Category | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
admin | What Subscription Do I Have | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/what-subscription-do-i-have.md | f1.keywords: -+ audience: Admin |
admin | Change Address Contact And More | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/change-address-contact-and-more.md | f1.keywords: -+ audience: Admin |
admin | Customize Your Organization Theme | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/customize-your-organization-theme.md | Check out all of our small business content on [Small business help & learning]( As the admin of your organization, you can create multiple themes for the people in your organization, and select which themes apply to different members of your organization. The organization theme is what appears in the top navigation bar for people in your organization. -You can add or update a default theme that applies to everyone within your org. You can also create up to four additional group themes that can be assigned to multiple Microsoft 365 groups. +You can add or update a default theme that applies to everyone in your organization. You can also create up to four additional group themes that can be assigned to multiple Microsoft 365 groups. ## Add or update your organization's theme You can add or update a default theme that applies to everyone within your org. 2. On the **Organization profile** tab, select **Custom themes**. -3. Choose **Add theme**. +3. Choose **Add theme** and add the required info for the tabs. All organization themes can be customized using the following tabs. You can create up to four additional group themes. On the **Logos** page, you can add your logos, and specify the URL where users will navigate to when they select the logo. -- **Default logo**: Add a URL location that points to your logo. Make sure that the URL uses HTTPS. Add a HTTPS image url that allows anonymous access and doesn't require authentication. For default theme, you also have an option to upload a logo image that is less than 10kb. Your default logo can be in the JPG, PNG, GIF, or SVG format. For SVG images, they will be resized to fit 24 pixels vertically. JPG, PNG, GIF images will be scaled to fit 200 x 48 pixels. Logo aspect ratio will always be preserved.+- **Default logo**: Add a URL location that points to your logo. Make sure that the URL uses HTTPS. Add an HTTPS image url that allows anonymous access and doesn't require authentication. For default theme, you also have an option to upload a logo image that is less than 10kb. Your default logo can be in the JPG, PNG, GIF, or SVG format. For SVG images, they will be resized to fit 24 pixels vertically. JPG, PNG, GIF images will be scaled to fit 200 x 48 pixels. Logo aspect ratio will always be preserved. - **Alternate logo**: Add a URL location that points to your logo. Your alternate logo should be optimized for use in Microsoft 365 dark themes. Same requirements as the default logo. - **On-click link**: Add a URL location that points to your logo. You can use your logo as a link to any company resource, for example, your company's website. If you donΓÇÖt select a URL location for your logo, itΓÇÖll default to the Microsoft 365 home page. Users who are assigned to multiple group themes will be shown the default theme. The default theme can only be deleted once all group themes are deleted. Make sure you delete all group themes before you try to delete the group theme. -### Why am I receiving an error message every time I upload a logo URL. +### Why am I receiving an error message every time I upload a logo URL Make sure the logo youΓÇÖre using is specified as a publicly addressable URL. Follow these steps for [uploading logos to Azure Blob Storage](/azure/storage/blobs/storage-upload-process-images?tabs=dotnet) or the [Office 365 Content Delivery Network with SharePoint Online](../../enterprise/use-microsoft-365-cdn-with-spo.md). |
admin | Download Software Licenses Csp | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/download-software-licenses-csp.md | f1.keywords: -+ audience: Admin |
commerce | About Registration Numbers | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/about-registration-numbers.md | f1.keywords: -+ audience: Admin |
commerce | Add Storage Space | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/add-storage-space.md | f1.keywords: -+ audience: Admin |
commerce | Change Payment Frequency | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/change-payment-frequency.md | f1.keywords: -+ audience: Admin |
commerce | Change Your Billing Addresses | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/change-your-billing-addresses.md | f1.keywords: -+ audience: Admin |
commerce | Future Start Date | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/future-start-date.md | f1.keywords: -+ audience: Admin |
commerce | Manage Payment Methods | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/manage-payment-methods.md | Title: "Manage payment methods" + Title: "Manage payment methods for Microsoft business accounts" f1.keywords: - CSH -description: "Buy business products or services from Microsoft by using an existing payment method or adding a new one in the Microsoft 365 admin center." Previously updated : 06/01/2022+description: "Learn how to manage your payment methods for Microsoft business products or services in the Microsoft 365 admin center." Last updated : 07/13/2023 -# Manage payment methods +# Manage payment methods for Microsoft business accounts -> [!IMPORTANT] -> As of January 26, 2021, new bank accounts are no longer supported for customers in Belgium, France, Italy, Luxembourg, Portugal, Spain, and the United States. If you're an existing customer in one of those countries, you can continue paying for your subscription with an existing bank account that is in good standing. However, you can't add new subscriptions to the bank account. --When you buy business products or services from Microsoft, you can use an existing payment method, or add a new one. You can use a credit or debit card, or bank account to pay for the things you buy. --If your business account has a billing profile, and you are a billing profile owner or billing profile contributor, you can use the billing profile that's backed by a credit card or invoice payment to make purchases or pay bills. If you're a billing invoice manager, you can only use a billing profile to pay bills. To learn more about billing profiles and roles, see [Manage billing profiles](manage-billing-profiles.md). +When you buy business products or services from Microsoft, you can use an existing payment method to pay for things, or add a new one. You can use a credit or debit card to pay for the things you buy. -If your business account doesn't have a billing profile, any Global or Billing admin can manage and use any bank account that is added to the business account. However, you can only manage or use credit cards that you add. --> [!NOTE] -> The option to pay with a bank account is not available in some countries or regions. +> [!IMPORTANT] >-> You must use a payment method issued from the same country as your tenant. +> - You must use a payment method issued from the same country/region as your tenant. +> - The option to pay with a bank account is no longer available. > [!TIP] > If you need help with the steps in this topic, consider [working with a Microsoft small business specialist](https://go.microsoft.com/fwlink/?linkid=2186871). With Business Assist, you and your employees get around-the-clock access to small business specialists as you grow your business, from onboarding to everyday use. -## Watch: Update your payment method --> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE3AVxy?autoplay=false] --You can easily update the payment method for your Microsoft 365 Business subscription. You can change details such as the credit card used, the name, or the address. - ## Before you begin -You must be a Global or Billing admin to do the tasks in this article. For more information, see [About admin roles](../../admin/add-users/about-admin-roles.md). +- [Find out what type of billing account you have](../manage-billing-accounts.md#view-my-billing-accounts). +- If you have a Microsoft Customer Agreement (MCA) billing account type, you must be a billing account owner or billing account contributor to manage the payment method on the account. For more information about billing account roles, see [Understand your Microsoft business billing account](../manage-billing-accounts.md). +- If you have an MCA billing account type and youΓÇÖre a billing profile owner or billing profile contributor, you can use the billing profile that's backed by a credit or debit card or invoice payment to make purchases or pay bills. If you're a billing invoice manager, you can only use a billing profile to pay bills. To learn more about billing profiles and roles, see [Understand your Microsoft business billing profile](manage-billing-profiles.md). ## Add a payment method -Adding a payment method doesn't associate any subscriptions with it. To assign a single subscription to the payment method, see [Change a payment method for a single subscription](#change-a-payment-method-for-a-single-subscription). To replace all subscriptions that use another payment method with the new one, see [Replace a payment method](#replace-a-payment-method). +> [!IMPORTANT] +> +> Adding a payment method doesn't associate it with any subscriptions or billing profiles you have. If you want to use the new payment method to pay for a subscription, you must move a subscription to it, or replace an existing payment method in a billing profile. ++If you have an MOSA billing account type, you can replace the payment method for all subscriptions that use another payment method as part of adding one. You can also [replace a payment method](#replace-a-payment-method) later on. To assign a single subscription to the payment method, see [Replace the payment method for a single subscription](#replace-the-payment-method-for-a-single-subscription). -1. In the admin center, go to the **Billing** > **Bills & payments** > <a href="https://go.microsoft.com/fwlink/p/?linkid=2018806" target="_blank">Payment methods</a> page. +1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">Microsoft 365 admin center</a>. + - If you're using the **Simplified view**, select **Subscriptions**, then select **View payment methods**. + - If you're using the Dashboard view, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=848039" target="_blank">Bills & payments</a> page, and select the **Payment methods** tab. 2. Select **Add a payment method**.-3. On the **Payment methods** page, pick a payment method from the drop-down menu. -4. Enter the information for the new card or bank account, then select **Add**. +3. On the **Add a payment method** page, enter the information for the new payment method, then select **Save**. +4. To use the new payment method to pay for all subscriptions currently paid for with another payment method, select **Replace an existing payment method**. +5. Select the payment method you want to replace, then select **Replace**. ## Update payment method details -You can change the name on the credit or debit card, billing address, or expiration date for an existing payment method. However, you can't change the card or account number. If the account number has changed, [replace it with a different payment method](#replace-a-payment-method), and then [delete the old one](#delete-a-payment-method). +You can change the name, billing address, or expiration date for an existing credit or debit card. However, you can't change the card number. If the account number has changed, [replace it with a different payment method](#replace-a-payment-method), and then [delete the old one](#delete-a-payment-method). -1. In the admin center, go to the **Billing** > **Bills & payments** > <a href="https://go.microsoft.com/fwlink/p/?linkid=2018806" target="_blank">Payment methods</a> page. -2. Select the row of the payment method to update. In the right pane, select **Edit**. +1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>. + - If you're using the **Simplified view**, select **Subscriptions**, then select **View payment methods**. + - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=848039" target="_blank">Bills & payments</a> page, and select the **Payment methods** tab. +2. Select the payment method to update. In the right pane, select **Edit**. 3. Update your payment method information, including the name on the credit or debit card, billing address, or expiration date, and then select **Save**. +> [!IMPORTANT] +> +> If you update a credit or debit card, you must enter the security code before any changes are saved. + ## Replace a payment method -When you replace a payment method, you replace it for all subscriptions and billing profiles that use the same payment method. Replacing a payment method doesn't delete the existing payment method. It's still available for you to select and use for other subscriptions and billing profiles. +When you replace an existing payment method, you can add a new payment method, or use a payment method thatΓÇÖs already in your account. To replace a payment method, you can do any of the following tasks: -To change the payment method for a single subscription, see [Change a payment method for a single subscription](#change-a-payment-method-for-a-single-subscription). +- [Replace the payment method for a billing profile](#replace-the-payment-method-for-a-billing-profile) (MCA billing account types only) +- [Replace the payment method for a single subscription](#replace-the-payment-method-for-a-single-subscription) (MOSA billing account types only) +- [Replace a single payment method for all subscriptions](#replace-a-single-payment-method-for-all-subscriptions) (MOSA billing account types only) -1. In the admin center, go to the **Billing** > **Bills & payments** > <a href="https://go.microsoft.com/fwlink/p/?linkid=2018806" target="_blank">Payment methods</a> page. -2. Select the row of the payment method to replace. The right pane lists all billing profiles and individual subscriptions that use the selected payment method. -3. In the right pane, select **Replace payment method for all items**. -4. To use an existing payment method, choose one from the drop-down list, then select **Replace**. - > [!NOTE] - > If you have subscriptions associated with a billing profile, you can only use a credit or debit card to pay for them. If you have bank accounts listed on the **Payment methods** page, they aren't available to select in the drop-down list. -5. To add a new payment method, select **Add payment method**. -6. In the **Add a payment method** pane, enter the account information, then select **Save**. You must use a payment method from the same country as your tenant. -7. The new payment method is already selected in the drop-down list. Select **Replace**. +> [!IMPORTANT] +> +> Replacing a payment method doesn't delete the existing payment method. It's still available for you to select and use for other subscriptions and billing profiles. Learn how to delete a payment method . ++### Replace the payment method for a billing profile -## Change a payment method for a single subscription +If you have an MCA billing account type, you can replace the payment method for a billing profile. -You can change the payment method used to pay for a single subscription. +1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>. + - If you're using the **Simplified view**, select **Subscriptions** > **View payment methods**. + - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=848039" target="_blank">Bills & payments</a> page. +2. Select the **Billing profiles** tab, then select the billing profile to update. +3. On the **Billing profile** page, under **Payment method**, select **Replace**. +4. If you need to add a new payment method first, select **Add payment method**, enter the details, then select **Save**. +5. In the **Replace payment method** pane, select a different payment method from the drop-down list, then select **Replace**. -1. In the admin center, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page. -2. On the **Products** tab, find the subscription that you want to pay for with the alternate payment method. -3. Select the three dots (more actions), then select **Replace payment method**. -4. In the **Replace payment method** pane, from the drop-down list, choose an alternate payment method, or choose to add a payment method. -5. If you add a payment method, enter the card or account details, then select **Save**. -6. Verify that the selected payment method is correct, then select **Replace**. +### Replace the payment method for a single subscription ++If you have an MOSA billing account type, you can change the payment method used to pay for a single subscription. ++1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>. + - If you're using the **Simplified view**, select **Subscriptions**. + - If you're using the **Dashboard view**, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=842054" target="_blank">Your products</a> page. +2. Select the subscription that you want to pay for with the alternate payment method. +3. On the product details page, in the **Subscription and payment settings** section, select **Replace payment method**. +4. If you want to add a new payment method first, select **Add payment method**, enter the details, then select **Save**. +5. In the **Replace payment method** pane select a different payment method from the drop-down list, then select **Replace**. ++### Replace a single payment method for all subscriptions ++If you have an MOSA billing account type, you can change the payment method used to pay for all your subscriptions. If you only want to change the payment method for one subscription, see [Replace the payment method for a single subscription](#replace-the-payment-method-for-a-single-subscription). ++1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>. + - If you're using the **Simplified view**, select **Subscriptions**, then select **View payment methods**. + - If you're using the Dashboard view, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=848039" target="_blank">Bills & payments</a> page, and select the **Payment methods** tab. +2. Select the payment method to replace. The right pane lists all the individual subscriptions that use the selected payment method. +3. In the right pane, select **Replace payment method for all items**. +4. Review the payment method details, then select **Next**. +5. To use a different payment method already on file, select Use another payment method. To add a new payment method, select **Add a payment method**. +6. Select **Next**. +7. To use an existing payment method, choose one from the drop-down list, then select **Next**. To add a new payment method, enter the information, then select **Next**. +8. Review the list of subscriptions or billing profiles that will move to the new payment method, then select **Next**. +9. Review the final details for replacing your payment method, then select **Replace payment method**. +10. When youΓÇÖre finished, you can select the link to **Review payment methods**, or select **Close**. ## Delete a payment method -You can only delete a payment method that isn't attached to a subscription or billing profile. This applies to all subscriptions, whatever their status. +You can only delete a payment method that isn't attached to a subscription or billing profile. This applies to all subscriptions, regardless of their status. ### Delete a payment method with no subscriptions or billing profiles attached If a payment method isn't associated with any subscriptions or billing profiles, you can immediately delete it. -1. In the admin center, go to the **Billing** > **Bills & payments** > <a href="https://go.microsoft.com/fwlink/p/?linkid=2018806" target="_blank">Payment methods</a> page. -2. Find the payment method to delete, select the three dots, then select **Delete**. -3. At the bottom of the right pane, select **Delete**. +1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>. + - If you're using the **Simplified view**, select **Subscriptions**, then select **View payment methods**. + - If you're using the Dashboard view, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=848039" target="_blank">Bills & payments</a> page, and select the **Payment methods** tab. +2. Find the payment method to delete, select the **More actions** button (the three dots), then select **Delete**. +3. Review the payment method details, then select **Next**. +4. On the next page, select **Delete**, then select **Close**. ### Delete a payment method with subscriptions or billing profiles attached -If a payment method is attached to any subscriptions or billing profiles, first replace it with an existing payment method, or add a new one, then delete the old payment method. +If a payment method is attached to any subscriptions or billing profiles, first replace it with an existing payment method or add a new one, then delete the old payment method. -1. In the admin center, go to the **Billing** > **Bills & payments** > <a href="https://go.microsoft.com/fwlink/p/?linkid=2018806" target="_blank">Payment methods</a> page. -2. Select the row for the payment method to delete. The right pane lists existing subscriptions that use that payment method. -3. In the right pane, select **Delete**. -4. To use an existing payment method, choose one from the drop-down list, select **Next**, and then select **Delete**. - > [!NOTE] - > If you have subscriptions associated with a billing profile, you can only use a credit card to pay for them. If you have bank accounts listed on the **Payment methods** page, they aren't available to choose in the drop-down list. -5. To add a new payment method, select **Add payment method**. -6. Choose the type of payment method that you want to add, enter the account information, and then select **Save**. -7. The new payment method is already selected in the drop-down list. Select **Next**. -8. Select **Delete**. +1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2024339" target="_blank">admin center</a>. + - If you're using the **Simplified view**, select **Subscriptions**, then select **View payment methods**. + - If you're using the Dashboard view, go to the **Billing** > <a href="https://go.microsoft.com/fwlink/p/?linkid=848039" target="_blank">Bills & payments</a> page, and select the **Payment methods** tab. +2. Find the payment method to delete, select the **More actions** button (the three dots), then select **Delete**. The **Delete a payment method** pane lists existing subscriptions and billing profiles that use that payment method. +3. Select **Next**. +4. To use a different payment method already on file, select Use another payment method. To add a new payment method, select **Add a payment method**. +5. Select **Next**. +6. To use an existing payment method, choose one from the drop-down list, then select **Next**. To add a new payment method, enter the information, then select **Next**. +7. Review the subscriptions or billing profiles to move, then select **Move subscriptions**. +8. Review the details of the payment method you want to delete, select **Delete**, then select **Close**. ## Troubleshoot payment methods -| Issue | Troubleshooting steps | -|:-|:--| -|**I get an error message that says, "The browser is currently set to block cookies."** |Set your browser to allow third-party cookies and try again. | -|**My credit or debit card was declined.** |If you pay by credit or debit card, and your card is declined, you receive an email that says Microsoft was unable to process the payment. Double-check that the card details—card number, expiration date, name on the card, and address, including city, state, and ZIP code—appear exactly as they do on the card and your statement. You can update your card information and immediately submit the payment by using the **Settle balance** link in the **Billing** section of the subscription details page. For more information, see [What if I have an outstanding balance?](pay-for-your-subscription.md#what-if-i-have-an-outstanding-balance) <br/><br/> If you continue to see the "declined" message, contact your bank. It's possible that your card isn't active. If you recently received the card in the mail with an updated expiration date, make sure it's activated. Your bank can also tell you whether your card isn't approved for online, international, or recurring transactions. | -|**I want to update a card or bank account number.** |You can't change the card or account number on an existing payment method. If your card or account number has changed, [replace it with a different payment method](#replace-a-payment-method), which moves all active subscriptions from the payment method to the new one, then [delete the old payment method](#delete-a-payment-method-with-no-subscriptions-or-billing-profiles-attached). | -|**I only have one card or bank account on my account and I want to remove it.** |If you only have one payment method, you must [replace it with a new payment method](#replace-a-payment-method) before you can delete it. | -|**I can't add my card or bank account.** |You must use a payment method issued from the same country as your tenant. If you have trouble entering your card or bank account information, you can [contact support](../../admin/get-help-support.md). | +| Issue | Troubleshooting steps | +|:--|:-| +|**My credit or debit card was declined.** |If you pay by credit or debit card, and your card is declined, you receive an email that says Microsoft was unable to process the payment. Double-check that the card details—card number, expiration date, name on the card, and address, including city, state, and ZIP code—appear exactly as they do on the card and your statement. You can update your card information and resubmit the payment. For more information, see [What if I have an outstanding balance?](pay-for-your-subscription.md#what-if-i-have-an-outstanding-balance)</br></br>If you continue to see the ΓÇ£declinedΓÇ¥ message, contact your bank. ItΓÇÖs possible that your card isnΓÇÖt active, or you might have insufficient funds. | +|**I want to update a credit or debit card number.** |You can't change the card on an existing payment method. If you want to replace a credit or debit card number, [replace it with a different payment method](#replace-a-payment-method), which moves all active subscriptions from the payment method to the new one. | +|**I only have one credit or debit card on my account and I want to remove it.** |If you only have one payment method, follow the steps in [Delete a payment method](#delete-a-payment-method). | +|**I can't add my credit or debit card.** |You must use a payment method issued from the same country/region as your tenant. If you have trouble entering your credit or debit card information, you can [contact support](../../admin/get-help-support.md). | ## Related content -[Pay for your business subscription](pay-for-your-subscription.md) (article)\ -[Manage billing profiles](manage-billing-profiles.md) (article)\ +[Pay for your business subscription](pay-for-your-subscription.md) (article) \ +[Manage billing profiles](manage-billing-profiles.md) (article) \ [Change your billing frequency](change-payment-frequency.md) (article) |
commerce | Pay For Subscription Billing Profile | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/pay-for-subscription-billing-profile.md | f1.keywords: -+ audience: Admin |
commerce | Pay For Your Subscription | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/pay-for-your-subscription.md | f1.keywords: -+ audience: Admin |
commerce | Understand Your Invoice2 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/understand-your-invoice2.md | f1.keywords: -+ audience: Admin |
commerce | View Your Bill Or Invoice | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/view-your-bill-or-invoice.md | f1.keywords: -+ audience: Admin |
commerce | Withholding Tax Credit Global | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/withholding-tax-credit-global.md | f1.keywords: -+ audience: Admin |
commerce | Withholding Tax Credit India | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/withholding-tax-credit-india.md | f1.keywords: -+ audience: Admin |
commerce | Buy Or Edit An Add On | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/buy-or-edit-an-add-on.md | f1.keywords: -+ audience: Admin |
commerce | Enter Your Product Key | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/enter-your-product-key.md | f1.keywords: -+ audience: Admin |
commerce | Manage Partners | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/manage-partners.md | f1.keywords: -+ audience: Admin |
commerce | Manage Saas Apps | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/manage-saas-apps.md | f1.keywords: -+ audience: Admin |
commerce | No Billing Account Found | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/no-billing-account-found.md | f1.keywords: CSH -+ audience: Admin |
commerce | Product Key Errors And Solutions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/product-key-errors-and-solutions.md | f1.keywords: -+ audience: Admin |
commerce | Purchases From Microsoft Open | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/purchases-from-microsoft-open.md | f1.keywords: -+ audience: Admin |
