Category | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
admin | Stay On Top Of Updates | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/stay-on-top-of-updates.md | With Microsoft 365, you receive new product updates and features as they become |Feature|Description|How to use| |:--|:--|:--|-|**Message center** <br/> |Learn about official service announcements and feature changes. You can read these messages in the Microsoft 365 admin center, the admin mobile app, or receive a weekly digest in email. Share these messages with others in your organization when you see a message someone else should act on. You can also use the Service Communications API to retrieve messages. <br/> |Sign in to the [admin center](../admin-overview/admin-center-overview.md) or [admin mobile app](../admin-overview/admin-mobile-app.md). Select **Health** \> **Message center**. Select a message to read or share. <br/> Change the services you see messages about or opt-in to the weekly digest by choosing **Edit preferences** in the admin center. This is also where you can opt-out of the weekly digest. <br/> [Overview of the Microsoft 365 Message center](message-center.md) <br/> | -|**Targeted release** <br/> |Sign up for Targeted release for yourself and a select group of individuals at your organization. Get the latest Microsoft 365 updates before everyone else and then inform or train your users on the new experience. <br/> |Sign in to the [admin center](../admin-overview/admin-center-overview.md) or [admin mobile app](../admin-overview/admin-mobile-app.md). Selece **Settings** \> **Organization profile** \> **Release preferences**. Learn more about [Targeted release](release-options-in-office-365.md). <br/> | -|**Roadmap** <br/> |Visit the Microsoft 365 Roadmap to learn about features that have been launched, are rolling out, are in development, have been cancelled, or previously released. The roadmap is the official site for Microsoft 365 updates and changes. <br/> |Visit the [Microsoft 365 Roadmap](https://www.microsoft.com/microsoft-365/roadmap) frequently and learn about planned updates and releases. <br/> | +|**Message center** <br/> |Learn about official service announcements and feature changes. You can read these messages in the Microsoft 365 admin center, the admin mobile app, or receive a weekly digest in email. Share these messages with others in your organization when you see a message someone else should act on. You can also use the Service Communications API to retrieve messages. <br/> |Sign in to the [admin center](../admin-overview/admin-center-overview.md) or [admin mobile app](../admin-overview/admin-mobile-app.md). Select **Health** \> **Message center**. Select a message to read or share. <br/> Change the services you see messages about or opt in to the weekly digest by choosing **Edit preferences** in the admin center. This is also where you can opt out of the weekly digest. <br/> [Overview of the Microsoft 365 Message center](message-center.md) <br/> | +|**Targeted release** <br/> |Sign up for Targeted release for yourself and a select group of individuals at your organization. Get the latest Microsoft 365 updates before everyone else and then inform or train your users on the new experience. <br/> |Sign in to the [admin center](../admin-overview/admin-center-overview.md) or [admin mobile app](../admin-overview/admin-mobile-app.md). Select **Settings** \> **Organization profile** \> **Release preferences**. Learn more about [Targeted release](release-options-in-office-365.md). <br/> | +|**Roadmap** <br/> |Visit the Microsoft 365 Roadmap to learn about features that have been launched, are rolling out, are in development, have been canceled, or previously released. The roadmap is the official site for Microsoft 365 updates and changes. <br/> |Visit the [Microsoft 365 Roadmap](https://www.microsoft.com/microsoft-365/roadmap) frequently and learn about planned updates and releases. <br/> | |**Blogs** and **Community** <br/> |Visit Microsoft 365 Blogs, Microsoft Community, and Microsoft Tech Community to learn more details about changes in Microsoft 365 and share experiences with other users. <br/> |Visit [Office Blogs](https://www.microsoft.com/en-us/microsoft-365/blog/). Visit [Microsoft Community](https://answers.microsoft.com). Visit [Microsoft Tech Community](https://techcommunity.microsoft.com). <br/> | > [!NOTE] |
admin | Azure Ad Setup Guides | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/azure-ad-setup-guides.md | This catalog contains some basic security features you can use to ensure your us ### Licensing -An Azure Active Directory P2 license is required to utilize the security features in this catalog. +Using features in this catalog requires either Microsoft Entra ID Governance or Microsoft Azure AD Premium P2 license. To find the right license for your requirements, see [Compare generally available features of Microsoft Azure AD](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing). [Open the Identity security for Teams catalog](https://portal.office.com/AdminPortal/home?Q=azuredocs#/teamsidentity) ## Identity Governance -This catalog is designed to help customers with Azure AD P2 functionality, including access reviews, PIM, entitlement management (ELM), Access Reviews, HR-driven user provisioning, and life cycle workflows. +This catalog is designed to help customers with Microsoft Entra ID Governance or Azure AD P2 functionality, including access reviews, PIM, entitlement management (ELM), Access Reviews, HR-driven user provisioning, and life cycle workflows. ### PIM Easily manage your users' lifecycle in Azure AD by creating custom workflows to [Open the Identity Governance setup guide](https://admin.microsoft.com/adminportal/home?Q=azuredocs#/modernonboarding/identitygovernance) > [!NOTE]-> Azure Active Directory P2 license is required to utilize the security features in this catalog. +> A Microsoft Entra ID Governance or Azure Active Directory P2 license is required to utilize the security features in this catalog. ## Azure Active Directory deployment This setup guide is designed to help you enable and configure self service passw SSPR requires one of the following licenses: +- Microsoft Entra ID Governance + - Azure Active Directory P1 or P2 - Microsoft 365 Business Premium SSPR requires one of the following licenses: ## Configure multi-factor authentication (MFA) -For customers with Azure P1 or Azure P2, we provide customizable Conditional Access templates that include the most common and least intrusive security standards. When Azure licensing isnΓÇÖt available, we provide a one-click solution to enable Security Defaults, a baseline protection policy for all users, or we provide steps to enable legacy (per-user) MFA. +For customers with Entra ID Governance,Azure P1, or Azure P2, we provide customizable Conditional Access templates that include the most common and least intrusive security standards. When Azure licensing isnΓÇÖt available, we provide a one-click solution to enable Security Defaults, a baseline protection policy for all users, or we provide steps to enable legacy (per-user) MFA. ### Licensing -Conditional Access requires an Azure Active Directory P1 or P2 license. Security defaults and per-user MFA are included with all Microsoft 365 subscriptions. +Conditional Access requires Microsoft Entra ID Governance or an Azure Active Directory P1 or P2 license. Security defaults and per-user MFA are included with all Microsoft 365 subscriptions. [Open the multi-factor authentication (MFA) guide](https://admin.microsoft.com/adminportal/home?Q=azuredocs#/modernonboarding/mfasetupguide) |
commerce | Allowselfservicepurchase Powershell | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/allowselfservicepurchase-powershell.md | The following table lists the available products and their **ProductId**. It als | Project Plan 1* | CFQ7TTC0HDB1 | Yes | | Project Plan 3* | CFQ7TTC0HDB0 | No | | Teams Exploratory | CFQ7TTC0J1FV | Yes |+| Teams Premium Introductory Pricing | CFQ7TTC0RM8K | Yes | | Visio Plan 1* | CFQ7TTC0HD33 | No | | Visio Plan 2* | CFQ7TTC0HD32 | No | | Viva Goals (self-service trials only) | CFQ7TTC0PW0V | Yes | |
enterprise | Microsoft 365 Tenant To Tenant Migrations | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/microsoft-365-tenant-to-tenant-migrations.md | Title: "Microsoft 365 tenant-to-tenant migrations" Previously updated : 10/08/2020 Last updated : 08/04/2023 audience: Admin Use the [Tenant-to-tenant migration architecture model](https://download.microso [](https://download.microsoft.com/download/b/a/1/ba19dfe7-96e2-4983-8783-4dcff9cebe7b/microsoft-365-tenant-to-tenant-migration.pdf) -You download this model in [PDF](https://download.microsoft.com/download/b/a/1/ba19dfe7-96e2-4983-8783-4dcff9cebe7b/microsoft-365-tenant-to-tenant-migration.pdf) format and print it on letter, legal, or tabloid (11 x 17) size paper. +You download this model in [PDF](https://download.microsoft.com/download/b/a/1/ba19dfe7-96e2-4983-8783-4dcff9cebe7b/microsoft-365-tenant-to-tenant-migration.pdf) format and print it on letter, legal, or tabloid (11 x 17 inches) size paper. This model provides guidance and a starting-point for planning with sections on: |
enterprise | Protect Your Global Administrator Accounts | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/protect-your-global-administrator-accounts.md | To enable Azure PIM for your Azure AD tenant and administrator accounts, see the To develop a comprehensive roadmap to secure privileged access against cyber attackers, see [Securing privileged access for hybrid and cloud deployments in Azure AD](/azure/active-directory/admin-roles-best-practices). -### Azure AD Privileged Identity Management +### Privileged Identity Management -Rather than having your privileged accounts be permanently assigned an administrator role, you can use Azure AD PIM to enable on-demand, just-in-time assignment of the administrator role when it's needed. +Rather than having your privileged accounts be permanently assigned an administrator role, you can use PIM to enable on-demand, just-in-time assignment of the administrator role when it's needed. Your administrator accounts go from being permanent admins to eligible admins. The administrator role is inactive until someone needs it. You then complete an activation process to add the administrator role to the privileged account for a predetermined amount of time. When the time expires, PIM removes the administrator role from the privileged account. Using PIM and this process significantly reduces the amount of time that your privileged accounts are vulnerable to attack and use by malicious users. -PIM is available with Azure Active Directory Premium P2, which is included with Microsoft 365 E5. Alternately, you can purchase individual Azure Active Directory Premium P2 licenses for your administrator accounts. +Using this feature requires either Microsoft Entra ID Governance or Microsoft Azure AD Premium P2 subscriptions. To find the right license for your requirements, see [Compare generally available features of Microsoft Azure AD](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing). ++For information about licenses for users, see [License requirements to use Privileged Identity Management](/azure/active-directory/privileged-identity-management/subscription-requirements). For more information, see: -- [Azure AD Privileged Identity Management](/azure/active-directory/active-directory-privileged-identity-management-configure).+- [Privileged Identity Management](/azure/active-directory/active-directory-privileged-identity-management-configure). - [Securing privileged access for hybrid and cloud deployments in Azure AD](/azure/active-directory/roles/security-planning) |
frontline | Deploy Dynamic Teams At Scale | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/deploy-dynamic-teams-at-scale.md | Last updated 07/12/2023 Frontline teams are a collection of people, content, and tools within an organization for different frontline worker locations. Membership of frontline dynamic teams is determined and managed by a set of Azure Active Directory (Azure AD) attributes. [Learn more about Azure AD attributes](/azure/active-directory/external-identities/customers/how-to-define-custom-attributes). -In the setup process, you'll define the following with Azure AD attributes: +In the setup process, you define the following information with Azure AD attributes: - Who your frontline workers are - What locations they work at -You'll also determine team structure and team owners. +You also determine team structure and team owners. -Then, you'll be able to choose which locations you want to create dynamic frontline teams for. +Then, you can choose which locations you want to create dynamic frontline teams for. Team membership will be automatically managed over time through the power of dynamic teams. As frontline workers are onboarded, offboarded, or change locations, their membership in these teams will update accordingly. ## Prerequisites -- Users must have a Microsoft 365 F3, F1, E1, E3, or E5 license. If a user doesn't have one of these licenses, they'll need an Azure AD P1 add-on license to leverage dynamic teams. [Learn more about frontline licensing](flw-licensing-options.md).