Category | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
admin | Microsoft 365 Copilot Usage | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/microsoft-365-copilot-usage.md | A user is considered active in a given app if they performed an intentional acti ### What's the difference between the user activity table and audit log? -The information captured in audit log records differs from that in [Microsoft 365 usage reports](#user-last-activity-table). It's important to note that audit logs are not designed for assessing user engagement in Microsoft 365, and they should not be used to replace or augment information in Microsoft 365 usage reports. To learn more about audit logs, see [Export, configure, and view audit log records](/purview/audit-log-export-records#step-1-export-audit-log-search-results). +The audit log data that powers Microsoft Purview solutions, such as AI hub, are built for data security and compliance purposes, and provide comprehensive visibility into Copilot interactions for these use cases (for example, to discover data oversharing risks or to collect interactions for regulatory compliance or legal purposes). They are not, however, intended to be used as the basis for Copilot usage reporting. Any aggregated metrics that customers build on top of this data, such as "prompt count" or "active user count," may not be consistent with the corresponding data points in the official Copilot usage reports provided by Microsoft. Microsoft cannot provide guidance on how to use audit log data as the basis for usage reporting, nor can Microsoft guarantee that aggregated usage metrics built on top of audit log data will match similar usage metrics reported in other tools. ++To access accurate information on Copilot for Microsoft 365 usage, use one of the following reports: the [Copilot for Microsoft 365 usage report](microsoft-365-copilot-usage.md) in the Microsoft 365 Admin Center or the [Copilot Dashboard](/viva/insights/org-team-insights/copilot-dashboard) in Viva Insights. ### Is Intelligent Recap usage in Teams captured in [Usage reports](activity-reports.md)? |
commerce | Allowselfservicepurchase Powershell | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/allowselfservicepurchase-powershell.md | The following table lists the available products and their **ProductId**. It als | Power BI Pro* | CFQ7TTC0H9MP | No | | Project Plan 1* | CFQ7TTC0HDB1 | Yes | | Project Plan 3* | CFQ7TTC0HDB0 | No |+| Python in Excel | CFQ7TTC0S3X1 | No | | Teams Exploratory | CFQ7TTC0J1FV | Yes | | Teams Premium Introductory Pricing | CFQ7TTC0RM8K | Yes | | Visio Plan 1* | CFQ7TTC0HD33 | Yes | |
frontline | Flw Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/flw-devices.md | Shared devices and bring-your-own-device (BYOD) are the most commonly adopted de <sup>1</sup>Dedicated devices are uncommon in frontline deployments primarily due to high cost and effort to manage in the context of high staff turnover.<br> <sup>2</sup>Kiosk device deployments arenΓÇÖt recommended because they donΓÇÖt allow user auditing and user-based security capabilities like multifactor authentication. [Learn more about kiosk devices](/windows/configuration/assigned-access). -We focus on shared devices and BYOD as these are the deployment models that fit the practical needs of most frontline deployments. Read on for an overview of planning considerations and management capabilities. +In this article, we focus on shared devices and BYOD, as these are the deployment models that fit the practical needs of most frontline deployments. Read on for an overview of planning considerations and management capabilities. ### Device operating system To learn more, see the [Microsoft Entra Conditional Access documentation](/entra #### App protection policies -With mobile application management (MAM) from Intune, you can use [app protection policies](/mem/intune/apps/app-protection-policy) with apps that are integrated with the Intune [App SDK](/mem/intune/developer/app-sdk-get-started). This allows you to further protect your organizationΓÇÖs data within an app. +With mobile application management (MAM) from Intune, you can use [app protection policies](/mem/intune/apps/app-protection-policy) with apps that are integrated with the [Intune App SDK](/mem/intune/developer/app-sdk-get-started). This allows you to further protect your organizationΓÇÖs data within an app. With app protection policies, you can add access control safeguards, such as: In a shared devices deployment, you can use app protection policies to ensure th ## Related articles - [Manage shared devices for your frontline](flw-shared-devices.md)-- [Frontline worker management](/azure/active-directory/fundamentals/frontline-worker-management)+- [Frontline worker management](/entra/fundamentals/frontline-worker-management) |