commerce | Review Partner Admin Privileges | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/review-partner-admin-privileges.md | f1.keywords: -+ audience: Admin |
commerce | Cancel Your Subscription | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/cancel-your-subscription.md | f1.keywords: -+ audience: Admin |
commerce | Manage Pay As You Go Services | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/manage-pay-as-you-go-services.md | f1.keywords: -+ audience: Admin |
commerce | Manage Self Service Signup Subscriptions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/manage-self-service-signup-subscriptions.md | f1.keywords: -+ audience: Admin |
commerce | Reactivate Your Subscription | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/reactivate-your-subscription.md | f1.keywords: -+ audience: Admin |
commerce | Renew Your Subscription | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/renew-your-subscription.md | f1.keywords: -+ audience: Admin |
commerce | Upgrade From Teams Free | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/upgrade-from-teams-free.md | f1.keywords: -+ audience: Admin |
commerce | Upgrade To Different Plan | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/upgrade-to-different-plan.md | f1.keywords: -+ audience: Admin |
commerce | What If My Subscription Expires | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/what-if-my-subscription-expires.md | f1.keywords: -+ audience: Admin |
commerce | Try Or Buy Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/try-or-buy-microsoft-365.md | f1.keywords: -+ audience: Admin |
commerce | Understand Proposal Workflow | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/understand-proposal-workflow.md | f1.keywords: -+ audience: Admin |
commerce | Use A Promo Code | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/use-a-promo-code.md | f1.keywords: -+ audience: Admin |
compliance | Audit Log Enable Disable | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/audit-log-enable-disable.md | -Audit logging is turned on by default for Microsoft 365 and Office 365 enterprise organizations. However, when setting up a new Microsoft 365 or Office 365 organization, you should verify the auditing status for your organization. For instructions, see the [Verify the auditing status for your organization](#verify-the-auditing-status-for-your-organization) section in this article. +Audit logging is turned on by default for Microsoft 365 organizations. However, when setting up a new Microsoft 365 organization, you should verify the auditing status for your organization. For instructions, see the [Verify the auditing status for your organization](#verify-the-auditing-status-for-your-organization) section in this article. -When auditing in the Microsoft Purview compliance portal is turned on, user and admin activity from your organization is recorded in the audit log and retained for 90 days, and up to one year depending on the license assigned to users. However, your organization may have reasons for not wanting to record and retain audit log data. In those cases, a global admin may decide to turn off auditing in Microsoft 365. +When auditing is turned on in the Microsoft Purview compliance portal, user and admin activity from your organization is recorded in the audit log and automatically retained for 90 days. The retention (lifetime) for audit data starts when it is added to the auditing log and is retained based on [audit log retention policies](/microsoft-365/compliance/audit-log-retention-policies) and the license assigned to users. ++Changes to the the user licensing or retention policies also change the expiration date of audit data. ++Your organization may have reasons for not wanting to record and retain audit log data. In these cases, a global admin can turn off auditing in Microsoft 365 for your organization. For instructions, see the [Turn off auditing](#turn-off-auditing) section in this article. > [!IMPORTANT]-> If you turn off auditing in Microsoft 365, you can't use the Office 365 Management Activity API or Microsoft Sentinel to access auditing data for your organization. Turning off auditing by following the steps in this article means that no results will be returned when you search the audit log using the compliance portal or when you run the **Search-UnifiedAuditLog** cmdlet in Exchange Online PowerShell. This also means that audit logs won't be available through the Office 365 Management Activity API or Microsoft Sentinel. +> If you turn off auditing in Microsoft 365, you can't use the [Office 365 Management Activity API](/office/office-365-management-api/office-365-management-activity-api-reference) or [Microsoft Sentinel](/azure/sentinel/overview) to access auditing data or logs for your organization. Turning off auditing by following the steps in this article means that no results will be returned when you search the audit log using the compliance portal or when you run the **Search-UnifiedAuditLog** cmdlet in Exchange Online PowerShell. [!INCLUDE [purview-preview](../includes/purview-preview.md)] When auditing in the Microsoft Purview compliance portal is turned on, user and > [!NOTE] > Users have to be assigned permissions in Exchange Online to turn auditing on or off. If you assign users the *Audit Logs* role on the **Permissions** page in the compliance portal, they won't be able to turn auditing on or off. This is because the underlying cmdlet is an Exchange Online PowerShell cmdlet. -- For step-by-step instructions on searching the audit log, see [Search the audit log](audit-log-search.md). +- For step-by-step instructions on searching the audit log, see [Search the audit log](audit-log-search.md). - For more information about the Microsoft 365 Management Activity API, see [Get started with Microsoft 365 Management APIs](/office/office-365-management-api/get-started-with-office-365-management-apis). ## Verify the auditing status for your organization To verify that auditing is turned on for your organization, you can run the foll Get-AdminAuditLogConfig | Format-List UnifiedAuditLogIngestionEnabled ``` -A value of `True` for the *UnifiedAuditLogIngestionEnabled* property indicates that auditing is turned on. A value of `False` indicates that auditing isn't turned on. +A value of `True` for the *UnifiedAuditLogIngestionEnabled* property indicates that auditing is turned on. A value of `False` indicates that auditing isn't turned on. > [!IMPORTANT] > Be sure to run the previous command in Exchange Online PowerShell. Although the **Get-AdminAuditLogConfig** cmdlet is also available in Security & Compliance PowerShell, the *UnifiedAuditLogIngestionEnabled* property is always `False`, even when auditing is turned on. You have to use Exchange Online PowerShell to turn off auditing. Get-AdminAuditLogConfig | FL UnifiedAuditLogIngestionEnabled ``` - The value of `False` for the _UnifiedAuditLogIngestionEnabled_ property indicates that auditing is turned off. + The value of `False` for the *UnifiedAuditLogIngestionEnabled* property indicates that auditing is turned off. - Go to the **Audit** page in the compliance portal. |
compliance | Device Onboarding Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-overview.md | Title: "Onboard Windows 10 or Windows 11 devices into Microsoft 365 overview" + Title: "Onboard Windows devices into Microsoft 365 overview" f1.keywords: - CSH -description: "Onboard Windows 10 and Windows 11 devices into Microsoft 365" +description: "Onboard Windows devices into Microsoft 365" -# Onboard Windows 10 and Windows 11 devices into Microsoft 365 overview +# Onboard Windows devices into Microsoft 365 overview **Applies to:** |
compliance | Dlp Alerts Dashboard Get Started | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-alerts-dashboard-get-started.md | ms.localizationpriority: medium - tier1 - purview-compliance-- SPO_Content search.appverid: - MET150 |
compliance | Dlp Chrome Get Started | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-chrome-get-started.md | |
compliance | Dlp Copy Matched Items Get Started | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-copy-matched-items-get-started.md | Standard Microsoft Purview Data Loss Prevention (DLP) permissions are required. ### Onboard devices -Before you can use copy matched items you have to onboard Windows 10/11 devices into Purview, see [Onboard Windows 10 and Windows 11 devices into Microsoft 365 overview](device-onboarding-overview.md#onboard-windows-10-and-windows-11-devices-into-microsoft-365-overview) +Before you can use copy matched items you have to onboard Windows 10/11 devices into Purview, see [Onboard Windows devices into Microsoft 365 overview](device-onboarding-overview.md#onboard-windows-devices-into-microsoft-365-overview). ### Setup Azure storage |
compliance | Dlp Create Deploy Policy | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-create-deploy-policy.md | Scenario recommendation: Restrict users from uploading sensitive data to unsanct --> -### Scenario 2 Show policy tip as oversharing popup --Oversharing popup is an E5 feature. -> [!IMPORTANT] -> This is a hypothetical scenario with hypothetical values. It's only for illustrative purposes. You should substitute your own sensitive information types, sensitivity labels, distribution groups and users. --> [!IMPORTANT] -> To identify the minimum version of Outlook that supports this feature, use the [capabilities table for Outlook](sensitivity-labels-versions.md#sensitivity-label-capabilities-in-outlook), and the row **Preventing oversharing as DLP policy tip**. --#### Scenario 2 prerequisites and assumptions --In Outlook Win 32 an oversharing popup displays a popup before a message is sent. Select **Show policy tip as a dialog for the user before send** in policy tip when creating a DLP rule for the Exchange location. -This scenario uses the *Highly confidential* sensitivity label, so it requires that you have created and published sensitivity labels. To learn more, see: --- [Learn about sensitivity labels](sensitivity-labels.md)-- [Get started with sensitivity labels](get-started-with-sensitivity-labels.md)-- [Create and configure sensitivity labels and their policies](create-sensitivity-labels.md)--This procedure uses a hypothetical company domain at Contoso.com. --#### Scenario 2 policy intent and mapping --*We need to block emails to all recipients that have the ‘highly confidential’ sensitivity label applied except if the recipient domain is contoso.com. We want to notify the user on send with a popup dialogue and no one can be allowed to override the block.* ---|Statement|Configuration question answered and configuration mapping| -||| -|"We need to block emails to all recipients..."|- **Where to monitor**: Exchange </br>- **Administrative scope**: Full directory </br>- **Action**: Restrict access or encrypt the content in Microsoft 365 locations > Block users from receiving email or accessing shared SharePoint, OneDrive, and Teams files > Block everyone | -|"...that have the 'highly confidential' sensitivity label applied..."| - **What to monitor**: use the Custom template </br> - **Conditions for a match**: edit it to add the *highly confidential* sensitivity label| -|"...except if..."| **Condition group configuration** - Create a nested boolean NOT condition group joined to the first conditions using a boolean AND| -|"...the recipient domain is contoso.com."| **Condition for match**: Recipient domain is| -|"...Notify..."|**User notifications**: enabled| -|"...the user on send with a popup dialogue..."| **Policy tips**: selected </br> - **Show policy tip as a dialog for the end user before send**: selected| -|"...and no one can be allowed to override the block...| **Allow overrides from M365 Services**: not selected| --To configure oversharing popups with default text, the DLP rule must include these conditions: --- Content contains > Sensitivity labels > *choose your sensitivity label(s)*- -and a recipient-based condition --- SentTo-- SentToAMemberOf-- RecpientDomainIs-- When these conditions are met, the policy tip displays untrusted recipients while the user is writing the mail in Outlook, before it's sent. ---#### Steps to create policy for scenario 2 --> [!IMPORTANT] -> For the purposes of this policy creation procedure, you'll accept the default include/exclude values and leave the policy turned off. You'll be changing these when you deploy the policy. --1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>. --1. In the Microsoft Purview compliance portal \> left navigation \> **Solutions** \> **Data loss prevention** \> **Policies** \> **+ Create policy**. --1. Select **Custom** from the **Categories** list. - -1. Select **Custom** from the **Templates** list. - -1. Give the policy a name. -- > [!IMPORTANT] - > Policies cannot be renamed. --1. Fill in a description. You can use the policy intent statement here. --1. Select **Next**. --1. Select **Full directory** under **Admin units**. --1. Set the **Exchange email** location status to **On**. Set all the other location status to **Off**. --1. Select **Next**. --1. Accept the default values for **Include** = **All** and **Exclude** = **None**. - -1. The **Create or customize advanced DLP rules** option should already be selected. - -1. Select **Next**. - -1. Select **Create rule**. Name the rule and provide a description. --1. Select **Add condition** > **Content contains** > **Add** > **Sensitivity labels** > **Highly confidential**. Choose **Add**. - -1. Select **Add group** > **AND** > **NOT** > **Add condition**. --1. Select **Recipient domain is** > **contoso.com**. Choose **Add**. -- > [!TIP] - > **Recipient is** and **Recipient is a member of** can also be used in the previous step and will trigger an oversharing popup. - -1. Select **Add and action** > **Restrict access or encrypt the content in Microsoft 365 locations** > **Restrict access or encrypt the content in Microsoft 365 locations** > **Block users from receiving email or accessing shared SharePoint, OneDrive, and Teams file.** > **Block everyone**. - -1. Set **User notifications** to **On**. - -1. Select **Policy tips** > **Show the policy tip as a dialog for the end user before send**. - -1. Make sure that **Allow override from M365 services** *isn't* selected. - -1. Choose **Save**. - -1. Choose **Next** > **Keep it off** > **Next** > **Submit**. --#### PowerShell steps to create policy for scenario 2 --DLP policies and rules can also be configured in PowerShell. To configure oversharing popups using PowerShell, first you create a DLP policy (using PowerShell) and add DLP rules for each warn, justify or block popup type. --You'll configure and scope your DLP Policy using [New-DlpCompliancePolicy](/powershell/module/exchange/new-dlpcompliancepolicy). Then, you'll configure each oversharing rule using [New-DlpComplianceRule](/powershell/module/exchange/new-dlpcompliancerule) --To configure a new DLP policy for the oversharing popup scenario use this code snippet: --```powershell -PS C:\> New-DlpCompliancePolicy -Name <DLP Policy Name> -ExchangeLocation All -``` --This sample DLP policy is scoped to all users in your organization. Scope your DLP Policies using `-ExchangeSenderMemberOf` and `-ExchangeSenderMemberOfException`. --|Parameter| Configuration| -||| -|[-ContentContainsSensitiveInformation](/powershell/module/exchange/new-dlpcompliancerule?view=exchange-ps#-contentcontainssensitiveinformation&preserve-view=true)| Configures one or more sensitivity label conditions. This sample includes one. At least one label is mandatory.| -|[-ExceptIfRecipientDomainIs](/powershell/module/exchange/new-dlpcompliancerule?view=exchange-ps#-exceptifrecipientdomainis&preserve-view=true)| List of trusted domains.| -|[-NotifyAllowOverride](/powershell/module/exchange/new-dlpcompliancerule?view=exchange-ps#-notifyallowoverride&preserve-view=true)| "WithJustification" enables justification radio buttons, "WithoutJustification" disables them.| -|[-NotifyOverrideRequirements](/powershell/module/exchange/new-dlpcompliancerule?view=exchange-ps#-notifyoverriderequirements&preserve-view=true) "WithAcknowledgement" enables the new acknowledgment option. This is optional.| -| --To configure a new DLP rule to generate a *warn* popup using trusted domains run this PowerShell code. --```powershell -PS C:\> New-DlpComplianceRule -Name <DLP Rule Name> -Policy <DLP Policy Name> -NotifyUser Owner -NotifyPolicyTipDisplayOption "Dialog" -ContentContainsSensitiveInformation @(@{operator = "And"; groups = @(@{operator="Or";name="Default";labels=@(@{name=<Label GUID>;type="Sensitivity"})})}) -ExceptIfRecipientDomainIs @("contoso.com","microsoft.com") -``` --To configure a new DLP rule to generate a *justify* popup using trusted domains run this PowerShell code. --```powershell -PS C:\> New-DlpComplianceRule -Name <DLP Rule Name> -Policy <DLP Policy Name> -NotifyUser Owner -NotifyPolicyTipDisplayOption "Dialog" -BlockAccess $true -ContentContainsSensitiveInformation @(@{operator = "And"; groups = @(@{operator = "Or"; name = "Default"; labels = @(@{name=<Label GUID 1>;type="Sensitivity"},@{name=<Label GUID 2>;type="Sensitivity"})})}) -ExceptIfRecipientDomainIs @("contoso.com","microsoft.com") -NotifyAllowOverride "WithJustification" -``` --To configure a new DLP rule to generate a *block* popup using trusted domains run this PowerShell code. --```powershell -PS C:\> New-DlpComplianceRule -Name <DLP Rule Name> -Policy <DLP Policy Name> -NotifyUser Owner -NotifyPolicyTipDisplayOption "Dialog" -BlockAccess $true -ContentContainsSensitiveInformation @(@{operator = "And"; groups = @(@{operator = "Or"; name = "Default"; labels = @(@{name=<Label GUID 1>;type="Sensitivity"},@{name=<Label GUID 2>;type="Sensitivity"})})}) -ExceptIfRecipientDomainIs @("contoso.com","microsoft.com") -``` --Use these procedures to access the [Business justification X-Header](dlp-policy-reference.md#business-justification-x-header). - ## Deployment A successful policy deployment isn't just about getting the policy into your environment to enforce controls on user actions. A haphazard, rushed deployment can negatively impact business process and annoy your users. Those consequences will slow acceptance of DLP technology in your organization and the safer behaviors it promotes. Ultimately making your sensitive items less safe in the long run. |
compliance | Dlp Firefox Extension Get Started | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-firefox-extension-get-started.md | |
compliance | Dlp Osp Get Started | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-osp-get-started.md | + + Title: "Get started with oversharing pop ups" +f1.keywords: +- CSH +++ Last updated : 07/13/2023+audience: ITPro ++f1_keywords: +- 'ms.o365.cc.DLPLandingPage' ++ms.localizationpriority: medium ++- tier1 +- purview-compliance +search.appverid: +- MET150 ++- seo-marvel-apr2020 +- admindeeplinkCOMPLIANCE +description: Get started with managing oversharing pop ups with data loss prevention policies. +++# Get started with oversharing pop ups ++When you configure the user device registry key and the appropriate Microsoft Purview Data Loss Prevention (DLP) policy, DLP will check email messages before they are sent for sensitive information and apply the actions defined in the DLP policy. ++Oversharing popup is an E5 feature. ++> [!IMPORTANT] +> This is a hypothetical scenario with hypothetical values. It's only for illustrative purposes. You should substitute your own sensitive information types, sensitivity labels, distribution groups and users. ++> [!IMPORTANT] +> To identify the minimum version of Outlook that supports this feature, use the [capabilities table for Outlook](sensitivity-labels-versions.md#sensitivity-label-capabilities-in-outlook), and the row **Preventing oversharing as DLP policy tip**. +++## Before you begin ++### SKU/subscriptions licensing ++Before you get started with DLP policies, you should confirm your [Microsoft 365 subscription](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans?rtc=1) and any add-ons. ++AIP P2 license is supported ++For full licensing details, see: [Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-purview-data-loss-prevention-data-loss-prevention-dlp-for-exchange-online-sharepoint-online-and-onedrive-for-business) ++### Permissions ++The account you use to create and deploy policies must be a member of one of these role groups ++- Compliance administrator +- Compliance data administrator +- Information Protection +- Information Protection Admin +- Security administrator ++> [!IMPORTANT] +> Be sure you understand the difference between an unrestricted administrator and an administrative unit restricted administrator [Administrative units](microsoft-365-compliance-center-permissions.md#administrative-units) before you start. ++### Granular Roles and Role Groups ++There are roles and role groups that you can use to fine tune your access controls. ++Here's a list of applicable roles. To learn more, see [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md). ++- DLP Compliance Management +- Information Protection Admin +- Information Protection Analyst +- Information Protection Investigator +- Information Protection Reader ++Here's a list of applicable role groups. To learn more, see To learn more about them, see [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md). ++- Information Protection +- Information Protection Admins +- Information Protection Analysts +- Information Protection Investigators +- Information Protection Readers ++### Prerequisites and assumptions ++In Outlook for Microsoft 365 an oversharing popup displays a popup before a message is sent. Select **Show policy tip as a dialog for the user before send** in policy tip when creating a DLP rule for the Exchange location. +This scenario uses the *Highly confidential* sensitivity label, so it requires that you have created and published sensitivity labels. To learn more, see: ++- [Learn about sensitivity labels](sensitivity-labels.md) +- [Get started with sensitivity labels](get-started-with-sensitivity-labels.md) +- [Create and configure sensitivity labels and their policies](create-sensitivity-labels.md) ++This procedure uses a hypothetical company domain at Contoso.com. ++## Policy intent and mapping ++*We need to block emails to all recipients that have the ‘highly confidential’ sensitivity label applied except if the recipient domain is contoso.com. We want to notify the user on send with a popup dialogue and no one can be allowed to override the block.* +++|Statement|Configuration question answered and configuration mapping| +||| +|"We need to block emails to all recipients..."|- **Where to monitor**: Exchange </br>- **Administrative scope**: Full directory </br>- **Action**: Restrict access or encrypt the content in Microsoft 365 locations > Block users from receiving email or accessing shared SharePoint, OneDrive, and Teams files > Block everyone | +|"...that have the 'highly confidential' sensitivity label applied..."| - **What to monitor**: use the Custom template </br> - **Conditions for a match**: edit it to add the *highly confidential* sensitivity label| +|"...except if..."| **Condition group configuration** - Create a nested boolean NOT condition group joined to the first conditions using a boolean AND| +|"...the recipient domain is contoso.com."| **Condition for match**: Recipient domain is| +|"...Notify..."|**User notifications**: enabled| +|"...the user on send with a popup dialogue..."| **Policy tips**: selected </br> - **Show policy tip as a dialog for the end user before send**: selected| +|"...and no one can be allowed to override the block...| **Allow overrides from M365 Services**: not selected| ++To configure oversharing popups with default text, the DLP rule must include these conditions: ++- Content contains > Sensitivity labels > *choose your sensitivity label(s)* + +and a recipient-based condition ++- Recipient is +- Recipient is a member of +- Recipient domain is ++ When these conditions are met, the policy tip displays untrusted recipients while the user is writing the mail in Outlook, before it's sent. ++### Steps to configure Outlook client ++You need configure the *dlpwaitonsendtimeout Regkey (Value in dword)* on all the devices you want to implement oversharing popups. This registry key defines the amount of time to wait to evaluate sensitive content. It is under: ++*Software\Policies\Microsoft\office\16.0\Outlook\options\Mail\Compose message* ++You can set this *RegKey* via group policy (**Specify wait time to evaluate sensitive content**), script or other mechanism for configuring registry keys. ++If you're using Group Policy, make sure you've downloaded the most recent version of Group Policy Administrative Template files for Microsoft 365 Apps for enterprise and navigate to this setting from **User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings**. If you're using the Cloud Policy service for Microsoft 365, search for the setting by name to configure it. ++When this value is set and the DLP policy are configured, email messages are checked for sensitive information before they are sent. If the message contains a match to the conditions defined in the policy, a policy tip notification appears before the user clicks **Send**.. ++This *RegKey* allows you to specify the wait on send behavior on your Outlook clients. Here's what each of the settings means. ++**Not configured** or **Disabled**: This is the default. When *dlpwaitonsendtimeout* is not configured the message is not checked before the user sends it. The email message will be sent with no pause when **Send** is clicked. The DLP data classification service will evaluate the message and apply the actions defined in the DLP policy. ++**Enabled**: The email message is checked when the **Send** is clicked but before the message is actually sent. You can set a time limit on how long to wait for DLP policy evaluation to complete (**T** value in seconds). If the policy evaluation doesn't complete in the specified time a **Send anyway** button appears allowing the user to bypass the presend check. The **T** value range is 0 to 9999 seconds. ++> [!IMPORTANT] +> If the **T** value is greater than 9999, it will be replaced with 1000 and the **Send Anyway** button will not appear. This holds the message until the policy evalution completes with no option for user override. The duration to complete the evaluation can vary depending on factors such as internet speed, content length, and the number of defined policies. Some users may encounter policy evaluation messages more frequently than others depending on what policies are deployed on their mailbox. ++To learn more about configuring and using GPO see, [Administer Group Policy in an Azure Active Directory Domain Services managed domain](/azure/active-directory-domain-services/manage-group-policy). ++### Steps to create a DLP policy for an oversharing pop up policy tip ++> [!IMPORTANT] +> For the purposes of this policy creation procedure, you'll accept the default include/exclude values and leave the policy turned off. You'll be changing these when you deploy the policy. ++1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>. ++1. In the Microsoft Purview compliance portal \> left navigation \> **Solutions** \> **Data loss prevention** \> **Policies** \> **+ Create policy**. ++1. Select **Custom** from the **Categories** list. + +1. Select **Custom** from the **Templates** list. + +1. Give the policy a name. ++ > [!IMPORTANT] + > Policies cannot be renamed. ++1. Fill in a description. You can use the policy intent statement here. ++1. Select **Next**. ++1. Select **Full directory** under **Admin units**. ++1. Set the **Exchange email** location status to **On**. Set all the other location status to **Off**. ++1. Select **Next**. ++1. Accept the default values for **Include** = **All** and **Exclude** = **None**. + +1. The **Create or customize advanced DLP rules** option should already be selected. + +1. Select **Next**. + +1. Select **Create rule**. Name the rule and provide a description. ++1. Select **Add condition** > **Content contains** > **Add** > **Sensitivity labels** > **Highly confidential**. Choose **Add**. + +1. Select **Add group** > **AND** > **NOT** > **Add condition**. ++1. Select **Recipient domain is** > **contoso.com**. Choose **Add**. ++ > [!TIP] + > **Recipient is** and **Recipient is a member of** can also be used in the previous step and will trigger an oversharing popup. + +1. Select **Add and action** > **Restrict access or encrypt the content in Microsoft 365 locations** > **Restrict access or encrypt the content in Microsoft 365 locations** > **Block users from receiving email or accessing shared SharePoint, OneDrive, and Teams file.** > **Block everyone**. + +1. Set **User notifications** to **On**. + +1. Select **Policy tips** > **Show the policy tip as a dialog for the end user before send**. + +1. Make sure that **Allow override from M365 services** *isn't* selected. + +1. Choose **Save**. + +1. Choose **Next** > **Keep it off** > **Next** > **Submit**. ++#### PowerShell steps to create policy ++DLP policies and rules can also be configured in PowerShell. To configure oversharing popups using PowerShell, first you create a DLP policy (using PowerShell) and add DLP rules for each warn, justify or block popup type. ++You'll configure and scope your DLP Policy using [New-DlpCompliancePolicy](/powershell/module/exchange/new-dlpcompliancepolicy). Then, you'll configure each oversharing rule using [New-DlpComplianceRule](/powershell/module/exchange/new-dlpcompliancerule) ++To configure a new DLP policy for the oversharing popup scenario use this code snippet: ++```powershell +PS C:\> New-DlpCompliancePolicy -Name <DLP Policy Name> -ExchangeLocation All +``` ++This sample DLP policy is scoped to all users in your organization. Scope your DLP Policies using `-ExchangeSenderMemberOf` and `-ExchangeSenderMemberOfException`. ++|Parameter| Configuration| +||| +|[-ContentContainsSensitiveInformation](/powershell/module/exchange/new-dlpcompliancerule?view=exchange-ps#-contentcontainssensitiveinformation&preserve-view=true)| Configures one or more sensitivity label conditions. This sample includes one. At least one label is mandatory.| +|[-ExceptIfRecipientDomainIs](/powershell/module/exchange/new-dlpcompliancerule?view=exchange-ps#-exceptifrecipientdomainis&preserve-view=true)| List of trusted domains.| +|[-NotifyAllowOverride](/powershell/module/exchange/new-dlpcompliancerule?view=exchange-ps#-notifyallowoverride&preserve-view=true)| "WithJustification" enables justification radio buttons, "WithoutJustification" disables them.| +|[-NotifyOverrideRequirements](/powershell/module/exchange/new-dlpcompliancerule?view=exchange-ps#-notifyoverriderequirements&preserve-view=true) |"WithAcknowledgement" enables the new acknowledgment option. This is optional.| +| ++To configure a new DLP rule to generate a *warn* popup using trusted domains run this PowerShell code. ++```powershell +PS C:\> New-DlpComplianceRule -Name <DLP Rule Name> -Policy <DLP Policy Name> -NotifyUser Owner -NotifyPolicyTipDisplayOption "Dialog" -ContentContainsSensitiveInformation @(@{operator = "And"; groups = @(@{operator="Or";name="Default";labels=@(@{name=<Label GUID>;type="Sensitivity"})})}) -ExceptIfRecipientDomainIs @("contoso.com","microsoft.com") +``` ++To configure a new DLP rule to generate a *justify* popup using trusted domains run this PowerShell code. ++```powershell +PS C:\> New-DlpComplianceRule -Name <DLP Rule Name> -Policy <DLP Policy Name> -NotifyUser Owner -NotifyPolicyTipDisplayOption "Dialog" -BlockAccess $true -ContentContainsSensitiveInformation @(@{operator = "And"; groups = @(@{operator = "Or"; name = "Default"; labels = @(@{name=<Label GUID 1>;type="Sensitivity"},@{name=<Label GUID 2>;type="Sensitivity"})})}) -ExceptIfRecipientDomainIs @("contoso.com","microsoft.com") -NotifyAllowOverride "WithJustification" +``` ++To configure a new DLP rule to generate a *block* popup using trusted domains run this PowerShell code. ++```powershell +PS C:\> New-DlpComplianceRule -Name <DLP Rule Name> -Policy <DLP Policy Name> -NotifyUser Owner -NotifyPolicyTipDisplayOption "Dialog" -BlockAccess $true -ContentContainsSensitiveInformation @(@{operator = "And"; groups = @(@{operator = "Or"; name = "Default"; labels = @(@{name=<Label GUID 1>;type="Sensitivity"},@{name=<Label GUID 2>;type="Sensitivity"})})}) -ExceptIfRecipientDomainIs @("contoso.com","microsoft.com") +``` ++Use these procedures to access the [Business justification X-Header](dlp-policy-reference.md#business-justification-x-header). ++## See also ++- [Learn about data loss prevention alerts and the alerts dashboard](dlp-alerts-dashboard-learn.md) +- [Create and Deploy data loss prevention policies](dlp-create-deploy-policy.md) |
