Updates from: 08/25/2022 01:19:06
Category Microsoft Docs article Related commit history on GitHub Change details
admin Secure Your Business Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/secure-your-business-data.md
Title: Top 10 ways to secure your business data - Best practices for small and medium-sized businesses
+ Title: Top 10 ways to secure your data - Best practices for small and medium-sized businesses
f1.keywords: - CSH
audience: Admin
ms.localizationpriority: medium Previously updated : 08/23/2022 Last updated : 08/24/2022 - Adm_O365 - Adm_TOC
search.appverid:
- BCS160 - MET150 - MOE150
-description: "Protect your business email and data from cyberthreats, including ransomware, phishing, and malicious attachments."
+description: "Learn the top 10 ways to protect your business, including ransomware, phishing, and malicious attachments."
# Top 10 ways to secure your data - Best practices for small and medium-sized businesses
Microsoft 365 for business plans include security capabilities, such as antiphis
1. **Use multi-factor authentication**. [Multi-factor authentication](multi-factor-authentication-microsoft-365.md) (MFA), also known as two-step verification, requires people to use a code or authentication app on their phone to sign into Microsoft 365, and is a critical first step to protecting your business data. Using MFA can prevent hackers from taking over if they know your password. See [security defaults and MFA](../../business-premium/m365bp-conditional-access.md).
-2. **Protect your administrator accounts**. Administrator accounts (also called admins) have elevated privileges, making these accounts more susceptible to cyberattacks. See [Protect your administrator accounts](../../business-premium/m365bp-protect-admin-accounts.md).
+2. **Protect your administrator accounts**. Administrator accounts (also called admins) have elevated privileges, making these accounts more susceptible to cyberattacks. You'll need to set up and manage the right number of admin and user accounts for your business. We also recommend adhering to the information security principle of least privilege, which means that users and applications should be granted access only to the data and operations they require to perform their jobs. See [Protect your administrator accounts](../../business-premium/m365bp-protect-admin-accounts.md).
3. **Use preset security policies**. Your subscription includes [preset security policies](../../security/office-365-security/preset-security-policies.md) that use recommended settings for anti-spam, anti-malware, and anti-phishing protection. See [Protect against malware and other cyberthreats](../../business-premium/m365bp-increase-protection.md).
Microsoft 365 for business plans include security capabilities, such as antiphis
- [Set up meetings with Microsoft Teams](../../business-premium/set-up-meetings.md) - [Share files and videos in a safe environment](../../business-premium/share-files-and-videos.md)
-7. **Set sharing settings for SharePoint and OneDrive files and folders**. Your default sharing levels for SharePoint and OneDrive might be set to a more permissive level than you should use. We recommend reviewing and if necessary, changing the default settings to better protect your business. See [Set sharing settings for SharePoint and OneDrive files and folders](../../business-premium/m365bp-increase-protection.md#set-sharing-settings-for-sharepoint-and-onedrive-files-and-folders).
+7. **Set sharing settings for SharePoint and OneDrive files and folders**. Your default sharing levels for SharePoint and OneDrive might be set to a more permissive level than you should use. We recommend reviewing and if necessary, changing the default settings to better protect your business. Grant people only the access they need to do their jobs. See [Set sharing settings for SharePoint and OneDrive files and folders](../../business-premium/m365bp-increase-protection.md#set-sharing-settings-for-sharepoint-and-onedrive-files-and-folders).
8. **Use Microsoft 365 Apps on devices**. Outlook and Microsoft 365 Apps (also referred to as Office apps) enable people to work productively and more securely across devices. Whether you're using the web or desktop version of an app, you can start a document on one device, and pick it up later on another device. Instead of sending files as email attachments, you can share links to files that are stored in SharePoint or OneDrive. See [Install Office apps on all devices](../../business-premium/m365bp-install-office-apps.md). 9. **Manage calendar sharing for your business**. You can help people in your organization share their calendars appropriately for better collaboration. You can manage what level of detail they can share, such as by limiting the details that are shared to free/busy times only. See [Manage calendar sharing](../../business-premium/m365bp-increase-protection.md#manage-calendar-sharing).
-10. **Maintain your environment**. After your initial setup and configuration of Microsoft 365 for business is complete, your organization needs a maintenance and operations plan. As employees come and go, you'll need to add or remove users, reset passwords, and maybe even reset devices to factory settings. See [Maintain your environment](../../business-premium/m365bp-maintain-environment.md).
+10. **Maintain your environment**. After your initial setup and configuration of Microsoft 365 for business is complete, your organization needs a maintenance and operations plan. As employees come and go, you'll need to add or remove users, reset passwords, and maybe even reset devices to factory settings. You'll also want to make sure people have only the access they need to do their jobs. See [Maintain your environment](../../business-premium/m365bp-maintain-environment.md).
## Comparing Microsoft 365 for business plans
The following table compares capabilities in Microsoft 365 for business plans.
(<a id="fn1">1</a>) Microsoft Publisher and Microsoft Access run on Windows laptops and desktops only.
-(<a id="fn2">2</a>) Microsoft Intune is included with certain Microsoft 365 plans. Basic Mobility and Security is part of the Microsoft 365 Business Basic and Standard. [Choose between Basic Mobility and Security or Intune](../basic-mobility-security/choose-between-basic-mobility-and-security-and-intune.md).
+(<a id="fn2">2</a>) Microsoft Intune is included with certain Microsoft 365 plans. Basic Mobility and Security capabilities are part of the Microsoft 365 Business Basic and Standard. [Choose between Basic Mobility and Security or Intune](../basic-mobility-security/choose-between-basic-mobility-and-security-and-intune.md).
(<a id="fn3">3</a>) Defender for Business is included in Microsoft 365 Business Premium. It can also be purchased as an add-on for Microsoft 365 Business Basic or Microsoft 365 Business Standard. See [Get Defender for Business](/microsoft-365/security/defender-business/get-defender-business).
business-premium Index https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/index.md
ms.audience: Admin
ms.localizationpriority: high Previously updated : 08/09/2022 Last updated : 08/24/2022 - M365-Campaigns - m365solution-overview
description: "Learn how to implement cybersecurity for small or medium sized bus
# Microsoft 365 Business Premium ΓÇô productivity and cybersecurity for small business
-Let us begin by saying that you made a wise choice in adopting Microsoft 365 Business Premium and its world class productivity tools. Designed with cybersecurity in mind, Microsoft 365 Business Premium safeguards your data, devices and information. You are your organization's first and best defense against hackers and cyberattackers, including random individuals, organized crime, or highly sophisticated nation states.
+Microsoft 365 Business Premium with its world class productivity tools is a wise choice for small and medium-sized businesses. Designed with cybersecurity in mind, Microsoft 365 Business Premium safeguards your data, devices and information. You are your organization's first and best defense against hackers and cyberattackers, including random individuals, organized crime, or highly sophisticated nation states.
-The task before you is this: let Microsoft 365 Business Premium help secure your organizationΓÇÖs future! Approach this task by taking on the following missions:
+The task before you is this: let Microsoft 365 Business Premium help secure your organizationΓÇÖs future! Approach this task by taking on the following six missions:
:::image type="content" source="media/sixmissions.png" alt-text="Diagram listing six missions.":::
Completing all six missions is the most effective way to thwart hackers, protect
## Cybersecurity playbook
-The guidance in these missions is based upon the zero trust methodology and helps your business achieve the goals described in the Harvard Kennedy School [Cybersecurity Campaign Playbook](https://go.microsoft.com/fwlink/p/?linkid=2015598). A summary is available for you to download ([Get the PDF here](https://download.microsoft.com/download/9/c/1/9c167271-8209-492e-acc2-38a39d1834c2/m365bp-cybersecurity-playbook.pdf)).
+The guidance in these missions is based upon the [Zero Trust security model](../security/office-365-security/microsoft-365-policies-configurations.md), and is summarized in a downloadable [Cybersecurity playbook](https://download.microsoft.com/download/9/c/1/9c167271-8209-492e-acc2-38a39d1834c2/m365bp-cybersecurity-playbook.pdf)).
