communications and attachments. In Native Mode, all Viva Engage users are in Azure Active Directory, all groups are Office 365 Groups, and all files are stored in SharePoint Online. ## Third-party sources |
compliance | Communication Compliance Configure | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-configure.md | search.appverid: > [!IMPORTANT] > Microsoft Purview Communication Compliance provides the tools to help organizations detect regulatory compliance (for example, SEC or FINRA) and business conduct violations such as sensitive or confidential information, harassing or threatening language, and sharing of adult content. Built with privacy by design, usernames are pseudonymized by default, role-based access controls are built in, investigators are opted in by an admin, and audit logs are in place to help ensure user-level privacy. -Use communication compliance policies to identify user communications for analysis by internal or external reviewers. For more information about how communication compliance policies can help you detect communications in your organization, see [communication compliance policies](/microsoft-365/compliance/communication-compliance-policies). If you'd like to review how Contoso quickly configured a communication compliance policy to detect potentially inappropriate content in Microsoft Teams, Exchange Online, and Yammer communications, check out this [case study](/microsoft-365/compliance/communication-compliance-case-study). +Use communication compliance policies to identify user communications for analysis by internal or external reviewers. For more information about how communication compliance policies can help you detect communications in your organization, see [communication compliance policies](/microsoft-365/compliance/communication-compliance-policies). If you'd like to review how Contoso quickly configured a communication compliance policy to detect potentially inappropriate content in Microsoft Teams, Exchange Online, and Viva Engage communications, check out this [case study](/microsoft-365/compliance/communication-compliance-case-study). [!INCLUDE [purview-preview](../includes/purview-preview.md)] For more information about setting up groups, see: - [Create and manage distribution groups](/Exchange/recipients-in-exchange-online/manage-distribution-groups/manage-distribution-groups) - [Overview of Microsoft 365 Groups](/office365/admin/create-groups/office-365-groups) -## Step 4 (optional): Verify your Yammer tenant is in Native Mode +## Step 4 (optional): Verify your Viva Engage tenant is in Native Mode -In Native Mode, all Yammer users are in Azure Active Directory (Azure AD), all groups are Office 365 Groups, and all files are stored in SharePoint Online. Your Yammer tenant must be in Native Mode for communication compliance policies to check and identify risky conversations in private messages and community conversations in Yammer. +In Native Mode, all Viva Engage users are in Azure Active Directory (Azure AD), all groups are Office 365 Groups, and all files are stored in SharePoint Online. Your Viva Engage tenant must be in Native Mode for communication compliance policies to check and identify risky conversations in private messages and community conversations in Viva Engage. -For more information about configuring Yammer in Native Mode, see: +For more information about configuring Viva Engage in Native Mode, see: -- [Overview of Yammer Native Mode in Microsoft 365](/yammer/configure-your-yammer-network/overview-native-mode)-- [Configure your Yammer network for Native Mode for Microsoft 365](/yammer/configure-your-yammer-network/native-mode)+- [Overview of Viva Engage Native Mode in Microsoft 365](/viva/engage/configure-your-viva-engage-network/overview-native-mode) +- [Configure your Viva Engage network for Native Mode for Microsoft 365](/viva/engage/configure-your-viva-engage-network/native-mode) ## Step 5 (required): Create a communication compliance policy For more information about configuring Yammer in Native Mode, see: - Choose the users or groups to apply the policy to, including all users in your organization, specific users and groups, or other users and groups you'd like to exclude. - Choose the reviewers for the policy. Reviewers are individual users and all reviewers must have mailboxes hosted on Exchange Online. Reviewers added here are the reviewers that you can choose from when escalating an alert in the investigation and remediation workflow. When reviewers are added to a policy, they automatically receive an email message that notifies them of the assignment to the policy and provides links to information about the review process. - Choose adaptive scopes for the policy. For more information, see [Adaptive policy scopes for compliance solutions](purview-adaptive-scopes.md#advantages-of-using-adaptive-scopes). If you decide to create an adaptive policy, you must create one or more adaptive scopes before you create your policy, and then select them during the create new policy process. For instructions, see [Configuration information for adaptive scopes](purview-adaptive-scopes.md#configure-adaptive-scopes).- - Choose the communication channels to check, including Exchange, Microsoft Teams, or Yammer. You'll also choose to check third-party sources if you've configured a connector in Microsoft 365. + - Choose the communication channels to check, including Exchange, Microsoft Teams, or Viva Engage. You'll also choose to check third-party sources if you've configured a connector in Microsoft 365. - Choose the communication direction to detect, including inbound, outbound, or internal communications. - Define the communication compliance policy [conditions](/microsoft-365/compliance/communication-compliance-policies#conditional-settings). You can choose from message address, keyword, file types, and size match conditions. - Choose if you'd like to include sensitive information types. This step is where you can select default and custom sensitive info types. Pick from existing custom sensitive information types or custom keyword dictionaries in the communication compliance policy wizard. You can create these items before running the wizard if needed. You can also create new sensitive information types from within the communication compliance policy wizard. After you create a communication compliance policy, it's a good idea to test it Follow these steps to test your communication compliance policy: -1. Open an email client, Microsoft Teams, or Yammer while signed in as a scoped user defined in the policy you want to test. -2. Send an email, Microsoft Teams chat, or Yammer message that meets the criteria you've defined in the communication compliance policy. This test can be a keyword, attachment size, domain, etc. Make sure you determine if your configured conditional settings in the policy are too restrictive or too lenient. +1. Open an email client, Microsoft Teams, or Viva Engage while signed in as a scoped user defined in the policy you want to test. ++2. Send an email, Microsoft Teams chat, or Viva Engage message that meets the criteria you've defined in the communication compliance policy. This test can be a keyword, attachment size, domain, etc. Make sure you determine if your configured conditional settings in the policy are too restrictive or too lenient. + > [!NOTE]- > Email messages can take approximately 24 hours to fully process in a policy. Communications in Microsoft Teams, Yammer, and third-party platforms can take approximately 48 hours to fully process in a policy. + > Email messages can take approximately 24 hours to fully process in a policy. Communications in Microsoft Teams, Viva Engage, and third-party platforms can take approximately 48 hours to fully process in a policy. 3. Sign in to Microsoft 365 as a reviewer designated in the communication compliance policy. Navigate to **Communication compliance** > **Alerts** to view the alerts for your policies. 4. Remediate the alert using the remediation controls and verify that the alert is properly resolved. |
compliance | Communication Compliance Investigate Remediate | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-investigate-remediate.md | Now that you've reviewed the details of the message for the alert, you can choos - **Tag as**: Tag the message as *compliant*, *non-compliant*, or as *questionable* as it relates to the policies and standards for your organization. Adding tags and tagging comments helps you micro-filter policy alerts for escalations or as part of other internal review processes. After tagging is complete, you can also choose to resolve the message to move it out of the pending review queue. - **Notify**: You can use the **Notify** control to assign a custom notice template to the alert and to send a warning notice to the user. Choose the appropriate notice template configured in the **Communication compliance settings** area and select **Send** to email a reminder to the user that sent the message and to resolve the issue. - **Escalate**: Using the **Escalate** control, you can choose who else in your organization should review the message. Choose from a list of reviewers configured in the communication compliance policy to send an email notification requesting additional review of the message alert. The selected reviewer can use a link in the email notification to go directly to items escalated to them for review.-- **Escalate for investigation**: Using the **Escalate for investigation** control, you can create a new [eDiscovery (Premium) case](/microsoft-365/compliance/overview-ediscovery-20) for single or multiple messages. You'll provide a name and notes for the new case, and user who sent the message matching the policy is automatically assigned as the case custodian. You don't need any additional permissions to manage the case. Creating a case doesn't resolve or create a new tag for the message. You can select a total of 100 messages when creating an eDiscovery (Premium) case during the remediation process. Messages in all communication channels included in communication compliance are supported. For example, you could select 50 Microsoft Teams chats, 25 Exchange Online email messages, and 25 Yammer messages when you open a new eDiscovery (Premium) case for a user.+- **Escalate for investigation**: Using the **Escalate for investigation** control, you can create a new [eDiscovery (Premium) case](/microsoft-365/compliance/overview-ediscovery-20) for single or multiple messages. You'll provide a name and notes for the new case, and user who sent the message matching the policy is automatically assigned as the case custodian. You don't need any additional permissions to manage the case. Creating a case doesn't resolve or create a new tag for the message. You can select a total of 100 messages when creating an eDiscovery (Premium) case during the remediation process. Messages in all communication channels included in communication compliance are supported. For example, you could select 50 Microsoft Teams chats, 25 Exchange Online email messages, and 25 Viva Engage messages when you open a new eDiscovery (Premium) case for a user. - **Remove message in Teams**: Using the **Remove message in Teams** control, you can block potentially inappropriate messages and content identified in alerts from Microsoft Teams channels and 1:1 and group chats. This includes Teams chat messages reported by users and chat messages detected using machine-learning and classifier-based communication compliance policies. Removed messages and content are replaced with a policy tip that explains that it's blocked and the policy that applies to its removal from view. Recipients are provided a link in the policy tip to learn more about the applicable policy and the review process. The sender receives a policy tip for the blocked message and content but can review the details of the blocked message and content for context regarding the removal. ### Step 4: Determine if message details should be archived outside of communication compliance |
compliance | Communication Compliance Plan | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-plan.md | There are six role groups used to configure initial permissions to manage commun ### Scoped users -Before you start using communication compliance, you must determine who needs their communications reviewed. In the policy, user email addresses identify individuals or groups of people to apply the policy to. Some examples of these groups are Microsoft 365 Groups, Exchange-based distribution lists, Yammer communities, and Microsoft Teams channels. You also can exclude specific users or groups from checking with a specific exclusion group or a list of groups. For more information about groups types supported in communication compliance policies, see [Get started with communication compliance](/microsoft-365/compliance/communication-compliance-configure#step-3-optional-set-up-groups-for-communication-compliance). +Before you start using communication compliance, you must determine who needs their communications reviewed. In the policy, user email addresses identify individuals or groups of people to apply the policy to. Some examples of these groups are Microsoft 365 Groups, Exchange-based distribution lists, Viva Engage communities, and Microsoft Teams channels. You also can exclude specific users or groups from checking with a specific exclusion group or a list of groups. For more information about groups types supported in communication compliance policies, see [Get started with communication compliance](/microsoft-365/compliance/communication-compliance-configure#step-3-optional-set-up-groups-for-communication-compliance). > [!IMPORTANT] > Users covered by communication compliance policies must have either a Microsoft 365 E5 Compliance license, an Office 365 Enterprise E3 license with the Advanced Compliance add-on, or be included in an Office 365 Enterprise E5 subscription. If you don't have an existing Enterprise E5 plan and want to try communication compliance, you can [sign up for a trial of Office 365 Enterprise E5](https://go.microsoft.com/fwlink/p/?LinkID=698279). Want to see an in-depth walkthrough of setting up a new communication compliance ## Ready to get started? -To configure communication compliance for your Microsoft 365 organization, see [Configure communication compliance](/microsoft-365/compliance/communication-compliance-configure) or check out the [case study for Contoso](/microsoft-365/compliance/communication-compliance-case-study) and how they quickly configured a communication compliance policy to detect potentially inappropriate content in Microsoft Teams, Exchange Online, and Yammer communications. +To configure communication compliance for your Microsoft 365 organization, see [Configure communication compliance](/microsoft-365/compliance/communication-compliance-configure) or check out the [case study for Contoso](/microsoft-365/compliance/communication-compliance-case-study) and how they quickly configured a communication compliance policy to detect potentially inappropriate content in Microsoft Teams, Exchange Online, and Viva Engage communications. |
compliance | Communication Compliance Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-policies.md | Policy templates are pre-defined policy settings that you can use to quickly cre |**Area**|**Policy Template**|**Details**| |:--|:--|:--|-| **Inappropriate text** | Detect inappropriate text | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Inbound, Outbound, Internal <br> - Review Percentage: 100% <br> - Conditions: Threat, Discrimination, and Targeted harassment classifiers | -| **Inappropriate images** | Detect inappropriate images | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Inbound, Outbound, Internal <br> - Review Percentage: 100% <br> - Conditions: Adult and Racy image classifiers | -| **Sensitive information** | Detect sensitive info types | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Inbound, Outbound, Internal <br> - Review Percentage: 10% <br> - Conditions: Sensitive information, out-of-the-box content patterns, and types, custom dictionary option, attachments larger than 1 MB | -| **Regulatory compliance** | Detect financial regulatory compliance | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Inbound, Outbound <br> - Review Percentage: 10% <br> - Conditions: Customer complaints, Gifts & entertainment, Money laundering, Regulatory collusion, Stock manipulation, and Unauthorized disclosure classifiers| -| **Conflict of interest** | Detect conflict of interest | - Locations: Exchange Online, Microsoft Teams, Yammer <br> - Direction: Internal <br> - Review Percentage: 100% <br> - Conditions: None | +| **Inappropriate text** | Detect inappropriate text | - Locations: Exchange Online, Microsoft Teams, Viva Engage <br> - Direction: Inbound, Outbound, Internal <br> - Review Percentage: 100% <br> - Conditions: Threat, Discrimination, and Targeted harassment classifiers | +| **Inappropriate images** | Detect inappropriate images | - Locations: Exchange Online, Microsoft Teams, Viva Engage <br> - Direction: Inbound, Outbound, Internal <br> - Review Percentage: 100% <br> - Conditions: Adult and Racy image classifiers | +| **Sensitive information** | Detect sensitive info types | - Locations: Exchange Online, Microsoft Teams, Viva Engage <br> - Direction: Inbound, Outbound, Internal <br> - Review Percentage: 10% <br> - Conditions: Sensitive information, out-of-the-box content patterns, and types, custom dictionary option, attachments larger than 1 MB | +| **Regulatory compliance** | Detect financial regulatory compliance | - Locations: Exchange Online, Microsoft Teams, Viva Engage <br> - Direction: Inbound, Outbound <br> - Review Percentage: 10% <br> - Conditions: Customer complaints, Gifts & entertainment, Money laundering, Regulatory collusion, Stock manipulation, and Unauthorized disclosure classifiers| +| **Conflict of interest** | Detect conflict of interest | - Locations: Exchange Online, Microsoft Teams, Viva Engage <br> - Direction: Internal <br> - Review Percentage: 100% <br> - Conditions: None | Communications are scanned every 24 hours from the time policies are created. For example, if you create an inappropriate content policy at 11:00 AM, the policy will gather communication compliance signals every 24 hours at 11:00 AM daily. Editing a policy doesn't change this time. To view the last scan date and Coordinated Universal Time (UTC) for a policy, navigate to the *Last policy scan* column on the **Policy** page. After creating a new policy, it may take up to 24 hours to view the first policy scan date and time. The following table outlines the time to detection for supported content types: |:|:--| | Email body content | 1 hour | | Teams body content | 1 hour |-| Yammer body content | 24 hours | +| Viva Engage body content | 24 hours | | Email OCR | 24 hours | | Teams OCR | 24 hours | | Email attachment | 24 hours | |
compliance | Communication Compliance Reports Audits | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-reports-audits.md | Use the *Export* option to create a .csv file containing the report details for - **Email**: Sensitive information types detected in Exchange email messages. - **Teams**: Sensitive information types detected in Microsoft Teams channels and chat messages.- - **Yammer**: Sensitive information types detected in Yammer inboxes, posts, chats, and replies. + - **Viva Engage**: Sensitive information types detected in Viva Engage inboxes, posts, chats, and replies. - **Third-party sources**: Sensitive information types detected for activities associated with third-party connectors configured in your organization. To view the breakdown of third-party sources for a specific sensitive information type in the report, hover your mouse over the value for the sensitive information type in the Third-party source column. - **Other**: Sensitive information types used for internal system processing. Selecting or deselecting this source for the report won't affect any values. Message details reports contain the following information for each message item - **Sender**: Sender of the message. - **Recipients**: Recipients included for the message. - **Date**: The date when the message was sent.-- **Location**: Channel that the message was sent on. This can be Exchange Online, Teams, Yammer, or any third-party channel supported by communication compliance. +- **Location**: Channel that the message was sent on. This can be Exchange Online, Teams, Viva Engage, or any third-party channel supported by communication compliance. - **Subject**: Subject of the message. - **Contains Attachments**: Status of any attachments for the message. Values are either *Yes* or *No*. - **Policy Name**: Name of the policy associated with the message. This value will be the same for all messages in the report. |
compliance | Communication Compliance Siem | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-siem.md | For more information about the Microsoft 365 Audit logs for Office 365 collected ## Configure communication compliance and Splunk integration + To integrate communication compliance alerts with Splunk, complete the following steps: 1. Install the [Splunk Add-on for Microsoft Office 365](https://docs.splunk.com/Documentation/AddOns/released/MSO365/ConfigureinputsmanagementAPI) |
compliance | Communication Compliance Solution Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-solution-overview.md | Protecting sensitive information and detecting and acting on workplace harassmen [!INCLUDE [purview-preview](../includes/purview-preview.md)] -Microsoft Purview Communication Compliance is an insider risk solution that helps you detect, capture, and act on inappropriate messages that can lead to potential data security or compliance incidents within your organization. Communication compliance evaluates text and image-based messages in Microsoft and third-party apps (Teams, Yammer, Outlook, WhatsApp, etc.) for potential business policy violations including inappropriate sharing of sensitive information, threatening or harassing language as well as potential regulatory violations (such as stock and capital manipulations). +Microsoft Purview Communication Compliance is an insider risk solution that helps you detect, capture, and act on inappropriate messages that can lead to potential data security or compliance incidents within your organization. Communication compliance evaluates text and image-based messages in Microsoft and third-party apps (Teams, Viva Engage, Outlook, WhatsApp, etc.) for potential business policy violations including inappropriate sharing of sensitive information, threatening or harassing language as well as potential regulatory violations (such as stock and capital manipulations). Communication compliance's mission is to foster safe and compliant communications across customers' enterprise communication channels. With role-based access controls, human investigators can take remediation actions such as removing a message from Teams or notifying senders of potentially inappropriate conduct. Operational factors and settings allow for effective and responsible use of the |End user reporting of inappropriate content in Teams|Message recipients can report messages they find inappropriate or deem a data security incident as a proactive approach to identifying communication risks.| |Keyword highlighting of messages caught by built-in classifiers|Investigators gain clarity on which key phrases trigger which classifiers.| |Pseudonymization|Sender/recipient aliases are pseudonymized to minimize investigation bias.|-|Users choose which communication channels to detect for patterns in|Users can choose which channels, such as Microsoft Teams, Exchange, Yammer, or third-party sources, to identify and detect content patterns.| +|Users choose which communication channels to detect for patterns in|Users can choose which channels, such as Microsoft Teams, Exchange, Viva Engage, or third-party sources, to identify and detect content patterns.| |Feedback loop to report misclassified items|Items misclassified by machine learning classifiers can be reported to Microsoft to improve future performance of classifiers. User privacy is honored as per the [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement).| ## Limitations of communication compliance Use the following steps to configure communication compliance for your organizat ## More information about communication compliance - [Investigate and remediate alerts](/microsoft-365/compliance/communication-compliance-investigate-remediate)-- [Case study: Contoso quickly configures an inappropriate content policy for Microsoft Teams, Exchange, and Yammer communications](/microsoft-365/compliance/communication-compliance-case-study)+- [Case study: Contoso quickly configures an inappropriate content policy for Microsoft Teams, Exchange, and Viva Engage communications](/microsoft-365/compliance/communication-compliance-case-study) |
compliance | Communication Compliance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance.md | search.appverid: > [!IMPORTANT] > Microsoft Purview Communication Compliance provides the tools to help organizations detect regulatory compliance (for example, SEC or FINRA) and business conduct violations such as sensitive or confidential information, harassing or threatening language, and sharing of adult content. Built with privacy by design, usernames are pseudonymized by default, role-based access controls are built in, investigators are opted in by an admin, and audit logs are in place to help ensure user-level privacy. -Microsoft Purview Communication Compliance is an insider risk solution that helps minimize communication risks by helping you detect, capture, and act on potentially inappropriate messages in your organization. Pre-defined and custom policies allow you to check internal and external communications for policy matches so they can be examined by designated reviewers. Reviewers can investigate email, Microsoft Teams, Yammer, or third-party communications in your organization and take appropriate actions to make sure they're compliant with your organization's message standards. +Microsoft Purview Communication Compliance is an insider risk solution that helps minimize communication risks by helping you detect, capture, and act on potentially inappropriate messages in your organization. Pre-defined and custom policies allow you to check internal and external communications for policy matches so they can be examined by designated reviewers. Reviewers can investigate email, Microsoft Teams, Viva Engage, or third-party communications in your organization and take appropriate actions to make sure they're compliant with your organization's message standards. Communication compliance policies in Microsoft 365 help you overcome many modern challenges associated with compliance and internal and external communications, including: Communication compliance policies check, detect, and capture messages across sev - **Microsoft Teams**: Chat communications for public and private [Microsoft Teams](/MicrosoftTeams/Teams-overview) channels and individual chats are supported in communication compliance as a standalone channel source or with other Microsoft 365 services. You'll need to manually add individual users, distribution groups, or specific Microsoft Teams channels when you select users and groups to apply a communication compliance policy to. Teams users can also self-report potentially inappropriate messages in private and group channels and chats for review and remediation. - **Exchange Online**: All mailboxes hosted on [Exchange Online](/Exchange/exchange-online) in your Microsoft 365 organization are eligible for analyses. Emails and attachments matching communication compliance policy conditions are instantly available for investigation and in compliance reports. Exchange Online is now an optional source channel and is no longer required in communication compliance policies.-- **Yammer**: Private messages and public community conversations in [Yammer](/yammer/yammer-landing-page) are supported in communication compliance policies. Yammer is an optional channel and must be in [native mode](/yammer/configure-your-yammer-network/overview-native-mode) to support checking of messages and attachments.+- **Viva Engage**: Private messages and public community conversations in [Viva Engage](/viva/engage/viva-engage-landing-page) are supported in communication compliance policies. Viva Engage is an optional channel and must be in [native mode](/viva/engage/configure-your-viva-engage-network/overview-native-mode) to support checking of messages and attachments. - **Third-party sources**: You can check messages from [third-party sources](/microsoft-365/compliance/archive-third-party-data) for data imported into mailboxes in your Microsoft 365 organization. Communication compliance supports connections to several popular platforms, including Instant Bloomberg and others. To learn more about messaging channel support in communication compliance policies, see [Detect channel signals with communication compliance](/microsoft-365/compliance/communication-compliance-channels). Keeping track and mitigating compliance issues identified by communication compl ## Ready to get started? - For planning information, see [Plan for communication compliance](/microsoft-365/compliance/communication-compliance-plan).-- Check out the [case study for Contoso](/microsoft-365/compliance/communication-compliance-case-study) and see how they quickly configured a communication compliance policy to detect potentially inappropriate content in Microsoft Teams, Exchange Online, and Yammer communications.+- Check out the [case study for Contoso](/microsoft-365/compliance/communication-compliance-case-study) and see how they quickly configured a communication compliance policy to detect potentially inappropriate content in Microsoft Teams, Exchange Online, and Viva Engage communications. - To configure communication compliance for your Microsoft 365 organization, see [Configure communication compliance](/microsoft-365/compliance/communication-compliance-configure). ## More resources |
compliance | Compliance Quick Tasks | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-quick-tasks.md | A [retention policy](/microsoft-365/compliance/retention) lets you proactively d When content is subject to a retention policy, people can continue to edit and work with the content as if nothing's changed. The content is retained in place, in its original location. But if someone edits or deletes content that's subject to the retention policy, a copy of the original content is saved to a secure location where it's retained while the retention policy for that content is in effect. -You can quickly put retention policies in place for multiple services in your Microsoft 365 environment that include Teams and Yammer messages, Exchange mail, SharePoint sites, and OneDrive accounts. There are no limits to the number of users, mailboxes or sites that a retention policy can automatically include. But if you need to get more selective, you can do so by configuring either an adaptive scope that's query-based to dynamically target specific instances, or a static scope that specifies specific instances to always include or always exclude. +You can quickly put retention policies in place for multiple services in your Microsoft 365 environment that include Teams and Viva Engage messages, Exchange mail, SharePoint sites, and OneDrive accounts. There are no limits to the number of users, mailboxes or sites that a retention policy can automatically include. But if you need to get more selective, you can do so by configuring either an adaptive scope that's query-based to dynamically target specific instances, or a static scope that specifies specific instances to always include or always exclude. For step-by-step guidance to configure retention policies, see [Create and configure retention policies](/microsoft-365/compliance/create-retention-policies). Because retention policies form the cornerstone of a data lifecycle management strategy for Microsoft 365 apps and services, also see [Get started with data lifecycle management](/microsoft-365/compliance/get-started-with-data-lifecycle-management). For step-by-step guidance to configure retention policies, see [Create and confi Protecting sensitive information and detecting and acting on workplace harassment incidents is an important part of compliance with internal policies and standards. [Communication compliance](/microsoft-365/compliance/communication-compliance) in Microsoft Purview helps minimize these risks by helping you quickly detect, capture, and take remediation actions for email and Microsoft Teams communications. These include inappropriate communications containing profanity, threats, and harassment and communications that share sensitive information inside and outside of your organization. -A pre-defined *Detect inappropriate text* policy template allows you to check internal and external communications for policy matches so they can be examined by designated reviewers. Reviewers can investigate email, Microsoft Teams, Yammer, or third-party communications in your organization and take appropriate remediation actions to make sure they're compliant with your organization's standards. +A pre-defined *Detect inappropriate text* policy template allows you to check internal and external communications for policy matches so they can be examined by designated reviewers. Reviewers can investigate email, Microsoft Teams, Viva Engage, or third-party communications in your organization and take appropriate remediation actions to make sure they're compliant with your organization's standards. The pre-defined *Detect sensitive info* policy template helps you quickly create a policy to check email and Microsoft Teams communications containing defined sensitive information types or keywords to help make sure that important data isn't shared with people that shouldn't have access. These activities could include unauthorized communication about confidential projects or industry-specific rules on insider trading or other collusion activities. |
compliance | Create Apply Retention Labels | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-apply-retention-labels.md | If the labels don't appear after seven days, check the **Status** of the label p 2. Run one of the following commands: - - For the policy locations **Teams private channel messages**, **Yammer user messages** and **Yammer community messages**: + - For the policy locations **Teams private channel messages**, **Viva Engage user messages** and **Viva Engage community messages**: ```PowerShell Set-AppRetentionCompliancePolicy -Identity <policy name> -RetryDistribution |
compliance | Create Retention Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-retention-policies.md | Although a retention policy can support multiple services that are identified as - **Teams channel messages** - **Teams chats** - **Teams private channel messages**-- **Yammer community messages**-- **Yammer user messages**+- **Viva Engage community messages** +- **Viva Engage user messages** -If you select the Teams or Yammer locations when you create a retention policy, the other locations are automatically excluded. This means that the instructions to follow depend on whether you need to include the Teams or Yammer locations. +If you select the Teams or Viva Engage locations when you create a retention policy, the other locations are automatically excluded. This means that the instructions to follow depend on whether you need to include the Teams or Viva Engage locations. > [!NOTE]-> When you use adaptive policies instead of static policies, you can configure a single retention policy to include both Teams and Yammer locations. This isn't the case for static policies where Teams and Yammer locations require their own retention policy. +> When you use adaptive policies instead of static policies, you can configure a single retention policy to include both Teams and Viva Engage locations. This isn't the case for static policies where Teams and Viva Engage locations require their own retention policy. When you've more than one retention policy, and when you also use retention labels, see [The principles of retention, or what takes precedence?](retention.md#the-principles-of-retention-or-what-takes-precedence) to understand the outcome when multiple retention settings apply to the same content. -Select the tab for instructions to create a retention policy for Teams, Yammer, or the other supported services (Exchange, SharePoint, OneDrive, Microsoft 365 Groups, Skype for Business): +Select the tab for instructions to create a retention policy for Teams, Viva Engage, or the other supported services (Exchange, SharePoint, OneDrive, Microsoft 365 Groups, Skype for Business): # [Retention policy for Teams](#tab/teams-retention) If you have team sites that aren't connected to a Microsoft 365 group, you need It's possible that a retention policy that's applied to Microsoft 365 groups, SharePoint sites, or OneDrive accounts could delete a file that's referenced in a Teams chat or channel message before those messages get deleted. In this scenario, the file still displays in the Teams message, but when users select the file, they get a "File not found" error. This behavior isn't specific to retention policies and could also happen if a user manually deletes a file from SharePoint or OneDrive. -# [Retention policy for Yammer](#tab/yammer-retention) +# [Retention policy for Viva Engage](#tab/viva-engage-retention) > [!NOTE]-> Retention policies for Yammer currently do not inform users when messages are deleted as a result of a retention policy. +> Retention policies for Viva Engage currently do not inform users when messages are deleted as a result of a retention policy. >-> To use this feature, your Yammer network must be [Native Mode](/yammer/configure-your-yammer-network/overview-native-mode), not Hybrid Mode. +> To use this feature, your Viva Engage network must be [Native Mode](/viva-engage/configure-your-viva-engage-network/overview-native-mode), not Hybrid Mode. 1. From the [Microsoft Purview compliance portal](https://compliance.microsoft.com/), select **Data lifecycle management** > **Microsoft 365** > **Retention Policies**. It's possible that a retention policy that's applied to Microsoft 365 groups, Sh 5. Depending on your selected scope: - - If you chose **Adaptive**: On the **Choose adaptive policy scopes and locations** page, select **Add scopes** and select one or more adaptive scopes that have been created. Then, select one or more locations. The locations that you can select depend on the [scope types](purview-adaptive-scopes.md#configure-adaptive-scopes) added. For example, if you only added a scope type of **User**, you'll be able to select **Yammer user messages** but not **Yammer community messages**. + - If you chose **Adaptive**: On the **Choose adaptive policy scopes and locations** page, select **Add scopes** and select one or more adaptive scopes that have been created. Then, select one or more locations. The locations that you can select depend on the [scope types](purview-adaptive-scopes.md#configure-adaptive-scopes) added. For example, if you only added a scope type of **User**, you'll be able to select **Viva Engage user messages** but not **Viva Engage community messages**. - - If you chose **Static**: On the **Choose locations to apply the policy** page, toggle on one or both of the locations for Yammer: **Yammer community message** and **Yammer user messages**. + - If you chose **Static**: On the **Choose locations to apply the policy** page, toggle on one or both of the locations for Viva Engage: **Viva Engage community message** and **Viva Engage user messages**. By default, all communities and users are selected, but you can refine this by specifying communities and users to be included or excluded. - For Yammer user messages: + For Viva Engage user messages: - If you leave the default at **All users**, Azure B2B guest users are not included. - If you select **Edit** for **All users**, you can apply a retention policy to external users if you know their account. It's possible that a retention policy that's applied to Microsoft 365 groups, Sh 7. Complete the configuration and save your settings. -For technical details about how retention works for Yammer, including what elements of messages are supported for retention and timing information with example walkthroughs, see [Learn about retention for Yammer](retention-policies-yammer.md). +For technical details about how retention works for Viva Engage, including what elements of messages are supported for retention and timing information with example walkthroughs, see [Learn about retention for Viva Engage](retention-policies-viva-engage.md). -#### Known configuration issues for Yammer retention policies +#### Known configuration issues for Viva Engage retention policies - Although you can select the option to start the retention period when items were last modified, the value of **When items were created** is always used. For messages that are edited, a copy of the original message is saved with its original timestamp to identify when this pre-edited message was created, and the post-edited message has a newer timestamp. -- When you select **Edit** for the Yammer user messages location, you might see guests and non-mailbox users. Retention policies aren't designed for these users, so don't select them.+- When you select **Edit** for the Viva Engage user messages location, you might see guests and non-mailbox users. Retention policies aren't designed for these users, so don't select them. -#### Additional retention policies needed to support Yammer +#### Additional retention policies needed to support Viva Engage -Yammer is more than just community messages and private messages. To retain and delete email messages for your Yammer network, configure an additional retention policy that includes any Microsoft 365 groups that are used for Yammer, by using the **Microsoft 365 Group mailboxes & sites** location. +Viva Engage is more than just community messages and private messages. To retain and delete email messages for your Viva Engage network, configure an additional retention policy that includes any Microsoft 365 groups that are used for Viva Engage, by using the **Microsoft 365 Group mailboxes & sites** location. -This location will also include files that are uploaded to Yammer communities. These files are stored in the group-connected SharePoint site for the Yammer community. +This location will also include files that are uploaded to Viva Engage communities. These files are stored in the group-connected SharePoint site for the Viva Engage community. -It's possible that a retention policy that's applied to SharePoint sites could delete a file that's referenced in a Yammer message before those messages get deleted. In this scenario, the file still displays in the Yammer message, but when users select the file, they get a "File not found" error. This behavior isn't specific to retention policies and could also happen if a user manually deletes a file from SharePoint. +It's possible that a retention policy that's applied to SharePoint sites could delete a file that's referenced in a Viva Engage message before those messages get deleted. In this scenario, the file still displays in the Viva Engage message, but when users select the file, they get a "File not found" error. This behavior isn't specific to retention policies and could also happen if a user manually deletes a file from SharePoint. # [Retention policy for all other services](#tab/other-retention) Use the following instructions for retention policies that apply to any of these - If you chose **Adaptive**: On the **Choose adaptive policy scopes and locations** page, select **Add scopes** and select one or more adaptive scopes that have been created. Then, select one or more locations. The locations that you can select depend on the [scope types](purview-adaptive-scopes.md#configure-adaptive-scopes) added. For example, if you only added a scope type of **User**, you'll be able to select **Exchange mailboxes** but not **SharePoint sites**. - - If you chose **Static**: On the **Choose locations** page, toggle on or off any of the locations except the locations for Teams and Yammer. For each location, you can leave it at the default to [apply the policy to the entire location](retention-settings.md#a-policy-that-applies-to-entire-locations), or [specify includes and excludes](retention-settings.md#a-policy-with-specific-inclusions-or-exclusions). + - If you chose **Static**: On the **Choose locations** page, toggle on or off any of the locations except the locations for Teams and Viva Engage. For each location, you can leave it at the default to [apply the policy to the entire location](retention-settings.md#a-policy-that-applies-to-entire-locations), or [specify includes and excludes](retention-settings.md#a-policy-with-specific-inclusions-or-exclusions). Information specific to locations: - [Exchange mailboxes and Exchange public folders](retention-settings.md#configuration-information-for-exchange-mailboxes-and-exchange-public-folders) First, the retention policy needs to be distributed to the locations that you se 2. Run one of the following commands: - - For the policy locations **Teams private channel messages**, **Yammer user messages** and **Yammer community messages**: + - For the policy locations **Teams private channel messages**, **Viva Engage user messages** and **Viva Engage community messages**: ```PowerShell Set-AppRetentionCompliancePolicy -Identity <policy name> -RetryDistribution |
compliance | Customer Key Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customer-key-overview.md | Multi-workload DEPs don't encrypt the following types of data. Instead, Microsof - SharePoint and OneDrive for Business data. - Microsoft Teams files and some Teams call and meeting recordings saved in OneDrive for Business and SharePoint Online are encrypted using the SharePoint Online DEP.-- Other Microsoft 365 workloads such as Yammer and Planner that aren't currently supported by Customer Key.+- Other Microsoft 365 workloads such as Viva Engage and Planner that aren't currently supported by Customer Key. - Teams Live Event data. You can create multiple DEPs per tenant but only assign one DEP at a time. When you assign the DEP, encryption begins automatically but takes some time to complete depending on the size of your tenant. |
compliance | Data Classification Increase Accuracy | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-increase-accuracy.md | Classifiers, such as [sensitive information types](sensitive-information-type-le This article shows you how to confirm whether items matched by a classifier are true positives (a **Match**) or false positives (**Not a match**) and provide **Match**/**Not a match** feedback. You can use that feedback to tune your classifiers to increase accuracy. You can also send redacted versions of the document as well as the **Match**, **Not a Match** feedback to Microsoft if you want to help increase the accuracy of the classifiers that Microsoft provides. -The **Match**, **Not a match** experience is available in: +The **Match**, **Not a match** and **Contextual Summary** experiences are available in: - Content Explorer - for SharePoint sites, OneDrive sites - Sensitive Information Type Matched Items page - for SharePoint sites, OneDrive sites The **Match**, **Not a match** experience is available in: - Microsoft Purview Data Loss Prevention (DLP) Alerts page - for SharePoint sites, OneDrive, and emails in Exchange - Microsoft Threat Protection (MTP) Alerts page - for SharePoint sites, OneDrive sites, and emails in Exchange +The **Contextual Summary** experience is available in: +- Microsoft Purview Information Protection (MIP) Auto-labeling simulation matched items - for SharePoint sites, OneDrive sites + [!INCLUDE [purview-preview](../includes/purview-preview.md)] ## Applies to The **Match**, **Not a match** experience is available in: |SIT |Yes| Yes|Yes| |Custom SIT | Yes|No | Yes| |Fingerprint SIT| No|No|Yes|-|Exact data match SIT|No|No|No| -|Named entities| No| No| No| -|Credential scan| No| No| No| +|Exact data match SIT|No*|No|No| +|Named entities| No*| No| No| +|Credential scan| No*| No| No| |Built-in Trainable classifiers|No| Yes| Yes| |Custom trainable classifier |No| No| Yes| +\* These classifiers are supported in MIP Auto-labeling simulation matched items - for SharePoint sites and OneDrive sites + > [!IMPORTANT]-> The match/not a match feedback experience supports items in: +> The match/not a match feedback and contextual summary experience support items in: > SharePoint sites & OneDrive sites - for Content Explorer, Sensitive Information Type and Trainable Classifier Matched Items, DLP Alerts and MTP Alerts. > Emails in Exchange - for DLP Alerts and MTP Alerts.+> The contextual summary experience supports items in: +> SharePoint sites and OneDrive sites - for MIP simulation matched items ## Licensing and Subscriptions For information on the relevant licensing and subscriptions, see the [licensing requirements for Data classification analytics: Overview Content & Activity Explorer](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#information-protection-data-classification-analytics-overview-content--activity-explorer). -## Known limitations for this preview +## Known limitations - The contextual summary only shows a limited number of matches in any given item, not all matches. - The contextual summary and feedback experience is only available for items created or updated after the feedback experience was enabled for the tenant. Items that were classified before the feature was enabled may not have the contextual summary and feedback experience available. |
compliance | Data Governance Solution | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-governance-solution.md | Use **Microsoft Purview Data Lifecycle Management** (formerly Microsoft Informat |Step|Description|More information| |:|:-|:| |1| Understand how retention and deletion works for Microsoft 365 services. <br /><br /> After you understand how you can use retention policies and retention labels, identify your workloads that need a retention policy and whether you need to create retention labels for exceptions. | [Learn about retention policies and retention labels](retention.md)|-|2| Create retention policies and if needed, retention labels for exceptions. <br /><br /> The most commonly used retention policies are for Exchange, SharePoint, Teams, Microsoft 365 Groups, and Yammer. You can configure exceptions for documents and emails. | [Create retention policies](create-retention-policies.md) <p> [Create and apply retention labels for your exceptions](create-retention-labels-information-governance.md)| +|2| Create retention policies and if needed, retention labels for exceptions. <br /><br /> The most commonly used retention policies are for Exchange, SharePoint, Teams, Microsoft 365 Groups, and Viva Engage. You can configure exceptions for documents and emails. | [Create retention policies](create-retention-policies.md) <p> [Create and apply retention labels for your exceptions](create-retention-labels-information-governance.md)| |3| Manage mailboxes. <br /><br /> Enable mailboxes for archiving and auto-expanding archiving, consider whether you need to customize when emails are moved to the archive mailbox, and make mailboxes inactive when users leave the organization.| [Enable archive mailboxes](enable-archive-mailboxes.md) <p> [Enable auto-expanding archiving](enable-autoexpanding-archiving.md) <p> [Create and manage inactive mailboxes](create-and-manage-inactive-mailboxes.md)| |4| Import PST files to online mailboxes. <br /><br /> If you have PST files that contain data you want to govern, you can import them by using network upload or drive shipping.| [Use network upload to import your organization's PST files](use-network-upload-to-import-pst-files.md) <p> [Use drive shipping to import your organization's PST files](use-drive-shipping-to-import-pst-files-to-office-365.md)| |
compliance | Data Lifecycle Management | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-lifecycle-management.md | Retaining and deleting content is often needed for compliance and regulatory req ## Microsoft 365 features -**Retention policies** are the cornerstone for data lifecycle management. Use these policies for Microsoft 365 workloads that include Exchange, SharePoint, OneDrive, Teams, and Yammer. Configure whether content for these services needs to be retained indefinitely, or for a specific period if users edit or delete it. Or you can configure the policy to automatically permanently delete the content after a specified period if it's not already deleted. You can also combine these two actions for retain and then delete, which is a very typical configuration. For example, retain email for three years and then delete it. +**Retention policies** are the cornerstone for data lifecycle management. Use these policies for Microsoft 365 workloads that include Exchange, SharePoint, OneDrive, Teams, and Viva Engage. Configure whether content for these services needs to be retained indefinitely, or for a specific period if users edit or delete it. Or you can configure the policy to automatically permanently delete the content after a specified period if it's not already deleted. You can also combine these two actions for retain and then delete, which is a very typical configuration. For example, retain email for three years and then delete it. When you configure a retention policy, you can target all instances in your organization (such as all mailboxes and all SharePoint sites), or individual instances (such as only the mailboxes for specific departments or regions, or just selected SharePoint sites). |
compliance | Dlp Exchange Conditions And Actions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-exchange-conditions-and-actions.md | To configure the sender address location at a DLP rule level, the parameter is * |condition or exception in DLP|condition/exception parameters in Security & Compliance PowerShell|property type|description| |||||-|Attachment is password protected|condition: *DocumentIsPasswordProtected* <br/><br/> exception: *ExceptIfDocumentIsPasswordProtected*|none|Messages where an attachment is password protected (and therefore can't be scanned). Password detection works for Office documents, archive documents (such as .zip, .7z, .rar, and .tar files), and .pdf files.| +|Attachment is password protected|condition: *DocumentIsPasswordProtected* <br/><br/> exception: *ExceptIfDocumentIsPasswordProtected*|none|Messages where an attachment is password protected (and therefore can't be scanned). Password detection works for Office documents, compressed files (.zip, .7z), and .pdf files.| |Attachment's file extension is|condition: *ContentExtensionMatchesWords* <br/><br/> exception: *ExceptIfContentExtensionMatchesWords*|Words|Messages where an attachment's file extension matches any of the specified words.| |Any email attachment's content could not be scanned|condition: *DocumentIsUnsupported* <br/><br/>exception: *ExceptIf DocumentIsUnsupported*|n/a|Messages where an attachment isn't natively recognized by Exchange Online.| |Any email attachment's content didn't complete scanning|condition: *ProcessingLimitExceeded* <br/><br/> exception: *ExceptIfProcessingLimitExceeded*|n/a|Messages where the rules engine couldn't complete the scanning of the attachments. You can use this condition to create rules that work together to identify and process messages where the content couldn't be fully scanned.| |
compliance | Dlp Policy Reference | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md | If you're new to Microsoft Purview DLP, here's a list of the core articles you'l 1. [Administrative units](microsoft-365-compliance-center-permissions.md#administrative-units) 1. [Learn about Microsoft Purview Data Loss Prevention](dlp-learn-about-dlp.md) - the article introduces you to the data loss prevention discipline and Microsoft's implementation of DLP-1. [Sensitive Information Type Limits](/microsoft-365/compliance/sit-limits) - these limits apply to all Microsoft Purview policies that use sensitive information types. 1. [Plan for data loss prevention (DLP)](dlp-overview-plan-for-dlp.md#plan-for-data-loss-prevention-dlp) - by working through this article you will: 1. [Identify stakeholders](dlp-overview-plan-for-dlp.md#identify-stakeholders) 1. [Describe the categories of sensitive information to protect](dlp-overview-plan-for-dlp.md#describe-the-categories-of-sensitive-information-to-protect) |
compliance | Ediscovery Add Custodians To Case | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-add-custodians-to-case.md | To deselect the primary mailbox and OneDrive account for a custodian:  -To associate other mailboxes, sites, Teams, or Yammer groups to a specific custodian: +To associate other mailboxes, sites, Teams, or Viva Engage groups to a specific custodian: 1. Expand a custodian to display the following services to associate data locations with the custodian. Select **Edit** next to a service to add a data location. - **Exchange**: Use to associate other mailboxes to the custodian. Type into the search box the name or alias (a minimum of three characters) of user mailboxes or distribution groups. Select the mailboxes to assign to the custodian and then select **Add**. - **SharePoint**: Use to associate SharePoint sites to the custodian. Select a site in the list or search for a site by typing a URL in the search box. Select the sites to assign to the custodian and then select **Add**. If a user is inactive, their OneDrive site will need to be added as an additional SharePoint location here. - **Teams**: Use to assign the Microsoft Teams the custodian is currently a member of. Select the teams to assign to the custodian and then select **Add**. After you add a team, the system automatically identifies and locates the SharePoint site and group mailbox associated to that team and assigns them to the custodian.- - **Yammer**: Use to assign the Yammer groups the custodian is currently a member of. Select the groups to assign to the custodian and then select **Add**. After you add a team, the system automatically identifies and locates the SharePoint site and group mailbox associated to that group and assigns them to the custodian. + - **Viva Engage**: Use to assign the Viva Engage groups the custodian is currently a member of. Select the groups to assign to the custodian and then select **Add**. After you add a team, the system automatically identifies and locates the SharePoint site and group mailbox associated to that group and assigns them to the custodian. > [!NOTE]- > You can use the **Exchange** and **SharePoint** location pickers to associate any mailbox or site in your organization to a custodian. , This includes associating the mailbox and site for a Microsoft Team or Yammer group that a custodian is not a member of. To do this, you have to add both the mailbox and site associated with each team or Yammer group. + > You can use the **Exchange** and **SharePoint** location pickers to associate any mailbox or site in your organization to a custodian. , This includes associating the mailbox and site for a Microsoft Team or Viva Engage group that a custodian is not a member of. To do this, you have to add both the mailbox and site associated with each team or Viva Engage group. -2. You can view the total number of mailboxes, sites, Teams, and Yammer groups assigned to each custodian by expanding each custodian in the table. When you've finalized the assigned data locations for each custodian, these associations will be maintained and used during the collection, processing, and review stages in the eDiscovery (Premium) workflow. +2. You can view the total number of mailboxes, sites, Teams, and Viva Engage groups assigned to each custodian by expanding each custodian in the table. When you've finalized the assigned data locations for each custodian, these associations will be maintained and used during the collection, processing, and review stages in the eDiscovery (Premium) workflow. 3. After adding custodians and configuring their data locations, select **Next** to go to the **Hold settings** page. |
compliance | Ediscovery Analyzing Data In Review Set | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-analyzing-data-in-review-set.md | The following list describes the result of the filter query in terms of what con - **Email**. Displays items that are marked as **Inclusive** or **InclusiveMinus**. An inclusive item is the final message in an email thread. It contains all previous content in the email thread. An inclusive minus it contains one or more attachments associated with the specific message in the email thread. A reviewer can use the inclusive minus value to determine which specific messages in the email thread have associated attachments. - **Attachments**. Filters out duplicate attachments in the same Email Set. Only attachments that are unique in an email thread are displayed. - **Documents and other**. Filters out duplicate documents. Only documents that are unique in the review set are displayed.-- **Teams conversations**. All Teams (and Yammer) conversations in the review set are displayed.+- **Teams conversations**. All Teams (and Viva Engage) conversations in the review set are displayed. For more information about inclusive types and document uniqueness, see [Email threading in eDiscovery (Premium)](ediscovery-email-threading.md). > [!NOTE]-> During the public preview of [the new case format](ediscovery-new-case-format.md) in eDiscovery (Premium), the **For Review** filter query did not return Teams or Yammer conversations for review sets (in cases that use the large case format) created before November 4, 2021. This issue has been resolved. That means if you reapply the **For Review** query to a review set in a case that uses the large case format, more items that match the filter query may be displayed because all Teams or Yammer conversations are included. +> During the public preview of [the new case format](ediscovery-new-case-format.md) in eDiscovery (Premium), the **For Review** filter query did not return Teams or Viva Engage conversations for review sets (in cases that use the large case format) created before November 4, 2021. This issue has been resolved. That means if you reapply the **For Review** query to a review set in a case that uses the large case format, more items that match the filter query may be displayed because all Teams or Viva Engage conversations are included. ## Analytics report |
