Category | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
business-premium | Create Communications Site | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/create-communications-site.md | Include the following elements in a Communications site: 5. Add photos that people can use or share to an **Image gallery web part**. -![Diagram of a SharePoint Communications page with space for common elements that a campaign would need.](../media/m365-democracy-comms-site.png) ## Infographic: Create a Communications site infographic The following links for PowerPoint and PDF can be downloaded and printed in tabloid format (also known as ledger, 11 x 17, or A3). -[![Image for communications site infographic.](../media/M365-Campaigns-CreateCommunicationSite-358-201.png)](https://download.microsoft.com/download/3/f/f/3ff49b41-e5a4-4993-a00c-7f791a80b627/M365CampaignsCreateCommunicationSite.pdf) +[:::image type="content" source="media/M365-Campaigns-CreateCommunicationSite-358-201.png" alt-text="Image for communications site infographic.":::](https://download.microsoft.com/download/3/f/f/3ff49b41-e5a4-4993-a00c-7f791a80b627/M365CampaignsCreateCommunicationSite.pdf) [PDF](https://download.microsoft.com/download/3/f/f/3ff49b41-e5a4-4993-a00c-7f791a80b627/M365CampaignsCreateCommunicationSite.pdf) | [PowerPoint](https://download.microsoft.com/download/3/f/f/3ff49b41-e5a4-4993-a00c-7f791a80b627/M365CampaignsCreateCommunicationSite.pptx) |
business-premium | Create Teams For Collaboration | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/create-teams-for-collaboration.md | For example, a business, legal firm, or healthcare practice might create the fol 1. **An external communications team or teams:** Coordinate with your vendors, partners, or clients without allowing them into anything sensitive. Set up different channels for specific groups. -![Diagram of a Microsoft Teams window with three separate teams to allow for secure communication and collaboration within a business.](../media/m365-democracy-teams-business-collab.png) And campaigns could create the following teams to communicate and collaborate securely: And campaigns could create the following teams to communicate and collaborate se 3. **A partners team:** Coordinate with your vendors, partners, or volunteers without allowing them into anything sensitive. -![Diagram of a Microsoft Teams window with three separate teams to allow for secure communication and collaboration within a campaign.](../media/m365-democracy-teams-collab.png) When you create a team, here's what else gets created: |
business-premium | M365 Business Premium Setup | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365-business-premium-setup.md | |
business-premium | M365 Campaigns Setup | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365-campaigns-setup.md | description: "Setup overview for Microsoft 365 for Campaigns or other businesses This article describes how to get Microsoft 365 for Campaigns (a special offering for campaigns and political parties in the USA), how to complete the basic setup process, and identify next steps. ## Get Microsoft 365 for Campaigns For examples of privacy and consent notices, see Appendix A in [Searching and Se To help your staff learn about steps to protect your campaign from cyber threats, use this downloadable guide: -[![Image for secure your help protect your campaign info graphic.](../media/M365-Campaigns-WhatCanUsersDoToSecure-358x201.png)](https://download.microsoft.com/download/f/c/5/fc58bc0c-773a-4ac8-a232-6f986f61ef58/M365CampaignsWhatCanUsersDoToSecure.pdf) +[:::image type="content" source="media/M365-Campaigns-WhatCanUsersDoToSecure-358x201.png" alt-text="Image for secure your help protect your campaign info graphic.":::](https://download.microsoft.com/download/f/c/5/fc58bc0c-773a-4ac8-a232-6f986f61ef58/M365CampaignsWhatCanUsersDoToSecure.pdf) [PDF](https://download.microsoft.com/download/f/c/5/fc58bc0c-773a-4ac8-a232-6f986f61ef58/M365CampaignsWhatCanUsersDoToSecure.pdf) | [PowerPoint](https://download.microsoft.com/download/f/c/5/fc58bc0c-773a-4ac8-a232-6f986f61ef58/M365CampaignsWhatCanUsersDoToSecure.pptx) |
business-premium | M365bp Collaborate Share Securely | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-collaborate-share-securely.md | description: "An overview on how to collaborate and share files and communicate # Collaborate and share securely with Microsoft 365 Business Premium The best way to collaborate and share securely is to use Microsoft Teams, and Teams is included in Microsoft 365 Business Premium. With Teams, all your files and communications are in a protected environment. With Teams, you can help set up and configure secure file sharing and communication within your organization. |
business-premium | M365bp Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-overview.md | Microsoft 365 Business PremiumΓÇöwith its world class [productivity and cybersec You are your organization's first and best defense against hackers and cyberattackers, including random individuals, organized crime, or highly sophisticated nation states. The task before you is this: let Microsoft 365 Business Premium help secure your organization's future! Approach this task by taking on the following six goals: |What to do|How to do it| ||| |