[:::image type="content" source="media/m365bp-cyber-security-playbook.png" alt-text="Cybersecurity playbook. Download this guide.":::](https://download.microsoft.com/download/9/c/1/9c167271-8209-492e-acc2-38a39d1834c2/m365bp-cybersecurity-playbook.pdf)
business-premium M365bp Conditional Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-conditional-access.md
audience: Admin
ms.localizationpriority: high Previously updated : 08/08/2022 Last updated : 08/24/2022 - M365-Campaigns - m365solution-smb
description: "Learn how security defaults can help protect your organization fro
# Security defaults and multi-factor authentication
-Microsoft 365 Business Premium was designed to help protect your company's user accounts with preconfigured security settings. These settings include enabling multi-factor authentication (MFA) for all your admins and user accounts. For most organizations, security defaults offer a good level of sign-in security.
-
-> [!TIP]
-> For more information about security defaults and the policies they enforce, see [What are security defaults?](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults).
+Microsoft 365 Business Premium was designed to help protect your company's user accounts with preconfigured security settings. These settings include enabling multi-factor authentication (MFA) for all your admins and user accounts. For most organizations, security defaults offer a good level of sign-in security. For organizations who must meet more stringent requirements, Conditional Access can be used.
This article provides information about:
This article provides information about:
- **[Conditional Access](#conditional-access)** (for businesses with more stringent security requirements) > [!NOTE]
-> If you've been using Conditional Access policies, you'll need to turn them off before using security defaults. You can use either security defaults or Conditional Access policies, but you can't use both at the same time.
+> You can use *either* security defaults *or* Conditional Access policies, but you can't use both at the same time.
## Security defaults
business-premium M365bp Protect Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-devices.md
audience: Admin
ms.localizationpriority: high Previously updated : 08/16/2022 Last updated : 08/24/2022 - M365-Campaigns - m365solution-smb
description: "An overview for how to set up and secure managed devices from secu
:::image type="content" source="media/mission6.png" alt-text="Secure managed devices with Defender for Business.":::
-Welcome to your final critical mission. Here, you'll onboard and implement protection for all the managed devices in your organization. [Onboard your devices to Defender for Business](../security/defender-business/mdb-onboard-devices.md) to help ensure those devices are protected from ransomware, malware, phishing, and other threats. You can also make sure Windows devices are protected and ready for Office deployment. When you're done, you can rest assured, knowing you've done what you can to protect your organization when these objectives have been achieved!
+Welcome to your final critical mission. Here, you'll onboard and implement protection for all the managed devices in your organization. [Onboard your devices to Defender for Business](../security/defender-business/mdb-onboard-devices.md) to help ensure those devices are protected from ransomware, malware, phishing, and other threats. You can also make sure Windows devices are protected and ready for Office deployment. When you're done, you can rest assured, knowing you've done your part to protect your organization when these objectives have been achieved!
Your objectives are to: - [Set up managed devices](m365bp-managed-devices-setup.md) - [Onboard enrolled devices and apply policies](m365bp-onboard-devices-mdb.md)-- Protect Windows devices by taking these steps:
- - [Upgrade Windows devices to Windows 10 Pro](m365bp-upgrade-windows-10-pro.md) (if necessary)
- - [Learn about threat protection by Microsoft Defender Antivirus](m365bp-threats-detected-defender-av.md)
- - [Secure Windows devices with default settings](m365bp-secure-windows-devices.md)
- - [Manage Windows devices with Microsoft 365 Business Premium](m365bp-manage-windows-devices.md)
- - [Prepare to automatically install Office apps to client computers](m365bp-prepare-for-office-client-deployment.md)
- - [Validate device protection settings for Windows 10 or 11 PCs](m365bp-validate-settings-on-windows-10-pcs.md)
+- [Secure Windows devices with default settings](m365bp-secure-windows-devices.md)
- [Review and edit device policies](m365bp-view-edit-create-mdb-policies.md) - [Manage device groups](m365bp-device-groups-mdb.md)
business-premium M365bp Secure Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-secure-users.md
audience: Admin
ms.localizationpriority: high Previously updated : 07/26/2022 Last updated : 08/24/2022 - M365-Campaigns - m365solution-smb
description: "Learn how Microsoft 365 Business Premium helps you run your busine
Microsoft 365 Business Premium is a comprehensive cloud productivity and security solution that was designed and built for small and medium-sized businesses (1-300 employees). With Microsoft 365 Business Premium, you can: -- Enable your employees to be connected and productive, whether they're working on site or remotely, with best-in-class collaboration tools like Microsoft Teams.-- Provide your employees with secure access to their business data and apps, and help ensure that only authorized personnel can access confidential work data.-- Defend against sophisticated cyberthreats and safeguard your business data with protection against phishing, ransomware, and data loss.-- Manage and secure the devices (Windows, Mac, iOS, and Android) that connect to your data, and help keep those devices up to date.
+- **Enable your employees to be connected and productive**, whether they're working on site or remotely, with best-in-class collaboration tools like [Microsoft Teams](create-teams-for-collaboration.md).
+- **Provide your employees with secure access to their business data and apps**, and help ensure that only authorized personnel can access confidential work data.
+- **Defend against sophisticated cyberthreats and safeguard your business data** with advanced protection against phishing, ransomware, and data loss.
+- **Manage and secure devices** (Windows, Mac, iOS, and Android) that connect to your data, and help keep those devices up to date.
-Microsoft 365 Business Premium offers you one comprehensive solution for productivity and security. As an admin or IT Pro, you have everything you need in one place for administration, billing, and 24x7 support, while reducing cost and complexity for your business. This article describes how Microsoft 365 Business Premium can help your business or campaign, and includes the following sections:
+Microsoft 365 Business Premium offers you one comprehensive solution for productivity and security. As an admin or IT Pro, you have everything you need in one place for administration, billing, and 24x7 support, while reducing cost and complexity for your business. This article includes the following sections:
- [Video: Top 5 benefits of Microsoft 365 Business Premium](#video-top-5-benefits-of-microsoft-365-business-premium) - [Productivity and advanced security capabilities](#productivity-and-security) that enable you to run your business more securely, across devices, and from almost anywhere
Our digital threats guide describes different kinds of threats and what you and
2. [Start the setup process](m365bp-setup-overview.md).
-3. [Bump up security](m365bp-security-overview.md).
+3. [Set up your security capabilities](m365bp-security-overview.md).
business-premium M365bp Security Incident Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-security-incident-management.md
Want to see how it works? Watch this short video on a typical incident response.
To learn more about incident responses, see the following articles:
-1. [Review security recommendations](../security/defender-business/mdb-view-tvm-dashboard.md?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json).
-
-2. [Review detected threats and take action](m365bp-review-threats-take-action.md).
-
-3. [Review remediation actions](m365bp-review-remediation-actions-devices.md).
-
-4. [Respond to a compromised email account](../security/office-365-security/responding-to-a-compromised-email-account.md).
+- [Review security recommendations](../security/defender-business/mdb-view-tvm-dashboard.md?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json).
+- [Review detected threats and take action](m365bp-review-threats-take-action.md).
+- [Review remediation actions](m365bp-review-remediation-actions-devices.md).
+- [Respond to a compromised email account](../security/office-365-security/responding-to-a-compromised-email-account.md).
business-premium M365bp Trial Playbook Microsoft Business Premium https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-trial-playbook-microsoft-business-premium.md
audience: Admin
ms.localizationpriority: high Previously updated : 07/19/2022 Last updated : 08/24/2022 ms.prod: m365-security search.appverid: - MOE150
When you [start a trial or purchase Microsoft 365 Business Premium](get-microsof
First, [set up your trial](../business-premium/m365bp-setup.md)!
-After you've initiated the trial and completed the setup process, it may take up to two hours for changes to take effect.
+After you've initiated the trial and completed the setup process, it can take up to two hours for changes to take effect.
Microsoft 365 Business Premium includes [Preset security policies](/security/office-365-security/preset-security-policies.md) that you can use in your environment. These policies represent a baseline protection profile that's suitable for most users. Standard protection includes:
When you try or buy Microsoft 365 Business Premium, you have the option of using
4. Follow the steps in the wizard to [create DNS records at any DNS hosting provider for Office 365](/microsoft-365/admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider) that verifies you own the domain. If you know your domain host, see [Add a domain to Microsoft 365](/microsoft-365/admin/setup/add-domain).
-5. If your hosting provider is GoDaddy or another host enabled with domain connect, the process is easy and you'll be automatically asked to sign in and let Microsoft authenticate on your behalf.
+5. If your hosting provider is GoDaddy or another host enabled with domain connect, you'll be asked to sign in and let Microsoft authenticate on your behalf automatically.
## Onboard and protect devices
-> [!NOTE]
-> The ability to onboard endpoints running Windows Server or Linux Server is now in preview! See [Onboard devices to Microsoft Defender for Business](../security/defender-business/mdb-onboard-devices.md).
