Updates from: 08/18/2022 01:26:01
Category Microsoft Docs article Related commit history on GitHub Change details
compliance Compliance Easy Trials Compliance Playbook https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials-compliance-playbook.md
# Trial playbook: Microsoft Purview solutions
-Welcome to the Microsoft Purview solutions trial playbook. This playbook will help you make the most of your 90-day free trial by helping you discover robust and comprehensive capabilities of Microsoft Purview and security products.
+Welcome to the Microsoft Purview solutions trial playbook. This playbook will help you make the most of your free trial by helping you discover robust and comprehensive capabilities of Microsoft Purview and security products.
-Trying each solution will help you make informed decisions to meet your organization's compliance needs.
+## Compliance actions with Microsoft Purview
-Features:
+Easily and quickly start trying MicrosoftΓÇÖs compliance solutions without changing your organizationΓÇÖs metadata.
-- [Audit (Premium)](#audit-premium)-- [Communication Compliance](#communication-compliance)-- [Compliance Manager](#compliance-manager)-- [Data Lifecycle Management](#data-lifecycle-management)-- [Microsoft Purview Data Loss Prevention](#data-loss-prevention)-- [eDiscovery](#ediscovery)-- [Information Protection](#information-protection)-- [Insider Risk Management](#insider-risk-management)-- [Records Management](#records-management)
+Depending on your priorities, you can start with any of these solution areas to see immediate value. Here are four top organizational concerns as communicated by our customers and recommended solutions to start with.
-Optional add-ons:
-- [Compliance Manager premium assessments](#compliance-manager-premium-assessments)-- [Microsoft Priva Privacy Risk Management and Microsoft Priva Subject Rights Requests](#microsoft-priva-privacy-risk-management-and-microsoft-priva-subject-rights-requests)
+**LetΓÇÖs get started!**
-## Compliance Actions with Microsoft Purview
+## Microsoft Purview Compliance Manager
-Easily and quickly start trying Microsoft's compliance solutions without changing your organization's meta data. Depending on your priorities, you can start with any of these solution areas to see immediate value. Below are five top organizational concerns as communicated by our customers and recommended solutions to start with.
+We recommend that you become familiar with Compliance Manager and improve your organizationΓÇÖs compliance posture. What can Compliance Manager do for your organization?
+- It can help you get compliant ΓÇô with easy onboarding and step-by-step guidance
+- It can help you stay compliant ΓÇô with customizable and multi-cloud assessments
+- It can help you scale compliance ΓÇô with built-in collaboration and workflow capabilities
-## Audit (Premium)
+### Step 1: Get to know Compliance Manager
-**Conduct investigations**:
+Our Compliance Manager overview page is the best first stop for a comprehensive review of what Compliance Manager is and how it works.
-Microsoft Purview Audit (Premium) helps organizations to conduct forensic and compliance investigations by increasing audit log retention required to conduct an investigation, providing access to crucial events that help determine scope of compromise, and providing faster access to the Office 365 Management Activity API.
+- Start with the [Microsoft Purview Compliance Manager Setup Guide](https://go.microsoft.com/fwlink/?linkid=2197452).
-### Step 1: [Apply the E5 license to each user for which you'd like to generate E5 events](set-up-advanced-audit.md#step-1-set-up-audit-premium-for-users)
+You may also want to jump right to key sections of our documentation using the links below:
-> [!TIP]
-> Trial best practice: Day 1
+- [Understand your compliance score](compliance-manager.md#understanding-your-compliance-score)
+- [Overview of key elements](compliance-manager.md#key-elements-controls-assessments-templates-improvement-actions): controls, assessments, templates, and improvement actions
+- [Understand the Compliance Manager dashboard](compliance-manager-setup.md#understand-the-compliance-manager-dashboard)
+- [Filter your dashboard view](compliance-manager-setup.md#filtering-your-dashboard-view)
+- [Learn about improvement actions](compliance-manager-setup.md#improvement-actions-page)
+- [Understand assessments](compliance-manager.md#assessments)
+- [Do a quick scan of your environment using the Microsoft Compliance Configuration Analyzer for Compliance Manager (preview)](compliance-manager-mcca.md)
-Audit (Premium) features such as the ability to log crucial events such as MailItemsAccessed and Send require an appropriate E5 license assigned to users. Additionally, the Advanced Auditing app/service plan must be enabled for those users.
-Set up Audit (Premium) for users - to verify that the Advanced Auditing app is assigned to users, [perform the following steps for each user](set-up-advanced-audit.md#step-1-set-up-audit-premium-for-users).
+### Step 2: Configure Compliance Manager to manage your compliance activities
-1. Enable Audit (Premium) events - [enable SearchQueryInitiatedExchange and SearchQueryInitiatedSharePoint](set-up-advanced-audit.md#step-2-enable-audit-premium-events) to be audited for each user in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).
-1. Set up audit retention policies - [create additional audit log retention policies](set-up-advanced-audit.md#step-3-set-up-audit-retention-policies) to meet the requirements of your organization's security operations, IT, and compliance teams.
-1. Search for Audit (Premium) events - [search for crucial Audit (Premium) events](set-up-advanced-audit.md#step-4-search-for-audit-premium-events) and other activities when conducting forensic investigations.
+Start working with assessments and taking improvement actions to implement controls and improve your compliance score.
-### Step 2: [Create new Audit Log policies to specify how long to retain audit logs in your org for activities performed by users and define priority levels for your policies](audit-log-retention-policies.md#before-you-create-an-audit-log-retention-policy)
+1. [Choose a pre-built template to create and manage your first assessment](compliance-manager-assessments.md).
+1. [Understand how to use templates for building assessments](compliance-manager-templates.md).
+1. [Perform implementation and testing work on improvement actions to complete controls in your assessments](compliance-manager-improvement-actions.md).
+1. [Better understand how different actions impact your compliance score](compliance-score-calculation.md).
-> [!TIP]
-> Trial best practice: Create within the first 30 days
+> [!NOTE]
+> Microsoft 365 or Office 365 E1/E3 subscription includes Microsoft Data Protection Baseline template. Microsoft 365 or Office 365 E5, E5 Compliance includes templates for:
+>
+> - Microsoft Data Protection Baseline
+> - European Union GDPR
+> - ISO/IEC 27001,
+> - NIST 800-53
-Audit log retention policies are part of the new Audit (Premium) capabilities in Microsoft Purview. An audit log retention policy lets you specify how long to retain audit logs in your organization.
+Compliance Manager includes 300+ regulatory or premium templates that can be purchased as an add-on with [Compliance Manager premium assessments add-on](compliance-easy-trials-compliance-manager-assessments.md). With any [premium templates](compliance-manager-templates-list.md) (included with your subscription or purchased as add-on) you will receive the universal version of those templates, allowing you to manage your compliance with any product or service
-1. Before you create an audit log retention policy ΓÇô [key things to know](audit-log-retention-policies.md#before-you-create-an-audit-log-retention-policy) before creating your policy.
-1. [Create an audit log retention policy](audit-log-retention-policies.md#create-an-audit-log-retention-policy)
-1. [Manage audit log retention policies in the Microsoft Purview compliance portal](audit-log-retention-policies.md#manage-audit-log-retention-policies-in-the-compliance-portal) - Audit log retention policies are listed on the Audit retention policies tab (also called the dashboard). You can use the dashboard to view, edit, and delete audit retention policies.
-1. Create and manage audit log retention policies on PowerShell - You can also use Security & Compliance PowerShell to [create and manage audit log retention policies](audit-log-retention-policies.md#create-and-manage-audit-log-retention-policies-in-powershell). One reason to use PowerShell is to create a policy for a record type or activity that isn't available in the UI.
+### Step 3: Scaling up: use advanced functionality to meet your custom needs
-## Communication Compliance
+Custom assessments are helpful for:
-**Identify and act on code of conduct policy violations**:
+- Managing compliance for non-Microsoft 365 products such as third-party apps and services, on-premises applications, and other assets
+- Managing your own custom or business-specific compliance controls:
+ 1. [Extend a Compliance Manager template by adding your own controls and improvement actions](compliance-manager-templates-extend.md)
+ 1. [Create your own custom template](compliance-manager-templates-create.md)
+ 1. [Modify an existing template to add or remove controls and actions](compliance-manager-templates-modify.md)
+ 1. [Set up automated testing of improvement actions](compliance-manager-setup.md#set-up-automated-testing)
+ 1. [Reassign improvement actions to another user](compliance-manager-setup.md#reassign-improvement-actions-to-another-user)
-Microsoft Purview Communication Compliance helps you intelligently identify communication violations to support a compliant and healthy work environment by helping you detect inappropriate messages, investigate possible policy violations, and take steps to remediate.
+**Organizational Concerns**
-### Step 1: [Enable permissions for communication compliance](communication-compliance-configure.md#step-1-required-enable-permissions-for-communication-compliance)
+## Information protection
-> [!TIP]
-> Trial best practice: Day 1
+The first organizational concern raised by customers is understanding what, where and how sensitive, business-critical data is being used and how to protect sensitive and confidential data from unauthorized access or leakage.
-[Assign all compliance users to the Communication Compliance role group](communication-compliance-configure.md#step-1-required-enable-permissions-for-communication-compliance).
+Get data visibility and protection starting with Information Protection and Data Loss Prevention.
-### Step 2: [Enable the audit log](communication-compliance-configure.md#step-2-required-enable-the-audit-log)
+- Detect ΓÇô discover sensitive data across your entire digital estate and understand how itΓÇÖs being used.
+- Protect ΓÇô classify information and apply sensitivity labels with a unified approach.
+- Prevent ΓÇô prevent accidental, malicious, and unauthorized oversharing of sensitive data.
-> [!TIP]
-> Trial best practice: Setup within the first 30 days
+## Information Protection and Data Loss Prevention
-To use this feature, turn on auditing so your organization can start recording user and admin activity in your org. When you turn this on, activity will be recorded to the audit log and available to view in a report. To learn more, see [Turn audit log search on or off](turn-audit-log-search-on-or-off.md).
+**Discover, classify and protect your sensitive data**
-### Step 3: [Create a communication compliance policy](communication-compliance-policies.md)
+One of the main concerns for most organizations, regarding compliance regulations, is how to classify their sensitive data, how to protect it, and prevent data loss. Purview Information Protection and Data Loss Prevention solutions allow customers to discover and classify their sensitive data, to protect their sensitive data using sensitivity labels, and finally to setup data loss prevention policies to prevent unauthorized sharing, use, or transfer of sensitive data through multiple egress points. The classification, labeling, and DLP capabilities are natively built-in Microsoft 365 workloads such as SharePoint Online, Exchange Online, OneDrive for Business, and Teams. You can extend these to non-Microsoft workloads.
-[Create communication compliance policy using the existing templates](communication-compliance-policies.md): 1- Inappropriate content; 2- Sensitive information; 3- Regulatory compliance; 4- Conflict of interest.
+### Set up your information protection and data loss prevention trial
-### Step 4: [Investigate and remediate alerts](communication-compliance-investigate-remediate.md)
+Eligible customers can activate default labels and default DLP policies for Information Protection and Data Loss Prevention. When you enable the default configuration in the trial, it will take about 2 minutes to configure all policies for your tenant and up to 24 hours to see the results of these default policies.
-[Investigate and remediate](communication-compliance-investigate-remediate.md) communication compliance alerts.
+Choosing the default configuration, with 1-click, the following is automatically configured:
-## Compliance Manager
+- Sensitivity labels and a sensitivity label policy
+- Client-side auto-labeling
+- Service-side auto-labeling
+- Data loss prevention (DLP) policies for Teams and devices
-**Manage your organizational compliance easily**:
+[Activate the default labels and policies](mip-easy-trials.md#activate-the-default-labels-and-policies). If necessary, you can edit it manually after the configuration is complete. If necessary, you can edit it manually after the configuration is complete.
-Microsoft Purview Compliance Manager can help you throughout your compliance journey, from taking inventory of your data protection risks to managing the complexities of implementing controls, staying current with regulations and certifications, and reporting to auditors.
+You can follow the actions below or alternatively, use the [Microsoft Purview Information Protection Setup Guide](https://go.microsoft.com/fwlink/?linkid=2197428) to set up your Information Protection and Data Loss Protection.
-### Step 1: [Get to know Compliance Manager](compliance-manager-quickstart.md#first-visit-get-to-know-compliance-manager)
+**Actions to try:**
-> [!TIP]
-> Trial best practice: Day 1
+## Microsoft Purview Information Protection
-Our Compliance Manager overview page is the best first stop for a comprehensive review of what Compliance Manager is and how it works. You may also want to jump right to key sections of our documentation using the links below:
+### Step 1: Automatically apply sensitivity labels to documents
-- [Understand your compliance score](compliance-manager.md#understanding-your-compliance-score)-- [Overview of key elements: controls, assessments, templates, and improvement actions](compliance-manager.md#key-elements-controls-assessments-templates-improvement-actions)-- [Understand the Compliance Manager dashboard](compliance-manager-setup.md#understand-the-compliance-manager-dashboard)-- [Filter your dashboard view](compliance-manager-setup.md#filtering-your-dashboard-view)-- [Learn about improvement actions](compliance-manager-setup.md#improvement-actions-page)-- [Understand assessments](compliance-manager.md#assessments)-- [Do a quick scan of your environment using the Microsoft Compliance Configuration Manager](compliance-manager-mcca.md)
+When you create a sensitivity label, you can automatically assign that label to files and emails when it matches conditions that you specify.
-![Compliance Manager - dashboard.](../media/compliance-manager-dashboard.png "Compliance Manager dashboard")
+1. [Create and configure sensitivity labels](create-sensitivity-labels.md#create-and-configure-sensitivity-labels)
+1. [Publish sensitivity label policy to all users](create-sensitivity-labels.md#publish-sensitivity-labels-by-creating-a-label-policy)
+1. Create an [auto-labeling policy](apply-sensitivity-label-automatically.md)
+ - Choose info you want label applied to
+ - Define locations to apply label
+ - Select label to apply
+ - Run policy in simulation mode
-### Step 2: [Configure Compliance Manager to manage your compliance activities](compliance-manager-assessments.md)
-> [!TIP]
-> Trial best practice: Inspect within the first 30 days
+### Step 2: Review and turn on auto-labeling policy
-Start working with assessments and taking improvement actions to implement controls and improve your compliance score.
+Now on the Information protection > Auto-labeling page, you see your auto-labeling policy in the Simulation section.
-1. [Choose a pre-built template to create and manage your first assessment](compliance-manager-assessments.md).
-1. [Understand how to use templates for building assessments](compliance-manager-templates.md).
-1. [Perform implementation and testing work on improvement actions to complete controls in your assessments](compliance-manager-improvement-actions.md).
-1. [Better understand how different actions impact your compliance score](compliance-score-calculation.md).
+1. Select your policy to see the details of the configuration and status. When the simulation is complete, select the Items to review tab to see which emails or documents matched the rules that are specified.
+1. When youΓÇÖre ready to run the policy without simulation, select the Turn on policy option.
-> [!NOTE]
-> Microsoft 365 or Office 365 E1/E3 subscription includes Microsoft Data Protection Baseline template. Microsoft 365 or Office 365 E5, E5 Compliance includes templates for:
->
-> - Microsoft Data Protection Baseline
-> - European Union GDPR
-> - ISO/IEC 27001,
-> - NIST 800-53
->
-> Compliance Manager includes 300+ regulatory or premium templates that can be purchased as an add-on. See the list here. With any premium templates (included with your subscription or purchased as add-on) you will receive the universal version of those templates, allowing you to manage your compliance with any product or service
+## Microsoft Purview Data Loss Prevention
-### Step 3: [Scaling up: use advanced functionality to meet your custom needs](compliance-manager-templates-create.md)
+### Step 1: Prevent data loss on Microsoft Teams locations
-Custom assessments are helpful for:
+If your organization has data loss prevention (DLP), you can define policies that prevent people from sharing sensitive information in a Microsoft Teams channel or chat session.
-- Managing compliance for non-Microsoft 365 products such as third-party apps and services, on-premises applications, and other assets-- Managing your own custom or business-specific compliance controls
+1. [Learn about DLP Licensing for Microsoft Teams and the scope of DLP protection](dlp-microsoft-teams.md#dlp-licensing-for-microsoft-teams)
+1. [Add Microsoft Teams as a location to existing DLP policies](dlp-microsoft-teams.md#add-microsoft-teams-as-a-location-to-existing-dlp-policies)
+1. [Configure our default DLP policy for Teams or define a new DLP policy for Microsoft Teams](mip-easy-trials.md)
-1. [Extend a Compliance Manager template by adding your own controls and improvement actions](compliance-manager-templates-extend.md)
-1. [Create your own custom template](compliance-manager-templates-create.md)
-1. [Modify an existing template to add or remove controls and actions](compliance-manager-templates-modify.md)
-1. [Set up automated testing of improvement actions](compliance-manager-setup.md#set-up-automated-testing)
-1. [Reassign improvement actions to another user](compliance-manager-setup.md#reassign-improvement-actions-to-another-user)
+### Step 2: Prevent data loss on devices
-## Data Lifecycle Management
+Microsoft Purview DLP for endpoints allows you to detect and prevent when sensitive items are used or shared on Windows 10, Windows 11 and macOS devices.
-**Govern at scale with automation**:
+1. Prepare your endpoints - make sure that the Windows 10 and macOS devices that you plan on deploying Endpoint DLP [meet these requirements](endpoint-dlp-getting-started.md#skusubscriptions-licensing).
+1. [Onboard devices into device management](endpoint-dlp-getting-started.md#windows-10-and-windows-11-onboarding-procedures) - You must onboard your endpoints before you can detect and protect sensitive items on a device. Both of these actions are done in the Microsoft Purview compliance portal.
+ - Scenario 1 ΓÇô Onboarding devices that have not been onboarded yet.
+ - Scenario 2 - Microsoft Defender for Endpoint is already deployed and there are endpoints reporting in. All these endpoints will appear in the managed devices list.
+1. [Configure our default DLP policy for devices or define a new DLP policy for devices](mip-easy-trials.md#dlp-for-devices).
+1. [View Endpoint DLP alerts](dlp-configure-view-alerts-policies.md) in DLP Alerts Management dashboard.
+1. [View Endpoint DLP data](data-classification-activity-explorer.md) in activity explorer.
-Improve your ability to adapt to changes in your organization with policy scopes that automatically update. Automate labelling of content to reduce manual efforts and improve compliance posture.
