Updates from: 07/20/2022 01:21:46
Category Microsoft Docs article Related commit history on GitHub Change details
business-premium Index https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/index.md
ms.audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 - M365-Campaigns - m365solution-overview
description: "Learn how to implement cybersecurity for small or medium sized bus
# Microsoft 365 Business Premium — cybersecurity for small business
-Let us begin by saying that you made a wise choice in adopting Microsoft 365 Business Premium and its world class productivity tools. Designed with cybersecurity in mind, Microsoft 365 Business Premium safeguard's your data, devices and information. You are your organization's first and best defense against hackers and cyberattackers, including random individuals, organized crime, or highly-sophisticated nation states.
+Let us begin by saying that you made a wise choice in adopting Microsoft 365 Business Premium and its world class productivity tools. Designed with cybersecurity in mind, Microsoft 365 Business Premium safeguards your data, devices and information. You are your organization's first and best defense against hackers and cyberattackers, including random individuals, organized crime, or highly-sophisticated nation states.
The task before you is thisΓÇölet Microsoft 365 Business Premium help secure your organizationΓÇÖs future! Approach this task by taking on the following missions which will help you fortify your environment, train your team, and safeguard managed devices. The missions are organized as follows:
business-premium M365 Campaigns Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365-campaigns-setup.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
business-premium M365bp Add Autopilot Devices And Profile https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-add-autopilot-devices-and-profile.md
audience: Admin
-- M365-subscription-management -- M365-identity-device-management-- Adm_TOC ms.localizationpriority: high Last updated : 07/19/2022 -- Core_O365Admin_Migration - MiniMaven-- MSB365 - OKR_SMB_M365-- seo-marvel-mar-- AdminSurgePortfolio-- AdminTemplateSet search.appverid: - BCS160 - MET150 - MOE150 description: "Learn how to use Windows Autopilot to set up new Windows 10 devices for your business so they're ready for employee use."
business-premium M365bp Add Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-add-users.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- M365-subscription-management-- M365-identity-device-management -- Adm_TOC -- Core_O365Admin_Migration - MiniMaven-- MSB365 - OKR_SMB_M365-- seo-marvel-mar-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 description: "How to add a new employee or user to your organization's network and internal systems. When a new employee joins your company, you must securely add them to the network."
business-premium M365bp App Protection Settings For Android And Ios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-app-protection-settings-for-android-and-ios.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management -- M365-identity-device-management-- Adm_TOC -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 - OKR_SMB_M365-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 description: "Learn how to create, edit, or delete an app management policy, and protect work files on Android or iOS devices."
business-premium M365bp Autopilot Profile Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-autopilot-profile-settings.md
f1.keywords:
- 'BCS365_ZTDProfileSettings' ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management -- M365-identity-device-management-- Adm_TOC -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 - OKR_SMB_M365-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 - MOE150 description: "Autopilot profiles help you control how Windows gets installed on user devices. The profiles contain default and optional settings like skip Cortana installation."
business-premium M365bp Avoid Phishing And Attacks https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-avoid-phishing-and-attacks.md
ms.audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management -- M365-identity-device-management - M365-Campaigns - m365solution-smb -- Adm_O365 - MiniMaven - MSB365 search.appverid:
business-premium M365bp Collaborate Share Securely https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-collaborate-share-securely.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365-- Core_O365Admin_Migration - MiniMaven - MSB365 search.appverid:
business-premium M365bp Conditional Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-conditional-access.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management -- M365-identity-device-management - M365-Campaigns - m365solution-smb -- Adm_O365 - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
For more information about security defaults and the policies they enforce, see
This article provides information about: -- [Security defaults](#security-defaults) (suitable for most businesses)-- [Conditional Access](#conditional-access) (for businesses with more stringent security requirements)
+- **[Security defaults](#security-defaults)** (suitable for most businesses)
+- **[Conditional Access](#conditional-access)** (for businesses with more stringent security requirements)
> [!NOTE] > If you've been using Conditional Access policies, you'll need to turn them off before using security defaults. You can use either security defaults or Conditional Access policies, but you can't use both at the same time.
business-premium M365bp Create And Edit Autopilot Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-create-and-edit-autopilot-devices.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management -- M365-identity-device-management-- Adm_TOC -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 - OKR_SMB_M365-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 - MOE150 description: "Learn how to upload devices using Autopilot in Microsoft 365 Business Premium. You can assign a profile to a device or a group of devices."
business-premium M365bp Device Groups Mdb https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-device-groups-mdb.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 f1.keywords: NOCSH
business-premium M365bp Device States https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-device-states.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management -- M365-identity-device-management-- Adm_TOC -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365-- seo-marvel-mar-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 - MOE150 description: "Learn about the various device states in the Device actions list in Admin home in Microsoft 365 for business."
business-premium M365bp Devices Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-devices-overview.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150 description: "An overview of how to set up all the bring-your-own devices (BYOD) with protection against cyberattacks and other malicious threats and vulnerabilities."
business-premium M365bp Increase Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-increase-protection.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365 - MiniMaven-- MSB365-- admindeeplinkMAC-- admindeeplinkEXCHANGE-- admindeeplinkSPO search.appverid: - BCS160 - MET150
In this objective, you increase your threat protection with Microsoft 365 Busine
- [Custom security policies](#create-custom-security-policies) that you can define to suit your business needs. - [How to adjust your sharing settings for SharePoint and OneDrive files and folders](#set-sharing-settings-for-sharepoint-and-onedrive-files-and-folders). - [Alert policies](#review-your-alert-policies) that monitor specific files and how they are used.
+- [Next steps](#next-steps) (such as securing unmanaged devices)
## Review and apply preset security policies
business-premium M365bp Install Office Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-install-office-apps.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management -- M365-identity-device-management - M365-Campaigns - m365solution-smb -- Adm_O365 - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
For all members of the organization, the Microsoft Office apps can be found on t
Have them perform the following:
-1. Go to office.com. You might need to sign in with your work account.
+1. Go to [https://office.com](https://office.com), and sign in using your work account.
2. Select **Install Office** > **Microsoft 365 apps** > **Run** , and then select **Yes**.
-3. The Office apps are installed. The process may take several minutes. When it completes, select **Close**.
-4. To install Microsoft Teams, go to the office.com page, and choose **Teams**.
+3. The Office apps are installed. The process might take several minutes. When it completes, select **Close**.
+4. To install Microsoft Teams, go to the [office.com page](https://office.com), and then choose **Teams**.
5. Get the Windows app, and then select **Run**. Teams displays a prompt when installation is complete. ## Set up mobile devices for Microsoft 365 Business Premium users
business-premium M365bp Intune Admin Roles In The Mac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-intune-admin-roles-in-the-mac.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- M365-subscription-management-- Adm_O365- -- AdminSurgePortfolio-- AdminTemplateSet-- admindeeplinkMAC description: "The Microsoft 365 admin center lets you manage some Microsoft Intune roles, which map to business functions and give permissions to do specific tasks."
business-premium M365bp Maintain Environment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-maintain-environment.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
business-premium M365bp Manage Windows Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-manage-windows-devices.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- M365-subscription-management -- M365-identity-device-management-- Adm_TOC -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365-- OKR_SMB_M365-- seo-marvel-mar-- AdminSurgePortfolio-- AdminTemplateSet search.appverid: - BCS160 - MET150
business-premium M365bp Managed Devices Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-managed-devices-setup.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
business-premium M365bp Map Protection Features To Intune Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-map-protection-features-to-intune-settings.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management -- M365-identity-device-management-- Adm_TOC -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365-- OKR_SMB_M365-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 description: "Learn how protection features in Microsoft 365 Business Premium map to Intune settings. The subscription provides you with a license to modify Intune settings."
business-premium M365bp Ms Partner https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-ms-partner.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 f1.keywords: NOCSH
If you'd prefer to have a Microsoft partner help you get and set up Microsoft 36
## See also - [Set up self-service passwords](../admin/add-users/let-users-reset-passwords.md)- - [Set up self-service group management](/azure/active-directory/enterprise-users/groups-self-service-management) ## Next objectives
business-premium M365bp Multifactor Authentication https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-multifactor-authentication.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management -- M365-identity-device-management - M365-Campaigns - m365solution-smb -- Adm_O365 - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
business-premium M365bp Onboard Devices Mdb https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-onboard-devices-mdb.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 f1.keywords: NOCSH
See [Device enrollment in Microsoft Intune](/mem/intune/enrollment/device-enroll
## What about servers?
-Servers are not supported by default in Microsoft 365 Business Premium and Defender for Business. However, the ability to onboard a server, such as an endpoint running Windows Server or Linux Server, is now in preview. Make sure to review the requirements before onboarding a server:
+By default, servers are not supported in Microsoft 365 Business Premium and the standalone version of Defender for Business. However, **the ability to onboard a server, such as an endpoint running Windows Server or Linux Server, is now in preview**!
-- You have a server license for each server instance in either Microsoft 365 Business Premium or Defender for Business (standalone).-- The **Preview features** setting is turned on. In the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Preview features**.-- The enforcement scope for Windows Server is turned on. Go to **Settings** > **Endpoints** > **Configuration management** > **Enforcement scope**. Select **Use MDE to enforce security configuration settings from MEM**, select **Windows Server**, and then select **Save**.-
-See the **servers** tab in [Onboard devices to Microsoft Defender for Business](../security/defender-business/mdb-onboard-devices.md) for detailed instructions.
+See [How to get Microsoft Defender for Business servers (preview)](../security/defender-business/get-defender-business-servers.md).
## Run a detection test on a Windows device
business-premium M365bp Prepare For Office Client Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-prepare-for-office-client-deployment.md
audience: Admin
ms.localizationpriority: high- Last updated : 07/19/2022 -- Core_O365Admin_Migration - MiniMaven-- MSB365-- OKR_SMB_M365-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 ROBOTS: NO INDEX, NO FOLLOW description: "Learn how to automatically install the 32-bit Office apps on Windows computers and keep them updated in Microsoft 365 Business Premium."
business-premium M365bp Protect Admin Accounts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-admin-accounts.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365 - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
business-premium M365bp Protect Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-devices.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
business-premium M365bp Protect Email Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-email-overview.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150 description: "An overview on how to train your team to protect your email from malware, phishing, and other malicious cyberattacks, using the cybersecurity tools included with Microsoft 365 Business Premium."
business-premium M365bp Protect Pcs Macs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-pcs-macs.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management -- M365-identity-device-management - M365-Campaigns - m365solution-smb -- Adm_O365 - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
description: "Protect unmanaged or bring-your-own devices (BYOD) from cyberattac
This objective is focused on creating protection for any unmanaged Windows 10 PCs and Macs not enrolled in Microsoft Intune. It is very likely your small business or campaign may have staff who bring their own devices (BYOD), and these devices are not managed. BYOD include personally-owned phones, tablets, and PCs.