+Microsoft 365 Business Premium includes Defender for Business, a new security solution to protect devices. See [Onboard devices to Microsoft Defender for Business](../security/defender-business/mdb-onboard-devices.md).
1. Go to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
When you try or buy Microsoft 365 Business Premium, you have the option of using
4. [Review your security policies](../security/defender-business/mdb-configure-security-settings.md).
-## Use Office apps on devices
+## Use Microsoft 365 Apps on devices
-1. First, you'll need to [install Office](m365bp-install-office-apps.md).
+1. First, you'll need to [install Microsoft 365 Apps](m365bp-install-office-apps.md).
-2. Go to office.com and [sign in](https://support.microsoft.com/office/get-started-at-office-com-91a4ec74-67fe-4a84-a268-f6bdf3da1804).
+2. Go to [https://office.com](https://office.com) and sign in. (See [Getting Started at Office.com](https://support.microsoft.com/office/get-started-at-office-com-91a4ec74-67fe-4a84-a268-f6bdf3da1804).)
3. Create an Office document, such as a [Word document](https://support.microsoft.com/office/basic-tasks-in-word-87b3243c-b0bf-4a29-82aa-09a681999fdc).
When you try or buy Microsoft 365 Business Premium, you have the option of using
2. Take some time to [familiarize yourself with the portal](../security/defender-business/mdb-get-started.md).
-3. Now, [assess your security posture](../security/defender/microsoft-secure-score.md).
+3. Now, [assess your security posture](../security/defender/microsoft-secure-score.md), and see how you can improve your score.
-4. Familiarize yourself with [how to respond to a security incident](../security/defender-business/mdb-respond-mitigate-threats.md).
+4. Learn how to [respond to a security incident](../security/defender-business/mdb-respond-mitigate-threats.md).
5. Lastly, [review remediation actions](../security/defender-business/mdb-review-remediation-actions.md). ## See also -- [Microsoft 365 Business Premium &mdash; cybersecurity for small business](index.md)
+- [Microsoft 365 Business Premium - cybersecurity for small business](index.md)
+- [What is Microsoft Defender for Business?](../security/defender-business/mdb-overview.md)
compliance Archive Jive Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/archive-jive-data.md
- Title: "Set up a connector to archive Jive data in Microsoft 365"-- NOCSH--- Previously updated : ---
-description: "Admins can set up a connector to import and archive Jive data from Veritas in Microsoft 365. This connector lets you archive third-party data in Microsoft 365 so you can use compliance features such as legal hold, content search, and retention policies to manage your organization's third-party data."
--
-# Set up a connector to archive Jive data
-
-Use a Veritas connector in the Microsoft Purview compliance portal to import and archive data from the collaboration platform to user mailboxes in your Microsoft 365 organization. Veritas provides a [Jive](https://globanet.com/jive/) connector that is configured to capture items from the third-party data source (on a regular basis) and then import those items to Microsoft 365. The connector converts content such as email messages, chats, and attachments from a user's Jive account to an email message format and then imports those items to the user's mailbox in Microsoft 365.
-
-After Jive data is stored in user mailboxes, you can apply Microsoft Purview features such as Litigation Hold, eDiscovery, retention policies and retention labels, and communication compliance. Using a Jive connector to import and archive data in Microsoft 365 can help your organization stay compliant with government and regulatory policies.
-
-## Overview of archiving Jive data
-
-The following overview explains the process of using a connector to archive the Jive data in Microsoft 365.
-
-![Archiving workflow for Jive data.](../media/JiveConnectorWorkflow.png)
-
-1. Your organization works with Jive to set up and configure a Jive site.
-
-2. Once every 24 hours, items from Jive are copied to the Veritas Merge1 site. The connector also converts the content of Jive items to an email message format.
-
-3. The Jive connector that you create in the compliance portal connects to the Veritas Merge1 site every day and transfers the content to a secure Azure Storage location in the Microsoft cloud.
-
-4. The connector imports the converted items to the mailboxes of specific users by using the value of the *Email* property of the automatic user mapping as described in [Step 3](#step-3-map-users-and-complete-the-connector-setup). A new subfolder in the Inbox folder named **Jive** is created in the user mailboxes, and the items are imported to that folder. The connector does this by using the value of the *Email* property. Every Jive item contains this property, which is populated with the email address of every participant of the item.
-
-## Before you begin
--- Create a Veritas Merge1 account for Microsoft connectors. To create this account, contact [Veritas Customer Support](https://www.veritas.com/content/support/). You will sign into this account when you create the connector in Step 1.--- The user who creates the Jive connector in Step 1 (and completes it in Step 3) must be assigned the Data Connector Admin role. This role is required to add connectors on the **Data connectors** page in the compliance portal. This role is added by default to multiple role groups. For a list of these role groups, see the "Roles in the security and compliance centers" section in [Permissions in the Security & Compliance Center](../security/office-365-security/permissions-in-the-security-and-compliance-center.md#roles-in-the-security--compliance-center). Alternatively, an admin in your organization can create a custom role group, assign the Data Connector Admin role, and then add the appropriate users as members. For instructions, see the "Create a custom role group" section in [Permissions in the Microsoft Purview compliance portal](microsoft-365-compliance-center-permissions.md#create-a-custom-role-group).--- This Veritas data connector is in public preview in GCC environments in the Microsoft 365 US Government cloud. Third-party applications and services might involve storing, transmitting, and processing your organization's customer data on third-party systems that are outside of the Microsoft 365 infrastructure and therefore are not covered by the Microsoft Purview and data protection commitments. Microsoft makes no representation that use of this product to connect to third-party applications implies that those third-party applications are FEDRAMP compliant.-
-## Step 1: Set up the Jive connector
-
-The first step is to access to the **Data Connectors** page in the compliance portal and create a connector for Jive data.
-
-1. Go to [https://compliance.microsoft.com](https://compliance.microsoft.com/) and then click **Data connectors** > **Jive**.
-
-2. On the **Jive** product description page, click **Add connector**.
-
-3. On the **Terms of service** page, click **Accept**.
-
-4. Enter a unique name that identifies the connector, and then click **Next**.
-
-5. Sign in to your Merge1 account to configure the connector.
-
-## Step 2: Configure the Jive connector
-
-The second step is to configure the Jive connector on the Merge1 site. For information about how to configure the Jive connector, see [Merge1 Third-Party Connectors User Guide](https://docs.ms.merge1.globanetportal.com/Merge1%20Third-Party%20Connectors%20Jive%20User%20Guide.pdf).
-
-After you click **Save & Finish**, the **User mapping** page in the connector wizard in the compliance portal is displayed.
-
-## Step 3: Map users and complete the connector setup
-
-To map users and complete the connector setup in the compliance portal, follow the steps below:
-
-1. On the **Map Jive users to Microsoft 365 users** page, enable automatic user mapping. The Jive items include a property called *Email*, which contains email addresses for users in your organization. If the connector can associate this address with a Microsoft 365 user, the items are imported to that user's mailbox.
-
-2. Click **Next**, review your settings, and go to the **Data connectors** page to see the progress of the import process for the new connector.
-
-## Step 4: Monitor the Jive connector
-
-After you create the Jive connector, you can view the connector status in the compliance portal.
-
-1. Go to [https://compliance.microsoft.com](https://compliance.microsoft.com) and click **Data connectors** in the left nav.
-
-2. Click the **Connectors** tab and then select the **Jive** connector to display the flyout page. This page contains the properties and information about the connector.
-
-3. Under **Connector status with source**, click the **Download log** link to open (or save) the status log for the connector. This log contains information about the data that's been imported to the Microsoft cloud. For more information, see [View admin logs for data connectors](data-connector-admin-logs.md).
-
-## Known issues
--- At this time, we don't support importing attachments or items that are larger than 10 MB. Support for larger items will be available at a later date.
compliance Customer Key Manage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customer-key-manage.md
To create a multi-workload DEP, follow these steps:
- *PolicyName* is the name you want to use for the policy. Names can't contain spaces. For example, Contoso_Global.
- - *KeyVaultURI1* is the URI for the first key in the policy. For example, <https://contosoWestUSvault1.vault.azure.net/keys/Key_01>.
+ - *KeyVaultURI1* is the URI for the first key in the policy. For example, `https://contosoWestUSvault1.vault.azure.net/keys/Key_01`.