+- Users must have a Microsoft 365 F3, F1, E1, E3, or E5 license. If a user doesn't have one of these licenses, they'll need an Azure AD P1 add-on license to use dynamic teams. [Learn more about frontline licensing](flw-licensing-options.md). - The admin running the deployment process needs Teams admin center permissions. - Ensure you can define your frontline workers and their work locations through data available in Azure AD. If you don't have this data in Azure AD, you can sync it through a [human capital management (HCM) connector](/azure/active-directory/app-provisioning/plan-cloud-hr-provision) or [use the PowerShell solution](deploy-teams-at-scale.md) to create teams at scale. - When evaluating the right solution, we recommend you do the following:- 1. Plan your frontline deployment - 1. Test the deploy tools (dynamic or static team creation) - 1. Deploy to a pilot location - 1. Deploy to a broader set of locations using a phased approach + 1. Plan your frontline deployment. + 1. Test the deploy tools (dynamic or static team creation). + 1. Deploy to a pilot location. + 1. Deploy to a broader set of locations using a phased approach. >[!NOTE] >The PowerShell solution creates static teams, which aren't managed automatically. ## Set up your frontline dynamic teams -1. Navigate to your [Teams admin center](https://admin.teams.microsoft.com). +1. In the left navigation of the [Teams admin center](https://admin.teams.microsoft.com), choose **Teams** > **Manage frontline teams**. +2. In the table, choose **Setup**. -2. Open the **Teams** section on the left rail. + :::image type="content" source="media/dtas-manage-setup.png" alt-text="Screenshot of the manage frontline teams table in the Teams admin center." lightbox="media/dtas-manage-setup.png"::: -3. Select **Manage frontline teams**. +3. Review the prerequisites information. -4. Choose **Setup** in the table. +4. Select the Azure AD attribute that defines your frontline workers. You can only choose one Azure AD attribute, but you can define multiple values by separating them with commas. -  + :::image type="content" source="media/dtas-frontline-attribute.png" alt-text="Screenshot of where to enter your Azure AD attribute and values for frontline workers." lightbox="media/dtas-frontline-attribute.png"::: -5. Review the prerequisite information. +5. Select the Azure AD attribute that defines the location your frontline employees work in. You can only choose one location attribute. -6. Select the Azure AD attribute that defines your frontline workers. You can only choose one Azure AD attribute, but you can define multiple values by separating them with commas. + :::image type="content" source="media/dtas-location-attribute.png" alt-text="Screenshot of where to enter your Azure AD attribute for frontline locations." lightbox="media/dtas-location-attribute.png"::: -  +6. Define your team structure by choosing a prefix. The prefix is applied using the "prefix-location" format for all your teams. -7. Select the Azure AD attribute that defines the location your frontline employees work in. You can only choose one location attribute. + :::image type="content" source="media/dtas-prefix.png" alt-text="Screenshot of the prefix, team template, and team owner account fields." lightbox="media/dtas-prefix.png"::: -  +7. Optionally, choose a team template. The team template you choose defines the channel structure for all your frontline teams. [Learn more about Teams templates](/microsoftteams/get-started-with-teams-templates-in-the-admin-console). -8. Define your team structure by choosing a prefix. The prefix will be applied in the format: "prefix-location" for all of your teams. --  --9. Optionally, choose a team template. The team template you choose will define the channel structure for all of your frontline teams. [Learn more about Teams templates](/microsoftteams/get-started-with-teams-templates-in-the-admin-console). --10. Enter a user account object ID to be the team owner. This account will be the owner for all frontline teams. It's recommended to choose a shared account rather than an individual person. - 1. To get a user's object ID, navigate to your [Azure portal](https://portal.azure.com). +8. Enter a user account object ID to be the team owner. This account will be the owner for all frontline teams. It's recommended to choose a shared account rather than an individual person. + 1. To get a user's object ID, go to the [Azure portal](https://portal.azure.com). 1. Select **Azure Active Directory**.- 1. Select **Users**. - 1. Choose your user. + 1. Select **Users**, and then choose your user. 1. Copy the user's object ID. -11. Review the settings and choose **Finish setup.** +9. Review the settings, and then choose **Finish setup.** >[!NOTE]- >The setup can take several hours to run. You can refresh the **Manage frontline teams** page to get the latest status of your setup. + >Setup can take several hours to run. You can refresh the **Manage frontline teams** page to get the latest status of your setup. -  + :::image type="content" source="media/dtas-setup-submitted.png" alt-text="Screenshot of the Manage frontline teams page with a banner showing that setup was submitted." lightbox="media/dtas-setup-submitted.png"::: ## Deploy your frontline dynamic teams -1. After the setup is complete, go to your **Manage frontline teams** page and select the **Deploy** button. +1. After setup is completed, go to the **Manage frontline teams** page, and then select the **Deploy** button. -  + :::image type="content" source="media/dtas-deploy.png" alt-text="Screenshot of the Deploy button." lightbox="media/dtas-deploy.png"::: -2. From here you can review your settings and view the list of locations that don't yet have a frontline dynamic team created. +2. From here, you can review your settings and view the list of locations that don't yet have a frontline dynamic team created. -3. Select the locations you want to create teams for in the table. +3. In the table, select the locations that you want to create teams for. -  + :::image type="content" source="media/dtas-deploy-locations.png" alt-text="Screenshot of the table of locations." lightbox="media/dtas-deploy-locations.png"::: -4. Select **Deploy**. This process can take multiple hours depending on how many teams you're creating. After the deployment is complete, you'll see the Number of frontline teams tile update. In this tile you can download a CSV file with a list of your frontline teams. If any errors occurred, you can download the error CSV file on the last deployment health tile. +4. Select **Deploy**. This process can take several hours depending on how many teams you're creating. After deployment is completed, you'll see the number updated in the **Frontline teams** tile. On this tile, you can download a CSV file with a list of your frontline teams. If any errors occurred, you can download the error CSV file on the **Last deployment health** tile. -  + :::image type="content" source="media/dtas-view-errors.png" alt-text="Screenshot of where you can get the CSV file on the Manage frontline teams page." lightbox="media/dtas-view-errors.png"::: 5. You can repeat this process for any frontline locations that don't have a team. You can manage your teams when changes happen in your organization. ### Create new teams for newly opened locations -1. First, navigate to your [Teams admin center](https://admin.teams.microsoft.com). --2. Open the **Teams** section on the left rail. --3. Select **Manage frontline teams**. +1. In the left navigation of the [Teams admin center](https://admin.teams.microsoft.com), choose **Teams** > **Manage frontline teams**. -4. Choose **Deploy** in the table. +2. In the table, choose **Deploy**. -5. Select the **Refresh locations** button, and proceed when prompted by the dialog box. This process can take several hours depending on your number of new locations. +3. Select the **Refresh location** button, and proceed when prompted by the dialog box. This process can take several hours depending on your number of new locations. -  + :::image type="content" source="media/dtas-refresh-locations.png" alt-text="Screenshot of the Refresh location button." lightbox="media/dtas-refresh-locations.png"::: -6. After your refresh completes, your setup status will show **Complete**. You can proceed to [deploy your new teams](#deploy-your-frontline-dynamic-teams). Deployment can take several hours depending on how many new teams you're deploying. +4. After your refresh completes, your setup status shows as **Complete**. You can proceed to [deploy your new teams](#deploy-your-frontline-dynamic-teams). Deployment can take several hours depending on how many new teams you're deploying. ### Edit your frontline team settings >[!IMPORTANT] >The ability to edit your frontline team settings is coming soon. -1. First, navigate to your [Teams admin center](https://admin.teams.microsoft.com). -1. Open the **Teams** section on the left rail. -1. Select **Manage frontline teams**. -1. Choose **Deploy frontline teams** under the Deploy settings column. -1. Edit your settings on this page and select **Save**. Your settings may take several hours to update. Refer to the following table for the effects of updating your settings: +1. In the left navigation of the [Teams admin center](https://admin.teams.microsoft.com), choose **Teams** > **Manage frontline teams**. +2. In the **Deploy settings** column, choose **Deploy frontline teams** . +3. Edit your settings on this page, and then select **Save**. Your settings may take several hours to update. See the following table for the effects of updating your settings. |Setting |Effect on existing frontline teams |Effect on new frontline teams | |--|--||-|Define your frontline Azure AD attribute. |All existing frontline teams will be members that have the new Azure AD attribute defined |All new frontline teams members will have the new Azure AD attribute defined | -|Choose the values applicable to your frontline Azure AD attribute. |All existing frontline team membership will reflect your updated values. |All new teams will be populated with members who have the updated Azure AD attributes you have defined. | -|Define your frontline locations. | Existing teams will continue to persist. If a team no longer is tied a location there will be no users in that team and users will be put in their respective location teams. |You can create new frontline teams based on the locations defined by your new Azure AD attribute. | -|Set your team name prefix. |All existing team names will be updated to reflect the prefix and location name if that has been changed. |All new teams will have the updated naming convention. | +|Define your frontline Azure AD attribute. |All existing frontline teams will be members that have the new Azure AD attribute defined. |All new frontline teams members will have the new Azure AD attribute defined. | +|Choose the values applicable to your frontline Azure AD attribute. |All existing frontline team membership will reflect your updated values. |All new teams will be populated with members who have the updated Azure AD attributes that you defined. | +|Define your frontline locations. | Existing teams will continue to persist. If a team is no longer tied to a location, there will be no users in that team, and users will be put in their respective location teams. |You can create new frontline teams based on the locations defined by your new Azure AD attribute. | +|Set your team name prefix. |All existing team names will be updated to reflect the prefix and location name if that was changed. |All new teams will have the updated naming convention. | |Select your team template. |No updates to the team structure will occur. |All new teams will use the updated team template. | |Select your team owner. |The team owner will be updated for all existing teams. |All new teams will have the updated team owner. | |
lighthouse | M365 Lighthouse Setup Gdap | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-setup-gdap.md | During the GDAP setup process, you create GDAP templates by configuring what sup - The customers you manage in Lighthouse need to be set up in Partner Center with either a reseller relationship or an existing delegated relationship (DAP or GDAP). > [!NOTE]-> Lighthouse GDAP templates use role-assignable security groups. An Azure AD P1 license is required to add users to these groups. To enable Just-in-Time (JIT) roles, an Azure AD P2 license is required. +> Lighthouse GDAP templates use role-assignable security groups. An Azure AD P1 license is required to add users to these groups. To enable Just-in-Time (JIT) roles, Microsoft Entra IDE Governance or an Azure AD P2 license is required. ## Set up GDAP for the first time |
lighthouse | M365 Lighthouse Whats New | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-whats-new.md | description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthous We're continuously adding new features to [Microsoft 365 Lighthouse](m365-lighthouse-overview.md), fixing issues we learn about, and making changes based on your feedback. Review this article to discover what we've been working on. > [!NOTE]-> Some features get rolled out at different speeds to our customers. If you aren't seeing a feature yet, you should see it soon. +> Features get rolled out at different speeds to our customers. If you aren't seeing a feature yet, you should see it soon. > > To see which new features are currently available in your partner tenant, go to the **Home** page of Microsoft 365 Lighthouse, and then either select the **What's new** link in the upper-right corner of the page or select **What's new** on the **What's new & learning resources** card. +## July 2023 ++### Sales Advisor is now part of Microsoft 365 Lighthouse ++Sales Advisor, formerly known as Project Orland in Partner Center Insights, is now integrated into Microsoft 365 Lighthouse. ++Sales Advisor helps you harness the power of AI-driven insights to fuel business growth and deliver scalable managed services to your customers. With Sales Advisor, you can discover proactive, actionable, and personalized recommendations for acquiring new customers, boosting customer retention, and expanding your business with premium offers. ++To view Sales Advisor in Lighthouse, in the left navigation pane, select **Sales Advisor** > **Opportunities**. To learn more, see [Overview of Sales Advisor in Microsoft 365 Lighthouse](m365-lighthouse-sales-advisor-overview.md). + ## June 2023 ### Deployment task for managing Windows updates |
security | Android Configure Mam | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure-mam.md | Use the following steps to configure the Disable sign out: 4. In the **Settings** page, under the **General Configuration Settings**, add **DisableSignOut** as the key and set the value as 1. - By default, Disable Sign Out = 0. - Admin needs to make Disable Sign Out = 1 to disable the sign-out button in the app. Users will not see the sign out button once the policy is pushed to the device.-5. Select **Next** and assign this profile to targeted devices/users. +5. Select **Next** and assign this profile to targeted devices and users. ++> [!IMPORTANT] +> This feature is in Public Preview. The following information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. ++## Device Tagging ++Defender for Endpoint on Android enables bulk tagging the mobile devices during onboarding by allowing the admins to set up tags via Intune. Admin can configure the device tags through Intune via configuration policies and push them to userΓÇÖs devices. Once the User installs and activates Defender, the client app passes the device tags to the Security Portal. The Device tags appear against the devices in the Device Inventory. ++Use the following steps to configure the Device tags: ++1. In the Microsoft Intune admin center, go to **Apps > App configuration policies > Add > Managed apps**. +2. Provide the policy a **name**. +3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app. +4. In Settings page, select Use configuration designer and add **DefenderDeviceTag** as the key and value type as **String**. + - Admin can assign a new tag by adding the key **DefenderDeviceTag** and setting a value for device tag. + - Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**. + - Admin can delete an existing tag by removing the key **DefenderDeviceTag**. ++5. Click Next and assign this policy to targeted devices and users. +++> [!NOTE] +> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take upto 18 hours for tags to reflect in the portal. ## Related topics Use the following steps to configure the Disable sign out: [!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]+ |