->[!NOTE]
->BYOD users must each install and run the Company Portal app to enroll these devices and receive access to company resources.
+> [!NOTE]
+> BYOD users must each install and run the Company Portal app to enroll these devices and receive access to company resources.
It's critical that you ensure your frontline users follow these guidelines so that minimum security capabilities are configured on all the BYOD devices.
Use firewall settings to protect your Mac from unwanted contact initiated by oth
## Next mission
-Okay, mission complete! Now, let's work on [securing the email system](m365bp-protect-email-overview.md) against phishing and other attacks.
+Okay, mission complete! Now, let's work on [securing email usage](m365bp-protect-email-overview.md) against phishing and other attacks.
business-premium M365bp Protection Settings For Windows 10 Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protection-settings-for-windows-10-devices.md
f1.keywords:
- 'BCS365_Win10AppPolicy' ms.localizationpriority: high Last updated : 07/19/2022 -- M365-subscription-management-- M365-identity-device-management-- Adm_TOC -- Core_O365Admin_Migration - MiniMaven-- MSB365-- OKR_SMB_M365-- seo-marvel-mar-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 - MOE150 description: "Learn how to create or edit app management policies and protect work files on your users' personal Windows devices."
business-premium M365bp Remove Company Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-remove-company-data.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- M365-subscription-management-- M365-identity-device-management -- Adm_TOC -- Core_O365Admin_Migration - MiniMaven-- MSB365-- OKR_SMB_M365-- seo-marvel-mar-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 description: "Discover how to use Microsoft 365 for business to remove company data that your users have on their devices or Windows PCs."
business-premium M365bp Reset Devices To Factory Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-reset-devices-to-factory-settings.md
audience: Admin
ms.localizationpriority: high--- M365-subscription-management-- M365-identity-device-management -- Adm_TOC Last updated : 07/19/2022 -- Core_O365Admin_Migration - MiniMaven-- MSB365-- OKR_SMB_M365-- seo-marvel-mar-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 description: "Learn how to use Microsoft 365 Business Premium to factory reset Windows devices you manage, reverting them to their original settings at purchase."
business-premium M365bp Reset Passwords https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-reset-passwords.md
audience: Admin
ms.localizationpriority: medium--- M365-subscription-management-- Adm_O365-- Adm_TOC Last updated : 07/19/2022 search.appverid: - BCS160 - MET150
business-premium M365bp Review Remediation Actions Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-review-remediation-actions-devices.md
audience: Admin
ms.localizationpriority: high- Last updated : 07/19/2022+ f1.keywords: NOCSH - SMB
business-premium M365bp Review Threats Take Action https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-review-threats-take-action.md
audience: Admin
ms.localizationpriority: medium Last updated : 07/19/2022 - M365-subscription-management - Adm_O365
business-premium M365bp Secure Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-secure-users.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 - M365-Campaigns - m365solution-smb -- Adm_O365 - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
business-premium M365bp Secure Windows Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-secure-windows-devices.md
f1_keywords:
- 'O365E_BCSSetup4WindowsConfig' ms.localizationpriority: high--- M365-subscription-management-- M365-identity-device-management Last updated : 07/19/2022 -- Core_O365Admin_Migration - MiniMaven-- MSB365-- OKR_SMB_M365-- seo-marvel-mar-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 - MOE150
-ROBOTS: NO INDEX, NO FOLLOW
description: "Learn about configuring the settings of the default device policy that any Windows device will receive upon signing in to their work or school account."
business-premium M365bp Security Incident Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-security-incident-management.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
business-premium M365bp Security Incident Quick Start https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-security-incident-quick-start.md
audience: Admin
ms.localizationpriority: high--- M365-subscription-management-- M365-identity-device-management -- Adm_TOC Last updated : 07/19/2022+
+- m365solution-smb
-- Core_O365Admin_Migration - MiniMaven-- MSB365-- OKR_SMB_M365-- seo-marvel-mar-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 description: "A set of suggestions for what to focus your efforts upon in the Defender portal when it comes to daily, weekly or monthly operations. "
business-premium M365bp Security Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-security-overview.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
business-premium M365bp Set Up Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-set-up-compliance.md
audience: Admin
ms.localizationpriority: high--- M365-subscription-management-- M365-identity-device-management -- Adm_TOC Last updated : 07/19/2022 - MiniMaven-- MSB365-- OKR_SMB_M365-- seo-marvel-mar-- AdminSurgePortfolio search.appverid: - BCS160 - MET150
business-premium M365bp Setup Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-setup-overview.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150 description: "Setup overview for small to medium-sized businesses and campaigns. How to set up cybersecurity and prevent cyberattacks."
business-premium M365bp Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-setup.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 f1.keywords: NOCSH
business-premium M365bp Threats Detected Defender Av https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-threats-detected-defender-av.md
audience: Admin
ms.localizationpriority: medium--- M365-subscription-management -- Adm_O365-- Adm_TOC- Last updated : 07/19/2022 search.appverid: MET150 description: "Learn how Microsoft Defender Antivirus protects your Windows devices from software threats, such as viruses, malware, and spyware."
business-premium M365bp Trial Playbook Microsoft Business Premium https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-trial-playbook-microsoft-business-premium.md
audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 ms.prod: m365-security search.appverid: - MOE150
business-premium M365bp Upgrade Windows 10 Pro https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-upgrade-windows-10-pro.md
audience: Admin
localization_priority: Normal--- SMB Last updated : 07/19/2022 search.appverid: - MET150 - MOE150
business-premium M365bp Validate Settings On Android Or Ios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-validate-settings-on-android-or-ios.md
audience: Admin
ms.localizationpriority: medium--- M365-subscription-management-- M365-identity-device-management-- Adm_TOC Last updated : 07/19/2022 -- Adm_O365-- Core_O365Admin_Migration - MSB365-- OKR_SMB_M365-- AdminSurgePortfolio search.appverid: - BCS160 - MET150 description: "Learn how to validate the Microsoft 365 Business Premium app protection settings on your Android or iOS devices. Making security settings for your applications is critical in order to protect the files on your mobile apps and devices from any kind of security threats."
business-premium Send Encrypted Email https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/send-encrypted-email.md
ms.audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management - M365-Campaigns - m365solution-smb -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365-- admindeeplinkEXCHANGE search.appverid: - BCS160 - MET150 description: "Learn how to send encrypted email using Outlook."
business-premium Set Up Meetings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/set-up-meetings.md
ms.audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 -- Adm_O365-- M365-subscription-management -- M365-identity-device-management - M365-Campaigns - m365solution-smb -- Adm_O365-- Core_O365Admin_Migration - MiniMaven-- MSB365 search.appverid: - BCS160 - MET150
business-premium Share Files And Videos https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/share-files-and-videos.md
ms.audience: Admin
ms.localizationpriority: high Last updated : 07/19/2022 - M365-Campaigns - m365solution-smb
Another thing to pay attention to is ensuring all members of the organization co
With files in Microsoft Teams and SharePoint, files can also be worked on and reviewed together, even tracking changes as needed. In Teams, files are shared inside of a firm, practice, or campaign. If you need to share them externally with people outside your organization, you can add them as guests to a team or send them a secure SharePoint link.
-You can also use Microsoft Stream to store and share videos internally. These videos are not viewable to the public so they are ideal for internal company or campaign messaging.
- ## Best practices Ensure your users use these methods to share files and videos securely:
commerce Add Storage Space https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/add-storage-space.md
f1.keywords:
-+ audience: Admin
compliance Compliance Manager Templates List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-templates-list.md
The templates listed below may be purchased by your organization.
- Victorian Protective Data Security Standards V2.0 (VPDSS 2.0) - Information Management Standard for Australian Government - National Archives of Australia (NAA) - China - Personal Information Security Specification -- Cybersecurity Law of the People's Republic of China
+- Cybersecurity Law of the People's Republic of China
+- Hong Kong - Code of Banking Practice and Payment Card
- Hong Kong - Personal Data (Privacy) Ordinance - India Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules - India - Information Technology Act
compliance Compliance Manager Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-manager-whats-new.md
description: "Find out whatΓÇÖs new in Compliance Manger and whatΓÇÖs to come. R
**In this article:** Learn about recent updates in Compliance Manager.
+## July 2022
+
+Compliance Manager has published the following new assessment template:
+
+- Hong Kong - Code of Banking Practice and Payment Card
+
+View our [full list of assessment templates](compliance-manager-templates-list.md).
++ ## May 2022 Compliance Manager has published the following new assessment templates:
compliance Dlp Configure Endpoint Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-configure-endpoint-settings.md
For example:
| ***.CONTOSO.COM** |**Matches the specified domain name, any subdomain, and any site**: <p>*://contoso.com <p>*://contoso.com/anysubsite <p>*://contoso.com/anysubsite1/anysubsite2 <p>*://anysubdomain.contoso.com/ <p>*://anysubdomain.contoso.com/anysubsite/ <p>*://anysubdomain1.anysubdomain2.contoso.com/anysubsite/ <p>*://anysubdomain1.anysubdomain2.contoso.com/anysubsite1/anysubsite2 (etc) <p>**Does not match unspecified domains** <p>*://anysubdomain.contoso.com.AU/ | | **`www.contoso.com`** |**Matches the specified domain name**: <p>`www.contoso.com` <p>**Does not match unspecified domains or subdomains** <p>*://anysubdomain.contoso.com/, in this case, you have to put the FQDN domain name itself `www.contoso.com`|
+#### Sensitive service domains (preview)
+
+When you list a website in Sensitive services domains you can audit, block with override, or block users when they attempt to:
+
+- print from a website
+- copy data from a website
+- save a website as local files
+
+Each website must be listed in a website group and the user must be accessing the website through Microsoft Edge. Sensitive service domains (preview) is used in conjunction with a DLP policy for Devices. See, [Scenario 6 Monitor or restrict user activities on sensitive service domains (preview)](endpoint-dlp-using.md#scenario-6-monitor-or-restrict-user-activities-on-sensitive-service-domains-preview) for more information.