- - *KeyVaultURI2* is the URI for the second key in the policy. For example, <https://contosoCentralUSvault1.vault.azure.net/keys/Key_02>. Separate the two URIs by a comma and a space.
+ - *KeyVaultURI2* is the URI for the second key in the policy. For example, `https://contosoCentralUSvault1.vault.azure.net/keys/Key_02`. Separate the two URIs by a comma and a space.
- *Policy Description* is a user-friendly description of the policy that will help you remember what the policy is for. You can include spaces in the description. For example, "Root policy for multiple workloads for all users in the tenant.".
To create a DEP to use with a mailbox, follow these steps:
- *Policy Description* is a user-friendly description of the policy that will help you remember what the policy is for. You can include spaces in the description. For example, "Root key for mailboxes in USA and its territories".
- - *KeyVaultURI1* is the URI for the first key in the policy. For example, <https://contoso_EastUSvault01.vault.azure.net/keys/USA_key_01>.
+ - *KeyVaultURI1* is the URI for the first key in the policy. For example, `https://contoso_EastUSvault01.vault.azure.net/keys/USA_key_01`.
- - *KeyVaultURI2* is the URI for the second key in the policy. For example, <https://contoso_EastUS2vault01.vault.azure.net/keys/USA_Key_02>. Separate the two URIs by a comma and a space.
+ - *KeyVaultURI2* is the URI for the second key in the policy. For example, `https://contoso_EastUS2vault01.vault.azure.net/keys/USA_Key_02`. Separate the two URIs by a comma and a space.
Example:
compliance Keyword Queries And Search Conditions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/keyword-queries-and-search-conditions.md
Keep the following in mind when using search conditions.
- The search query that is created by using the keywords box and conditions is displayed on the **Search** page, in the details pane for the selected search. In a query, everything to the right of the notation `(c:c)` indicates conditions that are added to the query. -- Conditions only add properties to the search query; the don't add operators. This is why the query displayed in the detail pane doesn't show operators to the right of the `(c:c)` notation. KQL adds the logical operators (according to the previously explained rules) when the executing the query.
+- Conditions only add properties to the search query; they don't add operators. This is why the query displayed in the detail pane doesn't show operators to the right of the `(c:c)` notation. KQL adds the logical operators (according to the previously explained rules) when the executing the query.
- You can use the drag and drop control to resequence the order of conditions. Click on the control for a condition and move it up or down.
compliance Ome https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ome.md
The rest of this article applies to the Microsoft Purview Message Encryption.
Microsoft Purview Message Encryption is an online service that's built on Microsoft Azure Rights Management (Azure RMS) which is part of Azure Information Protection. This service includes encryption, identity, and authorization policies to help secure your email. You can encrypt messages by using rights management templates, the [Do Not Forward option](/information-protection/deploy-use/configure-usage-rights#do-not-forward-option-for-emails), and the [encrypt-only option](/information-protection/deploy-use/configure-usage-rights#encrypt-only-option-for-emails).
-Users can then encrypt email messages and various attachments by using these options. For a full list of supported attachment types, see ["File types covered by IRM policies when they are attached to messages" in Introduction to IRM for email messages](https://support.office.com/article/bb643d33-4a3f-4ac7-9770-fd50d95f58dc#FileTypesforIRM).
+Users can then encrypt email messages and various attachments by using these options. For a full list of supported attachment types, see ["File types covered by IRM policies when they're attached to messages" in Introduction to IRM for email messages](https://support.office.com/article/bb643d33-4a3f-4ac7-9770-fd50d95f58dc#FileTypesforIRM).
As an administrator, you can also define mail flow rules to apply this protection. For example, you can create a rule that requires the encryption of all messages addressed to a specific recipient, or that contains specific words in the subject line, and also specify that recipients can't copy or print the contents of the message.
For a detailed list of the differences between the previous version of OME and M
When someone sends an email message that matches an encryption mail flow rule, the message is encrypted before it's sent. All Microsoft 365 end users that use Outlook clients to read mail receive native, first-class reading experiences for encrypted and rights-protected mail even if they're not in the same organization as the sender. Supported Outlook clients include Outlook desktop, Outlook Mac, Outlook mobile on iOS and Android, and Outlook on the web (formerly known as Outlook Web App).
-Recipients of encrypted messages who receive encrypted or rights-protected mail sent to their Outlook.com, Gmail, and Yahoo accounts receive a wrapper mail that directs them to the OME Portal where they can easily authenticate using a Microsoft account, Gmail, or Yahoo credentials.
+Recipients of encrypted messages who receive encrypted or rights-protected mail sent to their Outlook.com, Gmail, and Yahoo accounts receive a wrapper mail that directs them to the encrypted message portal where they can easily authenticate using a Microsoft account, Gmail, or Yahoo credentials.
-End users that read encrypted or rights-protected mail on clients other than Outlook also use the OME portal to view encrypted and rights-protected messages that they receive.
+End users that read encrypted or rights-protected mail on clients other than Outlook also use the encrypted message portal to view encrypted and rights-protected messages that they receive.
-If the sender of the protected mail is in GCC High and the recipient is outside of GCC High, including commercial users, Outlook.com users, and users of other email providers such as Gmail, the recipient receives a wrapper mail. The wrapper mail directs the recipient to the OME Portal where the recipient is able to read and reply to the message. Otherwise, if the sender and recipient are both in the GCC High environment, even if they're not in the same organization, then recipients that use Outlook clients to read mail receive native, first-class reading experiences for encrypted and rights-protected mail. For more information about the different experience in GCC High, see [Compare versions of OME](ome-version-comparison.md).
+If the sender of the protected mail is in GCC High and the recipient is outside of GCC High, including commercial users, Outlook.com users, and users of other email providers such as Gmail, the recipient receives a wrapper mail. The wrapper mail directs the recipient to the encrypted message portal where the recipient is able to read and reply to the message. Otherwise, if the sender and recipient are both in the GCC High environment, even if they're not in the same organization, then recipients that use Outlook clients to read mail receive native, first-class reading experiences for encrypted and rights-protected mail. For more information about the different experience in GCC High, see [Compare versions of OME](ome-version-comparison.md).
For more information about size limits for messages and attachments that you can encrypt using OME, see [Exchange Online Limits](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits).
Message revocation and expiration only work for emails that your users send to r
One way to enable Microsoft Purview Message Encryption is for Exchange Online and Exchange Online Protection administrators to define mail flow rules. These rules determine under what conditions email messages should be encrypted. When an encryption action is set for a rule, any messages that match the rule conditions are encrypted before they're sent.
-Mail flow rules are flexible, letting you combine conditions so you can meet specific security requirements in a single rule. For example, you can create a rule to encrypt all messages that contain specified keywords and are addressed to external recipients. Microsoft Purview Message Encryption also encrypt replies from recipients of encrypted email.
+Mail flow rules are flexible, letting you combine conditions so you can meet specific security requirements in a single rule. For example, you can create a rule to encrypt all messages that contain specified keywords and are addressed to external recipients. Microsoft Purview Message Encryption also encrypts replies from recipients of encrypted email.
For more information about how to create mail flow rules to take advantage of Microsoft Purview Message Encryption, see [Define mail flow rules to encrypt email messages](define-mail-flow-rules-to-encrypt-email.md).
If you're ready to get started using Microsoft Purview Message Encryption within
With Microsoft Purview Message Encryption, users can send encrypted email from Outlook and Outlook on the web. Additionally, admins can set up mail flow rules in Microsoft 365 to automatically encrypt emails based on keyword matching or other conditions.
-Recipients of encrypted messages who are in organizations will be able to read those messages seamlessly in any version Outlook, including Outlook for PC, Outlook for Mac, Outlook on the web, Outlook for iOS, and Outlook for Android. Users that receive encrypted messages on other email clients can view the messages in the OME portal.
+Recipients of encrypted messages who are in organizations will be able to read those messages seamlessly in any version Outlook, including Outlook for PC, Outlook for Mac, Outlook on the web, Outlook for iOS, and Outlook for Android. Users that receive encrypted messages on other email clients can view the messages in the encrypted message portal.
