Updates from: 07/28/2022 01:26:59
Category Microsoft Docs article Related commit history on GitHub Change details
compliance Dlp Policy Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-policy-reference.md
DLP policies detect sensitive items by matching them to a sensitive information
|On-Premises repositories| Yes| Yes| No| |PowerBI|Yes | Yes| No|
+> [!NOTE]
+> DLP supports (in preview) the using trainable classifiers as a condition to detect sensitive documents. Content can be defined by trainable classifiers in Exchange email online, Sharepoint Online sites, OneDrive for Business accounts, Teams Chat and Channels, and Devices. For more information, see [Trainable Classifiers](classifier-learn-about.md).
+ > [!NOTE] > DLP supports detecting sensitivity labels on emails and attachments See, [Use sensitivity labels as conditions in DLP policies](dlp-sensitivity-label-as-condition.md#use-sensitivity-labels-as-conditions-in-dlp-policies).
Conditions are inclusive and are where you define what you want the rule to look
- [sensitive information types](sensitive-information-type-learn-about.md#learn-about-sensitive-information-types) - [sensitivity labels](sensitivity-labels.md) - [retention labels](retention.md#using-a-retention-label-as-a-condition-in-a-dlp-policy)
+- [Trainable Classifiers](classifier-learn-about.md) (in preview)
depending on the [location(s)](#location-support-for-how-content-can-be-defined) you choose to apply the policy to.
security Microsoft Defender Offline https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-offline.md
ms.mktglfcycl: manage
ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium Last updated : 07/28/2022
# Run and review the results of a Microsoft Defender Offline scan -- **Applies to:** - [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037) - [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
Microsoft Defender Offline in Windows 10 and Windows 11 has the same hardware re
For more information about Windows 10 and Windows 11 requirements, see the following topics: - [Minimum hardware requirements](/windows-hardware/design/minimum/minimum-hardware-requirements-overview)- - [Hardware component guidelines](/windows-hardware/design/component-guidelines/components) > [!NOTE]
You can run a Microsoft Defender Offline scan with the following:
- Windows Management Instrumentation (WMI) - The Windows Security app -- ### Use PowerShell cmdlets to run an offline scan Use the following cmdlets:
See the following for more information:
> [!NOTE] > In Windows 10, version 1607, the offline scan could be run from under **Windows Settings** \> **Update & security** \> **Windows Defender** or from the Windows Defender client.
-## Review scan results
-
-Microsoft Defender Offline scan results will be listed in the [Scan history section of the Windows Security app](microsoft-defender-security-center-antivirus.md).
- > [!TIP] > If you're looking for Antivirus related information for other platforms, see: > - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
solutions Groups Services Interactions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/groups-services-interactions.md
Creating a community (formerly known as ΓÇ£groupΓÇ¥) in Yammer creates a mailbox
A Microsoft 365 group that is associated with Yammer cannot be used with a team in Microsoft Teams.
+A Yammer group cannot be used with a PowerBI Pro Workspace.
+ **Key features provided to Groups** - Conversation area
solutions Microsoft 365 Groups Expiration Policy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/microsoft-365-groups-expiration-policy.md
The group lifetime is specified in days and can be set to 180, 365 or to a custo
If the group does not have an owner, the expiration emails will go to the specified administrator.
-You can set the policy for all of your groups, only selected groups (up to 500), or turn it off completely by selecting **None**. Note that currently you can't have different policies for different groups.
+You can set the policy for all of your groups, only selected groups (up to 500), or turn it off completely by selecting **None**. When You select **None** all groups which are active and pending for verification will have no expiration date. However, the groups that are already expired are not impacted.
+
+Note that currently you can't have different policies for different groups.
![Screenshot of Groups expiration settings in Azure Active Directory.](../media/azure-groups-expiration-settings.png)