security | Android Configure | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure.md | Use the following steps to configure Disable sign-out: - Admins need to make Disable Sign Out = 0 to enable the sign-out button in the app. Users will be able to see the sign-out button once the policy is pushed. 5. Select **Next** and assign this profile to targeted devices and users. +> [!IMPORTANT] +> This feature is in Public Preview. The following information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. ++## Device Tagging ++Defender for Endpoint on Android enables bulk tagging the mobile devices during onboarding by allowing the admins to set up tags via Intune. Admin can configure the device tags through Intune via configuration policies and push them to userΓÇÖs devices. Once the User installs and activates Defender, the client app passes the device tags to the Security Portal. The Device tags appear against the devices in the Device Inventory. ++Use the following steps to configure the Device tags: ++1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**. +2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type. +3. Select **Microsoft Defender for Endpoint** as the target app. +4. In Settings page, select Use configuration designer and add **DefenderDeviceTag** as the key and value type as **String**. + - Admin can assign a new tag by adding the key **DefenderDeviceTag** and setting a value for device tag. + - Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**. + - Admin can delete an existing tag by removing the key **DefenderDeviceTag**. ++5. Click Next and assign this policy to targeted devices and users. +++> [!NOTE] +> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take upto 18 hours for tags to reflect in the portal. + ## Related articles - [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md) - [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md) [!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]+ |
security | Attack Surface Reduction Rules Reference | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference.md | Office VBA enables Win32 API calls. Malware can abuse this capability, such as [ Supported operating systems: - [Windows 10, version 1709](/windows/whats-new/whats-new-windows-10-version-1709)+- [Windows 11](/windows/whats-new/whats-new-windows-11-version-22h2) +- [Windows Server 2022](/windows-server/get-started/whats-new-in-windows-server-2022) - [Windows Server, version 1809](/windows-server/get-started/whats-new-in-windows-server-1809) - [Windows Server 2019](/windows-server/get-started-19/whats-new-19) - [Configuration Manager CB 1710](/configmgr/core/servers/manage/updates) |
security | Ios Configure Features | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-configure-features.md | This configuration is available for both the enrolled (MDM) devices as well as u **For unenrolled devices(MAM)** -1. In the Microsoft Intune admin center, navigate to Apps \> App configuration policies \> Add \> Managed apps. +1. In the Microsoft Intune admin center, navigate to Apps > App configuration policies > Add > Managed apps. 1. Give the policy a name. 1. Under the Select Public Apps, choose Microsoft Defender for Endpoint as the target app. 1. In Settings page, add **DisableSignOut** as the key and value as **true**, under the General Configuration Settings. This configuration is available for both the enrolled (MDM) devices as well as u 1. Admin needs to make **DisableSignOut = true** to disable the sign-out button in the app. Users will not see the sign out button once the policy is pushed. 1. Click Next and assign this policy to targeted devices/users. +## Device Tagging ++Defender for Endpoint on iOS enables bulk tagging the mobile devices during onboarding by allowing the admins to set up tags via Intune. Admin can configure the device tags through Intune via configuration policies and push them to userΓÇÖs devices. Once the User installs and activates Defender, the client app passes the device tags to the Security Portal. The Device tags appear against the devices in the Device Inventory. ++This configuration is available for both the enrolled (MDM) devices as well as unenrolled (MAM) devices. Admins can use the following steps to configure the Device tags. ++### Configure Device tags ++**For enrolled devices(MDM)** ++1. In the Microsoft Intune admin center, navigate to Apps \> App configuration policies \> Add \> Managed devices. +1. Give the policy a name, select Platform \> iOS/iPadOS +1. Select Microsoft Defender for Endpoint as the target app. +1. In Settings page, select Use configuration designer and add **DefenderDeviceTag** as the key and value type as **String**. + - Admin can assign a new tag by adding the key **DefenderDeviceTag** and setting a value for device tag. + - Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**. + - Admin can delete an existing tag by removing the key **DefenderDeviceTag**. ++1. Click Next and assign this policy to targeted devices/users. ++**For unenrolled devices(MAM)** ++1. In the Microsoft Intune admin center, navigate to Apps > App configuration policies > Add > Managed apps. +1. Give the policy a name. +1. Under the Select Public Apps, choose Microsoft Defender for Endpoint as the target app. +1. In Settings page, add **DefenderDeviceTag** as the key under the General Configuration Settings. + - Admin can assign a new tag by adding the key **DefenderDeviceTag** and setting a value for device tag. + - Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**. + - Admin can delete an existing tag by removing the key **DefenderDeviceTag**. +1. Click Next and assign this policy to targeted devices/users. ++> [!NOTE] +> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take upto 18 hours for tags to reflect in the portal. + ## Configure option to send in-app feedback Customers now have the option to configure the ability to send feedback data to Microsoft within the Defender for Endpoint app. Feedback data helps Microsoft improve products and troubleshoot issues. Use the following steps to configure the option to send feedback data to Microso Phishing websites impersonate trustworthy websites for the purpose of obtaining your personal or financial information. Visit the [Provide feedback about network protection](https://www.microsoft.com/wdsi/filesubmission/exploitguard/networkprotection) page to report a website that could be a phishing site. [!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]+ |
security | Troubleshoot Security Config Mgt | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-security-config-mgt.md | Title: Troubleshoot onboarding issues related to Security Management for Microsoft Defender for Endpoint description: Troubleshoot issues that might arise during the onboarding of devices using Security Management for Microsoft Defender for Endpoint. -keywords: troubleshoot onboarding, onboarding issues, event viewer, data collection and preview builds, sensor data and diagnostics -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium For Security Management for Microsoft Defender for Endpoint on Windows Server 20 7. Select **Save** to save the new rule. > [!NOTE]-> After this rule change is performed, a full synchronization of your Active Directory will be required. For large environments, it is recommended to schedule this rule change and full sync during on-premise Active Directory quiet periods. +> After this rule change is performed, a full synchronization of your Active Directory is required. For large environments, it is recommended to schedule this rule change and full sync during on-premises Active Directory quiet periods. ## Related topic |
security | Alert Grading For Malicious Exchange Connectors | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-for-malicious-exchange-connectors.md | |
security | Incident Response Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incident-response-overview.md | |
security | Investigate Users | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-users.md | |
security | M365d Action Center | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-action-center.md | f1.keywords: ms.localizationpriority: medium Previously updated : 07/27/2022 Last updated : 08/04/2023 audience: ITPro You can navigate to the list of actions pending approval in two different ways: 1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a> and sign in. -2. In the navigation pane, choose **Action center**. Or, in the Automated investigation & response card, select **Approve in Action Center**. +2. In the navigation pane under **Actions and submissions**, choose **Action center**. Or, in the Automated investigation & response card, select **Approve in Action Center**. 3. Use the **Pending actions** and **History** tabs. The following table summarizes what you'll see on each tab: |
security | M365d Autoir Actions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir-actions.md | f1.keywords: ms.localizationpriority: medium Previously updated : 07/27/2022 Last updated : 08/04/2023 audience: ITPro It's important to approve (or reject) pending actions as soon as possible so tha 1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a> and sign in. -2. In the navigation pane, choose **Action center**. +2. In the navigation pane under Actions and submissions, choose **Action center**. 3. In the Action center, on the **Pending** tab, select an item in the list. Its flyout pane opens. Here's an example. |
security | M365d Autoir Report False Positives Negatives | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir-report-false-positives-negatives.md | |
security | Microsoft Secure Score Improvement Actions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-improvement-actions.md | You won't be able to choose a status for Secure Score recommended actions in the #### Completed recommended actions -recommended actions have a "completed" status once all possible points for the recommended action have been achieved. Completed recommended actions are confirmed though Microsoft data, and you can't change the status. +Recommended actions have a "completed" status once all possible points for the recommended action have been achieved. Completed recommended actions are confirmed through Microsoft data, and you can't change the status. ### Assess information and review user impact |
security | Scc Permissions | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/scc-permissions.md | Managing permissions in Defender for Office 365 or Purview compliance gives user |Role group|Description|Default roles assigned| ||||-|**Attack Simulation Administrator**|Don't use this role group in these portals. Use the corresponding role in Azure AD.|Attack Simulator Admin| -|**Attack Payload Author**|Don't use this role group in these portals. Use the corresponding role in Azure AD.|Attack Simulator Payload Author| +|**Attack Simulator Administrators**|Don't use this role group in these portals. Use the corresponding role in Azure AD.|Attack Simulator Admin| +|**Attack Simulator Payload Authors**|Don't use this role group in these portals. Use the corresponding role in Azure AD.|Attack Simulator Payload Author| +|**Audit Manager**|Manage Audit log settings and Search, View, and Export Audit logs.|Audit Logs <br/><br/> View-Only Audit Logs| +|**Audit Reader**|Search, View, and Export Audit logs.|View-Only Audit Logs| +|**Billing Administrator**|Configure Billing features.|Billing Admin| |**Communication Compliance**|Provides permission to all the communication compliance roles: administrator, analyst, investigator, and viewer.|Case Management <br/><br/> Communication Compliance Admin <br/><br/> Communication Compliance Analysis <br/><br/> Communication Compliance Case Management <br/><br/> Communication Compliance Investigation <br/><br/> Communication Compliance Viewer <br/><br/> Data Classification Feedback Provider <br/><br/> Data Connector Admin <br/><br/> Scope Manager <br/><br/> View-Only Case| |**Communication Compliance Administrators**|Administrators of communication compliance that can create/edit policies and define global settings.|Communication Compliance Admin <br/><br/> Communication Compliance Case Management <br/><br/> Data Connector Admin <br/><br/> Scope Manager| |**Communication Compliance Analysts**|Analysts of communication compliance that can investigate policy matches, view message meta data, and take remediation actions.|Communication Compliance Analysis <br/><br/> Communication Compliance Case Management| |**Communication Compliance Investigators**|Analysts of communication compliance that can investigate policy matches, view message content, and take remediation actions.|Case Management <br/><br/> Communication Compliance Analysis <br/><br/> Communication Compliance Case Management <br/><br/> Communication Compliance Investigation <br/><br/> Data Classification Feedback Provider <br/><br/> View-Only Case| |**Communication Compliance Viewers**|Viewer of communication compliance that can access the available reports and widgets.|Communication Compliance Case Management <br/><br/> Communication Compliance Viewer|-|**Compliance Administrator**<sup>1</sup>|Members can manage settings for device management, data loss prevention, reports, and preservation.|Case Management <br/><br/> Communication Compliance Admin <br/><br/> Communication Compliance Case Management <br/><br/> Compliance Administrator <br/><br/> Compliance Manager Administrator <br/><br/> Compliance Search <br/><br/> Data Classification Feedback Provider <br/><br/> Data Classification Feedback Reviewer <br/><br/> Data Connector Admin <br/><br/> Data Investigation Management <br/><br/> Device Management <br/><br/> Disposition Management <br/><br/> DLP Compliance Management <br/><br/> Hold <br/><br/> IB Compliance Management <br/><br/> Information Protection Admin <br/><br/> Information Protection Analyst <br/><br/> Information Protection Reader <br/><br/> Insider Risk Management Admin <br/><br/> Manage Alerts <br/><br/> Organization Configuration <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Scope Manager <br/><br/> View-Only Audit Logs <br/><br/> View-Only Case <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management| -|**Compliance Data Administrator**|Members can manage settings for device management, data protection, data loss prevention, reports, and preservation.