compliance | Ediscovery Collection Statistics Reports | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-collection-statistics-reports.md | Here are other reasons why the estimated results from a collection estimate can - **The way results are estimated for collection estimates**. An estimate of the search results returned by a collection estimate is just that, an estimate (and not an actual count) of the items that meet the collection query criteria. To compile the estimate of email items, a list of the message IDs that meet the search criteria is requested from the Exchange database. But when you commit the collection to a review set, the collection is rerun and the actual messages are retrieved from the Exchange database. So differences might result because of how the estimated number of items and the actual number of items are determined. - **Changes that happen between the time when estimating and committing collection estimates**. When you commit a collection estimate to a review set, the search is rerun to collect that most recent items in the search index that meet the search criteria. It's possible that additional items were created, sent, or deleted that meet the search criteria in the time between when the collection estimate was last run and when the collection estimate is committed to a review set. It's also possible that items that were in the search index when the collection estimate results were estimated are no longer there because they were purged from a data source before committing the collection. One way to mitigate this issue is to specify a date range for a collection. Another way is to place a hold on content locations so that items are preserved and can't be purged. - **Unindexed items**. If the collection estimate included searching all Exchange mailboxes or all SharePoint sites, then only unindexed items from content locations that contain items that match the collection criteria will be added to the review set. In other words, if no results are found in a mailbox or site, then any unindexed items in that mailbox or site won't be added to the review set. However, unindexed items from all content locations (even those that don't contain items that match the collection query) will be included in the estimated collection results.-- **Partially indexed items**: Selection of this option adds partially indexed items from additional data sources to the review set. If the collection searched additional data sources (as specified on the **Additional locations** page in the collections wizard), there may be partially indexed items from these locations that you want to add to the review set. Custodial and non-custodial data sources typically don't have partially indexed items. That's because the Advanced indexing process reindexes items when custodial and non-custodial data sources are added to a case. Also, Adding partially indexed items will increase the number of items added to the review set. <p> After partially indexed items are added to the review set, you can apply a filter to specifically view these items. For more information, see [Filter partially indexed items](ediscovery-review-set-search.md#filter-partially-indexed-items)+- **Partially indexed items**: Selection of this option adds partially indexed items from additional data sources to the review set. If the collection searched additional data sources (as specified on the **Additional locations** page in the collections wizard), there may be partially indexed items from these locations that you want to add to the review set. Custodial and non-custodial data sources typically don't have partially indexed items. That's because the Advanced indexing process reindexes items when custodial and non-custodial data sources are added to a case. Also, Adding partially indexed items will increase the number of items added to the review set. <p> After partially indexed items are added to the review set, you can apply a filter to specifically view these items. For more information, see [Scenario example: Filter partially indexed items](ediscovery-review-set-search.md#scenario-example-filter-partially-indexed-items) Alternatively, if the collection estimate included specific content locations (which means that specific mailboxes or sites where specified on the **Additional locations** page in the collection estimate wizard), then unindexed items (that aren't excluded by the collection criteria) from the content locations specified in the search will be exported. In this case, the estimated number of unindexed items and the number of unindexed items that are added to the review set should be the same. |
compliance | Ediscovery Review Set Search | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ediscovery-review-set-search.md | f1.keywords: Previously updated : 04/01/2023 Last updated : 07/13/2023 audience: Admin -In most cases, it will be useful to dig deeper into the content in a review set and organize it to facilitate a more efficient review. Using filters and queries in a review set helps you focus on a subset of documents that meet the criteria of your review. +In most cases, it is useful to dig deeper into the content in a review set and organize it to facilitate a more efficient review. Using filters and queries in a review set helps you focus on a subset of documents that meet the criteria of your review. [!INCLUDE [purview-preview](../includes/purview-preview.md)] -## Default filters +## Advanced filters -In a review set, there are five default filters that are pre-loaded in the review set: +Improving on the default filters in previous versions, eDiscovery (Premium) now provides advanced filters that let you build more flexible and advanced filters for review sets. Similar to the [collection query builder experience](/microsoft-365/compliance/ediscovery-query-builder), the advanced filtering capability enables you to: -- Keywords-- Date-- Sender/Author-- Subject/Title-- Tags+- Quickly search for filter conditions. +- Create complex filters using subgroups, *AND*, or *OR* conditions. +- Easily change your queries with **Undo filter query** and **Redo filter query** controls. +- Manage saved filters without having to navigate to another area. +- Use *Is empty* and *Is not empty* conditions for each filter. - --Select each filter to expand it and assign a value. Select outside the filter to automatically apply the filter to the review set. + > [!NOTE] > A review set displays a maximum of 1,000 items per page and up to 10 pages (for a total of 10,000 items displayed per review set). Use default or custom filters to adjust the displayed items as needed. -## Add or remove filters --To add or remove filters that are displayed for the review set, select **Filters** to open the filter panel, which is displayed on a flyout page. -- +## Advanced filter controls -The available filters are organized in four sections: +To create and custom filtering for your review set, use the following controls: -- **Search**: Filters that provide different search capabilities.-- **Analytics & predictive coding**: Filters for properties generated and added to documents when you run the **Document & email analytic** job or use predictive coding models.-- **IDs**: Filters for all ID properties of documents.-- **Item properties**: Filters for document properties. --Expand each section and select or deselect filters to add or remove them in the filter set. When you add a filter, it's displayed in the filter set. --> [!NOTE] -> When you expand a section in the filter panel, you'll notice that the default filter types are selected. You can keep these selected or deselect them and removed them from the filter set. +- **AND/OR**: These conditional logical operators allow you to select the query condition that applies to specific filters and filter subgroups. These operators allow you to use multiple filters or subgroups connected to a single filter in your query. +- **Select a filter**: Allows you to select filters for the specific data sources and location content selected for the collection. +- **Add filter**: Allows you to add multiple filters to your query. Is available after you've defined at least one query filter. +- **Select an operator**: Depending on the selected filter, the operators compatible for the filter are available to select. For example, if the *Date* filter is selected, the available operators are *Before*, *After*, and *Between*. If the *Size (in bytes)* filter is selected, the available operators are *Greater than*, *Greater or equal*, *Less than*, *Less or equal*, *Between*, and *Equal*. +- **Value**: Depending on the selected filter, the values compatible for the filter are available. Additionally, some filters support multiple values and some filters support one specific value. For example, if the *Date* filter is selected, select date values. If the *Size (in bytes)* filter is selected, select a value for bytes. +- **Add subgroup**: After you've defined a filter, you can add a subgroup to refine the results returned by the filter. You can also add a subgroup to a subgroup for multi-layered query refinement. +- **Remove a filter condition**: To remove an individual filter or subgroup, select the remove icon to the right of each filter line or subgroup. +- **Clear all**: To clear the entire query of all filters and subgroups, select **Clear all**. ## Filter types Every searchable field in a review set has a corresponding filter that you can u There are multiple types of filters: -- **Freetext**: A freetext filter is applied to text fields such as "Subject". You can list multiple search terms by separating them with a comma.-- **Date**: A date filter is used for date fields such as "Last modified date".-- **Search options**: A search options filter provides a list of possible values (each value is displayed with a checkbox that you can select) for particular fields in the review. This filter is used for fields, such as "Sender", where there's a finite number of possible values in the review set.+- **Freetext**: A freetext filter is applied to text fields such as *Subject*. You can list multiple search terms by separating them with a comma. +- **Date**: A date filter is used for date fields such as *Last modified date*. +- **Search options**: A search options filter provides a list of possible values (each value is displayed with a checkbox that you can select) for particular fields in the review. This filter is used for fields, such as *Sender*, where there's a finite number of possible values in the review set. - **Keyword**: A keyword condition is a specific instance of freetext condition that you can use to search for terms. You can also use KQL-like query language in this type of filter. For more information, see the Query language and Advanced query builder sections in this article. -## Include and exclude filter relationships --You can change the include and exclude relationship for a particular filter. For example, in the Tag filter, you can exclude items that are tagged with a particular tag by selecting **Equals none of** in the dropdown filter. --## Save filters as queries +## Save and manage filter queries After you're satisfied with your filters, you can save the filter combination as a filter query. This saved filter query lets you apply the filter in the future review sessions. -To save a filter, select **Save the query** and name it. You or other reviewers can run previously saved filter queries by selecting the **Saved filter queries** dropdown and selecting a filter query to apply to review set documents. +To save a filter, select **Save** on the **Save filter queries** command bar and name it. You or other reviewers can run previously saved filter queries by selecting the **Saved filter queries** dropdown and selecting a filter query to apply to review set documents.  -To delete a filter query, open the filter panel and select the trashcan icon next to the query. +To edit or delete a saved filter query, select **Saved filter queries** and expand the filter properties to display the **Edit** and **Delete** options for the saved filter query. - + -## Query language +## Use query language support for KQL and Keyword filters -In addition to using filters, you can also use a KQL-like query language in the Keywords filter to build your review set search query. The query language for review set queries supports standard Boolean operators, such as **AND**, **OR**, **NOT**, and **NEAR**. It also supports a single-character wildcard (?) and a multi-character wildcard (*). +When using the *KQL* or *Keyword* filters, you can use a KQL-like query language to build your review set search query. The query language for these two filters supports standard Boolean operators, such as **AND**, **OR**, **NOT**, and **NEAR**. It also supports a single-character wildcard (?) and a multi-character wildcard (*). > [!NOTE] > Review filters only support wildcards (? or *) on a single term. Using wildcards in searches on phrases that consist of multiple terms aren't supported. -## Advanced query builder +## Scenario example: Filter for untagged items in a review set ++An eDiscovery administrator needs to create a query to find all items in the review set that haven't had any tagging applied. For this example, the administrator creates the following review set filter query: ++1. For the first filter, the administrator selects the filter and types *tag* in filter search. The filter *Tags* is displayed as a matching option, and the administrator selects it. +2. The administrator then selects **Select an operator** and selects the *Is empty* operator. This operator returns all items that don't have any tags applied. ++The review set is immediately updated and the only the items that aren't tagged are displayed. -You can also build more advanced queries to search for documents in a review set. + -1. Open the filter panel, select **Filters**, and expand the **Search** section. +## Scenario example: Filter for native file type items in a review set -  +An eDiscovery administrator needs to create a query to find all items in the review set that are a certain type, such as .csv, .msg, or .pdf. For this example, the administrator creates the following review set filter query: -2. Select the **KQL** filter and select **Open query builder**. +1. For the first filter, the administrator selects the filter and types *file* in filter search. The filter *Native file extension* is one of the filter options displayed in the search results, and the administrator selects it. +2. The administrator then selects **Select an operator** and selects the *Equals any of* operator. The administrator selects the *Any* field and selects the checkboxes for the file types to include in the filter query. - In this panel, you can create complex KQL queries by using the query builder. You can add conditions or add condition groups that are made up of multiple conditions that are logically connected by **AND** or **OR** relationships. +The review set is immediately updated and the only the items that match the selected file types are displayed. -  + -## Filter partially indexed items +## Scenario example: Filter partially indexed items If you selected the option to add partially indexed items from additional data sources when you committed the collection estimate to a review set. You'll probably want to identify and view those items to determine if an item might be relevant to your investigation and whether you need to remediate the error that resulted in the item being partially indexed. At this time, there isn't a filter option in a review set to display partially i 1. Create a collection and commit it to a new review set *without* adding partially indexed items from the additional data sources. 2. Create a new collection by copying the collection from step 1. 3. Commit the new collection to the same review set. But this time, add the partially indexed items from the additional data sources. Because items from the collection you created in step 1 have already been added to the review set, only the partially indexed items from the second collection are added to the review set.-4. After both collections are added to the review set, go to the review set, and select **Manage** > **Load sets**. +4. After both collections are added to the review set, select the review set, and select **Load sets**. 5. Copy or make note of the **Load Id** for the second collection (the one you created in step 2). The collection name is identified in the **Source info** column. 6. Back in the review set, select **Filter**, expand the **IDs** section, and then select the **Load Id** checkbox. 7. Expand the **Load Id** filter, and then select the checkbox for the load ID that corresponds to the second collection to display the partially indexed items. |
compliance | Endpoint Dlp Getting Started | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-getting-started.md | If you're onboarding Windows 10 or Windows 11 devices, check to make sure that t For a general introduction to onboarding Windows devices, see: -- [Onboard Windows 10 and Windows 11 devices into Microsoft Purview overview](device-onboarding-overview.md#onboard-windows-10-and-windows-11-devices-into-microsoft-365-overview)+- [Onboard Windows devices into Microsoft 365 overview](device-onboarding-overview.md#onboard-windows-devices-into-microsoft-365-overview) For specific guidance to onboarding Windows devices, see: |
compliance | Purview Adaptive Scopes | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/purview-adaptive-scopes.md | f1.keywords: Previously updated : 05/16/2023 Last updated : 07/13/2023 audience: Admin description: Learn about Microsoft Purview adaptive scopes for policies. # Adaptive scopes +>*[Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).* + When you create a [communication compliance policy](/microsoft-365/compliance/communication-compliance-policies) or a [policy for retention](retention.md#retention-policies-and-retention-labels), you can create or add an adaptive scope for your policy. A single policy can have one or many adaptive scopes. - An adaptive scope uses a query that you specify, so you can define the membership of users or groups included in that query. These dynamic queries run daily against the attributes or properties that you specify for the selected scope. You can use one or more adaptive scopes with a single policy. |
compliance | Sensitivity Labels Aip | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-aip.md | The AIP client supports many customizations by using [PowerShell advanced settin However, you might find you don't need to use PowerShell to configure the supported settings because they're included in the standard configuration from the Microsoft Purview compliance portal. For example, UI configuration to choose label colors, and turn off mandatory labeling for Outlook. Check the available configurations in [Manage sensitivity labels in Office apps](sensitivity-labels-office-apps.md). > [!NOTE]-> The AIP add-in used PowerShell advanced settings for [oversharing popup messages in Outlook](/azure/information-protection/rms-client/clientv2-admin-guide-customizations#implement-pop-up-messages-in-outlook-that-warn-justify-or-block-emails-being-sent). When you use built-in labeling, the equivalent of this configuration is now available as a [DLP policy configuration](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup). +> The AIP add-in used PowerShell advanced settings for [oversharing popup messages in Outlook](/azure/information-protection/rms-client/clientv2-admin-guide-customizations#implement-pop-up-messages-in-outlook-that-warn-justify-or-block-emails-being-sent). When you use built-in labeling, the equivalent of this configuration is now detailed in [Get started with oversharing pop ups](dlp-osp-get-started.md). ## Features not planned to be supported by built-in labeling for Office apps |
compliance | Sensitivity Labels Versions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-versions.md | The numbers listed are the minimum Office application versions required for each |[Display label color](sensitivity-labels-office-apps.md#label-colors) |Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2303+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |16.71+ |Rolling out: 4.2316.0+ |4.2316.0+ |Under review | |[Default sublabel for parent label](sensitivity-labels-office-apps.md#specify-a-default-sublabel-for-a-parent-label)|Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review | |[Scope labels to files or emails](sensitivity-labels-office-apps.md#scope-labels-to-just-files-or-emails) |Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Rolling out: 16.70+ <sup>\*</sup> | Rolling out: 4.2309+ |Rolling out: 4.2309+ |Yes |-|[Preventing oversharing as DLP policy tip](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup)|Current Channel: 2305+ <br /><br> Monthly Enterprise Channel: 2307+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review | +|[Get started with oversharing pop ups](dlp-osp-get-started.md)|Current Channel: 2305+ <br /><br> Monthly Enterprise Channel: 2307+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review | |[Label inheritance from email attachments](sensitivity-labels-office-apps.md#configure-label-inheritance-from-email-attachments) |Current Channel: 2302+ <br /><br> Monthly Enterprise Channel: 2302+ <br /><br> Semi-Annual Enterprise Channel: 2302+ |Under review |Under review |Under review |Under review | |[Double Key Encryption (DKE)](encryption-sensitivity-labels.md#double-key-encryption) |Preview: [Current Channel (Preview)](https://office.com/insider) |Under review |Under review |Under review| Under review | |
compliance | Sit Get Started Exact Data Match Hash Upload | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-get-started-exact-data-match-hash-upload.md | If the tool indicates a mismatch in number of columns, it might be due to the pr - the datastore name from the **edm.xml** file, for this example its `PatientRecords` > [!IMPORTANT]-> Install the [EDM Upload Agent](#links-to-edm-upload-agent-by-subscription-type) in a custom folder so you don't need administrator permissions. If you install it into the default (*Program Files*), administrator permissions are required. +> 1. If using Windows Server 2016 or before, you must also [install Visual C++](/cpp/windows/latest-supported-vc-redist?view=msvc-170#visual-studio-2015-2017-2019-and-2022&preserve-view=true) prior to installing the EDM Upload Agent. +> +> 2. Install the [EDM Upload Agent](#links-to-edm-upload-agent-by-subscription-type) in a custom folder so you don't need administrator permissions. If you install it into the default (*Program Files*), administrator permissions are required. +> #### Set up the security group and user account |
compliance | Whats New | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/whats-new.md | Whether it be adding new solutions to the [Microsoft Purview compliance portal]( ### Data lifecycle management and records management -- **General availability (GA)**: Auto-labeling retention policies for [cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments) that are shared via Yammer are now in general availability.+- **General availability (GA)**: Auto-labeling retention policies for [cloud attachments](apply-retention-labels-automatically.md#auto-apply-labels-to-cloud-attachments) that are shared via Viva Engage are now in general availability. ### Data loss prevention -- **General availability (GA)**: Oversharing Popup for Outlook Win 32. [Scenario 2 Show policy tip as oversharing popup](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup) and [Business justification X-Header](dlp-policy-reference.md#business-justification-x-header).+- **General availability (GA)**: Oversharing Popup for Outlook Win 32. [Get started with oversharing pop ups](dlp-osp-get-started.md) and [Business justification X-Header](dlp-policy-reference.md#business-justification-x-header). ### Insider risk management Whether it be adding new solutions to the [Microsoft Purview compliance portal]( - **General availability (GA)**: For labeling built into Windows, macOS, iOS, and Android, auditing actions for sensitivity labels include encryption details such as a change in the encryption status and settings, and the Rights Management owner. - **In preview**: The ability to [scope labels to files and emails](sensitivity-labels-office-apps.md#scope-labels-to-just-files-or-emails), so that, for example, a sensitivity label is visible to users in Outlook but not in Word, Excel, or PowerPoint. This configuration can be used as a parity feature for the AIP add-in, which could be disabled per app. - **In preview**: As a parity feature for the AIP add-in, built-in labeling for Windows supports [label inheritance from email attachments](sensitivity-labels-office-apps.md#configure-label-inheritance-from-email-attachments).-- **In preview**: Prevent [oversharing of labeled emails as a DLP policy tip](dlp-create-deploy-policy.md#scenario-2-show-policy-tip-as-oversharing-popup). This DLP policy configuration is an equivalent for the AIP add-in with PowerShell advanced settings that implement pop-up messages in Outlook that warn, justify, or block emails being sent.+- **In preview**: Prevent oversharing of labeled emails as a DLP policy tip using [Get started with oversharing pop ups](dlp-osp-get-started.md). This DLP policy configuration is an equivalent for the AIP add-in with PowerShell advanced settings that implement pop-up messages in Outlook that warn, justify, or block emails being sent. - **In preview**: Preview versions of Outlook for Mac now support [label colors](sensitivity-labels-office-apps.md#label-colors) but don't yet support the sensitivity bar. - **In preview**: For mandatory labeling, Outlook for Android in the Beta Channel supports a setting that you can configure with Microsoft Intune to [prompt users to select a sensitivity label when they first compose an email](sensitivity-labels-office-apps.md#for-outlook-mobile-change-when-users-are-prompted-for-a-label) instead of when they send it. - **In preview**: Now rolling out in preview to SharePoint and Teams, users can select and change a sensitivity label from the details pane from these apps when [sensitivity labels are enabled for Office files in SharePoint and OneDrive](sensitivity-labels-sharepoint-onedrive-files.md). |