++ ### Additional settings for endpoint DLP #### Business justification in policy tips
compliance Dlp Learn About Dlp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-learn-about-dlp.md
A DLP implementation typically follows these major phases.
- [Deploy your policies in production](#deploy-your-policies-in-production)
-<!--ADD DIAGRAM OF THE DLP LIFECYCLE WORK ON WITH MAS-->
- ### Plan for DLP DLP monitoring and protection are native to the applications that users use every day. This helps to protect your organizations' sensitive items from risky activities even if your users are unaccustomed to data loss prevention thinking and practices. If your organization and your users are new to data loss prevention practices, the adoption of DLP may require a change to your business processes and there will be a culture shift for your users. But, with proper planning, testing and tuning, your DLP policies will protect your sensitive items while minimizing any potential business process disruptions.
compliance Dlp Policy Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md
The available context options change depending on which location you choose. If
##### Conditions Devices supports - Content contains
+- (preview) The user accessed a sensitive website from Edge. See, [Scenario 6 Monitor or restrict user activities on sensitive service domains (preview)](endpoint-dlp-using.md#scenario-6-monitor-or-restrict-user-activities-on-sensitive-service-domains-preview) for more information.
+- File extension is
+- File type is
- See, [Endpoint activities you can monitor and take action on](endpoint-dlp-learn-about.md#endpoint-activities-you-can-monitor-and-take-action-on) ##### Conditions Microsoft Defender for Cloud Apps supports
The actions that are available in a rule are dependent on the locations that hav
#### Devices actions
+<!-
+- (preview) Audit or restricted activities when users acceses sensitive websites in Microsoft Edge browser on Windows devices. See, [Scenario 6 Monitor or restrict user activities on sensitive service domains (preview)](endpoint-dlp-using.md#scenario-6-monitor-or-restrict-user-activities-on-sensitive-service-domains-preview) for more information.
- Audit or restrict activities on Windows devices
-To use these settings, you have to configure options in **DLP settings** and in the policy in which you want to use them. See, [Restricted apps and app groups](dlp-configure-endpoint-settings.md#restricted-apps-and-app-groups) for more information.
+To use `Audit or restrict activities on Windows devices`, you have to configure options in **DLP settings** and in the policy in which you want to use them. See, [Restricted apps and app groups](dlp-configure-endpoint-settings.md#restricted-apps-and-app-groups) for more information.
The devices location provides many subactivities (conditions) and actions. To learn more, see [Endpoint activities you can monitor and take action on](endpoint-dlp-learn-about.md#endpoint-activities-you-can-monitor-and-take-action-on).
compliance Endpoint Dlp Using https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/endpoint-dlp-using.md
These scenarios require that you already have devices onboarded and reporting in
In this scenario, synchronizing files with the **Highly Confidential** sensitivity label to OneDrive is blocked. This is a complex scenario with multiple components and procedures. You will need: - An AAD user account to target and an onboarded Windows 10 computer that is already synchronizing a local OneDrive folder with OneDrive cloud storage.-- Microsoft Word installed on the target Windows 10 computer - Sensitivity labels configured and publishedΓÇösee [Get started with sensitivity labels](get-started-with-sensitivity-labels.md#get-started-with-sensitivity-labels) and [Create and configure sensitivity labels and their policies](create-sensitivity-labels.md#create-and-configure-sensitivity-labels-and-their-policies). There are three procedures.
There are three procedures.
## Scenario 5: Restrict unintentional sharing to unallowed cloud apps and services
-With Endpoint DLP and Edge Web browser, you can restrict unintentional sharing of sensitive items to unallowed cloud apps and services. Edge understands when an item is restricted by an Endpoint DLP policy and enforces access restrictions.
+With Endpoint DLP and Microisoft Edge Web browser, you can restrict unintentional sharing of sensitive items to unallowed cloud apps and services. Edge understands when an item is restricted by an Endpoint DLP policy and enforces access restrictions.
When you select **Devices** as a location in a properly configured DLP policy and use the Microsoft Edge browser, the unallowed browsers that you've defined in these settings will be prevented from accessing the sensitive items that match your DLP policy controls. Instead, users will be redirected to use Microsoft Edge which, with its understanding of DLP imposed restrictions, can block or restrict activities when the conditions in the DLP policy are met.
To use this restriction, youΓÇÖll need to configure three important pieces:
You can continue to add new services, apps, and policies to extend and augment your restrictions to meet your business needs and protect sensitive data. This configuration will help ensure your data remains safe while also avoiding unnecessary restrictions that prevent or restrict users from accessing and sharing non-sensitive items.+
+## Scenario 6 Monitor or restrict user activities on sensitive service domains (preview)
+
+Use this scenario when you want to audit, block with override, or block these user activities on a website.
+
+- print from a website
+- copy data from a website
+- save a website as local files
+
+The user must be accessing the website through Microsoft Edge.
+
+### Supported syntax for designating websites in a website group
+
+You can use a flexible syntax to include and exclude domains, subdomains, websites, and subsites in your website groups.
+
+- use `*` as a wildcard to specify all domains or all subdomains
+- use `/` as a terminator at the end of a URL to scope to that specific site only.
+
+When you add a URL without a terminating `/`, that URL is scoped to that site and all subsites.
+
+This syntax applies to all http/https websites.
+
+Here are some examples:
++
+|URL that you add to the website group |URL will match | URL will not match|
+||||
+|contoso.com | //<!--nourl-->contoso.com </br> //<!--nourl-->contoso.com/ </br> //<!--nourl-->contoso.com/allsubsites1 </br> //<!--nourl-->contoso.com/allsubsites1/allsubsites2| //<!--nourl-->allsubdomains.contoso.com </br> //<!--nourl-->allsubdomains.contoso.com.au |
+|contoso.com/ |//<!--nourl-->contoso.com </br> //<!--nourl-->contoso.com/ |//<!--nourl-->contoso.com/allsubsites1 </br> //<!--nourl-->contoso.com/allsubsites1/allsubsites2 </br> //<!--nourl-->allsubdomains.contoso.com </br> //<!--nourl-->allsubdomains.contoso.com/au |
+|*.contoso.com | //<!--nourl-->contoso.com </br> //<!--nourl-->contoso.com/allsubsites </br> //<!--nourl-->contoso.com/allsubsites1/allsubsites2 </br> //<!--nourl-->allsubdomains.contoso.com </br> //<!--nourl-->allsubdomains.contoso.com/allsubsites </br> //<!--nourl-->allsubdomains1/allsubdomains2/contoso.com/allsubsites1/allsubsites2 | //<!--nourl-->allsubdomains.contoso.com.au|
+|*.contoso.com/xyz |//<!--nourl-->contoso.com </br> //<!--nourl-->contoso.com/xyz </br> //<!--nourl-->contoso.con/xyz/allsubsites/ </br> //<!--nourl-->allsubdomains.contoso.com/xyz </br> //<!--nourl-->allsubdomains.contoso.com/xyz/allsubsites </br> //<!--nourl-->allsubdomains1.allsubdomains2.contoso.com/xyz/allsubsites </br> //<!--nourl-->allsubdomains1.allsubdomains2.contoso.com/xyz/allsubsites1/allsubsites2 | //<!--nourl-->contoso.com/xyz </br> //<!--nourl-->allsubdomains.contoso.com/xyz/|
+|*.contoso.com/xyz/ |//<!--nourl-->contoso.com/xyz </br> //<!--nourl-->allsubdomains.contoso.com/xyz |//<!--nourl-->contoso.com </br> //<!--nourl-->contoso.com/xyz/allsubsites/ </br> //<!--nourl-->allsubdomains.contoso.com/xyz/allsubsites/ </br> //<!--nourl-->allsubdomains1.allsubdomains2.contoso.com/xyz/allsubsites/ </br> //<!--nourl-->allsubdomains1.allsubdomains2.contoso.com/xyz/allsubsites1/allsubsites2|
++
+### Configure Sensitive service domains
+
+1. In the Microsoft Purview compliance portal open **Data loss prevention** > **Endpoint DLP settings** > **Browser and domain restrictions to sensitive data** > **Sensitive service domains**.
+1. Select **Add a new group of sensitive service domains**.
+1. Name the group.
+1. Select the **Match type** you want. You can select from **URL**, **IP address**, **IP address range**.
+1. Type in the appropriate value in the **Add new service domains to this group**. You can add multiple websites to a group and use wildcards to cover subdomains. For example, www.contoso.com for just the top level website or *.contoso.com for corp.contoso.com, hr.contoso.com, fin.contoso.com
+1. Select **Save**.
+1. Select **Policies**.
+1. Create and scope a policy that is applied only to **Devices**. See, [Create, test, and tune a DLP policy](create-test-tune-dlp-policy.md) for more information on how to create a policy.
+1. Create a rule that uses the **the user accessed a sensitive site from Edge**, and the action **Audit or restrict activities when users access sensitive sites in Microsoft Edge browser on Windows devices**.
+1. In the action select **Add or remove Sensitive site groups**.
+1. Select the **Sensitive site groups** you want.
+1. Select **Add**.
+1. Select the user activities you want to monitor or restrict and the actions you DLP to take in response to those activities.
+1. Finish configuring the rule and policy and apply it.
++ ## See also - [Learn about Endpoint data loss prevention](endpoint-dlp-learn-about.md)
compliance Sensitivity Labels Teams Groups Sites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-teams-groups-sites.md
description: "Use sensitivity labels to protect content in SharePoint and Micros
>*[Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).*
-In addition to using [sensitivity labels](sensitivity-labels.md) to classify and protect documents and emails, you can also use sensitivity labels to protect content in the following containers: Microsoft Teams sites, Microsoft 365 groups ([formerly Office 365 groups](https://techcommunity.microsoft.com/t5/microsoft-365-blog/office-365-groups-will-become-microsoft-365-groups/ba-p/1303601)), and SharePoint sites. For this container-level classification and protection, use the following label settings:
+In addition to using [sensitivity labels](sensitivity-labels.md) to protect documents and emails, you can also use sensitivity labels to protect content in the following containers: Microsoft Teams sites, Microsoft 365 groups ([formerly Office 365 groups](https://techcommunity.microsoft.com/t5/microsoft-365-blog/office-365-groups-will-become-microsoft-365-groups/ba-p/1303601)), and SharePoint sites. For this container-level protection, use the following label settings:
- Privacy (public or private) of teams sites and Microsoft 365 groups - External user access
In addition to using [sensitivity labels](sensitivity-labels.md) to classify and
> [!IMPORTANT] > The settings for unmanaged devices and authentication contexts work in conjunction with Azure Active Directory Conditional Access. You must configure this dependent feature if you want to use a sensitivity label for these settings. Additional information is included in the instructions that follow.