compliance | Ediscovery Assign Permissions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-assign-permissions.md | For more information, see [Work with communications in eDiscovery (Premium)](man ### Compliance Search -This role lets users run the Content Search tool in the compliance portal to search mailboxes and public folders, SharePoint Online sites, OneDrive for Business sites, Skype for Business conversations, Microsoft 365 groups, and Microsoft Teams, and Yammer groups. This role allows a user to get an estimate of the search results and create export reports, but other roles are needed to initiate content search actions such as previewing, exporting, or deleting search results. +This role lets users run the Content Search tool in the compliance portal to search mailboxes and public folders, SharePoint Online sites, OneDrive for Business sites, Skype for Business conversations, Microsoft 365 groups, and Microsoft Teams, and Viva Engage groups. This role allows a user to get an estimate of the search results and create export reports, but other roles are needed to initiate content search actions such as previewing, exporting, or deleting search results. In Content search and eDiscovery (Standard), users who are assigned the *Compliance Search* role but don't have the *Preview* role can preview the results of a search in which the preview action has been initiated by a user who is assigned the *Preview* role. The user without the *Preview* role can preview results for up to two weeks after the initial preview action was created. |
compliance | Ediscovery Bulk Add Custodians | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-bulk-add-custodians.md | After you download the CSV custodian template, you can add custodians and their |**Workload1 Location**| Depending on your workload type, this would be the location of the data source. For example, the email address for an Exchange mailbox or the URL for a SharePoint site. | ||| + > [!NOTE] > <sup>1</sup> If you put more than 1,000 mailboxes or 100 sites on hold in a case, the system will automatically scale the eDiscovery hold as needed. This means the system automatically adds data locations to multiple hold policies, instead of adding them to a single policy. However, the limit of 10,000 case hold policies per organization still applies. For more information about hold limits, see [Limits in eDiscovery (Premium)](ediscovery-premium-limits.md#hold-limits). <br> |
compliance | Ediscovery Commit Draft Collection | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-commit-draft-collection.md | When you're satisfied with the items you've collected in a collection estimate a 1. Decide whether to **Add to a new review set** (which is created after you submit the collection) or **Add to an existing review set**. Complete this section based on your decision. 2. Configure the **Retrieval** settings:+ - - **Teams and Yammer conversations**: Select this option to add conversation threads to the collection that include the chat items returned by the search query in the collection. This means that the chat conversation that contains items that match the search criteria is reconstructed. This lets you review chat items in the context of the back and forth conversation. Collect up to 12 hours of related conversations when a message matches a search. For more information, see [Conversation threading in eDiscovery (Premium)](ediscovery-conversation-review-sets.md). + A. **Teams and Viva Engage conversations**: Select this option to add conversation threads to the collection that include the chat items returned by the search query in the collection. This means that the chat conversation that contains items that match the search criteria is reconstructed. This lets you review chat items in the context of the back and forth conversation. Collect up to 12 hours of related conversations when a message matches a search. For more information, see [Conversation threading in eDiscovery (Premium)](ediscovery-conversation-review-sets.md). - To export Teams messages as individual messages when committing to review set, unselect **Teams and Yammer conversations**. This commits your review set with individual Teams messages. Once the collection is committed, you can export the documents and messages in the review set. The exported results contain the individual messages for Teams and Yammer instead of conversation threads. + To export Teams messages as individual messages when committing to review set, unselect **Teams and Viva Engage conversations**. This commits your review set with individual Teams messages. Once the collection is committed, you can export the documents and messages in the review set. The exported results contain the individual messages for Teams and Viva Engage instead of conversation threads. - > [!NOTE] - > The **Teams and Yammer conversations** setting is selected by default. If selected, review sets contain Teams conversation threads related to the matched search. + > [!NOTE] + > The **Teams and Viva Engage conversations** setting is selected by default. If selected, review sets contain Teams conversation threads related to the matched search. - **Cloud attachments**: Select this option to include modern attachments or linked files when the collection results are added to the review set. This means the target file of a modern attachment or linked file is added to the review set. |
compliance | Ediscovery Content Search Reference | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-content-search-reference.md | Keep the following things in mind when searching for content in Microsoft Teams Conditions are logically connected to the keyword query by the **AND** operator. That means an item must match both the keyword query and the search condition to be returned in the search results. For more information, see the "Guidelines for using conditions" section in [Keyword queries and search conditions for Content Search.](ediscovery-keyword-queries-and-search-conditions.md#guidelines-for-using-conditions) -## Searching Yammer Groups +## Searching Viva Engage Groups -You can use the **ItemClass** email property or the **Type** search condition to search specifically for conversation items in Yammer Groups. +You can use the **ItemClass** email property or the **Type** search condition to search specifically for conversation items in Viva Engage Groups. - To use the **ItemClass** property as part of the keyword search query, in the **Keywords** box of a search query, you can type one (or all) of the following property:value pairs: You can use the **ItemClass** email property or the **Type** search condition to - ItemClass:IPM.Yammer.praise - ItemClass:IPM.Yammer.question - For example, you can use the following search query to return Yammer messages and Yammer praise items: + For example, you can use the following search query to return Viva Engage messages and Viva Engage praise items: -  +  - - Alternatively, you can use the **Type** email condition and select **Yammer messages** to return Yammer items. For example, the following search query will return all Yammer conversation items that contain the keyword "confidential". + - Alternatively, you can use the **Type** email condition and select **Viva Engage messages** to return Viva Engage items. For example, the following search query will return all Viva Engage conversation items that contain the keyword "confidential". -  +  ## Searching inactive mailboxes |
compliance | Ediscovery Content Search | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-content-search.md | You can use the Content search eDiscovery tool in the Microsoft Purview complian - SharePoint Online sites and OneDrive for Business accounts - Microsoft Teams - Microsoft 365 Groups-- Yammer Groups+- Viva Engage Groups After you run a search, the number of content locations and an estimated number of search results are displayed on the search flyout page. You can quickly view statistics, such as the content locations that have the most items that match the search query. After you run a search, you can preview the results or export them to a local computer. After you run a search, the number of content locations and an estimated number  - 1. **Exchange mailboxes**: Set the toggle to **On** and then select **Choose users, groups, or teams** to specify the mailboxes to search. Use the search box to find user mailboxes and distribution groups. You can also search the mailbox associated with a Microsoft Team (for channel messages), Microsoft 365 Group, and Yammer Group. For more information about the application data stored in mailboxes, see [Content stored in mailboxes for eDiscovery](ediscovery-what-is-stored-in-a-mailbox.md). + 1. **Exchange mailboxes**: Set the toggle to **On** and then select **Choose users, groups, or teams** to specify the mailboxes to search. Use the search box to find user mailboxes and distribution groups. You can also search the mailbox associated with a Microsoft Team (for channel messages), Microsoft 365 Group, and Viva Engage Group. For more information about the application data stored in mailboxes, see [Content stored in mailboxes for eDiscovery](ediscovery-what-is-stored-in-a-mailbox.md). - 2. **SharePoint sites**: Set the toggle to **On** and then select **Choose sites** to specify SharePoint sites and OneDrive sites to search. Enter the URL for each site that you want to search. You can also add the URL for the SharePoint site for a Microsoft Team, Microsoft 365 Group, or Yammer Group. + 2. **SharePoint sites**: Set the toggle to **On** and then select **Choose sites** to specify SharePoint sites and OneDrive sites to search. Enter the URL for each site that you want to search. You can also add the URL for the SharePoint site for a Microsoft Team, Microsoft 365 Group, or Viva Engage Group. 3. **Exchange public folders**: Set the toggle to **On** to search all public folders in your Exchange Online organization. You can't choose specific public folders to search. Leave the toggle switch off if you don't want search all public folders. |
compliance | Ediscovery Conversation Review Sets | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-conversation-review-sets.md | Title: "Review conversations in eDiscovery (Premium)" -description: "Learn about the conversation reconstruction feature in Microsoft Purview eDiscovery (Premium) (called conversation threading) to reconstruct, review, and export chat conversations in Microsoft Teams and Yammer groups." +description: "Learn about the conversation reconstruction feature in Microsoft Purview eDiscovery (Premium) (called conversation threading) to reconstruct, review, and export chat conversations in Microsoft Teams and Viva Engage groups." f1.keywords: - NOCSH search.appverid: # Conversation threading in eDiscovery (Premium) -Instant messaging is a convenient way to ask questions, share ideas, or quickly communicate across large audiences. As instant messaging platforms, like Microsoft Teams and Yammer groups, become core to enterprise collaboration, organizations must evaluate how their eDiscovery workflow addresses these new forms of communication and collaboration. +Instant messaging is a convenient way to ask questions, share ideas, or quickly communicate across large audiences. As instant messaging platforms, like Microsoft Teams and Viva Engage groups, become core to enterprise collaboration, organizations must evaluate how their eDiscovery workflow addresses these new forms of communication and collaboration. The conversation reconstruction feature in Microsoft Purview eDiscovery (Premium) is designed to help you identify contextual content and produce distinct conversation views. This capability allows you to efficiently and rapidly review complete instant message conversations (also called *threaded conversations*) that are generated in platforms like Microsoft Teams. |
compliance | Ediscovery Create And Manage Cases | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-create-and-manage-cases.md | To get you started using eDiscovery (Premium), here's a basic workflow that alig Here are some things that happen (or that you can do) when you add custodians to a case: - - Data in the custodian's Exchange mailbox, OneDrive account, and any Microsoft Teams or Yammer groups that the custodian is a member of can be "marked" as custodial data in the case. + - Data in the custodian's Exchange mailbox, OneDrive account, and any Microsoft Teams or Viva Engage groups that the custodian is a member of can be "marked" as custodial data in the case. - Custodian (and non-custodial) data is reindexed (by a process called *Advanced indexing*). This helps optimize searching for it in the next step. - You can place a hold on custodian (and non-custodial) data. This preserves data that may be relevant to the case during the investigation. - You can associate other data sources with a custodian (for example, you can associate a SharePoint site or Microsoft 365 Group with a custodian) so this data can be reindexed, placed on hold, and searched, just like the data in the custodian's mailbox or OneDrive account. |
compliance | Ediscovery Create Draft Collection | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-create-draft-collection.md | Here's the descriptions of the pre-collection estimate management options. - **Types of collected items to include in the export**: Choose to export collected items with search hits, items with search hits and partially indexed items without hits, or only partially indexed items without search hits. You can also choose to one or more of the following options for collected items: - - Include Microsoft Teams and Yammer conversations + - Include Microsoft Teams and Viva Engage conversations - Include cloud attachments - Include all existing versions of Microsoft 365 documents on SharePoint - Include subfolder contents (insider subfolders of a matched folder) Here's the descriptions of the pre-collection estimate management options. - **Types of collected items to include in the export**: Choose to export collected items with search hits, items with search hits and partially indexed items without hits, or only partially indexed items without search hits. You can also choose to one or more of the following options for collected items: - - Include Microsoft Teams and Yammer conversations + - Include Microsoft Teams and Viva Engage conversations - Include cloud attachments - Include all existing versions of Microsoft 365 documents on SharePoint - Include subfolder contents (inside subfolders of a matched folder) |
compliance | Ediscovery Create Holds | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-create-holds.md | search.appverid: # Create eDiscovery holds in a eDiscovery (Standard) case -You can use a Microsoft Purview eDiscovery (Standard) case to create holds to preserve content that might be relevant to the case. You can place a hold on the Exchange mailboxes and OneDrive for Business accounts of people you're investigating in the case. You can also place a hold on the mailboxes and sites that are associated with Microsoft Teams, Microsoft 365 groups, and Yammer Groups. When you place content locations on hold, content is preserved until you remove the content location from the hold or until you delete the hold. +You can use a Microsoft Purview eDiscovery (Standard) case to create holds to preserve content that might be relevant to the case. You can place a hold on the Exchange mailboxes and OneDrive for Business accounts of people you're investigating in the case. You can also place a hold on the mailboxes and sites that are associated with Microsoft Teams, Microsoft 365 groups, and Viva Engage Groups. When you place content locations on hold, content is preserved until you remove the content location from the hold or until you delete the hold. >[!IMPORTANT] > For long term data retention not related to eDiscovery investigations, it is strongly advised to use retention policies and retention labels. For more information, see [Learn about retention policies and retention labels](/microsoft-365/compliance/retention#when-to-use-retention-policies-and-retention-labels-or-ediscovery-holds). To create an eDiscovery hold that's associated with a eDiscovery (Standard) case  - 1. **Exchange mailboxes**: Set the toggle to **On** and then select **Choose users, groups, or teams** to specify the mailboxes to place on hold. Use the search box to find user mailboxes and distribution groups (to place a hold on the mailboxes of group members) to place on hold. You can also place a hold on the associated mailbox for a Microsoft Team, Microsoft 365 group, and Yammer Group. For more information about the application data that is preserved when a mailbox is placed on hold, see [Content stored in mailboxes for eDiscovery](ediscovery-what-is-stored-in-a-mailbox.md). + 1. **Exchange mailboxes**: Set the toggle to **On** and then select **Choose users, groups, or teams** to specify the mailboxes to place on hold. Use the search box to find user mailboxes and distribution groups (to place a hold on the mailboxes of group members) to place on hold. You can also place a hold on the associated mailbox for a Microsoft Team, Microsoft 365 group, and Viva Engage Group. For more information about the application data that is preserved when a mailbox is placed on hold, see [Content stored in mailboxes for eDiscovery](ediscovery-what-is-stored-in-a-mailbox.md). - 2. **SharePoint sites**: Set the toggle to **On** and then select **Choose sites** to specify SharePoint sites and OneDrive accounts to place on hold. Type the URL for each site that you want to place on hold. You can also add the URL for the SharePoint site for a Microsoft Team, Microsoft 365 group or a Yammer Group. + 2. **SharePoint sites**: Set the toggle to **On** and then select **Choose sites** to specify SharePoint sites and OneDrive accounts to place on hold. Type the URL for each site that you want to place on hold. You can also add the URL for the SharePoint site for a Microsoft Team, Microsoft 365 group or a Viva Engage Group. 3. **Exchange public folders**: Set the toggle to **On** to put all public folders in your Exchange Online organization on hold. You can't choose specific public folders to put on hold. Leave the toggle switch off if you don't want to put a hold on public folders. After a mailbox, SharePoint site, or OneDrive account is removed from an eDiscov - **DelayHoldApplied:** This property applies to email-related content (generated by people using Outlook and Outlook on the web) that's stored in a user's mailbox. - - **DelayReleaseHoldApplied:** This property applies to cloud-based content (generated by non-Outlook apps such as Microsoft Teams, Microsoft Forms, and Microsoft Yammer) that's stored in a user's mailbox. Cloud data generated by a Microsoft app is typically stored in a hidden folder in a user's mailbox. + - **DelayReleaseHoldApplied:** This property applies to cloud-based content (generated by non-Outlook apps such as Microsoft Teams, Microsoft Forms, and Microsoft Viva Engage) that's stored in a user's mailbox. Cloud data generated by a Microsoft app is typically stored in a hidden folder in a user's mailbox. When a delay hold is placed on the mailbox (when either of the previous properties is set to **True**), the mailbox is still considered to be on hold for an unlimited hold duration, as if the mailbox was on Litigation Hold. After 30 days, the delay hold expires, and Microsoft 365 will automatically attempt to remove the delay hold (by setting the DelayHoldApplied or DelayReleaseHoldApplied property to **False**) so that the hold is removed. After either of these properties are set to **False**, the corresponding items that are marked for removal are purged the next time the mailbox is processed by the Managed Folder Assistant. The following table lists the limits for eDiscovery cases and case holds. |:--|:--| |Maximum number of cases for an organization. |No limit | |Maximum number of eDiscovery hold policies for an organization. This limit includes the combined total of hold policies in eDiscovery (Standard) and eDiscovery (Premium) cases. |10,000<sup>1</sup> |-|Maximum number of mailboxes in a single eDiscovery hold. This limit includes the combined total of user mailboxes, and the mailboxes associated with Microsoft 365 groups, Microsoft Teams, and Yammer Groups. |1,000 | -|Maximum number of sites in a single eDiscovery hold. This limit includes the combined total of OneDrive for Business sites, SharePoint sites, and the sites associated with Microsoft 365 groups, Microsoft Teams, and Yammer Groups. <br/|100| +|Maximum number of mailboxes in a single eDiscovery hold. This limit includes the combined total of user mailboxes, and the mailboxes associated with Microsoft 365 groups, Microsoft Teams, and Viva Engage Groups. |1,000 | +|Maximum number of sites in a single eDiscovery hold. This limit includes the combined total of OneDrive for Business sites, SharePoint sites, and the sites associated with Microsoft 365 groups, Microsoft Teams, and Viva Engage Groups. <br/|100| |Maximum number of cases displayed on the eDiscovery home page, and the maximum number of items displayed on the Holds, Searches, and Export tabs within a case. |1,000<sup>1</sup>| > [!NOTE] |
compliance | Ediscovery Document Metadata Fields | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-document-metadata-fields.md | This table provides the following information: |Conversation Pdf Time|ConversationPdfTime|*Not exported*|Date when the PDF version of the conversation was created.| |Conversation Redaction Burn Time|ConversationRedactionBurnTime|*Not exported*|Date when the PDF version of the conversation was created for Chat.| |Conversation Topic|ConversationTopic|*Not exported*|Conversation topic of the item.|-|Conversation Type|ConversationType|ConversationType|The type of chat conversation. Values are: <br>**Teams 1:1 and group chats and all Yammer conversations:** Group<br>**Teams channels and private channels:** Channel| +|Conversation Type|ConversationType|ConversationType|The type of chat conversation. Values are: <br>**Teams 1:1 and group chats and all Viva Engage conversations:** Group<br>**Teams channels and private channels:** Channel| |Contains Deleted Message|ContainsDeletedMessage|ContainsDeletedMessage|Indicates if the chat transcript includes a deleted message| |Contains Edited Message|ContainsEditedMessage|ContainsEditedMessage|Indicates if the chat transcript includes an edited message| |Teams Announcement Title|TeamsAnnouncementTitle|TeamsAnnouncementTitle|Title from a [teams announcement](https://support.microsoft.com/office/send-an-announcement-to-a-channel-8f244ea6-235a-4dcc-9143-9c5b801b4992).| This table provides the following information: |FamilyDuplicateSet*|*Not searchable*|Family_duplicate_set|Numeric identifier for families that are exact duplicates of each other (same content and all the same attachments).| |Family ID|FamilyId|Family_ID|Groups together attachments and extracted items from email and chats with its parent item. This includes the chat or email and all attachments and extracted items.| |Family Size|*Not searchable*|Family_size|Number of documents in the family.|-|File class|FileClass|File_class|For content from SharePoint and OneDrive: *Document*. <br>For content from Exchange: *Email* or *Attachment*. <br>For content from Teams or Yammer: *Conversations*.| +|File class|FileClass|File_class|For content from SharePoint and OneDrive: *Document*. <br>For content from Exchange: *Email* or *Attachment*. <br>For content from Teams or Viva Engage: *Conversations*.| |File ID|FileId|File_ID|Document identifier unique within the case.| |File system date created|*Not searchable*|File_system_date_created|Created date from file system (only applies to non-Office 365 data).| |File system date modified|*Not searchable*|File_system_date_modified|Modified date from file system (only applies to non-Office 365 data).| This table provides the following information: |Subject|Subject|Email_subject|Subject of the message.| |Subject/Title|SubjectTitle|*Not searchable*|Calculated field comprised of the subject or title of the item.| |Tags|Tags|Tags|Tags applied in a review set.|-|Team Name|TeamName|TeamName|**Teams:** Name of team<br>**Yammer:** Community name| +|Team Name|TeamName|TeamName|**Teams:** Name of team<br>**Viva Engage:** Community name| |Themes list|ThemesList|Themes_list|Themes list as calculated for analytics.|-|Thread ID|ThreadId|Thread_ID|The Thread ID from email messages, Teams conversations, and Yammer conversations. For email messages, all reply messages and attachments share the same Thread ID. For Teams 1:1 and group chats, all transcript files and their associated items within the same conversation share the same Thread ID. For more information, see [View documents in a review set](ediscovery-view-documents-in-review-set.md#grouping).| -|Title|Title|Doc_title|Title from the document metadata. Title from the document metadata. For Teams and Yammer content, this is the value from the ConversationName property.| +|Thread ID|ThreadId|Thread_ID|The Thread ID from email messages, Teams conversations, and Viva Engage conversations. For email messages, all reply messages and attachments share the same Thread ID. For Teams 1:1 and group chats, all transcript files and their associated items within the same conversation share the same Thread ID. For more information, see [View documents in a review set](ediscovery-view-documents-in-review-set.md#grouping).| +|Title|Title|Doc_title|Title from the document metadata. Title from the document metadata. For Teams and Viva Engage content, this is the value from the ConversationName property.| |To|To|Email_to|To field for message types. The format is *DisplayName\<SmtpAddress>*| |Unique in email set|UniqueInEmailSet|*Not exported*|*False* if there's a duplicate of the attachment in its email set.| |Version Group ID|*Not searchable*|Version_Group_Id|Groups together the different versions of the same document.| |
compliance | Ediscovery Export Documents From Review Set | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-export-documents-from-review-set.md | Use the following options to configure the export. Not all options are allowed f - *None*: This option doesn't export the family items or conversation items. It only exports the items that are selected or to all items in the review set list. - *Include associated family items*: This option includes associated family items. Family items are items that share the same [*FamilyId* metadata property](/microsoft-365/compliance/ediscovery-document-metadata-fields) value. For example, a document that's attached to an email message shares the same *FamilyId* as the email message. If this option is selected, the email message and the document are exported in this example, even though the document might not be included in the list of review set items.- - *Include associated conversation items*: This option includes associated items that are in the same Teams or Yammer conversation. Conversation items are items that share the same [*ConversationId* metadata property](/microsoft-365/compliance/ediscovery-document-metadata-fields) value. All messages, posts, and corresponding transcript file of a conversation share the same *ConversationId*. -+ - *Include associated conversation items*: This option includes associated items that are in the same Teams or Viva Engage conversation. Conversation items are items that share the same [*ConversationId* metadata property](/microsoft-365/compliance/ediscovery-document-metadata-fields) value. All messages, posts, and corresponding transcript file of a conversation share the same *ConversationId*. + If any option other than *None* is selected, all items that share the same association ID are exported, even though some of those items might not be in the results of the current review set query. For more information about conversation items, see [eDiscovery (Premium) workflow for content in Microsoft Teams](/microsoft-365/compliance/ediscovery-teams-workflow#grouping). - **Output options**: Exported content is either available for download directly through a web browser or can be sent to an Azure Storage account. The first two options enable direct download. |
compliance | Ediscovery Identify A Hold On An Exchange Online Mailbox | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-identify-a-hold-on-an-exchange-online-mailbox.md | For more information about retention labels, see [retention labels](retention.md After any type of hold is removed from a mailbox, a *delay hold* is applied. This means that the actual removal of the hold is delayed for 30 days to prevent data from being permanently deleted (purged) from the mailbox. This gives admins an opportunity to search for or recover mailbox items that will be purged after a hold is removed. A delay hold is placed on a mailbox the next time the Managed Folder Assistant processes the mailbox and detects that a hold was removed. Specifically, a delay hold is applied to a mailbox when the Managed Folder Assistant sets one of the following mailbox properties to **True**: - **DelayHoldApplied:** This property applies to email-related content (generated by people using Outlook and Outlook on the web) that's stored in a user's mailbox.-- **DelayReleaseHoldApplied:** This property applies to cloud-based content (generated by non-Outlook apps such as Microsoft Teams, Microsoft Forms, and Microsoft Yammer) that's stored in a user's mailbox. Cloud data generated by a Microsoft app is typically stored in a hidden folder in a user's mailbox.+- **DelayReleaseHoldApplied:** This property applies to cloud-based content (generated by non-Outlook apps such as Microsoft Teams, Microsoft Forms, and Microsoft Viva Engage) that's stored in a user's mailbox. Cloud data generated by a Microsoft app is typically stored in a hidden folder in a user's mailbox. When a delay hold is placed on the mailbox (when either of the previous properties is set to **True**), the mailbox is still considered to be on hold for an unlimited hold duration, as if the mailbox was on Litigation Hold. After 30 days, the delay hold expires, and Microsoft 365 will automatically attempt to remove the delay hold (by setting the *DelayHoldApplied* or *DelayReleaseHoldApplied* property to **False**) so that the hold is removed. After either of these properties are set to **False**, the corresponding items that are marked for removal are purged the next time the mailbox is processed by the Managed Folder Assistant. |
compliance | Ediscovery Legacy Retirement | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-legacy-retirement.md | The following table describes other tools that you can use to replace the existi <p>Higher reliability for searching, exporting, and placing content on hold</p> </li> <li>-<p>Searching for content in for Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, Microsoft Teams, Yammer Groups, Microsoft 365 Groups, and other content stored in Office 365 applications</p></li></ul> +<p>Searching for content in for Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, Microsoft Teams, Viva Engage Groups, Microsoft 365 Groups, and other content stored in Office 365 applications</p></li></ul> </td> </tr> <tr class="even"> |
compliance | Ediscovery Manage New Custodians | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-manage-new-custodians.md | To update the data sources that are associated with a custodian: - Select **Edit** next to **Mailbox** or **OneDrive** to add the custodian's mailbox or OneDrive location. - Select **Clear** next to **Mailbox** or **OneDrive** to remove the custodian's mailbox or OneDrive account from being associated as a data location for this custodian. -5. To add or remove other mailboxes, sites, Teams, or Yammer groups to a specific custodian, select **Edit** next to the service to add a data location. +5. To add or remove other mailboxes, sites, Teams, or Viva Engage groups to a specific custodian, select **Edit** next to the service to add a data location. - **Exchange**: Use to associate other mailboxes to the custodian. Type into the search box the name or alias (a minimum of three characters) of user mailboxes or distribution groups. Select the mailboxes to assign to the custodian and then select **Add**. - **SharePoint**: Use to associate SharePoint sites to the custodian. Select a site in the list or search for a site by typing a URL in the search box. Select the sites to assign to the custodian and then select **Add**. - **Teams**: Use to assign the Microsoft Teams the custodian is currently a member of. Select the teams to assign to the custodian and then select **Add**. After you add a team, the system automatically identifies and locates the SharePoint site and group mailbox associated to that team and assigns them to the custodian.- - **Yammer**: Use to assign the Yammer groups the custodian is currently a member of. Select the groups to assign to the custodian and then select **Add**. After you add a team, the system automatically identifies and locates the SharePoint site and group mailbox associated to that group and assigns them to the custodian. + - **Viva Engage**: Use to assign the Viva Engage groups the custodian is currently a member of. Select the groups to assign to the custodian and then select **Add**. After you add a team, the system automatically identifies and locates the SharePoint site and group mailbox associated to that group and assigns them to the custodian. > [!NOTE]- > You can use the **Exchange** and **SharePoint** location pickers to associate any mailbox or site in your organization, including teams or Yammer groups that a custodian is not a member of, to a custodian. To do this, you have to add both the mailbox and site associated with each team or Yammer group. + > You can use the **Exchange** and **SharePoint** location pickers to associate any mailbox or site in your organization, including teams or Viva Engage groups that a custodian is not a member of, to a custodian. To do this, you have to add both the mailbox and site associated with each team or Viva Engage group. 6. After editing the data locations for the custodian, select **Next** to go to the **Hold settings** page. |
compliance | Ediscovery New Case Format | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-new-case-format.md | Here's a list of other benefits of large cases in eDiscovery (Premium) workflow. - **Collection**: In the new case format, you can collect up to 1 TB of data for a single collection. - For each case, the collection settings will default to collect cloud Attachments and contextual Teams and Yammer content. These settings help to collect the full picture of digital communications within an investigation. For Teams and Yammer contextual conversations, the new case format will convert time-based snapshots of 1:1, 1: N and Channel conversations into HTML transcripts to help provide context of conversations and reduce the total number of items produced by chat-based content. + For each case, the collection settings will default to collect cloud Attachments and contextual Teams and Viva Engage content. These settings help to collect the full picture of digital communications within an investigation. For Teams and Viva Engage contextual conversations, the new case format will convert time-based snapshots of 1:1, 1: N and Channel conversations into HTML transcripts to help provide context of conversations and reduce the total number of items produced by chat-based content. - **Review**: Each review set will support up to 1 TB of pre-expansion content. Additional metadata will be available for filters and queries including Team name, channel name and conversation name for Teams content. Each transcript will include time-based content for before and after the responsive item. For Channel conversations, the root post and all replies will be collected for responsive content. For more information, see [eDiscovery (Premium) workflow for content in Microsoft Teams (preview)](teams-workflow-in-advanced-ediscovery.md) |
compliance | Ediscovery Non Custodial Data Sources | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-non-custodial-data-sources.md | Follow these steps to add and manage non-custodial data sources in an eDiscovery - **Exchange** - Select **Edit** to add mailboxes. Type a name or alias (a minimum of three characters) in the search box for mailboxes or distribution groups. Select the mailboxes that you want to add as non-custodian data sources and select **Add**. > [!NOTE]- > You can use the **SharePoint** and **Exchange** sections to add sites and mailboxes associated with a Team or Yammer group as non-custodial data sources. You have to separately add the mailbox and site associated with a Team or Yammer group.<br/><br/> Also, adding a root site URL (such as `https://contoso-my.sharepoint.com/personal/` or `https://contoso-my.sharepoint.com/`) as a SharePoint data source isn't supported. You have to add specific sites. + > You can use the **SharePoint** and **Exchange** sections to add sites and mailboxes associated with a Team or Viva Engage group as non-custodial data sources. You have to separately add the mailbox and site associated with a Team or Viva Engage group.<br/><br/> Also, adding a root site URL (such as `https://contoso-my.sharepoint.com/personal/` or `https://contoso-my.sharepoint.com/`) as a SharePoint data source isn't supported. You have to add specific sites. 4. After you add non-custodial data sources, you have the option to place those locations on hold or not. Select or unselect the **Hold** checkbox next to the data source to place it on hold. |
compliance | Ediscovery Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-overview.md | Traditionally, organizations that rely on multiple third-party eDiscovery soluti eDiscovery (Premium) in Microsoft 365 lets you discover data at the source and staying within your Microsoft 365 security and compliance boundary. By collecting data in-place from the live system, eDiscovery (Premium) reduces the friction of going back to the source and reduces unnecessary work of having to find missing content, which often happens when journaling lags in traditional eDiscovery solutions. -Native search and collection capabilities for data in Teams, Yammer, SharePoint Online, OneDrive for Business, and Exchange Online further enhances data discovery. For example, eDiscovery (Premium): +Native search and collection capabilities for data in Teams, Viva Engage, SharePoint Online, OneDrive for Business, and Exchange Online further enhances data discovery. For example, eDiscovery (Premium): - Reconstructs Teams conversations (instead of returning individual messages from conversations). - Collects cloud-based content shared with users by use of links or modern attachments in email message and Teams chats. |
compliance | Ediscovery Premium Limits | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-premium-limits.md | The following table lists the limits for holds associated with an eDiscovery (Pr | Description of limit | Limit | |:--|:--| |Maximum number of hold policies for an organization. This limit includes the combined total of hold policies in Microsoft Purview eDiscovery (Standard) and Microsoft Purview eDiscovery (Premium) cases. <br/> |10,000<sup>2</sup> |-|Maximum number of mailboxes in a single case hold. This limit includes the combined total of user mailboxes, and the mailboxes associated with Microsoft 365 Groups, Microsoft Teams, and Yammer Groups. <br/> |1,000 | -|Maximum number of sites in a single case hold. This limit includes the combined total of OneDrive for Business sites, SharePoint sites, and the sites associated with Microsoft 365 Groups, Microsoft Teams, and Yammer Groups. | 100 | +|Maximum number of mailboxes in a single case hold. This limit includes the combined total of user mailboxes, and the mailboxes associated with Microsoft 365 Groups, Microsoft Teams, and Viva Engage Groups. <br/> |1,000 | +|Maximum number of sites in a single case hold. This limit includes the combined total of OneDrive for Business sites, SharePoint sites, and the sites associated with Microsoft 365 Groups, Microsoft Teams, and Viva Engage Groups. | 100 | ## Indexing limits |
compliance | Ediscovery Search For Content | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-search-for-content.md | To create a eDiscovery (Standard) search:  - 1. **Exchange mailboxes**: Set the toggle to **On** and then select **Choose users, groups, or teams** to specify the mailboxes to place on hold. Use the search box to find user mailboxes and distribution groups (to place a hold on the mailboxes of group members) to place on hold. You can also search the mailbox associated with a Microsoft Team (for channel messages), Office 365 Group, and Yammer Group. For more information about the application data stored in mailboxes, see [Content stored in mailboxes for eDiscovery](ediscovery-what-is-stored-in-a-mailbox.md). + 1. **Exchange mailboxes**: Set the toggle to **On** and then select **Choose users, groups, or teams** to specify the mailboxes to place on hold. Use the search box to find user mailboxes and distribution groups (to place a hold on the mailboxes of group members) to place on hold. You can also search the mailbox associated with a Microsoft Team (for channel messages), Office 365 Group, and Viva Engage Group. For more information about the application data stored in mailboxes, see [Content stored in mailboxes for eDiscovery](ediscovery-what-is-stored-in-a-mailbox.md). - 2. **SharePoint sites**: Set the toggle to **On** and then select **Choose sites** to specify SharePoint sites and OneDrive accounts to place on hold. Type the URL for each site that you want to place on hold. You can also add the URL for the SharePoint site for a Microsoft Team, Office 365 Group, or Yammer Group. + 2. **SharePoint sites**: Set the toggle to **On** and then select **Choose sites** to specify SharePoint sites and OneDrive accounts to place on hold. Type the URL for each site that you want to place on hold. You can also add the URL for the SharePoint site for a Microsoft Team, Office 365 Group, or Viva Engage Group. 3. **Exchange public folders**: Set the toggle to **On** to put all public folders in your Exchange Online organization on hold. You can't choose specific public folders to put on hold. Leave the toggle switch off if you don't want to put a hold on public folders. After the search is completed, you can preview the search results. If necessary, ## More information about searching content locations - When you select **Choose users, groups, or teams** to specify mailboxes to search, the mailbox picker that's displayed is empty. This is by design to enhance performance. To add recipients to this list, select **Choose users, groups, or teams**, type a name (a minimum of three characters) in the search box, select the check box next to the name, and then select **Choose**.-- You can add inactive mailboxes, Microsoft Teams, Yammer Groups, Office 365 Groups, and distribution groups to the list of mailboxes to search. Dynamic distribution groups aren't supported. If you add Microsoft Teams, Yammer Groups, or Office 365 Groups, the group or team mailbox is searched; the mailboxes of the group members aren't searched.-- To add sites to the search, turn on the toggle and then select **Choose sites**. Type the URL for each site that you want to search. You can also add the URL for the SharePoint site for a Microsoft Team, a Yammer Group, or an Office 365 Group.+- You can add inactive mailboxes, Microsoft Teams, Viva Engage Groups, Office 365 Groups, and distribution groups to the list of mailboxes to search. Dynamic distribution groups aren't supported. If you add Microsoft Teams, Viva Engage Groups, or Office 365 Groups, the group or team mailbox is searched; the mailboxes of the group members aren't searched. +- To add sites to the search, turn on the toggle and then select **Choose sites**. Type the URL for each site that you want to search. You can also add the URL for the SharePoint site for a Microsoft Team, a Viva Engage Group, or an Office 365 Group. |
compliance | Ediscovery Standard Limits | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-standard-limits.md | The following table lists the limits for eDiscovery (Standard) cases and holds a |:--|:--| |Maximum number of cases for an organization. <br/> |No limit <br/> | |Maximum number of case holds for an organization. <br/> |10,000 <br/> |- |Maximum number of mailboxes in a single case hold. This limit includes the combined total of user mailboxes, and the mailboxes associated with Microsoft 365 Groups, Microsoft Teams, and Yammer Groups. <br/> |1,000 <br/> | - |Maximum number of sites in a single case hold. This limit includes the combined total of OneDrive for Business sites, SharePoint sites, and the sites associated with Microsoft 365 Groups, Microsoft Teams, and Yammer Groups. <br/> |100 <br/> | + |Maximum number of mailboxes in a single case hold. This limit includes the combined total of user mailboxes, and the mailboxes associated with Microsoft 365 Groups, Microsoft Teams, and Viva Engage Groups. <br/> |1,000 <br/> | + |Maximum number of sites in a single case hold. This limit includes the combined total of OneDrive for Business sites, SharePoint sites, and the sites associated with Microsoft 365 Groups, Microsoft Teams, and Viva Engage Groups. <br/> |100 <br/> | |Maximum number of cases displayed on the eDiscovery (Standard) home page, and the maximum number of items displayed on the Holds, Searches, and Export tabs within a case. <sup>1</sup> |1,000| > [!NOTE] |
compliance | Ediscovery Tagging Documents | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-tagging-documents.md | With the tag structure in place, reviewers can apply tags to items in a review s - **None**: This option doesn't apply tags to associated family items or associated conversation items. It only applies tags to the items that are selected or to all items in the review set list. - **Include associated family items**: This option applies the same tag to the associated family items of items that are tagged. *Family items* are items that share the same **FamilyId** metadata property value. For example, a document that's attached to an email message shares the same **FamilyId** as the email message. So if this option is selected for this example, the email message and the document are tagged, even though the document might not be included in the list of review set items.- - **Include associated conversation items**: This option applies the same tag to all items that are in the same Teams or Yammer conversation as the items that are tagged. *Conversation items* are items that share the same **ConversationId** metadata property value. All messages, posts, and corresponding transcript file of a conversation share the same **ConversationId**. If this option is selected, then all items in the same conversation (and transcript file) are tagged, even though some of those conversation items might not be included in the list of review set items. For more information about conversation items, see the "Grouping" section in [eDiscovery (Premium) workflow for content in Microsoft Teams](teams-workflow-in-advanced-ediscovery.md#grouping). + - **Include associated conversation items**: This option applies the same tag to all items that are in the same Teams or Viva Engage conversation as the items that are tagged. *Conversation items* are items that share the same **ConversationId** metadata property value. All messages, posts, and corresponding transcript file of a conversation share the same **ConversationId**. If this option is selected, then all items in the same conversation (and transcript file) are tagged, even though some of those conversation items might not be included in the list of review set items. For more information about conversation items, see the "Grouping" section in [eDiscovery (Premium) workflow for content in Microsoft Teams](teams-workflow-in-advanced-ediscovery.md#grouping). >[!NOTE] >Including associated family or conversation items will not change the count of items shown in the **Tag selected items** or **Tag all items in list** options. In other words, the number of associated items that will be tagged is not displayed. With the tag structure in place, reviewers can apply tags to items in a review s - **None**: This option doesn't apply tags to family group items or conversation group items. It only applies tags to the items that are selected or to all items in the review set list. - **Include family groups**: This option applies the same tag to the associated family items of items that are tagged. *Family group* items are items that share the same **GroupId** metadata property value. For example, a document that's attached to an PowerPoint file shares the same **GroupId** as the document. So if this option is selected for this example, the document and the PowerPoint file are both tagged. Both are grouped together in the list of review set items.- - **Include conversation groups**: This option applies the same tag to all items that are in the same email, Teams, or Yammer conversation as the items that are tagged. *Conversation group* items are items that share the same **ThreadId** metadata property value. All messages, posts, and corresponding transcript files of a conversation share the same **ThreadId**. If this option is selected, then all items in the same conversation (and transcript file) are tagged. All items are grouped together in the list of review set items. + - **Include conversation groups**: This option applies the same tag to all items that are in the same email, Teams, or Viva Engage conversation as the items that are tagged. *Conversation group* items are items that share the same **ThreadId** metadata property value. All messages, posts, and corresponding transcript files of a conversation share the same **ThreadId**. If this option is selected, then all items in the same conversation (and transcript file) are tagged. All items are grouped together in the list of review set items. - **Assign tags**: This section displays the tags (organized by tag groups) that you can apply to documents. You can only apply one single-choice tag (identified by a radio button) per tag group. However, you can apply multiple multi-choice tags (which are identified by a checkbox). |
compliance | Ediscovery Teams Workflow | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-teams-workflow.md | Use the **Group** control in the command bar of a review set to view Teams conte  - Select **Group family attachments** to view Teams content grouped by family. Each transcript file is displayed on a line in the list of review set items. Attachments are nested under the item.-- Select **Group Teams or Yammer conversations** to view Teams content grouped by conversation. Each conversation is displayed on a line in the list of review set items. Transcript files and attachments are nested under the top-level conversation.+- Select **Group Teams or Viva Engage conversations** to view Teams content grouped by conversation. Each conversation is displayed on a line in the list of review set items. Transcript files and attachments are nested under the top-level conversation. > [!NOTE] > Cloud attachments are grouped with the conversations they appear in. This grouping is accomplished by assigning the same **FamilyId** as the transcript file of the message the file was attached to and the same **ConversationId** as the conversation the message appeared in. This means multiple copies of cloud attachments may be added to the review set if they were attached to different conversations. |
compliance | Ediscovery View Documents In Review Set | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-view-documents-in-review-set.md | Use the **Group** control in the command bar of a review set to view review cont If you're new to eDiscovery or are an existing eDiscovery customer with a steady stream of new cases, grouping review set items using [Group IDs and Thread IDs](ediscovery-document-metadata-fields.md) is the recommended option. This grouping option makes it easier to find and review related items in a review set by grouping them together in the list view. With the **Enable group** option [enabled in the case settings](ediscovery-configure-review-set-settings.md), you'll see the following grouping options on the **Group** control in the command bar of a review set: - **Group by families**: All items related to a specific file are grouped together using the same Group ID. For example, if you have a PowerPoint file in the review set that includes imbedded images or .zip files, these images and files are grouped with the PowerPoint file and shown as nested items with the file in the item list view.-- **Group by conversations**: All email messages, Teams conversations, and Yammer conversations are grouped using the same Thread ID and appear as nested items. Additionally, all associated content for these messages and conversations is also grouped together. For example, if you have an email conversation that includes several email messages, some of which include attachments and some that include embedded images, all of the email messages, attachments, and images are grouped together in the review set list view under an applicable item.+- **Group by conversations**: All email messages, Teams conversations, and Viva Engage conversations are grouped using the same Thread ID and appear as nested items. Additionally, all associated content for these messages and conversations is also grouped together. For example, if you have an email conversation that includes several email messages, some of which include attachments and some that include embedded images, all of the email messages, attachments, and images are grouped together in the review set list view under an applicable item. >[!NOTE] > For cases created before March 15, 2023, the **Enable group** toggle is disabled and these grouping options aren't available. Item grouping in review sets for these cases is based on *Family ID* and *Conversation ID* described in Option 2. If you're new to eDiscovery or are an existing eDiscovery customer with a steady If you're an existing eDiscovery with a large number of existing cases or use existing internal or third-party automation to help process review set items, you may want to continue to group review set items with [Family IDs and Conversation IDs](ediscovery-document-metadata-fields.md). With the **Enable group** option [disabled in the case settings](ediscovery-configure-review-set-settings.md), you'll see the following grouping options on the **Group** control in the command bar of a review set: - **Group family attachments**: View review set content grouped by family. Each transcript file is displayed on a line in the list of review set items. Attachments are nested under the item.-- **Group Teams or Yammer conversations**: View Teams and Yammer content grouped by conversation. Each conversation is displayed on a line in the list of review set items. Transcript files and attachments are nested under the top-level conversation.+- **Group Teams or Viva Engage conversations**: View Teams and Viva Engage content grouped by conversation. Each conversation is displayed on a line in the list of review set items. Transcript files and attachments are nested under the top-level conversation. > [!NOTE] > Cloud attachments are grouped with the conversations they appear in. This grouping is accomplished by assigning the same **FamilyId** as the transcript file of the message the file was attached to and the same **ConversationId** as the conversation the message appeared in. This means multiple copies of cloud attachments may be added to the review set if they were attached to different conversations. |
compliance | Ediscovery What Is Stored In A Mailbox | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-what-is-stored-in-a-mailbox.md | The following table lists the apps that either stores or associates data with a |Tasks|Tasks in the Tasks app (which are the same tasks as the ones accessible in Outlook) are stored in a user's mailbox.| |Teams|Conversations that are part of a Teams channel are associated with the Teams mailbox. Conversations that are part of the Chat list in Teams (also called *1 x N chats*) are associated with the mailbox of the users who participate in the chat. Also, summary information for meetings and calls in a Teams channel are associated with mailboxes of users who dialed into the meeting or call. So when searching for Teams content, you would search the Teams mailbox for content in channel conversations and search user mailboxes for content in 1 x N chats.| |To-Do|Tasks (called *to-dos*, which are saved in to-do lists) in the To-Do app are stored in a user's mailbox.|-|Yammer|Conversations and comments within a Yammer community are associated with the Microsoft 365 group mailbox, as well as the user mailbox of the author and any named recipients (@ mentioned or Cc'ed users). Private messages sent outside of a Yammer community are stored in the mailbox of the users who participate in the private message.| +|Viva Engage|Conversations and comments within a Viva Engage community are associated with the Microsoft 365 group mailbox, as well as the user mailbox of the author and any named recipients (@ mentioned or Cc'ed users). Private messages sent outside of a Viva Engage community are stored in the mailbox of the users who participate in the private message.| | > [!NOTE] |
compliance | Ediscovery | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery.md | search.appverid: # Microsoft Purview eDiscovery solutions -Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in legal cases. You can use eDiscovery tools in Microsoft Purview to search for content in Exchange Online, OneDrive for Business, SharePoint Online, Microsoft Teams, Microsoft 365 Groups, and Yammer teams. You can search mailboxes and sites in the same eDiscovery search, and then export the search results. You can use Microsoft Purview eDiscovery (Standard) cases to identify, hold, and export content found in mailboxes and sites. If your organization has an Office 365 E5 or Microsoft 365 E5 subscription (or related E5 add-on subscriptions), you can further manage custodians and analyze content by using the feature-rich Microsoft Purview eDiscovery (Premium) solution in Microsoft 365. +Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in legal cases. You can use eDiscovery tools in Microsoft Purview to search for content in Exchange Online, OneDrive for Business, SharePoint Online, Microsoft Teams, Microsoft 365 Groups, and Viva Engage teams. You can search mailboxes and sites in the same eDiscovery search, and then export the search results. You can use Microsoft Purview eDiscovery (Standard) cases to identify, hold, and export content found in mailboxes and sites. If your organization has an Office 365 E5 or Microsoft 365 E5 subscription (or related E5 add-on subscriptions), you can further manage custodians and analyze content by using the feature-rich Microsoft Purview eDiscovery (Premium) solution in Microsoft 365. [!INCLUDE [purview-preview](../includes/purview-preview.md)] The following table compares the key capabilities available in Content search, e Here's a description of each eDiscovery capability. -- **Search for content**. Search for content that's stored in Exchange mailboxes, OneDrive for Business accounts, SharePoint sites, Microsoft Teams, Microsoft 365 Groups, and Yammer Teams. This includes content generated by other Microsoft 365 apps that store data in mailboxes and sites.+- **Search for content**. Search for content that's stored in Exchange mailboxes, OneDrive for Business accounts, SharePoint sites, Microsoft Teams, Microsoft 365 Groups, and Viva Engage Teams. This includes content generated by other Microsoft 365 apps that store data in mailboxes and sites. - **Keyword queries and search conditions**. Create Keyword Query Language (KQL) search queries to search for content keywords that match query criteria. You can also include conditions to narrow the scope of your search. - **Search statistics**. After you run a search, you can view statistics of the estimated search results, such as the number and total size of items matching your search criteria. Other statistics include the top content locations that contain search results and the number of items that match different parts of the search query. - **Export search results**. Export search results to a local computer in your organization in a two-step process. When you export search results, items are copied from their original content location in Microsoft 365 to a Microsoft-provided Azure Storage location. Then you can download those items to a local computer. Here's a description of each eDiscovery capability. - **Review sets**. Add relevant data to a review set. A review set is a secure, Microsoft-provided Azure Storage location in the Microsoft cloud. When you add data to a review set, the collected items are copied from their original content location to the review set. Review sets provide a static, known set of content that you can search, filter, tag, analyze, and predict relevancy using predictive coding models. You can also track and report on what content gets added to the review set. - **Support for cloud attachments and SharePoint versions**. When you add content to a review set, you have the option to include cloud attachments or linked files. This means that the target file of a cloud attachment or linked file is added to the review set. You also have the option to add all versions of a SharePoint document to a review set. - **Optical character recognition (OCR)**. When content is added to a review set, OCR functionality extracts text from images, and includes the image text with the content that's added to a review set. This lets you search for image text when you query the content in the review set.-- **Conversation threading**. When chat messages from Teams and Yammer conversations are added to a review set, you can collect the entire conversation thread. This means that the entire chat conversation that contains items that match the collection criteria is added to the review set. This lets you review chat items in the context of the back-and-forth conversation.+- **Conversation threading**. When chat messages from Teams and Viva Engage conversations are added to a review set, you can collect the entire conversation thread. This means that the entire chat conversation that contains items that match the collection criteria is added to the review set. This lets you review chat items in the context of the back-and-forth conversation. - **Collection statistics and reports**. After you create a collection estimate or commit a collection to a review set, you can view a rich set of statistics on the retrieved items, such as the content locations that contain the most items that matched the search criteria and the number of items returned by the search query. You can also preview a subset of the results. - **Review set filtering**. After content is added to a review set, you can apply filters to display only the set of items that match your filtering criteria. Then you can save the filter sets as a query, which lets you quickly reapply the saved filters. Review set filtering and saved queries help you quickly select content items that are most relevant to your investigation. - **Tagging**. Tags also help you omit non-relevant content and identify the most relevant content. When experts, attorneys, or other users review content in a review set, their opinions related to the content can be captured by using tags. For example, if the intent is to exclude unnecessary content, a user can tag documents with a tag such as "non-responsive". After content has been reviewed and tagged, a review set query can be created to exclude any content tagged as "non-responsive". This process eliminates the non-responsive content from subsequent steps in the eDiscovery workflow. |