includes | Defender M3d Techcommunity | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/includes/defender-m3d-techcommunity.md | + + Title: Microsoft 365 Defender tech community +description: Microsoft 365 Defender tech community engagement. Last updated : 07/21/2023+++++++++> [!TIP] +> Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: [Microsoft 365 Defender Tech Community](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/bg-p/MicrosoftThreatProtectionBlog). |
security | Android Configure Mam | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure-mam.md | Users can install and open the app to start the onboarding process. > [!NOTE] > The Optional permissions setting is different from the Disable Web protection setting. Optional permissions only help to skip the permissions during onboarding but it's available for the end user to later review and enable while Disable Web protection allows users to onboard the Microsoft Defender for Endpoint app without the Web Protection. It cannot be enabled later. ++## Disable sign out +Defender for Endpoint allows you to deploy the app and disabling the sign out button. By hiding the sign out button, users are prevented from signing out of the Defender app. This action helps prevent tampering with the device when Defender for Endpoint isn't running. ++Use the following steps to configure the Disable sign out: ++1. In the Microsoft Intune admin center, go to **Apps > App configuration policies > Add > Managed apps**. +2. Provide the policy a **name**. +3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app. +4. In the **Settings** page, under the **General Configuration Settings**, add **DisableSignOut** as the key and set the value as 1. + - By default, Disable Sign Out = 0. + - Admin needs to make Disable Sign Out = 1 to disable the sign-out button in the app. Users will not see the sign out button once the policy is pushed to the device. +5. Select **Next** and assign this profile to targeted devices/users. + ## Related topics - [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md) |
security | Android Configure | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure.md | Use the following steps to turn on privacy for targeted users in the work profil Using this privacy control won't impact the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium". +## Disable sign-out ++Defender for Endpoint supports deployment without the sign-out button in the app to prevent users from signing out of the Defender app. This is important to prevent users from tampering with the device. +Use the following steps to configure Disable sign-out: ++1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**. +2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type. +3. Select **Microsoft Defender for Endpoint** as the target app. +4. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type. + - By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles and 0 for device administrator mode. + - Admins need to make Disable Sign Out = 0 to enable the sign-out button in the app. Users will be able to see the sign-out button once the policy is pushed. +5. Select **Next** and assign this profile to targeted devices and users. + ## Related articles - [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md) |
security | Attack Surface Reduction Rules Deployment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment.md | ms.localizationpriority: medium audience: ITPro -+ As outlined in [Use attack surface reduction rules to prevent malware infection] | Use advanced protection against ransomware | Block persistence through WMI event subscription | Block Office apps from injecting code into other processes | Block Office communication apps from creating child processes | | | | | | Block Adobe Reader from creating child processes | | | | -(<a id="fn1">1</a>) _Block abuse of exploited vulnerable signed drivers_ isn't currently available in Intune Endpoint security. You can configure this rule using [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune). +(<a id="fn1">1</a>) _Block abuse of exploited vulnerable signed drivers_ is now available under **Endpoint Security** > **Attack Surface Reduction**. (<a id="fn1">2</a>) Some ASR rules generate considerable noise, but won't block functionality. For example, if you're updating Chrome; Chrome will access lsass.exe; passwords are stored in lsass on the device. However, Chrome should not be accessing local device lsass.exe. If you enable the rule to block access to lsass, it will generate a lot of events. Those events are good events because the software update process should not access lsass.exe. Enabling this rule will block Chrome updates from accessing lsass, but will not block Chrome from updating; this is also true of other applications that make unnecessary calls to lsass.exe. The _block access to lsass_ rule will block unnecessary calls to lsass, but won't block the application from running. |
security | Configure Local Policy Overrides Microsoft Defender Antivirus | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus.md | Title: Configure local overrides for Microsoft Defender Antivirus settings description: Enable or disable users from locally changing settings in Microsoft Defender Antivirus. -keywords: local override, local policy, group policy, gpo, lockdown,merge, lists -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium Previously updated : 08/02/2022 Last updated : 07/13/2023 To configure these settings: You can also configure how locally defined lists are combined or merged with globally defined lists. This setting applies to [exclusion lists](configure-exclusions-microsoft-defender-antivirus.md), [specified remediation lists](configure-remediation-microsoft-defender-antivirus.md), and [attack surface reduction](/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction). -By default, lists that have been configured in local group policy and the Windows Security app are merged with lists that are defined by the appropriate Group Policy Object that you have deployed on your network. Where there are conflicts, the globally defined list takes precedence. You can disable this setting to ensure that only globally-defined lists (such as those from any deployed GPOs) are used. +By default, lists that have been configured in local group policy and the Windows Security app are merged with lists that are defined by the appropriate Group Policy Object that you have deployed on your network. Where there are conflicts, the globally defined list takes precedence. You can disable this setting to ensure that only globally defined lists (such as those from any deployed GPOs) are used. ### Use Group Policy to disable local list merging By default, lists that have been configured in local group policy and the Window 4. Double-click **Configure local administrator merge behavior for lists** and set the option to **Disabled**. Then select **OK**. +> [!NOTE] +> For "Administrative Templates (.admx) for Windows 11 2022 Update (22H2)" and "Administrative Templates (.admx) for Windows 10 November 2021 Update (21H2)" templates, set **Configure local administrator merge behavior for lists** to **Enabled** to disable the local administrator merge behavior. + ### Use Microsoft Intune to disable local list merging 1. In the [Microsoft Intune admin center](https://endpoint.microsoft.com), select **Endpoint security** > **Antivirus**. |
security | Configure Server Endpoints | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-server-endpoints.md | ms.pagetype: security ms.localizationpriority: medium Previously updated : 11/10/2022 Last updated : 07/12/2023 audience: ITPro The following steps are only applicable if you're using a third-party anti-malwa > [!IMPORTANT] >-> - Always download the latest installer package from the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) before performing a new installation and ensure prerequisites have been met. After installation, ensure to regularly update using component updates described in the section [Update packages for Microsoft Defender for Endpoint on Windows Server 2012 R2 and 2016](#update-packages-for-microsoft-defender-for-endpoint-on-windows-server-2012-r2-and-2016). +> Always download the latest installer package from the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) before performing a new installation and ensure prerequisites have been met. After installation, ensure to regularly update using component updates described in the section [Update packages for Microsoft Defender for Endpoint on Windows Server 2012 R2 and 2016](#update-packages-for-microsoft-defender-for-endpoint-on-windows-server-2012-r2-and-2016). - An operating system update can introduce an installation issue on machines with slower disks due to a timeout with service installation. Installation fails with the message "Could not find c:\program files\windows defender\mpasdesc.dll, - 310 WinDefend". Use the latest installation package, and the latest [install.ps1](https://github.com/microsoft/mdefordownlevelserver) script to help clear the failed installation if necessary. - We've identified an issue with Windows Server 2012 R2 connectivity to cloud when static TelemetryProxyServer is used **and** the certificate revocation list (CRL) URLs aren't reachable from the SYSTEM account context. Ensure the EDR sensor is updated to version 10.8210.* or later (using [KB5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac)) to resolve the issue. Alternatively, use a different proxy option ("system-wide") that provides such connectivity, or configure the same proxy via the WinInet setting on the SYSTEM account context. - On Windows Server 2012 R2, there's no user interface for Microsoft Defender Antivirus. In addition, the user interface on Windows Server 2016 only allows for basic operations. To perform operations on a device locally, refer to [Manage Microsoft Defender for Endpoint with PowerShell, WMI, and MPCmdRun.exe](/microsoft-365/security/defender-endpoint/manage-mde-post-migration-other-tools). As a result, features that specifically rely on user interaction, such as where the user is prompted to make a decision or perform a specific task, may not work as expected. It's recommended to disable or not enable the user interface nor require user interaction on any managed server as it may impact protection capability. - Not all Attack Surface Reduction rules are applicable to all operating systems. See [Attack Surface Reduction (ASR) rules](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules). - Operating system upgrades aren't supported. Offboard then uninstall before upgrading. The installer package can only be used to upgrade installations that have not yet been updated with new antimalware platform or EDR sensor update packages.-- Automatic exclusions for **server roles** aren't supported on Windows Server 2012 R2; however, built-in exclusions for operating system files are. For more information about adding exclusions, see [Virus scanning recommendations for Enterprise computers that are running currently supported versions of Windows](https://support.microsoft.com/topic/virus-scanning-recommendations-for-enterprise-computers-that-are-running-currently-supported-versions-of-windows-kb822158-c067a732-f24a-9079-d240-3733e39b40bc).+- Automatic exclusions for **server roles** aren't supported on Windows Server 2012 R2; however, built-in exclusions for operating system files are. For more information about adding exclusions, see [Configure Microsoft Defender Antivirus exclusions on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md). - To automatically deploy and onboard the new solution using Microsoft Endpoint Configuration Manager (MECM) you need to be on [version 2207 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016). You can still configure and deploy using version 2107 with the hotfix rollup, but this requires additional deployment steps. See [Microsoft Endpoint Configuration Manager migration scenarios](/microsoft-365/security/defender-endpoint/server-migration#microsoft-endpoint-configuration-manager-migration-scenarios) for more information. ## Windows Server Semi-Annual Enterprise Channel (SAC), Windows Server 2019 and Windows Server 2022 |
security | Configure Server Exclusions Microsoft Defender Antivirus | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus.md | description: Windows Server includes automatic exclusions, based on server role. ms.localizationpriority: medium Previously updated : 07/12/2023 Last updated : 07/13/2023 search.appverid: met150 - Windows -This article describes exclusions for Windows Server 2016 and later. Because Microsoft Defender Antivirus is built into Windows Server 2016 and later, exclusions for operating system files and server roles happen automatically. If necessary, you can define custom exclusions or opt out of automatic exclusions. +This article describes exclusions for Windows Server. Because Microsoft Defender Antivirus is built into Windows, [built-in exclusions](#built-in-exclusions) for operating system files happen automatically on all versions of Windows. On Windows Server 2016 and later, [automatic exclusions](#automatic-server-role-exclusions) happen automatically as roles are added. If necessary, you can define custom exclusions or opt out of automatic exclusions. For a more detailed overview of exclusions, see [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md). For a more detailed overview of exclusions, see [Manage exclusions for Microsoft - Microsoft Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer. - Appropriate exclusions must be set for software that isn't included with the operating system. - Windows Server 2012 R2 doesn't have Microsoft Defender Antivirus as an installable feature. When you onboard those servers to Defender for Endpoint, you'll install Microsoft Defender Antivirus, and default exclusions for operating system files are applied. However, exclusions for server roles (as specified below) don't apply automatically, and you should configure these exclusions as appropriate. To learn more, see [Onboard Windows servers to the Microsoft Defender for Endpoint service](configure-server-endpoints.md).+- Built-in exclusions and automatic server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md). -## Automatic exclusions on Windows Server 2016 or later +## Automatic server role exclusions -On Windows Server 2016 or later, you shouldn't need to define the following exclusions for Microsoft Defender Antivirus: +On Windows Server 2016 or later, you shouldn't need to define exclusions for server roles. When you install a role on Windows Server 2016 or later, Microsoft Defender Antivirus includes automatic exclusions for the server role and any files that are added while installing the role. -- Operating system files-- Server roles and any files that are added through server roles--Because Microsoft Defender Antivirus is built into Windows Server 2016 and later, it doesn't require exclusions for operating system files. In addition, when you install a role on Windows Server 2016 or later, Microsoft Defender Antivirus includes automatic exclusions for the server role and any files that are added while installing the role. --Operating system exclusions and server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md). --> [!NOTE] -> Automatic exclusions apply only to Windows Server 2016 and later. These exclusions are not visible in the Windows Security app and in PowerShell. -> Automatic exclusions can apply if your servers running Windows Server 2012 R2 are onboarded to Defender for Endpoint. For more information, see [Onboard Windows servers to the Microsoft Defender for Endpoint service](configure-server-endpoints.md). -> Automatic exclusions for server roles and operating system files do not apply to Windows Server 2012. --### The list of automatic exclusions --The following sections contain the exclusions that are delivered with automatic exclusions file paths and file types. --#### Default exclusions for all roles --This section lists the default exclusions for all roles in Windows Server 2016, Windows Server 2019, and Windows Server 2022. +Windows Server 2012 R2 does not support the automatic exclusions feature. You'll need to define explicit exclusions for any server role and any software that's added after installing the operating system. > [!IMPORTANT] > - Default locations could be different than the locations that are described in this article. > - To set exclusions for software that isn't included as a Windows feature or server role, refer to the software manufacturer's documentation. -##### Windows "temp.edb" files --- `%windir%\SoftwareDistribution\Datastore\*\tmp.edb`-- `%ProgramData%\Microsoft\Search\Data\Applications\Windows\windows.edb`--##### Windows Update files or Automatic Update files --- `%windir%\SoftwareDistribution\Datastore\*\Datastore.edb`-- `%windir%\SoftwareDistribution\Datastore\*\edb.chk`-- `%windir%\SoftwareDistribution\Datastore\*\edb\*.log`-- `%windir%\SoftwareDistribution\Datastore\*\Edb\*.jrs`-- `%windir%\SoftwareDistribution\Datastore\*\Res\*.log`--##### Windows Security files --- `%windir%\Security\database\*.chk`-- `%windir%\Security\database\*.edb`-- `%windir%\Security\database\*.jrs`-- `%windir%\Security\database\*.log`-- `%windir%\Security\database\*.sdb`--##### Group Policy files --- `%allusersprofile%\NTUser.pol`-- `%SystemRoot%\System32\GroupPolicy\Machine\registry.pol`-- `%SystemRoot%\System32\GroupPolicy\User\registry.pol`--##### WINS files --- `%systemroot%\System32\Wins\*\*.chk`-- `%systemroot%\System32\Wins\*\*.log`-- `%systemroot%\System32\Wins\*\*.mdb`-- `%systemroot%\System32\LogFiles\`-- `%systemroot%\SysWow64\LogFiles\`--##### File Replication Service (FRS) exclusions --- Files in the File Replication Service (FRS) working folder. The FRS working folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Working Directory`-- - `%windir%\Ntfrs\jet\sys\*\edb.chk` - - `%windir%\Ntfrs\jet\*\Ntfrs.jdb` - - `%windir%\Ntfrs\jet\log\*\*.log` --- FRS Database log files. The FRS Database log file folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Ntfrs\Parameters\DB Log File Directory`-- - `%windir%\Ntfrs\*\Edb\*.log` --- The FRS staging folder. The staging folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Replica Sets\GUID\Replica Set Stage`-- - `%systemroot%\Sysvol\*\Ntfrs_cmp*\` --- The FRS preinstall folder. This folder is specified by the folder `Replica_root\DO_NOT_REMOVE_NtFrs_PreInstall_Directory`-- - `%systemroot%\SYSVOL\domain\DO_NOT_REMOVE_NtFrs_PreInstall_Directory\*\Ntfrs*\` --- The Distributed File System Replication (DFSR) database and working folders. These folders are specified by the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DFSR\Parameters\Replication Groups\GUID\Replica Set Configuration File`+Automatic exclusions include: - > [!NOTE] - > For custom locations, see [Opting out of automatic exclusions](#opting-out-of-automatic-exclusions). -- - `%systemdrive%\System Volume Information\DFSR\$db_normal$` - - `%systemdrive%\System Volume Information\DFSR\FileIDTable_*` - - `%systemdrive%\System Volume Information\DFSR\SimilarityTable_*` - - `%systemdrive%\System Volume Information\DFSR\*.XML` - - `%systemdrive%\System Volume Information\DFSR\$db_dirty$` - - `%systemdrive%\System Volume Information\DFSR\$db_clean$` - - `%systemdrive%\System Volume Information\DFSR\$db_lostl$` - - `%systemdrive%\System Volume Information\DFSR\Dfsr.db` - - `%systemdrive%\System Volume Information\DFSR\*.frx` - - `%systemdrive%\System Volume Information\DFSR\*.log` - - `%systemdrive%\System Volume Information\DFSR\Fsr*.jrs` - - `%systemdrive%\System Volume Information\DFSR\Tmp.edb` --##### Process exclusions --- `%systemroot%\System32\dfsr.exe`-- `%systemroot%\System32\dfsrs.exe`+- [Hyper-V exclusions](#hyper-v-exclusions) +- [SYSVOL files](#sysvol-files) +- [Active Directory exclusions](#active-directory-exclusions) +- [DHCP Server exclusions](#dhcp-server-exclusions) +- [DNS Server exclusions](#dns-server-exclusions) +- [File and Storage Services exclusions](#file-and-storage-services-exclusions) +- [Print Server exclusions](#print-server-exclusions) +- [Web Server exclusions](#web-server-exclusions) +- [Windows Server Update Services exclusions](#windows-server-update-services-exclusions) -##### Hyper-V exclusions +### Hyper-V exclusions The following table lists the file type exclusions, folder exclusions, and process exclusions that are delivered automatically when you install the Hyper-V role. The following table lists the file type exclusions, folder exclusions, and proce |Folders|`%ProgramData%\Microsoft\Windows\Hyper-V` <br/> `%ProgramFiles%\Hyper-V` <br/> `%SystemDrive%\ProgramData\Microsoft\Windows\Hyper-V\Snapshots` <br/> `%Public%\Documents\Hyper-V\Virtual Hard Disks`| |Processes|`%systemroot%\System32\Vmms.exe` <br/> `%systemroot%\System32\Vmwp.exe`| -##### SYSVOL files +### SYSVOL files - `%systemroot%\Sysvol\Domain\*.adm` - `%systemroot%\Sysvol\Domain\*.admx` The following table lists the file type exclusions, folder exclusions, and proce - `%systemroot%\Sysvol\Domain\*.ins` - `%systemroot%\Sysvol\Domain\Oscfilter.ini` --#### Active Directory exclusions +### Active Directory exclusions This section lists the exclusions that are delivered automatically when you install Active Directory Domain Services (AD DS). -##### NTDS database files +#### NTDS database files The database files are specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\DSA Database File` - `%windir%\Ntds\ntds.dit` - `%windir%\Ntds\ntds.pat` -##### The AD DS transaction log files +#### The AD DS transaction log files The transaction log files are specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\Database Log Files Path` The transaction log files are specified in the registry key `HKEY_LOCAL_MACHINE\ - `%windir%\Ntds\Ntds*.pat` - `%windir%\Ntds\TEMP.edb` -##### The NTDS working folder +#### The NTDS working folder This folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\DSA Working Directory` - `%windir%\Ntds\Temp.edb` - `%windir%\Ntds\Edb.chk` -##### Process exclusions for AD DS and AD DS-related support files +#### Process exclusions for AD DS and AD DS-related support files - `%systemroot%\System32\ntfrs.exe` - `%systemroot%\System32\lsass.exe` -#### DHCP Server exclusions +### DHCP Server exclusions This section lists the exclusions that are delivered automatically when you install the DHCP Server role. The DHCP Server file locations are specified by the *DatabasePath*, *DhcpLogFilePath*, and *BackupDatabasePath* parameters in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DHCPServer\Parameters` This section lists the exclusions that are delivered automatically when you inst - `%systemroot%\System32\DHCP\*\*.chk` - `%systemroot%\System32\DHCP\*\*.edb` -#### DNS Server exclusions +### DNS Server exclusions This section lists the file and folder exclusions and the process exclusions that are delivered automatically when you install the DNS Server role. -##### File and folder exclusions for the DNS Server role +#### File and folder exclusions for the DNS Server role - `%systemroot%\System32\Dns\*\*.log` - `%systemroot%\System32\Dns\*\*.dns` - `%systemroot%\System32\Dns\*\*.scc` - `%systemroot%\System32\Dns\*\BOOT` -##### Process exclusions for the DNS Server role +#### Process exclusions for the DNS Server role - `%systemroot%\System32\dns.exe` -#### File and Storage Services exclusions +### File and Storage Services exclusions This section lists the file and folder exclusions that are delivered automatically when you install the File and Storage Services role. The exclusions listed below don't include exclusions for the Clustering role. This section lists the file and folder exclusions that are delivered automatical - `%clusterserviceaccount%\Local Settings\Temp` - `%SystemDrive%\mscs` -#### Print Server exclusions +### Print Server exclusions This section lists the file type exclusions, folder exclusions, and the process exclusions that are delivered automatically when you install the Print Server role. -##### File type exclusions +#### File type exclusions - `*.shd` - `*.spl` -##### Folder exclusions +#### Folder exclusions This folder is specified in the registry key `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Printers\DefaultSpoolDirectory` - `%system32%\spool\printers\*` -##### Process exclusions +#### Process exclusions for the Print Server role - `spoolsv.exe` -#### Web Server exclusions +### Web Server exclusions This section lists the folder exclusions and the process exclusions that are delivered automatically when you install the Web Server role. -##### Folder exclusions +#### Folder exclusions - `%SystemRoot%\IIS Temporary Compressed Files` - `%SystemDrive%\inetpub\temp\IIS Temporary Compressed Files` This section lists the folder exclusions and the process exclusions that are del - `%systemDrive%\inetpub\logs` - `%systemDrive%\inetpub\wwwroot` -##### Process exclusions +#### Process exclusions for the Web Server role - `%SystemRoot%\system32\inetsrv\w3wp.exe` - `%SystemRoot%\SysWOW64\inetsrv\w3wp.exe` - `%SystemDrive%\PHP5433\php-cgi.exe` -##### Turning off scanning of files in the Sysvol\Sysvol folder or the SYSVOL_DFSR\Sysvol folder +#### Turning off scanning of files in the Sysvol\Sysvol folder or the SYSVOL_DFSR\Sysvol folder The current location of the `Sysvol\Sysvol` or `SYSVOL_DFSR\Sysvol` folder and all the subfolders is the file system reparse target of the replica set root. The `Sysvol\Sysvol` and `SYSVOL_DFSR\Sysvol` folders use the following locations by default: Exclude the following files from this folder and all its subfolders: - `*.ins` - `Oscfilter.ini` -#### Windows Server Update Services exclusions +### Windows Server Update Services exclusions This section lists the folder exclusions that are delivered automatically when you install the Windows Server Update Services (WSUS) role. The WSUS folder is specified in the registry key `HKEY_LOCAL_MACHINE\Software\Microsoft\Update Services\Server\Setup` This section lists the folder exclusions that are delivered automatically when y - `%systemroot%\SoftwareDistribution\Datastore` - `%systemroot%\SoftwareDistribution\Download` +## Built-in exclusions ++Because Microsoft Defender Antivirus is built into Windows, it doesn't require exclusions for operating system files on any version of Windows. ++Built-in exclusions include: ++- [Windows "temp.edb" files](#windows-tempedb-files) +- [Windows Update files or Automatic Update files](#windows-update-files-or-automatic-update-files) +- [Windows Security files](#windows-security-files) +- [Group Policy files](#group-policy-files) +- [WINS files](#wins-files) +- [File Replication Service (FRS) exclusions](#file-replication-service-frs-exclusions) +- [Process exclusions for built-in operating system files](#process-exclusions-for-built-in-operating-system-files) ++### Windows "temp.edb" files ++- `%windir%\SoftwareDistribution\Datastore\*\tmp.edb` +- `%ProgramData%\Microsoft\Search\Data\Applications\Windows\windows.edb` ++### Windows Update files or Automatic Update files ++- `%windir%\SoftwareDistribution\Datastore\*\Datastore.edb` +- `%windir%\SoftwareDistribution\Datastore\*\edb.chk` +- `%windir%\SoftwareDistribution\Datastore\*\edb\*.log` +- `%windir%\SoftwareDistribution\Datastore\*\Edb\*.jrs` +- `%windir%\SoftwareDistribution\Datastore\*\Res\*.log` ++### Windows Security files ++- `%windir%\Security\database\*.chk` +- `%windir%\Security\database\*.edb` +- `%windir%\Security\database\*.jrs` +- `%windir%\Security\database\*.log` +- `%windir%\Security\database\*.sdb` ++### Group Policy files ++- `%allusersprofile%\NTUser.pol` +- `%SystemRoot%\System32\GroupPolicy\Machine\registry.pol` +- `%SystemRoot%\System32\GroupPolicy\User\registry.pol` ++### WINS files ++- `%systemroot%\System32\Wins\*\*.chk` +- `%systemroot%\System32\Wins\*\*.log` +- `%systemroot%\System32\Wins\*\*.mdb` +- `%systemroot%\System32\LogFiles\` +- `%systemroot%\SysWow64\LogFiles\` ++### File Replication Service (FRS) exclusions ++- Files in the File Replication Service (FRS) working folder. The FRS working folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Working Directory` ++ - `%windir%\Ntfrs\jet\sys\*\edb.chk` + - `%windir%\Ntfrs\jet\*\Ntfrs.jdb` + - `%windir%\Ntfrs\jet\log\*\*.log` ++- FRS Database log files. The FRS Database log file folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Ntfrs\Parameters\DB Log File Directory` ++ - `%windir%\Ntfrs\*\Edb\*.log` ++- The FRS staging folder. The staging folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Replica Sets\GUID\Replica Set Stage` ++ - `%systemroot%\Sysvol\*\Ntfrs_cmp*\` ++- The FRS preinstall folder. This folder is specified by the folder `Replica_root\DO_NOT_REMOVE_NtFrs_PreInstall_Directory` ++ - `%systemroot%\SYSVOL\domain\DO_NOT_REMOVE_NtFrs_PreInstall_Directory\*\Ntfrs*\` ++- The Distributed File System Replication (DFSR) database and working folders. These folders are specified by the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DFSR\Parameters\Replication Groups\GUID\Replica Set Configuration File` ++ > [!NOTE] + > For custom locations, see [Opting out of automatic exclusions](#opting-out-of-automatic-exclusions). ++ - `%systemdrive%\System Volume Information\DFSR\$db_normal$` + - `%systemdrive%\System Volume Information\DFSR\FileIDTable_*` + - `%systemdrive%\System Volume Information\DFSR\SimilarityTable_*` + - `%systemdrive%\System Volume Information\DFSR\*.XML` + - `%systemdrive%\System Volume Information\DFSR\$db_dirty$` + - `%systemdrive%\System Volume Information\DFSR\$db_clean$` + - `%systemdrive%\System Volume Information\DFSR\$db_lostl$` + - `%systemdrive%\System Volume Information\DFSR\Dfsr.db` + - `%systemdrive%\System Volume Information\DFSR\*.frx` + - `%systemdrive%\System Volume Information\DFSR\*.log` + - `%systemdrive%\System Volume Information\DFSR\Fsr*.jrs` + - `%systemdrive%\System Volume Information\DFSR\Tmp.edb` ++### Process exclusions for built-in operating system files ++- `%systemroot%\System32\dfsr.exe` +- `%systemroot%\System32\dfsrs.exe` + ## Opting out of automatic exclusions -In Windows Server 2016 and later, the predefined exclusions delivered by Security intelligence updates only exclude the default paths for a role or feature. If you installed a role or feature in a custom path, or you want to manually control the set of exclusions, make sure to opt out of the automatic exclusions delivered in Security intelligence updates. But keep in mind that the exclusions that are delivered automatically are optimized for Windows Server 2016 and later. See [Recommendations for defining exclusions](configure-exclusions-microsoft-defender-antivirus.md#recommendations-for-defining-exclusions) before defining your exclusion lists. +In Windows Server 2016 and later, the predefined exclusions delivered by [Security intelligence updates](microsoft-defender-antivirus-updates.md#security-intelligence-updates) only exclude the default paths for a role or feature. If you installed a role or feature in a custom path, or you want to manually control the set of exclusions, make sure to opt out of the automatic exclusions delivered in Security intelligence updates. But keep in mind that the exclusions that are delivered automatically are optimized for Windows Server 2016 and later. See [Recommendations for defining exclusions](configure-exclusions-microsoft-defender-antivirus.md#recommendations-for-defining-exclusions) before defining your exclusion lists. > [!WARNING]-> Opting out of automatic exclusions may adversely impact performance, or result in data corruption. The exclusions that are delivered automatically are optimized for Windows Server 2016, Windows Server 2019, and Windows Server 2022 roles. +> Opting out of automatic exclusions might adversely impact performance, or result in data corruption. Automatic server role exclusions are optimized for Windows Server 2016, Windows Server 2019, and Windows Server 2022. Because predefined exclusions only exclude **default paths**, if you move NTDS and SYSVOL folders to another drive or path that is *different from the original path*, you must add exclusions manually. See [Configure the list of exclusions based on folder name or file extension](configure-extension-file-exclusions-microsoft-defender-antivirus.md#configure-the-list-of-exclusions-based-on-folder-name-or-file-extension). |