For detailed guidance about how to send and view encrypted messages, take a look at these articles.
enterprise Modern Desktop Deployment And Management Lab https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/modern-desktop-deployment-and-management-lab.md
There are two versions of the lab available for free download:
|Windows 10 Lab|Windows 11 Lab| ||| |[Win 10 lab environment](https://download.microsoft.com/download/8/5/e/85e007b0-1f3e-460c-bd0a-5a8c6ec490b5/Win10_21H2_lab.zip)|[Win 11 lab environment](https://download.microsoft.com/download/5/0/b/50bbe36a-9291-4339-9dcc-2a444fcd1659/Microsoft365DeviceLabKit.zip)|
-|[Win 10 lab guides](https://download.microsoft.com/download/8/5/e/85e007b0-1f3e-460c-bd0a-5a8c6ec490b5/Win10_21H2_guides.zip)|[Win 11 lab guides](https://download.microsoft.com/download/5/0/b/50bbe36a-9291-4339-9dcc-2a444fcd1659/Win11_SetUp_Guide_08.05.zip)|
+|[Win 10 lab guides](https://download.microsoft.com/download/b/d/4/bd4f430b-8cd1-4a07-97b1-c32100fce7ae/Win_10_21H2_lab_guides.zip)|[Win 11 lab guides](https://download.microsoft.com/download/5/0/b/50bbe36a-9291-4339-9dcc-2a444fcd1659/Win11_SetUp_Guide_08.05.zip)|
## A complete lab environment
frontline Collab Features Apps Toolkit https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/collab-features-apps-toolkit.md
+
+ Title: Help your frontline workers use collaboration apps and features
+++
+audience: ITPro
++
+search.appverid:
+searchScope:
+ - Microsoft Teams
+ - Microsoft Cloud for Healthcare
+f1.keywords:
+- NOCSH
+ms.localizationpriority: high
+
+ - microsoftcloud-healthcare
+ - m365solution-healthcare
+ - m365solution-scenario
+ - m365-frontline
+
+description: Resources to help you train your frontline workers on communication and collaboration features in Teams and Teams apps.
+appliesto:
+ - Microsoft Teams
+ - Microsoft 365 for frontline workers
++
+# Help your frontline workers use collaboration apps and features
+
+Now that your organization has begun using Microsoft 365 for frontline workers and Microsoft Teams, you'll need to make sure your workforce is comfortable using the apps and features available to them.
+
+Use your [corporate communications strategy](flw-corp-comms.md) to share these video resources to help your frontline team make the most out of the tools available to them.
+
+## Tags in Microsoft Teams
+
+Tagging users and teams in posts and chat helps your frontline workers reach the right people faster by finding team members by attributes such as role, location, or project.
+
+[End user training for posts and messages in Teams](https://support.microsoft.com/office/create-and-format-a-post-e66777da-636b-49eb-9408-b0d88b212885) <br>
+[View the Tags in Microsoft Teams video on YouTube](https://go.microsoft.com/fwlink/?linkid=2202727)
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE54jBN]
+
+## Walkie Talkie
+
+Walkie Talkie provides instant push-to-talk communication so your frontline workers can communicate easily and securely across locations.
+
+[End user training for Walkie Talkie](https://support.microsoft.com/office/use-walkie-talkie-in-teams-884a008a-761e-4b62-99f8-15671d9a2f69) <br>
+[View the Walkie Talkie video on YouTube](https://go.microsoft.com/fwlink/?linkid=2202710)
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE546Fv]
+
+## Approvals
+
+Approvals helps frontline workers get approvals for tasks, documents and more.
+
+[End user training for Approvals](https://support.microsoft.com/office/what-is-approvals-a9a01c95-e0bf-4d20-9ada-f7be3fc283d3?wt.mc_id=otc_microsoft_teams) <br>
+[View the Approvals video on YouTube](https://go.microsoft.com/fwlink/?linkid=2202800)
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE54mcl]
+
+## Tasks
+
+Frontline workers can use Tasks to view, track and complete important tasks throughout the day.
+
+[End user training for Tasks](https://support.microsoft.com/office/use-the-tasks-app-in-teams-e32639f3-2e07-4b62-9a8c-fd706c12c070) <br>
+[View the Tasks video on YouTube](https://go.microsoft.com/fwlink/?linkid=2202616)
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE54m8E]
+
+## Updates
+
+See how Updates helps frontline workers create, submit and review all updates in the flow of work.
+
+[End user training for Updates](https://support.microsoft.com/office/get-started-in-updates-c03a079e-e660-42dc-817b-ca4cfd602e5a) <br>
+[View the Updates video on YouTube](https://go.microsoft.com/fwlink/?linkid=2202831)
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE5443c]
+
+## Shifts
+
+[Learn how to help your employees use Shifts.](shifts-toolkit.md)
frontline Flw Choose Scenarios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/flw-choose-scenarios.md
Use these scenario overviews to start envisioning what your organization can do
## Communications Communications solutions connect your frontline workers and allow them to collaborate with each other, with others in the organization, and with your customers.
Also see these resources to learn how Yammer can work for your frontline workers
## Wellbeing & engagement Nurture a sense of belonging with your frontline employees by helping them engage with your entire organization.
Cover: [Inline translation](/microsoftteams/inline-message-translation-teams), P
## Training & onboarding Promote continual growth for your employees and encourage knowledge sharing and exchange.
Promote continual growth for your employees and encourage knowledge sharing and
## Schedule management Simplify and streamline schedule coordination with your frontline workforce. Gain visibility into their schedules and enable them to arrange for cover and leave.
Simplify and streamline schedule coordination with your frontline workforce. Gai
## Digitized processes Drive operational efficiency by digitizing paper-based processes and automating routine, repetitive steps.
Drive operational efficiency by digitizing paper-based processes and automating
## Virtual appointments Use Microsoft Bookings and Microsoft Teams to schedule and host virtual appointments with clients and customers. You can integrate Forms with your virtual appointments experience to get the right information about your customers, or as part of your customer support experience to learn what your customers need. More information: [Virtual appointments with Microsoft Teams and the Bookings app](bookings-virtual-visits.md)
+## Help your team, clients, and customers
+
+Find resources to share with your team to help them get comfortable using Teams apps and features. Get customizable infographics and web content to help your clients and customers use virtual appointments with your organization.
+
+| Scenario | Description |
+| | |
+|[Help your clients and customers use virtual appointments](virtual-appointments-toolkit.md) |Customizable infographics and FAQ that you can add to your website to make it easy for your clients to use virtual appointments with your organization. |
+|[Help your frontline workers track time and attendance](shifts-toolkit.md) |Videos to help your frontline managers and employees learn about how to use Shifts in Microsoft Teams. |
+|[Help your frontline workers use collaboration apps and features](collab-features-apps-toolkit.md) |Videos to help your frontline team use Microsoft Teams apps and features. |
+ ## More scenarios and solutions with the digital ecosystem All of the scenarios above can be achieved with out of the box capabilities from Microsoft. But you can extend even further with third-party apps in [AppSource](https://appsource.microsoft.com/marketplace/apps?search=frontline&page=1) and custom apps that you or our partners build for you with Power Platform, Teams, and Viva extensibility.
frontline Flw Team Collaboration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/flw-team-collaboration.md
Financial services organizations can also use the [Collaboration Manager for Loa
> [!TIP] > Examples are given for the financial services, healthcare, nonprofit, and retail industries, but you can use these apps for an organization in any sector.
+[View videos and resources](collab-features-apps-toolkit.md) to share with your team to help them use collaboration apps and features in Teams.
+ ### Create, manage, and share schedules with Shifts Use Shifts to seamlessly manage and share schedules. Managers can create custom groups such as cashiers, nurses, or mortgage specialists, assign shifts to employees, add custom labeling and breaks, and add open shifts that employees can request to take. Employees can use Shifts to set their availability, view their schedules, swap shifts with coworkers, and clock in and out. Managers can also create open shifts that employees can request. For example, a volunteer coordinator at a nonprofit could create open shifts that volunteers can request to take.
-[Learn how to Manage Shifts for your organization](/microsoftteams/expand-teams-across-your-org/shifts/manage-the-shifts-app-for-your-organization-in-teams?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
+Learn how to [Manage Shifts for your organization](/microsoftteams/expand-teams-across-your-org/shifts/manage-the-shifts-app-for-your-organization-in-teams?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
-Share this [Shifts video training](https://support.microsoft.com/office/what-is-shifts-f8efe6e4-ddb3-4d23-b81b-bb812296b821) with your users.
+Learn how to [help your employees track time and attendance with Shifts](shifts-toolkit.md).
-#### Shifts videos
+Share this [Shifts video training](https://support.microsoft.com/office/what-is-shifts-f8efe6e4-ddb3-4d23-b81b-bb812296b821) with your users.