compliance | Get Started With Data Lifecycle Management | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/get-started-with-data-lifecycle-management.md | Use the following table to help you map your business requirements to the most c |I want to ...|Documentation| |-||-|Efficiently retain or delete data for Microsoft 365 +|Efficiently retain or delete data for Microsoft 365 |Provide users with additional mailbox storage |[Enable archive mailboxes in Microsoft 365](enable-archive-mailboxes.md)| |Retain mailbox data after employees leave the organization |[Create and manage inactive mailboxes](create-and-manage-inactive-mailboxes.md)| |Upload mailbox data from PST files |[Use network upload to import PST files](use-network-upload-to-import-pst-files.md)| |
compliance | Inactive Mailboxes In Office 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/inactive-mailboxes-in-office-365.md | If a Microsoft 365 retention policy is applied to a mailbox, or one or more emai - Teams channel messages - Teams chats - Teams private channel messages- - Yammer community messages - - Yammer user messages + - Viva Engage community messages + - Viva Engage user messages For more information about Microsoft retention, see [Learn about retention policies and retention labels](retention.md). |
compliance | Manage Data Governance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/manage-data-governance.md | To keep what you need and delete what you don't: |Capability|What problems does it solve?| |:|:|:-|-|[Retention policies for Microsoft 365 workloads, with retention labels for exceptions](retention.md) | Lets you retain or delete content with policy management for email, documents, Teams and Yammer messages. | +|[Retention policies for Microsoft 365 workloads, with retention labels for exceptions](retention.md) | Lets you retain or delete content with policy management for email, documents, Teams and Viva Engage messages. | |[Inactive mailboxes](inactive-mailboxes-in-office-365.md)| Lets you retain mailbox content after employees leave the organization so that this content remains accessible to administrators, compliance officers, and records managers. | |[Archive mailboxes](archive-mailboxes.md)| Provides additional mailbox storage space for users.| |[Import service for PST files](importing-pst-files-to-office-365.md)| Supports bulk-importing PST files to Exchange Online mailboxes to retain and search email messages for compliance or regulatory requirements. | |
compliance | Office 365 Encryption Risks And Protections | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/office-365-encryption-risks-and-protections.md | Some risk scenarios and the currently available encryption technologies that mit | BitLocker | Exchange Online, SharePoint Online, and Skype for Business | Microsoft | Disks or servers are stolen or improperly recycled. | BitLocker provides a fail-safe approach to protect against loss of data due to stolen or improperly recycled hardware (server/disk). | | Service encryption | SharePoint Online, Skype for Business, and OneDrive for Business; Exchange Online | Microsoft | Internal or external hacker tries to access individual files/data as a blob. | The encrypted data cannot be decrypted without access to keys. Helps to mitigate risk of a hacker accessing data. | | Customer Key | SharePoint Online, OneDrive for Business, Exchange Online, and Skype for Business | Customer | N/A (This feature is designed as a compliance feature; not as a mitigation for any risk.) | Helps customers meet internal regulation and compliance obligations, and the ability to leave the service and revoke Microsoft's access to data |-| TLS between Microsoft 365 and clients | Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, Teams, and Yammer | Microsoft, Customer | Man-in-the-middle or other attack to tap the data flow between Microsoft 365 and client computers over Internet. | This implementation provides value to both Microsoft and customers and assures data integrity as it flows between Microsoft 365 and the client. | +| TLS between Microsoft 365 and clients | Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, Teams, and Viva Engage | Microsoft, Customer | Man-in-the-middle or other attack to tap the data flow between Microsoft 365 and client computers over Internet. | This implementation provides value to both Microsoft and customers and assures data integrity as it flows between Microsoft 365 and the client. | | TLS between Microsoft datacenters | Exchange Online, SharePoint Online, OneDrive for Business, and Skype for Business | Microsoft | Man-in-the-middle or other attack to tap the customer data flow between Microsoft 365 servers located in different Microsoft datacenters. | This implementation is another method to protect data against attacks between Microsoft datacenters. | | Azure Rights Management (included in Microsoft 365 or Azure Information Protection) | Exchange Online, SharePoint Online, and OneDrive for Business | Customer | Data falls into the hands of a person who should not have access to the data. | Azure Information Protection uses Azure RMS, which provides value to customers by using encryption, identity, and authorization policies to help secure files and email across multiple devices. Azure RMS provides value to customers where all emails originating from Microsoft 365 that match certain criteria (i.e., all emails to a certain address) can be automatically encrypted before they get sent to another recipient. | | S/MIME | Exchange Online | Customer | Email falls into the hands of a person who is not the intended recipient. | S/MIME provides value to customers by assuring that email encrypted with S/MIME can only be decrypted by the direct recipient of the email. | |
compliance | Purview Adaptive Scopes | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/purview-adaptive-scopes.md | The advantages of using adaptive scopes include: - No limits on the number of items per policy. Although adaptive policies are still subject to the maximum number of policies per tenant limitations, the more flexible configuration will likely result in far fewer policies. - Powerful targeting for your policy requirements. For example, you can create an adaptive scope to define a custom distribution group for a specific policy. - Query-based scopes provide resilience against business changes that might not be reliably reflected in group membership or external processes that rely on cross-department communication.-- A single policy can include locations for both Microsoft Teams and Yammer, whereas when you donΓÇÖt use an adaptive scope, each location requires its own policy.+- A single policy can include locations for both Microsoft Teams and Viva Engage, whereas when you donΓÇÖt use an adaptive scope, each location requires its own policy. - Support for [Azure AD administrative units](/azure/active-directory/roles/administrative-units). For specific advantages of using adaptive scopes specific to policies for retention, see [Learn about retention policies and retention labels](retention.md#adaptive-or-static-policy-scopes-for-retention). When you choose to use adaptive scopes, you're prompted to select what type of a | Adaptive scope type | Attributes or properties supported include | |:--|:-|-|**Users** - applies to: <br/> - Exchange mailboxes <br/> - OneDrive accounts <br/> - Teams chats <br/> - Teams private channel messages <br/> - Yammer user messages| First Name <br/> Last name <br/>Display name <br/> Job title <br/> Department <br/> Office <br/>Street address <br/> City <br/>State or province <br/>Postal code <br/> Country or region <br/> Email addresses <br/> Alias <br/> Exchange custom attributes: CustomAttribute1 - CustomAttribute15| +|**Users** - applies to: <br/> - Exchange mailboxes <br/> - OneDrive accounts <br/> - Teams chats <br/> - Teams private channel messages <br/> - Viva Engage user messages| First Name <br/> Last name <br/>Display name <br/> Job title <br/> Department <br/> Office <br/>Street address <br/> City <br/>State or province <br/>Postal code <br/> Country or region <br/> Email addresses <br/> Alias <br/> Exchange custom attributes: CustomAttribute1 - CustomAttribute15| |**SharePoint sites** - applies to: <br/> - SharePoint sites <sup>\*</sup> <br/> - OneDrive accounts |Site URL <br/>Site name <br/> SharePoint custom properties: RefinableString00 - RefinableString99 |-|**Microsoft 365 Groups** - applies to: <br/> - Microsoft 365 Group mailboxes & sites <br/> - Teams channel messages (standard and shared) <br/> - Yammer community messages <br> |Name <br/> Display name <br/> Description <br/> Email addresses <br/> Alias <br/> Exchange custom attributes: CustomAttribute1 - CustomAttribute15 | +|**Microsoft 365 Groups** - applies to: <br/> - Microsoft 365 Group mailboxes & sites <br/> - Teams channel messages (standard and shared) <br/> - Viva Engage community messages <br> |Name <br/> Display name <br/> Description <br/> Email addresses <br/> Alias <br/> Exchange custom attributes: CustomAttribute1 - CustomAttribute15 | <sup>\*</sup> Currently, [shared channel SharePoint sites](/microsoftteams/shared-channels#shared-channel-sharepoint-sites) aren't supported for adaptive scopes. |
compliance | Purview Compliance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/purview-compliance.md | Unintentional sharing of sensitive items can cause financial harm to your organi ### Manage your data lifecycle -[Microsoft Purview Data Lifecycle Management](/microsoft-365/compliance/manage-data-governance#microsoft-purview-data-lifecycle-management) (formerly Microsoft Information Governance) provides you with tools and capabilities to retain and delete content across Exchange, SharePoint, OneDrive, Microsoft 365 Groups, Teams, and Yammer. Retaining and deleting emails, documents, and messages are often needed for compliance and regulatory requirements. However, deleting content that no longer has business value also reduces your attack surface. +[Microsoft Purview Data Lifecycle Management](/microsoft-365/compliance/manage-data-governance#microsoft-purview-data-lifecycle-management) (formerly Microsoft Information Governance) provides you with tools and capabilities to retain and delete content across Exchange, SharePoint, OneDrive, Microsoft 365 Groups, Teams, and Viva Engage. Retaining and deleting emails, documents, and messages are often needed for compliance and regulatory requirements. However, deleting content that no longer has business value also reduces your attack surface. For more information, see [Learn about data lifecycle management](/microsoft-365/compliance/data-lifecycle-management). For more information about auditing solutions, see [Audit (Premium)](/microsoft- ### Identify and manage data for legal cases with eDiscovery (Premium) or eDiscovery (Standard) -Electronic discovery, or eDiscovery, is the process of identifying, collecting, and auditing electronic information for legal, regulatory, or business reasons. You can use [Microsoft Purview eDiscovery solutions](/microsoft-365/compliance/ediscovery) to search for data and content in Exchange Online, OneDrive for Business, SharePoint Online, Microsoft Teams, Microsoft 365 Groups, and Yammer teams. You can search mailboxes and sites in the same eDiscovery search, and then export the search results for analysis and review. +Electronic discovery, or eDiscovery, is the process of identifying, collecting, and auditing electronic information for legal, regulatory, or business reasons. You can use [Microsoft Purview eDiscovery solutions](/microsoft-365/compliance/ediscovery) to search for data and content in Exchange Online, OneDrive for Business, SharePoint Online, Microsoft Teams, Microsoft 365 Groups, and Viva Engage teams. You can search mailboxes and sites in the same eDiscovery search, and then export the search results for analysis and review. For more information about eDiscovery solutions, see [eDiscovery (Premium)](/microsoft-365/compliance/overview-ediscovery-20) and [eDiscovery (Standard)](/microsoft-365/compliance/get-started-core-ediscovery). |
compliance | Purview Fast Track Setup Guides | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/purview-fast-track-setup-guides.md | Setup guides in the admin center require authentication to a Microsoft Purview t | [Microsoft Purview Information Protection setup guide](https://go.microsoft.com/fwlink/?linkid=2222967) | [Microsoft Purview Information Protection setup guide](https://go.microsoft.com/fwlink/?linkid=2224687) | Get an overview of the capabilities you can apply to your information protection strategy so you can be confident your sensitive information is protected. Use a four-stage lifecycle approach in which you discover, classify, protect, and monitor sensitive information. The **Microsoft Purview Information Protection setup guide** provides guidance for completing each of these stages.| | [Microsoft Purview Data Lifecycle Management setup guide](https://go.microsoft.com/fwlink/?linkid=2223154) | [Microsoft Purview Data Lifecycle Management setup guide](https://go.microsoft.com/fwlink/?linkid=2224686) | The **Microsoft Purview Data Lifecycle Management setup guide** provides the information you need to set up and manage your organization's governance strategy to ensure that your data is classified and managed according to the specific lifecycle guidelines you set. This guide teaches you how to create, auto-apply, and publish retention labels, retention label policies, and retention policies to your organization's content and compliance records. You also get information on importing CSV files with a file plan for bulk scenarios and for applying them to individual documents manually. | | [Microsoft Purview Auditing solutions in Microsoft 365 guide](https://go.microsoft.com/fwlink/?linkid=2223153) | [Microsoft Purview Auditing solutions in Microsoft 365 guide](https://go.microsoft.com/fwlink/?linkid=2224816) | The **Microsoft Purview Auditing solutions in Microsoft 365 guide** provide an integrated solution to help organizations effectively respond to security events, forensic investigations, and compliance obligations. When you use the auditing solutions in Microsoft 365, you can search the audit log for activities performed in different Microsoft 365 services. |-| [Microsoft Purview eDiscovery solutions setup guide](https://go.microsoft.com/fwlink/?linkid=2223416) | [Microsoft Purview eDiscovery solutions setup guide](https://go.microsoft.com/fwlink/?linkid=2224465) | eDiscovery is the process of identifying and delivering electronic information that can be used as evidence in legal cases. The **Microsoft Purview eDiscovery solutions setup guide** helps you use the eDiscovery tools in Microsoft Purview that allow you to search for content in: <br> - Exchange <br> - OneDrive <br> - SharePoint <br> - Microsoft Teams <br> - Microsoft 365 Groups <br> - Yammer communities. | +| [Microsoft Purview eDiscovery solutions setup guide](https://go.microsoft.com/fwlink/?linkid=2223416) | [Microsoft Purview eDiscovery solutions setup guide](https://go.microsoft.com/fwlink/?linkid=2224465) | eDiscovery is the process of identifying and delivering electronic information that can be used as evidence in legal cases. The **Microsoft Purview eDiscovery solutions setup guide** helps you use the eDiscovery tools in Microsoft Purview that allow you to search for content in: <br> - Exchange <br> - OneDrive <br> - SharePoint <br> - Microsoft Teams <br> - Microsoft 365 Groups <br> - Viva Engage communities. | ## Related articles |
compliance | Retention Cmdlets | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-cmdlets.md | When you use retention labels, these contain the retention settings and their po Use the cmdlets in the following table when the locations are **Exchange mailboxes**, **SharePoint sites** or **SharePoint classic and communication sites**, **OneDrive accounts**, **Microsoft 365 Group mailboxes & sites**, **Skype for Business**, **Exchange public folders**, **Teams chat messages**, or **Teams channel messages**. -Don't use these cmdlets when the locations are for Teams private channel messages, Yammer user messages, or Yammer community messages. These locations have alternative cmdlets that are identified in the [next section](#retention-cmdlets-specific-to-teams-private-channels-and-yammer). +Don't use these cmdlets when the locations are for Teams private channel messages, Viva Engage user messages, or Viva Engage community messages. These locations have alternative cmdlets that are identified in the [next section](#retention-cmdlets-specific-to-teams-private-channels-and-Viva Engage). |Cmdlet|Description|Applicable locations| |:--|:--|:--|:--| Don't use these cmdlets when the locations are for Teams private channel message |[Get-RetentionCompliancePolicy](/powershell/module/exchange/get-retentioncompliancepolicy) <br /><br /> [New-RetentionCompliancePolicy](/powershell/module/exchange/new-retentioncompliancepolicy) <br /><br /> [Remove-RetentionCompliancePolicy](/powershell/module/exchange/remove-retentioncompliancepolicy) <br /><br /> [Set-RetentionCompliancePolicy](/powershell/module/exchange/set-retentioncompliancepolicy) |View, create, delete, configure retention policies and retention label policies |Exchange email <br /><br /> SharePoint sites (or SharePoint classic and communication sites) <br /><br /> OneDrive accounts<br /><br /> Microsoft 365 Group mailboxes & sites <br /><br /> Skype for Business <br /><br /> Exchange public folders <br /><br /> Teams chat messages <br /><br /> Teams channel messages | |[Get-RetentionComplianceRule](/powershell/module/exchange/get-retentioncompliancerule) <br /><br /> [New-RetentionComplianceRule](/powershell/module/exchange/new-retentioncompliancerule) <br /><br /> [Set-RetentionComplianceRule](/powershell/module/exchange/set-retentioncompliancerule) <br /><br /> [Remove-RetentionComplianceRule](/powershell/module/exchange/remove-retentioncompliancerule) | View, create, configure, delete settings (rules) for retention policies and retention labels |Exchange email <br /><br /> SharePoint sites (or SharePoint classic and communication sites) <br /><br /> OneDrive accounts <br /><br /> Microsoft 365 Group mailboxes & sites <br /><br /> Skype for Business <br /><br /> Exchange public folders <br /><br /> Teams chat messages <br /><br /> Teams channel messages | -## Retention cmdlets specific to Teams private channels and Yammer +## Retention cmdlets specific to Teams private channels and Viva Engage -Use the following cmdlets when the locations are for **Teams private channel messages**, **Yammer user messages**, or **Yammer community messages**. +Use the following cmdlets when the locations are for **Teams private channel messages**, **Viva Engage user messages**, or **Viva Engage community messages**. When the locations are for Teams chat messages, Teams channel messages, Exchange email, SharePoint sites (or SharePoint classic and communication sites), OneDrive accounts, Microsoft 365 Group mailboxes & sites, Skype for Business, or Exchange public folders, use the cmdlets listed in the [previous section](#retention-cmdlets-for-most-locations). |Cmdlet|Description|Applicable locations| |:--|:--|:--|:--|-|[Get-AppRetentionCompliancePolicy](/powershell/module/exchange/get-appretentioncompliancepolicy) <br /><br> [New-AppRetentionCompliancePolicy](/powershell/module/exchange/new-appretentioncompliancepolicy) <br /><br> [Remove-AppRetentionCompliancePolicy](/powershell/module/exchange/remove-appretentioncompliancepolicy) <br /><br> [Set-AppRetentionCompliancePolicy](/powershell/module/exchange/set-appretentioncompliancepolicy) | View, create, delete, configure retention policies |Teams private channel messages <br /><br /> Yammer user messages <br /><br /> Yammer community messages| -|[Get-AppRetentionComplianceRule](/powershell/module/exchange/get-appretentioncompliancerule) <br /><br /> [New-AppRetentionComplianceRule](/powershell/module/exchange/new-appretentioncompliancerule) <br /><br /> [Remove-AppRetentionComplianceRule](/powershell/module/exchange/remove-appretentioncompliancerule) <br /><br /> [Set-AppRetentionComplianceRule](/powershell/module/exchange/set-appretentioncompliancerule) | View, create, configure, delete settings (rules) for retention policies |Teams private channel messages <br /><br /> Yammer user messages <br /><br /> Yammer community messages| +|[Get-AppRetentionCompliancePolicy](/powershell/module/exchange/get-appretentioncompliancepolicy) <br /><br> [New-AppRetentionCompliancePolicy](/powershell/module/exchange/new-appretentioncompliancepolicy) <br /><br> [Remove-AppRetentionCompliancePolicy](/powershell/module/exchange/remove-appretentioncompliancepolicy) <br /><br> [Set-AppRetentionCompliancePolicy](/powershell/module/exchange/set-appretentioncompliancepolicy) | View, create, delete, configure retention policies |Teams private channel messages <br /><br /> Viva Engage user messages <br /><br /> Viva Engage community messages| +|[Get-AppRetentionComplianceRule](/powershell/module/exchange/get-appretentioncompliancerule) <br /><br /> [New-AppRetentionComplianceRule](/powershell/module/exchange/new-appretentioncompliancerule) <br /><br /> [Remove-AppRetentionComplianceRule](/powershell/module/exchange/remove-appretentioncompliancerule) <br /><br /> [Set-AppRetentionComplianceRule](/powershell/module/exchange/set-appretentioncompliancerule) | View, create, configure, delete settings (rules) for retention policies |Teams private channel messages <br /><br /> Viva Engage user messages <br /><br /> Viva Engage community messages| ## Configuration guidance |
compliance | Retention Limits | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-limits.md | Within this 10,000 policies limit, there are also some limits on the maximum num > [!NOTE] > These maximum numbers for Exchange and SharePoint are not exclusive to retention but are shared with other types of hold policies that include eDiscovery holds and In-Place Holds. -Although retention policies for Microsoft Teams and Yammer use mailboxes to store data for retention purposes, the maximum number of policies for Exchange Online exclude retention policies for Teams and Yammer. +Although retention policies for Microsoft Teams and Viva Engage use mailboxes to store data for retention purposes, the maximum number of policies for Exchange Online exclude retention policies for Teams and Viva Engage. ## Maximum number of items per policy Maximum numbers of items per policy for retention for static scopes: - Microsoft 365 Groups: 1,000 - Teams channel messages: 1,000 - Teams chats: 1,000-- Yammer community messages: 1,000-- Yammer user messages: 1,000+- Viva Engage community messages: 1,000 +- Viva Engage user messages: 1,000 - SharePoint sites: 100 - OneDrive accounts: 100 |
compliance | Retention Policies Exchange | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-exchange.md | The information in this article supplements [Learn about retention](retention.md - [Learn about retention for SharePoint and OneDrive](retention-policies-sharepoint.md) - [Learn about retention for Microsoft Teams](retention-policies-teams.md)-- [Learn about retention for Yammer](retention-policies-yammer.md)+- [Learn about retention for Viva Engage](retention-policies-viva-engage.md) [!INCLUDE [purview-preview](../includes/purview-preview.md)] |
compliance | Retention Policies Sharepoint | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-sharepoint.md | The information in this article supplements [Learn about retention](retention.md For other workloads, see: - [Learn about retention for Microsoft Teams](retention-policies-teams.md)-- [Learn about retention for Yammer](retention-policies-yammer.md)+- [Learn about retention for Viva Engage](retention-policies-viva-engage.md) - [Learn about retention for Exchange](retention-policies-exchange.md) [!INCLUDE [purview-preview](../includes/purview-preview.md)] When the retention settings are retain-only, or delete-only, the contents paths ## How retention works with cloud attachments -Cloud attachments are embedded links to files that users share, and these can be retained and deleted when your users share them in Outlook emails and Teams or Yammer messages. When you [automatically apply a retention label to cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments), the retention label is applied to a copy of the shared file, which is stored in the Preservation Hold library. +Cloud attachments are embedded links to files that users share, and these can be retained and deleted when your users share them in Outlook emails and Teams or Viva Engage messages. When you [automatically apply a retention label to cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments), the retention label is applied to a copy of the shared file, which is stored in the Preservation Hold library. For this scenario, we recommend you configure the label setting to start the retention period based on when the item is labeled. If you do configure the retention period based on when the item is created or last modified, this date is taken from the original file at the time of sharing. If you configure the start of retention to be when last modified, this setting has no effect for this copy in the Preservation Hold library. |
compliance | Retention Policies Teams | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-teams.md | The information in this article supplements [Learn about retention](retention.md For other workloads, see: - [Learn about retention for SharePoint and OneDrive](retention-policies-sharepoint.md)-- [Learn about retention for Yammer](retention-policies-yammer.md)+- [Learn about retention for Viva Engage](retention-policies-viva-engage.md) - [Learn about retention for Exchange](retention-policies-exchange.md) [!INCLUDE [purview-preview](../includes/purview-preview.md)] |
compliance | Retention Policies Viva Engage | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-viva-engage.md | + + Title: "Learn about retention for Viva Engage" +f1.keywords: +- NOCSH +++ Last updated : 09/02/2020+audience: Admin +++ms.localizationpriority: high ++- purview-compliance +- tier1 +- SPO_Content +search.appverid: +- MOE150 +- MET150 +description: "Learn about Microsoft 365 retention policies that apply to Viva Engage so you can manage automatic retention or deletion of Viva Engage messages for your organization." +++# Learn about retention for Viva Engage ++>*[Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).* ++The information in this article supplements [Learn about retention](retention.md) because it has information that's specific to Viva Engage. ++For other workloads, see: ++- [Learn about retention for SharePoint and OneDrive](retention-policies-sharepoint.md) +- [Learn about retention for Microsoft Teams](retention-policies-teams.md) +- [Learn about retention for Exchange](retention-policies-exchange.md) +++## What's included for retention and deletion ++Viva Engage user messages and community messages can be deleted by using retention policies for Viva Engage, and in addition to the text in these messages, the following items can be retained for compliance reasons: Hypertext links and links to other Viva Engage messages. ++> [!NOTE] +> As explained in the following section, user messages include private messages for an individual user, and any community messages associated with that user. +> +> User messages also include [storyline posts](https://support.microsoft.com/office/overview-of-storyline-for-viva-engage-and-viva-engage-530e4e66-9f1c-4be1-b371-08ea40dc4b69), which are supported by retention policies. ++User messages include all the names of the people in the conversation, and community messages include the community name and the message title (if supplied). ++Reactions from others in the form of emoticons aren't retained when you use retention policies for Viva Engage. ++Files that you use with Viva Engage aren't included in retention policies for Viva Engage. These items have their own retention policies. ++## How retention works with Viva Engage ++Use this section to understand how your compliance requirements are met by backend storage and processes, and should be verified by eDiscovery tools rather than by messages that are currently visible in the Viva Engage app. ++You can use a retention policy to retain data from community messages and user messages in Viva Engage, and delete these messages. Behind the scenes, Exchange mailboxes are used to store data copied from these messages. Data from Viva Engage user messages is stored in a hidden folder in the mailbox of each user included in the user message, and a similar hidden folder in a group mailbox is used for community messages. ++Copies of community messages can also be stored in the hidden folder of user mailboxes when they @ mention users or notify the user of a reply. Although these messages originate as a community message, a retention policy for Viva Engage user messages will often include copies of community messages. As a result, user messages aren't restricted to private messages. ++These hidden folders aren't designed to be directly accessible to users or administrators, but instead, store data that compliance administrators can search with eDiscovery tools. ++Even though they are stored in Exchange, Viva Engage messages are only included in a retention policy that's configured for the **Viva Engage community messages** or **Viva Engage user messages** locations. ++> [!NOTE] +> If a user is included in an active retention policy that retains Viva Engage data and you a delete a mailbox of a user who is included in this policy, to retain the Viva Engage data, the mailbox is converted into an [inactive mailbox](inactive-mailboxes-in-office-365.md). If you don't need to retain this Viva Engage data for the user, exclude the user account from the retention policy before you delete their mailbox. ++After a retention policy is configured for Viva Engage messages, a timer job from the Exchange service periodically evaluates items in the hidden folder where these Viva Engage messages are stored. The timer job takes up to seven days to run. When these items have expired their retention period, they're moved to the SubstrateHolds folderΓÇöa hidden folder that's in every user or group mailbox to store "soft-deleted" items before they're permanently deleted. ++> [!IMPORTANT] +> Because of the [first principle of retention](retention.md#the-principles-of-retention-or-what-takes-precedence) and since Viva Engage messages are stored in Exchange Online mailboxes, permanent deletion from the SubstrateHolds folder is always suspended if the mailbox is affected by another Viva Engage retention policy for the same location, Litigation Hold, delay hold, or if an eDiscovery hold is applied to the mailbox for legal or investigative reasons. +> +> While the mailbox is included in an applicable hold, Viva Engage messages that have been deleted will no longer be visible in Viva Engage but will continue to be discoverable with eDiscovery. ++After a retention policy is configured for Viva Engage messages, the paths the content takes depend on whether the retention policy is to retain and then delete, to retain only, or delete only. ++When the retention policy is to retain and then delete: ++ ++For the two paths in the diagram: ++1. **If a Viva Engage message is edited or deleted** by the user during the retention period, the original message is immediately copied (if edited) or moved (if deleted) to the SubstrateHolds folder. The message is stored there until the retention period expires and then the message is immediately permanently deleted. ++2. **If a Viva Engage message is not deleted** and for current messages after editing, the message is moved to the SubstrateHolds folder after the retention period expires. This action takes up to seven days from the expiry date. When the message is in the SubstrateHolds folder, it's then immediately permanently deleted. ++> [!NOTE] +> Messages in the SubstrateHolds folder are searchable by eDiscovery tools. Until messages are permanently deleted from the SubstrateHolds folder, they remain searchable by eDiscovery tools. ++When the retention period expires and moves a message to the SubstrateHolds folder, a delete operation is communicated to the Viva Engage service, that then relays the same operation to the Viva Engage client app. Delays in this communication or caching can explain why, for a short period of time, users continue to see these messages in their Viva Engage app. ++In this scenario where the Viva Engage service receives a delete command because of a retention policy, the corresponding message in the Viva Engage app is deleted for all users in the conversation. Some of these users might be from another organization, have a retention policy with a longer retention period, or no retention policy assigned to them. For these users, copies of the messages are still stored in their mailboxes and remain searchable for eDiscovery until the messages are permanently deleted by another retention policy. ++> [!IMPORTANT] +> Messages visible in the Viva Engage app are not an accurate reflection of whether they are retained or permanently deleted for compliance requirements. ++When the retention policy is retain-only, or delete-only, the content's paths are variations of retain and delete. ++### Content paths for retain-only retention policy ++1. **If a Viva Engage message is edited or deleted**: A copy of the original message is immediately created in the SubstrateHolds folder and retained there until the retention period expires. Then the message is immediately permanently deleted from the SubstrateHolds folder. ++2. **If the Viva Engage message is not modified or deleted** and for current messages after editing during the retention period: Nothing happens before and after the retention period; the message remains in its original location. ++### Content paths for delete-only retention policy ++1. **If the Viva Engage message is not deleted** during the retention period: At the end of the retention period, the message is moved to the SubstrateHolds folder. This action takes up to seven days from the expiry date. Then the message is immediately permanently deleted from the SubstrateHolds folder. ++2. **If the Viva Engage message is deleted by the user** during the period, the item is immediately moved to the SubstrateHolds folder where it's immediately permanently deleted. ++#### Example flows and timings for retention policies ++Use the following examples to see how the processes and timings explained in the previous sections apply to retention policies that have the following configurations: ++- [Example 1: Retain-only for 7 years](#example-1-retain-only-for-7-years) +- [Example 2: Retain for 30 days and then delete](#example-2-retain-for-30-days-and-then-delete) +- [Example 3: Delete-only after 1 day](#example-3-delete-only-after-1-day) ++For all examples that refer to permanent deletion, because of the [principles of retention](retention.md#the-principles-of-retention-or-what-takes-precedence), this action is suspended if the message is subject to another retention policy to retain the item or it's subject to an eDiscovery hold. ++##### Example 1: Retain-only for 7 years ++On day 1, a user posts a new Viva Engage message. ++On day 5, the user edits that message. ++On day 30, the user deletes the current message. ++Retention outcomes: ++- For the original message: + - On day 5, the message is copied to the SubstrateHolds folder where it can still be searched with eDiscovery tools for a minimum of 7 years from day 1 (the retention period). ++- For the current (edited) message: + - On day 30, the message moves to the SubstrateHolds folder where it can still be searched with eDiscovery tools for a minimum of 7 years from day 1 (the retention period). ++If the user had deleted the current message after the specified retention period, instead of within the retention period, the message would still be moved to the SubstrateHolds folder. However, now the retention period has expired, the message would be permanently deleted after the minimum of 1 day and then typically within 1-7 days. ++##### Example 2: Retain for 30 days and then delete ++On day 1, a user posts a new Viva Engage message. ++On day 10, the user edits that message. ++The user doesn't make further edits and doesn't delete the message. ++Retention outcomes: ++- For the original message: + - On day 10, the message is copied to the SubstrateHolds folder, where it can still be searched with eDiscovery tools. + - At the end of the retention period (30 days from day 1), the message is permanently deleted typically within 1-7 days after the minimum of 1 day, and then won't be returned with eDiscovery searches. ++- For the current (edited) message: + - At the end of the retention period (30 days from day 1), the message moves to the SubstrateHolds folder typically within 1-7 days, where it can still be searched with eDiscovery tools. + - The message is then permanently deleted typically within 1-7 days after the minimum of 1 day, and then won't be returned with eDiscovery searches. ++##### Example 3: Delete-only after 1 day ++> [!NOTE] +> Because of the short one-day duration of this configuration and retention processes that operate within a time period of 1-7 days, this section shows example timings that are within the typical time ranges. ++On day 1, a user posts a new Viva Engage message. ++Example retention outcome if the user doesn't edit or delete the message: ++- Day 5 (typically 1-7 days after the start of the retention period on day 2): + - The message moves to the SubstrateHolds folder and remains there for at least 1 day where it can still be searched with eDiscovery tools. ++- Day 9 (typically 1-7 days after a minimum of 1 day in the SubstrateHolds folder): + - The message is permanently deleted and then won't be returned with eDiscovery searches. ++As this example shows, although you can configure a retention policy to delete messages after just one day, the service undergoes multiple processes to ensure a compliant deletion. As a result, a delete action after 1 day could take 16 days before the message is permanently deleted so that it's no longer returned in eDiscovery searches. ++## Messages and external users ++By default, a retention policy for Viva Engage user messages applies to all users in your organization, but not external users. You can apply a retention policy to external users if you use the **Edit** option for users included, and specify their account. ++At this time, Azure B2B guest users are not supported. ++## When a user leaves the organization ++If a user leaves your organization and their Microsoft 365 account is deleted, their Viva Engage user messages that are subject to retention are stored in an inactive mailbox. These messages remain subject to any retention policy that was placed on the user before their mailbox was made inactive, and the contents are available to an eDiscovery search. For more information, see [Learn about inactive mailboxes](inactive-mailboxes-in-office-365.md). ++If the user stored any files in Viva Engage, see the [equivalent section](retention-policies-sharepoint.md#when-a-user-leaves-the-organization) for SharePoint and OneDrive. ++## Limitations ++Be aware of the following limitation when you use retention for Viva Engage community messages and user messages: ++- When you select **Edit** for the **Viva Engage user messages** location, you might see guests and non-mailbox users. Retention policies aren't designed for these users, so don't select them. ++## Configuration guidance ++If you're new to configuring retention in Microsoft 365, see [Get started with data lifecycle management](get-started-with-data-lifecycle-management.md). ++If you're ready to configure a retention policy for Viva Engage, see [Create and configure retention policies](create-retention-policies.md). |
compliance | Retention Policies Yammer | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-yammer.md | - Title: "Learn about retention for Yammer"-- NOCSH--- Previously updated : 09/02/2020----- purview-compliance-- tier1-- SPO_Content-- MOE150-- MET150 -description: "Learn about Microsoft 365 retention policies that apply to Yammer so you can manage automatic retention or deletion of Yammer messages for your organization." ---# Learn about retention for Yammer -->*[Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).* --The information in this article supplements [Learn about retention](retention.md) because it has information that's specific to Yammer. --For other workloads, see: --- [Learn about retention for SharePoint and OneDrive](retention-policies-sharepoint.md)-- [Learn about retention for Microsoft Teams](retention-policies-teams.md)-- [Learn about retention for Exchange](retention-policies-exchange.md)---## What's included for retention and deletion --Yammer user messages and community messages can be deleted by using retention policies for Yammer, and in addition to the text in these messages, the following items can be retained for compliance reasons: Hypertext links and links to other Yammer messages. --> [!NOTE] -> As explained in the following section, user messages include private messages for an individual user, and any community messages associated with that user. -> -> User messages also include [storyline posts](https://support.microsoft.com/office/overview-of-storyline-for-yammer-and-viva-engage-530e4e66-9f1c-4be1-b371-08ea40dc4b69), which are supported by retention policies. --User messages include all the names of the people in the conversation, and community messages include the community name and the message title (if supplied). --Reactions from others in the form of emoticons aren't retained when you use retention policies for Yammer. --Files that you use with Yammer aren't included in retention policies for Yammer. These items have their own retention policies. --## How retention works with Yammer --Use this section to understand how your compliance requirements are met by backend storage and processes, and should be verified by eDiscovery tools rather than by messages that are currently visible in the Yammer app. --You can use a retention policy to retain data from community messages and user messages in Yammer, and delete these messages. Behind the scenes, Exchange mailboxes are used to store data copied from these messages. Data from Yammer user messages is stored in a hidden folder in the mailbox of each user included in the user message, and a similar hidden folder in a group mailbox is used for community messages. --Copies of community messages can also be stored in the hidden folder of user mailboxes when they @ mention users or notify the user of a reply. Although these messages originate as a community message, a retention policy for Yammer user messages will often include copies of community messages. As a result, user messages aren't restricted to private messages. --These hidden folders aren't designed to be directly accessible to users or administrators, but instead, store data that compliance administrators can search with eDiscovery tools. --Even though they are stored in Exchange, Yammer messages are only included in a retention policy that's configured for the **Yammer community messages** or **Yammer user messages** locations. --> [!NOTE] -> If a user is included in an active retention policy that retains Yammer data and you a delete a mailbox of a user who is included in this policy, to retain the Yammer data, the mailbox is converted into an [inactive mailbox](inactive-mailboxes-in-office-365.md). If you don't need to retain this Yammer data for the user, exclude the user account from the retention policy before you delete their mailbox. --After a retention policy is configured for Yammer messages, a timer job from the Exchange service periodically evaluates items in the hidden folder where these Yammer messages are stored. The timer job takes up to seven days to run. When these items have expired their retention period, they're moved to the SubstrateHolds folderΓÇöa hidden folder that's in every user or group mailbox to store "soft-deleted" items before they're permanently deleted. --> [!IMPORTANT] -> Because of the [first principle of retention](retention.md#the-principles-of-retention-or-what-takes-precedence) and since Yammer messages are stored in Exchange Online mailboxes, permanent deletion from the SubstrateHolds folder is always suspended if the mailbox is affected by another Yammer retention policy for the same location, Litigation Hold, delay hold, or if an eDiscovery hold is applied to the mailbox for legal or investigative reasons. -> -> While the mailbox is included in an applicable hold, Yammer messages that have been deleted will no longer be visible in Yammer but will continue to be discoverable with eDiscovery. --After a retention policy is configured for Yammer messages, the paths the content takes depend on whether the retention policy is to retain and then delete, to retain only, or delete only. --When the retention policy is to retain and then delete: -- --For the two paths in the diagram: --1. **If a Yammer message is edited or deleted** by the user during the retention period, the original message is immediately copied (if edited) or moved (if deleted) to the SubstrateHolds folder. The message is stored there until the retention period expires and then the message is immediately permanently deleted. --2. **If a Yammer message is not deleted** and for current messages after editing, the message is moved to the SubstrateHolds folder after the retention period expires. This action takes up to seven days from the expiry date. When the message is in the SubstrateHolds folder, it's then immediately permanently deleted. --> [!NOTE] -> Messages in the SubstrateHolds folder are searchable by eDiscovery tools. Until messages are permanently deleted from the SubstrateHolds folder, they remain searchable by eDiscovery tools. --When the retention period expires and moves a message to the SubstrateHolds folder, a delete operation is communicated to the Yammer service, that then relays the same operation to the Yammer client app. Delays in this communication or caching can explain why, for a short period of time, users continue to see these messages in their Yammer app. --In this scenario where the Yammer service receives a delete command because of a retention policy, the corresponding message in the Yammer app is deleted for all users in the conversation. Some of these users might be from another organization, have a retention policy with a longer retention period, or no retention policy assigned to them. For these users, copies of the messages are still stored in their mailboxes and remain searchable for eDiscovery until the messages are permanently deleted by another retention policy. --> [!IMPORTANT] -> Messages visible in the Yammer app are not an accurate reflection of whether they are retained or permanently deleted for compliance requirements. --When the retention policy is retain-only, or delete-only, the content's paths are variations of retain and delete. --### Content paths for retain-only retention policy --1. **If a Yammer message is edited or deleted**: A copy of the original message is immediately created in the SubstrateHolds folder and retained there until the retention period expires. Then the message is immediately permanently deleted from the SubstrateHolds folder. --2. **If the Yammer message is not modified or deleted** and for current messages after editing during the retention period: Nothing happens before and after the retention period; the message remains in its original location. --### Content paths for delete-only retention policy --1. **If the Yammer message is not deleted** during the retention period: At the end of the retention period, the message is moved to the SubstrateHolds folder. This action takes up to seven days from the expiry date. Then the message is immediately permanently deleted from the SubstrateHolds folder. --2. **If the Yammer message is deleted by the user** during the period, the item is immediately moved to the SubstrateHolds folder where it's immediately permanently deleted. --#### Example flows and timings for retention policies --Use the following examples to see how the processes and timings explained in the previous sections apply to retention policies that have the following configurations: --- [Example 1: Retain-only for 7 years](#example-1-retain-only-for-7-years)-- [Example 2: Retain for 30 days and then delete](#example-2-retain-for-30-days-and-then-delete)-- [Example 3: Delete-only after 1 day](#example-3-delete-only-after-1-day)--For all examples that refer to permanent deletion, because of the [principles of retention](retention.md#the-principles-of-retention-or-what-takes-precedence), this action is suspended if the message is subject to another retention policy to retain the item or it's subject to an eDiscovery hold. --##### Example 1: Retain-only for 7 years --On day 1, a user posts a new Yammer message. --On day 5, the user edits that message. --On day 30, the user deletes the current message. --Retention outcomes: --- For the original message:- - On day 5, the message is copied to the SubstrateHolds folder where it can still be searched with eDiscovery tools for a minimum of 7 years from day 1 (the retention period). --- For the current (edited) message:- - On day 30, the message moves to the SubstrateHolds folder where it can still be searched with eDiscovery tools for a minimum of 7 years from day 1 (the retention period). --If the user had deleted the current message after the specified retention period, instead of within the retention period, the message would still be moved to the SubstrateHolds folder. However, now the retention period has expired, the message would be permanently deleted after the minimum of 1 day and then typically within 1-7 days. --##### Example 2: Retain for 30 days and then delete --On day 1, a user posts a new Yammer message. --On day 10, the user edits that message. --The user doesn't make further edits and doesn't delete the message. --Retention outcomes: --- For the original message:- - On day 10, the message is copied to the SubstrateHolds folder, where it can still be searched with eDiscovery tools. - - At the end of the retention period (30 days from day 1), the message is permanently deleted typically within 1-7 days after the minimum of 1 day, and then won't be returned with eDiscovery searches. --- For the current (edited) message:- - At the end of the retention period (30 days from day 1), the message moves to the SubstrateHolds folder typically within 1-7 days, where it can still be searched with eDiscovery tools. - - The message is then permanently deleted typically within 1-7 days after the minimum of 1 day, and then won't be returned with eDiscovery searches. --##### Example 3: Delete-only after 1 day --> [!NOTE] -> Because of the short one-day duration of this configuration and retention processes that operate within a time period of 1-7 days, this section shows example timings that are within the typical time ranges. --On day 1, a user posts a new Yammer message. --Example retention outcome if the user doesn't edit or delete the message: --- Day 5 (typically 1-7 days after the start of the retention period on day 2):- - The message moves to the SubstrateHolds folder and remains there for at least 1 day where it can still be searched with eDiscovery tools. --- Day 9 (typically 1-7 days after a minimum of 1 day in the SubstrateHolds folder):- - The message is permanently deleted and then won't be returned with eDiscovery searches. --As this example shows, although you can configure a retention policy to delete messages after just one day, the service undergoes multiple processes to ensure a compliant deletion. As a result, a delete action after 1 day could take 16 days before the message is permanently deleted so that it's no longer returned in eDiscovery searches. --## Messages and external users --By default, a retention policy for Yammer user messages applies to all users in your organization, but not external users. You can apply a retention policy to external users if you use the **Edit** option for users included, and specify their account. --At this time, Azure B2B guest users are not supported. --## When a user leaves the organization --If a user leaves your organization and their Microsoft 365 account is deleted, their Yammer user messages that are subject to retention are stored in an inactive mailbox. These messages remain subject to any retention policy that was placed on the user before their mailbox was made inactive, and the contents are available to an eDiscovery search. For more information, see [Learn about inactive mailboxes](inactive-mailboxes-in-office-365.md). --If the user stored any files in Yammer, see the [equivalent section](retention-policies-sharepoint.md#when-a-user-leaves-the-organization) for SharePoint and OneDrive. --## Limitations --Be aware of the following limitation when you use retention for Yammer community messages and user messages: --- When you select **Edit** for the **Yammer user messages** location, you might see guests and non-mailbox users. Retention policies aren't designed for these users, so don't select them.--## Configuration guidance --If you're new to configuring retention in Microsoft 365, see [Get started with data lifecycle management](get-started-with-data-lifecycle-management.md). --If you're ready to configure a retention policy for Yammer, see [Create and configure retention policies](create-retention-policies.md). |
compliance | Retention Regulatory Requirements | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-regulatory-requirements.md | This report helps you understand how the system aspects of the New Zealand Publi ## SEC 17a-4(f), FINRA 4511(c), and CFTC 1.31(c)-(d) -**Cohasset Assessment - Microsoft 365 - SEC Rule 17a-4(f) - Immutable Storage for SharePoint, OneDrive, Exchange, Teams, and Yammer** - [Download assessment](https://servicetrust.microsoft.com/DocumentPage/f028b699-8e39-451e-8af4-e8a66426068b) +**Cohasset Assessment - Microsoft 365 - SEC Rule 17a-4(f) - Immutable Storage for SharePoint, OneDrive, Exchange, Teams, and Viva Engage** - [Download assessment](https://servicetrust.microsoft.com/DocumentPage/f028b699-8e39-451e-8af4-e8a66426068b) -Applicable workloads: SharePoint, OneDrive, Teams, Exchange, and Yammer +Applicable workloads: SharePoint, OneDrive, Teams, Exchange, and Viva Engage Latest version released July 2022, this report has been produced in partnership with Cohasset Associates, Inc. (Cohasset) to assess the capabilities of Microsoft 365 services for recording, storing, and managing requirements for electronic records, as specified by: |
compliance | Retention Settings | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-settings.md | Before you configure retention, first familiarize yourself with capacity and sto - For SharePoint and OneDrive, retained items are stored in the site's Preservation Hold library, which is included in the site's storage quota. For more information, see [Manage site storage limits](/sharepoint/manage-site-collection-storage-limits) from the SharePoint documentation. -- For Exchange, Teams, and Yammer, where retained messages are stored in mailboxes, see [Exchange Online limits](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits) and enable [auto-expanding archiving](autoexpanding-archiving.md).+- For Exchange, Teams, and Viva Engage, where retained messages are stored in mailboxes, see [Exchange Online limits](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits) and enable [auto-expanding archiving](autoexpanding-archiving.md). In extreme cases where a high volume of email is deleted in a short time period, either by users or automatically from policy settings, you might also need to configure Exchange to more frequently move items from the Recoverable Items folder in the user's primary mailbox to the Recoverable Items folder in their archive mailbox. For step-by-step instructions, see [Increase the Recoverable Items quota for mailboxes on hold](ediscovery-increase-the-recoverable-quota-for-mailboxes-on-hold.md). |
compliance | Retention | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention.md | When content has retention settings assigned to it, that content remains in its - For Exchange mailboxes: The copy is retained in the **Recoverable Items** folder. -- For Teams and Yammer messages: The copy is retained in a hidden folder named **SubstrateHolds** as a subfolder in the Exchange **Recoverable Items** folder.+- For Teams and Viva Engage messages: The copy is retained in a hidden folder named **SubstrateHolds** as a subfolder in the Exchange **Recoverable Items** folder. > [!NOTE] > Because the Preservation Hold library is included in the site's storage quota, you might need to increase your storage when you use retention settings for SharePoint, OneDrive, and Microsoft 365 groups. For more detailed information about how retention settings work for different wo - [Learn about retention for SharePoint and OneDrive](retention-policies-sharepoint.md) - [Learn about retention for Microsoft Teams](retention-policies-teams.md)-- [Learn about retention for Yammer](retention-policies-yammer.md)+- [Learn about retention for Viva Engage](retention-policies-viva-engage.md) - [Learn about retention for Exchange](retention-policies-exchange.md) ## Retention policies and retention labels Retention policies can be applied to the following locations: - Teams channel messages (standard channels and [shared channels](/MicrosoftTeams/shared-channels)) - Teams chats - Teams private channel messages-- Yammer community messages-- Yammer user messages+- Viva Engage community messages +- Viva Engage user messages You can very efficiently apply a single policy to multiple locations, or to specific locations or users. Retention labels can be published to different locations, depending on what the |Auto-applied based on sensitive information types, keywords or a query, or trainable classifiers |Exchange, SharePoint, OneDrive, Microsoft 365 Groups | |Auto-applied to cloud attachments |SharePoint, OneDrive, Microsoft 365 Groups | -Exchange public folders, Skype, Teams and Yammer messages don't support retention labels. To retain and delete content from these locations, use retention policies instead. +Exchange public folders, Skype, Teams and Viva Engage messages don't support retention labels. To retain and delete content from these locations, use retention policies instead. #### Only one retention label at a time Use the following table to help you identify whether to use a retention policy o |Capability|Retention policy |Retention label| |:--|:--|:--|:--| |Retention settings that can retain and then delete, retain-only, or delete-only |Yes |Yes |-|Workloads supported: <br />- Exchange <br />- SharePoint <br />- OneDrive <br />- Microsoft 365 groups <br />- Skype for Business <br />- Teams<br />- Yammer|<br /> Yes <br /> Yes <br /> Yes <br /> Yes <br /> Yes <br /> Yes <br /> Yes | <br /> Yes, except public folders <br /> Yes <br /> Yes <br /> Yes <br /> No <br /> No <br /> No | +|Workloads supported: <br />- Exchange <br />- SharePoint <br />- OneDrive <br />- Microsoft 365 groups <br />- Skype for Business <br />- Teams<br />- Viva Engage|<br /> Yes <br /> Yes <br /> Yes <br /> Yes <br /> Yes <br /> Yes <br /> Yes | <br /> Yes, except public folders <br /> Yes <br /> Yes <br /> Yes <br /> No <br /> No <br /> No | |Retention applied automatically | Yes | Yes | |Automatically apply different retention settings at the end of the retention period | No | Yes | |Retention applied based on conditions <br /> - sensitive info types, KQL queries and keywords, trainable classifiers, cloud attachments| No | Yes | Explanation for the four different principles: - [How retention works for SharePoint and OneDrive](retention-policies-sharepoint.md#how-retention-works-for-sharepoint-and-onedrive) - [How retention works with Microsoft Teams](retention-policies-teams.md#how-retention-works-with-microsoft-teams)- - [How retention works with Yammer](retention-policies-yammer.md#how-retention-works-with-yammer) + - [How retention works with Viva Engage](retention-policies-viva-engage.md#how-retention-works-with-viva-engage) - [How retention works for Exchange](retention-policies-exchange.md#how-retention-works-for-exchange) **Example for this first principle**: An email message is subject to a retention policy for Exchange that is configured to delete items three years after they are created, and it also has a retention label applied that is configured to retain items five years after they are created. |