+### Step 3: Expand policies in scope or protection
-### Step 1: Dynamically target retention policies with Adaptive Policy Scopes
+You have flexibility in how you configure your DLP policies. You can start with our default DLP policy for Teams and devices and expand those policies to protect additional locations, sensitive information types, or labels. Note customers can run a DLP policy in test mode to understand or fine tune how the policy is working before it is turned on. In addition, you can expand upon the policy actions and customize alerting.
-> [!TIP]
-> Trial best practice: Day 1
+1. Add locations
+1. Add sensitive information types or labels to protect
+1. Add actions
+ - Teams:
+ i. [Prevent external access to sensitive documents](dlp-microsoft-teams.md#prevent-external-access-to-sensitive-documents)
+ i. [Get policy tips to help educate users and instructions for customizing policy tips](dlp-microsoft-teams.md#policy-tips-help-educate-users)
+ - Devices: switch from audit only to block
+1. [Configure and view alerts for data loss prevention policies](dlp-configure-view-alerts-policies.md)
-Adaptive policy scopes allow you to dynamically target a policy to certain users, groups, or sites based on their AD attributes. Attributes for scopes can be selected from a list or customized using an advanced query builder.
+## Microsoft Purview data governance
-Policies using adaptive policy scopes stay current as the organization changes with new employees joining or leaving. Additionally, they are not subject to the previous limits of 100/1,000 locations included in a policy.
+The second organizational concern customers convey is how to reduce risk and meet regulations by classifying data to keep what they need and delete what they don't need. Customers want compliant lifecycle management of sensitive data, to meet record keeping obligations, and to reduce the risk from over-retained data.
-- Create an [Adaptive Policy Scope](retention.md#adaptive-or-static-policy-scopes-for-retention), and use it with a retention policy
+Microsoft Purview Data Lifecycle Management and Records Management help you to:
-### Step 2: Automate labeling to apply a label to all items by default
+- Apply retention and deletion policies to data where users collaborate to manage risk and prevent productivity loss.
+- Ensure the correct policies are enforced by auto-classifying content.
+- Comply with record keeping obligations with immutability options, defensible disposal, and advanced policy targeting.
-> [!TIP]
-> Trial best practice: Setup within the first 30 days
+## Microsoft Purview Data Lifecycle Management
-Default labels allow you to automatically apply a retention label to all items within a specified library, folder, or document set in SharePoint.
+### Govern at scale with automation
-- Publish a label and apply it as default in [SharePoint](create-apply-retention-labels.md#applying-a-default-retention-label-to-all-content-in-a-sharepoint-library-folder-or-document-set)
+Start with the [Data Lifecycle Management Setup Guide](https://go.microsoft.com/fwlink/?linkid=2197335). Additionally, you may want to consider implementing these common scenarios:
-## Data Loss Prevention
+1. Auto-apply retention or deletion settings to sensitive data
+1. Auto-apply retention or deletion settings to everything in a SharePoint document library
+1. Target a retention or deletion policy to only specific users or mailboxes
-**Protect sensitive data**:
+### Step 1: Auto-apply retention or deletion settings to sensitive data
-To comply with business standards and industry regulations, organizations need to protect sensitive info to prevent its inadvertent disclosure. Set up Microsoft Purview Data Loss Prevention policies to identify, monitor, and automatically protect sensitive info across Microsoft 365.
+Start by managing the lifecycle of sensitive data by managing it automatically using retention and deletion settings. First, decide on the type of sensitive data that you want to protect. You may want to use one of our pre-built [sensitive information types](sensitive-information-type-learn-about.md). Next, [create a retention label](retention.md#retention-labels) with your desired retention or deletion settings. Finally, [automatically apply the retention label](apply-retention-labels-automatically.md#auto-apply-labels-to-content-with-specific-types-of-sensitive-information) that contains the sensitive information type you selected.
-### Step 1: [Protect data loss on Teams locations](dlp-microsoft-teams.md#dlp-licensing-for-microsoft-teams)
+### Step 2: Auto-apply retention or deletion settings to everything in a SharePoint document library, folder, or document set
-> [!TIP]
-> Trial best practice: Day 1
+You can set a default retention label in SharePoint to automatically apply it to all items within a specific document library, folder, or document set in SharePoint. This option is useful when users store a specific type of document in one of these locations.
-If your organization has data loss prevention (DLP), you can define policies that prevent people from sharing sensitive information in a Microsoft Teams channel or chat session.
+First, identify the content you would like to manage and the location of the content in SharePoint. Next, [create a retention label](retention.md#retention-labels) with your desired retention or deletion settings. Finally, [publish the retention to the document library, folder, or document set](create-apply-retention-labels.md#applying-a-default-retention-label-to-all-content-in-a-sharepoint-library-folder-or-document-set).
-1. Learn about [DLP Licensing for Microsoft Teams and the scope of DLP protection](dlp-microsoft-teams.md#dlp-licensing-for-microsoft-teams)
-1. [Add Microsoft Teams as a location to existing DLP policies](dlp-microsoft-teams.md#add-microsoft-teams-as-a-location-to-existing-dlp-policies)
-1. [Configure our default DLP policy for Teams](mip-easy-trials.md) or [Define a new DLP policy for Microsoft Teams](dlp-microsoft-teams.md#define-a-new-dlp-policy-for-microsoft-teams)
+### Step 3: Dynamically target retention policies with Adaptive Policy Scopes
-### Step 2: [Protect data loss on device locations](endpoint-dlp-getting-started.md)
+Many customers want to target a retention policy to specific users or mailboxes. For example, they may want to apply a longer retention period to the mailboxes of people in leadership roles or apply shorter retention to shared mailboxes. Adaptive policy scopes allow you to do this by using their AD attributes to target the policy. If one of the attribute values changes then the retention policy will automatically update its membership.
-> [!TIP]
-> Trial best practice: Setup within the first 30 days
+First, [decide what attributes you will use to target](retention-settings.md#configuration-information-for-adaptive-scopes) the users or mailboxes that you want to include or exclude from your policy. Next, [Create an Adaptive Policy Scope and use it with a retention policy](retention.md#adaptive-or-static-policy-scopes-for-retention).
-Microsoft Endpoint DLP allows you to monitor Windows 10 devices and detect when sensitive items are used and shared.
+## Microsoft Purview Records Management
-1. Prepare your endpoints - make sure that the Windows 10 and macOS devices that you plan on deploying Endpoint DLP to [meet these requirements](endpoint-dlp-getting-started.md)
-1. [Onboard devices into device management](endpoint-dlp-getting-started.md) - You must enable device monitoring and onboard your endpoints before you can monitor and protect sensitive items on a device. Both of these actions are done in the Microsoft Purview compliance portal.
- - Scenario 1 ΓÇô [Onboarding devices](endpoint-dlp-getting-started.md) that have not been onboarded yet.
- - Scenario 2 - [Microsoft Defender for Endpoint is already deployed and there are endpoints reporting in](endpoint-dlp-getting-started.md). All these endpoints will appear in the managed devices list.
-1. [Configure our default DLP policy for devices](mip-easy-trials.md#dlp-for-devices) or [Define a new DLP policy for devices](endpoint-dlp-learn-about.md).
-1. [View Endpoint DLP alerts](dlp-configure-view-alerts-policies.md) in DLP Alerts Management dashboard.
-1. [View Endpoint DLP data](data-classification-activity-explorer.md) in activity explorer.
+**Manage high-value items for business, legal, or regulatory record-keeping requirements**
-### Step 3: [Expand policies in scope or protection](dlp-learn-about-dlp.md#dlp-policy-configuration-overview)
+Records Management helps you to comply with more granular retention and deletion requirements. As an example, you can track your retention schedule or use flexible automation options. Additionally, you can make content immutable, trigger retention using an event, or require approval before items are disposed.
-You have flexibility in how you configure your DLP policies. You can start with our default DLP policy for Teams and devices and expand those policies to protect additional locations, sensitive information types, or labels. In addition, you can expand upon the policy actions and customize alerting.
+Here are our most popular records management scenarios:
-1. Add locations
-1. Add sensitive information types or labels to protect
-1. Add actions
- - Teams:
- - [Prevent external access to sensitive documents](dlp-microsoft-teams.md#prevent-external-access-to-sensitive-documents)
- - [Get policy tips to help educate users and instructions for customizing policy tips](dlp-microsoft-teams.md#policy-tips-help-educate-users)
- - Devices: switch from audit only to block
-1. [Configure and view alerts for data loss prevention policies - Microsoft Purview | Microsoft Docs](dlp-configure-view-alerts-policies.md)
+1. Automatically apply a retention label based on SharePoint file metadata
+1. Conduct a disposition review at the end of a retention period
+1. Make content immutable to prevent users from editing it
-## eDiscovery
+### Step 1: Automatically apply a retention label based on SharePoint file metadata
-**Discover more with an end-to-end workflow**:
+Auto-applying labels removes the need for your users to manually perform the labeling activities. As an example, you can auto-apply retention labels to content that has specific metadata properties in SharePoint.
+First, decide the metadata properties you would like to use, the locations where you want to look for matches, and the retention or deletion settings you want to apply. Next, [create a retention label](retention.md#retention-labels). Then, [follow the steps](auto-apply-retention-labels-scenario.md) to auto-apply the label based on SharePoint metadata.
-Take advantage of an end-to-end workflow for preserving, collecting, analyzing, and exporting content that's responsive to your organization's internal and external investigations. Legal teams can also manage the entire legal hold notification process by communicating with custodians involved in a case.
+### Step 2: Review content to approve before it's permanently deleted
-### Step 1 (required): [Permissions](https://aka.ms/ediscoveryninja)
+Some organizations have a requirement to review content at the end of its retention period before it is permanently deleted. Using Records Management, users you specify ("reviewers") can be notified to review the content and approve the permanent disposal action. Reviewers can also choose to assign a different retention period to the content or postpone deletion. Learn more here: Disposition of content.
-> [!TIP]
-> Trial best practice: Day 1
+### Step 3: Make content immutable to prevent users from editing it
-To access eDiscovery (Premium) or be added as a member of an eDiscovery (Premium) case, a user must be assigned the appropriate permissions.
+Some content has a lifecycle phase where both the file and the metadata should not be available for editing, often called declaring the content as an immutable record. Learn how to configure this option in Records Management: [Create a retention label that declares content as a record or a regulatory record](declare-records.md).
-1. [Set up eDiscovery (Premium) ΓÇô Assign eDiscovery permissions](get-started-with-advanced-ediscovery.md#step-2-assign-ediscovery-permissions)
-1. [Add or remove members from a case](add-or-remove-members-from-a-case-in-advanced-ediscovery.md)
+## Manage insider risks
-### Step 2 (required): Create a Case
+The third organizational concern we hear is how to protect your data and respond to potential insider data security incident risks, which may include data theft and inappropriate sharing of confidential information across all platforms like email and IM (e.g. Microsoft Teams).
+
+Using Insider Risk Management and Communication Compliance you can quickly identify and act on insider data security incidents and regulatory requirement risks, empowering you to collaborate with your Security, HR, Legal and other teams, depending on your organization.
-> [!TIP]
-> Trial best practice: Create within the first 30 days
+- Get rich insights ΓÇô identifying hidden risks with customizable ML templates requiring no endpoint agents.
+- Investigate ΓÇô integrated investigation workflows enable end-to-end collaboration across Security, HR and Legal.
+- Know privacy is built-in ΓÇô protect user privacy and prevent bias by removing identifiable user details, like name or email, while mitigating organizational risk.
-More organizations use the eDiscovery (Premium) solution in Microsoft Purview for critical eDiscovery processes. This includes responding to regulatory requests, investigations, and litigation.
+## Microsoft Purview Insider Risk Management
-1. Manage eDiscovery (Premium) ΓÇô [learn how to configure eDiscovery (Premium), manage cases, manage a workflow in eDiscovery (Premium), and analyze eDiscovery (Premium) search results](/learn/modules/manage-advanced-ediscovery).
-1. [Create an eDiscovery case using Advance eDiscovery's new case format](advanced-ediscovery-new-case-format.md)
-1. [Close or delete a case](close-or-delete-case.md) - When the legal case or investigation is completed, you can close or delete. You can also reopen a closed case.
+**Detect and remediate insider risks**
-### Step 3 (optional): Settings
+Leverage end-to-end workflows to help you quickly identify, triage, and remediate. Using logs from Microsoft 365 and Azure services, you can define policies to identify potential data security incidents and take remediation actions such as promoting user education or initiating an investigation.
-To allow people in your organization start to create and use cases, you must configure global settings that apply to all cases in your organization. At this time, the only global setting is **attorney-client privilege detection** (more global settings will be available in the future).
+### Step 1 (required): Enable permissions for Insider Risk Management
-1. [Set up eDiscovery (Premium) ΓÇô Global Settings](get-started-with-advanced-ediscovery.md#step-3-configure-global-settings-for-ediscovery-premium)
-1. [Configure search and analytics settings](configure-search-and-analytics-settings-in-advanced-ediscovery.md)
-1. [Manage jobs in eDiscovery (Premium)](managing-jobs-ediscovery20.md)
+There are four role groups used to configure permissions to manage Insider Risk Management features, which have different roles and level of access. Setting up permissions to Insider Risk Management is key before proceeding.
-### Step 4 (optional): [Compliance Boundaries](set-up-compliance-boundaries.md)
+[Add users to an insider risk management role group](insider-risk-management-configure.md#add-users-to-an-insider-risk-management-role-group)
-Compliance boundaries create logical boundaries within an organization that control the user content locations (such as mailboxes, OneDrive accounts, and SharePoint sites) that eDiscovery managers can search. They also control who can access eDiscovery cases used to manage the legal, human resources, or other investigations within your organization.
+If you are not able to see permissions, please talk to your tenant admin to assign the correct roles.
-![Compliance boundaries consist of search permissions filters that control access to agencies and admin role groups that control access to eDiscovery cases.](../media/M365_ComplianceBoundary_OrgChart_v2.png)
+### Step 2 (required): Enable the Microsoft 365 audit log
-Set up compliance boundaries for eDiscovery investigations:
+Auditing is enabled for Microsoft 365 organizations by default. Some organizations may have disabled auditing for specific reasons. If auditing is disabled for your organization, it might be because another administrator has turned it off. We recommend confirming that itΓÇÖs OK to turn auditing back on when completing this step.
-1. [Identify a user attribute to define your agencies](set-up-compliance-boundaries.md#step-1-identify-a-user-attribute-to-define-your-agencies)
-1. [Create a role group for each agency](set-up-compliance-boundaries.md#step-2-create-a-role-group-for-each-agency)
-1. [Create a search permissions filter to enforce the compliance boundary](set-up-compliance-boundaries.md#step-3-create-a-search-permissions-filter-to-enforce-the-compliance-boundary)
-1. [Create an eDiscovery case for an intra-agency investigations](set-up-compliance-boundaries.md#step-4-create-an-ediscovery-case-for-intra-agency-investigations)
+For step-by-step instructions to turn on auditing, see [Turn audit log search on or off](turn-audit-log-search-on-or-off.md). After you turn on auditing, a message is displayed that says the audit log is being prepared and that you can run a search in a couple of hours after the preparation is complete. You only have to do this action once. For more information about using the Microsoft 365 audit log, see [Search the audit log](search-the-audit-log-in-security-and-compliance.md).
-### Step 5 (optional): [Learn about Content search tool](search-for-content.md)
+### Step 3 (recommended): Enable and view Insider Risk Management analytics insights
-Use the Content search tool in the Microsoft Purview compliance portal to quickly find email in Exchange mailboxes, documents in SharePoint sites and OneDrive locations, and instant messaging conversations in Skype for Business. You can use the content search tool to search for email, documents, and instant messaging conversations in collaboration tools such as Microsoft Teams and Microsoft 365 Groups.
+Analytics within Insider Risk Management enables you to conduct an evaluation of potential insider risks that may lead to a data security incident in your organization without configuring any insider risk policies. Analytics scan results may take up to 48 hours before insights are available as reports for review. These assessment results are aggregated and anonymized, and offer organization-wide insights, like the percentage of users performing potential sensitive data exfiltration activities.
-- [Learn more about eDiscovery (Premium) search](search-for-content.md#search-for-content)
+To learn more about analytics insights, see [Insider risk management settings: Analytics](insider-risk-management-settings.md#analytics) and check out the [Insider risk management analytics video](https://www.youtube.com/watch?v=5c0P5MCXNXk) to help you understand your insider risk posture and help you take action by setting up appropriate policies to identify risky users.
-## Information Protection
+> [!NOTE]
+> To enable insider risk analytics, you must be a member of the Insider Risk Management or Insider Risk Management Admin.
-**Discover, classify and protect your sensitive information**:
+### Step 4: Start with Recommended actions
-Implement Microsoft Purview Information Protection and sensitivity labels, to help you discover, classify, and protect your sensitive content wherever it lives or travels.
+Quickly get started and get the most out of Insider Risk Management capabilities with Recommended actions. Included on the Overview page, recommended actions will help guide you through the steps to configure and deploy policies and to take investigation actions for user actions that generate alerts from policy matches.
-### Step 1: [Start your information protection trial](mip-easy-trials.md)
+[Select a recommendation from the list](insider-risk-management-configure.md#recommended-actions-preview) to get started with configuring insider risk management.
-> [!TIP]
-> Trial best practice: Day 1
-Eligible customers can activate default labels and policies for Microsoft Purview Information Protection. When you enable the default configuration in the trial, it will take about 2 minutes to configure all policies for your tenant and up to 24 hours to see the results of these default policies.
+Each recommended action guides you through the required activities for the recommendation, including any requirements, what to expect, and the impact of configuring the feature in your organization.
-Choosing the default configuration, with 1-click, the following is automatically configured:
+Note that the recommended steps in the playbook (above) may also be included in the Recommended actions shown in the portal.
-- Sensitivity labels and a sensitivity label policy-- Client-side auto-labeling-- Service-side auto-labeling-- Data loss prevention (DLP) policies for Teams and devices
+Set up recommendations are also available on the Microsoft docs page, via the [Microsoft Purview Insider Risk Management Setup Guide](https://go.microsoft.com/fwlink/?linkid=2197153).
-[Activate the default labels and policies](mip-easy-trials.md#activate-the-default-labels-and-policies). If necessary, you can edit manually after the configuration is complete.
+To fully leverage the functionality of Insider Risk Management, we recommend setting up policies for your organization to better identify potential risky actions that may lead to a security incident, leveraging templates for Data leaks or Data theft.
-### Step 2: [Automatically apply sensitivity labels to documents](apply-sensitivity-label-automatically.md)
+## Microsoft Purview Communication Compliance
-> [!TIP]
-> Trial best practice: Setup within the first 30 days
+**Identify regulatory compliance policy violations**
-When you create a sensitivity label, you can automatically assign that label to files and emails when it matches conditions that you specify.