-- [Watch the Tags with Shifts video](https://go.microsoft.com/fwlink/?linkid=2202712)-- [Watch the Clocking in with Shifts video](https://go.microsoft.com/fwlink/?linkid=2202613)-- [Watch the Create a schedule with Shifts video](https://go.microsoft.com/fwlink/?linkid=2202612)-- [Watch the Re-use a schedule from Excel with Shifts video](https://go.microsoft.com/fwlink/?linkid=2202611)-- [Watch the Copy a schedule with Shifts video](https://go.microsoft.com/fwlink/?linkid=2202298)-- [Watch the Swap Shifts video](https://go.microsoft.com/fwlink/?linkid=2202711)
+[View videos and resources](shifts-toolkit.md) to share with your team to help them use features in Shifts.
### Keep in touch with Walkie Talkie
The Walkie Talkie app provides instant push-to-talk communication. By using Walk
|Financial services |A bank employee discussing loan options with a customer can use Walkie Talkie to consult a loan expert to determine the best option for the customer. | |Manufacturing |A technician can use Walkie Talkie to consult with an expert in another location while performing equipment maintenance or repair. |
-[Learn how to manage Walkie Talkie for your organization](/microsoftteams/walkie-talkie?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
+Learn how to [manage Walkie Talkie for your organization](/microsoftteams/walkie-talkie?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
Share this [Walkie Talkie video training](https://support.microsoft.com/office/use-walkie-talkie-in-teams-884a008a-761e-4b62-99f8-15671d9a2f69) with your users.
The Praise app allows management and frontline team members to congratulate each
|Financial services |A bank manager can send the **Achiever** badge to a relationship manager who helps to retain an important client. | |Manufacturing |A supervisor can send the **Leadership** badge to a foreman whose team is performing well. |
-[Learn how to manage the Praise app for your organization](/microsoftteams/manage-praise-app?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
+Learn how to [manage the Praise app for your organization](/microsoftteams/manage-praise-app?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
Share this [Praise video training](https://support.microsoft.com/office/communication-and-praise-7d37ef80-542b-42e5-aa01-0fabbaa634b6) with your users. ### Track and monitor work with Tasks
-Use Tasks in Teams to track to-do items for your whole retail team. Store managers and employees can create, assign, and schedule tasks, categorize tasks, and update status at any time from any device running Teams. IT pros and admins can also publish tasks to specific teams for your organization. For example, you could publish a set of tasks for daily cleaning or steps to set up a new display.
+Use Tasks in Teams to track to-do items for your whole frontline team. Store managers and employees can create, assign, and schedule tasks, categorize tasks, and update status at any time from any device running Teams. IT pros and admins can also publish tasks to specific teams for your organization. For example, you could publish a set of tasks for daily cleaning or steps to set up a new display.
|Industry |Example | |:--|:-|
Use Tasks in Teams to track to-do items for your whole retail team. Store manage
|Financial services |A bank manager can assign mortgage specialists a task to review and get familiar with new rates or policies. | |Manufacturing |A supervisor can assign a worker a task to inspect a new batch of products. |
-[Learn how to manage the Tasks app for your organization](/microsoftteams/manage-tasks-app?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
+Learn how to [manage the Tasks app for your organization](/microsoftteams/manage-tasks-app?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
Share this [Tasks video training](https://support.microsoft.com/office/use-the-tasks-app-in-teams-e32639f3-2e07-4b62-9a8c-fd706c12c070) with your users.
Use Approvals to streamline requests and processes with your team. Create, manag
|Financial services |A lending specialist could submit an approval request to a supervisor to offer a special interest rate. | |Manufacturing |A machine operator can submit a request for approval to adjust the settings on a piece of equipment. |
-[Learn how to manage the Approvals app for your organization](/microsoftteams/approval-admin?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
+Learn how to [manage the Approvals app for your organization](/microsoftteams/approval-admin?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
Share this [Approvals video training](https://support.microsoft.com/office/what-is-approvals-a9a01c95-e0bf-4d20-9ada-f7be3fc283d3?wt.mc_id=otc_microsoft_teams) with your users.
The Updates in Microsoft Teams app provides a centralized place for members of y
|Financial services |A bank manager could create and assign a recurring daily template for tellers to confirm morning counts. | |Manufacturing |A supervisor can create and assign a template to keep track of progress on production of a new batch of items. |
-[Learn how to manage the Updates app for your organization](/microsoftteams/manage-updates-app?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
+Learn how to [manage the Updates app for your organization](/microsoftteams/manage-updates-app?bc=/microsoft-365/frontline/breadcrumb/toc.json&toc=/microsoft-365/frontline/toc.json).
Share this [Updates video training](https://support.microsoft.com/office/get-started-in-updates-c03a079e-e660-42dc-817b-ca4cfd602e5a) with your users.
frontline Shifts Toolkit https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/shifts-toolkit.md
+
+ Title: Help your frontline workers track time and attendance
+++
+audience: ITPro
++
+search.appverid:
+searchScope:
+ - Microsoft Teams
+ - Microsoft Cloud for Healthcare
+f1.keywords:
+- NOCSH
+ms.localizationpriority: high
+
+ - microsoftcloud-healthcare
+ - m365solution-healthcare
+ - m365solution-scenario
+ - m365-frontline
+
+description: Resources to help train your frontline team in using Shifts to access and manage their schedules.
+appliesto:
+ - Microsoft Teams
+ - Microsoft 365 for frontline workers
++
+# Help your frontline workers track time and attendance
+
+Now that your organization has begun using Shifts to manage schedules, you'll need to make sure that your frontline workers understand how to track their time and attendance.
+
+Use your [corporate communications strategy](flw-corp-comms.md) to share Shifts training content with your team and make sure they have access to the resources they need:
+
+1. Share the [Shifts video training](https://support.microsoft.com/office/what-is-shifts-f8efe6e4-ddb3-4d23-b81b-bb812296b821) with your team to help them understand the basics.
+2. Share [Videos for frontline managers](#shifts-videos-for-managers) with your managers to help them set up and manage schedules for their teams.
+3. Share [Videos for users](#shifts-videos-for-users) with all of your frontline staff to help them perform regular tasks such as clocking in and swapping shifts.
+
+## Shifts videos for managers
+
+Create a schedule with Shifts <br>
+[View Create a schedule with Shifts on YouTube](https://go.microsoft.com/fwlink/?linkid=2202612)
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE546xr]
+
+Copy a schedule with Shifts <br>
+[View Copy a schedule with Shifts on YouTube](https://go.microsoft.com/fwlink/?linkid=2202298)
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE54jxu]
+
+Reuse a weekly schedule from Excel with Shifts <br>
+[View Reuse a weekly schedule from Excel with Shifts on YouTube](https://go.microsoft.com/fwlink/?linkid=2202611)
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE546xQ]
+
+## Shifts videos for users
+
+Clocking in with Shifts <br>
+[View Clocking in with Shifts on YouTube](https://go.microsoft.com/fwlink/?linkid=2202613)
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE54uyx]
+
+Swap Shifts <br>
+[View Swap Shifts on YouTube](https://go.microsoft.com/fwlink/?linkid=2202711)
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE54jBv]
+
+Tags with Shifts <br>
+[View Tags with Shifts on YouTube](https://go.microsoft.com/fwlink/?linkid=2202712)
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE5443n]
lighthouse M365 Lighthouse Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-whats-new.md
We're continuously adding new features to [Microsoft 365 Lighthouse](m365-lighth
> [!NOTE] > Some features get rolled out at different speeds to our customers. If you aren't seeing a feature yet, you should see it soon.
+## August 2022
+
+### View and manage inactive user accounts
+
+Microsoft 365 Lighthouse now provides a list of all the inactive user accounts in your managed tenants. To access the list, select **Users** > **Inactive users** from the left navigation pane in Microsoft 365 Lighthouse. You can reduce security risks by using this list to track and clean up accounts that are still enabled but that haven't been used in the past six months.
+
+### Microsoft Edge policy deployment
+
+We've added a Microsoft Edge policy deployment task to the default baseline. This deployment task allows you to secure your customer tenant's browsers with Edge security settings, which include built-in protection against phishing and malware. Microsoft Edge has been proven to be more secure than Google Chromium for small- and medium-sized businesses with devices running Windows 10 or later.
+
+For more information, see [Microsoft Edge security for your business](/deployedge/ms-edge-security-for-business).