compliance | Sensitivity Labels Office Apps | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-office-apps.md | f1.keywords: Previously updated : 06/27/2023 Last updated : 07/12/2023 audience: Admin Office for the web: You must download the file from the browser. The following m When the PDF is created, it inherits the label with any content markings. For Windows, if the label applied encryption, that encryption is also inherited. Encrypted PDFs can be opened with Microsoft Edge on Windows or Mac. For more information, and alternative readers, see [Which PDF readers are supported for protected PDFs?](/azure/information-protection/rms-client/protected-pdf-readers#viewing-protected-pdfs-in-microsoft-edge-on-windows-or-mac) -Outlook doesn't currently support PDF attachments inheriting encryption from a labeled message. However, Outlook does support warning or blocking users from printing to PDF, as described next. +SharePoint and OneDrive support the following PDF scenarios: ++- When you've [enabled SharePoint and OneDrive for sensitivity labels](sensitivity-labels-sharepoint-onedrive-files.md) and [added PDF support](sensitivity-labels-sharepoint-onedrive-files.md#adding-support-for-pdf). Then, PDFs are supported when you upload a labeled PDF document with or without encryption applied, these services can process the file such that search, eDiscovery, and data loss prevention can inspect the contents, and the sensitivity label name is displayed for users. ++- [Auto-labeling policies](apply-sensitivity-label-automatically.md#how-to-configure-auto-labeling-policies-for-sharepoint-onedrive-and-exchange) can apply a sensitivity label and encryption (if configured) to PDF documents when [PDF support is added](sensitivity-labels-sharepoint-onedrive-files.md#adding-support-for-pdf). ++Outlook doesn't currently support PDF attachments inheriting encryption from a labeled message. However, Outlook now does support warning or blocking users from printing to PDF, as described next. PDF scenarios not supported: PDF scenarios not supported: The option **File** > **Info** > **Protect Document** > **Encrypt with Password** isn't supported when the document's label applies encryption. In this scenario, the encrypt with password option becomes unavailable for users. -For more information about this capability, see the announcement [Apply sensitivity labels to PDFs created with Office apps](https://insider.office.com/blog/apply-sensitivity-labels-to-pdfs-created-with-office-apps). +For more information about exporting to PDF, see the announcement [Apply sensitivity labels to PDFs created with Office apps](https://insider.office.com/blog/apply-sensitivity-labels-to-pdfs-created-with-office-apps). -For end user documentation, see [Create protected PDFs from Office files](https://support.microsoft.com/topic/aba7e367-e482-49e7-b746-a385e48d01e4). +For end user documentation, see [Create protected PDFs from Office files](https://support.microsoft.com/topic/aba7e367-e482-49e7-b746-a385e48d01e4) and [Which PDF readers are supported for protected PDFs?](/azure/information-protection/rms-client/protected-pdf-readers). ### Disabling PDF support |
compliance | Sensitivity Labels Sharepoint Default Label | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-sharepoint-default-label.md | f1.keywords: Previously updated : 04/03/2023 Last updated : 07/12/2023 audience: Admin Summary of outcomes: - You've [enabled sensitivity labels for Office files in SharePoint and OneDrive](sensitivity-labels-sharepoint-onedrive-files.md). To check this status, you can run `(Get-SPOTenant).EnableAIPIntegration` from the [SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online) to confirm the value is set to **True**. +- To support sensitivity labels for PDFs, you've [added support for PDFs in SharePoint](sensitivity-labels-sharepoint-onedrive-files.md#adding-support-for-pdf). To check this status, you can run `(Get-SPOTenant).EnableSensitivityLabelforPDF` from the [SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online) to confirm the value is set to **True**. + - [SharePoint Information Rights Management (IRM) is not enabled for the library](set-up-irm-in-sp-admin-center.md#irm-enable-sharepoint-document-libraries-and-lists). This older technology isn't compatible with using a default sensitivity label for a SharePoint document library. If a library is enabled for IRM, you won't be able to select a default sensitivity label. - [Site admin permissions](/sharepoint/site-permissions#site-admins) are needed to apply and change the sensitivity label in SharePoint. |
compliance | Sensitivity Labels Sharepoint Onedrive Files | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-sharepoint-onedrive-files.md | Enable built-in labeling for [supported Office files](sensitivity-labels-office- Now rolling out in preview: For SharePoint, users can also see and apply sensitivity labels from the details pane. This method is also available from the **Files** tab in Teams. -Enabling this feature also results in SharePoint and OneDrive being able to process the contents of Office files that have been encrypted by using a sensitivity label. The label can be applied in Office for the web, or in Office desktop apps and uploaded or saved in SharePoint and OneDrive. Until you enable this feature, these services can't process encrypted files, which means that coauthoring, eDiscovery, data loss prevention, search, and other collaborative features don't work for these files. +Enabling this feature also results in SharePoint and OneDrive being able to process the contents of Office files and optionally, [PDF documents](sensitivity-labels-office-apps.md#pdf-support) that have been encrypted by using a sensitivity label. The label can be applied in Office for the web, or in Office desktop apps and uploaded or saved in SharePoint and OneDrive. Until you enable this feature, these services can't process encrypted files, which means that coauthoring, eDiscovery, data loss prevention, search, and other collaborative features won't work for these files. -After you enable sensitivity labels for Office files in SharePoint and OneDrive, for new and changed files that have a sensitivity label that applies encryption with a cloud-based key (and doesn't use [Double Key Encryption](double-key-encryption.md)): +After you enable sensitivity labels for these files in SharePoint and OneDrive, for new and changed files that have a sensitivity label that applies encryption with a cloud-based key (and doesn't use [Double Key Encryption](double-key-encryption.md): -- For Word, Excel, and PowerPoint files, SharePoint and OneDrive recognize the label and can now process the contents of the encrypted file.+- For Word, Excel, and PowerPoint files, and uploaded [PDF files](sensitivity-labels-office-apps.md#pdf-support), SharePoint and OneDrive recognize the label and can now process the contents of the encrypted file. - When users download or access these files from SharePoint or OneDrive, the sensitivity label and any encryption settings from the label are enforced and remain with the file, wherever it is stored. Ensure you provide user guidance to use only labels to protect documents. For more information, see [Information Rights Management (IRM) options and sensitivity labels](sensitivity-labels-office-apps.md#information-rights-management-irm-options-and-sensitivity-labels). Uploading a labeled document, and then extracting and displaying that sensitivit - **Excel**: .xls, .xlt, .xla, .xlc, .xlm, .xlw, .xlsx, .xltx, .xlsm, .xltm, .xlam, .xlsb - **PowerPoint**: .ppt, .pot, .pps, .ppa, .pptx, .ppsx, .ppsxm, .potx, .ppam, .pptm, .potm, .ppsm +### Adding support for PDF ++> [!NOTE] +> This feature is in preview and subject to change. ++Not supported by default, and now rolling out in preview, you can enable support for PDFs for the following scenarios: ++- Applying a sensitivity label in Office on the web +- Uploading a labeled document, and then extracting and displaying that sensitivity label +- Search, eDiscovery, and data loss prevention +- [Auto-labeling policies](apply-sensitivity-label-automatically.md#how-to-configure-auto-labeling-policies-for-sharepoint-onedrive-and-exchange) and [default sensitivity labels for SharePoint document libraries](sensitivity-labels-sharepoint-default-label.md) ++> [!IMPORTANT] +> Be aware that enabling PDF support can increase the number of files that get automatically labeled with existing auto-labeling policies, which support a maximum of 25,000 files a day. ++To enable this PDF support, you have two options: ++- Turn on support from the Microsoft Purview compliance portal +- Use the following PowerShell command ++To turn on support from the Microsoft Purview compliance portal, go to **Information protection** > **Auto-labeling**. If you see a message to turn on PDF support, select the **Turn on now** button. If you don't immediately see this message, try again in a few days, or use the PowerShell option. ++To enable PDF support by using PowerShell, use the [Set-SPOTenant](/powershell/module/sharepoint-online/set-spotenant) cmdlet with the *EnableSensitivityLabelforPDF* parameter: ++```PowerShell +Set-SPOTenant -EnableSensitivityLabelforPDF $true +``` ++You might need to download the latest version of the SharePoint Online Management Shell for the PDF parameter. If you need more information about how to run the cmdlets, see the [section on this page to enable support for sensitivity labels](sensitivity-labels-sharepoint-onedrive-files.md#use-powershell-to-enable-support-for-sensitivity-labels). ++For Microsoft 365 Multi-Geo: Similarly to the instructions to run the PowerShell command to enable support for sensitivity labels, you must connect to each of your geo-locations, and then run the command to enable support for PDFs. + ## Support for labels configured for user-defined permissions Rolling out in preview, there's now limited support for labels configured for user-defined permissions. This encryption configuration refers to the setting **Let users assign permissions when they apply the label** and the checkbox **In Word, PowerPoint, and Excel, prompt users to specify permissions** is selected: |
compliance | Sensitivity Labels Teams Groups Sites | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-teams-groups-sites.md | The following apps and services don't currently support sensitivity labels confi - User apps and - Dynamics 365- - Yammer + - Viva Engage - Project - Power BI - My Apps portal |
compliance | Use Content Search To Search Third Party Data That Was Imported | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/use-content-search-to-search-third-party-data-that-was-imported.md | The following table lists the third-party data types that you can search, and th |WinMX <br/> | `ipm.externaldata.WinMX*` <br/> | |Winny <br/> | `ipm.externaldata.Winny*` <br/> | |Yahoo! <br/> | `ipm.externaldata.Yahoo!*` <br/> |-|Yammer <br/> | `ipm.externaldata.Yammer*` <br/> | +|Viva Engage <br/> | `ipm.externaldata.yammer*` <br/> | |YellowJacket <br/> | `ipm.externaldata.YellowJacket*` <br/> | |YouTube <br/> | `ipm.externaldata.YouTube*` <br/> | |
compliance | Whats New | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/whats-new.md | f1.keywords: Previously updated : 07/05/2023 Last updated : 07/12/2023 audience: Admin Whether it be adding new solutions to the [Microsoft Purview compliance portal]( ### Sensitivity labels - **General availability (GA)**: [Support for administrative units](get-started-with-sensitivity-labels.md#support-for-administrative-units).+- **In preview**: Now rolling out in preview, PDF support for auto-labeling policies, default sensitivity labels for SharePoint document libraries, and labeling activities in Office on the web that include manual labeling and displaying labeled documents, and encrypted PDFs that are now supported for DLP, eDiscovery, and search. You must [opt-in for this PDF support](sensitivity-labels-sharepoint-onedrive-files.md#adding-support-for-pdf). ## June 2023 Whether it be adding new solutions to the [Microsoft Purview compliance portal]( ### Data lifecycle management and records management - **General availability (GA)**: [Simulation mode](apply-retention-labels-automatically.md#learn-about-simulation-mode) for auto-apply retention label policies is now generally available.-- **General availability (GA)**: Auto-labeling retention policies for [cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments) that are shared via Exchange or Teams are now generally available. Cloud attachments shared via Yammer remain in preview.+- **General availability (GA)**: Auto-labeling retention policies for [cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments) that are shared via Exchange or Teams are now generally available. Cloud attachments shared via Viva Engage remain in preview. ### eDiscovery Whether it be adding new solutions to the [Microsoft Purview compliance portal]( ### Data lifecycle management and records management - **In preview**: Scan for sensitive information in images with support for [optical character recognition](ocr-learn-about.md) when you use auto-apply retention label policies.-- **In preview**: Auto-labeling retention policies for [cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments) that were already in preview now include attachments and links shared in Yammer.-- **In preview**: Support for Azure Active Directory administrative unitsΓÇöfor both [data lifecycle management](get-started-with-data-lifecycle-management.md#support-for-administrative-units) and [records management](get-started-with-records-management.md#support-for-administrative-units)ΓÇöis starting to roll out.++- **In preview**: Auto-labeling retention policies for [cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments) that were already in preview now include attachments and links shared in Viva Engage. +- **In preview**: Support for Azure Active Directory administrative unitsΓÇöfor both [data lifecycle managment](get-started-with-data-lifecycle-management.md#support-for-administrative-units) and [records management](get-started-with-records-management.md#support-for-administrative-units)ΓÇöis starting to roll out. - **In preview**: You can now optionally configure [auto-approval](disposition.md#auto-approval-for-disposition) when you configure a retention label for disposition review. ### Data loss prevention Whether it be adding new solutions to the [Microsoft Purview compliance portal]( ### Audit -- Clarification for audit log activities for [messages with reactions](/microsoft-365/compliance/audit-log-activities#yammer-activities) in Yammer.+- Clarification for audit log activities for [messages with reactions](/microsoft-365/compliance/audit-log-activities#viva-engage-activities) in Viva Engage. - [Clarification](/microsoft-365/compliance/audit-log-retention-policies#before-you-create-an-audit-log-retention-policy) on customized retention policies and licensing requirements. - Updates to [export limits](/microsoft-365/compliance/audit-new-search#audit-search-results-overview) for all search job items in Audit (Premium). - Clarification for [OneDrive for Business support](/microsoft-365/compliance/audit-premium) in Audit (Premium). Whether it be adding new solutions to the [Microsoft Purview compliance portal]( - **Rolling out in preview**: As a parity feature for the AIP add-in, built-in labeling for Windows supports the configuration of a [default sublabel for a parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label). - **Rolling out in preview**: Word, Excel, and PowerPoint in Office for Mac also supports the [sensitivity bar](sensitivity-labels-office-apps.md#sensitivity-bar) and [label colors](sensitivity-labels-office-apps.md#label-colors). - The earliest version for the AIP add-in to be [disabled by default in Office apps](sensitivity-labels-aip.md#how-to-disable-the-aip-add-in-to-use-built-in-labeling-for-office-apps) for the Current Channel and Monthly Enterprise Channel is now version 2302. The minimum version for the Semi-Annual Channel hasn't changed.+ |
enterprise | Administering A Multi Geo Environment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/administering-a-multi-geo-environment.md | If you have custom profile properties, then we recommend that you use the same p See [Work with user profiles in a Multi-Geo tenant](/sharepoint/dev/solution-guidance/multigeo-userprofileexperience) for additional details and for developer guidance. -## Yammer +## Viva Engage -Yammer is not a Multi-Geo workload. Yammer threads stored in Yammer will be placed in the _Tenant's_ central location. Yammer is rolling out a file storage change which will store Yammer files within SharePoint. Yammer files stored in SharePoint will be placed the SharePoint site associated with the Yammer group. SharePoint group sites are based on PDL logic as outlined in [SharePoint Sites and Groups](multi-geo-capabilities-in-onedrive-and-sharepoint-online-in-microsoft-365.md#sharepoint-sites-and-groups). +Viva Engage is not a Multi-Geo workload. Viva Engage threads stored in Viva Engage will be placed in the _Tenant's_ central location. Viva Engage is rolling out a file storage change which will store Viva Engage files within SharePoint. Viva Engage files stored in SharePoint will be placed the SharePoint site associated with the Viva Engage group. SharePoint group sites are based on PDL logic as outlined in [SharePoint Sites and Groups](multi-geo-capabilities-in-onedrive-and-sharepoint-online-in-microsoft-365.md#sharepoint-sites-and-groups). |
enterprise | Cloud Services Roadmap Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/cloud-services-roadmap-microsoft-365.md | To deploy your cloud - [Exchange Online](/Exchange/exchange-online) - [SharePoint](/sharepoint/sharepoint-online) - [Microsoft Teams](/MicrosoftTeams/Teams-overview)- - [Yammer](https://support.office.com/article/e1464355-1f97-49ac-b2aa-dd320b179dbe) + - [Viva Engage](https://support.office.com/article/e1464355-1f97-49ac-b2aa-dd320b179dbe) - [Train your users](/office365/admin/admin-overview/get-started-with-office-365#training-resources-for-your-users) ## Manage To manage your cloud - [SharePoint](https://support.office.com/article/79eb0420-8cbd-4bcb-a90b-ddc7d3ab4b3a) - [Skype for Business](/SkypeForBusiness/skype-for-business-online) - [Teams](/MicrosoftTeams/quality-of-experience-review-guide)- - [Yammer](https://support.office.com/article/e1464355-1f97-49ac-b2aa-dd320b179dbe) + - [Viva Engage](https://support.office.com/article/e1464355-1f97-49ac-b2aa-dd320b179dbe) - [Perform performance tuning for your cloud services](tune-microsoft-365-performance.md) ## How Microsoft does cloud services for Microsoft 365 |
enterprise | Configure Services And Applications | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/configure-services-and-applications.md | If you want help getting Microsoft 365 set up, use **[FastTrack](https://www.mic |**IM and online meetings** <br> (Teams) | - [Microsoft Teams deployment overview](/microsoftteams/deploy-overview)<br> - [Meetings and conferencing in Microsoft Teams](/microsoftteams/deploy-meetings-microsoft-teams-landing-page) <br> - [Plan your Teams voice solution](/microsoftteams/cloud-voice-landing-page) | | **File storage & sharing** <br> (OneDrive and SharePoint) | - [Set up Microsoft 365 file storage and sharing](https://support.office.com/article/7aa9cdc8-2245-4218-81ee-86fa7c35f1de#BKMK_WhatDif): Learn when you should use OneDrive to store files and when you should use SharePoint team sites <br> - Use the [OneDrive setup guide](https://aka.ms/OD4Bguidance) to get customized setup guidance | |**Microsoft 365 applications** | - Microsoft 365 administrators should use the [Office Deployment Guide](/deployoffice) to get help planning a Microsoft 365 Apps for enterprise deployment or upgrade. <br> - [Power BI for Microsoft 365 admin center](https://support.office.com/article/Power-BI-for-Office-365-Admin-Center-Help-5e391ecb-500c-47a3-bd0f-a6173b541044) <br> - [Get started with Project for the web](/project-for-the-web/projectforweb-admin-home). <br> - [Microsoft Intune deployment advisor](/mem/intune/) |-|**Enterprise Social** <br> (Yammer) | - [Use Yammer with Microsoft 365](https://support.office.com/article/Plan-for-Yammer-integration-with-Office-365-4086681f-6de1-4d39-aa72-752b2af1cbd7) <br> - Use the [Yammer Enterprise setup guide](https://aka.ms/yammerdeploy) to get customized setup guidance | +|**Enterprise Social** <br> (Viva Engage) | - [Use Viva Engage with Microsoft 365](https://support.office.com/article/Plan-for-yammer-integration-with-Office-365-4086681f-6de1-4d39-aa72-752b2af1cbd7) <br> - Use the [Viva Engage Enterprise setup guide](https://aka.ms/yammerdeploy) to get customized setup guidance | |
enterprise | Contoso Case Study | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/contoso-case-study.md | See these additional IT scenarios and configurations: - [Communication compliance offensive language policy](../compliance/communication-compliance-case-study.md) - Learn how Contoso quickly configured an offensive language policy for Microsoft Teams, Exchange, and Yammer communications. + Learn how Contoso quickly configured an offensive language policy for Microsoft Teams, Exchange, and Viva Engage communications. ## Next step |
enterprise | Disable Access To Services While Assigning User Licenses | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/disable-access-to-services-while-assigning-user-licenses.md | The following table shows the Microsoft 365 service plans and their friendly nam |:--|:--| | `SWAY` <br/> |Sway <br/> | | `TEAMS1` <br/> |Microsoft Teams <br/> |-| `YAMMER_ENTERPRISE` <br/> |Yammer <br/> | +| `YAMMER_ENTERPRISE` <br/> |Viva Engage <br/> | | `RMS_S_ENTERPRISE` <br/> |Azure Rights Management (RMS) <br/> | | `OFFICESUBSCRIPTION` <br/> |Microsoft 365 Apps for enterprise *(previously named Office 365 ProPlus)* <br/> | | `MCOSTANDARD` <br/> |Skype for Business Online <br/> | |
enterprise | M365 Dr Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/m365-dr-overview.md | Some examples: **Example 3:** For a _Tenant_ with the sign-up country as "Japan" that has a new subscription that includes Microsoft Forms, then the customer data for Forms will be provisioned into the _Macro Region Geography 3 - Americas_. Why? Because Forms is only deployed in _Macro Region Geography 3 - Americas_ and _Macro Region Geography 1 ΓÇô EMEA_ (EU _Tenants_ only). -**Example 4a:** For a _Tenant_ with the sign-up country as "Sweden" that has a new subscription that includes Microsoft Yammer, then the customer data for Yammer will be provisioned into the _Macro Region Geography 1 - EMEA_. Why? Because Yammer is deployed in _Macro Region Geography 1 - EMEA_ and Swedish _Tenants_ are best served out of that _Geography_. +**Example 4a:** For a _Tenant_ with the sign-up country as "Sweden" that has a new subscription that includes Microsoft Viva Engage, then the customer data for Viva Engage will be provisioned into the _Macro Region Geography 1 - EMEA_. Why? Because Viva Engage is deployed in _Macro Region Geography 1 - EMEA_ and Swedish _Tenants_ are best served out of that _Geography_. -**Example 4b:** For a _Tenant_ with the sign-up country as "Sweden" that has a subscription that includes Microsoft Yammer from before Yammer was deployed to _Macro Regional Geography 1 - EMEA_, then the customer data for Yammer will be located in _Macro Region Geography 3 - Americas_. Why? Because, at that time, Yammer only had a single deployment for all customers in _Macro Region Geography 3 - Americas_. +**Example 4b:** For a _Tenant_ with the sign-up country as "Sweden" that has a subscription that includes Microsoft Viva Engage from before Viva Engage was deployed to _Macro Regional Geography 1 - EMEA_, then the customer data for Viva Engage will be located in _Macro Region Geography 3 - Americas_. Why? Because, at that time, Viva Engage only had a single deployment for all customers in _Macro Region Geography 3 - Americas_. ### Migrations/Moves |
enterprise | M365 Dr Workload Other | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/m365-dr-workload-other.md | Please see the [Static data location information for select workloads](#static-d ### Whiteboard Please refer to [Manage data for Microsoft Whiteboard | Microsoft Learn](/microsoft-365/whiteboard/manage-data-organizations). -### Yammer -Please refer to [Data Residency - Yammer | Microsoft Learn](/yammer/manage-security-and-compliance/data-residency). +### Viva Engage +Please refer to [Data Residency - Viva Engage | Microsoft Learn](/viva/engage/manage-security-and-compliance/data-residency). ## Static data location information for select workloads |
enterprise | Microsoft 365 Inter Tenant Collaboration | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/microsoft-365-inter-tenant-collaboration.md | Microsoft 365 inter-tenant collaboration options include using a central locatio |:--|:--|:--| |Microsoft 365 Groups - Email, calendar, OneNote, and shared files in a central place | Groups are supported in Business Essentials, Business Premium, Education, and the Enterprise E1, E3, and E5 plans. People in one Microsoft 365 tenant can create a group and invite people in another Microsoft 365 tenant as guest users. Applies to Dynamics CRM as well. | <ul><li> [Learn about Microsoft 365 groups](https://support.office.com/article/b565caa1-5c40-40ef-9915-60fdb2d97fa2) </li><li> [Guest access in Microsoft 365 Groups](https://support.office.com/article/bfc7a840-868f-4fd6-a390-f347bf51aff6) </li><li> [Deploy Microsoft 365 Groups](/previous-versions/dynamicscrm-2016/administering-dynamics-365/dn896591(v=crm.8)) </li></ul> | -## Yammer collaboration options +## Viva Engage collaboration options | Sharing goal | Administrative action | How-to information | |:--|:--|:--|-|Yammer - Collaboration through an enterprise social medium | Unless the ability to create external groups is disabled by a Yammer admin, users can create external groups to collaborate in Yammer through conversations, the ability to like and follow posts, share files, and chat online. | [Create and manage external groups in Yammer](https://support.office.com/article/9ccd15ce-0efc-4dc1-81bc-4a424ab6f92a)| +|Viva Engage - Collaboration through an enterprise social medium | Unless the ability to create external groups is disabled by a Viva Engage admin, users can create external groups to collaborate in Viva Engage through conversations, the ability to like and follow posts, share files, and chat online. | [Create and manage external groups in Viva Engage](https://support.office.com/article/9ccd15ce-0efc-4dc1-81bc-4a424ab6f92a)| ## Teams collaboration options |
enterprise | Microsoft 365 Vpn Stream And Live Events | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/microsoft-365-vpn-stream-and-live-events.md | description: "Special considerations for Stream and live events in VPN environme >- For guidance on securing Teams media traffic in VPN split tunneling environments, see [Securing Teams media traffic for VPN split tunneling](microsoft-365-vpn-securing-teams.md). >- For information about optimizing Microsoft 365 worldwide tenant performance for users in China, see [Microsoft 365 performance optimization for China users](microsoft-365-networking-china.md). -Microsoft 365 Live Events traffic (this includes attendees to Teams-produced live events and those produced with an external encoder via Teams, Stream, or Yammer) and on-demand Stream traffic is currently categorized as **Default** versus **Optimize** in the [URL/IP list for the service](urls-and-ip-address-ranges.md). These endpoints are categorized as **Default** because they're hosted on CDNs that may also be used by other services. Customers generally prefer to proxy this type of traffic and apply any security elements normally done on endpoints such as these. +Microsoft 365 Live Events traffic (this includes attendees to Teams-produced live events and those produced with an external encoder via Teams, Stream, or Viva Engage) and on-demand Stream traffic is currently categorized as **Default** versus **Optimize** in the [URL/IP list for the service](urls-and-ip-address-ranges.md). These endpoints are categorized as **Default** because they're hosted on CDNs that may also be used by other services. Customers generally prefer to proxy this type of traffic and apply any security elements normally done on endpoints such as these. Many customers have asked for URL/IP data needed to connect their users to Stream/Live Events directly from their local internet connection, rather than route the high-volume and latency-sensitive traffic via the VPN infrastructure. Typically, this isn't possible without both dedicated namespaces and accurate IP information for the endpoints, which isn't provided for Microsoft 365 endpoints categorized as **Default**. -Use the following steps to enable direct connectivity for the Stream/Live Events service from clients using a forced tunnel VPN. This solution is intended to provide customers with an option to avoid routing Live Events traffic over VPN while there is high network traffic due to work-from-home scenarios. If possible, it's advised to access the service through an inspecting proxy. +Use the following steps to enable direct connectivity for the Stream/Live Events service from clients using a forced tunnel VPN. This solution is intended to provide customers with an option to avoid routing Live Events traffic over VPN while there's high network traffic due to work-from-home scenarios. If possible, it's advised to access the service through an inspecting proxy. >[!NOTE] >Using this solution, there may be service elements that do not resolve to the IP addresses provided and thus traverse the VPN, but the bulk of high-volume traffic like streaming data should. There may be other elements outside the scope of Live Events/Stream which get caught by this offload, but these should be limited as they must meet both the FQDN _and_ the IP match before going direct. Clients need external, recursive DNS resolution to be available so that the foll Some of these endpoints are shared with other elements outside of Stream/Live Events, it isn't advised to just use these FQDNs to configure VPN offload even if technically possible in your VPN solution (eg if it works at the FQDN rather than IP). -FQDNs aren't required in the VPN configuration, they are purely for use in PAC files in combination with the IPs to send the relevant traffic direct. +FQDNs aren't required in the VPN configuration, they're purely for use in PAC files in combination with the IPs to send the relevant traffic direct. ## 2. Implement PAC file changes (where required) -For organizations that utilize a PAC file to route traffic through a proxy while on VPN, this is normally achieved using FQDNs. However, with Stream/Live Events, the host names provided contain wildcards such as **\*.azureedge.net**, which also encompasses other elements for which it isn't possible to provide full IP listings. Thus, if the request is sent direct based on DNS wildcard match alone, traffic to these endpoints will be blocked as there is no route via the direct path for it in [Step 3](#3-configure-routing-on-the-vpn-to-enable-direct-egress) later in this article. +For organizations that utilize a PAC file to route traffic through a proxy while on VPN, this is normally achieved using FQDNs. However, with Stream/Live Events, the host names provided contain wildcards such as **\*.azureedge.net**, which also encompasses other elements for which it isn't possible to provide full IP listings. Thus, if the request is sent direct based on DNS wildcard match alone, traffic to these endpoints will be blocked as there's no route via the direct path for it in [Step 3](#3-configure-routing-on-the-vpn-to-enable-direct-egress) later in this article. To solve this, we can provide the following IPs and use them in combination with the host names in an example PAC file as described in [Step 1](#1-configure-external-dns-resolution). The PAC file checks if the URL matches those used for Stream/Live Events and then if it does, it then also checks to see if the IP returned from a DNS lookup matches those provided for the service. If _both_ match, then the traffic is routed direct. If either element (FQDN/IP) doesn't match, then the traffic is sent to the proxy. As a result, the configuration ensures that anything which resolves to an IP outside of the scope of both the IP and defined namespaces will traverse the proxy via the VPN as normal. To solve this, we can provide the following IPs and use them in combination with Live Events uses multiple CDN providers to stream to customers, to provide the best coverage, quality, and resiliency. Currently, both Azure CDN from Microsoft and from Verizon are used. Over time this could be changed due to situations such as regional availability. This article is a source to enable you to keep up to date on IP ranges. -For Azure CDN from Microsoft, you can download the list from [Download Azure IP Ranges and Service Tags ΓÇô Public Cloud from Official Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=56519) - you will need to look specifically for the service tag *AzureFrontdoor.Frontend* in the JSON; *addressPrefixes* will show the IPv4/IPv6 subnets. Over time the IPs can change, but the service tag list is always updated before they are put in use. +For Azure CDN from Microsoft, you can download the list from [Download Azure IP Ranges and Service Tags ΓÇô Public Cloud from Official Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=56519) - you'll need to look specifically for the service tag *AzureFrontdoor.Frontend* in the JSON; *addressPrefixes* will show the IPv4/IPv6 subnets. Over time the IPs can change, but the service tag list is always updated before they're put in use. -For Azure CDN from Verizon (Edgecast) you can find an exhaustive list using [Edge Nodes - List](/rest/api/cdn/edge-nodes/list) (click **Try It** ) - you will need to look specifically for the **Premium\_Verizon** section. Note that this API shows all Edgecast IPs (origin and Anycast). Currently there isn't a mechanism for the API to distinguish between origin and Anycast. +For Azure CDN from Verizon (Edgecast) you can find an exhaustive list using [Edge Nodes - List](/rest/api/cdn/edge-nodes/list) (select **Try It** ) - you'll need to look specifically for the **Premium\_Verizon** section. Note that this API shows all Edgecast IPs (origin and Anycast). Currently there isn't a mechanism for the API to distinguish between origin and Anycast. To implement this in a PAC file you can use the following example which sends the Microsoft 365 Optimize traffic direct (which is recommended best practice) via FQDN, and the critical Stream/Live Events traffic direct via a combination of the FQDN and the returned IP address. The placeholder name _Contoso_ would need to be edited to your specific tenant's name where _contoso_ is from contoso.onmicrosoft.com Note that only the IPs (not FQDNs) from [Gathering the current lists of CDN Endp ### Will this send all my traffic to the service direct? -No, this will send the latency-sensitive streaming traffic for a Live Event or Stream video direct, any other traffic will continue to use the VPN tunnel if they do not resolve to the IPs published. +No, this will send the latency-sensitive streaming traffic for a Live Event or Stream video direct, any other traffic will continue to use the VPN tunnel if they don't resolve to the IPs published. ### Do I need to use the IPv6 Addresses? No, access to all of the **Required** marked endpoints in [the URL/IP service](u ### Does this advice cover presenter traffic? -It does not, the advice above is purely for those consuming the service. Presenting from within Teams will see the presenter's traffic flowing to the Optimize marked UDP endpoints listed in URL/IP service row 11 with detailed VPN offload advice outlined in the [Implement VPN split tunneling](microsoft-365-vpn-implement-split-tunnel.md#implement-vpn-split-tunneling) section of [Implementing VPN split tunneling for Microsoft 365](microsoft-365-vpn-implement-split-tunnel.md). +It doesn't, the advice above is purely for those consuming the service. Presenting from within Teams will see the presenter's traffic flowing to the Optimize marked UDP endpoints listed in URL/IP service row 11 with detailed VPN offload advice outlined in the [Implement VPN split tunneling](microsoft-365-vpn-implement-split-tunnel.md#implement-vpn-split-tunneling) section of [Implementing VPN split tunneling for Microsoft 365](microsoft-365-vpn-implement-split-tunnel.md). ### Does this configuration risk traffic other than Live Events & Stream being sent direct? -Yes, due to shared FQDNs used for some elements of the service, this is unavoidable. This traffic is normally sent via a corporate proxy which can apply inspection. In a VPN split tunnel scenario, using both the FQDNs and IPs will scope this risk down to a minimum, but it will still exist. Customers can remove the **\*.azureedge.net** domain from the offload configuration and reduce this risk to a bare minimum but this will remove the offload of Stream-supported Live Events (Teams-scheduled, external encoder events, Yammer events produced in Teams, Yammer-scheduled external encoder events, and Stream scheduled events or on-demand viewing from Stream). Events scheduled and produced in Teams are unaffected. +Yes, due to shared FQDNs used for some elements of the service, this is unavoidable. This traffic is normally sent via a corporate proxy which can apply inspection. In a VPN split tunnel scenario, using both the FQDNs and IPs will scope this risk down to a minimum, but it will still exist. Customers can remove the **\*.azureedge.net** domain from the offload configuration and reduce this risk to a bare minimum but this will remove the offload of Stream-supported Live Events (Teams-scheduled, external encoder events, Viva Engage events produced in Teams, Viva Engage-scheduled external encoder events, and Stream scheduled events or on-demand viewing from Stream). Events scheduled and produced in Teams are unaffected. ## Related articles |
enterprise | O365 Data Locations | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/o365-data-locations.md | See the following links to understand how you can determine current workload dat - Viva Insights ΓÇô Advanced, Mgr, Leader [Data Location](m365-dr-workload-other.md#viva-insights--advanced-mgr-leader) - Viva Insights ΓÇô Personal [Data Location](m365-dr-workload-other.md#viva-insights--personal) - Viva Learning [Data Location](m365-dr-workload-other.md#viva-learning)-- Yammer [Data Location](m365-dr-workload-other.md#yammer)+- Viva Engage [Data Location](m365-dr-workload-other.md#viva-engage) - Office for mobile [Data Location](m365-dr-workload-other.md#office-for-mobile) - OneNote Services [Data Location](m365-dr-workload-other.md#onenote-services) - Power Apps for Microsoft 365 [Data Location](m365-dr-workload-other.md#power-apps-for-microsoft-365) |
enterprise | Session Timeouts | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/session-timeouts.md | The following table lists the session lifetimes for Microsoft 365 |Outlook Web App <br/> |6 hours. <br/> You can change this value by using the _ActivityBasedAuthenticationTimeoutInterval_ parameter in the [Set-OrganizationConfig](/powershell/module/exchange/set-organizationconfig) cmdlet. <br/> | |Azure Active Directory <br/> (Used by Office and Microsoft 365 applications in Windows clients with modern authentication enabled) <br/> | Modern authentication uses access tokens and refresh tokens to grant user access to Microsoft 365 resources using Azure Active Directory. An access token is a JSON Web Token provided after a successful authentication and is valid for 1 hour. A refresh token with a longer lifetime is also provided. When access tokens expire, Office clients use a valid refresh token to obtain a new access token. This exchange succeeds if the user's initial authentication is still valid. <br/> Refresh tokens are valid for 90 days, and with continuous use, they can be valid until revoked. <br/> Refresh tokens can be invalidated by several events such as: <br/> User's password has changed since the refresh token was issued. <br/> An administrator can apply conditional access policies that restrict access to the resource the user is trying to access. <br/> | |SharePoint and OneDrive mobile apps for Android, iOS, and Windows 10 <br/> |The default lifetime for the access token is 1 hour. The default max inactive time of the refresh token is 90 days. <br/> [Learn more about tokens and how to configure token lifetimes](/azure/active-directory/active-directory-configurable-token-lifetimes) <br/> To revoke the refresh token, you can reset the user's Microsoft 365 password <br/> |-|Yammer with Microsoft 365 Sign-In <br/> |Lifetime of the browser. If users close the browser and access Yammer in a new browser, Yammer will re-authenticate them with Microsoft 365. If users use third-party browsers that cache cookies, they may not need to re-authenticate when they reopen the browser. <br/> > [!NOTE]> This is valid only for networks using Microsoft 365 Sign-In for Yammer. | +|Viva Engage with Microsoft 365 Sign-In <br/> |Lifetime of the browser. If users close the browser and access Viva Engage in a new browser, Viva Engage will re-authenticate them with Microsoft 365. If users use third-party browsers that cache cookies, they may not need to re-authenticate when they reopen the browser. <br/> > [!NOTE]> This is valid only for networks using Microsoft 365 Sign-In for Viva Engage. | |
enterprise | Setup Guides For Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/setup-guides-for-microsoft-365.md | Advanced deployment guides in the admin center require authentication to a Micro |[Microsoft Purview Data Lifecycle Management setup guide](https://go.microsoft.com/fwlink/?linkid=2223154)|[Microsoft Purview Data Lifecycle Management setup guide](https://go.microsoft.com/fwlink/?linkid=2224686)|The **Microsoft Purview Data Lifecycle Management setup guide** provides you with the information you'll need to set up and manage your organization's governance strategy, to ensure that your data is classified and managed according to the specific lifecycle guidelines you set. With this guide, you'll learn how to create, auto-apply, or publish retention labels, retention label policies, and retention policies that are applied to your organization's content and compliance records. You'll also get information on importing CSV files with a file plan for bulk scenarios or for applying them manually to individual documents.| |[Microsoft Defender for Cloud Apps setup guide](https://go.microsoft.com/fwlink/?linkid=2222969)|[Microsoft Defender for Cloud Apps setup guide](https://go.microsoft.com/fwlink/?linkid=2224814)|The **Microsoft Defender for Cloud Apps setup guide** provides easy to follow deployment and management guidance to set up your Cloud Discovery solution. With Cloud Discovery, you'll integrate your supported security apps, and then you'll use traffic logs to dynamically discover and analyze the cloud apps that your organization uses. You'll also set up features available through the Defender for Cloud Apps solution, including threat detection policies to identify high-risk use, information protection policies to define access, and real-time session controls to monitor activity. With these features, your environment gets enhanced visibility, control over data movement, and analytics to identify and combat cyberthreats across all your Microsoft and third party cloud services.| |[Microsoft Purview Auditing solutions in Microsoft 365 guide](https://go.microsoft.com/fwlink/?linkid=2223153)|[Microsoft 365 Auditing solutions in Microsoft 365 guide](https://go.microsoft.com/fwlink/?linkid=2224816)|The **Microsoft Purview Auditing solutions in Microsoft 365 guide** provides an integrated solution to help organizations effectively respond to security events, forensic investigations, and compliance obligations. When you use the auditing solutions in Microsoft 365, you can search the audit log for activities performed in different Microsoft 365 services.|-|[Microsoft Purview eDiscovery solutions setup guide](https://go.microsoft.com/fwlink/?linkid=2223416)|[Microsoft Purview eDiscovery solutions setup guide](https://go.microsoft.com/fwlink/?linkid=2224465)|eDiscovery is the process of identifying and delivering electronic information that can be used as evidence in legal cases. The **Microsoft Purview eDiscovery solutions setup guide** assists in the use of eDiscovery tools in Microsoft Purview that allow you to search for content in Exchange Online, OneDrive for Business, SharePoint Online, Microsoft Teams, Microsoft 365 Groups, and Yammer communities.| +|[Microsoft Purview eDiscovery solutions setup guide](https://go.microsoft.com/fwlink/?linkid=2223416)|[Microsoft Purview eDiscovery solutions setup guide](https://go.microsoft.com/fwlink/?linkid=2224465)|eDiscovery is the process of identifying and delivering electronic information that can be used as evidence in legal cases. The **Microsoft Purview eDiscovery solutions setup guide** assists in the use of eDiscovery tools in Microsoft Purview that allow you to search for content in Exchange Online, OneDrive for Business, SharePoint Online, Microsoft Teams, Microsoft 365 Groups, and Viva Engage communities.| ## Guides for collaboration Advanced deployment guides in the admin center require authentication to a Micro |[SharePoint setup guide](https://go.microsoft.com/fwlink/?linkid=2223320)|[SharePoint setup guide](https://go.microsoft.com/fwlink/?linkid=2224196)|The **SharePoint setup guide** helps you set up your SharePoint document storage and content management, create sites, configure external sharing, migrate data and configure advanced settings, and drive user engagement and communication within your organization. You'll follow steps for configuring your content-sharing permission policies, choose your migration sync tools, and enable the security settings for your SharePoint environment.| |[Surface Hub and Microsoft Teams Rooms setup guide](https://go.microsoft.com/fwlink/?linkid=2222974)|[Surface Hub and Microsoft Teams Rooms setup guide](https://go.microsoft.com/fwlink/?linkid=2224463)|The **Surface Hub and Microsoft Teams Rooms setup guide** will customize your experience based on your environment. If you're hosted in Exchange Online and using Microsoft Teams, the guide will automatically create your device account with the correct settings.| |[OneDrive setup guide](https://go.microsoft.com/fwlink/?linkid=2223143)|[OneDrive setup guide](https://go.microsoft.com/fwlink/?linkid=2224690)|Use the **OneDrive setup guide** to get started with OneDrive file storage, sharing, collaboration, and syncing capabilities. OneDrive provides a central location where users can sync their Microsoft 365 Apps files, configure external sharing, migrate user data, and configure advanced security and device access settings. The OneDrive setup guide can be deployed using a OneDrive subscription or a standalone OneDrive plan.|-|[Yammer deployment advisor](https://go.microsoft.com/fwlink/?linkid=2223165)|[Yammer deployment advisor](https://go.microsoft.com/fwlink/?linkid=2224694)|Connect and engage across your organization with Yammer. The **Yammer deployment advisor** prepares your Yammer network by adding domains, defining admins, and combining Yammer networks. You'll get guidance to deploy Yammer and then customize the look, configure security and compliance, and refine the settings.| +|[Viva Engage deployment advisor](https://go.microsoft.com/fwlink/?linkid=2223165)|[Viva Engage deployment advisor](https://go.microsoft.com/fwlink/?linkid=2224694)|Connect and engage across your organization with Viva Engage. The **Viva Engage deployment advisor** prepares your Viva Engage network by adding domains, defining admins, and combining Viva Engage networks. You'll get guidance to deploy Viva Engage and then customize the look, configure security and compliance, and refine the settings.| ## Advanced guides |
enterprise | Urls And Ip Address Ranges | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/urls-and-ip-address-ranges.md | Data columns shown are: [!INCLUDE [Office 365 worldwide endpoints](../includes/office-365-worldwide-endpoints.md)] > [!NOTE]-> For recommendations on Yammer IP addresses and URLs, see [Using hard-coded IP addresses for Yammer is not recommended](https://techcommunity.microsoft.com/t5/Yammer-Blog/Using-hard-coded-IP-addresses-for-Yammer-is-not-recommended/ba-p/276592) on the Yammer blog. +> For recommendations on Viva Engage IP addresses and URLs, see [Using hard-coded IP addresses for Viva Engage is not recommended](https://techcommunity.microsoft.com/t5/yammer-Blog/Using-hard-coded-IP-addresses-for-yammer-is-not-recommended/ba-p/276592) on the Viva Engage blog. ## Related Topics |
enterprise | View Licenses And Services With Microsoft 365 Powershell | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/view-licenses-and-services-with-microsoft-365-powershell.md | The following table shows the Microsoft 365 service plans and their friendly nam |:--|:--| | `SWAY` <br/> |Sway <br/> | | `TEAMS1` <br/> |Microsoft Teams <br/> |-| `YAMMER_ENTERPRISE` <br/> |Yammer <br/> | +| `YAMMER_ENTERPRISE` <br/> |Viva Engage <br/> | | `RMS_S_ENTERPRISE` <br/> |Azure Rights Management (RMS) <br/> | | `OFFICESUBSCRIPTION` <br/> |Microsoft 365 Apps for enterprise *(previously named Office 365 ProPlus)* <br/> | | `MCOSTANDARD` <br/> |Skype for Business Online <br/> | |
enterprise | View Service Health | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/view-service-health.md | description: View the health status of Microsoft 365 services before you call su [](/office365/admin/microsoft-365-admin-center-preview?preserve-view=true&view=o365-worldwide) -You can view the health of your Microsoft services, including Office on the web, Yammer, Microsoft Dynamics CRM, and mobile device management cloud services, on the **Service health** page in the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?linkid=2024339). If you are experiencing problems with a cloud service, you can check the service health to determine whether this is a known issue with a resolution in progress before you call support or spend time troubleshooting. +You can view the health of your Microsoft services, including Office on the web, Viva Engage, Microsoft Dynamics CRM, and mobile device management cloud services, on the **Service health** page in the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?linkid=2024339). If you are experiencing problems with a cloud service, you can check the service health to determine whether this is a known issue with a resolution in progress before you call support or spend time troubleshooting. If you are unable to sign in to the admin center, you can use the [service status page](https://status.office365.com) to check for known issues preventing you from logging into your tenant. Also sign up to follow us at [@MSFT365status](https://twitter.com/MSFT365Status) on Twitter to see information on certain events. |
frontline | Deploy Dynamic Teams At Scale | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/deploy-dynamic-teams-at-scale.md | You can manage your teams when changes happen in your organization. ### Edit your frontline team settings +>[!IMPORTANT] +>The ability to edit your frontline team settings is coming soon. + 1. First, navigate to your [Teams admin center](https://admin.teams.microsoft.com). 1. Open the **Teams** section on the left rail. 1. Select **Manage frontline teams**. |
frontline | Flw Corp Comms | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/flw-corp-comms.md | With Microsoft Teams, Viva Connections, and SharePoint, you can enable these sce ## Connect across your organization with Viva Engage -Engage with communities in Viva Engage, which brings the power of Yammer into Teams. Communities in Viva Engage serve the needs of knowledge-sharing, employee experience, company-wide communications, and leadership engagement by providing a central place for your conversations, files, events, and updates. Associates can raise issues, provide feedback, and ask and answer questions in Viva Engage Communities. Hold live events and town halls to keep everyone in your organization in the loop. +Engage with communities in Viva Engage, which brings the power of Viva Engage into Teams. Communities in Viva Engage serve the needs of knowledge-sharing, employee experience, company-wide communications, and leadership engagement by providing a central place for your conversations, files, events, and updates. Associates can raise issues, provide feedback, and ask and answer questions in Viva Engage Communities. Hold live events and town halls to keep everyone in your organization in the loop. You can create communities for individual locations, identity or interest groups, or work groups such as nurses and financial advisors. |
frontline | Flw Wellbeing Engagement | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/flw-wellbeing-engagement.md | Survey's like MicrosoftΓÇÖs [Work Trend Index Pulse Report](https://www.microsof - Say leadership does not prioritize building culture - Believe that work stress will either stay the same or worsen in the coming year -You can help your frontline team overcome these challenges and feel supported in your organization by using [Viva Connections](#connect-frontline-workers-to-your-broader-organization-with-viva-connections), [Yammer](#create-communities-with-yammer), [Praise](#boost-morale-with-praise), [SharePoint, and Microsoft Stream](#support-engagement-with-sharepoint-and-microsoft-stream). +You can help your frontline team overcome these challenges and feel supported in your organization by using [Viva Connections](#connect-frontline-workers-to-your-broader-organization-with-viva-connections), [Viva Engage](#create-communities-with-viva-engage), [Praise](#boost-morale-with-praise), [SharePoint, and Microsoft Stream](#support-engagement-with-sharepoint-and-microsoft-stream). ## Connect frontline workers to your broader organization with Viva Connections Viva Connections is comprised of three main components that can be set up and cu |Component |Description |Capabilities | |:|:--|:| |Dashboard |The Dashboard is your employeeΓÇÖs digital toolset and enables quick access to popular tasks. |Prioritize cards that help frontline workers accomplish popular tasks like clocking in and out, or viewing assigned tasks. Cards can be targeted to distinct roles and regions. |-|Feed |The Feed aggregates content from Yammer, SharePoint news, and Stream to display a personalized news stream. |Content in the Feed gets automatically aggregated based on sites and Yammer communities that the user follows. Content can be prioritized to display more prominently in the Feed. Use audience targeting to display content to specific audiences. | +|Feed |The Feed aggregates content from Viva Engage, SharePoint news, and Stream to display a personalized news stream. |Content in the Feed gets automatically aggregated based on sites and Viva Engage communities that the user follows. Content can be prioritized to display more prominently in the Feed. Use audience targeting to display content to specific audiences. | |Resources |The Resources surface links to popular SharePoint portals and other content. |Resources are inherited from global navigation in SharePoint. Link to popular SharePoint portals like HR benefits and training resources. Modern SharePoint portals will display in Teams to provide the best possible viewing experience. | -There are several ways to use Viva Connections to communicate with your workforce. Viva Connections features a [Feed where news, content from Yammer, and videos are aggregated and displayed](/viva/connections/viva-connections-overview#viva-connections-feed) in a personalized view based on the sites and communities that the viewer follows. The [Dashboard](/viva/connections/create-dashboard) can also be used to highlight certain cards that link to important news sources. +There are several ways to use Viva Connections to communicate with your workforce. Viva Connections features a [Feed where news, content from Viva Engage, and videos are aggregated and displayed](/viva/connections/viva-connections-overview#viva-connections-feed) in a personalized view based on the sites and communities that the viewer follows. The [Dashboard](/viva/connections/create-dashboard) can also be used to highlight certain cards that link to important news sources. As you prioritize and align the scenarios to support, consider how and where certain tools and resources should be located. [Learn more about the differences between desktop and mobile apps](/viva/connections/viva-connections-overview#viva-connections-mobile-and-desktop-experiences). As you prioritize and align the scenarios to support, consider how and where cer Creating channels for your frontline workers to share feedback helps these teams feel engaged and like their voices matter. In addition, getting feedback from these teams can provide insights into how your organization can improve processes. -- **On the Dashboard**: Use a [web link card](/viva/connections/create-dashboard#add-a-web-link-card) to make it easy to link to feedback channels such as [Microsoft Forms](https://support.microsoft.com/office/create-a-form-with-microsoft-forms-4ffb64cc-7d5d-402f-b82e-b1d49418fd9d) and [Yammer communities](https://support.microsoft.com/office/join-and-create-a-community-in-yammer-56aaf591-1fbc-4160-ba26-0c4723c23fd6). You can also [integrate third-party solutions into the Dashboard](https://cloudpartners.transform.microsoft.com/resources/viva-app-integration).+- **On the Dashboard**: Use a [web link card](/viva/connections/create-dashboard#add-a-web-link-card) to make it easy to link to feedback channels such as [Microsoft Forms](https://support.microsoft.com/office/create-a-form-with-microsoft-forms-4ffb64cc-7d5d-402f-b82e-b1d49418fd9d) and [Viva Engage communities](https://support.microsoft.com/office/join-and-create-a-community-in-yammer-56aaf591-1fbc-4160-ba26-0c4723c23fd6). You can also [integrate third-party solutions into the Dashboard](https://cloudpartners.transform.microsoft.com/resources/viva-app-integration). > [!NOTE] > Form creation requires an F3 or Enterprise license. Workers with F1 licenses can fill out forms, but they'll need to be created by someone with an F3 or Enterprise license. [Learn more about license types](flw-licensing-options.md) or [View the detailed license comparison table](https://go.microsoft.com/fwlink/?linkid=2139145). Empowering frontline workers with the right technology makes their jobs easier a Review Viva Connections capabilities, technical requirements, and customization options. Then, work with stakeholders (such as representatives from HR and operations and process owners) who can accurately represent the needs of your frontline workforce. Take inventory of the highest priority needs and align them to Viva Connections capabilities to build a custom experience in Teams. [Get started planning, building, and launching Viva Connections for your organization](/viva/connections/plan-viva-connections). -## Create communities with Yammer +## Create communities with Viva Engage -Yammer is an internal social network that gives members of your organization opportunities to connect with each other. You can create communities where members of your organization can post messages and communicate. Having a variety of communities that span both frontline and non-frontline teams helps your on-the-ground workforce connect to each other and the broader organization. Communities can be based on: +Viva Engage is an internal social network that gives members of your organization opportunities to connect with each other. You can create communities where members of your organization can post messages and communicate. Having a variety of communities that span both frontline and non-frontline teams helps your on-the-ground workforce connect to each other and the broader organization. Communities can be based on: - Location - Roles, such as cashiers or nurses Yammer is an internal social network that gives members of your organization opp ### Host live events -Members of your leadership or management team can host live events on Yammer where employees can engage and ask questions in real time over chat. Your communications and management teams can use live events to share announcements, host morale events, and more. +Members of your leadership or management team can host live events on Viva Engage where employees can engage and ask questions in real time over chat. Your communications and management teams can use live events to share announcements, host morale events, and more. > [!NOTE]-> Only users with an E3 or E5 license can host live events, but users with F licenses can join them. [Learn more about who can host and join live events in Yammer](/yammer/manage-yammer-groups/yammer-live-events). +> Only users with an E3 or E5 license can host live events, but users with F licenses can join them. [Learn more about who can host and join live events in Viva Engage](/viva/engage/manage-viva-engage-groups/viva-engage-live-events). -[Learn more about Yammer](https://support.microsoft.com/office/what-is-yammer-1b0f3b3e-89ee-4b66-aac5-30def12f287c). +[Learn more about Viva Engage](https://support.microsoft.com/office/what-is-yammer-1b0f3b3e-89ee-4b66-aac5-30def12f287c). ## Boost morale with Praise |
frontline | Frontline Team Options | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/frontline-team-options.md | |