+Microsoft Purview Communication Compliance helps organizations detect explicit regulatory compliance violations such as SEC or FINRA obligations, including inappropriate sharing of sensitive or confidential information. With built in workflows, the solution can help you investigate and remediate possible regulatory compliance violations. Built with privacy by design, this solution has usernames pseudonymized by default, role-based access controls are built-in, investigators must be explicitly added by an administrator to a policy, and audit logs are in place to help ensure user-level privacy.
-1. [Create and configure sensitivity labels](create-sensitivity-labels.md#create-and-configure-sensitivity-labels)
-1. [Publish sensitivity label policy to all users](create-sensitivity-labels.md#publish-sensitivity-labels-by-creating-a-label-policy)
-1. [Create an auto-labeling policy](create-sensitivity-labels.md#publish-sensitivity-labels-by-creating-a-label-policy)
- - Choose info you want label applied to
- - Define locations to apply label
- - Select label to apply
- - [Run policy in simulation mode](create-sensitivity-labels.md#publish-sensitivity-labels-by-creating-a-label-policy)
+### Step 1: Enable permissions for communication compliance
-![New policy configuration for auto-labeling.](../media/auto-labeling-wizard.png)
+Assign users communication compliance roles to be able to use the product. The "Communication Compliance" role group gives you all the permissions to use the product. Learn about other communication compliance role groups here: [Get started with communication compliance](communication-compliance-configure.md#step-1-required-enable-permissions-for-communication-compliance).
-### Step 3: [Review and turn on auto-labeling policy](apply-sensitivity-label-automatically.md#how-to-configure-auto-labeling-policies-for-sharepoint-onedrive-and-exchange)
+### Step 2: Enable the audit log
-Now on the **Information protection** > **Auto-labeling** page, you see your auto-labeling policy in the **Simulation** section.
+To use this feature, turn on auditing. When you turn this on actions will be available in the audit log and view in a report. To learn more, see [Turn audit log search on or off](turn-audit-log-search-on-or-off.md).
-Select your policy to see the details of the configuration and status. When the simulation is complete, select the Items to review tab to see which emails or documents matched the rules that are specified.
+### Step 3: Review recommended actions insights
-When you're ready to run the policy without simulation, select the **Turn on policy** option.
+Included on the Policies page, recommended actions helps you discover risks you may not be aware of, like inappropriate sharing of sensitive or confidential information that are already occurring in your organization. This view includes only the aggregate number of matches per classification type, with none of the insights containing any personally identifiable information, and helps you determine the type and scope of communication compliance policies to configure.
-## Insider Risk Management
+### Step 4: Create a communication compliance policy
-**Detect and remediate insider risks**:
+Create a communication compliance policy using the existing templates: 1- Sensitive information; 2- Regulatory compliance; 3- Conflict of interest. Learn more about our out of the box policy templates and how to create a custom policy here: [Communication compliance policies](communication-compliance-policies.md).
-Leverage artificial intelligence to help you quickly identify, triage, and remediate internal risks. Using logs from Microsoft 365 and Azure services, you can define policies that monitor for insider risk signals, then take remediation actions such as promoting user education or initiating an investigation.
+### Step 5: Investigate and remediate alerts
-### Step 1 (required): [Enable permissions for insider risk management](insider-risk-management-configure.md#step-1-required-enable-permissions-for-insider-risk-management)
+[Investigate and remediate communication compliance alerts](communication-compliance-investigate-remediate.md).
-> [!TIP]
-> Trial best practice: Day 1
+### Step 6: Review reports for insights
-There are four role groups used to configure permissions to manage insider risk management features.
+[Review reports for insights on your overall communication compliance posture](communication-compliance-reports-audits.md).
-[Add users to an insider risk management role group.](insider-risk-management-configure.md#add-users-to-an-insider-risk-management-role-group)
+## Discover & respond
-If you are not able to see permissions, please talk to your tenant admin to assign the correct roles.
+The fourth organizational concern from customers is how to find relevant data when needed for investigations, regulatory requests, or litigations and for meeting regulatory requirements.
-### Step 2: [Start with user quick start guide](insider-risk-management-configure.md#recommended-actions-preview)
+With eDiscovery and Audit, you can discover data efficiently.
-Quickly get started and get the most out of insider risk management capabilities with recommended actions. Included on the Overview page, recommended actions help guide you through the steps to configure and deploy policies and to take investigation actions for user actions that generate alerts from policy matches.
+- Discover and collect data in-place ΓÇô collect, filter, and gain data insights faster, with greater visibility.
+- Manage workflows ΓÇô reduce the friction of identifying and collecting potential sources of relevant information by automatically mapping unique and shared data sources.
+- Accelerate the discovery process ΓÇô manage the increase of data volume by searching and processing highly relevant content in-place.
-[Select a recommendation from the list](insider-risk-management-configure.md#recommended-actions-preview) to get started with configuring insider risk management.
+## Microsoft Purview eDiscovery (Premium)
-![Insider risk management recommended actions.](../media/insider-risk-recommended-actions.png)
+Discover more efficiently with an end-to-end workflow
+Take advantage of an end-to-end workflow for preserving, collecting, analyzing, and exporting content thatΓÇÖs responsive to your organizationΓÇÖs internal and external investigations. Legal teams can also manage the entire legal hold notification process by communicating with custodians involved in a case.
-Each recommended action guides you through the required activities for the recommendation, including any requirements, what to expect, and the impact of configuring the feature in your organization.
+### Step 1 (required): Permissions
+
+To access eDiscovery (Premium) or be added as a member of an eDiscovery (Premium) case, a user must be assigned the appropriate permissions.
+
+1. [Set up eDiscovery (Premium) ΓÇô Assign eDiscovery permissions](get-started-with-advanced-ediscovery.md#step-2-assign-ediscovery-permissions)
+1. [Add or remove members from a case](add-or-remove-members-from-a-case-in-advanced-ediscovery.md)
+
+### Step 2 (required): Create a Case
+
+More organizations use the eDiscovery (Premium) solution in Microsoft 365 for critical eDiscovery processes. This includes responding to regulatory requests, investigations, and litigation.
+
+1. Manage eDiscovery (Premium) ΓÇô [learn how to configure eDiscovery (Premium), manage cases by using the Security & Compliance Center, manage a workflow in Advanced eDiscovery, and analyze Advanced eDiscovery search results](/learn/modules/manage-advanced-ediscovery).
+1. [Create an eDiscovery case](advanced-ediscovery-new-case-format.md) using eDiscovery PremiumΓÇÖs new case format
+1. [Close or delete a case](close-or-delete-case.md) - When the legal case or investigation is completed, you can close or delete. You can also reopen a closed case.
-### Step 3 (required): [Enable the Microsoft 365 audit log](insider-risk-management-configure.md#step-2-required-enable-the-microsoft-365-audit-log)
+### Step 3 (optional): Settings
-Auditing is enabled for Microsoft 365 organizations by default. Some organizations may have disabled auditing for specific reasons. If auditing is disabled for your organization, it might be because another administrator has turned it off. We recommend confirming that it's OK to turn auditing back on when completing this step.
+To allow people in your organization start to create and use cases, you must configure global settings that apply to all cases in your organization. You can manage settings such as attorney-client privilege detection, historical versions and many more.
-For step-by-step instructions to turn on auditing, see [Turn audit log search on or off](turn-audit-log-search-on-or-off.md). After you turn on auditing, a message is displayed that says the audit log is being prepared and that you can run a search in a couple of hours after the preparation is complete. You only have to do this action once. For more information about the using the Microsoft 365 audit log, see [Search the audit log](search-the-audit-log-in-security-and-compliance.md).
+1. [Configure global settings for eDiscovery (Premium)](get-started-with-advanced-ediscovery.md#step-3-configure-global-settings-for-ediscovery-premium)
+1. [Configure search and analytics settings](configure-search-and-analytics-settings-in-advanced-ediscovery.md)
+1. [Manage jobs in eDiscovery (Premium)](managing-jobs-ediscovery20.md)
-### Step 4 (required): [Enable and view insider risk analytics insights](insider-risk-management-configure.md#step-3-optional-enable-and-view-insider-risk-analytics-insights)
+### Step 4 (optional): Compliance Boundaries
-Insider risk management analytics enables you to conduct an evaluation of potential insider risks in your organization without configuring any insider risk policies. Analytics scan results may take up to 48 hours before insights are available as reports for review. To learn more about analytics insights, see [Insider risk management settings: Analytics (preview)](insider-risk-management-settings.md) and check out the [Insider Risk Management Analytics video](https://www.youtube.com/watch?v=5c0P5MCXNXk) to help you understand your insider risk posture and help you take action by setting up appropriate policies to identify risky users.
+Compliance boundaries create logical boundaries within an organization that control the user content locations (such as mailboxes, OneDrive accounts, and SharePoint sites) that eDiscovery managers can search. They also control who can access eDiscovery cases used to manage the legal, human resources, or other investigations within your organization.
-To enable insider risk Analytics, you must be a member of the Insider Risk Management or Insider Risk Management Admin. [Complete these steps to enable insider risk analytics](insider-risk-management-configure.md).
-## Records Management
+Set up compliance boundaries for eDiscovery investigations:
-**Manage high-value items for business, legal, or regulatory record-keeping requirements**:
+1. [Identify a user attribute to define your agencies](set-up-compliance-boundaries.md#step-1-identify-a-user-attribute-to-define-your-agencies)
+1. [Create a role group for each agency](set-up-compliance-boundaries.md#step-2-create-a-role-group-for-each-agency)
+1. [Create a search permissions filter to enforce the compliance boundary](set-up-compliance-boundaries.md#step-3-create-a-search-permissions-filter-to-enforce-the-compliance-boundary)
+1. [Create an eDiscovery case for an intra-agency investigations](set-up-compliance-boundaries.md#step-4-create-an-ediscovery-case-for-intra-agency-investigations)
-Use integrated Microsoft Purview Records Management features to automate the retention schedule for organizational regulatory, legal, and business-critical records. Leverage automation capabilities from creation through collaboration, to declare records, retain contents, and dispose of them at the end.
+### Step 5 (optional): eDiscovery PremiumΓÇÖs collection tool
-### Step 1: Mark contents as records
+Use the [eDiscovery (Premium) collection workflow](create-draft-collection.md#create-a-draft-collection) to quickly find email in Exchange mailboxes, documents in SharePoint sites and OneDrive locations, and instant messaging conversations in Teams. Collections in eDiscovery (Premium) help eDiscovery managers quickly scope a search for content across email, documents, Teams reactions, and other content in Microsoft 365. Collections provide managers with an estimate of the content that may be relevant to the case.
-> [!TIP]
-> Trial best practice: Day 1
+[Learn more about collection queries and estimates.](building-search-queries.md)
-When content is declared a record, restrictions are placed on the item in terms of what actions are allowed or blocked, additional activities about the items are logged, and you have proof of disposition if the items are deleted at the end of their retention period.
+## Microsoft Purview Audit (Premium)
-- Create a retention label that [declares content as a record or a regulatory record](declare-records.md)
+**Conduct investigations**
-### Step 2: Review content to approve before it's permanently deleted
+Advanced Audit helps organizations to conduct forensic and compliance investigations by increasing audit log retention required to conduct an investigation, providing access to crucial events that help determine scope of compromise, and providing faster access to the Office 365 Management Activity API.
-> [!TIP]
-> Trial best practice: Day 1
+### Step 1: Apply the E5 license to each user for which youΓÇÖd like to generate E5 events
-At the end of the retention period, users you specify ("reviewers") can be notified to review the content and approve the permanent disposal action. This supports if a different action than deletion is more appropriate, such as assigning a different retention period to the content or suspending deletion for an audit.
+Audit (Premium) features such as the ability to log crucial events such as MailItemsAccessed and Send require an appropriate E5 license assigned to users. Additionally, the Advanced Auditing app/service plan must be enabled for those users.
-- [Create a retention label that uses disposition review](disposition.md#disposition-reviews)
+Set up Audit (Premium) for users - to verify that the Advanced Auditing app is assigned to users, [perform the following steps for each user](set-up-advanced-audit.md#step-1-set-up-audit-premium-for-users).
-### Step 3: Apply labels automatically to content that matches specific conditions
+1. Enable Audit (Premium) events - [enable SearchQueryInitiatedExchange and SearchQueryInitiatedSharePoint](set-up-advanced-audit.md#step-2-enable-audit-premium-events) to be audited for each user in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).
+1. Set up audit retention policies - [create additional audit log retention policies](set-up-advanced-audit.md#step-3-set-up-audit-retention-policies) to meet the requirements of your organizationΓÇÖs security operations, IT, and compliance teams.
+1. Search for Audit (Premium) events - [search for crucial Audit (Premium) events](set-up-advanced-audit.md#step-4-search-for-audit-premium-events) and other activities when conducting forensic investigations.
-> [!TIP]
-> Trial best practice: Setup within the first 30 days
+### Step 2: Create new Audit Log policies to specify how long to retain audit logs in your org for activities performed by users and define priority levels for your policies
-Auto-applying labels removes the need for you users to manually perform the labeling activities. You can apply retention labels to content automatically when that content doesn't already have a retention label applied and contains sensitive information, keywords or searchable properties, or a match for trainable classifiers.
+Audit log retention policies are part of the new Advanced Audit capabilities in Microsoft 365. An audit log retention policy lets you specify how long to retain audit logs in your organization.
-- [Auto-apply retention labels to content with specific types of sensitive information](apply-retention-labels-automatically.md#auto-apply-labels-to-content-with-specific-types-of-sensitive-information)-- [Auto-apply retention labels to content using trainable classifiers](apply-retention-labels-automatically.md#auto-apply-labels-to-content-by-using-trainable-classifiers)-- [Auto-apply retention labels with keywords or searchable properties](apply-retention-labels-automatically.md#auto-apply-labels-to-content-with-keywords-or-searchable-properties)
+1. Before you create an audit log retention policy ΓÇô [key things to know](audit-log-retention-policies.md#before-you-create-an-audit-log-retention-policy) before creating your policy.
+1. [Create an audit log retention policy](audit-log-retention-policies.md#create-an-audit-log-retention-policy).
+1. [Manage audit log retention policies in the Microsoft Purview compliance portal](audit-log-retention-policies.md#manage-audit-log-retention-policies-in-the-compliance-portal) - Audit log retention policies are listed on the Audit retention policies tab (also called the dashboard). You can use the dashboard to view, edit, and delete audit retention policies.
+1. [Create and manage audit log retention policies on PowerShell](audit-log-retention-policies.md#create-and-manage-audit-log-retention-policies-in-powershell) - You can also use Security & Compliance Center PowerShell to create and manage audit log retention policies. One reason to use PowerShell is to create a policy for a record type or activity that isnΓÇÖt available in the UI.
## Additional trials and add-ons
compliance Data Classification Activity Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/data-classification-activity-explorer.md
Every account that accesses and uses data classification must have a license ass
An account must be explicitly assigned membership in any one of these role groups or explicitly granted the role.
-### Roles and Role Groups in preview
+### Roles and Role Groups
-There are roles and role groups in preview that you can test out to fine-tune your access controls.
+There are roles and role groups that you can use to fine-tune your access controls.
Here's a list of applicable roles that are in preview. To learn more about them, see [Roles in the Security & Compliance Center](../security/office-365-security/permissions-in-the-security-and-compliance-center.md#roles-in-the-security--compliance-center)
compliance Device Onboarding Offboarding Macos Intune Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-offboarding-macos-intune-mde.md
full disk access |[fulldisk.mobileconfig](https://github.com/microsoft/mdatp
1. In the **Configuration profiles** page, choose the profile that you just created, in this example *AccessibilityformacOS* and choose **Device status** to see a list of devices and the deployment status of the configuration profile.
-### Update configuration profiles
+### Update existing system configuration profiles
-1. Update the existing full disk access profile with the **fulldisk.mobileconfig** file.
-1. Update exisiting MDE preferences profile with these values
-
-```xml
-<key>features</key>
-<dict>
- <key>systemExtensions</key>
- <string>enabled</string>
- <key>dataLossPrevention</key>
- <string>enabled</string>
-</dict>
-```
+1. A Full Disk Access configuration profile should have been previously created and deployed for MDE. See, [Intune-based deployment for Microsoft Defender for Endpoint on Mac](/microsoft-365/security/defender-endpoint/mac-install-with-intune#full-disk-access). Endpoint DLP requires an additional Full Disk Access permission for a new application: `com.microsoft.dlp.daemon`.
+ 1. Update the existing Fullfull Disk Access configuration profile with the fulldisk.mobileconfig file.
+
+1. Find the existing MDE Preferences configuration profile. See, [Set preferences for Microsoft Defender for Endpoint on macOS](/microsoft-365/security/defender-endpoint/mac-preferences#intune-full-profile)
+ 1. Add a new key to the profile using these values:
+
+```xml
+<key>features</key>
+<dict>
+ <key>systemExtensions</key>
+ <string>enabled</string>
+ <key>dataLossPrevention</key>
+ <string>enabled</string>
+</dict>
+```
+
+Here's an [example mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/settings/data_loss_prevention/com.microsoft.wdav.mobileconfig)
+
## Offboard macOS devices using Intune > [!IMPORTANT]
compliance Device Onboarding Offboarding Macos Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-offboarding-macos-intune.md
Onboarding a macOS device into Compliance solutions is a six phase process.
1. [Deploy the onboarding package](#deploy-the-onboarding-package) 1. [Enable system extension](#enable-system-extension) 1. [Get the installation package](#get-the-installation-package)
-1. [Deploy the installation package](#deploy-the-microsoft-dlp-installation-package)
+1. [Publish application](#publish-application)
### Create system configuration profiles
full disk access |[fulldisk.mobileconfig](https://github.com/microsoft/mdatp
> Before you can deploy the *wdav.pkg.* package via Intune, it must be reformatted using the *Intune App Wrapping Tools for Mac* into the *wdav.pkg.intunemac* format.
-### Deploy the Microsoft DLP installation package
+### Publish application
-1. Follow the procedures in [How to add macOS line-of-business (LOB) apps to Microsoft Intune](/mem/intune/apps/lob-apps-macos) to convert the *wdav.pkg* file into the proper format and deploy it through Intune.
+Microsoft Endpoint DLP is installed as a component of Microsoft Defender for Endpoint (MDE) on macOS
+
+1. Follow the procedures in [Intune-based deployment for Microsoft Defender for Endpoint on macOS](/microsoft-365/security/defender-endpoint/mac-install-with-intune#publish-application) to deploy MDE to enrolled macOS devices.