business-premium | M365bp Protect Admin Accounts | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-admin-accounts.md | To create more admin accounts: 1. In the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?linkid=837890), choose **Users** \> **Active users** in the left nav. - ![Choose Users and then Active users in the left nav.](../media/Activeusers.png) + :::image type="content" source="media/Activeusers.png" alt-text="Choose Users and then Active users in the left nav." lightbox="media/Activeusers.png"::: 2. On the **Active users** page, select **Add a user** at the top of the page. To create more admin accounts: 5. In **Optional settings**, define the role of the user, including adding Admin center access if appropriate. - :::image type="content" source="media/m365bp-global-admin.png" lightbox="media/m365bp-global-admin.png" alt-text="Define new user roles."::: + :::image type="content" source="media/m365bp-global-admin.png" alt-text="Define new user roles." lightbox="media/m365bp-global-admin.png"::: 6. Finish and review your settings and select **Finish adding** to confirm the details. |
business-premium | M365bp Protect Against Malware Cyberthreats | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-against-malware-cyberthreats.md | This article describes how to increase your threat protection with Microsoft 365 Your subscription includes [preset security policies](../security/office-365-security/preset-security-policies.md) that use recommended settings for anti-spam, anti-malware, and anti-phishing protection. By default, built-in protection is enabled; however, consider applying standard or strict protection for increased security. > [!NOTE] > Preset security policies are not the same thing as [security defaults](m365bp-turn-on-mfa.md). Typically, you'll be using *either* security defaults *or* Conditional Access first, and then you'll add your security policies. [Preset security policies](#what-are-preset-security-policies) simplify the process of adding your security policies. You can also [create optional custom security policies](#6-create-additional-security-policies-for-email-and-collaboration-if-needed) (if needed). Alert policies are useful for tracking user and admin activities, potential malw The following image shows some of the default policies that are included with Microsoft 365 Business Premium. -![Default alert policies included with Microsoft 365.](../media/alertpolicies.png) ### View your alert policies The following image shows some of the default policies that are included with Mi 3. Select an individual policy to view more details or to edit the policy. The following image shows a list of alert policies with one policy selected: - :::image type="content" source="media/selected-alert-policy.png" lightbox="media/selected-alert-policy.png" alt-text="Screenshot of a selected alert policy."::: + :::image type="content" source="media/selected-alert-policy.png" alt-text="Screenshot of a selected alert policy." lightbox="media/selected-alert-policy.png"::: > [!TIP] > For more information, see [alert policies](../compliance/alert-policies.md). You can help people in your organization share their calendars appropriately for The following image shows that calendar sharing isn't allowed. - ![Screenshot of showing external calendar sharing as not allowed.](../media/nocalendarsharing.png) + :::image type="content" source="media/nocalendarsharing.png" alt-text="Screenshot of showing external calendar sharing as not allowed." lightbox="media/nocalendarsharing.png"::: The following image shows the settings when calendar sharing is allowed with an email link with only free/busy information. - ![Screenshot of calendar free/busy sharing with anyone.](../media/sharefreebusy.png) + :::image type="content" source="media/sharefreebusy.png" alt-text="Screenshot of calendar free/busy sharing with anyone." lightbox="media/sharefreebusy.png"::: If your users are allowed to share their calendars, see [these instructions](https://support.office.com/article/7ecef8ae-139c-40d9-bae2-a23977ee58d5) for how to share from Outlook on the web. |
business-premium | M365bp Protect Managed Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-managed-devices.md | description: "Learn how to secure managed devices from security threats and cybe # Secure managed devices with Microsoft 365 Business Premium Microsoft 365 Business Premium includes [Microsoft Defender for Business](../security/defender-business/mdb-overview.md) to help protect your organization's devices from ransomware, malware, phishing, and other threats. |