frontline | Switch From Enterprise To Frontline | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/switch-from-enterprise-to-frontline.md | We'll be referring to this table in later sections of this article. |Service or feature |Before the switch|After the switch| ||||-|Office apps| <ul><li>Identify files that are stored on users' local computers and help users move them to their OneDrive.</li><li>Keep in mind that Office desktop apps will go into reduced functionality mode after changing to an F plan. Be prepared to uninstall Office desktop apps after the switch.</li></ul>| Users:</br> <ul><li>Sign in to [office.com](https://www.office.com) to access Office for the web.</li><li>[Install and use Office mobile apps](https://support.microsoft.com/office/set-up-office-apps-and-email-on-a-mobile-device-7dabb6cb-0046-40b6-81fe-767e0b1f014f) (if not already).</li><li>Users can also directly collaborate on documents from SharePoint document libraries, OneDrive, Teams, and Yammer.</li></ul>Admins:<ul><li>Uninstall Office desktop apps from users' computers.</li></ul> | +|Office apps| <ul><li>Identify files that are stored on users' local computers and help users move them to their OneDrive.</li><li>Keep in mind that Office desktop apps will go into reduced functionality mode after changing to an F plan. Be prepared to uninstall Office desktop apps after the switch.</li></ul>| Users:</br> <ul><li>Sign in to [office.com](https://www.office.com) to access Office for the web.</li><li>[Install and use Office mobile apps](https://support.microsoft.com/office/set-up-office-apps-and-email-on-a-mobile-device-7dabb6cb-0046-40b6-81fe-767e0b1f014f) (if not already).</li><li>Users can also directly collaborate on documents from SharePoint document libraries, OneDrive, Teams, and Viva Engage.</li></ul>Admins:<ul><li>Uninstall Office desktop apps from users' computers.</li></ul> | |Email, Exchange, Outlook|<ul><li>Identify user mailboxes over 2 GB by using the [Get-MailboxStatistics](/powershell/module/exchange/get-mailboxstatistics?view=exchange-ps&preserve-view=true) Exchange PowerShell cmdlet, and then reduce mailbox size, as needed. To learn more, see [Mailbox storage limits in Outlook on the web](https://support.microsoft.com/office/mailbox-storage-limits-in-outlook-on-the-web-f170fe90-b859-4034-bcda-e186fc6a26f5).</li><li>If users have an archive mailbox:</li><ul><li>Move archive mailbox content back to the user's mailbox.</li><li>Check for any archive policies that may automatically move email based on the age of messages by using the [Get-EXOMailbox](/powershell/module/exchange/get-exomailbox?view=exchange-ps&preserve-view=true) Exchange Online PowerShell cmdlet.</li></ul> <li>Identify site mailbox access and usage.</li><li>Outlook desktop app, data, and configuration:</li><ul><li>Identify users and computers that are using Outlook data (.pst) files.</li><li>Identify and document existing Outlook client-only rules.</li><li>Export email signatures.</li></ul></ul>|Users:</br><ul><li>Sign in to [office.com](https://www.office.com) to access Outlook on the web.</li><li>[Set up email on mobile devices](https://support.microsoft.com/office/set-up-office-apps-and-email-on-a-mobile-device-7dabb6cb-0046-40b6-81fe-767e0b1f014f) (if not already).</li><li>Check and update mail signatures.</li><li>Check and update mailbox rules.</li></ul>Admins:<ul><li> [Disable Outlook on the web](/exchange/recipients-in-exchange-online/manage-user-mailboxes/enable-or-disable-outlook-web-app) for F1 users and ask them not to access the mailbox through any other methods.</li></ul>| |Teams | <ul><li>Identify usage of live events and webinars.</li><li>Identify users who have Teams Phone enabled. If users are using this feature, they may not be the appropriate set of users to transition to an F plan.</li></ul> || |OneDrive | <ul><li>Identify users who are using more than or close to 2 GB of storage. (OneDrive will become read-only for users who are over the 2 GB limit after the switch to an F plan.)</li><li>Help users reduce the number of files stored in OneDrive and the overall amount of storage used.</li><li>Make sure all files are fully synchronized from users' computers to OneDrive.</li></ul>| | Here's some ideas to help plan your strategy. |Communication|Training|Support| ||||-|<ul><li>Email</li><li>Department or store managers</li><li>Champions</li><li>Teams and channels</li><li>Yammer communities</li></ul> |<ul><li>Microsoft online help, training, and video resources</li><li>In-house training</li></ul>|<ul><li>In-house helpdesk</li><li>Self-serve intranet site</li><li>Microsoft online help, training, and video resources</li><li>Floor walkers and champions</li></ul> | +|<ul><li>Email</li><li>Department or store managers</li><li>Champions</li><li>Teams and channels</li><li>Viva Engage communities</li></ul> |<ul><li>Microsoft online help, training, and video resources</li><li>In-house training</li></ul>|<ul><li>In-house helpdesk</li><li>Self-serve intranet site</li><li>Microsoft online help, training, and video resources</li><li>Floor walkers and champions</li></ul> | You may also want to check out these adoption resources to help you engage and train your users: Communicate to your users that the change is completed and let them know how to ## User setup, help, and learning resources -Here are some links to setup, help, and learning resources that you can share with your frontline workers for training and support. +Here are some links to set up, help, and learning resources that you can share with your frontline workers for training and support. |App|Links | ||| |
includes | Microsoft 365 Client Support Certificate Based Authentication Include | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/microsoft-365-client-support-certificate-based-authentication-include.md | Last updated 03/17/2021 |WHITEBOARD|Γ£ö|Γ£ö|N/A|N/A|Γ£ö| |WORD|Γ£ö|Γ£ö|Γ£ö|Γ£ö|Γ£ö| |WORKPLACE ANALYTICS|N/A|N/A|N/A|N/A|N/A|-|YAMMER|Γ£ö|Γ£ö|Planned|Planned|N/A| +|Viva Engage|Γ£ö|Γ£ö|Planned|Planned|N/A| |
includes | Microsoft 365 Client Support Conditional Access Include | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/microsoft-365-client-support-conditional-access-include.md | Last updated 03/17/2021 |WHITEBOARD|Γ£ö|Planned|N/A|N/A|Planned| |WORD|Γ£ö|Γ£ö|Γ£ö|Γ£ö|N/A| |WORKPLACE ANALYTICS|N/A|N/A|N/A|N/A|N/A|-|YAMMER|Planned|Planned|Planned|Planned|N/A| +|Viva Engage|Planned|Planned|Planned|Planned|N/A| |
includes | Microsoft 365 Client Support Modern Authentication Include | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/microsoft-365-client-support-modern-authentication-include.md | Last updated 03/17/2021 |WHITEBOARD|Γ£ö|Γ£ö|N/A|N/A|Γ£ö| |WORD|Γ£ö|Γ£ö|Γ£ö|Γ£ö|Γ£ö| |WORKPLACE ANALYTICS|N/A|N/A|N/A|N/A|N/A|-|YAMMER|Γ£ö|Γ£ö|Γ£ö|Γ£ö|N/A| +|Viva Engage|Γ£ö|Γ£ö|Γ£ö|Γ£ö|N/A| |
includes | Microsoft 365 Client Support Single Sign On Include | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/microsoft-365-client-support-single-sign-on-include.md | Last updated 03/17/2021 |VISIO|N/A|Γ£ö|N/A|Γ£ö|N/A| |WHITEBOARD|Γ£ö|Γ£ö|N/A|N/A|Γ£ö| |WORD|Γ£ö|Γ£ö|Γ£ö|Γ£ö|Γ£ö|-|YAMMER|Γ£ö|Γ£ö|N/A|Planned|N/A| +|Viva Engage|Γ£ö|Γ£ö|N/A|Planned|N/A| |
includes | Office 365 Worldwide Endpoints | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/office-365-worldwide-endpoints.md | -<!--THIS FILE IS AUTOMATICALLY GENERATED. MANUAL CHANGES WILL BE OVERWRITTEN.--> +<!--THIS FILE IS AUTOMATICALLY GENERATED. MANUAL CHANGES WILL BE OVERWRITTEN.--> <!--Please contact the Office 365 Endpoints team with any questions.--> <!--Worldwide endpoints version 2023062900--> <!--File generated 2023-06-30 08:00:03.8532-->--## Exchange Online ++## Exchange Online ID | Category | ER | Addresses | Ports -- | - | | - | -- ID | Category | ER | Addresses | Ports 8 | Default<BR>Required | No | `*.outlook.com, autodiscover.<tenant>.onmicrosoft.com` | **TCP:** 443, 80 9 | Allow<BR>Required | Yes | `*.protection.outlook.com`<BR>`40.92.0.0/15, 40.107.0.0/16, 52.100.0.0/14, 52.238.78.88/32, 104.47.0.0/17, 2a01:111:f400::/48, 2a01:111:f403::/48` | **TCP:** 443 10 | Allow<BR>Required | Yes | `*.mail.protection.outlook.com`<BR>`40.92.0.0/15, 40.107.0.0/16, 52.100.0.0/14, 104.47.0.0/17, 2a01:111:f400::/48, 2a01:111:f403::/48` | **TCP:** 25--## SharePoint Online and OneDrive for Business ++## SharePoint Online and OneDrive for Business ID | Category | ER | Addresses | Ports -- | -- | | -- | - ID | Category | ER | Addresses | Ports 36 | Default<BR>Required | No | `g.live.com, oneclient.sfx.ms` | **TCP:** 443, 80 37 | Default<BR>Required | No | `*.sharepointonline.com, spoprod-a.akamaihd.net` | **TCP:** 443, 80 39 | Default<BR>Required | No | `*.svc.ms` | **TCP:** 443, 80--## Skype for Business Online and Microsoft Teams ++## Skype for Business Online and Microsoft Teams ID | Category | ER | Addresses | Ports | - | | - | - ID | Category | ER | Addresses | Ports 127 | Default<BR>Required | No | `*.skype.com` | **TCP:** 443, 80 167 | Default<BR>Required | No | `*.ecdn.microsoft.com` | **TCP:** 443 180 | Default<BR>Required | No | `compass-ssl.microsoft.com` | **TCP:** 443--## Microsoft 365 Common and Office Online ++## Microsoft 365 Common and Office Online ID | Category | ER | Addresses | Ports | -- | | -- | - ID | Category | ER | Addresses | Ports 105 | Default<BR>Optional<BR>**Notes:** Outlook for Android and iOS: Outlook Privacy | No | `www.acompli.com` | **TCP:** 443 114 | Default<BR>Optional<BR>**Notes:** Office Mobile URLs | No | `*.appex.bing.com, *.appex-rf.msn.com, c.bing.com, c.live.com, d.docs.live.net, directory.services.live.com, docs.live.net, partnerservices.getmicrosoftkey.com, signup.live.com` | **TCP:** 443, 80 116 | Default<BR>Optional<BR>**Notes:** Office for iPad URLs | No | `account.live.com, auth.gfx.ms, login.live.com` | **TCP:** 443, 80-117 | Default<BR>Optional<BR>**Notes:** Yammer | No | `*.yammer.com, *.yammerusercontent.com` | **TCP:** 443 -118 | Default<BR>Optional<BR>**Notes:** Yammer CDN | No | `*.assets-yammer.com` | **TCP:** 443 +117 | Default<BR>Optional<BR>**Notes:** Viva Engage | No | `*.yammer.com, *.yammerusercontent.com` | **TCP:** 443 +118 | Default<BR>Optional<BR>**Notes:** Viva Engage CDN | No | `*.assets-yammer.com` | **TCP:** 443 121 | Default<BR>Optional<BR>**Notes:** Planner: auxiliary URLs | No | `www.outlook.com` | **TCP:** 443, 80 122 | Default<BR>Optional<BR>**Notes:** Sway CDNs | No | `eus-www.sway-cdn.com, eus-www.sway-extensions.com, wus-www.sway-cdn.com, wus-www.sway-extensions.com` | **TCP:** 443 124 | Default<BR>Optional<BR>**Notes:** Sway | No | `sway.com, www.sway.com` | **TCP:** 443 |
lighthouse | M365 Lighthouse Whats New | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-whats-new.md | We're continuously adding new features to [Microsoft 365 Lighthouse](m365-lighth > [!NOTE] > Some features get rolled out at different speeds to our customers. If you aren't seeing a feature yet, you should see it soon.+> +> To see which new features are currently available in your partner tenant, go to the **Home** page of Microsoft 365 Lighthouse, and then either select the **What's new** link in the upper-right corner of the page or select **What's new** on the **What's new & learning resources** card. ++## June 2023 ++### Deployment task for managing Windows updates ++You can now deploy Windows update deployment policies to ensure customer tenant devices have the latest security patches, bug fixes, and performance improvements. You'll also gain insight into which tenants are missing the Windows update deployment policies, which tenants are in the process of implementing the policies, and which ones have successfully implemented the policies. ++To learn more, see [Overview of using Microsoft 365 Lighthouse baselines to deploy standard tenant configurations](m365-lighthouse-deploy-standard-tenant-configurations-overview.md). ++### Access to admin centers from Lighthouse ++We've added admin center links to Microsoft 365 Lighthouse so you can more efficiently manage your customers. The admin center links let you to go directly from Lighthouse to the applicable admin center for the selected customer tenant. ++You can access the admin center links from the **Tenants** page or by using the **Tenants** filter that's available throughout Lighthouse. On the **Tenants** page, select the three dots (more actions) next to the customer tenant whose services you want to manage, and then select **Manage services** to open the list of admin center links. To use the **Tenants** filter, open the filter, search for the customer tenant whose services you want to manage, and then select the **>** symbol next to the tenant name to open the list of admin center links. ++To learn more, see [Overview of the Tenants page in Microsoft 365 Lighthouse](m365-lighthouse-tenants-page-overview.md). ++### "What's new" is now customized for your tenant ++Since new features are rolled out gradually across Microsoft 365 Lighthouse partners, we've changed our "What's new" notifications to let you know when new features are available in your partner tenant. ++To see which new features are available in your partner tenant, go to the **Home** page of Lighthouse, and then either select the **What's new** link in the upper-right corner of the page or select **What's new** on the **What's new & learning resources** card. ++For a complete list of the latest features in Lighthouse, which may or may not yet be available in your partner tenant, refer to the list in this article. ++### Risky users for all tenants ++The **Risky users** page has been updated to show risky user information for all your onboarded customer tenants, even if the customer tenants don't have Azure Active Directory Premium P1 or above. For example, if a tenant only has a license for Microsoft Defender for Business or Windows 365 Business, you'll still be able to view the user accounts that have been flagged for risky behavior in that tenant. ++To see this updated functionality, in the left navigation pane in Microsoft 365 Lighthouse, select **Users** > **Risky users**. ++[Go to the Risky users page now](https://lighthouse.microsoft.com/#view/Microsoft_Intune_MTM/RiskyUsers.ReactView) ++To learn more, see [View and manage risky users in Microsoft 365 Lighthouse](m365-lighthouse-view-manage-risky-users.md). ++### Detailed user metrics ++You can now view detailed metrics of all your managed user accounts by going to **Users** > **Account management** > **User metrics**. You can see how many users, licensed users, guest users, Global Administrators, inactive users, and unblocked shared mailboxes you have across your customer tenants. This data can help you more efficiently and more effectively manage user accounts to maintain the health of your customer tenants. ++From the **User metrics** page, you can also quickly access the Microsoft 365 admin center, where you can view comprehensive user information and take additional actions. ++To learn more, see [Overview of the Users page in Microsoft 365 Lighthouse](m365-lighthouse-users-page-overview.md). ## May 2023 |
ms-feed | M365 Feed | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/ms-feed/m365-feed.md | In **Microsoft 365** (previously Office.com), while signed in with a work or sch In **Microsoft Edge**, select the **Microsoft 365** page when opening a new tab. - + See the section *Find your way around* in [Discover and learn with Microsoft Feed](https://support.microsoft.com/en-us/office/discover-and-learn-with-microsoft-feed-9c190800-e348-46b7-9d46-41c628b80ebb) When a user creates and stores a document in a folder in OneDrive, and this fold 2. **How does following work?** -Following is synchronized between Microsoft Feed and Yammer. Following features in Microsoft Feed are only available to users who have a Yammer license. If users don’t have a Yammer license, the My network page is not available, and the users can’t follow others from Microsoft Feed. +Following is synchronized between Microsoft Feed and Viva Engage. Following features in Microsoft Feed are only available to users who have a Viva Engage license. If users don’t have a Viva Engage license, the My network page is not available, and the users can’t follow others from Microsoft Feed. 3. **What's the connection between** [Office Delve](https://delve.office.com) **and Microsoft Feed?** |
security | Mdb Onboard Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-onboard-devices.md | You can use the following methods to onboard mobile devices, such as Android and | Device | Procedure | |:|:|-| Android | 1. On the device, go to the Google Play store.<br/><br/>2. If you haven't already done so, download and install the Microsoft Authenticator app. Sign in, and register your device in the Microsoft Authenticator app. <br/><br/>3. In the Google Play store, search for the Microsoft Defender app. <br/><br/>4. On the app page, scroll down and select **Join the beta** > **Join**.<br/><br/>5. Wait for the process to complete. It might take a few hours for the process of joining the beta program to complete. You'll see text that says, “Joining the beta…”<br/><br/>6. After you've enrolled into the beta, verify that the beta version of the app looks like `1.0.xxxx.0201`, and then install the app.<br/><br/>7. Open the app, sign in, and complete the onboarding process. | +| Android | 1. On the device, go to the Google Play store.<br/><br/>2. If you haven't already done so, download and install the Microsoft Authenticator app. Sign in, and register your device in the Microsoft Authenticator app. <br/><br/>3. In the Google Play store, search for the Microsoft Defender app. <br/><br/>4. On the app page, scroll down and select **Join the beta** > **Join**.<br/><br/>5. Wait for the process to complete. It might take a few hours for the process of joining the beta program to complete. You'll see text that says, "Joining the beta..."<br/><br/>6. After you've enrolled into the beta, verify that the beta version of the app looks like `1.0.xxxx.0201`, and then install the app.<br/><br/>7. Open the app, sign in, and complete the onboarding process. | | iOS | 1. On the device, go to the Apple App Store. <br/><br/>2. If you haven't already done so, download and install the Microsoft Authenticator app. Sign in, and register your device in the Microsoft Authenticator app.<br/><br/>3. In the Apple App Store, search for the Microsoft Defender app.<br/><br/>4. Sign in and install the app. <br/><br/>5. Agree to the terms of use to continue. <br/><br/>6. Allow the Microsoft Defender app to set up a VPN connection and add VPN configurations. <br/><br/>7. Choose whether to allow notifications (such as alerts). | > [!TIP] |
security | Mdb Partners | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-partners.md | Use the links in the following table to access the guide and summary checklist: | Resource | Description | |:|:|-| [Practical guide to security using Microsoft 365 Business (Basic, Standard, and Premium)](https://aka.ms/smbsecurityguide) | This Word document summarizes MicrosoftΓÇÖs recommendations for enabling employees at small and medium-sized businesses to securely work from anywhere- whether from home, in the office or on the go, using the features included in Microsoft 365 Business Premium. | +| [Practical guide to security using Microsoft 365 Business (Basic, Standard, and Premium)](https://aka.ms/smbsecurityguide) | This Word document summarizes Microsoft's recommendations for enabling employees at small and medium-sized businesses to securely work from anywhere- whether from home, in the office or on the go, using the features included in Microsoft 365 Business Premium. | | [Checklist for security with Microsoft 365 Business Premium](https://aka.ms/smbsecuritychecklist) | This checklist includes all the planning and configuration steps covered in the guide, from getting started to configuring security and compliance capabilities, and provides general recommendations for each step. | ## Integrate Microsoft endpoint security with your RMM tools and PSA software |
security | Android Support Signin | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-support-signin.md | Xiaomi changed the battery optimization permissions in Android 11. Defender for **Solution:** 1. Install MDE app in personal profile. (Sign-in is not required.) 2. Open the Company Portal and tap on Settings. -3. Go to the Battery Optimization section, tap on the ΓÇ£Turn OffΓÇ¥ button, and then click on ΓÇ£AllowΓÇ¥ to turn Battery Optimization off for the Company Portal. -4. Again, go to the Battery Optimization section and tap on the ΓÇ£Turn OnΓÇ¥ button. The battery saver section opens. +3. Go to the Battery Optimization section, tap on the "Turn Off" button, and then click on "Allow" to turn Battery Optimization off for the Company Portal. +4. Again, go to the Battery Optimization section and tap on the "Turn On" button. The battery saver section opens. 5. Find the Defender app and tap on it. -6. Select ΓÇ£No RestrictionΓÇ¥. Go back to the Defender app in work profile and tap on "Allow" button. +6. Select "No Restriction". Go back to the Defender app in work profile and tap on "Allow" button. 7. The application should not be uninstalled from personal profile for this to work. |
security | Configure Conditional Access | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-conditional-access.md | Take the following steps to enable Conditional Access: 6. Select **Enable policy**, and then **Create** to save your changes. > [!NOTE]-> You can use the Microsoft Defender for Endpoint app along with the Approved Client app and Compliant Device (Require device to be marked as compliant) controls in Azure AD Conditional Access policies. There's no exclusion required for the Microsoft Defender for Endpoint app while setting up Conditional Access. Although Microsoft Defender for Endpoint on Android & iOS (App ID - dd47d17a-3194-4d86-bfd5-c6ae6f5651e3) isn't an approved app, it is able to report device security posture in both these grant permissions. However, internally Defender requests **MSGraph/User.read** scope and **Intune Tunnel** scope (in case of Defender+Tunnel scenarios). So these scopes must be excluded*. To exclude MSGraph/User.read scope, any one cloud app can be excluded. To exclude Tunnel scope, you need to exclude ΓÇÿMicrosoft Tunnel GatewayΓÇÖ.These permission and exclusions enables the flow for compliance information to Conditional Access. +> You can use the Microsoft Defender for Endpoint app along with the Approved Client app and Compliant Device (Require device to be marked as compliant) controls in Azure AD Conditional Access policies. There's no exclusion required for the Microsoft Defender for Endpoint app while setting up Conditional Access. Although Microsoft Defender for Endpoint on Android & iOS (App ID - dd47d17a-3194-4d86-bfd5-c6ae6f5651e3) isn't an approved app, it is able to report device security posture in both these grant permissions. However, internally Defender requests **MSGraph/User.read** scope and **Intune Tunnel** scope (in case of Defender+Tunnel scenarios). So these scopes must be excluded*. To exclude MSGraph/User.read scope, any one cloud app can be excluded. To exclude Tunnel scope, you need to exclude 'Microsoft Tunnel Gateway'.These permission and exclusions enables the flow for compliance information to Conditional Access. -*Please note that applying a Conditional Access policy to All Cloud Apps could inadvertently block user access in some cases, so itΓÇÖs not recommended. Read more about [Conditional Access policies on Cloud Apps](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#all-cloud-apps) +*Please note that applying a Conditional Access policy to All Cloud Apps could inadvertently block user access in some cases, so it's not recommended. Read more about [Conditional Access policies on Cloud Apps](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#all-cloud-apps) For more information, see [Enforce compliance for Microsoft Defender for Endpoint with Conditional Access in Intune](/intune/advanced-threat-protection). |
security | Configure Server Exclusions Microsoft Defender Antivirus | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus.md | Title: Configure Microsoft Defender Antivirus exclusions on Windows Server description: Windows Server includes automatic exclusions, based on server role. You can also add custom exclusions.-keywords: exclusions, server, auto-exclusions, automatic, custom, scans, Microsoft Defender Antivirus -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium Previously updated : 11/28/2022 Last updated : 07/12/2023 search.appverid: met150 - Microsoft Defender Antivirus **Platforms**+ - Windows -Microsoft Defender Antivirus on Windows Server 2016 and Windows Server 2019 automatically enrolls you in certain exclusions, as defined by your specified server role. These exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md). +This article describes exclusions for Windows Server 2016 and later. Because Microsoft Defender Antivirus is built into Windows Server 2016 and later, exclusions for operating system files and server roles happen automatically. If necessary, you can define custom exclusions or opt out of automatic exclusions. -In addition to server role-defined automatic exclusions, you can add or remove custom exclusions. To do that, refer to these articles: -- [Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md)-- [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md)+For a more detailed overview of exclusions, see [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md). -## A few points to keep in mind +## A few important points about exclusions on Windows Server - Custom exclusions take precedence over automatic exclusions. - Automatic exclusions only apply to [real-time protection (RTP)](configure-protection-features-microsoft-defender-antivirus.md) scanning. In addition to server role-defined automatic exclusions, you can add or remove c - Appropriate exclusions must be set for software that isn't included with the operating system. - Windows Server 2012 R2 doesn't have Microsoft Defender Antivirus as an installable feature. When you onboard those servers to Defender for Endpoint, you'll install Microsoft Defender Antivirus, and default exclusions for operating system files are applied. However, exclusions for server roles (as specified below) don't apply automatically, and you should configure these exclusions as appropriate. To learn more, see [Onboard Windows servers to the Microsoft Defender for Endpoint service](configure-server-endpoints.md). -This article provides an overview of exclusions for Microsoft Defender Antivirus on Windows Server 2016 or later. --Because Microsoft Defender Antivirus is built into Windows Server 2016 and later, exclusions for operating system files and server roles happen automatically. However, you can define custom exclusions. You can also opt out of automatic exclusions if necessary. --This article includes the following sections: --|Section|Description| -||| -|[Automatic exclusions on Windows Server 2016 or later](#automatic-exclusions-on-windows-server-2016-or-later)|Describes the two main types of automatic exclusions and includes a detailed list of automatic exclusions| -|[Opting out of automatic exclusions](#opting-out-of-automatic-exclusions)|Includes important considerations and procedures describing how to opt out of automatic exclusions| -|[Defining custom exclusions](#defining-custom-exclusions)|Provides links to how-to information for defining custom exclusions| - ## Automatic exclusions on Windows Server 2016 or later -On Windows Server 2016 or later, you shouldn't need to define the following exclusions: +On Windows Server 2016 or later, you shouldn't need to define the following exclusions for Microsoft Defender Antivirus: - Operating system files - Server roles and any files that are added through server roles -Because Microsoft Defender Antivirus is built in, it doesn't require exclusions for operating system files on Windows Server 2016 or later. In addition, when you run Windows Server 2016 or later and install a role, Microsoft Defender Antivirus includes automatic exclusions for the server role and any files that are added while installing the role. +Because Microsoft Defender Antivirus is built into Windows Server 2016 and later, it doesn't require exclusions for operating system files. In addition, when you install a role on Windows Server 2016 or later, Microsoft Defender Antivirus includes automatic exclusions for the server role and any files that are added while installing the role. Operating system exclusions and server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md). Operating system exclusions and server role exclusions don't appear in the stand > Automatic exclusions can apply if your servers running Windows Server 2012 R2 are onboarded to Defender for Endpoint. For more information, see [Onboard Windows servers to the Microsoft Defender for Endpoint service](configure-server-endpoints.md). > Automatic exclusions for server roles and operating system files do not apply to Windows Server 2012. - ### The list of automatic exclusions The following sections contain the exclusions that are delivered with automatic exclusions file paths and file types. |
security | Defender Endpoint Antivirus Exclusions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-antivirus-exclusions.md | Title: Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus description: Learn about exclusions for Defender for Endpoint and Microsoft Defender Antivirus. Suppress alerts, submit files for analysis, and define exclusions and indicators to reduce noise and risk for your organization. -ms.sitesec: library + ms.localizationpriority: medium-+ Previously updated : 06/19/2023 Last updated : 07/12/2023 - - m365-security - tier2 The following table summarizes exclusion types that can be defined for Defender | Product/service | Exclusion types | |:|:-|-| [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) <br/>[Defender for Endpoint Plan 1 or Plan 2](defender-endpoint-plan-1-2.md) | - [Automatic exclusions](#automatic-exclusions) (for Windows Server 2016 and later)<br/>- [Custom exclusions](#custom-exclusions), such as process-based exclusions, folder location-based exclusions, file extension exclusions, or contextual file and folder exclusions<br/>- [Custom remediation actions](#custom-remediation-actions) based on threat severity or for specific threats<br/><br/>*The standalone versions of Defender for Endpoint Plan 1 and Plan 2 don't include server licenses. To onboard servers, you'll need another license, such as [Microsoft Defender for Servers Plan 1 or 2](/azure/defender-for-cloud/defender-for-servers-introduction). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).*<br/><br/>*If you're a small or medium-sized business using [Microsoft Defender for Business](../defender-business/mdb-overview.md), you can get [Microsoft Defender for Business servers](../defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).* | +| [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) <br/>[Defender for Endpoint Plan 1 or Plan 2](defender-endpoint-plan-1-2.md) | - [Automatic exclusions](#automatic-exclusions) (for Windows Server 2016 and later)<br/>- [Custom exclusions](#custom-exclusions), such as process-based exclusions, folder location-based exclusions, file extension exclusions, or contextual file and folder exclusions<br/>- [Custom remediation actions](#custom-remediation-actions) based on threat severity or for specific threats<br/><br/>*The standalone versions of Defender for Endpoint Plan 1 and Plan 2 don't include server licenses. To onboard servers, you'll need another license, such as Microsoft Defender for Endpoint for Servers or [Microsoft Defender for Servers Plan 1 or 2](/azure/defender-for-cloud/defender-for-servers-introduction). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).*<br/><br/>*If you're a small or medium-sized business using [Microsoft Defender for Business](../defender-business/mdb-overview.md), you can get [Microsoft Defender for Business servers](../defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).* | | [Defender for Endpoint Plan 1 or Plan 2](defender-endpoint-plan-1-2.md) | - [Indicators](#defender-for-endpoint-indicators) for files, certificates, or IP addresses, URLs/domains<br/>- [Attack surface reduction exclusions](#attack-surface-reduction-exclusions)<br/>- [Controlled folder access exclusions](#controlled-folder-access-exclusions) | | [Defender for Endpoint Plan 2](microsoft-defender-endpoint.md) | [Automation folder exclusions](#automation-folder-exclusions) (for automated investigation and remediation) | |
security | Defender Endpoint Subscription Settings | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-subscription-settings.md | A [mixed-licensing scenario](defender-endpoint-plan-1-2.md#mixed-licensing-scena ## Set your tenant to mixed mode and tag devices > [!IMPORTANT]-> - **Mixed-mode settings apply to client endpoints only**. Tagging server devices wonΓÇÖt change their subscription state. All server devices running Windows Server or Linux should have appropriate licenses, such as [Defender for Servers](/azure/defender-for-cloud/plan-defender-for-servers-select-plan). See [Options for onboarding servers](defender-endpoint-plan-1-2.md#options-for-onboarding-servers). +> - **Mixed-mode settings apply to client endpoints only**. Tagging server devices won't change their subscription state. All server devices running Windows Server or Linux should have appropriate licenses, such as [Defender for Servers](/azure/defender-for-cloud/plan-defender-for-servers-select-plan). See [Options for onboarding servers](defender-endpoint-plan-1-2.md#options-for-onboarding-servers). > - **Make sure to follow the procedures in this article to try mixed-license scenarios in your environment**. Assigning user licenses in the Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com)) doesn't set your tenant to mixed mode. > - Make sure that you have opted in to receive [preview features](preview.md). > - **You should have active trial or paid licenses for both Defender for Endpoint Plan 1 and Plan 2**. A [mixed-licensing scenario](defender-endpoint-plan-1-2.md#mixed-licensing-scena 1. As an admin, go to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in. -2. Go to **Settings** > **Endpoints** > **Licenses**. Your usage report opens and displays information about your organizationΓÇÖs Defender for Endpoint licenses. +2. Go to **Settings** > **Endpoints** > **Licenses**. Your usage report opens and displays information about your organization's Defender for Endpoint licenses. 3. Under **Subscription state**, select **Manage subscription settings**. |
security | Deployment Strategy | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/deployment-strategy.md | Last updated 12/18/2020 > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-secopsdashboard-abovefoldlink) -YouΓÇÖve already completed steps to set up your Microsoft Defender for Endpoint deployment and assigned roles and permissions for Defender for Endpoint. Next, plan for onboarding your devices by identifying your architecture and choosing your deployment method. +You've already completed steps to set up your Microsoft Defender for Endpoint deployment and assigned roles and permissions for Defender for Endpoint. Next, plan for onboarding your devices by identifying your architecture and choosing your deployment method. We understand that every enterprise environment is unique, so we've provided several options to give you the flexibility in choosing how to deploy the service. Deciding how to onboard endpoints to the Defender for Endpoint service comes down to two important steps: |
security | Device Health Microsoft Defender Antivirus Health | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-health-microsoft-defender-antivirus-health.md | Up-to-date reporting generates information for devices that meet the following c - Engine version: 1.1.19300.2+ - Platform version: 4.18.2202.1+ - Cloud protection enabled-- Sense (MsSense.exe): **10.8210.** \*+ΓÇ»+- Sense (MsSense.exe): **10.8210.** \*+ - Windows OS - Windows 10 1809 or later > [!NOTE] |
security | Get Authenticated Scan Properties | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-authenticated-scan-properties.md | scannerAgent|Object|An object representing the scanner agent, contains the machi ### Authentication parameters object properties -Property|Data type|Description and  +Property|Data type|Description :|:|: @odata.type|Enum|The scan type authentication parameters. Possible values are: "#microsoft.windowsDefenderATP.api.SnmpAuthParams" for "Network" scan type, and "#microsoft.windowsDefenderATP.api.WindowsAuthParams" for "Windows" scan type. type|Enum|The authentication method. Possible values vary based on @odata.type property. <br/> - If @odata.type is "SnmpAuthParams", possible values are "CommunityString", "NoAuthNoPriv", "AuthNoPriv", "AuthPriv". <br/> - If @odata.type is "WindowsAuthParams" possible values are "Kerberos" or "Negotiate". |
security | Get Security Baselines Assessment Configurations | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-security-baselines-assessment-configurations.md | If successful, this method returns 200 OK with the list of baseline configuratio |`cce`|Int|The CCE for this configuration as it appears in the benchmark. |rationale |String|The rationale for this configuration as it appears in the benchmark. For STIG benchmark this isn't supplied for this configuration. |source|Array [String]| Array of the registry paths or other locations used to determine the current device setting.-|recommendedValue|Array [String]|Array of the recommended value for each source returned in the ΓÇÿsourceΓÇÖ property array (values returned in the same order as the source property array). +|recommendedValue|Array [String]|Array of the recommended value for each source returned in the 'source' property array (values returned in the same order as the source property array). |remediation|String| The recommended steps to remediate. |isCustom|Boolean| True if the configuration is customized, false if not. |
security | Internet Facing Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/internet-facing-devices.md | Last updated 07/10/2023 > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-respondmachine-abovefoldlink) -As threat actors continuously scan the web to detect exposed devices they can exploit to gain a foothold in internal corporate networks, mapping your organization’s external attack surface is a key part of your security posture management. Devices that can be connected to or are approachable from the outside pose a threat to your organization. +As threat actors continuously scan the web to detect exposed devices they can exploit to gain a foothold in internal corporate networks, mapping your organization's external attack surface is a key part of your security posture management. Devices that can be connected to or are approachable from the outside pose a threat to your organization. Microsoft Defender for Endpoint automatically identifies and flags onboarded, exposed, internet-facing devices in the [Microsoft 365 Defender portal](https://security.microsoft.com/). This critical information provides increased visibility into an organization's external attack surface and insights into asset exploitability. Use this query to find all devices that are internet facing. DeviceInfo | where Timestamp > ago(7d) | where IsInternetFacing-| extend InternetFacingInfo  = AdditionalFields +| extend InternetFacingInfo = AdditionalFields | extend InternetFacingReason = extractjson("$.InternetFacingReason", InternetFacingInfo, typeof(string)), InternetFacingLocalPort = extractjson("$.InternetFacingLocalPort", InternetFacingInfo, typeof(int)), InternetFacingScannedPublicPort = extractjson("$.InternetFacingPublicScannedPort", InternetFacingInfo, typeof(int)), InternetFacingScannedPublicIp = extractjson("$.InternetFacingPublicScannedIp", InternetFacingInfo, typeof(string)), InternetFacingLocalIp = extractjson("$.InternetFacingLocalIp", InternetFacingInfo, typeof(string)), InternetFacingTransportProtocol=extractjson("$.InternetFacingTransportProtocol", InternetFacingInfo, typeof(string)), InternetFacingLastSeen = extractjson("$.InternetFacingLastSeen", InternetFacingInfo, typeof(datetime)) | summarize arg_max(Timestamp, *) by DeviceId ``` -This query returns the following fields for each internet-facing device with their aggregated evidence in the “AdditionalFields” column. +This query returns the following fields for each internet-facing device with their aggregated evidence in the "AdditionalFields" column. - **InternetFacingReason**: Whether the device was detected by an external scan or received incoming communication from the internet - **InternetFacingLocalIp**: The local IP address of the internet facing interface Use the following query for devices tagged with the reason **This device receive ```kusto // Use this function to obtain the device incoming communication from public IP addresses // Input:-// DeviceId – the device ID that you want to investigate. +// DeviceId - the device ID that you want to investigate. // The function will return the last 7 days of data.-InboundExternalNetworkEvents(“<DeviceId>”) +InboundExternalNetworkEvents("<DeviceId>") ``` >[!Note] |
security | Investigate Files | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-files.md | See [take response action on a file](respond-file-alerts.md) for more informatio ## File page overview -The file page offers an overview of the fileΓÇÖs details and attributes, the incidents and alerts where the file is seen, file names used, the number of devices where the file was seen in the last 30 days, including the dates when the file was first and last seen in the organization, Virus Total detection ratio, Microsoft Defender Antivirus detection, the number of cloud apps connected to the file, and the fileΓÇÖs prevalence in devices outside of the organization. +The file page offers an overview of the file's details and attributes, the incidents and alerts where the file is seen, file names used, the number of devices where the file was seen in the last 30 days, including the dates when the file was first and last seen in the organization, Virus Total detection ratio, Microsoft Defender Antivirus detection, the number of cloud apps connected to the file, and the file's prevalence in devices outside of the organization. > [!NOTE] > Different users may see dissimilar values in the *devices in organization* section of the file prevalence card. This is because the card displays information based on the role-based access control (RBAC) scope that a user has. This means if a user has been granted visibility on a specific set of devices, they will only see the file organizational prevalence on those devices. You can click on a device on the list to explore the full six months file histor > [!NOTE] > The Defender for Cloud Apps workload must be enabled to see file information related to cloud apps. -This section shows all the cloud applications where the file is observed. It also includes information like the fileΓÇÖs names, the users associated with the app, the number of matches to a specific cloud app policy, associated appsΓÇÖ names, when the file was last modified, and the fileΓÇÖs path. +This section shows all the cloud applications where the file is observed. It also includes information like the file's names, the users associated with the app, the number of matches to a specific cloud app policy, associated apps' names, when the file was last modified, and the file's path. :::image type="content" source="../../media/investigate-files/investigatefiles-cloudapps.png" alt-text="Screenshot of the cloud apps page within a file" lightbox="../../media/investigate-files/investigatefiles-cloudapps.png"::: The **File names** tab lists all names the file has been observed to use, within > [!NOTE] > The file content and capabilities views depend on whether Microsoft analyzed the file. -The File content tab lists information about portable executable (PE) files, including process writes, process creation, network activities, file writes, file deletes, registry reads, registry writes, strings, imports, and exports. This tab also lists all the fileΓÇÖs capabilities. +The File content tab lists information about portable executable (PE) files, including process writes, process creation, network activities, file writes, file deletes, registry reads, registry writes, strings, imports, and exports. This tab also lists all the file's capabilities. :::image type="content" source="../../media/investigate-files/investigatefiles-filecontent.png" alt-text="Screenshot of a file's content" lightbox="../../media/investigate-files/investigatefiles-filecontent.png"::: -The file capabilities view lists a fileΓÇÖs activities as mapped to the MITRE ATT&CKΓäó techniques. +The file capabilities view lists a file's activities as mapped to the MITRE ATT&CKΓäó techniques. :::image type="content" source="../../media/investigate-files/investigatefiles-filecapabilities.png" alt-text="Screenshot of a file's capabilities" lightbox="../../media/investigate-files/investigatefiles-filecapabilities.png"::: |
security | Ios Configure Features | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-configure-features.md | This configuration is available for both the enrolled (MDM) devices as well as u 1. **Disable Web Protection(MDM)** Use the following steps to disable **Web Protection** for enrolled devices. - - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**. - - Give the policy a name, **Platform > iOS/iPadOS**. + - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \> **Add** \> **Managed devices**. + - Give the policy a name, **Platform \> iOS/iPadOS**. - Select Microsoft Defender for Endpoint as the target app. - In Settings page, select Use configuration designer and add **WebProtection** as the key and value type as **String**. - By default, **WebProtection= true**. This configuration is available for both the enrolled (MDM) devices as well as u 1. **Disable Web Protection(MAM)** Use the following steps to disable **Web Protection** for unenrolled devices. - - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed apps**. + - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \> **Add** \> **Managed apps**. - Give the policy a name. - Under the Select Public Apps, choose Microsoft Defender for Endpoint as the target app. - In Settings page, under the General Configuration Settings, add **WebProtection** as the key and value as **false**. Network protection in Microsoft Defender for endpoint is disabled by default. Ad Follow the below steps for setting up MDM configuration for enrolled devices for Network protection. -1. In the Microsoft Intune admin center, navigate to **Apps** > **App configuration policies** > **Add** > **Managed devices**. +1. In the Microsoft Intune admin center, navigate to **Apps** \> **App configuration policies** \> **Add** \> **Managed devices**. 1. Provide name and description for the policy. In Platform choose **iOS/iPad**. 1. In targeted app choose **Microsoft Defender for Endpoint**. 1. In the Settings page, choose configuration settings format **Use configuration designer**. Follow the below steps for setting up MDM configuration for enrolled devices for Follow the below steps for setting up MAM config for unenrolled devices for Network protection (Authenticator device registration is required for MAM configuration) in iOS devices. Network Protection initialization will require the end user to open the app once. -1. In the Microsoft Intune admin center, navigate to **Apps** > **App configuration policies** > **Add** > **Managed apps** > **Create a new App configuration policy**. +1. In the Microsoft Intune admin center, navigate to **Apps** \> **App configuration policies** \> **Add** \> **Managed apps** \> **Create a new App configuration policy**. :::image type="content" source="images/addiosconfig.png" alt-text="Add configuration policy." lightbox="images/addiosconfig.png"::: Customers can now enable privacy control for the phish report sent by Microsoft 1. **Admin Privacy Controls (MDM)** Use the following steps to enable privacy and not collect the domain name as part of the phish alert report for enrolled devices. - - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**. + - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \> **Add** \> **Managed devices**. - - Give the policy a name, **Platform > iOS/iPadOS**, select the profile type. + - Give the policy a name, **Platform \> iOS/iPadOS**, select the profile type. - Select **Microsoft Defender for Endpoint** as the target app. Customers can now enable privacy control for the phish report sent by Microsoft 1. **Admin Privacy Controls (MAM)** Use the following steps to enable privacy and not collect the domain name as part of the phish alert report for unenrolled devices. - - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed apps**. + - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \> **Add** \> **Managed apps**. - Give the policy a name. Customers can now enable privacy control for the phish report sent by Microsoft 1. **End User Privacy Controls** These controls help the end user to configure the information shared to their organization. - For Supervised devices, End User controls will not be visible. Admin will decide and controls the settings.- - However, for Unsupervised devices, the control will be displayed under the **Settings > Privacy**. + - However, for Unsupervised devices, the control will be displayed under the **Settings \> Privacy**. - Users will see a toggle for **Unsafe Site Info**. - This toggle is only visible if Admin has set **DefenderExcludeURLInReport = true**. - If enabled by Admin, Users can decide if they want to send the unsafe site info to their Organization or not. Microsoft Defender for Endpoint on iOS enables **Optional Permissions** in the o 1. **Admin flow (MDM)** Use the following steps to enable **Optional VPN** permission for enrolled devices. - - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**. + - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \> **Add** \> **Managed devices**. - - Give the policy a name, select **Platform > iOS/iPadOS**. + - Give the policy a name, select **Platform \> iOS/iPadOS**. - Select **Microsoft Defender for Endpoint** as the target app. To protect corporate data from being accessed on jailbroken iOS devices, we reco Follow the steps below to create a compliance policy against jailbroken devices. -1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Compliance policies** > **Create Policy**. Select "iOS/iPadOS" as platform and click **Create**. +1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** \> **Compliance policies** \> **Create Policy**. Select "iOS/iPadOS" as platform and click **Create**. :::image type="content" source="images/ios-jb-policy.png" alt-text="The Create Policy tab" lightbox="images/ios-jb-policy.png"::: Defender for Endpoint on iOS supports vulnerability assessments of apps only for 1. Ensure the device is configured in the [Supervised mode](ios-install.md#complete-deployment-for-supervised-devices). -1. To enable the feature in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint Security** > **Microsoft Defender for Endpoint** > **Enable App sync for iOS/iPadOS devices**. +1. To enable the feature in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint Security** \> **Microsoft Defender for Endpoint** \> **Enable App sync for iOS/iPadOS devices**. :::image type="content" source="images/tvm-app-sync-toggle.png" alt-text="App sync toggleSup" lightbox="images/tvm-app-sync-toggle.png"::: Defender for Endpoint on iOS supports vulnerability assessments of apps only for ### On an Unsupervised Device -1. To enable the feature in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint Security** > **Microsoft Defender for Endpoint** > **Enable App sync for iOS/iPadOS devices**. +1. To enable the feature in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint Security** \> **Microsoft Defender for Endpoint** \> **Enable App sync for iOS/iPadOS devices**. :::image type="content" source="images/tvm-app-sync-toggle.png" alt-text="App sync toggle" lightbox="images/tvm-app-sync-toggle.png"::: Defender for Endpoint on iOS supports vulnerability assessments of apps only for :::image type="content" source="images/tvm-full-app-data.png" alt-text="Full App Data" lightbox="images/tvm-full-app-data.png"::: 1. Use the following steps to configure the privacy setting.- - Go to **Apps** > **App configuration policies** > **Add** > **Managed devices**. - - Give the policy a name, **Platform** > **iOS/iPadOS**. + - Go to **Apps** \> **App configuration policies** \> **Add** \> **Managed devices**. + - Give the policy a name, **Platform** \> **iOS/iPadOS**. - Select **Microsoft Defender for Endpoint** as the target app. - In Settings page, select Use configuration designer and add **DefenderTVMPrivacyMode** as the key and value type as **String**. - To disable privacy and collect the list of apps installed, enter value as `False` and assign this policy to users. Defender for Endpoint on iOS supports vulnerability assessments of apps only for Once the client versions are deployed to target iOS devices, the processing will start. Vulnerabilities found on those devices will start showing up in the Defender Vulnerability Management dashboard. The processing might take few hours (max 24 hours) to complete. Especially for the entire list of apps to show up in the software inventory. > [!NOTE]-> If you’re using SSL inspection solution within your iOS device, please allow list these domain names **securitycenter.windows.com** (in commercial environment) and **securitycenter.windows.us** (in GCC environment) for TVM feature to work. +> If you're using SSL inspection solution within your iOS device, please allow list these domain names **securitycenter.windows.com** (in commercial environment) and **securitycenter.windows.us** (in GCC environment) for TVM feature to work. ## Disable sign out This configuration is available for both the enrolled (MDM) devices as well as u **For enrolled devices(MDM)** -1. In the Microsoft Intune admin center, navigate to Apps > App configuration policies > Add > Managed devices. -1. Give the policy a name, select Platform > iOS/iPadOS -1. Select Microsoft Defender for Endpoint as the target app. -1. In Settings page, select Use configuration designer and add **DisableSignOut** as the key and value type as **String**. +1. In the Microsoft Intune admin center, navigate to Apps \> App configuration policies \> Add \> Managed devices. +1. Give the policy a name, select Platform \> iOS/iPadOS +1. Select Microsoft Defender for Endpoint as the target app. +1. In Settings page, select Use configuration designer and add **DisableSignOut** as the key and value type as **String**. 1. By default, DisableSignOut = false. 1. Admin needs to make **DisableSignOut = true** to disable the sign-out button in the app. Users will not see the sign out button once the policy is pushed. 1. Click Next and assign this policy to targeted devices/users. **For unenrolled devices(MAM)** -1. In the Microsoft Intune admin center, navigate to Apps > App configuration policies > Add > Managed apps. +1. In the Microsoft Intune admin center, navigate to Apps \> App configuration policies \> Add \> Managed apps. 1. Give the policy a name.-1. Under the Select Public Apps, choose Microsoft Defender for Endpoint as the target app. -1. In Settings page, add **DisableSignOut** as the key and value as **true**, under the General Configuration Settings. +1. Under the Select Public Apps, choose Microsoft Defender for Endpoint as the target app. +1. In Settings page, add **DisableSignOut** as the key and value as **true**, under the General Configuration Settings. 1. By default, DisableSignOut = false. 1. Admin needs to make **DisableSignOut = true** to disable the sign-out button in the app. Users will not see the sign out button once the policy is pushed. 1. Click Next and assign this policy to targeted devices/users. Customers now have the option to configure the ability to send feedback data to Use the following steps to configure the option to send feedback data to Microsoft: -1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**. +1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \> **Add** \> **Managed devices**. -1. Give the policy a name, and select **Platform > iOS/iPadOS** as the profile type. +1. Give the policy a name, and select **Platform \> iOS/iPadOS** as the profile type. 1. Select **Microsoft Defender for Endpoint** as the target app. Use the following steps to configure the option to send feedback data to Microso - To remove the ability of end-users to provide feedback, set the value as `false` and assign this policy to users. By default, this value is set to `true`. For US Government customers, the default value is set to 'false'. - - For users with key set as `true`, there will be an option to send Feedback data to Microsoft within the app (**Menu** > **Help & Feedback** > **Send Feedback to Microsoft**). + - For users with key set as `true`, there will be an option to send Feedback data to Microsoft within the app (**Menu** \> **Help & Feedback** \> **Send Feedback to Microsoft**). 1. Select **Next** and assign this profile to targeted devices/users. |
security | Linux Preferences | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-preferences.md | By default, NFS and Fuse are unmonitored from RTP, Quick, and Full scans. Howeve ||| |**Key**|unmonitoredFilesystems| |**Data type**|Array of strings|-|**Comments**|Configured filesystem will be unmonitored only if it is present in Microsoft's list of permitted unmonitored filesystems.| +|**Comments**|Configured filesystem will be unmonitored only if it is present in Microsoft's list of permitted unmonitored filesystems.| #### Configure file hash computation feature |
security | Mac Device Control Intune | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-intune.md | Microsoft Defender for Endpoint Device Control feature enables you to audit, all ## Licensing requirements -Before you get started with Removable Storage Access Control, you must confirm yourΓÇ»[Microsoft 365 subscription](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans?rtc=3). To access and use Removable Storage Access Control, you must have Microsoft 365 E3. +Before you get started with Removable Storage Access Control, you must confirm your [Microsoft 365 subscription](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans?rtc=3). To access and use Removable Storage Access Control, you must have Microsoft 365 E3. ## Deploy policy by using Intune ### Step 1: Build mobileconfig file -Now, you have ΓÇÿgroupsΓÇÖ and ΓÇÿrulesΓÇÖ and ΓÇÿsettingsΓÇÖ, replace the mobileconfig file with those values and put it under the Device Control node, here is the demo file: [mdatp-devicecontrol/demo.mobileconfig at main ┬╖ microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/macOS/mobileconfig/demo.mobileconfig). Make sure validate your policy with the JSON schema to make sure your policy format is correct: [mdatp-devicecontrol/device_control_policy_schema.json at main ┬╖ microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/macOS/policy/device_control_policy_schema.json). +Now, you have 'groups' and 'rules' and 'settings', replace the mobileconfig file with those values and put it under the Device Control node, here is the demo file: [mdatp-devicecontrol/demo.mobileconfig at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/macOS/mobileconfig/demo.mobileconfig). Make sure validate your policy with the JSON schema to make sure your policy format is correct: [mdatp-devicecontrol/device_control_policy_schema.json at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/macOS/policy/device_control_policy_schema.json). > [!NOTE] > See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups. Now, you have ΓÇÿgroupsΓÇÖ and ΓÇÿrulesΓÇÖ and ΓÇÿsettingsΓÇÖ, replace the mobil You can deploy the mobileconfig file through [**https://endpoint.microsoft.com/**](https://endpoint.microsoft.com/) > **Devices** > **macOS**: -- select ΓÇÿCreate profileΓÇÖ-- select ΓÇÿTemplatesΓÇÖ and ΓÇÿCustomΓÇÖ+- select 'Create profile' +- select 'Templates' and 'Custom' :::image type="content" source="images/macos-device-control-intune-mobileconfig.png" alt-text="Shows the Microsoft Endpoint Manager macOS Device Control / Configuration settings page." lightbox="images/macos-device-control-intune-mobileconfig.png"::: |
security | Mac Device Control Jamf | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-jamf.md | Microsoft Defender for Endpoint Device Control feature enables you to audit, all ## Licensing requirements -Before you get started with Removable Storage Access Control, you must confirm yourΓÇ»[Microsoft 365 subscription](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans?rtc=3). To access and use Removable Storage Access Control, you must have Microsoft 365 E3. +Before you get started with Removable Storage Access Control, you must confirm your [Microsoft 365 subscription](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans?rtc=3). To access and use Removable Storage Access Control, you must have Microsoft 365 E3. [!INCLUDE [Microsoft Defender for Endpoint third-party tool support](../../includes/support.md)] Before you get started with Removable Storage Access Control, you must confirm y ### Step 1: Create policy JSON -Now, you have ΓÇÿgroupsΓÇÖ and ΓÇÿrulesΓÇÖ and ΓÇÿsettingsΓÇÖ, combine ΓÇÿsettingsΓÇÖ and ΓÇÿgroupsΓÇÖ and rules into one JSON, here is the demo file: [mdatp-devicecontrol/deny_removable_media_except_kingston.json at main ┬╖ microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/macOS/policy/examples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [mdatp-devicecontrol/device_control_policy_schema.json at main ┬╖ microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/macOS/policy/device_control_policy_schema.json). +Now, you have 'groups' and 'rules' and 'settings', combine 'settings' and 'groups' and rules into one JSON, here is the demo file: [mdatp-devicecontrol/deny_removable_media_except_kingston.json at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/macOS/policy/examples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [mdatp-devicecontrol/device_control_policy_schema.json at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/macOS/policy/device_control_policy_schema.json). See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups. ### Step 2: Update MDE Preferences Schema -The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schemE Preferences configuration profile should be updated to use the new schema fileΓÇÖs content. +The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schemE Preferences configuration profile should be updated to use the new schema file's content. :::image type="content" source="images/macos-device-control-jamf-mde-preferences-schema.png" alt-text="Shows where to edit the Microsoft Defender for Endpoint Preferences Schema to update." lightbox="images/macos-device-control-jamf-mde-preferences-schema.png"::: ### Step 3: Add Device Control Policy to MDE Preferences -A new ΓÇÿDevice ControlΓÇÖ property will now be available to add to the UX. +A new 'Device Control' property will now be available to add to the UX. 1. Select the topmost **Add/Remove properties** button, then select **Device Control** and press **Apply**. |