|Compliance Administrator <br/><br/> Compliance Manager Administrator <br/><br/> Compliance Search <br/><br/> Device Management <br/><br/> Disposition Management <br/><br/> DLP Compliance Management <br/><br/> IB Compliance Management <br/><br/> Information Protection Admin <br/><br/> Information Protection Analyst <br/><br/> Information Protection Reader <br/><br/> Manage Alerts <br/><br/> Organization Configuration <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Scope Manager <br/><br/> Sensitivity Label Administrator <br/><br/> View-Only Audit Logs <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management| +|**Compliance Administrator**<sup>1</sup>|Members can manage settings for device management, data loss prevention, reports, and preservation.|Case Management <br/><br/> Communication Compliance Admin <br/><br/> Communication Compliance Case Management <br/><br/> Compliance Administrator <br/><br/> Compliance Manager Administration <br/><br/> Compliance Search <br/><br/> Data Classification Feedback Provider <br/><br/> Data Classification Feedback Reviewer <br/><br/> Data Connector Admin <br/><br/> Data Investigation Management <br/><br/> Device Management <br/><br/> Disposition Management <br/><br/> DLP Compliance Management <br/><br/> Hold <br/><br/> IB Compliance Management <br/><br/> Information Protection Admin <br/><br/> Information Protection Analyst <br/><br/> Information Protection Reader <br/><br/> Insider Risk Management Admin <br/><br/> Manage Alerts <br/><br/> Organization Configuration <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Scope Manager <br/><br/> View-Only Audit Logs <br/><br/> View-Only Case <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management| +|**Compliance Data Administrator**|Members can manage settings for device management, data protection, data loss prevention, reports, and preservation.|Compliance Administrator <br/><br/> Compliance Manager Administration <br/><br/> Compliance Search <br/><br/> Device Management <br/><br/> Disposition Management <br/><br/> DLP Compliance Management <br/><br/> IB Compliance Management <br/><br/> Information Protection Admin <br/><br/> Information Protection Analyst <br/><br/> Information Protection Reader <br/><br/> Manage Alerts <br/><br/> Organization Configuration <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Scope Manager <br/><br/> Sensitivity Label Administrator <br/><br/> View-Only Audit Logs <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management| |**Compliance Manager Administrators**|Manage template creation and modification.|Compliance Manager Administration <br/><br/> Compliance Manager Assessment <br/><br/> Compliance Manager Contribution <br/><br/> Compliance Manager Reader <br/><br/> Data Connector Admin| |**Compliance Manager Assessors**|Create assessments, implement improvement actions, and update test status for improvement actions.|Compliance Manager Assessment <br/><br/> Compliance Manager Contribution <br/><br/> Compliance Manager Reader <br/><br/> Data Connector Admin| |**Compliance Manager Contributors**|Create assessments and perform work to implement improvement actions.|Compliance Manager Contribution <br/><br/> Compliance Manager Reader <br/><br/> Data Connector Admin| |**Compliance Manager Readers**|View all Compliance Manager content except for administrator functions.|Compliance Manager Reader| |**Content Explorer Content Viewer**|View the contents files in Content explorer.|Data Classification Content Viewer| |**Content Explorer List Viewer**|View all items in Content explorer in list format only.|Data Classification List Viewer|+|**Data Catalog Curators**|Perform create, read, modify, and delete actions on catalog data objects and establish relationships between objects.|Data Map Reader <br/><br/> Data Map Writer| +|**Data Estate Insights Readers**|Provides read-only access to all insights reports across platforms and providers.|Data Map Reader <br/><br/> Insights Reader| |**Data Investigator**|Perform searches on mailboxes, SharePoint Online sites, and OneDrive for Business locations.|Communication <br/><br/> Compliance Search <br/><br/> Custodian <br/><br/> Data Investigation Management <br/><br/> Export <br/><br/> Preview <br/><br/> Review <br/><br/> RMS Decrypt <br/><br/> Search And Purge|+|**Data Source Administrators**|Manage data sources and data scans.|Credential Reader <br/><br/> Credential Writer <br/><br/> Scan Reader <br/><br/> Scan Writer <br/><br/> Source Reader <br/><br/> Source Writer| |**eDiscovery Manager**|Members can perform searches and place holds on mailboxes, SharePoint Online sites, and OneDrive for Business locations. Members can also create and manage eDiscovery cases, add and remove members to a case, create and edit Content Searches associated with a case, and access case data in eDiscovery (Premium). <br/><br/> An eDiscovery Administrator is a member of the eDiscovery Manager role group who has been assigned additional permissions. In addition to the tasks that an eDiscovery Manager can perform, an eDiscovery Administrator can:<ul><li>View all eDiscovery cases in the organization.</li><li>Manage any eDiscovery case after they add themselves as a member of the case.</li></ul> <br/><br/> The primary difference between an eDiscovery Manager and an eDiscovery Administrator is that an eDiscovery Administrator can access all cases that are listed on the **eDiscovery cases** page in the compliance portal. An eDiscovery manager can only access the cases they created or cases they're a member of. For more information about making a user an eDiscovery Administrator, see [Assign eDiscovery permissions in the compliance portal](../../compliance/assign-ediscovery-permissions.md).|Case Management <br/><br/> Communication <br/><br/> Compliance Search <br/><br/> Custodian <br/><br/> Export <br/><br/> Hold <br/><br/> Manage Review Set Tags <br/><br/> Preview <br/><br/> Review <br/><br/> RMS Decrypt <br/><br/> Scope Manager| |**Global Reader**|Members have read-only access to reports, alerts, and can see all the configuration and settings. <br/><br/> The primary difference between Global Reader and Security Reader is that a Global Reader can access **configuration and settings**.|Compliance Manager Reader <br/><br/> Security Reader <br/><br/> Sensitivity Label Reader <br/><br/> Service Assurance View <br/><br/> View-Only Audit Logs <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management|-|**Information Protection**|Full control over all information protection features, including sensitivity labels and their policies, DLP, all classifier types, activity and content explorers, and all related reports.|Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Information Protection Admin <br/><br/> Information Protection Analyst <br/><br/> Information Protection Investigator <br/><br/> Information Protection Reader| -|**Information Protection Admins**|Create, edit, and delete DLP policies, sensitivity labels and their policies, and all classifier types. Manage endpoint DLP settings and simulation mode for auto-labeling policies.|Information Protection Admin| -|**Information Protection Analysts**|Access and manage DLP alerts and activity explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Data Classification List Viewer <br/><br/> Information Protection Analyst| -|**Information Protection Investigators**|Access and manage DLP alerts, activity explorer, and content explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Information Protection Analyst <br/><br/> Information Protection Investigator| +|**Information Protection**|Full control over all information protection features, including sensitivity labels and their policies, DLP, all classifier types, activity and content explorers, and all related reports.|Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Information Protection Admin <br/><br/> Information Protection Analyst <br/><br/> Information Protection Investigator <br/><br/> Information Protection Reader <br/><br/> Purview Evaluation Administrator| +|**Information Protection Admins**|Create, edit, and delete DLP policies, sensitivity labels and their policies, and all classifier types. Manage endpoint DLP settings and simulation mode for auto-labeling policies.|Information Protection Admin <br/><br/> Purview Evaluation Administrator| +|**Information Protection Analysts**|Access and manage DLP alerts and activity explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Data Classification List Viewer <br/><br/> Information Protection Analyst <br/><br/> Purview Evaluation Administrator| +|**Information Protection Investigators**|Access and manage DLP alerts, activity explorer, and content explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Information Protection Analyst <br/><br/> Information Protection Investigator <br/><br/> Purview Evaluation Administrator| |**Information Protection Readers**|View-only access to reports for DLP policies and sensitivity labels and their policies.|Information Protection Reader|-|**Insider Risk Management**|Use this role group to manage insider risk management for your organization in a single group. By adding all user accounts for designated administrators, analysts, and investigators, you can configure insider risk management permissions in a single group. This role group contains all the insider risk management permission roles. This role group is the easiest way to quickly get started with insider risk management and is a good fit for organizations that don't need separate permissions defined for separate groups of users.|Case Management <br/><br/> Data Connector Admin <br/><br/> Insider Risk Management Admin <br/><br/> Insider Risk Management Analysis <br/><br/> Insider Risk Management Approval <br/><br/> Insider Risk Management Audit <br/><br/> Insider Risk Management Investigation <br/><br/> Insider Risk Management Sessions <br/><br/> Review <br/><br/> View-Only Case| -|**Insider Risk Management Admins**|Use this role group to initially configure insider risk management and later to segregate insider risk administrators into a defined group. Users in this role group can create, read, update, and delete insider risk management policies, global settings, and role group assignments.|Case Management <br/><br/> Custodian <br/><br/> Data Connector Admin <br/><br/> Insider Risk Management Admin <br/><br/> View-Only Case| +|**Insider Risk Management**|Use this role group to manage insider risk management for your organization in a single group. By adding all user accounts for designated administrators, analysts, and investigators, you can configure insider risk management permissions in a single group. This role group contains all the insider risk management permission roles. This role group is the easiest way to quickly get started with insider risk management and is a good fit for organizations that don't need separate permissions defined for separate groups of users.|Case Management <br/><br/> Custodian <br/><br/> Data Connector Admin <br/><br/> Insider Risk Management Admin <br/><br/> Insider Risk Management Analysis <br/><br/> Insider Risk Management Approval <br/><br/> Insider Risk Management Audit <br/><br/> Insider Risk Management Investigation <br/><br/> Insider Risk Management Sessions <br/><br/> Review <br/><br/> View-Only Case| +|**Insider Risk Management Admins**|Use this role group to initially configure insider risk management and later to segregate insider risk administrators into a defined group. Users in this role group can create, read, update, and delete insider risk management policies, global settings, and role group assignments.|Case Management <br/><br/> Data Connector Admin <br/><br/> Insider Risk Management Admin <br/><br/> View-Only Case| |**Insider Risk Management Analysts**|Use this group to assign permissions to users that act as insider risk case analysts. Users in this role group can access all insider risk management alerts, cases, and notices templates. They can't access the insider risk Content Explorer.|Case Management <br/><br/> Insider Risk Management Analysis <br/><br/> View-Only Case| |**Insider Risk Management Approvers**|For internal approval use only.|Insider Risk Management Approval| |**Insider Risk Management Auditors**|Use this group to assign permissions to users that audit insider risk management activities. Users in this role group can access the insider risk audit log.|Insider Risk Management Audit| Managing permissions in Defender for Office 365 or Purview compliance gives user |**IRM Contributors**|This role group is visible, but is used by background services only.|Insider Risk Management Permanent contribution <br/><br/> Insider Risk Management Temporary contribution| |**Knowledge Administrators**|Configure knowledge, learning, assign trainings and other intelligent features.|Knowledge Admin| |**MailFlow Administrator**|Members can monitor and view mail flow insights and reports in the Defender portal. Global admins can add ordinary users to this group, but, if the user isn't a member of the Exchange Admin group, the user doesn't have access to Exchange admin-related tasks.|View-Only Recipients|-|**Organization Management**<sup>1</sup>|Members can control permissions for accessing features in these portals, and also manage settings for device management, data loss prevention, reports, and preservation. <br/><br/> Users who aren't global administrators must be Exchange administrators to see and take action on devices that are managed by Basic Mobility and Security for Microsoft 365 (formerly known as Mobile Device Management or MDM). <br/><br/> Global admins are automatically added as members of this role group, but you don't see them in the output of the [Get-RoleGroupMember](/powershell/module/exchange/get-rolegroupmember) cmdlet in [Security & Compliance PowerShell](/powershell/module/exchange/get-rolegroupmember).|Audit Logs <br/><br/> Case Management <br/><br/> Communication Compliance Admin <br/><br/> Communication Compliance Case Management <br/><br/> Compliance Administrator <br/><br/> Compliance Manager Administration <br/><br/> Compliance Search <br/><br/> Data Connector Admin <br/><br/> Device Management <br/><br/> DLP Compliance Management <br/><br/> Hold <br/><br/> IB Compliance Management <br/><br/> Insider Risk Management Admin <br/><br/> Manage Alerts <br/><br/> Organization Configuration <br/><br/> Quarantine <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Role Management <br/><br/> Scope Manager <br/><br/> Search And Purge <br/><br/> Security Administrator <br/><br/> Security Reader <br/><br/> Sensitivity Label Administrator <br/><br/> Sensitivity Label Reader <br/><br/> Service Assurance View <br/><br/> Tag Manager <br/><br/> Tag Reader <br/><br/> View-Only Audit Logs <br/><br/> View-Only Case <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management| -|**Privacy Management**|Manage access control for Priva in the Microsoft Purview compliance portal.