business-premium | M365bp Security Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-security-overview.md | description: "Security overview for Microsoft 365 Business Premium, which provid # Configure your security protection in Microsoft 365 Business Premium After you have completed the basic setup process for [Microsoft 365 Business Premium](m365-business-premium-setup.md) (or [Microsoft 365 for Campaigns](m365-campaigns-setup.md)), your next step is to set up and configure your security protection. Microsoft 365 Business Premium includes security, compliance, identity, and management capabilities to help protect user accounts, email, files, and devices. Use this guidance to complete the following tasks: |
business-premium | M365bp Set Up Compliance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-set-up-compliance.md | Make sure you have one an appropriate role, such as Compliance Administrator ass ## Use Compliance Manager to get started Microsoft 365 Business Premium includes Compliance Manager, which can help you get started setting up your compliance features. Such features include data loss prevention, data lifecycle management, and insider risk management, to name a few. Compliance Manager can save you time by highlighting recommendations, a compliance score, and ways to improve your score. Here's how to get started: 3. On the **Overview** tab, review the information. Select an item or link to view more information, or to take actions, such as configuring a data loss prevention (DLP) policy. For example, in the **Solutions that affect your score** section, you might select the link in the **Remaining actions** column. - :::image type="content" source="./media/m365bp-compliancesolutions.png" alt-text="Screenshot of Solutions That Affect Your Score pane."::: + :::image type="content" source="media/m365bp-compliancesolutions.png" alt-text="Screenshot of Solutions That Affect Your Score pane." lightbox="media/m365bp-compliancesolutions.png"::: That action takes you to the **Improvement actions** tab, which is filtered for the item you selected. In this example we're looking at DLP policies to configure. - :::image type="content" source="./media/m365bp-dlppoliciestoconfigure.png" alt-text="Screenshot of DLP policies to configure."::: + :::image type="content" source="media/m365bp-dlppoliciestoconfigure.png" alt-text="Screenshot of DLP policies to configure." lightbox="media/m365bp-dlppoliciestoconfigure.png"::: 4. On the **Improvement actions** tab, select an item. In our example, we've selected **Create customized DLP policies or personally identifiable information**. A page loads that provides more information about the policy to configure. - :::image type="content" source="./media/m365bp-dlppolicyinfo.png" alt-text="Screenshot of information about DLP policy for customer content."::: + :::image type="content" source="media/m365bp-dlppolicyinfo.png" alt-text="Screenshot of information about DLP policy for customer content." lightbox="media/m365bp-dlppolicyinfo.png"::: Follow the information on the screen to set up your DLP policy. |
business-premium | M365bp Set Up Unmanaged Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-set-up-unmanaged-devices.md | description: "An overview of how to set up all the bring-your-own devices (BYOD) # Set up unmanaged (BYOD) devices with Microsoft 365 Business Premium Every device, whether [managed or unmanaged](m365bp-managed-unmanaged-devices.md), is a possible attack avenue into your network. Microsoft 365 Business Premium includes capabilities to help everyone protect devices, including unmanaged devices (also referred to as bring-your-own devices, or BYODs). [Learn more about managed and unmanaged devices](m365bp-managed-unmanaged-devices.md). To set up unmanaged (BYOD) devices, follow these steps: 3. [Protected unmanaged Windows and Mac devices](m365bp-protect-pcs-macs.md). Once you've completed these steps, proceed to [Use email securely](m365bp-use-email-securely.md).- |
business-premium | M365bp Use Email Securely | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-use-email-securely.md | description: "Know what to watch for in email. Train your team to guard against # Use email securely with Microsoft 365 Business Premium Microsoft 365 Business Premium includes features that help protect against threats. However, users play a role in using email securely, too. Email can contain malicious attacks that are cloaked as harmless communications. Email systems are especially vulnerable, because email is handled by everyone in the organization, and safety relies on people making consistently good decisions with those communications. |