security | Mac Device Control Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-overview.md | Example 2: [demo.mobileconfig](https://github.com/microsoft/mdatp-devicecontrol/ The Device Control for macOS includes global setting, group creation and access policy rule creation: -- Global setting called ‘settings’ allows you to define the global environment.-- Group called ‘groups’ allows you to create media groups. For example, authorized USB group or encrypted USB group.-- Access policy rule called ‘rules’ allows you to create policy to restrict each group. For example, only allow authorized user to Write access-authorized USB group.+- Global setting called 'settings' allows you to define the global environment. +- Group called 'groups' allows you to create media groups. For example, authorized USB group or encrypted USB group. +- Access policy rule called 'rules' allows you to create policy to restrict each group. For example, only allow authorized user to Write access-authorized USB group. Here are the properties you can use when you create the group and policy. > [!NOTE]-> We recommend you use the examples on the GitHub to understand the properties: [mdatp-devicecontrol/Removable Storage Access Control Samples/macOS/policy at main · microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/tree/main/Removable%20Storage%20Access%20Control%20Samples/macOS/policy). You can also use the scripts at [mdatp-devicecontrol/Removable Storage Access Control Samples/macOS/policy/scripts at main · microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/tree/main/Removable%20Storage%20Access%20Control%20Samples/macOS/policy/scripts) to translate Windows Device Control policy to macOS Device Control policy or translate macOS Device Control V1 policy to this V2 policy. +> We recommend you use the examples on the GitHub to understand the properties: [mdatp-devicecontrol/Removable Storage Access Control Samples/macOS/policy at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/tree/main/Removable%20Storage%20Access%20Control%20Samples/macOS/policy). You can also use the scripts at [mdatp-devicecontrol/Removable Storage Access Control Samples/macOS/policy/scripts at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/tree/main/Removable%20Storage%20Access%20Control%20Samples/macOS/policy/scripts) to translate Windows Device Control policy to macOS Device Control policy or translate macOS Device Control V1 policy to this V2 policy. ### Settings Here are the properties you can use when you create the group and policy. | Property name | Description | Options | |:|:|:|-| `$type` | The kind of group | “device” | +| `$type` | The kind of group | "device" | | `id` | GUID, a unique ID, represents the group and will be used in the policy. | You can generate the ID through [New-Guid (Microsoft.PowerShell.Utility) - PowerShell](/powershell/module/microsoft.powershell.utility/new-guid?view=powershell-7.2&preserve-view=true) or the uuidgen command on macOS | | `name` | Friendly name for the group. | string | | `query` | The media coverage under this group | See the **query** properties tables below for details. | Query type 2 is as follows: | clause $type | value | Description | |:|:|:| | `primaryId` | One of: <br>- `apple_devices`<br>- `removable_media_devices` <br>- `portable_devices` <br>- `bluetooth_devices` | |-| `vendorId` | 4 digit hexadecimal string | Matches a device’s vendor ID | -| `productId` | 4 digit hexadecimal string | Matches a device’s product ID | -| `serialNumber` | string | Matches a device’s serial number. Doesn't match if the device doesn't have a serial number. | +| `vendorId` | 4 digit hexadecimal string | Matches a device's vendor ID | +| `productId` | 4 digit hexadecimal string | Matches a device's product ID | +| `serialNumber` | string | Matches a device's serial number. Doesn't match if the device doesn't have a serial number. | | `encryption` | apfs | Match if a device is apfs-encrypted. | | `groupId` | UUID string | Match if a device is a member of another group. The value represents the UUID of the group to match against. <br> The group must be defined within the policy prior to the clause. | Query type 2 is as follows: | `excludeGroups` | The group(s) that the policy doesn't apply to. | The **id** value inside the group must be used in this instance. If multiple groups are in the excludeGroups, it's _OR_. | | `entries` | One rule can have multiple entries; each entry with a unique GUID tells Device Control one restriction.| See entry properties table later in this article to get the details. | -The following table lists the properties you can use in your entry: +The following table lists the properties you can use in your entry: | Property name | Description | Options | |:|:|:| The following table lists the properties you can use in your entry: | `access`| |Specify one or more access rights for this rule. These may include either device specific granular permissions, or broader generic permissions. See table below for more details on the valid access types for a given entry $type. | | `id`| UUID| | -The following table lists the properties you can use in entry: +The following table lists the properties you can use in entry: ### Enforcement The following table lists the properties you can use in entry: ### Access types -|entry $type | ‘access’ values [string] | Generic Access | Description | +|entry $type | 'access' values [string] | Generic Access | Description | |:|:|:|:| | **appleDevice** | backup_device | generic_read | | | appleDevice | update_device | generic_write | | In this scenario, you need to create two groups: one group for any removable med -1. Create a group to cover any removable media devices -1. Create a group for approved USBs--1. Combine those groups into one ‘groups’+-1. Combine those groups into one 'groups' ```json "groups": [ In this scenario, you need to create two groups: one group for any removable med #### Step 3: Rules: Create Deny policy for unallowed USBs -Create access policy rule and put into ‘rules’: +Create access policy rule and put into 'rules': ```json "rules": [ Create access policy rule and put into ‘rules’: ] ``` -In this case, only have one access rule policy, but if you have multiple, make sure to add all into ‘rules’. +In this case, only have one access rule policy, but if you have multiple, make sure to add all into 'rules'. ## See also |
security | Mac Support License | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-support-license.md | Or if you type "mdatp health" in the terminal without the double quotes, you mig ### Message: ATTENTION: No license found. Contact your administrator for help.\ healthy: false\-health_issues: [ΓÇ£missing licenseΓÇ¥]\ +health_issues: ["missing license"]\ licensed: false ### Cause: |
security | Machines View Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machines-view-overview.md | Filter | Description **Exclusion state** </br> | Filter the list based on whether the device has been excluded or not. For more information, see [Exclude devices](exclude-devices.md). **OS Platform** </br>| Filter by the OS platforms you're interested in investigating </br></br>(_Computers and mobile and IoT devices only_) **First seen** </br> | Filter your view based on when the device was first seen in the network or when it was first reported by the Microsoft Defender for Endpoint sensor.</br></br>(_Computers and mobile and IoT devices only_)-**Windows version** </br> | Filter by the Windows versions you're interested in investigating. If ΓÇÿfuture versionΓÇÖ appears in the Windows version field, it can mean:</br></br> - This is a pre-release build for a future Windows release</br> - The build has no version name</br> - The build version name is not yet supported </br></br> In all these scenarios, where available, the full OS version can be seen in the device details page.</br></br> (_Computers and mobile only_) +**Windows version** </br> | Filter by the Windows versions you're interested in investigating. If 'future version' appears in the Windows version field, it can mean:</br></br> - This is a pre-release build for a future Windows release</br> - The build has no version name</br> - The build version name is not yet supported </br></br> In all these scenarios, where available, the full OS version can be seen in the device details page.</br></br> (_Computers and mobile only_) **Sensor health state** </br> | Filter by the following sensor health states, for devices onboard to Microsoft Defender for Endpoint:</br> - **Active**: Devices that are actively reporting sensor data to the service.</br> - **Inactive**: Devices that have stopped sending signals for more than 7 days. </br> - **Misconfigured**: Devices that have impaired communications with service or are unable to send sensor data. </br> Misconfigured devices can further be classified to: </br> - No sensor data </br> - Impaired communications </br> For more information on how to address issues on misconfigured devices see, [Fix unhealthy sensors](/microsoft-365/security/defender-endpoint/fix-unhealthy-sensors).</br></br> (_Computers and mobile only_) **Onboarding status** </br> | Onboarding status indicates whether the device is currently onboarded to Microsoft Defender for Endpoint or not. Note that device discovery must be enabled for this filter to appear. You can filter by the following states: </br> - **Onboarded**: The endpoint is onboarded to Microsoft Defender for Endpoint. </br> - **Can be onboarded**: The endpoint was discovered in the network as a supported device, but it's not currently onboarded. Microsoft highly recommends onboarding these devices. </br> - **Unsupported**: The endpoint was discovered in the network, but is not supported by Microsoft Defender for Endpoint. </br> - **Insufficient info**: The system couldn't determine the supportability of the device.</br></br> (_Computers and mobile only_) **Antivirus status** </br> | Filter the view based on whether the antivirus status is disabled, not updated or unknown.</br></br> (_Computers and mobile only_) |
security | Mde Device Control Device Installation | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-device-control-device-installation.md | If you disable or don't configure this policy setting, Windows can install and u This policy setting allows you to prevent Windows from installing removable devices. A device is considered removable when the driver for the device to which it's connected indicates that the device is removable. For example, a Universal Serial Bus (USB) device is reported to be removable by the drivers for the USB hub to which the device is connected. By default, this policy setting takes precedence over any other policy setting that allows Windows to install a device. > [!NOTE]-> To enable the **Allow installation of devices using drivers that match these device setup classes**, **Allow installation of devices that match any of these device IDs**, and **Allow installation of devices that match any of these device instance IDs** policy settings to supersede this policy setting for applicable devices, enable the **Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria** policy setting. Also, the allow policy wonΓÇÖt take precedence if the **Block Removable Storage** option is selected in Device Control. +> To enable the **Allow installation of devices using drivers that match these device setup classes**, **Allow installation of devices that match any of these device IDs**, and **Allow installation of devices that match any of these device instance IDs** policy settings to supersede this policy setting for applicable devices, enable the **Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria** policy setting. Also, the allow policy won't take precedence if the **Block Removable Storage** option is selected in Device Control. If you enable this policy setting, Windows is prevented from installing removable devices and existing removable devices cannot have their drivers updated. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of removable devices from a remote desktop client to the remote desktop server. |
security | Mde Sec Ops Guide | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-sec-ops-guide.md | The Microsoft Defender Endpoint should be set up to support your regular securit - **Review threat analytics high-impact threats** Review threat analytics to identify any campaigns that are impacting your environment. - The ΓÇ£High-impact threatsΓÇ¥ table lists the threats that have had the highest impact to the organization. This section ranks threats by the number of devices that have active alerts. See [Track and respond to emerging threats through threat analytics](threat-analytics.md#view-the-threat-analytics-dashboard). + The "High-impact threats" table lists the threats that have had the highest impact to the organization. This section ranks threats by the number of devices that have active alerts. See [Track and respond to emerging threats through threat analytics](threat-analytics.md#view-the-threat-analytics-dashboard). ### Security administration team |
security | Microsoft Defender Antivirus Updates | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates.md | All our updates contain - Platform: **4.18.23060.x** (*final version number coming soon*) - Engine: **1.1.23060.1005** - Support phase: **Security and Critical Updates**-ΓÇ» + ### What's new - Improved output for [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) if scan results fail to retrieve All our updates contain - Platform: **4.18.23050.5** - Engine: **1.1.23050.2** - Support phase: **Security and Critical Updates**-ΓÇ» + ### What's new - Fixed issue that could lead to resolution of incorrect service endpoint All our updates contain - Platform: **4.18.23050.3** - Engine: **1.1.23050.2** - Support phase: **Security and Critical Updates** -ΓÇ» + ### What's new - New version format for Platform and Engine (see the [April-2023 update](#whats-new)) |
security | Microsoft Defender Endpoint Antivirus Performance Mode | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-antivirus-performance-mode.md | ms.sitesec: library ms.pagetype: security ms.localizationpriority: high --++ Last updated 06/06/2023 Performance mode is now available on Windows 11 as a new Microsoft Defender Antivirus capability. Performance mode reduces the performance impact of Microsoft Defender Antivirus scans for files stored on designated _Dev Drive_. The goal of performance mode is to improve functional performance for developers who use Windows 11 devices. -ItΓÇÖs important to note that performance mode can run only on Dev Drive. Additionally, Real-time protection (ΓÇ£OnΓÇ¥) is required for performance mode to function. Enabling this feature on a Dev Drive doesnΓÇÖt change standard Real-time protection running on volumes having operating systems or other volumes formatted FAT32 or NTFS. +It's important to note that performance mode can run only on Dev Drive. Additionally, Real-time protection ("On") is required for performance mode to function. Enabling this feature on a Dev Drive doesn't change standard Real-time protection running on volumes having operating systems or other volumes formatted FAT32 or NTFS. ### Dev Drive For more information about Dev Drive, see: [Set up a Dev Drive on Windows 11](/w ### Performance mode compared to real-time protection -By default, to give the best possible performance, creating a Dev Drive automatically grants trust in the new volume. A _trusted_ Dev Drive volume causes real-time protection to run in a special _asynchronous_ ΓÇ£performance modeΓÇ¥ for that volume. Running performance mode provides a balance between threat protection and performance. The balance is achieved by deferring security scans until after the _open file_ operation has completed, instead of performing the security scan synchronously while the file operation is being processed. This mode of performing security scans inherently provides faster performance, but with less protection. However, enabling performance mode provides significantly better protection than other _performance tuning_ methods such as using folder exclusions, which block security scans altogether. +By default, to give the best possible performance, creating a Dev Drive automatically grants trust in the new volume. A _trusted_ Dev Drive volume causes real-time protection to run in a special _asynchronous_ "performance mode" for that volume. Running performance mode provides a balance between threat protection and performance. The balance is achieved by deferring security scans until after the _open file_ operation has completed, instead of performing the security scan synchronously while the file operation is being processed. This mode of performing security scans inherently provides faster performance, but with less protection. However, enabling performance mode provides significantly better protection than other _performance tuning_ methods such as using folder exclusions, which block security scans altogether. > [!NOTE] > To enable performance mode, Real-time protection must be "On". |
security | Minimum Requirements | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/minimum-requirements.md | Title: Minimum requirements for Microsoft Defender for Endpoint description: Understand the licensing requirements and requirements for onboarding devices to the service -keywords: minimum requirements, licensing, comparison table -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium Previously updated : 06/19/2023 Last updated : 07/12/2023 audience: ITPro For information licensing requirements for Microsoft Defender for Endpoint, see For detailed licensing information, see the [Product Terms site](https://www.microsoft.com/licensing/terms/) and work with your account team to learn more about the terms and conditions. For more information on the array of features in Windows editions, see [Compare Windows editions](https://www.microsoft.com/windowsforbusiness/compare).+ ## Browser requirements Access to Defender for Endpoint is done through a browser, supporting the following browsers: When you run the onboarding wizard for the first time, you must choose where you > - You cannot change your data storage location after the first-time setup. > - Review the [Microsoft Defender for Endpoint data storage and privacy](data-storage-privacy.md) for more information on where and how Microsoft stores your data. +#### IP stack ++IPv4 (Internet Protocol Version 4) stack must be enabled on devices for communication to the Defender for Endpoint cloud service to work as expected. ++Alternatively, if you must use an IPv6-only configuration, consider adding dynamic IPv6/IPv4 transitional mechanisms, such as DNS64/NAT64 to ensure end-to-end IPv6 connectivity to Microsoft 365 without any other network reconfiguration. + #### Internet connectivity Internet connectivity on devices is required either directly or through proxy. |
security | Msda Updates Previous Versions Technical Upgrade Support | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md | Microsoft regularly releases [security intelligence updates and product updates - Security intelligence update version: **1.387.695.0** - Release date: **April 4, 2023 (Engine) / April 11, 2023 (Platform)**-- Platform: **4.18.2303.8** +- Platform: **4.18.2303.8** - Engine: **1.1.20200.4** - Support phase: **Technical upgrade support (only)** ### What's new - Beginning in April 2023, monthly platform and engine version release information (in this article) now includes two dates: Engine and Platform-- Increased file hash support -- Added support to protect registry keys against parent keys abuse -- Improved tamper protection of registry keys against parent keys abuse -- Improved log handling for DLP and Device Control -- Improved performance on developer drives +- Increased file hash support +- Added support to protect registry keys against parent keys abuse +- Improved tamper protection of registry keys against parent keys abuse +- Improved log handling for DLP and Device Control +- Improved performance on developer drives ### Known issues Microsoft regularly releases [security intelligence updates and product updates ### What's new - Fixed attack surface reduction (ASR) rule output with [Get-MpPreference](/powershell/module/defender/get-mppreference)-- Fixed threat DefaultAction outputs in Get-MpPreference -- Improved Defender performance during file copy operations for .NET applications -- Fixed [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management) app block warn feature -- Added opt-in feature to allow users seeing exclusions -- Fixed [ASR](overview-attack-surface-reduction.md) warn policy -- Increased maximum size for quarantine archive file to 4 GB -- Improvements to threat remediation logic -- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) hardening for temporary exclusions -- Fixed time zone calculation in [Defender PowerShell](/powershell/module/defender) module -- Fixed merging logic for exclusions in Defender PowerShell module +- Fixed threat DefaultAction outputs in Get-MpPreference +- Improved Defender performance during file copy operations for .NET applications +- Fixed [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management) app block warn feature +- Added opt-in feature to allow users seeing exclusions +- Fixed [ASR](overview-attack-surface-reduction.md) warn policy +- Increased maximum size for quarantine archive file to 4 GB +- Improvements to threat remediation logic +- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) hardening for temporary exclusions +- Fixed time zone calculation in [Defender PowerShell](/powershell/module/defender) module +- Fixed merging logic for exclusions in Defender PowerShell module - Improvements in the [contextual exclusions](/microsoft-365/security/defender-endpoint/configure-contextual-file-folder-exclusions-microsoft-defender-antivirus) syntax - Improved scheduled scan robustness - Improved serviceability for internal database files Microsoft regularly releases [security intelligence updates and product updates ### Known Issues -- None +- None ## January-2023 (Platform: 4.18.2301.6 | Engine: 1.1.20000.2) Microsoft regularly releases [security intelligence updates and product updates ### Known Issues -- None +- None ## November-2022 (Platform: 4.18.2211.5 | Engine: 1.1.19900.2) -- Security intelligence update version: **1.381.144.0** +- Security intelligence update version: **1.381.144.0** - Release date: **December 8, 2022**-- Platform: **4.18.2211.5** +- Platform: **4.18.2211.5** - Engine: **1.1.19900.2** - Support phase: **Technical upgrade support (only)** Microsoft regularly releases [security intelligence updates and product updates ### Known Issues -- None +- None ## October-2022 (Platform: 4.18.2210.6 | Engine: 1.1.19800.4) Microsoft regularly releases [security intelligence updates and product updates ### What's new - Addressed a quality issue that could result in poor responsiveness/usability-- Improved hang detection in antivirus engine -- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) capability -- Changed threat & vulnerability management (TVM)-warn and TVM-block action to block to resolve Intune's report -- Removed Clean Action from Intune policy for `ThreadSeverityDefaultAction` -- Added randomize scheduled task times configuration to Intune policy -- Added manageability for `DisableSMTPParsing` network protection -- Added improvement for behavior monitoring -- Normalized date format for event 1151 for Windows Defender -- Fixed a deadlock related to updating `\device\cdrom*` exclusions upon mounting a cdrom drive under certain conditions -- Improved PID information for threat detection +- Improved hang detection in antivirus engine +- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) capability +- Changed threat & vulnerability management (TVM)-warn and TVM-block action to block to resolve Intune's report +- Removed Clean Action from Intune policy for `ThreadSeverityDefaultAction` +- Added randomize scheduled task times configuration to Intune policy +- Added manageability for `DisableSMTPParsing` network protection +- Added improvement for behavior monitoring +- Normalized date format for event 1151 for Windows Defender +- Fixed a deadlock related to updating `\device\cdrom*` exclusions upon mounting a cdrom drive under certain conditions +- Improved PID information for threat detection ### Known Issues -- None +- None ## September-2022 (Platform: 4.18.2209.7 | Engine: 1.1.19700.3) Microsoft regularly releases [security intelligence updates and product updates - Improved hardening support for Defender disablement configurations on Server SKUs - Improved Defender configuration logics for [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) on servers - Improved WARN mode for [ASR rule](attack-surface-reduction-rules-reference.md)-- Improved certificate handling of OSX +- Improved certificate handling of OSX - Improved logging for scanning FilesStash location - Beginning with platform version 4.18.2208.0 and later: If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy setting](configure-endpoints-gp.md#update-endpoint-protection-configuration) will no longer completely disable Windows Defender Antivirus on Windows Server 2012 R2 and later operating systems. Instead, it is either ignored (if [ForceDefenderPassiveMode](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) is configured explicitly) or it places Microsoft Defender Antivirus into [passive mode](microsoft-defender-antivirus-windows.md#comparing-active-mode-passive-mode-and-disabled-mode) (if `ForceDefenderPassiveMode` isn't configured). Moreover, [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) allows a switch to active mode via changing `ForceDefenderPassiveMode` to `0`, but not to passive mode. These changes apply only to servers onboarded to Microsoft Defender for Endpoint. For more information, please refer to [Microsoft Defender Antivirus compatibility with other security products](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-compatibility#microsoft-defender-antivirus-and-non-microsoft-antivirusantimalware-solutions) ### Known Issues -- Some customers might have received platform updates 4.18.2209.2 from preview. It can cause the service to get stuck at the start state after the update. +- Some customers might have received platform updates 4.18.2209.2 from preview. It can cause the service to get stuck at the start state after the update. ## August-2022 (Platform: 4.18.2207.7 | Engine: 1.1.19600.3) Microsoft regularly releases [security intelligence updates and product updates ### What's new -- Performance improvement for [hybrid sleep](/windows-hardware/customize/power-settings/sleep-settings-hybrid-sleep) delay when Microsoft Defender Antivirus is active -- Fixed client detection behavior related to custom [certificate blocking indicators of compromise](indicator-certificates.md) -- Performance improvement for [AntiMalware Scan Interface (AMSI)](/windows/win32/amsi/antimalware-scan-interface-portal) caching -- Improved detection and remediation for [Microsoft Visual Basic for Applications](/office/vba/language/concepts/getting-started/64-bit-visual-basic-for-applications-overview) (VBA) related macros -- Improved processing of AMSI exclusions -- Fixed deadlock detection in Host Intrusion Prevention System (HIPS) rule processing. (For more information about HIPS and Defender for Endpoint, see [Migrating from a third-party HIPS to ASR rules](migrating-asr-rules.md).) -- Fixed memory leak where `MsMpEng.exe` was consuming private bytes. (If high CPU usage is also an issue, see [High CPU usage due to Microsoft Defender Antivirus](troubleshooting-mode-scenarios.md)) -- Fixed deadlock with [behavior monitoring](configure-real-time-protection-microsoft-defender-antivirus.md) -- Improved trust validation -- Fixed engine crash issue on legacy operating platforms -- Performance Analyzer v3 updates: Added top path support, scan skip information, and OnDemand scan support. See [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md). +- Performance improvement for [hybrid sleep](/windows-hardware/customize/power-settings/sleep-settings-hybrid-sleep) delay when Microsoft Defender Antivirus is active +- Fixed client detection behavior related to custom [certificate blocking indicators of compromise](indicator-certificates.md) +- Performance improvement for [AntiMalware Scan Interface (AMSI)](/windows/win32/amsi/antimalware-scan-interface-portal) caching +- Improved detection and remediation for [Microsoft Visual Basic for Applications](/office/vba/language/concepts/getting-started/64-bit-visual-basic-for-applications-overview) (VBA) related macros +- Improved processing of AMSI exclusions +- Fixed deadlock detection in Host Intrusion Prevention System (HIPS) rule processing. (For more information about HIPS and Defender for Endpoint, see [Migrating from a third-party HIPS to ASR rules](migrating-asr-rules.md).) +- Fixed memory leak where `MsMpEng.exe` was consuming private bytes. (If high CPU usage is also an issue, see [High CPU usage due to Microsoft Defender Antivirus](troubleshooting-mode-scenarios.md)) +- Fixed deadlock with [behavior monitoring](configure-real-time-protection-microsoft-defender-antivirus.md) +- Improved trust validation +- Fixed engine crash issue on legacy operating platforms +- Performance Analyzer v3 updates: Added top path support, scan skip information, and OnDemand scan support. See [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md). - Defender performance improvements during file copy operations-- Added improvements for [troubleshooting mode](enable-troubleshooting-mode.md) +- Added improvements for [troubleshooting mode](enable-troubleshooting-mode.md) - Added fix for Defender WINEVT channels across update/restarts. (For more information about WINEVT, see [Windows Event Log](/windows/win32/api/_wes/).)-- Added fix for [Defender WMI management](use-wmi-microsoft-defender-antivirus.md) bug during startup/updates -- Added fix for duplicated 2010/2011 in the [Windows Event Viewer Operational events](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus/) -- Added support for [Defender for Endpoint](microsoft-defender-endpoint.md) stack processes token hardening +- Added fix for [Defender WMI management](use-wmi-microsoft-defender-antivirus.md) bug during startup/updates +- Added fix for duplicated 2010/2011 in the [Windows Event Viewer Operational events](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus/) +- Added support for [Defender for Endpoint](microsoft-defender-endpoint.md) stack processes token hardening ### Known Issues Microsoft regularly releases [security intelligence updates and product updates ### What's new -- Added fix for ETW channel configuration for updates -- Added support for contextual exclusions allowing more specific exclusion targeting +- Added fix for ETW channel configuration for updates +- Added support for contextual exclusions allowing more specific exclusion targeting - Fixed context maximum size - Added fix for [ASR LSASS detection](attack-surface-reduction-rules-reference.md) - Added fix to SHSetKnownFolder for rule exclusion logic Microsoft regularly releases [security intelligence updates and product updates ### What's new -- Added fix for an [attack surface reduction rule](attack-surface-reduction.md) that blocked an Outlook add-in -- Added fix for [behavior monitoring](configure-protection-features-microsoft-defender-antivirus.md) performance issue related to short live processes -- Added fix for [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal) exclusion -- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) capabilities +- Added fix for an [attack surface reduction rule](attack-surface-reduction.md) that blocked an Outlook add-in +- Added fix for [behavior monitoring](configure-protection-features-microsoft-defender-antivirus.md) performance issue related to short live processes +- Added fix for [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal) exclusion +- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) capabilities - Added a fix for [real-time protection](configure-protection-features-microsoft-defender-antivirus.md) getting disabled in some cases when using `SharedSignaturesPath` config. For more information about the `SharedSignaturesPath` parameter, see [Set-MpPreference](/powershell/module/defender/set-mppreference). ### Known issues Microsoft regularly releases [security intelligence updates and product updates - Added fix resulting in better fidelity of EDR and Advanced Hunting detection alerts - Defender no longer supports custom notifications on toast pop ups. Modified GPO/Intune/SCCM and docs to reflect this change. - Improvements to capture both information and copy of files written to removable storage. To learn more, see [Microsoft Defender for Endpoint Device Control Removable Storage Access Control, removable storage media](device-control-removable-storage-access-control.md).-- Improved traffic output when SmartScreen service is unreachable +- Improved traffic output when SmartScreen service is unreachable - Connectivity improvements for customers using proxies with authentication requirements-- Fixed VDI device update bug for network FileShares +- Fixed VDI device update bug for network FileShares - EDR in block mode now supports granular device targeting with new CSPs. See [Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md). ### Known issues Microsoft regularly releases [security intelligence updates and product updates - Added new device control status fields under Get-MpComputerStatus in Defender PowerShell module. For more information, see [Microsoft Defender for Endpoint Device Control Removable Storage Access Control](device-control-removable-storage-access-control.md). - Fixed bug in which `SharedSignatureRoot` value couldn't be removed when set with PowerShell - Fixed bug in which [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) failed to be enabled, even though Microsoft Defender for Endpoint indicated that tamper protection was turned on-- Added supportability and bug fixes to performance analyzer for Microsoft Defender Antivirus tool. For more information, see [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md). +- Added supportability and bug fixes to performance analyzer for Microsoft Defender Antivirus tool. For more information, see [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md). - PowerShell ISE support added for `New-MpPerformanceRecording` - Fixed bug errors for `Get-MpPerformanceReport -TopFilesPerProcess` - Fixed performance recording session leak when using `New-MpPerformanceRecording` in PowerShell 7.x, remote sessions, and PowerShell ISE |
security | Supported Capabilities By Platform | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/supported-capabilities-by-platform.md | The following table gives information about the supported Microsoft Defender for |Operating System|Windows 10 & 11|Windows Server 2012 R2 <sup>[1]</sup>, <br> 2016 <sup>[1]</sup>, <br> 2019 & 2022, <br> 1803+|macOS|Linux| ||::|::|::|::| |**Prevention**|||||-|[Attack Surface Reduction rules](attack-surface-reduction.md)||||| -|[Controlled folder access](controlled-folders.md)||||| +|[Attack Surface Reduction](attack-surface-reduction.md)||||| |Device Control||||| |[Firewall](host-firewall-reporting.md)|||||-|[Exploit Protection](exploit-protection.md)||||| |[Network Protection](network-protection.md)||| <sup>[2]</sup>| <sup>[2]</sup>| |[Next-generation protection](next-generation-protection.md)||||| |[Tamper Protection](prevent-changes-to-security-settings-with-tamper-protection.md)||||| |
security | Tamper Resiliency | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/tamper-resiliency.md | audience: ITPro # Protect your organization from the effects of tampering -Tampering is the general term used to describe attackers attempts to impair the effectiveness of Microsoft Defender for Endpoint. The ultimate goal of attackers isn't to affect just one device, but rather to achieve their objective such as launching a ransomware attack. As such, the anti-tampering capabilities of Microsoft Defender for Endpoint extend beyond preventing tampering of a single device to detecting attacks and minimizing their impact. +Tampering is the general term used to describe attackers attempts to impair the effectiveness of Microsoft Defender for Endpoint. The ultimate goal of attackers isn't to affect just one device, but rather to achieve their objective such as launching a ransomware attack. As such, the anti-tampering capabilities of Microsoft Defender for Endpoint extend beyond preventing tampering of a single device to detecting attacks and minimizing their impact. **Applies to:** Tampering is the general term used to describe attackers attempts to impair the ## Organization wide tamper resiliency is built on Zero Trust -The foundation for defending against tampering is following a [Zero Trust](/windows/security/zero-trust-windows-device-health) model. +The foundation for defending against tampering is following a [Zero Trust](/windows/security/zero-trust-windows-device-health) model. - Follow the best practice of least privilege. See [Access control overview for Windows](/windows/security/identity-protection/access-control/access-control). - Configure [Conditional Access policies](/azure/active-directory/conditional-access/overview) to keep untrusted users and devices isolated. In order to provide an effective defense against tampering, devices must be healthy. -- [Onboard devices to Defender for Endpoint](/microsoft-365/security/defender-endpoint/onboard-configure). -- Make sure [security intelligence and antivirus updates](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates) are installed. +- [Onboard devices to Defender for Endpoint](/microsoft-365/security/defender-endpoint/onboard-configure). +- Make sure [security intelligence and antivirus updates](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates) are installed. - Managed devices centrally, such as by [Microsoft Intune](/mem/intune/protect/advanced-threat-protection-configure), [Microsoft Defender for Endpoint Security Configuration Management](/mem/intune/protect/mde-security-integration), or [Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection-configure). > [!NOTE]-> On Windows devices, Microsoft Defender Antivirus can be managed by using Group Policy, Windows Management Instrumentation (WMI), and PowerShell cmdlets. However, those methods are more susceptible to tampering than by using Microsoft Intune, Configuration Manager, or Microsoft Defender for Endpoint Security Configuration Management. +> On Windows devices, Microsoft Defender Antivirus can be managed by using Group Policy, Windows Management Instrumentation (WMI), and PowerShell cmdlets. However, those methods are more susceptible to tampering than by using Microsoft Intune, Configuration Manager, or Microsoft Defender for Endpoint Security Configuration Management. > If you're using Group Policy, we recommend [disabling local overrides for Microsoft Defender Antivirus settings](/microsoft-365/security/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus#configure-local-overrides-for-microsoft-defender-antivirus-settings) and [disabling local list merging](/microsoft-365/security/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus#configure-how-locally-and-globally-defined-threat-remediation-and-exclusions-lists-are-merged). -You can view health status for [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/device-health-microsoft-defender-antivirus-health) health and [sensors](/microsoft-365/security/defender-endpoint/device-health-sensor-health-os) in the [device health reports in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/device-health-reports). +You can view health status for [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/device-health-microsoft-defender-antivirus-health) health and [sensors](/microsoft-365/security/defender-endpoint/device-health-sensor-health-os) in the [device health reports in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/device-health-reports). ## Preventing tampering on a single device Microsoft provides several ways to keep devices well protected and up-to-date ag ### Broadest protection - Microsoft vulnerable driver blocklist -The blocklist is updated with each new major release of Windows, typically 1-2 times per year. Microsoft will occasionally publish future updates through regular Windows servicing. With Windows 11 2022 update, the vulnerable driver blocklist is enabled by default for all devices, but requires either memory integrity (also known as hypervisor-protected code integrity or HVCI), Smart App Control, or S mode to be active. +The blocklist is updated with each new major release of Windows, typically 1-2 times per year. Microsoft will occasionally publish future updates through regular Windows servicing. With Windows 11 2022 update, the vulnerable driver blocklist is enabled by default for all devices, but requires either memory integrity (also known as hypervisor-protected code integrity or HVCI), Smart App Control, or S mode to be active. See [Microsoft vulnerable driver blocklist](/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules#microsoft-vulnerable-driver-blocklist). -For devices that don't meet those requirements, this list of drivers can be blocked by using Windows Defender Application Control policy.  +For devices that don't meet those requirements, this list of drivers can be blocked by using Windows Defender Application Control policy. See [Vulnerable Driver blocklist XML](/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules#microsoft-vulnerable-driver-blocklist). WDAC also provides an audit mode to help understand the impact of applying the p A common technique used by attackers is to make unauthorized changes to anti-virus exclusions. Tamper protection prevents such attacks from occurring when all of the following conditions are met: -- The device is managed by Intune; and +- The device is managed by Intune; and - The device has [Disable Local Admin Merge enabled](/microsoft-365/security/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus#use-microsoft-intune-to-disable-local-list-merging). For more information, see [Tamper protection for antivirus exclusions](/microsoft-365/security/defender-endpoint/manage-tamper-protection-intune#tamper-protection-for-antivirus-exclusions). Attackers can be preventing from discovering existing antivirus exclusions by enabling [HideExclusionsFromLocalAdmin](/windows/client-management/mdm/defender-csp#configurationhideexclusionsfromlocaladmins). -## Detecting potential tampering activity in the Microsoft 365 Defender portal +## Detecting potential tampering activity in the Microsoft 365 Defender portal When tampering is detected, an alert is raised. Some of the alert titles for tampering are: When tampering is detected, an alert is raised. Some of the alert titles for tam - Tamper protection bypass - Tampering activity typical to ransomware attacks - Tampering with Microsoft Defender for Endpoint sensor communication-- Tampering with Microsoft Defender for Endpoint sensor settings +- Tampering with Microsoft Defender for Endpoint sensor settings - Tampering with the Microsoft Defender for Endpoint sensor |
security | Tvm Security Baselines | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-security-baselines.md | By selecting a configuration in the list, you'll see a flyout with compliance de You may have cases where you don't want to assess specific configurations on certain devices. For example, a device could be under third party control or it could have an alternate mitigation already in place. In these situations, you can add exceptions to exclude the assessment of specific configurations on a device. -Devices included in exceptions won't be assessed for the specified configurations in the baseline profiles. This means it won't affect an organizationΓÇÖs metrics and score, and it can help provide organizations with a clearer view of their compliance. +Devices included in exceptions won't be assessed for the specified configurations in the baseline profiles. This means it won't affect an organization's metrics and score, and it can help provide organizations with a clearer view of their compliance. To view exceptions: |
security | Additional Information Xdr | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/additional-information-xdr.md | Last updated 05/29/2023 ## Important considerations for you -To realize the benefits of Microsoft Defender Experts for XDR, you and your security operations center (SOC) team must take note of the following considerations to ensure timely incident remediation, improve your organizationΓÇÖs security posture, and protect your organization from threats. +To realize the benefits of Microsoft Defender Experts for XDR, you and your security operations center (SOC) team must take note of the following considerations to ensure timely incident remediation, improve your organization's security posture, and protect your organization from threats. - **Engage actively through the readiness assessment process** ΓÇô The [readiness assessment](get-started-xdr.md#run-initial-defender-experts-readiness-checks) when onboarding for Defender Experts for XDR is an integral part of the offering. Completing it successfully ensures prompt service coverage and protects your organization against known threats. - **Act on guided responses in a timely manner** ΓÇô For any suspicious incidents and alerts, our experts provide a detailed investigation summary and guided responses for remediation. We expect your SOC team to act on these guided responses in a timely manner to prevent further impact from any malicious attempts. |
security | Advanced Hunting Cloudappevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-cloudappevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - SharePoint Online - Skype for Business - Office 365-- Yammer+- Viva Engage ## Related topics |
security | Advanced Hunting Custom Functions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-custom-functions.md | Use a function in a query by typing its name along with values for any parameter Add a function to the current query by double-clicking on its name or selecting the three dots to the right of the function and selecting **Open in query editor**. -If a query requires arguments, provide them using the following syntax: *function_name(parameter 1, parameter 2, …)* +If a query requires arguments, provide them using the following syntax: *function_name(parameter 1, parameter 2, ...)*  > [!NOTE]-> Functions can’t be used inside another function. +> Functions can't be used inside another function. ## Work with function codes You can view the code of a function either to gain insight into how it works or to modify its code. Select the three dots to the right of the function and select **Load function code** to open a new tab with the function code. Edit the properties of a function by selecting the three dots to the right of th If the function code is already loaded to the editor, you can also select **Save** to apply any changes to the code or properties of the function. > [!NOTE]-> Once a function is in use in a saved query or a detection rule, you can’t edit the function to expand its scope. For example, if you saved a function that queries identity tables, and this function is used in a detection rule, you can’t edit the function to include a device table after the fact. To do that, you can save a new function. Product scoping can be narrowed for the same function but not extended. +> Once a function is in use in a saved query or a detection rule, you can't edit the function to expand its scope. For example, if you saved a function that queries identity tables, and this function is used in a detection rule, you can't edit the function to include a device table after the fact. To do that, you can save a new function. Product scoping can be narrowed for the same function but not extended. |
security | Advanced Hunting Deviceinfo Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceinfo-table.md | For information on other tables in the advanced hunting schema, [see the advance |`OSVersionInfo` | `string` | Additional information about the OS version, such as the popular name, code name, or version number | |`MergedDeviceIds` | `string` | Previous device IDs that have been assigned to the same device | |`MergedToDeviceId` | `string` | The most recent device ID assigned to a device |-|`SensorHealthState` | `string` | Indicates health of the deviceΓÇÖs EDR sensor, if onboarded to Microsoft Defender For Endpoint | +|`SensorHealthState` | `string` | Indicates health of the device's EDR sensor, if onboarded to Microsoft Defender For Endpoint | | `IsExcluded`| `bool` | Determines if the device is currently excluded from Microsoft Defender for Vulnerability Management experiences | |`ExclusionReason` | `string` | Indicates the reason for device exclusion | | `AssetValue`| `string` | Indicates the value of a device as assigned by the user | |
security | Alert Grading Password Spray Attack | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-password-spray-attack.md | This playbook helps investigate cases where suspicious behavior is observed as i The intended results of using this guide are: -- YouΓÇÖve identified the alerts associated with password spray attempts as malicious (TP) or false positive (FP) activities.+- You've identified the alerts associated with password spray attempts as malicious (TP) or false positive (FP) activities. - You've taken the necessary actions to remediate the attack. This section contains step-by-step guidance to respond to the alert and take the - Modifications in Azure environments, like Azure portal subscription changes - Changes to SharePoint Online, like the impacted user account gaining access to multiple sites or files with sensitive/confidential/company-only content - - **Inspect the impacted account's activities that occur within a short time span on multiple platforms and apps.** Audit events to check the timeline of activities, like contrasting the userΓÇÖs time spent reading or sending email followed by allocating resources to the userΓÇÖs account or other accounts. + - **Inspect the impacted account's activities that occur within a short time span on multiple platforms and apps.** Audit events to check the timeline of activities, like contrasting the user's time spent reading or sending email followed by allocating resources to the user's account or other accounts. ### 3. Investigate possible follow-on attacks CloudAppEvents | mv-expand ModifiedProperties = RawEventData.ModifiedProperties | where ModifiedProperties.Name == "StrongAuthenticationRequirement" and ModifiedProperties.OldValue != "[]" and ModifiedProperties.NewValue == "[]" | mv-expand ActivityObject = ActivityObjects-| where ActivityObject.Role == "Target objectΓÇ¥ +| where ActivityObject.Role == "Target object" | extend TargetObjectId = tostring(ActivityObject.Id) | project Timestamp, ReportId, AccountObjectId, ActivityObjects, TargetObjectId ``` Once you determine that the activities associated with this alert are malicious, 2. Revoke access tokens of the compromised account. 3. Use number matching in Microsoft Authenticator to mitigate MFA fatigue attacks. 4. Apply the principle of least privilege. Create accounts with minimum privilege required to complete tasks.-5. Configure blocking based on the senderΓÇÖs IP address and domains if the artifacts are related to email. +5. Configure blocking based on the sender's IP address and domains if the artifacts are related to email. 6. Block URLs or IP addresses (on the network protection platforms) that were identified as malicious during the investigation. ## See also |
security | Auditing | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/auditing.md | Last updated 05/29/2023 As a tenant administrator, you can use Microsoft Purview to search the audit logs for the times Microsoft Defender Experts signed into your tenant and the actions they did there to perform their investigations. You can also search the audit logs for the changes done by your tenant administrators to the Defender Experts settings. -[Audit (Standard)](/microsoft-365/compliance/audit-solutions-overview) is turned on by default for all Microsoft Defender Experts for XDR customers when paid licenses are assigned to the tenant. If you have a trial license, work with your service delivery manager to turn on Audit if it isnΓÇÖt yet. +[Audit (Standard)](/microsoft-365/compliance/audit-solutions-overview) is turned on by default for all Microsoft Defender Experts for XDR customers when paid licenses are assigned to the tenant. If you have a trial license, work with your service delivery manager to turn on Audit if it isn't yet. > [!NOTE] > Make sure you have the right [permissions](/microsoft-365/compliance/audit-log-search#before-you-search-the-audit-log) to search for audit logs. |
security | Before You Begin Xdr | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/before-you-begin-xdr.md | Defender Experts for XDR requests for certain roles and permissions for you to f ## Service availability and data protection -Defender Experts for XDR is a managed extended detection and response service that proactively hunts for threats across endpoints, email, identity, and cloud apps. To carry out hunting on your behalf, Microsoft experts need access to your Microsoft 365 Defender advanced hunting data. Purchasing this service means youΓÇÖre granting permission to Microsoft experts to access the said data. +Defender Experts for XDR is a managed extended detection and response service that proactively hunts for threats across endpoints, email, identity, and cloud apps. To carry out hunting on your behalf, Microsoft experts need access to your Microsoft 365 Defender advanced hunting data. Purchasing this service means you're granting permission to Microsoft experts to access the said data. -The following sections enumerate additional information about the serviceΓÇÖs data usage, compliance, and availability. For more information about Microsoft's commitment in valuing and protecting your data, visit the [Trust Center](https://www.microsoft.com/en-us/trust-center/product-overview) then scroll down to **Additional products and services** > **Managed Security Services** > **[Microsoft Defender Experts](https://aka.ms/trustcenter-defenderexperts)**. +The following sections enumerate additional information about the service's data usage, compliance, and availability. For more information about Microsoft's commitment in valuing and protecting your data, visit the [Trust Center](https://www.microsoft.com/en-us/trust-center/product-overview) then scroll down to **Additional products and services** > **Managed Security Services** > **[Microsoft Defender Experts](https://aka.ms/trustcenter-defenderexperts)**. ### Data collection, usage, and retention |
security | Custom Detection Rules | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-detection-rules.md | To manage custom detections, you need to be assigned one of these roles: - **Security operator**ΓÇöUsers with this [Azure Active Directory role](/azure/active-directory/roles/permissions-reference#security-operator) can manage alerts and have global read-only access to security-related features, including all information in the Microsoft 365 Defender portal. This role is sufficient for managing custom detections only if role-based access control (RBAC) is turned off in Microsoft Defender for Endpoint. If you have RBAC configured, you also need the **manage security settings** permission for Defender for Endpoint. -You can also manage custom detections that apply to data from specific Microsoft 365 Defender solutions if you have permissions for them. If you only have manage permissions for Microsoft 365 Defender for Office, for instance, you can create custom detections using `Email` tables but not `Identity` tables. +You can also manage custom detections that apply to data from specific Microsoft 365 Defender solutions if you have permissions for them. If you only have manage permissions for Microsoft Defender for Office 365, for instance, you can create custom detections using `Email` tables but not `Identity` tables. +++> [!NOTE] +> To manage custom detections, **security operators** will need the **manage security settings** permission in Microsoft Defender for Endpoint if RBAC is turned on. To manage required permissions, a **global administrator** can: To manage required permissions, a **global administrator** can: - Check RBAC settings for Microsoft Defender for Endpoint in [Microsoft 365 Defender](https://security.microsoft.com/) under **Settings** \> **Permissions** > **Roles**. Select the corresponding role to assign the **manage security settings** permission. > [!NOTE]-> To manage custom detections, **security operators** will need the **manage security settings** permission in Microsoft Defender for Endpoint if RBAC is turned on. +> A user also needs to have the appropriate permissions for the devices in the [device scope](#5-set-the-rule-scope) of a custom detection rule that they are creating or editing before they can proceed. A user can't edit a custom detection rule that is scoped to run on all devices, if the same user does not permissions for all devices. ++ ## Create a custom detection rule When setting the scope, you can select: - All devices - Specific device groups -Only data from devices in scope will be queried. Also, actions will be taken only on those devices. +Only data from devices in the scope will be queried. Also, actions will be taken only on those devices. ++> [!NOTE] +> Users are able to create or edit a custom detection rule only if they have the corresponding permissions for the devices included in the scope of the rule. For instance, admins can only create or edit rules that are scoped to all device groups if they have permissions for all device groups. ++ ### 6. Review and turn on the rule After reviewing the rule, select **Create** to save it. The custom detection rule immediately runs. It runs again based on configured frequency to check for matches, generate alerts, and take response actions. > [!IMPORTANT]-> Custom detections should be regularly reviewed for efficiency and effectiveness. To make sure you are creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in [Manage existing custom detection rules](#manage-existing-custom-detection-rules). +> Custom detections should be regularly reviewed for efficiency and effectiveness. To make sure you are creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in [Manage existing custom detect ion rules](#manage-existing-custom-detection-rules). > > You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules. You can also take the following actions on the rule from this page: - **Turn on** / **Turn off**ΓÇöenable the rule or stop it from running - **Delete**ΓÇöturn off the rule and remove it + ### View and manage triggered alerts In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions: |
security | Dex Xdr Permissions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/dex-xdr-permissions.md | Last updated 05/29/2023 For Microsoft Defender Experts for XDR incident investigations, when our experts need access to your tenants, we follow the just-in-time and least privilege principles to provide the right level of access at the right time. To deliver on these requirements, we built the Microsoft Defender Experts permissions platform using the following capabilities in Microsoft Azure Active Directory (Azure AD): - **Granular delegated admin privileges (GDAP)**: As part of onboarding, we provision the Microsoft Experts tenant as a service provider on your tenant to use the GDAP capability and get the right access level to our experts. The roles granted to our experts are configured using [cross-tenant role assignment](/azure/active-directory/external-identities/cross-tenant-access-overview) to ensure that they only have permissions that you have explicitly granted to them.-- **Azure AD cross-tenant access policies**: To enforce restrictions on our expertsΓÇÖ access to your tenant, we need to establish a cross-tenant trust between our experts and your tenant. To enable this trust, we configure a cross-tenant access policy in your tenant as part of onboarding. These cross-tenant access policies are created with read-only permissions to avoid any disruption.-- **Conditional access for external users**: We restrict our expertsΓÇÖ access to your tenants from our secure environment by using compliant devices with strong multifactor authentication (MFA). To enforce the trust settings configured in cross-tenant access policy and block access otherwise, we configure these conditional access policies in your tenant. -- **Just-in-time (JIT) access**: Even after you have permitted our experts access to your environment, we limit their access based on JIT permissions for case investigation, with limited duration for each role. Our experts must first request access and get approval in our internal system to gain the appropriate role in your tenant. Our expertsΓÇÖ access to your tenant is audited as part of Azure AD sign-in logs for you to review+- **Azure AD cross-tenant access policies**: To enforce restrictions on our experts' access to your tenant, we need to establish a cross-tenant trust between our experts and your tenant. To enable this trust, we configure a cross-tenant access policy in your tenant as part of onboarding. These cross-tenant access policies are created with read-only permissions to avoid any disruption. +- **Conditional access for external users**: We restrict our experts' access to your tenants from our secure environment by using compliant devices with strong multifactor authentication (MFA). To enforce the trust settings configured in cross-tenant access policy and block access otherwise, we configure these conditional access policies in your tenant. +- **Just-in-time (JIT) access**: Even after you have permitted our experts access to your environment, we limit their access based on JIT permissions for case investigation, with limited duration for each role. Our experts must first request access and get approval in our internal system to gain the appropriate role in your tenant. Our experts' access to your tenant is audited as part of Azure AD sign-in logs for you to review ## Configuring permissions in customer tenants -Once you select the permissions youΓÇÖd like to grant to our experts, we create the following policies in your tenant using the Security Administrator or Global Administrator context: +Once you select the permissions you'd like to grant to our experts, we create the following policies in your tenant using the Security Administrator or Global Administrator context: - **Configure Microsoft Experts as a service provider** ΓÇô This setting lets our experts access the tenant environment as external collaborators without requiring you to create accounts for them. - **Configure role assignments for our experts** ΓÇô This setting controls the roles our experts are allowed in the tenant. You select the appropriate roles during the onboarding process |