|Case Management <br/><br/> Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Admin <br/><br/> Privacy Management Analysis <br/><br/> Privacy Management Investigation <br/><br/> Privacy Management Permanent contribution <br/><br/> Privacy Management Temporary contribution <br/><br/> Privacy Management Viewer <br/><br/> Subject Rights Request Admin <br/><br/> View-Only Case| -|**Privacy Management Administrators**|Administrators of privacy management solution that can create/edit policies and define global settings.|Case Management <br/><br/> Privacy Management Admin <br/><br/> View-Only Case| -|**Privacy Management Analysts**|Analysts of privacy management solution that can investigate policy matches, view messages meta data, and take remediation actions.|Case Management <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Analysis <br/><br/> View-Only Case| -|**Privacy Management Contributors**|Manage contributor access for privacy management cases.|Privacy Management Permanent contribution <br/><br/> Privacy Management Temporary contribution| -|**Privacy Management Investigators**|Investigators of privacy management solution that can investigate policy matches, view message content, and take remediation actions.|Case Management <br/><br/> Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Investigation <br/><br/> View-Only Case| -|**Privacy Management Viewers**|Viewer of privacy management solution that can access the available dashboards and widgets.|Data Classification List Viewer <br/><br/> Privacy Management Viewer| +|**Organization Management**<sup>1</sup>|Members can control permissions for accessing features in these portals, and also manage settings for device management, data loss prevention, reports, and preservation. <br/><br/> Users who aren't global administrators must be Exchange administrators to see and take action on devices that are managed by Basic Mobility and Security for Microsoft 365 (formerly known as Mobile Device Management or MDM). <br/><br/> Global admins are automatically added as members of this role group, but you don't see them in the output of the [Get-RoleGroupMember](/powershell/module/exchange/get-rolegroupmember) cmdlet in [Security & Compliance PowerShell](/powershell/module/exchange/get-rolegroupmember).|Audit Logs <br/><br/> Case Management <br/><br/> Communication Compliance Admin <br/><br/> Communication Compliance Case Management <br/><br/> Compliance Administrator <br/><br/> Compliance Manager Administration <br/><br/> Compliance Search <br/><br/> Data Connector Admin <br/><br/> Device Management <br/><br/> DLP Compliance Management <br/><br/> Hold <br/><br/> IB Compliance Management <br/><br/> Insider Risk Management Admin <br/><br/> Manage Alerts <br/><br/> Organization Configuration <br/><br/> Quarantine <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Role Management <br/><br/> Scope Manager <br/><br/> Search And Purge <br/><br/> Security Administrator <br/><br/> Security Reader <br/><br/> Sensitivity Label Administrator <br/><br/> Sensitivity Label Reader <br/><br/> Service Assurance View <br/><br/> Tag Contributor <br/><br/> Tag Manager <br/><br/> Tag Reader <br/><br/> View-Only Audit Logs <br/><br/> View-Only Case <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management| +|**Privacy Management**|Manage access control for Privacy Management solution in the Microsoft Purview compliance portal.|Case Management <br/><br/> Compliance Manager Contribution <br/><br/> Compliance Manager Reader <br/><br/> Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Admin <br/><br/> Privacy Management Analysis <br/><br/> Privacy Management Investigation <br/><br/> Privacy Management Permanent contribution <br/><br/> Privacy Management Temporary contribution <br/><br/> Privacy Management Viewer <br/><br/> Subject Rights Request Admin <br/><br/> View-Only Case| +|**Privacy Management Administrators**|Administrators of privacy management solution that can create/edit policies and define global settings.|Case Management <br/><br/> Compliance Manager Contribution <br/><br/> Compliance Manager Reader <br/><br/> Privacy Management Admin <br/><br/> View-Only Case| +|**Privacy Management Analysts**|Analysts of privacy management solution that can investigate policy matches, view messages meta data, and take remediation actions.|Case Management <br/><br/> Compliance Manager Reader <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Analysis <br/><br/> View-Only Case| +|**Privacy Management Contributors**|Manage contributor access for privacy management cases.|Compliance Manager Reader <br/><br/> Privacy Management Permanent contribution <br/><br/> Privacy Management Temporary contribution| +|**Privacy Management Investigators**|Investigators of privacy management solution that can investigate policy matches, view message content, and take remediation actions.|Case Management <br/><br/> Compliance Manager Reader <br/><br/> Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Investigation <br/><br/> View-Only Case| +|**Privacy Management Viewers**|Viewer of privacy management solution that can access the available dashboards and widgets.|Compliance Manager Reader <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Viewer| |**Quarantine Administrator**|Members can access all Quarantine actions. For more information, see [Manage quarantined messages and files as an admin in EOP](quarantine-admin-manage-messages-files.md)|Quarantine| |**Records Management**|Members can configure all aspects of records management, including retention labels and disposition reviews.|Disposition Management <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Scope Manager| |**Reviewer**|Members can access review sets in [eDiscovery (Premium)](../../compliance/overview-ediscovery-20.md) cases. Members of this role group can see and open the list of cases on the **eDiscovery \> Advanced** page in the Microsoft Purview compliance portal that they're members of. After the user accesses an eDiscovery (Premium) case, they can select **Review sets** to access case data. This role doesn't allow the user to preview the results of a collection search that's associated with the case or do other search or case management tasks. Members of this role group can only access the data in a review set.|Review|-|**Security Administrator**|Members have access to many security features of Identity Protection Center, Privileged Identity Management, Monitor Microsoft 365 Service Health, and the Defender and compliance portals. <br/><br/> By default, this role group may not appear to have any members. However, the Security Administrator role from Azure Active Directory is assigned to this role group. Therefore, this role group inherits the capabilities and membership of the Security Administrator role from Azure Active Directory. <br/><br/> To manage permissions centrally, add and remove group members in the Azure Active Directory admin center. For more information, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference). If you edit this role group in these portals (membership or roles), those changes apply only to the security and compliance areas and not to any other services. <br/><br/> This role group includes all of the read-only permissions of the Security reader role, plus many additional administrative permissions for the same -|**Security Operator**|Members can manage security alerts, and also view reports and settings of security features.|Compliance Search <br/><br/> Manage Alerts <br/><br/> Security Reader <br/><br/> Tag Reader <br/><br/> Tenant AllowBlockList Manager <br/><br/> View-Only Audit Logs <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts| +|**Security Administrator**|Members have access to many security features of Identity Protection Center, Privileged Identity Management, Monitor Microsoft 365 Service Health, and the Defender and compliance portals. <br/><br/> By default, this role group may not appear to have any members. However, the Security Administrator role from Azure Active Directory is assigned to this role group. Therefore, this role group inherits the capabilities and membership of the Security Administrator role from Azure Active Directory. <br/><br/> To manage permissions centrally, add and remove group members in the Azure Active Directory admin center. For more information, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference). If you edit this role group in these portals (membership or roles), those changes apply only to the security and compliance areas and not to any other services. <br/><br/> This role group includes all of the read-only permissions of the Security reader role, plus many additional administrative permissions for the same +|**Security Operator**|Members can manage security alerts, and also view reports and settings of security features.|Compliance Search <br/><br/> Manage Alerts <br/><br/> Security Reader <br/><br/> Tag Contributor <br/><br/> Tag Reader <br/><br/> Tenant AllowBlockList Manager <br/><br/> View-Only Audit Logs <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts| |**Security Reader**|Members have read-only access to many security features of Identity Protection Center, Privileged Identity Management, Monitor Microsoft 365 Service Health, and the Defender and compliance portals. <br/><br/> By default, this role group may not appear to have any members. However, the Security Reader role from Azure Active Directory is assigned to this role group. Therefore, this role group inherits the capabilities and membership of the Security Reader role from Azure Active Directory. <br/><br/> To manage permissions centrally, add and remove group members in the Azure Active Directory admin center. For more information, see [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference). If you edit this role group in the portals (membership or roles), those changes apply only to security and compliance areas and not to any other services.|Compliance Manager Reader <br/><br/> Security Reader <br/><br/> Sensitivity Label Reader <br/><br/> Tag Reader <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts| |**Service Assurance User**|Members can access the Service assurance section in the compliance portal. Service assurance provides reports and documents that describe Microsoft's security practices for customer data that's stored in Microsoft 365. It also provides independent third-party audit reports on Microsoft 365. For more information, see [Service assurance in the compliance portal](../../compliance/service-assurance.md).|Service Assurance View|-|**Subject Rights Request Administrators**|Create subject rights requests.|Case Management <br/><br/> Subject Rights Request Admin <br/><br/> View-Only Case| -|**Subject Rights Request Approvers**|Approvers who are able to approve subject rights requests.|Subject Rights Request Approver| +|**Subject Rights Request Administrators**|Create subject rights requests.|Case Management <br/><br/> Compliance Manager Contribution <br/><br/> Compliance Manager Reader <br/><br/> Subject Rights Request Admin <br/><br/> View-Only Case| +|**Subject Rights Request Approvers**|Approvers who are able to approve subject rights requests.|Compliance Manager Reader <br/><br/> Subject Rights Request Approver| |**Supervisory Review**|Members can create and manage the policies that define which communications are subject to review in an organization. For more information, see [Configure communication compliance policies for your organization](../../compliance/communication-compliance-configure.md).|Supervisory Review Administrator| > [!NOTE] Managing permissions in Defender for Office 365 or Purview compliance gives user The table in this section lists the available roles and the role groups that they're assigned to by default. -The following roles aren't assigned to the Organization Management role group by default: --- Attack Simulator Admin-- Attack Simulator Payload Author-- Communication-- Communication Compliance Analysis-- Communication Compliance Investigation-- Communication Compliance Viewer-- Compliance Manager Assessment-- Compliance Manager Contribution-- Compliance Manager Reader-- Custodian-- Data Classification Content Viewer-- Data Classification Feedback Provider-- Data Classification Feedback Reviewer-- Data Classification List Viewer-- Data Investigation Management-- Disposition Management-- Export-- Information Protection Admin-- Information Protection Analyst-- Information Protection Investigator-- Information Protection Reader-- Insider Risk Management Analysis-- Insider Risk Management Approval-- Insider Risk Management Audit-- Insider Risk Management Investigation-- Insider Risk Management Permanent contribution-- Insider Risk Management Sessions-- Insider Risk Management Temporary contribution-- Knowledge Admin-- Manage Review Set Tags-- Preview-- Privacy Management Admin-- Privacy Management Analysis-- Privacy Management Investigation-- Privacy Management Permanent contribution-- Privacy Management Temporary contribution-- Privacy Management Viewer-- Review-- RMS Decrypt-- Subject Rights Request Admin-- Subject Rights Request Approver-- Supervisory Review Administrator-- Tenant AllowBlockList Manager+Roles that aren't assigned to the Organization Management role group by default are marked with <sup>\*</sup> |Role|Description|Default role group assignments| ||||-|**Attack Simulator Admin**|Don't use this role in the portals. Use the corresponding role in Azure AD.|Attack Simulation Administrator| -|**Attack Simulator Payload Author**|Don't use this role in the portals. Use the corresponding role in Azure AD.|Attack Payload Author| -|**Audit Logs**|Turn on and configure auditing for the organization, view the organization's audit reports, and then export these reports to a file.|Organization Management <br/><br/> Security Administrator| +|**Attack Simulator Admin**<sup>\*</sup>|Don't use this role in the portals. Use the corresponding role in Azure AD.|Attack Simulator Administrators| +|**Attack Simulator Payload Author**<sup>\*</sup>|Don't use this role in the portals. Use the corresponding role in Azure AD.|Attack Simulator Payload Authors| +|**Audit Logs**|Turn on and configure auditing for the organization, view the organization's audit reports, and then export these reports to a file.|Audit Manager <br/><br/> Organization Management <br/><br/> Security Administrator| +|**Billing Admin**<sup>\*</sup>|Allows billing admin for selected feature.|Billing Administrator| |**Case Management**|Create, edit, delete, and control access to eDiscovery cases.