## Offboard macOS devices using Intune
compliance Encryption Azure Ad Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/encryption-azure-ad-configuration.md
To ensure access to the encryption service isn't inadvertently blocked, use the
## Cross-tenant access settings and encrypted content
+> [!IMPORTANT]
+> Another organization's cross-tenant access settings can be responsible for either their users being unable to open content that your users have encrypted, or your users being unable to open content encrypted by the other organization.
+>
+> The message that users see indicates which organization blocked access. You might need to direct the Azure AD admin from another organization to this section.
+ By default, there's nothing to configure for cross-tenant authentication to work when users protect content by using encryption from the Azure Rights Management Service. However, your organization can restrict access by using Azure AD [External Identities cross-tenant access settings](/azure/active-directory/external-identities/cross-tenant-access-overview). Conversely, another organization can also configure these settings to restrict access with users in your organization. These settings affect opening any encrypted items, which include encrypted emails and encrypted documents.
-For example, another organization might have settings configured that prevent their users from opening content encrypted by your organization. In this scenario, until their Azure AD admin reconfigures their cross-tenant settings, an external user attempting to open that content will see a message that informs them **Access is blocked by the organization** with an email address to contact to request access.
+For example, another organization might have settings configured that prevent their users from opening content encrypted by your organization. In this scenario, until their Azure AD admin reconfigures their cross-tenant settings, an external user attempting to open that content will see a message that informs them **Access is blocked by your organization** with a reference to **Your tenant administrator**. In that message, the external users see their own organization domain name that identifies it's their Azure AD tenant, rather than yours, that's responsible for blocking the access.
+
+Your users will see a similar message but with your own organization name when it's your Azure AD configuration that blocks access. From the perspective of the signed in user, if it's another Azure AD organization that's responsible for blocking access, the message changes to **Access is blocked by the organization** and the domain name of that other organization.
Whenever cross-tenant access settings restrict access by applications, they must be configured to allow access to **Microsoft Azure Information Protection**, which has the following an app ID:
compliance Sit Defn Australia Business Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-australia-business-number.md
description: "Australia business number sensitive information type entity defini
# Australia business number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 11 digits with optional delimiters
compliance Sit Defn Australia Company Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-australia-company-number.md
description: "Australia company number sensitive information type entity definit
# Australia company number
-This sensitive information type is only available for use in:
-- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps ## Format
compliance Sit Defn Austria Identity Card https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-austria-identity-card.md
description: "Austria identity card sensitive information type entity definition
# Austria identity card
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format A 24-character combination of letters, digits, and special characters
compliance Sit Defn Austria Value Added Tax https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-austria-value-added-tax.md
description: "Austria value added tax sensitive information type entity definiti
# Austria value added tax
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 11-character alphanumeric pattern
compliance Sit Defn Belgium Value Added Tax Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-belgium-value-added-tax-number.md
description: "Belgium value added tax number sensitive information type entity d
# Belgium value added tax number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 12-character alphanumeric pattern
compliance Sit Defn Bulgaria Uniform Civil Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-bulgaria-uniform-civil-number.md
description: "Bulgaria uniform civil number sensitive information type entity de
# Bulgaria uniform civil number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 10 digits without spaces and delimiters
compliance Sit Defn Cyprus Identity Card https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-cyprus-identity-card.md
description: "Cyprus identity card sensitive information type entity definition.
# Cyprus identity card
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 10 digits without spaces and delimiters
compliance Sit Defn Cyprus Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-cyprus-tax-identification-number.md
description: "Cyprus tax identification number sensitive information type entity
# Cyprus tax identification number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format eight digits and one letter in the specified pattern
compliance Sit Defn Estonia Personal Identification Code https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-estonia-personal-identification-code.md
description: "Estonia Personal Identification Code sensitive information type en
# Estonia personal identification code
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 11 digits without spaces and delimiters
compliance Sit Defn Finland European Health Insurance Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-finland-european-health-insurance-number.md
description: "Finland european health insurance number sensitive information typ
# Finland european health insurance number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 20-digit number
compliance Sit Defn France Health Insurance Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-france-health-insurance-number.md
description: "France health insurance number sensitive information type entity d
# France health insurance number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 21-digit number
compliance Sit Defn France Value Added Tax Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-france-value-added-tax-number.md
description: "France value added tax number sensitive information type entity de
# France value added tax number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 13 character alphanumeric pattern
compliance Sit Defn Germany Value Added Tax Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-germany-value-added-tax-number.md
description: "Germany value added tax number sensitive information type entity d
# Germany value added tax number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 11 character alphanumeric pattern
compliance Sit Defn Greece Social Security Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-greece-social-security-number.md
description: "Greece Social Security Number (AMKA) sensitive information type en
# Greece Social Security Number (AMKA)
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 11 digits without spaces and delimiters
compliance Sit Defn Greece Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-greece-tax-identification-number.md
description: "Greece tax identification number sensitive information type entity
# Greece tax identification number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format Nine digits without spaces and delimiters
compliance Sit Defn Hungary Personal Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-hungary-personal-identification-number.md
description: "Hungary personal identification number sensitive information type
# Hungary personal identification number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 11 digits
compliance Sit Defn Hungary Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-hungary-tax-identification-number.md
description: "Hungary tax identification number sensitive information type entit
# Hungary tax identification number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 10 digits with no spaces or delimiters
compliance Sit Defn Hungary Value Added Tax Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-hungary-value-added-tax-number.md
description: "Hungary value added tax number sensitive information type entity d
# Hungary value added tax number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 10 character alphanumeric pattern
compliance Sit Defn Italy Fiscal Code https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-italy-fiscal-code.md
description: "Italy fiscal code sensitive information type entity definition."
# Italy fiscal code
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format a 16-character combination of letters and digits in the specified pattern
compliance Sit Defn Italy Value Added Tax Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-italy-value-added-tax-number.md
description: "Italy value added tax number sensitive information type entity def
# Italy value added tax number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 13 character alphanumeric pattern with optional delimiters
compliance Sit Defn Japan My Number Corporate https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-japan-my-number-corporate.md
description: "Japan My Number - Corporate sensitive information type entity defi
# Japan My Number - Corporate
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 13-digit number
compliance Sit Defn Japan My Number Personal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-japan-my-number-personal.md
description: "Japan My Number - Personal sensitive information type entity defin
# Japan My Number - Personal
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 12-digit number
compliance Sit Defn Lithuania Personal Code https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-lithuania-personal-code.md
description: "Lithuania personal code sensitive information type entity definiti
# Lithuania personal code
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 11 digits without spaces and delimiters
compliance Sit Defn Luxemburg National Identification Number Natural Persons https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-luxemburg-national-identification-number-natural-persons.md
description: "Luxemburg national identification number (natural persons) sensiti
# Luxemburg national identification number (natural persons)
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 13 digits with no spaces or delimiters
compliance Sit Defn Malta Identity Card Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-malta-identity-card-number.md
description: "Malta identity card number sensitive information type entity defin
# Malta identity card number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format seven digits followed by one letter
compliance Sit Defn Netherlands Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-netherlands-tax-identification-number.md
description: "Netherlands tax identification number sensitive information type e
# Netherlands tax identification number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format nine digits without spaces or delimiters
compliance Sit Defn Netherlands Value Added Tax Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-netherlands-value-added-tax-number.md
description: "Netherlands value added tax number sensitive information type enti
# Netherlands value added tax number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 14 character alphanumeric pattern
compliance Sit Defn New Zealand Bank Account Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-new-zealand-bank-account-number.md
description: "New Zealand bank account number sensitive information type entity
# New Zealand bank account number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 14-digit to 16-digit pattern with optional delimiter
compliance Sit Defn New Zealand Drivers License Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-new-zealand-drivers-license-number.md
description: "New Zealand driver's license number sensitive information type ent
# New Zealand drivers license number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format eight character alphanumeric pattern
compliance Sit Defn New Zealand Inland Revenue Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-new-zealand-inland-revenue-number.md
description: "New Zealand inland revenue number sensitive information type entit
# New Zealand inland revenue number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format eight or nine digits with optional delimiters
compliance Sit Defn New Zealand Social Welfare Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-new-zealand-social-welfare-number.md
description: "New Zealand social welfare number sensitive information type entit
# New Zealand social welfare number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format nine digits
compliance Sit Defn Poland Regon Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-poland-regon-number.md
description: "Poland REGON number sensitive information type entity definition."
# Poland REGON number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 9-digit or 14-digit number
compliance Sit Defn Poland Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-poland-tax-identification-number.md
description: "Poland tax identification number sensitive information type entity
# Poland tax identification number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 11 digits with no spaces or delimiters
compliance Sit Defn Romania Personal Numeric Code https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-romania-personal-numeric-code.md
description: "Romania personal numeric code (CNP) sensitive information type ent
# Romania personal numeric code (CNP)
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 13 digits without spaces and delimiters
compliance Sit Defn Russia Passport Number Domestic https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-russia-passport-number-domestic.md
description: "Russia passport number domestic sensitive information type entity
# Russia passport number domestic
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 10-digit number
compliance Sit Defn Russia Passport Number International https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-russia-passport-number-international.md
description: "Russia passport number international sensitive information type en
# Russia passport number international
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format nine-digit number
compliance Sit Defn Slovakia Personal Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slovakia-personal-number.md
description: "Slovakia personal number sensitive information type entity definit
# Slovakia personal number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format nine or 10 digits containing optional backslash
compliance Sit Defn Slovenia Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slovenia-tax-identification-number.md
description: "Slovenia tax identification number sensitive information type enti
# Slovenia tax identification number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format eight digits with no spaces or delimiters
compliance Sit Defn Slovenia Unique Master Citizen Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-slovenia-unique-master-citizen-number.md
description: "Slovenia Unique Master Citizen Number sensitive information type e
# Slovenia Unique Master Citizen Number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 13 digits without spaces or delimiters
compliance Sit Defn Spain Dni https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-spain-dni.md
description: "Spain DNI sensitive information type entity definition."
# Spain DNI
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format eight digits followed by one character
compliance Sit Defn Spain Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-spain-tax-identification-number.md
description: "Spain tax identification number sensitive information type entity
# Spain tax identification number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format seven or eight digits and one or two letters in the specified pattern
compliance Sit Defn Sweden Tax Identification Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-sweden-tax-identification-number.md
description: "Sweden tax identification number sensitive information type entity
# Sweden tax identification number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 10 digits and a symbol in the specified pattern
compliance Sit Defn Switzerland Ssn Ahv Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-switzerland-ssn-ahv-number.md
description: "Switzerland SSN AHV number sensitive information type entity defin
# Switzerland SSN AHV number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 13-digit number
compliance Sit Defn Uk Unique Taxpayer Reference Number https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-uk-unique-taxpayer-reference-number.md
description: "U.K. Unique Taxpayer Reference Number sensitive information type e
# U.K. Unique Taxpayer Reference Number
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format 10 digits without spaces and delimiters
compliance Sit Defn Ukraine Passport Domestic https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-ukraine-passport-domestic.md
description: "Ukraine passport domestic sensitive information type entity defini
# Ukraine passport domestic
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format nine digits
compliance Sit Defn Ukraine Passport International https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sit-defn-ukraine-passport-international.md
description: "Ukraine passport international sensitive information type entity d
# Ukraine passport international
-This sensitive information type is only available for use in:
--- data loss prevention policies-- communication compliance policies-- data lifecycle management-- records management-- Microsoft Defender for Cloud Apps- ## Format eight-character alphanumeric pattern
enterprise Move Sharepoint Between Geo Locations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/move-sharepoint-between-geo-locations.md
Power Apps need to be recreated in the destination location.
### Data movement between geo locations
-SharePoint uses Azure Blob storage for its content, while the metadata associated with sites and its files is stored within SharePoint. After the site is moved from its source geo location to its destination geo location, the service will also move its associated Blob Storage. Blob Storage moves complete in approximately 40 days.
+SharePoint uses Azure Blob Storage for its content, while the metadata associated with sites and its files is stored within SharePoint. After the site is moved from its source geo location to its destination geo location, the service will also move its associated Blob Storage. Blob Storage moves complete in approximately 40 days. This will not have any impact to users interaction with the data.
+
+You can check the Blob Storage move status using the [Get-SPOCrossGeoMoveReport](/powershell/module/sharepoint-online/get-spocrossgeomovereport) cmdlet.
security TOC https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/TOC.md
##### [Protect your network](network-protection.md) ##### [Evaluate network protection](evaluate-network-protection.md) ##### [Turn on network protection](enable-network-protection.md)
+##### [Network protection for Linux](network-protection-linux.md)
+##### [Network protection for MacOS](network-protection-macos.md)
#### [Web protection]() ##### [Web protection overview](web-protection-overview.md) ##### [Web threat protection]()
security Network Protection Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection-linux.md
+
+ Title: Use network protection to help prevent Linux connections to bad sites
+description: Protect your network by preventing Linux users from accessing known malicious and suspicious network addresses
+keywords: Network protection, Linux exploits, malicious website, ip, domain, domains, command and control, SmartScreen, toast notification
+ms.mktglfcycl: manage
+ms.sitesec: library
+ms.pagetype: security
+ms.localizationpriority: medium
+audience: ITPro
+++++
+ms.technology: mde
++
+- m365initiative-m365-defender
+- M365-security-compliance
Last updated :++
+# Network protection for Linux
++
+**Applies to:**
+
+- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)
+- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)
+- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
+
+> [!IMPORTANT]
+> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+
+## Overview
+
+Microsoft is bringing Network Protection functionality to Linux.
+
+Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host:
+
+- phishing scams
+- exploits
+- other malicious content on the Internet
+
+Network protection expands the scope of Microsoft Defender [SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md) to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources. The blocks on outbound HTTP(s) traffic is based on the domain or hostname.
+
+## Web content filtering for Linux
+
+You can use web content filtering for testing with Network protection for Linux. See [Web content filtering](web-content-filtering.md).
+
+### Known issues
+
+- Network Protection is implemented as a virtual private network (VPN) tunnel. Advanced packet routing options using custom nftables/iptables scripts are available.
+- Block/Warn UX isn't available
+ - Customer feedback is being collected to drive further design improvements
+
+> [!NOTE]
+> To evaluate the effectiveness of Linux Web Threat Protection, we recommend using the Firefox browser which is the default for all the distributions.
+
+### Prerequisites
+
+- Licensing: Microsoft Defender for Endpoint tenant (can be trial) and platform specific requirements found in [Microsoft Defender for Endpoint for non-Windows platforms](non-windows.md#licensing-requirements)
+- Onboarded Machines:
+ - **Minimum Linux version**: For a list of supported distributions, see [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).
+ - **Microsoft Defender for Endpoint Linux client version**: 101.78.13 -insiderFast(Beta)
+
+## Instructions
+
+Deploy Linux manually, see [Deploy Microsoft Defender for Endpoint on Linux manually](linux-install-manually.md)
+
+The following example shows the sequence of commands needed to the mdatp package on ubuntu 20.04 for insiders-Fast channel.
+
+```bash
+curl -o microsoft.list https://packages.microsoft.com/config/ubuntu/20.04/insiders-fast.list
+sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-insiders-fast.list
+sudo apt-get install gpg
+curl https://packages.microsoft.com/keys/microsoft.asc | sudo apt-key add -
+sudo apt-get install apt-transport-https
+sudo apt-get update
+sudo apt install -y mdatp
+```
+
+### Device Onboarding
+
+To onboard the device, you must download the Python onboarding package for Linux server from Microsoft 365 Defender -> Settings -> Device Management -> Onboarding and run:
+
+```bash
+sudo python3 MicrosoftDefenderATPOnboardingLinuxServer.py
+```
+
+### Manually enable network protection
+
+1. Turn on the ΓÇ£networkProtectionΓÇ¥ feature, edit the ΓÇ£/etc/opt/microsoft/mdatp/wdacfgΓÇ¥ and set **networkProtection** to **enabled**.
+2. Restart the mdatp service by running the following command:
+
+```bash
+sudo systemctl restart mdatp
+```
+> :::image type="content" source="images/network-protection-linux-mdatp-restart.png" alt-text="Shows Linux mdatp restart." lightbox="images/network-protection-linux-mdatp-restart.png":::
+
+### Configure the enforcement level
+
+Network protection is disabled by default, but it can be configured to run in one of the following modes (also called enforcement levels):
+
+- **Audit**: useful to make sure it doesn't affect line-of-business apps, or get an idea of how often blocks occur
+- **Block**: network protection prevents connection to malicious websites
+- **Disabled**: all components associated with Network Protection are disabled
+
+```bash
+sudo mdatp config network-protection enforcement-level --value block
+```
+
+or
+
+```bash
+sudo mdatp config network-protection enforcement-level --value audit
+```
+
+To confirm Network Protection has successfully started, run the following command from the Terminal; verify that it prints ΓÇ£startedΓÇ¥:
+
+```bash
+mdatp health --field network_protection_status
+```
+
+### Validation
+
+A. Check Network Protection has effect on always blocked sites:
+
+- [http://www.smartscreentestratings2.net](http://www.smartscreentestratings2.net)
+- [https://www.smartscreentestratings2.net](https://www.smartscreentestratings2.net)
+- [http://malw-090-0-1.phsh-005-0-1.smartscreentestratings.com/](http://malw-090-0-1.phsh-005-0-1.smartscreentestratings.com/)
+
+B. Inspect diagnostic logs
+
+```bash
+$ sudo mdatp log level set --level debug
+$ sudo tail -f /var/log/microsoft/mdatp/microsoft_defender_np_ext.logΓÇ»
+```
+
+#### To exit the validation mode
+
+Disable network protection and restart the network connection:
+
+```bash
+$ sudo mdatp config network-protection enforcement-level --value disabled
+```
+
+## Advanced configuration
+
+By default, Linux network protection is active on the default gateway; routing and tunneling are internally configured.
+To customize the network interfaces, change the **networkSetupMode** parameter from the **/opt/microsoft/mdatp/conf/** configuration file and restart the service:
+
+```bash
+sudo systemctl restart mdatp
+```
+
+The configuration file also enables the user to customize:
+
+- proxy setting
+- SSL certificate stores
+- tunneling device name
+- IP
+- and more
+
+The default values were tested for all distributions as described in [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
+
+### Microsoft Defender portal
+
+Also, make sure that in **Microsoft Defender** > **Settings** > **Endpoints** > **Advanced features** that **ΓÇÿCustom network indicatorsΓÇÖ** toggle is set _enabled_.
+
+> [!IMPORTANT]
+> The above **ΓÇÿCustom network indicatorsΓÇÖ** toggle controls **Custom Indicators** enablement **for ALL platforms with Network Protection support, including Windows. Reminder that - on Windows - for indicators to be enforced you also must have Network Protection explicitly enabled.