+
+### Deployment status reporting
+
+Microsoft 365 Lighthouse now provides a deployment status for each deployment plan to help you optimize and prioritize your deployment efforts accordingly.
+
+### Enhanced deployment insights for licensing
+
+Microsoft 365 Lighthouse now provides insights around which deployment tasks can't be completed for which users due to insufficient licensing. These insights help you adjust the licensing or the deployment plan accordingly to complete your deployment plan.
+
+### Enhanced baseline deployment with direct links to existing configurations
+
+We've enhanced the baseline deployment experience to make it faster and easier to ensure your customer tenants are healthy and secure. We've added links to detected customer tenant configurations, so you can easily find, review, and modify these tenant configurations in the applicable management portal.
+ ## July 2022 ### Enhanced baseline deployment
Microsoft 365 Lighthouse now makes the deployment of baselines to all of your ma
### Support for Microsoft 365 E5 customers
-We've changed our onboarding requirements to allow you to onboard Microsoft 365 E5 customers to Microsoft 365 Lighthouse. The expanded list of licenses that Microsoft 365 Lighthouse supports for onboarding includes Microsoft 365 Business Premium, Microsoft 365 E3, Microsoft 365 E5, Microsoft Defender for Business, and Windows 365 for Business. Customers who have at least one of any of these licenses, meet the requirements for delegated access permissions, and do not exceed the maximum number of licensed users can be managed in Microsoft 365 Lighthouse.
+We've changed our onboarding requirements to allow you to onboard Microsoft 365 E5 customers to Microsoft 365 Lighthouse. The expanded list of licenses that Microsoft 365 Lighthouse supports for onboarding includes Microsoft 365 Business Premium, Microsoft 365 E3, Microsoft 365 E5, Microsoft Defender for Business, and Windows 365 for Business. Customers who have at least one of any of these licenses, meet the requirements for delegated access permissions, and don't exceed the maximum number of licensed users can be managed in Microsoft 365 Lighthouse.
For a full list of requirements, see [Requirements for Microsoft 365 Lighthouse](m365-lighthouse-requirements.md).
We've redesigned the user details pane to include more user information and more
### Delegated access type and roles on Tenants page
-We've updated the **Tenants** page to list the Managed Service Provider (MSP)'s delegated access type (None, DAP, GDAP, or Both DAP & GDAP) per customer under the **Delegated access** column. We've also added a new column titled **Your roles** that lists the DAP and GDAP roles per customer for a signed-in user. These two enhancements to the **Tenants** page will make it easier for partner technicians to understand which types of delegated administrative permissions are available for each customer and which delegated roles have explicitly been granted to them.
+We've updated the **Tenants** page to list the Managed Service Provider (MSP)'s delegated access type (None, DAP, GDAP, or Both DAP & GDAP) per customer under the **Delegated access** column. We've also added a new column titled **Your roles** that lists the DAP and GDAP roles per customer for a signed-in user. These two enhancements to the **Tenants** page will make it easier for MSP technicians to understand which types of delegated administrative permissions are available for each customer and which delegated roles have explicitly been granted to them.
To learn more, see [Overview of permissions in Microsoft 365 Lighthouse](m365-lighthouse-overview-of-permissions.md).
security Mdb Add Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-add-users.md
ms.prod: m365-security ms.technology: mdb ms.localizationpriority: medium Last updated : 08/24/2022 f1.keywords: NOCSH
As soon as you have signed up for Defender for Business, your first step is to a
If you don't have any licenses available, you can still add a user and buy additional licenses. For more information about adding users, see [Add users and assign licenses at the same time](../../admin/add-users/add-users.md).
-5. On the **Optional settings** page, you can expand **Profile info** and fill in details, such as the user's jo title, department, location, and so forth. Then choose **Next**.
+5. On the **Optional settings** page, you can expand **Profile info** and fill in details, such as the user's job title, department, location, and so forth. Then choose **Next**.
6. On the **Review and finish** page, review the details, and then select **Finish adding** to add the user. If you need to make any changes, choose **Back** to go back to a previous page. ## Next steps - [Visit the Microsoft 365 Defender portal](mdb-get-started.md)-- [Use the setup wizard in Defender for Business](mdb-use-wizard.md).
+- [Use the setup wizard in Defender for Business](mdb-use-wizard.md).
security Get Cvekbmap Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-cvekbmap-collection.md
- Title: Get CVE-KB map API
-description: Learn how to use the Get CVE-KB map API to retrieve a map of CVEs to KBs and CVE details in Microsoft Defender for Endpoint.
-keywords: apis, graph api, supported apis, get, cve, kb
-search.product: eADQiWindows 10XVcnh
-ms.sitesec: library
-ms.pagetype: security
---------
-# Get CVE-KB map API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Retrieves a map of CVEs to KBs and CVE details.
-
-## Permissions
-
-User needs read permissions.
-
-## HTTP request
-
-```http
-GET /testwdatppreview/cvekbmap
-```
-
-## Request headers
-
-Header|Value
-:|:
-Authorization|Bearer {token}. **Required**.
-Content type|application/json
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and map exists - 200 OK.
-
-## Example
-
-### Request example
-
-Here's an example of the request:
-
-```http
-GET https://graph.microsoft.com/testwdatppreview/CveKbMap
-```
-
-### Response example
-
-Here's an example of the response:
-
-```json
-{
- "@odata.context":"https://graph.microsoft.com/testwdatppreview/$metadata#CveKbMap",
- "@odata.count": 4168,
- "value": [
- {
- "cveKbId": "CVE-2015-2482-3097617",
- "cveId": "CVE-2015-2482",
- "kbId":"3097617",
- "title": "Cumulative Security Update for Internet Explorer",
- "severity": "Critical"
- },
- ...
-}
-```
security Get Kbinfo Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-kbinfo-collection.md
- Title: Get KB collection API
-description: Retrieve a collection of knowledge bases (KB's) and KB details with Microsoft Defender for Endpoint.
-keywords: apis, graph api, supported apis, get, kb
-search.product: eADQiWindows 10XVcnh
-ms.sitesec: library
-ms.pagetype: security
---------
-# Get KB collection API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Retrieves a collection of KB's and KB details.
-
-## Permissions
-
-User needs read permissions.
-
-## HTTP request
-
-```http
-GET /testwdatppreview/kbinfo
-```
-
-## Request headers
-
-Header|Value
-:|:
-Authorization|Bearer {token}. **Required**.
-Content type|application/json
-
-## Request body
-
-Empty
-
-## Response
-
-If successful - 200 OK.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://graph.microsoft.com/testwdatppreview/KbInfo
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#KbInfo",
- "@odata.count": 271,
- "value":[
- {
- "id": "KB3097617 (10240.16549) Amd64",
- "release": "KB3097617 (10240.16549)",
- "publishingDate": "2015-10-16T21:00:00Z",
- "version": "10.0.10240.16549",
- "architecture": "Amd64"
- },
- ...
-}
-```
security Get Machinegroups Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-machinegroups-collection.md
- Title: Get RBAC machine groups collection API
-description: Learn how to use the Get KB collection API to retrieve a collection of RBAC device groups in Microsoft Defender for Endpoint.
-keywords: apis, graph api, supported apis, get, RBAC, group
-search.product: eADQiWindows 10XVcnh
-ms.sitesec: library
-ms.pagetype: security
----- Previously updated : 10/07/2018---
-# Get KB collection API
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Retrieves a collection of RBAC device groups.
-
-## Permissions
-
-User needs read permissions.
-
-## HTTP request
-
-```http
-GET https://graph.microsoft.com/testwdatppreview/machinegroups
-```
-
-## Request headers
-
-Header|Value
-:|:
-Authorization | Bearer {token}. **Required**.
-Content type | application/json
-
-## Request body
-
-Empty
-
-## Response
-
-If successful - 200 OK.
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-GET https://graph.microsoft.com/testwdatppreview/machinegroups
-Content-type: application/json
-```
-
-### Response example
-
-Here is an example of the response.
-Field id contains device group **id** and equal to field **rbacGroupId** in devices info.
-Field **ungrouped** is true only for one group for all devices that have not been assigned to any group. This group as usual has name "UnassignedGroup".
-
-```http
-HTTP/1.1 200 OK
-Content-type: application/json
-{
- "@odata.context":"https://graph.microsoft.com/testwdatppreview/$metadata#MachineGroups",
- "@odata.count":7,
- "value":[
- {
- "id":86,
- "name":"UnassignedGroup",
- "description":"",
- "ungrouped":true},
- ...