|Communication Compliance <br/><br/> Communication Compliance Investigators <br/><br/> Compliance Administrator <br/><br/> eDiscovery Manager <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Admins <br/><br/> Insider Risk Management Analysts <br/><br/> Insider Risk Management Investigators <br/><br/> Organization Management <br/><br/> Privacy Management <br/><br/> Privacy Management Administrators <br/><br/> Privacy Management Analysts <br/><br/> Privacy Management Investigators <br/><br/> Subject Rights Request Administrators|-|**Communication**|Manage all communications with the custodians identified in an eDiscovery (Premium) case. Create hold notifications, hold reminders, and escalations to management. Track custodian acknowledgment of hold notifications and manage access to the custodian portal that's used by each custodian in a case to track communications for the cases where they were identified as a custodian.|Data Investigator <br/><br/> eDiscovery Manager| +|**Communication**<sup>\*</sup>|Manage all communications with the custodians identified in an eDiscovery (Premium) case. Create hold notifications, hold reminders, and escalations to management. Track custodian acknowledgment of hold notifications and manage access to the custodian portal that's used by each custodian in a case to track communications for the cases where they were identified as a custodian.|Data Investigator <br/><br/> eDiscovery Manager| |**Communication Compliance Admin**|Used to manage policies in the Communication Compliance feature.|Communication Compliance <br/><br/> Communication Compliance Administrators <br/><br/> Compliance Administrator <br/><br/> Organization Management|-|**Communication Compliance Analysis**|Used to perform investigation, remediation of the message violations in the Communication Compliance feature. Can only view message meta data.|Communication Compliance <br/><br/> Communication Compliance Analysts <br/><br/> Communication Compliance Investigators| +|**Communication Compliance Analysis**<sup>\*</sup>|Used to perform investigation, remediation of the message violations in the Communication Compliance feature. Can only view message meta data.|Communication Compliance <br/><br/> Communication Compliance Analysts <br/><br/> Communication Compliance Investigators| |**Communication Compliance Case Management**|Used to access Communication Compliance cases.|Communication Compliance <br/><br/> Communication Compliance Administrators <br/><br/> Communication Compliance Analysts <br/><br/> Communication Compliance Investigators <br/><br/> Communication Compliance Viewers <br/><br/> Compliance Administrator <br/><br/> Organization Management|-|**Communication Compliance Investigation**|Used to perform investigation, remediation, and review message violations in the Communication Compliance feature. Can view message meta data and message.|Communication Compliance <br/><br/> Communication Compliance Investigators| -|**Communication Compliance Viewer**|Used to access reports and widgets in the Communication Compliance feature.|Communication Compliance <br/><br/> Communication Compliance Viewers| +|**Communication Compliance Investigation**<sup>\*</sup>|Used to perform investigation, remediation, and review message violations in the Communication Compliance feature. Can view message meta data and message.|Communication Compliance <br/><br/> Communication Compliance Investigators| +|**Communication Compliance Viewer**<sup>\*</sup>|Used to access reports and widgets in the Communication Compliance feature.|Communication Compliance <br/><br/> Communication Compliance Viewers| |**Compliance Administrator**|View and edit settings and reports for compliance features.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management| |**Compliance Manager Administration**|Manage template creation and modification.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Compliance Manager Administrators <br/><br/> Organization Management <br/><br/> Security Administrator|-|**Compliance Manager Assessment**|Create assessments, implement improvement actions, and update test status for improvement actions.|Compliance Manager Administrators <br/><br/> Compliance Manager Assessors| -|**Compliance Manager Contribution**|Create assessments and perform work to implement improvement actions.|Compliance Manager Administrators <br/><br/> Compliance Manager Assessors <br/><br/> Compliance Manager Contributors| -|**Compliance Manager Reader**|View all Compliance Manager content except for administrator functions.|Compliance Manager Administrators <br/><br/> Compliance Manager Assessors <br/><br/> Compliance Manager Contributors <br/><br/> Compliance Manager Readers <br/><br/> Global Reader <br/><br/> Security Reader| +|**Compliance Manager Assessment**<sup>\*</sup>|Create assessments, implement improvement actions, and update test status for improvement actions.|Compliance Manager Administrators <br/><br/> Compliance Manager Assessors| +|**Compliance Manager Contribution**<sup>\*</sup>|Create assessments and perform work to implement improvement actions.|Compliance Manager Administrators <br/><br/> Compliance Manager Assessors <br/><br/> Compliance Manager Contributors <br/><br/> Privacy Management <br/><br/> Privacy Management Administrators <br/><br/> Subject Rights Request Administrators| +|**Compliance Manager Reader**<sup>\*</sup>|View all Compliance Manager content except for administrator functions.|Compliance Manager Administrators <br/><br/> Compliance Manager Assessors <br/><br/> Compliance Manager Contributors <br/><br/> Compliance Manager Readers <br/><br/> Global Reader <br/><br/> Privacy Management <br/><br/> Privacy Management Administrators <br/><br/> Privacy Management Analysts <br/><br/> Privacy Management Contributors <br/><br/> Privacy Management Investigators <br/><br/> Privacy Management Viewers <br/><br/> Security Reader <br/><br/> Subject Rights Request Administrators <br/><br/> Subject Rights Request Approvers| |**Compliance Search**|Perform searches across mailboxes and get an estimate of the results.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Data Investigator <br/><br/> eDiscovery Manager <br/><br/> Organization Management <br/><br/> Security Operator|-|**Custodian**|Identify and manage custodians for eDiscovery (Premium) cases and use the information from Azure Active Directory and other sources to find data sources associated with custodians. Associate other data sources such as mailboxes, SharePoint sites, and Teams with custodians in a case. Place a legal hold on the data sources associated with custodians to preserve content in the context of a case.|Data Investigator <br/><br/> eDiscovery Manager <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Investigators| -|**Data Classification Content Viewer**|View in-place rendering of files in Content explorer.|Content Explorer Content Viewer <br/><br/> Information Protection <br/><br/> Information Protection Investigators <br/><br/> Privacy Management <br/><br/> Privacy Management Investigators| -|**Data Classification Feedback Provider**|Allows providing feedback to classifiers in content explorer.|Communication Compliance <br/><br/> Communication Compliance Investigators <br/><br/> Compliance Administrator| -|**Data Classification Feedback Reviewer**|Allows reviewing feedback from classifiers in feedback explorer.|Compliance Administrator| -|**Data Classification List Viewer**|View the list of files in content explorer.|Content Explorer List Viewer <br/><br/> Information Protection <br/><br/> Information Protection Analysts <br/><br/> Information Protection Investigators <br/><br/> Privacy Management <br/><br/> Privacy Management Analysts <br/><br/> Privacy Management Investigators <br/><br/> Privacy Management Viewers| +|**Credential Reader**<sup>\*</sup>|Read the different credentials created in the tenant.|Data Source Administrators| +|**Credential Writer**<sup>\*</sup>|Create and edit credentials.|Data Source Administrators| +|**Custodian**<sup>\*</sup>|Identify and manage custodians for eDiscovery (Premium) cases and use the information from Azure Active Directory and other sources to find data sources associated with custodians. Associate other data sources such as mailboxes, SharePoint sites, and Teams with custodians in a case. Place a legal hold on the data sources associated with custodians to preserve content in the context of a case.|Data Investigator <br/><br/> eDiscovery Manager <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Investigators| +|**Data Classification Content Viewer**<sup>\*</sup>|View in-place rendering of files in Content explorer.|Content Explorer Content Viewer <br/><br/> Information Protection <br/><br/> Information Protection Investigators <br/><br/> Privacy Management <br/><br/> Privacy Management Investigators| +|**Data Classification Feedback Provider**<sup>\*</sup>|Allows providing feedback to classifiers in content explorer.|Communication Compliance <br/><br/> Communication Compliance Investigators <br/><br/> Compliance Administrator| +|**Data Classification Feedback Reviewer**<sup>\*</sup>|Allows reviewing feedback from classifiers in feedback explorer.|Compliance Administrator| +|**Data Classification List Viewer**<sup>\*</sup>|View the list of files in content explorer.|Content Explorer List Viewer <br/><br/> Information Protection <br/><br/> Information Protection Analysts <br/><br/> Information Protection Investigators <br/><br/> Privacy Management <br/><br/> Privacy Management Analysts <br/><br/> Privacy Management Investigators <br/><br/> Privacy Management Viewers| |**Data Connector Admin**|Create and manage connectors to import and archive non-Microsoft data in Microsoft 365.|Communication Compliance <br/><br/> Communication Compliance Administrators <br/><br/> Compliance Administrator <br/><br/> Compliance Manager Administrators <br/><br/> Compliance Manager Assessors <br/><br/> Compliance Manager Contributors <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Admins <br/><br/> Organization Management|-|**Data Investigation Management**|Create, edit, delete, and control access to data investigation.|Compliance Administrator <br/><br/> Data Investigator| +|**Data Investigation Management**<sup>\*</sup>|Create, edit, delete, and control access to data investigation.|Compliance Administrator <br/><br/> Data Investigator| +|**Data Map Reader**<sup>\*</sup>|Read actions on data map objects.|Data Catalog Curators <br/><br/> Data Estate Insights Readers| +|**Data Map Writer**<sup>\*</sup>|Create, read, modify, and delete actions on data map objects and establish relationships between objects.|Data Catalog Curators| |**Device Management**|View and edit settings and reports for device management features.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator|-|**Disposition Management**|Control permissions for accessing Manual Disposition in the Defender and compliance portals.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Records Management| +|**Disposition Management**<sup>\*</sup>|Control permissions for accessing Manual Disposition in the Defender and compliance portals.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Records Management| |**DLP Compliance Management**|View and edit settings and reports for data loss prevention (DLP) policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator|-|**Export**|Export mailbox and site content that's returned from searches.|Data Investigator <br/><br/> eDiscovery Manager| +|**Export**<sup>\*</sup>|Export mailbox and site content that's returned from searches.|Data Investigator <br/><br/> eDiscovery Manager| |**Hold**|Place content in mailboxes, sites, and public folders on hold. When on hold, a copy of the content is stored in a secure location. Content owners are still able to modify or delete the original content.|Compliance Administrator <br/><br/> eDiscovery Manager <br/><br/> Organization Management| |**IB Compliance Management**|View, create, remove, modify, and test Information Barrier policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator|-|**Information Protection Admin**|Create, edit, and delete DLP policies, sensitivity labels and their policies, and all classifier types. Manage endpoint DLP settings and simulation mode for auto-labeling policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Information Protection <br/><br/> Information Protection Admins| -|**Information Protection Analyst**|Access and manage DLP alerts and activity explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Information Protection <br/><br/> Information Protection Analysts <br/><br/> Information Protection Investigators| -|**Information Protection Investigator**|Access and manage DLP alerts, activity explorer, and content explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Information Protection <br/><br/> Information Protection Investigators| -|**Information Protection Reader**|View-only access to reports for DLP policies and sensitivity labels and their policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Information Protection <br/><br/> Information Protection Readers| +|**Information Protection Admin**<sup>\*</sup>|Create, edit, and delete DLP policies, sensitivity labels and their policies, and all classifier types. Manage endpoint DLP settings and simulation mode for auto-labeling policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Information Protection <br/><br/> Information Protection Admins| +|**Information Protection Analyst**<sup>\*</sup>|Access and manage DLP alerts and activity explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Information Protection <br/><br/> Information Protection Analysts <br/><br/> Information Protection Investigators| +|**Information Protection Investigator**<sup>\*</sup>|Access and manage DLP alerts, activity explorer, and content explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Information Protection <br/><br/> Information Protection Investigators| +|**Information Protection Reader**<sup>\*</sup>|View-only access to reports for DLP policies and sensitivity labels and their policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Information Protection <br/><br/> Information Protection Readers| |**Insider Risk Management Admin**|Create, edit, delete, and control access to Insider Risk Management feature.|Compliance Administrator <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Admins <br/><br/> Organization Management|-|**Insider Risk Management Analysis**|Access all insider risk management alerts, cases, and notices templates.|Insider Risk Management <br/><br/> Insider Risk Management Analysts| -|**Insider Risk Management Approval**|Perform investigation, remediation, and review message violations in Privacy Management solution. Can view message metadata and full messages.|Insider Risk Management <br/><br/> Insider Risk Management Approvers| -|**Insider Risk Management Audit**|Allow viewing Insider Risk audit trails.|Insider Risk Management <br/><br/> Insider Risk Management Auditors| -|**Insider Risk Management Investigation**|Access all insider risk management alerts, cases, notices templates, and the Content Explorer for all cases.