-When you apply this sensitivity label to a supported container, the label automatically applies the classification and configured protection settings to the site or group.
+When you apply this sensitivity label to a supported container, the label automatically applies the sensitivity category and configured protection settings to the site or group.
-Content in these containers however, do not inherit the labels for the classification or settings for files and emails, such as visual markings and encryption. So that users can label their documents in SharePoint sites or team sites, make sure you've [enabled sensitivity labels for Office files in SharePoint and OneDrive](sensitivity-labels-sharepoint-onedrive-files.md).
+Content in these containers however, do not inherit the labels for the sensitivity category or settings for files and emails, such as content markings and encryption. So that users can label their documents in SharePoint sites or team sites, make sure you've [enabled sensitivity labels for Office files in SharePoint and OneDrive](sensitivity-labels-sharepoint-onedrive-files.md).
+
+Container labels don't support displaying [other languages](create-sensitivity-labels.md#additional-label-settings-with-security--compliance-powershell) and display the original language only for the label name and description.
## Using sensitivity labels for Microsoft Teams, Microsoft 365 groups, and SharePoint sites
security TOC https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/TOC.md
###### [Troubleshoot RHEL 6 installation issues](linux-support-rhel.md) ###### [Troubleshoot performance issues](linux-support-perf.md) ###### [Troubleshoot missing events issues](linux-support-events.md)
+###### [Troubleshoot AuditD performance issues](troubleshoot-auditd-performance-issues.md)
##### [Privacy](linux-privacy.md) ##### [Resources](linux-resources.md)
security Device Control Removable Storage Access Control https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-removable-storage-access-control.md
For policy deployment in Intune, the account must have permissions to create, ed
### Deploying Removable Storage Access Control by using Intune OMA-URI
+To block a specific removable storage class but allow specific media, you can use ΓÇÿIncludedIdList a group through PrimaryId and ExcludedIDList a group through DeviceId/HardwareId/etc.ΓÇÖ
+ Go to Microsoft Endpoint Manager admin center (<https://endpoint.microsoft.com/>) **> Devices > Create profile > Platform: Windows 10 and later, Profile type: Templates > Custom** 1. Enable or Disable Device control as follows:
security Mac Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-whatsnew.md
For more information on Microsoft Defender for Endpoint on other operating syste
- [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md)</br> <details>
- <summary>Jun-2022 (Build: 101.71.18 | Release version: 20.122052.17118.0)</summary>
+ <summary>Jul-2022 (Build: 101.71.18 | Release version: 20.122052.17118.0)</summary>
&ensp;Released: **Jul 7, 2022**<br/> &ensp;Published: **Jul 7, 2022**<br/>
security Troubleshoot Auditd Performance Issues https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-auditd-performance-issues.md
+
+ Title: Troubleshoot AuditD performance issues with Microsoft Defender for Endpoint on Linux
+
+description: Describes how to troubleshoot AuditD related performance issues that you might encounter with Microsoft Defender for Linux.
+keywords: microsoft, defender, Microsoft Defender for Endpoint, linux, troubleshoot, AuditD, XMDEClientAnalyzer, installation, deploy, uninstallation
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
++
+ms.localizationpriority: medium
+
+audience: ITPro
+
+ - m365-security-compliance
+ - m365-initiative-defender-endpoint
+
+ms.technology: mde
++
+# Troubleshoot AuditD performance issues with Microsoft Defender for Endpoint on Linux
+
+This article provides guidance on how to troubleshoot AuditD related performance issues that you might encounter with Microsoft Defender for Endpoint on Linux.
+
+**Background:**
+
+- Microsoft Defender for Endpoint on Linux OS distributions uses AuditD framework to collect certain types of telemetry events.
+
+- System events captured by rules added to `/etc/audit/rules.d/` will add to audit.log(s) and might affect host auditing and upstream collection.
+
+- Events added by Microsoft Defender for Endpoint on Linux will be tagged with `mdatp` key.
+
+- If the AuditD service is misconfigured or offline, then some events might be missing. To troubleshoot such an issue, refer to: [Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux.](linux-support-events.md)
+
+In certain server workloads, two issues might be observed:
+
+- **High CPU** resource consumption from ***mdatp_audisp_plugin*** process.
+
+- ***/var/log/audit/audit.log*** becoming large or frequently rotating.
+
+These issues may occur on servers with many events flooding AuditD.
+
+This can happen if there are multiple consumers for AuditD, or too many rules with the combination of Microsoft Defender for Endpoint and third party consumers, or high workload that generates a lot of events.
+
+To troubleshoot such issues, begin by [collecting MDEClientAnalyzer logs](run-analyzer-macos-linux.md) on the sample affected server.
+
+> [!NOTE]
+> As a general best practice, it is recommended to update the [Microsoft Defender for Endpoint agent to latest available version](linux-whatsnew.md) and confirming issue still persists before investigating further.
++
+## XMDEClientAnalyzer
+
+When you use XMDEClientAnalyzer, the following files will display output that provide insights to help you troubleshoot issues.
+- auditd_info.txt
+- auditd_log_analysis.txt
++
+### auditd_info.txt
+
+Contains general AuditD configuration and will display:
+
+- What processes are registered as AuditD consumers.
+
+- **Auditctl -s** output with **enabled=2**
+
+ - Suggests auditd is in immutable mode (requires restart for any config changes to take effect).
+
+- **Auditctl -l** output
+
+ - Will show what rules are currently loaded into the kernel (which may be different that what exists on disk in ΓÇ£/etc/auditd/rules.d/mdatp.rulesΓÇ¥).
+
+ - Will show which rules are related to Microsoft Defender for Endpoint.
+
+### auditd_log_analysis.txt
+
+Contains important aggregated information that is useful when investigating AuditD performance issues.
+
+- Which component owns the most reported events (Microsoft Defender for Endpoint events will be tagged with `key=mdatp`).
+
+- The top reporting initiators.
+
+- The most common system calls (network or filesystem events, and others).
+
+- What file system paths are the noisiest.
+
+**To mitigate most AuditD performance issues, you can implement AuditD exclusion. **
+
+> [!NOTE]
+> Exclusions should be made only for low threat and high noise initiators or paths. For example, do not exclude /bin/bash which risks creating a large blind spot.
+> [Common mistakes to avoid when defining exclusions](/microsoft-365/security/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus).
+++
+## Exclusion Types
+
+The XMDEClientAnalyzer support tool contains syntax that can be used to add AuditD exclusion configuration rules:
+
+AuditD exclusion ΓÇô support tool syntax help:
++
+**By initiator**
+
+- **-e/ -exe** full binary path > Removes all events by this initiator
+
+**By path**
+
+- **-d / -dir** full path to a directory > Removes filesystem events targeting this directory
+
+Examples:
+
+If ΓÇ£`/opt/app/bin/app`ΓÇ¥ writes to ΓÇ£`/opt/app/cfg/logs/1234.log`ΓÇ¥, then you can use the support tool to exclude with various options:
+
+`-e /opt/app/bin/app`
+
+`-d /opt/app/cfg`
+
+`-x /usr/bin/python /etc/usercfg`
+
+`-d /usr/app/bin/`
+
+More examples:
+
+`./mde_support_tool.sh exclude -p <process id>`
+
+`./mde_support_tool.sh exclude -e <process name>`
+
+To exclude more than one item - concatenate the exclusions into one line:
+
+`./mde_support_tool.sh exclude -e <process name> -e <process name 2> -e <process name3>`
+
+The -x flag is used to exclude access to subdirectories by specific initiators for example:
+
+`./mde_support_tool.sh exclude -x /usr/sbin/mv /tmp`
+
+The above will exclude monitoring of /tmp subfolder, when accessed by mv process.
+
+
+> [!NOTE]
+> Please contact Microsoft support if you need assistance with analyzing and mitigating AuditD related performance issues, or with deploying AuditD exclusions at scale.
++
security Defender Vulnerability Management Capabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities.md
> [!NOTE] > Microsoft Defender Vulnerability Management, a new standalone offering will provide the complete set of vulnerability tools and capabilities discussed in this article. To learn more, go to [What is Microsoft Defender Vulnerability Management.](defender-vulnerability-management.md)
-This article is intended to provide a high-level overview of the vulnerability features included in:
--- **Microsoft Defender for Endpoint Plan 2**. [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https:%2F%2Faka.ms%2FMDEp2OpenTrial)-- **Microsoft Defender Vulnerability Management add-on** (for existing Defender for Endpoint Plan 2 customers.) [Sign up for a free trial.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)-- **Microsoft Defender Vulnerability Management**. To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
+This article helps clarify what Defender Vulnerability Management capabilities are included in the following plans:
| Defender Vulnerability Management <p> _Core capabilities part of Defender for Endpoint Plan 2_| Defender Vulnerability Management add-on <p> _Additional capabilities for Defender for Endpoint Plan 2_| Defender Vulnerability Management Standalone <p> _Full vulnerability Management capabilities_| |:|:|:|
security Defender Vulnerability Management Trial https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-trial.md
+
+ Title: About the Microsoft Defender Vulnerability Management public preview trial
+description: Learn about the Microsoft Defender Vulnerability Management trial
+keywords: defender vulnerability management
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+f1.keywords:
+- NOCSH
++
+ms.localizationpriority: medium
+
+audience: ITPro
++
+ms.technology: m365d
++
+# About the Microsoft Defender Vulnerability Management public preview add-on trial
++
+**Applies to:**
+
+- [Microsoft Defender Vulnerability Management](../defender-vulnerability-management/index.yml)
+- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
+- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
++
+Microsoft Defender Vulnerability Management is a new service that provides advanced vulnerability management capabilities to minimize your organizationΓÇÖs cyber risk. Get real-time asset discovery, continuous risk-based assessment and prioritization, and built in remediation tools.
+
+It includes the existing vulnerability management capabilities in Microsoft Defender for Endpoint and new capabilities to further provide enhanced tools so your teams can intelligently assess, prioritize, and seamlessly remediate the biggest risks to your organization.