security | Defender Endpoint Antivirus Exclusions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-antivirus-exclusions.md | You can take certain actions to prevent false positives and similar issues from This article explains how these actions work, and describes the various types of exclusions that can be defined for Defender for Endpoint and Microsoft Defender Antivirus. > [!CAUTION]-> Defining exclusions reduces the level of protection offered by Defender for Endpoint and Microsoft Defender Antivirus. Use exclusions as a last resort, and make sure to define only the exclusions that are necessary. Make sure to review your exclusions periodically, and remove the ones you no longer need. See [Recommendations for defining exclusions](configure-exclusions-microsoft-defender-antivirus.md#recommendations-for-defining-exclusions) and [Common mistakes to avoid](common-exclusion-mistakes-microsoft-defender-antivirus.md). +> **Defining exclusions reduces the level of protection offered by Defender for Endpoint and Microsoft Defender Antivirus**. Use exclusions as a last resort, and make sure to define only the exclusions that are necessary. Make sure to review your exclusions periodically, and remove the ones you no longer need. See [Recommendations for defining exclusions](configure-exclusions-microsoft-defender-antivirus.md#recommendations-for-defining-exclusions) and [Common mistakes to avoid](common-exclusion-mistakes-microsoft-defender-antivirus.md). ## Submissions, suppressions, and exclusions When you're dealing with false positives, or known entities that are generating ## Submitting files for analysis -If you have a file that you think is wrongly detected as malware (a false positive), or a file that you suspect might be malware even though it wasn't detected (a false negative), you can submit the file to Microsoft for analysis. Your submission will be scanned immediately, and will then be reviewed by Microsoft security analysts. You'll be able to check the status of your submission on the [submission history page](https://www.microsoft.com/wdsi/submissionhistory). +If you have a file that you think is wrongly detected as malware (a false positive), or a file that you suspect might be malware even though it wasn't detected (a false negative), you can submit the file to Microsoft for analysis. Your submission is scanned immediately, and will then be reviewed by Microsoft security analysts. You're able to check the status of your submission on the [submission history page](https://www.microsoft.com/wdsi/submissionhistory). Submitting files for analysis helps reduce false positives and false negatives for all customers. To learn more, see the following articles: The following table summarizes exclusion types that can be defined for Defender | Product/service | Exclusion types | |:|:-|-| [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) <br/>[Defender for Endpoint Plan 1 or Plan 2](defender-endpoint-plan-1-2.md) | - [Automatic exclusions](#automatic-exclusions) (for Windows Server 2016 and later)<br/>- [Custom exclusions](#custom-exclusions), such as process-based exclusions, folder location-based exclusions, file extension exclusions, or contextual file and folder exclusions<br/>- [Custom remediation actions](#custom-remediation-actions) based on threat severity or for specific threats<br/><br/>*The standalone versions of Defender for Endpoint Plan 1 and Plan 2 don't include server licenses. To onboard servers, you'll need another license, such as Microsoft Defender for Endpoint for Servers or [Microsoft Defender for Servers Plan 1 or 2](/azure/defender-for-cloud/defender-for-servers-introduction). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).*<br/><br/>*If you're a small or medium-sized business using [Microsoft Defender for Business](../defender-business/mdb-overview.md), you can get [Microsoft Defender for Business servers](../defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).* | +| [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) <br/>[Defender for Endpoint Plan 1 or Plan 2](defender-endpoint-plan-1-2.md) | - [Automatic exclusions](#automatic-exclusions) (for active roles on Windows Server 2016 and later)<br/>- [Built-in exclusions](#built-in-exclusions) (for operating system files in Windows)<br/>- [Custom exclusions](#custom-exclusions), such as process-based exclusions, folder location-based exclusions, file extension exclusions, or contextual file and folder exclusions<br/>- [Custom remediation actions](#custom-remediation-actions) based on threat severity or for specific threats<br/><br/>*The standalone versions of Defender for Endpoint Plan 1 and Plan 2 don't include server licenses. To onboard servers, you need another license, such as Microsoft Defender for Endpoint for Servers or [Microsoft Defender for Servers Plan 1 or 2](/azure/defender-for-cloud/defender-for-servers-introduction). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).*<br/><br/>*If you're a small or medium-sized business using [Microsoft Defender for Business](../defender-business/mdb-overview.md), you can get [Microsoft Defender for Business servers](../defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).* | | [Defender for Endpoint Plan 1 or Plan 2](defender-endpoint-plan-1-2.md) | - [Indicators](#defender-for-endpoint-indicators) for files, certificates, or IP addresses, URLs/domains<br/>- [Attack surface reduction exclusions](#attack-surface-reduction-exclusions)<br/>- [Controlled folder access exclusions](#controlled-folder-access-exclusions) | | [Defender for Endpoint Plan 2](microsoft-defender-endpoint.md) | [Automation folder exclusions](#automation-folder-exclusions) (for automated investigation and remediation) | The following sections describe these exclusions in more detail: Microsoft Defender Antivirus exclusions can apply to antivirus scans and/or to real-time protection. These exclusions include: -- [Automatic exclusions](#automatic-exclusions)-- [Custom exclusions](#custom-exclusions)-- [Custom remediation actions](#custom-remediation-actions)+- [Automatic exclusions](#automatic-exclusions) (for server roles on Windows Server 2016 and later) +- [Built-in exclusions](#built-in-exclusions) (for operating system files in all versions of Windows) +- [Custom exclusions](#custom-exclusions) (for files and folders that you specify, if necessary) +- [Custom remediation actions](#custom-remediation-actions) (to determine what happens with detected threats) ### Automatic exclusions -[Automatic exclusions](configure-server-exclusions-microsoft-defender-antivirus.md#the-list-of-automatic-exclusions) include operating system files and server roles and features. These exclusions won't be scanned by [real-time protection](configure-protection-features-microsoft-defender-antivirus.md) but are still subject to [quick, full, or on-demand antivirus scans](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan). The following table provides some examples and includes links to learn more. +[Automatic exclusions](configure-server-exclusions-microsoft-defender-antivirus.md#automatic-server-role-exclusions) (also referred to as *automatic server role exclusions*) include exclusions for server roles and features in Windows Server. These exclusions aren't scanned by [real-time protection](configure-protection-features-microsoft-defender-antivirus.md) but are still subject to [quick, full, or on-demand antivirus scans](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan). -| Automatic exclusion type | Examples | -|:|:-| -| Operating system files <br/>(See [Automatic exclusions](configure-server-exclusions-microsoft-defender-antivirus.md#the-list-of-automatic-exclusions).) | `%windir%\SoftwareDistribution\Datastore\*\Datastore.edb` <br/> `%allusersprofile%\NTUser.pol` <br/> Windows Update files <br/> Windows Security files <br/> ... and more | -| Server roles and features <br/>(See [Default exclusions for roles](configure-server-exclusions-microsoft-defender-antivirus.md#default-exclusions-for-all-roles).) | File Replication Service (FRS) <br/> Hyper-V <br/> SYSVOL <br/> Active Directory <br/> DNS Server <br/> Print Server <br/> Web Server <br/> Windows Server Update Services | +Examples include: ++- File Replication Service (FRS) +- Hyper-V +- SYSVOL +- Active Directory +- DNS Server +- Print Server +- Web Server +- Windows Server Update Services +- ...and more. ++> [!NOTE] +> Automatic exclusions for server roles aren't supported on Windows Server 2012 R2. For servers running Windows Server 2012 R2 with the Active Directory Domain Services (AD DS) server role installed, exclusions for domain controllers must be specified manually. See [Active Directory exclusions](configure-server-exclusions-microsoft-defender-antivirus.md#active-directory-exclusions). ++For more information, see [Automatic server role exclusions](configure-server-exclusions-microsoft-defender-antivirus.md#automatic-server-role-exclusions). ++### Built-in exclusions ++[Built-in exclusions](configure-server-exclusions-microsoft-defender-antivirus.md#built-in-exclusions) include certain operating system files that are excluded by Microsoft Defender Antivirus on all versions of Windows (including Windows 10, Windows 11, and Windows Server). ++Examples include: ++- `%windir%\SoftwareDistribution\Datastore\*\Datastore.edb` +- `%allusersprofile%\NTUser.pol` +- Windows Update files +- Windows Security files +- ... and more. ++For more information, see [Built-in exclusions](configure-server-exclusions-microsoft-defender-antivirus.md#built-in-exclusions). ### Custom exclusions You can define [indicators](manage-indicators.md) with specific actions for enti - **Block and Remediate** ΓÇô Files or certificates with Block and Remediate indicators are blocked and quarantined when detected. -- **Block Execution** ΓÇô IP addresses and URLs/domains with Block Execution indicators are completely blocked. Users can't access those locations.+- **Block Execution** ΓÇô IP addresses and URLs/domains with Block Execution indicators are blocked. Users can't access those locations. - **Warn** ΓÇô IP addresses and URLs/domains with Warn indicators cause a warning message to be displayed when a user attempts to access those locations. Users can choose to bypass the warning and proceed to the IP address or URL/domain. Also note that while most ASR rules exclusions are independent from Microsoft De Automation folder exclusions apply to [automated investigation and remediation](automated-investigations.md) in Defender for Endpoint, which is designed to examine alerts and take immediate action to resolve detected breaches. As alerts are triggered, and an automated investigation runs, a verdict (Malicious, Suspicious, or No threats found) is reached for each piece of evidence investigated. Depending on the [automation level](automation-levels.md) and other security settings, remediation actions can occur automatically or only upon approval by your security operations team. -You can specify folders, file extensions in a specific directory, and file names to be excluded from automated investigation and remediation capabilities. Such automation folder exclusions will apply to all devices onboarded to Defender for Endpoint. These exclusions are still subject to antivirus scans. See [Manage automation folder exclusions](manage-automation-folder-exclusions.md). +You can specify folders, file extensions in a specific directory, and file names to be excluded from automated investigation and remediation capabilities. Such automation folder exclusions apply to all devices onboarded to Defender for Endpoint. These exclusions are still subject to antivirus scans. See [Manage automation folder exclusions](manage-automation-folder-exclusions.md). ## How exclusions and indicators are evaluated The following diagram shows how [automated investigation and remediation works w :::image type="content" source="images/air-exclusions.png" alt-text="Screenshot that Shows automated investigation and remediation and indicators." lightbox="images/air-exclusions.png"::: -## Additional server workloads and exclusions +## Other server workloads and exclusions -If your organization is using other server workloads, such as Exchange Server, SharePoint Server, or SQL Server, be aware that only built-in server roles (that could be prerequisites for software you install later) on Windows Server are excluded by [automatic exclusions](#automatic-exclusions) feature (and only when using their default installation location). You'll likely need to define antivirus exclusions for these additional workloads, or for all workloads if you disable automatic exclusions. +If your organization is using other server workloads, such as Exchange Server, SharePoint Server, or SQL Server, be aware that only built-in server roles (that could be prerequisites for software you install later) on Windows Server are excluded by [automatic exclusions](#automatic-exclusions) feature (and only when using their default installation location). You'll likely need to define antivirus exclusions for these other workloads, or for all workloads if you disable automatic exclusions. Here are some examples of technical documentation to identify and implement the exclusions you need: Here are some examples of technical documentation to identify and implement the Depending on what you're using, you might need to refer to the documentation for that server workload. > [!TIP]-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are: +> **Performance tip** Due to a variety of factors, Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are: > > - Top paths that impact scan time > - Top files that impact scan time Depending on what you're using, you might need to refer to the documentation for > > You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions. > See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).-> ## See also |
security | Mac Schedule Scan | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-schedule-scan.md | Title: How to schedule scans with Microsoft Defender for Endpoint on macOS description: Learn how to schedule an automatic scanning time for Microsoft Defender for Endpoint in macOS to better protect your organization's assets. keywords: microsoft, defender, Microsoft Defender for Endpoint, mac, scans, antivirus, big sur, monterey, ventura, mde for mac -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium Last updated : 07/13/2023 audience: ITPro The following code shows the schema you need to use to schedule a quick scan. <true/> <key>StartCalendarInterval</key> <dict>- <key>Day</key> - <integer>3</integer> <key>Hour</key> <integer>2</integer> <key>Minute</key> The following code shows the schema you need to use to schedule a quick scan. <true/> <key>StartCalendarInterval</key> <dict>- <key>Day</key> - <integer>3</integer> <key>Hour</key> <integer>2</integer> <key>Minute</key> |
security | Manage Auto Investigation | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-auto-investigation.md | Title: Review remediation actions following automated investigations description: Review and approve (or reject) remediation actions following an automated investigation. -keywords: autoir, automated, investigation, detection, remediation, action, pending, approved -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium Previously updated : 07/20/2022 Last updated : 07/13/2023 audience: ITPro Here are a few examples: - **Example 3**: Tailspin Toys has their device groups set to **No automated response** (not recommended). In this case, automated investigations do not occur. No remediation actions are taken or pending, and no actions are logged in the [Action center](/microsoft-365/security/defender-endpoint/auto-investigation-action-center#the-action-center) for their devices (see [Manage device groups](/microsoft-365/security/defender-endpoint/machine-groups#manage-device-groups)). -Whether taken automatically or upon approval, an automated investigation can result in one or more of the remediation actions: +Whether taken automatically or upon approval, an automated investigation and remediation can result in one or more of the remediation actions: - Quarantine a file - Remove a registry key |
security | Get Defender Vulnerability Management | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management.md | Microsoft Defender Vulnerability Management is available as a standalone and as > - US Government customers using GCC, GCC High, and DoD > - Microsoft Defender for Business customers -- If you don't have Defender for Endpoint Plan 1 or Plan 2, or Microsoft 365 E3, sign up to try the [Defender Vulnerability Management Standalone Trial](#try-defender-vulnerability-management-standalone)+- If you don't have Defender for Endpoint Plan 1 or Plan 2, or Microsoft 365 E3 or E5, sign up to try the [Defender Vulnerability Management Standalone Trial](#try-defender-vulnerability-management-standalone) - If you already have Defender for Endpoint Plan 2, sign up to try the [Defender Vulnerability Management Add-on Trial](#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers) > [!NOTE] Microsoft Defender Vulnerability Management is available as a standalone and as ## Try Defender Vulnerability Management Standalone -If you don't have Defender for Endpoint Plan 1 or Plan 2, or Microsoft 365 E3, you will sign up to trial the **Defender Vulnerability Management Standalone trial**. +If you don't have Defender for Endpoint Plan 1 or Plan 2, or Microsoft 365 E3 or E5, you will sign up to trial the **Defender Vulnerability Management Standalone trial**. > [!IMPORTANT] > You must be logged into the tenant as a global administrator to perform this task. |
security | Activate Defender Rbac | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/activate-defender-rbac.md | If you deactivate a workload, the roles created and edited within Microsoft 365 ## Next steps - [Edit or delete roles](edit-delete-rbac-roles.md) |
security | Additional Information Xdr | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/additional-information-xdr.md | If you don't have your own security IR team, [Microsoft Incident Response](https ### See also -[Frequently asked questions](frequently-asked-questions.md) +[Frequently asked questions](frequently-asked-questions.md) |
security | Advanced Hunting Aadsignineventsbeta Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-aadsignineventsbeta-table.md | Use this reference to construct queries that return information from the table. - [Advanced hunting overview](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview) - [Learn the query language](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-language) - [Understand the schema](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-schema-reference) |
security | Advanced Hunting Aadspnsignineventsbeta Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-aadspnsignineventsbeta-table.md | For information on other tables in the advanced hunting schema, see [the advance - [Advanced hunting overview](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview) - [Learn the query language](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-language) - [Understand the schema](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-schema-reference) |
security | Advanced Hunting Alertevidence Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-alertevidence-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Alertinfo Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-alertinfo-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Assignedipaddresses Function | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-assignedipaddresses-function.md | AssignedIPAddresses(DeviceName, Date) ## Related topics - [Advanced hunting overview](advanced-hunting-overview.md) - [Learn the query language](advanced-hunting-query-language.md)-- [Understand the schema](advanced-hunting-schema-tables.md)+- [Understand the schema](advanced-hunting-schema-tables.md) |
security | Advanced Hunting Behaviorentities Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-behaviorentities-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Behaviorinfo Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-behaviorinfo-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Best Practices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-best-practices.md | To learn about all supported parsing functions, [read about Kusto string functio - [Quotas and usage parameters](advanced-hunting-limits.md) - [Handle advanced hunting errors](advanced-hunting-errors.md) - [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)+- [Learn the query language](advanced-hunting-query-language.md) |
security | Advanced Hunting Cloudappevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-cloudappevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Custom Functions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-custom-functions.md | If the function code is already loaded to the editor, you can also select **Save - [Learn the query language](advanced-hunting-query-language.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Get more query examples](advanced-hunting-shared-queries.md) |
security | Advanced Hunting Deviceevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Devicefilecertificateinfo Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicefilecertificateinfo-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Devicefileevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicefileevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Devicefromip Function | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicefromip-function.md | DeviceNetworkEvents - [Advanced hunting overview](advanced-hunting-overview.md) - [Learn the query language](advanced-hunting-query-language.md) - [Understand the schema](advanced-hunting-schema-tables.md) |
security | Advanced Hunting Deviceimageloadevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceimageloadevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Deviceinfo Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceinfo-table.md | DeviceInfo - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Devicelogonevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicelogonevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Devicenetworkevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicenetworkevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Devicenetworkinfo Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicenetworkinfo-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Use shared queries](advanced-hunting-shared-queries.md) - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)+- [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Deviceprocessevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceprocessevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Deviceregistryevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceregistryevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Devicetvmhardwarefirmware Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmhardwarefirmware-table.md | DeviceTvmHardwareFirmware - [Learn the query language](advanced-hunting-query-language.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)+- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) |
security | Advanced Hunting Devicetvminfogathering Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvminfogathering-table.md | DeviceTvmInfoGathering - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) - [Overview of Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)-- [Learn how to manage the Log4Shell vulnerability in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/tvm-manage-log4shell-guidance)+- [Learn how to manage the Log4Shell vulnerability in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/tvm-manage-log4shell-guidance) |
security | Advanced Hunting Devicetvminfogatheringkb Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvminfogatheringkb-table.md | DeviceTvmInfoGathering - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) - [Overview Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) |
security | Advanced Hunting Devicetvmsecureconfigurationassessment Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmsecureconfigurationassessment-table.md | DeviceTvmSecureConfigurationAssessment - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)+- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) |
security | Advanced Hunting Devicetvmsecureconfigurationassessmentkb Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md | DeviceTvmSecureConfigurationAssessment - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)+- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) |
security | Advanced Hunting Devicetvmsoftwareevidencebeta Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmsoftwareevidencebeta-table.md | For information on other tables in the advanced hunting schema, see [the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Devicetvmsoftwareinventory Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmsoftwareinventory-table.md | For information on other tables in the advanced hunting schema, see [the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)+- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) |
security | Advanced Hunting Devicetvmsoftwarevulnerabilities Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmsoftwarevulnerabilities-table.md | For information on other tables in the advanced hunting schema, see [the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)+- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) |
security | Advanced Hunting Devicetvmsoftwarevulnerabilitieskb Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md | For information on other tables in the advanced hunting schema, see [the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)+- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) |