|Insider Risk Management <br/><br/> Insider Risk Management Investigators| -|**Insider Risk Management Permanent contribution**|This role group is visible, but is used by background services only.|IRM Contributors| -|**Insider Risk Management Sessions**|Perform investigation and remediation of message violations in Privacy Management solution. Can view only message metadata.|Insider Risk Management <br/><br/> Insider Risk Management Session Approvers| -|**Insider Risk Management Temporary contribution**|This role group is visible, but is used by background services only.|IRM Contributors| -|**Knowledge Admin**|Configure knowledge, learning, assign trainings and other intelligent features.|Knowledge Administrators| +|**Insider Risk Management Analysis**<sup>\*</sup>|Access all insider risk management alerts, cases, and notices templates.|Insider Risk Management <br/><br/> Insider Risk Management Analysts| +|**Insider Risk Management Approval**<sup>\*</sup>|Perform investigation, remediation, and review message violations in Privacy Management solution. Can view message metadata and full messages.|Insider Risk Management <br/><br/> Insider Risk Management Approvers| +|**Insider Risk Management Audit**<sup>\*</sup>|Allow viewing Insider Risk audit trails.|Insider Risk Management <br/><br/> Insider Risk Management Auditors| +|**Insider Risk Management Investigation**<sup>\*</sup>|Access all insider risk management alerts, cases, notices templates, and the Content Explorer for all cases.|Insider Risk Management <br/><br/> Insider Risk Management Investigators| +|**Insider Risk Management Permanent contribution**<sup>\*</sup>|This role group is visible, but is used by background services only.|IRM Contributors| +|**Insider Risk Management Sessions**<sup>\*</sup>|Perform investigation and remediation of message violations in Privacy Management solution. Can view only message metadata.|Insider Risk Management <br/><br/> Insider Risk Management Session Approvers| +|**Insider Risk Management Temporary contribution**<sup>\*</sup>|This role group is visible, but is used by background services only.|IRM Contributors| +|**Insights Reader**<sup>\*</sup>|Provides read-only access to all Insights reports in the Data Estate Insights app. Insights readers need to have at least data reader role access to a collection to view reports about that specific collection.|Data Estate Insights Readers| +|**Knowledge Admin**<sup>\*</sup>|Configure knowledge, learning, assign trainings and other intelligent features.|Knowledge Administrators| |**Manage Alerts**|View and edit settings and reports for alerts.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator|-|**Manage Review Set Tags**|Decrypt RMS-protected content when exporting search results.|eDiscovery Manager| +|**Manage Review Set Tags**<sup>\*</sup>|Decrypt RMS-protected content when exporting search results.|eDiscovery Manager| |**Organization Configuration**|Run, view, and export audit reports and manage compliance policies for DLP, devices, and preservation.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management|-|**Preview**|View a list of items that are returned from content searches, and open each item from the list to view its contents.|Data Investigator <br/><br/> eDiscovery Manager| -|**Privacy Management Admin**|Manage policies in Privacy Management and has access to all functionality of the solution.|Privacy Management <br/><br/> Privacy Management Administrators| -|**Privacy Management Analysis**|Perform investigation and remediation of the message violations in Privacy Management. Can only view messages metadata.|Privacy Management <br/><br/> Privacy Management Analysts| -|**Privacy Management Investigation**|Perform investigation, remediation, and review message violations in Privacy Management. Can view message metadata and the full message.|Privacy Management <br/><br/> Privacy Management Investigators| -|**Privacy Management Permanent contribution**|Access Privacy Management cases as a permanent contributor.|Privacy Management <br/><br/> Privacy Management Contributors| -|**Privacy Management Temporary contribution**|Access Privacy Management cases as a temporary contributor.|Privacy Management <br/><br/> Privacy Management Contributors| -|**Privacy Management Viewer**|Access dashboards and widgets in Privacy Management.|Privacy Management <br/><br/> Privacy Management Viewers| +|**Preview**<sup>\*</sup>|View a list of items that are returned from content searches, and open each item from the list to view its contents.|Data Investigator <br/><br/> eDiscovery Manager| +|**Privacy Management Admin**<sup>\*</sup>|Manage policies in Privacy Management and has access to all functionality of the solution.|Privacy Management <br/><br/> Privacy Management Administrators| +|**Privacy Management Analysis**<sup>\*</sup>|Perform investigation and remediation of the message violations in Privacy Management. Can only view messages metadata.|Privacy Management <br/><br/> Privacy Management Analysts| +|**Privacy Management Investigation**<sup>\*</sup>|Perform investigation, remediation, and review message violations in Privacy Management. Can view message metadata and the full message.|Privacy Management <br/><br/> Privacy Management Investigators| +|**Privacy Management Permanent contribution**<sup>\*</sup>|Access Privacy Management cases as a permanent contributor.|Privacy Management <br/><br/> Privacy Management Contributors| +|**Privacy Management Temporary contribution**<sup>\*</sup>|Access Privacy Management cases as a temporary contributor.|Privacy Management <br/><br/> Privacy Management Contributors| +|**Privacy Management Viewer**<sup>\*</sup>|Access dashboards and widgets in Privacy Management.|Privacy Management <br/><br/> Privacy Management Viewers| +|**Purview Evaluation Administrator**<sup>\*</sup>|Create and manage the Microsoft 365 Purview Evaluation lab.|Information Protection <br/><br/> Information Protection Admins <br/><br/> Information Protection Analysts <br/><br/> Information Protection Investigators| |**Quarantine**|Allows viewing and releasing quarantined email.|Organization Management <br/><br/> Quarantine Administrator <br/><br/> Security Administrator| |**RecordManagement**|View and edit the configuration of the records management feature.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Records Management| |**Retention Management**|Manage retention policies, retention labels, and retention label policies. Includes permissions to add and remove adaptive scopes from these policies, and to create, delete, and modify adaptive scopes.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Records Management|-|**Review**|This role lets users access review sets in eDiscovery (Premium) cases. Users who are assigned this role can see and open the list of cases on the **eDiscovery \> Advanced** page in the Microsoft Purview compliance portal that they're members of. After the user accesses an eDiscovery (Premium) case, they can select **Review sets** to access case data. This role doesn't allow the user to preview the results of a collection search that's associated with the case or do other search or case management tasks. Users with this role can only access the data in a review set.|Data Investigator <br/><br/> eDiscovery Manager <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Investigators <br/><br/> Reviewer| -|**RMS Decrypt**|Decrypt RMS-protected content when exporting search results.|Data Investigator <br/><br/> eDiscovery Manager| +|**Review**<sup>\*</sup>|This role lets users access review sets in eDiscovery (Premium) cases. Users who are assigned this role can see and open the list of cases on the **eDiscovery \> Advanced** page in the Microsoft Purview compliance portal that they're members of. After the user accesses an eDiscovery (Premium) case, they can select **Review sets** to access case data. This role doesn't allow the user to preview the results of a collection search that's associated with the case or do other search or case management tasks. Users with this role can only access the data in a review set.|Data Investigator <br/><br/> eDiscovery Manager <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Investigators <br/><br/> Reviewer| +|**RMS Decrypt**<sup>\*</sup>|Decrypt RMS-protected content when exporting search results.|Data Investigator <br/><br/> eDiscovery Manager| |**Role Management**|Manage role group membership and create or delete custom role groups.|Organization Management|+|**Scan Reader**<sup>\*</sup>|Read the different scans created in the tenant.|Data Source Administrators| +|**Scan Writer**<sup>\*</sup>|Create, update and delete scans in the tenant.|Data Source Administrators| |**Scope Manager**|Enables administrators to create, edit, delete, and control access to scoping features such as Adaptive Scopes in the organization.|Communication Compliance <br/><br/> Communication Compliance Administrators <br/><br/> Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> eDiscovery Manager <br/><br/> Organization Management <br/><br/> Records Management| |**Search And Purge**|Lets people bulk-remove data that matches the criteria of a content search.|Data Investigator <br/><br/> Organization Management| |**Security Administrator**|View and edit the configuration and reports for Security features.|Organization Management <br/><br/> Security Administrator| The following roles aren't assigned to the Organization Management role group by |**Sensitivity Label Administrator**|View, create, modify, and remove sensitivity labels.|Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator| |**Sensitivity Label Reader**|View the configuration and usage of sensitivity labels.|Global Reader <br/><br/> Organization Management <br/><br/> Security Reader| |**Service Assurance View**|Download the available documents from the Service Assurance section. Content includes independent auditing, compliance documentation, and trust-related guidance for using Microsoft 365 features to manage regulatory compliance and security risks.|Global Reader <br/><br/> Organization Management <br/><br/> Service Assurance User|-|**Subject Rights Request Admin**|Manage supervisory review policies, including which communications to review and who should perform the review.|Privacy Management <br/><br/> Subject Rights Request Administrators| -|**Subject Rights Request Approver**|Create, edit, delete, and control access to custodian.|Subject Rights Request Approvers| -|**Supervisory Review Administrator**|Manage supervisory review policies, including which communications to review and who should do the review.|Supervisory Review| +|**Source Reader**<sup>\*</sup>|Read the different sources created in the tenant.|Data Source Administrators| +|**Source Writer**<sup>\*</sup>|Create, update and delete sources in the tenant.|Data Source Administrators| +|**Subject Rights Request Admin**<sup>\*</sup>|Manage supervisory review policies, including which communications to review and who should perform the review.|Privacy Management <br/><br/> Subject Rights Request Administrators| +|**Subject Rights Request Approver**<sup>\*</sup>|Create, edit, delete, and control access to custodian.|Subject Rights Request Approvers| +|**Supervisory Review Administrator**<sup>\*</sup>|Manage supervisory review policies, including which communications to review and who should do the review.|Supervisory Review| +|**Tag Contributor**|Enables viewing and updating of existing tags.|Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator| |**Tag Manager**|View, update, create, and delete user tags.|Organization Management <br/><br/> Security Administrator| |**Tag Reader**|Read-only access to existing user tags.|Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator <br/><br/> Security Reader|-|**Tenant AllowBlockList Manager**|Manage Tenant Allow/Block List settings.|Security Operator| -|**View-Only Audit Logs**|View and export audit reports. Because these reports might contain sensitive information, you should only assign this role to people with an explicit need to view this information.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator| +|**Tenant AllowBlockList Manager**<sup>\*</sup>|Manage Tenant Allow/Block List settings.|Security Operator| +|**View-Only Audit Logs**|View and export audit reports. Because these reports might contain sensitive information, you should only assign this role to people with an explicit need to view this information.|Audit Manager <br/><br/> Audit Reader <br/><br/> Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator| |**View-Only Case**||Communication Compliance <br/><br/> Communication Compliance Investigators <br/><br/> Compliance Administrator <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Admins <br/><br/> Insider Risk Management Analysts <br/><br/> Insider Risk Management Investigators <br/><br/> Organization Management <br/><br/> Privacy Management <br/><br/> Privacy Management Administrators <br/><br/> Privacy Management Analysts <br/><br/> Privacy Management Investigators <br/><br/> Subject Rights Request Administrators| |**View-Only Device Management**|View the configuration and reports for the Device Management feature.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator <br/><br/> Security Reader| |**View-Only DLP Compliance Management**|View the settings and reports for data loss prevention (DLP) policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator <br/><br/> Security Reader| The following roles aren't assigned to the Organization Management role group by |**View-Only Manage Alerts**|View the configuration and reports for the Manage Alerts feature.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator <br/><br/> Security Reader| |**View-Only Recipients**|View information about users and groups.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> MailFlow Administrator <br/><br/> Organization Management| |**View-Only Record Management**|View the configuration of the records management feature.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management|-|**View-Only Retention Management**|View the configuration of retention policies, retention labels, and retention label policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management| +|**View-Only Retention Management**|View the configuration of retention policies, retention labels, and retention label policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management| |