+
+## How to sign up for the Defender Vulnerability Management public preview add-on trial
+
+To sign up for the Defender Vulnerability Management add-on trial, you can go directly to the [Microsoft 365 trials hub](https://security.microsoft.com/trialHorizontalHub) page or by selecting **Trials** on the left navigation from the [Microsoft Defender 365 portal](https://security.microsoft.com/homepage).
+
+Once you've reached the [Microsoft 365 trials hub](https://security.microsoft.com/trialHorizontalHub):
+
+1. Under **Security trials**, find the **Defender Vulnerability Management add-on** card and select **Try now**.
+
+2. Review the information about what's included in the trial, then select **Begin trial**.
+
+Your trial will be effective immediately for 120 days. It can take up to 6 hours for all vulnerability management features to appear in your left navigation. Sign out and sign back in to see the updates.
+
+> [!NOTE]
+> This is a public preview trial. Details on your purchase options for this new offering will be made available once the offering is generally available.
+
+## Required roles for starting the trial
+
+As a Global Administrator, you can start the trial or you can allow to users start the trial on behalf of your organization by enabling this option:
+
+1. In the Microsoft 365 admin center, go to **Settings** > **Org settings** > **Services** > **User owned apps and services**
+2. Check **Let users start trials on behalf of your organization**
+3. Select **Save**
++
+> [!NOTE]
+> If you don't want users in your organization to be able to start trials, as a Global Administrator you must disable this option once you've activated the trial.
+>
+> Only a Global Administrator can end the trial.
+
+It can take a few hours for the changes to take effect. Once it does, return to the trial setup page and select **Begin trial**.
+
+## Licensing
+
+As part of the trial setup, the new Defender Vulnerability Management trial licenses will be applied to users automatically. Therefore, no assignment is needed (_The trial can automatically apply up to 1,000,000 licenses_). The licenses are active for 120 days.
+
+## Getting started, extending, and ending the trial
+
+### Getting started
+
+You can start using Defender Vulnerability Management features as soon as you see them in the Microsoft 365 Defender portal. Nothing is created automatically and users won't be affected. When you navigate to each solution, you may be guided to make extra setup configurations to start using features.
+
+### Extending the trial
+
+You can extend the trial within the last 15 days of the trial period. You're limited to a maximum of two trial periods. If you don't extend by the time your trial period ends, you'll need to wait at least 30 days before signing up for a second trial.
+
+### Ending the trial
+
+Admins can disable the trial anytime by selecting **Trials** on the left navigation, going to the **Defender Vulnerability Management** trial card and selecting **End trial**.
+
+Unless stated otherwise for the solution your trial data will be maintained for time, usually 180 days, before being permanently deleted. You may continue to access the data gathered during the trial until that time.
+
+## Terms and conditions
+
+See the [terms and conditions](/legal/microsoft-365/microsoft-365-trial) for Microsoft 365 trials.
+
+## Learn more about Defender Vulnerability Management
+
+Wondering what you can experience in your free trial? The Defender Vulnerability Management trial includes:
+
+- **[Security baselines assessment](tvm-security-baselines.md)**: When the trial ends security baseline profiles may be stored for a short additional time before being deleted.
+- **[Blocking vulnerable applicationsΓÇ»(beta)](tvm-block-vuln-apps.md)**: When the trial ends blocked applications will be immediately unblocked whereas baseline profiles may be stored for a short additional time before being deleted.
+- **[Browser extensions assessment](tvm-browser-extensions.md)**
+- **[Digital certificates assessment](tvm-certificate-inventory.md)**
+- **[Network shares analysis](tvm-network-share-assessment.md)**
security Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management.md
Watch the following video to learn more about Defender Vulnerability Management.
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Y1FX]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
> [!TIP] >For more information on the features and capabilities that are included in each offering, see [Compare Microsoft Defender Vulnerability Management offerings.](defender-vulnerability-management-capabilities.md)
Understand and assess your cyber exposure with advanced vulnerability and config
## Risk-based intelligent prioritization
-Defender Vulnerability Management leverage Microsoft's threat intelligence, breach likelihood predictions, business contexts, and device assessments to quickly prioritize the biggest vulnerabilities in your organization. A single view of prioritized recommendations from multiple security feeds, along with critical details including related CVEs and exposed devices helps you quickly remediate the biggest vulnerabilities on your most critical assets. Risk-based intelligent prioritization:
+Defender Vulnerability Management leverage Microsoft's threat intelligence, breach likelihood predictions, business contexts, and device assessments to quickly prioritize the biggest vulnerabilities in your organization. A single view of prioritized recommendations from multiple security feeds, along with critical details including related CVEs and exposed devices, helps you quickly remediate the biggest vulnerabilities on your most critical assets. Risk-based intelligent prioritization:
- **Focuses on emerging threats** - Dynamically aligns the prioritization of security recommendations with vulnerabilities currently being exploited in the wild and emerging threats that pose the highest risk. - **Pinpoints active breaches** - Correlates vulnerability management and EDR insights to prioritize vulnerabilities being exploited in an active breach within the organization.
security Get Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management.md
-# Sign-up for Microsoft Defender Vulnerability Management public preview
+# Sign up for Microsoft Defender Vulnerability Management public preview
**Applies to:**
> [!IMPORTANT] > Some information in this article relates to prereleased products/services that might be substantially modified before they are commercially released. Microsoft makes no warranties, express or implied, for the information provided here.
-Microsoft Defender Vulnerability Management will be available as a standalone and as an add-on for Microsoft Defender for Endpoint Plan 2 customers. How you sign up for the Defender Vulnerability Management trial depends on whether you already have Microsoft Defender for Endpoint Plan 2 or not.
+Microsoft Defender Vulnerability Management is available as a standalone and as an add-on for Microsoft Defender for Endpoint Plan 2 customers. How you sign up for the Defender Vulnerability Management trial depends on whether you already have Microsoft Defender for Endpoint Plan 2.
-- If you don't already have Defender for Endpoint Plan 2, sign up to try the [Defender Vulnerability Management Standalone](#try-defender-vulnerability-management-standalone)-- If you already have an existing Defender for Endpoint Plan 2 or Microsoft 365 E5 license, sign up to try the [Defender Vulnerability Management add-on](#try-the-defender-vulnerability-management-add-on-for-defender-for-endpoint-plan-2-customers)
+> [!NOTE]
+> This offering isn't currently available for Microsoft Defender for Business customers.
+
+- If you don't already have Defender for Endpoint Plan 2, sign up to try the [Defender Vulnerability Management Standalone trial.](#try-defender-vulnerability-management-standalone)
+- If you already have an existing Defender for Endpoint Plan 2 or Microsoft 365 E5 license, sign up to try the [Defender Vulnerability Management Add-on trial.](#try-the-defender-vulnerability-management-add-on-public-preview-trial-for-defender-for-endpoint-plan-2-customers)
+
+> If you have any questions related to the trial sign up and onboarding process, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
## Try Defender Vulnerability Management Standalone
-If you don't already have Defender for Endpoint Plan 2, you will sign up to trial the **Defender Vulnerability Management Standalone**. To do this or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
+If you don't already have Defender for Endpoint Plan 2, you will sign up to trial the **Defender Vulnerability Management Standalone trial**.
+
+> [!IMPORTANT]
+> You must be logged into the tenant as a global administrator to perform this task.
+
+To sign up:
+
+1. Log in as a global admin to the tenant where the Defender Vulnerability Management public preview trial service will be added.
+2. Visit [Microsoft Defender Vulnerability Management Public Preview Trial](https://aka.ms/MDVMPreviewTrial).
+3. Follow the prompts to sign in. This will differ depending on whether you already have a Microsoft 365 subscription or not.
+4. Once you have signed in, select the **Try now** button to confirm your order of the 120 day subscription of the Microsoft Defender Vulnerability Management Public Preview Trial.
+5. Select **Continue**. YouΓÇÖll now be directed to the Microsoft 365 admin center. No action is required in the Microsoft 365 admin center to start using the trial.
+
+> [!NOTE]
+> Once you activate the trial it can take up to 4 hours for Defender Vulnerability Management to be fully available in your tenant.
-## Try the Defender Vulnerability Management add-on for Defender for Endpoint Plan 2 customers
+## Try the Defender Vulnerability Management Add-on Public Preview Trial for Defender for Endpoint Plan 2 customers
-If you already have an existing Defender for Endpoint Plan 2 or Microsoft 365 E5 license, you will sign up to trial the **Defender Vulnerability Management Add-on** to get access to the additional capabilities. To sign up:
+If you already have an existing Defender for Endpoint Plan 2 or Microsoft 365 E5 license, sign up to trial the **Defender Vulnerability Management Add-on trial** to get access to the additional capabilities. To sign up:
-1. Visit [https://aka.ms/AddonPreviewTrial](https://aka.ms/AddonPreviewTrial).
-2. If you already have a Microsoft 365 subscription, sign in using your account. If you don't already have a subscription, follow the prompts to create a new account.
-3. Select the **Try now** button to confirm your order of the 120 day subscription of the Microsoft Defender Vulnerability Management Public Preview Trial.
+1. Visit [Microsoft Defender Vulnerability Management Add-on Public Preview Trial](https://aka.ms/AddonPreviewTrial).
+2. Follow the prompts to sign in. This will differ depending on whether you already have a Microsoft 365 subscription or not.
+3. Once you have signed in, select the **Try now** button to confirm your order of the 120 day subscription of the Microsoft Defender Vulnerability Add-on Public Preview Trial.
4. Select **Continue**. YouΓÇÖll now be directed to the Microsoft 365 admin center. No action is required in the Microsoft 365 admin center to start using the trial. > [!NOTE]
-> Once you activate the trial it can take up to 4 hours for the new features to become available in the portal.
+> Once you activate the trial it can take up to 6 hours for the new features to become available in the portal.
## Next steps - When you're ready to get started, visit the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) to start using Defender Vulnerability Management. - [Learn more about Defender Vulnerability Management](defender-vulnerability-management.md).-- [Assign a device's value](tvm-assign-device-value.md) to helps you differentiate between asset priorities.
security Threat And Vuln Mgt Event Timeline https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/threat-and-vuln-mgt-event-timeline.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
Event timeline is a risk news feed that helps you interpret how risk is introduced into the organization through new vulnerabilities or exploits. You can view events that may impact your organization's risk. For example, you can find new vulnerabilities that were introduced, vulnerabilities that became exploitable, exploit that was added to an exploit kit, and more.
security Trial Playbook Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/trial-playbook-defender-vulnerability-management.md
+
+ Title: Trial playbook - Microsoft Defender Vulnerability Management (public preview)
+description: Learn how Microsoft Defender Vulnerability Management can help you protect all your users and data.