business-premium | Secure Your Business Data | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/secure-your-business-data.md | This article describes the top 10 ways to secure your business data with Microso ## Top 10 ways to secure your business data The following table summarizes how to secure your data using Microsoft 365 for business. |Best practices and capabilities|Microsoft 365 Business Premium|Microsoft 365 Business Standard|Microsoft 365 Business Basic| |||||-|**1. Use multi-factor authentication** (MFA), also known as two-step verification. See [Turn on multifactor authentication](m365bp-turn-on-mfa.md).|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|- [Security defaults](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults#enabling-security-defaults) (suitable for most organizations)|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|- [Conditional Access](m365bp-turn-on-mfa.md) (for more stringent requirements)|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|**2. Set up and protect your administrator accounts**. See [Protect your admin accounts](m365bp-protect-admin-accounts.md).|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|**3. Use preset security policies to protect email and collaboration content**. See [Review and apply preset security policies](/microsoft-365/business-premium/m365bp-protect-against-malware-cyberthreats#1-review-and-apply-preset-security-policies-for-email-and-collaboration).|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|- [Anti-spam, anti-malware, and anti-phishing protection](../security/office-365-security/eop-about.md) for email|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|- [Advanced anti-phishing, spoof settings, impersonation settings, Safe Links, and Safe Attachments](../security/office-365-security/mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) for email and Office documents|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|**4. Protect all devices**, including personal and company devices. See [Secure managed and unmanaged devices](m365bp-managed-unmanaged-devices.md).|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|- [Microsoft 365 Apps](m365bp-users-install-m365-apps.md) (Word, Excel, PowerPoint, and more) installed on users' computers, phones, and tablets|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|| -|- [Windows 10 or 11 Pro Upgrade](m365bp-upgrade-windows-pro.md) from Windows 7 Pro, Windows 8 Pro, or Windows 8.1 Pro|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|- [Advanced threat protection](m365bp-onboard-devices-mdb.md) for users' computers, phones, and tablets|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|**5. Train everyone on email best practices**. See [Protect yourself against phishing and other attacks](m365bp-avoid-phishing-and-attacks.md).|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|- [Anti-spam, anti-malware, and anti-phishing protection](../security/office-365-security/eop-about.md) for email|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|- [Advanced threat protection](../security/office-365-security/mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) for email and Office documents|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|**6. Use Microsoft Teams for collaboration and sharing**.|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|- [Microsoft Teams](create-teams-for-collaboration.md) for communication, collaboration, and sharing|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|- [Safe Links & Safe Attachments](/microsoft-365/security/office-365-security/mdo-support-teams-about) with Microsoft Teams|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|- [Sensitivity labels for meetings](/microsoft-365/compliance/sensitivity-labels-meetings) to protect calendar items, Microsoft Teams meetings, and chat|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|- [Data Loss Prevention](/microsoft-365/compliance/dlp-teams-default-policy) in Microsoft Teams to safeguard company data|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|**7. Set sharing settings for SharePoint and OneDrive files and folders**.|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|- [Safe Links](/microsoft-365/security/office-365-security/safe-links-about) and [Safe Attachments](/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-about) for SharePoint and OneDrive|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|- [Sensitivity labels](/microsoft-365/compliance/get-started-with-sensitivity-labels) to mark items as sensitive, confidential. etc.|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|- [Data Loss Prevention](/microsoft-365/compliance/get-started-with-the-default-dlp-policy) to safeguard company data|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|**8. Use Microsoft 365 Apps on devices**|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|| -|- [Outlook and Web/mobile versions of Microsoft 365 Apps](https://support.microsoft.com/en-us/office/what-is-microsoft-365-for-business-56e60c2b-1929-4a04-bd9b-ff5b844364f3) for all users|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|- [Microsoft 365 Apps](m365bp-users-install-m365-apps.md) installed on users' devices|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|| -|- [Employee quick setup guide](https://support.microsoft.com/office/7f34c318-e772-46a5-8c0a-ab86661542d1) to help users get set up and running|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|**9. Manage calendar sharing for your business**.