security | Frequently Asked Questions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/frequently-asked-questions.md | Last updated 05/29/2023 | Questions | Answers | ||| | **How is Microsoft Defender Experts for XDR different from Microsoft Defender Experts for Hunting?** | [Microsoft Defender Experts for Hunting](../defender/defender-experts-for-hunting.md) provides proactive threat hunting service to proactively find threats. This service is meant for customers that have a robust security operations center and want that deep expertise in hunting to expose advanced threats. Microsoft Defender Experts for XDR provides end-to-end security operations capabilities to monitor, investigate, and respond to security alerts. This service is meant for customers with constrained security operations centers (SOCs) that are overburdened with alert volume, in need of skilled experts, or both. Defender Experts for XDR also includes the proactive threat hunting offered by Defender Experts for Hunting|-| **Does Defender Experts for XDR require Microsoft Sentinel?** | No. Defender Experts can use Microsoft 365 Defender data in customersΓÇÖ original locations for each Microsoft 365 Defender product deployed. | +| **Does Defender Experts for XDR require Microsoft Sentinel?** | No. Defender Experts can use Microsoft 365 Defender data in customers' original locations for each Microsoft 365 Defender product deployed. | | **What products does Defender Experts for XDR operate on?** | Refer to the [Before you begin](before-you-begin-xdr.md) for details. | | **Does Defender Experts for XDR replace my SOC team?** | Defender Experts for XDR currently provide coverage for Microsoft 365 Defender incidents. It's the ideal way to augment your SOC team, reduce their workload, and collaborate with them to protect your organization from activity groups. | | **What actions can your experts take during incident investigation?** | Our expert analysts can take actions based on the roles granted to them in your Microsoft 365 Defender portal. If our analysts are granted a security reader role, they can investigate and provide guided response for your SOC team to act on. If our analysts are granted a security operator role, they can also take specific remediation actions agreed upon with your SOC team. |-| **What types of incidents can your experts investigate?** | Defender Experts for XDR covers incidents categorized as High or Medium severity in Windows, Linux, and macOS devices. Incidents categorized as Compliance, Data Loss Prevention (DLP), or Custom Detections and those affecting internet of things (IoT), iOS, or Android devices are outside the serviceΓÇÖs scope. | +| **What types of incidents can your experts investigate?** | Defender Experts for XDR covers incidents categorized as High or Medium severity in Windows, Linux, and macOS devices. Incidents categorized as Compliance, Data Loss Prevention (DLP), or Custom Detections and those affecting internet of things (IoT), iOS, or Android devices are outside the service's scope. | | **Can your experts help me improve my security posture?** | Yes, our experts provide necessary guidance regularly to improve your security posture. | **Can Defender Experts for XDR help with an active compromise or vulnerability?** | No, Defender Experts currently don't provide incident response services. Contact your Microsoft representative or fill out the [Experiencing a Cybersecurity Incident?](https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbRypQlJUvhTFIvfpiAfrpFQdUOTdRRFpDUFQ1TzNLVFZXV0VUOVlVN0szUiQlQCN0PWcu) form to engage Microsoft Incident Response for incident response assistance. | | **How can my organization participate in the Defender Experts for XDR service?** | Contact your Microsoft representative to express interest in Defender Experts for XDR.| |
security | Get Started Xdr | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/get-started-xdr.md | Last updated 05/29/2023 - [Microsoft 365 Defender](microsoft-365-defender.md) -Once the Defender Experts for XDR team is ready to onboard your organization, youΓÇÖll receive a welcome email to continue the setup and get you started. +Once the Defender Experts for XDR team is ready to onboard your organization, you'll receive a welcome email to continue the setup and get you started. Select the link in the welcome email to directly launch the Defender Experts settings step-by-step guide in the Microsoft 365 Defender portal. You can also open this guide by going to **Settings** > **Defender Experts** and selecting **Get started**. Select the link in the welcome email to directly launch the Defender Experts set By default, Defender Experts for XDR requires **Service provider access** that lets our experts sign into your tenant and deliver services based on assigned security roles. [Learn more about cross-tenant access](/azure/active-directory/external-identities/cross-tenant-access-overview) -You also need to grant our experts temporary, scoped access only as needed, depending on the type of work youΓÇÖd like them to handle on your behalf: +You also need to grant our experts temporary, scoped access only as needed, depending on the type of work you'd like them to handle on your behalf: - **Investigate incidents and guide my responses** (default) ΓÇô This option lets our experts proactively monitor and investigate incidents and guide you through any necessary response actions. (Access level: Security Reader)-- **Respond directly to active threats** (recommended) ΓÇô This option lets our experts contain and remediate active threats immediately while investigating, thus reducing the threatΓÇÖs impact, and improving your overall response efficiency. (Access level: Security Operator)+- **Respond directly to active threats** (recommended) ΓÇô This option lets our experts contain and remediate active threats immediately while investigating, thus reducing the threat's impact, and improving your overall response efficiency. (Access level: Security Operator) [Learn more about access levels](/azure/active-directory/roles/permissions-reference) You also need to grant our experts temporary, scoped access only as needed, depe To edit or update permissions after the initial setup, go to **Settings** > **Defender Experts** > **Permissions**. In this page, you could also turn **Access security data from all devices** on or off under the access levels. > [!IMPORTANT]-> If you turn off **Access security data from all devices**, our experts wonΓÇÖt be able to investigate incidents involving devices that belong to Microsoft Defender for Endpoint device groups. [Learn more about device groups](../defender-endpoint/machine-groups.md). +> If you turn off **Access security data from all devices**, our experts won't be able to investigate incidents involving devices that belong to Microsoft Defender for Endpoint device groups. [Learn more about device groups](../defender-endpoint/machine-groups.md). ## Tell us who to contact for important matters |
security | Investigate Users | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-users.md | The timeline represents activities and alerts observed from a user's identity in  -- **Timeline filters:** In order to improve your investigation experience, you can use the timeline filters: Type (Alerts and/or user's related activities), Alert severity, Activity type, App, Location, Protocol. Each filter depends on the others, and the options in each filter (drop-down) only contains the data that is relevant for the specific user. +- **Timeline filters:** In order to improve your investigation experience, you can use the timeline filters: Type (Alerts and/or user's related activities), Alert severity, Activity type, App, Location, Protocol. Each filter depends on the others, and the options in each filter (drop-down) only contains the data that is relevant for the specific user. - **Export button:** You can export the timeline to a CSV file. Export is limited to the first 5000 records and contains the data as it displays in the UI (same filters and columns). |
security | Onboarding Defender Experts For Hunting | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/onboarding-defender-experts-for-hunting.md | You can set up Microsoft 365 Defender to notify you or your staff with an email 1. In the Microsoft 365 Defender navigation pane, select **Settings** > **Microsoft 365 Defender** > **Email notifications** > **Incidents**. 2. Update your existing email notification rules or create a new one. [Learn more about creating a rule for email notifications](/microsoft-365/security/defender/incidents-overview#create-a-rule-for-email-notifications)-3. On the ruleΓÇÖs **Notification settings** page, make sure to configure the following: +3. On the rule's **Notification settings** page, make sure to configure the following: - **Source** ΓÇô Choose **Microsoft Defender Experts** under **Microsoft 365 Defender** and **Microsoft Defender for Endpoint** - **Alert severity** ΓÇô Choose the alert severities that will trigger an incident notification. For example, if you only want to be informed about high-severity incidents, select High. |
security | Start Using Mdex Xdr | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/start-using-mdex-xdr.md | Last updated 05/29/2023 After you completed the [onboarding steps and readiness checks](get-started-xdr.md) for Microsoft Defender Experts for XDR, our experts will start monitoring your environment to streamline the service so we can perform comprehensive service on your behalf. During this stage, our experts identify latent threats, sources of risk, and normal activity. -Once our experts begin to perform comprehensive response work on your behalf, youΓÇÖll start receiving notifications about incidents that require remediation steps and targeted recommendations on critical incidents. You can also chat with our experts or your service delivery managers (SDMs) regarding important queries and regular business and security posture reviews and view real-time reports on the number of incidents weΓÇÖve investigated and resolved on your behalf. +Once our experts begin to perform comprehensive response work on your behalf, you'll start receiving notifications about incidents that require remediation steps and targeted recommendations on critical incidents. You can also chat with our experts or your service delivery managers (SDMs) regarding important queries and regular business and security posture reviews and view real-time reports on the number of incidents we've investigated and resolved on your behalf. ## Managed detection and response Through a combination of automation and human expertise, Defender Experts for XD Once our experts start investigating an incident, the incident's **Assigned to** and **Status** fields are updated to _Defender Experts_ and _In progress_, respectively. -When our experts conclude their investigation on an incident, the incidentΓÇÖs **Classification** field is updated to one of the following, depending on the expertsΓÇÖ findings: +When our experts conclude their investigation on an incident, the incident's **Classification** field is updated to one of the following, depending on the experts' findings: - True Positive - False Positive The **Determination** field corresponding to each classification is also updated :::image type="content" source="../../media/xdr/incidents-xdr-1.png" alt-text="Screenshot of Incidents page showing the Tags, Status, Assigned to, Classification, and Determination fields." lightbox="../../media/xdr/incidents-xdr-1.png"::: -If an incident is classified as _False Positive_ or _Informational_, _Expected Activity_, then the incident's **Status** field gets updated to _Resolved_. Our experts then conclude their work on this incident and the **Assigned to** field gets updated to _Unassigned_. Our experts may share updates from their investigation and their conclusion when resolving an incident. These updates are posted in the incidentΓÇÖs **Comments and history** flyout panel. +If an incident is classified as _False Positive_ or _Informational_, _Expected Activity_, then the incident's **Status** field gets updated to _Resolved_. Our experts then conclude their work on this incident and the **Assigned to** field gets updated to _Unassigned_. Our experts may share updates from their investigation and their conclusion when resolving an incident. These updates are posted in the incident's **Comments and history** flyout panel. > [!NOTE]-> Incident comments are one-way posts. Defender Experts canΓÇÖt respond to any comments or questions you add in the **Comments and history** panel. If you wish to correspond with our experts, reply to the email Defender Experts sent you instead. +> Incident comments are one-way posts. Defender Experts can't respond to any comments or questions you add in the **Comments and history** panel. If you wish to correspond with our experts, reply to the email Defender Experts sent you instead. Otherwise, if an incident is classified as _True Positive_, our experts then identify recommended response actions that need to be performed. The method in which the actions are performed depends on the permissions and access levels you have given the Defender Experts for XDR service. [Learn more about granting permissions to our experts](get-started-xdr.md#grant-permissions-to-our-experts). -- If you have granted Defender Experts for XDR the recommended Security Operator access permissions, our experts could perform the recommended response actions on the incident on your behalf. These actions, along with an **Investigation summary**, show up in the incidentΓÇÖs [Guided response](#how-to-use-guided-response-in-microsoft-365-defender) flyout panel in your Microsoft 365 Defender portal for you or your SOC team to review. Once our experts conclude their work on the incident, its **Status** field is then updated to _Resolved_ and the **Assigned to** field is updated to _Unassigned_.+- If you have granted Defender Experts for XDR the recommended Security Operator access permissions, our experts could perform the recommended response actions on the incident on your behalf. These actions, along with an **Investigation summary**, show up in the incident's [Guided response](#how-to-use-guided-response-in-microsoft-365-defender) flyout panel in your Microsoft 365 Defender portal for you or your SOC team to review. Once our experts conclude their work on the incident, its **Status** field is then updated to _Resolved_ and the **Assigned to** field is updated to _Unassigned_. -- If you have granted Defender Experts for XDR the default Security Reader access, then the recommended response actions, along with an **Investigation summary**, show up in the incidentΓÇÖs **Guided response** flyout panel in your Microsoft 365 Defender portal for you or your SOC team to perform. To identify this handover, the incidentΓÇÖs **Assigned to** field is updated to _Customer_.+- If you have granted Defender Experts for XDR the default Security Reader access, then the recommended response actions, along with an **Investigation summary**, show up in the incident's **Guided response** flyout panel in your Microsoft 365 Defender portal for you or your SOC team to perform. To identify this handover, the incident's **Assigned to** field is updated to _Customer_. You can check the number of incidents that are awaiting your action in the Defender Experts card in your Microsoft 365 Defender portal: To view the incidents our experts have investigated or are currently investigati In the Microsoft 365 Defender portal, an incident that requires your attention using guided response has the **Assigned to** field set to _Customer_ and a task card on top of the **Incidents** pane. Your designated incident contacts also receives a corresponding email notification with a link to the Defender portal to view the incident. [Learn more about notification contacts](get-started-xdr.md#tell-us-who-to-contact-for-important-matters). -Select **View guided response** on the task card or on the top of the portal page (**Guided response** tab) to open a flyout panel where you can read our expertsΓÇÖ investigation summary, complete pending actions identified by our experts, or engage with them through chat. +Select **View guided response** on the task card or on the top of the portal page (**Guided response** tab) to open a flyout panel where you can read our experts' investigation summary, complete pending actions identified by our experts, or engage with them through chat. :::image type="content" source="../../media/xdr/view-guided-response-button.png" alt-text="Screenshot of the view guided response task card." lightbox="../../media/xdr/view-guided-response-button.png"::: Apart from these one-click actions, you can also receive guided responses from o **To view and perform the guided response actions:** 1. Select the arrow buttons in a task card to expand it and read more information about the recommendation or collapse it.-1. For cards with one-click response actions, select the recommended action. The **Action status** in the card changes to **In progress**, then to **Failed** or **Completed**, depending on the actionΓÇÖs outcome. +1. For cards with one-click response actions, select the recommended action. The **Action status** in the card changes to **In progress**, then to **Failed** or **Completed**, depending on the action's outcome. > [!TIP] > You can also monitor the status of in-portal response actions in the [Action center](m365d-action-center.md). -3. For cards with recommended actions that you need to perform manually, select **Mark as complete** once youΓÇÖve performed them. -1. If you donΓÇÖt want to complete a recommended action right away, select the ellipsis icon on the top of the card and choose any of the following other options: +3. For cards with recommended actions that you need to perform manually, select **Mark as complete** once you've performed them. +1. If you don't want to complete a recommended action right away, select the ellipsis icon on the top of the card and choose any of the following other options: - **Mark in progress** - **Mark as skipped** - **Mark as new** The following section describes how an incident handled by our experts is update 1. An incident being investigated by our experts has the **Owner** listed as _Defender Experts_. 1. An incident that our experts have confirmed as a _True Positive_ has a guided response posted in Microsoft 365 Defender, and the **Owner** is listed as _Customer_. You need to act on the incident based on using the provided guided response.-1. Once our experts have concluded their investigation and closed an incident as _False Positive_ or _Informational_, _Expected Activity_, the incidentΓÇÖs **Status** is updated to _Resolved_ and a **Reason for closing** is provided. +1. Once our experts have concluded their investigation and closed an incident as _False Positive_ or _Informational_, _Expected Activity_, the incident's **Status** is updated to _Resolved_ and a **Reason for closing** is provided. :::image type="content" source="../../media/xdr/microsoft-sentinel-incidents.png" alt-text="Screenshot of Microsoft Sentinel incidents." lightbox="../../media/xdr/microsoft-sentinel-incidents.png"::: The following section describes how an incident handled by our experts is update You could obtain visibility into incidents in your SIEM or ITSM application by using the [Microsoft 365 Defender API](../defender/api-overview.md) or [connectors in Sentinel](/azure/sentinel/data-connectors-reference). -After configuring a connector, the updates by Defender Experts to an incidentΓÇÖs **Status**, **Assigned to**, **Classification**, and **Determination** fields in Microsoft 365 Defender can be synchronized with the third-party SIEM or ITSM applications, depending on how the field mapping has been implemented. To illustrate, you can take a look at the [connector available from Sentinel to ServiceNow](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Servicenow/StoreApp). +After configuring a connector, the updates by Defender Experts to an incident's **Status**, **Assigned to**, **Classification**, and **Determination** fields in Microsoft 365 Defender can be synchronized with the third-party SIEM or ITSM applications, depending on how the field mapping has been implemented. To illustrate, you can take a look at the [connector available from Sentinel to ServiceNow](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Servicenow/StoreApp). ## Get real-time visibility with Defender Experts for XDR reports The **Incidents by severity** and **Incidents by category** sections break down The **Average incident resolution time** section displays a bar chart of the average time, in minutes, our experts spent investigating and closing incidents in your environment and the average time you spent performing the recommended guided response actions. -If youΓÇÖve set Defender Experts for XDR to have **Security Reader** access, the **Average incident resolution time** section also displays the estimated **Potential time savings** you could realize if you let our experts take managed remediation actions on your behalf by [providing them the permissions](get-started-xdr.md#grant-permissions-to-our-experts) to do so. The potential time savings are derived by calculating the total time it took you to complete recommended guided response actions after our experts issued them to you during your selected date range. Otherwise, if the service has **Security Operator** access, this report section displays the estimated time you already saved by granting us permission to take managed remediation actions on your behalf. To change access levels, select **Edit permissions**. +If you've set Defender Experts for XDR to have **Security Reader** access, the **Average incident resolution time** section also displays the estimated **Potential time savings** you could realize if you let our experts take managed remediation actions on your behalf by [providing them the permissions](get-started-xdr.md#grant-permissions-to-our-experts) to do so. The potential time savings are derived by calculating the total time it took you to complete recommended guided response actions after our experts issued them to you during your selected date range. Otherwise, if the service has **Security Operator** access, this report section displays the estimated time you already saved by granting us permission to take managed remediation actions on your behalf. To change access levels, select **Edit permissions**. ## Collaborate with a trusted advisor |
security | Microsoft Threat Actor Naming | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/microsoft-threat-actor-naming.md | Microsoft categorizes threat actors into five key groups: **Private sector offensive actors (PSOAs):** cyber activity led by commercial actors that are known/legitimate legal entities, that create and sell cyberweapons to customers who then select targets and operate the cyberweapons. These tools threaten many global human rights efforts, as they have been observed targeting and surveilling dissidents, human rights defenders, journalists, civil society advocates, and other private citizens. -**Influence operations:** information campaigns communicated online or offline in a manipulative fashion to shift perceptions, behaviors, or decisions by target audiences to further a group or a nationΓÇÖs interests and objectives. +**Influence operations:** information campaigns communicated online or offline in a manipulative fashion to shift perceptions, behaviors, or decisions by target audiences to further a group or a nation's interests and objectives. **Groups in development:** a temporary designation given to an unknown, emerging, or developing threat activity that allows Microsoft to track it as a discrete set of information until we can reach high confidence about the origin or identity of the actor behind the operation. Once criteria are met, a group in development is converted to a named actor or merged into existing names. |
security | Protect Against Threats | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/protect-against-threats.md | For more information about the recommended settings for Safe Attachments, see [S - **Safe Attachments unknown malware response**: Select **Block**. - **Quarantine policy**: The default value is blank, which means the default AdminOnlyAccessPolicy policy is used. Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy). - **Redirect attachment with detected attachments** : **Enable redirect**: Turn this setting on (select) and enter an email address to receive detected messages.- - **Apply the Safe Attachments detection response if scanning can't complete (timeout or errors)**: Verify this setting is selected. 5. When you're finished, select **Submit**, and then select **Done**. |
security | Quarantine Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-policies.md | Full instructions for creating and modifying Safe Attachments policies are descr If you'd rather use PowerShell to assign quarantine policies in Safe Attachments policies, connect to Exchange Online PowerShell or Exchange Online Protection PowerShell and use the following syntax: ```powershell-<New-SafeAttachmentPolicy -Name "<Unique name>" | Set-SafeAttachmentPolicy -Identity "<Policy name>"> -Enable $true -Action <Block | Replace | DynamicDelivery> [-QuarantineTag <QuarantineTagName>] +<New-SafeAttachmentPolicy -Name "<Unique name>" | Set-SafeAttachmentPolicy -Identity "<Policy name>"> -Enable $true -Action <Block | DynamicDelivery> [-QuarantineTag <QuarantineTagName>] ``` **Notes**: -- The _Action_ parameter values Block, Replace, or DynamicDelivery can result in quarantined messages (the value Allow doesn't quarantine messages). The value of the _Action_ parameter in meaningful only when the value of the _Enable_ parameter is `$true`.+- The _Action_ parameter values Block or DynamicDelivery can result in quarantined messages (the value Allow doesn't quarantine messages). The value of the _Action_ parameter in meaningful only when the value of the _Enable_ parameter is `$true`. - When you create new Safe Attachments policies without using the _QuarantineTag_ parameter, the default quarantine policy named AdminOnlyAccessPolicy is used for malware detections by Safe Attachments. |
security | Recommended Settings For Eop And Office365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365.md | Users can't release their own messages that were quarantined as malware by Safe ||::|::|::|::|| |**Safe Attachments unknown malware response** (_Enable_ and _Action_)|**Off** (`-Enable $false` and `-Action Block`)|**Block** (`-Enable $true` and `-Action Block`)|**Block** (`-Enable $true` and `-Action Block`)|**Block** (`-Enable $true` and `-Action Block`)|When the _Enable_ parameter is $false, the value of the _Action_ parameter doesn't matter.| |**Quarantine policy** (_QuarantineTag_)|AdminOnlyAccessPolicy|AdminOnlyAccessPolicy|AdminOnlyAccessPolicy|AdminOnlyAccessPolicy||-|**Redirect attachment with detected attachments** : **Enable redirect** (_Redirect_ and _RedirectAddress_)|Not selected and no email address specified. (`-Redirect $false` and _RedirectAddress_ is blank)|Not selected and no email address specified. (`-Redirect $false` and _RedirectAddress_ is blank)|Selected and specify an email address. (`$true` and \<email address\>)|Selected and specify an email address. (`$true` and \<email address\>)|Redirect messages to a security admin for review. <br><br> **Note**: This setting isn't configured in the **Standard**, **Strict**, or **Built-in protection** preset security policies. The **Standard** and **Strict** values indicate our **recommended** values in new Safe Attachments policies that you create.| -|**Apply the Safe Attachments detection response if scanning can't complete (timeout or errors)** (_ActionOnError_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|| +|**Redirect attachment with detected attachments** : **Enable redirect** (_Redirect_ and _RedirectAddress_)|Not selected and no email address specified. (`-Redirect $false` and _RedirectAddress_ is blank)|Not selected and no email address specified. (`-Redirect $false` and _RedirectAddress_ is blank)|Not selected and no email address specified. (`-Redirect $false` and _RedirectAddress_ is blank)|Not selected and no email address specified. (`-Redirect $false` and _RedirectAddress_ is blank)|Redirection of messages is available only when the **Safe Attachments unknown malware response** value is **Monitor** (`-Enable $true` and `-Action Allow`).| ### Safe Links policy settings |
security | Safe Attachments About | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-about.md | This section describes the settings in Safe Attachments policies: ┬╣ Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy). Users can't release their own messages that were quarantined as malware by Safe Attachments, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages. -- **Redirect messages with detected attachments**: **Enable redirect** and **Send messages that contain blocked, monitored, or replaced attachments to the specified email address**: For **Block** or **Monitor** actions, send messages that contain malware attachments to the specified internal or external email address for analysis and investigation.+- **Redirect messages with detected attachments**: **Enable redirect** and **Send messages that contain blocked, monitored, or replaced attachments to the specified email address**: For the **Monitor** action only, send messages that contain malware attachments to the specified internal or external email address for analysis and investigation. The recommendation for Standard and Strict policy settings is to enable redirection. For more information, see [Safe Attachments settings](recommended-settings-for-eop-and-office365.md#safe-attachments-settings). - > [!NOTE] - > Redirection will soon be available only for the **Monitor** action. For more information, see [MC424899](https://admin.microsoft.com/AdminPortal/Home?#/MessageCenter/:/messages/MC424899). --- **Apply the Safe Attachments detection response if scanning can't complete (timeout or errors)**: The action specified by **Safe Attachments unknown malware response** is taken on messages even when Safe Attachments scanning can't complete. Always select this option if you select **Enable redirect**. Otherwise, messages might be lost.- - **Priority**: If you create multiple policies, you can specify the order that they're applied. No two policies can have the same priority, and policy processing stops after the first policy is applied (the highest priority policy for that recipient). For more information about the order of precedence and how multiple policies are evaluated and applied, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md). |
security | Safe Attachments Policies Configure | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-policies-configure.md | description: Learn about how to define Safe Attachments policies to protect your Previously updated : 7/10/2023 Last updated : 7/12/2023 appliesto: - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/microsoft-defender-for-office-365-product-overview#microsoft-defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 plan 1 and plan 2</a> - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft 365 Defender</a> You configure Safe Attachments policies in the Microsoft 365 Defender portal or > [!NOTE] > Redirection is available only for the **Monitor** action. For more information, see [MC424899](https://admin.microsoft.com/AdminPortal/Home?#/MessageCenter/:/messages/MC424899). - - **Apply the Safe Attachments detection response if scanning can't complete (timeout or errors)**: The action specified by **Safe Attachments unknown malware response** is taken on messages even when Safe Attachments scanning can't complete. - When you're finished on the **Settings** page, select **Next**. 6. On the **Review** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard. Creating a Safe Attachments policy in PowerShell is a two-step process: To create a safe attachment policy, use this syntax: ```PowerShell-New-SafeAttachmentPolicy -Name "<PolicyName>" -Enable $true [-AdminDisplayName "<Comments>"] [-Action <Allow | Block | Replace | DynamicDelivery>] [-Redirect <$true | $false>] [-RedirectAddress <SMTPEmailAddress>] [-ActionOnError <$true | $false>] [-QuarantineTag <QuarantinePolicyName>] +New-SafeAttachmentPolicy -Name "<PolicyName>" -Enable $true [-AdminDisplayName "<Comments>"] [-Action <Allow | Block | DynamicDelivery>] [-Redirect <$true | $false>] [-RedirectAddress <SMTPEmailAddress>] [-QuarantineTag <QuarantinePolicyName>] ``` This example creates a safe attachment policy named Contoso All with the following values: - Block messages that are found to contain malware by Safe Documents scanning (we aren't using the _Action_ parameter, and the default value is `Block`). - The default quarantine policy is used (AdminOnlyAccessPolicy), because we aren't using the _QuarantineTag_ parameter.-- Redirection is enabled, and messages that are found to contain malware are sent to sec-ops@contoso.com for analysis and investigation.-- If Safe Attachments scanning isn't available or encounters errors, don't deliver the message (we aren't using the _ActionOnError_ parameter, and the default value is `$true`). ```PowerShell-New-SafeAttachmentPolicy -Name "Contoso All" -Enable $true -Redirect $true -RedirectAddress sec-ops@contoso.com +New-SafeAttachmentPolicy -Name "Contoso All" -Enable $true ``` For detailed syntax and parameter information, see [New-SafeAttachmentPolicy](/powershell/module/exchange/new-safeattachmentpolicy). |
security | Understand Detection Technology In Email Entity | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/understand-detection-technology-in-email-entity.md | To resolve false positives like the ones listed in the table below, you should a |Bulk|Detection for advertising / marketing and similar message types with their relative complaint levels|[Step-by-Step guide on how to tune bulk thresholds](tune-bulk-mail-filtering-walkthrough.md)| |Campaign|Messages identified and grouped as part of a malware or phish campaign|[Learn more about campaigns](track-and-respond-to-emerging-threats-with-campaigns.md)| |Domain reputation|The message was sent from a domain that was identified as spam or phish domain, based on internal or external signals||-|File detonation|Safe Attachments detected a malicious attachment during detonation within a sandbox|| -|File detonation reputation|File attachments previously detected by Safe Attachments during detonation|| +|File detonation|Safe Attachments detected a malicious attachment during detonation within a sandbox|| +|File detonation reputation|File attachments previously detected by Safe Attachments during detonation|| |File reputation|The message contains a file that was previously identified as malicious by other sources|| |Fingerprint matching|The message resembles a previously detected malicious or spam message|| |General filter|Phishing or spam signals based on analyst heuristics|| |Impersonation brand|Sender impersonation of well-known brands||-|Impersonation domain|Impersonation of sender domains that you own or specified for protection in anti-phishing policies|[Impersonation insight overview](../anti-phishing-mdo-impersonation-insight.md)| -|Impersonation user|Impersonation of protected senders that you specified in anti-phishing policies|[Impersonation insight overview](../anti-phishing-mdo-impersonation-insight.md)| +|Impersonation domain|Impersonation of sender domains that you own or specified for protection in anti-phishing policies|[Impersonation insight overview](../anti-phishing-mdo-impersonation-insight.md)| +|Impersonation user|Impersonation of protected senders that you specified in anti-phishing policies|[Impersonation insight overview](../anti-phishing-mdo-impersonation-insight.md)| |IP reputation|The message was sent from an IP that was identified as potentially malicious|| |Mailbox intelligence impersonation|Sender detected as impersonating an address in the user's personal sender map|[Mailbox intelligence impersonation protection](../anti-phishing-policies-about.md)| |Mixed analysis detection|Multiple filters contributed to the verdict for this message||-|Spoof DMARC|The message failed DMARC authentication|[How Microsoft 365 handles inbound email that fails DMARC](../email-authentication-dmarc-configure.md)| +|Spoof DMARC|The message failed DMARC authentication|[How Microsoft 365 handles inbound email that fails DMARC](../email-authentication-dmarc-configure.md)| |Spoof external domain|Spoof intelligence detected email spoofing of a domain that is external to your organization|| |Spoof intra-org|Spoof intelligence detected email spoofing of a user or domain that is internal to your organization||-|URL detonation|Safe Links detected a malicious URL in the message during detonation within a sandbox|| -|URL detonation reputation|URLs previously detected by Safe Links during detonation|| +|URL detonation|Safe Links detected a malicious URL in the message during detonation within a sandbox|| +|URL detonation reputation|URLs previously detected by Safe Links during detonation|| |URL malicious reputation|The message contains a URL that was previously identified as malicious or spam by other sources|| ## Watch a video on submitting messages to Microsoft to learn more |
security | Try Microsoft Defender For Office 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/try-microsoft-defender-for-office-365.md | The settings are also described in the following tables. ||| |Name|Evaluation Policy| |Action|Allow|-|ActionOnError|True| +|ActionOnError|True<sup>\*</sup>| |AdminDisplayName|Evaluation Policy| |ConfidenceLevelThreshold|80| |Enable|True| The settings are also described in the following tables. |RedirectAddress|blank| |ScanTimeout|30| +<sup>\*</sup> This parameter has been deprecated and is no longer used. + #### Safe Links evaluation policy settings |Setting|Value| |
solutions | Apps Add Step 4 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/apps-add-step-4.md | Use the following steps to add Microsoft licensed apps to Intune: > In addition, consider adding the following Microsoft apps based on your existing license: > - Microsoft Exchange > - Microsoft SharePoint-> - Microsoft Yammer +> - Microsoft Viva Engage > - Microsoft Viva > - Project Online Desktop Client > - Visio Online Plan 2 |
solutions | Apps License Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/apps-license-overview.md | When you purchase a plan that includes Microsoft Intune, there are [Microsoft ap | **Microsoft 365 apps** | Includes online apps, such as Microsoft Word, Excel, PowerPoint, OneNote, Outlook, and more | | **Email, calendar, and scheduling** | Includes Microsoft Exchange and Outlook desktop client | | **Meetings, calling, and chat** | Includes Microsoft Teams |-| **Social, intranet, and storage** | Includes SharePoint, Yammer Enterprise, and Viva Connections | +| **Social, intranet, and storage** | Includes SharePoint, Viva Engage, and Viva Connections | | **Content services** | Includes Microsoft Graph API, Microsoft Search, Microsoft Stream, and more | | **Project and task management** | Includes Microsoft Planning and Microsoft To-Do | | **Analytics** | Includes Productivity Score, Secure Score, Compliance Management, and Power BI Pro | |
solutions | Collaboration Governance Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/collaboration-governance-overview.md | -description: "Learn governance best practices for Microsoft 365 collaboration tools, including Microsoft 365 Groups, Teams, SharePoint, and Yammer." +description: "Learn governance best practices for Microsoft 365 collaboration tools, including Microsoft 365 Groups, Teams, SharePoint, and Viva Engage." # What is collaboration governance? Organizations today are using a diverse tool set. There's the team of developers If users feel the IT-provided tools do not fit their needs, they will likely download their favorite consumer app which supports their scenarios. Although this process allows users to get started quickly, it leads to a frustrating user experience across the organization with multiple logins, difficulty sharing, and no single place to view content. This concept is referred to as ΓÇ£Shadow ITΓÇ¥ and poses a significant risk to organizations. It reduces the ability to uniformly manage user access, ensure security, and service compliance needs. -Services such as Microsoft 365 groups, Teams, and Yammer empower users and reduces the risk of shadow IT by providing the tools needed to collaborate. Microsoft 365 has a rich set of tools to implement any governance capabilities your organization might require. +Services such as Microsoft 365 groups, Teams, and Viva Engage empower users and reduces the risk of shadow IT by providing the tools needed to collaborate. Microsoft 365 has a rich set of tools to implement any governance capabilities your organization might require.  If your organization is multi-national and you have data residency requirements ## Why Microsoft 365 groups are important in collaboration governance -Microsoft 365 groups lets you choose a set of people with whom you wish to collaborate, and easily set up a collection of resources for those people to share. Adding members to the group automatically grants the needed permissions to all assets provided by the group. Both Teams and Yammer use Microsoft 365 groups to manage their membership. +Microsoft 365 groups lets you choose a set of people with whom you wish to collaborate, and easily set up a collection of resources for those people to share. Adding members to the group automatically grants the needed permissions to all assets provided by the group. Both Teams and Viva Engage use Microsoft 365 groups to manage their membership. -Microsoft 365 groups include a suite of linked resources that users can use for communication and collaboration. Groups always include a SharePoint site, Planner, a Power BI workspace, a mailbox and calendar, and Stream. Depending on how you create the group, you can optionally add other services such as Teams, Yammer, and Project. +Microsoft 365 groups include a suite of linked resources that users can use for communication and collaboration. Groups always include a SharePoint site, Planner, a Power BI workspace, a mailbox and calendar, and Stream. Depending on how you create the group, you can optionally add other services such as Teams, Viva Engage, and Project.  Microsoft 365 groups include a suite of linked resources that users can use for |[SharePoint team site](https://support.office.com/article/what-is-a-sharepoint-team-site-75545757-36c3-46a7-beed-0aaa74f0401e)|A central repository for information, links and content relating to your group| |[Stream](https://support.microsoft.com/microsoft-stream)|A video streaming service| |[Teams](https://support.microsoft.com/teams)|A chat-based workspace in Microsoft 365|-|[Yammer group](https://support.office.com/article/Learn-about-Office-365-groups-b565caa1-5c40-40ef-9915-60fdb2d97fa2)|A common place to have conversations and share information| +|[Viva Engage group](https://support.office.com/article/Learn-about-Office-365-groups-b565caa1-5c40-40ef-9915-60fdb2d97fa2)|A common place to have conversations and share information| Microsoft 365 Groups includes a variety of governance controls, including an expiration policy, naming conventions, and a blocked words policy, to help you manage groups in your organization. Because groups control membership and access to this suite of resources, managing groups is a key part of governing collaboration in Microsoft 365. There are three main communication methods supported by Microsoft 365: - Outlook: collaboration through email with a shared group inbox and calendar - Microsoft Teams: a persistent-chat-based workspace where you can have informal, real-time, conversations around a variety of topics, organized by specific sub-groups-- Yammer: enterprise social experience for collaboration+- Viva Engage: enterprise social experience for collaboration - + - Teams: chat-based workspace (high velocity collaboration) ΓÇô inner loop - Built for collaboration with the people your users work with every day There are three main communication methods supported by Microsoft 365: - Add tabs, connectors and bots - Live chat, audio/video conferencing, recorded meetings -- Yammer: connect across the org (enterprise social) ΓÇô outer loop+- Viva Engage: connect across the org (enterprise social) ΓÇô outer loop - Communities of practice - Cross-functional groups of people who share a common interest or expertise but are not necessarily working together on a day-to-day basis - Leadership connection, learning communities, role-based communities There are three main communication methods supported by Microsoft 365: As you determine how you want to use collaboration features in Microsoft 365, consider these methods of communication and which your users are likely to use in different scenarios. > [!NOTE]-> When a new Office 365 Group is created via Yammer or Teams, the group isn't visible in Outlook or the address book because the primary communication between those users happens in their respective clients. Yammer groups cannot be connected to Teams. +> When a new Office 365 Group is created via Viva Engage or Teams, the group isn't visible in Outlook or the address book because the primary communication between those users happens in their respective clients. Viva Engage groups cannot be connected to Teams. ## Collaboration governance best practices checklist Follow these basic steps to create your governance plan: 3. Plan to manage user access - plan [the level of access you want to grant users in groups, SharePoint, and Teams](groups-teams-access-governance.md). 4. Plan to manage compliance settings - review the available [compliance options for Microsoft 365 groups, Teams, and SharePoint collaboration](groups-teams-compliance-governance.md). 5. Plan to manage communications - review the available [communications governance options for collaboration scenarios](groups-teams-communication-governance.md).-6. Plan for organization and lifecycle governance - choose [the policies you want to use for group and team creation, naming, expiration, and archiving](plan-organization-lifecycle-governance.md). Also, understand the [end of lifecycle options for groups, teams, and Yammer](end-life-cycle-groups-teams-sites-yammer.md) +6. Plan for organization and lifecycle governance - choose [the policies you want to use for group and team creation, naming, expiration, and archiving](plan-organization-lifecycle-governance.md). Also, understand the [end of lifecycle options for groups, teams, and Viva Engage](end-life-cycle-groups-teams-sites-viva-engage.md)  Learn how to set up your groups expiry lifecycle, naming policies, classificatio **Customer example** -See a behind-the-scenes example of how Microsoft 365 Groups, SharePoint, Teams, and Yammer work together to provide a global collaboration platform. +See a behind-the-scenes example of how Microsoft 365 Groups, SharePoint, Teams, and Viva Engage work together to provide a global collaboration platform. -- [Finding your collaboration sweet spot with Microsoft 365 Groups, SharePoint, Teams, and Yammer](https://www.youtube.com/watch?v=Rx9eVwqXeQk)+- [Finding your collaboration sweet spot with Microsoft 365 Groups, SharePoint, Teams, and Viva Engage](https://www.youtube.com/watch?v=Rx9eVwqXeQk) ## See also |
solutions | Contoso Case Study Solutions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/contoso-case-study-solutions.md | Next, see how Contoso used Microsoft 365 for these solutions and scenarios: - [Migration of their on-premises users to Teams for unified communication, collaboration, and voice](/MicrosoftTeams/voice-case-study-overview) -- [Configure an offensive language policy for Microsoft Teams, Exchange, and Yammer communications](../compliance/communication-compliance-case-study.md)+- [Configure an offensive language policy for Microsoft Teams, Exchange, and Viva Engage communications](../compliance/communication-compliance-case-study.md) |
solutions | Empower People To Work Remotely Train Monitor Usage | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/empower-people-to-work-remotely-train-monitor-usage.md | description: Train your users and ensure that issues are dealt with quickly. Train your hybrid workers on: - Proper sign-in procedures using MFA, including registering an additional verification method.-- The use of devices and how endpoint management policies can be used to block access for non-compliant or unmanaged devices.-- The use of allowed apps and how endpoint management application polices can be used to block the use of some apps.+- The use of devices and how endpoint management policies can be used to block access for noncompliant or unmanaged devices. +- The use of allowed apps and how endpoint management application policies can be used to block the use of some apps. - Windows 11 or 10 Enterprise security features. - How to use [Teams](/microsoftteams/training-microsoft-teams-landing-page) for chat, video-based conferencing, document sharing, and threaded conversations. - How to use [Outlook](https://support.office.com/article/outlook-training-8a5b816d-9052-4190-a5eb-494512343cca) for email and scheduling. Train your hybrid workers on: This training should include hands-on exercises so that your workers can experience these capabilities and their results. -Create a forum for your workers to ask questions or get issues addressed, such as a team or a Yammer group. +Create a forum for your workers to ask questions or get issues addressed, such as a team or a Viva Engage group. In the weeks after training: Then, retrain your users as needed. ## Results of Step 6 -Your hybrid workers are trained and there is a responsive and open forum for them to provide feedback and post issues with security, compliance, remote access, and productivity apps. +Your hybrid workers are trained and there's a responsive and open forum for them to provide feedback and post issues with security, compliance, remote access, and productivity apps. |
solutions | Empower People To Work Remotely | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/empower-people-to-work-remotely.md | To enable the capabilities of Microsoft 365 for your hybrid workers, use these M |Configuration Manager|Manage software installations, updates, and settings on your devices|Requires separate Configuration Manager licenses| |Endpoint Analytics|Determine the update readiness of your Windows clients.|Requires separate Configuration Manager licenses| |Windows Autopilot|Set up and pre-configure new Windows 11 or 10 devices for productive use.|Microsoft 365 E3 or E5|-|Microsoft Teams, Exchange Online, SharePoint Online and OneDrive, Microsoft 365 Apps, Microsoft Power Platform, and Yammer|Create, communicate, and collaborate.|Microsoft 365 E3 or E5| +|Microsoft Teams, Exchange Online, SharePoint Online and OneDrive, Microsoft 365 Apps, Microsoft Power Platform, and Viva Engage|Create, communicate, and collaborate.|Microsoft 365 E3 or E5| |||| For security and compliance criteria, see [Deploy security and compliance for remote workers](empower-people-to-work-remotely-security-compliance.md). |
solutions | End Life Cycle Groups Teams Sites Viva Engage | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/end-life-cycle-groups-teams-sites-viva-engage.md | + + Title: "End of lifecycle options for groups, teams, and Viva Engage" + Last updated : 08/12/2020++++audience: Admin +++ms.localizationpriority: medium ++- highpri +- M365-collaboration +- m365solution-collabgovernance ++- M365solutions +f1.keywords: NOCSH +recommendations: false +description: "End of lifecycle options for groups, teams, and Viva Engage." +++# End of lifecycle options for groups, teams, and Viva Engage ++Microsoft 365 Groups and Microsoft Teams work with multiple connected services. When a group or team is deleted, most of the information in the connected services is also deleted. This article describes options for retaining information by moving it out of the group or team before deletion. ++A common practice for groups or teams that are no longer required is to move the files out of the team and archive them in another location such as a SharePoint document library. This practice is based on a legacy style of working where information is stored in files and folders, and communications are conducted via email. ++The following table outlines the services associated with groups and teams and key types of content found in each of them: ++|Service|Types of content| +|:|:| +|Teams|Channel conversations, files in channels| +|Forms|Survey structure and results| +|OneNote|Notebook| +|Outlook|Mail and calendar| +|Planner|Project status and task information| +|Power Automate|Workflows| +|Power BI|Data, reports, and dashboards| +|Project on the web|Project plans| +|Roadmap|Roadmaps| +|SharePoint|Files, lists, Teams channel wiki data| +|Stream|Videos| +|Viva Engage|Conversations| ++When deleting a group or team, most of the associated resources are also deleted. Exceptions include: ++- Videos in Stream remain and are owned by the person who uploaded/recorded them +- Flows in Power Automate remain and are owned by the person who created them. +- Project and roadmap data in Project on the web remains in the CDS and can be restored separately. ++Groups and teams remain in a soft-delete state for 30 days and can be restored at any time. However, after the 30 days they, and any associated resources such as services and content, are purged from the Microsoft 365 environment. Any content protected by a retention policy remains available through eDiscovery searches. ++## End of life cycle considerations for group-connected services ++There are three key areas that team and group owners and IT administrators need to consider when deleting a group or team. ++**Content** ++Does the content need to be retained after the team is no longer there? Is it sufficient to rely on retention capabilities of Microsoft 365, or is some of the content in apps and services that don't offer retention? Does the content need to be retained for record management, archival, or future use and reference purposes? ++To avoid any potential data loss, these questions must be asked before any team is archived or deleted. ++**Services** ++Does content need to stay in its current working form? For example, does the Power BI report need to continue to be accessible? Do the Form results need to be available in the visual summary view? Are the lists in SharePoint linked to or embedded anywhere? ++These questions must be asked before the underlying group is deleted because exporting the content may not be sufficient. ++**Guests** ++When guests are invited to a team, a guest account is created in the host organizationΓÇÖs Azure Active Directory before adding them to the team. When a team is deleted, guests aren't removed from Azure Active Directory. While guests can't access groups, sites, teams, or content which hasn't been shared with them, they can still potentially use features within Microsoft Teams such as starting chats, voice and video calls, and using apps. ++A team or group owner can invite someone from outside the organization to become a guest in Azure Active Directory by adding them to a team. A team owner can't, however, remove the guest from Azure Active Directory. Deleting accounts can only be performed by a global admin or user admin. ++It's important to perform guest reviews and to understand whether guests need to be removed from Azure Active Directory upon team deletion. There may be a valid case for guests to remain in the directory, such as being a member of other teams or using other Microsoft 365 or Azure services. ++## Teams ++Teams-specific content is primarily in the form of conversations. ++Conversations in channels can't be copied or moved using native Microsoft Teams functionality. They can however be exported using the Graph API. ++Additionally, if a retention policy is applied to Teams, the conversations are retained and available through eDiscovery searches. Using eDiscovery (Premium) you can [reconstruct a Teams chat conversation](/microsoft-365/compliance/conversation-review-sets). +++### Archiving a team ++The benefit of [archiving a team](/microsoftteams/archive-or-delete-a-team) is that it provides full access to the team as it was. Users can still browse channel conversations and open files even if they aren't active. Additionally, teams can be unarchived if there's a need to continue working on them (for example, if a project is extended). ++When a team is archived by an owner, it's set to read-only for members both for content within the team and if selected, the associated SharePoint site. The objective of this action is to ensure that conversations in channels are preserved in their existing state, along with SharePoint-based content such as files and wikis. ++In the SharePoint site there are no visible changes. However, no changes can be made to any files or lists because the SharePoint permissions for the Microsoft 365 group are set to **Site visitors**. This includes the OneNote notebook for the team, which is stored in the Site Assets library within the SharePoint site. ++When a team is archived, the underlying Microsoft 365 group is still subject to the expiration policy (if set), and as such the owner must continue to renew the team. ++While the teamΓÇÖs channel conversations and SharePoint site contents are set to read-only, the same isn't applied to other associated ++- Planner buckets and tasks can still be created, modified, and deleted. +- Forms can still receive submissions. +- The Outlook mailbox can still receive emails. +- Power BI dashboards, reports and data can still be modified. +- Projects and roadmaps can still be edited in Project on the web. +- Videos can still be uploaded, modified, and deleted in Stream. +- Flows in Power Automate can still be created, modified, deleted, and will continue to run. (They will fail however, if required to post a message to a channel of the archived team.) ++## Forms ++While a form can be moved from an individual account to a group, it can't be moved or copied from one group to another. There are three options available for a form when a team is deleted. ++**Duplicate the form** ++Forms can be [shared as templates](https://support.microsoft.com/office/82ea9d8a-260a-47a0-afdb-497f3d746e3f), allowing other users to copy it to their own account or a group. This doesn't retain the data from result submissions; only form structure such as questions and settings. ++**Export results to a spreadsheet** ++If the data of the form responses needs to be retained, this can be achieved by [exporting the results to an Excel spreadsheet](https://support.office.com/article/02859424-341d-406f-b32a-9a0fbaf357af). This will only export the questions and their responses as data ΓÇô it doesn't include graphs created by Forms. ++**Delete the Form** ++While deletion of the group will also result in the deletion of any associated forms, group members can [directly delete them](https://support.microsoft.com/office/2207e468-ce1b-4c4a-a256-caf631d87af0) without being an owner of the group. However, this is a manual step that doesn't provide any additional benefit. ++## OneNote ++The OneNote notebook included in a group is stored in the Site Assets library within the associated SharePoint site. While notebook files can sometimes be spread across multiple individual files, they can't be copied and opened independently. Instead, the contents of the OneNote notebook must be moved or exported using the OneNote desktop client. ++**Move pages and sections to another notebook** ++[Individually moving pages or sections to another notebook](https://support.office.com/article/c3c8b098-7f9c-4c2a-a0dc-ebb83bc76364) provides owners with an opportunity to clean up their data and take only what needs to be retained. ++**Export the entire notebook as a package** ++If the entire notebook needs to be retained with its existing structure, it can be [exported as a OneNote package](https://support.office.com/article/a4b60da5-8f33-464e-b1ba-b95ce540f309) file and then imported to a new location. Instead, this can be used as a method to retain the contents in a single file instead of the existing multi-file structure. ++**Print to PDF** ++In scenarios where some of the contents of the notebook need only to be retained for reference or as records, individual pages can be [printed to PDF and stored elsewhere](https://support.office.com/article/13d173b5-7f4c-45a8-94eb-9354d63af5cd). ++## Mailbox and calendar ++It's not uncommon for the group-associated mailbox to be used, even though many conversations may have been conducted within team channels. The mailbox only stores emails that were emailed directly to it and doesn't include emails that were sent directly to channels. ++In some cases, the emails stored within the mailbox may be notifications of meetings, Planner task updates, and other app or system-generated messages. it's important that the contents of the mailbox be reviewed to determine whether the content should be retained or deleted. ++If a retention policy is applied in Exchange, the emails and calendar items are retained and available through eDiscovery searches. ++**Export mail and calendar** ++Team or group members can [export the contents of the mailbox and calendar to an Outlook Data / Personal Storage (PST) file](https://support.office.com/article/14252b52-3075-4e9b-be4e-ff9ef1068f91). This file can then be stored elsewhere, or the contents can be imported into a different mailbox. The former isn't recommended as the contents of the PST file aren't searchable without opening it in Outlook, and the file itself can become corrupted over time. ++**IT-performed content migration** ++Administrators can use third-party tools to migrate email and calendar contents between mailboxes without any user intervention. One potential storage location could be a shared mailbox created purely to serve as an ΓÇ£archiveΓÇ¥ of the group mailbox contents. ++## Planner ++Each group or team can have multiple plans. It's important during the off-boarding process to ensure that retention requirements are addressed for each plan. Like the other services, there are several approaches to off-board content in Planner. ++**Export the plan to a spreadsheet** ++If it's only required to keep a copy of the plan for record-keeping purposes, the simplest approach is to [export the plan to an Excel spreadsheet](https://support.microsoft.com/office/4d850c6e-e548-4aab-83b4-b62b68662d2a). This is a one-way action - there's no option to import plans from a spreadsheet. ++> [!IMPORTANT] +> Exporting a plan to Excel will take most information within the plan, but won't include comments, links, or files. ++**Copy and move tasks to another Plan** ++While copying or moving tasks to another plan seems like a solution, individual tasks can only be [copied or moved between plans](https://support.microsoft.com/office/ad43a5d8-c1ad-42fd-b3da-fe97d72c8a1b) within the same group. This won't back up the data if the group associated with the plan is being deleted. ++**Copy entire plan** ++It's also possible to [copy the entire plan](https://support.microsoft.com/office/50401e13-a25f-40df-93c6-b608cc28c3d4). Copying can't be done to an existing group. Copying the plan will create a new group. Additionally, copying the entire plan won't include comments, assignments, links, attachments, or dates. ++## Power Automate ++Flows created in Power Automate and associated with a group or team don't belong to the group. They are owned by the creator and merely shared with other users and groups. As such they aren't affected if a group or team is deleted. ++**Change ownership of the flow** ++If the flow needs to continue operating, any owners can add other users or Microsoft 365 groups as owners. ++**Export the flow** ++If the flow doesn't need to continue operating but it needs to be preserved for potential future use, it can be [exported as a file](https://flow.microsoft.com/blog/import-export-bap-packages/) and imported again later. ++## Power BI ++Power BI data and workspaces can operate independently from groups and teams and like other workloads offer different ways of being off-boarded. +Classic workspaces in Power BI are associated with a Microsoft 365 Group, whereas modern workspaces are not - and can merely share their content with the group (similar to a flow). ++**Copy reports to another workspace** ++If you need the report once the group or team is deleted, it can be [copied from the existing workspace to another workspace within Power BI](/power-bi/connect-data/service-datasets-copy-reports). ++**Export data from a dashboard or report** ++Instead, if the report no longer needs to be active but the data needs to be retained, it can be [exported to Excel](/power-bi/visuals/power-bi-visualization-export-data). ++## Project ++Projects and Roadmaps created in Project for the web are associated with Microsoft 365 groups and have approaches to off-boarding similar to Power BI. ++**Assign the project to another group** ++If the project needs to be preserved in its functional state beyond the life of the group or team, it can be [assigned to a different Microsoft 365 group](/project-for-the-web/access-a-project-after-group-is-deleted#reassign-the-project). This can be done using the Dynamics 365 Administration Center. ++**Export data from the project or roadmap** ++Using the Dynamics 365 Administration Center, it's possible to [export user data from the project](/project-for-the-web/export-user-data-from-project-for-the-web) to a spreadsheet. The data can also be exported to Project file (.MPP) and XML file formats by using PowerShell. ++## SharePoint ++All files in team channels are stored in the SharePoint site of the associated group. In some cases, content other than documents may exist in SharePoint, such as lists or pages. ++Files are generally stored in three primary locations within a SharePoint site: ++- Pages - Site Pages library +- Images used in pages ΓÇô Site Assets library +- Files in channels ΓÇô Documents library +- Wiki pages ΓÇô Teams Wiki Data library ++If the site has one or more subsites, the off-boarding process will need to be repeated for each subsite. If the team contains private or shared channels, there's a separate SharePoint site for each channel. ++It's important when removing files from a group or team to consider that they may be shared with users who aren't members of the group or team. You may want to communicate the impending change to them. ++**Download files** ++Files stored in SharePoint in one of the libraries mentioned above can be [downloaded to a local computer](https://support.office.com/article/5c7397b7-19c7-4893-84fe-d02e8fa5df05). ++**Move files** ++Additionally, files can be [moved to another location within SharePoint such as a library in a different site](https://support.office.com/article/00e2f483-4df3-46be-a861-1f5f0c1a87bc). ++**Export list** ++Data stored within SharePoint lists can be [exported to an Excel spreadsheet](https://support.office.com/article/bfb2ea48-6118-4fa9-abb6-cced9424e5d9), and imported again to a list in another site. ++Alternatively, Power Automate or a third-party tool can be used to migrate the list between sites in order to retain function, list views, formatting, and other attributes. ++**ΓÇ£ExportΓÇ¥ wiki files** ++Wiki contents within team channels are stored in an HTML formatted file in a dedicated library of the associated SharePoint site. They can't be readily exported and imported to another channel wiki but can be converted to an HTML file and opened as a web page. ++## Microsoft Stream ++Like Power Automate, videos in Stream associated with a group or team aren't actually owned by the group and aren't deleted when the group is deleted. Videos in Stream are owned by the person who uploaded or created the video, even if they add users or groups as owners. Meetings recorded in a Teams channel are owned by the person who started the recording. ++**Adding other owners** ++Because the video is retained in Stream when the group is deleted, the original owner can [share the video with other users and groups, even adding them as owners](/stream/portal-edit-video). ++**Download the video** ++In scenarios where the video doesn't need to be retained in Stream or needs to be stored in an alternate location such as a records management system, an owner can [download it locally](/stream/portal-download-video). ++## Viva Engage ++Unlike conversations in Microsoft Teams, Viva Engage offers both users and administrators options to move or export conversations. ++**Move conversations to another group or community** ++Conversations can be moved to another Viva Engage group by any user, not just owners or administrators. This is possible in both the [classic Viva Engage](https://support.office.com/article/149c6399-4ac1-4ced-84d7-e0660960a872) and the [new Viva Engage](https://support.office.com/article/d63debf1-1c90-4ec5-b5ae-8a00939a1680) interfaces. ++**Export network data** ++Viva Engage network administrators [export network data](/viva/engage/manage-security-and-compliance/export-viva-engage-enterprise-data). However, doing so will export all conversations for the entire network. The resulting export lists the Group ID. It's possible to filter conversations based on this ID. ++## Related topics ++[Remove a former employee and secure data](/microsoft-365/admin/add-users/remove-former-employee) |