-}
-```
security Get Machinesecuritystates Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-machinesecuritystates-collection.md
- Title: Get machines security states collection API
-description: Retrieve a collection of device security states using Microsoft Defender for Endpoint.
-keywords: apis, graph api, supported apis, get, device, security, state
-search.product: eADQiWindows 10XVcnh
-ms.sitesec: library
-ms.pagetype: security
--------
-# Get Machines security states collection API
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Retrieves a collection of devices security states.
-
-## Permissions
-
-User needs read permissions.
-
-## HTTP request
-
-```http
-GET /testwdatppreview/machinesecuritystates
-```
-
-## Request headers
-
-Header|Value
-:|:
-Authorization|Bearer {token}. **Required**.
-Content type|application/json
-
-## Request body
-
-Empty
-
-## Response
-
-If successful - 200 OK.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://graph.microsoft.com/testwdatppreview/machinesecuritystates
-Content-type: application/json
-```
-
-### Response example
-
-Here's an example of the response.
-
-Field *id* contains device ID and equal to the field *id** in devices info.
-
-```json
-HTTP/1.1 200 OK
-Content-type: application/json
-{
- "@odata.context":"https://graph.microsoft.com/testwdatppreview/$metadata#MachineSecurityStates",
- "@odata.count":444,
- "@odata.nextLink":"https://graph.microsoft.com/testwdatppreview/machinesecuritystates?$skiptoken=[continuation token]",
- "value":[
- {
- "id":"000050e1b4afeee3742489ede9ad7a3e16bbd9c4",
- "build":14393,
- "revision":2485,
- "architecture":"Amd64",
- "osVersion":"10.0.14393.2485.amd64fre.rs1_release.180827-1809",
- "propertiesRequireAttention":[
- "AntivirusNotReporting",
- "EdrImpairedCommunications"
- ]
- },
- ...
- ]
-}
-```
security Manage Updates Baselines Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-updates-baselines-microsoft-defender-antivirus.md
Security intelligence update version: 1.373.219.0 <br/>
### Known Issues
-No known issues
+- Customers deploying platform update 4.18.2207.5 might experience lagging network performance that could impact applications.
<br/><br/> </details><details>
security Schedule Antivirus Scan In Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/schedule-antivirus-scan-in-mde.md
Use the following steps to schedule scans:
PATH=/sbin:/bin:/usr/sbin:/usr/bin RANDOM_DELAY=45 # Anacron jobs will start between 8pm and 11pm.
- START_HOURS_RANGE=2-023
+ START_HOURS_RANGE=20-23
# delay will be 5 minutes + RANDOM_DELAY for cron.daily ```
Use the following steps to schedule scans:
```Press Esc```
- ```Type: **wq!```
+ ```Type: wq!```
1. Change the file permissions to allow the file to be executed. ```Chmod 755 mdavfullscan```+ ```ls -la``` :::image type="content" source="images/chmod-755-mdavfullscan.png" alt-text="7. Change file permissions":::
security Get Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management.md
Microsoft Defender Vulnerability Management is available as a standalone and as an add-on for Microsoft Defender for Endpoint Plan 2 customers. How you sign up for the Defender Vulnerability Management trial depends on whether you already have Microsoft Defender for Endpoint Plan 2. > [!NOTE]
-> This offering isn't currently available for Microsoft Defender for Business customers.
+> This offering isn't currently available to:
+>
+> - US Government customers using GCC, GCC High, and DoD
+> - Microsoft Defender for Business customers
- If you don't have Defender for Endpoint Plan 1 or Plan 2, or Microsoft 365 E3, sign up to try the [Defender Vulnerability Management Standalone trial.](#try-defender-vulnerability-management-standalone) - If you already have Defender for Endpoint Plan 2, sign up to try the [Defender Vulnerability Management Add-on trial.](#try-the-defender-vulnerability-management-add-on-public-preview-trial-for-defender-for-endpoint-plan-2-customers)
security Portals https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/portals.md
audience: ITPro-+ - M365-security-compliance search.appverid: met150
ms.technology: m365d
While [Microsoft 365 Defender portal](microsoft-365-defender-portal.md) is the new home for monitoring and managing security across your identities, data, devices, and apps, you will need to access various portals for certain specialized tasks.
-> [!TIP]
+> [!TIP]
> To access various relevant portals from Microsoft 365 Defender portal, select **More resources** in the navigation pane. ## Security portals
Security operators and admins can go to the following portals to manage security
<p></p> | Portal name | Description | Link |
-||||
+||||
| Microsoft 365 Defender portal | Monitor and respond to threat activity and strengthen security posture across your identities, email, data, endpoints, and apps with [Microsoft 365 Defender](microsoft-365-defender.md) | [security.microsoft.com](https://security.microsoft.com/) |
-| Microsoft Defender Security Center | Monitor and respond to threat activity on your endpoints using capabilities provided with [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) | [securitycenter.windows.com](https://securitycenter.microsoft.com/) |
-| Security & Compliance Center | Manage [Exchange Online Protection](../office-365-security/exchange-online-protection-overview.md) and [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365) to protect your email and collaboration services, and ensure compliance to various data-handling regulations | [protection.office.com](https://protection.office.com) |
+| Microsoft Defender Security Center | Monitor and respond to threat activity on your endpoints using capabilities provided with [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint). **NOTE:** Most tenants should now be redirected to the Microsoft 365 Defender portal at [security.microsoft.com](https://security.microsoft.com/). | [securitycenter.windows.com](https://securitycenter.windows.com) |
+| Office 365 Security & Compliance Center | Manage [Exchange Online Protection](../office-365-security/exchange-online-protection-overview.md) and [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365) to protect your email and collaboration services, and ensure compliance to various data-handling regulations. **NOTE:** Most tenants using the security sections of the Office 365 Security & Compliance Center should now be redirected to the Microsoft 365 Defender portal at [security.microsoft.com](https://security.microsoft.com/). | [protection.office.com](https://protection.office.com) |
| Defender for Cloud portal | Use [Microsoft Defender for Cloud](/azure/security-center/security-center-intro) to strengthen the security posture of your data centers and your hybrid workloads in the cloud | [portal.azure.com/#blade/Microsoft_Azure_Security](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/0) | | Microsoft Defender for Identity portal | Identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions using Active Directory signals with [Microsoft Defender for Identity](/azure-advanced-threat-protection/what-is-atp) | [portal.atp.azure.com](https://portal.atp.azure.com/) | | Defender for Cloud Apps portal | Use [Microsoft Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security) to get rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats on cloud services | [portal.cloudappsecurity.com](https://portal.cloudappsecurity.com/) |
Security operators and admins can go to the following portals to manage security
While these portals are not specifically for managing security, they support various workloads and tasks that can impact your security. Visit these portals to manage identities, permissions, device settings, and data handling policies. <p></p>
-| Portal name | Description | Link |
-||||
+| Portal name | Description | Link |
+||||
| Azure portal | View and manage all your [Azure resources](/azure/azure-resource-manager/management/overview) | [portal.azure.com](https://portal.azure.com/) | | Azure Active Directory portal | View and manage [Azure Active Directory](/azure/active-directory/fundamentals/active-directory-whatis) | [aad.portal.azure.com](https://aad.portal.azure.com/) | | Microsoft Purview compliance portal | Manage data handling policies and ensure [compliance with regulations](/compliance/regulatory/offering-home) | [compliance.microsoft.com](https://compliance.microsoft.com/) | | Microsoft 365 admin center | Configure Microsoft 365 services; manage roles, licenses, and track updates to your Microsoft 365 services | [admin.microsoft.com](https://go.microsoft.com/fwlink/p/?linkid=2166757) |
-| Microsoft Endpoint Manager admin center | Use [Microsoft Endpoint Manager](/mem/configmgr/) to manage and secure devices using combined Intune and Configuration Manager capabilities | [devicemanagement.microsoft.com](https://devicemanagement.microsoft.com/) |
+| Microsoft Endpoint Manager admin center | Use [Microsoft Endpoint Manager](/mem/configmgr/) to manage and secure devices using combined Intune and Configuration Manager capabilities | [endpoint.microsoft.com](https://endpoint.microsoft.com/) |
| Microsoft Intune portal | Use [Microsoft Intune](/intune/fundamentals/what-is-intune) to deploy device policies and monitor devices for compliance | [endpoint.microsoft.com](https://endpoint.microsoft.com/#blade/Microsoft_Intune_DeviceSettings/DevicesMenu/overview)