|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|- [Outlook](../admin/setup/setup-outlook.md) for email and calendars|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| -|- [Data Loss Prevention](/microsoft-365/compliance/get-started-with-the-default-dlp-policy) to safeguard company data|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::||| -|**10. Maintain your environment** by performing tasks, such asl adding or removing users and devices. See [Maintain your environment](m365bp-mdb-maintain-environment.md).|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::|:::image type="content" source="../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included":::| +|**1. Use multi-factor authentication** (MFA), also known as two-step verification. See [Turn on multifactor authentication](m365bp-turn-on-mfa.md).|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Security defaults](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults#enabling-security-defaults) (suitable for most organizations)|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Conditional Access](m365bp-turn-on-mfa.md) (for more stringent requirements)|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|**2. Set up and protect your administrator accounts**. See [Protect your admin accounts](m365bp-protect-admin-accounts.md).|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|**3. Use preset security policies to protect email and collaboration content**. See [Review and apply preset security policies](/microsoft-365/business-premium/m365bp-protect-against-malware-cyberthreats#1-review-and-apply-preset-security-policies-for-email-and-collaboration).|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Anti-spam, anti-malware, and anti-phishing protection](../security/office-365-security/eop-about.md) for email|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Advanced anti-phishing, spoof settings, impersonation settings, Safe Links, and Safe Attachments](../security/office-365-security/mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) for email and Office documents|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|**4. Protect all devices**, including personal and company devices. See [Secure managed and unmanaged devices](m365bp-managed-unmanaged-devices.md).|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|- [Microsoft 365 Apps](m365bp-users-install-m365-apps.md) (Word, Excel, PowerPoint, and more) installed on users' computers, phones, and tablets|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|| +|- [Windows 10 or 11 Pro Upgrade](m365bp-upgrade-windows-pro.md) from Windows 7 Pro, Windows 8 Pro, or Windows 8.1 Pro|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|- [Advanced threat protection](m365bp-onboard-devices-mdb.md) for users' computers, phones, and tablets|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|**5. Train everyone on email best practices**. See [Protect yourself against phishing and other attacks](m365bp-avoid-phishing-and-attacks.md).|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Anti-spam, anti-malware, and anti-phishing protection](../security/office-365-security/eop-about.md) for email|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Advanced threat protection](../security/office-365-security/mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) for email and Office documents|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|**6. Use Microsoft Teams for collaboration and sharing**.|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Microsoft Teams](create-teams-for-collaboration.md) for communication, collaboration, and sharing|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Safe Links & Safe Attachments](/microsoft-365/security/office-365-security/mdo-support-teams-about) with Microsoft Teams|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|- [Sensitivity labels for meetings](/microsoft-365/compliance/sensitivity-labels-meetings) to protect calendar items, Microsoft Teams meetings, and chat|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|- [Data Loss Prevention](/microsoft-365/compliance/dlp-teams-default-policy) in Microsoft Teams to safeguard company data|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|**7. Set sharing settings for SharePoint and OneDrive files and folders**.|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Safe Links](/microsoft-365/security/office-365-security/safe-links-about) and [Safe Attachments](/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-about) for SharePoint and OneDrive|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|- [Sensitivity labels](/microsoft-365/compliance/get-started-with-sensitivity-labels) to mark items as sensitive, confidential. etc.