+keywords: vulnerability management, threat and vulnerability management, Microsoft Defender for Endpoint TVM, Microsoft Defender for Endpoint-TVM, vulnerability management, vulnerability assessment, threat and vulnerability scanning, secure configuration assessment, Microsoft Defender for Endpoint, Microsoft Defender Vulnerability Management, endpoint vulnerabilities, next generation
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
++
+ms.localizationpriority: medium
+
+audience: ITPro
++
+ms.technology: mde
+++
+# Trial playbook: Microsoft Defender Vulnerability Management
+
+## Welcome to the Microsoft Defender Vulnerability Management trial playbook
+
+This playbook is a simple guide to help you make the most of your free trial. Using the suggested steps in this playbook from the Microsoft Security team, you'll learn how vulnerability management can help you protect all your users and data.
+
+## What is Microsoft Defender Vulnerability Management?
+
+Reducing cyber risk requires a comprehensive risk-based vulnerability management program to identify, assess, remediate, and track important vulnerabilities across your most critical assets.
+
+Microsoft Defender Vulnerability Management is a new service that proactively provides continuous real-time discovery and assessment of vulnerabilities, context-aware threat & business prioritization, and built-in remediation processes. It includes all threat and vulnerability management capabilities in Microsoft Defender for Endpoint and new enhanced capabilities so your teams can further intelligently assess, prioritize, and seamlessly remediate the biggest risks to your organization.
++
+Watch the following video to learn more about Defender Vulnerability Management:
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Y1FX]
+
+## LetΓÇÖs get started
+
+### Step 1: Set-up
+
+> [!NOTE]
+> Users need to have the global admin role defined in Azure AD to onboard the trial.
+
+1. Check [permissions and pre-requisites.](tvm-prerequisites.md)
+2. The Microsoft Defender Vulnerability Management preview trial can be accessed in several ways:
+
+ Via the [Microsoft 365 Defender portal](https://security.microsoft.com) under Trials.
+
+ :::image type="content" source="../../medivm-trialshub.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management trial hub landing page.":::
+
+ Via the [Microsoft Admin Center](https://admin.microsoft.com/#/catalog) (global admins only).
+
+3. Sign up for the trial depends on whether you already have Microsoft Defender for Endpoint Plan 2 or not.
+ - If you have Defender for Endpoint Plan 2 or Microsoft 365 E5, choose [Defender Vulnerability Management Add-on](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-the-defender-vulnerability-management-add-on-public-preview-trial-for-defender-for-endpoint-plan-2-customers).
+ - If you don't have Defender for Endpoint Plan 2, or Microsoft 365 E5, choose [Defender Vulnerability Management Standalone](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-standalone).
+4. When you're ready to get started, visit the [Microsoft 365 Defender portal](https://security.microsoft.com) to start using the Defender Vulnerability Management trial.
+
+> [!NOTE]
+> This is a public preview trial. Details on your purchase options for this new offering will be made available once the offering is generally available.
+
+> [!NOTE]
+> Once you activate the trial it can take up to 6 hours for the new features to become available in the portal.
+
+Now that you have set up your trial, itΓÇÖs time to try key capabilities.
+
+### Step 2: Know what to protect in a single view
+
+Built-in and agentless scanners continuously monitor and detect risk even when devices arenΓÇÖt connected to the corporate network. Expanded asset coverage consolidates software applications, digital certificates, network shares, and browser extensions into a single inventory view.
+
+1. [**Device inventory**](../defender-endpoint/machines-view-overview.md) - The device inventory shows a list of the devices in your network. By default, the list displays devices seen in the last 30 days. At a glance, you'll see information such as domains, risk levels, OS platform, associated CVEs, and other details for easy identification of devices most at risk.
+
+2. Discover and assess your organizationΓÇÖs software in a single, consolidated inventory view:
+ - [**Software application inventory**](tvm-software-inventory.md) - the software inventory in Defender Vulnerability Management is a list of known applications in your organization. The view includes vulnerability and misconfiguration insights across installed software with prioritized impact scores and details such as OS platforms, vendors, number of weaknesses, threats, and an entity-level view of exposed devices.
+ - [**Browser extension assessments**](tvm-browser-extensions.md) - the browser extensions page displays a list of the extensions installed across different browsers in your organization. Extensions usually need different permissions to run properly. Defender Vulnerability Management provides detailed information on the permissions requested by each extension and identifies those with the highest associated risk levels, the devices with the extension turned on, installed versions, and more.
+ - [**Certificate inventory**](tvm-certificate-inventory.md) - the certificate inventory allows you to discover, assess, and manage digital certificates installed across your organization in a single view. This can help you:
+ - Identify certificates that are about to expire so you can update them and prevent service disruption.
+ - Detect potential vulnerabilities due to the use of weak signature algorithm (for example, SHA-1-RSA), short key size (for example, RSA 512 bit), or weak signature hash algorithm (for example, MD5).
+ - Ensure compliance with regulatory guidelines and organizational policy.
+
+3. [Assign device value](tvm-assign-device-value.md) - defining a device's value helps you differentiate between asset priorities. The device value is used to incorporate the risk appetite of an individual asset into the threat and vulnerability management exposure score calculation. Devices assigned as "high value" will receive more weight. Device value options:
+ - Low
+ - Normal (Default)
+ - High
+
+ You can also use the [set device value API](/microsoft-365/security/defender-endpoint/set-device-value).
+
+### Step 3: Track and mitigate remediation activities
+
+1. [**Request remediation**](tvm-remediation.md#request-remediation) - vulnerability management capabilities bridge the gap between Security and IT administrators through the remediation request workflow. Security admins like you can request for the IT Administrator to remediate a vulnerability from the **Recommendation** pages to [Intune](/mem/intune/).
+2. [**View your remediation activities**](tvm-remediation.md#view-your-remediation-activities) - when you submit a remediation request from the Security recommendations page, it kicks-off a remediation activity. A security task is created that can be tracked on a **Remediation** page, and a remediation ticket is created in Microsoft Intune.
+3. [**Block vulnerable applications**](tvm-block-vuln-apps.md) - Remediating vulnerabilities takes time and can be dependent on the responsibilities and resources of the IT team. Security admins can temporarily reduce the risk of a vulnerability by taking immediate action to block all currently known vulnerable versions of an application or warn users with customizable messages before opening vulnerable app versions until the remediation request is completed. The block option gives IT teams time to patch the application without security admins worrying that the vulnerabilities will be exploited in the meantime.
+
+ - [How to block vulnerable applications](tvm-block-vuln-apps.md#how-to-block-vulnerable-applications)
+ - [View remediation activities](tvm-block-vuln-apps.md#view-remediation-activities)
+ - [View blocked applications](tvm-block-vuln-apps.md#view-blocked-applications)
+ - [Unblock applications](tvm-block-vuln-apps.md#unblock-applications)
+
+4. Use enhanced assessment capabilities such as [Network shares analysis](tvm-network-share-assessment.md) to protect vulnerable network shares. As network shares can be easily accessed by network users, small common weaknesses can make them vulnerable. These types of misconfigurations are commonly used in the wild by attackers for lateral movement, reconnaissance, data exfiltration, and more. ThatΓÇÖs why we built a new category of configuration assessments in Defender Vulnerability Management that identify the common weaknesses that expose your endpoints to attack vectors in Windows network shares. This helps you:
+ - Disallow offline access to shares
+ - Remove shares from the root folder
+ - Remove share write permission set to ΓÇÿEveryoneΓÇÖ
+ - Set folder enumeration for shares
+
+5. View and monitor your organizationΓÇÖs devices using a [**Vulnerable devices report**](tvm-vulnerable-devices-report.md) that shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure.
+
+### Step 4: Set up security baseline assessments
+
+Instead of running point-in-time compliance scans, security baselines assessment helps you to continuously and proactively monitor your organization's compliance against industry security benchmarks in real time. A security baseline profile is a customized profile that you can create to assess and monitor endpoints in your organization against industry security benchmarks (CIS, NIST, MS). When you create a security baseline profile, you're creating a template that consists of multiple device configuration settings and a base benchmark to compare against.
+
+Security baselines provide support for Center for Internet Security (CIS) benchmarks for Windows 10, Windows 11, and Windows Server 2008 R2 and above, as well as Security Technical Implementation Guides (STIG) benchmarks for Windows 10 and Windows Server 2019.
+
+1. Get started with [security baselines assessment](tvm-security-baselines.md#get-started-with-security-baselines-assessment)
+2. Review [security baseline profile assessment results](tvm-security-baselines.md#review-security-baseline-profile-assessment-results)
+3. [Use advanced hunting](tvm-security-baselines.md#use-advanced-hunting)
+
+### Step 5: Create meaningful reports to get in-depth insights using APIs and Advanced Hunting
+
+Defender Vulnerability Management APIs can help drive clarity in your organization with customized views into your security posture and automation of vulnerability management workflows. Alleviate your security teamΓÇÖs workload with data collection, risk score analysis, and integrations with your other organizational processes and solutions. For more information, see:
+
+- [Export assessment methods and properties per device](../defender-endpoint/get-assessment-methods-properties.md)
+- [Defender Vulnerability Management APIs blog](https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/new-threat-amp-vulnerability-management-apis-create-reports/ba-p/2445813)
+
+Advanced hunting enables flexible access to Defender Vulnerability Management raw data, which allows you to proactively inspect entities for known and potential threats.
+For more information, see [Hunt for exposed devices](../defender-endpoint/advanced-hunting-overview.md).
+
+## Additional resources
+
+- Compare offerings: [Microsoft Defender Vulnerability Management](defender-vulnerability-management-capabilities.md)
+- [Defender Vulnerability Management documentation](../defender-vulnerability-management/index.yml)
+- Datasheet: [Microsoft Defender Vulnerability Management: Reduce cyber risk with continuous vulnerability discovery and assessment, risk-based prioritization, and remediation](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4XR02)
security Tvm Assign Device Value https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-assign-device-value.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
Defining a device's value helps you differentiate between asset priorities. The device value is used to incorporate the risk appetite of an individual asset into the threat and vulnerability management exposure score calculation. Devices assigned as "high value" will receive more weight.
security Tvm Block Vuln Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-block-vuln-apps.md
ms.technology: mdvm
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
Remediating vulnerabilities takes time and can be dependent on the responsibilities and resources of the IT team. Security admins can temporarily reduce the risk of a vulnerability by taking immediate action to block all currently known vulnerable versions of an application, until the remediation request is completed. The block option gives IT teams time to patch the application without security admins worrying that the vulnerabilities will be exploited in the meantime.