+
+>:::image type="content" source="images/network-protection-linux-defender-security-center-advanced-features-settings.png" alt-text="MEM Create Profile" lightbox="images/network-protection-linux-defender-security-center-advanced-features-settings.png":::
+
+## How to explore the features
+
+1. Learn how to [Protect your organization against web threats](web-threat-protection.md) using web threat protection.
+ - Web threat protection is part of web protection in Microsoft Defender for Endpoint. It uses network protection to secure your devices against web threats.
+2. Run through the [Custom Indicators of Compromise](indicator-ip-domain.md) flow to get blocks on the Custom Indicator type.
+3. Explore [Web content filtering](web-content-filtering.md).
+ > [!NOTE]
+ > If you are removing a policy or changing device groups at the same time, this might cause a delay in policy deployment.
+ > Pro tip: You can deploy a policy without selecting any category on a device group. This action will create an audit only policy, to help you understand user behavior before creating a block policy.
+4. [Integrate Microsoft Defender for Endpoint with Cloud App Security](/defender-cloud-apps/mde-integration.md) and your network protection-enabled macOS devices will have endpoint policy enforcement capabilities.
+ > [!NOTE]
+ > Discovery and other features are currently not supported on these platforms.
+
+## Scenarios
+
+The following scenarios are supported during public preview:
+
+### Web threat protection
+
+Web threat protection is part of Web protection in Microsoft Defender for Endpoint. It uses network protection to secure your devices against web threats. By integrating with Microsoft Edge and popular third-party browsers like Chrome and Firefox, web threat protection stops web threats without a web proxy. Web threat protection can protect devices while they're on premises or away. Web threat protection stops access to the following types of sites:
+
+- phishing sites
+- malware vectors
+- exploit sites
+- untrusted or low-reputation sites
+- sites you've blocked in your custom indicator list
+
+>:::image type="content" source="images/network-protection-reports-web-protection.png" alt-text="Web Protection reports web threat detections." lightbox="images/network-protection-reports-web-protection.png":::
+
+For more information, see [Protect your organization against web threat](web-threat-protection.md)
+
+#### Custom Indicators of Compromise
+
+Indicator of compromise (IoCs) matching is an essential feature in every endpoint protection solution. This capability gives SecOps the ability to set a list of indicators for detection and for blocking (prevention and response).
+
+Create indicators that define the detection, prevention, and exclusion of entities. You can define the action to be taken as well as the duration for when to apply the action and the scope of the device group to apply it to.
+
+Currently supported sources are the cloud detection engine of Defender for Endpoint, the automated investigation and remediation engine, and the endpoint prevention engine (Microsoft Defender Antivirus).
+
+>:::image type="content" source ="images/network-protection-add-url-domain-indicator.png" alt-text="Shows network protection add URL or domain indicator." lightbox="images/network-protection-add-url-domain-indicator.png":::
+
+For more information, see: [Create indicators for IPs and URLs/domains](indicator-ip-domain.md).
+
+### Web content filtering
+
+Web content filtering is part of the [Web protection](web-protection-overview.md) capabilities in Microsoft Defender for Endpoint and Microsoft Defender for Business. Web content filtering enables your organization to track and regulate access to websites based on their content categories. Many of these websites (even if they're not malicious) might be problematic because of compliance regulations, bandwidth usage, or other concerns.
+
+Configure policies across your device groups to block certain categories. Blocking a category prevents users within specified device groups from accessing URLs associated with the category. For any category that's not blocked, the URLs are automatically audited. Your users can access the URLs without disruption, and you'll gather access statistics to help create a more custom policy decision. Your users will see a block notification if an element on the page they're viewing is making calls to a blocked resource.
+
+Web content filtering is available on the major web browsers, with blocks performed by Windows Defender SmartScreen (Microsoft Edge) and Network Protection (Chrome, Firefox, Brave, and Opera). For more information about browser support, see [Prerequisites](#prerequisites).
+
+> :::image type="content" source="images/network-protection-wcf-add-policy.png" alt-text="Shows network protection web content filtering add policy." lightbox="images/network-protection-wcf-add-policy.png":::
+
+For more information about reporting, see [Web content filtering](web-content-filtering.md).
+
+### Microsoft Defender for Cloud Applications
+
+The Microsoft Defender for Cloud Applications / Cloud App Catalog identifies apps you would want end users to be warned upon accessing with Microsoft 365 Defender for Endpoint, and mark them as _Monitored_. The domains listed under monitored apps would be later synced to Microsoft 365 Defender for Endpoint:
+
+> :::image type="content" source="images/network-protection-macos-mcas-monitored-apps.png" alt-text="Shows network protection mcas monitored apps." lightbox="images/network-protection-macos-mcas-monitored-apps.png":::
+
+Within 10-15 minutes, these domains will be listed in Microsoft 365 Defender for Endpoint Security Center under Indicators > URLs/Domains with Action=Warn. Within the enforcement SLA (see details at the end of this article).
+
+> :::image type="content" source="images/network-protection-macos-mcas-cloud-app-security.png" alt-text="Shows network protection mcas cloud app security." lightbox="images/network-protection-macos-mcas-cloud-app-security.png":::
+
+## See also
+
+- [Protect your network](network-protection.md)
+- [Turn on network protection](enable-network-protection.md)
+- [Web protection](web-protection-overview.md)
+- [Create indicators](manage-indicators.md)
+- [Web content filtering](web-content-filtering.md)
security Network Protection Macos https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection-macos.md
+
+ Title: Use network protection to help prevent macOS connections to bad sites
+description: Protect your network by preventing macOS users from accessing known malicious and suspicious network addresses
+keywords: Network protection, MacOS exploits, malicious website, ip, domain, domains, command and control, SmartScreen, toast notification
+ms.mktglfcycl: manage
+ms.sitesec: library
+ms.pagetype: security
+ms.localizationpriority: medium
+audience: ITPro
+++++
+ms.technology: mde
++
+- m365initiative-m365-defender
+- M365-security-compliance
Last updated :++
+# Network protection for macOS
++
+**Applies to:**
+
+- [Microsoft Microsoft 365 Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)
+- [Microsoft Microsoft 365 Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)
+- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
+
+> [!IMPORTANT]
+> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+
+## Overview
+
+Microsoft is bringing Network protection functionality to macOS (min. macOS 11).
+
+Microsoft Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host:
+
+- phishing scams
+- exploits
+- other malicious content on the Internet
+
+Network protection expands the scope of Microsoft 365 Defender [SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md) to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources. The blocks on outbound HTTP(s) traffic are based on the domain or hostname.
+
+## New and updated capabilities
+
+- You can run your corporate VPN in tandem or ΓÇ£side by sideΓÇ¥ with network protection. Currently, no VPN conflicts are identified. If you do experience conflicts, you can provide feedback through the feedback channel listed at the bottom of this page.
+ - Web content filtering is supported with network protection for macOS.
+ - If network protection is configured and active on the device, web content filtering (WCF) policies created in the MDEP Portal are respected in browsers, including Chromium Microsoft Edge for macOS. Web content filtering in Microsoft Edge on Mac currently requires network protection; other E5 feature, such as Microsoft Defender for Cloud Applications or Custom Indicators currently also require network protection.
+
+### Known issues
+
+- Block/Warn UX isn't customizable and might require other look and feel changes
+ - Customer feedback is being collected to drive further design improvements
+
+### Important notes
+
+- We donΓÇÖt recommend controlling network protection from System Preferences by using the Disconnect button. Instead, use the mdatp command-line tool or JAMF / Intune to control network protection for macOS.
+- To evaluate effectiveness of macOS web threat protection, we recommend trying it in browsers other than Microsoft Edge for macOS (for example, Safari). Microsoft Edge for macOS has built-in web threat protection that is enabled regardless of whether the Mac network protection feature you're evaluating, is turned on or not.
+
+> [!NOTE]
+>
+> Microsoft Edge for macOS does not currently support web content filtering, custom indicators, or other enterprise features. However, network protection will provide this protection to Microsoft Edge for macOS as well if network protection is enabled.
+
+## Prerequisites
+
+- Licensing: Microsoft 365 Defender for Endpoint tenant (can be trial)
+- Onboarded Machines:
+ - Minimum macOS version: 11
+ - Product version 101.78.13 or later
+ - Your device must be in either the InsiderSlow (Preview) or InsiderFast (Beta) Microsoft AutoUpdate update channel. You can check the update channel using the following command:
+
+```bash
+mdatp --health releaseRing
+```
+
+If your device isn't already in the InsiderSlow(Preview) update channel, execute the following command from the Terminal. The channel update takes effect next time the product starts (when the next product update is installed or when the device is rebooted).
+
+```bash
+defaults write com.microsoft.autoupdate2 ChannelName -string InsiderSlow
+```
+
+Alternatively, if you are in a managed environment (JAMF or Intune), you can configure the device group remotely. For more information, see [Set preferences for Microsoft 365 Defender for Endpoint on macOS](mac-preferences.md).
+
+## Deployment instructions
+
+### Microsoft 365 Defender for Endpoint
+
+After youΓÇÖve configured your device to be in the InsiderSlow(preview) update channel, install the most recent product version through Microsoft AutoUpdate. To open Microsoft AutoUpdate, run the following command from the Terminal:
+
+```bash
+open /Library/Application\ Support/Microsoft/MAU2.0/Microsoft\ AutoUpdate.app
+```
+
+Configure the product with your organization information using the instructions in our public documentation.
+
+Network protection is disabled by default, but it can be configured to run in one of the following modes (also called enforcement levels):
+
+- **Audit**: useful to make sure it doesn't affect line-of-business apps, or get an idea of how often blocks occur
+- **Block**: network protection prevents connection to malicious websites
+- **Disabled**: all components associated with network protection are disabled
+
+You can deploy this feature in one of the following ways: manually, through JAMF, or through Intune. The following sections describe each of these methods in detail.
+
+#### Manual deployment
+
+To configure the enforcement level, run the following command from the Terminal:
+
+```bash
+mdatp config network-protection enforcement-level --value [enforcement-level]
+```
+
+For example, to configure network protection to run in blocking mode, execute the following command:
+
+```bash
+mdatp config network-protection enforcement-level --value block
+```
+
+To confirm that network protection has been started successfully, run the following command from the Terminal, and verify that it prints ΓÇ£startedΓÇ¥:
+
+```bash
+mdatp health --field network_protection_status
+```
+
+#### JAMF deployment
+
+A successful JAMF deployment requires a configuration profile to set the enforcement level of network protection.
+After you create this configuration profile, assign it to the devices where you want to enable network protection.
+
+##### Configure the enforcement level
+
+Note: If youΓÇÖve already configured Microsoft 365 Defender for Endpoint on Mac using the instructions listed here, then update the plist file you previously deployed with the content listed below and redeploy it from JAMF.
+
+1. In **Computers** > **Configuration Profiles**, select **Options** > **Applications & Custom Settings**
+2. Select **Upload File** (PLIST file)
+3. Set preference domain to _com.microsoft.wdav_
+4. Upload the following plist file
+
+```xml
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
+<plist version="1.0">
+<dict>
+ <key>networkProtection</key>
+ <dict>
+ <key>enforcementLevel</key>
+ <string>block</string>
+ </dict>
+</dict>
+</plist>
+```
+
+#### Intune deployment
+
+A successful Intune deployment requires a configuration profile to set the enforcement level of network protection.
+After you create this configuration profile, assign it to the devices where you want to enable network protection.
+
+##### Configure the enforcement level using Intune
+
+> [!NOTE]
+> If youΓÇÖve already configured Microsoft Defender for Endpoint on Mac using the instructions listed here, then update the plist file you previously deployed with the content listed below and re-deploy it from Intune.
+
+1. OpenΓÇ»**Manage**ΓÇ»>ΓÇ»**Device configuration**. SelectΓÇ»**Manage**ΓÇ»>ΓÇ»**Profiles**ΓÇ»>ΓÇ»**Create Profile**.
+2. Specify a name for the profile. Change **Platform=macOS** to **Profile type=Custom**. Select **Configure**.
+3. Save the following payload as _com.microsoft.wdav.xml_
+
+```xml
+<?xml version="1.0" encoding="utf-8"?>
+<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
+<plist version="1">
+ <dict>
+ <key>PayloadUUID</key>
+ <string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
+ <key>PayloadType</key>
+ <string>Configuration</string>
+ <key>PayloadOrganization</key>
+ <string>Microsoft</string>
+ <key>PayloadIdentifier</key>
+ <string>com.microsoft.wdav</string>
+ <key>PayloadDisplayName</key>
+ <string>Microsoft Defender ATP settings</string>
+ <key>PayloadDescription</key>
+ <string>Microsoft Defender ATP configuration settings</string>
+ <key>PayloadVersion</key>
+ <integer>1</integer>
+ <key>PayloadEnabled</key>
+ <true/>
+ <key>PayloadRemovalDisallowed</key>
+ <true/>
+ <key>PayloadScope</key>
+ <string>System</string>
+ <key>PayloadContent</key>
+ <array>
+ <dict>
+ <key>PayloadUUID</key>
+ <string>99DBC2BC-3B3A-46A2-A413-C8F9BB9A7295</string>
+ <key>PayloadType</key>
+ <string>com.microsoft.wdav</string>
+ <key>PayloadOrganization</key>
+ <string>Microsoft</string>
+ <key>PayloadIdentifier</key>
+ <string>com.microsoft.wdav</string>
+ <key>PayloadDisplayName</key>
+ <string>Microsoft Defender ATP configuration settings</string>
+ <key>PayloadDescription</key>
+ <string/>
+ <key>PayloadVersion</key>
+ <integer>1</integer>
+ <key>PayloadEnabled</key>
+ <true/>
+ <key>networkProtection</key>
+ <dict>
+ <key>enforcementLevel</key>
+ <string>block</string>
+ </dict>
+ </dict>
+ </array>
+ </dict>
+</plist>
+```
+
+4. Verify that the above file was copied correctly. From the Terminal, run the following command and verify that it outputs OK:
+
+```bash
+plutil -lint com.microsoft.wdav.xml
+```
+
+5. Enter _com.microsoft.wdav_ as the custom configuration profile name.
+6. Open the configuration profile and upload the com.microsoft.wdav.xml file. (This file was created in step 3.)
+7. SelectΓÇ»**OK**
+8. Select **Manage** > **Assignments**. In the **Include** tab, select the devices for which you want to enable network protection.
+
+## How to explore the features
+
+1. Learn how to [Protect your organization against web threats](web-threat-protection.md) using web threat protection.
+ - Web threat protection is part of web protection in Microsoft Defender for Endpoint. It uses network protection to secure your devices against web threats.
+2. Run through the [Custom Indicators of Compromise](indicator-ip-domain.md) flow to get blocks on the Custom Indicator type.
+3. Explore [Web content filtering](web-content-filtering.md).
+ > [!NOTE]
+ > If you are removing a policy or changing device groups at the same time, this might cause a delay in policy deployment.
+ > Pro tip: You can deploy a policy without selecting any category on a device group. This action will create an audit only policy, to help you understand user behavior before creating a block policy.
+4. [Integrate Microsoft Defender for Endpoint with Cloud App Security](/defender-cloud-apps/mde-integration) and your network protection-enabled macOS devices will have endpoint policy enforcement capabilities.
+ > [!NOTE]
+ > Discovery and other features are currently not supported on these platforms.
+
+## Scenarios
+
+The following scenarios are supported during public preview:
+
+### Web threat protection
+
+Web threat protection is part of web protection in Microsoft 365 Defender for Endpoint. It uses network protection to secure your devices against web threats. By integrating with Microsoft Edge for macOS and popular third-party browsers like Chrome and Firefox, web threat protection stops web threats without a web proxy. Web threat protection can protect devices while they're on premises or away. Web threat protection stops access to the following types of sites:
+
+- phishing sites
+- malware vectors
+- exploit sites
+- untrusted or low-reputation sites
+- sites you've blocked in your custom indicator list
++
+For more information, see [Protect your organization against web threat](web-threat-protection.md)
+
+### Custom Indicators of Compromise
+
+Indicator of compromise (IoCs) matching is an essential feature in every endpoint protection solution. This capability gives SecOps the ability to set a list of indicators for detection and for blocking (prevention and response).
+
+Create indicators that define the detection, prevention, and exclusion of entities. You can define the action to be taken as well as the duration for when to apply the action and the scope of the device group to apply it to.
+
+Currently supported sources are the cloud detection engine of Defender for Endpoint, the automated investigation and remediation engine, and the endpoint prevention engine (Microsoft Defender Antivirus).
++
+For more information, see: [Create indicators for IPs and URLs/domains](indicator-ip-domain.md).
+
+### Web content filtering
+
+Web content filtering is part of the [Web protection](web-protection-overview.md) capabilities in Microsoft Defender for Endpoint and Microsoft Defender for Business. Web content filtering enables your organization to track and regulate access to websites based on their content categories. Many of these websites (even if they're not malicious) might be problematic because of compliance regulations, bandwidth usage, or other concerns.
+
+Configure policies across your device groups to block certain categories. Blocking a category prevents users within specified device groups from accessing URLs associated with the category. For any category that's not blocked, the URLs are automatically audited. Your users can access the URLs without disruption, and you'll gather access statistics to help create a more custom policy decision. Your users will see a block notification if an element on the page they're viewing is making calls to a blocked resource.
+
+Web content filtering is available on the major web browsers, with blocks performed by Network Protection (Safari, Chrome, Firefox, Brave, and Opera). For more information about browser support, see [Prerequisites](#prerequisites).
++
+For more information about reporting, see [Web content filtering](web-content-filtering.md).
+
+### Microsoft Defender for Cloud Applications
+
+The Microsoft Defender for Cloud Applications / Cloud App Catalog identifies apps you would want end users to be warned upon accessing with Microsoft 365 Defender for Endpoint, and mark them as _Monitored_. The domains listed under monitored apps would be later synced to Microsoft 365 Defender for Endpoint:
++
+Within 10-15 minutes, these domains will be listed in Microsoft 365 Defender for Endpoint Security Center under Indicators > URLs/Domains with Action=Warn. Within the enforcement SLA (see details at the end of this article), end users will be getting warn messages when attempting to access these domains:
++
+When the end user will be attempting to access monitored domains, they'll be warned by Microsoft 365 Defender for Endpoint.