|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|- [Data Loss Prevention](/microsoft-365/compliance/get-started-with-the-default-dlp-policy) to safeguard company data|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|**8. Use Microsoft 365 Apps on devices**|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|| +|- [Outlook and Web/mobile versions of Microsoft 365 Apps](https://support.microsoft.com/en-us/office/what-is-microsoft-365-for-business-56e60c2b-1929-4a04-bd9b-ff5b844364f3) for all users|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Microsoft 365 Apps](m365bp-users-install-m365-apps.md) installed on users' devices|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|| +|- [Employee quick setup guide](https://support.microsoft.com/office/7f34c318-e772-46a5-8c0a-ab86661542d1) to help users get set up and running|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|**9. Manage calendar sharing for your business**.|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Outlook](../admin/setup/setup-outlook.md) for email and calendars|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| +|- [Data Loss Prevention](/microsoft-365/compliance/get-started-with-the-default-dlp-policy) to safeguard company data|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::||| +|**10. Maintain your environment** by performing tasks, such asl adding or removing users and devices. See [Maintain your environment](m365bp-mdb-maintain-environment.md).|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::|:::image type="content" source="media/green-check-mark.png" alt-text="Included":::| For more information about what each plan includes, see [Microsoft 365 User Subscription Suites for Small and Medium-sized Businesses](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWR6bM). |
business-premium | Set Up Meetings | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/set-up-meetings.md | Make sure members of the organization use Microsoft Teams for all meetings. Team With Teams, you don't need to be a member of the organization or even have an account to join a meeting. You can schedule and run online meetings where you can share your screen, share files, assign tasks, and more. Political campaigns can include staff, volunteers, or guests that are outside your organization. You can easily meet with clients, staff or partners over Microsoft Teams, and in a secure and worry-free environment. -[![An illustration of two users in a meeting.](../media/HostOnlineMeeting-thumb-358x201.png)](https://go.microsoft.com/fwlink/?linkid=2078712) +[:::image type="content" source="media/HostOnlineMeeting-thumb-358x201.png" alt-text="An illustration of two users in a meeting.":::](https://go.microsoft.com/fwlink/?linkid=2078712) Download an infographic in [PDF](https://go.microsoft.com/fwlink/?linkid=2078712) or [PowerPoint](https://go.microsoft.com/fwlink/?linkid=2079515) to get a quick overview of how to join or host an online meeting with Microsoft Teams. |
business-premium | Share Files And Videos | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/share-files-and-videos.md | description: "Share files and videos inside your campaign with Microsoft Teams a It's important to pay attention to who can view and edit files, and where those files are stored. Files should be stored in a secure location with the proper permissions applied. With Microsoft 365 Business Premium, users can use Microsoft Teams to store and share files. Alternately, you can send a SharePoint link. Sending a link rather than an email attachment helps ensure that you know who is viewing or modifying files. Files can't be viewed or modified without permissions granted, whereas email attachments are easily forwarded. -![Diagram of a Microsoft Teams window, showing Files tab and Get link on the menu.](../media/m365-democracy-teams-sharefiles.png) With files in Microsoft Teams and SharePoint, files can also be worked on and reviewed together, even tracking changes as needed. In Teams, files are shared inside of a firm, practice, or campaign. If you need to share them externally with people outside your organization, you can add them as guests to a team or send them a secure SharePoint link. To create and share videos, follow these steps. Download an infographic in [PDF](https://go.microsoft.com/fwlink/?linkid=2079435) or [PowerPoint](https://go.microsoft.com/fwlink/?linkid=2079438) to get a quick overview of ways to share your files. -[![An illustration of sharing files with different users.](../media/ShareYourfiles-thumb-358x201.png)](https://go.microsoft.com/fwlink/?linkid=2079435) +[:::image type="content" source="media/ShareYourfiles-thumb-358x201.png" alt-text="An illustration of sharing files with different users.":::](https://go.microsoft.com/fwlink/?linkid=2079435) ## Next step |