security | Advanced Hunting Emailattachmentinfo Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-emailattachmentinfo-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Emailevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-emailevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Emailpostdeliveryevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-emailpostdeliveryevents-table.md | This table captures events with the following `ActionType` values: - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Emailurlinfo Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-emailurlinfo-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Errors | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-errors.md | Advanced hunting displays errors to notify for syntax mistakes and whenever quer - [Advanced hunting best practices](advanced-hunting-best-practices.md) - [Quotas and usage parameters](advanced-hunting-limits.md) - [Understand the schema](advanced-hunting-schema-tables.md)-- [Kusto Query Language overview](/azure/data-explorer/kusto/query/)+- [Kusto Query Language overview](/azure/data-explorer/kusto/query/) |
security | Advanced Hunting Example | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-example.md | The data from this query will appear in the results panel below the query itself ## Related information - [Advanced hunting best practices](advanced-hunting-best-practices.md) - [Overview - Advanced hunting](advanced-hunting-overview.md) |
security | Advanced Hunting Expert Training | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-expert-training.md | CloudAppEvents - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Extend Data | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-extend-data.md | If you're running Active Directory on premises, you need to install the Microsof ## Related topics - [Advanced hunting overview](advanced-hunting-overview.md)-- [Understand the schema](advanced-hunting-schema-tables.md)+- [Understand the schema](advanced-hunting-schema-tables.md) |
security | Advanced Hunting Fileprofile Function | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-fileprofile-function.md | DeviceFileEvents - [Learn the query language](advanced-hunting-query-language.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Get more query examples](advanced-hunting-shared-queries.md) |
security | Advanced Hunting Find Ransomware | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-find-ransomware.md | Microsoft Security team blog posts: - [Ransomware responseΓÇöto pay or not to pay? (December 2019)](https://www.microsoft.com/security/blog/2019/12/16/ransomware-response-to-pay-or-not-to-pay/) - [Norsk Hydro responds to ransomware attack with transparency (December 2019)](https://www.microsoft.com/security/blog/2019/12/17/norsk-hydro-ransomware-attack-transparency/) |
security | Advanced Hunting Go Hunt | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-go-hunt.md | In addition to modifying the query to get more relevant results, you can also: - [Learn the query language](advanced-hunting-query-language.md) - [Work with query results](advanced-hunting-query-results.md) - [Custom detection rules](custom-detection-rules.md) |
security | Advanced Hunting Identitydirectoryevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-identitydirectoryevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Identityinfo Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-identityinfo-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Identitylogonevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-identitylogonevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Identityqueryevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-identityqueryevents-table.md | For information on other tables in the advanced hunting schema, [see the advance - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Limits | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-limits.md | This means that, for instance, if on a specific day you ran two queries, one use - [Advanced hunting best practices](advanced-hunting-best-practices.md) - [Handle advanced hunting errors](advanced-hunting-errors.md) - [Advanced hunting overview](advanced-hunting-overview.md) |
security | Advanced Hunting Link To Incident | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-link-to-incident.md | You can also select the event to open the **Inspect record** pane. You can view which alerts were generated from advanced hunting by filtering the Incidents queue and Alerts queue by **Manual** detection source. :::image type="content" source="../../media/link-to-incident-8-filter.png" alt-text="The manual filtering of Incidents and Alerts queue in the Filters page in the Microsoft 365 Defender portal " lightbox="../../media/link-to-incident-8-filter.png"::: |
security | Advanced Hunting Migrate From Mde | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-migrate-from-mde.md | AlertInfo - [Advanced hunting overview](advanced-hunting-overview.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Advanced hunting in Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview) |
security | Advanced Hunting Modes | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-modes.md | We recommend going through these steps to quickly get started with advanced hunt - [Understand the schema](advanced-hunting-schema-tables.md) - [Build hunting queries using guided mode](advanced-hunting-query-builder.md)-- [Learn the query language](advanced-hunting-query-language.md)+- [Learn the query language](advanced-hunting-query-language.md) |
security | Advanced Hunting Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-overview.md | Advanced hunting results are converted to the [timezone](m365d-time-zone.md) set - [Understand the schema](advanced-hunting-schema-tables.md) - [Microsoft Graph security API](/graph/api/resources/security-api-overview#advanced-hunting) - [Custom detections overview](custom-detections-overview.md) |
security | Advanced Hunting Query Builder Details | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder-details.md | If you change the view to **Emails & collaboration**, the query is narrowed down ## See also - [Advanced hunting quotas and usage parameters](advanced-hunting-limits.md)+ - [Extend advanced hunting coverage with the right settings](advanced-hunting-extend-data.md) |
security | Advanced Hunting Query Builder Results | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder-results.md | To view more columns: - [Advanced hunting quotas and usage parameters](advanced-hunting-limits.md) - [Switch to advanced mode](advanced-hunting-query-builder-details.md#switch-to-advanced-mode-after-building-a-query)-- [Refine your query in guided mode](advanced-hunting-query-builder-details.md)+- [Refine your query in guided mode](advanced-hunting-query-builder-details.md) |
security | Advanced Hunting Query Builder | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder.md | Then, add another condition, this time specifying the folder or **DeliveryLocati - [Refine your query in guided mode](advanced-hunting-query-builder-details.md) - [Work with query results in guided mode](advanced-hunting-query-builder-results.md) - [Understand the schema](advanced-hunting-schema-tables.md) |
security | Advanced Hunting Query Emails Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-emails-devices.md | DeviceProcessEvents - [Use shared queries](advanced-hunting-shared-queries.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Query Language | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-language.md | For more information on Kusto query language and supported operators, see [Kusto - [Use shared queries](advanced-hunting-shared-queries.md) - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)+- [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Query Results | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-results.md | Select the three dots to the right of any column in the **Inspect record** panel - [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md) - [Custom detections overview](custom-detections-overview.md) |
security | Advanced Hunting Schema Changes | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-schema-changes.md | The `AppFileEvents` table has been deprecated. The `CloudAppEvents` table includ ## Related topics - [Advanced hunting overview](advanced-hunting-overview.md) - [Understand the schema](advanced-hunting-schema-tables.md) |
security | Advanced Hunting Schema Tables | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-schema-tables.md | The following reference lists all the tables in the schema. Each table name link - [Use shared queries](advanced-hunting-shared-queries.md) - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Seenby Function | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-seenby-function.md | DeviceInfo - [Learn the query language](advanced-hunting-query-language.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Get more query examples](advanced-hunting-shared-queries.md) |
security | Advanced Hunting Shared Queries | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-shared-queries.md | Community queries are grouped into folders like *Campaigns*, *Collection*, *Defe - [Work with query results](advanced-hunting-query-results.md) - [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) - [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)+- [Apply query best practices](advanced-hunting-best-practices.md) |
security | Advanced Hunting Take Action | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-take-action.md | Each action is individually recorded in the [action center](m365d-action-center. - [Work with query results](advanced-hunting-query-results.md) - [Understand the schema](advanced-hunting-schema-tables.md) - [Action center overview](m365d-action-center.md) |
security | Advanced Hunting Urlclickevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-urlclickevents-table.md | UrlClickEvents - [Proactively hunt for threats](advanced-hunting-overview.md) - [Safe Links in Microsoft Defender for Office 365](../office-365-security/safe-links-about.md) - [Take action on advanced hunting query results](advanced-hunting-take-action.md) |
security | Alert Grading For Malicious Exchange Connectors | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-for-malicious-exchange-connectors.md | Once it's determined that the observed alert activities are part of TP, classify ## See also - [Overview of alert classification](alert-grading-playbooks.md)-- [Investigate alerts](investigate-alerts.md)+- [Investigate alerts](investigate-alerts.md) |
security | Alert Grading Password Spray Attack | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-password-spray-attack.md | Once you determine that the activities associated with this alert are malicious, ## See also - [Overview of alert classification](alert-grading-playbooks.md)-- [Investigate alerts](investigate-alerts.md)+- [Investigate alerts](investigate-alerts.md) |
security | Alert Grading Password Spray | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-password-spray.md | AlertInfo - [Overview of alert classification](alert-grading-playbooks.md) - [Classifying password spray attacks](alert-grading-password-spray-attack.md) - [Investigate alerts](investigate-alerts.md) |
security | Alert Grading Playbook Email Forwarding | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-email-forwarding.md | Once you determine that the activities associated make this alert a True Positiv - [Suspicious inbox forwarding rules](alert-grading-playbook-inbox-forwarding-rules.md) - [Suspicious inbox manipulation rules](alert-grading-playbook-inbox-manipulation-rules.md) - [Investigate alerts](investigate-alerts.md) |
security | Alert Grading Playbook Inbox Forwarding Rules | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-inbox-forwarding-rules.md | CloudAppEvents - [Suspicious email forwarding activity](alert-grading-playbook-email-forwarding.md) - [Suspicious inbox manipulation rules](alert-grading-playbook-inbox-manipulation-rules.md) - [Investigate alerts](investigate-alerts.md) |
security | Alert Grading Playbook Inbox Manipulation Rules | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-inbox-manipulation-rules.md | CloudAppEvents - [Suspicious email forwarding activity](alert-grading-playbook-email-forwarding.md) - [Suspicious inbox forwarding rules](alert-grading-playbook-inbox-forwarding-rules.md) - [Investigate alerts](investigate-alerts.md) |
security | Alert Grading Playbooks | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbooks.md | See these playbooks for steps to more quickly classify alerts for the following - [Password spray attacks](alert-grading-password-spray-attack.md) See [Investigate alerts](investigate-alerts.md) for information on how to examine alerts with the Microsoft 365 Defender portal. |
security | Api Access | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-access.md | For more information, see **[Create an app with partner access to Microsoft 365 - [OAuth 2.0 authorization for user sign in and API access](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code) - [Manage secrets in your server apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/) - [Create a 'Hello world' application that accesses the Microsoft 365 APIs](api-hello-world.md) |
security | Api Advanced Hunting | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-advanced-hunting.md | In the following example, a user sends the query below and receives an API respo - [Learn about API limits and licensing](api-terms.md) - [Understand error codes](api-error-codes.md) - [Advanced hunting overview](advanced-hunting-overview.md) |
security | Api Articles | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-articles.md | The following resources provide more information about APIs available for other - [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/apis-intro) - [Microsoft Defender for Office 365](/office/office-365-management-api/) - [Microsoft Defender for Cloud Apps](/cloud-app-security/api-introduction) |
security | Api Create App User Context | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-create-app-user-context.md | The following example shows how to send a request to get a list of incidents **u - [Learn about API limits and licensing](api-terms.md) - [Understand error codes](api-error-codes.md) - [OAuth 2.0 authorization for user sign in and API access](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code) |
security | Api Create App Web | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-create-app-web.md | The following example shows how to send a request to get a list of incidents **u - [Understand error codes](api-error-codes.md) - [Manage secrets in your server apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/) - [OAuth 2.0 authorization for user sign in and API access](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code) |
security | Api Error Codes | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-error-codes.md | Each error response contains a unique ID parameter for tracking. The property na - [Supported Microsoft 365 Defender APIs](api-supported.md) - [Access the Microsoft 365 Defender APIs](api-access.md) - [Learn about API limits and licensing](api-terms.md) |
security | Api Get Incident | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-get-incident.md | GET https://api.security.microsoft.com/api/incidents/{id} ## Related articles [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview) |
security | Api Hello World | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-hello-world.md | You're all done! You've successfully: - [Create an app with multi-tenant partner access to Microsoft 365 Defender APIs](api-partner-access.md) - [Manage secrets in your server apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/) - [OAuth 2.0 Authorization for user sign in and API access](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code) |
security | Api Incident | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-incident.md | alerts | alert list | List of related alerts. See examples at [List incidents](a - [Incidents overview](incidents-overview.md) - [List incidents API](api-list-incidents.md) - [Update incident API](api-update-incidents.md) |
security | Api List Incidents | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-list-incidents.md | GET https://api.security.microsoft.com/api/incidents - [Incidents overview](incidents-overview.md) - [Incident APIs](api-incident.md) - [Update incident API](api-update-incidents.md) |
security | Api Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-overview.md | Watch this short video to learn how you can use Microsoft 365 Defender to automa | [Understand API error codes](api-error-codes.md) | | [Manage secrets in your apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/) | | [Implement OAuth 2.0 authorization for user sign in](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code) | |
security | Api Partner Access | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-partner-access.md | The following example shows how to send a request to get a list of incidents **u - [Understand error codes](api-error-codes.md) - [Manage secrets in your server apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/) - [OAuth 2.0 authorization for user sign in and API access](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code) |
security | Api Supported | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-supported.md | All APIs along the `/api` path use the [OData](/odata/overview) Protocol; for ex - [Streaming API](../defender-endpoint/raw-data-export.md) - [Learn about API limits and licensing](api-terms.md) - [Understand error codes](api-error-codes.md) |
security | Api Update Incidents | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-update-incidents.md | Here's an example of the request. - [Incident APIs](api-incident.md) - [List incidents](api-list-incidents.md) - [Incidents overview](incidents-overview.md) |
security | Auditing | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/auditing.md | In addition to using Audit New Search in the Microsoft Purview compliance portal ### See also -[Additional information](additional-information-xdr.md) +[Additional information](additional-information-xdr.md) |
security | Autoad Results | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/autoad-results.md | To release a user account or a device from containment, click on the contained a The Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) brings together [remediation](m365d-remediation-actions.md) and response actions across your devices, email & collaboration content, and identities. Actions listed include remediation actions that were taken automatically or manually. You can view automatic attack disruption actions in the Action center. -After you mitigate the risk and complete the investigation of an incident, you can release the contained assets from the action details pane (e.g., enable a disabled user account or release a device from containment). For more information about the action center, see [Action center](m365d-action-center.md). +After you mitigate the risk and complete the investigation of an incident, you can release the contained assets from the action details pane (e.g., enable a disabled user account or release a device from containment). For more information about the action center, see [Action center](m365d-action-center.md). |
security | Automatic Attack Disruption | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/automatic-attack-disruption.md | For more information, see [view attack disruption details and results](autoad-re - [View details and results](autoad-results.md) |
security | Before You Begin Defender Experts | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/before-you-begin-defender-experts.md | If you haven't done so yet, you can complete the customer interest form for Defe ### Next step - [Start using Defender Experts for Hunting](onboarding-defender-experts-for-hunting.md) |
security | Before You Begin Xdr | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/before-you-begin-xdr.md | As part of the service's built-in [Microsoft Defender Experts for Hunting](defen ## Access requirements -Anyone from your organization can complete the [customer interest form](https://aka.ms/IWantDefenderExperts) for the Defender Experts for XDR service, however, you need to work with your Commercial Executive to transact the Defender Experts for XDR SKU. +Work with your Commercial Executive to transact the Defender Experts for XDR SKU. Defender Experts for XDR requests for certain roles and permissions for you to fully access the service capabilities. [Learn more](dex-xdr-permissions.md). This service is currently delivered in English language only. ### Next step -[Get started with Microsoft Defender Experts for XDR](get-started-xdr.md) +[Get started with Microsoft Defender Experts for XDR](get-started-xdr.md) |
security | Compare Rbac Roles | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/compare-rbac-roles.md | Use this table to learn about the permissions assigned by default for each workl - [Import existing RBAC roles](import-rbac-roles.md) - [Activate Microsoft 365 Defender RBAC](activate-defender-rbac.md) |
security | Configure Attack Disruption | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-attack-disruption.md | Excluding user accounts is not recommended, and accounts added to this list won' - [Automatic attack disruption in Microsoft 365 Defender](automatic-attack-disruption.md) |
security | Configure Email Notifications | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-email-notifications.md | This section lists various issues that you may encounter when using email notifi - [Update data retention settings](../defender-endpoint/data-retention-settings.md) - [Configure advanced features](../defender-endpoint/advanced-features.md) - [Configure vulnerability email notifications](../defender-endpoint/configure-vulnerability-email-notifications.md) |
security | Configure Event Hub | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-event-hub.md | for your custom app to ingest. ## Related topics -[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview) +[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview) |
security | Configure Siem Defender | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-siem-defender.md | For more information on the Elastic streaming API integration, see [Microsoft M3 ## Related articles [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview) |
security | Create Custom Rbac Roles | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/create-custom-rbac-roles.md | To access and manage roles and permissions, without being a Global Administrator - [Import existing RBAC roles](import-rbac-roles.md) - [Activate Microsoft 365 Defender RBAC](activate-defender-rbac.md) |
security | Custom Detection Rules | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-detection-rules.md | In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name - [Advanced hunting overview](advanced-hunting-overview.md) - [Learn the advanced hunting query language](advanced-hunting-query-language.md) - [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md) |
security | Custom Detections Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-detections-overview.md | Custom detections provide: - [Create and manage custom detection rules](custom-detection-rules.md) - [Advanced hunting overview](advanced-hunting-overview.md) - [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md) |
security | Custom Permissions Details | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-permissions-details.md | Permissions to manages the security and system settings and to create and assign - [Create custom roles](create-custom-rbac-roles.md) - [Activate Microsoft 365 Defender RBAC](activate-defender-rbac.md) |
security | Custom Roles | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-roles.md | Similarly, to view hunting data from Microsoft Defender for Office 365, users wo - [RBAC roles](../office-365-security/migrate-to-defender-for-office-365-onboard.md#rbac-roles) - [Manage access to Microsoft 365 Defender](m365d-permissions.md) - [Manage admin access for Defender for Cloud Apps](/cloud-app-security/manage-admins) |
security | Data Privacy | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/data-privacy.md | For more information on the data storage and privacy information of the specific - [Microsoft Defender for Endpoint data storage and privacy](/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy) - [Microsoft Defender for Cloud Apps data security and privacy](/cloud-app-security/cas-compliance-trust) - [Microsoft 365 privacy, security, and transparency](/office365/servicedescriptions/office-365-platform-service-description/privacy-security-and-transparency#advanced-threat-protection) |
security | Defender Experts For Hunting | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/defender-experts-for-hunting.md | The following capabilities included in this managed threat hunting service could ### Next step - [Before you begin using Defender Experts for Hunting](before-you-begin-defender-experts.md) |
security | Defender Experts Report | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/defender-experts-report.md | The **Top trending suspicious activities** section of the report identifies up t By showing the most critical and frequently observed activities, you can assess and evaluate their impact and develop strategies to prevent or mitigate potential threats to your environment Select **View details** in each card to open a flyout panel detailing the impacted devices and users. If applicable, the page also provides links to view related Defender Expert Notifications. |
security | Defender Threat Intelligence | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/defender-threat-intelligence.md | Under **Threat Intelligence** is the existing node for the **Threat Analytics** The experience between the existing Defender TI standalone portal differs slightly from the version in Microsoft 365 Defender. Though most of the functionality is available, at this time, the Defender TI experience in Microsoft 365 Defender doesn't include the ability to apply custom tags or project capabilities. [Learn more about Microsoft Defender Threat Intelligence](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti). |
security | Deploy Configure M365 Defender | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/deploy-configure-m365-defender.md | Deployment guides in the admin center require authentication to a Microsoft 365 - [Microsoft Defender for Endpoint overview](../defender-endpoint/microsoft-defender-endpoint.md) - [Microsoft Defender for Office 365 overview](../office-365-security/defender-for-office-365.md) - [Microsoft Defender for Cloud Apps overview](/cloud-app-security/what-is-cloud-app-security) |
security | Deploy Supported Services | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/deploy-supported-services.md | Once you've deployed the supported services, [turn on Microsoft 365 Defender](m3 - [Microsoft Defender for Office 365 overview](../office-365-security/defender-for-office-365.md) - [Microsoft Defender for Cloud Apps overview](/cloud-app-security/what-is-cloud-app-security) - [Microsoft Defender for Identity overview](/azure-advanced-threat-protection/what-is-atp) |
security | Device Profile | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/device-profile.md | Selecting an item opens a flyout that links to the update. * [Turn on Microsoft 365 Defender](m365d-enable.md) * [Investigate entities on devices, using live response](../defender-endpoint/live-response.md) * [Automated investigation and response (AIR) in Office 365](../office-365-security/air-about.md) |
security | Dex Xdr Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/dex-xdr-overview.md | In addition to the constantly updated research and intelligence tailored for the ### Next step [Before you begin](before-you-begin-xdr.md) |
security | Dex Xdr Permissions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/dex-xdr-permissions.md | These policies are configured during the onboarding process and require the rele ### See also -[Additional information](additional-information-xdr.md) +[Additional information](additional-information-xdr.md) |
security | Dlp Investigate Alerts Defender | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/dlp-investigate-alerts-defender.md | Go to the incident summary page and select **Manage Incident** to add incident t - [Incidents overview](incidents-overview.md) - [Prioritize incidents](incident-queue.md) - [Manage incidents](manage-incidents.md) |
security | Dlp Investigate Alerts Sentinel | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/dlp-investigate-alerts-sentinel.md | CloudAppEvents - [Incidents overview](incidents-overview.md) - [Prioritize incidents](incident-queue.md) - [Manage incidents](manage-incidents.md) |