+
+- The user will get a plain block experience accompanied by the following toast message, which will be displayed by the operating system including the name of the blocked application (e.g Blogger.com)
+
+ :::image type="content" source="images/network-protection-macos-content-blocked.png" alt-text="Shows end-user network protection content blocked toast notification.":::
+
+If the end user encounters a _block_, the user will have two possible resolutions:
+
+#### User bypass
+
+- **For toast message experience**: Press the Unblock button. By reloading the webpage, the user will be able to proceed and use the cloud app. (This action is applicable for the next 24 hours, after which the user will have to unblock once again)
+
+#### User education
+
+- **For toast message experience**: Press the toast message itself. End user will be redirected to a custom redirect URL set globally in Microsoft Defender for Cloud Applications (More information at the bottom of this page)
+
+> [!NOTE]
+> Tracking bypasses per app** ΓÇô You can track how many users have bypassed the warning in the _Application_ page in Microsoft Defender for Cloud Applications.
+
+ :::image type="content" source="images/network-protection-macos-mcas-cloud-app-security.png" alt-text="Shows network protection cloud app security overview.":::
+
+## Appendix
+
+### End user education center SharePoint site template
+
+For many organizations, it's important to take the cloud controls provided by Microsoft Defender for Cloud Applications, and to not only set limitations on end users when needed, but to also educate and coach them about:
+
+- the specific incident
+- why it has happened
+- what is the thinking behind this decision
+- how encountering block sites can be mitigated
+
+Upon facing an unexpected behavior, usersΓÇÖ confusion may be reduced by providing them as much information as possible, not only to explain about what has happened but to also educate them to be more aware the next time they choose a cloud app to complete their job. For example, this information can include:
+
+- Organization security and compliance policies and guidelines for internet and cloud use
+- Approved/recommended cloud apps for use
+- Restricted/blocked cloud apps for use
+
+For this page, we recommend that your organization uses a basic SharePoint site.
+
+### Important things to know
+
+1. It can take up to two hours (typically less) for app domains to propagate and to be update in the endpoint devices, after it's marked as _Monitored_.
+2. By default, action will be taken for all apps and domains that were marked as Monitored in Microsoft Defender for Cloud Applications portal for all the onboarded endpoints in the organization.
+3. Full URLs are currently not supported and won't be sent from Microsoft Defender for Cloud Applications to Microsoft 365 Defender for Endpoint, if any full URLs are listed under Microsoft Defender for Cloud Applications monitored apps, hence, user wonΓÇÖt get warned on access attempt (for example, google.com/drive isn't supported, while drive.google.com is supported).
+
+No End-user notification on third party browsers? Check your toast message settings
+
+## See also
+
+- [Microsoft 365 Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
+- [Microsoft 365 Defender for Endpoint integration with Microsoft Microsoft 365 Defender for Cloud Applications](/defender-cloud-apps/mde-integration.md)
+- [Get to know the innovative features in Microsoft Edge](https://www.microsoft.com/edge/features)
+- [Protect your network](network-protection.md)
+- [Turn on network protection](enable-network-protection.md)
+- [Web protection](web-protection-overview.md)
+- [Create indicators](manage-indicators.md)
+- [Web content filtering](web-content-filtering.md)
security Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection.md
A user visits a website:
- **Unblock** - The user won't need to access the Windows Defender Security Intelligence (WDSI) portal to gain site access. The user will have access to the site for 24 hours; at which point the block is reenabled for another 24 hours. The user can continue to use **Unblock** to access the site until such time that the administrator prohibits (blocks) the site, thus removing the option to **Unblock**. - **Feedback** - The toast notification presents the user with a link to submit a ticket, which the user can use to submit feedback to the administrator in an attempt to justify access to the site.
- > [!div class="mx-imgBorder"]
- > ![Shows a network protection phishing content warn notification](images/network-protection-phishing-warn-2.png)
+ :::image type="content" source="images/network-protection-phishing-warn-2.png" alt-text="Shows a network protection phishing content warn notification.":::
- > [NOTE!]
+ > [!NOTE]
> The images shown here for warn experience and block experience (below) both list **"blocked url"** as example placeholder text; in a functioning environment the actual url or domain will be listed. #### Block experience
A user visits a website:
- **Ok** The toast notification is released (removed), and the attempt to access the site is ended. - **Feedback** The toast notification presents the user with a link to submit a ticket, which the user can use to submit feedback to the administrator in an attempt to justify access to the site.
- ![ Shows a network protection known phishing content blocked notification](images/network-protection-phishing-blocked.png)
+ :::image type="content" source="images/network-protection-phishing-blocked.png" alt-text="Shows a network protection known phishing content blocked notification." lightbox="images/network-protection-phishing-blocked.png":::
### Network protection: C2 detection and remediation
Support for Command and Control servers (C2) is a key part of this ransomware ev
A new feature in Defender for Endpoint indicators enables administrators to allow end users to bypass warnings that are generated for some URLs and IPs. Depending on why the URL was blocked, when a SmartScreen block is encountered it may offer administrators the ability to unblock the site for up to 24 hours. In such cases, a Windows Security toast notification will appear, permitting the end-user to **Unblock** the URL or IP for the defined period of time.
- ![Windows Security notification for network protection](images/network-protection-smart-screen-block-notification.png)
-Microsoft Defender for Endpoint administrators can configure SmartScreen Unblock functionality in the [Microsoft 365 Defender portal](https://security.microsoft.com), using the following configuration tool.
+Microsoft Defender for Endpoint Administrators can configure SmartScreen Unblock functionality at [Microsoft 365 Defender](https://security.microsoft.com/), using the following configuration tool. From the Microsoft 365 Defender portal, navigate to the path to the ConfigToolName.
- ![Network protection SmartScreen block configuration ULR and IP form](images/network-protection-smart-screen-block-configuration.png)
## Using network protection
DeviceEvents
```
- > [!div class="mx-imgBorder"]
- > ![Advanced hunting for auditing and identifying events](images/network-protection-advanced-hunting.png)
+ > [!TIP] > These entries have data in the **AdditionalFields** column which gives you great info around the action, if you expand **AdditionalFields** you can also get the fields: **IsAudit**, **ResponseCategory**, and **DisplayName**.
Network protection now has a performance optimization that allows Block mode to
- [Evaluate network protection](evaluate-network-protection.md) | Undertake a quick scenario that demonstrates how the feature works, and what events would typically be created. - [Enable network protection](enable-network-protection.md) | Use Group Policy, PowerShell, or MDM CSPs to enable and manage network protection in your network. - [Configuring attack surface reduction capabilities in Microsoft Intune](/mem/intune/protect/endpoint-security-asr-policy)
+- [Network protection for Linux](network-protection-linux.md) | To learn about using Microsoft Network protection for Linux devices.
+- [Network protection for MacOS](network-protection-macos.md) | To learn more about Microsoft Network protection for MacOS
security Defender Vulnerability Management Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-faq.md
Find answers to frequently asked questions (FAQs) about Microsoft Defender Vulne
Microsoft Defender Vulnerability Management is available for public preview via two
-1. Microsoft Defender for Endpoint Plan 2 / E5 customers can seamlessly enhance their existing generally available vulnerability management capabilities with the Microsoft Defender Vulnerability Management add-on. This service provides consolidated inventories, expanded asset coverage, cross-platform support, and new assessment and mitigation tools. To sign up for the free 120-day public preview trial, see [Defender Vulnerability Management Add-on](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-the-defender-vulnerability-management-add-on-public-preview-trial-for-defender-for-endpoint-plan-2-customers).
+1. Microsoft Defender for Endpoint Plan 2 customers can seamlessly enhance their existing generally available vulnerability management capabilities with the Microsoft Defender Vulnerability Management add-on. This service provides consolidated inventories, expanded asset coverage, cross-platform support, and new assessment and mitigation tools. To sign up for the free 120-day public preview trial, see [Defender Vulnerability Management Add-on](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-the-defender-vulnerability-management-add-on-public-preview-trial-for-defender-for-endpoint-plan-2-customers).
-2. For non-Defender for Endpoint Plan 2 / non-E5 customers looking for a risk-based vulnerability management solution, Microsoft Defender Vulnerability Management standalone helps you efficiently discover, assess, and remediate vulnerabilities and misconfigurations in one place. To sign up for the free 120-day public preview trial, see [Defender Vulnerability Management Standalone](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-standalone).
+2. For non-Defender for Endpoint Plan 1 or Plan 2 customers, or non-Microsoft 365 E3 customers looking for a risk-based vulnerability management solution, Microsoft Defender Vulnerability Management standalone helps you efficiently discover, assess, and remediate vulnerabilities and misconfigurations in one place. To sign up for the free 120-day public preview trial, see [Defender Vulnerability Management Standalone](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-standalone).
-If you have any questions related to the trial sign up and onboarding process, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
+If you have any questions related to the trial sign-up and onboarding process, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com).
-### Is Defender Vulnerability Management available as part of E5?
+### Is Defender Vulnerability Management available as part of Defender for Endpoint Plan 2?
-If the customer has E5, they have Defender for Endpoint Plan 2 and core vulnerability management capabilities. Defender Vulnerability Management is a separate solution from Defender for Endpoint (not included in E5) and is available as an add-on.
+If the customer has Defender for Endpoint Plan 2 they have the core vulnerability management capabilities. Defender Vulnerability Management is a separate solution from Defender for Endpoint (not included in Defender for Endpoint Plan 2) and is available as an add-on.
### What will the purchase options be when Defender Vulnerability Management is generally available (GA)?
Details on your purchase options for Defender Vulnerability Management will be m
### How do customers sign up for a trial?
-For existing Defender for Endpoint Plan 2 / E5 customers who want to evaluate the experience first-hand, we encourage directly onboarding onto the Microsoft Defender Vulnerability Management add-on free 120-day public preview trial. For more information, see [Defender Vulnerability Management Add-on](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-the-defender-vulnerability-management-add-on-public-preview-trial-for-defender-for-endpoint-plan-2-customers).
+For existing Defender for Endpoint Plan 2 customers who want to evaluate the experience first-hand, we encourage directly onboarding onto the Microsoft Defender Vulnerability Management add-on free 120-day public preview trial. For more information, see [Defender Vulnerability Management Add-on](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-the-defender-vulnerability-management-add-on-public-preview-trial-for-defender-for-endpoint-plan-2-customers).
-For new customers (non-Defender for Endpoint Plan 2 / non-E5), see [Defender Vulnerability Management Standalone](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-standalone) to sign up for the free 120-day public preview trial.
+For new customers (non-Defender for Endpoint Plan 1 or Plan 2 customers, or non-Microsoft 365 E3 customers), see [Defender Vulnerability Management Standalone](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-standalone) to sign up for the free 120-day public preview trial.
> [!NOTE] > Customers need to have the global admin role defined in Azure AD to onboard the trial.
Once a customer is onboarded on to the free-trial experience, Defender Vulnerabi
### Do I need to assign Defender Vulnerability Management trial licenses to users in my organization as instructed in the admin center?
-Currently, there is no need to assign the new Defender Vulnerability Management license to users. Licenses will be applied automatically after a customer signs up for the free public preview trial.
+Currently, there's no need to assign the new Defender Vulnerability Management license to users. Licenses will be applied automatically after a customer signs up for the free public preview trial.
### If a customer is in private preview, what will happen to their premium capabilities if I don't sign up for a free public preview trial?
The new capabilities will be available only to customers who onboard the public
The public preview trial lasts for 120 days.
-After your trial ends, you'll have a 30 day grace period of active trial before the license becomes suspended. When the trial is suspended, you will retain your security baselines, but you may lose access to your portal and your blocked applications may become unblocked.
+After your trial ends, you'll have a 30 day grace period of active trial before the license becomes suspended. When the trial is suspended, you'll retain your security baselines, but you may lose access to your portal and your blocked applications may become unblocked.
After 180 days, your license will be deactivated and your profiles will be deleted.
After 180 days, your license will be deactivated and your profiles will be delet
### I want to block a vulnerable application but it's not showing up as available to block?
-Examples of recommendations where you might not see a mitigation action (such as block) include:
+Examples of recommendations where you might not see a mitigation action (such as block) includes:
-- Recommendations related to applications where Microsoft does not have sufficient information to block
+- Recommendations related to applications where Microsoft doesn't have sufficient information to block
- Recommendations related to Microsoft applications-- Recommendations related to operating systems -- Recommendations related to apps for MacOS and Linux
+- Recommendations related to operating systems
+- Recommendations related to apps for macOS and Linux
-It is also possible that your organization has reached the maximum indicator capacity of 15,000. If this is the case, you will need to free up space by deleting old indicators. To learn more see, [Manage indicators](../defender-endpoint/indicator-manage.md).
+It's also possible that your organization has reached the maximum indicator capacity of 15,000. If this is the case, you will need to free up space by deleting old indicators. To learn more, see [Manage indicators](../defender-endpoint/indicator-manage.md).
### Does blocking vulnerable apps work on all devices?
This feature is supported on Windows devices (1809 or later) with the latest Win
### What is the full list of baseline benchmarks I can use as part of security baselines assessment?
-There is currently support for:
+There's currently support for:
- Center for Internet Security (CIS) benchmarks for Windows 10, Windows 11, and Windows Server 2008R2 and above. - Security Technical Implementation Guides (STIG) benchmarks for Windows 10 and Windows Server 2019.
Upcoming support:
### What operating systems can I measure using security baseline assessments?
-Currently Windows is supported, but coverage will be expanded to cover additional operating systems such as Mac and Linux.
+Currently Windows is supported, but coverage will be expanded to cover more operating systems such as Mac and Linux.
## Defender Vulnerability Management general FAQs
security Defender Vulnerability Management Trial https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-trial.md
- Title: About the Microsoft Defender Vulnerability Management public preview trial
-description: Learn about the Microsoft Defender Vulnerability Management trial
-keywords: defender vulnerability management
-ms.sitesec: library
-ms.pagetype: security
-- NOCSH-------
-# About the Microsoft Defender Vulnerability Management public preview add-on trial
--
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](../defender-vulnerability-management/index.yml)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)--
-Microsoft Defender Vulnerability Management is a new service that provides advanced vulnerability management capabilities to minimize your organization's cyber risk. Get real-time asset discovery, continuous risk-based assessment and prioritization, and built in remediation tools.
-
-It includes the existing vulnerability management capabilities in Microsoft Defender for Endpoint and new capabilities to further provide enhanced tools so your teams can intelligently assess, prioritize, and seamlessly remediate the biggest risks to your organization.
-
-## How to sign up for the Defender Vulnerability Management public preview add-on trial
-
-To sign up for the Defender Vulnerability Management add-on trial, you can go directly to the [Microsoft 365 trials hub](https://security.microsoft.com/trialHorizontalHub) page or by selecting **Trials** on the left navigation from the [Microsoft Defender 365 portal](https://security.microsoft.com/homepage).
-
-Once you've reached the [Microsoft 365 trials hub](https://security.microsoft.com/trialHorizontalHub):
-
-1. Under **Security trials**, find the **Defender Vulnerability Management add-on** card and select **Try now**.
-
-2. Review the information about what's included in the trial, then select **Begin trial**.
-
-Your trial will be effective immediately for 120 days. It can take up to 6 hours for all vulnerability management features to appear in your left navigation. Sign out and sign back in to see the updates.
-
-> [!NOTE]
-> This is a public preview trial. Details on your purchase options for this new offering will be made available once the offering is generally available.
-
-## Required roles for starting the trial
-
-As a Global Administrator, you can start the trial or you can allow to users start the trial on behalf of your organization by enabling this option:
-
-1. In the Microsoft 365 admin center, go to **Settings** > **Org settings** > **Services** > **User owned apps and services**
-2. Check **Let users start trials on behalf of your organization**
-3. Select **Save**
--
-> [!NOTE]
-> If you don't want users in your organization to be able to start trials, as a Global Administrator you must disable this option once you've activated the trial.
->
-> Only a Global Administrator can end the trial.
-
-It can take a few hours for the changes to take effect. Once it does, return to the trial setup page and select **Begin trial**.
-
-## Licensing
-
-As part of the trial setup, the new Defender Vulnerability Management trial licenses will be applied to users automatically. Therefore, no assignment is needed (_The trial can automatically apply up to 1,000,000 licenses_). The licenses are active for 120 days.
-
-## Getting started, extending, and ending the trial
-
-### Getting started
-
-You can start using Defender Vulnerability Management features as soon as you see them in the Microsoft 365 Defender portal. Nothing is created automatically and users won't be affected. When you navigate to each solution, you may be guided to make extra setup configurations to start using features.
-
-### Extending the trial
-
-You can extend the trial within the last 15 days of the trial period. You're limited to a maximum of two trial periods. If you don't extend by the time your trial period ends, you'll need to wait at least 30 days before signing up for a second trial.
-
-### Ending the trial
-
-Admins can disable the trial anytime by selecting **Trials** on the left navigation, going to the **Defender Vulnerability Management** trial card and selecting **End trial**.
-
-Unless stated otherwise for the solution your trial data will be maintained for time, usually 180 days, before being permanently deleted. You may continue to access the data gathered during the trial until that time.
-
-## Terms and conditions
-
-See the [terms and conditions](/legal/microsoft-365/microsoft-365-trial) for Microsoft 365 trials.
-
-## Learn more about Defender Vulnerability Management
-
-Wondering what you can experience in your free trial? The Defender Vulnerability Management trial includes:
--- **[Security baselines assessment](tvm-security-baselines.md)**: When the trial ends security baseline profiles may be stored for a short additional time before being deleted.-- **[Blocking vulnerable applications (beta)](tvm-block-vuln-apps.md)**: When the trial ends blocked applications will be immediately unblocked whereas baseline profiles may be stored for a short additional time before being deleted.-- **[Browser extensions assessment](tvm-browser-extensions.md)**-- **[Digital certificates assessment](tvm-certificate-inventory.md)**-- **[Network shares analysis](tvm-network-share-assessment.md)**
security Get Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management.md
Microsoft Defender Vulnerability Management is available as a standalone and as
> [!NOTE] > This offering isn't currently available for Microsoft Defender for Business customers. -- If you don't already have Defender for Endpoint Plan 2, sign up to try the [Defender Vulnerability Management Standalone trial.](#try-defender-vulnerability-management-standalone)-- If you already have an existing Defender for Endpoint Plan 2 or Microsoft 365 E5 license, sign up to try the [Defender Vulnerability Management Add-on trial.](#try-the-defender-vulnerability-management-add-on-public-preview-trial-for-defender-for-endpoint-plan-2-customers)
+- If you don't have Defender for Endpoint Plan 1 or Plan 2, or Microsoft 365 E3, sign up to try the [Defender Vulnerability Management Standalone trial.](#try-defender-vulnerability-management-standalone)
+- If you already have Defender for Endpoint Plan 2, sign up to try the [Defender Vulnerability Management Add-on trial.](#try-the-defender-vulnerability-management-add-on-public-preview-trial-for-defender-for-endpoint-plan-2-customers)
> If you have any questions related to the trial sign up and onboarding process, [contact us](mailto:mdvmtrial@microsoft.com) (mdvmtrial@microsoft.com). ## Try Defender Vulnerability Management Standalone
-If you don't already have Defender for Endpoint Plan 2, you will sign up to trial the **Defender Vulnerability Management Standalone trial**.