lighthouse | M365 Lighthouse Deploy Powershell Script | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-deploy-powershell-script.md | + + Title: "Deploy a PowerShell script from Microsoft 365 Lighthouse" +f1.keywords: NOCSH ++++ Last updated : 07/12/2024+audience: Admin +++ms.localizationpriority: medium ++- Tier1 +- scotvorg +- M365-subscription-management +- Adm_O365 +- essentials-manage ++- AdminSurgePortfolio +- M365-Lighthouse +search.appverid: MET150 +description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to deploy a PowerShell script from Lighthouse." +++# Deploy a PowerShell script from Microsoft 365 Lighthouse ++PowerShell scripts are plain text files that you can use to automate processes. You can deploy PowerShell scripts and check script results for Intune-managed devices from Lighthouse instead of having to go to the Scripts page in Microsoft Intune for each customer tenant. ++## Before you begin ++Ensure that the target devices on which you're running the PowerShell script are running Windows 10 or later (excluding Windows 10 Home) and enrolled in Intune. ++For a detailed list of requirements and to learn more about using PowerShell scripts, see [Use PowerShell scripts on Windows 10/11 devices in Intune](/mem/intune/apps/intune-management-extension). ++## Create and deploy a PowerShell script ++1. In the left navigation pane in Lighthouse, select **Tenants**. ++2. From the list of tenants, select any tenant to open the tenant details. + +3. Select the **Scripts** tab, and then select **Create script**. ++4. From the **Target group** dropdown list, select the Microsoft Entra group to use to target the devices on which the script will run. The default is **All Devices**. ++5. In the **Title** box, enter a name for the script. Script names appear on the **Scripts** tab in Lighthouse and in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2109431" target="_blank">Microsoft Intune admin center</a>. ++6. (Optional) Enter a description of the script. ++7. In the **PowerShell script** box, enter the script or upload the script file. The maximum file size is 4 MB. ++8. Select **Deploy**. + +## Next steps ++On the **Scripts** page in Lighthouse, select the script from the list to open the script details. From here, you can see a list of devices targeted to run the script and the status of the script. Keep in mind that it might take some time for the script to run. For help troubleshooting script issues, see [Common issues and resolutions when using PowerShell scripts on Windows 10/11 devices in Intune](/mem/intune/apps/intune-management-extension). ++## Related content ++[Manage Microsoft Entra groups and group membership](/entra/fundamentals/how-to-manage-groups) (article)\ +[Use PowerShell scripts on Windows 10/11 devices in Intune](/mem/intune/apps/intune-management-extension) (article) |
loop | Loop Components Teams | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/loop/loop-components-teams.md | For information on admin settings for Loop components in Teams, see [Settings ma ## Clients and platforms +- Available on Loop apps on Windows, iOS, Android, and web. - Available on Teams apps on Windows, Mac, iOS, Android, and web. - Available on Outlook apps on Windows and web. - Available on OneNote apps on Windows and web. - Available on Whiteboard apps on Windows, Surface, iOS, Android, and web. iOS and Android are "view and edit" but users can't paste new ones.+- Available on Office apps on iOS and Android. ## Loop components and .loop files Version History allows you to review, restore, or copy from previous versions of ## What apps can open and edit .loop files? -The .loop files can only be opened as links in your browser, such as in Loop, and as Loop components in Teams chat, Outlook email, Whiteboard, and Word for the web. If downloaded, they can't be opened again without first uploading them back to OneDrive or SharePoint. +The .loop files can only be opened as links in your browser, such as in Loop, and as Loop components in Teams chat, Outlook email, and all of the apps listed in the "Clients and Platforms" section above. If downloaded, they can't be opened again without first uploading them back to OneDrive or SharePoint. ## If Loop is disabled from the admin switch, what will the user experience be? If you disable these experiences as outlined in the [Settings management](loop-c - With your tenant's default file permissions set to *Specific people* (only the people the user specifies), copying the link to the Loop component and pasting it in another Teams chat requires the sender to use the permissions dialog and add the recipients in the Specific people option to grant access properly. - With your tenant's default file permissions set to *Specific people* (only the people the user specifies), creating a Loop component in a group chat with more than 20 members requires the sender to manually select the permission options for the component. - Searching for Loop components in Teams search or Outlook email search returns a link to the Loop component, not the message itself that contained the Loop component link.-- Loop components are disabled in federated chats.-- Guests aren't able to view or collaborate on a Loop component.+- Loop components are disabled in most federated environments. - External recipients of emails aren't able to view or collaborate on a Loop component. - Loop components don't load if the file was moved to a different library. If the file is moved to a different folder within the same library, then the Loop components continue to load in the message containing the link to the Loop component. |