While taking the remediation steps suggested by a security recommendation, secur
The **block action** is intended to block all installed vulnerable versions of the application in your organization from running. For example, if there is an active zero-day vulnerability you can block your users from running the affected software while you determine work-around options.
-The **warn action** is intended to send a warning to your users when they open vulnerable versions of the application. Users will can choose to bypass the warning and access the application.
+The **warn action** is intended to send a warning to your users when they open vulnerable versions of the application. Users can choose to bypass the warning and access the application.
For both actions, you can customize the message the users will see. For example, you can encourage them to install the latest version.
If you don't see the mitigation option while requesting a remediation, it's beca
- Microsoft applications - Recommendations related to operating systems-- Recommendations related to apps for MacOS and Linux
+- Recommendations related to apps for macOS and Linux
- Apps where Microsoft does not have sufficient information or a high confidence to block If you try to block an application and it doesn't work, you may have reached the maximum indicator capacity. If this is the case, you can delete old indicators [Learn more about indicators](../defender-endpoint/manage-indicators.md).
security Tvm Browser Extensions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-browser-extensions.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
A browser extension is a small software application that adds functionality to a web browser. Visibility into the browser extensions installed can help you ensure the safe usage of extensions in your organization.
security Tvm Certificate Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-certificate-inventory.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
Certificates can be used in multiple ways, this includes:
security Tvm Dashboard Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-dashboard-insights.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
Defender vulnerability management provides both security administrators and security operations teams with unique value, including:
security Tvm End Of Support Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-end-of-support-software.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
End-of-support (EOS), otherwise known as end-of-life (EOL), for software or software versions means that they will no longer be supported or serviced, and will not receive security updates. When you use software or software versions with ended support, you're exposing your organization to security vulnerabilities, legal, and financial risks.
security Tvm Exception https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-exception.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
As an alternative to a remediation request when a recommendation is not relevant at the moment, you can create exceptions for recommendations. If your organization has device groups, you will be able to scope the exception to specific device groups. Exceptions can either be created for selected device groups, or for all device groups past and present.
Only users with "exceptions handling" permissions can manage exceptions (includi
## Create an exception
-Select a security recommendation you would like create an exception for, and then select **Exception options** and fill out the form.
+Select a security recommendation you would like to create an exception for, and then select **Exception options** and fill out the form.
![Showing where the button for "exception options" is location in a security recommendation flyout.](../../media/defender-vulnerability-management/tvm-exception-options.png)
security Tvm Exposure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-exposure-score.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
Your exposure score is visible in the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) of the Microsoft 365 Defender portal. It reflects how vulnerable your organization is to cybersecurity threats. Low exposure score means your devices are less vulnerable from exploitation.
security Tvm Hunt Exposed Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-hunt-exposed-devices.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
## Use advanced hunting to find devices with vulnerabilities
security Tvm Microsoft Secure Score Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-microsoft-secure-score-devices.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
> [!NOTE] > Configuration score is now part of vulnerability management as Microsoft Secure Score for Devices.
security Tvm Network Share Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-network-share-assessment.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
The ability to share files and folders over a network allows users to provide access to resources like files, documents, and media to other people on the network. As network shares can be easily accessed by network users, some common weaknesses exist that can cause network shares to be vulnerable.
security Tvm Prerequisites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-prerequisites.md
ms.technology: mde
- [Microsoft Defender Vulnerability Management](index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
>[!NOTE] >The same minimum requirements as Microsoft Defender for Endpoint apply to Microsoft Defender Vulnerability Management, for more information, see [Minimum requirements](../defender-endpoint/minimum-requirements.md).
Ensure that your devices:
## Relevant permission options
+To view the permissions options for vulnerability management:
+ 1. Log in to Microsoft 365 Defender portal using account with a Security administrator or Global administrator role assigned. 2. In the navigation pane, select **Settings > Endpoints > Roles**.
For more information, see [Create and manage roles for role-based access control
- **Security operations** - Take response actions, approve or dismiss pending remediation actions, manage allowed/blocked lists for automation and indicators - **Threat and vulnerability management - Exception handling** - Create new exceptions and manage active exceptions - **Threat and vulnerability management - Remediation handling** - Submit new remediation requests, create tickets, and manage existing remediation activities
+- **Threat and vulnerability management - Application handling** - Apply immediate mitigation actions by blocking vulnerable applications, as part of the remediation activity and manage the blocked apps and perform unblock actions
+
+### Threat and vulnerability management - security baselines
-For more information, see [RBAC permission options](../defender-endpoint/user-roles.md#permission-options)
+**Threat and vulnerability management ΓÇô Manage security baselines assessment profiles** - Create and manage profiles so you can assess if your devices comply to security industry baselines.
+
+>[!Note]
+> For the Defender Vulnerability Management public preview trial this permission is not required. Users with ΓÇ£Threat and vulnerability management - View dataΓÇ¥ permissions can manage security baselines. However, when the trial ends and a license is purchased, this permission is required.
## Related articles - [Supported operating systems and platforms](tvm-supported-os.md)-- [Assign device value](tvm-assign-device-value.md) - [Threat and vulnerability management dashboard](tvm-dashboard-insights.md)-
security Tvm Remediation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-remediation.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
Watch this short video to learn how threat and vulnerability management discovers vulnerabilities and misconfigurations on your endpoints and provides actionable insights that help you quickly remediate threats and vulnerabilities in your environment.
security Tvm Security Baselines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-security-baselines.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
Instead of running never-ending compliance scans, security baselines assessment helps you to continuously and effortlessly monitor your organization's security baselines compliance and identify changes in real time.
Security baselines provide support for Center for Internet Security (**CIS)** be
8. Select **Submit** to create your profile. 9. On the final page, select **View profile page** to see the assessment results.
-> [!Note]
-> You can create multiple profiles for the same operating system with various customizations.
+>[!Note]
+>You can create multiple profiles for the same operating system with various customizations.
When you customize a configuration an icon will appear beside it to indicate that it has been customized and is no longer using the recommended value. Select the **reset** button to revert to the recommended value.
security Tvm Security Recommendation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-security-recommendation.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
Cybersecurity weaknesses identified in your organization are mapped to actionable security recommendations and prioritized by their impact. Prioritized recommendations help shorten the time to mitigate or remediate vulnerabilities and drive compliance.
security Tvm Software Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-software-inventory.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
The software inventory in Defender Vulnerability Management is a list of known software in your organization. The default filter on the software inventory page displays all software with official [Common Platform Enumerations (CPE)](https://nvd.nist.gov/products/cpe). The view includes details such as the name of the vendor, number of weaknesses, threats, and number of exposed devices.
security Tvm Supported Os https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-supported-os.md
ms.technology: mde
- [Microsoft Defender Vulnerability Management](../defender-vulnerability-management/index.yml) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
Before you begin, ensure that you meet the following operating system or platform requisites for vulnerability management so the activities in your devices are properly accounted for.
security Tvm Vulnerable Devices Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-vulnerable-devices-report.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure.
security Tvm Weaknesses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-weaknesses.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
> [!IMPORTANT] > Defender Vulnerability Management can help identify Log4j vulnerabilities in applications and components. [Learn more](../defender-endpoint/tvm-manage-Log4shell-guidance.md).
security Tvm Zero Day Vulnerabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-zero-day-vulnerabilities.md
ms.technology: mde
[!include[Prerelease information](../../includes/prerelease.md)]
-> To sign up for the Defender Vulnerability Management public preview or if you have any questions, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
->
-> Already have Microsoft Defender for Endpoint P2? [Sign up for a free trial of the Defender Vulnerability Management Add-on.](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2)
+>[!Note]
+> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../defender-vulnerability-management/get-defender-vulnerability-management.md).
A zero-day vulnerability is a flaw in software for which no official patch or security update has been released. A software vendor may or may not be aware of the vulnerability, and no public information about this risk is available. Zero-day vulnerabilities often have high severity levels and are actively exploited.
security Deploy Supported Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/deploy-supported-services.md
audience: ITPro - M365-security-compliance
- - m365initiative-m365-defender
+ - m365solution-getstarted
search.appverid: - MOE150
The table below lists how each supported service provides additional data, oppor
## Deploy the services
-Deploying each service typically requires provisioning to your tenant and some initial configuration. See the following table to understand how each of these services are deployed.
+Deploying each service typically requires provisioning to your tenant and some initial configuration. See the following table to understand how each of these services is deployed.
| Service | Provisioning instructions | Initial configuration | | | | |
security First Incident Analyze https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-analyze.md
audience: ITPro - M365-security-compliance
- - m365initiative-m365-defender
+ - m365solution-firstincident
search.appverid: - MOE150
security First Incident Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-overview.md
audience: ITPro - M365-security-compliance
- - m365initiative-m365-defender
+ - m365solution-firstincident
search.appverid: - MOE150
security First Incident Path Identity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-path-identity.md
audience: ITPro - M365-security-compliance
- - m365initiative-m365-defender
+ - m365solution-firstincident
search.appverid: - MOE150
security First Incident Path Phishing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-path-phishing.md
audience: ITPro - M365-security-compliance
- - m365initiative-m365-defender
+ - m365solution-firstincident
search.appverid: - MOE150
security First Incident Post https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-post.md
audience: ITPro - M365-security-compliance
- - m365initiative-m365-defender
+ - m365solution-firstincident
search.appverid: - MOE150
security First Incident Prepare https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-prepare.md
audience: ITPro - M365-security-compliance
- - m365initiative-m365-defender
+ - m365solution-firstincident
search.appverid: - MOE150
security First Incident Remediate https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-remediate.md
audience: ITPro - M365-security-compliance
- - m365initiative-m365-defender
+ - m365solution-firstincident
search.appverid: - MOE150
security Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/get-started.md
audience: ITPro - M365-security-compliance
- - m365initiative-m365-defender
+ - m365solution-getstarted
ms.technology: m365d
security Incident Response Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incident-response-overview.md
audience: ITPro - M365-security-compliance
- - m365initiative-m365-defender
- - m365solution-incidentresponse
- - m365solution-overview
search.appverid: - MOE150
security Investigate Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-incidents.md
audience: ITPro - M365-security-compliance
- - m365initiative-m365-defender
- - incidentresponse
- - m365solution-incidentresponse
- - m365solution-overview
search.appverid: - MOE150
security M365d Enable https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable.md
ms.localizationpriority: medium audience: ITPro-+
+ - M365-security-compliance
+ - m365solution-getstarted
search.appverid: - MOE150
Once the service is provisioned, it adds:
*Microsoft 365 Defender portal with incidents management and other capabilities* ### Getting Microsoft Defender for Identity data
-To enable the integration with Microsoft Defender for Cloud Apps, you'll need to login to the Microsoft Defender for Cloud Apps at least once.