+If you don't have Defender for Endpoint Plan 1 or Plan 2, or Microsoft 365 E3, you will sign up to trial the **Defender Vulnerability Management Standalone trial**.
> [!IMPORTANT] > You must be logged into the tenant as a global administrator to perform this task.
To sign up:
## Try the Defender Vulnerability Management Add-on Public Preview Trial for Defender for Endpoint Plan 2 customers
-If you already have an existing Defender for Endpoint Plan 2 or Microsoft 365 E5 license, sign up to trial the **Defender Vulnerability Management Add-on trial** to get access to the additional capabilities. To sign up:
+If you already have Defender for Endpoint Plan 2, sign up to trial the **Defender Vulnerability Management Add-on trial** to get access to the additional capabilities. To sign up:
1. Visit [Microsoft Defender Vulnerability Management Add-on Public Preview Trial](https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2&ali=1&ru=https://aka.ms/MdvmPortal). 2. Follow the prompts to sign in. This will differ depending on whether you already have a Microsoft 365 subscription or not.
security Trial Playbook Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/trial-playbook-defender-vulnerability-management.md
- Title: Trial playbook - Microsoft Defender Vulnerability Management (public preview)
-description: Learn how Microsoft Defender Vulnerability Management can help you protect all your users and data.
-keywords: vulnerability management, threat and vulnerability management, Microsoft Defender for Endpoint TVM, Microsoft Defender for Endpoint-TVM, vulnerability management, vulnerability assessment, threat and vulnerability scanning, secure configuration assessment, Microsoft Defender for Endpoint, Microsoft Defender Vulnerability Management, endpoint vulnerabilities, next generation
-ms.sitesec: library
-ms.pagetype: security
--------
-# Trial playbook: Microsoft Defender Vulnerability Management
-
-## Welcome to the Microsoft Defender Vulnerability Management trial playbook
-
-This playbook is a simple guide to help you make the most of your free trial. Using the suggested steps in this playbook from the Microsoft Security team, you'll learn how vulnerability management can help you protect all your users and data.
-
-## What is Microsoft Defender Vulnerability Management?
-
-Reducing cyber risk requires a comprehensive risk-based vulnerability management program to identify, assess, remediate, and track important vulnerabilities across your most critical assets.
-
-Microsoft Defender Vulnerability Management is a new service that proactively provides continuous real-time discovery and assessment of vulnerabilities, context-aware threat & business prioritization, and built-in remediation processes. It includes all Defender Vulnerability Management capabilities in Microsoft Defender for Endpoint and new enhanced capabilities so your teams can further intelligently assess, prioritize, and seamlessly remediate the biggest risks to your organization.
--
-Watch the following video to learn more about Defender Vulnerability Management:
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Y1FX]
-
-## Let's get started
-
-### Step 1: Set-up
-
-> [!NOTE]
-> Users need to have the global admin role defined in Azure AD to onboard the trial.
-
-1. Check [permissions and pre-requisites.](tvm-prerequisites.md)
-2. The Microsoft Defender Vulnerability Management preview trial can be accessed in several ways:
-
- Via the [Microsoft 365 Defender portal](https://security.microsoft.com) under Trials.
-
- :::image type="content" source="../../medivm-trialshub.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management trial hub landing page.":::
-
- Via the [Microsoft Admin Center](https://admin.microsoft.com/#/catalog) (global admins only).
-
-3. Sign up for the trial depends on whether you already have Microsoft Defender for Endpoint Plan 2 or not.
- - If you have Defender for Endpoint Plan 2 or Microsoft 365 E5, choose [Defender Vulnerability Management Add-on](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-the-defender-vulnerability-management-add-on-public-preview-trial-for-defender-for-endpoint-plan-2-customers).
- - If you don't have Defender for Endpoint Plan 2, or Microsoft 365 E5, choose [Defender Vulnerability Management Standalone](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-standalone).
-4. When you're ready to get started, visit the [Microsoft 365 Defender portal](https://security.microsoft.com) to start using the Defender Vulnerability Management trial.
-
-> [!NOTE]
-> This is a public preview trial. Details on your purchase options for this new offering will be made available once the offering is generally available.
-
-> [!NOTE]
-> Once you activate the trial it can take up to 6 hours for the new features to become available in the portal.
-
-Now that you have set up your trial, it's time to try key capabilities.
-
-### Step 2: Know what to protect in a single view
-
-Built-in and agentless scanners continuously monitor and detect risk even when devices aren't connected to the corporate network. Expanded asset coverage consolidates software applications, digital certificates, network shares, and browser extensions into a single inventory view.
-
-1. [**Device inventory**](../defender-endpoint/machines-view-overview.md) - The device inventory shows a list of the devices in your network. By default, the list displays devices seen in the last 30 days. At a glance, you'll see information such as domains, risk levels, OS platform, associated CVEs, and other details for easy identification of devices most at risk.
-
-2. Discover and assess your organization's software in a single, consolidated inventory view:
- - [**Software application inventory**](tvm-software-inventory.md) - the software inventory in Defender Vulnerability Management is a list of known applications in your organization. The view includes vulnerability and misconfiguration insights across installed software with prioritized impact scores and details such as OS platforms, vendors, number of weaknesses, threats, and an entity-level view of exposed devices.
- - [**Browser extension assessments**](tvm-browser-extensions.md) - the browser extensions page displays a list of the extensions installed across different browsers in your organization. Extensions usually need different permissions to run properly. Defender Vulnerability Management provides detailed information on the permissions requested by each extension and identifies those with the highest associated risk levels, the devices with the extension turned on, installed versions, and more.
- - [**Certificate inventory**](tvm-certificate-inventory.md) - the certificate inventory allows you to discover, assess, and manage digital certificates installed across your organization in a single view. This can help you:
- - Identify certificates that are about to expire so you can update them and prevent service disruption.
- - Detect potential vulnerabilities due to the use of weak signature algorithm (for example, SHA-1-RSA), short key size (for example, RSA 512 bit), or weak signature hash algorithm (for example, MD5).
- - Ensure compliance with regulatory guidelines and organizational policy.
-
-3. [Assign device value](tvm-assign-device-value.md) - defining a device's value helps you differentiate between asset priorities. The device value is used to incorporate the risk appetite of an individual asset into the Defender Vulnerability Management exposure score calculation. Devices assigned as "high value" will receive more weight. Device value options:
- - Low
- - Normal (Default)
- - High
-
- You can also use the [set device value API](/microsoft-365/security/defender-endpoint/set-device-value).
-
-### Step 3: Track and mitigate remediation activities
-
-1. [**Request remediation**](tvm-remediation.md#request-remediation) - vulnerability management capabilities bridge the gap between Security and IT administrators through the remediation request workflow. Security admins like you can request for the IT Administrator to remediate a vulnerability from the **Recommendation** pages to [Intune](/mem/intune/).
-2. [**View your remediation activities**](tvm-remediation.md#view-your-remediation-activities) - when you submit a remediation request from the Security recommendations page, it kicks-off a remediation activity. A security task is created that can be tracked on a **Remediation** page, and a remediation ticket is created in Microsoft Intune.
-3. [**Block vulnerable applications**](tvm-block-vuln-apps.md) - Remediating vulnerabilities takes time and can be dependent on the responsibilities and resources of the IT team. Security admins can temporarily reduce the risk of a vulnerability by taking immediate action to block all currently known vulnerable versions of an application or warn users with customizable messages before opening vulnerable app versions until the remediation request is completed. The block option gives IT teams time to patch the application without security admins worrying that the vulnerabilities will be exploited in the meantime.
-
- - [How to block vulnerable applications](tvm-block-vuln-apps.md#how-to-block-vulnerable-applications)
- - [View remediation activities](tvm-block-vuln-apps.md#view-remediation-activities)
- - [View blocked applications](tvm-block-vuln-apps.md#view-blocked-applications)
- - [Unblock applications](tvm-block-vuln-apps.md#unblock-applications)
-
-4. Use enhanced assessment capabilities such as [Network shares analysis](tvm-network-share-assessment.md) to protect vulnerable network shares. As network shares can be easily accessed by network users, small common weaknesses can make them vulnerable. These types of misconfigurations are commonly used in the wild by attackers for lateral movement, reconnaissance, data exfiltration, and more. That's why we built a new category of configuration assessments in Defender Vulnerability Management that identify the common weaknesses that expose your endpoints to attack vectors in Windows network shares. This helps you:
- - Disallow offline access to shares
- - Remove shares from the root folder
- - Remove share write permission set to 'Everyone'
- - Set folder enumeration for shares
-
-5. View and monitor your organization's devices using a [**Vulnerable devices report**](tvm-vulnerable-devices-report.md) that shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure.
-
-### Step 4: Set up security baseline assessments
-
-Instead of running point-in-time compliance scans, security baselines assessment helps you to continuously and proactively monitor your organization's compliance against industry security benchmarks in real time. A security baseline profile is a customized profile that you can create to assess and monitor endpoints in your organization against industry security benchmarks (CIS, NIST, MS). When you create a security baseline profile, you're creating a template that consists of multiple device configuration settings and a base benchmark to compare against.
-
-Security baselines provide support for Center for Internet Security (CIS) benchmarks for Windows 10, Windows 11, and Windows Server 2008 R2 and above, as well as Security Technical Implementation Guides (STIG) benchmarks for Windows 10 and Windows Server 2019.
-
-1. Get started with [security baselines assessment](tvm-security-baselines.md#get-started-with-security-baselines-assessment)
-2. Review [security baseline profile assessment results](tvm-security-baselines.md#review-security-baseline-profile-assessment-results)
-3. [Use advanced hunting](tvm-security-baselines.md#use-advanced-hunting)
-
-### Step 5: Create meaningful reports to get in-depth insights using APIs and Advanced Hunting
-
-Defender Vulnerability Management APIs can help drive clarity in your organization with customized views into your security posture and automation of vulnerability management workflows. Alleviate your security team's workload with data collection, risk score analysis, and integrations with your other organizational processes and solutions. For more information, see:
--- [Export assessment methods and properties per device](../defender-endpoint/get-assessment-methods-properties.md)-- [Defender Vulnerability Management APIs blog](https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/new-threat-amp-vulnerability-management-apis-create-reports/ba-p/2445813)-
-Advanced hunting enables flexible access to Defender Vulnerability Management raw data, which allows you to proactively inspect entities for known and potential threats.
-For more information, see [Hunt for exposed devices](../defender-endpoint/advanced-hunting-overview.md).
-
-## Additional resources
--- Compare offerings: [Microsoft Defender Vulnerability Management](defender-vulnerability-management-capabilities.md)-- [Defender Vulnerability Management documentation](../defender-vulnerability-management/index.yml)-- Datasheet: [Microsoft Defender Vulnerability Management: Reduce cyber risk with continuous vulnerability discovery and assessment, risk-based prioritization, and remediation](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4XR02)
security Microsoft Secure Score Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-whats-new.md
The more improvement actions you take, the higher your Secure Score will be. For
Microsoft Secure Score can be found at <https://security.microsoft.com/securescore> in the [Microsoft 365 Defender portal](microsoft-365-defender-portal.md).
+## August 2022
+
+New Microsoft Information Protection recommendations are now available as Secure Score improvement actions:
+
+- **Labeling**
+ - Extend M365 sensitivity labeling to assets in Azure Purview data map
+ - Ensure Auto-labeling data classification policies are setup and used
+ - Publish M365 sensitivity label data classification policies
+ - Create Data Loss Prevention (DLP) policies
+
+New Microsoft Defender for Office 365 recommendations are now available as Secure Score improvement actions:
+
+- **Anti-spam - Inbound policy**
+ - Set the email bulk complaint level (BCL) threshold to be 6 or lower
+ - Set action to take on spam detection
+ - Set action to take on high confidence spam detection
+ - Set action to take on phishing detection
+ - Set action to take on high confidence phishing detection
+ - Set action to take on bulk spam detection
+ - Retain spam in quarantine for 30 days
+ - Ensure spam safety tips are enabled
+ - Ensure that no sender domains are allowed for anti-spam policies (will replace ΓÇ£Ensure that there are no sender domains allowed for Anti-spam policiesΓÇ¥ to extend functionality also for specific senders)
+
+- **Anti-spam - Outbound policy**
+ - Set maximum number of external recipients that a user can email per hour
+ - Set maximum number of internal recipients that a user can send to within an hour
+ - Set a daily message limit
+ - Block users who reached the message limit
+ - Set Automatic email forwarding rules to be system controlled
+
+- **Anti-spam - Connection filter**
+ - Don't add allowed IP addresses in the connection filter policy
+ ## June 2022 - New Microsoft Defender for Endpoint and Microsoft Defender Vulnerability Management recommendations are now available as Secure Score improvement actions:
security Anti Phishing Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-protection.md
EOP (that is, Microsoft 365 organizations without Microsoft Defender for Office
- **Anti-phishing policies in EOP**: Turn spoof intelligence on or off, turn unauthenticated sender indicators in Outlook on or off, and specify the action for blocked spoofed senders. For more information, see [Configure anti-phishing policies in EOP](configure-anti-phishing-policies-eop.md). -- **Allow or block spoofed senders in the Tenant Allow/Block List**: When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoof** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoof senders before they're detected by spoof intelligence. For more information, see [Manage the Tenant Allow/Block List in EOP](tenant-allow-block-list.md).
+- **Allow or block spoofed senders in the Tenant Allow/Block List**: When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoof senders before they're detected by spoof intelligence. For more information, see [Manage the Tenant Allow/Block List in EOP](tenant-allow-block-list.md).
- **Implicit email authentication**: EOP enhances standard email authentication checks for inbound email ([SPF](set-up-spf-in-office-365-to-help-prevent-spoofing.md), [DKIM](use-dkim-to-validate-outbound-email.md), and [DMARC](use-dmarc-to-validate-email.md) with sender reputation, sender history, recipient history, behavioral analysis, and other advanced techniques to help identify forged senders. For more information, see [Email authentication in Microsoft 365](email-validation-and-authentication.md).
security Anti Spoofing Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spoofing-protection.md
The following anti-spoofing technologies are available in EOP:
- **Spoof intelligence insight**: Review spoofed messages from senders in internal and external domains during the last 7 days, and allow or block those senders. For more information, see [Spoof intelligence insight in EOP](learn-about-spoof-intelligence.md). -- **Allow or block spoofed senders in the Tenant Allow/Block List**: When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoof** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoof senders before they're detected by spoof intelligence. For more information, see [Manage the Tenant Allow/Block List in EOP](tenant-allow-block-list.md).
+- **Allow or block spoofed senders in the Tenant Allow/Block List**: When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoof senders before they're detected by spoof intelligence. For more information, see [Manage the Tenant Allow/Block List in EOP](tenant-allow-block-list.md).
- **Anti-phishing policies**: In EOP and Microsoft Defender for Office 365, anti-phishing policies contain the following anti-spoofing settings: - Turn spoof intelligence on or off.
security Configure Mdo Anti Phishing Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/configure-mdo-anti-phishing-policies.md
Creating a custom anti-phishing policy in the Microsoft 365 Defender portal crea
When you're finished, click **Add**.
+ > [!NOTE]
+ > If Microsoft 365 system messages from the following senders are identified as impersonation attempts, you can add the senders to the trusted senders list:
+ >
+ > - `Γüánoreply@email.teams.microsoft.com`
+ > - `noreply@emeaemail.teams.microsoft.com`
+ > - `no-reply@sharepointonline.com`
+ Back on the **Manage custom domains for impersonation** flyout, you can remove entries from the **Sender** and **Domain** tabs by selecting one or more entries from the list. You can search for entries using the ![Search icon.](../../media/m365-cc-sc-create-icon.png) **Search** box. After you select at least one entry, the **Delete** icon appears, which you can use to remove the selected entries.
security Learn About Spoof Intelligence https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/learn-about-spoof-intelligence.md
The rest of this article explains how to use the spoof intelligence insight in t
> [!NOTE] >
-> - Only spoofed senders that were detected by spoof intelligence appear in the spoof intelligence insight. When you override the allow or block verdict in the insight, the spoofed sender becomes a manual allow or block entry that appears only on the **Spoof** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoofed senders before they're detected by spoof intelligence. For more information, see [Manage the Tenant Allow/Block List in EOP](tenant-allow-block-list.md).
+> - Only spoofed senders that were detected by spoof intelligence appear in the spoof intelligence insight. When you override the allow or block verdict in the insight, the spoofed sender becomes a manual allow or block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoofed senders before they're detected by spoof intelligence. For more information, see [Manage the Tenant Allow/Block List in EOP](tenant-allow-block-list.md).
>
-> - The spoof intelligence insight and the **Spoof** tab in the Tenant Allow/Block list replace the functionality of the spoof intelligence policy that was available on the anti-spam policy page in the Security & Compliance Center.
+> - The spoof intelligence insight and the **Spoofed senders** tab in the Tenant Allow/Block list replace the functionality of the spoof intelligence policy that was available on the anti-spam policy page in the Security & Compliance Center.
> > - The spoof intelligence insight shows 7 days worth of data. The **Get-SpoofIntelligenceInsight** cmdlet shows 30 days worth of data. >
To view information about the spoof intelligence detections, click **View spoofi
### View information about spoofed messages > [!NOTE]
-> Remember, only spoofed senders that were detected by spoof intelligence appear on this page. When you override the allow or block verdict in the insight, the spoofed sender becomes a manual allow or block entry that appears only on the **Spoof** tab in the Tenant Allow/Block List.
+> Remember, only spoofed senders that were detected by spoof intelligence appear on this page. When you override the allow or block verdict in the insight, the spoofed sender becomes a manual allow or block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List.
On the **Spoof intelligence insight** page that appears after you click **View spoofing activity** in the spoof intelligence insight, the page contains the following information:
security Set Up Anti Phishing Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/set-up-anti-phishing-policies.md
The following spoof settings are available in anti-phishing policies in EOP and
- **Enable spoof intelligence**: Turns spoof intelligence on or off. We recommend that you leave it turned on.