security | Edit Delete Rbac Roles | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/edit-delete-rbac-roles.md | If the workload is active, by removing the role all assigned user permission wil - [Learn about RBAC permissions](custom-permissions-details.md) - [Map existing RBAC roles to Microsoft 365 Defender RBAC roles](compare-rbac-roles.md) |
security | Eval Create Eval Environment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-create-eval-environment.md | The second is to [Set up your Microsoft 365 Defender trial lab environment](set [Learn how to enable Microsoft 365 for Identity](eval-defender-identity-overview.md) Or return to the Overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Endpoint Architecture | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-architecture.md | Microsoft Defender for Endpoint can also be integrated into other Security Infor Return to the overview for [Evaluate Microsoft Defender for Endpoint](eval-defender-endpoint-overview.md) Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Endpoint Enable Eval | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-enable-eval.md | The following table lists the available tools based on the endpoint that you nee Return to the overview for [Evaluate Microsoft Defender for Endpoint](eval-defender-endpoint-overview.md) Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Endpoint Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-overview.md | The following table describes the steps in the illustration. |[Step 1. Review architecture requirements and key concepts](eval-defender-endpoint-architecture.md)|Understand the Defender for Endpoint architecture and the capabilities available to you.| |[Step 2. Enable the evaluation environment](eval-defender-endpoint-enable-eval.md)|Follow the steps to set up the evaluation environment.| |[Step 3. Set up the pilot](eval-defender-endpoint-pilot.md)|Verify your pilot group, run simulations, and become familiar with key features and dashboards.| |
security | Eval Defender Endpoint Pilot | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-pilot.md | To run any of the provided simulations, you need at least [one onboarded device] Return to the overview for [Evaluate Microsoft Defender for Endpoint](eval-defender-endpoint-overview.md) Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Identity Architecture | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-architecture.md | Step 2 of 3: [Enable the evaluation environment Defender for Identity](eval-defe Return to the overview for [Evaluate Microsoft Defender for Identity](eval-defender-identity-overview.md) Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Identity Enable Eval | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-enable-eval.md | Step 3 of 3: [Pilot Microsoft Defender for Identity](eval-defender-identity-pilo Return to the overview for [Evaluate Microsoft Defender for Identity](eval-defender-identity-overview.md) Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Identity Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-overview.md | This table describes the steps in the illustration. |1|[Review architecture requirements and key concepts](eval-defender-identity-architecture.md) | Understand the Defender for Identity architecture and be sure your environment meets the architecture prerequisites. | |2|[Enable the evaluation environment](eval-defender-identity-enable-eval.md) | Follow the steps to set up the evaluation environment. | |3|[Set up the pilot](eval-defender-identity-pilot.md) | Learn about benchmark settings for your identity environment and try out Defender for Identity tutorials. | |
security | Eval Defender Identity Pilot | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-pilot.md | Try out Defender for Identity tutorials: Return to the overview for [Evaluate Microsoft Defender for Office 365](eval-defender-office-365-overview.md) -Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) +Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Investigate Respond Additional | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-investigate-respond-additional.md | See [Get expert training on advanced hunting](advanced-hunting-expert-training.m ### Navigation you may need [Create the Microsoft 365 Defender Evaluation Environment](eval-create-eval-environment.md) |
security | Eval Defender Investigate Respond Simulate Attack | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-investigate-respond-simulate-attack.md | Step 2 of 2: [Try Microsoft 365 Defender incident response capabilities](eval-de ### Navigation you may need [Create the Microsoft 365 Defender Evaluation Environment](eval-create-eval-environment.md) |
security | Eval Defender Investigate Respond | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-investigate-respond.md | The following table describes the steps in the illustration. ## Navigation you may need [Create the Microsoft 365 Defender Evaluation Environment](eval-create-eval-environment.md) |
security | Eval Defender Mcas Architecture | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-architecture.md | Step 2 of 3: [Enable the evaluation environment for Microsoft Defender for Cloud Return to the overview for [Evaluate Microsoft Defender for Cloud Apps](eval-defender-mcas-overview.md) Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Mcas Enable Eval | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-enable-eval.md | Step 3 of 3: [Pilot Microsoft Defender for Cloud Apps](eval-defender-mcas-pilot. Return to the overview for [Evaluate Microsoft Defender for Cloud Apps](eval-defender-mcas-overview.md) Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Mcas Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-overview.md | Use the following steps to enable and pilot Microsoft Defender for Cloud Apps. |[Review architecture requirements and key concepts](eval-defender-mcas-architecture.md) | Understand the Defender for Cloud Apps architecture and how it integrates with Microsoft 365 Defender, Microsoft Defender for Endpoint, and Azure Active Directory. | |[Enable the evaluation environment](eval-defender-mcas-enable-eval.md) | Connect to the portal, configure integration with Defender for Identity and/or your organization's network devices, and begin to view and manage cloud apps. | |[Set up the pilot](eval-defender-mcas-pilot.md) | Scope your deployment to certain user groups, configure Conditional Access App Control, and try out tutorials for protecting your environment. | |
security | Eval Defender Mcas Pilot | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-pilot.md | For more information on advanced hunting in Microsoft Defender for Cloud Apps da Return to the overview for [Evaluate Microsoft Defender for Cloud Apps](eval-defender-mcas-overview.md) Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Office 365 Architecture | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-office-365-architecture.md | Step 2 of 3: [Enable the evaluation environment Microsoft Defender for Office 36 Return to the overview for [Evaluate Microsoft Defender for Office 365](eval-defender-office-365-overview.md) Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Office 365 Enable Eval | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-office-365-enable-eval.md | Step 3 of 3: Set up the pilot for Microsoft Defender for Office 365 Return to the overview for [Evaluate Microsoft Defender for Office 365](eval-defender-office-365-overview.md) Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Office 365 Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-office-365-overview.md | The following table describes the steps in the illustration. |1|[Review architecture requirements and key concepts](eval-defender-office-365-architecture.md)|Understand the Defender for Office architecture and be sure your Exchange Online environment meets the architecture prerequisites.| |2|[Enable the evaluation environment](eval-defender-office-365-enable-eval.md)|Follow the steps to set up the evaluation environment.| |3|[Set up the pilot](eval-defender-office-365-pilot.md)|Create pilot groups, configure protection, and become familiar with key features and dashboards.| |
security | Eval Defender Office 365 Pilot | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-office-365-pilot.md | Now that your pilot is set up and configured, it's helpful to become familiar wi Return to the overview for [Evaluate Microsoft Defender for Office 365](eval-defender-office-365-overview.md) Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md) |
security | Eval Defender Promote To Production | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-promote-to-production.md | Use the following general guidelines to onboard more devices to Microsoft Defend ## Microsoft Defender for Cloud Apps Microsoft Defender for Cloud Apps doesn't require any other configuration. Just make sure you've purchased the necessary licenses. If you've scoped the deployment to certain user groups, increase the scope of these groups until you reach production scale. |
security | Eval Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-overview.md | This order is commonly recommended and designed to leverage the value of the cap ## Go to the Next Step [Learn about and/or create the Microsoft 365 Defender Evaluation Environment](eval-create-eval-environment.md) |
security | Export Incidents Queue | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/export-incidents-queue.md | For example, for the data on the CSV file, you can apply filters to view the fol > The maximum number of records you can export to a CSV file is 10,000. If you have thoughts or suggestions about the new **Export** feature (the **Export** button) for the incident queue, contact Microsoft team or send your feedback through the Microsoft 365 Defender portal. |
security | Feedback | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/feedback.md | Check out this video to see how easy it is to provide feedback. 2. Rate your experience and provide details on what you liked or where improvement can be made. You can also choose to be contacted about the feedback. 3. Select **Submit**. |
security | Fetch Incidents | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/fetch-incidents.md | For information on how to fetch alerts using REST API, see [Pull alerts using RE ## Related topics -[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview) +[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview) |
security | First Incident Analyze | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-analyze.md | Learn how to [remediate incidents](first-incident-remediate.md). - [Incidents overview](incidents-overview.md) - [Investigate incidents](investigate-incidents.md) - [Manage incidents](manage-incidents.md) |
security | First Incident Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-overview.md | More examples of first incident responses: [Detailed incident response playbooks](/security/compass/incident-response-playbooks) |
security | First Incident Path Identity | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-path-identity.md | See the [phishing](first-incident-path-phishing.md) investigation path. - [Incidents overview](incidents-overview.md) - [Manage incidents](manage-incidents.md) - [Investigate incidents](investigate-incidents.md) |
security | First Incident Path Phishing | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-path-phishing.md | See the [identity-based attack](first-incident-path-identity.md) investigation p - [Incidents overview](incidents-overview.md) - [Investigate incidents](investigate-incidents.md) - [Manage incidents](manage-incidents.md) |
security | First Incident Post | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-post.md | See these additional investigation paths: - [Incidents overview](incidents-overview.md) - [Investigate incidents](investigate-incidents.md) - [Manage incidents](manage-incidents.md) |
security | First Incident Prepare | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-prepare.md | Learn how to [triage and analyze incidents](first-incident-analyze.md). - [Incidents overview](incidents-overview.md) - [Investigate incidents](investigate-incidents.md) - [Manage incidents](manage-incidents.md) |
security | First Incident Remediate | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-remediate.md | Learn how to [perform a post-incident review of an incident](first-incident-post - [Incidents overview](incidents-overview.md) - [Investigate incidents](investigate-incidents.md) - [Manage incidents](manage-incidents.md) |
security | Frequently Asked Questions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/frequently-asked-questions.md | Last updated 05/29/2023 ### See also [How Microsoft Defender Experts for XDR permissions work](dex-xdr-permissions.md) |
security | Get Started Xdr | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/get-started-xdr.md | Once the readiness checks are completed, our experts will start monitoring your ### See also - [Frequently asked questions](frequently-asked-questions.md) - [How Microsoft Defender Experts for XDR permissions work](dex-xdr-permissions.md) |
security | Get Started | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/get-started.md | Turning on Microsoft 365 Defender and deploying services will give you access to |Microsoft Defender for Office 365 | Advanced protection for your apps and data in Office 365, including email and other collaboration tools | | Microsoft Defender for Identity | Defend against advanced threats, compromised identities, and malicious insiders using correlated Active Directory signals | | Microsoft Defender for Cloud Apps | Identify and combat cyberthreats across your Microsoft and third-party cloud services | |
security | Import Rbac Roles | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/import-rbac-roles.md | Imported roles appear in the **Permissions and roles** list together with any cu - [Activate Microsoft 365 Defender RBAC](activate-defender-rbac.md) - [Edit or delete roles](edit-delete-rbac-roles.md) |
security | Incident Queue | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incident-queue.md | After you've determined which incident requires the highest priority, select it - [Incidents overview](incidents-overview.md) - [Manage incidents](manage-incidents.md) - [Investigate incidents](investigate-incidents.md) |
security | Incident Response Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incident-response-overview.md | For more information, see [Threat analytics in Microsoft 365 Defender](threat-an Endpoint Attack Notifications (previously referred to as Microsoft Threat Experts - Targeted Attack Notifications) is a managed threat hunting service. Once you apply and are accepted, you'll receive Endpoint Attack Notifications from Microsoft Defender experts, so you won't miss critical threats to your environment. These notifications will help you protect your organization's endpoints, email, and identities. Microsoft Defender Experts ΓÇô Experts on Demand lets you get expert advice about threats your organization is facing and you can reach out for help on threats your organization is facing. It's available as an additional subscription service. For more information, see [Microsoft Defender Experts in Microsoft 365 overview](../defender-endpoint/experts-on-demand.md). |
security | Incidents Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incidents-overview.md | Follow this table based on your security team role. | Security investigator or analyst (Tier 2) | <ol><li> Perform [investigations](investigate-incidents.md) of incidents from the **Incidents** page of the Microsoft 365 Defender portal. </li><li> See these [incident response playbooks](/security/compass/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. </li></ol> | | Advanced security analyst or threat hunter (Tier 3) | <ol><li>Perform [investigations](investigate-incidents.md) of incidents from the **Incidents** page of the Microsoft 365 Defender portal. </li><li> Track and respond to emerging threats with [threat analytics](threat-analytics.md). </li><li> Proactively hunt for threats with [advanced threat hunting](advanced-hunting-overview.md). </li><li> See these [incident response playbooks](/security/compass/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. | | SOC manager | See how to [integrate Microsoft 365 Defender into your Security Operations Center (SOC)](integrate-microsoft-365-defender-secops.md). | |
security | Integrate Microsoft 365 Defender Secops Plan | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-plan.md | Every SOC team should test its preparedness in responding to a cyber incident. T ## Next step [Step 2. Perform a SOC integration readiness assessment using the Zero Trust Framework](integrate-microsoft-365-defender-secops-readiness.md) |
security | Integrate Microsoft 365 Defender Secops Readiness | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-readiness.md | Adoption procedures and use case creation are described in Steps 3 and 4. ## Next step [Step 3. Plan for Microsoft 365 Defender integration with your SOC catalog of services](integrate-microsoft-365-defender-secops-services.md) |
security | Integrate Microsoft 365 Defender Secops Roles | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-roles.md | The following table breaks out each SOC team's roles and responsibilities and ho ## Next step [Step 5. Develop and test use cases](integrate-microsoft-365-defender-secops-use-cases.md) |
security | Integrate Microsoft 365 Defender Secops Services | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-services.md | To integrate the capabilities of Microsoft 365 Defender, you will need to refine ## Next step [Step 4. Define Microsoft 365 Defender roles, responsibilities, and oversight](integrate-microsoft-365-defender-secops-roles.md) |
security | Integrate Microsoft 365 Defender Secops Tasks | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-tasks.md | Integrate these tasks into your current SOC processes. ## Next steps You should review the guides referred to in this content and in the [Microsoft 365 Defender library](/microsoft-365/security/defender) to determine how your own implementation of Microsoft 365 Defender should be structured and integrated. |
security | Integrate Microsoft 365 Defender Secops Use Cases | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-use-cases.md | After executing the Preparation phase, organizations should invoke the remaining ## Next step [Step 6. Identify SOC maintenance tasks](integrate-microsoft-365-defender-secops-tasks.md) |
security | Integrate Microsoft 365 Defender Secops | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops.md | Use these steps to integrate Microsoft 365 Defender into your SOC. |
security | Investigate Alerts | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-alerts.md | As needed for in-process incidents, continue your [investigation](investigate-in - [Investigate incidents](investigate-incidents.md) - [Investigate data loss prevention alerts in Defender](dlp-investigate-alerts-defender.md) - [Azure Active Directory Identity Protection](/azure/active-directory/identity-protection/overview-identity-protection)-- +- |
security | Investigate Incidents | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-incidents.md | As needed: - [Incidents overview](incidents-overview.md) - [Prioritize incidents](incident-queue.md) - [Manage incidents](manage-incidents.md) |
security | Investigate Users | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-users.md | As needed for in-process incidents, continue your [investigation](investigate-in |
security | M365d Action Center | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-action-center.md | To perform tasks, such as approving or rejecting pending actions in the Action c ## Next step - [View and manage remediation actions](m365d-autoir-actions.md) |
security | M365d Autoir Actions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir-actions.md | If you've determined that a device or a file is not a threat, you can undo remed - [View the details and results of an automated investigation](m365d-autoir-results.md) - [Address false positives or false negatives](m365d-autoir-report-false-positives-negatives.md) |
security | M365d Autoir Report False Positives Negatives | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir-report-false-positives-negatives.md | If a remediation action was taken on an entity (such as a device or an email mes - [View the details and results of an automated investigation](m365d-autoir-results.md) - [Proactively hunt for threats with advanced hunting in Microsoft 365 Defender](advanced-hunting-overview.md) |
security | M365d Autoir Results | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir-results.md | To provide more context about how investigation states show up, the following ta - [View and manage remediation actions](m365d-autoir-actions.md) - [Learn more about remediation actions](m365d-remediation-actions.md) |
security | M365d Autoir | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir.md | Using the Automated investigation & response card, your security operations team - [Configure automated investigation and response for your organization](m365d-configure-auto-investigation-response.md) - [Learn more about the Action center](m365d-action-center.md) |
security | M365d Configure Auto Investigation Response | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-configure-auto-investigation-response.md | You can choose from several options to change settings for your automated invest - [Remediation actions in Microsoft 365 Defender](m365d-remediation-actions.md) - [Visit the Action center](m365d-action-center.md) |
security | M365d Enable Faq | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable-faq.md | Get the latest publicly available experiences by turning on [preview features](p - [Deploy supported services](deploy-supported-services.md) - [Setup guides for Microsoft 365 Defender](deploy-configure-m365-defender.md) - [Turn on preview features](preview.md) |
security | M365d Enable | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable.md | Microsoft support staff can help provision or deprovision the service and relate - [Microsoft Defender for Cloud Apps overview](/cloud-app-security/what-is-cloud-app-security) - [Microsoft Defender for Identity overview](/azure-advanced-threat-protection/what-is-atp) - [Microsoft Defender for Endpoint data storage](../defender-endpoint/data-storage-privacy.md) |
security | M365d Permissions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-permissions.md | During the preview, Microsoft 365 Defender does not enforce access controls base - [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference) - [Microsoft Defender for Endpoint RBAC](/windows/security/threat-protection/microsoft-defender-atp/rbac) - [Defender for Cloud Apps roles](/cloud-app-security/manage-admins) |
security | M365d Remediation Actions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-remediation-actions.md | In addition to remediation actions that follow automated investigations, your se - [View and manage remediation actions](m365d-autoir-actions.md) - [Address false positives or false negatives](m365d-autoir-report-false-positives-negatives.md) - [Contain devices from the network](../defender-endpoint\respond-machine-alerts.md#contain-devices-from-the-network) |
security | M365d Time Zone | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-time-zone.md | To set the time zone for these features, go to **Settings** > **Microsoft 365 De > [!NOTE] > The custom time range filter in advanced hunting remains in UTC regardless of the time zone setting. |
security | Manage Incidents | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/manage-incidents.md | For resolved incidents, perform a [post-incident review](first-incident-post.md) - [Incidents overview](incidents-overview.md) - [Prioritize incidents](incident-queue.md) - [Investigate incidents](investigate-incidents.md) |
security | Manage Rbac | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/manage-rbac.md | Use the following steps as a guide to start using the Microsoft 365 Defender RBA Watch the following video to see the steps above in action: -> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RW12hyh] +> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RW12hyh] |
security | Microsoft 365 Defender Integration With Azure Sentinel | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-integration-with-azure-sentinel.md | Here's how it works. - [Overview of incidents in Microsoft 365 Defender](incidents-overview.md) - [Investigate incidents with Microsoft Sentinel](/azure/sentinel/tutorial-investigate-cases) |
security | Microsoft 365 Defender Portal | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-portal.md | Common controls and content either appear in the same place, or are condensed in :::image type="content" source="../../media/converged-add-role-9.png" alt-text="The Settings page in the Microsoft 365 Defender portal" lightbox="../../media/converged-add-role-9.png"::: -### Permissions & roles +### Permissions :::image type="content" source="../../media/converged-roles-5.png" alt-text="The Endpoints roles & groups displayed on the Permissions & roles page" lightbox="../../media/converged-roles-5.png"::: Keep exploring the features and capabilities in Microsoft 365 Defender: With this learning path from Microsoft Learn, you can understand Microsoft 365 Defender and how it can help identify, control, and remediate security threats. -|Training:|Detect and respond to cyber attacks with Microsoft 365 Defender| +|Training:|Mitigate threats using Microsoft 365 Defender| |||-||Microsoft 365 Defender unifies threat signals across endpoints, identities, email, and applications to provide integrated protection against sophisticated cyber attacks. Microsoft 365 Defender is the central experience to investigate and respond to incidents and proactively search for ongoing malicious cyber security activities.<p> 1 hr 38 min - Learning Path - 5 Modules| +||Analyze threat data across domains and rapidly remediate threats with built-in orchestration and automation in Microsoft 365 Defender. This learning path aligns with exam SC-200: Microsoft Security Operations Analyst.<p> 9 hr 31 min - Learning Path - 11 Modules| > [!div class="nextstepaction"]-> [Start >](/training/paths/defender-detect-respond/) +> [Start >](/training/paths/dsc-200-mitigate-threats-using-microsoft-365-defender/) ## See also - [What's new in Microsoft 365 Defender](whats-new.md) - [Microsoft Defender for Office 365 in Microsoft 365 Defender](microsoft-365-security-center-mdo.md) - [Microsoft Defender for Endpoint in Microsoft 365 Defender](microsoft-365-security-center-mde.md) |
security | Microsoft 365 Defender Train Security Staff | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-train-security-staff.md | One of the best ways to learn is by configuring and testing Microsoft 365 Defend ## Simulating an attack To test your security staff on their ability to detect and respond to a cyberattack, use a simulated attack. See [Simulate attacks with the Microsoft 365 Defender portal](eval-defender-investigate-respond-simulate-attack.md#simulate-attacks-with-the-microsoft-365-defender-portal) for more information. |
security | Microsoft 365 Defender | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender.md | Microsoft 365 Defender licensing requirements must be met before you can enable - [Turn on Microsoft 365 Defender](m365d-enable.md) |
security | Microsoft 365 Security Center Defender Cloud Apps | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-defender-cloud-apps.md | Learn how to protect your cloud apps in Microsoft 365 Defender: ## Related information - [Microsoft 365 Defender](microsoft-365-defender.md) |
security | Microsoft 365 Security Center Mde | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-mde.md | Logging in to multiple tenants simultaneously in the same browsing session is cu - [Microsoft 365 Defender](microsoft-365-defender.md) - [Microsoft Defender for Endpoint in Microsoft 365 Defender](microsoft-365-security-center-mde.md) - [Redirecting accounts from Microsoft Defender for Endpoint to Microsoft 365 Defender](microsoft-365-security-mde-redirection.md) |
security | Microsoft 365 Security Center Mdi | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-mdi.md | For more information, see: - [Related videos for Microsoft Defender for Identity](https://www.microsoft.com/videoplayer/embed/RE4HcEU) - [Microsoft 365 Defender](microsoft-365-defender.md) - [Microsoft Defender for Identity](/defender-for-identity/) |
security | Microsoft 365 Security Center Mdo | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-mdo.md | Also included is a link to the Security & Compliance Center for comparison. The - [Email & collaboration alerts](../../compliance/alert-policies.md#default-alert-policies) - [Custom detection rules](/microsoft-365/security/defender-endpoint/custom-detection-rules) - [Create a phishing attack simulation](../office-365-security/attack-simulation-training-simulations.md) and [create a payload for training your people](../office-365-security/attack-simulation-training-payloads.md) |