+To enable the integration with Microsoft Defender for Cloud Apps, you'll need to log in to the Microsoft Defender for Cloud Apps at least once.
## Get assistance
security User Submission https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/user-submission.md
Title: User reported message settings
+ Title: User-reported email settings for spam, phish, as malicious mail
f1.keywords: - NOCSH--++ Previously updated : Last updated : 07/19/2022 audience: ITPro ms.localizationpriority: medium
- M365-security-compliance - m365initiative-defender-office365
-description: Admins can learn how to configure a mailbox to collect spam and phishing email that are reported by users.
+description: How to configure a mailbox to collect spam and phishing email reported by users. Make a mailbox for messages that users report as spam, phish, as malicious, or not malicious.
ms.technology: mdo ms.prod: m365-security
ms.prod: m365-security
- [Microsoft Defender for Office 365 plan 1 and plan 2](defender-for-office-365.md) - [Microsoft 365 Defender](../defender/microsoft-365-defender.md)
-In Microsoft 365 organizations with Exchange Online mailboxes, you can specify a mailbox to receive messages that users report as malicious or not malicious. When users report messages using the various reporting options, you can use this mailbox to intercept messages (send to the custom mailbox only) or receive copies of messages (send to the custom mailbox and Microsoft). This feature works with the following message reporting options:
+In Microsoft 365 organizations with Exchange Online mailboxes, you can direct mail to a mailbox when users report spam, phish, as malicious, or even not malicious messages. When users report emails using various reporting options, admins can use this mailbox to intercept those email messages (send to the custom mailbox only) or receive copies of messages (send to the custom mailbox and Microsoft).
+
+This feature works with these message reporting options:
- [The Report Message add-in](enable-the-report-message-add-in.md) - [The Report Phishing add-in](enable-the-report-phish-add-in.md) - [Third-party reporting tools](#third-party-reporting-tools)
-Delivering user reported messages to a custom mailbox instead of directly to Microsoft allows your admins to selectively and manually report messages to Microsoft using [Admin submission](admin-submission.md). These settings were formerly known as the User submissions policy.
+Delivering user-reported messages to a custom mailbox instead of directly to Microsoft allows admins to selectively and manually report email messages to Microsoft using [Admin submission](admin-submission.md). *These settings were formerly known as the User submissions policy*.
> [!NOTE]
- > If reporting has been [disabled in Outlook on the web](report-junk-email-and-phishing-scams-in-outlook-on-the-web-eop.md#disable-or-enable-junk-email-reporting-in-outlook-on-the-web), enabling user reported messages here will override that setting and enable users to report messages in Outlook on the web again.
+ > If reporting has been [disabled in Outlook on the web](report-junk-email-and-phishing-scams-in-outlook-on-the-web-eop.md#disable-or-enable-junk-email-reporting-in-outlook-on-the-web), enabling user-reported messages here will override that setting and enable users to report messages in Outlook on the web again.
## Custom mailbox prerequisites
-Use the following articles to configure the prerequisites required so user reported messages go to your custom mailbox:
+Use the articles below to configure prerequisites user-reported email messages go to your custom mailbox:
- [Identify the custom mailbox as a SecOps mailbox](configure-advanced-delivery.md#use-the-microsoft-365-defender-portal-to-configure-secops-mailboxes-in-the-advanced-delivery-policy).
Use the following articles to configure the prerequisites required so user repor
- Zero-hour auto purge (ZAP) for malware is turned off (**Protection settings** section \> **Enable zero-hour auto purge for malware** is not selected). - The common attachment filter option is turned off (**Protection settings** section \> **Enable the common attachments filter** is not selected).
-If you have Microsoft Defender for Office 365, you should also configure the following settings so that our advanced filtering does not impact the reported messages:
+**If you have Microsoft Defender for Office 365**, you should also configure the following settings so that our advanced filtering doesn't impact the reported emails:
- Make sure the custom mailbox is not part of any [preset security policies](preset-security-policies.md#use-the-microsoft-365-defender-portal-to-modify-the-assignments-of-standard-and-strict-preset-security-policies)
If you have Microsoft Defender for Office 365, you should also configure the fol
- [Create a Safe Attachments policy](set-up-safe-attachments-policies.md) for the custom mailbox where Safe Attachments scanning, including Dynamic Delivery, is turned off (**Safe Attachments unknown malware response** section > **Off**).
-After you've verified that your mailbox meets all applicable prerequisites, you can use the procedures in this article to configure the user submissions mailbox.
+After you've verified that your mailbox meets prerequisites, you can use the rest of this article to configure the user submissions mailbox.
## What do you need to know before you begin?
After you've verified that your mailbox meets all applicable prerequisites, you
- [Enable or disable access to Exchange Online PowerShell](/powershell/exchange/disable-access-to-exchange-online-powershell) - [Client Access Rules in Exchange Online](/exchange/clients-and-mobile-in-exchange-online/client-access-rules/client-access-rules)
-## Use the Microsoft 365 Defender portal to configure the user submissions mailbox
+## Use the Microsoft 365 Defender portal to configure the user submissions mailbox for emails
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** > **Threat policies** > **User reported message settings** in the **Others** section. To go directly to the **User submissions** page, use <https://security.microsoft.com/userSubmissionsReportMessage>.
After you've verified that your mailbox meets all applicable prerequisites, you
3. When you're finished, click **Confirm**. To clear these values, click **Restore**.
-## Third-party reporting tools
+## Third-party email reporting tools
You can configure third-party message reporting tools to send reported messages to the custom mailbox. You would do this by setting the **Microsoft Outlook Report Message button** setting to **Off** and setting the **My organization's mailbox** to an Office 365 mailbox of your choice.
whiteboard Configure Privacy Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/configure-privacy-settings.md
# Configure privacy settings in Microsoft Whiteboard >[!NOTE]
-> If your users want to learn more about default privacy settings and how diagnostic data is collected, direct them to [Microsoft Whiteboard privacy and compliance](https://support.microsoft.com/office/privacy-and-compliance-ed9f0de9-71be-44c2-837d-e0f448660be1).
+> If you or your users want to learn more about default privacy settings, optional connected experiences, and how diagnostic data is collected, direct them to [Microsoft Whiteboard privacy and compliance](https://support.microsoft.com/office/privacy-and-compliance-ed9f0de9-71be-44c2-837d-e0f448660be1).
If you are the Microsoft Whiteboard administrator for your organization, you can control the following:
If you are the Microsoft Whiteboard administrator for your organization, you can
- Whether optional connected experiences in Whiteboard are available to your users.
-To configure the level of diagnostic data, sign in to the [Microsoft 365 admin center](https://docs.microsoft.com/microsoft-365/admin/admin-overview/admin-center-overview?view=o365-worldwide) with your administrator account. From the admin center home page, go to **Show all > Settings > Org settings > Whiteboard**.
+To configure the level of diagnostic data, sign in to the [Microsoft 365 admin center](/microsoft-365/admin/admin-overview/admin-center-overview?view=o365-worldwide) with your administrator account. From the admin center home page, go to **Show all > Settings > Org settings > Whiteboard**.
-To configure the availability of optional connected experiences, use the [Office cloud policy service](https://docs.microsoft.com/deployoffice/admincenter/overview-office-cloud-policy-service) in the [Microsoft 365 Apps admin center](https://config.office.com). Sign in with your administrator account and go to **Customization > Policy Management**. The policy you want to configure is named: **Allow the use of additional optional connected experiences in Office**.
+To configure the availability of optional connected experiences, use the [Office cloud policy service](/deployoffice/admincenter/overview-office-cloud-policy-service) in the [Microsoft 365 Apps admin center](https://config.office.com). Sign in with your administrator account and go to **Customization > Policy Management**. The policy you want to configure is named: **Allow the use of additional optional connected experiences in Office**.
## Diagnostic data setting for your organization
-You can choose the level of [diagnostic data](https://support.microsoft.com/office/privacy-and-compliance-ed9f0de9-71be-44c2-837d-e0f448660be1#diagnostic_data)that is collected and sent to Microsoft about the Whiteboard client software running on devices in your organization. Optional diagnostic data will be sent to Microsoft, unless you change the setting in the Microsoft 365 admin center. If you choose to send optional diagnostic data, required diagnostic data is also included.
+You can choose the level of diagnostic data that is collected and sent to Microsoft about the Whiteboard client software running on devices in your organization. Optional diagnostic data will be sent to Microsoft, unless you change the setting in the Microsoft 365 admin center. If you choose to send optional diagnostic data, required diagnostic data is also included.
In addition to **Required** or **Optional**, there is also a choice of **Neither**. If you choose that option, no diagnostic data about Whiteboard client software running on the userΓÇÖs device is sent to Microsoft. This option, however, significantly limits MicrosoftΓÇÖs ability to detect, diagnose, and remediate problems that your users may encounter while using Whiteboard.
Your users wonΓÇÖt be able to change the diagnostic data level for their devices
## Optional connected experiences setting for your organization
-You can choose whether to make [optional connected experiences](https://support.microsoft.com/office/privacy-and-compliance-ed9f0de9-71be-44c2-837d-e0f448660be1?storagetype=live#optional) in Whiteboard available to your users. These connected experiences will be available to your users unless you change the setting in the Microsoft 365 admin center.
+You can choose whether to make optional connected experiences in Whiteboard available to your users. These connected experiences will be available to your users unless you change the setting in the Microsoft 365 admin center.
These connected experiences are different because they are not covered by your organizationΓÇÖs commercial agreement with Microsoft. Optional connected experiences are offered by Microsoft directly to your users and are governed by the [Microsoft Services Agreement](https://www.microsoft.com/servicesagreement) instead of the [Online Services Terms](https://www.microsoft.com/licensing/product-licensing/products).