Category | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
compliance | Dlp Policy Reference | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md | DLP policies detect sensitive items by matching them to a sensitive information |On-Premises repositories| Yes| Yes| No| |PowerBI|Yes | Yes| No| +> [!NOTE] +> DLP supports (in preview) the using trainable classifiers as a condition to detect sensitive documents. Content can be defined by trainable classifiers in Exchange email online, Sharepoint Online sites, OneDrive for Business accounts, Teams Chat and Channels, and Devices. For more information, see [Trainable Classifiers](classifier-learn-about.md). + > [!NOTE] > DLP supports detecting sensitivity labels on emails and attachments See, [Use sensitivity labels as conditions in DLP policies](dlp-sensitivity-label-as-condition.md#use-sensitivity-labels-as-conditions-in-dlp-policies). Conditions are inclusive and are where you define what you want the rule to look - [sensitive information types](sensitive-information-type-learn-about.md#learn-about-sensitive-information-types) - [sensitivity labels](sensitivity-labels.md) - [retention labels](retention.md#using-a-retention-label-as-a-condition-in-a-dlp-policy)+- [Trainable Classifiers](classifier-learn-about.md) (in preview) depending on the [location(s)](#location-support-for-how-content-can-be-defined) you choose to apply the policy to. |
security | Microsoft Defender Offline | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-offline.md | ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium Last updated : 07/28/2022 Microsoft Defender Offline in Windows 10 and Windows 11 has the same hardware re For more information about Windows 10 and Windows 11 requirements, see the following topics: - [Minimum hardware requirements](/windows-hardware/design/minimum/minimum-hardware-requirements-overview)- - [Hardware component guidelines](/windows-hardware/design/component-guidelines/components) > [!NOTE] You can run a Microsoft Defender Offline scan with the following: - Windows Management Instrumentation (WMI) - The Windows Security app -- ### Use PowerShell cmdlets to run an offline scan Use the following cmdlets: See the following for more information: > [!NOTE] > In Windows 10, version 1607, the offline scan could be run from under **Windows Settings** \> **Update & security** \> **Windows Defender** or from the Windows Defender client. -## Review scan results --Microsoft Defender Offline scan results will be listed in the [Scan history section of the Windows Security app](microsoft-defender-security-center-antivirus.md). - > [!TIP] > If you're looking for Antivirus related information for other platforms, see: > - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md) |
solutions | Groups Services Interactions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/groups-services-interactions.md | Creating a community (formerly known as ΓÇ£groupΓÇ¥) in Yammer creates a mailbox A Microsoft 365 group that is associated with Yammer cannot be used with a team in Microsoft Teams. +A Yammer group cannot be used with a PowerBI Pro Workspace. + **Key features provided to Groups** - Conversation area |
solutions | Microsoft 365 Groups Expiration Policy | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/microsoft-365-groups-expiration-policy.md | The group lifetime is specified in days and can be set to 180, 365 or to a custo If the group does not have an owner, the expiration emails will go to the specified administrator. -You can set the policy for all of your groups, only selected groups (up to 500), or turn it off completely by selecting **None**. Note that currently you can't have different policies for different groups. +You can set the policy for all of your groups, only selected groups (up to 500), or turn it off completely by selecting **None**. When You select **None** all groups which are active and pending for verification will have no expiration date. However, the groups that are already expired are not impacted. ++Note that currently you can't have different policies for different groups. ![Screenshot of Groups expiration settings in Azure Active Directory.](../media/azure-groups-expiration-settings.png) |