security | Microsoft 365 Security Mda Redirection | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-mda-redirection.md | Once disabled, accounts will no longer be routed to security.microsoft.com. - [About Microsoft 365 Defender](https://www.microsoft.com/microsoft-365/security/microsoft-365-defender) - [Microsoft security portals and admin centers](portals.md) - [Microsoft Defender for Cloud Apps in Microsoft 365 Defender](microsoft-365-security-center-defender-cloud-apps.md) |
security | Microsoft 365 Security Mde Redirection | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-mde-redirection.md | Once disabled, accounts will no longer be routed to security.microsoft.com, and - [`The New Defender`](https://afrait.com/blog/the-new-defender/) - [About Microsoft 365 Defender](https://www.microsoft.com/microsoft-365/security/microsoft-365-defender) - [Microsoft security portals and admin centers](portals.md) |
security | Microsoft Secure Score History Metrics Trends | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-history-metrics-trends.md | If you have any issues, let us know by posting in the [Security, Privacy & Compl - [Assess your security posture](microsoft-secure-score-improvement-actions.md) - [What's coming](microsoft-secure-score-whats-coming.md) - [What's new](microsoft-secure-score-whats-new.md) |
security | Microsoft Secure Score Improvement Actions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-improvement-actions.md | If you have any issues, let us know by posting in the [Security, Privacy & Compl - [Track your Microsoft Secure Score history and meet goals](microsoft-secure-score-history-metrics-trends.md) - [What's coming](microsoft-secure-score-whats-coming.md) - [What's new](microsoft-secure-score-whats-new.md) |
security | Microsoft Secure Score Whats New | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-whats-new.md | If you have any issues, let us know by posting in the [Security, Privacy & Compl - [Assess your security posture](microsoft-secure-score-improvement-actions.md) - [Track your Microsoft Secure Score history and meet goals](microsoft-secure-score-history-metrics-trends.md) - [What's coming](microsoft-secure-score-whats-coming.md) |
security | Microsoft Secure Score | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score.md | If you have any issues, let us know by posting in the [Security, Privacy & Compl - [Track your Microsoft Secure Score history and meet goals](microsoft-secure-score-history-metrics-trends.md) - [What's coming](microsoft-secure-score-whats-coming.md) - [What's new](microsoft-secure-score-whats-new.md) |
security | Mssp Access | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/mssp-access.md | To implement a multi-tenant delegated access solution, take the following steps: At this point, analyst access has been provisioned, and each analyst should be able to access the customer's Microsoft 365 Defender portal: `https://security.microsoft.com/?tid=<CustomerTenantId>` with the permissions and roles they were assigned. |
security | Onboarding Defender Experts For Hunting | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/onboarding-defender-experts-for-hunting.md | The option to **Ask Defender Experts** is available in several places throughout ### Next step - [Understand the Defender Experts for Hunting report in Microsoft 365 Defender](defender-experts-report.md) |
security | Opt Out Of Preview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/opt-out-of-preview.md | Last updated 11/17/2022 # Opt out of Microsoft Defender Experts for XDR preview Consult your service delivery manager (SDM) to opt out of the preview. |
security | Playbook Detecting Ransomware M365 Defender | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/playbook-detecting-ransomware-m365-defender.md | As part of your SecOps team's ongoing tool and process best practices and securi - Update the set of operational tasks for ransomware detection. |
security | Playbook Responding Ransomware M365 Defender | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/playbook-responding-ransomware-m365-defender.md | Recover deleted email. ### Step 9: Re-enable Exchange ActiveSync and OneDrive sync * After you've cleaned your computers and devices and recovered the data, you can re-enable Exchange ActiveSync and OneDrive sync that you previously disabled in step 3 of containment. |
security | Portals | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/portals.md | While these portals are not specifically for managing security, they support var | Microsoft 365 admin center | Configure Microsoft 365 services; manage roles, licenses, and track updates to your Microsoft 365 services | [admin.microsoft.com](https://go.microsoft.com/fwlink/p/?linkid=2166757) | | Microsoft Intune admin center | Use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) to manage and secure devices. Can also combine Intune and Configuration Manager capabilities. | [endpoint.microsoft.com](https://endpoint.microsoft.com/) | | Microsoft Intune portal | Use [Microsoft Intune](/intune/fundamentals/what-is-intune) to deploy device policies and monitor devices for compliance | [endpoint.microsoft.com](https://endpoint.microsoft.com/#blade/Microsoft_Intune_DeviceSettings/DevicesMenu/overview) |
security | Prerequisites | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/prerequisites.md | Currently, the Microsoft Defender for Office 365 integration into the unified Mi - [Microsoft 365 Defender overview](microsoft-365-defender.md) - [Turn on Microsoft 365 Defender](m365d-enable.md) - [Manage access and permissions](m365d-permissions.md) |
security | Preview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/preview.md | You'll know you have preview features turned on when you see that the **Turn on |
security | Secure Score Data Storage Privacy | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/secure-score-data-storage-privacy.md | By default, data is retained for 90 days based on your active licenses. ### At contract termination or expiration Your data is kept and is available to you while the license is under grace period or suspended mode. At the end of this period, data that is associated to expired or terminated license is erased from Microsoft's systems to make it unrecoverable, no later than 90 days from the associated contract termination or expiration. |
security | Session Cookie Theft Alert | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/session-cookie-theft-alert.md | Once you determine that the alert activities are malicious, classify those alert ## See also [From cookie theft to BEC](https://www.microsoft.com/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud/) |
security | Setup M365deval | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/setup-m365deval.md | This topic guides you to set up a dedicated lab environment. For information on |[Phase 3: Configure & Onboard](config-m365d-eval.md) | Configure each Microsoft 365 Defender pillar for your Microsoft 365 Defender trial lab or pilot environment and onboard your endpoints. |:-|:--| |
security | Start Using Mdex Xdr | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/start-using-mdex-xdr.md | The option to **Ask Defender Experts** is available in the incidents and alerts - [Search audit logs for actions performed by Defender Experts](auditing.md) - [Additional information](additional-information-xdr.md) - [Frequently asked questions](frequently-asked-questions.md) |
security | Streaming Api Event Hub | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/streaming-api-event-hub.md | For more information, see [Log Analytics workspace data export in Azure Monitor] - [Stream Microsoft 365 Defender events to your Azure storage account](streaming-api-storage.md) - [Azure Event Hubs documentation](/azure/event-hubs/) - [Troubleshoot connectivity issues - Azure Event Hubs](/azure/event-hubs/troubleshooting-guide) |
security | Streaming Api Storage | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/streaming-api-storage.md | For more information, see [Monitor destinations - Azure Monitor | Microsoft Docs - [Microsoft 365 Defender Streaming API](streaming-api.md) - [Stream Microsoft 365 Defender events to your Azure storage account](streaming-api-storage.md) - [Azure Storage Account documentation](/azure/storage/common/storage-account-overview) |
security | Streaming Api | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/streaming-api.md | Watch this short video to learn how to set up the streaming API to ship event in - [Overview of Advanced Hunting](../defender/advanced-hunting-overview.md) - [Azure Event Hubs documentation](/azure/event-hubs/) - [Azure Storage Account documentation](/azure/storage/common/storage-account-overview) |
security | Supported Event Types | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/supported-event-types.md | The following table only includes the list of the tables supported in the stream ## Related topics [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview) |
security | Threat Analytics Analyst Reports | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/threat-analytics-analyst-reports.md | Advanced hunting queries in the analyst reports have been vetted by Microsoft an - [Threat analytics overview](threat-analytics.md) - [Proactively find threats with advanced hunting](advanced-hunting-overview.md) - [Custom detection rules](custom-detection-rules.md) |
security | Threat Analytics | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/threat-analytics.md | When looking at the threat analytics data, remember the following factors: - [Proactively find threats with advanced hunting](advanced-hunting-overview.md) - [Understand the analyst report section](threat-analytics-analyst-reports.md) - [Assess and resolve security weaknesses and exposures](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) |
security | Tickets | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/tickets.md | Last updated 02/16/2021 > This capability is no longer available. Thank you for your feedback and continued support while we determine next steps. ServiceNow is a popular cloud computing platform that helps companies manage digital workflows for enterprise operations. Their Now platform has IT workflows, employee workflows, and customer workflows. |
security | Top Scoring Industry Tests | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/top-scoring-industry-tests.md | The capabilities within Microsoft Defender for Endpoint provide [additional laye [Learn more about Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and evaluate it in your own network by signing up for a [90-day trial](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp), or [enabling Preview features on existing tenants](/windows/security/threat-protection/microsoft-defender-atp/preview). [Learn more about Microsoft 365 Defender](https://www.microsoft.com/security/business/threat-protection/integrated-threat-protection) or [start using the service](m365d-enable.md). |
security | Troubleshoot | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/troubleshoot.md | To turn on Microsoft 365 Defender, access **Settings** from the navigation pane ## How do I create an exception for my file/URL? A false positive is a file or URL that is detected as malicious but is not a threat. You can create indicators and define exclusions to unblock and allow certain files/URLs. See [Address false positives/negatives in Defender for Endpoint](/microsoft-365/security/defender-endpoint/defender-endpoint-false-positives-negatives). |
security | Usgov | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/usgov.md | For more information, see the individual workloads US Gov pages: - [Microsoft Defender for Cloud Apps](/enterprise-mobility-security/solutions/ems-cloud-app-security-govt-service-description). - [Microsoft Defender for Identity](/enterprise-mobility-security/solutions/ems-mdi-govt-service-description). - [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/gov). |
security | Whats New | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/whats-new.md | The security operations team can view all actions pending approval, and the stip Find information about events in various cloud apps and services covered by Microsoft Defender for Cloud Apps. This table also includes information previously available in the `AppFileEvents` table. |
security | Zero Trust With Microsoft 365 Defender | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/zero-trust-with-microsoft-365-defender.md | Learn more about Zero Trust for Microsoft 365 Defender Learn more about other Microsoft 365 capabilities that contribute to a strong Zero Trust strategy and architecture with the [Zero Trust deployment plan with Microsoft 365](../Microsoft-365-zero-trust.md). Learn more about Zero Trust and how to build an enterprise-scale strategy and architecture with the [Zero Trust Guidance Center](/security/zero-trust). |
syntex | Ocr | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/ocr.md | Before you can use the optical character recognition (OCR) service in Microsoft ### Licensing -Before you can use the OCR service in Syntex, you must first enter your Azure subscription in [Syntex pay-as-you-go](syntex-azure-billing.md). OCR in Syntex is billed based on the [type and number of transactions](syntex-pay-as-you-go-services.md). +Before you can use the OCR service in Syntex, you must first link an Azure subscription in [Syntex pay-as-you-go](syntex-azure-billing.md). OCR in Syntex is billed based on the [type and number of transactions](syntex-pay-as-you-go-services.md). ### Permissions -You must have Global admin or SharePoint admin permissions to be able to access the Microsoft 365 admin center and set up the OCR service in Syntex. +You must have Global admin or SharePoint admin permissions to be able to access the Microsoft 365 admin center and set up the OCR service in Syntex. ## Set up optical character recognition |
syntex | Syntex Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/syntex-overview.md | -description: Learn about the capabilities and features in Microsoft Syntex. +description: Learn about the capabilities, services, and features in Microsoft Syntex. # Overview of Microsoft Syntex description: Learn about the capabilities and features in Microsoft Syntex. </br> -Microsoft Syntex is a content understanding, processing, and compliance service that uses intelligent document processing, content artificial intelligence (AI), and advanced machine learning to automatically and thoughtfully find, organize, and classify documents in your SharePoint libraries. +Microsoft Syntex is a content understanding, processing, and compliance service that uses intelligent document processing, content artificial intelligence (AI), and advanced machine learning to automatically and thoughtfully find, organize, and classify documents in your SharePoint libraries, Microsoft Teams, OneDrive for Business, and Exchange. With Syntex, you can automate your content-based processesΓÇöcapturing the information in your business documents and transforming that information into working knowledge for your organization. Rather than clicking and sorting through hundreds or thousands of files, Syntex extracts, analyzes, and categorizes the data for you. You can dive deeper into your content to truly understand it, and you can turn the information into meaningful insights that your organization can use to make informed business decisions. -## Scenarios and use cases +## Explore scenarios and use cases :::row:::+ :::column span=""::: +  + :::column-end::: :::column span="3"::: Syntex can help your organization automate business processes, improve search accuracy, and manage compliance risk. With content AI services and capabilities, you can build content understanding and classification directly into the content management flow. :::column-end:::- :::column span=""::: -  - :::column-end::: :::row-end::: -[Learn more about how to use Syntex to streamline processes in your organization.](adoption-scenarios.md) +[Learn more about scenarios and use case for Microsoft Syntex.](adoption-scenarios.md) ++## Syntex services -## Models +### Content assembly :::row:::- :::column span=""::: -  - :::column-end::: :::column span="3":::- Understanding your content with Syntex begins with models. Models let you identify and classify documents that are uploaded to your SharePoint document libraries, and then to extract the information you need from each file. + With Syntex, you can automatically generate standard repetitive business documents, such as contracts, statements of work, service agreements, letters of consent, and correspondence. - In Syntex, you can build [custom models](model-types-overview.md) or you can use [prebuilt models](prebuilt-overview.md). + You can do all these tasks quicker, more consistently, and with fewer errors in Syntex. + :::column-end::: + :::column span=""::: +  :::column-end::: :::row-end::: -The type of model you choose will depend on the types of files you use, the format and structure of the files, the information you want to extract, and where you want to apply the model. +You create *modern templates* based on the business documents you use most. You then use those templates to automatically generate new documents using SharePoint lists or user entries as a data source. -### Custom models +[Learn more about how to generate documents using content assembly.](content-assembly.md) -You build custom models to understand the layout of your files from example documents. The models learn to look for the data you need to extract from similar documents. Custom models include: +### Prebuilt document processing -- [Unstructured document processing](document-understanding-overview.md)-- [Freeform document processing](freeform-document-processing-overview.md)-- [Structured document processing](form-processing-overview.md)+ :::column span=""::: +  + :::column-end::: + :::column span="3"::: + Use a [prebuilt model](prebuilt-overview.md) to save time processing and extracting information from [contracts](prebuilt-model-contract.md), [invoices](prebuilt-model-invoice.md), or [receipts](prebuilt-model-receipt.md). Prebuilt models are pretrained to recognize common business documents and the structured information in the documents. + :::column-end::: -| Unstructured<br>document processing | Freeform<br>document processing | Structured<br>document processing | -| - | - | - | -|  |  |  | -| Use this custom model to automatically classify documents and extract information from them. Use the patterns of the text in example documents to train the model. Best for Office files and automatic classification of files. <br>[Learn more about unstructured models.](document-understanding-overview.md) | Use this custom model to automatically extract information from unstructured documents. Use the patterns of the text or the layout in example documents to train the model. Best for a mix of both text and layout needs. <br>[Learn more about freeform models.](freeform-document-processing-overview.md) | Use this custom model to automatically identify field and table values from structured or semi-structured documents like forms. Best for most languages and files that include form layouts or tables. <br>[Learn more about structured models.](form-processing-overview.md) | +Instead of having to create a new document processing model from scratch, you can use a prebuilt model to jumpstart your document project. -### Prebuilt models +[Learn more about prebuilt models in Microsoft Syntex.](prebuilt-overview.md) -If you don't need to build a custom model, you can use a [prebuilt model](prebuilt-overview.md). This type of model is pretrained to extract predefined entities from common business files. Prebuilt models include: +### Structured and freeform document processing -- [Contract processing](prebuilt-model-contract.md)-- [Invoice processing](prebuilt-model-invoice.md)-- [Receipt processing](prebuilt-model-receipt.md)+ :::column span=""::: +  + :::column-end::: + :::column span="3"::: + Use a [structured model](form-processing-overview.md) to automatically identify field and table values. It works best for structured or semi-structured documents, such as forms and invoices. Use a [freeform model](freeform-document-processing-overview.md) to automatically extract information from unstructured and freeform documents, such as letters and contracts where the information can appear anywhere in the document. + :::column-end::: -| Contract processing | Invoice processing | Receipt processing | -| - | - | - | -| |  |  | -| Use this prebuilt model to save time processing contracts. Automatically extract key information specific to contract documents. <br>[Learn more about contract models.](prebuilt-model-contract.md) | Use this prebuilt model to save time processing invoices. Automatically extract key information specific to invoices. <br>[Learn more about invoice models.](prebuilt-model-invoice.md) | Use this prebuilt model to save time processing receipts. Automatically extract key information specific to expenses. <br>[Learn more about receipt models.](prebuilt-model-receipt.md) | +Both structured and freeform models use Microsoft Power Apps AI Builder to create and train models within Syntex. -[Learn more about custom and prebuilt models in Microsoft Syntex.](model-types-overview.md) +Learn more about [structured models](form-processing-overview.md) and [freeform models](freeform-document-processing-overview.md) in Microsoft Syntex. -## Content assembly +### Unstructured document processing :::row::: :::column span="":::-  +  :::column-end::: :::column span="3":::- With Syntex, you can create *modern templates* based on the business documents you use most. -- You can then use those templates to automatically generate new documents using SharePoint lists or user entries as a data source. + Use an [unstructured model](document-understanding-overview.md) to automatically classify documents and extract information from them. It works best for documents that vary in composition, such as letters or contracts. This model type supports the widest range of file types. :::column-end::: :::row-end::: - This process lets you automatically generate standard repetitive business documents, such as contracts, statements of work, service agreements, letters of consent, and correspondence. You can do all these tasks quicker, more consistently, and with fewer errors in Syntex. --[Learn more about how to generate documents using content assembly.](content-assembly.md) +[Learn more about unstructured models in Microsoft Syntex.](document-understanding-overview.md) -## Content query +### Optical character recognition :::row::: :::column span="3":::- The content query feature in Syntex lets you perform specific metadata-based queries on SharePoint document libraries. -- You can make faster, more precise queries based on specific metadata column values, rather than just searching for keywords. + The optical character recognition (OCR) service in Syntex lets you extract printed or handwritten text from images. Syntex automatically scans the image files, extracts the relevant text, and makes the text from the images available for search and indexing. This lets you quickly and accurately find the keywords and phrases you're looking for. :::column-end::: :::column span="":::-  +  :::column-end::: :::row-end::: -This feature is useful when you have a specific piece of information you want to search for, such as when a document was last modified, a specific person associated with a file, or a specific file type. +[Learn more about using the OCR service in Microsoft Syntex.](ocr.md) -[Learn more about how to search for metadata in document libraries in Microsoft Syntex.](metadata-search.md) +## Other features -## Annotations +### Annotations :::row::: :::column span="":::-  +  :::column-end::: :::column span="3"::: Use the annotations feature in Syntex to add notes, comment, and collaborate with others on your content in document libraries. You can use annotations without modifying the original files, so the original records are preserved. This feature is useful when you have a specific piece of information you want to [Learn more about using annotations in Microsoft Syntex.](annotations.md) -## Optical character recognition +### Content query :::row:::- :::column span=""::: -  - :::column-end::: :::column span="3":::- The optical character recognition (OCR) service in Syntex lets you extract printed or handwritten text from images. Syntex automatically scans the image files, extracts the relevant text, and makes the text from the images available for search and indexing. This lets you quickly and accurately find the keywords and phrases you're looking for. + The content query feature in Syntex lets you perform specific metadata-based queries on SharePoint document libraries. ++ You can make faster, more precise queries based on specific metadata column values, rather than just searching for keywords. + :::column-end::: + :::column span=""::: +  :::column-end::: :::row-end::: -[Learn more about using the OCR service in Microsoft Syntex.](ocr.md) +This feature is useful when you have a specific piece of information you want to search for, such as when a document was last modified, a specific person associated with a file, or a specific file type. -## Content compliance +[Learn more about how to search for metadata in document libraries in Microsoft Syntex.](metadata-search.md) ++### Content compliance :::row:::- :::column span="3"::: - Understanding your content allows for better compliance control and increases management and governance options for all your data. When content is properly tagged and labeled, you have better control over your data and can follow regulations more easily. Syntex helps you ensure compliance by using retention labels and sensitivity labels to manage your documents. - :::column-end::: :::column span="":::-  +  + :::column-end::: + :::column span="3"::: + Understanding your content allows for better compliance control and increases management and governance options for all your data. When content is properly tagged and labeled, you have better control over your data and can follow regulations more easily. Syntex helps you ensure compliance by using retention labels and sensitivity labels to manage your documents. :::column-end::: :::row-end::: Learn more about how to apply [retention labels](apply-a-retention-label-to-a-model.md) and [sensitivity labels](apply-a-sensitivity-label-to-a-model.md) to models in Microsoft Syntex. -## Content processing +### Content processing :::row:::- :::column span=""::: -  - :::column-end::: :::column span="3":::- Syntex lets you build simple rules-driven actions in document libraries based on metadata. From a document library, you can create rules to automate tasks such as sending a notification when metadata changes in a file, when a new file is created in the library, or when files are moved or copied based on metadata extracted by Syntex models. + Syntex lets you build simple rules-driven actions in document libraries based on metadata. From a document library, you can create rules to automate tasks such as sending a notification when metadata changes in a file, when a new file is created in the library, or when files are moved or copied based on metadata extracted by Syntex models. + :::column-end::: + :::column span=""::: +  :::column-end::: :::row-end::: [Learn more about content processing rules in Microsoft Syntex.](content-processing-overview.md) -## Premium taxonomy services +### Premium taxonomy services :::row::: :::column span=""::: Learn more about how to apply [retention labels](apply-a-retention-label-to-a-mo - [Pushing enterprise content types to a hub site](push-content-type-to-hub.md), which also adds them to the associated sites and any newly created lists or libraries. -- [Term store reports](term-store-analytics.md), which provides you insights into published term sets and their use across your organization.+- [Term store reports](term-store-analytics.md), which provides you with insights into published term sets and their use across your organization. <!<br><br> > [!div class="nextstepaction"] |
syntex | Unstructured Setup | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/unstructured-setup.md | Before you can use unstructured document processing in Microsoft Syntex, it must ### Licensing -Before you can use unstructured document processing in Syntex, you must first enter your Azure subscription in [Syntex pay-as-you-go](syntex-azure-billing.md). Unstructured document processing in Syntex is billed based on the [type and number of transactions](syntex-pay-as-you-go-services.md). +Before you can use unstructured document processing in Syntex, you must first link an Azure subscription in [Syntex pay-as-you-go](syntex-azure-billing.md). Unstructured document processing in Syntex is billed based on the [type and number of transactions](syntex-pay-as-you-go-services.md). ### Permissions You must have Global admin or SharePoint admin permissions to be able to access ## Set up unstructured document processing -After an Azure subscription is linked to Microsoft Syntex, unstructured document processing will be automatically set up and enabled for all SharePoint sites. +After an [Azure subscription is linked to Microsoft Syntex](syntex-azure-billing.md), unstructured document processing will be automatically set up and enabled for all SharePoint sites. ## Manage sites |