- When spoof intelligence is enabled, the **spoof intelligence insight** shows spoofed senders that were automatically detected and allowed or blocked by spoof intelligence. You can manually override the spoof intelligence verdict to allow or block the detected spoofed senders from within the insight. But when you do, the spoofed sender disappears from the spoof intelligence insight, and is now visible only on the **Spoof** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoofed senders in the Tenant Allow/Block List. For more information, see the following articles:
+ When spoof intelligence is enabled, the **spoof intelligence insight** shows spoofed senders that were automatically detected and allowed or blocked by spoof intelligence. You can manually override the spoof intelligence verdict to allow or block the detected spoofed senders from within the insight. But when you do, the spoofed sender disappears from the spoof intelligence insight, and is now visible only on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoofed senders in the Tenant Allow/Block List. For more information, see the following articles:
- [Spoof intelligence insight in EOP](learn-about-spoof-intelligence.md) - [Manage the Tenant Allow/Block List in EOP](tenant-allow-block-list.md)
The following impersonation settings are only available in anti-phishing policie
- **Add trusted senders and domains**: Exceptions to the impersonation protection settings. Messages from the specified senders and sender domains are never classified as impersonation-based attacks by the policy. In other words, the action for protected senders, protected domains, or mailbox intelligence protection aren't applied to these trusted senders or sender domains. The maximum limit for these lists is 1024 entries.
+ > [!NOTE]
+ > If Microsoft 365 system messages from the following senders are identified as impersonation attempts, you can add the senders to the trusted senders list:
+ >
+ > - `Γüánoreply@email.teams.microsoft.com`
+ > - `noreply@emeaemail.teams.microsoft.com`
+ > - `no-reply@sharepointonline.com`
+ ### Advanced phishing thresholds in anti-phishing policies in Microsoft Defender for Office 365 The following advanced phishing thresholds are only available in anti-phishing policies in Defender for Office 365. These thresholds control the sensitivity for applying machine learning models to messages to determine a phishing verdict:
security Tenant Allow Block List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list.md
The Tenant Allow/Block List in the Microsoft 365 Defender portal gives you a way
- URLs to block. - Files to block. - Email domains or addresses to block.-- Spoofed senders to allow or block. If you override the allow or block verdict in the [spoof intelligence insight](learn-about-spoof-intelligence.md), the spoofed sender becomes a manual allow or block entry that only appears on the **Spoof** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoofed senders here before they're detected by spoof intelligence.
+- Spoofed senders to allow or block. If you override the allow or block verdict in the [spoof intelligence insight](learn-about-spoof-intelligence.md), the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also manually create allow or block entries for spoofed senders here before they're detected by spoof intelligence.
- URLs to allow. - Files to allow. - Email domains or addresses to allow.
security Tuning Anti Phishing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tuning-anti-phishing.md
Specifically, you should check the **X-Forefront-Antispam-Report** header field
- For messages that end up in quarantine by mistake, or for messages that are allowed through, we recommend that you search for those messages in [Threat Explorer and real-time detections](threat-explorer.md). You can search by sender, recipient, or message ID. After you locate the message, go to details by clicking on the subject. For a quarantined message, look to see what the "detection technology" was so that you can use the appropriate method to override. For an allowed message, look to see which policy allowed the message. -- Email from spoofed senders (the From address of the message doesn't match the source of the message) is classified as phishing in Defender for Office 365. Sometimes spoofing is benign, and sometimes users don't want messages from specific spoofed sender to be quarantined. To minimize the impact to users, periodically review the [spoof intelligence insight](learn-about-spoof-intelligence.md), the **Spoof** tab in the [Tenant Allow/Block List](tenant-allow-block-list.md), and the [Spoof detections report](view-email-security-reports.md#spoof-detections-report). Once you have reviewed allowed and blocked spoofed senders and made any necessary overrides, you can be confident to [configure spoof intelligence in anti-phishing policies](set-up-anti-phishing-policies.md#spoof-settings) to **Quarantine** suspicious messages instead of delivering them to the user's Junk Email folder.
+- Email from spoofed senders (the From address of the message doesn't match the source of the message) is classified as phishing in Defender for Office 365. Sometimes spoofing is benign, and sometimes users don't want messages from specific spoofed sender to be quarantined. To minimize the impact to users, periodically review the [spoof intelligence insight](learn-about-spoof-intelligence.md), the **Spoofed senders** tab in the [Tenant Allow/Block List](tenant-allow-block-list.md), and the [Spoof detections report](view-email-security-reports.md#spoof-detections-report). Once you have reviewed allowed and blocked spoofed senders and made any necessary overrides, you can be confident to [configure spoof intelligence in anti-phishing policies](set-up-anti-phishing-policies.md#spoof-settings) to **Quarantine** suspicious messages instead of delivering them to the user's Junk Email folder.
- You can repeat the above step for Impersonation (domain or user) in Microsoft Defender for Office 365. The Impersonation report is found under **Threat Management** \> **Dashboard** \> **Insights**.
solutions Information Protection Deploy Protect Information https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/information-protection-deploy-protect-information.md
For data privacy within sites of concern, push sensitivity labels for automatic
## Data loss prevention
-You can use [data loss prevention (DLP)](../compliance/dlp-learn-about-dlp.md) in Microsoft 365 to detect, warn, and block risky, inadvertent, or inappropriate sharing, such as sharing of data containing personal information, both internally and externally.
+You can use [data loss prevention (DLP)](../compliance/dlp-learn-about-dlp.md) in Microsoft Purview to detect, warn, and block risky, inadvertent, or inappropriate sharing, such as sharing of data containing personal information, both internally and externally.
DLP allows you to:
DLP is used to identify a document or email containing a health record and then
### Planning for DLP
-Plan your DLP policies for:
+See, [Plan for data loss prevention (DLP)](../compliance/dlp-overview-plan-for-dlp.md) for complete guidance on planning your DLP implementation
+
+<!-- Plan your DLP policies for:
- Your business requirements.
Although sensitivity labels canΓÇÖt be used in DLP policy conditions, certain pr
- DLP has more granular levels of control in terms of rules, conditions, and actions.
- - DLP policies can be applied to Teams chat and channel messages. Sensitivity labels can only be applied to documents and email.
+ - DLP policies can be applied to Teams chat and channel messages. Sensitivity labels can only be applied to documents and email. -->
### DLP policies
-DLP policies are configured in the Microsoft Purview compliance portal and specify the level of protection, the sensitive information type the policy is looking for, and the target workloads. Their basic components consist of identifying the protection and the types of data.
+DLP policies are configured in the Microsoft Purview compliance portal and specify the level of protection, the information the policy is looking for, and the target workloads. Every DLP policy requires you to:
+
+1. Choose what you want to monitor.
+1. Choose where to monitor.
+1. Choose the conditions that must be matched for a policy to be applied to an item.
+1. Choose the action to take when the policy conditions are met.
+
+To learn more about DLP policies, and how to design them, see:
+
+- [Learn about data loss prevention](../compliance/dlp-learn-about-dlp.md)
+- [Design a data loss prevention policy](../compliance/dlp-policy-design.md)
+- [Data Loss Prevention policy reference](../compliance/dlp-policy-reference.md)
++
+<!--
> [!div class="mx-imgBorder"] > ![DLP policy configuration in Microsoft 365.](../media/information-protection-deploy-protect-information/information-protection-deploy-protect-information-dlp-config.png)
Here is an example DLP policy for awareness of GDPR.
![Example DLP policy for awareness of GDPR.](../media/information-protection-deploy-protect-information/information-protection-deploy-protect-information-dlp-example-policy.png)
-See [this article](../compliance/create-test-tune-dlp-policy.md) for more information about creating and applying DLP policies.
+See [this article](../compliance/create-test-tune-dlp-policy.md) for more information about creating and applying DLP policies.-->
### Protection levels for data privacy
whiteboard Configure Privacy Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/configure-privacy-settings.md
description: Learn about compliance and how to configure privacy settings in Mic
>[!NOTE] > If you or your users want to learn more about default privacy settings, optional connected experiences, and how diagnostic data is collected, direct them to [Microsoft Whiteboard privacy and compliance](https://support.microsoft.com/office/privacy-and-compliance-ed9f0de9-71be-44c2-837d-e0f448660be1).
-If you are the Microsoft Whiteboard administrator for your organization, you can control the following:
+If you're the Microsoft Whiteboard administrator for your organization, you can control the following settings:
- What level of diagnostic data is collected and sent to Microsoft about the Whiteboard client software running on the userΓÇÖs device.
To configure the availability of optional connected experiences, use the [Office
You can choose the level of diagnostic data that is collected and sent to Microsoft about the Whiteboard client software running on devices in your organization. Optional diagnostic data will be sent to Microsoft, unless you change the setting in the Microsoft 365 admin center. If you choose to send optional diagnostic data, required diagnostic data is also included.
-In addition to **Required** or **Optional**, there is also a choice of **Neither**. If you choose that option, no diagnostic data about Whiteboard client software running on the userΓÇÖs device is sent to Microsoft. This option, however, significantly limits MicrosoftΓÇÖs ability to detect, diagnose, and remediate problems that your users may encounter while using Whiteboard.
+In addition to **Required** or **Optional**, there's also a choice of **Neither**. If you choose that option, no diagnostic data about Whiteboard client software running on the userΓÇÖs device is sent to Microsoft. This option, however, significantly limits MicrosoftΓÇÖs ability to detect, diagnose, and remediate problems that your users may encounter while using Whiteboard.
-Your users wonΓÇÖt be able to change the diagnostic data level for their devices if they are signed in to Whiteboard with their organizational credentials (sometimes referred to as a work or school account). But if they are signed in to Whiteboard with a Microsoft account, such as a personal outlook.com email address, then they can change the diagnostic data level on their devices by going to **Settings > Privacy and security**.
+Your users wonΓÇÖt be able to change the diagnostic data level for their devices if they're signed in to Whiteboard with their organizational credentials (sometimes referred to as a work or school account). But if they're signed in to Whiteboard with a Microsoft account, such as a personal outlook.com email address, then they can change the diagnostic data level on their devices by going to **Settings > Privacy and security**.
## Optional connected experiences setting for your organization You can choose whether to make optional connected experiences in Whiteboard available to your users. These connected experiences will be available to your users unless you change the setting in the Microsoft 365 admin center.
-These connected experiences are different because they are not covered by your organizationΓÇÖs commercial agreement with Microsoft. Optional connected experiences are offered by Microsoft directly to your users and are governed by the [Microsoft Services Agreement](https://www.microsoft.com/servicesagreement) instead of the [Online Services Terms](https://www.microsoft.com/licensing/product-licensing/products).
+These connected experiences are different because they aren't covered by your organizationΓÇÖs commercial agreement with Microsoft. Optional connected experiences are offered by Microsoft directly to your users and are governed by the [Microsoft Services Agreement](https://www.microsoft.com/servicesagreement) instead of the [Online Services Terms](https://www.microsoft.com/licensing/product-licensing/products).
-Even if you choose to make these optional connected experiences available to your users, your users have the option to turn them off as a group by going to **Settings > Privacy and security**. Your users only have this choice if they are signed in to Whiteboard with their organizational credentials (sometimes referred to as a work or school account), not if they are signed in with a Microsoft account, such as a personal outlook.com email address.
+Even if you choose to make these optional connected experiences available to your users, your users can turn them off as a group by going to **Settings > Privacy and security**. Your users only have this choice if they're signed into Whiteboard with their organizational credentials, also known as a work or school account. Users can't change privacy settings if they're signed in with a Microsoft account, such as a personal outlook.com email address.
## Required diagnostic data events collected by Whiteboard
Collected the first-time ink is added to a board in Microsoft Whiteboard. This i
**Intentional.SurfSide.ActivationProtocol.LoadFromUri**
-Collected every time when Microsoft Whiteboard is launched by a call from another application or process. This information is critical to catch if Whiteboard does not launch when properly invoked by another application or process. Microsoft is using this data to diagnose the issue in order to guarantee Microsoft Whiteboard is running as expected.
+Collected every time when Microsoft Whiteboard is launched by a call from another application or process. This information is critical to catch if Whiteboard doesn't launch when properly invoked by another application or process. Microsoft is using this data to diagnose the issue in order to guarantee Microsoft Whiteboard is running as expected.
- **ApplicationExecutionState** ΓÇô execution state of app when activation protocol happens - **IsSignedIn** ΓÇô user is authentication status-- **Kind** ΓÇô application or process which is launching Whiteboard
+- **Kind** ΓÇô application or process that is launching Whiteboard
**Intentional.Whiteboard.Init.DisplayWhiteboard**
-Collected the first time Microsoft Whiteboard is actually displayed on a client per a session. This information is critical to catch launching issues. Microsoft is using this data to diagnose the issue in order to guarantee Microsoft Whiteboard is running as expected.
+Collected the first time Microsoft Whiteboard is displayed on a client per a session. This information is critical to catch launching issues. Microsoft is using this data to diagnose the issue in order to guarantee Microsoft Whiteboard is running as expected.
- **IsPrelaunched** ΓÇô prelaunch status - **IsProtocolActivation** ΓÇô application launch type
Collected every time when Microsoft Whiteboard launches after the previous state
Collected every time when Microsoft Whiteboard launches. This information is critical to catch errors associated with user configured settings. Microsoft is using this data to diagnose the issue in order to guarantee Microsoft Whiteboard is running as expected. - **ActivePen** ΓÇô pen mode state-- **CollectFullTelemetryWithoutSignIn** ΓÇô full telemetry collection without sign in enablement
+- **CollectFullTelemetryWithoutSignIn** ΓÇô full telemetry collection without sign-in enablement
- **DefaultWhiteboardBackgroundColor** ΓÇô default board background color - **DefaultWhiteboardBackgroundPattern** ΓÇô default board background pattern - **FlightStatus** ΓÇô flight status
whiteboard Deploy On Windows Organizations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/deploy-on-windows-organizations.md
description: Learn how to deploy Microsoft Whiteboard on devices running Windows
Whiteboard can be deployed on devices that run Windows 10 or later using Microsoft Intune or Microsoft Configuration Manager (formerly System Center Configuration Manager). Whiteboard isn't supported on Windows Server.
+In order to deploy Whiteboard, you must first ensure that Whiteboard is enabled for your organization. For more information, see [Manage access to Whiteboard](manage-whiteboard-access-organizations.md).
+ - **Microsoft Intune using an online license mode** ΓÇô This process allows you to specify groups of users who will receive access to the Whiteboard app. - **Microsoft Configuration Manager using manual offline installation and updates** ΓÇô This process allows you to install Whiteboard and then manually update it every 2ΓÇô4 weeks.
whiteboard Gdpr Requests https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/gdpr-requests.md
The General Data Protection Regulation (GDPR) gives rights to users to manage pe
This article provides information about how to export, transfer, or delete personal information from Microsoft Whiteboard.
+In order to manage personal information, you must first ensure that Whiteboard is enabled for your organization. For more information, see [Manage access to Whiteboard](manage-whiteboard-access-organizations.md).
+ ## Export a whiteboard ### On Windows
On iOS or the web, do the following steps:
2. Select the **Settings** icon.
-3. Do one of the following:
+3. Do one of the following steps:
- In Whiteboard for iOS, select **Export image (png)**.
whiteboard Manage Data Gcc High https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-data-gcc-high.md
description: Learn how to enable, disable, and manage access to Whiteboard.
Data is stored as .whiteboard files in OneDrive for Business. An average whiteboard might be anywhere from 50 KB to 1 MB in size and located wherever your OneDrive for Business content resides. To check where new data is created, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations). Look at the location for OneDrive for Business. All properties that apply to general files in OneDrive for Business also apply to Whiteboard, except for external sharing.
+In order to manage data, you must first ensure that Whiteboard is enabled for your organization. For more information, see [Manage access to Whiteboard in GCC High environments](manage-whiteboard-access-gcc-high.md).
+ You can manage Whiteboard data using existing OneDrive for Business controls. For more information, see [OneDrive guide for enterprises](/onedrive/plan-onedrive-enterprise). You can use existing OneDrive for Business tooling to satisfy data subject requests (DSRs) for General Data Protection Regulation (GDPR). Whiteboard files can be moved in the same way as other content in OneDrive for Business. However, share links and permissions might not move.
whiteboard Manage Data Organizations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-data-organizations.md
description: Learn about data retention for Microsoft Whiteboard in Azure and On
# Manage data for Microsoft Whiteboard
-In order to manage data, you must first ensure that Whiteboard is enabled for your organization. For more information, see [Manage access to Whiteboard](manage-whiteboard-access-organizations.md).
- Whiteboard content is stored in both Azure and OneDrive for Business. New whiteboards will be stored in OneDrive for Business; the only exception is whiteboards started from a Surface Hub will be stored in Azure (which will be moved to OneDrive for Business in the future). For more information, see [Manage sharing in Whiteboard](manage-sharing-organizations.md).
+In order to manage data, you must first ensure that Whiteboard is enabled for your organization. For more information, see [Manage access to Whiteboard](manage-whiteboard-access-organizations.md).
+ ## Azure storage overview Whiteboard currently stores content securely in Azure. Data might be stored in different locations, depending on the country and when Whiteboard switched to storing new content in those locations. To check where new data is created, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
whiteboard Manage Whiteboard Access Organizations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-whiteboard-access-organizations.md
description: Learn how to set up Microsoft Whiteboard for your organization in t
>[!NOTE] > This article applies to Enterprise or Education organizations who use Whiteboard. For US Government GCC High environments, see [Manage access to Microsoft Whiteboard for GCC High environments](manage-whiteboard-access-gcc-high.md).
-Microsoft Whiteboard is a visual collaboration canvas where people, content, and ideas come together. Today, Whiteboard runs on Azure for Enterprise and Education customers. Whiteboard is transitioning to be run on top of OneDrive for Business. This transition will bring many new capabilities and allow you to create, share, discover, and manage whiteboards as easily as any Office document.
-
-Whiteboard is automatically enabled for applicable Microsoft 365 tenants.
+Microsoft Whiteboard is a visual collaboration canvas where people, content, and ideas come together. Microsoft Whiteboard on OneDrive for Business is enabled by default for applicable Microsoft 365 tenants. It can be enabled or disabled at a tenant-wide level. You should also ensure that **Microsoft Whiteboard Services** is enabled in the **Azure Active Directory admin center** > **Enterprise applications**.
Whiteboard conforms to global standards including SOC 1, SOC 2, ISO 27001, HIPAA, and EU Model Clauses.
The following admin settings are required for Whiteboard:
- The <code>Set-SPOTenant -IsWBFluidEnabled</code> cmdlet must be enabled using [SharePoint Online PowerShell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
->[!NOTE]
-> The roll out of OneDrive for Business storage is in progress. When you go to the Microsoft 365 admin center, the option to opt in or out of OneDrive for Business storage is disabled if your tenant already has been transitioned to OneDrive for Business.
- You can control access to Whiteboard in the following ways: - Enable or disable Whiteboard for your entire tenant using the Microsoft 365 admin center.