solutions | Energy Secure Collaboration | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/energy-secure-collaboration.md | Microsoft 365 Supervision Policies allow organizations to monitor communications With many communication channels available to employees, organizations increasingly require effective solutions for detecting and investigating communications in regulated industries such as energy trading markets. These challenges can include increasing numbers of communication channels and message volume and the risk of potential fines for policy violations. -[Microsoft Purview Communication Compliance](/microsoft-365/compliance/communication-compliance) is a compliance solution that helps minimize communication risks by helping you detect, investigate, and act on inappropriate messages in your organization. Pre-defined and custom policies allow you to scan internal and external communications for policy matches so they can be examined by designated reviewers. Reviewers can investigate scanned email, Microsoft Teams, Yammer, or third-party communications in your organization and take appropriate actions to make sure they're compliant with your organization's message standards. +[Microsoft Purview Communication Compliance](/microsoft-365/compliance/communication-compliance) is a compliance solution that helps minimize communication risks by helping you detect, investigate, and act on inappropriate messages in your organization. Pre-defined and custom policies allow you to scan internal and external communications for policy matches so they can be examined by designated reviewers. Reviewers can investigate scanned email, Microsoft Teams, Viva Engage, or third-party communications in your organization and take appropriate actions to make sure they're compliant with your organization's message standards. Communication Compliance helps compliance teams effectively and efficiently review messages for potential violations of: |
solutions | Financial Services Secure Collaboration | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/financial-services-secure-collaboration.md | Upon request, Microsoft will provide an attestation letter of compliance with SE In addition, these capabilities also help Microsoft 365 meet storage requirements for [CFTC Rule 1.31(c)-(d)](https://www.cftc.gov/sites/default/files/opa/press99/opa4266-99-attch.htm) from the **U.S. Commodity Futures Trading Commission** and [FINRA Rule Series 4510](https://www.finra.org/rules-guidance/rulebooks/finra-rules/4511) from the **Financial Industry Regulatory Authority.** Collectively, these rules represent the most-prescriptive guidance globally for financial institutions to retain records. -Additional details about how Microsoft 365 complies with SEC rule 17a-4 and other regulations is available with the [Office 365 - Cohasset Assessment - SEC Rule 17a-4(f) - Immutable Storage for SharePoint, OneDrive, Exchange, Teams, and Yammer (2022)](https://servicetrust.microsoft.com/DocumentPage/f028b699-8e39-451e-8af4-e8a66426068b) download document. +Additional details about how Microsoft 365 complies with SEC rule 17a-4 and other regulations is available with the [Office 365 - Cohasset Assessment - SEC Rule 17a-4(f) - Immutable Storage for SharePoint, OneDrive, Exchange, Teams, and Viva Engage (2022)](https://servicetrust.microsoft.com/DocumentPage/f028b699-8e39-451e-8af4-e8a66426068b) download document. ## Establish ethical walls with information barriers Financial institutions are typically required to establish and maintain a superv ### Communication compliance -[Microsoft Purview Communication Compliance](/microsoft-365/compliance/communication-compliance) is a compliance solution that helps minimize communication risks by helping you detect, investigate, and act on inappropriate messages in your organization. Pre-defined and custom policies allow you to scan internal and external communications for policy matches so they can be examined by designated reviewers. Reviewers can investigate scanned email, Microsoft Teams, Yammer, or third-party communications in your organization and take appropriate actions to make sure they're compliant with your organization's message standards. +[Microsoft Purview Communication Compliance](/microsoft-365/compliance/communication-compliance) is a compliance solution that helps minimize communication risks by helping you detect, investigate, and act on inappropriate messages in your organization. Pre-defined and custom policies allow you to scan internal and external communications for policy matches so they can be examined by designated reviewers. Reviewers can investigate scanned email, Microsoft Teams, Viva Engage, or third-party communications in your organization and take appropriate actions to make sure they're compliant with your organization's message standards. Communication compliance provides reports that enable policy review activities to be audited based on the policy and the reviewer. Reports are available to validate that policies are working as defined by an organization's written policies. They can also be used to identify communications that require review and those that aren't compliant with corporate policy. Finally, all activities related to configuring policies and reviewing communications are audited in the Office 365 unified audit log. As a result, communication compliance also helps financial institutions to comply with FINRA Rule 3120. |
solutions | Groups Naming Policy | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/groups-naming-policy.md | description: "Learn how to create a naming policy for Microsoft 365 groups." You can use a group naming policy to enforce a consistent naming strategy for groups created by users in your organization. A naming policy can help you and your users identify the function of the group, membership, geographic region, or who created the group. The naming policy can also help categorize groups in the address book. You can use the policy to block specific words from being used in group names and aliases. -The naming policy is applied to groups that are created across all groups workloads (like Outlook, Microsoft Teams, SharePoint, Planner, Yammer, etc.). It gets applied to both the group name and group alias. It also gets applied when a user creates a group and when the group name, alias, description, or avatar is edited for an existing group. +The naming policy is applied to groups that are created across all groups workloads (like Outlook, Microsoft Teams, SharePoint, Planner, Viva Engage, etc.). It gets applied to both the group name and group alias. It also gets applied when a user creates a group and when the group name, alias, description, or avatar is edited for an existing group. > [!TIP] > A Microsoft 365 group naming policy only applies to Microsoft 365 groups. It doesn't apply to distribution groups created in Exchange Online. To create a naming policy for distribution groups, see [Create a distribution group naming policy](/exchange/recipients-in-exchange-online/manage-distribution-groups/create-group-naming-policy). It's recommended that you use attributes that have values filled in for all user > [!NOTE] > A period (.) or a hyphen (-) is permitted anywhere in the group name, except at the beginning or end of the name. An underscore (_) is permitted anywhere in the group name, including at the beginning or end of the name. -- If you are using Yammer Office 365 connected groups, avoid using the following characters in your naming policy: @, \#, \[, \], \<, and \>. If these characters are in the naming policy, regular Yammer users will not be able to create groups.+- If you are using Viva Engage Office 365 connected groups, avoid using the following characters in your naming policy: @, \#, \[, \], \<, and \>. If these characters are in the naming policy, regular Viva Engage users will not be able to create groups. > [!Tip] > - Use short strings as suffix. |
solutions | Groups Services Interactions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/groups-services-interactions.md | description: "Groups services interactions" Microsoft 365 Groups provides a common fabric for several services and workloads within the Microsoft 365 platform to deliver a connected experience for end users. At its core, a Microsoft 365 group exists to provide: - A way to manage the membership (Azure AD)-- A place for messaging and conversations to take place (Exchange mailbox, Microsoft Teams, Yammer)+- A place for messaging and conversations to take place (Exchange mailbox, Microsoft Teams, Viva Engage) - A place for files to be stored (SharePoint) - A calendar for scheduling (Exchange) - A notebook for capturing notes (OneNote) -At the point of group creation, several other resources are also provisioned, however they are not visible until accessed for the first time from the service: +At the point of group creation, several other resources are also provisioned, however they aren't visible until accessed for the first time from the service: - A board for managing group tasks (Planner) - A workspace for reporting (Power BI) Examples of this include: - Power Automate for workflows - Project on the web and Roadmap for waterfall-based project management - Teams for channel-based conversations-- Yammer for communities of interest+- Viva Engage for communities of interest ## User interactions with groups Microsoft 365 Groups can be created and managed from various interfaces, both by ### Administrative experiences -Administrators can create and manage Microsoft 365 groups from several of the workload admin centers, command-line interfaces that support scripting, as well as custom-built apps interacting with the Graph API. The only exception to this is Yammer groups ΓÇô which must be created from within the Yammer web interface. +Administrators can create and manage Microsoft 365 groups from several of the workload admin centers, command-line interfaces that support scripting, as well as custom-built apps interacting with the Graph API. The only exception to this is Viva Engage groups ΓÇô which must be created from within the Viva Engage web interface. **Related settings** The admin center also provides several guest invitation control measures that go **SharePoint** -SharePoint sites are created with Owner, Member, and Visitor security groups, with the first two matching up to their Microsoft 365 group counterparts. While membership for SharePoint Online sites is generally managed by the associated Microsoft 365 group, it is not a bidirectional relationship. Any changes to membership at the Microsoft 365 group level are reflected in SharePoint, however if membership is changed in the SharePoint group, this is not reflected in the Microsoft 365 group. +SharePoint sites are created with Owner, Member, and Visitor security groups, with the first two matching up to their Microsoft 365 group counterparts. While membership for SharePoint Online sites is generally managed by the associated Microsoft 365 group, it isn't a bidirectional relationship. Any changes to membership at the Microsoft 365 group level are reflected in SharePoint, however if membership is changed in the SharePoint group, this isn't reflected in the Microsoft 365 group. ### User experiences The following services allow creation of groups by end users: - SharePoint - Stream - Microsoft Teams-- Yammer+- Viva Engage #### Restriction of group creation -A common approach to control sprawl of teams is to limit which users can create them. This can only be done by limiting the creation of groups. Doing this impacts the ability to create groups from other services where that may be necessary for end user. Microsoft 365 Groups does not support the ability to restrict the creation of groups from some apps or services while allowing it from others. +A common approach to control sprawl of teams is to limit which users can create them. This can only be done by limiting the creation of groups. Doing this impacts the ability to create groups from other services where that may be necessary for end user. Microsoft 365 Groups doesn't support the ability to restrict the creation of groups from some apps or services while allowing it from others. The experience of group creation restriction varies between apps and The experience of group creation restriction varies between apps and |Outlook|**New group** option is removed from New menu in people page| |Planner|**New plan** explains that group creation has been turned off and offers to add the plan to an existing group| |Project for the web and Roadmap|**Create group** menu explains that group creation is restricted and suggests using an existing group.|-|SharePoint|Still able to create a team site that is not connected to a group.| -|Stream|**Group** option does not appear under the **Create menu**.| -|Teams|User cannot create a team with a new group but can still create a team that utilizes an existing group.<br><br>**Create a team** button is replaced with **Create team from a group**.| -|Yammer|**Create a group** option is removed from main Groups/Communities navigation.| +|SharePoint|Still able to create a team site that isn't connected to a group.| +|Stream|**Group** option doesn't appear under the **Create menu**.| +|Teams|User can't create a team with a new group but can still create a team that utilizes an existing group.<br><br>**Create a team** button is replaced with **Create team from a group**.| +|Viva Engage|**Create a group** option is removed from main Groups/Communities navigation.| ## Services interactions with groups The following table provides an overview of Microsoft 365 Groups interactions wi |SharePoint|Site|Yes|Yes|Yes| |Stream|Channel, video|Yes|Yes|Yes| |Teams|Team|No|Yes|Yes|-|Yammer|Group|Yes|Yes|Yes| +|Viva Engage|Group|Yes|Yes|Yes| While the table above provides a high-level overview of group interactions with Microsoft 365 services, there are several nuances and intricacies that you should understand. The following sections take a more in-depth look at the specific workloads and their interactions with groups. By default, when a team is created, the mailbox and calendar associated with the **Can Teams create a group?** -Yes, creating a new team will create a new Microsoft 365 group. It is also possible to create a team for an existing group that does not currently have one. +Yes, creating a new team will create a new Microsoft 365 group. It's also possible to create a team for an existing group that doesn't currently have one. **Do teams exist without a group?** -No, it is not possible for a team to exist without a Group. +No, it isn't possible for a team to exist without a Group. **Can there be multiple teams per group?** Exchange Online provides messaging, calendar, contact, and associated functional **Can Exchange create a group?** -Yes, it is possible to create a group from the Exchange Online admin center, as well as from Outlook. You can also convert Exchange distribution lists to Microsoft 365 groups. +Yes, it's possible to create a group from the Exchange Online admin center, as well as from Outlook. You can also convert Exchange distribution lists to Microsoft 365 groups. **Does Exchange exist without a Group?** No, there can only be a single Exchange Online mailbox and calendar for a group. **Can Exchange mailboxes and calendars be associated with multiple groups?** -No, the mailbox and calendar have a 1:1 relationship with the group. It is possible to share the mailbox with other users or groups, however this does not establish any form of service association. +No, the mailbox and calendar have a 1:1 relationship with the group. It's possible to share the mailbox with other users or groups, however this doesn't establish any form of service association. **Can the Exchange mailbox or calendarΓÇÖs association with a group change?** -No, the mailbox and calendar cannot be changed to a different group. However, the content can be moved from one mailbox to another within Outlook or by using a third-party tool. +No, the mailbox and calendar can't be changed to a different group. However, the content can be moved from one mailbox to another within Outlook or by using a third-party tool. **Does deleting the mailbox delete the group?** Forms provides web-based surveys and quizzes. **Can Forms create a group?** -No, Forms cannot create a group. +No, Forms can't create a group. **Do forms exist without a group?** No, a form can only be associated with a single group. **Can a formΓÇÖs association with a group change?** -No, once a form is associated with a group (either created directly within, or ownership transferred from an individual) it cannot be moved to another group. +No, once a form is associated with a group (either created directly within, or ownership transferred from an individual) it can't be moved to another group. **Does deleting the form delete the group?** -No, it is not possible to delete a group from the Forms interface, only individual forms. +No, it isn't possible to delete a group from the Forms interface, only individual forms. ## OneNote OneNote is a digital notebook application. The OneNote notebook created with a g **Can OneNote create a group?** -No, the OneNote application cannot create a group. +No, the OneNote application can't create a group. **Do OneNote notebooks exist without a group?** Power Apps provides a canvas for app development without code. **Can Power Apps create a group?** -No, Power Apps cannot create a Microsoft 365 group. +No, Power Apps can't create a Microsoft 365 group. **Do Power Apps exist without a group?** Power Automate (formerly known as Microsoft Flow) provides workflows and automat **Can Power Automate create a group?** -No, Power Automate cannot create a Microsoft 365 group in the context of being associated with one. +No, Power Automate can't create a Microsoft 365 group in the context of being associated with one. -It is possible however to create a flow that performs various operations such as creating an Azure AD security group or updating membership of a Microsoft 365 group. +It's possible however to create a flow that performs various operations such as creating an Azure AD security group or updating membership of a Microsoft 365 group. **Do flows exist without a group?** Yes, deleting the workspace in Power BI will delete group and group-associated Power BI provides interactive data-driven dashboards and reports. -While creating a new workspace in Power BI does not create a Microsoft 365 group, creating a group by any other means creates a new (not classic) workspace in Power BI. +While creating a new workspace in Power BI doesn't create a Microsoft 365 group, creating a group by any other means creates a new (not classic) workspace in Power BI. **Key features provided to groups** While creating a new workspace in Power BI does not create a Microsoft 365 group **Can Power BI create a group?** -No, it is not possible to create a Microsoft 365 group from the new Power BI interface. +No, it isn't possible to create a Microsoft 365 group from the new Power BI interface. **Does the new Power BI workspace exist without a group?** -Yes, it is possible to have reports and workspaces created in Power BI that are not associated with Microsoft 365 groups. +Yes, it's possible to have reports and workspaces created in Power BI that are not associated with Microsoft 365 groups. **Can there be multiple workspaces per group?** Key features provided to groups. **Can Project for the web create a group?** -Yes, it is possible to create a new Microsoft 365 group directly from Project for the web. +Yes, it's possible to create a new Microsoft 365 group directly from Project for the web. **Do projects exist without a group?** Yes and no; videos in Stream are owned by the original uploader or meeting recor No, deleting videos or channels doesnΓÇÖt delete the group. However, deleting the group itself in Stream will delete group-associated services and content, except for the actual videos. -## Yammer +## Viva Engage -Yammer is an enterprise social platform designed to foster community engagement within and between organizations. +Viva Engage is an enterprise social platform designed to foster community engagement within and between organizations. -Creating a community (formerly known as ΓÇ£groupΓÇ¥) in Yammer creates a mailbox, but at present this is not used. +Creating a community (formerly known as ΓÇ£groupΓÇ¥) in Viva Engage creates a mailbox, but at present this is not used. -A Microsoft 365 group that is associated with Yammer cannot be used with a team in Microsoft Teams. +A Microsoft 365 group that is associated with Viva Engage cannot be used with a team in Microsoft Teams. -A Yammer group cannot be used with a PowerBI Pro Workspace. +A Viva Engage group cannot be used with a PowerBI Pro Workspace. **Key features provided to Groups** - Conversation area -**Can Yammer create a Microsoft 365 group?** +**Can Viva Engage create a Microsoft 365 group?** -Yes, creating a new group in Yammer will create a new Microsoft 365 group, if the platforms are connected and the user has the ability to create a group. +Yes, creating a new group in Viva Engage will create a new Microsoft 365 group, if the platforms are connected and the user has the ability to create a group. -A Yammer group with associated Microsoft 365 group cannot be created in any interface or service other than Yammer itself. +A Viva Engage group with associated Microsoft 365 group cannot be created in any interface or service other than Viva Engage itself. -**Does a Yammer group exist without a Microsoft 365 group?** +**Does a Viva Engage group exist without a Microsoft 365 group?** -Yes, it is possible to create a Yammer group without a Microsoft 365 group. +Yes, it is possible to create a Viva Engage group without a Microsoft 365 group. -If the Yammer platform is not connected to Microsoft 365 groups, or users do not have the ability to create a Microsoft 365 group, Yammer groups are created without a Microsoft 365 group association. +If the Viva Engage platform is not connected to Microsoft 365 groups, or users do not have the ability to create a Microsoft 365 group, Viva Engage groups are created without a Microsoft 365 group association. -**Can there be multiple Yammer groups per Microsoft 365 group?** +**Can there be multiple Viva Engage groups per Microsoft 365 group?** -No, the relationship between a Yammer group and a Microsoft 365 group is 1:1. +No, the relationship between a Viva Engage group and a Microsoft 365 group is 1:1. -**Can a Yammer group be associated with multiple Microsoft 365 groups?** +**Can a Viva Engage group be associated with multiple Microsoft 365 groups?** -No, the Yammer group can only be associated with a single Microsoft 365 group. It is possible for posts to be shared with or moved to other Yammer groups. +No, the Viva Engage group can only be associated with a single Microsoft 365 group. It is possible for posts to be shared with or moved to other Viva Engage groups. -**Can a Yammer groupΓÇÖs association with a Microsoft 365 group change?** +**Can a Viva Engage groupΓÇÖs association with a Microsoft 365 group change?** -No, the Yammer group can only ever be associated with the Microsoft 365 group to which it was originally associated. +No, the Viva Engage group can only ever be associated with the Microsoft 365 group to which it was originally associated. -**Does deleting the Yammer group delete the Microsoft 365 group?** +**Does deleting the Viva Engage group delete the Microsoft 365 group?** -Yes, deleting the group in Yammer will delete related Microsoft group and group-associated services and content. +Yes, deleting the group in Viva Engage will delete related Microsoft group and group-associated services and content. ## Related topics |
solutions | Groups Sharepoint Governance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/groups-sharepoint-governance.md | description: "Learn about settings interactions between Microsoft 365 Groups and Some settings for Microsoft 365 Groups and SharePoint in Microsoft 365, particularly related to sharing and group and team site creation, overlap with each other. This article provides descriptions of these interactions and best practices for how to work with these settings. - + ## The effects of SharePoint settings on Microsoft 365 groups |
solutions | Groups Teams Access Governance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/groups-teams-access-governance.md | Additional resources: [Manage sharing settings in SharePoint](/sharepoint/turn-external-sharing-on-or-off) -[Create and manage an external network in Yammer](/yammer/work-with-external-users/create-and-manage-an-external-network) +[Create and manage an external network in Viva Engage](/viva/engage/work-with-external-users/create-and-manage-an-external-network) [Configure Teams with three tiers of protection](./configure-teams-three-tiers-protection.md) |
solutions | Groups Teams Communication Governance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/groups-teams-communication-governance.md | You can control anonymous join for Teams meetings which allows anyone with a lin ## Communication compliance -Communication compliance allows you to examine communications for offensive language, sensitive information, and information related to internal and regulatory standards. Chat communications, mailboxes, and Yammer messages can all be monitored, generating alerts. With administration tools, you can quickly identify and take action on messages with policy matches. +Communication compliance allows you to examine communications for offensive language, sensitive information, and information related to internal and regulatory standards. Chat communications, mailboxes, and Viva Engage messages can all be monitored, generating alerts. With administration tools, you can quickly identify and take action on messages with policy matches. [Learn about communication compliance](../compliance/communication-compliance.md) Communication compliance allows you to examine communications for offensive lang [Manage Microsoft Teams settings for your organization](/microsoftteams/enable-features-office-365) -[Manage Yammer data compliance](/yammer/manage-security-and-compliance/manage-data-compliance) +[Manage Viva Engage data compliance](/viva/engage/manage-security-and-compliance/manage-data-compliance) |
solutions | Identity Design Principles | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/identity-design-principles.md | As stated earlier, many customers are looking to achieve a more granular delegat - **Permission Filtering** - (../compliance/index.yml) - **Compliance Boundaries** - (../compliance/set-up-compliance-boundaries.md) - **eDiscovery (Premium)** - (../compliance/overview-ediscovery-20.md)-- **Yammer** - (/yammer/manage-yammer-users/manage-yammer-admins)+- **Viva Engage** - (/viva/engage/manage-viva-engage-users/manage-viva-engage-admins) - **Multi-geo** - (../enterprise/add-a-sharepoint-geo-admin.md) - **Dynamics 365** ΓÇô (/dynamics365/) |
solutions | Manage Creation Of Groups | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/manage-creation-of-groups.md | When you limit who can create a group, it affects all services that rely on grou - Outlook - SharePoint-- Yammer+- Viva Engage - Microsoft Teams - Microsoft Stream - Planner |
solutions | Microsoft 365 Groups Expiration Policy | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/microsoft-365-groups-expiration-policy.md | description: "Learn about Microsoft 365 groups expiration policies." With the increase in usage of Microsoft 365 groups and Microsoft Teams, administrators and users need a way to clean up unused groups and teams. A Microsoft 365 groups expiration policy can help remove inactive groups from the system and make things cleaner. -When a group expires, [almost all of its associated services (the mailbox, Planner, SharePoint site, team, etc.) are also deleted](/microsoft-365/solutions/end-life-cycle-groups-teams-sites-yammer). +When a group expires, [almost all of its associated services (the mailbox, Planner, SharePoint site, team, etc.) are also deleted](/microsoft-365/solutions/end-life-cycle-groups-teams-sites-viva-engage). When a group expires it is "soft-deleted" which means it can still be recovered for up to 30 days. -Administrators can specify an expiration period and any inactive group that reaches the end of that period, and is not renewed, will be deleted. (This includes archived teams.) The expiration period begins when the group is created, or on the date it was last renewed. Group owners will automatically be sent a notification before the expiration that allows them to renew the group for another expiration interval. Expiration notices for groups used in Teams appear in the Teams Owners feed. +Administrators can specify an expiration period and any inactive group that reaches the end of that period, and isn't renewed, will be deleted. (This includes archived teams.) The expiration period begins when the group is created, or on the date it was last renewed. Group owners will automatically be sent a notification before the expiration that allows them to renew the group for another expiration interval. Expiration notices for groups used in Teams appear in the Teams Owners feed. -Groups that are actively in use are renewed automatically around 35 days before the group expires. In this case, the owner does not get any renewal notifications. Any of the following actions will automatically renew a group: -- SharePoint - View, edit, download, move, share, or upload files. (Viewing a SharePoint page does not count as an action for automatic renewal.)+Groups that are actively in use are renewed automatically around 35 days before the group expires. In this case, the owner doesn't get any renewal notifications. Any of the following actions will automatically renew a group: +- SharePoint - View, edit, download, move, share, or upload files. (Viewing a SharePoint page doesn't count as an action for automatic renewal.) - Outlook - Join or edit group, read or write group message from the group, and like a message (Outlook on the web). - Teams - Visit a teams channel.-- Yammer - View a post within a Yammer community or an interactive email in Outlook.+- Viva Engage - View a post within a Viva Engage community or an interactive email in Outlook. - Forms - View, create, or edit forms, or submit a response to a form. > [!IMPORTANT] As noted above, expiry is turned off by default. An administrator will have to e The group lifetime is specified in days and can be set to 180, 365 or to a custom value that you specify. The custom value has to be at least 30 days. -If the group does not have an owner, the expiration emails will go to the specified email. +If the group doesn't have an owner, the expiration emails will go to the specified email. -You can set the policy for all of your groups, only selected groups (up to 500), or turn it off completely by selecting **None**. When You select **None** all groups which are active and pending for verification will have no expiration date. However, the groups that are already expired are not impacted. +You can set the policy for all of your groups, only selected groups (up to 500), or turn it off completely by selecting **None**. When You select **None** all groups which are active and pending for verification will have no expiration date. However, the groups that are already expired aren't impacted. Note that currently you can't have different policies for different groups. Note that currently you can't have different policies for different groups. ## How expiry works with the retention policy -If you have set up a retention policy for groups in the Microsoft Purview compliance portal, the expiration policy works seamlessly with retention policy. When a group expires, the group's mailbox conversations and files in the group site are retained in the retention container for the specific number of days defined in the retention policy. Users will not see the group, or its content, after expiration however. +If you have set up a retention policy for groups in the Microsoft Purview compliance portal, the expiration policy works seamlessly with retention policy. When a group expires, the group's mailbox conversations and files in the group site are retained in the retention container for the specific number of days defined in the retention policy. Users won't see the group, or its content, after expiration however. ## How and when a group owner learns if their groups are going to expire If the group was created via Planner, SharePoint, or any other app, the expiration notifications will always come via email. If the group was created via Teams, the group owner will receive an email and a notification to renew through the activity section. It's not recommended that you enable expiration on a group if your group owner doesn't have a valid email address. -30 days before the group expires, the group owners (or the email addresses that you specified for groups that don't have an owner) will receive an email allowing them to easily renew the group. If they don't renew it, they'll receive another renewal email 15 days before expiration. If they still haven't renewed it, they will receive one more email notification the day before expiration. +30 days before the group expires, the group owners (or the email addresses that you specified for groups that don't have an owner) will receive an email allowing them to easily renew the group. If they don't renew it, they'll receive another renewal email 15 days before expiration. If they still haven't renewed it, they'll receive one more email notification the day before expiration. If for some reason none of the owners or admins renew the group before it expires, the admin can still restore the group for up to 30 days after expiration. For details see: [Restore a deleted Microsoft 365 group](https://support.office.com/article/restore-a-deleted-office-365-group-b7c66b59-657a-4e1a-8aa0-8163b1f4eb54). ## Archiving group contents -If you have a group that you no longer plan to use, but you want to retain its content, see [Archive groups, teams, and Yammer](end-life-cycle-groups-teams-sites-yammer.md) for information about how to export information from the different groups services. +If you have a group that you no longer plan to use, but you want to retain its content, see [Archive groups, teams, and Viva Engage](end-life-cycle-groups-teams-sites-viva-engage.md) for information about how to export information from the different groups services. ## Related topics |
solutions | Per Group Guest Access | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/per-group-guest-access.md | Title: "Prevent guests from being added to a specific group"-+ Last updated 08/12/2020 |
solutions | Plan Organization Lifecycle Governance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/plan-organization-lifecycle-governance.md | When a Microsoft 365 group is deleted, by default it's retained for 30 days. Thi If you have retention policies in place to retain chat, files, or mail, those items will be preserved after the group is deleted. See [Learn about retention policies](../compliance/retention.md) for details. -If you want to delete a group but preserve the content from one or more of the group-connected services, see [Archive groups, teams, and Yammer](end-life-cycle-groups-teams-sites-yammer.md) for information. +If you want to delete a group but preserve the content from one or more of the group-connected services, see [Archive groups, teams, and Viva Engage](end-life-cycle-groups-teams-sites-viva-engage.md) for information. ## Group naming policy |
solutions | Productivity Illustrations | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/productivity-illustrations.md | The logical architecture of productivity services in Microsoft 365, leading with |[](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/msft-m365-teams-logical-architecture.pdf) <br/> [PDF](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/msft-m365-teams-logical-architecture.pdf) \| [Visio](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/msft-m365-teams-logical-architecture.vsdx) <br>Updated January 2021 |Microsoft provides a suite of productivity services that work together to provide collaboration experiences with data governance, security, and compliance capabilities. <br/> <br/>This series of illustrations provides a view into the logical architecture of productivity services for enterprise architects, leading with Microsoft Teams.| ## Microsoft 365 for frontline workers scenarios-Microsoft 365 for frontline workers can help you connect and engage your workforce, enhance workforce management, and increase operational efficiency. You can use the capabilities included with Microsoft 365 for frontline workers, from Microsoft Teams, to SharePoint, Viva Connections, Yammer, and the Power Platform, or add in solutions from our partners in the digital ecosystem to connect with existing systems or create custom solutions for your business. +Microsoft 365 for frontline workers can help you connect and engage your workforce, enhance workforce management, and increase operational efficiency. You can use the capabilities included with Microsoft 365 for frontline workers, from Microsoft Teams, to SharePoint, Viva Connections, Viva Engage, and the Power Platform, or add in solutions from our partners in the digital ecosystem to connect with existing systems or create custom solutions for your business. Use the following posters to start envisioning what your organization can do with Microsoft 365 for frontline workers. |
syntex | Ocr Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/ocr-overview.md | + + Title: Overview of optical character recognition in Microsoft Syntex ++++ Last updated : 07/01/2023+audience: admin ++++search.appverid: ++ - enabler-strategic + - m365initiative-syntex +ms.localizationpriority: medium +description: Learn about optical character recognition in Microsoft Syntex. +++# Overview of optical character recognition in Microsoft Syntex ++The optical character recognition (OCR) service in Microsoft Syntex lets you extract printed or handwritten text from images, such as posters, drawings, and product labels, as well as from documents like articles, reports, forms, and invoices. ++The text is typically extracted as words, text lines, and paragraphs or text blocks, enabling access to digital version of the scanned text. The extracted information is indexed in search and can be made available for compliance features like [data loss prevention (DLP)](../compliance/dlp-learn-about-dlp.md). ++For example, you enable the OCR service and then add image files to your document library. Syntex automatically scans the image files, extracts the relevant text, and makes the text from the images available for search and indexing. This lets you quickly and accurately find the keywords and phrases you're looking for. ++## Requirements and limitations ++### Supported file types ++The OCR service is available for the following file types: ++- JPEG +- JPG +- PNG +- BMP +- TIFF +- PDF (image only) ++### Supported languages ++The OCR service supports more than [150 languages](/azure/cognitive-services/language-support). ++### File limitations ++- Image file sizes must be less than 50 MB. ++- Images must be at least 50 x 50 pixels and not larger than 16,000 x 16,000 pixels. ++- Only images uploaded after OCR has been enabled are scanned. ++- Currently, images that are embedded in Office documents aren't supported. + |
syntex | Ocr | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/ocr.md | Title: Extract text from images using the OCR service in Microsoft Syntex + Title: Set up and manage optical character recognition in Microsoft Syntex Previously updated : 05/31/2023 Last updated : 07/01/2023 audience: admin -description: Learn how to extract text from images using optical character recognition in Microsoft Syntex. +description: Learn how to set up and manage optical character recognition in Microsoft Syntex. -# Extract text from images using the OCR service in Microsoft Syntex +# Set up and manage optical character recognition in Microsoft Syntex -Optical character recognition (OCR) in Microsoft Syntex lets you extract printed or handwritten text from images, such as posters, drawings, and product labels, as well as from documents like articles, reports, forms, and invoices. --The text is typically extracted as words, text lines, and paragraphs or text blocks, enabling access to digital version of the scanned text. The extracted information is indexed in search and can be made available for compliance features like [data loss prevention (DLP)](../compliance/dlp-learn-about-dlp.md). --For example, you enable the OCR service and then add image files to your document library. Syntex automatically scans the image files, extracts the relevant text, and makes the text from the images available for search and indexing. This lets you quickly and accurately find the keywords and phrases you're looking for. +Before you can use the optical character recognition (OCR) service in Microsoft Syntex, it must be configured in the Microsoft 365 admin center. ## Prerequisites You can set up the OCR service in the same admin area that you used to set up bi 3. On the **Manage Microsoft Syntex** page, select **Optical character recognition**. -4. On the **Optical character recognition** page, select the SharePoint libraries where you want to enable OCR. The default is no SharePoint libraries, but you can select **Edit** to choose specific SharePoint libraries or to choose all SharePoint libraries. --### Microsoft Purview compliance portal --The compliance admin for your organization [configures the OCR settings for your tenant](../compliance/ocr-learn-about.md?#phase-3-configure-your-ocr-settings) in the Microsoft Purview compliance portal. --The compliance admin can specify which SharePoint sites to enable OCR to make that text available for [DLP policies](../compliance/dlp-learn-about-dlp.md). If there are different sites specified in the two setup locations, the maximum number of sites will be enabled for OCR. You won't be charged twice for processing. --For more information, see [Learn about optical character recognition in Microsoft Purview](../compliance/ocr-learn-about.md). +4. On the **Optical character recognition** page: -## Requirements and limitations + a. Choose which site or sites this service should be enabled for. -### Supported file types + b. To restrict user access to this service, select **No sites** or **Selected sites** and follow the instructions to either select the sites or upload a CSV listing a maximum of 100 sites. You can then manage site access permissions for the sites you selected. -The OCR service is available for the following file types: + c. Select **Save**. -- JPEG-- JPG-- PNG-- BMP-- TIFF-- PDF (image only)--### Supported languages --The OCR service supports more than [150 languages](/azure/cognitive-services/language-support). --### File limitations --- Image file sizes must be less than 50 MB.--- Images must be at least 50 x 50 pixels and not larger than 16,000 x 16,000 pixels.+### Microsoft Purview compliance portal -- Only images uploaded after OCR has been enabled are scanned.+The compliance admin for your organization [configures the OCR settings for your tenant](../compliance/ocr-learn-about.md?#phase-3-configure-your-ocr-settings) in the Microsoft Purview compliance portal. -- Currently, images that are embedded in Office documents aren't supported.+The compliance admin can specify which SharePoint sites to enable OCR to make that text available for [data loss prevention policies](../compliance/dlp-learn-about-dlp.md). If there are different sites specified in the two setup locations, the maximum number of sites will be enabled for OCR. You won't be charged twice for processing. +For more information, see [Learn about optical character recognition in Microsoft Purview](../compliance/ocr-learn-about.md). |
syntex | Prebuilt Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-overview.md | Title: Overview of prebuilt models in Microsoft Syntex + Title: Overview of prebuilt document processing in Microsoft Syntex ms.localizationpriority: medium description: Learn about prebuilt models in Microsoft Syntex. -# Overview of prebuilt models in Microsoft Syntex +# Overview of prebuilt document processing in Microsoft Syntex In addition to [custom models](model-types-overview.md#custom-models), Microsoft Syntex provides *prebuilt models* to automate the extraction of information. ## Introduction to prebuilt models -Prebuilt models are preconfigured to recognize documents and the structured information in the documents. Instead of having to create a new custom model from scratch, you can iterate on an existing pretrained model to add specific fields that fit the needs of your organization. +Prebuilt document processing uses [prebuilt models](#available-prebuilt-models) that are preconfigured to recognize documents and the structured information in the documents. Instead of having to create a new custom model from scratch, you can iterate on an existing pretrained model to add specific fields that fit the needs of your organization. Prebuilt models use optical character recognition (OCR) combined with deep learning models to identify and extract predefined text and data fields common to specific document types. You start by analyzing one of your files against the prebuilt model. You then select the detected fields that make sense for your purpose. If the model doesn't detect the fields that you need, you can analyze again by using a different file. |
syntex | Prebuilt Setup | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/prebuilt-setup.md | + + Title: Set up and manage prebuilt document processing in Microsoft Syntex ++++ Last updated : 07/12/2023+audience: admin ++++search.appverid: ++ - enabler-strategic + - m365initiative-syntex +ms.localizationpriority: medium +description: Learn how to set up and manage prebuilt document processing in Microsoft Syntex. +++# Set up and manage prebuilt document processing in Microsoft Syntex ++Before you can use prebuilt document processing in Microsoft Syntex, it must be set up in the Microsoft 365 admin center. ++## Prerequisites ++### Licensing ++Before you can use prebuilt document processing in Syntex, you must first link an Azure subscription in [Syntex pay-as-you-go](syntex-azure-billing.md). Prebuilt document processing in Syntex is billed based on the [type and number of transactions](syntex-pay-as-you-go-services.md). ++### Permissions ++You must have Global admin or SharePoint admin permissions to be able to access the Microsoft 365 admin center and set up prebuilt document processing in Syntex. ++## Set up prebuilt document processing ++After an [Azure subscription is linked to Microsoft Syntex](syntex-azure-billing.md), prebuilt document processing will be automatically set up and enabled for all SharePoint sites. ++## Manage sites ++Manage which SharePoint sites users can use to create prebuilt models to process files. ++1. In the Microsoft 365 admin center, select <a href="https://go.microsoft.com/fwlink/p/?linkid=2171997" target="_blank">**Setup**</a>, and then select **Use content AI with Microsoft Syntex**. ++2. On the **Use content AI with Microsoft Syntex** page, select **Manage Microsoft Syntex**. ++3. On the **Manage Microsoft Syntex** page, select **Prebuilt document processing**. ++4. On the **Prebuilt document processing** page: ++ a. Choose which site or sites this service should be enabled for. ++ > [!NOTE] + > Disabling a site after a model is made available to process files on that site will not disable the model. Models can still be used to process files and incur charges. A model can be made available to process files by being created on that site or in a content center. ++ b. To restrict user access to this service, select **No sites** or **Selected sites** and follow the instructions to either select the sites or upload a CSV listing a maximum of 100 sites. You can then manage site access permissions for the sites you selected. ++ c. Select **Save**. |
syntex | Set Up Content Understanding | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/set-up-content-understanding.md | description: Set up Microsoft Syntex per-user licensing. # Set up Microsoft Syntex per-user licensing -If you plan to use Microsoft Syntex with per-user licensing, follow the steps in this article to set up your licenses, and then read [Set up Microsoft Syntex](set-up-microsoft-syntex.md) to set up Microsoft Syntex features. +> [!NOTE] +> As of July 1, 2023, per-user licenses are no longer available for purchase. You will need to [set up pay-as-you-go billing](syntex-azure-billing.md).<br><br> +> Per-user licenses purchased before July 1 can still be assigned to new users. After existing per-user licenses expire, you will need to opt-in to Syntex [pay-as-you-go billing](syntex-azure-billing.md). For an overview of licensing options for Microsoft Syntex, see [Licensing for Microsoft Syntex](syntex-licensing.md). To assign licenses: 1. Select **Save changes**. -## See also --[Overview of the document processing model in AI Builder](/ai-builder/form-processing-model-overview) --[Create and manage environments in the Power Platform admin center](/power-platform/admin/create-environment) |
syntex | Set Up Microsoft Syntex | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/set-up-microsoft-syntex.md | You must have Global admin or SharePoint admin permissions to be able to access As an admin, you can also make changes to your selected settings anytime in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>. -## To set up Microsoft Syntex +## Set up Microsoft Syntex services 1. In the Microsoft 365 admin center, select <a href="https://go.microsoft.com/fwlink/p/?linkid=2171997" target="_blank">**Setup**</a>, and then view the **Files and content** section. -1. In the **Files and content** section, select **Use content AI with Microsoft Syntex**. +2. In the **Files and content** section, select **Use content AI with Microsoft Syntex**. -1. On the **Use content AI with Microsoft Syntex** page, select **Manage Microsoft Syntex**. +3. On the **Use content AI with Microsoft Syntex** page, select **Manage Microsoft Syntex**. -1. Select the Microsoft Syntex service that you want to set up. +4. Select the Microsoft Syntex service that you want to set up. -1. Choose the options that you want to use, and then select **Save**. +5. Choose the options that you want to use, and then select **Save**. +### Setup instructions by service ++The following table provides links to the specific setup instructions for each service. ++|Service |Instructions to set up service | +|:-|:-| +|Prebuilt document processing | [Set up prebuilt document processing](prebuilt-setup.md) | +|Unstructured document processing | [Set up unstructured document processing](unstructured-setup.md) | +|Optical character recognition | [Set up optical character recognition](ocr.md#set-up-optical-character-recognition) | |
syntex | Unstructured Setup | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/unstructured-setup.md | + + Title: Set up and manage unstructured document processing in Microsoft Syntex ++++ Last updated : 07/12/2023+audience: admin ++++search.appverid: ++ - enabler-strategic + - m365initiative-syntex +ms.localizationpriority: medium +description: Learn how to set up and manage unstructured document processing in Microsoft Syntex. +++# Set up and manage unstructured document processing in Microsoft Syntex ++Before you can use unstructured document processing in Microsoft Syntex, it must be set up in the Microsoft 365 admin center. ++## Prerequisites ++### Licensing ++Before you can use unstructured document processing in Syntex, you must first enter your Azure subscription in [Syntex pay-as-you-go](syntex-azure-billing.md). Unstructured document processing in Syntex is billed based on the [type and number of transactions](syntex-pay-as-you-go-services.md). ++### Permissions ++You must have Global admin or SharePoint admin permissions to be able to access the Microsoft 365 admin center and set up unstructured document processing in Syntex. ++## Set up unstructured document processing ++After an Azure subscription is linked to Microsoft Syntex, unstructured document processing will be automatically set up and enabled for all SharePoint sites. ++## Manage sites ++Manage which SharePoint sites users can use to create custom models to process files. ++1. In the Microsoft 365 admin center, select <a href="https://go.microsoft.com/fwlink/p/?linkid=2171997" target="_blank">**Setup**</a>, and then select **Use content AI with Microsoft Syntex**. ++2. On the **Use content AI with Microsoft Syntex** page, select **Manage Microsoft Syntex**. ++3. On the **Manage Microsoft Syntex** page, select **Unstructured document processing**. ++4. On the **Unstructured document processing** page: ++ a. Choose which site or sites this service should be enabled for. ++ > [!NOTE] + > Disabling a site after a model is made available to process files on that site will not disable the model. Models can still be used to process files and incur charges. A model can be made available to process files by being created either on that site or in a content center. ++ b. To restrict user access to this service, select **No sites** or **Selected sites** and follow the instructions to either select the sites or upload a CSV listing a maximum of 100 sites. You can then manage site access permissions for the sites you selected. ++ c. Select **Save**. |