solutions | B2b Extranet | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/b2b-extranet.md | description: "Learn how to create a B2B extranet site or team with managed guest # Create a B2B extranet with managed guests -You can use [Azure Active Directory Entitlement Management](/azure/active-directory/governance/entitlement-management-overview) to create a B2B extranet to collaborate with a partner organization that uses Azure Active Directory. This allows users to self-enroll in the extranet site or team and receive access via an approval workflow. +You can use [Entitlement Management](/azure/active-directory/governance/entitlement-management-overview) to create a B2B extranet to collaborate with a partner organization that uses Azure Active Directory. This allows users to self-enroll in the extranet site or team and receive access via an approval workflow. With this method of sharing resources for collaboration, the partner organization can help maintain and approve the guests on their end, reducing the burden on your IT department and allowing those most familiar with the collaboration agreement to manage user access. -This article walks through the steps to create a package of resources (in this case, a site or team) that you can share with a partner organization through a self-service access registration model. +This article walks through the steps to create a package of resources (in this case, a site or team) that you can share with a partner organization through a self-service access registration model. Before you begin, create the site or team that you want to share with the partner organization and enable it for guest sharing. See [Collaborate with guests in a site](collaborate-in-site.md) or [Collaborate with guests in a team](collaborate-as-team.md) for more information. We also recommend that you review [Create a secure guest sharing environment](create-secure-guest-sharing-environment.md) for information about security and compliance features that you can use to help maintain your governance policies when collaborating with guests. ## License requirements -Using this feature requires an Azure AD Premium P2 license. +Using this feature requires Microsoft Entra ID Governance licenses. To find the right license for your requirements, see [Compare generally available features of Microsoft Azure AD](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing). -Specialized clouds, such as Azure Germany and Azure China 21Vianet, are not currently available for use. +Specialized clouds, such as Azure Germany and Azure China 21Vianet, aren't currently available for use. ## Video demonstration This video demonstrates the procedures covered in this article. In order to invite guests from a partner organization, you need to add the partner's domain as a connected organization in Azure Active Directory. To add a connected organization-1. In [Azure Active Directory](https://aad.portal.azure.com), click **Identity Governance**. -2. Click **Connected organizations**. -4. Click **Add connected organization**. -5. Type a name and description for the organization, and then click **Next: Directory + domain**. -6. Click **Add directory + domain**. -7. Type the domain for the organization that you want to connect, and then click **Add**. -8. Click **Connect**, and then click **Next: Sponsors**. +1. In the [Microsoft Entra admin center](https://aad.portal.azure.com), select **Identity Governance**. +2. Select **Connected organizations**. +4. Select **Add connected organization**. +5. Type a name and description for the organization, and then select **Next: Directory + domain**. +6. Select **Add directory + domain**. +7. Type the domain for the organization that you want to connect, and then select **Add**. +8. Select **Connect**, and then Select **Next: Sponsors**. 9. Add people from your organization or the organization that you're connecting to who you want to approve access for guests.-10. Click **Next: Review + Create**. -11. Review the settings that you've chosen and then click **Create**. +10. Select **Next: Review + Create**. +11. Review the settings that you've chosen and then select **Create**. -  +  ## Choose the resources to share The first step in selecting resources to share with a partner organization is to create a catalog to contain them. To create a catalog-1. In [Azure Active Directory](https://aad.portal.azure.com), click **Identity Governance**. -2. Click **Catalogs**. -3. Click **New catalog**. +1. In the [Microsoft Entra admin center](https://aad.portal.azure.com), select **Identity Governance**. +2. Select **Catalogs**. +3. Select **New catalog**. 4. Type a name and description for the catalog and ensure that **Enabled** and **Enabled for external users** are both set to **Yes**.-5. Click **Create**. +5. Select **Create**. -  +  Once the catalog has been created, you add the SharePoint site or team that you want to share with the partner organization. To add resources to a catalog-1. In Azure AD Identity Governance, click **Catalogs**, and then click the catalog where you want to add resources. -2. Click **Resources** and then click **Add resources**. -3. Select the teams or SharePoint sites that you want to include in your extranet, and then click **Add**. +1. In the Microsoft Entra Admin Center, select **Catalogs**, and then select the catalog where you want to add resources. +2. Select **Resources** and then select **Add resources**. +3. Select the teams or SharePoint sites that you want to include in your extranet, and then select **Add**. -  +  Once you've defined the resources that you want to share, the next step is to create an access package, which defines the type of access that partner users are granted and the approval process for new partner users requesting access. To create an access package-1. In Azure AD Identity Governance, click **Catalogs**, and then click the catalog where you want to create an access package. -2. Click **Access packages**, and then click **New access package**. -3. Type a name and description for the access package, and then click **Next: Resource roles**. +1. In the Microsoft Entra Admin Center, select **Catalogs**, and then select the catalog where you want to create an access package. +2. Select **Access packages**, and then select **New access package**. +3. Type a name and description for the access package, and then select **Next: Resource roles**. 4. Choose the resources from the catalog that you want to use for your extranet. 5. For each resource, in the **Role** column, choose the user role you want to grant to the guests who use the extranet.-6. Click **Next: Requests**. +6. Select **Next: Requests**. 7. Under **Users who can request access**, choose **For users not in your directory**.-8. Ensure that the **Specific connected organizations** option is selected, and then click **Add directories**. -9. Choose the connected organization that you add earlier, and then click **Select** +8. Ensure that the **Specific connected organizations** option is selected, and then select **Add directories**. +9. Choose the connected organization that you add earlier, and then select **Select** 10. Under **Approval**, choose **Yes** for **Require approval**. 11. Under **First approver**, choose one of the sponsors that you added earlier or choose a specific user.-12. Click **Add fallback** and select a fallback approver. +12. CliSelectck **Add fallback** and select a fallback approver. 13. Under **Enable**, choose **Yes**.-14. Click **Next: Lifecycle**. -15. Choose the expiration and access review settings that you want to use, and then click **Next: Review + Create**. -16. Review your settings, and then click **Create**. +14. Select **Next: Lifecycle**. +15. Choose the expiration and access review settings that you want to use, and then select **Next: Review + Create**. +16. Review your settings, and then select **Create**. -  +  -If you're partnering with a large organization, you may want to hide the access package. If the package is hidden, then users in the partner organization will not see the package on their *My Access* portal. Instead, they must be sent a direct link to sign up for the package. Hiding the access package can reduce the number of inappropriate access requests and can also help keep available access packages organized in the partner organization's portal. +If you're partnering with a large organization, you may want to hide the access package. If the package is hidden, then users in the partner organization won't see the package on their *My Access* portal. Instead, they must be sent a direct link to sign up for the package. Hiding the access package can reduce the number of inappropriate access requests and can also help keep available access packages organized in the partner organization's portal. To set an access package to hidden-1. In Azure AD Identity Governance, click **Access packages**, and then click your access package. -2. On the **Overview** page, click **Edit**. -3. Under **Properties**, choose **Yes** for **Hidden**, and then click **Save**. +1. In the Microsoft Entra admin center, select **Access packages**, and then select your access package. +2. On the **Overview** page, select **Edit**. +3. Under **Properties**, choose **Yes** for **Hidden**, and then select **Save**.  To set an access package to hidden If you set the access package to hidden, you need to send a direct link to the partner organization so that they can request access to your site or team. To find the access portal link-1. In Azure AD Identity Governance, click **Access packages**, and then click your access package. -2. On the **Overview** page, click **Copy to clipboard** link for the **My Access portal link**. +1. In the Microsoft Entra Admin Center, select **Access packages**, and then select your access package. +2. On the **Overview** page, select **Copy to clipboard** link for the **My Access portal link**.  -Once you have copied the link, you can share it with your contact at the partner organization and they can send it to the users on their collaboration team. +Once you have copied the link, you can share it with your contact at the partner organization, and they can send it to the users on their collaboration team. ## See Also |
test-base | Against Windows New Features | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/test-base/against-windows-new-features.md | + + Title: 'Test against Windows new features' +description: This section shows you how to set up your own scheduled tests against preview features in Windows insider channel +search.appverid: MET150 ++++audience: Software-Vendor + Last updated : 07/27/2023++ms.localizationpriority: medium ++++f1.keywords: NOCSH +++# Test against Windows new features ++If youΓÇÖre seeking further validation of your eco-system solution(s) against Windows new features, or hesitating whether to deploy the latest Windows feature or the next version of security solution to your organization, Test Base provides you a way to automatically test your applications against preview builds in Windows Insider program (More about [Windows Insider](https://www.microsoft.com/windowsinsider/about-windows-insider-program)). ++This section shows you how to set up your own scheduled tests against preview features in Windows insider channel. ++## Prepare your package ++1. **Define content:** Depending on your package type, you may select below instructions: +- [Creating and Testing Binary Files on Test Base](testapplication.md) +- [Test your Intune application on Test Base](testintuneapplication.md) +- [Uploading a pre-built zip package](uploadapplication.md) +2. **Configure test:** Both *Out-of-Box* test and *Functional* test are supported. Selecting *Out-of-Box* will leverage the officially suggested test flow and automatically generate install / uninstall / launch / close test scripts for you; *Functional* tests will allow you more flexibility to set up your own test flow. You may also select both. ++3. **Edit package:** Edit test scripts and test flow as you need. + > [!Note] + > All your tests would be directly launched against the latest Windows OS with new features. No need to add any additional test script for system feature enablement. Thus, feature update testing would be more economical for you if you only want to validate potential compatibility issues against Windows new features since you wonΓÇÖt spend time in update/upgrade validation. ++## Sign-up for scheduled tests against preview Windows builds ++Scheduled tests against preview Windows builds are set in the **Test matrix** step. By selecting **Feature update**, your package would be tested against preview builds flight to your indicated insider channel. ++> [!div class="mx-imgBorder"] +> [](Media/test-against-windows-new-features-1.png#lightbox) ++To set up for feature updates, you must specify the target product and its preview channel from ΓÇ£*Insider Channel*ΓÇ¥ dropdown list. ++> [!div class="mx-imgBorder"] +> [](Media/test-against-windows-new-features-2.png#lightbox) ++Your selection will register your application for automatic test runs against the latest feature updates of your selected product channel and all future new updates in the latest Windows Insider Preview Builds of your selection. ++> [!Note] +> - Check in [Flight Hub](/windows-insider/flight-hub/) for more details on the Windows Insider Preview builds. +> - Windows 11, version 23H2 shares the same servicing branch as Windows 11, version 22H2. New features are firstly flight to insider audience via a simple update with enablement package(eKB) (See in [Windows client roadmap update](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-client-roadmap-update-july-2023/ba-p/3871736)). Testing against these new features will soon be supported also in Test Base Feature Update. ++You may also set your current OS in ΓÇ£*OS baseline for Insight*ΓÇ¥. We would provide you with more test insights by regression analysis of your as-is OS environment and the latest target OS. ++> [!div class="mx-imgBorder"] +> [](Media/test-against-windows-new-features-3.png#lightbox) ++- If the OS youΓÇÖre looking for didnΓÇÖt show up in our current supported product list, feel free to [Let us know your request](https://forms.office.com/r/ZeGihXBXHk), or contact us via [testbasepreview@microsoft.com](mailto:testbasepreview@microsoft.com). ++## Check Feature update test results ++A test run will be executed after the package passes the validation. For all new feature updates in your selected insider channel, an automated run will be scheduled. ++You can view the results of the test run under the **Test summary** page by clicking the link on the package name. ++> [!div class="mx-imgBorder"] +> [](Media/test-against-windows-new-features-4.png#lightbox) ++You may use the release number / release version / KB number to map with the update version pushed to your organization. You will not only get the detailed script execution results with test logs but also compare regressively with previous monthΓÇÖs execution result to deep dive into any further performance risks. In case you might need to reproduce the failure and see in detail the execution process in video, you may click on **Re-run test**. ++> [!div class="mx-imgBorder"] +> [](Media/test-against-windows-new-features-5.png#lightbox) + |